Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-8610 (GCVE-0-2016-8610)
Vulnerability from cvelistv5
Published
2017-11-13 22:00
Modified
2024-08-06 02:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:27:40.949Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "93841", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93841" }, { "name": "RHSA-2017:1659", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-1659.html" }, { "name": "RHSA-2017:1658", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1658" }, { "name": "RHSA-2017:1801", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1801" }, { "name": "RHSA-2017:0286", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0286.html" }, { "name": "RHSA-2017:1413", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1413" }, { "name": "RHSA-2017:2494", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2494" }, { "name": "FreeBSD-SA-16:35", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc" }, { "name": "RHSA-2017:1414", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1414" }, { "name": "[oss-security] 20161024 CVE-2016-8610: SSL Death Alert: OpenSSL SSL/TLS SSL3_AL_WARNING undefined alert Remote DoS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2016/q4/224" }, { "name": "RHSA-2017:0574", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0574.html" }, { "name": "DSA-3773", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3773" }, { "name": "RHSA-2017:1415", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html" }, { "name": "1037084", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037084" }, { "name": "RHSA-2017:1802", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1802" }, { "name": "RHSA-2017:2493", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2493" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20171130-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.360.cn/cve/CVE-2016-8610/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03897en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2016-8610" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenSSL", "vendor": "OpenSSL", "versions": [ { "status": "affected", "version": "All 0.9.8" }, { "status": "affected", "version": "All 1.0.1" }, { "status": "affected", "version": "1.0.2 through 1.0.2h" }, { "status": "affected", "version": "1.1.0" } ] } ], "datePublic": "2016-10-24T00:00:00", "descriptions": [ { "lang": "en", "value": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T21:14:51", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "93841", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93841" }, { "name": "RHSA-2017:1659", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-1659.html" }, { "name": "RHSA-2017:1658", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1658" }, { "name": "RHSA-2017:1801", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1801" }, { "name": "RHSA-2017:0286", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0286.html" }, { "name": "RHSA-2017:1413", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1413" }, { "name": "RHSA-2017:2494", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2494" }, { "name": "FreeBSD-SA-16:35", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc" }, { "name": "RHSA-2017:1414", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1414" }, { "name": "[oss-security] 20161024 CVE-2016-8610: SSL Death Alert: OpenSSL SSL/TLS SSL3_AL_WARNING undefined alert Remote DoS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2016/q4/224" }, { "name": "RHSA-2017:0574", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0574.html" }, { "name": "DSA-3773", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3773" }, { "name": "RHSA-2017:1415", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html" }, { "name": "1037084", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037084" }, { "name": "RHSA-2017:1802", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1802" }, { "name": "RHSA-2017:2493", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2493" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20171130-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security.360.cn/cve/CVE-2016-8610/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03897en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.paloaltonetworks.com/CVE-2016-8610" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-8610", "datePublished": "2017-11-13T22:00:00Z", "dateReserved": "2016-10-12T00:00:00", "dateUpdated": "2024-08-06T02:27:40.949Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-8610\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2017-11-13T22:29:00.203\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.\"},{\"lang\":\"es\",\"value\":\"Se ha encontrado un fallo de denegaci\u00f3n de servicio en OpenSSL en las versiones 0.9.8, 1.0.1, 1.0.2 hasta la 1.0.2h y la 1.1.0 en la forma en la que el protocolo TLS/SSL defini\u00f3 el procesamiento de paquetes ALERT durante una negociaci\u00f3n de conexi\u00f3n. Un atacante remoto podr\u00eda emplear este fallo para hacer que un servidor TLS/SSL consuma una cantidad excesiva de recursos de CPU y fracase a la hora de aceptar conexiones de otros clientes.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.2\",\"versionEndIncluding\":\"1.0.2h\",\"matchCriteriaId\":\"0BD3F477-4078-42BC-AF81-A68487FCDBEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4E446D-B9D3-45F2-9722-B41FA14A6C31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D1C00C0-C77E-4255-9ECA-20F2673C7366\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73104834-5810-48DD-9B97-549D223853F1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8442C20-41F9-47FD-9A12-E724D3A31FD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF77CDCF-B9C9-427D-B2BF-36650FB2148C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B142ACCC-F7A9-4A3B-BE60-0D6691D5058D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1ABA871-3271-48E2-A69C-5AD70AF94E53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:cn1610_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB30733E-68FC-49C4-86C0-7FEE75C366BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:cn1610:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6361DAC6-600F-4B15-8797-D67F298F46FB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62347994-1353-497C-9C4A-D5D8D95F67E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:data_ontap:-:*:*:*:*:7-mode:*:*\",\"matchCriteriaId\":\"6C2ACC32-5147-4EA5-95BE-B6B4EAB3D82B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0C4B1E5-75BF-43AE-BBAC-0DD4124C71ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0\",\"versionEndIncluding\":\"11.40\",\"matchCriteriaId\":\"9C82200F-A26E-4AD4-82FF-DC5601A28D52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:host_agent:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"546855F3-654C-48F0-B3A0-FF1ABBF04007\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*\",\"matchCriteriaId\":\"3FA5E22C-489B-4C5F-A5F3-C03F45CA8811\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5735E553-9731-4AAC-BCFF-989377F817B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap_select_deploy:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E968916-8CE0-4165-851F-14E37ECEA948\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"146A767F-DC04-454B-9913-17D3A2B5AAA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:smi-s_provider:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BB0FDCF-3750-44C6-AC5C-0CC2AAD14093\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapcenter_server:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E788440A-02B0-45F5-AFBC-7109F3177033\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:unix:*:*\",\"matchCriteriaId\":\"61D7EF01-F618-497F-9375-8003CEA3D380\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ADFF451-740F-4DBA-BD23-3881945D3E40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:storagegrid_webscale:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"813CD8F9-9F05-49A7-BB4D-E9A1D54D6DFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FED6CAE-D97F-49E0-9D00-1642A3A427B4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.1.17\",\"matchCriteriaId\":\"460EF266-5397-4FB9-B4C3-BECB2FB12AE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.0.0\",\"versionEndIncluding\":\"7.0.15\",\"matchCriteriaId\":\"2C837CEA-991C-45BA-8DFF-20F4E98E4639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.1.0\",\"versionEndIncluding\":\"7.1.10\",\"matchCriteriaId\":\"1558B8D3-B289-4143-A3C2-F8EF29CECDD3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:adaptive_access_manager:11.1.2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"530B1012-03DF-4AE2-863E-FB07351FE4A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A125E817-F974-4509-872C-B71933F42AD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55D98C27-734F-490B-92D5-251805C841B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_ip_service_activator:7.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDB13348-C8CA-4E71-9DC6-091B09D52E96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE7A60DB-A287-4E61-8131-B6314007191B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:core_rdbms:11.2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1367C5D-8815-41E6-B609-E855CB8B1AA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:core_rdbms:12.1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E150F02-5B34-4496-A024-335DF64D7F8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:core_rdbms:12.2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4059F859-A7D8-4ADD-93EE-74AF082ED34A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:core_rdbms:18c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9FFAF8E-4023-4599-9F0D-274E6517CB1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:core_rdbms:19c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B639209-A651-43FB-8F0C-B25F605521EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB654DFA-FEF9-4D00-ADB0-F3F2B6ACF13E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37209C6F-EF99-4D21-9608-B3A06D283D24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:goldengate_application_adapters:12.3.2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6F259E6-10A8-4207-8FC2-85ABD70B04C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41684398-18A4-4DC6-B8A2-3EBAA0CBF9A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0A735B4-4F3C-416B-8C08-9CB21BAD2889\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E1E416B-920B-49A0-9523-382898C2979D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24A3C819-5151-4543-A5C6-998C9387C8A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FB98961-8C99-4490-A6B8-9A5158784F5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.1.4.1.0\",\"matchCriteriaId\":\"A6DA0527-562D-457F-A2BB-3DF5EAABA1AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B40B13B7-68B3-4510-968C-6A730EB46462\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C93CC705-1F8C-4870-99E6-14BF264C3811\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F14A818F-AA16-4438-A3E4-E64C9287AC66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp2361\",\"matchCriteriaId\":\"271CACEB-10F5-4CA8-9C99-3274F18EE62D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"xcp3000\",\"versionEndExcluding\":\"xcp3070\",\"matchCriteriaId\":\"EF82224E-9EED-472E-A038-768E4179B219\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"983D27DE-BC89-454E-AE47-95A26A3651E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp2361\",\"matchCriteriaId\":\"433EEE1B-134C-48F9-8688-23C5F1ABBF0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"xcp3000\",\"versionEndExcluding\":\"xcp3070\",\"matchCriteriaId\":\"8B56D4BF-9328-4998-95F3-D23BD1349280\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5825AEE1-B668-40BD-86A9-2799430C742C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp2361\",\"matchCriteriaId\":\"47FFEE5C-5DAE-4FAD-9651-7983DE092120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"xcp3000\",\"versionEndExcluding\":\"xcp3070\",\"matchCriteriaId\":\"62AAD1D8-D312-452A-80E7-97FA3238C95F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DA2D526-BDCF-4A65-914A-B3BA3A0CD613\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp2361\",\"matchCriteriaId\":\"2FD8BD3B-C35B-4C44-B5A1-FA4646ACB374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"xcp3000\",\"versionEndExcluding\":\"xcp3070\",\"matchCriteriaId\":\"F429B6AB-44E3-412F-AAE6-33B6F1150262\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE0CF40B-E5BD-4558-9321-184D58EF621D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp2361\",\"matchCriteriaId\":\"66D6EF49-7094-41D9-BDF5-AE5846E37418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"xcp3000\",\"versionEndExcluding\":\"xcp3070\",\"matchCriteriaId\":\"78152A31-DB06-4F13-94EA-D3C94B240EE0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F3C9C09-7B2B-4DB6-8BE0-35302ED35776\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"xcp2361\",\"matchCriteriaId\":\"6593DA00-EE33-4223-BEAE-8DC629E79287\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"xcp3000\",\"versionEndExcluding\":\"xcp3070\",\"matchCriteriaId\":\"EB1FF50C-D9D0-4DF0-90F8-9259BD7B315B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95503CE5-1D06-4092-A60D-D310AADCAFB1\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0286.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0574.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-1415.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-1659.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/oss-sec/2016/q4/224\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/93841\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037084\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1413\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1414\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1658\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1801\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1802\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2493\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2494\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://security.360.cn/cve/CVE-2016-8610/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20171130-0001/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.paloaltonetworks.com/CVE-2016-8610\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03897en_us\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2017/dsa-3773\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2020.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2020.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2020.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0286.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-0574.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-1415.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2017-1659.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/oss-sec/2016/q4/224\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/93841\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037084\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1413\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1414\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1658\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1801\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1802\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2493\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2494\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://security.360.cn/cve/CVE-2016-8610/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20171130-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.paloaltonetworks.com/CVE-2016-8610\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03897en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2017/dsa-3773\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujan2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
suse-su-2018:3964-1
Vulnerability from csaf_suse
Published
2018-12-03 14:32
Modified
2018-12-03 14:32
Summary
Security update for openssl1
Notes
Title of the patch
Security update for openssl1
Description of the patch
This update for openssl1 fixes the following issues:
Security issues fixed:
- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
Patchnames
secsp3-openssl1-13887
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssl1", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssl1 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).\n- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).\n- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).\n- Fixed the \u0027One and Done\u0027 side-channel attack on RSA (bsc#1104789).\n", "title": "Description of the patch" }, { "category": "details", "text": "secsp3-openssl1-13887", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3964-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3964-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183964-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3964-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183964-1.html" }, { "category": "self", "summary": "SUSE Bug 1104789", "url": "https://bugzilla.suse.com/1104789" }, { "category": "self", "summary": "SUSE Bug 1110018", "url": "https://bugzilla.suse.com/1110018" }, { "category": "self", "summary": "SUSE Bug 1113534", "url": "https://bugzilla.suse.com/1113534" }, { "category": "self", "summary": "SUSE Bug 1113652", "url": "https://bugzilla.suse.com/1113652" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8610 page", "url": "https://www.suse.com/security/cve/CVE-2016-8610/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0734 page", "url": "https://www.suse.com/security/cve/CVE-2018-0734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5407 page", "url": "https://www.suse.com/security/cve/CVE-2018-5407/" } ], "title": "Security update for openssl1", "tracking": { "current_release_date": "2018-12-03T14:32:33Z", "generator": { "date": "2018-12-03T14:32:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3964-1", "initial_release_date": "2018-12-03T14:32:33Z", "revision_history": [ { "date": "2018-12-03T14:32:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libopenssl1-devel-1.0.1g-0.58.15.1.i586", "product": { "name": "libopenssl1-devel-1.0.1g-0.58.15.1.i586", "product_id": "libopenssl1-devel-1.0.1g-0.58.15.1.i586" } }, { "category": "product_version", "name": "libopenssl1_0_0-1.0.1g-0.58.15.1.i586", "product": { "name": "libopenssl1_0_0-1.0.1g-0.58.15.1.i586", "product_id": "libopenssl1_0_0-1.0.1g-0.58.15.1.i586" } }, { "category": "product_version", "name": "openssl1-1.0.1g-0.58.15.1.i586", "product": { "name": "openssl1-1.0.1g-0.58.15.1.i586", "product_id": "openssl1-1.0.1g-0.58.15.1.i586" } }, { "category": "product_version", "name": "openssl1-doc-1.0.1g-0.58.15.1.i586", "product": { "name": "openssl1-doc-1.0.1g-0.58.15.1.i586", "product_id": "openssl1-doc-1.0.1g-0.58.15.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libopenssl1-devel-1.0.1g-0.58.15.1.ia64", "product": { "name": "libopenssl1-devel-1.0.1g-0.58.15.1.ia64", "product_id": "libopenssl1-devel-1.0.1g-0.58.15.1.ia64" } }, { "category": "product_version", "name": "libopenssl1_0_0-1.0.1g-0.58.15.1.ia64", "product": { "name": "libopenssl1_0_0-1.0.1g-0.58.15.1.ia64", "product_id": "libopenssl1_0_0-1.0.1g-0.58.15.1.ia64" } }, { "category": "product_version", "name": "libopenssl1_0_0-x86-1.0.1g-0.58.15.1.ia64", "product": { "name": "libopenssl1_0_0-x86-1.0.1g-0.58.15.1.ia64", "product_id": "libopenssl1_0_0-x86-1.0.1g-0.58.15.1.ia64" } }, { "category": "product_version", "name": "openssl1-1.0.1g-0.58.15.1.ia64", "product": { "name": "openssl1-1.0.1g-0.58.15.1.ia64", "product_id": "openssl1-1.0.1g-0.58.15.1.ia64" } }, { "category": "product_version", "name": "openssl1-doc-1.0.1g-0.58.15.1.ia64", "product": { "name": "openssl1-doc-1.0.1g-0.58.15.1.ia64", "product_id": "openssl1-doc-1.0.1g-0.58.15.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "libopenssl1-devel-1.0.1g-0.58.15.1.ppc64", "product": { "name": "libopenssl1-devel-1.0.1g-0.58.15.1.ppc64", "product_id": "libopenssl1-devel-1.0.1g-0.58.15.1.ppc64" } }, { "category": "product_version", "name": "libopenssl1_0_0-1.0.1g-0.58.15.1.ppc64", "product": { "name": "libopenssl1_0_0-1.0.1g-0.58.15.1.ppc64", "product_id": "libopenssl1_0_0-1.0.1g-0.58.15.1.ppc64" } }, { "category": "product_version", "name": "libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.ppc64", "product": { "name": "libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.ppc64", "product_id": "libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.ppc64" } }, { "category": "product_version", "name": "openssl1-1.0.1g-0.58.15.1.ppc64", "product": { "name": "openssl1-1.0.1g-0.58.15.1.ppc64", "product_id": "openssl1-1.0.1g-0.58.15.1.ppc64" } }, { "category": "product_version", "name": "openssl1-doc-1.0.1g-0.58.15.1.ppc64", "product": { "name": "openssl1-doc-1.0.1g-0.58.15.1.ppc64", "product_id": "openssl1-doc-1.0.1g-0.58.15.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libopenssl1-devel-1.0.1g-0.58.15.1.s390x", "product": { "name": "libopenssl1-devel-1.0.1g-0.58.15.1.s390x", "product_id": "libopenssl1-devel-1.0.1g-0.58.15.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_0_0-1.0.1g-0.58.15.1.s390x", "product": { "name": "libopenssl1_0_0-1.0.1g-0.58.15.1.s390x", "product_id": "libopenssl1_0_0-1.0.1g-0.58.15.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.s390x", "product": { "name": "libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.s390x", "product_id": "libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.s390x" } }, { "category": "product_version", "name": "openssl1-1.0.1g-0.58.15.1.s390x", "product": { "name": "openssl1-1.0.1g-0.58.15.1.s390x", "product_id": "openssl1-1.0.1g-0.58.15.1.s390x" } }, { "category": "product_version", "name": "openssl1-doc-1.0.1g-0.58.15.1.s390x", "product": { "name": "openssl1-doc-1.0.1g-0.58.15.1.s390x", "product_id": "openssl1-doc-1.0.1g-0.58.15.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libopenssl1-devel-1.0.1g-0.58.15.1.x86_64", "product": { "name": "libopenssl1-devel-1.0.1g-0.58.15.1.x86_64", "product_id": "libopenssl1-devel-1.0.1g-0.58.15.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-1.0.1g-0.58.15.1.x86_64", "product": { "name": "libopenssl1_0_0-1.0.1g-0.58.15.1.x86_64", "product_id": "libopenssl1_0_0-1.0.1g-0.58.15.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.x86_64", "product": { "name": "libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.x86_64", "product_id": "libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.x86_64" } }, { "category": "product_version", "name": "openssl1-1.0.1g-0.58.15.1.x86_64", "product": { "name": "openssl1-1.0.1g-0.58.15.1.x86_64", "product_id": "openssl1-1.0.1g-0.58.15.1.x86_64" } }, { "category": "product_version", "name": "openssl1-doc-1.0.1g-0.58.15.1.x86_64", "product": { "name": "openssl1-doc-1.0.1g-0.58.15.1.x86_64", "product_id": "openssl1-doc-1.0.1g-0.58.15.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11-SECURITY", "product": { "name": "SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:security" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libopenssl1-devel-1.0.1g-0.58.15.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.i586" }, "product_reference": "libopenssl1-devel-1.0.1g-0.58.15.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1-devel-1.0.1g-0.58.15.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ia64" }, "product_reference": "libopenssl1-devel-1.0.1g-0.58.15.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1-devel-1.0.1g-0.58.15.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ppc64" }, "product_reference": "libopenssl1-devel-1.0.1g-0.58.15.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1-devel-1.0.1g-0.58.15.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.s390x" }, "product_reference": "libopenssl1-devel-1.0.1g-0.58.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1-devel-1.0.1g-0.58.15.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.x86_64" }, "product_reference": "libopenssl1-devel-1.0.1g-0.58.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1g-0.58.15.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.i586" }, "product_reference": "libopenssl1_0_0-1.0.1g-0.58.15.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1g-0.58.15.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ia64" }, "product_reference": "libopenssl1_0_0-1.0.1g-0.58.15.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1g-0.58.15.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ppc64" }, "product_reference": "libopenssl1_0_0-1.0.1g-0.58.15.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1g-0.58.15.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.s390x" }, "product_reference": "libopenssl1_0_0-1.0.1g-0.58.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1g-0.58.15.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.x86_64" }, "product_reference": "libopenssl1_0_0-1.0.1g-0.58.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.ppc64" }, "product_reference": "libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.s390x" }, "product_reference": "libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.x86_64" }, "product_reference": "libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-x86-1.0.1g-0.58.15.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.58.15.1.ia64" }, "product_reference": "libopenssl1_0_0-x86-1.0.1g-0.58.15.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-1.0.1g-0.58.15.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.i586" }, "product_reference": "openssl1-1.0.1g-0.58.15.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-1.0.1g-0.58.15.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ia64" }, "product_reference": "openssl1-1.0.1g-0.58.15.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-1.0.1g-0.58.15.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ppc64" }, "product_reference": "openssl1-1.0.1g-0.58.15.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-1.0.1g-0.58.15.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.s390x" }, "product_reference": "openssl1-1.0.1g-0.58.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-1.0.1g-0.58.15.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.x86_64" }, "product_reference": "openssl1-1.0.1g-0.58.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-doc-1.0.1g-0.58.15.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.i586" }, "product_reference": "openssl1-doc-1.0.1g-0.58.15.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-doc-1.0.1g-0.58.15.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ia64" }, "product_reference": "openssl1-doc-1.0.1g-0.58.15.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-doc-1.0.1g-0.58.15.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ppc64" }, "product_reference": "openssl1-doc-1.0.1g-0.58.15.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-doc-1.0.1g-0.58.15.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.s390x" }, "product_reference": "openssl1-doc-1.0.1g-0.58.15.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-doc-1.0.1g-0.58.15.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.x86_64" }, "product_reference": "openssl1-doc-1.0.1g-0.58.15.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8610" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8610", "url": "https://www.suse.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1005879 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005879" }, { "category": "external", "summary": "SUSE Bug 1110018 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1110018" }, { "category": "external", "summary": "SUSE Bug 1120592 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1120592" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-8610", "url": "https://bugzilla.suse.com/982575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-03T14:32:33Z", "details": "important" } ], "title": "CVE-2016-8610" }, { "cve": "CVE-2018-0734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0734" } ], "notes": [ { "category": "general", "text": "The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0734", "url": "https://www.suse.com/security/cve/CVE-2018-0734" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1113652 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113652" }, { "category": "external", "summary": "SUSE Bug 1113742 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113742" }, { "category": "external", "summary": "SUSE Bug 1122198 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1122198" }, { "category": "external", "summary": "SUSE Bug 1122212 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1122212" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-03T14:32:33Z", "details": "moderate" } ], "title": "CVE-2018-0734" }, { "cve": "CVE-2018-5407", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5407" } ], "notes": [ { "category": "general", "text": "Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on \u0027port contention\u0027.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5407", "url": "https://www.suse.com/security/cve/CVE-2018-5407" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1116195 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1116195" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.58.15.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.58.15.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-03T14:32:33Z", "details": "moderate" } ], "title": "CVE-2018-5407" } ] }
suse-su-2018:3994-1
Vulnerability from csaf_suse
Published
2018-12-06 08:40
Modified
2018-12-06 08:40
Summary
Security update for compat-openssl097g
Notes
Title of the patch
Security update for compat-openssl097g
Description of the patch
This update for compat-openssl097g fixes the following issues:
Security issue fixed:
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
Non-security issue fixed:
- Fixed timing vulnerability in DSA signature generation (bsc#1113742).
Patchnames
slesappsp4-compat-openssl097g-13896
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for compat-openssl097g", "title": "Title of the patch" }, { "category": "description", "text": "This update for compat-openssl097g fixes the following issues:\n\nSecurity issue fixed:\n\n- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).\n\nNon-security issue fixed:\n\n- Fixed timing vulnerability in DSA signature generation (bsc#1113742).\n", "title": "Description of the patch" }, { "category": "details", "text": "slesappsp4-compat-openssl097g-13896", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3994-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3994-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183994-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3994-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-December/004924.html" }, { "category": "self", "summary": "SUSE Bug 1110018", "url": "https://bugzilla.suse.com/1110018" }, { "category": "self", "summary": "SUSE Bug 1113742", "url": "https://bugzilla.suse.com/1113742" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8610 page", "url": "https://www.suse.com/security/cve/CVE-2016-8610/" } ], "title": "Security update for compat-openssl097g", "tracking": { "current_release_date": "2018-12-06T08:40:32Z", "generator": { "date": "2018-12-06T08:40:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3994-1", "initial_release_date": "2018-12-06T08:40:32Z", "revision_history": [ { "date": "2018-12-06T08:40:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "compat-openssl097g-0.9.7g-146.22.51.8.1.ppc64", "product": { "name": "compat-openssl097g-0.9.7g-146.22.51.8.1.ppc64", "product_id": "compat-openssl097g-0.9.7g-146.22.51.8.1.ppc64" } }, { "category": "product_version", "name": "compat-openssl097g-32bit-0.9.7g-146.22.51.8.1.ppc64", "product": { "name": "compat-openssl097g-32bit-0.9.7g-146.22.51.8.1.ppc64", "product_id": "compat-openssl097g-32bit-0.9.7g-146.22.51.8.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "compat-openssl097g-0.9.7g-146.22.51.8.1.x86_64", "product": { "name": "compat-openssl097g-0.9.7g-146.22.51.8.1.x86_64", "product_id": "compat-openssl097g-0.9.7g-146.22.51.8.1.x86_64" } }, { "category": "product_version", "name": "compat-openssl097g-32bit-0.9.7g-146.22.51.8.1.x86_64", "product": { "name": "compat-openssl097g-32bit-0.9.7g-146.22.51.8.1.x86_64", "product_id": "compat-openssl097g-32bit-0.9.7g-146.22.51.8.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "compat-openssl097g-0.9.7g-146.22.51.8.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.8.1.ppc64" }, "product_reference": "compat-openssl097g-0.9.7g-146.22.51.8.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl097g-0.9.7g-146.22.51.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.8.1.x86_64" }, "product_reference": "compat-openssl097g-0.9.7g-146.22.51.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl097g-32bit-0.9.7g-146.22.51.8.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.8.1.ppc64" }, "product_reference": "compat-openssl097g-32bit-0.9.7g-146.22.51.8.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl097g-32bit-0.9.7g-146.22.51.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.8.1.x86_64" }, "product_reference": "compat-openssl097g-32bit-0.9.7g-146.22.51.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8610" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.8.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.8.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8610", "url": "https://www.suse.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1005879 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005879" }, { "category": "external", "summary": "SUSE Bug 1110018 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1110018" }, { "category": "external", "summary": "SUSE Bug 1120592 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1120592" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-8610", "url": "https://bugzilla.suse.com/982575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.8.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.8.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.8.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.51.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.8.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.51.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-06T08:40:32Z", "details": "important" } ], "title": "CVE-2016-8610" } ] }
suse-su-2017:0495-1
Vulnerability from csaf_suse
Published
2017-02-17 13:29
Modified
2017-02-17 13:29
Summary
Security update for openssl1
Notes
Title of the patch
Security update for openssl1
Description of the patch
This update for openssl1 fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)
Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085)
- Degrade the 3DES cipher to MEDIUM in SSLv2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)
Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- call c_rehash in %post (bsc#1001707)
- ship static libraries in the devel package (bsc#1022644)
Patchnames
secsp3-openssl1-12991
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssl1", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for openssl1 fixes the following issues contained in the\nOpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)\n\nSecurity issues fixed:\n- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)\n- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)\n- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085)\n- Degrade the 3DES cipher to MEDIUM in SSLv2 (bsc#1001912)\n- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)\n\nBugs fixed:\n- fix crash in openssl speed (bsc#1000677)\n- call c_rehash in %post (bsc#1001707)\n- ship static libraries in the devel package (bsc#1022644)\n", "title": "Description of the patch" }, { "category": "details", "text": "secsp3-openssl1-12991", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0495-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0495-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170495-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0495-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-February/002653.html" }, { "category": "self", "summary": "SUSE Bug 1000677", "url": "https://bugzilla.suse.com/1000677" }, { "category": "self", "summary": "SUSE Bug 1001707", "url": "https://bugzilla.suse.com/1001707" }, { "category": "self", "summary": "SUSE Bug 1001912", "url": "https://bugzilla.suse.com/1001912" }, { "category": "self", "summary": "SUSE Bug 1004499", "url": "https://bugzilla.suse.com/1004499" }, { "category": "self", "summary": "SUSE Bug 1005878", "url": "https://bugzilla.suse.com/1005878" }, { "category": "self", "summary": "SUSE Bug 1019334", "url": "https://bugzilla.suse.com/1019334" }, { "category": "self", "summary": "SUSE Bug 1021641", "url": "https://bugzilla.suse.com/1021641" }, { "category": "self", "summary": "SUSE Bug 1022085", "url": "https://bugzilla.suse.com/1022085" }, { "category": "self", "summary": "SUSE Bug 1022644", "url": "https://bugzilla.suse.com/1022644" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2108 page", "url": "https://www.suse.com/security/cve/CVE-2016-2108/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7056 page", "url": "https://www.suse.com/security/cve/CVE-2016-7056/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8610 page", "url": "https://www.suse.com/security/cve/CVE-2016-8610/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3731 page", "url": "https://www.suse.com/security/cve/CVE-2017-3731/" } ], "title": "Security update for openssl1", "tracking": { "current_release_date": "2017-02-17T13:29:39Z", "generator": { "date": "2017-02-17T13:29:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0495-1", "initial_release_date": "2017-02-17T13:29:39Z", "revision_history": [ { "date": "2017-02-17T13:29:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libopenssl1-devel-1.0.1g-0.57.1.i586", "product": { "name": "libopenssl1-devel-1.0.1g-0.57.1.i586", "product_id": "libopenssl1-devel-1.0.1g-0.57.1.i586" } }, { "category": "product_version", "name": "libopenssl1_0_0-1.0.1g-0.57.1.i586", "product": { "name": "libopenssl1_0_0-1.0.1g-0.57.1.i586", "product_id": "libopenssl1_0_0-1.0.1g-0.57.1.i586" } }, { "category": "product_version", "name": "openssl1-1.0.1g-0.57.1.i586", "product": { "name": "openssl1-1.0.1g-0.57.1.i586", "product_id": "openssl1-1.0.1g-0.57.1.i586" } }, { "category": "product_version", "name": "openssl1-doc-1.0.1g-0.57.1.i586", "product": { "name": "openssl1-doc-1.0.1g-0.57.1.i586", "product_id": "openssl1-doc-1.0.1g-0.57.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libopenssl1-devel-1.0.1g-0.57.1.ia64", "product": { "name": "libopenssl1-devel-1.0.1g-0.57.1.ia64", "product_id": "libopenssl1-devel-1.0.1g-0.57.1.ia64" } }, { "category": "product_version", "name": "libopenssl1_0_0-1.0.1g-0.57.1.ia64", "product": { "name": "libopenssl1_0_0-1.0.1g-0.57.1.ia64", "product_id": "libopenssl1_0_0-1.0.1g-0.57.1.ia64" } }, { "category": "product_version", "name": "libopenssl1_0_0-x86-1.0.1g-0.57.1.ia64", "product": { "name": "libopenssl1_0_0-x86-1.0.1g-0.57.1.ia64", "product_id": "libopenssl1_0_0-x86-1.0.1g-0.57.1.ia64" } }, { "category": "product_version", "name": "openssl1-1.0.1g-0.57.1.ia64", "product": { "name": "openssl1-1.0.1g-0.57.1.ia64", "product_id": "openssl1-1.0.1g-0.57.1.ia64" } }, { "category": "product_version", "name": "openssl1-doc-1.0.1g-0.57.1.ia64", "product": { "name": "openssl1-doc-1.0.1g-0.57.1.ia64", "product_id": "openssl1-doc-1.0.1g-0.57.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "libopenssl1-devel-1.0.1g-0.57.1.ppc64", "product": { "name": "libopenssl1-devel-1.0.1g-0.57.1.ppc64", "product_id": "libopenssl1-devel-1.0.1g-0.57.1.ppc64" } }, { "category": "product_version", "name": "libopenssl1_0_0-1.0.1g-0.57.1.ppc64", "product": { "name": "libopenssl1_0_0-1.0.1g-0.57.1.ppc64", "product_id": "libopenssl1_0_0-1.0.1g-0.57.1.ppc64" } }, { "category": "product_version", "name": "libopenssl1_0_0-32bit-1.0.1g-0.57.1.ppc64", "product": { "name": "libopenssl1_0_0-32bit-1.0.1g-0.57.1.ppc64", "product_id": "libopenssl1_0_0-32bit-1.0.1g-0.57.1.ppc64" } }, { "category": "product_version", "name": "openssl1-1.0.1g-0.57.1.ppc64", "product": { "name": "openssl1-1.0.1g-0.57.1.ppc64", "product_id": "openssl1-1.0.1g-0.57.1.ppc64" } }, { "category": "product_version", "name": "openssl1-doc-1.0.1g-0.57.1.ppc64", "product": { "name": "openssl1-doc-1.0.1g-0.57.1.ppc64", "product_id": "openssl1-doc-1.0.1g-0.57.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libopenssl1-devel-1.0.1g-0.57.1.s390x", "product": { "name": "libopenssl1-devel-1.0.1g-0.57.1.s390x", "product_id": "libopenssl1-devel-1.0.1g-0.57.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_0_0-1.0.1g-0.57.1.s390x", "product": { "name": "libopenssl1_0_0-1.0.1g-0.57.1.s390x", "product_id": "libopenssl1_0_0-1.0.1g-0.57.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_0_0-32bit-1.0.1g-0.57.1.s390x", "product": { "name": "libopenssl1_0_0-32bit-1.0.1g-0.57.1.s390x", "product_id": "libopenssl1_0_0-32bit-1.0.1g-0.57.1.s390x" } }, { "category": "product_version", "name": "openssl1-1.0.1g-0.57.1.s390x", "product": { "name": "openssl1-1.0.1g-0.57.1.s390x", "product_id": "openssl1-1.0.1g-0.57.1.s390x" } }, { "category": "product_version", "name": "openssl1-doc-1.0.1g-0.57.1.s390x", "product": { "name": "openssl1-doc-1.0.1g-0.57.1.s390x", "product_id": "openssl1-doc-1.0.1g-0.57.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libopenssl1-devel-1.0.1g-0.57.1.x86_64", "product": { "name": "libopenssl1-devel-1.0.1g-0.57.1.x86_64", "product_id": "libopenssl1-devel-1.0.1g-0.57.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-1.0.1g-0.57.1.x86_64", "product": { "name": "libopenssl1_0_0-1.0.1g-0.57.1.x86_64", "product_id": "libopenssl1_0_0-1.0.1g-0.57.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-32bit-1.0.1g-0.57.1.x86_64", "product": { "name": "libopenssl1_0_0-32bit-1.0.1g-0.57.1.x86_64", "product_id": "libopenssl1_0_0-32bit-1.0.1g-0.57.1.x86_64" } }, { "category": "product_version", "name": "openssl1-1.0.1g-0.57.1.x86_64", "product": { "name": "openssl1-1.0.1g-0.57.1.x86_64", "product_id": "openssl1-1.0.1g-0.57.1.x86_64" } }, { "category": "product_version", "name": "openssl1-doc-1.0.1g-0.57.1.x86_64", "product": { "name": "openssl1-doc-1.0.1g-0.57.1.x86_64", "product_id": "openssl1-doc-1.0.1g-0.57.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11-SECURITY", "product": { "name": "SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:security" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libopenssl1-devel-1.0.1g-0.57.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.i586" }, "product_reference": "libopenssl1-devel-1.0.1g-0.57.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1-devel-1.0.1g-0.57.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ia64" }, "product_reference": "libopenssl1-devel-1.0.1g-0.57.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1-devel-1.0.1g-0.57.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ppc64" }, "product_reference": "libopenssl1-devel-1.0.1g-0.57.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1-devel-1.0.1g-0.57.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.s390x" }, "product_reference": "libopenssl1-devel-1.0.1g-0.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1-devel-1.0.1g-0.57.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.x86_64" }, "product_reference": "libopenssl1-devel-1.0.1g-0.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1g-0.57.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.i586" }, "product_reference": "libopenssl1_0_0-1.0.1g-0.57.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1g-0.57.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ia64" }, "product_reference": "libopenssl1_0_0-1.0.1g-0.57.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1g-0.57.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ppc64" }, "product_reference": "libopenssl1_0_0-1.0.1g-0.57.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1g-0.57.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.s390x" }, "product_reference": "libopenssl1_0_0-1.0.1g-0.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1g-0.57.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.x86_64" }, "product_reference": "libopenssl1_0_0-1.0.1g-0.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-32bit-1.0.1g-0.57.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.ppc64" }, "product_reference": "libopenssl1_0_0-32bit-1.0.1g-0.57.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-32bit-1.0.1g-0.57.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.s390x" }, "product_reference": "libopenssl1_0_0-32bit-1.0.1g-0.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-32bit-1.0.1g-0.57.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.x86_64" }, "product_reference": "libopenssl1_0_0-32bit-1.0.1g-0.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-x86-1.0.1g-0.57.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.57.1.ia64" }, "product_reference": "libopenssl1_0_0-x86-1.0.1g-0.57.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-1.0.1g-0.57.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.i586" }, "product_reference": "openssl1-1.0.1g-0.57.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-1.0.1g-0.57.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ia64" }, "product_reference": "openssl1-1.0.1g-0.57.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-1.0.1g-0.57.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ppc64" }, "product_reference": "openssl1-1.0.1g-0.57.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-1.0.1g-0.57.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.s390x" }, "product_reference": "openssl1-1.0.1g-0.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-1.0.1g-0.57.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.x86_64" }, "product_reference": "openssl1-1.0.1g-0.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-doc-1.0.1g-0.57.1.i586 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.i586" }, "product_reference": "openssl1-doc-1.0.1g-0.57.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-doc-1.0.1g-0.57.1.ia64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ia64" }, "product_reference": "openssl1-doc-1.0.1g-0.57.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-doc-1.0.1g-0.57.1.ppc64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ppc64" }, "product_reference": "openssl1-doc-1.0.1g-0.57.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-doc-1.0.1g-0.57.1.s390x as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.s390x" }, "product_reference": "openssl1-doc-1.0.1g-0.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" }, { "category": "default_component_of", "full_product_name": { "name": "openssl1-doc-1.0.1g-0.57.1.x86_64 as component of SUSE Linux Enterprise Server 11-SECURITY", "product_id": "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.x86_64" }, "product_reference": "openssl1-doc-1.0.1g-0.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11-SECURITY" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2108", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2108" } ], "notes": [ { "category": "general", "text": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2108", "url": "https://www.suse.com/security/cve/CVE-2016-2108" }, { "category": "external", "summary": "SUSE Bug 1001502 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1001502" }, { "category": "external", "summary": "SUSE Bug 1004499 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1004499" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 977584 for CVE-2016-2108", "url": "https://bugzilla.suse.com/977584" }, { "category": "external", "summary": "SUSE Bug 977617 for CVE-2016-2108", "url": "https://bugzilla.suse.com/977617" }, { "category": "external", "summary": "SUSE Bug 978492 for CVE-2016-2108", "url": "https://bugzilla.suse.com/978492" }, { "category": "external", "summary": "SUSE Bug 989345 for CVE-2016-2108", "url": "https://bugzilla.suse.com/989345" }, { "category": "external", "summary": "SUSE Bug 996067 for CVE-2016-2108", "url": "https://bugzilla.suse.com/996067" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:29:39Z", "details": "important" } ], "title": "CVE-2016-2108" }, { "cve": "CVE-2016-7056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7056" } ], "notes": [ { "category": "general", "text": "A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7056", "url": "https://www.suse.com/security/cve/CVE-2016-7056" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1019334 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1019334" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:29:39Z", "details": "moderate" } ], "title": "CVE-2016-7056" }, { "cve": "CVE-2016-8610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8610" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8610", "url": "https://www.suse.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1005879 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005879" }, { "category": "external", "summary": "SUSE Bug 1110018 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1110018" }, { "category": "external", "summary": "SUSE Bug 1120592 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1120592" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-8610", "url": "https://bugzilla.suse.com/982575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:29:39Z", "details": "important" } ], "title": "CVE-2016-8610" }, { "cve": "CVE-2017-3731", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3731" } ], "notes": [ { "category": "general", "text": "If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3731", "url": "https://www.suse.com/security/cve/CVE-2017-3731" }, { "category": "external", "summary": "SUSE Bug 1021641 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1021641" }, { "category": "external", "summary": "SUSE Bug 1022085 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1022085" }, { "category": "external", "summary": "SUSE Bug 1064118 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1064118" }, { "category": "external", "summary": "SUSE Bug 1064119 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1064119" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1-devel-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-32bit-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:libopenssl1_0_0-x86-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-1.0.1g-0.57.1.x86_64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.i586", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ia64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.ppc64", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.s390x", "SUSE Linux Enterprise Server 11-SECURITY:openssl1-doc-1.0.1g-0.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-17T13:29:39Z", "details": "moderate" } ], "title": "CVE-2017-3731" } ] }
suse-su-2017:0461-1
Vulnerability from csaf_suse
Published
2017-02-14 14:18
Modified
2017-02-14 14:18
Summary
Security update for openssl
Notes
Title of the patch
Security update for openssl
Description of the patch
This update for openssl fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)
Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)
- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085, CVE-2017-3731)
- Degrade the 3DES cipher to MEDIUM in SSLv2 (bsc#1001912)
Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- fix ca-bundle path (bsc#1022271)
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2017-236,SUSE-SLE-SDK-12-SP1-2017-236,SUSE-SLE-SERVER-12-SP1-2017-236
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssl", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for openssl fixes the following issues contained in the\nOpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)\n\nSecurity issues fixed:\n- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)\n- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)\n- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)\n- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085, CVE-2017-3731)\n- Degrade the 3DES cipher to MEDIUM in SSLv2 (bsc#1001912)\n\nBugs fixed:\n- fix crash in openssl speed (bsc#1000677)\n- fix ca-bundle path (bsc#1022271)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2017-236,SUSE-SLE-SDK-12-SP1-2017-236,SUSE-SLE-SERVER-12-SP1-2017-236", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0461-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0461-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170461-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0461-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-February/002642.html" }, { "category": "self", "summary": "SUSE Bug 1000677", "url": "https://bugzilla.suse.com/1000677" }, { "category": "self", "summary": "SUSE Bug 1001912", "url": "https://bugzilla.suse.com/1001912" }, { "category": "self", "summary": "SUSE Bug 1004499", "url": "https://bugzilla.suse.com/1004499" }, { "category": "self", "summary": "SUSE Bug 1005878", "url": "https://bugzilla.suse.com/1005878" }, { "category": "self", "summary": "SUSE Bug 1019334", "url": "https://bugzilla.suse.com/1019334" }, { "category": "self", "summary": "SUSE Bug 1021641", "url": "https://bugzilla.suse.com/1021641" }, { "category": "self", "summary": "SUSE Bug 1022085", "url": "https://bugzilla.suse.com/1022085" }, { "category": "self", "summary": "SUSE Bug 1022271", "url": "https://bugzilla.suse.com/1022271" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2108 page", "url": "https://www.suse.com/security/cve/CVE-2016-2108/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7056 page", "url": "https://www.suse.com/security/cve/CVE-2016-7056/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8610 page", "url": "https://www.suse.com/security/cve/CVE-2016-8610/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3731 page", "url": "https://www.suse.com/security/cve/CVE-2017-3731/" } ], "title": "Security update for openssl", "tracking": { "current_release_date": "2017-02-14T14:18:29Z", "generator": { "date": "2017-02-14T14:18:29Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0461-1", "initial_release_date": "2017-02-14T14:18:29Z", "revision_history": [ { "date": "2017-02-14T14:18:29Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssl-doc-1.0.1i-54.5.1.noarch", "product": { "name": "openssl-doc-1.0.1i-54.5.1.noarch", "product_id": "openssl-doc-1.0.1i-54.5.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libopenssl-devel-1.0.1i-54.5.1.ppc64le", "product": { "name": "libopenssl-devel-1.0.1i-54.5.1.ppc64le", "product_id": "libopenssl-devel-1.0.1i-54.5.1.ppc64le" } }, { "category": "product_version", "name": "libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "product": { "name": "libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "product_id": "libopenssl1_0_0-1.0.1i-54.5.1.ppc64le" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "product": { "name": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "product_id": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le" } }, { "category": "product_version", "name": "openssl-1.0.1i-54.5.1.ppc64le", "product": { "name": "openssl-1.0.1i-54.5.1.ppc64le", "product_id": "openssl-1.0.1i-54.5.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libopenssl-devel-1.0.1i-54.5.1.s390x", "product": { "name": "libopenssl-devel-1.0.1i-54.5.1.s390x", "product_id": "libopenssl-devel-1.0.1i-54.5.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_0_0-1.0.1i-54.5.1.s390x", "product": { "name": "libopenssl1_0_0-1.0.1i-54.5.1.s390x", "product_id": "libopenssl1_0_0-1.0.1i-54.5.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "product": { "name": "libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "product_id": "libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "product": { "name": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "product_id": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "product": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "product_id": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x" } }, { "category": "product_version", "name": "openssl-1.0.1i-54.5.1.s390x", "product": { "name": "openssl-1.0.1i-54.5.1.s390x", "product_id": "openssl-1.0.1i-54.5.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "product": { "name": "libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "product_id": "libopenssl1_0_0-1.0.1i-54.5.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "product": { "name": "libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "product_id": "libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64" } }, { "category": "product_version", "name": "openssl-1.0.1i-54.5.1.x86_64", "product": { "name": "openssl-1.0.1i-54.5.1.x86_64", "product_id": "openssl-1.0.1i-54.5.1.x86_64" } }, { "category": "product_version", "name": "libopenssl-devel-1.0.1i-54.5.1.x86_64", "product": { "name": "libopenssl-devel-1.0.1i-54.5.1.x86_64", "product_id": "libopenssl-devel-1.0.1i-54.5.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "product": { "name": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "product_id": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "product": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "product_id": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1i-54.5.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64" }, "product_reference": "libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64" }, "product_reference": "libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1.0.1i-54.5.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:openssl-1.0.1i-54.5.1.x86_64" }, "product_reference": "openssl-1.0.1i-54.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-1.0.1i-54.5.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.ppc64le" }, "product_reference": "libopenssl-devel-1.0.1i-54.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-1.0.1i-54.5.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.s390x" }, "product_reference": "libopenssl-devel-1.0.1i-54.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-1.0.1i-54.5.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.x86_64" }, "product_reference": "libopenssl-devel-1.0.1i-54.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1i-54.5.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le" }, "product_reference": "libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1i-54.5.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x" }, "product_reference": "libopenssl1_0_0-1.0.1i-54.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1i-54.5.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64" }, "product_reference": "libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x" }, "product_reference": "libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64" }, "product_reference": "libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le" }, "product_reference": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x" }, "product_reference": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64" }, "product_reference": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x" }, "product_reference": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64" }, "product_reference": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1.0.1i-54.5.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.ppc64le" }, "product_reference": "openssl-1.0.1i-54.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1.0.1i-54.5.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.s390x" }, "product_reference": "openssl-1.0.1i-54.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1.0.1i-54.5.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.x86_64" }, "product_reference": "openssl-1.0.1i-54.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-1.0.1i-54.5.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch" }, "product_reference": "openssl-doc-1.0.1i-54.5.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1i-54.5.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le" }, "product_reference": "libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1i-54.5.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x" }, "product_reference": "libopenssl1_0_0-1.0.1i-54.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1i-54.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64" }, "product_reference": "libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x" }, "product_reference": "libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64" }, "product_reference": "libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le" }, "product_reference": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x" }, "product_reference": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64" }, "product_reference": "libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x" }, "product_reference": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64" }, "product_reference": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1.0.1i-54.5.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.ppc64le" }, "product_reference": "openssl-1.0.1i-54.5.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1.0.1i-54.5.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.s390x" }, "product_reference": "openssl-1.0.1i-54.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1.0.1i-54.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.x86_64" }, "product_reference": "openssl-1.0.1i-54.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-1.0.1i-54.5.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch" }, "product_reference": "openssl-doc-1.0.1i-54.5.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2108", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2108" } ], "notes": [ { "category": "general", "text": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2108", "url": "https://www.suse.com/security/cve/CVE-2016-2108" }, { "category": "external", "summary": "SUSE Bug 1001502 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1001502" }, { "category": "external", "summary": "SUSE Bug 1004499 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1004499" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 977584 for CVE-2016-2108", "url": "https://bugzilla.suse.com/977584" }, { "category": "external", "summary": "SUSE Bug 977617 for CVE-2016-2108", "url": "https://bugzilla.suse.com/977617" }, { "category": "external", "summary": "SUSE Bug 978492 for CVE-2016-2108", "url": "https://bugzilla.suse.com/978492" }, { "category": "external", "summary": "SUSE Bug 989345 for CVE-2016-2108", "url": "https://bugzilla.suse.com/989345" }, { "category": "external", "summary": "SUSE Bug 996067 for CVE-2016-2108", "url": "https://bugzilla.suse.com/996067" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T14:18:29Z", "details": "important" } ], "title": "CVE-2016-2108" }, { "cve": "CVE-2016-7056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7056" } ], "notes": [ { "category": "general", "text": "A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7056", "url": "https://www.suse.com/security/cve/CVE-2016-7056" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1019334 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1019334" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T14:18:29Z", "details": "moderate" } ], "title": "CVE-2016-7056" }, { "cve": "CVE-2016-8610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8610" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8610", "url": "https://www.suse.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1005879 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005879" }, { "category": "external", "summary": "SUSE Bug 1110018 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1110018" }, { "category": "external", "summary": "SUSE Bug 1120592 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1120592" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-8610", "url": "https://bugzilla.suse.com/982575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T14:18:29Z", "details": "important" } ], "title": "CVE-2016-8610" }, { "cve": "CVE-2017-3731", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3731" } ], "notes": [ { "category": "general", "text": "If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3731", "url": "https://www.suse.com/security/cve/CVE-2017-3731" }, { "category": "external", "summary": "SUSE Bug 1021641 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1021641" }, { "category": "external", "summary": "SUSE Bug 1022085 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1022085" }, { "category": "external", "summary": "SUSE Bug 1064118 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1064118" }, { "category": "external", "summary": "SUSE Bug 1064119 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1064119" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.5.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libopenssl-devel-1.0.1i-54.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-14T14:18:29Z", "details": "moderate" } ], "title": "CVE-2017-3731" } ] }
suse-su-2018:3864-2
Vulnerability from csaf_suse
Published
2019-04-27 13:33
Modified
2019-04-27 13:33
Summary
Security update for openssl
Notes
Title of the patch
Security update for openssl
Description of the patch
This update for openssl fixes the following issues:
Security issues fixed:
- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2018-0737: Corrected the current error detection of the current fix (bsc#1106197).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Add missing timing side channel patch for DSA signature generation (bsc#1113742).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
Non-security issues fixed:
- Added openssl(cli) so that the packages that required the openssl binary can require this instead of the new openssl meta package (bsc#1101470).
Patchnames
SUSE-SLE-SAP-12-SP1-2019-1063
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssl", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssl fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).\n- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).\n- CVE-2018-0737: Corrected the current error detection of the current fix (bsc#1106197). \n- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).\n- Add missing timing side channel patch for DSA signature generation (bsc#1113742).\n- Fixed the \u0027One and Done\u0027 side-channel attack on RSA (bsc#1104789).\n\nNon-security issues fixed:\n\n- Added openssl(cli) so that the packages that required the openssl binary can require this instead of the new openssl meta package (bsc#1101470).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-SP1-2019-1063", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3864-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3864-2", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183864-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3864-2", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-April/005383.html" }, { "category": "self", "summary": "SUSE Bug 1101470", "url": "https://bugzilla.suse.com/1101470" }, { "category": "self", "summary": "SUSE Bug 1104789", "url": "https://bugzilla.suse.com/1104789" }, { "category": "self", "summary": "SUSE Bug 1106197", "url": "https://bugzilla.suse.com/1106197" }, { "category": "self", "summary": "SUSE Bug 1110018", "url": "https://bugzilla.suse.com/1110018" }, { "category": "self", "summary": "SUSE Bug 1113534", "url": "https://bugzilla.suse.com/1113534" }, { "category": "self", "summary": "SUSE Bug 1113652", "url": "https://bugzilla.suse.com/1113652" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8610 page", "url": "https://www.suse.com/security/cve/CVE-2016-8610/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0734 page", "url": "https://www.suse.com/security/cve/CVE-2018-0734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0737 page", "url": "https://www.suse.com/security/cve/CVE-2018-0737/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5407 page", "url": "https://www.suse.com/security/cve/CVE-2018-5407/" } ], "title": "Security update for openssl", "tracking": { "current_release_date": "2019-04-27T13:33:27Z", "generator": { "date": "2019-04-27T13:33:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3864-2", "initial_release_date": "2019-04-27T13:33:27Z", "revision_history": [ { "date": "2019-04-27T13:33:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssl-doc-1.0.1i-54.20.1.noarch", "product": { "name": "openssl-doc-1.0.1i-54.20.1.noarch", "product_id": "openssl-doc-1.0.1i-54.20.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "product": { "name": "libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "product_id": "libopenssl1_0_0-1.0.1i-54.20.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "product": { "name": "libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "product_id": "libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "product": { "name": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "product_id": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "product": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "product_id": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64" } }, { "category": "product_version", "name": "openssl-1.0.1i-54.20.1.x86_64", "product": { "name": "openssl-1.0.1i-54.20.1.x86_64", "product_id": "openssl-1.0.1i-54.20.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1i-54.20.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.20.1.x86_64" }, "product_reference": "libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64" }, "product_reference": "libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64" }, "product_reference": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64" }, "product_reference": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1.0.1i-54.20.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.20.1.x86_64" }, "product_reference": "openssl-1.0.1i-54.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-1.0.1i-54.20.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.20.1.noarch" }, "product_reference": "openssl-doc-1.0.1i-54.20.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8610" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.20.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8610", "url": "https://www.suse.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1005879 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005879" }, { "category": "external", "summary": "SUSE Bug 1110018 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1110018" }, { "category": "external", "summary": "SUSE Bug 1120592 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1120592" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-8610", "url": "https://bugzilla.suse.com/982575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.20.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.20.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:33:27Z", "details": "important" } ], "title": "CVE-2016-8610" }, { "cve": "CVE-2018-0734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0734" } ], "notes": [ { "category": "general", "text": "The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.20.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0734", "url": "https://www.suse.com/security/cve/CVE-2018-0734" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1113652 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113652" }, { "category": "external", "summary": "SUSE Bug 1113742 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113742" }, { "category": "external", "summary": "SUSE Bug 1122198 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1122198" }, { "category": "external", "summary": "SUSE Bug 1122212 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1122212" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.20.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.20.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:33:27Z", "details": "moderate" } ], "title": "CVE-2018-0734" }, { "cve": "CVE-2018-0737", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0737" } ], "notes": [ { "category": "general", "text": "The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.20.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0737", "url": "https://www.suse.com/security/cve/CVE-2018-0737" }, { "category": "external", "summary": "SUSE Bug 1089039 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1089039" }, { "category": "external", "summary": "SUSE Bug 1089041 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1089041" }, { "category": "external", "summary": "SUSE Bug 1089044 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1089044" }, { "category": "external", "summary": "SUSE Bug 1089045 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1089045" }, { "category": "external", "summary": "SUSE Bug 1108542 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1108542" }, { "category": "external", "summary": "SUSE Bug 1123780 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1123780" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1126909" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.20.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.20.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:33:27Z", "details": "moderate" } ], "title": "CVE-2018-0737" }, { "cve": "CVE-2018-5407", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5407" } ], "notes": [ { "category": "general", "text": "Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on \u0027port contention\u0027.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.20.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5407", "url": "https://www.suse.com/security/cve/CVE-2018-5407" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1116195 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1116195" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.20.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:openssl-doc-1.0.1i-54.20.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-04-27T13:33:27Z", "details": "moderate" } ], "title": "CVE-2018-5407" } ] }
suse-su-2017:0601-1
Vulnerability from csaf_suse
Published
2017-03-03 16:48
Modified
2017-03-03 16:48
Summary
Security update for compat-openssl097g
Notes
Title of the patch
Security update for compat-openssl097g
Description of the patch
This update for compat-openssl097g fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)
Security issues fixed:
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)
Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- resume reading from /dev/urandom when interrupted by a signal
(bsc#995075)
- fix crash in print_notice (bsc#998190)
Patchnames
slesappsp4-compat-openssl097g-13004
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for compat-openssl097g", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for compat-openssl097g fixes the following issues contained in the\nOpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)\n\nSecurity issues fixed:\n- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)\n- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)\n- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)\n\nBugs fixed:\n- fix crash in openssl speed (bsc#1000677)\n- resume reading from /dev/urandom when interrupted by a signal\n (bsc#995075)\n- fix crash in print_notice (bsc#998190)\n", "title": "Description of the patch" }, { "category": "details", "text": "slesappsp4-compat-openssl097g-13004", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0601-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0601-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170601-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0601-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-March/002676.html" }, { "category": "self", "summary": "SUSE Bug 1000677", "url": "https://bugzilla.suse.com/1000677" }, { "category": "self", "summary": "SUSE Bug 1001912", "url": "https://bugzilla.suse.com/1001912" }, { "category": "self", "summary": "SUSE Bug 1004499", "url": "https://bugzilla.suse.com/1004499" }, { "category": "self", "summary": "SUSE Bug 1005878", "url": "https://bugzilla.suse.com/1005878" }, { "category": "self", "summary": "SUSE Bug 1021641", "url": "https://bugzilla.suse.com/1021641" }, { "category": "self", "summary": "SUSE Bug 995075", "url": "https://bugzilla.suse.com/995075" }, { "category": "self", "summary": "SUSE Bug 998190", "url": "https://bugzilla.suse.com/998190" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2108 page", "url": "https://www.suse.com/security/cve/CVE-2016-2108/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8610 page", "url": "https://www.suse.com/security/cve/CVE-2016-8610/" } ], "title": "Security update for compat-openssl097g", "tracking": { "current_release_date": "2017-03-03T16:48:22Z", "generator": { "date": "2017-03-03T16:48:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0601-1", "initial_release_date": "2017-03-03T16:48:22Z", "revision_history": [ { "date": "2017-03-03T16:48:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "compat-openssl097g-0.9.7g-146.22.50.1.ppc64", "product": { "name": "compat-openssl097g-0.9.7g-146.22.50.1.ppc64", "product_id": "compat-openssl097g-0.9.7g-146.22.50.1.ppc64" } }, { "category": "product_version", "name": "compat-openssl097g-32bit-0.9.7g-146.22.50.1.ppc64", "product": { "name": "compat-openssl097g-32bit-0.9.7g-146.22.50.1.ppc64", "product_id": "compat-openssl097g-32bit-0.9.7g-146.22.50.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "compat-openssl097g-0.9.7g-146.22.50.1.x86_64", "product": { "name": "compat-openssl097g-0.9.7g-146.22.50.1.x86_64", "product_id": "compat-openssl097g-0.9.7g-146.22.50.1.x86_64" } }, { "category": "product_version", "name": "compat-openssl097g-32bit-0.9.7g-146.22.50.1.x86_64", "product": { "name": "compat-openssl097g-32bit-0.9.7g-146.22.50.1.x86_64", "product_id": "compat-openssl097g-32bit-0.9.7g-146.22.50.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "compat-openssl097g-0.9.7g-146.22.50.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.50.1.ppc64" }, "product_reference": "compat-openssl097g-0.9.7g-146.22.50.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl097g-0.9.7g-146.22.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.50.1.x86_64" }, "product_reference": "compat-openssl097g-0.9.7g-146.22.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl097g-32bit-0.9.7g-146.22.50.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.50.1.ppc64" }, "product_reference": "compat-openssl097g-32bit-0.9.7g-146.22.50.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "compat-openssl097g-32bit-0.9.7g-146.22.50.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.50.1.x86_64" }, "product_reference": "compat-openssl097g-32bit-0.9.7g-146.22.50.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2108", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2108" } ], "notes": [ { "category": "general", "text": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.50.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.50.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.50.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2108", "url": "https://www.suse.com/security/cve/CVE-2016-2108" }, { "category": "external", "summary": "SUSE Bug 1001502 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1001502" }, { "category": "external", "summary": "SUSE Bug 1004499 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1004499" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 977584 for CVE-2016-2108", "url": "https://bugzilla.suse.com/977584" }, { "category": "external", "summary": "SUSE Bug 977617 for CVE-2016-2108", "url": "https://bugzilla.suse.com/977617" }, { "category": "external", "summary": "SUSE Bug 978492 for CVE-2016-2108", "url": "https://bugzilla.suse.com/978492" }, { "category": "external", "summary": "SUSE Bug 989345 for CVE-2016-2108", "url": "https://bugzilla.suse.com/989345" }, { "category": "external", "summary": "SUSE Bug 996067 for CVE-2016-2108", "url": "https://bugzilla.suse.com/996067" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.50.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.50.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.50.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.50.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.50.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.50.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-03-03T16:48:22Z", "details": "important" } ], "title": "CVE-2016-2108" }, { "cve": "CVE-2016-8610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8610" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.50.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.50.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.50.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8610", "url": "https://www.suse.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1005879 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005879" }, { "category": "external", "summary": "SUSE Bug 1110018 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1110018" }, { "category": "external", "summary": "SUSE Bug 1120592 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1120592" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-8610", "url": "https://bugzilla.suse.com/982575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.50.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.50.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.50.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.50.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-0.9.7g-146.22.50.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.50.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:compat-openssl097g-32bit-0.9.7g-146.22.50.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-03-03T16:48:22Z", "details": "important" } ], "title": "CVE-2016-8610" } ] }
suse-su-2017:2700-1
Vulnerability from csaf_suse
Published
2017-10-10 19:37
Modified
2017-10-10 19:37
Summary
Security update for SLES 12-SP1 Docker image
Notes
Title of the patch
Security update for SLES 12-SP1 Docker image
Description of the patch
The SUSE Linux Enterprise Server 12 SP1 container image has been updated to include
security and stability fixes.
