ALT-BU-2014-2693-1
Branch p7 update bulletin.
Closed vulnerabilities
Modified: 2024-07-05
BDU:2015-05887
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05888
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05889
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05890
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05891
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05892
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05893
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05894
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05895
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05896
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05897
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05898
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-05899
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-11
CVE-2013-4508
lighttpd before 1.4.34, when SNI is enabled, configures weak SSL ciphers, which makes it easier for remote attackers to hijack sessions by inserting packets into the client-server data stream or obtain sensitive information by sniffing the network.
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_01.txt
- http://jvn.jp/en/jp/JVN37417423/index.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00049.html
- http://marc.info/?l=bugtraq&m=141576815022399&w=2
- http://openwall.com/lists/oss-security/2013/11/04/19
- http://redmine.lighttpd.net/issues/2525
- http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2913/diff/
- https://www.debian.org/security/2013/dsa-2795
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_01.txt
- http://jvn.jp/en/jp/JVN37417423/index.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00049.html
- http://marc.info/?l=bugtraq&m=141576815022399&w=2
- http://openwall.com/lists/oss-security/2013/11/04/19
- http://redmine.lighttpd.net/issues/2525
- http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2913/diff/
- https://www.debian.org/security/2013/dsa-2795
Modified: 2025-04-12
CVE-2014-2323
SQL injection vulnerability in mod_mysql_vhost.c in lighttpd before 1.4.35 allows remote attackers to execute arbitrary SQL commands via the host name, related to request_check_hostname.
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt
- http://jvn.jp/en/jp/JVN37417423/index.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00006.html
- http://marc.info/?l=bugtraq&m=141576815022399&w=2
- http://seclists.org/oss-sec/2014/q1/561
- http://seclists.org/oss-sec/2014/q1/564
- http://secunia.com/advisories/57404
- http://secunia.com/advisories/57514
- http://www.debian.org/security/2014/dsa-2877
- http://www.lighttpd.net/2014/3/12/1.4.35/
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt
- http://jvn.jp/en/jp/JVN37417423/index.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00006.html
- http://marc.info/?l=bugtraq&m=141576815022399&w=2
- http://seclists.org/oss-sec/2014/q1/561
- http://seclists.org/oss-sec/2014/q1/564
- http://secunia.com/advisories/57404
- http://secunia.com/advisories/57514
- http://www.debian.org/security/2014/dsa-2877
- http://www.lighttpd.net/2014/3/12/1.4.35/
Modified: 2025-04-12
CVE-2014-2324
Multiple directory traversal vulnerabilities in (1) mod_evhost and (2) mod_simple_vhost in lighttpd before 1.4.35 allow remote attackers to read arbitrary files via a .. (dot dot) in the host name, related to request_check_hostname.
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt
- http://jvn.jp/en/jp/JVN37417423/index.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00006.html
- http://marc.info/?l=bugtraq&m=141576815022399&w=2
- http://seclists.org/oss-sec/2014/q1/561
- http://seclists.org/oss-sec/2014/q1/564
- http://secunia.com/advisories/57404
- http://secunia.com/advisories/57514
- http://www.debian.org/security/2014/dsa-2877
- http://www.lighttpd.net/2014/3/12/1.4.35/
- http://www.securityfocus.com/bid/66157
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt
- http://jvn.jp/en/jp/JVN37417423/index.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00006.html
- http://marc.info/?l=bugtraq&m=141576815022399&w=2
- http://seclists.org/oss-sec/2014/q1/561
- http://seclists.org/oss-sec/2014/q1/564
- http://secunia.com/advisories/57404
- http://secunia.com/advisories/57514
- http://www.debian.org/security/2014/dsa-2877
- http://www.lighttpd.net/2014/3/12/1.4.35/
- http://www.securityfocus.com/bid/66157
Package kernel-image-un-def updated to version 3.13.9-alt1 for branch p7 in task 117821.
