ALT-BU-2015-2795-1
Branch sisyphus update bulletin.
Closed bugs
Не ротируются логи с logrotate >= 3.9.1-alt1
Package perl-MIME-Types updated to version 2.12-alt2 for branch sisyphus in task 154930.
Closed bugs
Excessive dependency to perl-Mojolicious
Package kernel-modules-eprd-std-def updated to version 0.5.0-alt3.262414.1 for branch sisyphus in task 154940.
Closed bugs
Конфликт для разных версий ядра
Package kernel-modules-eprd-ovz-el updated to version 0.5.0-alt3.132640.138 for branch sisyphus in task 154940.
Closed bugs
Конфликт для разных версий ядра
Package kernel-image-un-def updated to version 4.3.3-alt1 for branch sisyphus in task 154942.
Closed vulnerabilities
BDU:2016-01939
Уязвимость стека IPv6 ядра Linux операционной системы Android, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2024-11-21
CVE-2013-7446
Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d267278a9ece963d77eefec61630223fce08c6c
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d267278a9ece963d77eefec61630223fce08c6c
- SUSE-SU-2016:0745
- SUSE-SU-2016:0745
- SUSE-SU-2016:0746
- SUSE-SU-2016:0746
- SUSE-SU-2016:0747
- SUSE-SU-2016:0747
- SUSE-SU-2016:0749
- SUSE-SU-2016:0749
- SUSE-SU-2016:0750
- SUSE-SU-2016:0750
- SUSE-SU-2016:0751
- SUSE-SU-2016:0751
- SUSE-SU-2016:0752
- SUSE-SU-2016:0752
- SUSE-SU-2016:0753
- SUSE-SU-2016:0753
- SUSE-SU-2016:0754
- SUSE-SU-2016:0754
- SUSE-SU-2016:0755
- SUSE-SU-2016:0755
- SUSE-SU-2016:0756
- SUSE-SU-2016:0756
- SUSE-SU-2016:0757
- SUSE-SU-2016:0757
- SUSE-SU-2016:0911
- SUSE-SU-2016:0911
- SUSE-SU-2016:1102
- SUSE-SU-2016:1102
- openSUSE-SU-2016:1641
- openSUSE-SU-2016:1641
- SUSE-SU-2016:1961
- SUSE-SU-2016:1961
- SUSE-SU-2016:1994
- SUSE-SU-2016:1994
- SUSE-SU-2016:1995
- SUSE-SU-2016:1995
- SUSE-SU-2016:2000
- SUSE-SU-2016:2000
- SUSE-SU-2016:2001
- SUSE-SU-2016:2001
- SUSE-SU-2016:2002
- SUSE-SU-2016:2002
- SUSE-SU-2016:2003
- SUSE-SU-2016:2003
- SUSE-SU-2016:2005
- SUSE-SU-2016:2005
- SUSE-SU-2016:2006
- SUSE-SU-2016:2006
- SUSE-SU-2016:2007
- SUSE-SU-2016:2007
- SUSE-SU-2016:2009
- SUSE-SU-2016:2009
- SUSE-SU-2016:2010
- SUSE-SU-2016:2010
- SUSE-SU-2016:2011
- SUSE-SU-2016:2011
- SUSE-SU-2016:2014
- SUSE-SU-2016:2014
- SUSE-SU-2016:2074
- SUSE-SU-2016:2074
- DSA-3426
- DSA-3426
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- [oss-security] 20151118 Re: CVE request - Linux kernel - Unix sockets use after free - peer_wait_queue prematurely freed
- [oss-security] 20151118 Re: CVE request - Linux kernel - Unix sockets use after free - peer_wait_queue prematurely freed
- 77638
- 77638
- 1034557
- 1034557
- [netdev] 20150304 [PATCH net] af_unix: don't poll dead peers
- [netdev] 20150304 [PATCH net] af_unix: don't poll dead peers
- USN-2886-1
- USN-2886-1
- USN-2887-1
- USN-2887-1
- USN-2887-2
- USN-2887-2
- USN-2888-1
- USN-2888-1
- USN-2889-1
- USN-2889-1
- USN-2889-2
- USN-2889-2
- USN-2890-1
- USN-2890-1
- USN-2890-2
- USN-2890-2
- USN-2890-3
- USN-2890-3
- https://bugzilla.redhat.com/show_bug.cgi?id=1282688
- https://bugzilla.redhat.com/show_bug.cgi?id=1282688
- https://forums.grsecurity.net/viewtopic.php?f=3&t=4150
- https://forums.grsecurity.net/viewtopic.php?f=3&t=4150
- https://github.com/torvalds/linux/commit/7d267278a9ece963d77eefec61630223fce08c6c
- https://github.com/torvalds/linux/commit/7d267278a9ece963d77eefec61630223fce08c6c
- https://groups.google.com/forum/#%21topic/syzkaller/3twDUI4Cpm8
- https://groups.google.com/forum/#%21topic/syzkaller/3twDUI4Cpm8
- [linux-kernel] 20131014 Re: epoll oops.
- [linux-kernel] 20131014 Re: epoll oops.
- [linux-kernel] 20140515 eventpoll __list_del_entry corruption (was: perf: use after free in perf_remove_from_context)
- [linux-kernel] 20140515 eventpoll __list_del_entry corruption (was: perf: use after free in perf_remove_from_context)
- [linux-kernel] 20150913 List corruption on epoll_ctl(EPOLL_CTL_DEL) an AF_UNIX socket
- [linux-kernel] 20150913 List corruption on epoll_ctl(EPOLL_CTL_DEL) an AF_UNIX socket
Modified: 2024-11-21
CVE-2015-7884
The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=eda98796aff0d9bf41094b06811f5def3b4c333c
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=eda98796aff0d9bf41094b06811f5def3b4c333c
- openSUSE-SU-2016:1008
- openSUSE-SU-2016:1008
- [oss-security] 20151021 Re: CVE Request: Linux Kernel ioctl infoleaks on vivid-osd and dgnc
- [oss-security] 20151021 Re: CVE Request: Linux Kernel ioctl infoleaks on vivid-osd and dgnc
- 77317
- 77317
- 1034893
- 1034893
- USN-2842-1
- USN-2842-1
- USN-2842-2
- USN-2842-2
- USN-2843-1
- USN-2843-1
- USN-2843-2
- USN-2843-2
- USN-2843-3
- USN-2843-3
- https://bugzilla.redhat.com/show_bug.cgi?id=1274726
- https://bugzilla.redhat.com/show_bug.cgi?id=1274726
- https://github.com/torvalds/linux/commit/eda98796aff0d9bf41094b06811f5def3b4c333c
- https://github.com/torvalds/linux/commit/eda98796aff0d9bf41094b06811f5def3b4c333c
Modified: 2024-11-21
CVE-2015-7885
The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4b6184336ebb5c8dc1eae7f7ab46ee608a748b05
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4b6184336ebb5c8dc1eae7f7ab46ee608a748b05
- [oss-security] 20151021 Re: CVE Request: Linux Kernel ioctl infoleaks on vivid-osd and dgnc
- [oss-security] 20151021 Re: CVE Request: Linux Kernel ioctl infoleaks on vivid-osd and dgnc
- 77317
- 77317
- 1034896
- 1034896
- USN-2841-1
- USN-2841-1
- USN-2841-2
- USN-2841-2
- USN-2842-1
- USN-2842-1
- USN-2842-2
- USN-2842-2
- USN-2843-1
- USN-2843-1
- USN-2843-2
- USN-2843-2
- USN-2843-3
- USN-2843-3
- USN-2844-1
- USN-2844-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1274728
- https://bugzilla.redhat.com/show_bug.cgi?id=1274728
- https://github.com/torvalds/linux/commit/4b6184336ebb5c8dc1eae7f7ab46ee608a748b05
- https://github.com/torvalds/linux/commit/4b6184336ebb5c8dc1eae7f7ab46ee608a748b05
Modified: 2024-11-21
CVE-2015-7990
Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8c7188b23474cca017b3ef354c4a58456f68303a
- SUSE-SU-2015:2108