The following issues related to building of the container images have been fixed:
- Included krb5 package to avoid the inclusion of krb5-mini which gets selected as a
dependency by the Build Service solver. (bsc#1056193)
- Do not install recommended packages when building container images. (bsc#975726)
A number of security issues that have been already fixed by updates released for
SUSE Linux Enterprise Server 12 SP1 are now included in the base image. A package/CVE
cross-reference is available below.
pam:
- CVE-2015-3238
libtasn1:
- CVE-2015-3622
- CVE-2016-4008
expat:
expat:
- CVE-2012-6702
- CVE-2015-1283
- CVE-2016-0718
- CVE-2016-5300
- CVE-2016-9063
- CVE-2017-9233
libidn:
- CVE-2015-2059
- CVE-2015-8948
- CVE-2016-6261
- CVE-2016-6262
- CVE-2016-6263
zlib:
- CVE-2016-9840
- CVE-2016-9841
- CVE-2016-9842
- CVE-2016-9843
curl:
- CVE-2016-5419
- CVE-2016-5420
- CVE-2016-5421
- CVE-2016-7141
- CVE-2016-7167
- CVE-2016-8615
- CVE-2016-8616
- CVE-2016-8617
- CVE-2016-8618
- CVE-2016-8619
- CVE-2016-8620
- CVE-2016-8621
- CVE-2016-8622
- CVE-2016-8623
- CVE-2016-8624
- CVE-2016-9586
- CVE-2017-1000100
- CVE-2017-1000101
- CVE-2017-7407
openssl:
- CVE-2016-2105
- CVE-2016-2106
- CVE-2016-2107
- CVE-2016-2108
- CVE-2016-2109
- CVE-2016-2177
- CVE-2016-2178
- CVE-2016-2179
- CVE-2016-2180
- CVE-2016-2181
- CVE-2016-2182
- CVE-2016-2183
- CVE-2016-6302
- CVE-2016-6303
- CVE-2016-6304
- CVE-2016-6306
- CVE-2016-7056
- CVE-2016-8610
- CVE-2017-3731
cracklib:
- CVE-2016-6318
pcre:
- CVE-2014-8964
- CVE-2015-2325
- CVE-2015-2327
- CVE-2015-2328
- CVE-2015-3210
- CVE-2015-3217
- CVE-2015-5073
- CVE-2015-8380
- CVE-2015-8381
- CVE-2015-8382
- CVE-2015-8383
- CVE-2015-8384
- CVE-2015-8385
- CVE-2015-8386
- CVE-2015-8387
- CVE-2015-8388
- CVE-2015-8389
- CVE-2015-8390
- CVE-2015-8391
- CVE-2015-8392
- CVE-2015-8393
- CVE-2015-8394
- CVE-2015-8395
- CVE-2016-1283
- CVE-2016-3191
appamor:
- CVE-2017-6507
bash:
- CVE-2014-6277
- CVE-2014-6278
- CVE-2016-0634
- CVE-2016-7543
cpio:
- CVE-2016-2037
glibc:
- CVE-2016-1234
- CVE-2016-3075
- CVE-2016-3706
- CVE-2016-4429
- CVE-2017-1000366
perl:
- CVE-2015-8853
- CVE-2016-1238
- CVE-2016-2381
- CVE-2016-6185
libssh2_org:
- CVE-2016-0787
util-linux:
- CVE-2016-5011
- CVE-2017-2616
ncurses:
- CVE-2017-10684
- CVE-2017-10685
- CVE-2017-11112
- CVE-2017-11113
libksba:
- CVE-2016-4574
- CVE-2016-4579
libxml2:
- CVE-2014-0191
- CVE-2015-8806
- CVE-2016-1762
- CVE-2016-1833
- CVE-2016-1834
- CVE-2016-1835
- CVE-2016-1837
- CVE-2016-1838
- CVE-2016-1839
- CVE-2016-1840
- CVE-2016-2073
- CVE-2016-3627
- CVE-2016-3705
- CVE-2016-4447
- CVE-2016-4448
- CVE-2016-4449
- CVE-2016-4483
- CVE-2016-4658
- CVE-2016-9318
- CVE-2016-9597
- CVE-2017-9047
- CVE-2017-9048
- CVE-2017-9049
- CVE-2017-9050
libgcrypt:
- CVE-2015-7511
- CVE-2016-6313
- CVE-2017-7526
update-alternatives:
- CVE-2015-0860
systemd:
- CVE-2014-9770
- CVE-2015-8842
- CVE-2016-7796
dbus-1:
- CVE-2014-7824
- CVE-2015-0245
Finally, the following packages received non-security fixes:
- augeas
- bzip2
- ca-certificates-mozilla
- coreutils
- cryptsetup
- cyrus-sasl
- dirmngr
- e2fsprogs
- findutils
- gpg2
- insserv-compat
- kmod
- libcap
- libsolv
- libzypp
- lua51
- lvm2
- netcfg
- p11-kit
- permissions
- procps
- rpm
- sed
- sg3_utils
- shadow
- zypper
Patchnames
SUSE-SLE-Module-Containers-12-2017-1673
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for SLES 12-SP1 Docker image", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise Server 12 SP1 container image has been updated to include\nsecurity and stability fixes.\n\nThe following issues related to building of the container images have been fixed:\n\n- Included krb5 package to avoid the inclusion of krb5-mini which gets selected as a\n dependency by the Build Service solver. (bsc#1056193)\n- Do not install recommended packages when building container images. (bsc#975726)\n\nA number of security issues that have been already fixed by updates released for\nSUSE Linux Enterprise Server 12 SP1 are now included in the base image. A package/CVE\ncross-reference is available below.\n\npam:\n\n- CVE-2015-3238\n\nlibtasn1:\n\n- CVE-2015-3622\n- CVE-2016-4008\n\nexpat:\n\nexpat:\n\n- CVE-2012-6702\n- CVE-2015-1283\n- CVE-2016-0718\n- CVE-2016-5300\n- CVE-2016-9063\n- CVE-2017-9233\n\nlibidn:\n\n- CVE-2015-2059\n- CVE-2015-8948\n- CVE-2016-6261\n- CVE-2016-6262\n- CVE-2016-6263\n\n\nzlib:\n\n- CVE-2016-9840\n- CVE-2016-9841\n- CVE-2016-9842\n- CVE-2016-9843\n\ncurl:\n\n- CVE-2016-5419\n- CVE-2016-5420\n- CVE-2016-5421\n- CVE-2016-7141\n- CVE-2016-7167\n- CVE-2016-8615\n- CVE-2016-8616\n- CVE-2016-8617\n- CVE-2016-8618\n- CVE-2016-8619\n- CVE-2016-8620\n- CVE-2016-8621\n- CVE-2016-8622\n- CVE-2016-8623\n- CVE-2016-8624\n- CVE-2016-9586\n- CVE-2017-1000100\n- CVE-2017-1000101\n- CVE-2017-7407\n\nopenssl:\n\n- CVE-2016-2105\n- CVE-2016-2106\n- CVE-2016-2107\n- CVE-2016-2108\n- CVE-2016-2109\n- CVE-2016-2177\n- CVE-2016-2178\n- CVE-2016-2179\n- CVE-2016-2180\n- CVE-2016-2181\n- CVE-2016-2182\n- CVE-2016-2183\n- CVE-2016-6302\n- CVE-2016-6303\n- CVE-2016-6304\n- CVE-2016-6306\n- CVE-2016-7056\n- CVE-2016-8610\n- CVE-2017-3731\n\ncracklib:\n\n- CVE-2016-6318\n\npcre:\n\n- CVE-2014-8964\n- CVE-2015-2325\n- CVE-2015-2327\n- CVE-2015-2328\n- CVE-2015-3210\n- CVE-2015-3217\n- CVE-2015-5073\n- CVE-2015-8380\n- CVE-2015-8381\n- CVE-2015-8382\n- CVE-2015-8383\n- CVE-2015-8384\n- CVE-2015-8385\n- CVE-2015-8386\n- CVE-2015-8387\n- CVE-2015-8388\n- CVE-2015-8389\n- CVE-2015-8390\n- CVE-2015-8391\n- CVE-2015-8392\n- CVE-2015-8393\n- CVE-2015-8394\n- CVE-2015-8395\n- CVE-2016-1283\n- CVE-2016-3191\n\nappamor:\n\n- CVE-2017-6507\n\nbash:\n\n- CVE-2014-6277\n- CVE-2014-6278\n- CVE-2016-0634\n- CVE-2016-7543\n\ncpio:\n\n- CVE-2016-2037\n\nglibc:\n\n- CVE-2016-1234\n- CVE-2016-3075\n- CVE-2016-3706\n- CVE-2016-4429\n- CVE-2017-1000366\n\nperl:\n\n- CVE-2015-8853\n- CVE-2016-1238\n- CVE-2016-2381\n- CVE-2016-6185\n\nlibssh2_org:\n\n- CVE-2016-0787\n\nutil-linux:\n\n- CVE-2016-5011\n- CVE-2017-2616\n\nncurses:\n\n- CVE-2017-10684\n- CVE-2017-10685\n- CVE-2017-11112\n- CVE-2017-11113\n\nlibksba:\n\n- CVE-2016-4574\n- CVE-2016-4579\n\nlibxml2:\n\n- CVE-2014-0191\n- CVE-2015-8806\n- CVE-2016-1762\n- CVE-2016-1833\n- CVE-2016-1834\n- CVE-2016-1835\n- CVE-2016-1837\n- CVE-2016-1838\n- CVE-2016-1839\n- CVE-2016-1840\n- CVE-2016-2073\n- CVE-2016-3627\n- CVE-2016-3705\n- CVE-2016-4447\n- CVE-2016-4448\n- CVE-2016-4449\n- CVE-2016-4483\n- CVE-2016-4658\n- CVE-2016-9318\n- CVE-2016-9597\n- CVE-2017-9047\n- CVE-2017-9048\n- CVE-2017-9049\n- CVE-2017-9050\n\nlibgcrypt:\n\n- CVE-2015-7511\n- CVE-2016-6313\n- CVE-2017-7526\n\nupdate-alternatives:\n\n- CVE-2015-0860\n\nsystemd:\n\n- CVE-2014-9770\n- CVE-2015-8842\n- CVE-2016-7796\n\ndbus-1:\n\n- CVE-2014-7824\n- CVE-2015-0245\n\nFinally, the following packages received non-security fixes:\n\n- augeas\n- bzip2\n- ca-certificates-mozilla\n- coreutils\n- cryptsetup\n- cyrus-sasl\n- dirmngr\n- e2fsprogs\n- findutils\n- gpg2\n- insserv-compat\n- kmod\n- libcap\n- libsolv\n- libzypp\n- lua51\n- lvm2\n- netcfg\n- p11-kit\n- permissions\n- procps\n- rpm\n- sed\n- sg3_utils\n- shadow\n- zypper\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Containers-12-2017-1673", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2700-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2700-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172700-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2700-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html" }, { "category": "self", "summary": "SUSE Bug 1056193", "url": "https://bugzilla.suse.com/1056193" }, { "category": "self", "summary": "SUSE Bug 975726", "url": "https://bugzilla.suse.com/975726" }, { "category": "self", "summary": "SUSE CVE CVE-2012-6702 page", "url": "https://www.suse.com/security/cve/CVE-2012-6702/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0191 page", "url": "https://www.suse.com/security/cve/CVE-2014-0191/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6271 page", "url": "https://www.suse.com/security/cve/CVE-2014-6271/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6277 page", "url": "https://www.suse.com/security/cve/CVE-2014-6277/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-6278 page", "url": "https://www.suse.com/security/cve/CVE-2014-6278/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7169 page", "url": "https://www.suse.com/security/cve/CVE-2014-7169/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7187 page", "url": "https://www.suse.com/security/cve/CVE-2014-7187/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7824 page", "url": "https://www.suse.com/security/cve/CVE-2014-7824/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8964 page", "url": "https://www.suse.com/security/cve/CVE-2014-8964/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9770 page", "url": "https://www.suse.com/security/cve/CVE-2014-9770/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0245 page", "url": "https://www.suse.com/security/cve/CVE-2015-0245/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-0860 page", "url": "https://www.suse.com/security/cve/CVE-2015-0860/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1283 page", "url": "https://www.suse.com/security/cve/CVE-2015-1283/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2059 page", "url": "https://www.suse.com/security/cve/CVE-2015-2059/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2325 page", "url": "https://www.suse.com/security/cve/CVE-2015-2325/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2327 page", "url": "https://www.suse.com/security/cve/CVE-2015-2327/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2328 page", "url": "https://www.suse.com/security/cve/CVE-2015-2328/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3210 page", "url": "https://www.suse.com/security/cve/CVE-2015-3210/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3217 page", "url": "https://www.suse.com/security/cve/CVE-2015-3217/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3238 page", "url": "https://www.suse.com/security/cve/CVE-2015-3238/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3622 page", "url": "https://www.suse.com/security/cve/CVE-2015-3622/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5073 page", "url": "https://www.suse.com/security/cve/CVE-2015-5073/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5276 page", "url": "https://www.suse.com/security/cve/CVE-2015-5276/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7511 page", "url": "https://www.suse.com/security/cve/CVE-2015-7511/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8380 page", "url": "https://www.suse.com/security/cve/CVE-2015-8380/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8381 page", "url": "https://www.suse.com/security/cve/CVE-2015-8381/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8382 page", "url": "https://www.suse.com/security/cve/CVE-2015-8382/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8383 page", "url": "https://www.suse.com/security/cve/CVE-2015-8383/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8384 page", "url": "https://www.suse.com/security/cve/CVE-2015-8384/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8385 page", "url": "https://www.suse.com/security/cve/CVE-2015-8385/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8386 page", "url": "https://www.suse.com/security/cve/CVE-2015-8386/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8387 page", "url": "https://www.suse.com/security/cve/CVE-2015-8387/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8388 page", "url": "https://www.suse.com/security/cve/CVE-2015-8388/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8389 page", "url": "https://www.suse.com/security/cve/CVE-2015-8389/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8390 page", "url": "https://www.suse.com/security/cve/CVE-2015-8390/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8391 page", "url": "https://www.suse.com/security/cve/CVE-2015-8391/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8392 page", "url": "https://www.suse.com/security/cve/CVE-2015-8392/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8393 page", "url": "https://www.suse.com/security/cve/CVE-2015-8393/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8394 page", "url": "https://www.suse.com/security/cve/CVE-2015-8394/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8395 page", "url": "https://www.suse.com/security/cve/CVE-2015-8395/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8806 page", "url": "https://www.suse.com/security/cve/CVE-2015-8806/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8842 page", "url": "https://www.suse.com/security/cve/CVE-2015-8842/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8853 page", "url": "https://www.suse.com/security/cve/CVE-2015-8853/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8948 page", "url": "https://www.suse.com/security/cve/CVE-2015-8948/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0634 page", "url": "https://www.suse.com/security/cve/CVE-2016-0634/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0718 page", "url": "https://www.suse.com/security/cve/CVE-2016-0718/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0787 page", "url": "https://www.suse.com/security/cve/CVE-2016-0787/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1234 page", "url": "https://www.suse.com/security/cve/CVE-2016-1234/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1238 page", "url": "https://www.suse.com/security/cve/CVE-2016-1238/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1283 page", "url": "https://www.suse.com/security/cve/CVE-2016-1283/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1762 page", "url": "https://www.suse.com/security/cve/CVE-2016-1762/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1833 page", "url": "https://www.suse.com/security/cve/CVE-2016-1833/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1834 page", "url": "https://www.suse.com/security/cve/CVE-2016-1834/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1835 page", "url": "https://www.suse.com/security/cve/CVE-2016-1835/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1837 page", "url": "https://www.suse.com/security/cve/CVE-2016-1837/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1838 page", "url": "https://www.suse.com/security/cve/CVE-2016-1838/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1839 page", "url": "https://www.suse.com/security/cve/CVE-2016-1839/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1840 page", "url": "https://www.suse.com/security/cve/CVE-2016-1840/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2037 page", "url": "https://www.suse.com/security/cve/CVE-2016-2037/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2073 page", "url": "https://www.suse.com/security/cve/CVE-2016-2073/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2105 page", "url": "https://www.suse.com/security/cve/CVE-2016-2105/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2106 page", "url": "https://www.suse.com/security/cve/CVE-2016-2106/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2107 page", "url": "https://www.suse.com/security/cve/CVE-2016-2107/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2108 page", "url": "https://www.suse.com/security/cve/CVE-2016-2108/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2109 page", "url": "https://www.suse.com/security/cve/CVE-2016-2109/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2177 page", "url": "https://www.suse.com/security/cve/CVE-2016-2177/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2178 page", "url": "https://www.suse.com/security/cve/CVE-2016-2178/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2179 page", "url": "https://www.suse.com/security/cve/CVE-2016-2179/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2180 page", "url": "https://www.suse.com/security/cve/CVE-2016-2180/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2181 page", "url": "https://www.suse.com/security/cve/CVE-2016-2181/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2182 page", "url": "https://www.suse.com/security/cve/CVE-2016-2182/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2183 page", "url": "https://www.suse.com/security/cve/CVE-2016-2183/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2381 page", "url": "https://www.suse.com/security/cve/CVE-2016-2381/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3075 page", "url": "https://www.suse.com/security/cve/CVE-2016-3075/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3191 page", "url": "https://www.suse.com/security/cve/CVE-2016-3191/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3627 page", "url": "https://www.suse.com/security/cve/CVE-2016-3627/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3705 page", "url": "https://www.suse.com/security/cve/CVE-2016-3705/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3706 page", "url": "https://www.suse.com/security/cve/CVE-2016-3706/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4008 page", "url": "https://www.suse.com/security/cve/CVE-2016-4008/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4429 page", "url": "https://www.suse.com/security/cve/CVE-2016-4429/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4447 page", "url": "https://www.suse.com/security/cve/CVE-2016-4447/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4448 page", "url": "https://www.suse.com/security/cve/CVE-2016-4448/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4449 page", "url": "https://www.suse.com/security/cve/CVE-2016-4449/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4483 page", "url": "https://www.suse.com/security/cve/CVE-2016-4483/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4574 page", "url": "https://www.suse.com/security/cve/CVE-2016-4574/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4579 page", "url": "https://www.suse.com/security/cve/CVE-2016-4579/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4658 page", "url": "https://www.suse.com/security/cve/CVE-2016-4658/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5011 page", "url": "https://www.suse.com/security/cve/CVE-2016-5011/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5300 page", "url": "https://www.suse.com/security/cve/CVE-2016-5300/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5419 page", "url": "https://www.suse.com/security/cve/CVE-2016-5419/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5420 page", "url": "https://www.suse.com/security/cve/CVE-2016-5420/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5421 page", "url": "https://www.suse.com/security/cve/CVE-2016-5421/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6185 page", "url": "https://www.suse.com/security/cve/CVE-2016-6185/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6261 page", "url": "https://www.suse.com/security/cve/CVE-2016-6261/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6262 page", "url": "https://www.suse.com/security/cve/CVE-2016-6262/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6263 page", "url": "https://www.suse.com/security/cve/CVE-2016-6263/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6302 page", "url": "https://www.suse.com/security/cve/CVE-2016-6302/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6303 page", "url": "https://www.suse.com/security/cve/CVE-2016-6303/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6304 page", "url": "https://www.suse.com/security/cve/CVE-2016-6304/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6306 page", "url": "https://www.suse.com/security/cve/CVE-2016-6306/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6313 page", "url": "https://www.suse.com/security/cve/CVE-2016-6313/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6318 page", "url": "https://www.suse.com/security/cve/CVE-2016-6318/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7056 page", "url": "https://www.suse.com/security/cve/CVE-2016-7056/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7141 page", "url": "https://www.suse.com/security/cve/CVE-2016-7141/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7167 page", "url": "https://www.suse.com/security/cve/CVE-2016-7167/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7543 page", "url": "https://www.suse.com/security/cve/CVE-2016-7543/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7796 page", "url": "https://www.suse.com/security/cve/CVE-2016-7796/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8610 page", "url": "https://www.suse.com/security/cve/CVE-2016-8610/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8615 page", "url": "https://www.suse.com/security/cve/CVE-2016-8615/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8616 page", "url": "https://www.suse.com/security/cve/CVE-2016-8616/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8617 page", "url": "https://www.suse.com/security/cve/CVE-2016-8617/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8618 page", "url": "https://www.suse.com/security/cve/CVE-2016-8618/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8619 page", "url": "https://www.suse.com/security/cve/CVE-2016-8619/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8620 page", "url": "https://www.suse.com/security/cve/CVE-2016-8620/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8621 page", "url": "https://www.suse.com/security/cve/CVE-2016-8621/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8622 page", "url": "https://www.suse.com/security/cve/CVE-2016-8622/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8623 page", "url": "https://www.suse.com/security/cve/CVE-2016-8623/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8624 page", "url": "https://www.suse.com/security/cve/CVE-2016-8624/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9063 page", "url": "https://www.suse.com/security/cve/CVE-2016-9063/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9318 page", "url": "https://www.suse.com/security/cve/CVE-2016-9318/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9586 page", "url": "https://www.suse.com/security/cve/CVE-2016-9586/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9597 page", "url": "https://www.suse.com/security/cve/CVE-2016-9597/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9840 page", "url": "https://www.suse.com/security/cve/CVE-2016-9840/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9841 page", "url": "https://www.suse.com/security/cve/CVE-2016-9841/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9842 page", "url": "https://www.suse.com/security/cve/CVE-2016-9842/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9843 page", "url": "https://www.suse.com/security/cve/CVE-2016-9843/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000100 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000100/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000101 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000101/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000366 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000366/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10684 page", "url": "https://www.suse.com/security/cve/CVE-2017-10684/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-10685 page", "url": "https://www.suse.com/security/cve/CVE-2017-10685/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11112 page", "url": "https://www.suse.com/security/cve/CVE-2017-11112/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11113 page", "url": "https://www.suse.com/security/cve/CVE-2017-11113/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2616 page", "url": "https://www.suse.com/security/cve/CVE-2017-2616/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3731 page", "url": "https://www.suse.com/security/cve/CVE-2017-3731/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6507 page", "url": "https://www.suse.com/security/cve/CVE-2017-6507/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7407 page", "url": "https://www.suse.com/security/cve/CVE-2017-7407/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7526 page", "url": "https://www.suse.com/security/cve/CVE-2017-7526/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9047 page", "url": "https://www.suse.com/security/cve/CVE-2017-9047/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9048 page", "url": "https://www.suse.com/security/cve/CVE-2017-9048/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9049 page", "url": "https://www.suse.com/security/cve/CVE-2017-9049/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9050 page", "url": "https://www.suse.com/security/cve/CVE-2017-9050/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9233 page", "url": "https://www.suse.com/security/cve/CVE-2017-9233/" } ], "title": "Security update for SLES 12-SP1 Docker image", "tracking": { "current_release_date": "2017-10-10T19:37:36Z", "generator": { "date": "2017-10-10T19:37:36Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2700-1", "initial_release_date": "2017-10-10T19:37:36Z", "revision_history": [ { "date": "2017-10-10T19:37:36Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "sles12sp1-docker-image-1.0.7-20171002.ppc64le", "product": { "name": "sles12sp1-docker-image-1.0.7-20171002.ppc64le", "product_id": "sles12sp1-docker-image-1.0.7-20171002.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "sles12sp1-docker-image-1.0.7-20171002.s390x", "product": { "name": "sles12sp1-docker-image-1.0.7-20171002.s390x", "product_id": "sles12sp1-docker-image-1.0.7-20171002.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "sles12sp1-docker-image-1.0.7-20171002.x86_64", "product": { "name": "sles12sp1-docker-image-1.0.7-20171002.x86_64", "product_id": "sles12sp1-docker-image-1.0.7-20171002.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Containers 12", "product": { "name": "SUSE Linux Enterprise Module for Containers 12", "product_id": "SUSE Linux Enterprise Module for Containers 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-containers:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "sles12sp1-docker-image-1.0.7-20171002.ppc64le as component of SUSE Linux Enterprise Module for Containers 12", "product_id": "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le" }, "product_reference": "sles12sp1-docker-image-1.0.7-20171002.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12" }, { "category": "default_component_of", "full_product_name": { "name": "sles12sp1-docker-image-1.0.7-20171002.s390x as component of SUSE Linux Enterprise Module for Containers 12", "product_id": "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x" }, "product_reference": "sles12sp1-docker-image-1.0.7-20171002.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12" }, { "category": "default_component_of", "full_product_name": { "name": "sles12sp1-docker-image-1.0.7-20171002.x86_64 as component of SUSE Linux Enterprise Module for Containers 12", "product_id": "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" }, "product_reference": "sles12sp1-docker-image-1.0.7-20171002.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-6702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-6702" } ], "notes": [ { "category": "general", "text": "Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-6702", "url": "https://www.suse.com/security/cve/CVE-2012-6702" }, { "category": "external", "summary": "SUSE Bug 983215 for CVE-2012-6702", "url": "https://bugzilla.suse.com/983215" }, { "category": "external", "summary": "SUSE Bug 983216 for CVE-2012-6702", "url": "https://bugzilla.suse.com/983216" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2012-6702" }, { "cve": "CVE-2014-0191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0191" } ], "notes": [ { "category": "general", "text": "The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0191", "url": "https://www.suse.com/security/cve/CVE-2014-0191" }, { "category": "external", "summary": "SUSE Bug 1014873 for CVE-2014-0191", "url": "https://bugzilla.suse.com/1014873" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2014-0191", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 876652 for CVE-2014-0191", "url": "https://bugzilla.suse.com/876652" }, { "category": "external", "summary": "SUSE Bug 877506 for CVE-2014-0191", "url": "https://bugzilla.suse.com/877506" }, { "category": "external", "summary": "SUSE Bug 996079 for CVE-2014-0191", "url": "https://bugzilla.suse.com/996079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2014-0191" }, { "cve": "CVE-2014-6271", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6271" } ], "notes": [ { "category": "general", "text": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6271", "url": "https://www.suse.com/security/cve/CVE-2014-6271" }, { "category": "external", "summary": "SUSE Bug 1024628 for CVE-2014-6271", "url": "https://bugzilla.suse.com/1024628" }, { "category": "external", "summary": "SUSE Bug 1130324 for CVE-2014-6271", "url": "https://bugzilla.suse.com/1130324" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2014-6271", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 896776 for CVE-2014-6271", "url": "https://bugzilla.suse.com/896776" }, { "category": "external", "summary": "SUSE Bug 898346 for CVE-2014-6271", "url": "https://bugzilla.suse.com/898346" }, { "category": "external", "summary": "SUSE Bug 898604 for CVE-2014-6271", "url": "https://bugzilla.suse.com/898604" }, { "category": "external", "summary": "SUSE Bug 898812 for CVE-2014-6271", "url": "https://bugzilla.suse.com/898812" }, { "category": "external", "summary": "SUSE Bug 898884 for CVE-2014-6271", "url": "https://bugzilla.suse.com/898884" }, { "category": "external", "summary": "SUSE Bug 900127 for CVE-2014-6271", "url": "https://bugzilla.suse.com/900127" }, { "category": "external", "summary": "SUSE Bug 900454 for CVE-2014-6271", "url": "https://bugzilla.suse.com/900454" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2014-6271" }, { "cve": "CVE-2014-6277", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6277" } ], "notes": [ { "category": "general", "text": "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6277", "url": "https://www.suse.com/security/cve/CVE-2014-6277" }, { "category": "external", "summary": "SUSE Bug 898812 for CVE-2014-6277", "url": "https://bugzilla.suse.com/898812" }, { "category": "external", "summary": "SUSE Bug 898884 for CVE-2014-6277", "url": "https://bugzilla.suse.com/898884" }, { "category": "external", "summary": "SUSE Bug 900127 for CVE-2014-6277", "url": "https://bugzilla.suse.com/900127" }, { "category": "external", "summary": "SUSE Bug 900454 for CVE-2014-6277", "url": "https://bugzilla.suse.com/900454" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2014-6277" }, { "cve": "CVE-2014-6278", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-6278" } ], "notes": [ { "category": "general", "text": "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-6278", "url": "https://www.suse.com/security/cve/CVE-2014-6278" }, { "category": "external", "summary": "SUSE Bug 898604 for CVE-2014-6278", "url": "https://bugzilla.suse.com/898604" }, { "category": "external", "summary": "SUSE Bug 898812 for CVE-2014-6278", "url": "https://bugzilla.suse.com/898812" }, { "category": "external", "summary": "SUSE Bug 898884 for CVE-2014-6278", "url": "https://bugzilla.suse.com/898884" }, { "category": "external", "summary": "SUSE Bug 900127 for CVE-2014-6278", "url": "https://bugzilla.suse.com/900127" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2014-6278" }, { "cve": "CVE-2014-7169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7169" } ], "notes": [ { "category": "general", "text": "GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7169", "url": "https://www.suse.com/security/cve/CVE-2014-7169" }, { "category": "external", "summary": "SUSE Bug 1024628 for CVE-2014-7169", "url": "https://bugzilla.suse.com/1024628" }, { "category": "external", "summary": "SUSE Bug 1130324 for CVE-2014-7169", "url": "https://bugzilla.suse.com/1130324" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2014-7169", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 896776 for CVE-2014-7169", "url": "https://bugzilla.suse.com/896776" }, { "category": "external", "summary": "SUSE Bug 898346 for CVE-2014-7169", "url": "https://bugzilla.suse.com/898346" }, { "category": "external", "summary": "SUSE Bug 898762 for CVE-2014-7169", "url": "https://bugzilla.suse.com/898762" }, { "category": "external", "summary": "SUSE Bug 898812 for CVE-2014-7169", "url": "https://bugzilla.suse.com/898812" }, { "category": "external", "summary": "SUSE Bug 898884 for CVE-2014-7169", "url": "https://bugzilla.suse.com/898884" }, { "category": "external", "summary": "SUSE Bug 899039 for CVE-2014-7169", "url": "https://bugzilla.suse.com/899039" }, { "category": "external", "summary": "SUSE Bug 899266 for CVE-2014-7169", "url": "https://bugzilla.suse.com/899266" }, { "category": "external", "summary": "SUSE Bug 900127 for CVE-2014-7169", "url": "https://bugzilla.suse.com/900127" }, { "category": "external", "summary": "SUSE Bug 900454 for CVE-2014-7169", "url": "https://bugzilla.suse.com/900454" }, { "category": "external", "summary": "SUSE Bug 902237 for CVE-2014-7169", "url": "https://bugzilla.suse.com/902237" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2014-7169" }, { "cve": "CVE-2014-7187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7187" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7187", "url": "https://www.suse.com/security/cve/CVE-2014-7187" }, { "category": "external", "summary": "SUSE Bug 1024628 for CVE-2014-7187", "url": "https://bugzilla.suse.com/1024628" }, { "category": "external", "summary": "SUSE Bug 898603 for CVE-2014-7187", "url": "https://bugzilla.suse.com/898603" }, { "category": "external", "summary": "SUSE Bug 898762 for CVE-2014-7187", "url": "https://bugzilla.suse.com/898762" }, { "category": "external", "summary": "SUSE Bug 898812 for CVE-2014-7187", "url": "https://bugzilla.suse.com/898812" }, { "category": "external", "summary": "SUSE Bug 898884 for CVE-2014-7187", "url": "https://bugzilla.suse.com/898884" }, { "category": "external", "summary": "SUSE Bug 899039 for CVE-2014-7187", "url": "https://bugzilla.suse.com/899039" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2014-7187" }, { "cve": "CVE-2014-7824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7824" } ], "notes": [ { "category": "general", "text": "D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7824", "url": "https://www.suse.com/security/cve/CVE-2014-7824" }, { "category": "external", "summary": "SUSE Bug 904017 for CVE-2014-7824", "url": "https://bugzilla.suse.com/904017" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2014-7824" }, { "cve": "CVE-2014-8964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8964" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8964", "url": "https://www.suse.com/security/cve/CVE-2014-8964" }, { "category": "external", "summary": "SUSE Bug 906574 for CVE-2014-8964", "url": "https://bugzilla.suse.com/906574" }, { "category": "external", "summary": "SUSE Bug 924960 for CVE-2014-8964", "url": "https://bugzilla.suse.com/924960" }, { "category": "external", "summary": "SUSE Bug 933288 for CVE-2014-8964", "url": "https://bugzilla.suse.com/933288" }, { "category": "external", "summary": "SUSE Bug 936408 for CVE-2014-8964", "url": "https://bugzilla.suse.com/936408" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2014-8964", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2014-8964" }, { "cve": "CVE-2014-9770", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9770" } ], "notes": [ { "category": "general", "text": "tmpfiles.d/systemd.conf in systemd before 214 uses weak permissions for journal files under (1) /run/log/journal/%m and (2) /var/log/journal/%m, which allows local users to obtain sensitive information by reading these files.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9770", "url": "https://www.suse.com/security/cve/CVE-2014-9770" }, { "category": "external", "summary": "SUSE Bug 972612 for CVE-2014-9770", "url": "https://bugzilla.suse.com/972612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2014-9770" }, { "cve": "CVE-2015-0245", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0245" } ], "notes": [ { "category": "general", "text": "D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0245", "url": "https://www.suse.com/security/cve/CVE-2015-0245" }, { "category": "external", "summary": "SUSE Bug 1003898 for CVE-2015-0245", "url": "https://bugzilla.suse.com/1003898" }, { "category": "external", "summary": "SUSE Bug 916343 for CVE-2015-0245", "url": "https://bugzilla.suse.com/916343" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2015-0245" }, { "cve": "CVE-2015-0860", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-0860" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an \"old-style\" Debian binary package, which triggers a stack-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-0860", "url": "https://www.suse.com/security/cve/CVE-2015-0860" }, { "category": "external", "summary": "SUSE Bug 957160 for CVE-2015-0860", "url": "https://bugzilla.suse.com/957160" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2015-0860" }, { "cve": "CVE-2015-1283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1283" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1283", "url": "https://www.suse.com/security/cve/CVE-2015-1283" }, { "category": "external", "summary": "SUSE Bug 1034050 for CVE-2015-1283", "url": "https://bugzilla.suse.com/1034050" }, { "category": "external", "summary": "SUSE Bug 939077 for CVE-2015-1283", "url": "https://bugzilla.suse.com/939077" }, { "category": "external", "summary": "SUSE Bug 979441 for CVE-2015-1283", "url": "https://bugzilla.suse.com/979441" }, { "category": "external", "summary": "SUSE Bug 980391 for CVE-2015-1283", "url": "https://bugzilla.suse.com/980391" }, { "category": "external", "summary": "SUSE Bug 983985 for CVE-2015-1283", "url": "https://bugzilla.suse.com/983985" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2015-1283" }, { "cve": "CVE-2015-2059", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2059" } ], "notes": [ { "category": "general", "text": "The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2059", "url": "https://www.suse.com/security/cve/CVE-2015-2059" }, { "category": "external", "summary": "SUSE Bug 1173590 for CVE-2015-2059", "url": "https://bugzilla.suse.com/1173590" }, { "category": "external", "summary": "SUSE Bug 919214 for CVE-2015-2059", "url": "https://bugzilla.suse.com/919214" }, { "category": "external", "summary": "SUSE Bug 923241 for CVE-2015-2059", "url": "https://bugzilla.suse.com/923241" }, { "category": "external", "summary": "SUSE Bug 937096 for CVE-2015-2059", "url": "https://bugzilla.suse.com/937096" }, { "category": "external", "summary": "SUSE Bug 937097 for CVE-2015-2059", "url": "https://bugzilla.suse.com/937097" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2015-2059" }, { "cve": "CVE-2015-2325", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2325" } ], "notes": [ { "category": "general", "text": "The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2325", "url": "https://www.suse.com/security/cve/CVE-2015-2325" }, { "category": "external", "summary": "SUSE Bug 924960 for CVE-2015-2325", "url": "https://bugzilla.suse.com/924960" }, { "category": "external", "summary": "SUSE Bug 933288 for CVE-2015-2325", "url": "https://bugzilla.suse.com/933288" }, { "category": "external", "summary": "SUSE Bug 936408 for CVE-2015-2325", "url": "https://bugzilla.suse.com/936408" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2015-2325", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2015-2325" }, { "cve": "CVE-2015-2327", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2327" } ], "notes": [ { "category": "general", "text": "PCRE before 8.36 mishandles the /(((a\\2)|(a*)\\g\u003c-1\u003e))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2327", "url": "https://www.suse.com/security/cve/CVE-2015-2327" }, { "category": "external", "summary": "SUSE Bug 906574 for CVE-2015-2327", "url": "https://bugzilla.suse.com/906574" }, { "category": "external", "summary": "SUSE Bug 957567 for CVE-2015-2327", "url": "https://bugzilla.suse.com/957567" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2015-2327" }, { "cve": "CVE-2015-2328", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2328" } ], "notes": [ { "category": "general", "text": "PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2328", "url": "https://www.suse.com/security/cve/CVE-2015-2328" }, { "category": "external", "summary": "SUSE Bug 906574 for CVE-2015-2328", "url": "https://bugzilla.suse.com/906574" }, { "category": "external", "summary": "SUSE Bug 957600 for CVE-2015-2328", "url": "https://bugzilla.suse.com/957600" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2015-2328" }, { "cve": "CVE-2015-3210", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3210" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P\u003cB\u003ec)(?P\u003cB\u003ea(?P=B)))\u003eWGXCREDITS)/, a different vulnerability than CVE-2015-8384.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3210", "url": "https://www.suse.com/security/cve/CVE-2015-3210" }, { "category": "external", "summary": "SUSE Bug 933288 for CVE-2015-3210", "url": "https://bugzilla.suse.com/933288" }, { "category": "external", "summary": "SUSE Bug 957598 for CVE-2015-3210", "url": "https://bugzilla.suse.com/957598" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2015-3210", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2015-3210" }, { "cve": "CVE-2015-3217", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3217" } ], "notes": [ { "category": "general", "text": "PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\\\.|([^\\\\\\\\W_])?)+)+$/.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3217", "url": "https://www.suse.com/security/cve/CVE-2015-3217" }, { "category": "external", "summary": "SUSE Bug 933878 for CVE-2015-3217", "url": "https://bugzilla.suse.com/933878" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2015-3217", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2015-3217" }, { "cve": "CVE-2015-3238", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3238" } ], "notes": [ { "category": "general", "text": "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3238", "url": "https://www.suse.com/security/cve/CVE-2015-3238" }, { "category": "external", "summary": "SUSE Bug 1123794 for CVE-2015-3238", "url": "https://bugzilla.suse.com/1123794" }, { "category": "external", "summary": "SUSE Bug 934920 for CVE-2015-3238", "url": "https://bugzilla.suse.com/934920" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2015-3238" }, { "cve": "CVE-2015-3622", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3622" } ], "notes": [ { "category": "general", "text": "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3622", "url": "https://www.suse.com/security/cve/CVE-2015-3622" }, { "category": "external", "summary": "SUSE Bug 929414 for CVE-2015-3622", "url": "https://bugzilla.suse.com/929414" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2015-3622" }, { "cve": "CVE-2015-5073", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5073" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5073", "url": "https://www.suse.com/security/cve/CVE-2015-5073" }, { "category": "external", "summary": "SUSE Bug 936227 for CVE-2015-5073", "url": "https://bugzilla.suse.com/936227" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "critical" } ], "title": "CVE-2015-5073" }, { "cve": "CVE-2015-5276", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5276" } ], "notes": [ { "category": "general", "text": "The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5276", "url": "https://www.suse.com/security/cve/CVE-2015-5276" }, { "category": "external", "summary": "SUSE Bug 945842 for CVE-2015-5276", "url": "https://bugzilla.suse.com/945842" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2015-5276" }, { "cve": "CVE-2015-7511", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7511" } ], "notes": [ { "category": "general", "text": "Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7511", "url": "https://www.suse.com/security/cve/CVE-2015-7511" }, { "category": "external", "summary": "SUSE Bug 965902 for CVE-2015-7511", "url": "https://bugzilla.suse.com/965902" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2015-7511" }, { "cve": "CVE-2015-8380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8380" } ], "notes": [ { "category": "general", "text": "The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \\01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8380", "url": "https://www.suse.com/security/cve/CVE-2015-8380" }, { "category": "external", "summary": "SUSE Bug 957566 for CVE-2015-8380", "url": "https://bugzilla.suse.com/957566" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2015-8380" }, { "cve": "CVE-2015-8381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8381" } ], "notes": [ { "category": "general", "text": "The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?\u0027R\u0027)(\\k\u0027R\u0027)|((?\u0027R\u0027)))H\u0027Rk\u0027Rf)|s(?\u0027R\u0027))))/ and /(?J:(?|(:(?|(?\u0027R\u0027)(\\z(?|(?\u0027R\u0027)(\\k\u0027R\u0027)|((?\u0027R\u0027)))k\u0027R\u0027)|((?\u0027R\u0027)))H\u0027Ak\u0027Rf)|s(?\u0027R\u0027)))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8381", "url": "https://www.suse.com/security/cve/CVE-2015-8381" }, { "category": "external", "summary": "SUSE Bug 906574 for CVE-2015-8381", "url": "https://bugzilla.suse.com/906574" }, { "category": "external", "summary": "SUSE Bug 957598 for CVE-2015-8381", "url": "https://bugzilla.suse.com/957598" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2015-8381", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2015-8381" }, { "cve": "CVE-2015-8382", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8382" } ], "notes": [ { "category": "general", "text": "The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8382", "url": "https://www.suse.com/security/cve/CVE-2015-8382" }, { "category": "external", "summary": "SUSE Bug 957598 for CVE-2015-8382", "url": "https://bugzilla.suse.com/957598" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2015-8382", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "critical" } ], "title": "CVE-2015-8382" }, { "cve": "CVE-2015-8383", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8383" } ], "notes": [ { "category": "general", "text": "PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8383", "url": "https://www.suse.com/security/cve/CVE-2015-8383" }, { "category": "external", "summary": "SUSE Bug 957598 for CVE-2015-8383", "url": "https://bugzilla.suse.com/957598" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2015-8383", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "critical" } ], "title": "CVE-2015-8383" }, { "cve": "CVE-2015-8384", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8384" } ], "notes": [ { "category": "general", "text": "PCRE before 8.38 mishandles the /(?J)(?\u0027d\u0027(?\u0027d\u0027\\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8384", "url": "https://www.suse.com/security/cve/CVE-2015-8384" }, { "category": "external", "summary": "SUSE Bug 906574 for CVE-2015-8384", "url": "https://bugzilla.suse.com/906574" }, { "category": "external", "summary": "SUSE Bug 957598 for CVE-2015-8384", "url": "https://bugzilla.suse.com/957598" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2015-8384", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "critical" } ], "title": "CVE-2015-8384" }, { "cve": "CVE-2015-8385", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8385" } ], "notes": [ { "category": "general", "text": "PCRE before 8.38 mishandles the /(?|(\\k\u0027Pm\u0027)|(?\u0027Pm\u0027))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8385", "url": "https://www.suse.com/security/cve/CVE-2015-8385" }, { "category": "external", "summary": "SUSE Bug 957598 for CVE-2015-8385", "url": "https://bugzilla.suse.com/957598" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2015-8385", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "critical" } ], "title": "CVE-2015-8385" }, { "cve": "CVE-2015-8386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8386" } ], "notes": [ { "category": "general", "text": "PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8386", "url": "https://www.suse.com/security/cve/CVE-2015-8386" }, { "category": "external", "summary": "SUSE Bug 957598 for CVE-2015-8386", "url": "https://bugzilla.suse.com/957598" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2015-8386", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "critical" } ], "title": "CVE-2015-8386" }, { "cve": "CVE-2015-8387", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8387" } ], "notes": [ { "category": "general", "text": "PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8387", "url": "https://www.suse.com/security/cve/CVE-2015-8387" }, { "category": "external", "summary": "SUSE Bug 957598 for CVE-2015-8387", "url": "https://bugzilla.suse.com/957598" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2015-8387", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "critical" } ], "title": "CVE-2015-8387" }, { "cve": "CVE-2015-8388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8388" } ], "notes": [ { "category": "general", "text": "PCRE before 8.38 mishandles the /(?=di(?\u003c=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8388", "url": "https://www.suse.com/security/cve/CVE-2015-8388" }, { "category": "external", "summary": "SUSE Bug 936227 for CVE-2015-8388", "url": "https://bugzilla.suse.com/936227" }, { "category": "external", "summary": "SUSE Bug 957598 for CVE-2015-8388", "url": "https://bugzilla.suse.com/957598" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2015-8388", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "critical" } ], "title": "CVE-2015-8388" }, { "cve": "CVE-2015-8389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8389" } ], "notes": [ { "category": "general", "text": "PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8389", "url": "https://www.suse.com/security/cve/CVE-2015-8389" }, { "category": "external", "summary": "SUSE Bug 957598 for CVE-2015-8389", "url": "https://bugzilla.suse.com/957598" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2015-8389", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "critical" } ], "title": "CVE-2015-8389" }, { "cve": "CVE-2015-8390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8390" } ], "notes": [ { "category": "general", "text": "PCRE before 8.38 mishandles the [: and \\\\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8390", "url": "https://www.suse.com/security/cve/CVE-2015-8390" }, { "category": "external", "summary": "SUSE Bug 957598 for CVE-2015-8390", "url": "https://bugzilla.suse.com/957598" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2015-8390", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "critical" } ], "title": "CVE-2015-8390" }, { "cve": "CVE-2015-8391", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8391" } ], "notes": [ { "category": "general", "text": "The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8391", "url": "https://www.suse.com/security/cve/CVE-2015-8391" }, { "category": "external", "summary": "SUSE Bug 957598 for CVE-2015-8391", "url": "https://bugzilla.suse.com/957598" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2015-8391", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "critical" } ], "title": "CVE-2015-8391" }, { "cve": "CVE-2015-8392", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8392" } ], "notes": [ { "category": "general", "text": "PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8392", "url": "https://www.suse.com/security/cve/CVE-2015-8392" }, { "category": "external", "summary": "SUSE Bug 906574 for CVE-2015-8392", "url": "https://bugzilla.suse.com/906574" }, { "category": "external", "summary": "SUSE Bug 957598 for CVE-2015-8392", "url": "https://bugzilla.suse.com/957598" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2015-8392", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2015-8392" }, { "cve": "CVE-2015-8393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8393" } ], "notes": [ { "category": "general", "text": "pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8393", "url": "https://www.suse.com/security/cve/CVE-2015-8393" }, { "category": "external", "summary": "SUSE Bug 957598 for CVE-2015-8393", "url": "https://bugzilla.suse.com/957598" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2015-8393", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "critical" } ], "title": "CVE-2015-8393" }, { "cve": "CVE-2015-8394", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8394" } ], "notes": [ { "category": "general", "text": "PCRE before 8.38 mishandles the (?(\u003cdigits\u003e) and (?(R\u003cdigits\u003e) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8394", "url": "https://www.suse.com/security/cve/CVE-2015-8394" }, { "category": "external", "summary": "SUSE Bug 957598 for CVE-2015-8394", "url": "https://bugzilla.suse.com/957598" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2015-8394", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "critical" } ], "title": "CVE-2015-8394" }, { "cve": "CVE-2015-8395", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8395" } ], "notes": [ { "category": "general", "text": "PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8395", "url": "https://www.suse.com/security/cve/CVE-2015-8395" }, { "category": "external", "summary": "SUSE Bug 906574 for CVE-2015-8395", "url": "https://bugzilla.suse.com/906574" }, { "category": "external", "summary": "SUSE Bug 957598 for CVE-2015-8395", "url": "https://bugzilla.suse.com/957598" }, { "category": "external", "summary": "SUSE Bug 958373 for CVE-2015-8395", "url": "https://bugzilla.suse.com/958373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "critical" } ], "title": "CVE-2015-8395" }, { "cve": "CVE-2015-8806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8806" } ], "notes": [ { "category": "general", "text": "dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the \"\u003c!DOCTYPE html\" substring in a crafted HTML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8806", "url": "https://www.suse.com/security/cve/CVE-2015-8806" }, { "category": "external", "summary": "SUSE Bug 963963 for CVE-2015-8806", "url": "https://bugzilla.suse.com/963963" }, { "category": "external", "summary": "SUSE Bug 965283 for CVE-2015-8806", "url": "https://bugzilla.suse.com/965283" }, { "category": "external", "summary": "SUSE Bug 981114 for CVE-2015-8806", "url": "https://bugzilla.suse.com/981114" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2015-8806" }, { "cve": "CVE-2015-8842", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8842" } ], "notes": [ { "category": "general", "text": "tmpfiles.d/systemd.conf in systemd before 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8842", "url": "https://www.suse.com/security/cve/CVE-2015-8842" }, { "category": "external", "summary": "SUSE Bug 972612 for CVE-2015-8842", "url": "https://bugzilla.suse.com/972612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2015-8842" }, { "cve": "CVE-2015-8853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8853" } ], "notes": [ { "category": "general", "text": "The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by \"a\\x80.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8853", "url": "https://www.suse.com/security/cve/CVE-2015-8853" }, { "category": "external", "summary": "SUSE Bug 976584 for CVE-2015-8853", "url": "https://bugzilla.suse.com/976584" }, { "category": "external", "summary": "SUSE Bug 997948 for CVE-2015-8853", "url": "https://bugzilla.suse.com/997948" }, { "category": "external", "summary": "SUSE Bug 997950 for CVE-2015-8853", "url": "https://bugzilla.suse.com/997950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2015-8853" }, { "cve": "CVE-2015-8948", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8948" } ], "notes": [ { "category": "general", "text": "idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8948", "url": "https://www.suse.com/security/cve/CVE-2015-8948" }, { "category": "external", "summary": "SUSE Bug 1014473 for CVE-2015-8948", "url": "https://bugzilla.suse.com/1014473" }, { "category": "external", "summary": "SUSE Bug 1173590 for CVE-2015-8948", "url": "https://bugzilla.suse.com/1173590" }, { "category": "external", "summary": "SUSE Bug 1190777 for CVE-2015-8948", "url": "https://bugzilla.suse.com/1190777" }, { "category": "external", "summary": "SUSE Bug 990189 for CVE-2015-8948", "url": "https://bugzilla.suse.com/990189" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2015-8948" }, { "cve": "CVE-2016-0634", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0634" } ], "notes": [ { "category": "general", "text": "The expansion of \u0027\\h\u0027 in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in \u0027hostname\u0027 of a machine.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0634", "url": "https://www.suse.com/security/cve/CVE-2016-0634" }, { "category": "external", "summary": "SUSE Bug 1000396 for CVE-2016-0634", "url": "https://bugzilla.suse.com/1000396" }, { "category": "external", "summary": "SUSE Bug 1001299 for CVE-2016-0634", "url": "https://bugzilla.suse.com/1001299" }, { "category": "external", "summary": "SUSE Bug 1159416 for CVE-2016-0634", "url": "https://bugzilla.suse.com/1159416" }, { "category": "external", "summary": "SUSE Bug 1188388 for CVE-2016-0634", "url": "https://bugzilla.suse.com/1188388" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-0634" }, { "cve": "CVE-2016-0718", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0718" } ], "notes": [ { "category": "general", "text": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0718", "url": "https://www.suse.com/security/cve/CVE-2016-0718" }, { "category": "external", "summary": "SUSE Bug 979441 for CVE-2016-0718", "url": "https://bugzilla.suse.com/979441" }, { "category": "external", "summary": "SUSE Bug 991809 for CVE-2016-0718", "url": "https://bugzilla.suse.com/991809" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-0718" }, { "cve": "CVE-2016-0787", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0787" } ], "notes": [ { "category": "general", "text": "The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a \"bits/bytes confusion bug.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0787", "url": "https://www.suse.com/security/cve/CVE-2016-0787" }, { "category": "external", "summary": "SUSE Bug 1149968 for CVE-2016-0787", "url": "https://bugzilla.suse.com/1149968" }, { "category": "external", "summary": "SUSE Bug 967026 for CVE-2016-0787", "url": "https://bugzilla.suse.com/967026" }, { "category": "external", "summary": "SUSE Bug 968174 for CVE-2016-0787", "url": "https://bugzilla.suse.com/968174" }, { "category": "external", "summary": "SUSE Bug 974691 for CVE-2016-0787", "url": "https://bugzilla.suse.com/974691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-0787" }, { "cve": "CVE-2016-1234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1234" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1234", "url": "https://www.suse.com/security/cve/CVE-2016-1234" }, { "category": "external", "summary": "SUSE Bug 1020940 for CVE-2016-1234", "url": "https://bugzilla.suse.com/1020940" }, { "category": "external", "summary": "SUSE Bug 969727 for CVE-2016-1234", "url": "https://bugzilla.suse.com/969727" }, { "category": "external", "summary": "SUSE Bug 988770 for CVE-2016-1234", "url": "https://bugzilla.suse.com/988770" }, { "category": "external", "summary": "SUSE Bug 988782 for CVE-2016-1234", "url": "https://bugzilla.suse.com/988782" }, { "category": "external", "summary": "SUSE Bug 989127 for CVE-2016-1234", "url": "https://bugzilla.suse.com/989127" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-1234" }, { "cve": "CVE-2016-1238", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1238" } ], "notes": [ { "category": "general", "text": "(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1238", "url": "https://www.suse.com/security/cve/CVE-2016-1238" }, { "category": "external", "summary": "SUSE Bug 1108749 for CVE-2016-1238", "url": "https://bugzilla.suse.com/1108749" }, { "category": "external", "summary": "SUSE Bug 1123389 for CVE-2016-1238", "url": "https://bugzilla.suse.com/1123389" }, { "category": "external", "summary": "SUSE Bug 987887 for CVE-2016-1238", "url": "https://bugzilla.suse.com/987887" }, { "category": "external", "summary": "SUSE Bug 988311 for CVE-2016-1238", "url": "https://bugzilla.suse.com/988311" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-1238" }, { "cve": "CVE-2016-1283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1283" } ], "notes": [ { "category": "general", "text": "The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\\\"){99}-))(?J)(?\u0027R\u0027(?\u0027R\u0027\u003c((?\u0027RR\u0027(?\u0027R\u0027\\){97)?J)?J)(?\u0027R\u0027(?\u0027R\u0027\\){99|(:(?|(?\u0027R\u0027)(\\k\u0027R\u0027)|((?