Closed vulnerabilities
Modified: 2024-07-05
BDU:2015-04307
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
Modified: 2016-11-28
BDU:2015-04308
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
Modified: 2016-11-28
BDU:2015-04309
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
Modified: 2016-11-28
BDU:2015-04310
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
- CVE-2012-2372
- CVE-2013-2929
- CVE-2013-4299
- CVE-2013-4579
- CVE-2013-6382
- CVE-2013-7339
- CVE-2014-0055
- CVE-2014-0077
- CVE-2014-0101
- CVE-2014-0131
- CVE-2014-0155
- CVE-2014-1444
- CVE-2014-1445
- CVE-2014-1446
- CVE-2014-1874
- CVE-2014-2309
- CVE-2014-2523
- CVE-2014-2678
- CVE-2014-2851
- CVE-2014-3122
- CVE-2014-3144
- CVE-2014-3145
- CVE-2014-3917
- CVE-2014-4652
- CVE-2014-4653
- CVE-2014-4654
- CVE-2014-4655
- CVE-2014-4656
- CVE-2014-4699
Modified: 2025-04-12
CVE-2014-2523
net/netfilter/nf_conntrack_proto_dccp.c in the Linux kernel through 3.13.6 uses a DCCP header pointer incorrectly, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a DCCP packet that triggers a call to the (1) dccp_new, (2) dccp_packet, or (3) dccp_error function.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b22f5126a24b3b2f15448c3f2a254fc10cbc2b92
- http://secunia.com/advisories/57446
- http://twitter.com/grsecurity/statuses/445496197399461888
- http://www.openwall.com/lists/oss-security/2014/03/17/7
- http://www.securityfocus.com/bid/66279
- http://www.securitytracker.com/id/1029945
- http://www.ubuntu.com/usn/USN-2173-1
- http://www.ubuntu.com/usn/USN-2174-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1077343
- https://exchange.xforce.ibmcloud.com/vulnerabilities/91910
- https://github.com/torvalds/linux/commit/b22f5126a24b3b2f15448c3f2a254fc10cbc2b92
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b22f5126a24b3b2f15448c3f2a254fc10cbc2b92
- http://secunia.com/advisories/57446
- http://twitter.com/grsecurity/statuses/445496197399461888
- http://www.openwall.com/lists/oss-security/2014/03/17/7
- http://www.securityfocus.com/bid/66279
- http://www.securitytracker.com/id/1029945
- http://www.ubuntu.com/usn/USN-2173-1
- http://www.ubuntu.com/usn/USN-2174-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1077343
- https://exchange.xforce.ibmcloud.com/vulnerabilities/91910
- https://github.com/torvalds/linux/commit/b22f5126a24b3b2f15448c3f2a254fc10cbc2b92
Closed vulnerabilities
Modified: 2016-11-28
BDU:2015-00130
Уязвимость программного обеспечения Cisco IPS, позволяющая злоумышленнику получить одноразовый код (nonce) ECDSA
Modified: 2016-11-28
BDU:2015-00131
Уязвимость программного обеспечения Cisco Unified Communications Manager, позволяющая злоумышленнику получить одноразовый код (nonce) ECDSA
Modified: 2024-07-05
BDU:2015-01314
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить целостность и доступность защищаемой информации
Modified: 2021-03-23
BDU:2015-09745
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2023-04-21
BDU:2015-09760
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
Modified: 2021-03-23
BDU:2015-09775
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-11
CVE-2013-4353
The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=blob_plain%3Bf=CHANGES%3Bhb=refs/heads/OpenSSL_1_0_1-stable
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=197e0ea817ad64820789d86711d55ff50d71f631
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00065.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00067.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00070.html
- http://rhn.redhat.com/errata/RHSA-2014-0015.html
- http://rhn.redhat.com/errata/RHSA-2014-0041.html
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www.debian.org/security/2014/dsa-2837
- http://www.openssl.org/news/vulnerabilities.html
- http://www.splunk.com/view/SP-CAAAMB3
- http://www.ubuntu.com/usn/USN-2079-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1049058
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=blob_plain%3Bf=CHANGES%3Bhb=refs/heads/OpenSSL_1_0_1-stable
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=197e0ea817ad64820789d86711d55ff50d71f631
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00065.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00067.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00070.html
- http://rhn.redhat.com/errata/RHSA-2014-0015.html
- http://rhn.redhat.com/errata/RHSA-2014-0041.html