- SUSE-SU-2015:2108
- SUSE-SU-2015:2194
- SUSE-SU-2015:2194
- SUSE-SU-2015:2292
- SUSE-SU-2015:2292
- SUSE-SU-2015:2339
- SUSE-SU-2015:2339
- SUSE-SU-2015:2350
- SUSE-SU-2015:2350
- SUSE-SU-2016:0335
- SUSE-SU-2016:0335
- SUSE-SU-2016:0337
- SUSE-SU-2016:0337
- SUSE-SU-2016:0354
- SUSE-SU-2016:0354
- SUSE-SU-2016:0380
- SUSE-SU-2016:0380
- SUSE-SU-2016:0381
- SUSE-SU-2016:0381
- SUSE-SU-2016:0383
- SUSE-SU-2016:0383
- SUSE-SU-2016:0384
- SUSE-SU-2016:0384
- SUSE-SU-2016:0386
- SUSE-SU-2016:0386
- SUSE-SU-2016:0387
- SUSE-SU-2016:0387
- SUSE-SU-2016:0434
- SUSE-SU-2016:0434
- SUSE-SU-2016:2074
- SUSE-SU-2016:2074
- openSUSE-SU-2015:2232
- openSUSE-SU-2015:2232
- DSA-3396
- DSA-3396
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- [oss-security] 20151027 Re: CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c
- [oss-security] 20151027 Re: CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- 77340
- 77340
- 1034453
- 1034453
- USN-2886-1
- USN-2886-1
- USN-2887-1
- USN-2887-1
- USN-2887-2
- USN-2887-2
- USN-2888-1
- USN-2888-1
- USN-2889-1
- USN-2889-1
- USN-2889-2
- USN-2889-2
- USN-2890-1
- USN-2890-1
- USN-2890-2
- USN-2890-2
- USN-2890-3
- USN-2890-3
- https://bugzilla.redhat.com/show_bug.cgi?id=1276437
- https://bugzilla.redhat.com/show_bug.cgi?id=1276437
- https://bugzilla.suse.com/show_bug.cgi?id=952384
- https://bugzilla.suse.com/show_bug.cgi?id=952384
- https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a
- https://github.com/torvalds/linux/commit/8c7188b23474cca017b3ef354c4a58456f68303a
- [linux-kernel] 20151016 [PATCH] RDS: fix race condition when sending a message on unbound socket.
- [linux-kernel] 20151016 [PATCH] RDS: fix race condition when sending a message on unbound socket.
Modified: 2024-11-21
CVE-2015-8374
fs/btrfs/inode.c in the Linux kernel before 4.3.3 mishandles compressed inline extents, which allows local users to obtain sensitive pre-truncation information from a file via a clone action.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0305cd5f7fca85dae392b9ba85b116896eb7c1c7
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0305cd5f7fca85dae392b9ba85b116896eb7c1c7
- RHSA-2016:2574
- RHSA-2016:2574
- RHSA-2016:2584
- RHSA-2016:2584
- DSA-3426
- DSA-3426
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- [oss-security] 20151127 CVE request: Linux kernel, information disclosure after file truncate on BTRFS
- [oss-security] 20151127 CVE request: Linux kernel, information disclosure after file truncate on BTRFS
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- 78219
- 78219
- 1034895
- 1034895
- USN-2886-1
- USN-2886-1
- USN-2887-1
- USN-2887-1
- USN-2887-2
- USN-2887-2
- USN-2888-1
- USN-2888-1
- USN-2889-1
- USN-2889-1
- USN-2889-2
- USN-2889-2
- USN-2890-1
- USN-2890-1
- USN-2890-2
- USN-2890-2
- USN-2890-3
- USN-2890-3
- https://bugzilla.redhat.com/show_bug.cgi?id=1286261
- https://bugzilla.redhat.com/show_bug.cgi?id=1286261
- https://github.com/torvalds/linux/commit/0305cd5f7fca85dae392b9ba85b116896eb7c1c7
- https://github.com/torvalds/linux/commit/0305cd5f7fca85dae392b9ba85b116896eb7c1c7
Modified: 2024-11-21
CVE-2015-8569
The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=09ccfd238e5a0e670d8178cf50180ea81ae09ae1
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=09ccfd238e5a0e670d8178cf50180ea81ae09ae1
- FEDORA-2016-5d43766e33
- FEDORA-2016-5d43766e33
- SUSE-SU-2016:0911
- SUSE-SU-2016:0911
- SUSE-SU-2016:1102
- SUSE-SU-2016:1102
- SUSE-SU-2016:2074
- SUSE-SU-2016:2074
- http://twitter.com/grsecurity/statuses/676744240802750464
- http://twitter.com/grsecurity/statuses/676744240802750464
- DSA-3434
- DSA-3434
- [oss-security] 20151215 Re: CVE Request: Linux Kernel: information leak from getsockname
- [oss-security] 20151215 Re: CVE Request: Linux Kernel: information leak from getsockname
- 79428
- 79428
- 1034549
- 1034549
- USN-2886-1
- USN-2886-1
- USN-2888-1
- USN-2888-1
- USN-2890-1
- USN-2890-1
- USN-2890-2
- USN-2890-2
- USN-2890-3
- USN-2890-3
- https://bugzilla.redhat.com/show_bug.cgi?id=1292045
- https://bugzilla.redhat.com/show_bug.cgi?id=1292045
- https://github.com/torvalds/linux/commit/09ccfd238e5a0e670d8178cf50180ea81ae09ae1
- https://github.com/torvalds/linux/commit/09ccfd238e5a0e670d8178cf50180ea81ae09ae1
- [linux-kernel] 20151214 Information leak in pptp_bind
- [linux-kernel] 20151214 Information leak in pptp_bind
Modified: 2024-11-21
CVE-2015-8961
The __ext4_journal_stop function in fs/ext4/ext4_jbd2.c in the Linux kernel before 4.3.3 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging improper access to a certain error field.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6934da9238da947628be83635e365df41064b09b
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6934da9238da947628be83635e365df41064b09b
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- 94135
- 94135
- https://github.com/torvalds/linux/commit/6934da9238da947628be83635e365df41064b09b
- https://github.com/torvalds/linux/commit/6934da9238da947628be83635e365df41064b09b
- https://source.android.com/security/bulletin/2016-11-01.html
- https://source.android.com/security/bulletin/2016-11-01.html
Modified: 2024-11-21
CVE-2016-3841
The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=45f6fad84cc305103b28d73482b344d7f5b76f39
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=45f6fad84cc305103b28d73482b344d7f5b76f39
- RHSA-2016:0855
- RHSA-2016:0855
- RHSA-2016:2574
- RHSA-2016:2574
- RHSA-2016:2584
- RHSA-2016:2584
- RHSA-2016:2695
- RHSA-2016:2695
- http://source.android.com/security/bulletin/2016-08-01.html
- http://source.android.com/security/bulletin/2016-08-01.html
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
- 92227
- 92227
- https://github.com/torvalds/linux/commit/45f6fad84cc305103b28d73482b344d7f5b76f39
- https://github.com/torvalds/linux/commit/45f6fad84cc305103b28d73482b344d7f5b76f39
Package openssl098 updated to version 0.9.8zh-alt1 for branch sisyphus in task 154980.
