ALT-BU-2015-2795-1
Branch sisyphus update bulletin.
Closed bugs
Не ротируются логи с logrotate >= 3.9.1-alt1
Package perl-MIME-Types updated to version 2.12-alt2 for branch sisyphus in task 154930.
Closed bugs
Excessive dependency to perl-Mojolicious
Package kernel-modules-eprd-std-def updated to version 0.5.0-alt3.262414.1 for branch sisyphus in task 154940.
Closed bugs
Конфликт для разных версий ядра
Package kernel-modules-eprd-ovz-el updated to version 0.5.0-alt3.132640.138 for branch sisyphus in task 154940.
Closed bugs
Конфликт для разных версий ядра
Package kernel-image-un-def updated to version 4.3.3-alt1 for branch sisyphus in task 154942.
Closed vulnerabilities
Modified: 2024-12-03
BDU:2016-01939
Уязвимость стека IPv6 ядра Linux операционной системы Android, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2025-04-12
CVE-2013-7446
Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d267278a9ece963d77eefec61630223fce08c6c
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://www.debian.org/security/2015/dsa-3426
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- http://www.openwall.com/lists/oss-security/2015/11/18/16
- http://www.securityfocus.com/bid/77638
- http://www.securitytracker.com/id/1034557
- http://www.spinics.net/lists/netdev/msg318826.html
- http://www.ubuntu.com/usn/USN-2886-1
- http://www.ubuntu.com/usn/USN-2887-1
- http://www.ubuntu.com/usn/USN-2887-2
- http://www.ubuntu.com/usn/USN-2888-1
- http://www.ubuntu.com/usn/USN-2889-1
- http://www.ubuntu.com/usn/USN-2889-2
- http://www.ubuntu.com/usn/USN-2890-1
- http://www.ubuntu.com/usn/USN-2890-2
- http://www.ubuntu.com/usn/USN-2890-3
- https://bugzilla.redhat.com/show_bug.cgi?id=1282688
- https://forums.grsecurity.net/viewtopic.php?f=3&t=4150
- https://github.com/torvalds/linux/commit/7d267278a9ece963d77eefec61630223fce08c6c
- https://groups.google.com/forum/#%21topic/syzkaller/3twDUI4Cpm8
- https://lkml.org/lkml/2013/10/14/424
- https://lkml.org/lkml/2014/5/15/532
- https://lkml.org/lkml/2015/9/13/195
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d267278a9ece963d77eefec61630223fce08c6c
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00042.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://www.debian.org/security/2015/dsa-3426
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- http://www.openwall.com/lists/oss-security/2015/11/18/16
- http://www.securityfocus.com/bid/77638
- http://www.securitytracker.com/id/1034557
- http://www.spinics.net/lists/netdev/msg318826.html
- http://www.ubuntu.com/usn/USN-2886-1
- http://www.ubuntu.com/usn/USN-2887-1
- http://www.ubuntu.com/usn/USN-2887-2
- http://www.ubuntu.com/usn/USN-2888-1
- http://www.ubuntu.com/usn/USN-2889-1
- http://www.ubuntu.com/usn/USN-2889-2
- http://www.ubuntu.com/usn/USN-2890-1
- http://www.ubuntu.com/usn/USN-2890-2
- http://www.ubuntu.com/usn/USN-2890-3
- https://bugzilla.redhat.com/show_bug.cgi?id=1282688
- https://forums.grsecurity.net/viewtopic.php?f=3&t=4150
- https://github.com/torvalds/linux/commit/7d267278a9ece963d77eefec61630223fce08c6c
- https://groups.google.com/forum/#%21topic/syzkaller/3twDUI4Cpm8
- https://lkml.org/lkml/2013/10/14/424
- https://lkml.org/lkml/2014/5/15/532
- https://lkml.org/lkml/2015/9/13/195
Modified: 2025-04-12
CVE-2015-7884
The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=eda98796aff0d9bf41094b06811f5def3b4c333c
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
- http://www.openwall.com/lists/oss-security/2015/10/21/8
- http://www.securityfocus.com/bid/77317
- http://www.securitytracker.com/id/1034893
- http://www.ubuntu.com/usn/USN-2842-1
- http://www.ubuntu.com/usn/USN-2842-2
- http://www.ubuntu.com/usn/USN-2843-1
- http://www.ubuntu.com/usn/USN-2843-2
- http://www.ubuntu.com/usn/USN-2843-3
- https://bugzilla.redhat.com/show_bug.cgi?id=1274726
- https://github.com/torvalds/linux/commit/eda98796aff0d9bf41094b06811f5def3b4c333c
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=eda98796aff0d9bf41094b06811f5def3b4c333c
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
- http://www.openwall.com/lists/oss-security/2015/10/21/8
- http://www.securityfocus.com/bid/77317
- http://www.securitytracker.com/id/1034893
- http://www.ubuntu.com/usn/USN-2842-1
- http://www.ubuntu.com/usn/USN-2842-2
- http://www.ubuntu.com/usn/USN-2843-1
- http://www.ubuntu.com/usn/USN-2843-2
- http://www.ubuntu.com/usn/USN-2843-3
- https://bugzilla.redhat.com/show_bug.cgi?id=1274726
- https://github.com/torvalds/linux/commit/eda98796aff0d9bf41094b06811f5def3b4c333c
Modified: 2025-04-12