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www.debian.org/security/2014/dsa-2837
- http://www.openssl.org/news/vulnerabilities.html
- http://www.splunk.com/view/SP-CAAAMB3
- http://www.ubuntu.com/usn/USN-2079-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1049058
Modified: 2025-04-11
CVE-2013-6449
The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=ca989269a2876bae79393bd54c3e72d49975fc75
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124833.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124854.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124858.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00006.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00009.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00031.html
- http://rhn.redhat.com/errata/RHSA-2014-0015.html
- http://rhn.redhat.com/errata/RHSA-2014-0041.html
- http://rt.openssl.org/Ticket/Display.html?id=3200&user=guest&pass=guest
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://security.gentoo.org/glsa/glsa-201412-39.xml
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www.debian.org/security/2014/dsa-2833
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securityfocus.com/bid/64530
- http://www.securitytracker.com/id/1029548
- http://www.ubuntu.com/usn/USN-2079-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1045363
- https://issues.apache.org/jira/browse/TS-2355
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=ca989269a2876bae79393bd54c3e72d49975fc75
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124833.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124854.html
- http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124858.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00006.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00009.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00012.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00031.html
- http://rhn.redhat.com/errata/RHSA-2014-0015.html
- http://rhn.redhat.com/errata/RHSA-2014-0041.html
- http://rt.openssl.org/Ticket/Display.html?id=3200&user=guest&pass=guest
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://security.gentoo.org/glsa/glsa-201412-39.xml
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www.debian.org/security/2014/dsa-2833
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securityfocus.com/bid/64530
- http://www.securitytracker.com/id/1029548
- http://www.ubuntu.com/usn/USN-2079-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1045363
- https://issues.apache.org/jira/browse/TS-2355
Modified: 2025-04-11
CVE-2013-6450
The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=34628967f1e65dc8f34e000f0f5518e21afbfc7b
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00031.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00032.html
- http://rhn.redhat.com/errata/RHSA-2014-0015.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://security.gentoo.org/glsa/glsa-201412-39.xml
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www.debian.org/security/2014/dsa-2833
- http://www.openssl.org/news/vulnerabilities.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securityfocus.com/bid/64618
- http://www.securitytracker.com/id/1029549
- http://www.securitytracker.com/id/1031594
- http://www.ubuntu.com/usn/USN-2079-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://puppet.com/security/cve/cve-2013-6450
- https://security-tracker.debian.org/tracker/CVE-2013-6450
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=34628967f1e65dc8f34e000f0f5518e21afbfc7b
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136470.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00031.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00032.html
- http://rhn.redhat.com/errata/RHSA-2014-0015.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://security.gentoo.org/glsa/glsa-201412-39.xml
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www.debian.org/security/2014/dsa-2833
- http://www.openssl.org/news/vulnerabilities.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securityfocus.com/bid/64618
- http://www.securitytracker.com/id/1029549
- http://www.securitytracker.com/id/1031594
- http://www.ubuntu.com/usn/USN-2079-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://puppet.com/security/cve/cve-2013-6450
- https://security-tracker.debian.org/tracker/CVE-2013-6450
Modified: 2025-04-12