Closed vulnerabilities
BDU:2015-06127
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации
BDU:2015-06128
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации
BDU:2015-06129
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации
BDU:2015-06130
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации
BDU:2015-06131
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить доступность защищаемой информации
BDU:2015-09142
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09143
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09144
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09145
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09146
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
BDU:2015-09819
Уязвимости операционной системы Альт Линукс СПТ, позволяющие удаленному злоумышленнику нарушить целостность и доступность передаваемой защищаемой информации
BDU:2015-09820
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09821
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09822
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09823
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09824
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09905
Уязвимости системы автоматизации деятельности предприятия 1С:Предприятие, позволяющие злоумышленнику вызвать отказ в обслуживании или получить доступ к зашифрованным данным без знания ключа шифрования
BDU:2015-09960
Уязвимость программной платформы Java Platform, позволяющая нарушителю, действующему удаленно, упростить процесс расшифровки сообщения
BDU:2015-09963
Уязвимость программной платформы JRockit, позволяющая нарушителю, действующему удаленно, упростить процесс расшифровки сообщения
BDU:2015-09980
Уязвимость системы управления базами данных MySQL, позволяющая удаленному нарушителю вызвать отказ в обслуживании
BDU:2015-11035
Уязвимость функции BN_GF2m_mod_inv библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2015-11036
Уязвимость библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2015-11037
Уязвимость библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2015-11038
Уязвимость библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2015-11039
Уязвимость библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-01654
Уязвимость реализации ASN1_TFLG_COMBINE библиотеки OpenSSL, позволяющая нарушителю получить защищаемую информацию из памяти процесса
Modified: 2024-11-21
CVE-2014-3569
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling. NOTE: this issue became relevant after the CVE-2014-3568 fix.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- APPLE-SA-2015-04-08-2
- APPLE-SA-2015-04-08-2
- openSUSE-SU-2015:0130
- openSUSE-SU-2015:0130
- SUSE-SU-2015:0946
- SUSE-SU-2015:0946
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- HPSBUX03162
- HPSBUX03162
- HPSBUX03244
- HPSBUX03244
- SSRT101885
- SSRT101885
- HPSBHF03289
- HPSBHF03289
- HPSBOV03318
- HPSBOV03318
- HPSBMU03380
- HPSBMU03380
- HPSBMU03409
- HPSBMU03409
- HPSBMU03396
- HPSBMU03396
- HPSBMU03413
- HPSBMU03413
- HPSBMU03397
- HPSBMU03397
- http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3569.html
- http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3569.html
- http://rt.openssl.org/Ticket/Display.html?id=3571&user=guest&pass=guest
- http://rt.openssl.org/Ticket/Display.html?id=3571&user=guest&pass=guest
- 20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
- 20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
- DSA-3125
- DSA-3125
- MDVSA-2015:019
- MDVSA-2015:019
- MDVSA-2015:062
- MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 71934
- 71934
- 1033378
- 1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://bto.bluecoat.com/security-advisory/sa88
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=392fa7a952e97d82eac6958c81ed1e256e6b8ca5
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=392fa7a952e97d82eac6958c81ed1e256e6b8ca5
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=6ce9687b5aba5391fc0de50e18779eb676d0e04d
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=6ce9687b5aba5391fc0de50e18779eb676d0e04d
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=b82924741b4bd590da890619be671f4635e46c2b
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=b82924741b4bd590da890619be671f4635e46c2b
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://security-tracker.debian.org/tracker/CVE-2014-3569
- https://security-tracker.debian.org/tracker/CVE-2014-3569
- https://support.apple.com/HT204659
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
- https://www.openssl.org/news/secadv_20150108.txt
Modified: 2024-11-21
CVE-2014-3570
The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- APPLE-SA-2015-04-08-2
- APPLE-SA-2015-04-08-2
- FEDORA-2015-0512
- FEDORA-2015-0512
- FEDORA-2015-0601
- FEDORA-2015-0601
- openSUSE-SU-2015:0130
- openSUSE-SU-2015:0130
- SUSE-SU-2015:0578
- SUSE-SU-2015:0578
- SUSE-SU-2015:0946
- SUSE-SU-2015:0946
- openSUSE-SU-2015:1277
- openSUSE-SU-2015:1277
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- HPSBUX03162
- HPSBUX03162
- HPSBUX03244
- HPSBUX03244
- SSRT101885
- SSRT101885
- HPSBGN03299
- HPSBGN03299
- SSRT101987
- SSRT101987
- HPSBHF03289
- HPSBHF03289
- HPSBOV03318
- HPSBOV03318
- HPSBMU03380
- HPSBMU03380
- HPSBMU03409
- HPSBMU03409
- HPSBMU03396
- HPSBMU03396
- HPSBMU03413
- HPSBMU03413
- HPSBMU03397
- HPSBMU03397
- RHSA-2015:0066
- RHSA-2015:0066
- RHSA-2015:0849
- RHSA-2015:0849
- RHSA-2016:1650
- RHSA-2016:1650
- 20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
- 20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
- DSA-3125
- DSA-3125
- MDVSA-2015:019
- MDVSA-2015:019
- MDVSA-2015:062
- MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 71939
- 71939
- 1033378
- 1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/a7a44ba55cb4f884c6bc9ceac90072dea38e66d0
- https://github.com/openssl/openssl/commit/a7a44ba55cb4f884c6bc9ceac90072dea38e66d0
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
- https://www.openssl.org/news/secadv_20150108.txt
Modified: 2024-11-21
CVE-2014-3571
OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
- APPLE-SA-2015-04-08-2
- APPLE-SA-2015-04-08-2
- FEDORA-2015-0512
- FEDORA-2015-0512
- FEDORA-2015-0601
- FEDORA-2015-0601
- openSUSE-SU-2015:0130
- openSUSE-SU-2015:0130
- SUSE-SU-2015:0946
- SUSE-SU-2015:0946
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- HPSBUX03162
- HPSBUX03162
- HPSBUX03244
- HPSBUX03244
- SSRT101885
- SSRT101885
- HPSBHF03289
- HPSBHF03289
- HPSBOV03318
- HPSBOV03318
- HPSBMU03380
- HPSBMU03380
- HPSBMU03409
- HPSBMU03409
- HPSBMU03396
- HPSBMU03396
- HPSBMU03413