CVE-2015-7885
The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4b6184336ebb5c8dc1eae7f7ab46ee608a748b05
- http://www.openwall.com/lists/oss-security/2015/10/21/8
- http://www.securityfocus.com/bid/77317
- http://www.securitytracker.com/id/1034896
- http://www.ubuntu.com/usn/USN-2841-1
- http://www.ubuntu.com/usn/USN-2841-2
- http://www.ubuntu.com/usn/USN-2842-1
- http://www.ubuntu.com/usn/USN-2842-2
- http://www.ubuntu.com/usn/USN-2843-1
- http://www.ubuntu.com/usn/USN-2843-2
- http://www.ubuntu.com/usn/USN-2843-3
- http://www.ubuntu.com/usn/USN-2844-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1274728
- https://github.com/torvalds/linux/commit/4b6184336ebb5c8dc1eae7f7ab46ee608a748b05
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4b6184336ebb5c8dc1eae7f7ab46ee608a748b05
- http://www.openwall.com/lists/oss-security/2015/10/21/8
- http://www.securityfocus.com/bid/77317
- http://www.securitytracker.com/id/1034896
- http://www.ubuntu.com/usn/USN-2841-1
- http://www.ubuntu.com/usn/USN-2841-2
- http://www.ubuntu.com/usn/USN-2842-1
- http://www.ubuntu.com/usn/USN-2842-2
- http://www.ubuntu.com/usn/USN-2843-1
- http://www.ubuntu.com/usn/USN-2843-2
- http://www.ubuntu.com/usn/USN-2843-3
- http://www.ubuntu.com/usn/USN-2844-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1274728
- https://github.com/torvalds/linux/commit/4b6184336ebb5c8dc1eae7f7ab46ee608a748b05
Modified: 2025-04-12
CVE-2015-7990
Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
- http://www.debian.org/security/2015/dsa-3396
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- http://www.openwall.com/lists/oss-security/2015/10/27/5
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securityfocus.com/bid/77340
- http://www.securitytracker.com/id/1034453
- http://www.ubuntu.com/usn/USN-2886-1
- http://www.ubuntu.com/usn/USN-2887-1
- http://www.ubuntu.com/usn/USN-2887-2
- http://www.ubuntu.com/usn/USN-2888-1
- http://www.ubuntu.com/usn/USN-2889-1
- http://www.ubuntu.com/usn/USN-2889-2
- http://www.ubuntu.com/usn/USN-2890-1
- http://www.ubuntu.com/usn/USN-2890-2
- http://www.ubuntu.com/usn/USN-2890-3
- https://bugzilla.redhat.com/show_bug.cgi?id=1276437
- https://bugzilla.suse.com/show_bug.cgi?id=952384
- https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a
- https://lkml.org/lkml/2015/10/16/530
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00020.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
- http://www.debian.org/security/2015/dsa-3396
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- http://www.openwall.com/lists/oss-security/2015/10/27/5
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securityfocus.com/bid/77340
- http://www.securitytracker.com/id/1034453
- http://www.ubuntu.com/usn/USN-2886-1
- http://www.ubuntu.com/usn/USN-2887-1
- http://www.ubuntu.com/usn/USN-2887-2
- http://www.ubuntu.com/usn/USN-2888-1
- http://www.ubuntu.com/usn/USN-2889-1
- http://www.ubuntu.com/usn/USN-2889-2
- http://www.ubuntu.com/usn/USN-2890-1
- http://www.ubuntu.com/usn/USN-2890-2
- http://www.ubuntu.com/usn/USN-2890-3
- https://bugzilla.redhat.com/show_bug.cgi?id=1276437
- https://bugzilla.suse.com/show_bug.cgi?id=952384
- https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a
- https://lkml.org/lkml/2015/10/16/530
Modified: 2025-04-12
CVE-2015-8374
fs/btrfs/inode.c in the Linux kernel before 4.3.3 mishandles compressed inline extents, which allows local users to obtain sensitive pre-truncation information from a file via a clone action.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0305cd5f7fca85dae392b9ba85b116896eb7c1c7
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://rhn.redhat.com/errata/RHSA-2016-2584.html
- http://www.debian.org/security/2015/dsa-3426
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- http://www.openwall.com/lists/oss-security/2015/11/27/2
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.securityfocus.com/bid/78219
- http://www.securitytracker.com/id/1034895
- http://www.ubuntu.com/usn/USN-2886-1
- http://www.ubuntu.com/usn/USN-2887-1
- http://www.ubuntu.com/usn/USN-2887-2
- http://www.ubuntu.com/usn/USN-2888-1
- http://www.ubuntu.com/usn/USN-2889-1
- http://www.ubuntu.com/usn/USN-2889-2
- http://www.ubuntu.com/usn/USN-2890-1
- http://www.ubuntu.com/usn/USN-2890-2
- http://www.ubuntu.com/usn/USN-2890-3
- https://bugzilla.redhat.com/show_bug.cgi?id=1286261
- https://github.com/torvalds/linux/commit/0305cd5f7fca85dae392b9ba85b116896eb7c1c7
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0305cd5f7fca85dae392b9ba85b116896eb7c1c7