CVE-2014-0076
The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
- http://advisories.mageia.org/MGASA-2014-0165.html
- http://eprint.iacr.org/2014/140
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=2198be3483259de374f91e57d247d0fc667aef29
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00007.html
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://marc.info/?l=bugtraq&m=140317760000786&w=2
- http://marc.info/?l=bugtraq&m=140389274407904&w=2
- http://marc.info/?l=bugtraq&m=140389355508263&w=2
- http://marc.info/?l=bugtraq&m=140448122410568&w=2
- http://marc.info/?l=bugtraq&m=140482916501310&w=2
- http://marc.info/?l=bugtraq&m=140621259019789&w=2
- http://marc.info/?l=bugtraq&m=140752315422991&w=2
- http://marc.info/?l=bugtraq&m=140904544427729&w=2
- http://secunia.com/advisories/58492
- http://secunia.com/advisories/58727
- http://secunia.com/advisories/58939
- http://secunia.com/advisories/59040
- http://secunia.com/advisories/59162
- http://secunia.com/advisories/59175
- http://secunia.com/advisories/59264
- http://secunia.com/advisories/59300
- http://secunia.com/advisories/59364
- http://secunia.com/advisories/59374
- http://secunia.com/advisories/59413
- http://secunia.com/advisories/59438
- http://secunia.com/advisories/59445
- http://secunia.com/advisories/59450
- http://secunia.com/advisories/59454
- http://secunia.com/advisories/59490
- http://secunia.com/advisories/59495
- http://secunia.com/advisories/59514
- http://secunia.com/advisories/59655
- http://secunia.com/advisories/59721
- http://secunia.com/advisories/60571
- http://support.apple.com/kb/HT6443
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=swg21673137
- http://www-01.ibm.com/support/docview.wss?uid=swg21676035
- http://www-01.ibm.com/support/docview.wss?uid=swg21676062
- http://www-01.ibm.com/support/docview.wss?uid=swg21676092
- http://www-01.ibm.com/support/docview.wss?uid=swg21676419
- http://www-01.ibm.com/support/docview.wss?uid=swg21676424
- http://www-01.ibm.com/support/docview.wss?uid=swg21676501
- http://www-01.ibm.com/support/docview.wss?uid=swg21676655
- http://www-01.ibm.com/support/docview.wss?uid=swg21677695
- http://www-01.ibm.com/support/docview.wss?uid=swg21677828
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:067
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.novell.com/support/kb/doc.php?id=7015264
- http://www.novell.com/support/kb/doc.php?id=7015300
- http://www.openssl.org/news/secadv_20140605.txt
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securityfocus.com/bid/66363
- http://www.ubuntu.com/usn/USN-2165-1
- https://bugs.gentoo.org/show_bug.cgi?id=505278
- https://bugzilla.novell.com/show_bug.cgi?id=869945
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
- http://advisories.mageia.org/MGASA-2014-0165.html
- http://eprint.iacr.org/2014/140
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=2198be3483259de374f91e57d247d0fc667aef29
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10629
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00007.html
- http://marc.info/?l=bugtraq&m=140266410314613&w=2
- http://marc.info/?l=bugtraq&m=140317760000786&w=2
- http://marc.info/?l=bugtraq&m=140389274407904&w=2
- http://marc.info/?l=bugtraq&m=140389355508263&w=2
- http://marc.info/?l=bugtraq&m=140448122410568&w=2
- http://marc.info/?l=bugtraq&m=140482916501310&w=2
- http://marc.info/?l=bugtraq&m=140621259019789&w=2
- http://marc.info/?l=bugtraq&m=140752315422991&w=2
- http://marc.info/?l=bugtraq&m=140904544427729&w=2
- http://secunia.com/advisories/58492
- http://secunia.com/advisories/58727
- http://secunia.com/advisories/58939
- http://secunia.com/advisories/59040
- http://secunia.com/advisories/59162
- http://secunia.com/advisories/59175
- http://secunia.com/advisories/59264
- http://secunia.com/advisories/59300
- http://secunia.com/advisories/59364
- http://secunia.com/advisories/59374
- http://secunia.com/advisories/59413
- http://secunia.com/advisories/59438
- http://secunia.com/advisories/59445
- http://secunia.com/advisories/59450
- http://secunia.com/advisories/59454
- http://secunia.com/advisories/59490
- http://secunia.com/advisories/59495
- http://secunia.com/advisories/59514
- http://secunia.com/advisories/59655
- http://secunia.com/advisories/59721
- http://secunia.com/advisories/60571
- http://support.apple.com/kb/HT6443
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140605-openssl