\u0027R\u0027)))H\u0027R\u0027R)(H\u0027R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1283", "url": "https://www.suse.com/security/cve/CVE-2016-1283" }, { "category": "external", "summary": "SUSE Bug 960837 for CVE-2016-1283", "url": "https://bugzilla.suse.com/960837" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "critical" } ], "title": "CVE-2016-1283" }, { "cve": "CVE-2016-1762", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1762" } ], "notes": [ { "category": "general", "text": "The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1762", "url": "https://www.suse.com/security/cve/CVE-2016-1762" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-1762", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 981040 for CVE-2016-1762", "url": "https://bugzilla.suse.com/981040" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-1762" }, { "cve": "CVE-2016-1833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1833" } ], "notes": [ { "category": "general", "text": "The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1833", "url": "https://www.suse.com/security/cve/CVE-2016-1833" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-1833", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 981108 for CVE-2016-1833", "url": "https://bugzilla.suse.com/981108" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-1833" }, { "cve": "CVE-2016-1834", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1834" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1834", "url": "https://www.suse.com/security/cve/CVE-2016-1834" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-1834", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 981041 for CVE-2016-1834", "url": "https://bugzilla.suse.com/981041" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-1834" }, { "cve": "CVE-2016-1835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1835" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1835", "url": "https://www.suse.com/security/cve/CVE-2016-1835" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-1835", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 981109 for CVE-2016-1835", "url": "https://bugzilla.suse.com/981109" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2016-1835" }, { "cve": "CVE-2016-1837", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1837" } ], "notes": [ { "category": "general", "text": "Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1837", "url": "https://www.suse.com/security/cve/CVE-2016-1837" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-1837", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 981111 for CVE-2016-1837", "url": "https://bugzilla.suse.com/981111" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-1837" }, { "cve": "CVE-2016-1838", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1838" } ], "notes": [ { "category": "general", "text": "The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1838", "url": "https://www.suse.com/security/cve/CVE-2016-1838" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-1838", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 981112 for CVE-2016-1838", "url": "https://bugzilla.suse.com/981112" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-1838" }, { "cve": "CVE-2016-1839", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1839" } ], "notes": [ { "category": "general", "text": "The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1839", "url": "https://www.suse.com/security/cve/CVE-2016-1839" }, { "category": "external", "summary": "SUSE Bug 1039069 for CVE-2016-1839", "url": "https://bugzilla.suse.com/1039069" }, { "category": "external", "summary": "SUSE Bug 1039661 for CVE-2016-1839", "url": "https://bugzilla.suse.com/1039661" }, { "category": "external", "summary": "SUSE Bug 1069433 for CVE-2016-1839", "url": "https://bugzilla.suse.com/1069433" }, { "category": "external", "summary": "SUSE Bug 1069690 for CVE-2016-1839", "url": "https://bugzilla.suse.com/1069690" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-1839", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 963963 for CVE-2016-1839", "url": "https://bugzilla.suse.com/963963" }, { "category": "external", "summary": "SUSE Bug 981114 for CVE-2016-1839", "url": "https://bugzilla.suse.com/981114" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-1839" }, { "cve": "CVE-2016-1840", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1840" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1840", "url": "https://www.suse.com/security/cve/CVE-2016-1840" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-1840", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 981115 for CVE-2016-1840", "url": "https://bugzilla.suse.com/981115" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2016-1840" }, { "cve": "CVE-2016-2037", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2037" } ], "notes": [ { "category": "general", "text": "The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2037", "url": "https://www.suse.com/security/cve/CVE-2016-2037" }, { "category": "external", "summary": "SUSE Bug 1028410 for CVE-2016-2037", "url": "https://bugzilla.suse.com/1028410" }, { "category": "external", "summary": "SUSE Bug 963448 for CVE-2016-2037", "url": "https://bugzilla.suse.com/963448" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-2037" }, { "cve": "CVE-2016-2073", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2073" } ], "notes": [ { "category": "general", "text": "The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2073", "url": "https://www.suse.com/security/cve/CVE-2016-2073" }, { "category": "external", "summary": "SUSE Bug 963963 for CVE-2016-2073", "url": "https://bugzilla.suse.com/963963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-2073" }, { "cve": "CVE-2016-2105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2105" } ], "notes": [ { "category": "general", "text": "Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2105", "url": "https://www.suse.com/security/cve/CVE-2016-2105" }, { "category": "external", "summary": "SUSE Bug 977584 for CVE-2016-2105", "url": "https://bugzilla.suse.com/977584" }, { "category": "external", "summary": "SUSE Bug 977614 for CVE-2016-2105", "url": "https://bugzilla.suse.com/977614" }, { "category": "external", "summary": "SUSE Bug 978492 for CVE-2016-2105", "url": "https://bugzilla.suse.com/978492" }, { "category": "external", "summary": "SUSE Bug 989902 for CVE-2016-2105", "url": "https://bugzilla.suse.com/989902" }, { "category": "external", "summary": "SUSE Bug 990369 for CVE-2016-2105", "url": "https://bugzilla.suse.com/990369" }, { "category": "external", "summary": "SUSE Bug 990370 for CVE-2016-2105", "url": "https://bugzilla.suse.com/990370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-2105" }, { "cve": "CVE-2016-2106", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2106" } ], "notes": [ { "category": "general", "text": "Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2106", "url": "https://www.suse.com/security/cve/CVE-2016-2106" }, { "category": "external", "summary": "SUSE Bug 977584 for CVE-2016-2106", "url": "https://bugzilla.suse.com/977584" }, { "category": "external", "summary": "SUSE Bug 977615 for CVE-2016-2106", "url": "https://bugzilla.suse.com/977615" }, { "category": "external", "summary": "SUSE Bug 978492 for CVE-2016-2106", "url": "https://bugzilla.suse.com/978492" }, { "category": "external", "summary": "SUSE Bug 979279 for CVE-2016-2106", "url": "https://bugzilla.suse.com/979279" }, { "category": "external", "summary": "SUSE Bug 990369 for CVE-2016-2106", "url": "https://bugzilla.suse.com/990369" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-2106" }, { "cve": "CVE-2016-2107", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2107" } ], "notes": [ { "category": "general", "text": "The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2107", "url": "https://www.suse.com/security/cve/CVE-2016-2107" }, { "category": "external", "summary": "SUSE Bug 976942 for CVE-2016-2107", "url": "https://bugzilla.suse.com/976942" }, { "category": "external", "summary": "SUSE Bug 977584 for CVE-2016-2107", "url": "https://bugzilla.suse.com/977584" }, { "category": "external", "summary": "SUSE Bug 977616 for CVE-2016-2107", "url": "https://bugzilla.suse.com/977616" }, { "category": "external", "summary": "SUSE Bug 978492 for CVE-2016-2107", "url": "https://bugzilla.suse.com/978492" }, { "category": "external", "summary": "SUSE Bug 990369 for CVE-2016-2107", "url": "https://bugzilla.suse.com/990369" }, { "category": "external", "summary": "SUSE Bug 990370 for CVE-2016-2107", "url": "https://bugzilla.suse.com/990370" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2016-2107" }, { "cve": "CVE-2016-2108", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2108" } ], "notes": [ { "category": "general", "text": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2108", "url": "https://www.suse.com/security/cve/CVE-2016-2108" }, { "category": "external", "summary": "SUSE Bug 1001502 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1001502" }, { "category": "external", "summary": "SUSE Bug 1004499 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1004499" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 977584 for CVE-2016-2108", "url": "https://bugzilla.suse.com/977584" }, { "category": "external", "summary": "SUSE Bug 977617 for CVE-2016-2108", "url": "https://bugzilla.suse.com/977617" }, { "category": "external", "summary": "SUSE Bug 978492 for CVE-2016-2108", "url": "https://bugzilla.suse.com/978492" }, { "category": "external", "summary": "SUSE Bug 989345 for CVE-2016-2108", "url": "https://bugzilla.suse.com/989345" }, { "category": "external", "summary": "SUSE Bug 996067 for CVE-2016-2108", "url": "https://bugzilla.suse.com/996067" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2016-2108" }, { "cve": "CVE-2016-2109", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2109" } ], "notes": [ { "category": "general", "text": "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2109", "url": "https://www.suse.com/security/cve/CVE-2016-2109" }, { "category": "external", "summary": "SUSE Bug 1015243 for CVE-2016-2109", "url": "https://bugzilla.suse.com/1015243" }, { "category": "external", "summary": "SUSE Bug 976942 for CVE-2016-2109", "url": "https://bugzilla.suse.com/976942" }, { "category": "external", "summary": "SUSE Bug 977584 for CVE-2016-2109", "url": "https://bugzilla.suse.com/977584" }, { "category": "external", "summary": "SUSE Bug 978492 for CVE-2016-2109", "url": "https://bugzilla.suse.com/978492" }, { "category": "external", "summary": "SUSE Bug 990369 for CVE-2016-2109", "url": "https://bugzilla.suse.com/990369" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-2109" }, { "cve": "CVE-2016-2177", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2177" } ], "notes": [ { "category": "general", "text": "OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2177", "url": "https://www.suse.com/security/cve/CVE-2016-2177" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-2177", "url": "https://bugzilla.suse.com/982575" }, { "category": "external", "summary": "SUSE Bug 999075 for CVE-2016-2177", "url": "https://bugzilla.suse.com/999075" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-2177", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2016-2177" }, { "cve": "CVE-2016-2178", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2178" } ], "notes": [ { "category": "general", "text": "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2178", "url": "https://www.suse.com/security/cve/CVE-2016-2178" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-2178", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 983249 for CVE-2016-2178", "url": "https://bugzilla.suse.com/983249" }, { "category": "external", "summary": "SUSE Bug 983519 for CVE-2016-2178", "url": "https://bugzilla.suse.com/983519" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-2178", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-2178" }, { "cve": "CVE-2016-2179", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2179" } ], "notes": [ { "category": "general", "text": "The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2179", "url": "https://www.suse.com/security/cve/CVE-2016-2179" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-2179", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 994844 for CVE-2016-2179", "url": "https://bugzilla.suse.com/994844" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-2179", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-2179" }, { "cve": "CVE-2016-2180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2180" } ], "notes": [ { "category": "general", "text": "The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the \"openssl ts\" command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2180", "url": "https://www.suse.com/security/cve/CVE-2016-2180" }, { "category": "external", "summary": "SUSE Bug 1003811 for CVE-2016-2180", "url": "https://bugzilla.suse.com/1003811" }, { "category": "external", "summary": "SUSE Bug 990419 for CVE-2016-2180", "url": "https://bugzilla.suse.com/990419" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-2180", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-2180" }, { "cve": "CVE-2016-2181", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2181" } ], "notes": [ { "category": "general", "text": "The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2181", "url": "https://www.suse.com/security/cve/CVE-2016-2181" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-2181", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 994749 for CVE-2016-2181", "url": "https://bugzilla.suse.com/994749" }, { "category": "external", "summary": "SUSE Bug 994844 for CVE-2016-2181", "url": "https://bugzilla.suse.com/994844" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-2181", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-2181" }, { "cve": "CVE-2016-2182", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2182" } ], "notes": [ { "category": "general", "text": "The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2182", "url": "https://www.suse.com/security/cve/CVE-2016-2182" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-2182", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 993819 for CVE-2016-2182", "url": "https://bugzilla.suse.com/993819" }, { "category": "external", "summary": "SUSE Bug 994844 for CVE-2016-2182", "url": "https://bugzilla.suse.com/994844" }, { "category": "external", "summary": "SUSE Bug 995959 for CVE-2016-2182", "url": "https://bugzilla.suse.com/995959" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-2182", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-2182" }, { "cve": "CVE-2016-2183", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2183" } ], "notes": [ { "category": "general", "text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2183", "url": "https://www.suse.com/security/cve/CVE-2016-2183" }, { "category": "external", "summary": "SUSE Bug 1001912 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1001912" }, { "category": "external", "summary": "SUSE Bug 1024218 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1024218" }, { "category": "external", "summary": "SUSE Bug 1027038 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1027038" }, { "category": "external", "summary": "SUSE Bug 1034689 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1034689" }, { "category": "external", "summary": "SUSE Bug 1056614 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1056614" }, { "category": "external", "summary": "SUSE Bug 1171693 for CVE-2016-2183", "url": "https://bugzilla.suse.com/1171693" }, { "category": "external", "summary": "SUSE Bug 994844 for CVE-2016-2183", "url": "https://bugzilla.suse.com/994844" }, { "category": "external", "summary": "SUSE Bug 995359 for CVE-2016-2183", "url": "https://bugzilla.suse.com/995359" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-2183" }, { "cve": "CVE-2016-2381", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2381" } ], "notes": [ { "category": "general", "text": "Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2381", "url": "https://www.suse.com/security/cve/CVE-2016-2381" }, { "category": "external", "summary": "SUSE Bug 967082 for CVE-2016-2381", "url": "https://bugzilla.suse.com/967082" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2016-2381", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-2381" }, { "cve": "CVE-2016-3075", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3075" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3075", "url": "https://www.suse.com/security/cve/CVE-2016-3075" }, { "category": "external", "summary": "SUSE Bug 1123874 for CVE-2016-3075", "url": "https://bugzilla.suse.com/1123874" }, { "category": "external", "summary": "SUSE Bug 973164 for CVE-2016-3075", "url": "https://bugzilla.suse.com/973164" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-3075" }, { "cve": "CVE-2016-3191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3191" } ], "notes": [ { "category": "general", "text": "The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3191", "url": "https://www.suse.com/security/cve/CVE-2016-3191" }, { "category": "external", "summary": "SUSE Bug 971741 for CVE-2016-3191", "url": "https://bugzilla.suse.com/971741" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-3191" }, { "cve": "CVE-2016-3627", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3627" } ], "notes": [ { "category": "general", "text": "The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3627", "url": "https://www.suse.com/security/cve/CVE-2016-3627" }, { "category": "external", "summary": "SUSE Bug 1026099 for CVE-2016-3627", "url": "https://bugzilla.suse.com/1026099" }, { "category": "external", "summary": "SUSE Bug 1026101 for CVE-2016-3627", "url": "https://bugzilla.suse.com/1026101" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-3627", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 972335 for CVE-2016-3627", "url": "https://bugzilla.suse.com/972335" }, { "category": "external", "summary": "SUSE Bug 975947 for CVE-2016-3627", "url": "https://bugzilla.suse.com/975947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-3627" }, { "cve": "CVE-2016-3705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3705" } ], "notes": [ { "category": "general", "text": "The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3705", "url": "https://www.suse.com/security/cve/CVE-2016-3705" }, { "category": "external", "summary": "SUSE Bug 1017497 for CVE-2016-3705", "url": "https://bugzilla.suse.com/1017497" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-3705", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 975947 for CVE-2016-3705", "url": "https://bugzilla.suse.com/975947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2016-3705" }, { "cve": "CVE-2016-3706", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3706" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3706", "url": "https://www.suse.com/security/cve/CVE-2016-3706" }, { "category": "external", "summary": "SUSE Bug 1123874 for CVE-2016-3706", "url": "https://bugzilla.suse.com/1123874" }, { "category": "external", "summary": "SUSE Bug 980483 for CVE-2016-3706", "url": "https://bugzilla.suse.com/980483" }, { "category": "external", "summary": "SUSE Bug 997423 for CVE-2016-3706", "url": "https://bugzilla.suse.com/997423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-3706" }, { "cve": "CVE-2016-4008", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4008" } ], "notes": [ { "category": "general", "text": "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4008", "url": "https://www.suse.com/security/cve/CVE-2016-4008" }, { "category": "external", "summary": "SUSE Bug 982779 for CVE-2016-4008", "url": "https://bugzilla.suse.com/982779" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-4008" }, { "cve": "CVE-2016-4429", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4429" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4429", "url": "https://www.suse.com/security/cve/CVE-2016-4429" }, { "category": "external", "summary": "SUSE Bug 1081556 for CVE-2016-4429", "url": "https://bugzilla.suse.com/1081556" }, { "category": "external", "summary": "SUSE Bug 1123874 for CVE-2016-4429", "url": "https://bugzilla.suse.com/1123874" }, { "category": "external", "summary": "SUSE Bug 980854 for CVE-2016-4429", "url": "https://bugzilla.suse.com/980854" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-4429" }, { "cve": "CVE-2016-4447", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4447" } ], "notes": [ { "category": "general", "text": "The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4447", "url": "https://www.suse.com/security/cve/CVE-2016-4447" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-4447", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 981548 for CVE-2016-4447", "url": "https://bugzilla.suse.com/981548" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-4447" }, { "cve": "CVE-2016-4448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4448" } ], "notes": [ { "category": "general", "text": "Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4448", "url": "https://www.suse.com/security/cve/CVE-2016-4448" }, { "category": "external", "summary": "SUSE Bug 1010299 for CVE-2016-4448", "url": "https://bugzilla.suse.com/1010299" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-4448", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 981549 for CVE-2016-4448", "url": "https://bugzilla.suse.com/981549" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-4448" }, { "cve": "CVE-2016-4449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4449" } ], "notes": [ { "category": "general", "text": "XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4449", "url": "https://www.suse.com/security/cve/CVE-2016-4449" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-4449", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 981550 for CVE-2016-4449", "url": "https://bugzilla.suse.com/981550" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-4449" }, { "cve": "CVE-2016-4483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4483" } ], "notes": [ { "category": "general", "text": "The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4483", "url": "https://www.suse.com/security/cve/CVE-2016-4483" }, { "category": "external", "summary": "SUSE Bug 1026101 for CVE-2016-4483", "url": "https://bugzilla.suse.com/1026101" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-4483", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 978395 for CVE-2016-4483", "url": "https://bugzilla.suse.com/978395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-4483" }, { "cve": "CVE-2016-4574", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4574" } ], "notes": [ { "category": "general", "text": "Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4574", "url": "https://www.suse.com/security/cve/CVE-2016-4574" }, { "category": "external", "summary": "SUSE Bug 1135436 for CVE-2016-4574", "url": "https://bugzilla.suse.com/1135436" }, { "category": "external", "summary": "SUSE Bug 979261 for CVE-2016-4574", "url": "https://bugzilla.suse.com/979261" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2016-4574" }, { "cve": "CVE-2016-4579", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4579" } ], "notes": [ { "category": "general", "text": "Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the \"returned length of the object from _ksba_ber_parse_tl.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4579", "url": "https://www.suse.com/security/cve/CVE-2016-4579" }, { "category": "external", "summary": "SUSE Bug 1135436 for CVE-2016-4579", "url": "https://bugzilla.suse.com/1135436" }, { "category": "external", "summary": "SUSE Bug 979906 for CVE-2016-4579", "url": "https://bugzilla.suse.com/979906" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-4579" }, { "cve": "CVE-2016-4658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4658" } ], "notes": [ { "category": "general", "text": "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4658", "url": "https://www.suse.com/security/cve/CVE-2016-4658" }, { "category": "external", "summary": "SUSE Bug 1005544 for CVE-2016-4658", "url": "https://bugzilla.suse.com/1005544" }, { "category": "external", "summary": "SUSE Bug 1014873 for CVE-2016-4658", "url": "https://bugzilla.suse.com/1014873" }, { "category": "external", "summary": "SUSE Bug 1069433 for CVE-2016-4658", "url": "https://bugzilla.suse.com/1069433" }, { "category": "external", "summary": "SUSE Bug 1078813 for CVE-2016-4658", "url": "https://bugzilla.suse.com/1078813" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-4658", "url": "https://bugzilla.suse.com/1123919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-4658" }, { "cve": "CVE-2016-5011", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5011" } ], "notes": [ { "category": "general", "text": "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5011", "url": "https://www.suse.com/security/cve/CVE-2016-5011" }, { "category": "external", "summary": "SUSE Bug 988361 for CVE-2016-5011", "url": "https://bugzilla.suse.com/988361" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-5011" }, { "cve": "CVE-2016-5300", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5300" } ], "notes": [ { "category": "general", "text": "The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5300", "url": "https://www.suse.com/security/cve/CVE-2016-5300" }, { "category": "external", "summary": "SUSE Bug 983216 for CVE-2016-5300", "url": "https://bugzilla.suse.com/983216" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2016-5300" }, { "cve": "CVE-2016-5419", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5419" } ], "notes": [ { "category": "general", "text": "curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5419", "url": "https://www.suse.com/security/cve/CVE-2016-5419" }, { "category": "external", "summary": "SUSE Bug 1033413 for CVE-2016-5419", "url": "https://bugzilla.suse.com/1033413" }, { "category": "external", "summary": "SUSE Bug 1033442 for CVE-2016-5419", "url": "https://bugzilla.suse.com/1033442" }, { "category": "external", "summary": "SUSE Bug 991389 for CVE-2016-5419", "url": "https://bugzilla.suse.com/991389" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-5419" }, { "cve": "CVE-2016-5420", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5420" } ], "notes": [ { "category": "general", "text": "curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5420", "url": "https://www.suse.com/security/cve/CVE-2016-5420" }, { "category": "external", "summary": "SUSE Bug 991390 for CVE-2016-5420", "url": "https://bugzilla.suse.com/991390" }, { "category": "external", "summary": "SUSE Bug 997420 for CVE-2016-5420", "url": "https://bugzilla.suse.com/997420" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-5420" }, { "cve": "CVE-2016-5421", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5421" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5421", "url": "https://www.suse.com/security/cve/CVE-2016-5421" }, { "category": "external", "summary": "SUSE Bug 991391 for CVE-2016-5421", "url": "https://bugzilla.suse.com/991391" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-5421" }, { "cve": "CVE-2016-6185", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6185" } ], "notes": [ { "category": "general", "text": "The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6185", "url": "https://www.suse.com/security/cve/CVE-2016-6185" }, { "category": "external", "summary": "SUSE Bug 988311 for CVE-2016-6185", "url": "https://bugzilla.suse.com/988311" }, { "category": "external", "summary": "SUSE Bug 999993 for CVE-2016-6185", "url": "https://bugzilla.suse.com/999993" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-6185" }, { "cve": "CVE-2016-6261", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6261" } ], "notes": [ { "category": "general", "text": "The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6261", "url": "https://www.suse.com/security/cve/CVE-2016-6261" }, { "category": "external", "summary": "SUSE Bug 1118435 for CVE-2016-6261", "url": "https://bugzilla.suse.com/1118435" }, { "category": "external", "summary": "SUSE Bug 1173590 for CVE-2016-6261", "url": "https://bugzilla.suse.com/1173590" }, { "category": "external", "summary": "SUSE Bug 990190 for CVE-2016-6261", "url": "https://bugzilla.suse.com/990190" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-6261" }, { "cve": "CVE-2016-6262", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6262" } ], "notes": [ { "category": "general", "text": "idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6262", "url": "https://www.suse.com/security/cve/CVE-2016-6262" }, { "category": "external", "summary": "SUSE Bug 1014473 for CVE-2016-6262", "url": "https://bugzilla.suse.com/1014473" }, { "category": "external", "summary": "SUSE Bug 1173590 for CVE-2016-6262", "url": "https://bugzilla.suse.com/1173590" }, { "category": "external", "summary": "SUSE Bug 1190777 for CVE-2016-6262", "url": "https://bugzilla.suse.com/1190777" }, { "category": "external", "summary": "SUSE Bug 990189 for CVE-2016-6262", "url": "https://bugzilla.suse.com/990189" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-6262" }, { "cve": "CVE-2016-6263", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6263" } ], "notes": [ { "category": "general", "text": "The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6263", "url": "https://www.suse.com/security/cve/CVE-2016-6263" }, { "category": "external", "summary": "SUSE Bug 1118435 for CVE-2016-6263", "url": "https://bugzilla.suse.com/1118435" }, { "category": "external", "summary": "SUSE Bug 990191 for CVE-2016-6263", "url": "https://bugzilla.suse.com/990191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-6263" }, { "cve": "CVE-2016-6302", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6302" } ], "notes": [ { "category": "general", "text": "The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6302", "url": "https://www.suse.com/security/cve/CVE-2016-6302" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-6302", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 994844 for CVE-2016-6302", "url": "https://bugzilla.suse.com/994844" }, { "category": "external", "summary": "SUSE Bug 995324 for CVE-2016-6302", "url": "https://bugzilla.suse.com/995324" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-6302", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-6302" }, { "cve": "CVE-2016-6303", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6303" } ], "notes": [ { "category": "general", "text": "Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6303", "url": "https://www.suse.com/security/cve/CVE-2016-6303" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-6303", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-6303", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 994844 for CVE-2016-6303", "url": "https://bugzilla.suse.com/994844" }, { "category": "external", "summary": "SUSE Bug 995377 for CVE-2016-6303", "url": "https://bugzilla.suse.com/995377" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-6303", "url": "https://bugzilla.suse.com/999665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-6303" }, { "cve": "CVE-2016-6304", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6304" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6304", "url": "https://www.suse.com/security/cve/CVE-2016-6304" }, { "category": "external", "summary": "SUSE Bug 1001706 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1001706" }, { "category": "external", "summary": "SUSE Bug 1003811 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1003811" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 1005579 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1005579" }, { "category": "external", "summary": "SUSE Bug 1021375 for CVE-2016-6304", "url": "https://bugzilla.suse.com/1021375" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-6304", "url": "https://bugzilla.suse.com/999665" }, { "category": "external", "summary": "SUSE Bug 999666 for CVE-2016-6304", "url": "https://bugzilla.suse.com/999666" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-6304" }, { "cve": "CVE-2016-6306", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6306" } ], "notes": [ { "category": "general", "text": "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6306", "url": "https://www.suse.com/security/cve/CVE-2016-6306" }, { "category": "external", "summary": "SUSE Bug 1004104 for CVE-2016-6306", "url": "https://bugzilla.suse.com/1004104" }, { "category": "external", "summary": "SUSE Bug 999665 for CVE-2016-6306", "url": "https://bugzilla.suse.com/999665" }, { "category": "external", "summary": "SUSE Bug 999668 for CVE-2016-6306", "url": "https://bugzilla.suse.com/999668" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-6306" }, { "cve": "CVE-2016-6313", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6313" } ], "notes": [ { "category": "general", "text": "The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6313", "url": "https://www.suse.com/security/cve/CVE-2016-6313" }, { "category": "external", "summary": "SUSE Bug 1123792 for CVE-2016-6313", "url": "https://bugzilla.suse.com/1123792" }, { "category": "external", "summary": "SUSE Bug 994157 for CVE-2016-6313", "url": "https://bugzilla.suse.com/994157" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-6313" }, { "cve": "CVE-2016-6318", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6318" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6318", "url": "https://www.suse.com/security/cve/CVE-2016-6318" }, { "category": "external", "summary": "SUSE Bug 1123113 for CVE-2016-6318", "url": "https://bugzilla.suse.com/1123113" }, { "category": "external", "summary": "SUSE Bug 992966 for CVE-2016-6318", "url": "https://bugzilla.suse.com/992966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-6318" }, { "cve": "CVE-2016-7056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7056" } ], "notes": [ { "category": "general", "text": "A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7056", "url": "https://www.suse.com/security/cve/CVE-2016-7056" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1019334 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1019334" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-7056" }, { "cve": "CVE-2016-7141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7141" } ], "notes": [ { "category": "general", "text": "curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7141", "url": "https://www.suse.com/security/cve/CVE-2016-7141" }, { "category": "external", "summary": "SUSE Bug 991390 for CVE-2016-7141", "url": "https://bugzilla.suse.com/991390" }, { "category": "external", "summary": "SUSE Bug 997420 for CVE-2016-7141", "url": "https://bugzilla.suse.com/997420" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-7141" }, { "cve": "CVE-2016-7167", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7167" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7167", "url": "https://www.suse.com/security/cve/CVE-2016-7167" }, { "category": "external", "summary": "SUSE Bug 998760 for CVE-2016-7167", "url": "https://bugzilla.suse.com/998760" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-7167" }, { "cve": "CVE-2016-7543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7543" } ], "notes": [ { "category": "general", "text": "Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7543", "url": "https://www.suse.com/security/cve/CVE-2016-7543" }, { "category": "external", "summary": "SUSE Bug 1001299 for CVE-2016-7543", "url": "https://bugzilla.suse.com/1001299" }, { "category": "external", "summary": "SUSE Bug 1159416 for CVE-2016-7543", "url": "https://bugzilla.suse.com/1159416" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-7543" }, { "cve": "CVE-2016-7796", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7796" } ], "notes": [ { "category": "general", "text": "The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7796", "url": "https://www.suse.com/security/cve/CVE-2016-7796" }, { "category": "external", "summary": "SUSE Bug 1001765 for CVE-2016-7796", "url": "https://bugzilla.suse.com/1001765" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-7796" }, { "cve": "CVE-2016-8610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8610" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8610", "url": "https://www.suse.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1005879 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005879" }, { "category": "external", "summary": "SUSE Bug 1110018 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1110018" }, { "category": "external", "summary": "SUSE Bug 1120592 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1120592" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-8610", "url": "https://bugzilla.suse.com/982575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2016-8610" }, { "cve": "CVE-2016-8615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8615" } ], "notes": [ { "category": "general", "text": "A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8615", "url": "https://www.suse.com/security/cve/CVE-2016-8615" }, { "category": "external", "summary": "SUSE Bug 1005633 for CVE-2016-8615", "url": "https://bugzilla.suse.com/1005633" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-8615" }, { "cve": "CVE-2016-8616", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8616" } ], "notes": [ { "category": "general", "text": "A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8616", "url": "https://www.suse.com/security/cve/CVE-2016-8616" }, { "category": "external", "summary": "SUSE Bug 1005634 for CVE-2016-8616", "url": "https://bugzilla.suse.com/1005634" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-8616" }, { "cve": "CVE-2016-8617", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8617" } ], "notes": [ { "category": "general", "text": "The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8617", "url": "https://www.suse.com/security/cve/CVE-2016-8617" }, { "category": "external", "summary": "SUSE Bug 1005635 for CVE-2016-8617", "url": "https://bugzilla.suse.com/1005635" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-8617" }, { "cve": "CVE-2016-8618", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8618" } ], "notes": [ { "category": "general", "text": "The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8618", "url": "https://www.suse.com/security/cve/CVE-2016-8618" }, { "category": "external", "summary": "SUSE Bug 1005637 for CVE-2016-8618", "url": "https://bugzilla.suse.com/1005637" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-8618" }, { "cve": "CVE-2016-8619", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8619" } ], "notes": [ { "category": "general", "text": "The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8619", "url": "https://www.suse.com/security/cve/CVE-2016-8619" }, { "category": "external", "summary": "SUSE Bug 1005638 for CVE-2016-8619", "url": "https://bugzilla.suse.com/1005638" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-8619" }, { "cve": "CVE-2016-8620", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8620" } ], "notes": [ { "category": "general", "text": "The \u0027globbing\u0027 feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8620", "url": "https://www.suse.com/security/cve/CVE-2016-8620" }, { "category": "external", "summary": "SUSE Bug 1005640 for CVE-2016-8620", "url": "https://bugzilla.suse.com/1005640" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-8620" }, { "cve": "CVE-2016-8621", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8621" } ], "notes": [ { "category": "general", "text": "The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8621", "url": "https://www.suse.com/security/cve/CVE-2016-8621" }, { "category": "external", "summary": "SUSE Bug 1005642 for CVE-2016-8621", "url": "https://bugzilla.suse.com/1005642" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-8621" }, { "cve": "CVE-2016-8622", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8622" } ], "notes": [ { "category": "general", "text": "The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8622", "url": "https://www.suse.com/security/cve/CVE-2016-8622" }, { "category": "external", "summary": "SUSE Bug 1005643 for CVE-2016-8622", "url": "https://bugzilla.suse.com/1005643" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-8622" }, { "cve": "CVE-2016-8623", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8623" } ], "notes": [ { "category": "general", "text": "A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8623", "url": "https://www.suse.com/security/cve/CVE-2016-8623" }, { "category": "external", "summary": "SUSE Bug 1005645 for CVE-2016-8623", "url": "https://bugzilla.suse.com/1005645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-8623" }, { "cve": "CVE-2016-8624", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8624" } ], "notes": [ { "category": "general", "text": "curl before version 7.51.0 doesn\u0027t parse the authority component of the URL correctly when the host name part ends with a \u0027#\u0027 character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8624", "url": "https://www.suse.com/security/cve/CVE-2016-8624" }, { "category": "external", "summary": "SUSE Bug 1005646 for CVE-2016-8624", "url": "https://bugzilla.suse.com/1005646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-8624" }, { "cve": "CVE-2016-9063", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9063" } ], "notes": [ { "category": "general", "text": "An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox \u003c 50.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9063", "url": "https://www.suse.com/security/cve/CVE-2016-9063" }, { "category": "external", "summary": "SUSE Bug 1009026 for CVE-2016-9063", "url": "https://bugzilla.suse.com/1009026" }, { "category": "external", "summary": "SUSE Bug 1010424 for CVE-2016-9063", "url": "https://bugzilla.suse.com/1010424" }, { "category": "external", "summary": "SUSE Bug 1047240 for CVE-2016-9063", "url": "https://bugzilla.suse.com/1047240" }, { "category": "external", "summary": "SUSE Bug 1123115 for CVE-2016-9063", "url": "https://bugzilla.suse.com/1123115" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "critical" } ], "title": "CVE-2016-9063" }, { "cve": "CVE-2016-9318", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9318" } ], "notes": [ { "category": "general", "text": "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9318", "url": "https://www.suse.com/security/cve/CVE-2016-9318" }, { "category": "external", "summary": "SUSE Bug 1010675 for CVE-2016-9318", "url": "https://bugzilla.suse.com/1010675" }, { "category": "external", "summary": "SUSE Bug 1014873 for CVE-2016-9318", "url": "https://bugzilla.suse.com/1014873" }, { "category": "external", "summary": "SUSE Bug 1019074 for CVE-2016-9318", "url": "https://bugzilla.suse.com/1019074" }, { "category": "external", "summary": "SUSE Bug 1118959 for CVE-2016-9318", "url": "https://bugzilla.suse.com/1118959" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-9318", "url": "https://bugzilla.suse.com/1123919" }, { "category": "external", "summary": "SUSE Bug 1126613 for CVE-2016-9318", "url": "https://bugzilla.suse.com/1126613" }, { "category": "external", "summary": "SUSE Bug 1148896 for CVE-2016-9318", "url": "https://bugzilla.suse.com/1148896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-9318" }, { "cve": "CVE-2016-9586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9586" } ], "notes": [ { "category": "general", "text": "curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl\u0027s implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9586", "url": "https://www.suse.com/security/cve/CVE-2016-9586" }, { "category": "external", "summary": "SUSE Bug 1015332 for CVE-2016-9586", "url": "https://bugzilla.suse.com/1015332" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-9586" }, { "cve": "CVE-2016-9597", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9597" } ], "notes": [ { "category": "general", "text": "It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9597", "url": "https://www.suse.com/security/cve/CVE-2016-9597" }, { "category": "external", "summary": "SUSE Bug 1014873 for CVE-2016-9597", "url": "https://bugzilla.suse.com/1014873" }, { "category": "external", "summary": "SUSE Bug 1017497 for CVE-2016-9597", "url": "https://bugzilla.suse.com/1017497" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2016-9597", "url": "https://bugzilla.suse.com/1123919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-9597" }, { "cve": "CVE-2016-9840", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9840" } ], "notes": [ { "category": "general", "text": "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9840", "url": "https://www.suse.com/security/cve/CVE-2016-9840" }, { "category": "external", "summary": "SUSE Bug 1003579 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1003579" }, { "category": "external", "summary": "SUSE Bug 1022633 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1022633" }, { "category": "external", "summary": "SUSE Bug 1023215 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1023215" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1038505" }, { "category": "external", "summary": "SUSE Bug 1062104 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1062104" }, { "category": "external", "summary": "SUSE Bug 1120866 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1120866" }, { "category": "external", "summary": "SUSE Bug 1123150 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1123150" }, { "category": "external", "summary": "SUSE Bug 1127473 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1127473" }, { "category": "external", "summary": "SUSE Bug 1184301 for CVE-2016-9840", "url": "https://bugzilla.suse.com/1184301" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "critical" } ], "title": "CVE-2016-9840" }, { "cve": "CVE-2016-9841", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9841" } ], "notes": [ { "category": "general", "text": "inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9841", "url": "https://www.suse.com/security/cve/CVE-2016-9841" }, { "category": "external", "summary": "SUSE Bug 1003579 for CVE-2016-9841", "url": "https://bugzilla.suse.com/1003579" }, { "category": "external", "summary": "SUSE Bug 1022633 for CVE-2016-9841", "url": "https://bugzilla.suse.com/1022633" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2016-9841", "url": "https://bugzilla.suse.com/1038505" }, { "category": "external", "summary": "SUSE Bug 1064070 for CVE-2016-9841", "url": "https://bugzilla.suse.com/1064070" }, { "category": "external", "summary": "SUSE Bug 1070162 for CVE-2016-9841", "url": "https://bugzilla.suse.com/1070162" }, { "category": "external", "summary": "SUSE Bug 1120866 for CVE-2016-9841", "url": "https://bugzilla.suse.com/1120866" }, { "category": "external", "summary": "SUSE Bug 1123150 for CVE-2016-9841", "url": "https://bugzilla.suse.com/1123150" }, { "category": "external", "summary": "SUSE Bug 1127473 for CVE-2016-9841", "url": "https://bugzilla.suse.com/1127473" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "critical" } ], "title": "CVE-2016-9841" }, { "cve": "CVE-2016-9842", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9842" } ], "notes": [ { "category": "general", "text": "The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9842", "url": "https://www.suse.com/security/cve/CVE-2016-9842" }, { "category": "external", "summary": "SUSE Bug 1003580 for CVE-2016-9842", "url": "https://bugzilla.suse.com/1003580" }, { "category": "external", "summary": "SUSE Bug 1022633 for CVE-2016-9842", "url": "https://bugzilla.suse.com/1022633" }, { "category": "external", "summary": "SUSE Bug 1023215 for CVE-2016-9842", "url": "https://bugzilla.suse.com/1023215" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2016-9842", "url": "https://bugzilla.suse.com/1038505" }, { "category": "external", "summary": "SUSE Bug 1062104 for CVE-2016-9842", "url": "https://bugzilla.suse.com/1062104" }, { "category": "external", "summary": "SUSE Bug 1120866 for CVE-2016-9842", "url": "https://bugzilla.suse.com/1120866" }, { "category": "external", "summary": "SUSE Bug 1123150 for CVE-2016-9842", "url": "https://bugzilla.suse.com/1123150" }, { "category": "external", "summary": "SUSE Bug 1127473 for CVE-2016-9842", "url": "https://bugzilla.suse.com/1127473" }, { "category": "external", "summary": "SUSE Bug 1184301 for CVE-2016-9842", "url": "https://bugzilla.suse.com/1184301" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2016-9842" }, { "cve": "CVE-2016-9843", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9843" } ], "notes": [ { "category": "general", "text": "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9843", "url": "https://www.suse.com/security/cve/CVE-2016-9843" }, { "category": "external", "summary": "SUSE Bug 1003580 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1003580" }, { "category": "external", "summary": "SUSE Bug 1013882 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1013882" }, { "category": "external", "summary": "SUSE Bug 1038505 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1038505" }, { "category": "external", "summary": "SUSE Bug 1062104 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1062104" }, { "category": "external", "summary": "SUSE Bug 1116686 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1116686" }, { "category": "external", "summary": "SUSE Bug 1120866 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1120866" }, { "category": "external", "summary": "SUSE Bug 1123150 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1123150" }, { "category": "external", "summary": "SUSE Bug 1127473 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1127473" }, { "category": "external", "summary": "SUSE Bug 1184301 for CVE-2016-9843", "url": "https://bugzilla.suse.com/1184301" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2016-9843" }, { "cve": "CVE-2017-1000100", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000100" } ], "notes": [ { "category": "general", "text": "When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn\u0027t restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl\u0027s redirect protocols with --proto-redir and libcurl\u0027s with CURLOPT_REDIR_PROTOCOLS.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000100", "url": "https://www.suse.com/security/cve/CVE-2017-1000100" }, { "category": "external", "summary": "SUSE Bug 1051644 for CVE-2017-1000100", "url": "https://bugzilla.suse.com/1051644" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2017-1000100" }, { "cve": "CVE-2017-1000101", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000101" } ], "notes": [ { "category": "general", "text": "curl supports \"globbing\" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000101", "url": "https://www.suse.com/security/cve/CVE-2017-1000101" }, { "category": "external", "summary": "SUSE Bug 1051643 for CVE-2017-1000101", "url": "https://bugzilla.suse.com/1051643" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2017-1000101" }, { "cve": "CVE-2017-1000366", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000366" } ], "notes": [ { "category": "general", "text": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000366", "url": "https://www.suse.com/security/cve/CVE-2017-1000366" }, { "category": "external", "summary": "SUSE Bug 1037551 for CVE-2017-1000366", "url": "https://bugzilla.suse.com/1037551" }, { "category": "external", "summary": "SUSE Bug 1039357 for CVE-2017-1000366", "url": "https://bugzilla.suse.com/1039357" }, { "category": "external", "summary": "SUSE Bug 1063847 for CVE-2017-1000366", "url": "https://bugzilla.suse.com/1063847" }, { "category": "external", "summary": "SUSE Bug 1071319 for CVE-2017-1000366", "url": "https://bugzilla.suse.com/1071319" }, { "category": "external", "summary": "SUSE Bug 1123874 for CVE-2017-1000366", "url": "https://bugzilla.suse.com/1123874" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2017-1000366" }, { "cve": "CVE-2017-10684", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10684" } ], "notes": [ { "category": "general", "text": "In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10684", "url": "https://www.suse.com/security/cve/CVE-2017-10684" }, { "category": "external", "summary": "SUSE Bug 1046858 for CVE-2017-10684", "url": "https://bugzilla.suse.com/1046858" }, { "category": "external", "summary": "SUSE Bug 1115932 for CVE-2017-10684", "url": "https://bugzilla.suse.com/1115932" }, { "category": "external", "summary": "SUSE Bug 1175501 for CVE-2017-10684", "url": "https://bugzilla.suse.com/1175501" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2017-10684" }, { "cve": "CVE-2017-10685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-10685" } ], "notes": [ { "category": "general", "text": "In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-10685", "url": "https://www.suse.com/security/cve/CVE-2017-10685" }, { "category": "external", "summary": "SUSE Bug 1046853 for CVE-2017-10685", "url": "https://bugzilla.suse.com/1046853" }, { "category": "external", "summary": "SUSE Bug 1115932 for CVE-2017-10685", "url": "https://bugzilla.suse.com/1115932" }, { "category": "external", "summary": "SUSE Bug 1175501 for CVE-2017-10685", "url": "https://bugzilla.suse.com/1175501" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2017-10685" }, { "cve": "CVE-2017-11112", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11112" } ], "notes": [ { "category": "general", "text": "In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11112", "url": "https://www.suse.com/security/cve/CVE-2017-11112" }, { "category": "external", "summary": "SUSE Bug 1046853 for CVE-2017-11112", "url": "https://bugzilla.suse.com/1046853" }, { "category": "external", "summary": "SUSE Bug 1047964 for CVE-2017-11112", "url": "https://bugzilla.suse.com/1047964" }, { "category": "external", "summary": "SUSE Bug 1175501 for CVE-2017-11112", "url": "https://bugzilla.suse.com/1175501" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2017-11112" }, { "cve": "CVE-2017-11113", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11113" } ], "notes": [ { "category": "general", "text": "In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11113", "url": "https://www.suse.com/security/cve/CVE-2017-11113" }, { "category": "external", "summary": "SUSE Bug 1046853 for CVE-2017-11113", "url": "https://bugzilla.suse.com/1046853" }, { "category": "external", "summary": "SUSE Bug 1047965 for CVE-2017-11113", "url": "https://bugzilla.suse.com/1047965" }, { "category": "external", "summary": "SUSE Bug 1175501 for CVE-2017-11113", "url": "https://bugzilla.suse.com/1175501" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2017-11113" }, { "cve": "CVE-2017-2616", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2616" } ], "notes": [ { "category": "general", "text": "A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2616", "url": "https://www.suse.com/security/cve/CVE-2017-2616" }, { "category": "external", "summary": "SUSE Bug 1023041 for CVE-2017-2616", "url": "https://bugzilla.suse.com/1023041" }, { "category": "external", "summary": "SUSE Bug 1123789 for CVE-2017-2616", "url": "https://bugzilla.suse.com/1123789" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2017-2616" }, { "cve": "CVE-2017-3731", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3731" } ], "notes": [ { "category": "general", "text": "If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3731", "url": "https://www.suse.com/security/cve/CVE-2017-3731" }, { "category": "external", "summary": "SUSE Bug 1021641 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1021641" }, { "category": "external", "summary": "SUSE Bug 1022085 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1022085" }, { "category": "external", "summary": "SUSE Bug 1064118 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1064118" }, { "category": "external", "summary": "SUSE Bug 1064119 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1064119" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2017-3731" }, { "cve": "CVE-2017-6507", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6507" } ], "notes": [ { "category": "general", "text": "An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle \u0027restart\u0027 operations removing AppArmor profiles that aren\u0027t found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what\u0027s done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6507", "url": "https://www.suse.com/security/cve/CVE-2017-6507" }, { "category": "external", "summary": "SUSE Bug 1029696 for CVE-2017-6507", "url": "https://bugzilla.suse.com/1029696" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2017-6507" }, { "cve": "CVE-2017-7407", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7407" } ], "notes": [ { "category": "general", "text": "The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a \u0027%\u0027 character, which leads to a heap-based buffer over-read.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7407", "url": "https://www.suse.com/security/cve/CVE-2017-7407" }, { "category": "external", "summary": "SUSE Bug 1032309 for CVE-2017-7407", "url": "https://bugzilla.suse.com/1032309" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2017-7407" }, { "cve": "CVE-2017-7526", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7526" } ], "notes": [ { "category": "general", "text": "libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7526", "url": "https://www.suse.com/security/cve/CVE-2017-7526" }, { "category": "external", "summary": "SUSE Bug 1046607 for CVE-2017-7526", "url": "https://bugzilla.suse.com/1046607" }, { "category": "external", "summary": "SUSE Bug 1047462 for CVE-2017-7526", "url": "https://bugzilla.suse.com/1047462" }, { "category": "external", "summary": "SUSE Bug 1123792 for CVE-2017-7526", "url": "https://bugzilla.suse.com/1123792" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2017-7526" }, { "cve": "CVE-2017-9047", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9047" } ], "notes": [ { "category": "general", "text": "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. The variable len is assigned strlen(buf). If the content-\u003etype is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-\u003eprefix is appended to buf (if it actually fits) whereupon (ii) content-\u003ename is written to the buffer. However, the check for whether the content-\u003ename actually fits also uses \u0027len\u0027 rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9047", "url": "https://www.suse.com/security/cve/CVE-2017-9047" }, { "category": "external", "summary": "SUSE Bug 1039063 for CVE-2017-9047", "url": "https://bugzilla.suse.com/1039063" }, { "category": "external", "summary": "SUSE Bug 1039066 for CVE-2017-9047", "url": "https://bugzilla.suse.com/1039066" }, { "category": "external", "summary": "SUSE Bug 1039657 for CVE-2017-9047", "url": "https://bugzilla.suse.com/1039657" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2017-9047", "url": "https://bugzilla.suse.com/1123919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2017-9047" }, { "cve": "CVE-2017-9048", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9048" } ], "notes": [ { "category": "general", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 \u003c size. This vulnerability causes programs that use libxml2, such as PHP, to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9048", "url": "https://www.suse.com/security/cve/CVE-2017-9048" }, { "category": "external", "summary": "SUSE Bug 1039064 for CVE-2017-9048", "url": "https://bugzilla.suse.com/1039064" }, { "category": "external", "summary": "SUSE Bug 1039066 for CVE-2017-9048", "url": "https://bugzilla.suse.com/1039066" }, { "category": "external", "summary": "SUSE Bug 1039658 for CVE-2017-9048", "url": "https://bugzilla.suse.com/1039658" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "low" } ], "title": "CVE-2017-9048" }, { "cve": "CVE-2017-9049", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9049" } ], "notes": [ { "category": "general", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9049", "url": "https://www.suse.com/security/cve/CVE-2017-9049" }, { "category": "external", "summary": "SUSE Bug 1039063 for CVE-2017-9049", "url": "https://bugzilla.suse.com/1039063" }, { "category": "external", "summary": "SUSE Bug 1039064 for CVE-2017-9049", "url": "https://bugzilla.suse.com/1039064" }, { "category": "external", "summary": "SUSE Bug 1039066 for CVE-2017-9049", "url": "https://bugzilla.suse.com/1039066" }, { "category": "external", "summary": "SUSE Bug 1039659 for CVE-2017-9049", "url": "https://bugzilla.suse.com/1039659" }, { "category": "external", "summary": "SUSE Bug 1039661 for CVE-2017-9049", "url": "https://bugzilla.suse.com/1039661" }, { "category": "external", "summary": "SUSE Bug 1069690 for CVE-2017-9049", "url": "https://bugzilla.suse.com/1069690" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2017-9049", "url": "https://bugzilla.suse.com/1123919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2017-9049" }, { "cve": "CVE-2017-9050", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9050" } ], "notes": [ { "category": "general", "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9050", "url": "https://www.suse.com/security/cve/CVE-2017-9050" }, { "category": "external", "summary": "SUSE Bug 1039066 for CVE-2017-9050", "url": "https://bugzilla.suse.com/1039066" }, { "category": "external", "summary": "SUSE Bug 1039069 for CVE-2017-9050", "url": "https://bugzilla.suse.com/1039069" }, { "category": "external", "summary": "SUSE Bug 1039661 for CVE-2017-9050", "url": "https://bugzilla.suse.com/1039661" }, { "category": "external", "summary": "SUSE Bug 1069433 for CVE-2017-9050", "url": "https://bugzilla.suse.com/1069433" }, { "category": "external", "summary": "SUSE Bug 1069690 for CVE-2017-9050", "url": "https://bugzilla.suse.com/1069690" }, { "category": "external", "summary": "SUSE Bug 1123919 for CVE-2017-9050", "url": "https://bugzilla.suse.com/1123919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "moderate" } ], "title": "CVE-2017-9050" }, { "cve": "CVE-2017-9233", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9233" } ], "notes": [ { "category": "general", "text": "XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9233", "url": "https://www.suse.com/security/cve/CVE-2017-9233" }, { "category": "external", "summary": "SUSE Bug 1030296 for CVE-2017-9233", "url": "https://bugzilla.suse.com/1030296" }, { "category": "external", "summary": "SUSE Bug 1047236 for CVE-2017-9233", "url": "https://bugzilla.suse.com/1047236" }, { "category": "external", "summary": "SUSE Bug 1073350 for CVE-2017-9233", "url": "https://bugzilla.suse.com/1073350" }, { "category": "external", "summary": "SUSE Bug 1123115 for CVE-2017-9233", "url": "https://bugzilla.suse.com/1123115" }, { "category": "external", "summary": "SUSE Bug 983216 for CVE-2017-9233", "url": "https://bugzilla.suse.com/983216" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-10-10T19:37:36Z", "details": "important" } ], "title": "CVE-2017-9233" } ] }
suse-su-2019:1553-1
Vulnerability from csaf_suse
Published
2019-06-18 16:29
Modified
2019-06-18 16:29
Summary
Security update for openssl
Notes
Title of the patch
Security update for openssl
Description of the patch
This update for openssl fixes the following issues:
- CVE-2018-0732: Reject excessively large primes in DH key generation (bsc#1097158)
- CVE-2018-0734: Timing vulnerability in DSA signature generation (bsc#1113652)
- CVE-2018-0737: Cache timing vulnerability in RSA Key Generation (bsc#1089039)
- CVE-2018-5407: Elliptic curve scalar multiplication timing attack defenses (fixes 'PortSmash') (bsc#1113534)
- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)
- Fix One&Done side-channel attack on RSA (bsc#1104789)
- Reject invalid EC point coordinates (bsc#1131291)
- The 9 Lives of Bleichenbacher's CAT: Cache ATtacks on TLS Implementations (bsc#1117951)
- Add missing error string to CVE-2016-8610 fix (bsc#1110018#c9)
- blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)
Non security fixes:
- correct the error detection in the fips patch (bsc#1106197)
- Add openssl(cli) Provide so the packages that require the openssl
binary can require this instead of the new openssl meta package
(bsc#1101470)
Patchnames
SUSE-2019-1553,SUSE-SLE-SERVER-12-2019-1553
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssl", "title": "Title of the patch" }, { "category": "description", "text": "\n \nThis update for openssl fixes the following issues:\n\n- CVE-2018-0732: Reject excessively large primes in DH key generation (bsc#1097158)\n- CVE-2018-0734: Timing vulnerability in DSA signature generation (bsc#1113652)\n- CVE-2018-0737: Cache timing vulnerability in RSA Key Generation (bsc#1089039)\n- CVE-2018-5407: Elliptic curve scalar multiplication timing attack defenses (fixes \u0027PortSmash\u0027) (bsc#1113534)\n- CVE-2019-1559: Fix 0-byte record padding oracle via SSL_shutdown (bsc#1127080)\n- Fix One\u0026Done side-channel attack on RSA (bsc#1104789)\n- Reject invalid EC point coordinates (bsc#1131291)\n- The 9 Lives of Bleichenbacher\u0027s CAT: Cache ATtacks on TLS Implementations (bsc#1117951)\n- Add missing error string to CVE-2016-8610 fix (bsc#1110018#c9)\n- blinding enhancements for ECDSA and DSA (bsc#1097624, bsc#1098592)\n\nNon security fixes:\n\n- correct the error detection in the fips patch (bsc#1106197)\n- Add openssl(cli) Provide so the packages that require the openssl\n binary can require this instead of the new openssl meta package\n (bsc#1101470)\n\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-1553,SUSE-SLE-SERVER-12-2019-1553", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1553-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:1553-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191553-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:1553-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-June/005586.html" }, { "category": "self", "summary": "SUSE Bug 1089039", "url": "https://bugzilla.suse.com/1089039" }, { "category": "self", "summary": "SUSE Bug 1097158", "url": "https://bugzilla.suse.com/1097158" }, { "category": "self", "summary": "SUSE Bug 1097624", "url": "https://bugzilla.suse.com/1097624" }, { "category": "self", "summary": "SUSE Bug 1098592", "url": "https://bugzilla.suse.com/1098592" }, { "category": "self", "summary": "SUSE Bug 1101470", "url": "https://bugzilla.suse.com/1101470" }, { "category": "self", "summary": "SUSE Bug 1104789", "url": "https://bugzilla.suse.com/1104789" }, { "category": "self", "summary": "SUSE Bug 1106197", "url": "https://bugzilla.suse.com/1106197" }, { "category": "self", "summary": "SUSE Bug 1110018", "url": "https://bugzilla.suse.com/1110018" }, { "category": "self", "summary": "SUSE Bug 1113534", "url": "https://bugzilla.suse.com/1113534" }, { "category": "self", "summary": "SUSE Bug 1113652", "url": "https://bugzilla.suse.com/1113652" }, { "category": "self", "summary": "SUSE Bug 1117951", "url": "https://bugzilla.suse.com/1117951" }, { "category": "self", "summary": "SUSE Bug 1127080", "url": "https://bugzilla.suse.com/1127080" }, { "category": "self", "summary": "SUSE Bug 1131291", "url": "https://bugzilla.suse.com/1131291" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8610 page", "url": "https://www.suse.com/security/cve/CVE-2016-8610/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0732 page", "url": "https://www.suse.com/security/cve/CVE-2018-0732/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0734 page", "url": "https://www.suse.com/security/cve/CVE-2018-0734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0737 page", "url": "https://www.suse.com/security/cve/CVE-2018-0737/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5407 page", "url": "https://www.suse.com/security/cve/CVE-2018-5407/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-1559 page", "url": "https://www.suse.com/security/cve/CVE-2019-1559/" } ], "title": "Security update for openssl", "tracking": { "current_release_date": "2019-06-18T16:29:26Z", "generator": { "date": "2019-06-18T16:29:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:1553-1", "initial_release_date": "2019-06-18T16:29:26Z", "revision_history": [ { "date": "2019-06-18T16:29:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libopenssl-devel-1.0.1i-27.34.1.aarch64", "product": { "name": "libopenssl-devel-1.0.1i-27.34.1.aarch64", "product_id": "libopenssl-devel-1.0.1i-27.34.1.aarch64" } }, { "category": "product_version", "name": "libopenssl1_0_0-1.0.1i-27.34.1.aarch64", "product": { "name": "libopenssl1_0_0-1.0.1i-27.34.1.aarch64", "product_id": "libopenssl1_0_0-1.0.1i-27.34.1.aarch64" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.aarch64", "product": { "name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.aarch64", "product_id": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.aarch64" } }, { "category": "product_version", "name": "openssl-1.0.1i-27.34.1.aarch64", "product": { "name": "openssl-1.0.1i-27.34.1.aarch64", "product_id": "openssl-1.0.1i-27.34.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libopenssl-devel-64bit-1.0.1i-27.34.1.aarch64_ilp32", "product": { "name": "libopenssl-devel-64bit-1.0.1i-27.34.1.aarch64_ilp32", "product_id": "libopenssl-devel-64bit-1.0.1i-27.34.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libopenssl1_0_0-64bit-1.0.1i-27.34.1.aarch64_ilp32", "product": { "name": "libopenssl1_0_0-64bit-1.0.1i-27.34.1.aarch64_ilp32", "product_id": "libopenssl1_0_0-64bit-1.0.1i-27.34.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-64bit-1.0.1i-27.34.1.aarch64_ilp32", "product": { "name": "libopenssl1_0_0-hmac-64bit-1.0.1i-27.34.1.aarch64_ilp32", "product_id": "libopenssl1_0_0-hmac-64bit-1.0.1i-27.34.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "libopenssl-devel-1.0.1i-27.34.1.i586", "product": { "name": "libopenssl-devel-1.0.1i-27.34.1.i586", "product_id": "libopenssl-devel-1.0.1i-27.34.1.i586" } }, { "category": "product_version", "name": "libopenssl1_0_0-1.0.1i-27.34.1.i586", "product": { "name": "libopenssl1_0_0-1.0.1i-27.34.1.i586", "product_id": "libopenssl1_0_0-1.0.1i-27.34.1.i586" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.i586", "product": { "name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.i586", "product_id": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.i586" } }, { "category": "product_version", "name": "openssl-1.0.1i-27.34.1.i586", "product": { "name": "openssl-1.0.1i-27.34.1.i586", "product_id": "openssl-1.0.1i-27.34.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "openssl-doc-1.0.1i-27.34.1.noarch", "product": { "name": "openssl-doc-1.0.1i-27.34.1.noarch", "product_id": "openssl-doc-1.0.1i-27.34.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libopenssl-devel-1.0.1i-27.34.1.ppc64le", "product": { "name": "libopenssl-devel-1.0.1i-27.34.1.ppc64le", "product_id": "libopenssl-devel-1.0.1i-27.34.1.ppc64le" } }, { "category": "product_version", "name": "libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "product": { "name": "libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "product_id": "libopenssl1_0_0-1.0.1i-27.34.1.ppc64le" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "product": { "name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "product_id": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le" } }, { "category": "product_version", "name": "openssl-1.0.1i-27.34.1.ppc64le", "product": { "name": "openssl-1.0.1i-27.34.1.ppc64le", "product_id": "openssl-1.0.1i-27.34.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libopenssl-devel-1.0.1i-27.34.1.s390", "product": { "name": "libopenssl-devel-1.0.1i-27.34.1.s390", "product_id": "libopenssl-devel-1.0.1i-27.34.1.s390" } }, { "category": "product_version", "name": "libopenssl1_0_0-1.0.1i-27.34.1.s390", "product": { "name": "libopenssl1_0_0-1.0.1i-27.34.1.s390", "product_id": "libopenssl1_0_0-1.0.1i-27.34.1.s390" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390", "product": { "name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390", "product_id": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390" } }, { "category": "product_version", "name": "openssl-1.0.1i-27.34.1.s390", "product": { "name": "openssl-1.0.1i-27.34.1.s390", "product_id": "openssl-1.0.1i-27.34.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libopenssl-devel-1.0.1i-27.34.1.s390x", "product": { "name": "libopenssl-devel-1.0.1i-27.34.1.s390x", "product_id": "libopenssl-devel-1.0.1i-27.34.1.s390x" } }, { "category": "product_version", "name": "libopenssl-devel-32bit-1.0.1i-27.34.1.s390x", "product": { "name": "libopenssl-devel-32bit-1.0.1i-27.34.1.s390x", "product_id": "libopenssl-devel-32bit-1.0.1i-27.34.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_0_0-1.0.1i-27.34.1.s390x", "product": { "name": "libopenssl1_0_0-1.0.1i-27.34.1.s390x", "product_id": "libopenssl1_0_0-1.0.1i-27.34.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "product": { "name": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "product_id": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "product": { "name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "product_id": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "product": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "product_id": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x" } }, { "category": "product_version", "name": "openssl-1.0.1i-27.34.1.s390x", "product": { "name": "openssl-1.0.1i-27.34.1.s390x", "product_id": "openssl-1.0.1i-27.34.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libopenssl-devel-1.0.1i-27.34.1.x86_64", "product": { "name": "libopenssl-devel-1.0.1i-27.34.1.x86_64", "product_id": "libopenssl-devel-1.0.1i-27.34.1.x86_64" } }, { "category": "product_version", "name": "libopenssl-devel-32bit-1.0.1i-27.34.1.x86_64", "product": { "name": "libopenssl-devel-32bit-1.0.1i-27.34.1.x86_64", "product_id": "libopenssl-devel-32bit-1.0.1i-27.34.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "product": { "name": "libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "product_id": "libopenssl1_0_0-1.0.1i-27.34.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "product": { "name": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "product_id": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "product": { "name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "product_id": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "product": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "product_id": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64" } }, { "category": "product_version", "name": "openssl-1.0.1i-27.34.1.x86_64", "product": { "name": "openssl-1.0.1i-27.34.1.x86_64", "product_id": "openssl-1.0.1i-27.34.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1i-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le" }, "product_reference": "libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1i-27.34.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x" }, "product_reference": "libopenssl1_0_0-1.0.1i-27.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1i-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64" }, "product_reference": "libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x" }, "product_reference": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64" }, "product_reference": "libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le" }, "product_reference": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x" }, "product_reference": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64" }, "product_reference": "libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x" }, "product_reference": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64" }, "product_reference": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1.0.1i-27.34.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le" }, "product_reference": "openssl-1.0.1i-27.34.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1.0.1i-27.34.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x" }, "product_reference": "openssl-1.0.1i-27.34.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1.0.1i-27.34.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64" }, "product_reference": "openssl-1.0.1i-27.34.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-1.0.1i-27.34.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" }, "product_reference": "openssl-doc-1.0.1i-27.34.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8610" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8610", "url": "https://www.suse.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1005879 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005879" }, { "category": "external", "summary": "SUSE Bug 1110018 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1110018" }, { "category": "external", "summary": "SUSE Bug 1120592 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1120592" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-8610", "url": "https://bugzilla.suse.com/982575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-06-18T16:29:26Z", "details": "important" } ], "title": "CVE-2016-8610" }, { "cve": "CVE-2018-0732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0732" } ], "notes": [ { "category": "general", "text": "During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0732", "url": "https://www.suse.com/security/cve/CVE-2018-0732" }, { "category": "external", "summary": "SUSE Bug 1077628 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1077628" }, { "category": "external", "summary": "SUSE Bug 1097158 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1097158" }, { "category": "external", "summary": "SUSE Bug 1099502 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1099502" }, { "category": "external", "summary": "SUSE Bug 1106692 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1106692" }, { "category": "external", "summary": "SUSE Bug 1108542 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1108542" }, { "category": "external", "summary": "SUSE Bug 1110163 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1110163" }, { "category": "external", "summary": "SUSE Bug 1112097 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1112097" }, { "category": "external", "summary": "SUSE Bug 1122198 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1122198" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2018-0732", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-06-18T16:29:26Z", "details": "important" } ], "title": "CVE-2018-0732" }, { "cve": "CVE-2018-0734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0734" } ], "notes": [ { "category": "general", "text": "The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0734", "url": "https://www.suse.com/security/cve/CVE-2018-0734" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1113652 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113652" }, { "category": "external", "summary": "SUSE Bug 1113742 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113742" }, { "category": "external", "summary": "SUSE Bug 1122198 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1122198" }, { "category": "external", "summary": "SUSE Bug 1122212 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1122212" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-06-18T16:29:26Z", "details": "moderate" } ], "title": "CVE-2018-0734" }, { "cve": "CVE-2018-0737", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0737" } ], "notes": [ { "category": "general", "text": "The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0737", "url": "https://www.suse.com/security/cve/CVE-2018-0737" }, { "category": "external", "summary": "SUSE Bug 1089039 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1089039" }, { "category": "external", "summary": "SUSE Bug 1089041 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1089041" }, { "category": "external", "summary": "SUSE Bug 1089044 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1089044" }, { "category": "external", "summary": "SUSE Bug 1089045 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1089045" }, { "category": "external", "summary": "SUSE Bug 1108542 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1108542" }, { "category": "external", "summary": "SUSE Bug 1123780 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1123780" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1126909" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-06-18T16:29:26Z", "details": "moderate" } ], "title": "CVE-2018-0737" }, { "cve": "CVE-2018-5407", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5407" } ], "notes": [ { "category": "general", "text": "Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on \u0027port contention\u0027.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5407", "url": "https://www.suse.com/security/cve/CVE-2018-5407" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1116195 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1116195" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-06-18T16:29:26Z", "details": "moderate" } ], "title": "CVE-2018-5407" }, { "cve": "CVE-2019-1559", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-1559" } ], "notes": [ { "category": "general", "text": "If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable \"non-stitched\" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2019-1559", "url": "https://www.suse.com/security/cve/CVE-2019-1559" }, { "category": "external", "summary": "SUSE Bug 1127080 for CVE-2019-1559", "url": "https://bugzilla.suse.com/1127080" }, { "category": "external", "summary": "SUSE Bug 1130039 for CVE-2019-1559", "url": "https://bugzilla.suse.com/1130039" }, { "category": "external", "summary": "SUSE Bug 1141798 for CVE-2019-1559", "url": "https://bugzilla.suse.com/1141798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.34.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.34.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2019-06-18T16:29:26Z", "details": "low" } ], "title": "CVE-2019-1559" } ] }
suse-su-2017:0304-1
Vulnerability from csaf_suse
Published
2017-01-27 17:23
Modified
2017-01-27 17:23
Summary
Security update for gnutls
Notes
Title of the patch
Security update for gnutls
Description of the patch
This update for gnutls fixes the following issues:
- Malformed asn1 definitions could cause a segmentation fault in the asn1 definition parser (bsc#961491).