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://rhn.redhat.com/errata/RHSA-2016-2584.html
- http://www.debian.org/security/2015/dsa-3426
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- http://www.openwall.com/lists/oss-security/2015/11/27/2
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.securityfocus.com/bid/78219
- http://www.securitytracker.com/id/1034895
- http://www.ubuntu.com/usn/USN-2886-1
- http://www.ubuntu.com/usn/USN-2887-1
- http://www.ubuntu.com/usn/USN-2887-2
- http://www.ubuntu.com/usn/USN-2888-1
- http://www.ubuntu.com/usn/USN-2889-1
- http://www.ubuntu.com/usn/USN-2889-2
- http://www.ubuntu.com/usn/USN-2890-1
- http://www.ubuntu.com/usn/USN-2890-2
- http://www.ubuntu.com/usn/USN-2890-3
- https://bugzilla.redhat.com/show_bug.cgi?id=1286261
- https://github.com/torvalds/linux/commit/0305cd5f7fca85dae392b9ba85b116896eb7c1c7
Modified: 2025-04-12
CVE-2015-8569
The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=09ccfd238e5a0e670d8178cf50180ea81ae09ae1
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://twitter.com/grsecurity/statuses/676744240802750464
- http://www.debian.org/security/2016/dsa-3434
- http://www.openwall.com/lists/oss-security/2015/12/15/11
- http://www.securityfocus.com/bid/79428
- http://www.securitytracker.com/id/1034549
- http://www.ubuntu.com/usn/USN-2886-1
- http://www.ubuntu.com/usn/USN-2888-1
- http://www.ubuntu.com/usn/USN-2890-1
- http://www.ubuntu.com/usn/USN-2890-2
- http://www.ubuntu.com/usn/USN-2890-3
- https://bugzilla.redhat.com/show_bug.cgi?id=1292045
- https://github.com/torvalds/linux/commit/09ccfd238e5a0e670d8178cf50180ea81ae09ae1
- https://lkml.org/lkml/2015/12/14/252
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=09ccfd238e5a0e670d8178cf50180ea81ae09ae1
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://twitter.com/grsecurity/statuses/676744240802750464
- http://www.debian.org/security/2016/dsa-3434
- http://www.openwall.com/lists/oss-security/2015/12/15/11
- http://www.securityfocus.com/bid/79428
- http://www.securitytracker.com/id/1034549
- http://www.ubuntu.com/usn/USN-2886-1
- http://www.ubuntu.com/usn/USN-2888-1
- http://www.ubuntu.com/usn/USN-2890-1
- http://www.ubuntu.com/usn/USN-2890-2
- http://www.ubuntu.com/usn/USN-2890-3
- https://bugzilla.redhat.com/show_bug.cgi?id=1292045
- https://github.com/torvalds/linux/commit/09ccfd238e5a0e670d8178cf50180ea81ae09ae1
- https://lkml.org/lkml/2015/12/14/252
Modified: 2025-04-12
CVE-2015-8961
The __ext4_journal_stop function in fs/ext4/ext4_jbd2.c in the Linux kernel before 4.3.3 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging improper access to a certain error field.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6934da9238da947628be83635e365df41064b09b
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- http://www.securityfocus.com/bid/94135
- https://github.com/torvalds/linux/commit/6934da9238da947628be83635e365df41064b09b
- https://source.android.com/security/bulletin/2016-11-01.html
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6934da9238da947628be83635e365df41064b09b
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- http://www.securityfocus.com/bid/94135
- https://github.com/torvalds/linux/commit/6934da9238da947628be83635e365df41064b09b
- https://source.android.com/security/bulletin/2016-11-01.html
Modified: 2025-04-12
CVE-2016-3841
The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=45f6fad84cc305103b28d73482b344d7f5b76f39
- http://rhn.redhat.com/errata/RHSA-2016-0855.html
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://rhn.redhat.com/errata/RHSA-2016-2584.html
- http://rhn.redhat.com/errata/RHSA-2016-2695.html
- http://source.android.com/security/bulletin/2016-08-01.html
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- http://www.securityfocus.com/bid/92227
- https://github.com/torvalds/linux/commit/45f6fad84cc305103b28d73482b344d7f5b76f39
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=45f6fad84cc305103b28d73482b344d7f5b76f39
- http://rhn.redhat.com/errata/RHSA-2016-0855.html
- http://rhn.redhat.com/errata/RHSA-2016-2574.html
- http://rhn.redhat.com/errata/RHSA-2016-2584.html
- http://rhn.redhat.com/errata/RHSA-2016-2695.html
- http://source.android.com/security/bulletin/2016-08-01.html
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- http://www.securityfocus.com/bid/92227
- https://github.com/torvalds/linux/commit/45f6fad84cc305103b28d73482b344d7f5b76f39
Package openssl098 updated to version 0.9.8zh-alt1 for branch sisyphus in task 154980.