- HPSBMU03413
- HPSBMU03397
- HPSBMU03397
- RHSA-2015:0066
- RHSA-2015:0066
- 20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
- 20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
- DSA-3125
- DSA-3125
- MDVSA-2015:019
- MDVSA-2015:019
- MDVSA-2015:062
- MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 71937
- 71937
- 1033378
- 1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/248385c606620b29ecc96ca9d3603463f879652b
- https://github.com/openssl/openssl/commit/248385c606620b29ecc96ca9d3603463f879652b
- https://github.com/openssl/openssl/commit/feba02f3919495e1b960c33ba849e10e77d0785d
- https://github.com/openssl/openssl/commit/feba02f3919495e1b960c33ba849e10e77d0785d
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://support.apple.com/HT204659
- https://www.openssl.org/news/secadv_20150108.txt
- https://www.openssl.org/news/secadv_20150108.txt
Modified: 2024-11-21
CVE-2014-3572
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- APPLE-SA-2015-04-08-2
- APPLE-SA-2015-04-08-2
- openSUSE-SU-2015:0130
- openSUSE-SU-2015:0130
- SUSE-SU-2015:0578
- SUSE-SU-2015:0578
- SUSE-SU-2015:0946
- SUSE-SU-2015:0946
- openSUSE-SU-2015:1277
- openSUSE-SU-2015:1277
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- HPSBUX03162
- HPSBUX03162
- HPSBUX03244
- HPSBUX03244
- SSRT101885
- SSRT101885
- HPSBGN03299
- HPSBGN03299
- SSRT101987
- SSRT101987
- HPSBHF03289
- HPSBHF03289
- HPSBOV03318
- HPSBOV03318
- HPSBMU03380
- HPSBMU03380
- HPSBMU03409
- HPSBMU03409
- HPSBMU03396
- HPSBMU03396
- HPSBMU03413
- HPSBMU03413
- HPSBMU03397
- HPSBMU03397
- RHSA-2015:0066
- RHSA-2015:0066
- 20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
- 20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
- DSA-3125
- DSA-3125
- MDVSA-2015:019
- MDVSA-2015:019
- MDVSA-2015:062
- MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 71942
- 71942
- 1033378
- 1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/b15f8769644b00ef7283521593360b7b2135cb63
- https://github.com/openssl/openssl/commit/b15f8769644b00ef7283521593360b7b2135cb63
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
- https://www.openssl.org/news/secadv_20150108.txt
Modified: 2024-11-21
CVE-2014-8275
OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- APPLE-SA-2015-04-08-2
- APPLE-SA-2015-04-08-2
- FEDORA-2015-0601
- FEDORA-2015-0601
- openSUSE-SU-2015:0130
- openSUSE-SU-2015:0130
- SUSE-SU-2015:0578
- SUSE-SU-2015:0578
- SUSE-SU-2015:0946
- SUSE-SU-2015:0946
- openSUSE-SU-2015:1277
- openSUSE-SU-2015:1277
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- HPSBUX03162
- HPSBUX03162
- HPSBUX03244
- HPSBUX03244
- SSRT101885
- SSRT101885
- HPSBGN03299
- HPSBGN03299
- SSRT101987
- SSRT101987
- HPSBHF03289
- HPSBHF03289
- HPSBOV03318
- HPSBOV03318
- HPSBMU03380
- HPSBMU03380
- HPSBMU03409
- HPSBMU03409
- HPSBMU03396
- HPSBMU03396
- HPSBMU03413
- HPSBMU03413
- HPSBMU03397
- HPSBMU03397
- RHSA-2015:0066
- RHSA-2015:0066
- RHSA-2015:0800
- RHSA-2015:0800
- 20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
- 20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
- DSA-3125
- DSA-3125
- MDVSA-2015:019
- MDVSA-2015:019
- MDVSA-2015:062
- MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 71935
- 71935
- 1033378
- 1033378
- https://bto.bluecoat.com/security-advisory/sa88
- https://bto.bluecoat.com/security-advisory/sa88
- https://github.com/openssl/openssl/commit/684400ce192dac51df3d3e92b61830a6ef90be3e
- https://github.com/openssl/openssl/commit/684400ce192dac51df3d3e92b61830a6ef90be3e
- https://github.com/openssl/openssl/commit/cb62ab4b17818fe66d2fed0a7fe71969131c811b
- https://github.com/openssl/openssl/commit/cb62ab4b17818fe66d2fed0a7fe71969131c811b
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://support.apple.com/HT204659
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
- https://www.openssl.org/news/secadv_20150108.txt
Modified: 2024-11-21
CVE-2015-0204
The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10679
- APPLE-SA-2015-04-08-2
- APPLE-SA-2015-04-08-2
- openSUSE-SU-2015:0130
- openSUSE-SU-2015:0130
- SUSE-SU-2015:0578
- SUSE-SU-2015:0578
- SUSE-SU-2015:0946
- SUSE-SU-2015:0946
- SUSE-SU-2015:1085
- SUSE-SU-2015:1085
- SUSE-SU-2015:1086
- SUSE-SU-2015:1086
- SUSE-SU-2015:1138
- SUSE-SU-2015:1138
- SUSE-SU-2015:1161
- SUSE-SU-2015:1161
- SUSE-SU-2015:2166
- SUSE-SU-2015:2166
- SUSE-SU-2015:2168
- SUSE-SU-2015:2168
- SUSE-SU-2015:2182
- SUSE-SU-2015:2182
- SUSE-SU-2015:2192
- SUSE-SU-2015:2192
- SUSE-SU-2015:2216
- SUSE-SU-2015:2216
- SUSE-SU-2016:0113
- SUSE-SU-2016:0113
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- HPSBUX03162
- HPSBUX03162
- HPSBUX03244
- HPSBUX03244
- SSRT101885
- SSRT101885
- HPSBGN03299
- HPSBGN03299
- SSRT101987
- SSRT101987
- HPSBHF03289
- HPSBHF03289
- HPSBOV03318
- HPSBOV03318
- HPSBUX03334
- HPSBUX03334
- SSRT102000
- SSRT102000
- HPSBMU03380
- HPSBMU03380
- HPSBMU03345
- HPSBMU03345
- HPSBMU03409
- HPSBMU03409
- HPSBMU03396
- HPSBMU03396
- HPSBMU03413
- HPSBMU03413
- HPSBMU03397
- HPSBMU03397
- RHSA-2015:0066
- RHSA-2015:0066
- RHSA-2015:0800
- RHSA-2015:0800
- RHSA-2015:0849
- RHSA-2015:0849
- RHSA-2016:1650
- RHSA-2016:1650
- http://support.novell.com/security/cve/CVE-2015-0204.html
- http://support.novell.com/security/cve/CVE-2015-0204.html
- 20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
- 20150310 Multiple Vulnerabilities in OpenSSL (January 2015) Affecting Cisco Products
- DSA-3125
- DSA-3125
- MDVSA-2015:019
- MDVSA-2015:019
- MDVSA-2015:062
- MDVSA-2015:062
- MDVSA-2015:063
- MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 71936
- 71936
- 91787
- 91787
- 1033378
- 1033378
- http://www-01.ibm.com/support/docview.wss?uid=swg21883640
- http://www-01.ibm.com/support/docview.wss?uid=swg21883640
- http://www-304.ibm.com/support/docview.wss?uid=swg21960769
- http://www-304.ibm.com/support/docview.wss?uid=swg21960769
- https://bto.bluecoat.com/security-advisory/sa88
- https://bto.bluecoat.com/security-advisory/sa88
- https://bto.bluecoat.com/security-advisory/sa91
- https://bto.bluecoat.com/security-advisory/sa91
- openssl-cve20150204-weak-security(99707)
- openssl-cve20150204-weak-security(99707)
- https://freakattack.com/
- https://freakattack.com/
- https://github.com/openssl/openssl/commit/ce325c60c74b0fa784f5872404b722e120e5cab0
- https://github.com/openssl/openssl/commit/ce325c60c74b0fa784f5872404b722e120e5cab0
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://kc.mcafee.com/corporate/index?page=content&id=SB10108
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- GLSA-201503-11
- GLSA-201503-11
- https://support.apple.com/HT204659