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=swg21673137
- http://www-01.ibm.com/support/docview.wss?uid=swg21676035
- http://www-01.ibm.com/support/docview.wss?uid=swg21676062
- http://www-01.ibm.com/support/docview.wss?uid=swg21676092
- http://www-01.ibm.com/support/docview.wss?uid=swg21676419
- http://www-01.ibm.com/support/docview.wss?uid=swg21676424
- http://www-01.ibm.com/support/docview.wss?uid=swg21676501
- http://www-01.ibm.com/support/docview.wss?uid=swg21676655
- http://www-01.ibm.com/support/docview.wss?uid=swg21677695
- http://www-01.ibm.com/support/docview.wss?uid=swg21677828
- http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-345106.htm
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:067
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.novell.com/support/kb/doc.php?id=7015264
- http://www.novell.com/support/kb/doc.php?id=7015300
- http://www.openssl.org/news/secadv_20140605.txt
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.securityfocus.com/bid/66363
- http://www.ubuntu.com/usn/USN-2165-1
- https://bugs.gentoo.org/show_bug.cgi?id=505278
- https://bugzilla.novell.com/show_bug.cgi?id=869945
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- https://kc.mcafee.com/corporate/index?page=content&id=SB10075
Modified: 2025-10-22
CVE-2014-0160
The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
- http://advisories.mageia.org/MGASA-2014-0165.html
- http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/
- http://cogentdatahub.com/ReleaseNotes.html
- http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3
- http://heartbleed.com/
- http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html
- http://marc.info/?l=bugtraq&m=139722163017074&w=2
- http://marc.info/?l=bugtraq&m=139757726426985&w=2
- http://marc.info/?l=bugtraq&m=139757819327350&w=2
- http://marc.info/?l=bugtraq&m=139757919027752&w=2
- http://marc.info/?l=bugtraq&m=139758572430452&w=2
- http://marc.info/?l=bugtraq&m=139765756720506&w=2
- http://marc.info/?l=bugtraq&m=139774054614965&w=2
- http://marc.info/?l=bugtraq&m=139774703817488&w=2
- http://marc.info/?l=bugtraq&m=139808058921905&w=2
- http://marc.info/?l=bugtraq&m=139817685517037&w=2
- http://marc.info/?l=bugtraq&m=139817727317190&w=2
- http://marc.info/?l=bugtraq&m=139817782017443&w=2
- http://marc.info/?l=bugtraq&m=139824923705461&w=2
- http://marc.info/?l=bugtraq&m=139824993005633&w=2
- http://marc.info/?l=bugtraq&m=139833395230364&w=2
- http://marc.info/?l=bugtraq&m=139835815211508&w=2
- http://marc.info/?l=bugtraq&m=139835844111589&w=2
- http://marc.info/?l=bugtraq&m=139836085512508&w=2
- http://marc.info/?l=bugtraq&m=139842151128341&w=2
- http://marc.info/?l=bugtraq&m=139843768401936&w=2
- http://marc.info/?l=bugtraq&m=139869720529462&w=2
- http://marc.info/?l=bugtraq&m=139869891830365&w=2
- http://marc.info/?l=bugtraq&m=139889113431619&w=2
- http://marc.info/?l=bugtraq&m=139889295732144&w=2
- http://marc.info/?l=bugtraq&m=139905202427693&w=2
- http://marc.info/?l=bugtraq&m=139905243827825&w=2
- http://marc.info/?l=bugtraq&m=139905295427946&w=2
- http://marc.info/?l=bugtraq&m=139905351928096&w=2
- http://marc.info/?l=bugtraq&m=139905405728262&w=2
- http://marc.info/?l=bugtraq&m=139905458328378&w=2
- http://marc.info/?l=bugtraq&m=139905653828999&w=2
- http://marc.info/?l=bugtraq&m=139905868529690&w=2
- http://marc.info/?l=bugtraq&m=140015787404650&w=2
- http://marc.info/?l=bugtraq&m=140075368411126&w=2
- http://marc.info/?l=bugtraq&m=140724451518351&w=2
- http://marc.info/?l=bugtraq&m=140752315422991&w=2
- http://marc.info/?l=bugtraq&m=141287864628122&w=2
- http://marc.info/?l=bugtraq&m=142660345230545&w=2
- http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1
- http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3
- http://rhn.redhat.com/errata/RHSA-2014-0376.html
- http://rhn.redhat.com/errata/RHSA-2014-0377.html
- http://rhn.redhat.com/errata/RHSA-2014-0378.html
- http://rhn.redhat.com/errata/RHSA-2014-0396.html
- http://seclists.org/fulldisclosure/2014/Apr/109
- http://seclists.org/fulldisclosure/2014/Apr/173
- http://seclists.org/fulldisclosure/2014/Apr/190
- http://seclists.org/fulldisclosure/2014/Apr/90
- http://seclists.org/fulldisclosure/2014/Apr/91
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://secunia.com/advisories/57347
- http://secunia.com/advisories/57483
- http://secunia.com/advisories/57721