Closed vulnerabilities
Modified: 2016-11-28
BDU:2015-06127
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06128
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06129
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06130
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-06131
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09142
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09143
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09144
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09145
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09146
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2016-11-30
BDU:2015-09819
Уязвимости операционной системы Альт Линукс СПТ, позволяющие удаленному злоумышленнику нарушить целостность и доступность передаваемой защищаемой информации
Modified: 2022-04-26
BDU:2015-09820
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09821
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09822
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09823
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09824
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2017-06-21
BDU:2015-09905
Уязвимости системы автоматизации деятельности предприятия 1С:Предприятие, позволяющие злоумышленнику вызвать отказ в обслуживании или получить доступ к зашифрованным данным без знания ключа шифрования
Modified: 2021-03-23
BDU:2015-09960
Уязвимость программной платформы Java Platform, позволяющая нарушителю, действующему удаленно, упростить процесс расшифровки сообщения
Modified: 2021-03-23
BDU:2015-09963
Уязвимость программной платформы JRockit, позволяющая нарушителю, действующему удаленно, упростить процесс расшифровки сообщения
Modified: 2021-03-23
BDU:2015-09980
Уязвимость системы управления базами данных MySQL, позволяющая удаленному нарушителю вызвать отказ в обслуживании
Modified: 2024-11-28
BDU:2015-11035
Уязвимость функции BN_GF2m_mod_inv библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2021-03-23
BDU:2015-11036
Уязвимость библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2021-03-23
BDU:2015-11037
Уязвимость библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2021-03-23
BDU:2015-11038
Уязвимость библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2021-03-23
BDU:2015-11039
Уязвимость библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-28
BDU:2016-01654
Уязвимость реализации ASN1_TFLG_COMBINE библиотеки OpenSSL, позволяющая нарушителю получить защищаемую информацию из памяти процесса
Modified: 2025-04-12
CVE-2014-3569
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling. NOTE: this issue became relevant after the CVE-2014-3568 fix.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3569.html
- http://rt.openssl.org/Ticket/Display.html?id=3571&user=guest&pass=guest
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71934
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=392fa7a952e97d82eac6958c81ed1e256e6b8ca5
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=6ce9687b5aba5391fc0de50e18779eb676d0e04d
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=b82924741b4bd590da890619be671f4635e46c2b
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://security-tracker.debian.org/tracker/CVE-2014-3569
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3569.html
- http://rt.openssl.org/Ticket/Display.html?id=3571&user=guest&pass=guest
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71934
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=392fa7a952e97d82eac6958c81ed1e256e6b8ca5
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=6ce9687b5aba5391fc0de50e18779eb676d0e04d
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=b82924741b4bd590da890619be671f4635e46c2b
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://security-tracker.debian.org/tracker/CVE-2014-3569
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
Modified: 2025-04-12
CVE-2014-3570
The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142720981827617&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://rhn.redhat.com/errata/RHSA-2015-0849.html
- http://rhn.redhat.com/errata/RHSA-2016-1650.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71939
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/a7a44ba55cb4f884c6bc9ceac90072dea38e66d0
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142720981827617&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://rhn.redhat.com/errata/RHSA-2015-0849.html
- http://rhn.redhat.com/errata/RHSA-2016-1650.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71939
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/a7a44ba55cb4f884c6bc9ceac90072dea38e66d0
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
Modified: 2025-04-12
CVE-2014-3571
OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71937
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/248385c606620b29ecc96ca9d3603463f879652b
- https://github.com/openssl/openssl/commit/feba02f3919495e1b960c33ba849e10e77d0785d
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://www.openssl.org/news/secadv_20150108.txt
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147938.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71937
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/248385c606620b29ecc96ca9d3603463f879652b
- https://github.com/openssl/openssl/commit/feba02f3919495e1b960c33ba849e10e77d0785d
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://www.openssl.org/news/secadv_20150108.txt
Modified: 2025-04-12
CVE-2014-3572
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142720981827617&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71942
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/b15f8769644b00ef7283521593360b7b2135cb63
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142720981827617&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71942
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/b15f8769644b00ef7283521593360b7b2135cb63
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
Modified: 2025-04-12
CVE-2014-8275
OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142720981827617&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://rhn.redhat.com/errata/RHSA-2015-0800.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71935
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/684400ce192dac51df3d3e92b61830a6ef90be3e
- https://github.com/openssl/openssl/commit/cb62ab4b17818fe66d2fed0a7fe71969131c811b
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148363.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142720981827617&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://rhn.redhat.com/errata/RHSA-2015-0800.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71935
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/684400ce192dac51df3d3e92b61830a6ef90be3e
- https://github.com/openssl/openssl/commit/cb62ab4b17818fe66d2fed0a7fe71969131c811b
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
Modified: 2025-04-12
CVE-2015-0204