- https://support.apple.com/HT204659
- https://support.citrix.com/article/CTX216642
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150108.txt
- https://www.openssl.org/news/secadv_20150108.txt
- https://www.openssl.org/news/secadv_20150319.txt
- https://www.openssl.org/news/secadv_20150319.txt
Modified: 2024-11-21
CVE-2015-0209
Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- APPLE-SA-2015-06-30-2
- APPLE-SA-2015-06-30-2
- FEDORA-2015-4303
- FEDORA-2015-4303
- FEDORA-2015-4320
- FEDORA-2015-4320
- FEDORA-2015-4300
- FEDORA-2015-4300
- FEDORA-2015-6951
- FEDORA-2015-6951
- FEDORA-2015-6855
- FEDORA-2015-6855
- SUSE-SU-2015:0541
- SUSE-SU-2015:0541
- openSUSE-SU-2015:1277
- openSUSE-SU-2015:1277
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- openSUSE-SU-2015:0554
- openSUSE-SU-2015:0554
- HPSBGN03306
- HPSBGN03306
- HPSBUX03334
- HPSBUX03334
- SSRT102000
- SSRT102000
- HPSBMU03380
- HPSBMU03380
- HPSBMU03409
- HPSBMU03409
- HPSBMU03413
- HPSBMU03413
- HPSBMU03397
- HPSBMU03397
- RHSA-2015:0715
- RHSA-2015:0715
- RHSA-2015:0716
- RHSA-2015:0716
- RHSA-2015:0752
- RHSA-2015:0752
- RHSA-2016:1089
- RHSA-2016:1089
- RHSA-2016:2957
- RHSA-2016:2957
- http://support.apple.com/kb/HT204942
- http://support.apple.com/kb/HT204942
- DSA-3197
- DSA-3197
- MDVSA-2015:062
- MDVSA-2015:062
- MDVSA-2015:063
- MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 73239
- 73239
- 1031929
- 1031929
- USN-2537-1
- USN-2537-1
- https://access.redhat.com/articles/1384453
- https://access.redhat.com/articles/1384453
- https://bto.bluecoat.com/security-advisory/sa92
- https://bto.bluecoat.com/security-advisory/sa92
- https://bugzilla.redhat.com/show_bug.cgi?id=1196737
- https://bugzilla.redhat.com/show_bug.cgi?id=1196737
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=1b4a8df38fc9ab3c089ca5765075ee53ec5bd66a
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- GLSA-201503-11
- GLSA-201503-11
- https://support.citrix.com/article/CTX216642
- https://support.citrix.com/article/CTX216642
- FreeBSD-SA-15:06
- FreeBSD-SA-15:06
- https://www.openssl.org/news/secadv_20150319.txt
- https://www.openssl.org/news/secadv_20150319.txt
Modified: 2024-11-21
CVE-2015-0286
The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- APPLE-SA-2015-06-30-2
- APPLE-SA-2015-06-30-2
- APPLE-SA-2015-09-16-1
- APPLE-SA-2015-09-16-1
- APPLE-SA-2015-09-30-3
- APPLE-SA-2015-09-30-3
- FEDORA-2015-4303
- FEDORA-2015-4303
- FEDORA-2015-4320
- FEDORA-2015-4320
- FEDORA-2015-4300
- FEDORA-2015-4300
- FEDORA-2015-6951
- FEDORA-2015-6951
- FEDORA-2015-6855
- FEDORA-2015-6855
- SUSE-SU-2015:0541
- SUSE-SU-2015:0541
- SUSE-SU-2015:0578
- SUSE-SU-2015:0578
- openSUSE-SU-2015:1277
- openSUSE-SU-2015:1277
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- openSUSE-SU-2015:0554
- openSUSE-SU-2015:0554
- HPSBGN03306
- HPSBGN03306
- HPSBUX03334
- HPSBUX03334
- SSRT102000
- SSRT102000
- HPSBMU03380
- HPSBMU03380
- HPSBMU03409
- HPSBMU03409
- HPSBMU03413
- HPSBMU03413
- HPSBMU03397
- HPSBMU03397
- RHSA-2015:0715
- RHSA-2015:0715
- RHSA-2015:0716
- RHSA-2015:0716
- RHSA-2015:0752
- RHSA-2015:0752
- RHSA-2016:2957
- RHSA-2016:2957
- http://support.apple.com/kb/HT204942
- http://support.apple.com/kb/HT204942
- DSA-3197
- DSA-3197
- http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015
- http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015
- MDVSA-2015:062
- MDVSA-2015:062
- MDVSA-2015:063
- MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 73225
- 73225
- 1031929
- 1031929
- 1032917
- 1032917
- USN-2537-1
- USN-2537-1
- https://access.redhat.com/articles/1384453
- https://access.redhat.com/articles/1384453
- https://bto.bluecoat.com/security-advisory/sa92
- https://bto.bluecoat.com/security-advisory/sa92
- https://bugzilla.redhat.com/show_bug.cgi?id=1202366
- https://bugzilla.redhat.com/show_bug.cgi?id=1202366
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c3c7fb07dc975dc3c9de0eddb7d8fd79fc9c67c1
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c3c7fb07dc975dc3c9de0eddb7d8fd79fc9c67c1
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://support.apple.com/HT205212
- https://support.apple.com/HT205212
- https://support.apple.com/HT205267
- https://support.apple.com/HT205267
- https://support.citrix.com/article/CTX216642
- https://support.citrix.com/article/CTX216642
- FreeBSD-SA-15:06
- FreeBSD-SA-15:06
- https://www.openssl.org/news/secadv_20150319.txt
- https://www.openssl.org/news/secadv_20150319.txt
Modified: 2024-11-21
CVE-2015-0287
The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- APPLE-SA-2015-06-30-2
- APPLE-SA-2015-06-30-2
- APPLE-SA-2015-09-16-1
- APPLE-SA-2015-09-16-1
- APPLE-SA-2015-09-30-3
- APPLE-SA-2015-09-30-3
- FEDORA-2015-4303
- FEDORA-2015-4303
- FEDORA-2015-4320
- FEDORA-2015-4320
- FEDORA-2015-4300
- FEDORA-2015-4300
- FEDORA-2015-6951
- FEDORA-2015-6951
- FEDORA-2015-6855
- FEDORA-2015-6855
- SUSE-SU-2015:0541
- SUSE-SU-2015:0541
- SUSE-SU-2015:0578
- SUSE-SU-2015:0578
- openSUSE-SU-2015:1277
- openSUSE-SU-2015:1277
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- SUSE-SU-2016:0678
- SUSE-SU-2016:0678
- openSUSE-SU-2015:0554
- openSUSE-SU-2015:0554
- HPSBGN03306
- HPSBGN03306
- HPSBUX03334
- HPSBUX03334
- SSRT102000
- SSRT102000
- HPSBMU03380
- HPSBMU03380
- HPSBMU03409
- HPSBMU03409
- HPSBMU03397
- HPSBMU03397
- RHSA-2015:0715
- RHSA-2015:0715
- RHSA-2015:0716
- RHSA-2015:0716
- RHSA-2015:0752
- RHSA-2015:0752
- RHSA-2015:0800
- RHSA-2015:0800
- http://support.apple.com/kb/HT204942
- http://support.apple.com/kb/HT204942
- DSA-3197
- DSA-3197
- MDVSA-2015:062
- MDVSA-2015:062
- MDVSA-2015:063
- MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 73227
- 73227
- 1031929
- 1031929
- USN-2537-1
- USN-2537-1
- https://access.redhat.com/articles/1384453
- https://access.redhat.com/articles/1384453
- https://bto.bluecoat.com/security-advisory/sa92
- https://bto.bluecoat.com/security-advisory/sa92
- https://bugzilla.redhat.com/show_bug.cgi?id=1202380
- https://bugzilla.redhat.com/show_bug.cgi?id=1202380
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=b717b083073b6cacc0a5e2397b661678aff7ae7f
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=b717b083073b6cacc0a5e2397b661678aff7ae7f
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- GLSA-201503-11
- GLSA-201503-11
- https://support.apple.com/HT205212
- https://support.apple.com/HT205212
- https://support.apple.com/HT205267
- https://support.apple.com/HT205267
- https://support.citrix.com/article/CTX216642
- https://support.citrix.com/article/CTX216642
- FreeBSD-SA-15:06
- FreeBSD-SA-15:06
- https://www.openssl.org/news/secadv_20150319.txt