- http://secunia.com/advisories/57836
- http://secunia.com/advisories/57966
- http://secunia.com/advisories/57968
- http://secunia.com/advisories/59139
- http://secunia.com/advisories/59243
- http://secunia.com/advisories/59347
- http://support.citrix.com/article/CTX140605
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661
- http://www-01.ibm.com/support/docview.wss?uid=swg21670161
- http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
- http://www.blackberry.com/btsc/KB35882
- http://www.debian.org/security/2014/dsa-2896
- http://www.exploit-db.com/exploits/32745
- http://www.exploit-db.com/exploits/32764
- http://www.f-secure.com/en/web/labs_global/fsc-2014-1
- http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
- http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
- http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf
- http://www.kb.cert.org/vuls/id/720951
- http://www.kerio.com/support/kerio-control/release-history
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.openssl.org/news/secadv_20140407.txt
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securityfocus.com/bid/66690
- http://www.securitytracker.com/id/1030026
- http://www.securitytracker.com/id/1030074
- http://www.securitytracker.com/id/1030077
- http://www.securitytracker.com/id/1030078
- http://www.securitytracker.com/id/1030079
- http://www.securitytracker.com/id/1030080
- http://www.securitytracker.com/id/1030081
- http://www.securitytracker.com/id/1030082
- http://www.splunk.com/view/SP-CAAAMB3
- http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00
- http://www.ubuntu.com/usn/USN-2165-1
- http://www.us-cert.gov/ncas/alerts/TA14-098A
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
- https://blog.torproject.org/blog/openssl-bug-cve-2014-0160
- https://bugzilla.redhat.com/show_bug.cgi?id=1084875
- https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf
- https://code.google.com/p/mod-spdy/issues/detail?id=85
- https://filezilla-project.org/versions.php?type=server
- https://gist.github.com/chapmajs/10473815
- https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04260637-4%257CdocLocale%253Den_US%257CcalledBy%253DSearch_Result&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
- https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E
- https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html
- https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html
- https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html
- https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217
- https://www.cert.fi/en/reports/2014/vulnerability788210.html
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
- https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd
- http://advisories.mageia.org/MGASA-2014-0165.html
- http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/
- http://cogentdatahub.com/ReleaseNotes.html
- http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01
- http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3
- http://heartbleed.com/
- http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html
- http://marc.info/?l=bugtraq&m=139722163017074&w=2
- http://marc.info/?l=bugtraq&m=139757726426985&w=2
- http://marc.info/?l=bugtraq&m=139757819327350&w=2
- http://marc.info/?l=bugtraq&m=139757919027752&w=2
- http://marc.info/?l=bugtraq&m=139758572430452&w=2
- http://marc.info/?l=bugtraq&m=139765756720506&w=2
- http://marc.info/?l=bugtraq&m=139774054614965&w=2
- http://marc.info/?l=bugtraq&m=139774703817488&w=2
- http://marc.info/?l=bugtraq&m=139808058921905&w=2
- http://marc.info/?l=bugtraq&m=139817685517037&w=2
- http://marc.info/?l=bugtraq&m=139817727317190&w=2
- http://marc.info/?l=bugtraq&m=139817782017443&w=2
- http://marc.info/?l=bugtraq&m=139824923705461&w=2
- http://marc.info/?l=bugtraq&m=139824993005633&w=2
- http://marc.info/?l=bugtraq&m=139833395230364&w=2
- http://marc.info/?l=bugtraq&m=139835815211508&w=2
- http://marc.info/?l=bugtraq&m=139835844111589&w=2
- http://marc.info/?l=bugtraq&m=139836085512508&w=2
- http://marc.info/?l=bugtraq&m=139842151128341&w=2
- http://marc.info/?l=bugtraq&m=139843768401936&w=2
- http://marc.info/?l=bugtraq&m=139869720529462&w=2
- http://marc.info/?l=bugtraq&m=139869891830365&w=2
- http://marc.info/?l=bugtraq&m=139889113431619&w=2
- http://marc.info/?l=bugtraq&m=139889295732144&w=2
- http://marc.info/?l=bugtraq&m=139905202427693&w=2