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142720981827617&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143213830203296&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144043644216842&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://rhn.redhat.com/errata/RHSA-2015-0800.html
- http://rhn.redhat.com/errata/RHSA-2015-0849.html
- http://rhn.redhat.com/errata/RHSA-2016-1650.html
- http://support.novell.com/security/cve/CVE-2015-0204.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www-01.ibm.com/support/docview.wss?uid=swg21883640
- http://www-304.ibm.com/support/docview.wss?uid=swg21960769
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71936
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://bto.bluecoat.com/security-advisory/sa91
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99707
- https://freakattack.com/
- https://github.com/openssl/openssl/commit/ce325c60c74b0fa784f5872404b722e120e5cab0
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://security.gentoo.org/glsa/201503-11
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
- https://www.openssl.org/news/secadv_20150319.txt
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=142496179803395&w=2
- http://marc.info/?l=bugtraq&m=142496289803847&w=2
- http://marc.info/?l=bugtraq&m=142720981827617&w=2
- http://marc.info/?l=bugtraq&m=142721102728110&w=2
- http://marc.info/?l=bugtraq&m=142895206924048&w=2
- http://marc.info/?l=bugtraq&m=143213830203296&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144043644216842&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050205101530&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0066.html
- http://rhn.redhat.com/errata/RHSA-2015-0800.html
- http://rhn.redhat.com/errata/RHSA-2015-0849.html
- http://rhn.redhat.com/errata/RHSA-2016-1650.html
- http://support.novell.com/security/cve/CVE-2015-0204.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150310-ssl
- http://www-01.ibm.com/support/docview.wss?uid=swg21883640
- http://www-304.ibm.com/support/docview.wss?uid=swg21960769
- http://www.debian.org/security/2015/dsa-3125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:019
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/71936
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://bto.bluecoat.com/security-advisory/sa91
- https://exchange.xforce.ibmcloud.com/vulnerabilities/99707
- https://freakattack.com/
- https://github.com/openssl/openssl/commit/ce325c60c74b0fa784f5872404b722e120e5cab0
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://security.gentoo.org/glsa/201503-11
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
- https://www.openssl.org/news/secadv_20150319.txt
Modified: 2025-04-12
CVE-2015-0209
Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html
- http://marc.info/?l=bugtraq&m=142841429220765&w=2
- http://marc.info/?l=bugtraq&m=143213830203296&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0715.html
- http://rhn.redhat.com/errata/RHSA-2015-0716.html
- http://rhn.redhat.com/errata/RHSA-2015-0752.html
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://support.apple.com/kb/HT204942
- http://www.debian.org/security/2015/dsa-3197
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/73239
- http://www.securitytracker.com/id/1031929
- http://www.ubuntu.com/usn/USN-2537-1
- https://access.redhat.com/articles/1384453
- https://bto.bluecoat.com/security-advisory/sa92
- https://bugzilla.redhat.com/show_bug.cgi?id=1196737
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://security.gentoo.org/glsa/201503-11
- https://support.citrix.com/article/CTX216642
- https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc
- https://www.openssl.org/news/secadv_20150319.txt
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html
- http://marc.info/?l=bugtraq&m=142841429220765&w=2
- http://marc.info/?l=bugtraq&m=143213830203296&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0715.html
- http://rhn.redhat.com/errata/RHSA-2015-0716.html
- http://rhn.redhat.com/errata/RHSA-2015-0752.html
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://support.apple.com/kb/HT204942
- http://www.debian.org/security/2015/dsa-3197
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/73239
- http://www.securitytracker.com/id/1031929
- http://www.ubuntu.com/usn/USN-2537-1
- https://access.redhat.com/articles/1384453
- https://bto.bluecoat.com/security-advisory/sa92
- https://bugzilla.redhat.com/show_bug.cgi?id=1196737
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://security.gentoo.org/glsa/201503-11
- https://support.citrix.com/article/CTX216642
- https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc
- https://www.openssl.org/news/secadv_20150319.txt
Modified: 2025-04-12
CVE-2015-0286
The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html
- http://marc.info/?l=bugtraq&m=142841429220765&w=2
- http://marc.info/?l=bugtraq&m=143213830203296&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0715.html
- http://rhn.redhat.com/errata/RHSA-2015-0716.html
- http://rhn.redhat.com/errata/RHSA-2015-0752.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://support.apple.com/kb/HT204942
- http://www.debian.org/security/2015/dsa-3197
- http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/73225
- http://www.securitytracker.com/id/1031929
- http://www.securitytracker.com/id/1032917
- http://www.ubuntu.com/usn/USN-2537-1
- https://access.redhat.com/articles/1384453
- https://bto.bluecoat.com/security-advisory/sa92
- https://bugzilla.redhat.com/show_bug.cgi?id=1202366
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c3c7fb07dc975dc3c9de0eddb7d8fd79fc9c67c1
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://support.apple.com/HT205212
- https://support.apple.com/HT205267
- https://support.citrix.com/article/CTX216642
- https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc
- https://www.openssl.org/news/secadv_20150319.txt
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html
- http://marc.info/?l=bugtraq&m=142841429220765&w=2
- http://marc.info/?l=bugtraq&m=143213830203296&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0715.html
- http://rhn.redhat.com/errata/RHSA-2015-0716.html
- http://rhn.redhat.com/errata/RHSA-2015-0752.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://support.apple.com/kb/HT204942
- http://www.debian.org/security/2015/dsa-3197
- http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/73225
- http://www.securitytracker.com/id/1031929
- http://www.securitytracker.com/id/1032917
- http://www.ubuntu.com/usn/USN-2537-1
- https://access.redhat.com/articles/1384453
- https://bto.bluecoat.com/security-advisory/sa92
- https://bugzilla.redhat.com/show_bug.cgi?id=1202366
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c3c7fb07dc975dc3c9de0eddb7d8fd79fc9c67c1
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://support.apple.com/HT205212
- https://support.apple.com/HT205267
- https://support.citrix.com/article/CTX216642
- https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc
- https://www.openssl.org/news/secadv_20150319.txt
Modified: 2025-04-12
CVE-2015-0287
The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html
- http://marc.info/?l=bugtraq&m=142841429220765&w=2