- CVE-2016-8610: Remote denial of service in SSL alert handling (bsc#1005879).
- CVE-2017-5335: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
- CVE-2017-5336: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
- CVE-2017-5337: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).
Patchnames
sdksp4-gnutls-12957,slehasp4-gnutls-12957,slessp4-gnutls-12957
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for gnutls", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for gnutls fixes the following issues:\n\n- Malformed asn1 definitions could cause a segmentation fault in the asn1 definition parser (bsc#961491).\n- CVE-2016-8610: Remote denial of service in SSL alert handling (bsc#1005879).\n- CVE-2017-5335: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).\n- CVE-2017-5336: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).\n- CVE-2017-5337: Decoding a specially crafted OpenPGP certificate could have lead to heap and stack overflows (bsc#1018832).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-gnutls-12957,slehasp4-gnutls-12957,slessp4-gnutls-12957", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0304-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0304-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170304-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0304-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-January/002604.html" }, { "category": "self", "summary": "SUSE Bug 1005879", "url": "https://bugzilla.suse.com/1005879" }, { "category": "self", "summary": "SUSE Bug 1018832", "url": "https://bugzilla.suse.com/1018832" }, { "category": "self", "summary": "SUSE Bug 961491", "url": "https://bugzilla.suse.com/961491" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8610 page", "url": "https://www.suse.com/security/cve/CVE-2016-8610/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5335 page", "url": "https://www.suse.com/security/cve/CVE-2017-5335/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5336 page", "url": "https://www.suse.com/security/cve/CVE-2017-5336/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5337 page", "url": "https://www.suse.com/security/cve/CVE-2017-5337/" } ], "title": "Security update for gnutls", "tracking": { "current_release_date": "2017-01-27T17:23:55Z", "generator": { "date": "2017-01-27T17:23:55Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0304-1", "initial_release_date": "2017-01-27T17:23:55Z", "revision_history": [ { "date": "2017-01-27T17:23:55Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libgnutls-devel-2.4.1-24.39.67.1.i586", "product": { "name": "libgnutls-devel-2.4.1-24.39.67.1.i586", "product_id": "libgnutls-devel-2.4.1-24.39.67.1.i586" } }, { "category": "product_version", "name": "libgnutls-extra-devel-2.4.1-24.39.67.1.i586", "product": { "name": "libgnutls-extra-devel-2.4.1-24.39.67.1.i586", "product_id": "libgnutls-extra-devel-2.4.1-24.39.67.1.i586" } }, { "category": "product_version", "name": "libgnutls-extra26-2.4.1-24.39.67.1.i586", "product": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.i586", "product_id": "libgnutls-extra26-2.4.1-24.39.67.1.i586" } }, { "category": "product_version", "name": "gnutls-2.4.1-24.39.67.1.i586", "product": { "name": "gnutls-2.4.1-24.39.67.1.i586", "product_id": "gnutls-2.4.1-24.39.67.1.i586" } }, { "category": "product_version", "name": "libgnutls26-2.4.1-24.39.67.1.i586", "product": { "name": "libgnutls26-2.4.1-24.39.67.1.i586", "product_id": "libgnutls26-2.4.1-24.39.67.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libgnutls-devel-2.4.1-24.39.67.1.ia64", "product": { "name": "libgnutls-devel-2.4.1-24.39.67.1.ia64", "product_id": "libgnutls-devel-2.4.1-24.39.67.1.ia64" } }, { "category": "product_version", "name": "libgnutls-extra-devel-2.4.1-24.39.67.1.ia64", "product": { "name": "libgnutls-extra-devel-2.4.1-24.39.67.1.ia64", "product_id": "libgnutls-extra-devel-2.4.1-24.39.67.1.ia64" } }, { "category": "product_version", "name": "libgnutls-extra26-2.4.1-24.39.67.1.ia64", "product": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.ia64", "product_id": "libgnutls-extra26-2.4.1-24.39.67.1.ia64" } }, { "category": "product_version", "name": "gnutls-2.4.1-24.39.67.1.ia64", "product": { "name": "gnutls-2.4.1-24.39.67.1.ia64", "product_id": "gnutls-2.4.1-24.39.67.1.ia64" } }, { "category": "product_version", "name": "libgnutls26-2.4.1-24.39.67.1.ia64", "product": { "name": "libgnutls26-2.4.1-24.39.67.1.ia64", "product_id": "libgnutls26-2.4.1-24.39.67.1.ia64" } }, { "category": "product_version", "name": "libgnutls26-x86-2.4.1-24.39.67.1.ia64", "product": { "name": "libgnutls26-x86-2.4.1-24.39.67.1.ia64", "product_id": "libgnutls26-x86-2.4.1-24.39.67.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "libgnutls-devel-2.4.1-24.39.67.1.ppc64", "product": { "name": "libgnutls-devel-2.4.1-24.39.67.1.ppc64", "product_id": "libgnutls-devel-2.4.1-24.39.67.1.ppc64" } }, { "category": "product_version", "name": "libgnutls-extra-devel-2.4.1-24.39.67.1.ppc64", "product": { "name": "libgnutls-extra-devel-2.4.1-24.39.67.1.ppc64", "product_id": "libgnutls-extra-devel-2.4.1-24.39.67.1.ppc64" } }, { "category": "product_version", "name": "libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "product": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "product_id": "libgnutls-extra26-2.4.1-24.39.67.1.ppc64" } }, { "category": "product_version", "name": "gnutls-2.4.1-24.39.67.1.ppc64", "product": { "name": "gnutls-2.4.1-24.39.67.1.ppc64", "product_id": "gnutls-2.4.1-24.39.67.1.ppc64" } }, { "category": "product_version", "name": "libgnutls26-2.4.1-24.39.67.1.ppc64", "product": { "name": "libgnutls26-2.4.1-24.39.67.1.ppc64", "product_id": "libgnutls26-2.4.1-24.39.67.1.ppc64" } }, { "category": "product_version", "name": "libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "product": { "name": "libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "product_id": "libgnutls26-32bit-2.4.1-24.39.67.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libgnutls-devel-2.4.1-24.39.67.1.s390x", "product": { "name": "libgnutls-devel-2.4.1-24.39.67.1.s390x", "product_id": "libgnutls-devel-2.4.1-24.39.67.1.s390x" } }, { "category": "product_version", "name": "libgnutls-extra-devel-2.4.1-24.39.67.1.s390x", "product": { "name": "libgnutls-extra-devel-2.4.1-24.39.67.1.s390x", "product_id": "libgnutls-extra-devel-2.4.1-24.39.67.1.s390x" } }, { "category": "product_version", "name": "libgnutls-extra26-2.4.1-24.39.67.1.s390x", "product": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.s390x", "product_id": "libgnutls-extra26-2.4.1-24.39.67.1.s390x" } }, { "category": "product_version", "name": "gnutls-2.4.1-24.39.67.1.s390x", "product": { "name": "gnutls-2.4.1-24.39.67.1.s390x", "product_id": "gnutls-2.4.1-24.39.67.1.s390x" } }, { "category": "product_version", "name": "libgnutls26-2.4.1-24.39.67.1.s390x", "product": { "name": "libgnutls26-2.4.1-24.39.67.1.s390x", "product_id": "libgnutls26-2.4.1-24.39.67.1.s390x" } }, { "category": "product_version", "name": "libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "product": { "name": "libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "product_id": "libgnutls26-32bit-2.4.1-24.39.67.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libgnutls-devel-2.4.1-24.39.67.1.x86_64", "product": { "name": "libgnutls-devel-2.4.1-24.39.67.1.x86_64", "product_id": "libgnutls-devel-2.4.1-24.39.67.1.x86_64" } }, { "category": "product_version", "name": "libgnutls-extra-devel-2.4.1-24.39.67.1.x86_64", "product": { "name": "libgnutls-extra-devel-2.4.1-24.39.67.1.x86_64", "product_id": "libgnutls-extra-devel-2.4.1-24.39.67.1.x86_64" } }, { "category": "product_version", "name": "libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "product": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "product_id": "libgnutls-extra26-2.4.1-24.39.67.1.x86_64" } }, { "category": "product_version", "name": "gnutls-2.4.1-24.39.67.1.x86_64", "product": { "name": "gnutls-2.4.1-24.39.67.1.x86_64", "product_id": "gnutls-2.4.1-24.39.67.1.x86_64" } }, { "category": "product_version", "name": "libgnutls26-2.4.1-24.39.67.1.x86_64", "product": { "name": "libgnutls26-2.4.1-24.39.67.1.x86_64", "product_id": "libgnutls26-2.4.1-24.39.67.1.x86_64" } }, { "category": "product_version", "name": "libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "product": { "name": "libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "product_id": "libgnutls26-32bit-2.4.1-24.39.67.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 11 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-hae:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-2.4.1-24.39.67.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.i586" }, "product_reference": "libgnutls-devel-2.4.1-24.39.67.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-2.4.1-24.39.67.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ia64" }, "product_reference": "libgnutls-devel-2.4.1-24.39.67.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-2.4.1-24.39.67.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ppc64" }, "product_reference": "libgnutls-devel-2.4.1-24.39.67.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-2.4.1-24.39.67.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.s390x" }, "product_reference": "libgnutls-devel-2.4.1-24.39.67.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-2.4.1-24.39.67.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.x86_64" }, "product_reference": "libgnutls-devel-2.4.1-24.39.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra-devel-2.4.1-24.39.67.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.i586" }, "product_reference": "libgnutls-extra-devel-2.4.1-24.39.67.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra-devel-2.4.1-24.39.67.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ia64" }, "product_reference": "libgnutls-extra-devel-2.4.1-24.39.67.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra-devel-2.4.1-24.39.67.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ppc64" }, "product_reference": "libgnutls-extra-devel-2.4.1-24.39.67.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra-devel-2.4.1-24.39.67.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.s390x" }, "product_reference": "libgnutls-extra-devel-2.4.1-24.39.67.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra-devel-2.4.1-24.39.67.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.x86_64" }, "product_reference": "libgnutls-extra-devel-2.4.1-24.39.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.ia64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.67.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.i586" }, "product_reference": "gnutls-2.4.1-24.39.67.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.67.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ia64" }, "product_reference": "gnutls-2.4.1-24.39.67.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.67.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64" }, "product_reference": "gnutls-2.4.1-24.39.67.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.67.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.s390x" }, "product_reference": "gnutls-2.4.1-24.39.67.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.67.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64" }, "product_reference": "gnutls-2.4.1-24.39.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.67.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586" }, "product_reference": "libgnutls26-2.4.1-24.39.67.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.67.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64" }, "product_reference": "libgnutls26-2.4.1-24.39.67.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.67.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64" }, "product_reference": "libgnutls26-2.4.1-24.39.67.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.67.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x" }, "product_reference": "libgnutls26-2.4.1-24.39.67.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.67.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64" }, "product_reference": "libgnutls26-2.4.1-24.39.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-32bit-2.4.1-24.39.67.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64" }, "product_reference": "libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-32bit-2.4.1-24.39.67.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x" }, "product_reference": "libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-32bit-2.4.1-24.39.67.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64" }, "product_reference": "libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-x86-2.4.1-24.39.67.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64" }, "product_reference": "libgnutls26-x86-2.4.1-24.39.67.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.67.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.i586" }, "product_reference": "gnutls-2.4.1-24.39.67.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.67.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ia64" }, "product_reference": "gnutls-2.4.1-24.39.67.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.67.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64" }, "product_reference": "gnutls-2.4.1-24.39.67.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.67.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.s390x" }, "product_reference": "gnutls-2.4.1-24.39.67.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-2.4.1-24.39.67.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64" }, "product_reference": "gnutls-2.4.1-24.39.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-extra26-2.4.1-24.39.67.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64" }, "product_reference": "libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.67.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586" }, "product_reference": "libgnutls26-2.4.1-24.39.67.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.67.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64" }, "product_reference": "libgnutls26-2.4.1-24.39.67.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.67.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64" }, "product_reference": "libgnutls26-2.4.1-24.39.67.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.67.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x" }, "product_reference": "libgnutls26-2.4.1-24.39.67.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-2.4.1-24.39.67.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64" }, "product_reference": "libgnutls26-2.4.1-24.39.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-32bit-2.4.1-24.39.67.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64" }, "product_reference": "libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-32bit-2.4.1-24.39.67.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x" }, "product_reference": "libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-32bit-2.4.1-24.39.67.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64" }, "product_reference": "libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls26-x86-2.4.1-24.39.67.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64" }, "product_reference": "libgnutls26-x86-2.4.1-24.39.67.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8610" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8610", "url": "https://www.suse.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1005879 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005879" }, { "category": "external", "summary": "SUSE Bug 1110018 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1110018" }, { "category": "external", "summary": "SUSE Bug 1120592 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1120592" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-8610", "url": "https://bugzilla.suse.com/982575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-27T17:23:55Z", "details": "important" } ], "title": "CVE-2016-8610" }, { "cve": "CVE-2017-5335", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5335" } ], "notes": [ { "category": "general", "text": "The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5335", "url": "https://www.suse.com/security/cve/CVE-2017-5335" }, { "category": "external", "summary": "SUSE Bug 1018832 for CVE-2017-5335", "url": "https://bugzilla.suse.com/1018832" }, { "category": "external", "summary": "SUSE Bug 1021057 for CVE-2017-5335", "url": "https://bugzilla.suse.com/1021057" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-27T17:23:55Z", "details": "moderate" } ], "title": "CVE-2017-5335" }, { "cve": "CVE-2017-5336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5336" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5336", "url": "https://www.suse.com/security/cve/CVE-2017-5336" }, { "category": "external", "summary": "SUSE Bug 1018832 for CVE-2017-5336", "url": "https://bugzilla.suse.com/1018832" }, { "category": "external", "summary": "SUSE Bug 1021057 for CVE-2017-5336", "url": "https://bugzilla.suse.com/1021057" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-27T17:23:55Z", "details": "moderate" } ], "title": "CVE-2017-5336" }, { "cve": "CVE-2017-5337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5337" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5337", "url": "https://www.suse.com/security/cve/CVE-2017-5337" }, { "category": "external", "summary": "SUSE Bug 1018832 for CVE-2017-5337", "url": "https://bugzilla.suse.com/1018832" }, { "category": "external", "summary": "SUSE Bug 1021057 for CVE-2017-5337", "url": "https://bugzilla.suse.com/1021057" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise High Availability Extension 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:gnutls-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-32bit-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libgnutls26-x86-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra-devel-2.4.1-24.39.67.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libgnutls-extra26-2.4.1-24.39.67.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-27T17:23:55Z", "details": "moderate" } ], "title": "CVE-2017-5337" } ] }
suse-su-2018:3864-1
Vulnerability from csaf_suse
Published
2018-11-22 15:26
Modified
2018-11-22 15:26
Summary
Security update for openssl
Notes
Title of the patch
Security update for openssl
Description of the patch
This update for openssl fixes the following issues:
Security issues fixed:
- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2018-0737: Corrected the current error detection of the current fix (bsc#1106197).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Add missing timing side channel patch for DSA signature generation (bsc#1113742).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
Non-security issues fixed:
- Added openssl(cli) so that the packages that required the openssl binary can require this instead of the new openssl meta package (bsc#1101470).
Patchnames
SUSE-SLE-SERVER-12-SP1-2018-2762
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssl", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssl fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).\n- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).\n- CVE-2018-0737: Corrected the current error detection of the current fix (bsc#1106197). \n- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).\n- Add missing timing side channel patch for DSA signature generation (bsc#1113742).\n- Fixed the \u0027One and Done\u0027 side-channel attack on RSA (bsc#1104789).\n\nNon-security issues fixed:\n\n- Added openssl(cli) so that the packages that required the openssl binary can require this instead of the new openssl meta package (bsc#1101470).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-SP1-2018-2762", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3864-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3864-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183864-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3864-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-November/004873.html" }, { "category": "self", "summary": "SUSE Bug 1101470", "url": "https://bugzilla.suse.com/1101470" }, { "category": "self", "summary": "SUSE Bug 1104789", "url": "https://bugzilla.suse.com/1104789" }, { "category": "self", "summary": "SUSE Bug 1106197", "url": "https://bugzilla.suse.com/1106197" }, { "category": "self", "summary": "SUSE Bug 1110018", "url": "https://bugzilla.suse.com/1110018" }, { "category": "self", "summary": "SUSE Bug 1113534", "url": "https://bugzilla.suse.com/1113534" }, { "category": "self", "summary": "SUSE Bug 1113652", "url": "https://bugzilla.suse.com/1113652" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8610 page", "url": "https://www.suse.com/security/cve/CVE-2016-8610/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0734 page", "url": "https://www.suse.com/security/cve/CVE-2018-0734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0737 page", "url": "https://www.suse.com/security/cve/CVE-2018-0737/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5407 page", "url": "https://www.suse.com/security/cve/CVE-2018-5407/" } ], "title": "Security update for openssl", "tracking": { "current_release_date": "2018-11-22T15:26:23Z", "generator": { "date": "2018-11-22T15:26:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3864-1", "initial_release_date": "2018-11-22T15:26:23Z", "revision_history": [ { "date": "2018-11-22T15:26:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssl-doc-1.0.1i-54.20.1.noarch", "product": { "name": "openssl-doc-1.0.1i-54.20.1.noarch", "product_id": "openssl-doc-1.0.1i-54.20.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libopenssl1_0_0-1.0.1i-54.20.1.ppc64le", "product": { "name": "libopenssl1_0_0-1.0.1i-54.20.1.ppc64le", "product_id": "libopenssl1_0_0-1.0.1i-54.20.1.ppc64le" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.ppc64le", "product": { "name": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.ppc64le", "product_id": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.ppc64le" } }, { "category": "product_version", "name": "openssl-1.0.1i-54.20.1.ppc64le", "product": { "name": "openssl-1.0.1i-54.20.1.ppc64le", "product_id": "openssl-1.0.1i-54.20.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libopenssl1_0_0-1.0.1i-54.20.1.s390x", "product": { "name": "libopenssl1_0_0-1.0.1i-54.20.1.s390x", "product_id": "libopenssl1_0_0-1.0.1i-54.20.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_0_0-32bit-1.0.1i-54.20.1.s390x", "product": { "name": "libopenssl1_0_0-32bit-1.0.1i-54.20.1.s390x", "product_id": "libopenssl1_0_0-32bit-1.0.1i-54.20.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.s390x", "product": { "name": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.s390x", "product_id": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.s390x", "product": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.s390x", "product_id": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.s390x" } }, { "category": "product_version", "name": "openssl-1.0.1i-54.20.1.s390x", "product": { "name": "openssl-1.0.1i-54.20.1.s390x", "product_id": "openssl-1.0.1i-54.20.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "product": { "name": "libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "product_id": "libopenssl1_0_0-1.0.1i-54.20.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "product": { "name": "libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "product_id": "libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "product": { "name": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "product_id": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "product": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "product_id": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64" } }, { "category": "product_version", "name": "openssl-1.0.1i-54.20.1.x86_64", "product": { "name": "openssl-1.0.1i-54.20.1.x86_64", "product_id": "openssl-1.0.1i-54.20.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1i-54.20.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.ppc64le" }, "product_reference": "libopenssl1_0_0-1.0.1i-54.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1i-54.20.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.s390x" }, "product_reference": "libopenssl1_0_0-1.0.1i-54.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1i-54.20.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.x86_64" }, "product_reference": "libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-32bit-1.0.1i-54.20.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.s390x" }, "product_reference": "libopenssl1_0_0-32bit-1.0.1i-54.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64" }, "product_reference": "libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.ppc64le" }, "product_reference": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.s390x" }, "product_reference": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64" }, "product_reference": "libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.s390x" }, "product_reference": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64" }, "product_reference": "libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1.0.1i-54.20.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.ppc64le" }, "product_reference": "openssl-1.0.1i-54.20.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1.0.1i-54.20.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.s390x" }, "product_reference": "openssl-1.0.1i-54.20.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1.0.1i-54.20.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.x86_64" }, "product_reference": "openssl-1.0.1i-54.20.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-1.0.1i-54.20.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-doc-1.0.1i-54.20.1.noarch" }, "product_reference": "openssl-doc-1.0.1i-54.20.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8610" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-doc-1.0.1i-54.20.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8610", "url": "https://www.suse.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1005879 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005879" }, { "category": "external", "summary": "SUSE Bug 1110018 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1110018" }, { "category": "external", "summary": "SUSE Bug 1120592 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1120592" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-8610", "url": "https://bugzilla.suse.com/982575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-doc-1.0.1i-54.20.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-doc-1.0.1i-54.20.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-11-22T15:26:23Z", "details": "important" } ], "title": "CVE-2016-8610" }, { "cve": "CVE-2018-0734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0734" } ], "notes": [ { "category": "general", "text": "The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-doc-1.0.1i-54.20.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0734", "url": "https://www.suse.com/security/cve/CVE-2018-0734" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1113652 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113652" }, { "category": "external", "summary": "SUSE Bug 1113742 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113742" }, { "category": "external", "summary": "SUSE Bug 1122198 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1122198" }, { "category": "external", "summary": "SUSE Bug 1122212 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1122212" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-doc-1.0.1i-54.20.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-doc-1.0.1i-54.20.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-11-22T15:26:23Z", "details": "moderate" } ], "title": "CVE-2018-0734" }, { "cve": "CVE-2018-0737", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0737" } ], "notes": [ { "category": "general", "text": "The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-doc-1.0.1i-54.20.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0737", "url": "https://www.suse.com/security/cve/CVE-2018-0737" }, { "category": "external", "summary": "SUSE Bug 1089039 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1089039" }, { "category": "external", "summary": "SUSE Bug 1089041 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1089041" }, { "category": "external", "summary": "SUSE Bug 1089044 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1089044" }, { "category": "external", "summary": "SUSE Bug 1089045 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1089045" }, { "category": "external", "summary": "SUSE Bug 1108542 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1108542" }, { "category": "external", "summary": "SUSE Bug 1123780 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1123780" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2018-0737", "url": "https://bugzilla.suse.com/1126909" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-doc-1.0.1i-54.20.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-doc-1.0.1i-54.20.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-11-22T15:26:23Z", "details": "moderate" } ], "title": "CVE-2018-0737" }, { "cve": "CVE-2018-5407", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5407" } ], "notes": [ { "category": "general", "text": "Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on \u0027port contention\u0027.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-doc-1.0.1i-54.20.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5407", "url": "https://www.suse.com/security/cve/CVE-2018-5407" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1116195 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1116195" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-doc-1.0.1i-54.20.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-1.0.1i-54.20.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:openssl-doc-1.0.1i-54.20.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-11-22T15:26:23Z", "details": "moderate" } ], "title": "CVE-2018-5407" } ] }
suse-su-2017:0605-1
Vulnerability from csaf_suse
Published
2017-03-03 16:46
Modified
2017-03-03 16:46
Summary
Security update for compat-openssl098
Notes
Title of the patch
Security update for compat-openssl098
Description of the patch
This update for compat-openssl098 fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)
Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)
Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- don't attempt session resumption if no ticket is present and session
ID length is zero (bsc#984663)
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2017-319,SUSE-SLE-DESKTOP-12-SP2-2017-319,SUSE-SLE-Module-Legacy-12-2017-319,SUSE-SLE-SAP-12-SP1-2017-319,SUSE-SLE-SAP-12-SP2-2017-319
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for compat-openssl098", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for compat-openssl098 fixes the following issues contained in the\nOpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)\n\nSecurity issues fixed:\n- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)\n- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)\n- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)\n- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)\n\nBugs fixed:\n- fix crash in openssl speed (bsc#1000677)\n- don\u0027t attempt session resumption if no ticket is present and session\n ID length is zero (bsc#984663)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2017-319,SUSE-SLE-DESKTOP-12-SP2-2017-319,SUSE-SLE-Module-Legacy-12-2017-319,SUSE-SLE-SAP-12-SP1-2017-319,SUSE-SLE-SAP-12-SP2-2017-319", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0605-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0605-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170605-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0605-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-March/002678.html" }, { "category": "self", "summary": "SUSE Bug 1000677", "url": "https://bugzilla.suse.com/1000677" }, { "category": "self", "summary": "SUSE Bug 1001912", "url": "https://bugzilla.suse.com/1001912" }, { "category": "self", "summary": "SUSE Bug 1004499", "url": "https://bugzilla.suse.com/1004499" }, { "category": "self", "summary": "SUSE Bug 1005878", "url": "https://bugzilla.suse.com/1005878" }, { "category": "self", "summary": "SUSE Bug 1019334", "url": "https://bugzilla.suse.com/1019334" }, { "category": "self", "summary": "SUSE Bug 1021641", "url": "https://bugzilla.suse.com/1021641" }, { "category": "self", "summary": "SUSE Bug 984663", "url": "https://bugzilla.suse.com/984663" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2108 page", "url": "https://www.suse.com/security/cve/CVE-2016-2108/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7056 page", "url": "https://www.suse.com/security/cve/CVE-2016-7056/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8610 page", "url": "https://www.suse.com/security/cve/CVE-2016-8610/" } ], "title": "Security update for compat-openssl098", "tracking": { "current_release_date": "2017-03-03T16:46:55Z", "generator": { "date": "2017-03-03T16:46:55Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0605-1", "initial_release_date": "2017-03-03T16:46:55Z", "revision_history": [ { "date": "2017-03-03T16:46:55Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libopenssl0_9_8-0.9.8j-105.1.s390x", "product": { "name": "libopenssl0_9_8-0.9.8j-105.1.s390x", "product_id": "libopenssl0_9_8-0.9.8j-105.1.s390x" } }, { "category": "product_version", "name": "libopenssl0_9_8-32bit-0.9.8j-105.1.s390x", "product": { "name": "libopenssl0_9_8-32bit-0.9.8j-105.1.s390x", "product_id": "libopenssl0_9_8-32bit-0.9.8j-105.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libopenssl0_9_8-0.9.8j-105.1.x86_64", "product": { "name": "libopenssl0_9_8-0.9.8j-105.1.x86_64", "product_id": "libopenssl0_9_8-0.9.8j-105.1.x86_64" } }, { "category": "product_version", "name": "libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "product": { "name": "libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "product_id": "libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP2", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 12", "product": { "name": "SUSE Linux Enterprise Module for Legacy 12", "product_id": "SUSE Linux Enterprise Module for Legacy 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-105.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-105.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-105.1.s390x as component of SUSE Linux Enterprise Module for Legacy 12", "product_id": "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.s390x" }, "product_reference": "libopenssl0_9_8-0.9.8j-105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 12" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-105.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 12", "product_id": "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 12" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-105.1.s390x as component of SUSE Linux Enterprise Module for Legacy 12", "product_id": "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.s390x" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 12" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 12", "product_id": "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 12" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-105.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-105.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2108", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2108" } ], "notes": [ { "category": "general", "text": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2108", "url": "https://www.suse.com/security/cve/CVE-2016-2108" }, { "category": "external", "summary": "SUSE Bug 1001502 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1001502" }, { "category": "external", "summary": "SUSE Bug 1004499 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1004499" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 977584 for CVE-2016-2108", "url": "https://bugzilla.suse.com/977584" }, { "category": "external", "summary": "SUSE Bug 977617 for CVE-2016-2108", "url": "https://bugzilla.suse.com/977617" }, { "category": "external", "summary": "SUSE Bug 978492 for CVE-2016-2108", "url": "https://bugzilla.suse.com/978492" }, { "category": "external", "summary": "SUSE Bug 989345 for CVE-2016-2108", "url": "https://bugzilla.suse.com/989345" }, { "category": "external", "summary": "SUSE Bug 996067 for CVE-2016-2108", "url": "https://bugzilla.suse.com/996067" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-03-03T16:46:55Z", "details": "important" } ], "title": "CVE-2016-2108" }, { "cve": "CVE-2016-7056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7056" } ], "notes": [ { "category": "general", "text": "A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7056", "url": "https://www.suse.com/security/cve/CVE-2016-7056" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1019334 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1019334" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-03-03T16:46:55Z", "details": "moderate" } ], "title": "CVE-2016-7056" }, { "cve": "CVE-2016-8610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8610" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8610", "url": "https://www.suse.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1005879 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005879" }, { "category": "external", "summary": "SUSE Bug 1110018 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1110018" }, { "category": "external", "summary": "SUSE Bug 1120592 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1120592" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-8610", "url": "https://bugzilla.suse.com/982575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-105.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-03-03T16:46:55Z", "details": "important" } ], "title": "CVE-2016-8610" } ] }
suse-su-2017:0585-1
Vulnerability from csaf_suse
Published
2017-03-01 15:52
Modified
2017-03-01 15:52
Summary
Security update for openssl
Notes
Title of the patch
Security update for openssl
Description of the patch
This update for openssl fixes the following issues contained in the
OpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)
Security issues fixed:
- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)
- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)
- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)
- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)
Bugs fixed:
- fix crash in openssl speed (bsc#1000677)
- don't attempt session resumption if no ticket is present and session
ID length is zero (bsc#984663)
Patchnames
sdksp4-openssl-12999,sleclo50sp3-openssl-12999,sleman21-openssl-12999,slemap21-openssl-12999,sleposp3-openssl-12999,slessp3-openssl-12999,slessp4-openssl-12999,slestso13-openssl-12999
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssl", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for openssl fixes the following issues contained in the\nOpenSSL Security Advisory [26 Jan 2017] (bsc#1021641)\n\nSecurity issues fixed:\n- CVE-2016-7056: A local ECSDA P-256 timing attack that might have allowed key recovery was fixed (bsc#1019334)\n- CVE-2016-8610: A remote denial of service in SSL alert handling was fixed (bsc#1005878)\n- degrade 3DES to MEDIUM in SSL2 (bsc#1001912)\n- CVE-2016-2108: Added a missing commit for CVE-2016-2108, fixing the negative zero handling in the ASN.1 decoder (bsc#1004499)\n\nBugs fixed:\n- fix crash in openssl speed (bsc#1000677)\n- don\u0027t attempt session resumption if no ticket is present and session\n ID length is zero (bsc#984663)\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-openssl-12999,sleclo50sp3-openssl-12999,sleman21-openssl-12999,slemap21-openssl-12999,sleposp3-openssl-12999,slessp3-openssl-12999,slessp4-openssl-12999,slestso13-openssl-12999", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0585-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0585-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170585-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0585-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-March/002670.html" }, { "category": "self", "summary": "SUSE Bug 1000677", "url": "https://bugzilla.suse.com/1000677" }, { "category": "self", "summary": "SUSE Bug 1001912", "url": "https://bugzilla.suse.com/1001912" }, { "category": "self", "summary": "SUSE Bug 1004499", "url": "https://bugzilla.suse.com/1004499" }, { "category": "self", "summary": "SUSE Bug 1005878", "url": "https://bugzilla.suse.com/1005878" }, { "category": "self", "summary": "SUSE Bug 1019334", "url": "https://bugzilla.suse.com/1019334" }, { "category": "self", "summary": "SUSE Bug 1021641", "url": "https://bugzilla.suse.com/1021641" }, { "category": "self", "summary": "SUSE Bug 984663", "url": "https://bugzilla.suse.com/984663" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2108 page", "url": "https://www.suse.com/security/cve/CVE-2016-2108/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7056 page", "url": "https://www.suse.com/security/cve/CVE-2016-7056/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8610 page", "url": "https://www.suse.com/security/cve/CVE-2016-8610/" } ], "title": "Security update for openssl", "tracking": { "current_release_date": "2017-03-01T15:52:58Z", "generator": { "date": "2017-03-01T15:52:58Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0585-1", "initial_release_date": "2017-03-01T15:52:58Z", "revision_history": [ { "date": "2017-03-01T15:52:58Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libopenssl-devel-0.9.8j-0.105.1.i586", "product": { "name": "libopenssl-devel-0.9.8j-0.105.1.i586", "product_id": "libopenssl-devel-0.9.8j-0.105.1.i586" } }, { "category": "product_version", "name": "libopenssl0_9_8-0.9.8j-0.105.1.i586", "product": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.i586", "product_id": "libopenssl0_9_8-0.9.8j-0.105.1.i586" } }, { "category": "product_version", "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "product": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "product_id": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586" } }, { "category": "product_version", "name": "openssl-0.9.8j-0.105.1.i586", "product": { "name": "openssl-0.9.8j-0.105.1.i586", "product_id": "openssl-0.9.8j-0.105.1.i586" } }, { "category": "product_version", "name": "openssl-doc-0.9.8j-0.105.1.i586", "product": { "name": "openssl-doc-0.9.8j-0.105.1.i586", "product_id": "openssl-doc-0.9.8j-0.105.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libopenssl-devel-0.9.8j-0.105.1.ia64", "product": { "name": "libopenssl-devel-0.9.8j-0.105.1.ia64", "product_id": "libopenssl-devel-0.9.8j-0.105.1.ia64" } }, { "category": "product_version", "name": "libopenssl0_9_8-0.9.8j-0.105.1.ia64", "product": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.ia64", "product_id": "libopenssl0_9_8-0.9.8j-0.105.1.ia64" } }, { "category": "product_version", "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "product": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "product_id": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64" } }, { "category": "product_version", "name": "libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "product": { "name": "libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "product_id": "libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64" } }, { "category": "product_version", "name": "openssl-0.9.8j-0.105.1.ia64", "product": { "name": "openssl-0.9.8j-0.105.1.ia64", "product_id": "openssl-0.9.8j-0.105.1.ia64" } }, { "category": "product_version", "name": "openssl-doc-0.9.8j-0.105.1.ia64", "product": { "name": "openssl-doc-0.9.8j-0.105.1.ia64", "product_id": "openssl-doc-0.9.8j-0.105.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "libopenssl-devel-0.9.8j-0.105.1.ppc64", "product": { "name": "libopenssl-devel-0.9.8j-0.105.1.ppc64", "product_id": "libopenssl-devel-0.9.8j-0.105.1.ppc64" } }, { "category": "product_version", "name": "libopenssl-devel-32bit-0.9.8j-0.105.1.ppc64", "product": { "name": "libopenssl-devel-32bit-0.9.8j-0.105.1.ppc64", "product_id": "libopenssl-devel-32bit-0.9.8j-0.105.1.ppc64" } }, { "category": "product_version", "name": "libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "product": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "product_id": "libopenssl0_9_8-0.9.8j-0.105.1.ppc64" } }, { "category": "product_version", "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "product": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "product_id": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64" } }, { "category": "product_version", "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "product": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "product_id": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64" } }, { "category": "product_version", "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "product": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "product_id": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64" } }, { "category": "product_version", "name": "openssl-0.9.8j-0.105.1.ppc64", "product": { "name": "openssl-0.9.8j-0.105.1.ppc64", "product_id": "openssl-0.9.8j-0.105.1.ppc64" } }, { "category": "product_version", "name": "openssl-doc-0.9.8j-0.105.1.ppc64", "product": { "name": "openssl-doc-0.9.8j-0.105.1.ppc64", "product_id": "openssl-doc-0.9.8j-0.105.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libopenssl-devel-0.9.8j-0.105.1.s390x", "product": { "name": "libopenssl-devel-0.9.8j-0.105.1.s390x", "product_id": "libopenssl-devel-0.9.8j-0.105.1.s390x" } }, { "category": "product_version", "name": "libopenssl-devel-32bit-0.9.8j-0.105.1.s390x", "product": { "name": "libopenssl-devel-32bit-0.9.8j-0.105.1.s390x", "product_id": "libopenssl-devel-32bit-0.9.8j-0.105.1.s390x" } }, { "category": "product_version", "name": "libopenssl0_9_8-0.9.8j-0.105.1.s390x", "product": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.s390x", "product_id": "libopenssl0_9_8-0.9.8j-0.105.1.s390x" } }, { "category": "product_version", "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "product": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "product_id": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x" } }, { "category": "product_version", "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "product": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "product_id": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x" } }, { "category": "product_version", "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "product": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "product_id": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x" } }, { "category": "product_version", "name": "openssl-0.9.8j-0.105.1.s390x", "product": { "name": "openssl-0.9.8j-0.105.1.s390x", "product_id": "openssl-0.9.8j-0.105.1.s390x" } }, { "category": "product_version", "name": "openssl-doc-0.9.8j-0.105.1.s390x", "product": { "name": "openssl-doc-0.9.8j-0.105.1.s390x", "product_id": "openssl-doc-0.9.8j-0.105.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libopenssl-devel-0.9.8j-0.105.1.x86_64", "product": { "name": "libopenssl-devel-0.9.8j-0.105.1.x86_64", "product_id": "libopenssl-devel-0.9.8j-0.105.1.x86_64" } }, { "category": "product_version", "name": "libopenssl-devel-32bit-0.9.8j-0.105.1.x86_64", "product": { "name": "libopenssl-devel-32bit-0.9.8j-0.105.1.x86_64", "product_id": "libopenssl-devel-32bit-0.9.8j-0.105.1.x86_64" } }, { "category": "product_version", "name": "libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "product": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "product_id": "libopenssl0_9_8-0.9.8j-0.105.1.x86_64" } }, { "category": "product_version", "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "product": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "product_id": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64" } }, { "category": "product_version", "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "product": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "product_id": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64" } }, { "category": "product_version", "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "product": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "product_id": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64" } }, { "category": "product_version", "name": "openssl-0.9.8j-0.105.1.x86_64", "product": { "name": "openssl-0.9.8j-0.105.1.x86_64", "product_id": "openssl-0.9.8j-0.105.1.x86_64" } }, { "category": "product_version", "name": "openssl-doc-0.9.8j-0.105.1.x86_64", "product": { "name": "openssl-doc-0.9.8j-0.105.1.x86_64", "product_id": "openssl-doc-0.9.8j-0.105.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 5", "product": { "name": "SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5", "product_identification_helper": { "cpe": "cpe:/o:suse:cloud:5" } } }, { "category": "product_name", "name": "SUSE Manager 2.1", "product": { "name": "SUSE Manager 2.1", "product_id": "SUSE Manager 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:2.1" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 2.1", "product": { "name": "SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:2.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } }, { "category": "product_name", "name": "SUSE Studio Onsite 1.3", "product": { "name": "SUSE Studio Onsite 1.3", "product_id": "SUSE Studio Onsite 1.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-studioonsite:1.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.i586" }, "product_reference": "libopenssl-devel-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.105.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ia64" }, "product_reference": "libopenssl-devel-0.9.8j-0.105.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.105.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ppc64" }, "product_reference": "libopenssl-devel-0.9.8j-0.105.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl-devel-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl-devel-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-32bit-0.9.8j-0.105.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.ppc64" }, "product_reference": "libopenssl-devel-32bit-0.9.8j-0.105.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-32bit-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl-devel-32bit-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-32bit-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl-devel-32bit-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.105.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:libopenssl-devel-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl-devel-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:libopenssl0_9_8-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:openssl-0.9.8j-0.105.1.x86_64" }, "product_reference": "openssl-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:openssl-doc-0.9.8j-0.105.1.x86_64" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.105.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl-devel-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.105.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl-devel-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.s390x" }, "product_reference": "openssl-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.x86_64" }, "product_reference": "openssl-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.s390x" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.x86_64" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.105.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl-devel-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:openssl-0.9.8j-0.105.1.x86_64" }, "product_reference": "openssl-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:openssl-doc-0.9.8j-0.105.1.x86_64" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.105.1.i586" }, "product_reference": "libopenssl-devel-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.105.1.i586" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.105.1.i586" }, "product_reference": "openssl-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.105.1.i586" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.i586" }, "product_reference": "libopenssl-devel-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl-devel-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl-devel-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.i586" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.i586" }, "product_reference": "openssl-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.s390x" }, "product_reference": "openssl-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.x86_64" }, "product_reference": "openssl-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.i586" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.s390x" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.x86_64" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.i586" }, "product_reference": "libopenssl-devel-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl-devel-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl-devel-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.i586" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.i586" }, "product_reference": "openssl-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.s390x" }, "product_reference": "openssl-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.x86_64" }, "product_reference": "openssl-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.i586" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.s390x" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.x86_64" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64" }, "product_reference": "libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.i586" }, "product_reference": "openssl-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ia64" }, "product_reference": "openssl-0.9.8j-0.105.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ppc64" }, "product_reference": "openssl-0.9.8j-0.105.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.s390x" }, "product_reference": "openssl-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.x86_64" }, "product_reference": "openssl-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.i586" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64" }, "product_reference": "libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.i586" }, "product_reference": "openssl-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ia64" }, "product_reference": "openssl-0.9.8j-0.105.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ppc64" }, "product_reference": "openssl-0.9.8j-0.105.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.s390x" }, "product_reference": "openssl-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.x86_64" }, "product_reference": "openssl-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.i586" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.105.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64" }, "product_reference": "openssl-doc-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.105.1.x86_64 as component of SUSE Studio Onsite 1.3", "product_id": "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.105.1.x86_64" }, "product_reference": "libopenssl-devel-0.9.8j-0.105.1.x86_64", "relates_to_product_reference": "SUSE Studio Onsite 1.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2108", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2108" } ], "notes": [ { "category": "general", "text": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:openssl-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:openssl-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.105.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2108", "url": "https://www.suse.com/security/cve/CVE-2016-2108" }, { "category": "external", "summary": "SUSE Bug 1001502 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1001502" }, { "category": "external", "summary": "SUSE Bug 1004499 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1004499" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 977584 for CVE-2016-2108", "url": "https://bugzilla.suse.com/977584" }, { "category": "external", "summary": "SUSE Bug 977617 for CVE-2016-2108", "url": "https://bugzilla.suse.com/977617" }, { "category": "external", "summary": "SUSE Bug 978492 for CVE-2016-2108", "url": "https://bugzilla.suse.com/978492" }, { "category": "external", "summary": "SUSE Bug 989345 for CVE-2016-2108", "url": "https://bugzilla.suse.com/989345" }, { "category": "external", "summary": "SUSE Bug 996067 for CVE-2016-2108", "url": "https://bugzilla.suse.com/996067" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:openssl-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:openssl-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.105.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:openssl-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:openssl-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.105.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-03-01T15:52:58Z", "details": "important" } ], "title": "CVE-2016-2108" }, { "cve": "CVE-2016-7056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7056" } ], "notes": [ { "category": "general", "text": "A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:openssl-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:openssl-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.105.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7056", "url": "https://www.suse.com/security/cve/CVE-2016-7056" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1019334 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1019334" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:openssl-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:openssl-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.105.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:openssl-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:openssl-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.105.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-03-01T15:52:58Z", "details": "moderate" } ], "title": "CVE-2016-7056" }, { "cve": "CVE-2016-8610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8610" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:openssl-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:openssl-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.105.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8610", "url": "https://www.suse.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1005879 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005879" }, { "category": "external", "summary": "SUSE Bug 1110018 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1110018" }, { "category": "external", "summary": "SUSE Bug 1120592 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1120592" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-8610", "url": "https://bugzilla.suse.com/982575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:openssl-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:openssl-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.105.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:openssl-0.9.8j-0.105.1.x86_64", "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.s390x", "SUSE Manager 2.1:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:openssl-0.9.8j-0.105.1.x86_64", "SUSE Manager Proxy 2.1:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl-devel-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-32bit-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:libopenssl0_9_8-hmac-32bit-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:openssl-0.9.8j-0.105.1.x86_64", "SUSE OpenStack Cloud 5:openssl-doc-0.9.8j-0.105.1.x86_64", "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.105.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-03-01T15:52:58Z", "details": "important" } ], "title": "CVE-2016-8610" } ] }
suse-su-2018:4274-1
Vulnerability from csaf_suse
Published
2018-12-27 08:06
Modified
2018-12-27 08:06
Summary
Security update for openssl
Notes
Title of the patch
Security update for openssl
Description of the patch
This update for openssl fixes the following issues:
Security issues fixed:
- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
Patchnames
sdksp4-openssl-13918,sleposp3-openssl-13918,slessp3-openssl-13918,slessp4-openssl-13918,slestso13-openssl-13918
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssl", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssl fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).\n- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).\n- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).\n- Fixed the \u0027One and Done\u0027 side-channel attack on RSA (bsc#1104789).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-openssl-13918,sleposp3-openssl-13918,slessp3-openssl-13918,slessp4-openssl-13918,slestso13-openssl-13918", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_4274-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:4274-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20184274-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:4274-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-December/005002.html" }, { "category": "self", "summary": "SUSE Bug 1104789", "url": "https://bugzilla.suse.com/1104789" }, { "category": "self", "summary": "SUSE Bug 1110018", "url": "https://bugzilla.suse.com/1110018" }, { "category": "self", "summary": "SUSE Bug 1113534", "url": "https://bugzilla.suse.com/1113534" }, { "category": "self", "summary": "SUSE Bug 1113652", "url": "https://bugzilla.suse.com/1113652" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8610 page", "url": "https://www.suse.com/security/cve/CVE-2016-8610/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0734 page", "url": "https://www.suse.com/security/cve/CVE-2018-0734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5407 page", "url": "https://www.suse.com/security/cve/CVE-2018-5407/" } ], "title": "Security update for openssl", "tracking": { "current_release_date": "2018-12-27T08:06:44Z", "generator": { "date": "2018-12-27T08:06:44Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:4274-1", "initial_release_date": "2018-12-27T08:06:44Z", "revision_history": [ { "date": "2018-12-27T08:06:44Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libopenssl-devel-0.9.8j-0.106.18.1.i586", "product": { "name": "libopenssl-devel-0.9.8j-0.106.18.1.i586", "product_id": "libopenssl-devel-0.9.8j-0.106.18.1.i586" } }, { "category": "product_version", "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "product": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "product_id": "libopenssl0_9_8-0.9.8j-0.106.18.1.i586" } }, { "category": "product_version", "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "product": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "product_id": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586" } }, { "category": "product_version", "name": "openssl-0.9.8j-0.106.18.1.i586", "product": { "name": "openssl-0.9.8j-0.106.18.1.i586", "product_id": "openssl-0.9.8j-0.106.18.1.i586" } }, { "category": "product_version", "name": "openssl-doc-0.9.8j-0.106.18.1.i586", "product": { "name": "openssl-doc-0.9.8j-0.106.18.1.i586", "product_id": "openssl-doc-0.9.8j-0.106.18.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libopenssl-devel-0.9.8j-0.106.18.1.ia64", "product": { "name": "libopenssl-devel-0.9.8j-0.106.18.1.ia64", "product_id": "libopenssl-devel-0.9.8j-0.106.18.1.ia64" } }, { "category": "product_version", "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "product": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "product_id": "libopenssl0_9_8-0.9.8j-0.106.18.1.ia64" } }, { "category": "product_version", "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "product": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "product_id": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64" } }, { "category": "product_version", "name": "libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "product": { "name": "libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "product_id": "libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64" } }, { "category": "product_version", "name": "openssl-0.9.8j-0.106.18.1.ia64", "product": { "name": "openssl-0.9.8j-0.106.18.1.ia64", "product_id": "openssl-0.9.8j-0.106.18.1.ia64" } }, { "category": "product_version", "name": "openssl-doc-0.9.8j-0.106.18.1.ia64", "product": { "name": "openssl-doc-0.9.8j-0.106.18.1.ia64", "product_id": "openssl-doc-0.9.8j-0.106.18.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "libopenssl-devel-0.9.8j-0.106.18.1.ppc64", "product": { "name": "libopenssl-devel-0.9.8j-0.106.18.1.ppc64", "product_id": "libopenssl-devel-0.9.8j-0.106.18.1.ppc64" } }, { "category": "product_version", "name": "libopenssl-devel-32bit-0.9.8j-0.106.18.1.ppc64", "product": { "name": "libopenssl-devel-32bit-0.9.8j-0.106.18.1.ppc64", "product_id": "libopenssl-devel-32bit-0.9.8j-0.106.18.1.ppc64" } }, { "category": "product_version", "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "product": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "product_id": "libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64" } }, { "category": "product_version", "name": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "product": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "product_id": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64" } }, { "category": "product_version", "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "product": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "product_id": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64" } }, { "category": "product_version", "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "product": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "product_id": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64" } }, { "category": "product_version", "name": "openssl-0.9.8j-0.106.18.1.ppc64", "product": { "name": "openssl-0.9.8j-0.106.18.1.ppc64", "product_id": "openssl-0.9.8j-0.106.18.1.ppc64" } }, { "category": "product_version", "name": "openssl-doc-0.9.8j-0.106.18.1.ppc64", "product": { "name": "openssl-doc-0.9.8j-0.106.18.1.ppc64", "product_id": "openssl-doc-0.9.8j-0.106.18.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "libopenssl-devel-0.9.8j-0.106.18.1.s390x", "product": { "name": "libopenssl-devel-0.9.8j-0.106.18.1.s390x", "product_id": "libopenssl-devel-0.9.8j-0.106.18.1.s390x" } }, { "category": "product_version", "name": "libopenssl-devel-32bit-0.9.8j-0.106.18.1.s390x", "product": { "name": "libopenssl-devel-32bit-0.9.8j-0.106.18.1.s390x", "product_id": "libopenssl-devel-32bit-0.9.8j-0.106.18.1.s390x" } }, { "category": "product_version", "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "product": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "product_id": "libopenssl0_9_8-0.9.8j-0.106.18.1.s390x" } }, { "category": "product_version", "name": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "product": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "product_id": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x" } }, { "category": "product_version", "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "product": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "product_id": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x" } }, { "category": "product_version", "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "product": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "product_id": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x" } }, { "category": "product_version", "name": "openssl-0.9.8j-0.106.18.1.s390x", "product": { "name": "openssl-0.9.8j-0.106.18.1.s390x", "product_id": "openssl-0.9.8j-0.106.18.1.s390x" } }, { "category": "product_version", "name": "openssl-doc-0.9.8j-0.106.18.1.s390x", "product": { "name": "openssl-doc-0.9.8j-0.106.18.1.s390x", "product_id": "openssl-doc-0.9.8j-0.106.18.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "product": { "name": "libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "product_id": "libopenssl-devel-0.9.8j-0.106.18.1.x86_64" } }, { "category": "product_version", "name": "libopenssl-devel-32bit-0.9.8j-0.106.18.1.x86_64", "product": { "name": "libopenssl-devel-32bit-0.9.8j-0.106.18.1.x86_64", "product_id": "libopenssl-devel-32bit-0.9.8j-0.106.18.1.x86_64" } }, { "category": "product_version", "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "product": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "product_id": "libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64" } }, { "category": "product_version", "name": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "product": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "product_id": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64" } }, { "category": "product_version", "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "product": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "product_id": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64" } }, { "category": "product_version", "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "product": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "product_id": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64" } }, { "category": "product_version", "name": "openssl-0.9.8j-0.106.18.1.x86_64", "product": { "name": "openssl-0.9.8j-0.106.18.1.x86_64", "product_id": "openssl-0.9.8j-0.106.18.1.x86_64" } }, { "category": "product_version", "name": "openssl-doc-0.9.8j-0.106.18.1.x86_64", "product": { "name": "openssl-doc-0.9.8j-0.106.18.1.x86_64", "product_id": "openssl-doc-0.9.8j-0.106.18.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } }, { "category": "product_name", "name": "SUSE Studio Onsite 1.3", "product": { "name": "SUSE Studio Onsite 1.3", "product_id": "SUSE Studio Onsite 1.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-studioonsite:1.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.i586" }, "product_reference": "libopenssl-devel-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.106.18.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ia64" }, "product_reference": "libopenssl-devel-0.9.8j-0.106.18.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.106.18.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ppc64" }, "product_reference": "libopenssl-devel-0.9.8j-0.106.18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl-devel-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-32bit-0.9.8j-0.106.18.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.ppc64" }, "product_reference": "libopenssl-devel-32bit-0.9.8j-0.106.18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-32bit-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl-devel-32bit-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-32bit-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl-devel-32bit-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.106.18.1.i586" }, "product_reference": "libopenssl-devel-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.106.18.1.i586" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.106.18.1.i586" }, "product_reference": "openssl-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.106.18.1.i586" }, "product_reference": "openssl-doc-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.i586" }, "product_reference": "libopenssl-devel-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl-devel-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.i586" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.i586" }, "product_reference": "openssl-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.s390x" }, "product_reference": "openssl-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "openssl-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.i586" }, "product_reference": "openssl-doc-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.s390x" }, "product_reference": "openssl-doc-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "openssl-doc-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.i586" }, "product_reference": "libopenssl-devel-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl-devel-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.i586" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.i586" }, "product_reference": "openssl-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.s390x" }, "product_reference": "openssl-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "openssl-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.i586" }, "product_reference": "openssl-doc-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.s390x" }, "product_reference": "openssl-doc-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "openssl-doc-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64" }, "product_reference": "libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.i586" }, "product_reference": "openssl-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.106.18.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ia64" }, "product_reference": "openssl-0.9.8j-0.106.18.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.106.18.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64" }, "product_reference": "openssl-0.9.8j-0.106.18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.s390x" }, "product_reference": "openssl-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "openssl-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586" }, "product_reference": "openssl-doc-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.106.18.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64" }, "product_reference": "openssl-doc-0.9.8j-0.106.18.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.106.18.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64" }, "product_reference": "openssl-doc-0.9.8j-0.106.18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x" }, "product_reference": "openssl-doc-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "openssl-doc-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64" }, "product_reference": "libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.i586" }, "product_reference": "openssl-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.106.18.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ia64" }, "product_reference": "openssl-0.9.8j-0.106.18.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.106.18.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64" }, "product_reference": "openssl-0.9.8j-0.106.18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.s390x" }, "product_reference": "openssl-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "openssl-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.106.18.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586" }, "product_reference": "openssl-doc-0.9.8j-0.106.18.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.106.18.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64" }, "product_reference": "openssl-doc-0.9.8j-0.106.18.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.106.18.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64" }, "product_reference": "openssl-doc-0.9.8j-0.106.18.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.106.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x" }, "product_reference": "openssl-doc-0.9.8j-0.106.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-0.9.8j-0.106.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "openssl-doc-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl-devel-0.9.8j-0.106.18.1.x86_64 as component of SUSE Studio Onsite 1.3", "product_id": "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.106.18.1.x86_64" }, "product_reference": "libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "relates_to_product_reference": "SUSE Studio Onsite 1.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8610" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.106.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8610", "url": "https://www.suse.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1005879 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005879" }, { "category": "external", "summary": "SUSE Bug 1110018 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1110018" }, { "category": "external", "summary": "SUSE Bug 1120592 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1120592" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-8610", "url": "https://bugzilla.suse.com/982575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.106.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.106.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-27T08:06:44Z", "details": "important" } ], "title": "CVE-2016-8610" }, { "cve": "CVE-2018-0734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0734" } ], "notes": [ { "category": "general", "text": "The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.106.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0734", "url": "https://www.suse.com/security/cve/CVE-2018-0734" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1113652 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113652" }, { "category": "external", "summary": "SUSE Bug 1113742 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113742" }, { "category": "external", "summary": "SUSE Bug 1122198 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1122198" }, { "category": "external", "summary": "SUSE Bug 1122212 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1122212" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.106.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.106.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-27T08:06:44Z", "details": "moderate" } ], "title": "CVE-2018-0734" }, { "cve": "CVE-2018-5407", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5407" } ], "notes": [ { "category": "general", "text": "Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on \u0027port contention\u0027.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.106.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5407", "url": "https://www.suse.com/security/cve/CVE-2018-5407" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1116195 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1116195" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.106.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-hmac-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:libopenssl0_9_8-x86-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:openssl-doc-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-0.9.8j-0.106.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:libopenssl-devel-32bit-0.9.8j-0.106.18.1.x86_64", "SUSE Studio Onsite 1.3:libopenssl-devel-0.9.8j-0.106.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-27T08:06:44Z", "details": "moderate" } ], "title": "CVE-2018-5407" } ] }