- https://www.openssl.org/news/secadv_20150319.txt
Modified: 2024-11-21
CVE-2015-0288
The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- APPLE-SA-2015-06-30-2
- APPLE-SA-2015-06-30-2
- FEDORA-2015-4303
- FEDORA-2015-4303
- FEDORA-2015-4320
- FEDORA-2015-4320
- FEDORA-2015-4300
- FEDORA-2015-4300
- FEDORA-2015-6951
- FEDORA-2015-6951
- FEDORA-2015-6855
- FEDORA-2015-6855
- SUSE-SU-2015:0541
- SUSE-SU-2015:0541
- SUSE-SU-2015:0578
- SUSE-SU-2015:0578
- openSUSE-SU-2015:1277
- openSUSE-SU-2015:1277
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- openSUSE-SU-2015:0554
- openSUSE-SU-2015:0554
- HPSBGN03306
- HPSBGN03306
- HPSBUX03334
- HPSBUX03334
- SSRT102000
- SSRT102000
- HPSBMU03380
- HPSBMU03380
- HPSBMU03409
- HPSBMU03409
- HPSBMU03413
- HPSBMU03413
- HPSBMU03397
- HPSBMU03397
- RHSA-2015:0715
- RHSA-2015:0715
- RHSA-2015:0716
- RHSA-2015:0716
- RHSA-2015:0752
- RHSA-2015:0752
- RHSA-2015:0800
- RHSA-2015:0800
- http://support.apple.com/kb/HT204942
- http://support.apple.com/kb/HT204942
- DSA-3197
- DSA-3197
- MDVSA-2015:062
- MDVSA-2015:062
- MDVSA-2015:063
- MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 73237
- 73237
- 1031929
- 1031929
- USN-2537-1
- USN-2537-1
- https://access.redhat.com/articles/1384453
- https://access.redhat.com/articles/1384453
- https://bto.bluecoat.com/security-advisory/sa92
- https://bto.bluecoat.com/security-advisory/sa92
- https://bugzilla.redhat.com/show_bug.cgi?id=1202418
- https://bugzilla.redhat.com/show_bug.cgi?id=1202418
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=28a00bcd8e318da18031b2ac8778c64147cd54f9
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=28a00bcd8e318da18031b2ac8778c64147cd54f9
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://rt.openssl.org/Ticket/Display.html?id=3708&user=guest&pass=guest
- https://rt.openssl.org/Ticket/Display.html?id=3708&user=guest&pass=guest
- GLSA-201503-11
- GLSA-201503-11
- https://support.citrix.com/article/CTX216642
- https://support.citrix.com/article/CTX216642
- FreeBSD-SA-15:06
- FreeBSD-SA-15:06
- https://www.openssl.org/news/secadv_20150319.txt
- https://www.openssl.org/news/secadv_20150319.txt
Modified: 2024-11-21
CVE-2015-0289
The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- APPLE-SA-2015-06-30-2
- APPLE-SA-2015-06-30-2
- FEDORA-2015-4303
- FEDORA-2015-4303
- FEDORA-2015-4320
- FEDORA-2015-4320
- FEDORA-2015-4300
- FEDORA-2015-4300
- FEDORA-2015-6951
- FEDORA-2015-6951
- FEDORA-2015-6855
- FEDORA-2015-6855
- SUSE-SU-2015:0541
- SUSE-SU-2015:0541
- SUSE-SU-2015:0578
- SUSE-SU-2015:0578
- openSUSE-SU-2015:1277
- openSUSE-SU-2015:1277
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- openSUSE-SU-2015:0554
- openSUSE-SU-2015:0554
- HPSBGN03306
- HPSBGN03306
- HPSBUX03334
- HPSBUX03334
- SSRT102000
- SSRT102000
- HPSBMU03380
- HPSBMU03380
- HPSBMU03409
- HPSBMU03409
- HPSBMU03397
- HPSBMU03397
- RHSA-2015:0715
- RHSA-2015:0715
- RHSA-2015:0716
- RHSA-2015:0716
- RHSA-2015:0752
- RHSA-2015:0752
- RHSA-2015:0800
- RHSA-2015:0800
- http://support.apple.com/kb/HT204942
- http://support.apple.com/kb/HT204942
- DSA-3197
- DSA-3197
- http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015
- http://www.fortiguard.com/advisory/2015-03-24-openssl-vulnerabilities-march-2015
- MDVSA-2015:062
- MDVSA-2015:062
- MDVSA-2015:063
- MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 73231
- 73231
- 1031929
- 1031929
- USN-2537-1
- USN-2537-1
- https://access.redhat.com/articles/1384453
- https://access.redhat.com/articles/1384453
- https://bto.bluecoat.com/security-advisory/sa92
- https://bto.bluecoat.com/security-advisory/sa92
- https://bugzilla.redhat.com/show_bug.cgi?id=1202384
- https://bugzilla.redhat.com/show_bug.cgi?id=1202384
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c0334c2c92dd1bc3ad8138ba6e74006c3631b0f9
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c0334c2c92dd1bc3ad8138ba6e74006c3631b0f9
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- GLSA-201503-11
- GLSA-201503-11
- FreeBSD-SA-15:06
- FreeBSD-SA-15:06
- https://www.openssl.org/news/secadv_20150319.txt
- https://www.openssl.org/news/secadv_20150319.txt
Modified: 2024-11-21
CVE-2015-0293
The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10680
- APPLE-SA-2015-06-30-2
- APPLE-SA-2015-06-30-2
- FEDORA-2015-4303
- FEDORA-2015-4303
- FEDORA-2015-4320
- FEDORA-2015-4320
- FEDORA-2015-4300
- FEDORA-2015-4300
- FEDORA-2015-6951
- FEDORA-2015-6951
- FEDORA-2015-6855
- FEDORA-2015-6855
- SUSE-SU-2015:0541
- SUSE-SU-2015:0541
- SUSE-SU-2015:0578
- SUSE-SU-2015:0578
- SUSE-SU-2016:0617
- SUSE-SU-2016:0617
- SUSE-SU-2016:0620
- SUSE-SU-2016:0620
- SUSE-SU-2016:0621
- SUSE-SU-2016:0621
- SUSE-SU-2016:0624
- SUSE-SU-2016:0624
- openSUSE-SU-2016:0628
- openSUSE-SU-2016:0628
- SUSE-SU-2016:0631
- SUSE-SU-2016:0631
- openSUSE-SU-2016:0637
- openSUSE-SU-2016:0637
- openSUSE-SU-2016:0638
- openSUSE-SU-2016:0638
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- SUSE-SU-2016:0641
- SUSE-SU-2016:0641
- openSUSE-SU-2016:0720
- openSUSE-SU-2016:0720
- SUSE-SU-2016:1057
- SUSE-SU-2016:1057
- openSUSE-SU-2015:0554
- openSUSE-SU-2015:0554
- HPSBUX03334
- HPSBUX03334
- SSRT102000
- SSRT102000
- HPSBMU03380
- HPSBMU03380
- HPSBMU03409
- HPSBMU03409
- HPSBMU03397
- HPSBMU03397
- RHSA-2015:0715
- RHSA-2015:0715
- RHSA-2015:0716
- RHSA-2015:0716
- RHSA-2015:0752
- RHSA-2015:0752
- RHSA-2015:0800
- RHSA-2015:0800
- http://support.apple.com/kb/HT204942
- http://support.apple.com/kb/HT204942
- MDVSA-2015:062
- MDVSA-2015:062
- MDVSA-2015:063
- MDVSA-2015:063
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 73232
- 73232
- 1031929
- 1031929
- USN-2537-1
- USN-2537-1
- https://access.redhat.com/articles/1384453
- https://access.redhat.com/articles/1384453
- https://bto.bluecoat.com/security-advisory/sa92
- https://bto.bluecoat.com/security-advisory/sa92
- https://bugzilla.redhat.com/show_bug.cgi?id=1202404
- https://bugzilla.redhat.com/show_bug.cgi?id=1202404
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=86f8fb0e344d62454f8daf3e15236b2b59210756
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=86f8fb0e344d62454f8daf3e15236b2b59210756
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- https://kc.mcafee.com/corporate/index?page=content&id=SB10110
- GLSA-201503-11
- GLSA-201503-11
- https://support.citrix.com/article/CTX216642
- https://support.citrix.com/article/CTX216642
- FreeBSD-SA-15:06
- FreeBSD-SA-15:06
- https://www.openssl.org/news/secadv_20150319.txt
- https://www.openssl.org/news/secadv_20150319.txt
Modified: 2024-11-21
CVE-2015-1788
The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.