- http://marc.info/?l=bugtraq&m=143213830203296&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0715.html
- http://rhn.redhat.com/errata/RHSA-2015-0716.html
- http://rhn.redhat.com/errata/RHSA-2015-0752.html
- http://rhn.redhat.com/errata/RHSA-2015-0800.html
- http://support.apple.com/kb/HT204942
- http://www.debian.org/security/2015/dsa-3197
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/73227
- http://www.securitytracker.com/id/1031929
- http://www.ubuntu.com/usn/USN-2537-1
- https://access.redhat.com/articles/1384453
- https://bto.bluecoat.com/security-advisory/sa92
- https://bugzilla.redhat.com/show_bug.cgi?id=1202380
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=b717b083073b6cacc0a5e2397b661678aff7ae7f
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://security.gentoo.org/glsa/201503-11
- https://support.apple.com/HT205212
- https://support.apple.com/HT205267
- https://support.citrix.com/article/CTX216642
- https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc
- https://www.openssl.org/news/secadv_20150319.txt
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html
- http://marc.info/?l=bugtraq&m=142841429220765&w=2
- http://marc.info/?l=bugtraq&m=143213830203296&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0715.html
- http://rhn.redhat.com/errata/RHSA-2015-0716.html
- http://rhn.redhat.com/errata/RHSA-2015-0752.html
- http://rhn.redhat.com/errata/RHSA-2015-0800.html
- http://support.apple.com/kb/HT204942
- http://www.debian.org/security/2015/dsa-3197
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/73227
- http://www.securitytracker.com/id/1031929
- http://www.ubuntu.com/usn/USN-2537-1
- https://access.redhat.com/articles/1384453
- https://bto.bluecoat.com/security-advisory/sa92
- https://bugzilla.redhat.com/show_bug.cgi?id=1202380
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=b717b083073b6cacc0a5e2397b661678aff7ae7f
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://security.gentoo.org/glsa/201503-11
- https://support.apple.com/HT205212
- https://support.apple.com/HT205267
- https://support.citrix.com/article/CTX216642
- https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc
- https://www.openssl.org/news/secadv_20150319.txt
Modified: 2025-04-12
CVE-2015-0288
The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html
- http://marc.info/?l=bugtraq&m=142841429220765&w=2
- http://marc.info/?l=bugtraq&m=143213830203296&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0715.html
- http://rhn.redhat.com/errata/RHSA-2015-0716.html
- http://rhn.redhat.com/errata/RHSA-2015-0752.html
- http://rhn.redhat.com/errata/RHSA-2015-0800.html
- http://support.apple.com/kb/HT204942
- http://www.debian.org/security/2015/dsa-3197
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/73237
- http://www.securitytracker.com/id/1031929
- http://www.ubuntu.com/usn/USN-2537-1
- https://access.redhat.com/articles/1384453
- https://bto.bluecoat.com/security-advisory/sa92
- https://bugzilla.redhat.com/show_bug.cgi?id=1202418
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=28a00bcd8e318da18031b2ac8778c64147cd54f9
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://rt.openssl.org/Ticket/Display.html?id=3708&user=guest&pass=guest
- https://security.gentoo.org/glsa/201503-11
- https://support.citrix.com/article/CTX216642
- https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc
- https://www.openssl.org/news/secadv_20150319.txt
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html
- http://marc.info/?l=bugtraq&m=142841429220765&w=2
- http://marc.info/?l=bugtraq&m=143213830203296&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050254401665&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0715.html
- http://rhn.redhat.com/errata/RHSA-2015-0716.html
- http://rhn.redhat.com/errata/RHSA-2015-0752.html
- http://rhn.redhat.com/errata/RHSA-2015-0800.html
- http://support.apple.com/kb/HT204942
- http://www.debian.org/security/2015/dsa-3197
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/73237
- http://www.securitytracker.com/id/1031929
- http://www.ubuntu.com/usn/USN-2537-1
- https://access.redhat.com/articles/1384453
- https://bto.bluecoat.com/security-advisory/sa92
- https://bugzilla.redhat.com/show_bug.cgi?id=1202418
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=28a00bcd8e318da18031b2ac8778c64147cd54f9
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://rt.openssl.org/Ticket/Display.html?id=3708&user=guest&pass=guest
- https://security.gentoo.org/glsa/201503-11
- https://support.citrix.com/article/CTX216642
- https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc
- https://www.openssl.org/news/secadv_20150319.txt
Modified: 2025-04-12
CVE-2015-0289
The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html
- http://marc.info/?l=bugtraq&m=142841429220765&w=2
- http://marc.info/?l=bugtraq&m=143213830203296&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0715.html
- http://rhn.redhat.com/errata/RHSA-2015-0716.html
- http://rhn.redhat.com/errata/RHSA-2015-0752.html
- http://rhn.redhat.com/errata/RHSA-2015-0800.html
- http://support.apple.com/kb/HT204942
- http://www.debian.org/security/2015/dsa-3197
- http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/73231
- http://www.securitytracker.com/id/1031929
- http://www.ubuntu.com/usn/USN-2537-1
- https://access.redhat.com/articles/1384453
- https://bto.bluecoat.com/security-advisory/sa92
- https://bugzilla.redhat.com/show_bug.cgi?id=1202384
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c0334c2c92dd1bc3ad8138ba6e74006c3631b0f9
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://security.gentoo.org/glsa/201503-11
- https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc
- https://www.openssl.org/news/secadv_20150319.txt
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html
- http://marc.info/?l=bugtraq&m=142841429220765&w=2
- http://marc.info/?l=bugtraq&m=143213830203296&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0715.html
- http://rhn.redhat.com/errata/RHSA-2015-0716.html
- http://rhn.redhat.com/errata/RHSA-2015-0752.html
- http://rhn.redhat.com/errata/RHSA-2015-0800.html
- http://support.apple.com/kb/HT204942
- http://www.debian.org/security/2015/dsa-3197
- http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/73231
- http://www.securitytracker.com/id/1031929
- http://www.ubuntu.com/usn/USN-2537-1
- https://access.redhat.com/articles/1384453
- https://bto.bluecoat.com/security-advisory/sa92
- https://bugzilla.redhat.com/show_bug.cgi?id=1202384
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c0334c2c92dd1bc3ad8138ba6e74006c3631b0f9
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://security.gentoo.org/glsa/201503-11
- https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc
- https://www.openssl.org/news/secadv_20150319.txt
Modified: 2025-04-12
CVE-2015-0293
The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html
- http://marc.info/?l=bugtraq&m=143213830203296&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0715.html
- http://rhn.redhat.com/errata/RHSA-2015-0716.html
- http://rhn.redhat.com/errata/RHSA-2015-0752.html
- http://rhn.redhat.com/errata/RHSA-2015-0800.html