suse-su-2017:0348-1
Vulnerability from csaf_suse
Published
2017-02-01 07:19
Modified
2017-02-01 07:19
Summary
Security update for gnutls
Notes
Title of the patch
Security update for gnutls
Description of the patch
This update for gnutls fixes the following security issues:
- GnuTLS could have crashed when processing maliciously crafted OpenPGP
certificates (GNUTLS-SA-2017-2, bsc#1018832, CVE-2017-5335, CVE-2017-5337,
CVE-2017-5336)
- GnuTLS could have falsely accepted certificates when using OCSP
(GNUTLS-SA-2016-3, bsc#999646, CVE-2016-7444)
- GnuTLS could have suffered from 100% CPU load DoS attacks by using SSL alert
packets during the handshake (bsc#1005879, CVE-2016-8610)
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2017-177,SUSE-SLE-DESKTOP-12-SP2-2017-177,SUSE-SLE-RPI-12-SP2-2017-177,SUSE-SLE-SDK-12-SP1-2017-177,SUSE-SLE-SDK-12-SP2-2017-177,SUSE-SLE-SERVER-12-SP1-2017-177,SUSE-SLE-SERVER-12-SP2-2017-177
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for gnutls", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for gnutls fixes the following security issues:\n\n- GnuTLS could have crashed when processing maliciously crafted OpenPGP\n certificates (GNUTLS-SA-2017-2, bsc#1018832, CVE-2017-5335, CVE-2017-5337,\n CVE-2017-5336)\n- GnuTLS could have falsely accepted certificates when using OCSP\n (GNUTLS-SA-2016-3, bsc#999646, CVE-2016-7444)\n- GnuTLS could have suffered from 100% CPU load DoS attacks by using SSL alert\n packets during the handshake (bsc#1005879, CVE-2016-8610)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2017-177,SUSE-SLE-DESKTOP-12-SP2-2017-177,SUSE-SLE-RPI-12-SP2-2017-177,SUSE-SLE-SDK-12-SP1-2017-177,SUSE-SLE-SDK-12-SP2-2017-177,SUSE-SLE-SERVER-12-SP1-2017-177,SUSE-SLE-SERVER-12-SP2-2017-177", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0348-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0348-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170348-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0348-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-February/002614.html" }, { "category": "self", "summary": "SUSE Bug 1005879", "url": "https://bugzilla.suse.com/1005879" }, { "category": "self", "summary": "SUSE Bug 1018832", "url": "https://bugzilla.suse.com/1018832" }, { "category": "self", "summary": "SUSE Bug 999646", "url": "https://bugzilla.suse.com/999646" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7444 page", "url": "https://www.suse.com/security/cve/CVE-2016-7444/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8610 page", "url": "https://www.suse.com/security/cve/CVE-2016-8610/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5335 page", "url": "https://www.suse.com/security/cve/CVE-2017-5335/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5336 page", "url": "https://www.suse.com/security/cve/CVE-2017-5336/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5337 page", "url": "https://www.suse.com/security/cve/CVE-2017-5337/" } ], "title": "Security update for gnutls", "tracking": { "current_release_date": "2017-02-01T07:19:39Z", "generator": { "date": "2017-02-01T07:19:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0348-1", "initial_release_date": "2017-02-01T07:19:39Z", "revision_history": [ { "date": "2017-02-01T07:19:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "gnutls-3.2.15-16.1.aarch64", "product": { "name": "gnutls-3.2.15-16.1.aarch64", "product_id": "gnutls-3.2.15-16.1.aarch64" } }, { "category": "product_version", "name": "libgnutls-openssl27-3.2.15-16.1.aarch64", "product": { "name": "libgnutls-openssl27-3.2.15-16.1.aarch64", "product_id": "libgnutls-openssl27-3.2.15-16.1.aarch64" } }, { "category": "product_version", "name": "libgnutls28-3.2.15-16.1.aarch64", "product": { "name": "libgnutls28-3.2.15-16.1.aarch64", "product_id": "libgnutls28-3.2.15-16.1.aarch64" } }, { "category": "product_version", "name": "libgnutls-devel-3.2.15-16.1.aarch64", "product": { "name": "libgnutls-devel-3.2.15-16.1.aarch64", "product_id": "libgnutls-devel-3.2.15-16.1.aarch64" } }, { "category": "product_version", "name": "libgnutls-openssl-devel-3.2.15-16.1.aarch64", "product": { "name": "libgnutls-openssl-devel-3.2.15-16.1.aarch64", "product_id": "libgnutls-openssl-devel-3.2.15-16.1.aarch64" } }, { "category": "product_version", "name": "libgnutlsxx-devel-3.2.15-16.1.aarch64", "product": { "name": "libgnutlsxx-devel-3.2.15-16.1.aarch64", "product_id": "libgnutlsxx-devel-3.2.15-16.1.aarch64" } }, { "category": "product_version", "name": "libgnutlsxx28-3.2.15-16.1.aarch64", "product": { "name": "libgnutlsxx28-3.2.15-16.1.aarch64", "product_id": "libgnutlsxx28-3.2.15-16.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libgnutls-devel-3.2.15-16.1.ppc64le", "product": { "name": "libgnutls-devel-3.2.15-16.1.ppc64le", "product_id": "libgnutls-devel-3.2.15-16.1.ppc64le" } }, { "category": "product_version", "name": "libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "product": { "name": "libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "product_id": "libgnutls-openssl-devel-3.2.15-16.1.ppc64le" } }, { "category": "product_version", "name": "libgnutlsxx-devel-3.2.15-16.1.ppc64le", "product": { "name": "libgnutlsxx-devel-3.2.15-16.1.ppc64le", "product_id": "libgnutlsxx-devel-3.2.15-16.1.ppc64le" } }, { "category": "product_version", "name": "libgnutlsxx28-3.2.15-16.1.ppc64le", "product": { "name": "libgnutlsxx28-3.2.15-16.1.ppc64le", "product_id": "libgnutlsxx28-3.2.15-16.1.ppc64le" } }, { "category": "product_version", "name": "gnutls-3.2.15-16.1.ppc64le", "product": { "name": "gnutls-3.2.15-16.1.ppc64le", "product_id": "gnutls-3.2.15-16.1.ppc64le" } }, { "category": "product_version", "name": "libgnutls-openssl27-3.2.15-16.1.ppc64le", "product": { "name": "libgnutls-openssl27-3.2.15-16.1.ppc64le", "product_id": "libgnutls-openssl27-3.2.15-16.1.ppc64le" } }, { "category": "product_version", "name": "libgnutls28-3.2.15-16.1.ppc64le", "product": { "name": "libgnutls28-3.2.15-16.1.ppc64le", "product_id": "libgnutls28-3.2.15-16.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libgnutls-devel-3.2.15-16.1.s390x", "product": { "name": "libgnutls-devel-3.2.15-16.1.s390x", "product_id": "libgnutls-devel-3.2.15-16.1.s390x" } }, { "category": "product_version", "name": "libgnutls-openssl-devel-3.2.15-16.1.s390x", "product": { "name": "libgnutls-openssl-devel-3.2.15-16.1.s390x", "product_id": "libgnutls-openssl-devel-3.2.15-16.1.s390x" } }, { "category": "product_version", "name": "libgnutlsxx-devel-3.2.15-16.1.s390x", "product": { "name": "libgnutlsxx-devel-3.2.15-16.1.s390x", "product_id": "libgnutlsxx-devel-3.2.15-16.1.s390x" } }, { "category": "product_version", "name": "libgnutlsxx28-3.2.15-16.1.s390x", "product": { "name": "libgnutlsxx28-3.2.15-16.1.s390x", "product_id": "libgnutlsxx28-3.2.15-16.1.s390x" } }, { "category": "product_version", "name": "gnutls-3.2.15-16.1.s390x", "product": { "name": "gnutls-3.2.15-16.1.s390x", "product_id": "gnutls-3.2.15-16.1.s390x" } }, { "category": "product_version", "name": "libgnutls-openssl27-3.2.15-16.1.s390x", "product": { "name": "libgnutls-openssl27-3.2.15-16.1.s390x", "product_id": "libgnutls-openssl27-3.2.15-16.1.s390x" } }, { "category": "product_version", "name": "libgnutls28-3.2.15-16.1.s390x", "product": { "name": "libgnutls28-3.2.15-16.1.s390x", "product_id": "libgnutls28-3.2.15-16.1.s390x" } }, { "category": "product_version", "name": "libgnutls28-32bit-3.2.15-16.1.s390x", "product": { "name": "libgnutls28-32bit-3.2.15-16.1.s390x", "product_id": "libgnutls28-32bit-3.2.15-16.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gnutls-3.2.15-16.1.x86_64", "product": { "name": "gnutls-3.2.15-16.1.x86_64", "product_id": "gnutls-3.2.15-16.1.x86_64" } }, { "category": "product_version", "name": "libgnutls28-3.2.15-16.1.x86_64", "product": { "name": "libgnutls28-3.2.15-16.1.x86_64", "product_id": "libgnutls28-3.2.15-16.1.x86_64" } }, { "category": "product_version", "name": "libgnutls28-32bit-3.2.15-16.1.x86_64", "product": { "name": "libgnutls28-32bit-3.2.15-16.1.x86_64", "product_id": "libgnutls28-32bit-3.2.15-16.1.x86_64" } }, { "category": "product_version", "name": "libgnutls-devel-3.2.15-16.1.x86_64", "product": { "name": "libgnutls-devel-3.2.15-16.1.x86_64", "product_id": "libgnutls-devel-3.2.15-16.1.x86_64" } }, { "category": "product_version", "name": "libgnutls-openssl-devel-3.2.15-16.1.x86_64", "product": { "name": "libgnutls-openssl-devel-3.2.15-16.1.x86_64", "product_id": "libgnutls-openssl-devel-3.2.15-16.1.x86_64" } }, { "category": "product_version", "name": "libgnutlsxx-devel-3.2.15-16.1.x86_64", "product": { "name": "libgnutlsxx-devel-3.2.15-16.1.x86_64", "product_id": "libgnutlsxx-devel-3.2.15-16.1.x86_64" } }, { "category": "product_version", "name": "libgnutlsxx28-3.2.15-16.1.x86_64", "product": { "name": "libgnutlsxx28-3.2.15-16.1.x86_64", "product_id": "libgnutlsxx28-3.2.15-16.1.x86_64" } }, { "category": "product_version", "name": "libgnutls-openssl27-3.2.15-16.1.x86_64", "product": { "name": "libgnutls-openssl27-3.2.15-16.1.x86_64", "product_id": "libgnutls-openssl27-3.2.15-16.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP2", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP2", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2", "product": { "name": "SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1.x86_64" }, "product_reference": "gnutls-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls28-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-32bit-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls28-32bit-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1.x86_64" }, "product_reference": "gnutls-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls28-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-32bit-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2", "product_id": "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls28-32bit-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.2.15-16.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:gnutls-3.2.15-16.1.aarch64" }, "product_reference": "gnutls-3.2.15-16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.2.15-16.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64" }, "product_reference": "libgnutls-openssl27-3.2.15-16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-3.2.15-16.1.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2", "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls28-3.2.15-16.1.aarch64" }, "product_reference": "libgnutls28-3.2.15-16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.ppc64le" }, "product_reference": "libgnutls-devel-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.s390x" }, "product_reference": "libgnutls-devel-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls-devel-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl-devel-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.ppc64le" }, "product_reference": "libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl-devel-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.s390x" }, "product_reference": "libgnutls-openssl-devel-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl-devel-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls-openssl-devel-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx-devel-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.ppc64le" }, "product_reference": "libgnutlsxx-devel-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx-devel-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.s390x" }, "product_reference": "libgnutlsxx-devel-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx-devel-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.x86_64" }, "product_reference": "libgnutlsxx-devel-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx28-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.ppc64le" }, "product_reference": "libgnutlsxx28-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx28-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.s390x" }, "product_reference": "libgnutlsxx28-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx28-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.x86_64" }, "product_reference": "libgnutlsxx28-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-3.2.15-16.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.aarch64" }, "product_reference": "libgnutls-devel-3.2.15-16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.ppc64le" }, "product_reference": "libgnutls-devel-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.s390x" }, "product_reference": "libgnutls-devel-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls-devel-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl-devel-3.2.15-16.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.aarch64" }, "product_reference": "libgnutls-openssl-devel-3.2.15-16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl-devel-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.ppc64le" }, "product_reference": "libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl-devel-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.s390x" }, "product_reference": "libgnutls-openssl-devel-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl-devel-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls-openssl-devel-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx-devel-3.2.15-16.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.aarch64" }, "product_reference": "libgnutlsxx-devel-3.2.15-16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx-devel-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.ppc64le" }, "product_reference": "libgnutlsxx-devel-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx-devel-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.s390x" }, "product_reference": "libgnutlsxx-devel-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx-devel-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.x86_64" }, "product_reference": "libgnutlsxx-devel-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx28-3.2.15-16.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.aarch64" }, "product_reference": "libgnutlsxx28-3.2.15-16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx28-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.ppc64le" }, "product_reference": "libgnutlsxx28-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx28-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.s390x" }, "product_reference": "libgnutlsxx28-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx28-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.x86_64" }, "product_reference": "libgnutlsxx28-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.ppc64le" }, "product_reference": "gnutls-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.s390x" }, "product_reference": "gnutls-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.x86_64" }, "product_reference": "gnutls-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le" }, "product_reference": "libgnutls-openssl27-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x" }, "product_reference": "libgnutls-openssl27-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls-openssl27-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.ppc64le" }, "product_reference": "libgnutls28-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.s390x" }, "product_reference": "libgnutls28-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls28-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-32bit-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x" }, "product_reference": "libgnutls28-32bit-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-32bit-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls28-32bit-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.ppc64le" }, "product_reference": "gnutls-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.s390x" }, "product_reference": "gnutls-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.x86_64" }, "product_reference": "gnutls-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le" }, "product_reference": "libgnutls-openssl27-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x" }, "product_reference": "libgnutls-openssl27-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls-openssl27-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.ppc64le" }, "product_reference": "libgnutls28-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.s390x" }, "product_reference": "libgnutls28-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls28-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-32bit-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x" }, "product_reference": "libgnutls28-32bit-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-32bit-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls28-32bit-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.2.15-16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.aarch64" }, "product_reference": "gnutls-3.2.15-16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.ppc64le" }, "product_reference": "gnutls-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.s390x" }, "product_reference": "gnutls-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.x86_64" }, "product_reference": "gnutls-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.2.15-16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64" }, "product_reference": "libgnutls-openssl27-3.2.15-16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le" }, "product_reference": "libgnutls-openssl27-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x" }, "product_reference": "libgnutls-openssl27-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls-openssl27-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-3.2.15-16.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.aarch64" }, "product_reference": "libgnutls28-3.2.15-16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.ppc64le" }, "product_reference": "libgnutls28-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.s390x" }, "product_reference": "libgnutls28-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls28-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-32bit-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x" }, "product_reference": "libgnutls28-32bit-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-32bit-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2", "product_id": "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls28-32bit-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.2.15-16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.aarch64" }, "product_reference": "gnutls-3.2.15-16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.ppc64le" }, "product_reference": "gnutls-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.s390x" }, "product_reference": "gnutls-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.x86_64" }, "product_reference": "gnutls-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.2.15-16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64" }, "product_reference": "libgnutls-openssl27-3.2.15-16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le" }, "product_reference": "libgnutls-openssl27-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x" }, "product_reference": "libgnutls-openssl27-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-openssl27-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls-openssl27-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-3.2.15-16.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.aarch64" }, "product_reference": "libgnutls28-3.2.15-16.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-3.2.15-16.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.ppc64le" }, "product_reference": "libgnutls28-3.2.15-16.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.s390x" }, "product_reference": "libgnutls28-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls28-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-32bit-3.2.15-16.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x" }, "product_reference": "libgnutls28-32bit-3.2.15-16.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls28-32bit-3.2.15-16.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64" }, "product_reference": "libgnutls28-32bit-3.2.15-16.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-7444", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7444" } ], "notes": [ { "category": "general", "text": "The gnutls_ocsp_resp_check_crt function in lib/x509/ocsp.c in GnuTLS before 3.4.15 and 3.5.x before 3.5.4 does not verify the serial length of an OCSP response, which might allow remote attackers to bypass an intended certificate validation mechanism via vectors involving trailing bytes left by gnutls_malloc.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7444", "url": "https://www.suse.com/security/cve/CVE-2016-7444" }, { "category": "external", "summary": "SUSE Bug 999646 for CVE-2016-7444", "url": "https://bugzilla.suse.com/999646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-01T07:19:39Z", "details": "low" } ], "title": "CVE-2016-7444" }, { "cve": "CVE-2016-8610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8610" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8610", "url": "https://www.suse.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1005879 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005879" }, { "category": "external", "summary": "SUSE Bug 1110018 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1110018" }, { "category": "external", "summary": "SUSE Bug 1120592 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1120592" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-8610", "url": "https://bugzilla.suse.com/982575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-01T07:19:39Z", "details": "important" } ], "title": "CVE-2016-8610" }, { "cve": "CVE-2017-5335", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5335" } ], "notes": [ { "category": "general", "text": "The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5335", "url": "https://www.suse.com/security/cve/CVE-2017-5335" }, { "category": "external", "summary": "SUSE Bug 1018832 for CVE-2017-5335", "url": "https://bugzilla.suse.com/1018832" }, { "category": "external", "summary": "SUSE Bug 1021057 for CVE-2017-5335", "url": "https://bugzilla.suse.com/1021057" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-01T07:19:39Z", "details": "moderate" } ], "title": "CVE-2017-5335" }, { "cve": "CVE-2017-5336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5336" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5336", "url": "https://www.suse.com/security/cve/CVE-2017-5336" }, { "category": "external", "summary": "SUSE Bug 1018832 for CVE-2017-5336", "url": "https://bugzilla.suse.com/1018832" }, { "category": "external", "summary": "SUSE Bug 1021057 for CVE-2017-5336", "url": "https://bugzilla.suse.com/1021057" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-01T07:19:39Z", "details": "moderate" } ], "title": "CVE-2017-5336" }, { "cve": "CVE-2017-5337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5337" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5337", "url": "https://www.suse.com/security/cve/CVE-2017-5337" }, { "category": "external", "summary": "SUSE Bug 1018832 for CVE-2017-5337", "url": "https://bugzilla.suse.com/1018832" }, { "category": "external", "summary": "SUSE Bug 1021057 for CVE-2017-5337", "url": "https://bugzilla.suse.com/1021057" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:gnutls-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls-openssl27-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libgnutls28-32bit-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:libgnutlsxx28-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutls-openssl-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx-devel-3.2.15-16.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP2:libgnutlsxx28-3.2.15-16.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-01T07:19:39Z", "details": "moderate" } ], "title": "CVE-2017-5337" } ] }
suse-su-2018:4068-1
Vulnerability from csaf_suse
Published
2018-12-11 08:21
Modified
2018-12-11 08:21
Summary
Security update for compat-openssl098
Notes
Title of the patch
Security update for compat-openssl098
Description of the patch
This update for compat-openssl098 fixes the following issues:
Security issues fixed:
- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).
- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).
- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).
- Fixed the 'One and Done' side-channel attack on RSA (bsc#1104789).
Patchnames
SUSE-SLE-DESKTOP-12-SP3-2018-2893,SUSE-SLE-DESKTOP-12-SP4-2018-2893,SUSE-SLE-Module-Legacy-12-2018-2893,SUSE-SLE-SAP-12-SP1-2018-2893,SUSE-SLE-SAP-12-SP2-2018-2893,SUSE-SLE-SAP-12-SP3-2018-2893,SUSE-SLE-SAP-12-SP4-2018-2893
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for compat-openssl098", "title": "Title of the patch" }, { "category": "description", "text": "This update for compat-openssl098 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-0734: Fixed timing vulnerability in DSA signature generation (bsc#1113652).\n- CVE-2018-5407: Fixed elliptic curve scalar multiplication timing attack defenses (bsc#1113534).\n- CVE-2016-8610: Adjusted current fix and add missing error string (bsc#1110018).\n- Fixed the \u0027One and Done\u0027 side-channel attack on RSA (bsc#1104789).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP3-2018-2893,SUSE-SLE-DESKTOP-12-SP4-2018-2893,SUSE-SLE-Module-Legacy-12-2018-2893,SUSE-SLE-SAP-12-SP1-2018-2893,SUSE-SLE-SAP-12-SP2-2018-2893,SUSE-SLE-SAP-12-SP3-2018-2893,SUSE-SLE-SAP-12-SP4-2018-2893", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_4068-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:4068-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20184068-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:4068-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-December/004950.html" }, { "category": "self", "summary": "SUSE Bug 1104789", "url": "https://bugzilla.suse.com/1104789" }, { "category": "self", "summary": "SUSE Bug 1110018", "url": "https://bugzilla.suse.com/1110018" }, { "category": "self", "summary": "SUSE Bug 1113534", "url": "https://bugzilla.suse.com/1113534" }, { "category": "self", "summary": "SUSE Bug 1113652", "url": "https://bugzilla.suse.com/1113652" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8610 page", "url": "https://www.suse.com/security/cve/CVE-2016-8610/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-0734 page", "url": "https://www.suse.com/security/cve/CVE-2018-0734/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5407 page", "url": "https://www.suse.com/security/cve/CVE-2018-5407/" } ], "title": "Security update for compat-openssl098", "tracking": { "current_release_date": "2018-12-11T08:21:22Z", "generator": { "date": "2018-12-11T08:21:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:4068-1", "initial_release_date": "2018-12-11T08:21:22Z", "revision_history": [ { "date": "2018-12-11T08:21:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libopenssl0_9_8-0.9.8j-106.9.1.s390x", "product": { "name": "libopenssl0_9_8-0.9.8j-106.9.1.s390x", "product_id": "libopenssl0_9_8-0.9.8j-106.9.1.s390x" } }, { "category": "product_version", "name": "libopenssl0_9_8-32bit-0.9.8j-106.9.1.s390x", "product": { "name": "libopenssl0_9_8-32bit-0.9.8j-106.9.1.s390x", "product_id": "libopenssl0_9_8-32bit-0.9.8j-106.9.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "product": { "name": "libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "product_id": "libopenssl0_9_8-0.9.8j-106.9.1.x86_64" } }, { "category": "product_version", "name": "libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "product": { "name": "libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "product_id": "libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP4", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 12", "product": { "name": "SUSE Linux Enterprise Module for Legacy 12", "product_id": "SUSE Linux Enterprise Module for Legacy 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-106.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-106.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-106.9.1.s390x as component of SUSE Linux Enterprise Module for Legacy 12", "product_id": "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.s390x" }, "product_reference": "libopenssl0_9_8-0.9.8j-106.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 12" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-106.9.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 12", "product_id": "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 12" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-106.9.1.s390x as component of SUSE Linux Enterprise Module for Legacy 12", "product_id": "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.s390x" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-106.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 12" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 12", "product_id": "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64" }, "product_reference": "libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 12" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-106.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.9.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-106.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.9.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-106.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl0_9_8-0.9.8j-106.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64" }, "product_reference": "libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-8610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8610" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8610", "url": "https://www.suse.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1005879 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005879" }, { "category": "external", "summary": "SUSE Bug 1110018 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1110018" }, { "category": "external", "summary": "SUSE Bug 1120592 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1120592" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-8610", "url": "https://bugzilla.suse.com/982575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-11T08:21:22Z", "details": "important" } ], "title": "CVE-2016-8610" }, { "cve": "CVE-2018-0734", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-0734" } ], "notes": [ { "category": "general", "text": "The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-0734", "url": "https://www.suse.com/security/cve/CVE-2018-0734" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1113652 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113652" }, { "category": "external", "summary": "SUSE Bug 1113742 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1113742" }, { "category": "external", "summary": "SUSE Bug 1122198 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1122198" }, { "category": "external", "summary": "SUSE Bug 1122212 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1122212" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2018-0734", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-11T08:21:22Z", "details": "moderate" } ], "title": "CVE-2018-0734" }, { "cve": "CVE-2018-5407", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5407" } ], "notes": [ { "category": "general", "text": "Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on \u0027port contention\u0027.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5407", "url": "https://www.suse.com/security/cve/CVE-2018-5407" }, { "category": "external", "summary": "SUSE Bug 1113534 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1113534" }, { "category": "external", "summary": "SUSE Bug 1116195 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1116195" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2018-5407", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 12:libopenssl0_9_8-32bit-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libopenssl0_9_8-0.9.8j-106.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libopenssl0_9_8-0.9.8j-106.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-11T08:21:22Z", "details": "moderate" } ], "title": "CVE-2018-5407" } ] }
suse-su-2018:0112-1
Vulnerability from csaf_suse
Published
2018-01-16 12:36
Modified
2018-01-16 12:36
Summary
Security update for openssl
Notes
Title of the patch
Security update for openssl
Description of the patch
This update for openssl fixes the following issues:
Security issues fixed:
- CVE-2016-7056: ECSDA P-256 timing attack key recovery (bsc#1019334)
- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085)
- CVE-2016-8610: remote denial of service in SSL alert handling (bsc#1005878)
- CVE-2017-3735: Malformed X.509 IPAdressFamily could cause OOB read (bsc#1056058)
Bug fixes:
- support alternate root ca chains (bsc#1032261)
- X509_get_default_cert_file() returns an incorrect path (bsc#1022271)
- Segmentation fault in 'openssl speed' when engine library file cannot be found (bsc#1000677)
- adjust DEFAULT_SUSE to meet 1.0.2 and current state (bsc#1027908)
- Missing important ciphers in openssl 1.0.1i-47.1 on SLES12 SP1 (bsc#990592)
- out of bounds read+crash in DES_fcrypt (bsc#1065363)
- tracker bug for January 26th 2017 release (bsc#1021641)
- patch for CVE-2016-2108 fails negative zero exploit (bsc#1001502)
- Birthday attacks on 64-bit block ciphers aka triple-des (SWEET32) (bsc#1001912)
- Include additional patch for CVE-2016-2108 (bsc#1004499)
- openssl DEFAULT_SUSE cipher list is missing ECDHE-ECDSA ciphers (bsc#1055825)
Patchnames
SUSE-SLE-SERVER-12-2018-79
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for openssl", "title": "Title of the patch" }, { "category": "description", "text": "This update for openssl fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2016-7056: ECSDA P-256 timing attack key recovery (bsc#1019334)\n- CVE-2017-3731: Truncated packet could crash via OOB read (bsc#1022085)\n- CVE-2016-8610: remote denial of service in SSL alert handling (bsc#1005878)\n- CVE-2017-3735: Malformed X.509 IPAdressFamily could cause OOB read (bsc#1056058)\n\nBug fixes:\n\n- support alternate root ca chains (bsc#1032261)\n- X509_get_default_cert_file() returns an incorrect path (bsc#1022271)\n- Segmentation fault in \u0027openssl speed\u0027 when engine library file cannot be found (bsc#1000677)\n- adjust DEFAULT_SUSE to meet 1.0.2 and current state (bsc#1027908)\n- Missing important ciphers in openssl 1.0.1i-47.1 on SLES12 SP1 (bsc#990592)\n- out of bounds read+crash in DES_fcrypt (bsc#1065363)\n- tracker bug for January 26th 2017 release (bsc#1021641)\n- patch for CVE-2016-2108 fails negative zero exploit (bsc#1001502)\n- Birthday attacks on 64-bit block ciphers aka triple-des (SWEET32) (bsc#1001912)\n- Include additional patch for CVE-2016-2108 (bsc#1004499)\n- openssl DEFAULT_SUSE cipher list is missing ECDHE-ECDSA ciphers (bsc#1055825)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SERVER-12-2018-79", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_0112-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:0112-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180112-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:0112-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-January/003599.html" }, { "category": "self", "summary": "SUSE Bug 1000677", "url": "https://bugzilla.suse.com/1000677" }, { "category": "self", "summary": "SUSE Bug 1001502", "url": "https://bugzilla.suse.com/1001502" }, { "category": "self", "summary": "SUSE Bug 1001912", "url": "https://bugzilla.suse.com/1001912" }, { "category": "self", "summary": "SUSE Bug 1004499", "url": "https://bugzilla.suse.com/1004499" }, { "category": "self", "summary": "SUSE Bug 1005878", "url": "https://bugzilla.suse.com/1005878" }, { "category": "self", "summary": "SUSE Bug 1019334", "url": "https://bugzilla.suse.com/1019334" }, { "category": "self", "summary": "SUSE Bug 1021641", "url": "https://bugzilla.suse.com/1021641" }, { "category": "self", "summary": "SUSE Bug 1022085", "url": "https://bugzilla.suse.com/1022085" }, { "category": "self", "summary": "SUSE Bug 1022271", "url": "https://bugzilla.suse.com/1022271" }, { "category": "self", "summary": "SUSE Bug 1027908", "url": "https://bugzilla.suse.com/1027908" }, { "category": "self", "summary": "SUSE Bug 1032261", "url": "https://bugzilla.suse.com/1032261" }, { "category": "self", "summary": "SUSE Bug 1055825", "url": "https://bugzilla.suse.com/1055825" }, { "category": "self", "summary": "SUSE Bug 1056058", "url": "https://bugzilla.suse.com/1056058" }, { "category": "self", "summary": "SUSE Bug 1065363", "url": "https://bugzilla.suse.com/1065363" }, { "category": "self", "summary": "SUSE Bug 990592", "url": "https://bugzilla.suse.com/990592" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2108 page", "url": "https://www.suse.com/security/cve/CVE-2016-2108/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7056 page", "url": "https://www.suse.com/security/cve/CVE-2016-7056/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8610 page", "url": "https://www.suse.com/security/cve/CVE-2016-8610/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3731 page", "url": "https://www.suse.com/security/cve/CVE-2017-3731/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-3735 page", "url": "https://www.suse.com/security/cve/CVE-2017-3735/" } ], "title": "Security update for openssl", "tracking": { "current_release_date": "2018-01-16T12:36:33Z", "generator": { "date": "2018-01-16T12:36:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:0112-1", "initial_release_date": "2018-01-16T12:36:33Z", "revision_history": [ { "date": "2018-01-16T12:36:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "openssl-doc-1.0.1i-27.28.1.noarch", "product": { "name": "openssl-doc-1.0.1i-27.28.1.noarch", "product_id": "openssl-doc-1.0.1i-27.28.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libopenssl1_0_0-1.0.1i-27.28.1.ppc64le", "product": { "name": "libopenssl1_0_0-1.0.1i-27.28.1.ppc64le", "product_id": "libopenssl1_0_0-1.0.1i-27.28.1.ppc64le" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le", "product": { "name": "libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le", "product_id": "libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le" } }, { "category": "product_version", "name": "openssl-1.0.1i-27.28.1.ppc64le", "product": { "name": "openssl-1.0.1i-27.28.1.ppc64le", "product_id": "openssl-1.0.1i-27.28.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libopenssl1_0_0-1.0.1i-27.28.1.s390x", "product": { "name": "libopenssl1_0_0-1.0.1i-27.28.1.s390x", "product_id": "libopenssl1_0_0-1.0.1i-27.28.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x", "product": { "name": "libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x", "product_id": "libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x", "product": { "name": "libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x", "product_id": "libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x", "product": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x", "product_id": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x" } }, { "category": "product_version", "name": "openssl-1.0.1i-27.28.1.s390x", "product": { "name": "openssl-1.0.1i-27.28.1.s390x", "product_id": "openssl-1.0.1i-27.28.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libopenssl1_0_0-1.0.1i-27.28.1.x86_64", "product": { "name": "libopenssl1_0_0-1.0.1i-27.28.1.x86_64", "product_id": "libopenssl1_0_0-1.0.1i-27.28.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64", "product": { "name": "libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64", "product_id": "libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64", "product": { "name": "libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64", "product_id": "libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64" } }, { "category": "product_version", "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64", "product": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64", "product_id": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64" } }, { "category": "product_version", "name": "openssl-1.0.1i-27.28.1.x86_64", "product": { "name": "openssl-1.0.1i-27.28.1.x86_64", "product_id": "openssl-1.0.1i-27.28.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1i-27.28.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.ppc64le" }, "product_reference": "libopenssl1_0_0-1.0.1i-27.28.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1i-27.28.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.s390x" }, "product_reference": "libopenssl1_0_0-1.0.1i-27.28.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-1.0.1i-27.28.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.x86_64" }, "product_reference": "libopenssl1_0_0-1.0.1i-27.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x" }, "product_reference": "libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64" }, "product_reference": "libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le" }, "product_reference": "libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x" }, "product_reference": "libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64" }, "product_reference": "libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x" }, "product_reference": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64" }, "product_reference": "libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1.0.1i-27.28.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.ppc64le" }, "product_reference": "openssl-1.0.1i-27.28.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1.0.1i-27.28.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.s390x" }, "product_reference": "openssl-1.0.1i-27.28.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1.0.1i-27.28.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.x86_64" }, "product_reference": "openssl-1.0.1i-27.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-doc-1.0.1i-27.28.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.28.1.noarch" }, "product_reference": "openssl-doc-1.0.1i-27.28.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2108", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2108" } ], "notes": [ { "category": "general", "text": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.28.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2108", "url": "https://www.suse.com/security/cve/CVE-2016-2108" }, { "category": "external", "summary": "SUSE Bug 1001502 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1001502" }, { "category": "external", "summary": "SUSE Bug 1004499 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1004499" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-2108", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 977584 for CVE-2016-2108", "url": "https://bugzilla.suse.com/977584" }, { "category": "external", "summary": "SUSE Bug 977617 for CVE-2016-2108", "url": "https://bugzilla.suse.com/977617" }, { "category": "external", "summary": "SUSE Bug 978492 for CVE-2016-2108", "url": "https://bugzilla.suse.com/978492" }, { "category": "external", "summary": "SUSE Bug 989345 for CVE-2016-2108", "url": "https://bugzilla.suse.com/989345" }, { "category": "external", "summary": "SUSE Bug 996067 for CVE-2016-2108", "url": "https://bugzilla.suse.com/996067" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.28.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.28.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-01-16T12:36:33Z", "details": "important" } ], "title": "CVE-2016-2108" }, { "cve": "CVE-2016-7056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7056" } ], "notes": [ { "category": "general", "text": "A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.28.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7056", "url": "https://www.suse.com/security/cve/CVE-2016-7056" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1019334 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1019334" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-7056", "url": "https://bugzilla.suse.com/1148697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.28.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.28.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-01-16T12:36:33Z", "details": "moderate" } ], "title": "CVE-2016-7056" }, { "cve": "CVE-2016-8610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8610" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.28.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8610", "url": "https://www.suse.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1005879 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005879" }, { "category": "external", "summary": "SUSE Bug 1110018 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1110018" }, { "category": "external", "summary": "SUSE Bug 1120592 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1120592" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-8610", "url": "https://bugzilla.suse.com/982575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.28.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.28.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-01-16T12:36:33Z", "details": "important" } ], "title": "CVE-2016-8610" }, { "cve": "CVE-2017-3731", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3731" } ], "notes": [ { "category": "general", "text": "If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.28.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3731", "url": "https://www.suse.com/security/cve/CVE-2017-3731" }, { "category": "external", "summary": "SUSE Bug 1021641 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1021641" }, { "category": "external", "summary": "SUSE Bug 1022085 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1022085" }, { "category": "external", "summary": "SUSE Bug 1064118 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1064118" }, { "category": "external", "summary": "SUSE Bug 1064119 for CVE-2017-3731", "url": "https://bugzilla.suse.com/1064119" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.28.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.28.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-01-16T12:36:33Z", "details": "moderate" } ], "title": "CVE-2017-3731" }, { "cve": "CVE-2017-3735", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-3735" } ], "notes": [ { "category": "general", "text": "While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.28.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-3735", "url": "https://www.suse.com/security/cve/CVE-2017-3735" }, { "category": "external", "summary": "SUSE Bug 1056058 for CVE-2017-3735", "url": "https://bugzilla.suse.com/1056058" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.28.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:libopenssl1_0_0-hmac-32bit-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:openssl-1.0.1i-27.28.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:openssl-doc-1.0.1i-27.28.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-01-16T12:36:33Z", "details": "moderate" } ], "title": "CVE-2017-3735" } ] }
rhsa-2017:0286
Vulnerability from csaf_redhat
Published
2017-02-20 10:56
Modified
2025-08-03 17:28
Summary
Red Hat Security Advisory: openssl security update
Notes
Topic
An update for openssl is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Security Fix(es):
* An integer underflow leading to an out of bounds read flaw was found in OpenSSL. A remote attacker could possibly use this flaw to crash a 32-bit TLS/SSL server or client using OpenSSL if it used the RC4-MD5 cipher suite. (CVE-2017-3731)
* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections form other clients. (CVE-2016-8610)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for openssl is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nSecurity Fix(es):\n\n* An integer underflow leading to an out of bounds read flaw was found in OpenSSL. A remote attacker could possibly use this flaw to crash a 32-bit TLS/SSL server or client using OpenSSL if it used the RC4-MD5 cipher suite. (CVE-2017-3731)\n\n* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections form other clients. (CVE-2016-8610)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0286", "url": "https://access.redhat.com/errata/RHSA-2017:0286" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20170126.txt", "url": "https://www.openssl.org/news/secadv/20170126.txt" }, { "category": "external", "summary": "1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "external", "summary": "1416852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416852" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0286.json" } ], "title": "Red Hat Security Advisory: openssl security update", "tracking": { "current_release_date": "2025-08-03T17:28:06+00:00", "generator": { "date": "2025-08-03T17:28:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:0286", "initial_release_date": "2017-02-20T10:56:12+00:00", "revision_history": [ { "date": "2017-02-20T10:56:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-02-20T10:56:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T17:28:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-48.el6_8.4.x86_64", "product": { "name": "openssl-0:1.0.1e-48.el6_8.4.x86_64", "product_id": "openssl-0:1.0.1e-48.el6_8.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-48.el6_8.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "product": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "product_id": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-48.el6_8.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "product": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "product_id": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-48.el6_8.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "product": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "product_id": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-48.el6_8.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "product": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "product_id": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-48.el6_8.4?arch=x86_64" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-60.el7_3.1.x86_64", "product": { "name": "openssl-1:1.0.1e-60.el7_3.1.x86_64", "product_id": "openssl-1:1.0.1e-60.el7_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-60.el7_3.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "product": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "product_id": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-60.el7_3.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "product": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "product_id": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-60.el7_3.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "product": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "product_id": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-60.el7_3.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "product": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "product_id": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-60.el7_3.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "product": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "product_id": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-60.el7_3.1?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-48.el6_8.4.i686", "product": { "name": "openssl-0:1.0.1e-48.el6_8.4.i686", "product_id": "openssl-0:1.0.1e-48.el6_8.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-48.el6_8.4?arch=i686" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "product": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "product_id": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-48.el6_8.4?arch=i686" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-48.el6_8.4.i686", "product": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.i686", "product_id": "openssl-devel-0:1.0.1e-48.el6_8.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-48.el6_8.4?arch=i686" } } }, { "category": "product_version", "name": "openssl-static-0:1.0.1e-48.el6_8.4.i686", "product": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.i686", "product_id": "openssl-static-0:1.0.1e-48.el6_8.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-48.el6_8.4?arch=i686" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-48.el6_8.4.i686", "product": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.i686", "product_id": "openssl-perl-0:1.0.1e-48.el6_8.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-48.el6_8.4?arch=i686" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-60.el7_3.1.i686", "product": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.i686", "product_id": "openssl-devel-1:1.0.1e-60.el7_3.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-60.el7_3.1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-60.el7_3.1.i686", "product": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.i686", "product_id": "openssl-libs-1:1.0.1e-60.el7_3.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-60.el7_3.1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "product": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "product_id": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-60.el7_3.1?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-60.el7_3.1.i686", "product": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.i686", "product_id": "openssl-static-1:1.0.1e-60.el7_3.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-60.el7_3.1?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-48.el6_8.4.src", "product": { "name": "openssl-0:1.0.1e-48.el6_8.4.src", "product_id": "openssl-0:1.0.1e-48.el6_8.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-48.el6_8.4?arch=src" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-60.el7_3.1.src", "product": { "name": "openssl-1:1.0.1e-60.el7_3.1.src", "product_id": "openssl-1:1.0.1e-60.el7_3.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-60.el7_3.1?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openssl-static-0:1.0.1e-48.el6_8.4.s390x", "product": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.s390x", "product_id": "openssl-static-0:1.0.1e-48.el6_8.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-48.el6_8.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "product": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "product_id": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-48.el6_8.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "product": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "product_id": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-48.el6_8.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-48.el6_8.4.s390x", "product": { "name": "openssl-0:1.0.1e-48.el6_8.4.s390x", "product_id": "openssl-0:1.0.1e-48.el6_8.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-48.el6_8.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "product": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "product_id": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-48.el6_8.4?arch=s390x" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-60.el7_3.1.s390x", "product": { "name": "openssl-1:1.0.1e-60.el7_3.1.s390x", "product_id": "openssl-1:1.0.1e-60.el7_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-60.el7_3.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "product": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "product_id": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-60.el7_3.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "product": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "product_id": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-60.el7_3.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "product": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "product_id": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-60.el7_3.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "product": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "product_id": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-60.el7_3.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390x", "product": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390x", "product_id": "openssl-static-1:1.0.1e-60.el7_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-60.el7_3.1?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "product": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "product_id": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-48.el6_8.4?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "product": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "product_id": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-48.el6_8.4?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "product": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "product_id": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-48.el6_8.4?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-0:1.0.1e-48.el6_8.4.ppc64", "product": { "name": "openssl-0:1.0.1e-48.el6_8.4.ppc64", "product_id": "openssl-0:1.0.1e-48.el6_8.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-48.el6_8.4?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "product": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "product_id": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-48.el6_8.4?arch=ppc64" } } }, { "category": "product_version", "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64", "product": { "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64", "product_id": "openssl-1:1.0.1e-60.el7_3.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-60.el7_3.1?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "product": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "product_id": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-60.el7_3.1?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "product": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "product_id": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-60.el7_3.1?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "product": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "product_id": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-60.el7_3.1?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "product": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "product_id": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-60.el7_3.1?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "product": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "product_id": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-60.el7_3.1?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-48.el6_8.4.ppc", "product": { "name": "openssl-0:1.0.1e-48.el6_8.4.ppc", "product_id": "openssl-0:1.0.1e-48.el6_8.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-48.el6_8.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "product": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "product_id": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-48.el6_8.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "product": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "product_id": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-48.el6_8.4?arch=ppc" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "product": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "product_id": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-60.el7_3.1?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "product": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "product_id": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-60.el7_3.1?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "product": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "product_id": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-60.el7_3.1?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc", "product": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc", "product_id": "openssl-static-1:1.0.1e-60.el7_3.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-60.el7_3.1?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "openssl-0:1.0.1e-48.el6_8.4.s390", "product": { "name": "openssl-0:1.0.1e-48.el6_8.4.s390", "product_id": "openssl-0:1.0.1e-48.el6_8.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-48.el6_8.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "product": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "product_id": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-48.el6_8.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390", "product": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390", "product_id": "openssl-devel-0:1.0.1e-48.el6_8.4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-48.el6_8.4?arch=s390" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390", "product": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390", "product_id": "openssl-devel-1:1.0.1e-60.el7_3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-60.el7_3.1?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390", "product": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390", "product_id": "openssl-libs-1:1.0.1e-60.el7_3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-60.el7_3.1?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "product": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "product_id": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-60.el7_3.1?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390", "product": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390", "product_id": "openssl-static-1:1.0.1e-60.el7_3.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-60.el7_3.1?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64le", "product": { "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64le", "product_id": "openssl-1:1.0.1e-60.el7_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-60.el7_3.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "product": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "product_id": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-60.el7_3.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "product": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "product_id": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-60.el7_3.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "product": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "product_id": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-60.el7_3.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "product": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "product_id": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-60.el7_3.1?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "product": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "product_id": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-60.el7_3.1?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openssl-1:1.0.1e-60.el7_3.1.aarch64", "product": { "name": "openssl-1:1.0.1e-60.el7_3.1.aarch64", "product_id": "openssl-1:1.0.1e-60.el7_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl@1.0.1e-60.el7_3.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "product": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "product_id": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-devel@1.0.1e-60.el7_3.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "product": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "product_id": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-libs@1.0.1e-60.el7_3.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "product": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "product_id": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-debuginfo@1.0.1e-60.el7_3.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "product": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "product_id": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-perl@1.0.1e-60.el7_3.1?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "product": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "product_id": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openssl-static@1.0.1e-60.el7_3.1?arch=aarch64\u0026epoch=1" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.src", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.src", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.src", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.src", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.src", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.src", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.src", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.src", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.s390", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64" }, "product_reference": "openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.src", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Client-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.src", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Client-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.src", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.src", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.src", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.src", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.src", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Workstation-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.src", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.i686", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.s390", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64" }, "product_reference": "openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.3.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc." } ], "cve": "CVE-2016-8610", "discovery_date": "2016-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384743" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "Vulnerability description" }, { "category": "summary", "text": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects applications that are compiled against OpenSSL or GnuTLS and do not allocate an extra thread for processing ClientHello messages. Nginx is affected by this issue; Apache httpd is not affected by this issue. This issue has been rated as having a security impact of Moderate. It requires an attacker to send a very large amount of SSL ALERT messages to the host network connection. This issue can also be mitigated by configuring firewalls to limit the number of connections per IP address, or use deep packet inspection to reject these type of alert packets. A future update may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "RHBZ#1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8610", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8610" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610" }, { "category": "external", "summary": "http://security.360.cn/cve/CVE-2016-8610", "url": "http://security.360.cn/cve/CVE-2016-8610" } ], "release_date": "2016-10-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-20T10:56:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0286" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS" }, { "cve": "CVE-2017-3731", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1416852" } ], "notes": [ { "category": "description", "text": "An integer underflow leading to an out of bounds read flaw was found in OpenSSL. A remote attacker could possibly use this flaw to crash a 32-bit TLS/SSL server or client using OpenSSL if it used the RC4-MD5 cipher suite.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Truncated packet could crash via OOB read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3731" }, { "category": "external", "summary": "RHBZ#1416852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416852" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3731", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3731" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3731", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3731" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20170126.txt", "url": "https://www.openssl.org/news/secadv/20170126.txt" } ], "release_date": "2017-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-02-20T10:56:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.", "product_ids": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0286" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Client-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Client-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Client-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Client-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6ComputeNode-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6ComputeNode-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6ComputeNode-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Server-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Server-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Server-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Server-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Workstation-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.src", "6Workstation-optional-6.8.z:openssl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-debuginfo-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-devel-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-perl-0:1.0.1e-48.el6_8.4.x86_64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.i686", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.ppc64", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.s390x", "6Workstation-optional-6.8.z:openssl-static-0:1.0.1e-48.el6_8.4.x86_64", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Client-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Client-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Client-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Client-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7ComputeNode-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7ComputeNode-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7ComputeNode-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Server-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Server-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Server-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Server-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Workstation-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.src", "7Workstation-optional-7.3.Z:openssl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-debuginfo-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-devel-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-libs-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-perl-1:1.0.1e-60.el7_3.1.x86_64", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.aarch64", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.i686", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.ppc64le", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.s390x", "7Workstation-optional-7.3.Z:openssl-static-1:1.0.1e-60.el7_3.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Truncated packet could crash via OOB read" } ] }
rhsa-2017:1801
Vulnerability from csaf_redhat
Published
2017-07-25 16:44
Modified
2025-08-03 16:00
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 Service Pack 1 security update
Notes
Topic
An update is now available for Red Hat JBoss Web Server 3.1 for RHEL 6 and Red Hat JBoss Web Server 3.1 for RHEL 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.