- http://marc.info/?l=bugtraq&m=139905243827825&w=2
- http://marc.info/?l=bugtraq&m=139905295427946&w=2
- http://marc.info/?l=bugtraq&m=139905351928096&w=2
- http://marc.info/?l=bugtraq&m=139905405728262&w=2
- http://marc.info/?l=bugtraq&m=139905458328378&w=2
- http://marc.info/?l=bugtraq&m=139905653828999&w=2
- http://marc.info/?l=bugtraq&m=139905868529690&w=2
- http://marc.info/?l=bugtraq&m=140015787404650&w=2
- http://marc.info/?l=bugtraq&m=140075368411126&w=2
- http://marc.info/?l=bugtraq&m=140724451518351&w=2
- http://marc.info/?l=bugtraq&m=140752315422991&w=2
- http://marc.info/?l=bugtraq&m=141287864628122&w=2
- http://marc.info/?l=bugtraq&m=142660345230545&w=2
- http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1
- http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3
- http://rhn.redhat.com/errata/RHSA-2014-0376.html
- http://rhn.redhat.com/errata/RHSA-2014-0377.html
- http://rhn.redhat.com/errata/RHSA-2014-0378.html
- http://rhn.redhat.com/errata/RHSA-2014-0396.html
- http://seclists.org/fulldisclosure/2014/Apr/109
- http://seclists.org/fulldisclosure/2014/Apr/173
- http://seclists.org/fulldisclosure/2014/Apr/190
- http://seclists.org/fulldisclosure/2014/Apr/90
- http://seclists.org/fulldisclosure/2014/Apr/91
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://secunia.com/advisories/57347
- http://secunia.com/advisories/57483
- http://secunia.com/advisories/57721
- http://secunia.com/advisories/57836
- http://secunia.com/advisories/57966
- http://secunia.com/advisories/57968
- http://secunia.com/advisories/59139
- http://secunia.com/advisories/59243
- http://secunia.com/advisories/59347
- http://support.citrix.com/article/CTX140605
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed
- http://www-01.ibm.com/support/docview.wss?uid=isg400001841
- http://www-01.ibm.com/support/docview.wss?uid=isg400001843
- http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661
- http://www-01.ibm.com/support/docview.wss?uid=swg21670161
- http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf
- http://www.blackberry.com/btsc/KB35882
- http://www.debian.org/security/2014/dsa-2896
- http://www.exploit-db.com/exploits/32745
- http://www.exploit-db.com/exploits/32764
- http://www.f-secure.com/en/web/labs_global/fsc-2014-1
- http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/
- http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/
- http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/
- http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf
- http://www.kb.cert.org/vuls/id/720951
- http://www.kerio.com/support/kerio-control/release-history
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.openssl.org/news/secadv_20140407.txt
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- http://www.securityfocus.com/bid/66690
- http://www.securitytracker.com/id/1030026
- http://www.securitytracker.com/id/1030074
- http://www.securitytracker.com/id/1030077
- http://www.securitytracker.com/id/1030078
- http://www.securitytracker.com/id/1030079
- http://www.securitytracker.com/id/1030080
- http://www.securitytracker.com/id/1030081
- http://www.securitytracker.com/id/1030082
- http://www.splunk.com/view/SP-CAAAMB3
- http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00
- http://www.ubuntu.com/usn/USN-2165-1
- http://www.us-cert.gov/ncas/alerts/TA14-098A
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
- https://blog.torproject.org/blog/openssl-bug-cve-2014-0160
- https://bugzilla.redhat.com/show_bug.cgi?id=1084875
- https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf
- https://code.google.com/p/mod-spdy/issues/detail?id=85
- https://filezilla-project.org/versions.php?type=server
- https://gist.github.com/chapmajs/10473815
- https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04260637-4%257CdocLocale%253Den_US%257CcalledBy%253DSearch_Result&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
- https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E
- https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html
- https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html
- https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html
- https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217
- https://www.cert.fi/en/reports/2014/vulnerability788210.html
- https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
- https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-0160