- http://support.apple.com/kb/HT204942
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/73232
- http://www.securitytracker.com/id/1031929
- http://www.ubuntu.com/usn/USN-2537-1
- https://access.redhat.com/articles/1384453
- https://bto.bluecoat.com/security-advisory/sa92
- https://bugzilla.redhat.com/show_bug.cgi?id=1202404
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=86f8fb0e344d62454f8daf3e15236b2b59210756
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://security.gentoo.org/glsa/201503-11
- https://support.citrix.com/article/CTX216642
- https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc
- https://www.openssl.org/news/secadv_20150319.txt
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152733.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152734.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152844.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156823.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157177.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00038.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00062.html
- http://marc.info/?l=bugtraq&m=143213830203296&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://marc.info/?l=bugtraq&m=144050297101809&w=2
- http://rhn.redhat.com/errata/RHSA-2015-0715.html
- http://rhn.redhat.com/errata/RHSA-2015-0716.html
- http://rhn.redhat.com/errata/RHSA-2015-0752.html
- http://rhn.redhat.com/errata/RHSA-2015-0800.html
- http://support.apple.com/kb/HT204942
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/73232
- http://www.securitytracker.com/id/1031929
- http://www.ubuntu.com/usn/USN-2537-1
- https://access.redhat.com/articles/1384453
- https://bto.bluecoat.com/security-advisory/sa92
- https://bugzilla.redhat.com/show_bug.cgi?id=1202404
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=86f8fb0e344d62454f8daf3e15236b2b59210756
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://security.gentoo.org/glsa/201503-11
- https://support.citrix.com/article/CTX216642
- https://www.freebsd.org/security/advisories/FreeBSD-SA-15%3A06.openssl.asc
- https://www.openssl.org/news/secadv_20150319.txt
Modified: 2025-04-12
CVE-2015-1788
The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.
- http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=143880121627664&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl
- http://www-304.ibm.com/support/docview.wss?uid=swg21960041
- http://www.debian.org/security/2015/dsa-3287
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/75158
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1032564
- http://www.ubuntu.com/usn/USN-2639-1
- https://bto.bluecoat.com/security-advisory/sa98
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openssl/openssl/commit/4924b37ee01f71ae19c94a8934b80eeb2f677932
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://openssl.org/news/secadv/20150611.txt
- https://security.gentoo.org/glsa/201506-02
- https://support.apple.com/kb/HT205031
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150611.txt
- http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=143880121627664&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl
- http://www-304.ibm.com/support/docview.wss?uid=swg21960041
- http://www.debian.org/security/2015/dsa-3287
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/75158
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1032564
- http://www.ubuntu.com/usn/USN-2639-1
- https://bto.bluecoat.com/security-advisory/sa98
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openssl/openssl/commit/4924b37ee01f71ae19c94a8934b80eeb2f677932
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://openssl.org/news/secadv/20150611.txt
- https://security.gentoo.org/glsa/201506-02
- https://support.apple.com/kb/HT205031
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150611.txt
Modified: 2025-04-12
CVE-2015-1789
The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=143654156615516&w=2
- http://marc.info/?l=bugtraq&m=143880121627664&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://rhn.redhat.com/errata/RHSA-2015-1115.html
- http://rhn.redhat.com/errata/RHSA-2015-1197.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl
- http://www.debian.org/security/2015/dsa-3287
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/75156
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1032564
- http://www.ubuntu.com/usn/USN-2639-1
- https://bto.bluecoat.com/security-advisory/sa98
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://openssl.org/news/secadv/20150611.txt
- https://security.gentoo.org/glsa/201506-02
- https://support.apple.com/kb/HT205031
- https://support.citrix.com/article/CTX216642
- https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11
- https://www.openssl.org/news/secadv_20150611.txt
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=143654156615516&w=2
- http://marc.info/?l=bugtraq&m=143880121627664&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://rhn.redhat.com/errata/RHSA-2015-1115.html
- http://rhn.redhat.com/errata/RHSA-2015-1197.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl
- http://www.debian.org/security/2015/dsa-3287
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/75156
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1032564
- http://www.ubuntu.com/usn/USN-2639-1
- https://bto.bluecoat.com/security-advisory/sa98
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://openssl.org/news/secadv/20150611.txt
- https://security.gentoo.org/glsa/201506-02
- https://support.apple.com/kb/HT205031
- https://support.citrix.com/article/CTX216642
- https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11
- https://www.openssl.org/news/secadv_20150611.txt
Modified: 2025-04-12
CVE-2015-1790
The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=143654156615516&w=2
- http://marc.info/?l=bugtraq&m=143880121627664&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://rhn.redhat.com/errata/RHSA-2015-1115.html
- http://rhn.redhat.com/errata/RHSA-2015-1197.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl
- http://www.debian.org/security/2015/dsa-3287
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/75157
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1032564
- http://www.ubuntu.com/usn/USN-2639-1
- https://bto.bluecoat.com/security-advisory/sa98
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openssl/openssl/commit/59302b600e8d5b77ef144e447bb046fd7ab72686
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://openssl.org/news/secadv/20150611.txt
- https://security.gentoo.org/glsa/201506-02
- https://support.apple.com/kb/HT205031
- https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11
- https://www.openssl.org/news/secadv_20150611.txt
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=143654156615516&w=2
- http://marc.info/?l=bugtraq&m=143880121627664&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://rhn.redhat.com/errata/RHSA-2015-1115.html
- http://rhn.redhat.com/errata/RHSA-2015-1197.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl
- http://www.debian.org/security/2015/dsa-3287