This release of Red Hat JBoss Web Server 3.1 Service Pack 1 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645)
* A vulnerability was discovered in tomcat's handling of pipelined requests when "Sendfile" was used. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure. (CVE-2017-5647)
* A vulnerability was discovered in the error page mechanism in Tomcat's DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. (CVE-2017-5664)
* A vulnerability was discovered in tomcat. When running an untrusted application under a SecurityManager it was possible, under some circumstances, for that application to retain references to the request or response objects and thereby access and/or modify information associated with another web application. (CVE-2017-5648)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Web Server 3.1 for RHEL 6 and Red Hat JBoss Web Server 3.1 for RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 3.1 Service Pack 1 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645)\n\n* A vulnerability was discovered in tomcat\u0027s handling of pipelined requests when \"Sendfile\" was used. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure. (CVE-2017-5647)\n\n* A vulnerability was discovered in the error page mechanism in Tomcat\u0027s DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. (CVE-2017-5664)\n\n* A vulnerability was discovered in tomcat. When running an untrusted application under a SecurityManager it was possible, under some circumstances, for that application to retain references to the request or response objects and thereby access and/or modify information associated with another web application. (CVE-2017-5648)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:1801", "url": "https://access.redhat.com/errata/RHSA-2017:1801" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1441205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441205" }, { "category": "external", "summary": "1441223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441223" }, { "category": "external", "summary": "1443635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443635" }, { "category": "external", "summary": "1459158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459158" }, { "category": "external", "summary": "JWS-657", "url": "https://issues.redhat.com/browse/JWS-657" }, { "category": "external", "summary": "JWS-667", "url": "https://issues.redhat.com/browse/JWS-667" }, { "category": "external", "summary": "JWS-695", "url": "https://issues.redhat.com/browse/JWS-695" }, { "category": "external", "summary": "JWS-709", "url": "https://issues.redhat.com/browse/JWS-709" }, { "category": "external", "summary": "JWS-716", "url": "https://issues.redhat.com/browse/JWS-716" }, { "category": "external", "summary": "JWS-717", "url": "https://issues.redhat.com/browse/JWS-717" }, { "category": "external", "summary": "JWS-725", "url": "https://issues.redhat.com/browse/JWS-725" }, { "category": "external", "summary": "JWS-741", "url": "https://issues.redhat.com/browse/JWS-741" }, { "category": "external", "summary": "JWS-760", "url": "https://issues.redhat.com/browse/JWS-760" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1801.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 3.1.0 Service Pack 1 security update", "tracking": { "current_release_date": "2025-08-03T16:00:50+00:00", "generator": { "date": "2025-08-03T16:00:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:1801", "initial_release_date": "2017-07-25T16:44:35+00:00", "revision_history": [ { "date": "2017-07-25T16:44:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-07-25T16:44:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T16:00:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 3.1 for RHEL 7", "product": { "name": "Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 3.1 for RHEL 6", "product": { "name": "Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "product": { "name": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "product_id": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.2.8-10.redhat_10.ep7.el7?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "product": { "name": "tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "product_id": "tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.2.8-10.redhat_10.ep7.el7?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "product": { "name": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "product_id": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.2.8-10.redhat_10.ep7.el6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "product": { "name": "tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "product_id": "tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.2.8-10.redhat_10.ep7.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "product": { "name": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "product_id": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.2.8-10.redhat_10.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "product": { "name": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "product_id": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/log4j-eap6@1.2.16-12.redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.70-22.ep7.el7.src", "product": { "name": "tomcat7-0:7.0.70-22.ep7.el7.src", "product_id": "tomcat7-0:7.0.70-22.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.70-22.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "tomcat8-0:8.0.36-24.ep7.el7.src", "product": { "name": "tomcat8-0:8.0.36-24.ep7.el7.src", "product_id": "tomcat8-0:8.0.36-24.ep7.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8@8.0.36-24.ep7.el7?arch=src" } } }, { "category": "product_version", "name": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "product": { "name": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "product_id": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.2.8-10.redhat_10.ep7.el6?arch=src" } } }, { "category": "product_version", "name": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "product": { "name": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "product_id": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/log4j-eap6@1.2.16-12.redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "tomcat8-0:8.0.36-24.ep7.el6.src", "product": { "name": "tomcat8-0:8.0.36-24.ep7.el6.src", "product_id": "tomcat8-0:8.0.36-24.ep7.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8@8.0.36-24.ep7.el6?arch=src" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.70-22.ep7.el6.src", "product": { "name": "tomcat7-0:7.0.70-22.ep7.el6.src", "product_id": "tomcat7-0:7.0.70-22.ep7.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.70-22.ep7.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "product": { "name": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "product_id": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/log4j-eap6@1.2.16-12.redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.70-22.ep7.el7.noarch", "product": { "name": "tomcat7-0:7.0.70-22.ep7.el7.noarch", "product_id": "tomcat7-0:7.0.70-22.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.70-22.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "product": { "name": "tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "product_id": "tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.70-22.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "product": { "name": "tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "product_id": "tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-lib@7.0.70-22.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "product": { "name": "tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "product_id": "tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-el-2.2-api@7.0.70-22.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "product": { "name": "tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "product_id": "tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-jsvc@7.0.70-22.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "product": { "name": "tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "product_id": "tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.70-22.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "product": { "name": "tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "product_id": "tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.70-22.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "product": { "name": "tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "product_id": "tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.70-22.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "product": { "name": "tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "product_id": "tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.70-22.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "product": { "name": "tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "product_id": "tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-selinux@7.0.70-22.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "product": { "name": "tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "product_id": "tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.70-22.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "product": { "name": "tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "product_id": "tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.70-22.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-0:8.0.36-24.ep7.el7.noarch", "product": { "name": "tomcat8-0:8.0.36-24.ep7.el7.noarch", "product_id": "tomcat8-0:8.0.36-24.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8@8.0.36-24.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "product": { "name": "tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "product_id": "tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-servlet-3.1-api@8.0.36-24.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch", "product": { "name": "tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch", "product_id": "tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-webapps@8.0.36-24.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "product": { "name": "tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "product_id": "tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-jsp-2.3-api@8.0.36-24.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "product": { "name": "tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "product_id": "tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-el-2.2-api@8.0.36-24.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "product": { "name": "tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "product_id": "tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-docs-webapp@8.0.36-24.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "product": { "name": "tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "product_id": "tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-selinux@8.0.36-24.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "product": { "name": "tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "product_id": "tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-admin-webapps@8.0.36-24.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "product": { "name": "tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "product_id": "tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-javadoc@8.0.36-24.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "product": { "name": "tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "product_id": "tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-jsvc@8.0.36-24.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "product": { "name": "tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "product_id": "tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-lib@8.0.36-24.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "product": { "name": "tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "product_id": "tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-log4j@8.0.36-24.ep7.el7?arch=noarch" } } }, { "category": "product_version", "name": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "product": { "name": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "product_id": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/log4j-eap6@1.2.16-12.redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-0:8.0.36-24.ep7.el6.noarch", "product": { "name": "tomcat8-0:8.0.36-24.ep7.el6.noarch", "product_id": "tomcat8-0:8.0.36-24.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8@8.0.36-24.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "product": { "name": "tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "product_id": "tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-webapps@8.0.36-24.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "product": { "name": "tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "product_id": "tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-jsp-2.3-api@8.0.36-24.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "product": { "name": "tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "product_id": "tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-servlet-3.1-api@8.0.36-24.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "product": { "name": "tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "product_id": "tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-selinux@8.0.36-24.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "product": { "name": "tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "product_id": "tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-el-2.2-api@8.0.36-24.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "product": { "name": "tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "product_id": "tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-docs-webapp@8.0.36-24.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "product": { "name": "tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "product_id": "tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-admin-webapps@8.0.36-24.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "product": { "name": "tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "product_id": "tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-javadoc@8.0.36-24.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "product": { "name": "tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "product_id": "tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-jsvc@8.0.36-24.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "product": { "name": "tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "product_id": "tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-lib@8.0.36-24.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "product": { "name": "tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "product_id": "tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat8-log4j@8.0.36-24.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.70-22.ep7.el6.noarch", "product": { "name": "tomcat7-0:7.0.70-22.ep7.el6.noarch", "product_id": "tomcat7-0:7.0.70-22.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.70-22.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "product": { "name": "tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "product_id": "tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.70-22.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "product": { "name": "tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "product_id": "tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-el-2.2-api@7.0.70-22.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "product": { "name": "tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "product_id": "tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-lib@7.0.70-22.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "product": { "name": "tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "product_id": "tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-jsvc@7.0.70-22.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "product": { "name": "tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "product_id": "tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.70-22.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "product": { "name": "tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "product_id": "tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.70-22.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "product": { "name": "tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "product_id": "tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.70-22.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "product": { "name": "tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "product_id": "tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.70-22.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "product": { "name": "tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "product_id": "tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-selinux@7.0.70-22.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "product": { "name": "tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "product_id": "tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.70-22.ep7.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "product": { "name": "tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "product_id": "tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.70-22.ep7.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "product": { "name": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "product_id": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native@1.2.8-10.redhat_10.ep7.el6?arch=i686" } } }, { "category": "product_version", "name": "tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "product": { "name": "tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "product_id": "tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat-native-debuginfo@1.2.8-10.redhat_10.ep7.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch" }, "product_reference": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src" }, "product_reference": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686 as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686" }, "product_reference": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src" }, "product_reference": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64" }, "product_reference": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686 as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686" }, "product_reference": "tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64" }, "product_reference": "tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.70-22.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch" }, "product_reference": "tomcat7-0:7.0.70-22.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.70-22.ep7.el6.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src" }, "product_reference": "tomcat7-0:7.0.70-22.ep7.el6.src", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch" }, "product_reference": "tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch" }, "product_reference": "tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch" }, "product_reference": "tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch" }, "product_reference": "tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch" }, "product_reference": "tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch" }, "product_reference": "tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-lib-0:7.0.70-22.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch" }, "product_reference": "tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch" }, "product_reference": "tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch" }, "product_reference": "tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch" }, "product_reference": "tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch" }, "product_reference": "tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-0:8.0.36-24.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch" }, "product_reference": "tomcat8-0:8.0.36-24.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-0:8.0.36-24.ep7.el6.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src" }, "product_reference": "tomcat8-0:8.0.36-24.ep7.el6.src", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch" }, "product_reference": "tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch" }, "product_reference": "tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch" }, "product_reference": "tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch" }, "product_reference": "tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch" }, "product_reference": "tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch" }, "product_reference": "tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-lib-0:8.0.36-24.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch" }, "product_reference": "tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch" }, "product_reference": "tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch" }, "product_reference": "tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch" }, "product_reference": "tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 6", "product_id": "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch" }, "product_reference": "tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "relates_to_product_reference": "6Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch" }, "product_reference": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src" }, "product_reference": "log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src" }, "product_reference": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64" }, "product_reference": "tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64 as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64" }, "product_reference": "tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.70-22.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch" }, "product_reference": "tomcat7-0:7.0.70-22.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.70-22.ep7.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src" }, "product_reference": "tomcat7-0:7.0.70-22.ep7.el7.src", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch" }, "product_reference": "tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch" }, "product_reference": "tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch" }, "product_reference": "tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch" }, "product_reference": "tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch" }, "product_reference": "tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch" }, "product_reference": "tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-lib-0:7.0.70-22.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch" }, "product_reference": "tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch" }, "product_reference": "tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch" }, "product_reference": "tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch" }, "product_reference": "tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch" }, "product_reference": "tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-0:8.0.36-24.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch" }, "product_reference": "tomcat8-0:8.0.36-24.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-0:8.0.36-24.ep7.el7.src as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src" }, "product_reference": "tomcat8-0:8.0.36-24.ep7.el7.src", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch" }, "product_reference": "tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch" }, "product_reference": "tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch" }, "product_reference": "tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch" }, "product_reference": "tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch" }, "product_reference": "tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch" }, "product_reference": "tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-lib-0:8.0.36-24.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch" }, "product_reference": "tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch" }, "product_reference": "tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch" }, "product_reference": "tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch" }, "product_reference": "tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch as a component of Red Hat JBoss Web Server 3.1 for RHEL 7", "product_id": "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" }, "product_reference": "tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch", "relates_to_product_reference": "7Server-JWS-3.1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc.", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-6304", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2016-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1377600" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: OCSP Status Request extension unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "TLS server applications using OpenSSL versions in Red Hat Enterprise Linux 6 and 7 are only affected if they enable OCSP stapling support. Applications not enabling OCSP stapling support are not affected. Few applications implement OCSP stapling support and typically do not enable it by default.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6304" }, { "category": "external", "summary": "RHBZ#1377600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6304", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-25T16:44:35+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1801" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: OCSP Status Request extension unbounded memory growth" }, { "cve": "CVE-2016-7056", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2017-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1412120" } ], "notes": [ { "category": "description", "text": "A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: ECDSA P-256 timing attack key recovery", "title": "Vulnerability summary" }, { "category": "other", "text": "In order to exploit this flaw, the attacker needs to be have local (shell) access to the machine where the message is being signed using the ECDSA algorithm with a P-256 elliptic curve key. Then using cache timing attacks (which needs precise timing), on multiple signature runs, the private key could be obtained. Based on the factor that exploitation is difficult, Red Hat Product Security Team has rated this flaw as having Moderate impact. A further security release may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7056" }, { "category": "external", "summary": "RHBZ#1412120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7056", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7056" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7056", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7056" } ], "release_date": "2017-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-25T16:44:35+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1801" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: ECDSA P-256 timing attack key recovery" }, { "acknowledgments": [ { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc." } ], "cve": "CVE-2016-8610", "discovery_date": "2016-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384743" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "Vulnerability description" }, { "category": "summary", "text": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects applications that are compiled against OpenSSL or GnuTLS and do not allocate an extra thread for processing ClientHello messages. Nginx is affected by this issue; Apache httpd is not affected by this issue. This issue has been rated as having a security impact of Moderate. It requires an attacker to send a very large amount of SSL ALERT messages to the host network connection. This issue can also be mitigated by configuring firewalls to limit the number of connections per IP address, or use deep packet inspection to reject these type of alert packets. A future update may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "RHBZ#1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8610", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8610" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610" }, { "category": "external", "summary": "http://security.360.cn/cve/CVE-2016-8610", "url": "http://security.360.cn/cve/CVE-2016-8610" } ], "release_date": "2016-10-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-25T16:44:35+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1801" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS" }, { "cve": "CVE-2017-5645", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2017-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1443635" } ], "notes": [ { "category": "description", "text": "It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Socket receiver deserialization vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "The flaw in Log4j-1.x is now identified by CVE-2019-17571. CVE-2017-5645 has been assigned by MITRE to a similar flaw identified in Log4j-2.x", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5645" }, { "category": "external", "summary": "RHBZ#1443635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443635" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5645", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5645" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5645", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5645" } ], "release_date": "2017-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-25T16:44:35+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1801" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j: Socket receiver deserialization vulnerability" }, { "cve": "CVE-2017-5647", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1441205" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in Tomcat\u0027s handling of pipelined requests when \"Sendfile\" was used. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incorrect handling of pipelined requests when send file was used", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5647" }, { "category": "external", "summary": "RHBZ#1441205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441205" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5647", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5647" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5647", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5647" } ], "release_date": "2017-04-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-25T16:44:35+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1801" }, { "category": "workaround", "details": "The AJP connector does not support the sendfile capability. A server configured to only use the AJP connector (disable HTTP Connector) is not affected by this vulnerability.\n\nDisable the sendfile capability by setting useSendfile=\"false\" in the HTTP connector configuration. Note: Disabling sendfile, may impact performance on large files.", "product_ids": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Incorrect handling of pipelined requests when send file was used" }, { "cve": "CVE-2017-5648", "discovery_date": "2017-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1441223" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in tomcat. When running an untrusted application under a SecurityManager it was possible, under some circumstances, for that application to retain references to the request or response objects and thereby access and/or modify information associated with another web application.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Calls to application listeners did not use the appropriate facade object", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5648" }, { "category": "external", "summary": "RHBZ#1441223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441223" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5648", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5648" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5648", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5648" } ], "release_date": "2017-04-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-25T16:44:35+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1801" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Calls to application listeners did not use the appropriate facade object" }, { "cve": "CVE-2017-5664", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2017-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1459158" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in the error page mechanism in Tomcat\u0027s DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Security constrained bypass in error page mechanism", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw can be triggered for static error pages only if the readonly property for the DefaultServlet is set to false in the $CATALINA_HOME/conf/web.xml file. The default for readonly is true.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5664" }, { "category": "external", "summary": "RHBZ#1459158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459158" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5664", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5664" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5664", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5664" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.78", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.78" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.44", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.44" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.15", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.15" } ], "release_date": "2017-06-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-25T16:44:35+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1801" }, { "category": "workaround", "details": "If it is necessary to have the DefaultServlet property readonly=false, use a jsp error page, for example Error404.jsp rather than a static html error page. Alternatively do not specify an error-page in the Deployment Descriptor and use a custom ErrorReportValve.", "product_ids": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Security constrained bypass in error page mechanism" }, { "cve": "CVE-2017-7674", "discovery_date": "2017-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1480618" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in Tomcat where the CORS Filter did not send a \"Vary: Origin\" HTTP header. This potentially allowed sensitive data to be leaked to other visitors through both client-side and server-side caches.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Vary header not added by CORS filter leading to cache poisoning", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7674" }, { "category": "external", "summary": "RHBZ#1480618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480618" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7674", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7674" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html", "url": "https://tomcat.apache.org/security-7.html" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html", "url": "https://tomcat.apache.org/security-8.html" } ], "release_date": "2017-08-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-25T16:44:35+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1801" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Vary header not added by CORS filter leading to cache poisoning" }, { "cve": "CVE-2019-17571", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1785616" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in Log4j, where a vulnerable SocketServer class may lead to the deserialization of untrusted data. This flaw allows an attacker to remotely execute arbitrary code when combined with a deserialization gadget.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: deserialization of untrusted data in SocketServer", "title": "Vulnerability summary" }, { "category": "other", "text": "This is the same issue as CVE-2017-5645. MITRE has CVE-2017-5645 to a similar flaw found in log4j-2.x. The flaw found in log4j-1.2 has been assigned CVE-2019-17571. CVE-2019-17571 has been addressed in Red Hat Enterprise Linux via RHSA-2017:2423.\nAlso the rh-java-common-log4j package shipped with Red Hat Software Collections was addressed via RHSA-2017:1417\n\nIn Satellite 5.8, although the version of log4j as shipped in the nutch package is affected, nutch does not load any of the SocketServer classes from log4j. Satellite 5 is considered not vulnerable to this flaw since the affected code can not be reached.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17571" }, { "category": "external", "summary": "RHBZ#1785616", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785616" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17571", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17571" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17571", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17571" } ], "release_date": "2019-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-25T16:44:35+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1801" }, { "category": "workaround", "details": "Please note that the Log4j upstream strongly recommends against using the SerializedLayout with the SocketAppenders. Customers may mitigate this issue by removing the SocketServer class outright; or if they must continue to use SocketAppenders, they can modify their SocketAppender configuration from SerializedLayout to use JsonLayout instead. An example of this in log4j-server.properties might look like this:\n\nlog4j.appender.file.layout=org.apache.log4j.JsonLayout", "product_ids": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.noarch", "6Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.src", "6Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.i686", "6Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el6.x86_64", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el6.src", "6Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el6.src", "6Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el6.noarch", "6Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el6.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.noarch", "7Server-JWS-3.1:log4j-eap6-0:1.2.16-12.redhat_3.1.ep6.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.src", "7Server-JWS-3.1:tomcat-native-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat-native-debuginfo-0:1.2.8-10.redhat_10.ep7.el7.x86_64", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-0:7.0.70-22.ep7.el7.src", "7Server-JWS-3.1:tomcat7-admin-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-docs-webapp-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-el-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-javadoc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsp-2.2-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-jsvc-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-lib-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-log4j-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-selinux-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-servlet-3.0-api-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat7-webapps-0:7.0.70-22.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-0:8.0.36-24.ep7.el7.src", "7Server-JWS-3.1:tomcat8-admin-webapps-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-docs-webapp-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-el-2.2-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-javadoc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsp-2.3-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-jsvc-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-lib-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-log4j-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-selinux-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-servlet-3.1-api-0:8.0.36-24.ep7.el7.noarch", "7Server-JWS-3.1:tomcat8-webapps-0:8.0.36-24.ep7.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j: deserialization of untrusted data in SocketServer" } ] }
rhsa-2017:2493
Vulnerability from csaf_redhat
Published
2017-08-21 15:33
Modified
2025-08-03 16:01
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server 2 security update
Notes
Topic
An update is now available for Red Hat JBoss Enterprise Web Server 2.1.2 for Red Hat Enterprise Linux 6 and Red Hat JBoss Enterprise Web Server 2.1.2 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
This release provides an update to OpenSSL and Tomcat 6/7 for Red Hat JBoss Web Server 2.1.2. The updates are documented in the Release Notes document linked to in the References.
Users of Red Hat JBoss Web Server 2.1.2 should upgrade to these updated packages, which resolve several security issues.
Security Fix(es):
* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304)
* A vulnerability was discovered in tomcat's handling of pipelined requests when "Sendfile" was used. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure. (CVE-2017-5647)
* A vulnerability was discovered in the error page mechanism in Tomcat's DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. (CVE-2017-5664)
* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients. (CVE-2016-8610)
Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Web Server 2.1.2 for Red Hat Enterprise Linux 6 and Red Hat JBoss Enterprise Web Server 2.1.2 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nApache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nThis release provides an update to OpenSSL and Tomcat 6/7 for Red Hat JBoss Web Server 2.1.2. The updates are documented in the Release Notes document linked to in the References.\n\nUsers of Red Hat JBoss Web Server 2.1.2 should upgrade to these updated packages, which resolve several security issues.\n\nSecurity Fix(es):\n\n* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304)\n\n* A vulnerability was discovered in tomcat\u0027s handling of pipelined requests when \"Sendfile\" was used. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure. (CVE-2017-5647)\n\n* A vulnerability was discovered in the error page mechanism in Tomcat\u0027s DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. (CVE-2017-5664)\n\n* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients. (CVE-2016-8610)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:2493", "url": "https://access.redhat.com/errata/RHSA-2017:2493" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/3155411", "url": "https://access.redhat.com/articles/3155411" }, { "category": "external", "summary": "1377600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600" }, { "category": "external", "summary": "1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "external", "summary": "1441205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441205" }, { "category": "external", "summary": "1459158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459158" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2493.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2 security update", "tracking": { "current_release_date": "2025-08-03T16:01:12+00:00", "generator": { "date": "2025-08-03T16:01:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:2493", "initial_release_date": "2017-08-21T15:33:48+00:00", "revision_history": [ { "date": "2017-08-21T15:33:48+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-08-21T15:33:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T16:01:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product": { "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el6" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product": { "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.54-25_patch_05.ep6.el6.src", "product": { "name": "tomcat7-0:7.0.54-25_patch_05.ep6.el6.src", "product_id": "tomcat7-0:7.0.54-25_patch_05.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.54-25_patch_05.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.41-17_patch_04.ep6.el6.src", "product": { "name": "tomcat6-0:6.0.41-17_patch_04.ep6.el6.src", "product_id": "tomcat6-0:6.0.41-17_patch_04.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.41-17_patch_04.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.54-25_patch_05.ep6.el7.src", "product": { "name": "tomcat7-0:7.0.54-25_patch_05.ep6.el7.src", "product_id": "tomcat7-0:7.0.54-25_patch_05.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.54-25_patch_05.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.41-17_patch_04.ep6.el7.src", "product": { "name": "tomcat6-0:6.0.41-17_patch_04.ep6.el7.src", "product_id": "tomcat6-0:6.0.41-17_patch_04.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.41-17_patch_04.ep6.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch", "product": { "name": "tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_id": "tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-maven-devel@7.0.54-25_patch_05.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch", "product": { "name": "tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_id": "tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.54-25_patch_05.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "product": { "name": "tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_id": "tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.54-25_patch_05.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "product": { "name": "tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_id": "tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.54-25_patch_05.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "product": { "name": "tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_id": "tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.54-25_patch_05.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch", "product": { "name": "tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_id": "tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.54-25_patch_05.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch", "product": { "name": "tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_id": "tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.54-25_patch_05.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "product": { "name": "tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_id": "tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.54-25_patch_05.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch", "product": { "name": "tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_id": "tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.54-25_patch_05.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "product": { "name": "tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_id": "tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-el-2.2-api@7.0.54-25_patch_05.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch", "product": { "name": "tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_id": "tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-lib@7.0.54-25_patch_05.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "product": { "name": "tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_id": "tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.41-17_patch_04.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch", "product": { "name": "tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_id": "tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.41-17_patch_04.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch", "product": { "name": "tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_id": "tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.41-17_patch_04.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch", "product": { "name": "tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_id": "tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.41-17_patch_04.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "product": { "name": "tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_id": "tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.41-17_patch_04.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch", "product": { "name": "tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_id": "tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.41-17_patch_04.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "product": { "name": "tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_id": "tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-el-2.1-api@6.0.41-17_patch_04.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch", "product": { "name": "tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_id": "tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-maven-devel@6.0.41-17_patch_04.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "product": { "name": "tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_id": "tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.41-17_patch_04.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "product": { "name": "tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_id": "tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.41-17_patch_04.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch", "product": { "name": "tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_id": "tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.41-17_patch_04.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "product": { "name": "tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_id": "tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.54-25_patch_05.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch", "product": { "name": "tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_id": "tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-maven-devel@7.0.54-25_patch_05.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "product": { "name": "tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_id": "tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.54-25_patch_05.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch", "product": { "name": "tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_id": "tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.54-25_patch_05.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "product": { "name": "tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_id": "tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.54-25_patch_05.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch", "product": { "name": "tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_id": "tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.54-25_patch_05.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch", "product": { "name": "tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_id": "tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7@7.0.54-25_patch_05.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch", "product": { "name": "tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_id": "tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.54-25_patch_05.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "product": { "name": "tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_id": "tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.54-25_patch_05.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "product": { "name": "tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_id": "tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-el-2.2-api@7.0.54-25_patch_05.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch", "product": { "name": "tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_id": "tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat7-lib@7.0.54-25_patch_05.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "product": { "name": "tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_id": "tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.41-17_patch_04.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch", "product": { "name": "tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_id": "tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.41-17_patch_04.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "product": { "name": "tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_id": "tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.41-17_patch_04.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch", "product": { "name": "tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_id": "tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.41-17_patch_04.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch", "product": { "name": "tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_id": "tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.41-17_patch_04.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch", "product": { "name": "tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_id": "tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.41-17_patch_04.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "product": { "name": "tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_id": "tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-el-2.1-api@6.0.41-17_patch_04.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch", "product": { "name": "tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_id": "tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-maven-devel@6.0.41-17_patch_04.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "product": { "name": "tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_id": "tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.41-17_patch_04.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch", "product": { "name": "tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_id": "tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.41-17_patch_04.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "product": { "name": "tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_id": "tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.41-17_patch_04.ep6.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch" }, "product_reference": "tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.41-17_patch_04.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.src" }, "product_reference": "tomcat6-0:6.0.41-17_patch_04.ep6.el6.src", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch" }, "product_reference": "tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch" }, "product_reference": "tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch" }, "product_reference": "tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.54-25_patch_05.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.src" }, "product_reference": "tomcat7-0:7.0.54-25_patch_05.ep6.el6.src", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch" }, "product_reference": "tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch" }, "product_reference": "tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch" }, "product_reference": "tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch" }, "product_reference": "tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch" }, "product_reference": "tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch" }, "product_reference": "tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch" }, "product_reference": "tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch" }, "product_reference": "tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch" }, "product_reference": "tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server", "product_id": "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch" }, "product_reference": "tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch" }, "product_reference": "tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.41-17_patch_04.ep6.el7.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.src" }, "product_reference": "tomcat6-0:6.0.41-17_patch_04.ep6.el7.src", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch" }, "product_reference": "tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch" }, "product_reference": "tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch" }, "product_reference": "tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-0:7.0.54-25_patch_05.ep6.el7.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.src" }, "product_reference": "tomcat7-0:7.0.54-25_patch_05.ep6.el7.src", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch" }, "product_reference": "tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch" }, "product_reference": "tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch" }, "product_reference": "tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch" }, "product_reference": "tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch" }, "product_reference": "tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch" }, "product_reference": "tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch" }, "product_reference": "tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch" }, "product_reference": "tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch" }, "product_reference": "tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server", "product_id": "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch" }, "product_reference": "tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEWS-2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc.", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-6304", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2016-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1377600" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: OCSP Status Request extension unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "TLS server applications using OpenSSL versions in Red Hat Enterprise Linux 6 and 7 are only affected if they enable OCSP stapling support. Applications not enabling OCSP stapling support are not affected. Few applications implement OCSP stapling support and typically do not enable it by default.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.src", "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.src", "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6304" }, { "category": "external", "summary": "RHBZ#1377600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6304", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-21T15:33:48+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.src", "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.src", "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2493" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.src", "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.src", "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: OCSP Status Request extension unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc." } ], "cve": "CVE-2016-8610", "discovery_date": "2016-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384743" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "Vulnerability description" }, { "category": "summary", "text": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects applications that are compiled against OpenSSL or GnuTLS and do not allocate an extra thread for processing ClientHello messages. Nginx is affected by this issue; Apache httpd is not affected by this issue. This issue has been rated as having a security impact of Moderate. It requires an attacker to send a very large amount of SSL ALERT messages to the host network connection. This issue can also be mitigated by configuring firewalls to limit the number of connections per IP address, or use deep packet inspection to reject these type of alert packets. A future update may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.src", "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.src", "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "RHBZ#1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8610", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8610" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610" }, { "category": "external", "summary": "http://security.360.cn/cve/CVE-2016-8610", "url": "http://security.360.cn/cve/CVE-2016-8610" } ], "release_date": "2016-10-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-21T15:33:48+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.src", "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.src", "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2493" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.src", "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.src", "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS" }, { "cve": "CVE-2017-5647", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1441205" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in Tomcat\u0027s handling of pipelined requests when \"Sendfile\" was used. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incorrect handling of pipelined requests when send file was used", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.src", "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.src", "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5647" }, { "category": "external", "summary": "RHBZ#1441205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441205" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5647", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5647" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5647", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5647" } ], "release_date": "2017-04-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-21T15:33:48+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.src", "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.src", "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2493" }, { "category": "workaround", "details": "The AJP connector does not support the sendfile capability. A server configured to only use the AJP connector (disable HTTP Connector) is not affected by this vulnerability.\n\nDisable the sendfile capability by setting useSendfile=\"false\" in the HTTP connector configuration. Note: Disabling sendfile, may impact performance on large files.", "product_ids": [ "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.src", "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.src", "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.src", "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.src", "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Incorrect handling of pipelined requests when send file was used" }, { "cve": "CVE-2017-5664", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2017-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1459158" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in the error page mechanism in Tomcat\u0027s DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Security constrained bypass in error page mechanism", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw can be triggered for static error pages only if the readonly property for the DefaultServlet is set to false in the $CATALINA_HOME/conf/web.xml file. The default for readonly is true.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.src", "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.src", "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5664" }, { "category": "external", "summary": "RHBZ#1459158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459158" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5664", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5664" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5664", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5664" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.78", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.78" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.44", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.44" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.15", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.15" } ], "release_date": "2017-06-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-21T15:33:48+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.src", "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.src", "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2493" }, { "category": "workaround", "details": "If it is necessary to have the DefaultServlet property readonly=false, use a jsp error page, for example Error404.jsp rather than a static html error page. Alternatively do not specify an error-page in the Deployment Descriptor and use a custom ErrorReportValve.", "product_ids": [ "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.src", "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.src", "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el6.src", "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el6.src", "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el6.noarch", "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el6.noarch", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-0:6.0.41-17_patch_04.ep6.el7.src", "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-17_patch_04.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-0:7.0.54-25_patch_05.ep6.el7.src", "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-25_patch_05.ep6.el7.noarch", "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-25_patch_05.ep6.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Security constrained bypass in error page mechanism" } ] }
rhsa-2017:1414
Vulnerability from csaf_redhat
Published
2017-06-07 17:54
Modified
2025-08-04 11:55
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 6
Notes
Topic
An update is now available for Red Hat JBoss Core Services on RHEL 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.
This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.23, and includes bug fixes, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304)
* It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user's browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack. (CVE-2016-0736)
* It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication. (CVE-2016-2161)
* A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys. (CVE-2016-7056)
* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients. (CVE-2016-8610)
* It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)
* A vulnerability was found in httpd's handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server's available memory, causing httpd to crash. (CVE-2016-8740)
Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Core Services on RHEL 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.23, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304)\n\n* It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack. (CVE-2016-0736)\n\n* It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication. (CVE-2016-2161)\n\n* A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys. (CVE-2016-7056)\n\n* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients. (CVE-2016-8610)\n\n* It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)\n\n* A vulnerability was found in httpd\u0027s handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server\u0027s available memory, causing httpd to crash. (CVE-2016-8740)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:1414", "url": "https://access.redhat.com/errata/RHSA-2017:1414" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/" }, { "category": "external", "summary": "1377600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600" }, { "category": "external", "summary": "1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "external", "summary": "1401528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401528" }, { "category": "external", "summary": "1406744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744" }, { "category": "external", "summary": "1406753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753" }, { "category": "external", "summary": "1406822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822" }, { "category": "external", "summary": "1412120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412120" }, { "category": "external", "summary": "JBCS-318", "url": "https://issues.redhat.com/browse/JBCS-318" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1414.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 6", "tracking": { "current_release_date": "2025-08-04T11:55:37+00:00", "generator": { "date": "2025-08-04T11:55:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:1414", "initial_release_date": "2017-06-07T17:54:17+00:00", "revision_history": [ { "date": "2017-06-07T17:54:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-06-07T17:54:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T11:55:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 6 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-19.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.1-19.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-120.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-120.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-120.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-libs@2.4.23-120.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-120.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-120.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-120.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-120.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-120.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-120.jbcs.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-19.GA.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "product_id": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-120.jbcs.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-19.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.1-19.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-120.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-120.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-120.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-libs@2.4.23-120.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-120.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-120.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-120.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-120.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-120.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-120.jbcs.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.23-120.jbcs.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-0736", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2016-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1406744" } ], "notes": [ { "category": "description", "text": "It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Padding Oracle in Apache mod_session_crypto", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0736" }, { "category": "external", "summary": "RHBZ#1406744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0736", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0736" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25" }, { "category": "external", "summary": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt", "url": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt" } ], "release_date": "2016-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:54:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1414" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Padding Oracle in Apache mod_session_crypto" }, { "cve": "CVE-2016-2161", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1406753" } ], "notes": [ { "category": "description", "text": "It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: DoS vulnerability in mod_auth_digest", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2161" }, { "category": "external", "summary": "RHBZ#1406753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2161", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2161" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25" } ], "release_date": "2016-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:54:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1414" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: DoS vulnerability in mod_auth_digest" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc.", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-6304", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2016-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1377600" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: OCSP Status Request extension unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "TLS server applications using OpenSSL versions in Red Hat Enterprise Linux 6 and 7 are only affected if they enable OCSP stapling support. Applications not enabling OCSP stapling support are not affected. Few applications implement OCSP stapling support and typically do not enable it by default.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6304" }, { "category": "external", "summary": "RHBZ#1377600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6304", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:54:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1414" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: OCSP Status Request extension unbounded memory growth" }, { "cve": "CVE-2016-7056", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2017-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1412120" } ], "notes": [ { "category": "description", "text": "A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: ECDSA P-256 timing attack key recovery", "title": "Vulnerability summary" }, { "category": "other", "text": "In order to exploit this flaw, the attacker needs to be have local (shell) access to the machine where the message is being signed using the ECDSA algorithm with a P-256 elliptic curve key. Then using cache timing attacks (which needs precise timing), on multiple signature runs, the private key could be obtained. Based on the factor that exploitation is difficult, Red Hat Product Security Team has rated this flaw as having Moderate impact. A further security release may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7056" }, { "category": "external", "summary": "RHBZ#1412120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7056", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7056" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7056", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7056" } ], "release_date": "2017-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:54:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1414" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: ECDSA P-256 timing attack key recovery" }, { "acknowledgments": [ { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc." } ], "cve": "CVE-2016-8610", "discovery_date": "2016-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384743" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "Vulnerability description" }, { "category": "summary", "text": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects applications that are compiled against OpenSSL or GnuTLS and do not allocate an extra thread for processing ClientHello messages. Nginx is affected by this issue; Apache httpd is not affected by this issue. This issue has been rated as having a security impact of Moderate. It requires an attacker to send a very large amount of SSL ALERT messages to the host network connection. This issue can also be mitigated by configuring firewalls to limit the number of connections per IP address, or use deep packet inspection to reject these type of alert packets. A future update may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "RHBZ#1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8610", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8610" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610" }, { "category": "external", "summary": "http://security.360.cn/cve/CVE-2016-8610", "url": "http://security.360.cn/cve/CVE-2016-8610" } ], "release_date": "2016-10-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:54:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1414" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS" }, { "cve": "CVE-2016-8740", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2016-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1401528" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in httpd\u0027s handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server\u0027s available memory, causing httpd to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Incomplete handling of LimitRequestFields directive in mod_http2", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security has rated this issue as having Low security\nimpact. This issue is not currently planned to be addressed in future\nupdates. For additional information, refer to the Issue Severity\nClassification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8740" }, { "category": "external", "summary": "RHBZ#1401528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8740", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8740" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8740", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8740" }, { "category": "external", "summary": "http://seclists.org/bugtraq/2016/Dec/3", "url": "http://seclists.org/bugtraq/2016/Dec/3" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2016-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:54:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1414" }, { "category": "workaround", "details": "As a temporary workaround - HTTP/2 can be disabled by changing\nthe configuration by removing h2 and h2c from the Protocols\nline(s) in the configuration file. \n\nThe resulting line should read:\n\n\t\tProtocols http/1.1", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: Incomplete handling of LimitRequestFields directive in mod_http2" }, { "cve": "CVE-2016-8743", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1406822" } ], "notes": [ { "category": "description", "text": "It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Apache HTTP Request Parsing Whitespace Defects", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8743" }, { "category": "external", "summary": "RHBZ#1406822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8743", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8743" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25" } ], "release_date": "2016-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:54:17+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1414" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Apache HTTP Request Parsing Whitespace Defects" } ] }
rhsa-2017:1658
Vulnerability from csaf_redhat
Published
2017-06-28 20:20
Modified
2025-08-04 11:53
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update
Notes
Topic
An update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 6 and Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.
This release includes bug fixes as well as a new release of OpenSSL. For further information, see the knowledge base article linked to in the References section. All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat Enterprise Linux 7 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect.
Security Fix(es):
* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304)
* It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system. (CVE-2016-2178)
* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections form other clients. (CVE-2016-8610)
* Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2016-2177)
Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 6 and Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.\n\nThis release includes bug fixes as well as a new release of OpenSSL. For further information, see the knowledge base article linked to in the References section. All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat Enterprise Linux 7 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect.\n\nSecurity Fix(es):\n\n* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304)\n\n* It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system. (CVE-2016-2178)\n\n* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections form other clients. (CVE-2016-8610)\n\n* Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2016-2177)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:1658", "url": "https://access.redhat.com/errata/RHSA-2017:1658" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/2688611", "url": "https://access.redhat.com/articles/2688611" }, { "category": "external", "summary": "https://access.redhat.com/solutions/222023", "url": "https://access.redhat.com/solutions/222023" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-enterprise-application-platform/", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-enterprise-application-platform/" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.4", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.4" }, { "category": "external", "summary": "1341705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341705" }, { "category": "external", "summary": "1343400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343400" }, { "category": "external", "summary": "1377600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600" }, { "category": "external", "summary": "1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1658.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update", "tracking": { "current_release_date": "2025-08-04T11:53:21+00:00", "generator": { "date": "2025-08-04T11:53:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:1658", "initial_release_date": "2017-06-28T20:20:17+00:00", "revision_history": [ { "date": "2017-06-28T20:20:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-06-28T20:20:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T11:53:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-13.jbcs.el6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.ppc64", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.ppc64", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.ppc64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.ppc64", "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-13.jbcs.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.ppc64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.ppc64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-13.jbcs.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.ppc64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.ppc64", "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-13.jbcs.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.ppc64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.ppc64", "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-13.jbcs.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.ppc64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.ppc64", "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-13.jbcs.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.ppc64", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.ppc64", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.ppc64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.ppc64", "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-13.jbcs.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.ppc64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.ppc64", "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-13.jbcs.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.ppc64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.ppc64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-13.jbcs.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.ppc64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.ppc64", "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-13.jbcs.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.ppc64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.ppc64", "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-13.jbcs.el6?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-13.jbcs.el6?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.ppc64" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.ppc64", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.ppc64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.ppc64", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.ppc64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.ppc64", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.ppc64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.ppc64", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.ppc64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.ppc64", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.ppc64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.ppc64", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.ppc64" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.ppc64", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.ppc64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.ppc64", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.ppc64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.ppc64", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.ppc64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.ppc64", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.ppc64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.ppc64", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.ppc64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.ppc64", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBEAP-6.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2177", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2016-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1341705" } ], "notes": [ { "category": "description", "text": "Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Possible integer overflow vulnerabilities in codebase", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2177" }, { "category": "external", "summary": "RHBZ#1341705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341705" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2177", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2177" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T20:20:17+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1658" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: Possible integer overflow vulnerabilities in codebase" }, { "cve": "CVE-2016-2178", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2016-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1343400" } ], "notes": [ { "category": "description", "text": "It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Non-constant time codepath followed for certain operations in DSA implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2178" }, { "category": "external", "summary": "RHBZ#1343400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343400" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2178", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178" }, { "category": "external", "summary": "http://eprint.iacr.org/2016/594", "url": "http://eprint.iacr.org/2016/594" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T20:20:17+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1658" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Non-constant time codepath followed for certain operations in DSA implementation" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc.", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-6304", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2016-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1377600" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: OCSP Status Request extension unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "TLS server applications using OpenSSL versions in Red Hat Enterprise Linux 6 and 7 are only affected if they enable OCSP stapling support. Applications not enabling OCSP stapling support are not affected. Few applications implement OCSP stapling support and typically do not enable it by default.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6304" }, { "category": "external", "summary": "RHBZ#1377600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6304", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T20:20:17+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1658" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: OCSP Status Request extension unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc." } ], "cve": "CVE-2016-8610", "discovery_date": "2016-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384743" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "Vulnerability description" }, { "category": "summary", "text": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects applications that are compiled against OpenSSL or GnuTLS and do not allocate an extra thread for processing ClientHello messages. Nginx is affected by this issue; Apache httpd is not affected by this issue. This issue has been rated as having a security impact of Moderate. It requires an attacker to send a very large amount of SSL ALERT messages to the host network connection. This issue can also be mitigated by configuring firewalls to limit the number of connections per IP address, or use deep packet inspection to reject these type of alert packets. A future update may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "RHBZ#1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8610", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8610" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610" }, { "category": "external", "summary": "http://security.360.cn/cve/CVE-2016-8610", "url": "http://security.360.cn/cve/CVE-2016-8610" } ], "release_date": "2016-10-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T20:20:17+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1658" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.src", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el6.x86_64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.i686", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.ppc64", "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el6.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.ppc64", "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS" } ] }
rhsa-2017:0574
Vulnerability from csaf_redhat
Published
2017-03-21 08:23
Modified
2025-08-03 16:00
Summary
Red Hat Security Advisory: gnutls security, bug fix, and enhancement update
Notes
Topic
An update for gnutls is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.