- http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery
- http://fortiguard.com/advisory/2015-07-09-cve-2015-1793-openssl-alternative-chains-certificate-forgery
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- NetBSD-SA2015-008
- NetBSD-SA2015-008
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- APPLE-SA-2015-08-13-2
- APPLE-SA-2015-08-13-2
- openSUSE-SU-2015:1139
- openSUSE-SU-2015:1139
- SUSE-SU-2015:1143
- SUSE-SU-2015:1143
- SUSE-SU-2015:1150
- SUSE-SU-2015:1150
- SUSE-SU-2015:1181
- SUSE-SU-2015:1181
- SUSE-SU-2015:1182
- SUSE-SU-2015:1182
- SUSE-SU-2015:1184
- SUSE-SU-2015:1184
- SUSE-SU-2015:1185
- SUSE-SU-2015:1185
- openSUSE-SU-2015:1277
- openSUSE-SU-2015:1277
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- HPSBUX03388
- HPSBUX03388
- SSRT102180
- SSRT102180
- HPSBMU03409
- HPSBMU03409
- 20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products
- 20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products
- DSA-3287
- DSA-3287
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 75158
- 75158
- 91787
- 91787
- 1032564
- 1032564
- USN-2639-1
- USN-2639-1
- http://www-304.ibm.com/support/docview.wss?uid=swg21960041
- http://www-304.ibm.com/support/docview.wss?uid=swg21960041
- https://bto.bluecoat.com/security-advisory/sa98
- https://bto.bluecoat.com/security-advisory/sa98
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openssl/openssl/commit/4924b37ee01f71ae19c94a8934b80eeb2f677932
- https://github.com/openssl/openssl/commit/4924b37ee01f71ae19c94a8934b80eeb2f677932
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://openssl.org/news/secadv/20150611.txt
- https://openssl.org/news/secadv/20150611.txt
- GLSA-201506-02
- GLSA-201506-02
- https://support.apple.com/kb/HT205031
- https://support.apple.com/kb/HT205031
- https://support.citrix.com/article/CTX216642
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150611.txt
- https://www.openssl.org/news/secadv_20150611.txt
Modified: 2024-11-21
CVE-2015-1789
The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- NetBSD-SA2015-008
- NetBSD-SA2015-008
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733
- APPLE-SA-2015-08-13-2
- APPLE-SA-2015-08-13-2
- FEDORA-2015-10047
- FEDORA-2015-10047
- FEDORA-2015-10108
- FEDORA-2015-10108
- openSUSE-SU-2015:1139
- openSUSE-SU-2015:1139
- SUSE-SU-2015:1143
- SUSE-SU-2015:1143
- SUSE-SU-2015:1150
- SUSE-SU-2015:1150
- SUSE-SU-2015:1181
- SUSE-SU-2015:1181
- SUSE-SU-2015:1182
- SUSE-SU-2015:1182
- SUSE-SU-2015:1183
- SUSE-SU-2015:1183
- SUSE-SU-2015:1184
- SUSE-SU-2015:1184
- SUSE-SU-2015:1185
- SUSE-SU-2015:1185
- openSUSE-SU-2015:1277
- openSUSE-SU-2015:1277
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- HPSBGN03371
- HPSBGN03371
- HPSBUX03388
- HPSBUX03388
- SSRT102180
- SSRT102180
- HPSBMU03409
- HPSBMU03409
- RHSA-2015:1115
- RHSA-2015:1115
- RHSA-2015:1197
- RHSA-2015:1197
- 20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products
- 20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products
- DSA-3287
- DSA-3287
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 75156
- 75156
- 91787
- 91787
- 1032564
- 1032564
- USN-2639-1
- USN-2639-1
- https://bto.bluecoat.com/security-advisory/sa98
- https://bto.bluecoat.com/security-advisory/sa98
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11
- https://github.com/openssl/openssl/commit/f48b83b4fb7d6689584cf25f61ca63a4891f5b11
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://openssl.org/news/secadv/20150611.txt
- https://openssl.org/news/secadv/20150611.txt
- GLSA-201506-02
- GLSA-201506-02
- https://support.apple.com/kb/HT205031
- https://support.apple.com/kb/HT205031
- https://support.citrix.com/article/CTX216642
- https://support.citrix.com/article/CTX216642
- https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11
- https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11
- https://www.openssl.org/news/secadv_20150611.txt
- https://www.openssl.org/news/secadv_20150611.txt
Modified: 2024-11-21
CVE-2015-1790
The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- NetBSD-SA2015-008
- NetBSD-SA2015-008
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733
- APPLE-SA-2015-08-13-2
- APPLE-SA-2015-08-13-2
- FEDORA-2015-10047
- FEDORA-2015-10047
- FEDORA-2015-10108
- FEDORA-2015-10108
- openSUSE-SU-2015:1139
- openSUSE-SU-2015:1139
- SUSE-SU-2015:1143
- SUSE-SU-2015:1143
- SUSE-SU-2015:1150
- SUSE-SU-2015:1150
- SUSE-SU-2015:1181
- SUSE-SU-2015:1181
- SUSE-SU-2015:1182
- SUSE-SU-2015:1182
- SUSE-SU-2015:1183
- SUSE-SU-2015:1183
- SUSE-SU-2015:1184
- SUSE-SU-2015:1184
- SUSE-SU-2015:1185
- SUSE-SU-2015:1185
- openSUSE-SU-2015:1277
- openSUSE-SU-2015:1277
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- HPSBGN03371
- HPSBGN03371
- HPSBUX03388
- HPSBUX03388
- SSRT102180
- SSRT102180
- HPSBMU03409
- HPSBMU03409
- RHSA-2015:1115
- RHSA-2015:1115
- RHSA-2015:1197
- RHSA-2015:1197
- 20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products
- 20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products
- DSA-3287
- DSA-3287
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 75157
- 75157
- 91787
- 91787
- 1032564
- 1032564
- USN-2639-1
- USN-2639-1
- https://bto.bluecoat.com/security-advisory/sa98
- https://bto.bluecoat.com/security-advisory/sa98
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openssl/openssl/commit/59302b600e8d5b77ef144e447bb046fd7ab72686
- https://github.com/openssl/openssl/commit/59302b600e8d5b77ef144e447bb046fd7ab72686
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://openssl.org/news/secadv/20150611.txt
- https://openssl.org/news/secadv/20150611.txt
- GLSA-201506-02
- GLSA-201506-02
- https://support.apple.com/kb/HT205031
- https://support.apple.com/kb/HT205031
- https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11
- https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11
- https://www.openssl.org/news/secadv_20150611.txt
- https://www.openssl.org/news/secadv_20150611.txt
Modified: 2024-11-21
CVE-2015-1791
Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- NetBSD-SA2015-008
- NetBSD-SA2015-008
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733
- APPLE-SA-2015-08-13-2
- APPLE-SA-2015-08-13-2
- FEDORA-2015-10047
- FEDORA-2015-10047