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/75157
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1032564
- http://www.ubuntu.com/usn/USN-2639-1
- https://bto.bluecoat.com/security-advisory/sa98
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openssl/openssl/commit/59302b600e8d5b77ef144e447bb046fd7ab72686
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://openssl.org/news/secadv/20150611.txt
- https://security.gentoo.org/glsa/201506-02
- https://support.apple.com/kb/HT205031
- https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11
- https://www.openssl.org/news/secadv_20150611.txt
Modified: 2025-04-12
CVE-2015-1791
Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=143880121627664&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://rhn.redhat.com/errata/RHSA-2015-1115.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl
- http://www-304.ibm.com/support/docview.wss?uid=swg21960041
- http://www.debian.org/security/2015/dsa-3287
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/75161
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1032479
- http://www.ubuntu.com/usn/USN-2639-1
- https://bto.bluecoat.com/security-advisory/sa98
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openssl/openssl/commit/98ece4eebfb6cd45cc8d550c6ac0022965071afc
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://openssl.org/news/secadv/20150611.txt
- https://security.gentoo.org/glsa/201506-02
- https://support.apple.com/kb/HT205031
- https://support.citrix.com/article/CTX216642
- https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11
- https://www.openssl.org/news/secadv_20150611.txt
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=143880121627664&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://rhn.redhat.com/errata/RHSA-2015-1115.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl
- http://www-304.ibm.com/support/docview.wss?uid=swg21960041
- http://www.debian.org/security/2015/dsa-3287
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/75161
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1032479
- http://www.ubuntu.com/usn/USN-2639-1
- https://bto.bluecoat.com/security-advisory/sa98
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openssl/openssl/commit/98ece4eebfb6cd45cc8d550c6ac0022965071afc
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://openssl.org/news/secadv/20150611.txt
- https://security.gentoo.org/glsa/201506-02
- https://support.apple.com/kb/HT205031
- https://support.citrix.com/article/CTX216642
- https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11
- https://www.openssl.org/news/secadv_20150611.txt
Modified: 2025-04-12
CVE-2015-1792
The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=143654156615516&w=2
- http://marc.info/?l=bugtraq&m=143880121627664&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://rhn.redhat.com/errata/RHSA-2015-1115.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl
- http://www.debian.org/security/2015/dsa-3287
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/75154
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1032564
- http://www.ubuntu.com/usn/USN-2639-1
- https://bto.bluecoat.com/security-advisory/sa98
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openssl/openssl/commit/cd30f03ac5bf2962f44bd02ae8d88245dff2f12c
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://openssl.org/news/secadv/20150611.txt
- https://security.gentoo.org/glsa/201506-02
- https://support.apple.com/kb/HT205031
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150611.txt
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-008.txt.asc
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160436.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160647.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00024.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://marc.info/?l=bugtraq&m=143654156615516&w=2
- http://marc.info/?l=bugtraq&m=143880121627664&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://rhn.redhat.com/errata/RHSA-2015-1115.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150612-openssl
- http://www.debian.org/security/2015/dsa-3287
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/75154
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1032564
- http://www.ubuntu.com/usn/USN-2639-1
- https://bto.bluecoat.com/security-advisory/sa98
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openssl/openssl/commit/cd30f03ac5bf2962f44bd02ae8d88245dff2f12c
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://openssl.org/news/secadv/20150611.txt
- https://security.gentoo.org/glsa/201506-02
- https://support.apple.com/kb/HT205031
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150611.txt
Modified: 2025-04-12
CVE-2015-3195
The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.
- http://fortiguard.com/advisory/openssl-advisory-december-2015
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173801.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00103.html
- http://marc.info/?l=bugtraq&m=145382583417444&w=2
- http://openssl.org/news/secadv/20151203.txt
- http://rhn.redhat.com/errata/RHSA-2015-2616.html
- http://rhn.redhat.com/errata/RHSA-2015-2617.html
- http://rhn.redhat.com/errata/RHSA-2016-2056.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl
- http://www.debian.org/security/2015/dsa-3413
- http://www.fortiguard.com/advisory/openssl-advisory-december-2015
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/78626
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1034294
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.754583
- http://www.ubuntu.com/usn/USN-2830-1
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=cc598f321fbac9c04da5766243ed55d55948637d
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100
- https://support.apple.com/HT206167
- http://fortiguard.com/advisory/openssl-advisory-december-2015
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-December/173801.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00017.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00070.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00071.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00087.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00103.html
- http://marc.info/?l=bugtraq&m=145382583417444&w=2
- http://openssl.org/news/secadv/20151203.txt
- http://rhn.redhat.com/errata/RHSA-2015-2616.html
- http://rhn.redhat.com/errata/RHSA-2015-2617.html
- http://rhn.redhat.com/errata/RHSA-2016-2056.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151204-openssl
- http://www.debian.org/security/2015/dsa-3413
- http://www.fortiguard.com/advisory/openssl-advisory-december-2015
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/78626
- http://www.securityfocus.com/bid/91787
- http://www.securitytracker.com/id/1034294
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.754583
- http://www.ubuntu.com/usn/USN-2830-1
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=cc598f321fbac9c04da5766243ed55d55948637d
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100
- https://support.apple.com/HT206167
Closed bugs
hostname обрезается до 7 символов.