The following packages have been upgraded to a later upstream version: gnutls (2.12.23). (BZ#1321112, BZ#1326073, BZ#1415682, BZ#1326389)
Security Fix(es):
* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections form other clients. (CVE-2016-8610)
* Multiple flaws were found in the way gnutls processed OpenPGP certificates. An attacker could create specially crafted OpenPGP certificates which, when parsed by gnutls, would cause it to crash. (CVE-2017-5335, CVE-2017-5336, CVE-2017-5337)
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for gnutls is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The gnutls packages provide the GNU Transport Layer Security (GnuTLS) library, which implements cryptographic algorithms and protocols such as SSL, TLS, and DTLS.\n\nThe following packages have been upgraded to a later upstream version: gnutls (2.12.23). (BZ#1321112, BZ#1326073, BZ#1415682, BZ#1326389)\n\nSecurity Fix(es):\n\n* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections form other clients. (CVE-2016-8610)\n\n* Multiple flaws were found in the way gnutls processed OpenPGP certificates. An attacker could create specially crafted OpenPGP certificates which, when parsed by gnutls, would cause it to crash. (CVE-2017-5335, CVE-2017-5336, CVE-2017-5337)\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 6.9 Release Notes and Red Hat Enterprise Linux 6.9 Technical Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0574", "url": "https://access.redhat.com/errata/RHSA-2017:0574" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html", "url": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Release_Notes/index.html" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html", "url": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/6.9_Technical_Notes/index.html" }, { "category": "external", "summary": "1320982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1320982" }, { "category": "external", "summary": "1321112", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1321112" }, { "category": "external", "summary": "1323215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1323215" }, { "category": "external", "summary": "1326073", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326073" }, { "category": "external", "summary": "1326389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326389" }, { "category": "external", "summary": "1326886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1326886" }, { "category": "external", "summary": "1327656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327656" }, { "category": "external", "summary": "1328205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328205" }, { "category": "external", "summary": "1333521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1333521" }, { "category": "external", "summary": "1335924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335924" }, { "category": "external", "summary": "1337460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337460" }, { "category": "external", "summary": "1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "external", "summary": "1411836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411836" }, { "category": "external", "summary": "1412235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412235" }, { "category": "external", "summary": "1412236", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412236" }, { "category": "external", "summary": "1415682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1415682" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0574.json" } ], "title": "Red Hat Security Advisory: gnutls security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-03T16:00:49+00:00", "generator": { "date": "2025-08-03T16:00:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:0574", "initial_release_date": "2017-03-21T08:23:04+00:00", "revision_history": [ { "date": "2017-03-21T08:23:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-03-21T08:23:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T16:00:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "gnutls-0:2.12.23-21.el6.x86_64", "product": { "name": "gnutls-0:2.12.23-21.el6.x86_64", "product_id": "gnutls-0:2.12.23-21.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@2.12.23-21.el6?arch=x86_64" } } }, { "category": "product_version", "name": "gnutls-utils-0:2.12.23-21.el6.x86_64", "product": { "name": "gnutls-utils-0:2.12.23-21.el6.x86_64", "product_id": "gnutls-utils-0:2.12.23-21.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-utils@2.12.23-21.el6?arch=x86_64" } } }, { "category": "product_version", "name": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "product": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "product_id": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@2.12.23-21.el6?arch=x86_64" } } }, { "category": "product_version", "name": "gnutls-devel-0:2.12.23-21.el6.x86_64", "product": { "name": "gnutls-devel-0:2.12.23-21.el6.x86_64", "product_id": "gnutls-devel-0:2.12.23-21.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@2.12.23-21.el6?arch=x86_64" } } }, { "category": "product_version", "name": "gnutls-guile-0:2.12.23-21.el6.x86_64", "product": { "name": "gnutls-guile-0:2.12.23-21.el6.x86_64", "product_id": "gnutls-guile-0:2.12.23-21.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-guile@2.12.23-21.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "gnutls-0:2.12.23-21.el6.i686", "product": { "name": "gnutls-0:2.12.23-21.el6.i686", "product_id": "gnutls-0:2.12.23-21.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@2.12.23-21.el6?arch=i686" } } }, { "category": "product_version", "name": "gnutls-debuginfo-0:2.12.23-21.el6.i686", "product": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.i686", "product_id": "gnutls-debuginfo-0:2.12.23-21.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@2.12.23-21.el6?arch=i686" } } }, { "category": "product_version", "name": "gnutls-utils-0:2.12.23-21.el6.i686", "product": { "name": "gnutls-utils-0:2.12.23-21.el6.i686", "product_id": "gnutls-utils-0:2.12.23-21.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-utils@2.12.23-21.el6?arch=i686" } } }, { "category": "product_version", "name": "gnutls-devel-0:2.12.23-21.el6.i686", "product": { "name": "gnutls-devel-0:2.12.23-21.el6.i686", "product_id": "gnutls-devel-0:2.12.23-21.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@2.12.23-21.el6?arch=i686" } } }, { "category": "product_version", "name": "gnutls-guile-0:2.12.23-21.el6.i686", "product": { "name": "gnutls-guile-0:2.12.23-21.el6.i686", "product_id": "gnutls-guile-0:2.12.23-21.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-guile@2.12.23-21.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "gnutls-0:2.12.23-21.el6.src", "product": { "name": "gnutls-0:2.12.23-21.el6.src", "product_id": "gnutls-0:2.12.23-21.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@2.12.23-21.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "gnutls-guile-0:2.12.23-21.el6.ppc", "product": { "name": "gnutls-guile-0:2.12.23-21.el6.ppc", "product_id": "gnutls-guile-0:2.12.23-21.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-guile@2.12.23-21.el6?arch=ppc" } } }, { "category": "product_version", "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc", "product": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc", "product_id": "gnutls-debuginfo-0:2.12.23-21.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@2.12.23-21.el6?arch=ppc" } } }, { "category": "product_version", "name": "gnutls-0:2.12.23-21.el6.ppc", "product": { "name": "gnutls-0:2.12.23-21.el6.ppc", "product_id": "gnutls-0:2.12.23-21.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@2.12.23-21.el6?arch=ppc" } } }, { "category": "product_version", "name": "gnutls-devel-0:2.12.23-21.el6.ppc", "product": { "name": "gnutls-devel-0:2.12.23-21.el6.ppc", "product_id": "gnutls-devel-0:2.12.23-21.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@2.12.23-21.el6?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "gnutls-guile-0:2.12.23-21.el6.ppc64", "product": { "name": "gnutls-guile-0:2.12.23-21.el6.ppc64", "product_id": "gnutls-guile-0:2.12.23-21.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-guile@2.12.23-21.el6?arch=ppc64" } } }, { "category": "product_version", "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "product": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "product_id": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@2.12.23-21.el6?arch=ppc64" } } }, { "category": "product_version", "name": "gnutls-0:2.12.23-21.el6.ppc64", "product": { "name": "gnutls-0:2.12.23-21.el6.ppc64", "product_id": "gnutls-0:2.12.23-21.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@2.12.23-21.el6?arch=ppc64" } } }, { "category": "product_version", "name": "gnutls-devel-0:2.12.23-21.el6.ppc64", "product": { "name": "gnutls-devel-0:2.12.23-21.el6.ppc64", "product_id": "gnutls-devel-0:2.12.23-21.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@2.12.23-21.el6?arch=ppc64" } } }, { "category": "product_version", "name": "gnutls-utils-0:2.12.23-21.el6.ppc64", "product": { "name": "gnutls-utils-0:2.12.23-21.el6.ppc64", "product_id": "gnutls-utils-0:2.12.23-21.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-utils@2.12.23-21.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "gnutls-guile-0:2.12.23-21.el6.s390", "product": { "name": "gnutls-guile-0:2.12.23-21.el6.s390", "product_id": "gnutls-guile-0:2.12.23-21.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-guile@2.12.23-21.el6?arch=s390" } } }, { "category": "product_version", "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390", "product": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390", "product_id": "gnutls-debuginfo-0:2.12.23-21.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@2.12.23-21.el6?arch=s390" } } }, { "category": "product_version", "name": "gnutls-0:2.12.23-21.el6.s390", "product": { "name": "gnutls-0:2.12.23-21.el6.s390", "product_id": "gnutls-0:2.12.23-21.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@2.12.23-21.el6?arch=s390" } } }, { "category": "product_version", "name": "gnutls-devel-0:2.12.23-21.el6.s390", "product": { "name": "gnutls-devel-0:2.12.23-21.el6.s390", "product_id": "gnutls-devel-0:2.12.23-21.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@2.12.23-21.el6?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "gnutls-guile-0:2.12.23-21.el6.s390x", "product": { "name": "gnutls-guile-0:2.12.23-21.el6.s390x", "product_id": "gnutls-guile-0:2.12.23-21.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-guile@2.12.23-21.el6?arch=s390x" } } }, { "category": "product_version", "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390x", "product": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390x", "product_id": "gnutls-debuginfo-0:2.12.23-21.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-debuginfo@2.12.23-21.el6?arch=s390x" } } }, { "category": "product_version", "name": "gnutls-0:2.12.23-21.el6.s390x", "product": { "name": "gnutls-0:2.12.23-21.el6.s390x", "product_id": "gnutls-0:2.12.23-21.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls@2.12.23-21.el6?arch=s390x" } } }, { "category": "product_version", "name": "gnutls-devel-0:2.12.23-21.el6.s390x", "product": { "name": "gnutls-devel-0:2.12.23-21.el6.s390x", "product_id": "gnutls-devel-0:2.12.23-21.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-devel@2.12.23-21.el6?arch=s390x" } } }, { "category": "product_version", "name": "gnutls-utils-0:2.12.23-21.el6.s390x", "product": { "name": "gnutls-utils-0:2.12.23-21.el6.s390x", "product_id": "gnutls-utils-0:2.12.23-21.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/gnutls-utils@2.12.23-21.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-0:2.12.23-21.el6.src" }, "product_reference": "gnutls-0:2.12.23-21.el6.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-devel-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-devel-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-guile-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-guile-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-utils-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-utils-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-utils-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:gnutls-utils-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-0:2.12.23-21.el6.src" }, "product_reference": "gnutls-0:2.12.23-21.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-debuginfo-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-debuginfo-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-devel-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-devel-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-devel-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-devel-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-devel-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-devel-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-guile-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-guile-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-guile-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-guile-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-guile-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-guile-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-utils-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-utils-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-utils-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:gnutls-utils-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.src" }, "product_reference": "gnutls-0:2.12.23-21.el6.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-0:2.12.23-21.el6.src" }, "product_reference": "gnutls-0:2.12.23-21.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-0:2.12.23-21.el6.src" }, "product_reference": "gnutls-0:2.12.23-21.el6.src", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-devel-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-devel-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-guile-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-guile-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-utils-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-utils-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-utils-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:gnutls-utils-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-0:2.12.23-21.el6.src" }, "product_reference": "gnutls-0:2.12.23-21.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-debuginfo-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-debuginfo-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-devel-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-devel-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-devel-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-devel-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-devel-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-devel-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-guile-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-guile-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-guile-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-guile-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-guile-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-guile-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-utils-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-utils-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-utils-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:gnutls-utils-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-0:2.12.23-21.el6.src" }, "product_reference": "gnutls-0:2.12.23-21.el6.src", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-0:2.12.23-21.el6.src" }, "product_reference": "gnutls-0:2.12.23-21.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-devel-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-devel-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-devel-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-devel-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-guile-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.ppc", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.s390", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-guile-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-guile-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-utils-0:2.12.23-21.el6.i686" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-utils-0:2.12.23-21.el6.ppc64" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-utils-0:2.12.23-21.el6.s390x" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-utils-0:2.12.23-21.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:gnutls-utils-0:2.12.23-21.el6.x86_64" }, "product_reference": "gnutls-utils-0:2.12.23-21.el6.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc." } ], "cve": "CVE-2016-8610", "discovery_date": "2016-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384743" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "Vulnerability description" }, { "category": "summary", "text": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects applications that are compiled against OpenSSL or GnuTLS and do not allocate an extra thread for processing ClientHello messages. Nginx is affected by this issue; Apache httpd is not affected by this issue. This issue has been rated as having a security impact of Moderate. It requires an attacker to send a very large amount of SSL ALERT messages to the host network connection. This issue can also be mitigated by configuring firewalls to limit the number of connections per IP address, or use deep packet inspection to reject these type of alert packets. A future update may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:gnutls-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-0:2.12.23-21.el6.src", "6Client-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Client:gnutls-0:2.12.23-21.el6.i686", "6Client:gnutls-0:2.12.23-21.el6.ppc", "6Client:gnutls-0:2.12.23-21.el6.ppc64", "6Client:gnutls-0:2.12.23-21.el6.s390", "6Client:gnutls-0:2.12.23-21.el6.s390x", "6Client:gnutls-0:2.12.23-21.el6.src", "6Client:gnutls-0:2.12.23-21.el6.x86_64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client:gnutls-devel-0:2.12.23-21.el6.i686", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client:gnutls-devel-0:2.12.23-21.el6.s390", "6Client:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client:gnutls-guile-0:2.12.23-21.el6.i686", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client:gnutls-guile-0:2.12.23-21.el6.s390", "6Client:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client:gnutls-utils-0:2.12.23-21.el6.i686", "6Client:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.src", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-0:2.12.23-21.el6.src", "6ComputeNode:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-0:2.12.23-21.el6.src", "6Server-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server:gnutls-0:2.12.23-21.el6.i686", "6Server:gnutls-0:2.12.23-21.el6.ppc", "6Server:gnutls-0:2.12.23-21.el6.ppc64", "6Server:gnutls-0:2.12.23-21.el6.s390", "6Server:gnutls-0:2.12.23-21.el6.s390x", "6Server:gnutls-0:2.12.23-21.el6.src", "6Server:gnutls-0:2.12.23-21.el6.x86_64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server:gnutls-devel-0:2.12.23-21.el6.i686", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server:gnutls-devel-0:2.12.23-21.el6.s390", "6Server:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server:gnutls-guile-0:2.12.23-21.el6.i686", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server:gnutls-guile-0:2.12.23-21.el6.s390", "6Server:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server:gnutls-utils-0:2.12.23-21.el6.i686", "6Server:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-0:2.12.23-21.el6.src", "6Workstation-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-0:2.12.23-21.el6.i686", "6Workstation:gnutls-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-0:2.12.23-21.el6.s390", "6Workstation:gnutls-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-0:2.12.23-21.el6.src", "6Workstation:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-utils-0:2.12.23-21.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "RHBZ#1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8610", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8610" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610" }, { "category": "external", "summary": "http://security.360.cn/cve/CVE-2016-8610", "url": "http://security.360.cn/cve/CVE-2016-8610" } ], "release_date": "2016-10-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-21T08:23:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-optional:gnutls-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-0:2.12.23-21.el6.src", "6Client-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Client:gnutls-0:2.12.23-21.el6.i686", "6Client:gnutls-0:2.12.23-21.el6.ppc", "6Client:gnutls-0:2.12.23-21.el6.ppc64", "6Client:gnutls-0:2.12.23-21.el6.s390", "6Client:gnutls-0:2.12.23-21.el6.s390x", "6Client:gnutls-0:2.12.23-21.el6.src", "6Client:gnutls-0:2.12.23-21.el6.x86_64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client:gnutls-devel-0:2.12.23-21.el6.i686", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client:gnutls-devel-0:2.12.23-21.el6.s390", "6Client:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client:gnutls-guile-0:2.12.23-21.el6.i686", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client:gnutls-guile-0:2.12.23-21.el6.s390", "6Client:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client:gnutls-utils-0:2.12.23-21.el6.i686", "6Client:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.src", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-0:2.12.23-21.el6.src", "6ComputeNode:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-0:2.12.23-21.el6.src", "6Server-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server:gnutls-0:2.12.23-21.el6.i686", "6Server:gnutls-0:2.12.23-21.el6.ppc", "6Server:gnutls-0:2.12.23-21.el6.ppc64", "6Server:gnutls-0:2.12.23-21.el6.s390", "6Server:gnutls-0:2.12.23-21.el6.s390x", "6Server:gnutls-0:2.12.23-21.el6.src", "6Server:gnutls-0:2.12.23-21.el6.x86_64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server:gnutls-devel-0:2.12.23-21.el6.i686", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server:gnutls-devel-0:2.12.23-21.el6.s390", "6Server:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server:gnutls-guile-0:2.12.23-21.el6.i686", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server:gnutls-guile-0:2.12.23-21.el6.s390", "6Server:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server:gnutls-utils-0:2.12.23-21.el6.i686", "6Server:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-0:2.12.23-21.el6.src", "6Workstation-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-0:2.12.23-21.el6.i686", "6Workstation:gnutls-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-0:2.12.23-21.el6.s390", "6Workstation:gnutls-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-0:2.12.23-21.el6.src", "6Workstation:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-utils-0:2.12.23-21.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0574" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-optional:gnutls-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-0:2.12.23-21.el6.src", "6Client-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Client:gnutls-0:2.12.23-21.el6.i686", "6Client:gnutls-0:2.12.23-21.el6.ppc", "6Client:gnutls-0:2.12.23-21.el6.ppc64", "6Client:gnutls-0:2.12.23-21.el6.s390", "6Client:gnutls-0:2.12.23-21.el6.s390x", "6Client:gnutls-0:2.12.23-21.el6.src", "6Client:gnutls-0:2.12.23-21.el6.x86_64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client:gnutls-devel-0:2.12.23-21.el6.i686", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client:gnutls-devel-0:2.12.23-21.el6.s390", "6Client:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client:gnutls-guile-0:2.12.23-21.el6.i686", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client:gnutls-guile-0:2.12.23-21.el6.s390", "6Client:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client:gnutls-utils-0:2.12.23-21.el6.i686", "6Client:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.src", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-0:2.12.23-21.el6.src", "6ComputeNode:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-0:2.12.23-21.el6.src", "6Server-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server:gnutls-0:2.12.23-21.el6.i686", "6Server:gnutls-0:2.12.23-21.el6.ppc", "6Server:gnutls-0:2.12.23-21.el6.ppc64", "6Server:gnutls-0:2.12.23-21.el6.s390", "6Server:gnutls-0:2.12.23-21.el6.s390x", "6Server:gnutls-0:2.12.23-21.el6.src", "6Server:gnutls-0:2.12.23-21.el6.x86_64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server:gnutls-devel-0:2.12.23-21.el6.i686", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server:gnutls-devel-0:2.12.23-21.el6.s390", "6Server:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server:gnutls-guile-0:2.12.23-21.el6.i686", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server:gnutls-guile-0:2.12.23-21.el6.s390", "6Server:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server:gnutls-utils-0:2.12.23-21.el6.i686", "6Server:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-0:2.12.23-21.el6.src", "6Workstation-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-0:2.12.23-21.el6.i686", "6Workstation:gnutls-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-0:2.12.23-21.el6.s390", "6Workstation:gnutls-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-0:2.12.23-21.el6.src", "6Workstation:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-utils-0:2.12.23-21.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS" }, { "cve": "CVE-2017-5335", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2017-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1412235" } ], "notes": [ { "category": "description", "text": "The stream reading functions in lib/opencdk/read-packet.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to cause a denial of service (out-of-memory error and crash) via a crafted OpenPGP certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "gnutls: Out of memory while parsing crafted OpenPGP certificate", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:gnutls-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-0:2.12.23-21.el6.src", "6Client-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Client:gnutls-0:2.12.23-21.el6.i686", "6Client:gnutls-0:2.12.23-21.el6.ppc", "6Client:gnutls-0:2.12.23-21.el6.ppc64", "6Client:gnutls-0:2.12.23-21.el6.s390", "6Client:gnutls-0:2.12.23-21.el6.s390x", "6Client:gnutls-0:2.12.23-21.el6.src", "6Client:gnutls-0:2.12.23-21.el6.x86_64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client:gnutls-devel-0:2.12.23-21.el6.i686", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client:gnutls-devel-0:2.12.23-21.el6.s390", "6Client:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client:gnutls-guile-0:2.12.23-21.el6.i686", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client:gnutls-guile-0:2.12.23-21.el6.s390", "6Client:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client:gnutls-utils-0:2.12.23-21.el6.i686", "6Client:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.src", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-0:2.12.23-21.el6.src", "6ComputeNode:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-0:2.12.23-21.el6.src", "6Server-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server:gnutls-0:2.12.23-21.el6.i686", "6Server:gnutls-0:2.12.23-21.el6.ppc", "6Server:gnutls-0:2.12.23-21.el6.ppc64", "6Server:gnutls-0:2.12.23-21.el6.s390", "6Server:gnutls-0:2.12.23-21.el6.s390x", "6Server:gnutls-0:2.12.23-21.el6.src", "6Server:gnutls-0:2.12.23-21.el6.x86_64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server:gnutls-devel-0:2.12.23-21.el6.i686", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server:gnutls-devel-0:2.12.23-21.el6.s390", "6Server:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server:gnutls-guile-0:2.12.23-21.el6.i686", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server:gnutls-guile-0:2.12.23-21.el6.s390", "6Server:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server:gnutls-utils-0:2.12.23-21.el6.i686", "6Server:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-0:2.12.23-21.el6.src", "6Workstation-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-0:2.12.23-21.el6.i686", "6Workstation:gnutls-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-0:2.12.23-21.el6.s390", "6Workstation:gnutls-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-0:2.12.23-21.el6.src", "6Workstation:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-utils-0:2.12.23-21.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5335" }, { "category": "external", "summary": "RHBZ#1412235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412235" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5335", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5335" } ], "release_date": "2017-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-21T08:23:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-optional:gnutls-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-0:2.12.23-21.el6.src", "6Client-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Client:gnutls-0:2.12.23-21.el6.i686", "6Client:gnutls-0:2.12.23-21.el6.ppc", "6Client:gnutls-0:2.12.23-21.el6.ppc64", "6Client:gnutls-0:2.12.23-21.el6.s390", "6Client:gnutls-0:2.12.23-21.el6.s390x", "6Client:gnutls-0:2.12.23-21.el6.src", "6Client:gnutls-0:2.12.23-21.el6.x86_64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client:gnutls-devel-0:2.12.23-21.el6.i686", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client:gnutls-devel-0:2.12.23-21.el6.s390", "6Client:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client:gnutls-guile-0:2.12.23-21.el6.i686", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client:gnutls-guile-0:2.12.23-21.el6.s390", "6Client:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client:gnutls-utils-0:2.12.23-21.el6.i686", "6Client:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.src", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-0:2.12.23-21.el6.src", "6ComputeNode:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-0:2.12.23-21.el6.src", "6Server-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server:gnutls-0:2.12.23-21.el6.i686", "6Server:gnutls-0:2.12.23-21.el6.ppc", "6Server:gnutls-0:2.12.23-21.el6.ppc64", "6Server:gnutls-0:2.12.23-21.el6.s390", "6Server:gnutls-0:2.12.23-21.el6.s390x", "6Server:gnutls-0:2.12.23-21.el6.src", "6Server:gnutls-0:2.12.23-21.el6.x86_64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server:gnutls-devel-0:2.12.23-21.el6.i686", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server:gnutls-devel-0:2.12.23-21.el6.s390", "6Server:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server:gnutls-guile-0:2.12.23-21.el6.i686", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server:gnutls-guile-0:2.12.23-21.el6.s390", "6Server:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server:gnutls-utils-0:2.12.23-21.el6.i686", "6Server:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-0:2.12.23-21.el6.src", "6Workstation-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-0:2.12.23-21.el6.i686", "6Workstation:gnutls-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-0:2.12.23-21.el6.s390", "6Workstation:gnutls-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-0:2.12.23-21.el6.src", "6Workstation:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-utils-0:2.12.23-21.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0574" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-optional:gnutls-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-0:2.12.23-21.el6.src", "6Client-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Client:gnutls-0:2.12.23-21.el6.i686", "6Client:gnutls-0:2.12.23-21.el6.ppc", "6Client:gnutls-0:2.12.23-21.el6.ppc64", "6Client:gnutls-0:2.12.23-21.el6.s390", "6Client:gnutls-0:2.12.23-21.el6.s390x", "6Client:gnutls-0:2.12.23-21.el6.src", "6Client:gnutls-0:2.12.23-21.el6.x86_64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client:gnutls-devel-0:2.12.23-21.el6.i686", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client:gnutls-devel-0:2.12.23-21.el6.s390", "6Client:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client:gnutls-guile-0:2.12.23-21.el6.i686", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client:gnutls-guile-0:2.12.23-21.el6.s390", "6Client:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client:gnutls-utils-0:2.12.23-21.el6.i686", "6Client:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.src", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-0:2.12.23-21.el6.src", "6ComputeNode:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-0:2.12.23-21.el6.src", "6Server-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server:gnutls-0:2.12.23-21.el6.i686", "6Server:gnutls-0:2.12.23-21.el6.ppc", "6Server:gnutls-0:2.12.23-21.el6.ppc64", "6Server:gnutls-0:2.12.23-21.el6.s390", "6Server:gnutls-0:2.12.23-21.el6.s390x", "6Server:gnutls-0:2.12.23-21.el6.src", "6Server:gnutls-0:2.12.23-21.el6.x86_64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server:gnutls-devel-0:2.12.23-21.el6.i686", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server:gnutls-devel-0:2.12.23-21.el6.s390", "6Server:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server:gnutls-guile-0:2.12.23-21.el6.i686", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server:gnutls-guile-0:2.12.23-21.el6.s390", "6Server:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server:gnutls-utils-0:2.12.23-21.el6.i686", "6Server:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-0:2.12.23-21.el6.src", "6Workstation-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-0:2.12.23-21.el6.i686", "6Workstation:gnutls-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-0:2.12.23-21.el6.s390", "6Workstation:gnutls-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-0:2.12.23-21.el6.src", "6Workstation:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-utils-0:2.12.23-21.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "gnutls: Out of memory while parsing crafted OpenPGP certificate" }, { "cve": "CVE-2017-5336", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2017-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1412236" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in the cdk_pk_get_keyid function in lib/opencdk/pubkey.c in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allows remote attackers to have unspecified impact via a crafted OpenPGP certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "gnutls: Stack overflow in cdk_pk_get_keyid", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:gnutls-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-0:2.12.23-21.el6.src", "6Client-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Client:gnutls-0:2.12.23-21.el6.i686", "6Client:gnutls-0:2.12.23-21.el6.ppc", "6Client:gnutls-0:2.12.23-21.el6.ppc64", "6Client:gnutls-0:2.12.23-21.el6.s390", "6Client:gnutls-0:2.12.23-21.el6.s390x", "6Client:gnutls-0:2.12.23-21.el6.src", "6Client:gnutls-0:2.12.23-21.el6.x86_64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client:gnutls-devel-0:2.12.23-21.el6.i686", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client:gnutls-devel-0:2.12.23-21.el6.s390", "6Client:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client:gnutls-guile-0:2.12.23-21.el6.i686", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client:gnutls-guile-0:2.12.23-21.el6.s390", "6Client:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client:gnutls-utils-0:2.12.23-21.el6.i686", "6Client:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.src", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-0:2.12.23-21.el6.src", "6ComputeNode:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-0:2.12.23-21.el6.src", "6Server-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server:gnutls-0:2.12.23-21.el6.i686", "6Server:gnutls-0:2.12.23-21.el6.ppc", "6Server:gnutls-0:2.12.23-21.el6.ppc64", "6Server:gnutls-0:2.12.23-21.el6.s390", "6Server:gnutls-0:2.12.23-21.el6.s390x", "6Server:gnutls-0:2.12.23-21.el6.src", "6Server:gnutls-0:2.12.23-21.el6.x86_64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server:gnutls-devel-0:2.12.23-21.el6.i686", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server:gnutls-devel-0:2.12.23-21.el6.s390", "6Server:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server:gnutls-guile-0:2.12.23-21.el6.i686", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server:gnutls-guile-0:2.12.23-21.el6.s390", "6Server:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server:gnutls-utils-0:2.12.23-21.el6.i686", "6Server:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-0:2.12.23-21.el6.src", "6Workstation-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-0:2.12.23-21.el6.i686", "6Workstation:gnutls-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-0:2.12.23-21.el6.s390", "6Workstation:gnutls-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-0:2.12.23-21.el6.src", "6Workstation:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-utils-0:2.12.23-21.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5336" }, { "category": "external", "summary": "RHBZ#1412236", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412236" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5336", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5336" } ], "release_date": "2017-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-21T08:23:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-optional:gnutls-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-0:2.12.23-21.el6.src", "6Client-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Client:gnutls-0:2.12.23-21.el6.i686", "6Client:gnutls-0:2.12.23-21.el6.ppc", "6Client:gnutls-0:2.12.23-21.el6.ppc64", "6Client:gnutls-0:2.12.23-21.el6.s390", "6Client:gnutls-0:2.12.23-21.el6.s390x", "6Client:gnutls-0:2.12.23-21.el6.src", "6Client:gnutls-0:2.12.23-21.el6.x86_64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client:gnutls-devel-0:2.12.23-21.el6.i686", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client:gnutls-devel-0:2.12.23-21.el6.s390", "6Client:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client:gnutls-guile-0:2.12.23-21.el6.i686", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client:gnutls-guile-0:2.12.23-21.el6.s390", "6Client:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client:gnutls-utils-0:2.12.23-21.el6.i686", "6Client:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.src", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-0:2.12.23-21.el6.src", "6ComputeNode:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-0:2.12.23-21.el6.src", "6Server-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server:gnutls-0:2.12.23-21.el6.i686", "6Server:gnutls-0:2.12.23-21.el6.ppc", "6Server:gnutls-0:2.12.23-21.el6.ppc64", "6Server:gnutls-0:2.12.23-21.el6.s390", "6Server:gnutls-0:2.12.23-21.el6.s390x", "6Server:gnutls-0:2.12.23-21.el6.src", "6Server:gnutls-0:2.12.23-21.el6.x86_64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server:gnutls-devel-0:2.12.23-21.el6.i686", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server:gnutls-devel-0:2.12.23-21.el6.s390", "6Server:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server:gnutls-guile-0:2.12.23-21.el6.i686", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server:gnutls-guile-0:2.12.23-21.el6.s390", "6Server:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server:gnutls-utils-0:2.12.23-21.el6.i686", "6Server:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-0:2.12.23-21.el6.src", "6Workstation-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-0:2.12.23-21.el6.i686", "6Workstation:gnutls-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-0:2.12.23-21.el6.s390", "6Workstation:gnutls-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-0:2.12.23-21.el6.src", "6Workstation:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-utils-0:2.12.23-21.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0574" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "6Client-optional:gnutls-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-0:2.12.23-21.el6.src", "6Client-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Client:gnutls-0:2.12.23-21.el6.i686", "6Client:gnutls-0:2.12.23-21.el6.ppc", "6Client:gnutls-0:2.12.23-21.el6.ppc64", "6Client:gnutls-0:2.12.23-21.el6.s390", "6Client:gnutls-0:2.12.23-21.el6.s390x", "6Client:gnutls-0:2.12.23-21.el6.src", "6Client:gnutls-0:2.12.23-21.el6.x86_64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client:gnutls-devel-0:2.12.23-21.el6.i686", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client:gnutls-devel-0:2.12.23-21.el6.s390", "6Client:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client:gnutls-guile-0:2.12.23-21.el6.i686", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client:gnutls-guile-0:2.12.23-21.el6.s390", "6Client:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client:gnutls-utils-0:2.12.23-21.el6.i686", "6Client:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.src", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-0:2.12.23-21.el6.src", "6ComputeNode:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-0:2.12.23-21.el6.src", "6Server-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server:gnutls-0:2.12.23-21.el6.i686", "6Server:gnutls-0:2.12.23-21.el6.ppc", "6Server:gnutls-0:2.12.23-21.el6.ppc64", "6Server:gnutls-0:2.12.23-21.el6.s390", "6Server:gnutls-0:2.12.23-21.el6.s390x", "6Server:gnutls-0:2.12.23-21.el6.src", "6Server:gnutls-0:2.12.23-21.el6.x86_64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server:gnutls-devel-0:2.12.23-21.el6.i686", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server:gnutls-devel-0:2.12.23-21.el6.s390", "6Server:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server:gnutls-guile-0:2.12.23-21.el6.i686", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server:gnutls-guile-0:2.12.23-21.el6.s390", "6Server:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server:gnutls-utils-0:2.12.23-21.el6.i686", "6Server:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-0:2.12.23-21.el6.src", "6Workstation-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-0:2.12.23-21.el6.i686", "6Workstation:gnutls-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-0:2.12.23-21.el6.s390", "6Workstation:gnutls-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-0:2.12.23-21.el6.src", "6Workstation:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-utils-0:2.12.23-21.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "gnutls: Stack overflow in cdk_pk_get_keyid" }, { "cve": "CVE-2017-5337", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1411836" } ], "notes": [ { "category": "description", "text": "Multiple heap-based buffer overflows in the read_attribute function in GnuTLS before 3.3.26 and 3.5.x before 3.5.8 allow remote attackers to have unspecified impact via a crafted OpenPGP certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "gnutls: Heap read overflow in read-packet.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:gnutls-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-0:2.12.23-21.el6.src", "6Client-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Client:gnutls-0:2.12.23-21.el6.i686", "6Client:gnutls-0:2.12.23-21.el6.ppc", "6Client:gnutls-0:2.12.23-21.el6.ppc64", "6Client:gnutls-0:2.12.23-21.el6.s390", "6Client:gnutls-0:2.12.23-21.el6.s390x", "6Client:gnutls-0:2.12.23-21.el6.src", "6Client:gnutls-0:2.12.23-21.el6.x86_64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client:gnutls-devel-0:2.12.23-21.el6.i686", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client:gnutls-devel-0:2.12.23-21.el6.s390", "6Client:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client:gnutls-guile-0:2.12.23-21.el6.i686", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client:gnutls-guile-0:2.12.23-21.el6.s390", "6Client:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client:gnutls-utils-0:2.12.23-21.el6.i686", "6Client:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.src", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-0:2.12.23-21.el6.src", "6ComputeNode:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-0:2.12.23-21.el6.src", "6Server-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server:gnutls-0:2.12.23-21.el6.i686", "6Server:gnutls-0:2.12.23-21.el6.ppc", "6Server:gnutls-0:2.12.23-21.el6.ppc64", "6Server:gnutls-0:2.12.23-21.el6.s390", "6Server:gnutls-0:2.12.23-21.el6.s390x", "6Server:gnutls-0:2.12.23-21.el6.src", "6Server:gnutls-0:2.12.23-21.el6.x86_64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server:gnutls-devel-0:2.12.23-21.el6.i686", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server:gnutls-devel-0:2.12.23-21.el6.s390", "6Server:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server:gnutls-guile-0:2.12.23-21.el6.i686", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server:gnutls-guile-0:2.12.23-21.el6.s390", "6Server:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server:gnutls-utils-0:2.12.23-21.el6.i686", "6Server:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-0:2.12.23-21.el6.src", "6Workstation-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-0:2.12.23-21.el6.i686", "6Workstation:gnutls-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-0:2.12.23-21.el6.s390", "6Workstation:gnutls-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-0:2.12.23-21.el6.src", "6Workstation:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-utils-0:2.12.23-21.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5337" }, { "category": "external", "summary": "RHBZ#1411836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411836" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5337", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5337" } ], "release_date": "2017-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-21T08:23:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-optional:gnutls-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-0:2.12.23-21.el6.src", "6Client-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Client:gnutls-0:2.12.23-21.el6.i686", "6Client:gnutls-0:2.12.23-21.el6.ppc", "6Client:gnutls-0:2.12.23-21.el6.ppc64", "6Client:gnutls-0:2.12.23-21.el6.s390", "6Client:gnutls-0:2.12.23-21.el6.s390x", "6Client:gnutls-0:2.12.23-21.el6.src", "6Client:gnutls-0:2.12.23-21.el6.x86_64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client:gnutls-devel-0:2.12.23-21.el6.i686", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client:gnutls-devel-0:2.12.23-21.el6.s390", "6Client:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client:gnutls-guile-0:2.12.23-21.el6.i686", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client:gnutls-guile-0:2.12.23-21.el6.s390", "6Client:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client:gnutls-utils-0:2.12.23-21.el6.i686", "6Client:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.src", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-0:2.12.23-21.el6.src", "6ComputeNode:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-0:2.12.23-21.el6.src", "6Server-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server:gnutls-0:2.12.23-21.el6.i686", "6Server:gnutls-0:2.12.23-21.el6.ppc", "6Server:gnutls-0:2.12.23-21.el6.ppc64", "6Server:gnutls-0:2.12.23-21.el6.s390", "6Server:gnutls-0:2.12.23-21.el6.s390x", "6Server:gnutls-0:2.12.23-21.el6.src", "6Server:gnutls-0:2.12.23-21.el6.x86_64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server:gnutls-devel-0:2.12.23-21.el6.i686", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server:gnutls-devel-0:2.12.23-21.el6.s390", "6Server:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server:gnutls-guile-0:2.12.23-21.el6.i686", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server:gnutls-guile-0:2.12.23-21.el6.s390", "6Server:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server:gnutls-utils-0:2.12.23-21.el6.i686", "6Server:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-0:2.12.23-21.el6.src", "6Workstation-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-0:2.12.23-21.el6.i686", "6Workstation:gnutls-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-0:2.12.23-21.el6.s390", "6Workstation:gnutls-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-0:2.12.23-21.el6.src", "6Workstation:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-utils-0:2.12.23-21.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:0574" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "6Client-optional:gnutls-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-0:2.12.23-21.el6.src", "6Client-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Client:gnutls-0:2.12.23-21.el6.i686", "6Client:gnutls-0:2.12.23-21.el6.ppc", "6Client:gnutls-0:2.12.23-21.el6.ppc64", "6Client:gnutls-0:2.12.23-21.el6.s390", "6Client:gnutls-0:2.12.23-21.el6.s390x", "6Client:gnutls-0:2.12.23-21.el6.src", "6Client:gnutls-0:2.12.23-21.el6.x86_64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Client:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Client:gnutls-devel-0:2.12.23-21.el6.i686", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc", "6Client:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Client:gnutls-devel-0:2.12.23-21.el6.s390", "6Client:gnutls-devel-0:2.12.23-21.el6.s390x", "6Client:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Client:gnutls-guile-0:2.12.23-21.el6.i686", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc", "6Client:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Client:gnutls-guile-0:2.12.23-21.el6.s390", "6Client:gnutls-guile-0:2.12.23-21.el6.s390x", "6Client:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Client:gnutls-utils-0:2.12.23-21.el6.i686", "6Client:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Client:gnutls-utils-0:2.12.23-21.el6.s390x", "6Client:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.src", "6ComputeNode-optional:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-0:2.12.23-21.el6.src", "6ComputeNode:gnutls-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-devel-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-guile-0:2.12.23-21.el6.x86_64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.i686", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.ppc64", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.s390x", "6ComputeNode:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-0:2.12.23-21.el6.src", "6Server-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Server:gnutls-0:2.12.23-21.el6.i686", "6Server:gnutls-0:2.12.23-21.el6.ppc", "6Server:gnutls-0:2.12.23-21.el6.ppc64", "6Server:gnutls-0:2.12.23-21.el6.s390", "6Server:gnutls-0:2.12.23-21.el6.s390x", "6Server:gnutls-0:2.12.23-21.el6.src", "6Server:gnutls-0:2.12.23-21.el6.x86_64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Server:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Server:gnutls-devel-0:2.12.23-21.el6.i686", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc", "6Server:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Server:gnutls-devel-0:2.12.23-21.el6.s390", "6Server:gnutls-devel-0:2.12.23-21.el6.s390x", "6Server:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Server:gnutls-guile-0:2.12.23-21.el6.i686", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc", "6Server:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Server:gnutls-guile-0:2.12.23-21.el6.s390", "6Server:gnutls-guile-0:2.12.23-21.el6.s390x", "6Server:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Server:gnutls-utils-0:2.12.23-21.el6.i686", "6Server:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Server:gnutls-utils-0:2.12.23-21.el6.s390x", "6Server:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-0:2.12.23-21.el6.src", "6Workstation-optional:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation-optional:gnutls-utils-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-0:2.12.23-21.el6.i686", "6Workstation:gnutls-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-0:2.12.23-21.el6.s390", "6Workstation:gnutls-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-0:2.12.23-21.el6.src", "6Workstation:gnutls-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.i686", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-debuginfo-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.i686", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-devel-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390", "6Workstation:gnutls-devel-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-devel-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.i686", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc", "6Workstation:gnutls-guile-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390", "6Workstation:gnutls-guile-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-guile-0:2.12.23-21.el6.x86_64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.i686", "6Workstation:gnutls-utils-0:2.12.23-21.el6.ppc64", "6Workstation:gnutls-utils-0:2.12.23-21.el6.s390x", "6Workstation:gnutls-utils-0:2.12.23-21.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "gnutls: Heap read overflow in read-packet.c" } ] }
rhsa-2017:1659
Vulnerability from csaf_redhat
Published
2017-06-28 19:59
Modified
2025-08-04 11:53
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update
Notes
Topic
An update is now available for Red Hat JBoss Enterprise Application Platform.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.
This release includes bug fixes as well as a new release of OpenSSL that addresses a number of outstanding security flaws. For further information, see the knowledge base article linked to in the References section. All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat Enterprise Linux 6 are advised to upgrade to these updated packages.
Security Fix(es):
* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304)
* It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system. (CVE-2016-2178)
* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections form other clients. (CVE-2016-8610)
* Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2016-2177)
Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Enterprise Application Platform.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.\n\nThis release includes bug fixes as well as a new release of OpenSSL that addresses a number of outstanding security flaws. For further information, see the knowledge base article linked to in the References section. All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat Enterprise Linux 6 are advised to upgrade to these updated packages.\n\nSecurity Fix(es):\n\n* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304)\n\n* It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system. (CVE-2016-2178)\n\n* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections form other clients. (CVE-2016-8610)\n\n* Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2016-2177)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:1659", "url": "https://access.redhat.com/errata/RHSA-2017:1659" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/2688611", "url": "https://access.redhat.com/articles/2688611" }, { "category": "external", "summary": "https://access.redhat.com/solutions/222023", "url": "https://access.redhat.com/solutions/222023" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/", "url": "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.4", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.4" }, { "category": "external", "summary": "1341705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341705" }, { "category": "external", "summary": "1343400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343400" }, { "category": "external", "summary": "1377600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600" }, { "category": "external", "summary": "1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1659.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.16 natives update", "tracking": { "current_release_date": "2025-08-04T11:53:26+00:00", "generator": { "date": "2025-08-04T11:53:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:1659", "initial_release_date": "2017-06-28T19:59:51+00:00", "revision_history": [ { "date": "2017-06-28T19:59:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-06-28T19:59:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T11:53:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.4", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.4", "product_id": "Red Hat JBoss Enterprise Application Platform 6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2177", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2016-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1341705" } ], "notes": [ { "category": "description", "text": "Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Possible integer overflow vulnerabilities in codebase", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2177" }, { "category": "external", "summary": "RHBZ#1341705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341705" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2177", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2177" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T19:59:51+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1659" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: Possible integer overflow vulnerabilities in codebase" }, { "cve": "CVE-2016-2178", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2016-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1343400" } ], "notes": [ { "category": "description", "text": "It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Non-constant time codepath followed for certain operations in DSA implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2178" }, { "category": "external", "summary": "RHBZ#1343400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1343400" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2178", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2178" }, { "category": "external", "summary": "http://eprint.iacr.org/2016/594", "url": "http://eprint.iacr.org/2016/594" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-05-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T19:59:51+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1659" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Non-constant time codepath followed for certain operations in DSA implementation" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc.", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-6304", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2016-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1377600" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: OCSP Status Request extension unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "TLS server applications using OpenSSL versions in Red Hat Enterprise Linux 6 and 7 are only affected if they enable OCSP stapling support. Applications not enabling OCSP stapling support are not affected. Few applications implement OCSP stapling support and typically do not enable it by default.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6304" }, { "category": "external", "summary": "RHBZ#1377600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6304", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T19:59:51+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1659" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: OCSP Status Request extension unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc." } ], "cve": "CVE-2016-8610", "discovery_date": "2016-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384743" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "Vulnerability description" }, { "category": "summary", "text": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects applications that are compiled against OpenSSL or GnuTLS and do not allocate an extra thread for processing ClientHello messages. Nginx is affected by this issue; Apache httpd is not affected by this issue. This issue has been rated as having a security impact of Moderate. It requires an attacker to send a very large amount of SSL ALERT messages to the host network connection. This issue can also be mitigated by configuring firewalls to limit the number of connections per IP address, or use deep packet inspection to reject these type of alert packets. A future update may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "RHBZ#1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8610", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8610" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610" }, { "category": "external", "summary": "http://security.360.cn/cve/CVE-2016-8610", "url": "http://security.360.cn/cve/CVE-2016-8610" } ], "release_date": "2016-10-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T19:59:51+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1659" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS" } ] }
rhsa-2017:1413
Vulnerability from csaf_redhat
Published
2017-06-07 17:54
Modified
2025-08-04 11:55
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 7
Notes
Topic
An update is now available for Red Hat JBoss Core Services on RHEL 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.
This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.23, and includes bug fixes, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304)
* It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user's browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack. (CVE-2016-0736)
* It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication. (CVE-2016-2161)
* A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys. (CVE-2016-7056)
* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients. (CVE-2016-8610)
* It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)
* A vulnerability was found in httpd's handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server's available memory, causing httpd to crash. (CVE-2016-8740)
Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Core Services on RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.23, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304)\n\n* It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack. (CVE-2016-0736)\n\n* It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication. (CVE-2016-2161)\n\n* A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys. (CVE-2016-7056)\n\n* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients. (CVE-2016-8610)\n\n* It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)\n\n* A vulnerability was found in httpd\u0027s handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server\u0027s available memory, causing httpd to crash. (CVE-2016-8740)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:1413", "url": "https://access.redhat.com/errata/RHSA-2017:1413" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/" }, { "category": "external", "summary": "1377600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600" }, { "category": "external", "summary": "1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "external", "summary": "1401528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401528" }, { "category": "external", "summary": "1406744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744" }, { "category": "external", "summary": "1406753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753" }, { "category": "external", "summary": "1406822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822" }, { "category": "external", "summary": "1412120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412120" }, { "category": "external", "summary": "JBCS-319", "url": "https://issues.redhat.com/browse/JBCS-319" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1413.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 7", "tracking": { "current_release_date": "2025-08-04T11:55:33+00:00", "generator": { "date": "2025-08-04T11:55:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:1413", "initial_release_date": "2017-06-07T17:54:35+00:00", "revision_history": [ { "date": "2017-06-07T17:54:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-06-07T17:54:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T11:55:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-13.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-19.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.1-19.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-120.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-120.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-libs@2.4.23-120.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-120.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-120.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-120.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-120.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-120.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-120.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-120.jbcs.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-13.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-19.GA.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "product_id": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-120.jbcs.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.23-120.jbcs.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-0736", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2016-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1406744" } ], "notes": [ { "category": "description", "text": "It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Padding Oracle in Apache mod_session_crypto", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0736" }, { "category": "external", "summary": "RHBZ#1406744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0736", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0736" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25" }, { "category": "external", "summary": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt", "url": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt" } ], "release_date": "2016-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:54:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1413" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Padding Oracle in Apache mod_session_crypto" }, { "cve": "CVE-2016-2161", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1406753" } ], "notes": [ { "category": "description", "text": "It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: DoS vulnerability in mod_auth_digest", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2161" }, { "category": "external", "summary": "RHBZ#1406753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2161", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2161" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25" } ], "release_date": "2016-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:54:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1413" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: DoS vulnerability in mod_auth_digest" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc.", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-6304", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2016-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1377600" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: OCSP Status Request extension unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "TLS server applications using OpenSSL versions in Red Hat Enterprise Linux 6 and 7 are only affected if they enable OCSP stapling support. Applications not enabling OCSP stapling support are not affected. Few applications implement OCSP stapling support and typically do not enable it by default.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6304" }, { "category": "external", "summary": "RHBZ#1377600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6304", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:54:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1413" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: OCSP Status Request extension unbounded memory growth" }, { "cve": "CVE-2016-7056", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2017-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1412120" } ], "notes": [ { "category": "description", "text": "A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: ECDSA P-256 timing attack key recovery", "title": "Vulnerability summary" }, { "category": "other", "text": "In order to exploit this flaw, the attacker needs to be have local (shell) access to the machine where the message is being signed using the ECDSA algorithm with a P-256 elliptic curve key. Then using cache timing attacks (which needs precise timing), on multiple signature runs, the private key could be obtained. Based on the factor that exploitation is difficult, Red Hat Product Security Team has rated this flaw as having Moderate impact. A further security release may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7056" }, { "category": "external", "summary": "RHBZ#1412120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7056", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7056" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7056", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7056" } ], "release_date": "2017-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:54:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1413" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: ECDSA P-256 timing attack key recovery" }, { "acknowledgments": [ { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc." } ], "cve": "CVE-2016-8610", "discovery_date": "2016-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384743" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "Vulnerability description" }, { "category": "summary", "text": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects applications that are compiled against OpenSSL or GnuTLS and do not allocate an extra thread for processing ClientHello messages. Nginx is affected by this issue; Apache httpd is not affected by this issue. This issue has been rated as having a security impact of Moderate. It requires an attacker to send a very large amount of SSL ALERT messages to the host network connection. This issue can also be mitigated by configuring firewalls to limit the number of connections per IP address, or use deep packet inspection to reject these type of alert packets. A future update may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "RHBZ#1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8610", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8610" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610" }, { "category": "external", "summary": "http://security.360.cn/cve/CVE-2016-8610", "url": "http://security.360.cn/cve/CVE-2016-8610" } ], "release_date": "2016-10-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:54:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1413" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS" }, { "cve": "CVE-2016-8740", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2016-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1401528" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in httpd\u0027s handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server\u0027s available memory, causing httpd to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Incomplete handling of LimitRequestFields directive in mod_http2", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security has rated this issue as having Low security\nimpact. This issue is not currently planned to be addressed in future\nupdates. For additional information, refer to the Issue Severity\nClassification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8740" }, { "category": "external", "summary": "RHBZ#1401528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8740", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8740" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8740", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8740" }, { "category": "external", "summary": "http://seclists.org/bugtraq/2016/Dec/3", "url": "http://seclists.org/bugtraq/2016/Dec/3" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2016-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:54:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1413" }, { "category": "workaround", "details": "As a temporary workaround - HTTP/2 can be disabled by changing\nthe configuration by removing h2 and h2c from the Protocols\nline(s) in the configuration file. \n\nThe resulting line should read:\n\n\t\tProtocols http/1.1", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: Incomplete handling of LimitRequestFields directive in mod_http2" }, { "cve": "CVE-2016-8743", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1406822" } ], "notes": [ { "category": "description", "text": "It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Apache HTTP Request Parsing Whitespace Defects", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8743" }, { "category": "external", "summary": "RHBZ#1406822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8743", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8743" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25" } ], "release_date": "2016-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:54:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.", "product_ids": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1413" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-120.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-120.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-13.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-13.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Apache HTTP Request Parsing Whitespace Defects" } ] }
rhsa-2017:1415
Vulnerability from csaf_redhat
Published
2017-06-07 17:43
Modified
2025-08-04 11:55
Summary
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1
Notes
Topic
An update is now available for Red Hat JBoss Core Services.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.
This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.23, and includes bug fixes, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304)
* It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user's browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack. (CVE-2016-0736)
* It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication. (CVE-2016-2161)
* A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys. (CVE-2016-7056)
* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients. (CVE-2016-8610)
* It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)
* A vulnerability was found in httpd's handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server's available memory, causing httpd to crash. (CVE-2016-8740)
Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Core Services.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.23, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304)\n\n* It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack. (CVE-2016-0736)\n\n* It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication. (CVE-2016-2161)\n\n* A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys. (CVE-2016-7056)\n\n* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients. (CVE-2016-8610)\n\n* It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)\n\n* A vulnerability was found in httpd\u0027s handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server\u0027s available memory, causing httpd to crash. (CVE-2016-8740)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:1415", "url": "https://access.redhat.com/errata/RHSA-2017:1415" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.23", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.23" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/" }, { "category": "external", "summary": "1377600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600" }, { "category": "external", "summary": "1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "external", "summary": "1401528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401528" }, { "category": "external", "summary": "1406744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744" }, { "category": "external", "summary": "1406753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753" }, { "category": "external", "summary": "1406822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822" }, { "category": "external", "summary": "1412120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412120" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1415.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1", "tracking": { "current_release_date": "2025-08-04T11:55:43+00:00", "generator": { "date": "2025-08-04T11:55:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:1415", "initial_release_date": "2017-06-07T17:43:43+00:00", "revision_history": [ { "date": "2017-06-07T17:43:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-06-07T17:43:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T11:55:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Text-Only JBCS", "product": { "name": "Text-Only JBCS", "product_id": "Text-Only JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-0736", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2016-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1406744" } ], "notes": [ { "category": "description", "text": "It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user\u0027s browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Padding Oracle in Apache mod_session_crypto", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0736" }, { "category": "external", "summary": "RHBZ#1406744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0736", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0736" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0736" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25" }, { "category": "external", "summary": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt", "url": "https://www.redteam-pentesting.de/advisories/rt-sa-2016-001.txt" } ], "release_date": "2016-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:43:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1415" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Padding Oracle in Apache mod_session_crypto" }, { "cve": "CVE-2016-2161", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1406753" } ], "notes": [ { "category": "description", "text": "It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: DoS vulnerability in mod_auth_digest", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2161" }, { "category": "external", "summary": "RHBZ#1406753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406753" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2161", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2161" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2161" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25" } ], "release_date": "2016-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:43:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1415" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: DoS vulnerability in mod_auth_digest" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc.", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-6304", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2016-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1377600" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: OCSP Status Request extension unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "TLS server applications using OpenSSL versions in Red Hat Enterprise Linux 6 and 7 are only affected if they enable OCSP stapling support. Applications not enabling OCSP stapling support are not affected. Few applications implement OCSP stapling support and typically do not enable it by default.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6304" }, { "category": "external", "summary": "RHBZ#1377600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6304", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:43:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1415" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: OCSP Status Request extension unbounded memory growth" }, { "cve": "CVE-2016-7056", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2017-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1412120" } ], "notes": [ { "category": "description", "text": "A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: ECDSA P-256 timing attack key recovery", "title": "Vulnerability summary" }, { "category": "other", "text": "In order to exploit this flaw, the attacker needs to be have local (shell) access to the machine where the message is being signed using the ECDSA algorithm with a P-256 elliptic curve key. Then using cache timing attacks (which needs precise timing), on multiple signature runs, the private key could be obtained. Based on the factor that exploitation is difficult, Red Hat Product Security Team has rated this flaw as having Moderate impact. A further security release may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7056" }, { "category": "external", "summary": "RHBZ#1412120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7056", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7056" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7056", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7056" } ], "release_date": "2017-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:43:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1415" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: ECDSA P-256 timing attack key recovery" }, { "acknowledgments": [ { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc." } ], "cve": "CVE-2016-8610", "discovery_date": "2016-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384743" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "Vulnerability description" }, { "category": "summary", "text": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects applications that are compiled against OpenSSL or GnuTLS and do not allocate an extra thread for processing ClientHello messages. Nginx is affected by this issue; Apache httpd is not affected by this issue. This issue has been rated as having a security impact of Moderate. It requires an attacker to send a very large amount of SSL ALERT messages to the host network connection. This issue can also be mitigated by configuring firewalls to limit the number of connections per IP address, or use deep packet inspection to reject these type of alert packets. A future update may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "RHBZ#1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8610", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8610" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610" }, { "category": "external", "summary": "http://security.360.cn/cve/CVE-2016-8610", "url": "http://security.360.cn/cve/CVE-2016-8610" } ], "release_date": "2016-10-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:43:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1415" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS" }, { "cve": "CVE-2016-8740", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2016-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1401528" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in httpd\u0027s handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. An attacker could send crafted requests with headers larger than the server\u0027s available memory, causing httpd to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Incomplete handling of LimitRequestFields directive in mod_http2", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security has rated this issue as having Low security\nimpact. This issue is not currently planned to be addressed in future\nupdates. For additional information, refer to the Issue Severity\nClassification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8740" }, { "category": "external", "summary": "RHBZ#1401528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1401528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8740", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8740" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8740", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8740" }, { "category": "external", "summary": "http://seclists.org/bugtraq/2016/Dec/3", "url": "http://seclists.org/bugtraq/2016/Dec/3" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html", "url": "https://httpd.apache.org/security/vulnerabilities_24.html" } ], "release_date": "2016-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:43:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1415" }, { "category": "workaround", "details": "As a temporary workaround - HTTP/2 can be disabled by changing\nthe configuration by removing h2 and h2c from the Protocols\nline(s) in the configuration file. \n\nThe resulting line should read:\n\n\t\tProtocols http/1.1", "product_ids": [ "Text-Only JBCS" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: Incomplete handling of LimitRequestFields directive in mod_http2" }, { "cve": "CVE-2016-8743", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1406822" } ], "notes": [ { "category": "description", "text": "It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: Apache HTTP Request Parsing Whitespace Defects", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Text-Only JBCS" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8743" }, { "category": "external", "summary": "RHBZ#1406822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406822" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8743", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8743" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8743" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.25" } ], "release_date": "2016-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-07T17:43:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Text-Only JBCS" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1415" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Text-Only JBCS" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: Apache HTTP Request Parsing Whitespace Defects" } ] }
rhsa-2017:1802
Vulnerability from csaf_redhat
Published
2017-07-25 17:46
Modified
2025-08-03 16:00
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server Service Pack 1 security update
Notes
Topic
An update is now available for Red Hat JBoss Web Server 3.1.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.
This release of Red Hat JBoss Web Server 3.1 Service Pack 1 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645)
* A vulnerability was discovered in tomcat's handling of pipelined requests when "Sendfile" was used. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure. (CVE-2017-5647)
* A vulnerability was discovered in the error page mechanism in Tomcat's DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. (CVE-2017-5664)
* A vulnerability was discovered in tomcat. When running an untrusted application under a SecurityManager it was possible, under some circumstances, for that application to retain references to the request or response objects and thereby access and/or modify information associated with another web application. (CVE-2017-5648)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Web Server 3.1.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 3.1 Service Pack 1 serves as a replacement for Red Hat JBoss Web Server 3.1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645)\n\n* A vulnerability was discovered in tomcat\u0027s handling of pipelined requests when \"Sendfile\" was used. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure. (CVE-2017-5647)\n\n* A vulnerability was discovered in the error page mechanism in Tomcat\u0027s DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. (CVE-2017-5664)\n\n* A vulnerability was discovered in tomcat. When running an untrusted application under a SecurityManager it was possible, under some circumstances, for that application to retain references to the request or response objects and thereby access and/or modify information associated with another web application. (CVE-2017-5648)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:1802", "url": "https://access.redhat.com/errata/RHSA-2017:1802" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=3.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=3.1" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/Red_Hat_JBoss_Web_Server/3/html-single/3.1_Release_Notes/index.html", "url": "https://access.redhat.com/documentation/en-US/Red_Hat_JBoss_Web_Server/3/html-single/3.1_Release_Notes/index.html" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/httpoxy", "url": "https://access.redhat.com/security/vulnerabilities/httpoxy" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2435491", "url": "https://access.redhat.com/solutions/2435491" }, { "category": "external", "summary": "1441205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441205" }, { "category": "external", "summary": "1441223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441223" }, { "category": "external", "summary": "1443635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443635" }, { "category": "external", "summary": "1459158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459158" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1802.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server Service Pack 1 security update", "tracking": { "current_release_date": "2025-08-03T16:00:56+00:00", "generator": { "date": "2025-08-03T16:00:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:1802", "initial_release_date": "2017-07-25T17:46:13+00:00", "revision_history": [ { "date": "2017-07-25T17:46:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-07-25T17:46:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T16:00:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 3.1", "product": { "name": "Red Hat JBoss Web Server 3.1", "product_id": "Red Hat JBoss Web Server 3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3.1" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc.", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-6304", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2016-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1377600" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: OCSP Status Request extension unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "TLS server applications using OpenSSL versions in Red Hat Enterprise Linux 6 and 7 are only affected if they enable OCSP stapling support. Applications not enabling OCSP stapling support are not affected. Few applications implement OCSP stapling support and typically do not enable it by default.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6304" }, { "category": "external", "summary": "RHBZ#1377600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6304", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-25T17:46:13+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1802" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: OCSP Status Request extension unbounded memory growth" }, { "cve": "CVE-2016-7056", "cwe": { "id": "CWE-385", "name": "Covert Timing Channel" }, "discovery_date": "2017-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1412120" } ], "notes": [ { "category": "description", "text": "A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: ECDSA P-256 timing attack key recovery", "title": "Vulnerability summary" }, { "category": "other", "text": "In order to exploit this flaw, the attacker needs to be have local (shell) access to the machine where the message is being signed using the ECDSA algorithm with a P-256 elliptic curve key. Then using cache timing attacks (which needs precise timing), on multiple signature runs, the private key could be obtained. Based on the factor that exploitation is difficult, Red Hat Product Security Team has rated this flaw as having Moderate impact. A further security release may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7056" }, { "category": "external", "summary": "RHBZ#1412120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1412120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7056", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7056" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7056", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7056" } ], "release_date": "2017-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-25T17:46:13+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1802" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: ECDSA P-256 timing attack key recovery" }, { "acknowledgments": [ { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc." } ], "cve": "CVE-2016-8610", "discovery_date": "2016-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384743" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "Vulnerability description" }, { "category": "summary", "text": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects applications that are compiled against OpenSSL or GnuTLS and do not allocate an extra thread for processing ClientHello messages. Nginx is affected by this issue; Apache httpd is not affected by this issue. This issue has been rated as having a security impact of Moderate. It requires an attacker to send a very large amount of SSL ALERT messages to the host network connection. This issue can also be mitigated by configuring firewalls to limit the number of connections per IP address, or use deep packet inspection to reject these type of alert packets. A future update may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "RHBZ#1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8610", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8610" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610" }, { "category": "external", "summary": "http://security.360.cn/cve/CVE-2016-8610", "url": "http://security.360.cn/cve/CVE-2016-8610" } ], "release_date": "2016-10-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-25T17:46:13+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1802" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS" }, { "cve": "CVE-2017-5645", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2017-04-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1443635" } ], "notes": [ { "category": "description", "text": "It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: Socket receiver deserialization vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "The flaw in Log4j-1.x is now identified by CVE-2019-17571. CVE-2017-5645 has been assigned by MITRE to a similar flaw identified in Log4j-2.x", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5645" }, { "category": "external", "summary": "RHBZ#1443635", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443635" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5645", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5645" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5645", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5645" } ], "release_date": "2017-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-25T17:46:13+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1802" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j: Socket receiver deserialization vulnerability" }, { "cve": "CVE-2017-5647", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1441205" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in Tomcat\u0027s handling of pipelined requests when \"Sendfile\" was used. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incorrect handling of pipelined requests when send file was used", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5647" }, { "category": "external", "summary": "RHBZ#1441205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441205" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5647", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5647" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5647", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5647" } ], "release_date": "2017-04-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-25T17:46:13+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1802" }, { "category": "workaround", "details": "The AJP connector does not support the sendfile capability. A server configured to only use the AJP connector (disable HTTP Connector) is not affected by this vulnerability.\n\nDisable the sendfile capability by setting useSendfile=\"false\" in the HTTP connector configuration. Note: Disabling sendfile, may impact performance on large files.", "product_ids": [ "Red Hat JBoss Web Server 3.1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Incorrect handling of pipelined requests when send file was used" }, { "cve": "CVE-2017-5648", "discovery_date": "2017-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1441223" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in tomcat. When running an untrusted application under a SecurityManager it was possible, under some circumstances, for that application to retain references to the request or response objects and thereby access and/or modify information associated with another web application.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Calls to application listeners did not use the appropriate facade object", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5648" }, { "category": "external", "summary": "RHBZ#1441223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441223" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5648", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5648" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5648", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5648" } ], "release_date": "2017-04-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-25T17:46:13+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1802" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Calls to application listeners did not use the appropriate facade object" }, { "cve": "CVE-2017-5664", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2017-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1459158" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in the error page mechanism in Tomcat\u0027s DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Security constrained bypass in error page mechanism", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw can be triggered for static error pages only if the readonly property for the DefaultServlet is set to false in the $CATALINA_HOME/conf/web.xml file. The default for readonly is true.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5664" }, { "category": "external", "summary": "RHBZ#1459158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459158" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5664", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5664" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5664", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5664" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.78", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.78" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.44", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.44" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.15", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.15" } ], "release_date": "2017-06-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-25T17:46:13+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1802" }, { "category": "workaround", "details": "If it is necessary to have the DefaultServlet property readonly=false, use a jsp error page, for example Error404.jsp rather than a static html error page. Alternatively do not specify an error-page in the Deployment Descriptor and use a custom ErrorReportValve.", "product_ids": [ "Red Hat JBoss Web Server 3.1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Security constrained bypass in error page mechanism" }, { "cve": "CVE-2017-7674", "discovery_date": "2017-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1480618" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in Tomcat where the CORS Filter did not send a \"Vary: Origin\" HTTP header. This potentially allowed sensitive data to be leaked to other visitors through both client-side and server-side caches.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Vary header not added by CORS filter leading to cache poisoning", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7674" }, { "category": "external", "summary": "RHBZ#1480618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1480618" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7674", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7674" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html", "url": "https://tomcat.apache.org/security-7.html" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html", "url": "https://tomcat.apache.org/security-8.html" } ], "release_date": "2017-08-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-25T17:46:13+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1802" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: Vary header not added by CORS filter leading to cache poisoning" }, { "cve": "CVE-2019-17571", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2019-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1785616" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in Log4j, where a vulnerable SocketServer class may lead to the deserialization of untrusted data. This flaw allows an attacker to remotely execute arbitrary code when combined with a deserialization gadget.", "title": "Vulnerability description" }, { "category": "summary", "text": "log4j: deserialization of untrusted data in SocketServer", "title": "Vulnerability summary" }, { "category": "other", "text": "This is the same issue as CVE-2017-5645. MITRE has CVE-2017-5645 to a similar flaw found in log4j-2.x. The flaw found in log4j-1.2 has been assigned CVE-2019-17571. CVE-2019-17571 has been addressed in Red Hat Enterprise Linux via RHSA-2017:2423.\nAlso the rh-java-common-log4j package shipped with Red Hat Software Collections was addressed via RHSA-2017:1417\n\nIn Satellite 5.8, although the version of log4j as shipped in the nutch package is affected, nutch does not load any of the SocketServer classes from log4j. Satellite 5 is considered not vulnerable to this flaw since the affected code can not be reached.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17571" }, { "category": "external", "summary": "RHBZ#1785616", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1785616" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17571", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17571" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17571", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17571" } ], "release_date": "2019-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-25T17:46:13+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1802" }, { "category": "workaround", "details": "Please note that the Log4j upstream strongly recommends against using the SerializedLayout with the SocketAppenders. Customers may mitigate this issue by removing the SocketServer class outright; or if they must continue to use SocketAppenders, they can modify their SocketAppender configuration from SerializedLayout to use JsonLayout instead. An example of this in log4j-server.properties might look like this:\n\nlog4j.appender.file.layout=org.apache.log4j.JsonLayout", "product_ids": [ "Red Hat JBoss Web Server 3.1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat JBoss Web Server 3.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "log4j: deserialization of untrusted data in SocketServer" } ] }
rhsa-2017:2494
Vulnerability from csaf_redhat
Published
2017-08-21 15:22
Modified
2025-08-03 16:01
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server 2 security update
Notes
Topic
An update is now available for Red Hat JBoss Web Server 2.1.2.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.