- FEDORA-2015-10108
- FEDORA-2015-10108
- openSUSE-SU-2015:1139
- openSUSE-SU-2015:1139
- SUSE-SU-2015:1143
- SUSE-SU-2015:1143
- SUSE-SU-2015:1150
- SUSE-SU-2015:1150
- SUSE-SU-2015:1182
- SUSE-SU-2015:1182
- SUSE-SU-2015:1184
- SUSE-SU-2015:1184
- SUSE-SU-2015:1185
- SUSE-SU-2015:1185
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- HPSBUX03388
- HPSBUX03388
- SSRT102180
- SSRT102180
- HPSBMU03409
- HPSBMU03409
- RHSA-2015:1115
- RHSA-2015:1115
- 20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products
- 20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products
- DSA-3287
- DSA-3287
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 75161
- 75161
- 91787
- 91787
- 1032479
- 1032479
- USN-2639-1
- USN-2639-1
- http://www-304.ibm.com/support/docview.wss?uid=swg21960041
- http://www-304.ibm.com/support/docview.wss?uid=swg21960041
- https://bto.bluecoat.com/security-advisory/sa98
- https://bto.bluecoat.com/security-advisory/sa98
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openssl/openssl/commit/98ece4eebfb6cd45cc8d550c6ac0022965071afc
- https://github.com/openssl/openssl/commit/98ece4eebfb6cd45cc8d550c6ac0022965071afc
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://openssl.org/news/secadv/20150611.txt
- https://openssl.org/news/secadv/20150611.txt
- GLSA-201506-02
- GLSA-201506-02
- https://support.apple.com/kb/HT205031
- https://support.apple.com/kb/HT205031
- https://support.citrix.com/article/CTX216642
- https://support.citrix.com/article/CTX216642
- https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11
- https://www.arista.com/en/support/advisories-notices/security-advisories/1144-security-advisory-11
- https://www.openssl.org/news/secadv_20150611.txt
- https://www.openssl.org/news/secadv_20150611.txt
Modified: 2024-11-21
CVE-2015-1792
The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- NetBSD-SA2015-008
- NetBSD-SA2015-008
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10694
- APPLE-SA-2015-08-13-2
- APPLE-SA-2015-08-13-2
- FEDORA-2015-10047
- FEDORA-2015-10047
- FEDORA-2015-10108
- FEDORA-2015-10108
- openSUSE-SU-2015:1139
- openSUSE-SU-2015:1139
- SUSE-SU-2015:1143
- SUSE-SU-2015:1143
- SUSE-SU-2015:1150
- SUSE-SU-2015:1150
- SUSE-SU-2015:1182
- SUSE-SU-2015:1182
- SUSE-SU-2015:1184
- SUSE-SU-2015:1184
- SUSE-SU-2015:1185
- SUSE-SU-2015:1185
- openSUSE-SU-2015:1277
- openSUSE-SU-2015:1277
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- HPSBGN03371
- HPSBGN03371
- HPSBUX03388
- HPSBUX03388
- SSRT102180
- SSRT102180
- HPSBMU03409
- HPSBMU03409
- RHSA-2015:1115
- RHSA-2015:1115
- 20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products
- 20150612 Multiple Vulnerabilities in OpenSSL (June 2015) Affecting Cisco Products
- DSA-3287
- DSA-3287
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/2015-06-11-fortinet-vulnerability-openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.fortiguard.com/advisory/openssl-vulnerabilities-june-2015
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 75154
- 75154
- 91787
- 91787
- 1032564
- 1032564
- USN-2639-1
- USN-2639-1
- https://bto.bluecoat.com/security-advisory/sa98
- https://bto.bluecoat.com/security-advisory/sa98
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://github.com/openssl/openssl/commit/cd30f03ac5bf2962f44bd02ae8d88245dff2f12c
- https://github.com/openssl/openssl/commit/cd30f03ac5bf2962f44bd02ae8d88245dff2f12c
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05045763
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131044
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05184351
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05353965
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://kc.mcafee.com/corporate/index?page=content&id=SB10122
- https://openssl.org/news/secadv/20150611.txt
- https://openssl.org/news/secadv/20150611.txt
- GLSA-201506-02
- GLSA-201506-02
- https://support.apple.com/kb/HT205031
- https://support.apple.com/kb/HT205031
- https://support.citrix.com/article/CTX216642
- https://support.citrix.com/article/CTX216642
- https://www.openssl.org/news/secadv_20150611.txt
- https://www.openssl.org/news/secadv_20150611.txt
Modified: 2024-11-21
CVE-2015-3195
The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.
- http://fortiguard.com/advisory/openssl-advisory-december-2015
- http://fortiguard.com/advisory/openssl-advisory-december-2015
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10733
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- APPLE-SA-2016-03-21-5
- APPLE-SA-2016-03-21-5
- FEDORA-2015-d87d60b9a9
- FEDORA-2015-d87d60b9a9
- openSUSE-SU-2016:0637
- openSUSE-SU-2016:0637
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- SUSE-SU-2016:0678
- SUSE-SU-2016:0678
- openSUSE-SU-2015:2288
- openSUSE-SU-2015:2288
- openSUSE-SU-2015:2289
- openSUSE-SU-2015:2289
- openSUSE-SU-2015:2318
- openSUSE-SU-2015:2318
- openSUSE-SU-2015:2349
- openSUSE-SU-2015:2349
- HPSBGN03536
- HPSBGN03536
- http://openssl.org/news/secadv/20151203.txt
- http://openssl.org/news/secadv/20151203.txt
- RHSA-2015:2616
- RHSA-2015:2616
- RHSA-2015:2617
- RHSA-2015:2617
- RHSA-2016:2056
- RHSA-2016:2056
- RHSA-2016:2957
- RHSA-2016:2957
- 20151204 Multiple Vulnerabilities in OpenSSL (December 2015) Affecting Cisco Products
- 20151204 Multiple Vulnerabilities in OpenSSL (December 2015) Affecting Cisco Products
- DSA-3413
- DSA-3413
- http://www.fortiguard.com/advisory/openssl-advisory-december-2015
- http://www.fortiguard.com/advisory/openssl-advisory-december-2015
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 78626
- 78626
- 91787
- 91787
- 1034294
- 1034294
- SSA:2015-349-04
- SSA:2015-349-04
- USN-2830-1
- USN-2830-1
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=cc598f321fbac9c04da5766243ed55d55948637d
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=cc598f321fbac9c04da5766243ed55d55948637d
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944173
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05131085
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05398322
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40100
- https://support.apple.com/HT206167
- https://support.apple.com/HT206167
Closed bugs
hostname обрезается до 7 символов.