This release provides an update to OpenSSL and Tomcat 6/7 for Red Hat JBoss Web Server 2.1.2. The updates are documented in the Release Notes document linked to in the References.
Users of Red Hat JBoss Web Server 2.1.2 should upgrade to these updated packages, which resolve several security issues.
Security Fix(es):
* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304)
* A vulnerability was discovered in tomcat's handling of pipelined requests when "Sendfile" was used. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure. (CVE-2017-5647)
* A vulnerability was discovered in the error page mechanism in Tomcat's DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. (CVE-2017-5664)
* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients. (CVE-2016-8610)
Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat JBoss Web Server 2.1.2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nApache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nThis release provides an update to OpenSSL and Tomcat 6/7 for Red Hat JBoss Web Server 2.1.2. The updates are documented in the Release Notes document linked to in the References.\n\nUsers of Red Hat JBoss Web Server 2.1.2 should upgrade to these updated packages, which resolve several security issues.\n\nSecurity Fix(es):\n\n* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304)\n\n* A vulnerability was discovered in tomcat\u0027s handling of pipelined requests when \"Sendfile\" was used. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure. (CVE-2017-5647)\n\n* A vulnerability was discovered in the error page mechanism in Tomcat\u0027s DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. (CVE-2017-5664)\n\n* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients. (CVE-2016-8610)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:2494", "url": "https://access.redhat.com/errata/RHSA-2017:2494" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=2.1.2", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=2.1.2" }, { "category": "external", "summary": "https://access.redhat.com/articles/3155411", "url": "https://access.redhat.com/articles/3155411" }, { "category": "external", "summary": "1377600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600" }, { "category": "external", "summary": "1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "external", "summary": "1441205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441205" }, { "category": "external", "summary": "1459158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459158" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2494.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 2 security update", "tracking": { "current_release_date": "2025-08-03T16:01:19+00:00", "generator": { "date": "2025-08-03T16:01:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:2494", "initial_release_date": "2017-08-21T15:22:58+00:00", "revision_history": [ { "date": "2017-08-21T15:22:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-08-21T15:22:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T16:01:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 2.1", "product": { "name": "Red Hat JBoss Web Server 2.1", "product_id": "Red Hat JBoss Web Server 2.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2.1" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc.", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-6304", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2016-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1377600" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: OCSP Status Request extension unbounded memory growth", "title": "Vulnerability summary" }, { "category": "other", "text": "TLS server applications using OpenSSL versions in Red Hat Enterprise Linux 6 and 7 are only affected if they enable OCSP stapling support. Applications not enabling OCSP stapling support are not affected. Few applications implement OCSP stapling support and typically do not enable it by default.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6304" }, { "category": "external", "summary": "RHBZ#1377600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377600" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6304", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6304" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-09-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-21T15:22:58+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2494" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 2.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "openssl: OCSP Status Request extension unbounded memory growth" }, { "acknowledgments": [ { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc." } ], "cve": "CVE-2016-8610", "discovery_date": "2016-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384743" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "Vulnerability description" }, { "category": "summary", "text": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects applications that are compiled against OpenSSL or GnuTLS and do not allocate an extra thread for processing ClientHello messages. Nginx is affected by this issue; Apache httpd is not affected by this issue. This issue has been rated as having a security impact of Moderate. It requires an attacker to send a very large amount of SSL ALERT messages to the host network connection. This issue can also be mitigated by configuring firewalls to limit the number of connections per IP address, or use deep packet inspection to reject these type of alert packets. A future update may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "RHBZ#1384743", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384743" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8610", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8610" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610" }, { "category": "external", "summary": "http://security.360.cn/cve/CVE-2016-8610", "url": "http://security.360.cn/cve/CVE-2016-8610" } ], "release_date": "2016-10-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-21T15:22:58+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2494" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 2.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS" }, { "cve": "CVE-2017-5647", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1441205" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in Tomcat\u0027s handling of pipelined requests when \"Sendfile\" was used. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incorrect handling of pipelined requests when send file was used", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5647" }, { "category": "external", "summary": "RHBZ#1441205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1441205" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5647", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5647" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5647", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5647" } ], "release_date": "2017-04-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-21T15:22:58+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2494" }, { "category": "workaround", "details": "The AJP connector does not support the sendfile capability. A server configured to only use the AJP connector (disable HTTP Connector) is not affected by this vulnerability.\n\nDisable the sendfile capability by setting useSendfile=\"false\" in the HTTP connector configuration. Note: Disabling sendfile, may impact performance on large files.", "product_ids": [ "Red Hat JBoss Web Server 2.1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 2.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Incorrect handling of pipelined requests when send file was used" }, { "cve": "CVE-2017-5664", "cwe": { "id": "CWE-266", "name": "Incorrect Privilege Assignment" }, "discovery_date": "2017-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1459158" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in the error page mechanism in Tomcat\u0027s DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Security constrained bypass in error page mechanism", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw can be triggered for static error pages only if the readonly property for the DefaultServlet is set to false in the $CATALINA_HOME/conf/web.xml file. The default for readonly is true.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5664" }, { "category": "external", "summary": "RHBZ#1459158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1459158" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5664", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5664" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5664", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5664" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.78", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.78" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.44", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.44" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.15", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.15" } ], "release_date": "2017-06-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-21T15:22:58+00:00", "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat JBoss Web Server 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:2494" }, { "category": "workaround", "details": "If it is necessary to have the DefaultServlet property readonly=false, use a jsp error page, for example Error404.jsp rather than a static html error page. Alternatively do not specify an error-page in the Deployment Descriptor and use a custom ErrorReportValve.", "product_ids": [ "Red Hat JBoss Web Server 2.1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Server 2.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: Security constrained bypass in error page mechanism" } ] }
gsd-2016-8610
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2016-8610", "description": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "id": "GSD-2016-8610", "references": [ "https://www.suse.com/security/cve/CVE-2016-8610.html", "https://www.debian.org/security/2017/dsa-3773", "https://access.redhat.com/errata/RHSA-2017:2494", "https://access.redhat.com/errata/RHSA-2017:2493", "https://access.redhat.com/errata/RHSA-2017:1802", "https://access.redhat.com/errata/RHSA-2017:1801", "https://access.redhat.com/errata/RHSA-2017:1659", "https://access.redhat.com/errata/RHSA-2017:1658", "https://access.redhat.com/errata/RHSA-2017:1415", "https://access.redhat.com/errata/RHSA-2017:1414", "https://access.redhat.com/errata/RHSA-2017:1413", "https://access.redhat.com/errata/RHSA-2017:0574", "https://access.redhat.com/errata/RHSA-2017:0286", "https://ubuntu.com/security/CVE-2016-8610", "https://advisories.mageia.org/CVE-2016-8610.html", "https://alas.aws.amazon.com/cve/html/CVE-2016-8610.html", "https://linux.oracle.com/cve/CVE-2016-8610.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-8610" ], "details": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "id": "GSD-2016-8610", "modified": "2023-12-13T01:21:22.740296Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-8610", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OpenSSL", "version": { "version_data": [ { "version_affected": "=", "version_value": "All 0.9.8" }, { "version_affected": "=", "version_value": "All 1.0.1" }, { "version_affected": "=", "version_value": "1.0.2 through 1.0.2h" }, { "version_affected": "=", "version_value": "1.1.0" } ] } } ] }, "vendor_name": "OpenSSL" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-400", "lang": "eng", "value": "CWE-400" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.oracle.com/security-alerts/cpuapr2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "https://www.oracle.com/security-alerts/cpujan2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "name": "https://security.360.cn/cve/CVE-2016-8610/", "refsource": "MISC", "url": "https://security.360.cn/cve/CVE-2016-8610/" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2017-0286.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2017-0286.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2017-0574.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2017-0574.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2017-1415.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2017-1659.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2017-1659.html" }, { "name": "http://seclists.org/oss-sec/2016/q4/224", "refsource": "MISC", "url": "http://seclists.org/oss-sec/2016/q4/224" }, { "name": "http://www.securityfocus.com/bid/93841", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/93841" }, { "name": "http://www.securitytracker.com/id/1037084", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1037084" }, { "name": "https://access.redhat.com/errata/RHSA-2017:1413", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2017:1413" }, { "name": "https://access.redhat.com/errata/RHSA-2017:1414", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2017:1414" }, { "name": "https://access.redhat.com/errata/RHSA-2017:1658", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2017:1658" }, { "name": "https://access.redhat.com/errata/RHSA-2017:1801", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2017:1801" }, { "name": "https://access.redhat.com/errata/RHSA-2017:1802", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2017:1802" }, { "name": "https://access.redhat.com/errata/RHSA-2017:2493", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2017:2493" }, { "name": "https://access.redhat.com/errata/RHSA-2017:2494", "refsource": "MISC", "url": "https://access.redhat.com/errata/RHSA-2017:2494" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610" }, { "name": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401", "refsource": "MISC", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401" }, { "name": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc", "refsource": "MISC", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc" }, { "name": "https://security.netapp.com/advisory/ntap-20171130-0001/", "refsource": "MISC", "url": "https://security.netapp.com/advisory/ntap-20171130-0001/" }, { "name": "https://security.paloaltonetworks.com/CVE-2016-8610", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2016-8610" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03897en_us", "refsource": "MISC", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03897en_us" }, { "name": "https://www.debian.org/security/2017/dsa-3773", "refsource": "MISC", "url": "https://www.debian.org/security/2017/dsa-3773" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD3F477-4078-42BC-AF81-A68487FCDBEC", "versionEndIncluding": "1.0.2h", "versionStartIncluding": "1.0.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "8A4E446D-B9D3-45F2-9722-B41FA14A6C31", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2D1C00C0-C77E-4255-9ECA-20F2673C7366", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "73104834-5810-48DD-9B97-549D223853F1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8442C20-41F9-47FD-9A12-E724D3A31FD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B142ACCC-F7A9-4A3B-BE60-0D6691D5058D", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1ABA871-3271-48E2-A69C-5AD70AF94E53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:cn1610_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB30733E-68FC-49C4-86C0-7FEE75C366BF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:cn1610:-:*:*:*:*:*:*:*", "matchCriteriaId": "6361DAC6-600F-4B15-8797-D67F298F46FB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*", "matchCriteriaId": "62347994-1353-497C-9C4A-D5D8D95F67E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:data_ontap:-:*:*:*:*:7-mode:*:*", "matchCriteriaId": "6C2ACC32-5147-4EA5-95BE-B6B4EAB3D82B", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0C4B1E5-75BF-43AE-BBAC-0DD4124C71ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C82200F-A26E-4AD4-82FF-DC5601A28D52", "versionEndIncluding": "11.40", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:host_agent:-:*:*:*:*:*:*:*", "matchCriteriaId": "546855F3-654C-48F0-B3A0-FF1ABBF04007", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*", "matchCriteriaId": "3FA5E22C-489B-4C5F-A5F3-C03F45CA8811", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:ontap_select_deploy:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E968916-8CE0-4165-851F-14E37ECEA948", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*", "matchCriteriaId": "146A767F-DC04-454B-9913-17D3A2B5AAA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:smi-s_provider:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BB0FDCF-3750-44C6-AC5C-0CC2AAD14093", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:snapcenter_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "E788440A-02B0-45F5-AFBC-7109F3177033", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:unix:*:*", "matchCriteriaId": "61D7EF01-F618-497F-9375-8003CEA3D380", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ADFF451-740F-4DBA-BD23-3881945D3E40", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:storagegrid_webscale:-:*:*:*:*:*:*:*", "matchCriteriaId": "813CD8F9-9F05-49A7-BB4D-E9A1D54D6DFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FED6CAE-D97F-49E0-9D00-1642A3A427B4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "460EF266-5397-4FB9-B4C3-BECB2FB12AE4", "versionEndIncluding": "6.1.17", "vulnerable": true }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C837CEA-991C-45BA-8DFF-20F4E98E4639", "versionEndIncluding": "7.0.15", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "1558B8D3-B289-4143-A3C2-F8EF29CECDD3", "versionEndIncluding": "7.1.10", "versionStartIncluding": "7.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:adaptive_access_manager:11.1.2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "530B1012-03DF-4AE2-863E-FB07351FE4A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A125E817-F974-4509-872C-B71933F42AD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "55D98C27-734F-490B-92D5-251805C841B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_ip_service_activator:7.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "BDB13348-C8CA-4E71-9DC6-091B09D52E96", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "DE7A60DB-A287-4E61-8131-B6314007191B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:core_rdbms:11.2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E1367C5D-8815-41E6-B609-E855CB8B1AA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:core_rdbms:12.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7E150F02-5B34-4496-A024-335DF64D7F8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:core_rdbms:12.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4059F859-A7D8-4ADD-93EE-74AF082ED34A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:core_rdbms:18c:*:*:*:*:*:*:*", "matchCriteriaId": "C9FFAF8E-4023-4599-9F0D-274E6517CB1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:core_rdbms:19c:*:*:*:*:*:*:*", "matchCriteriaId": "9B639209-A651-43FB-8F0C-B25F605521EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB654DFA-FEF9-4D00-ADB0-F3F2B6ACF13E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "37209C6F-EF99-4D21-9608-B3A06D283D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:goldengate_application_adapters:12.3.2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6F259E6-10A8-4207-8FC2-85ABD70B04C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "41684398-18A4-4DC6-B8A2-3EBAA0CBF9A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*", "matchCriteriaId": "D0A735B4-4F3C-416B-8C08-9CB21BAD2889", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*", "matchCriteriaId": "7E1E416B-920B-49A0-9523-382898C2979D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", "matchCriteriaId": "D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24A3C819-5151-4543-A5C6-998C9387C8A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "4FB98961-8C99-4490-A6B8-9A5158784F5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6DA0527-562D-457F-A2BB-3DF5EAABA1AB", "versionEndExcluding": "18.1.4.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B40B13B7-68B3-4510-968C-6A730EB46462", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C93CC705-1F8C-4870-99E6-14BF264C3811", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F14A818F-AA16-4438-A3E4-E64C9287AC66", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "271CACEB-10F5-4CA8-9C99-3274F18EE62D", "versionEndExcluding": "xcp2361", "vulnerable": true }, { "criteria": "cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF82224E-9EED-472E-A038-768E4179B219", "versionEndExcluding": "xcp3070", "versionStartIncluding": "xcp3000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "983D27DE-BC89-454E-AE47-95A26A3651E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "433EEE1B-134C-48F9-8688-23C5F1ABBF0F", "versionEndExcluding": "xcp2361", "vulnerable": true }, { "criteria": "cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B56D4BF-9328-4998-95F3-D23BD1349280", "versionEndExcluding": "xcp3070", "versionStartIncluding": "xcp3000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*", "matchCriteriaId": "5825AEE1-B668-40BD-86A9-2799430C742C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "47FFEE5C-5DAE-4FAD-9651-7983DE092120", "versionEndExcluding": "xcp2361", "vulnerable": true }, { "criteria": "cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "62AAD1D8-D312-452A-80E7-97FA3238C95F", "versionEndExcluding": "xcp3070", "versionStartIncluding": "xcp3000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DA2D526-BDCF-4A65-914A-B3BA3A0CD613", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FD8BD3B-C35B-4C44-B5A1-FA4646ACB374", "versionEndExcluding": "xcp2361", "vulnerable": true }, { "criteria": "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F429B6AB-44E3-412F-AAE6-33B6F1150262", "versionEndExcluding": "xcp3070", "versionStartIncluding": "xcp3000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE0CF40B-E5BD-4558-9321-184D58EF621D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66D6EF49-7094-41D9-BDF5-AE5846E37418", "versionEndExcluding": "xcp2361", "vulnerable": true }, { "criteria": "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78152A31-DB06-4F13-94EA-D3C94B240EE0", "versionEndExcluding": "xcp3070", "versionStartIncluding": "xcp3000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F3C9C09-7B2B-4DB6-8BE0-35302ED35776", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6593DA00-EE33-4223-BEAE-8DC629E79287", "versionEndExcluding": "xcp2361", "vulnerable": true }, { "criteria": "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB1FF50C-D9D0-4DF0-90F8-9259BD7B315B", "versionEndExcluding": "xcp3070", "versionStartIncluding": "xcp3000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*", "matchCriteriaId": "95503CE5-1D06-4092-A60D-D310AADCAFB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "descriptions": [ { "lang": "en", "value": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients." }, { "lang": "es", "value": "Se ha encontrado un fallo de denegaci\u00f3n de servicio en OpenSSL en las versiones 0.9.8, 1.0.1, 1.0.2 hasta la 1.0.2h y la 1.1.0 en la forma en la que el protocolo TLS/SSL defini\u00f3 el procesamiento de paquetes ALERT durante una negociaci\u00f3n de conexi\u00f3n. Un atacante remoto podr\u00eda emplear este fallo para hacer que un servidor TLS/SSL consuma una cantidad excesiva de recursos de CPU y fracase a la hora de aceptar conexiones de otros clientes." } ], "id": "CVE-2016-8610", "lastModified": "2024-01-26T17:44:24.227", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-13T22:29:00.203", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0286.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0574.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-1659.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2016/q4/224" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93841" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037084" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1413" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1414" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1658" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1801" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1802" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2493" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2494" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.360.cn/cve/CVE-2016-8610/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171130-0001/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2016-8610" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03897en_us" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-3773" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "secalert@redhat.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] } } } }
fkie_cve-2016-8610
Vulnerability from fkie_nvd
Published
2017-11-13 22:29
Modified
2025-04-20 01:37
Severity ?
Summary
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2017-0286.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2017-0574.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2017-1415.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2017-1659.html | Third Party Advisory | |
secalert@redhat.com | http://seclists.org/oss-sec/2016/q4/224 | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/93841 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securitytracker.com/id/1037084 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2017:1413 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2017:1414 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2017:1658 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2017:1801 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2017:1802 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2017:2493 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2017:2494 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610 | Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401 | Broken Link | |
secalert@redhat.com | https://security.360.cn/cve/CVE-2016-8610/ | Third Party Advisory | |
secalert@redhat.com | https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc | Third Party Advisory | |
secalert@redhat.com | https://security.netapp.com/advisory/ntap-20171130-0001/ | Third Party Advisory | |
secalert@redhat.com | https://security.paloaltonetworks.com/CVE-2016-8610 | Third Party Advisory | |
secalert@redhat.com | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us | Third Party Advisory | |
secalert@redhat.com | https://www.debian.org/security/2017/dsa-3773 | Third Party Advisory | |
secalert@redhat.com | https://www.oracle.com/security-alerts/cpuapr2020.html | Patch, Third Party Advisory | |
secalert@redhat.com | https://www.oracle.com/security-alerts/cpujan2020.html | Patch, Third Party Advisory | |
secalert@redhat.com | https://www.oracle.com/security-alerts/cpujul2020.html | Patch, Third Party Advisory | |
secalert@redhat.com | https://www.oracle.com/security-alerts/cpuoct2020.html | Patch, Third Party Advisory | |
secalert@redhat.com | https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | Patch, Third Party Advisory | |
secalert@redhat.com | https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2017-0286.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2017-0574.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2017-1415.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2017-1659.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/oss-sec/2016/q4/224 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/93841 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1037084 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:1413 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:1414 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:1658 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:1801 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:1802 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:2493 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:2494 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.360.cn/cve/CVE-2016-8610/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20171130-0001/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.paloaltonetworks.com/CVE-2016-8610 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2017/dsa-3773 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuapr2020.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujan2020.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujul2020.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpuoct2020.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openssl | openssl | * | |
openssl | openssl | 0.9.8 | |
openssl | openssl | 1.0.1 | |
openssl | openssl | 1.1.0 | |
debian | debian_linux | 8.0 | |
redhat | enterprise_linux_desktop | 6.0 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 6.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_server_aus | 7.3 | |
redhat | enterprise_linux_server_aus | 7.4 | |
redhat | enterprise_linux_server_aus | 7.6 | |
redhat | enterprise_linux_server_eus | 7.3 | |
redhat | enterprise_linux_server_eus | 7.4 | |
redhat | enterprise_linux_server_eus | 7.5 | |
redhat | enterprise_linux_server_eus | 7.6 | |
redhat | enterprise_linux_server_tus | 7.3 | |
redhat | enterprise_linux_server_tus | 7.6 | |
redhat | enterprise_linux_workstation | 6.0 | |
redhat | enterprise_linux_workstation | 7.0 | |
redhat | jboss_enterprise_application_platform | 6.0.0 | |
redhat | jboss_enterprise_application_platform | 6.4.0 | |
redhat | enterprise_linux | 6.0 | |
redhat | enterprise_linux | 7.0 | |
netapp | cn1610_firmware | - | |
netapp | cn1610 | - | |
netapp | clustered_data_ontap_antivirus_connector | - | |
netapp | data_ontap | - | |
netapp | data_ontap_edge | - | |
netapp | e-series_santricity_os_controller | * | |
netapp | host_agent | - | |
netapp | oncommand_balance | - | |
netapp | oncommand_unified_manager | - | |
netapp | oncommand_workflow_automation | - | |
netapp | ontap_select_deploy | - | |
netapp | service_processor | - | |
netapp | smi-s_provider | - | |
netapp | snapcenter_server | - | |
netapp | snapdrive | - | |
netapp | storagegrid | - | |
netapp | storagegrid_webscale | - | |
netapp | clustered_data_ontap | - | |
paloaltonetworks | pan-os | * | |
paloaltonetworks | pan-os | * | |
paloaltonetworks | pan-os | * | |
oracle | adaptive_access_manager | 11.1.2.3.0 | |
oracle | application_testing_suite | 13.3.0.1 | |
oracle | communications_analytics | 12.1.1 | |
oracle | communications_ip_service_activator | 7.3.4 | |
oracle | communications_ip_service_activator | 7.4.0 | |
oracle | core_rdbms | 11.2.0.4 | |
oracle | core_rdbms | 12.1.0.2 | |
oracle | core_rdbms | 12.2.0.1 | |
oracle | core_rdbms | 18c | |
oracle | core_rdbms | 19c | |
oracle | enterprise_manager_ops_center | 12.3.3 | |
oracle | enterprise_manager_ops_center | 12.4.0 | |
oracle | goldengate_application_adapters | 12.3.2.1.0 | |
oracle | jd_edwards_enterpriseone_tools | 9.2 | |
oracle | peoplesoft_enterprise_peopletools | 8.56 | |
oracle | peoplesoft_enterprise_peopletools | 8.57 | |
oracle | peoplesoft_enterprise_peopletools | 8.58 | |
oracle | retail_predictive_application_server | 15.0.3 | |
oracle | retail_predictive_application_server | 16.0.3 | |
oracle | timesten_in-memory_database | * | |
oracle | weblogic_server | 10.3.6.0.0 | |
oracle | weblogic_server | 12.1.3.0.0 | |
oracle | weblogic_server | 12.2.1.3.0 | |
oracle | weblogic_server | 12.2.1.4.0 | |
fujitsu | m10-1_firmware | * | |
fujitsu | m10-1_firmware | * | |
fujitsu | m10-1 | - | |
fujitsu | m10-4_firmware | * | |
fujitsu | m10-4_firmware | * | |
fujitsu | m10-4 | - | |
fujitsu | m10-4s_firmware | * | |
fujitsu | m10-4s_firmware | * | |
fujitsu | m10-4s | - | |
fujitsu | m12-1_firmware | * | |
fujitsu | m12-1_firmware | * | |
fujitsu | m12-1 | - | |
fujitsu | m12-2_firmware | * | |
fujitsu | m12-2_firmware | * | |
fujitsu | m12-2 | - | |
fujitsu | m12-2s_firmware | * | |
fujitsu | m12-2s_firmware | * | |
fujitsu | m12-2s | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BD3F477-4078-42BC-AF81-A68487FCDBEC", "versionEndIncluding": "1.0.2h", "versionStartIncluding": "1.0.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "8A4E446D-B9D3-45F2-9722-B41FA14A6C31", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2D1C00C0-C77E-4255-9ECA-20F2673C7366", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "73104834-5810-48DD-9B97-549D223853F1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8442C20-41F9-47FD-9A12-E724D3A31FD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B142ACCC-F7A9-4A3B-BE60-0D6691D5058D", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1ABA871-3271-48E2-A69C-5AD70AF94E53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:cn1610_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB30733E-68FC-49C4-86C0-7FEE75C366BF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:cn1610:-:*:*:*:*:*:*:*", "matchCriteriaId": "6361DAC6-600F-4B15-8797-D67F298F46FB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap_antivirus_connector:-:*:*:*:*:*:*:*", "matchCriteriaId": "62347994-1353-497C-9C4A-D5D8D95F67E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:data_ontap:-:*:*:*:*:7-mode:*:*", "matchCriteriaId": "6C2ACC32-5147-4EA5-95BE-B6B4EAB3D82B", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0C4B1E5-75BF-43AE-BBAC-0DD4124C71ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C82200F-A26E-4AD4-82FF-DC5601A28D52", "versionEndIncluding": "11.40", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:host_agent:-:*:*:*:*:*:*:*", "matchCriteriaId": "546855F3-654C-48F0-B3A0-FF1ABBF04007", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*", "matchCriteriaId": "3FA5E22C-489B-4C5F-A5F3-C03F45CA8811", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:ontap_select_deploy:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E968916-8CE0-4165-851F-14E37ECEA948", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*", "matchCriteriaId": "146A767F-DC04-454B-9913-17D3A2B5AAA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:smi-s_provider:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BB0FDCF-3750-44C6-AC5C-0CC2AAD14093", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:snapcenter_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "E788440A-02B0-45F5-AFBC-7109F3177033", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:snapdrive:-:*:*:*:*:unix:*:*", "matchCriteriaId": "61D7EF01-F618-497F-9375-8003CEA3D380", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ADFF451-740F-4DBA-BD23-3881945D3E40", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:storagegrid_webscale:-:*:*:*:*:*:*:*", "matchCriteriaId": "813CD8F9-9F05-49A7-BB4D-E9A1D54D6DFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FED6CAE-D97F-49E0-9D00-1642A3A427B4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "460EF266-5397-4FB9-B4C3-BECB2FB12AE4", "versionEndIncluding": "6.1.17", "vulnerable": true }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C837CEA-991C-45BA-8DFF-20F4E98E4639", "versionEndIncluding": "7.0.15", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "1558B8D3-B289-4143-A3C2-F8EF29CECDD3", "versionEndIncluding": "7.1.10", "versionStartIncluding": "7.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:adaptive_access_manager:11.1.2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "530B1012-03DF-4AE2-863E-FB07351FE4A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:application_testing_suite:13.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A125E817-F974-4509-872C-B71933F42AD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "55D98C27-734F-490B-92D5-251805C841B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_ip_service_activator:7.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "BDB13348-C8CA-4E71-9DC6-091B09D52E96", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "DE7A60DB-A287-4E61-8131-B6314007191B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:core_rdbms:11.2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E1367C5D-8815-41E6-B609-E855CB8B1AA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:core_rdbms:12.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7E150F02-5B34-4496-A024-335DF64D7F8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:core_rdbms:12.2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "4059F859-A7D8-4ADD-93EE-74AF082ED34A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:core_rdbms:18c:*:*:*:*:*:*:*", "matchCriteriaId": "C9FFAF8E-4023-4599-9F0D-274E6517CB1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:core_rdbms:19c:*:*:*:*:*:*:*", "matchCriteriaId": "9B639209-A651-43FB-8F0C-B25F605521EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB654DFA-FEF9-4D00-ADB0-F3F2B6ACF13E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "37209C6F-EF99-4D21-9608-B3A06D283D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:goldengate_application_adapters:12.3.2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F6F259E6-10A8-4207-8FC2-85ABD70B04C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "41684398-18A4-4DC6-B8A2-3EBAA0CBF9A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*", "matchCriteriaId": "D0A735B4-4F3C-416B-8C08-9CB21BAD2889", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*", "matchCriteriaId": "7E1E416B-920B-49A0-9523-382898C2979D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", "matchCriteriaId": "D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_predictive_application_server:15.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24A3C819-5151-4543-A5C6-998C9387C8A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_predictive_application_server:16.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "4FB98961-8C99-4490-A6B8-9A5158784F5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6DA0527-562D-457F-A2BB-3DF5EAABA1AB", "versionEndExcluding": "18.1.4.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B40B13B7-68B3-4510-968C-6A730EB46462", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C93CC705-1F8C-4870-99E6-14BF264C3811", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F14A818F-AA16-4438-A3E4-E64C9287AC66", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "271CACEB-10F5-4CA8-9C99-3274F18EE62D", "versionEndExcluding": "xcp2361", "vulnerable": true }, { "criteria": "cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF82224E-9EED-472E-A038-768E4179B219", "versionEndExcluding": "xcp3070", "versionStartIncluding": "xcp3000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "983D27DE-BC89-454E-AE47-95A26A3651E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "433EEE1B-134C-48F9-8688-23C5F1ABBF0F", "versionEndExcluding": "xcp2361", "vulnerable": true }, { "criteria": "cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B56D4BF-9328-4998-95F3-D23BD1349280", "versionEndExcluding": "xcp3070", "versionStartIncluding": "xcp3000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*", "matchCriteriaId": "5825AEE1-B668-40BD-86A9-2799430C742C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "47FFEE5C-5DAE-4FAD-9651-7983DE092120", "versionEndExcluding": "xcp2361", "vulnerable": true }, { "criteria": "cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "62AAD1D8-D312-452A-80E7-97FA3238C95F", "versionEndExcluding": "xcp3070", "versionStartIncluding": "xcp3000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DA2D526-BDCF-4A65-914A-B3BA3A0CD613", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FD8BD3B-C35B-4C44-B5A1-FA4646ACB374", "versionEndExcluding": "xcp2361", "vulnerable": true }, { "criteria": "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F429B6AB-44E3-412F-AAE6-33B6F1150262", "versionEndExcluding": "xcp3070", "versionStartIncluding": "xcp3000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE0CF40B-E5BD-4558-9321-184D58EF621D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "66D6EF49-7094-41D9-BDF5-AE5846E37418", "versionEndExcluding": "xcp2361", "vulnerable": true }, { "criteria": "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "78152A31-DB06-4F13-94EA-D3C94B240EE0", "versionEndExcluding": "xcp3070", "versionStartIncluding": "xcp3000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F3C9C09-7B2B-4DB6-8BE0-35302ED35776", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6593DA00-EE33-4223-BEAE-8DC629E79287", "versionEndExcluding": "xcp2361", "vulnerable": true }, { "criteria": "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB1FF50C-D9D0-4DF0-90F8-9259BD7B315B", "versionEndExcluding": "xcp3070", "versionStartIncluding": "xcp3000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*", "matchCriteriaId": "95503CE5-1D06-4092-A60D-D310AADCAFB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients." }, { "lang": "es", "value": "Se ha encontrado un fallo de denegaci\u00f3n de servicio en OpenSSL en las versiones 0.9.8, 1.0.1, 1.0.2 hasta la 1.0.2h y la 1.1.0 en la forma en la que el protocolo TLS/SSL defini\u00f3 el procesamiento de paquetes ALERT durante una negociaci\u00f3n de conexi\u00f3n. Un atacante remoto podr\u00eda emplear este fallo para hacer que un servidor TLS/SSL consuma una cantidad excesiva de recursos de CPU y fracase a la hora de aceptar conexiones de otros clientes." } ], "id": "CVE-2016-8610", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-13T22:29:00.203", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0286.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0574.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-1659.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2016/q4/224" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93841" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037084" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1413" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1414" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1658" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1801" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1802" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2493" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2494" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.360.cn/cve/CVE-2016-8610/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171130-0001/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2016-8610" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03897en_us" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-3773" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0286.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0574.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-1659.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2016/q4/224" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1658" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1801" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1802" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2494" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.360.cn/cve/CVE-2016-8610/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171130-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2016-8610" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03897en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-3773" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "secalert@redhat.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
opensuse-su-2024:10801-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
gnutls-3.7.2-1.2 on GA media
Notes
Title of the patch
gnutls-3.7.2-1.2 on GA media
Description of the patch
These are all security issues fixed in the gnutls-3.7.2-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10801
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "gnutls-3.7.2-1.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the gnutls-3.7.2-1.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10801", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10801-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2006-4790 page", "url": "https://www.suse.com/security/cve/CVE-2006-4790/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-1948 page", "url": "https://www.suse.com/security/cve/CVE-2008-1948/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-1949 page", "url": "https://www.suse.com/security/cve/CVE-2008-1949/" }, { "category": "self", "summary": "SUSE CVE CVE-2008-1950 page", "url": "https://www.suse.com/security/cve/CVE-2008-1950/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8610 page", "url": "https://www.suse.com/security/cve/CVE-2016-8610/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7869 page", "url": "https://www.suse.com/security/cve/CVE-2017-7869/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10846 page", "url": "https://www.suse.com/security/cve/CVE-2018-10846/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3829 page", "url": "https://www.suse.com/security/cve/CVE-2019-3829/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3836 page", "url": "https://www.suse.com/security/cve/CVE-2019-3836/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13777 page", "url": "https://www.suse.com/security/cve/CVE-2020-13777/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-20232 page", "url": "https://www.suse.com/security/cve/CVE-2021-20232/" } ], "title": "gnutls-3.7.2-1.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10801-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "gnutls-3.7.2-1.2.aarch64", "product": { "name": "gnutls-3.7.2-1.2.aarch64", "product_id": "gnutls-3.7.2-1.2.aarch64" } }, { "category": "product_version", "name": "gnutls-guile-3.7.2-1.2.aarch64", "product": { "name": "gnutls-guile-3.7.2-1.2.aarch64", "product_id": "gnutls-guile-3.7.2-1.2.aarch64" } }, { "category": "product_version", "name": "libgnutls-dane-devel-3.7.2-1.2.aarch64", "product": { "name": "libgnutls-dane-devel-3.7.2-1.2.aarch64", "product_id": "libgnutls-dane-devel-3.7.2-1.2.aarch64" } }, { "category": "product_version", "name": "libgnutls-dane0-3.7.2-1.2.aarch64", "product": { "name": "libgnutls-dane0-3.7.2-1.2.aarch64", "product_id": "libgnutls-dane0-3.7.2-1.2.aarch64" } }, { "category": "product_version", "name": "libgnutls-devel-3.7.2-1.2.aarch64", "product": { "name": "libgnutls-devel-3.7.2-1.2.aarch64", "product_id": "libgnutls-devel-3.7.2-1.2.aarch64" } }, { "category": "product_version", "name": "libgnutls-devel-32bit-3.7.2-1.2.aarch64", "product": { "name": "libgnutls-devel-32bit-3.7.2-1.2.aarch64", "product_id": "libgnutls-devel-32bit-3.7.2-1.2.aarch64" } }, { "category": "product_version", "name": "libgnutls30-3.7.2-1.2.aarch64", "product": { "name": "libgnutls30-3.7.2-1.2.aarch64", "product_id": "libgnutls30-3.7.2-1.2.aarch64" } }, { "category": "product_version", "name": "libgnutls30-32bit-3.7.2-1.2.aarch64", "product": { "name": "libgnutls30-32bit-3.7.2-1.2.aarch64", "product_id": "libgnutls30-32bit-3.7.2-1.2.aarch64" } }, { "category": "product_version", "name": "libgnutls30-hmac-3.7.2-1.2.aarch64", "product": { "name": "libgnutls30-hmac-3.7.2-1.2.aarch64", "product_id": "libgnutls30-hmac-3.7.2-1.2.aarch64" } }, { "category": "product_version", "name": "libgnutlsxx-devel-3.7.2-1.2.aarch64", "product": { "name": "libgnutlsxx-devel-3.7.2-1.2.aarch64", "product_id": "libgnutlsxx-devel-3.7.2-1.2.aarch64" } }, { "category": "product_version", "name": "libgnutlsxx28-3.7.2-1.2.aarch64", "product": { "name": "libgnutlsxx28-3.7.2-1.2.aarch64", "product_id": "libgnutlsxx28-3.7.2-1.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "gnutls-3.7.2-1.2.ppc64le", "product": { "name": "gnutls-3.7.2-1.2.ppc64le", "product_id": "gnutls-3.7.2-1.2.ppc64le" } }, { "category": "product_version", "name": "gnutls-guile-3.7.2-1.2.ppc64le", "product": { "name": "gnutls-guile-3.7.2-1.2.ppc64le", "product_id": "gnutls-guile-3.7.2-1.2.ppc64le" } }, { "category": "product_version", "name": "libgnutls-dane-devel-3.7.2-1.2.ppc64le", "product": { "name": "libgnutls-dane-devel-3.7.2-1.2.ppc64le", "product_id": "libgnutls-dane-devel-3.7.2-1.2.ppc64le" } }, { "category": "product_version", "name": "libgnutls-dane0-3.7.2-1.2.ppc64le", "product": { "name": "libgnutls-dane0-3.7.2-1.2.ppc64le", "product_id": "libgnutls-dane0-3.7.2-1.2.ppc64le" } }, { "category": "product_version", "name": "libgnutls-devel-3.7.2-1.2.ppc64le", "product": { "name": "libgnutls-devel-3.7.2-1.2.ppc64le", "product_id": "libgnutls-devel-3.7.2-1.2.ppc64le" } }, { "category": "product_version", "name": "libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "product": { "name": "libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "product_id": "libgnutls-devel-32bit-3.7.2-1.2.ppc64le" } }, { "category": "product_version", "name": "libgnutls30-3.7.2-1.2.ppc64le", "product": { "name": "libgnutls30-3.7.2-1.2.ppc64le", "product_id": "libgnutls30-3.7.2-1.2.ppc64le" } }, { "category": "product_version", "name": "libgnutls30-32bit-3.7.2-1.2.ppc64le", "product": { "name": "libgnutls30-32bit-3.7.2-1.2.ppc64le", "product_id": "libgnutls30-32bit-3.7.2-1.2.ppc64le" } }, { "category": "product_version", "name": "libgnutls30-hmac-3.7.2-1.2.ppc64le", "product": { "name": "libgnutls30-hmac-3.7.2-1.2.ppc64le", "product_id": "libgnutls30-hmac-3.7.2-1.2.ppc64le" } }, { "category": "product_version", "name": "libgnutlsxx-devel-3.7.2-1.2.ppc64le", "product": { "name": "libgnutlsxx-devel-3.7.2-1.2.ppc64le", "product_id": "libgnutlsxx-devel-3.7.2-1.2.ppc64le" } }, { "category": "product_version", "name": "libgnutlsxx28-3.7.2-1.2.ppc64le", "product": { "name": "libgnutlsxx28-3.7.2-1.2.ppc64le", "product_id": "libgnutlsxx28-3.7.2-1.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "gnutls-3.7.2-1.2.s390x", "product": { "name": "gnutls-3.7.2-1.2.s390x", "product_id": "gnutls-3.7.2-1.2.s390x" } }, { "category": "product_version", "name": "gnutls-guile-3.7.2-1.2.s390x", "product": { "name": "gnutls-guile-3.7.2-1.2.s390x", "product_id": "gnutls-guile-3.7.2-1.2.s390x" } }, { "category": "product_version", "name": "libgnutls-dane-devel-3.7.2-1.2.s390x", "product": { "name": "libgnutls-dane-devel-3.7.2-1.2.s390x", "product_id": "libgnutls-dane-devel-3.7.2-1.2.s390x" } }, { "category": "product_version", "name": "libgnutls-dane0-3.7.2-1.2.s390x", "product": { "name": "libgnutls-dane0-3.7.2-1.2.s390x", "product_id": "libgnutls-dane0-3.7.2-1.2.s390x" } }, { "category": "product_version", "name": "libgnutls-devel-3.7.2-1.2.s390x", "product": { "name": "libgnutls-devel-3.7.2-1.2.s390x", "product_id": "libgnutls-devel-3.7.2-1.2.s390x" } }, { "category": "product_version", "name": "libgnutls-devel-32bit-3.7.2-1.2.s390x", "product": { "name": "libgnutls-devel-32bit-3.7.2-1.2.s390x", "product_id": "libgnutls-devel-32bit-3.7.2-1.2.s390x" } }, { "category": "product_version", "name": "libgnutls30-3.7.2-1.2.s390x", "product": { "name": "libgnutls30-3.7.2-1.2.s390x", "product_id": "libgnutls30-3.7.2-1.2.s390x" } }, { "category": "product_version", "name": "libgnutls30-32bit-3.7.2-1.2.s390x", "product": { "name": "libgnutls30-32bit-3.7.2-1.2.s390x", "product_id": "libgnutls30-32bit-3.7.2-1.2.s390x" } }, { "category": "product_version", "name": "libgnutls30-hmac-3.7.2-1.2.s390x", "product": { "name": "libgnutls30-hmac-3.7.2-1.2.s390x", "product_id": "libgnutls30-hmac-3.7.2-1.2.s390x" } }, { "category": "product_version", "name": "libgnutlsxx-devel-3.7.2-1.2.s390x", "product": { "name": "libgnutlsxx-devel-3.7.2-1.2.s390x", "product_id": "libgnutlsxx-devel-3.7.2-1.2.s390x" } }, { "category": "product_version", "name": "libgnutlsxx28-3.7.2-1.2.s390x", "product": { "name": "libgnutlsxx28-3.7.2-1.2.s390x", "product_id": "libgnutlsxx28-3.7.2-1.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gnutls-3.7.2-1.2.x86_64", "product": { "name": "gnutls-3.7.2-1.2.x86_64", "product_id": "gnutls-3.7.2-1.2.x86_64" } }, { "category": "product_version", "name": "gnutls-guile-3.7.2-1.2.x86_64", "product": { "name": "gnutls-guile-3.7.2-1.2.x86_64", "product_id": "gnutls-guile-3.7.2-1.2.x86_64" } }, { "category": "product_version", "name": "libgnutls-dane-devel-3.7.2-1.2.x86_64", "product": { "name": "libgnutls-dane-devel-3.7.2-1.2.x86_64", "product_id": "libgnutls-dane-devel-3.7.2-1.2.x86_64" } }, { "category": "product_version", "name": "libgnutls-dane0-3.7.2-1.2.x86_64", "product": { "name": "libgnutls-dane0-3.7.2-1.2.x86_64", "product_id": "libgnutls-dane0-3.7.2-1.2.x86_64" } }, { "category": "product_version", "name": "libgnutls-devel-3.7.2-1.2.x86_64", "product": { "name": "libgnutls-devel-3.7.2-1.2.x86_64", "product_id": "libgnutls-devel-3.7.2-1.2.x86_64" } }, { "category": "product_version", "name": "libgnutls-devel-32bit-3.7.2-1.2.x86_64", "product": { "name": "libgnutls-devel-32bit-3.7.2-1.2.x86_64", "product_id": "libgnutls-devel-32bit-3.7.2-1.2.x86_64" } }, { "category": "product_version", "name": "libgnutls30-3.7.2-1.2.x86_64", "product": { "name": "libgnutls30-3.7.2-1.2.x86_64", "product_id": "libgnutls30-3.7.2-1.2.x86_64" } }, { "category": "product_version", "name": "libgnutls30-32bit-3.7.2-1.2.x86_64", "product": { "name": "libgnutls30-32bit-3.7.2-1.2.x86_64", "product_id": "libgnutls30-32bit-3.7.2-1.2.x86_64" } }, { "category": "product_version", "name": "libgnutls30-hmac-3.7.2-1.2.x86_64", "product": { "name": "libgnutls30-hmac-3.7.2-1.2.x86_64", "product_id": "libgnutls30-hmac-3.7.2-1.2.x86_64" } }, { "category": "product_version", "name": "libgnutlsxx-devel-3.7.2-1.2.x86_64", "product": { "name": "libgnutlsxx-devel-3.7.2-1.2.x86_64", "product_id": "libgnutlsxx-devel-3.7.2-1.2.x86_64" } }, { "category": "product_version", "name": "libgnutlsxx28-3.7.2-1.2.x86_64", "product": { "name": "libgnutlsxx28-3.7.2-1.2.x86_64", "product_id": "libgnutlsxx28-3.7.2-1.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.7.2-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64" }, "product_reference": "gnutls-3.7.2-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.7.2-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le" }, "product_reference": "gnutls-3.7.2-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.7.2-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x" }, "product_reference": "gnutls-3.7.2-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-3.7.2-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64" }, "product_reference": "gnutls-3.7.2-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-3.7.2-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64" }, "product_reference": "gnutls-guile-3.7.2-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-3.7.2-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le" }, "product_reference": "gnutls-guile-3.7.2-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-3.7.2-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x" }, "product_reference": "gnutls-guile-3.7.2-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gnutls-guile-3.7.2-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64" }, "product_reference": "gnutls-guile-3.7.2-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-dane-devel-3.7.2-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64" }, "product_reference": "libgnutls-dane-devel-3.7.2-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-dane-devel-3.7.2-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le" }, "product_reference": "libgnutls-dane-devel-3.7.2-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-dane-devel-3.7.2-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x" }, "product_reference": "libgnutls-dane-devel-3.7.2-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-dane-devel-3.7.2-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64" }, "product_reference": "libgnutls-dane-devel-3.7.2-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-dane0-3.7.2-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64" }, "product_reference": "libgnutls-dane0-3.7.2-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-dane0-3.7.2-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le" }, "product_reference": "libgnutls-dane0-3.7.2-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-dane0-3.7.2-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x" }, "product_reference": "libgnutls-dane0-3.7.2-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-dane0-3.7.2-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64" }, "product_reference": "libgnutls-dane0-3.7.2-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-3.7.2-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64" }, "product_reference": "libgnutls-devel-3.7.2-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-3.7.2-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le" }, "product_reference": "libgnutls-devel-3.7.2-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-3.7.2-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x" }, "product_reference": "libgnutls-devel-3.7.2-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-3.7.2-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64" }, "product_reference": "libgnutls-devel-3.7.2-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-32bit-3.7.2-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64" }, "product_reference": "libgnutls-devel-32bit-3.7.2-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-32bit-3.7.2-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le" }, "product_reference": "libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-32bit-3.7.2-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x" }, "product_reference": "libgnutls-devel-32bit-3.7.2-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls-devel-32bit-3.7.2-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64" }, "product_reference": "libgnutls-devel-32bit-3.7.2-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-3.7.2-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64" }, "product_reference": "libgnutls30-3.7.2-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-3.7.2-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le" }, "product_reference": "libgnutls30-3.7.2-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-3.7.2-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x" }, "product_reference": "libgnutls30-3.7.2-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-3.7.2-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64" }, "product_reference": "libgnutls30-3.7.2-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-32bit-3.7.2-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64" }, "product_reference": "libgnutls30-32bit-3.7.2-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-32bit-3.7.2-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le" }, "product_reference": "libgnutls30-32bit-3.7.2-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-32bit-3.7.2-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x" }, "product_reference": "libgnutls30-32bit-3.7.2-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-32bit-3.7.2-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64" }, "product_reference": "libgnutls30-32bit-3.7.2-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-hmac-3.7.2-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64" }, "product_reference": "libgnutls30-hmac-3.7.2-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-hmac-3.7.2-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le" }, "product_reference": "libgnutls30-hmac-3.7.2-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-hmac-3.7.2-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x" }, "product_reference": "libgnutls30-hmac-3.7.2-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutls30-hmac-3.7.2-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64" }, "product_reference": "libgnutls30-hmac-3.7.2-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx-devel-3.7.2-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64" }, "product_reference": "libgnutlsxx-devel-3.7.2-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx-devel-3.7.2-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le" }, "product_reference": "libgnutlsxx-devel-3.7.2-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx-devel-3.7.2-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x" }, "product_reference": "libgnutlsxx-devel-3.7.2-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx-devel-3.7.2-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64" }, "product_reference": "libgnutlsxx-devel-3.7.2-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx28-3.7.2-1.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64" }, "product_reference": "libgnutlsxx28-3.7.2-1.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx28-3.7.2-1.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le" }, "product_reference": "libgnutlsxx28-3.7.2-1.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx28-3.7.2-1.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x" }, "product_reference": "libgnutlsxx28-3.7.2-1.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgnutlsxx28-3.7.2-1.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" }, "product_reference": "libgnutlsxx28-3.7.2-1.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-4790", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2006-4790" } ], "notes": [ { "category": "general", "text": "verify.c in GnuTLS before 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents GnuTLS from correctly verifying X.509 and other certificates that use PKCS, a variant of CVE-2006-4339.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2006-4790", "url": "https://www.suse.com/security/cve/CVE-2006-4790" }, { "category": "external", "summary": "SUSE Bug 1107874 for CVE-2006-4790", "url": "https://bugzilla.suse.com/1107874" }, { "category": "external", "summary": "SUSE Bug 206636 for CVE-2006-4790", "url": "https://bugzilla.suse.com/206636" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2006-4790" }, { "cve": "CVE-2008-1948", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-1948" } ], "notes": [ { "category": "general", "text": "The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a zero value for the length of Server Names, which leads to a buffer overflow in session resumption data in the pack_security_parameters function, aka GNUTLS-SA-2008-1-1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-1948", "url": "https://www.suse.com/security/cve/CVE-2008-1948" }, { "category": "external", "summary": "SUSE Bug 392947 for CVE-2008-1948", "url": "https://bugzilla.suse.com/392947" }, { "category": "external", "summary": "SUSE Bug 670152 for CVE-2008-1948", "url": "https://bugzilla.suse.com/670152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2008-1948" }, { "cve": "CVE-2008-1949", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-1949" } ], "notes": [ { "category": "general", "text": "The _gnutls_recv_client_kx_message function in lib/gnutls_kx.c in libgnutls in gnutls-serv in GnuTLS before 2.2.4 continues to process Client Hello messages within a TLS message after one has already been processed, which allows remote attackers to cause a denial of service (NULL dereference and crash) via a TLS message containing multiple Client Hello messages, aka GNUTLS-SA-2008-1-2.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-1949", "url": "https://www.suse.com/security/cve/CVE-2008-1949" }, { "category": "external", "summary": "SUSE Bug 392947 for CVE-2008-1949", "url": "https://bugzilla.suse.com/392947" }, { "category": "external", "summary": "SUSE Bug 670152 for CVE-2008-1949", "url": "https://bugzilla.suse.com/670152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2008-1949" }, { "cve": "CVE-2008-1950", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2008-1950" } ], "notes": [ { "category": "general", "text": "Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS before 2.2.4 allows remote attackers to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encrypted Client Hello message within a TLS record with an invalid Record Length, which leads to an invalid cipher padding length, aka GNUTLS-SA-2008-1-3.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2008-1950", "url": "https://www.suse.com/security/cve/CVE-2008-1950" }, { "category": "external", "summary": "SUSE Bug 392947 for CVE-2008-1950", "url": "https://bugzilla.suse.com/392947" }, { "category": "external", "summary": "SUSE Bug 670152 for CVE-2008-1950", "url": "https://bugzilla.suse.com/670152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2008-1950" }, { "cve": "CVE-2016-8610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8610" } ], "notes": [ { "category": "general", "text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8610", "url": "https://www.suse.com/security/cve/CVE-2016-8610" }, { "category": "external", "summary": "SUSE Bug 1005878 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005878" }, { "category": "external", "summary": "SUSE Bug 1005879 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1005879" }, { "category": "external", "summary": "SUSE Bug 1110018 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1110018" }, { "category": "external", "summary": "SUSE Bug 1120592 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1120592" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1148697 for CVE-2016-8610", "url": "https://bugzilla.suse.com/1148697" }, { "category": "external", "summary": "SUSE Bug 982575 for CVE-2016-8610", "url": "https://bugzilla.suse.com/982575" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-8610" }, { "cve": "CVE-2017-7869", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7869" } ], "notes": [ { "category": "general", "text": "GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor\u0027s GNUTLS-SA-2017-3 report) is fixed in 3.5.10.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7869", "url": "https://www.suse.com/security/cve/CVE-2017-7869" }, { "category": "external", "summary": "SUSE Bug 1034173 for CVE-2017-7869", "url": "https://bugzilla.suse.com/1034173" }, { "category": "external", "summary": "SUSE Bug 1038337 for CVE-2017-7869", "url": "https://bugzilla.suse.com/1038337" }, { "category": "external", "summary": "SUSE Bug 1049210 for CVE-2017-7869", "url": "https://bugzilla.suse.com/1049210" }, { "category": "external", "summary": "SUSE Bug 1149679 for CVE-2017-7869", "url": "https://bugzilla.suse.com/1149679" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2017-7869" }, { "cve": "CVE-2018-10846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10846" } ], "notes": [ { "category": "general", "text": "A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of \"Just in Time\" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10846", "url": "https://www.suse.com/security/cve/CVE-2018-10846" }, { "category": "external", "summary": "SUSE Bug 1105460 for CVE-2018-10846", "url": "https://bugzilla.suse.com/1105460" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10846" }, { "cve": "CVE-2019-3829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3829" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7. A memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is affected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3829", "url": "https://www.suse.com/security/cve/CVE-2019-3829" }, { "category": "external", "summary": "SUSE Bug 1130681 for CVE-2019-3829", "url": "https://bugzilla.suse.com/1130681" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3829" }, { "cve": "CVE-2019-3836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3836" } ], "notes": [ { "category": "general", "text": "It was discovered in gnutls before version 3.6.7 upstream that there is an uninitialized pointer access in gnutls versions 3.6.3 or later which can be triggered by certain post-handshake messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3836", "url": "https://www.suse.com/security/cve/CVE-2019-3836" }, { "category": "external", "summary": "SUSE Bug 1130682 for CVE-2019-3836", "url": "https://bugzilla.suse.com/1130682" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3836" }, { "cve": "CVE-2020-13777", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13777" } ], "notes": [ { "category": "general", "text": "GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13777", "url": "https://www.suse.com/security/cve/CVE-2020-13777" }, { "category": "external", "summary": "SUSE Bug 1172461 for CVE-2020-13777", "url": "https://bugzilla.suse.com/1172461" }, { "category": "external", "summary": "SUSE Bug 1172506 for CVE-2020-13777", "url": "https://bugzilla.suse.com/1172506" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-13777" }, { "cve": "CVE-2021-20232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-20232" } ], "notes": [ { "category": "general", "text": "A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-20232", "url": "https://www.suse.com/security/cve/CVE-2021-20232" }, { "category": "external", "summary": "SUSE Bug 1183456 for CVE-2021-20232", "url": "https://bugzilla.suse.com/1183456" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:gnutls-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.s390x", "openSUSE Tumbleweed:gnutls-guile-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-dane0-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls-devel-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-32bit-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutls30-hmac-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx-devel-3.7.2-1.2.x86_64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.aarch64", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.ppc64le", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.s390x", "openSUSE Tumbleweed:libgnutlsxx28-3.7.2-1.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-20232" } ] }
ghsa-v2q2-jxh8-m5h8
Vulnerability from github
Published
2022-05-13 01:14
Modified
2025-04-20 03:48
Severity ?
VLAI Severity ?
Details
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.
{ "affected": [], "aliases": [ "CVE-2016-8610" ], "database_specific": { "cwe_ids": [ "CWE-400" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-11-13T22:29:00Z", "severity": "HIGH" }, "details": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", "id": "GHSA-v2q2-jxh8-m5h8", "modified": "2025-04-20T03:48:22Z", "published": "2022-05-13T01:14:25Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8610" }, { "type": "WEB", "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "type": "WEB", "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "type": "WEB", "url": "https://www.debian.org/security/2017/dsa-3773" }, { "type": "WEB", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03897en_us" }, { "type": "WEB", "url": "https://security.paloaltonetworks.com/CVE-2016-8610" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20171130-0001" }, { "type": "WEB", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc" }, { "type": "WEB", "url": "https://security.360.cn/cve/CVE-2016-8610" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=af58be768ebb690f78530f796e92b8ae5c9a4401" }, { "type": "WEB", "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:2494" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:2493" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1802" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1801" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1658" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1414" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1413" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2017-0286.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2017-0574.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2017-1415.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2017-1659.html" }, { "type": "WEB", "url": "http://seclists.org/oss-sec/2016/q4/224" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/93841" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1037084" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…