ALT-BU-2016-2745-1
Branch p8 update bulletin.
Closed vulnerabilities
BDU:2016-01176
Уязвимость библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2020-02960
Уязвимость функции EVP_EncodeUpdate (crypto/evp/encode.c) библиотеки OpenSSL, связанная с ошибкой при обработке числа, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02961
Уязвимость функции EVP_EncodeUpdate (crypto/evp/evp_enc.c) библиотеки OpenSSL, связанная с ошибкой при обработке числа, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02962
Уязвимость функции проверки заполнения реализации AES-NI библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
BDU:2020-02963
Уязвимость функции asn1_d2i_read_bio (crypto/asn1/a_d2i_fp.c) библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-2105
Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- APPLE-SA-2016-07-18-1
- APPLE-SA-2016-07-18-1
- FEDORA-2016-05c567df1a
- FEDORA-2016-05c567df1a
- FEDORA-2016-1411324654
- FEDORA-2016-1411324654
- FEDORA-2016-1e39d934ed
- FEDORA-2016-1e39d934ed
- SUSE-SU-2016:1206
- SUSE-SU-2016:1206
- SUSE-SU-2016:1228
- SUSE-SU-2016:1228
- SUSE-SU-2016:1231
- SUSE-SU-2016:1231
- SUSE-SU-2016:1233
- SUSE-SU-2016:1233
- openSUSE-SU-2016:1237
- openSUSE-SU-2016:1237
- openSUSE-SU-2016:1238
- openSUSE-SU-2016:1238
- openSUSE-SU-2016:1239
- openSUSE-SU-2016:1239
- openSUSE-SU-2016:1240
- openSUSE-SU-2016:1240
- openSUSE-SU-2016:1241
- openSUSE-SU-2016:1241
- openSUSE-SU-2016:1242
- openSUSE-SU-2016:1242
- openSUSE-SU-2016:1243
- openSUSE-SU-2016:1243
- SUSE-SU-2016:1267
- SUSE-SU-2016:1267
- openSUSE-SU-2016:1273
- openSUSE-SU-2016:1273
- SUSE-SU-2016:1290
- SUSE-SU-2016:1290
- SUSE-SU-2016:1360
- SUSE-SU-2016:1360
- openSUSE-SU-2016:1566
- openSUSE-SU-2016:1566
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- RHSA-2016:0722
- RHSA-2016:0722
- RHSA-2016:0996
- RHSA-2016:0996
- RHSA-2016:1648
- RHSA-2016:1648
- RHSA-2016:1649
- RHSA-2016:1649
- RHSA-2016:1650
- RHSA-2016:1650
- RHSA-2016:2056
- RHSA-2016:2056
- RHSA-2016:2073
- RHSA-2016:2073
- RHSA-2016:2957
- RHSA-2016:2957
- 20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016
- 20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016
- DSA-3566
- DSA-3566
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 89757
- 89757
- 91787
- 91787
- 1035721
- 1035721
- SSA:2016-124-01
- SSA:2016-124-01
- USN-2959-1
- USN-2959-1
- https://bto.bluecoat.com/security-advisory/sa123
- https://bto.bluecoat.com/security-advisory/sa123
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=5b814481f3573fa9677f3a31ee51322e2a22ee6a
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=5b814481f3573fa9677f3a31ee51322e2a22ee6a
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://kc.mcafee.com/corporate/index?page=content&id=SB10160
- https://kc.mcafee.com/corporate/index?page=content&id=SB10160
- GLSA-201612-16
- GLSA-201612-16
- https://security.netapp.com/advisory/ntap-20160504-0001/
- https://security.netapp.com/advisory/ntap-20160504-0001/
- https://source.android.com/security/bulletin/pixel/2017-11-01
- https://source.android.com/security/bulletin/pixel/2017-11-01
- https://support.apple.com/HT206903
- https://support.apple.com/HT206903
- FreeBSD-SA-16:17
- FreeBSD-SA-16:17
- https://www.openssl.org/news/secadv/20160503.txt
- https://www.openssl.org/news/secadv/20160503.txt
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
Modified: 2024-11-21
CVE-2016-2106
Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- APPLE-SA-2016-07-18-1
- APPLE-SA-2016-07-18-1
- FEDORA-2016-05c567df1a
- FEDORA-2016-05c567df1a
- FEDORA-2016-1411324654
- FEDORA-2016-1411324654
- FEDORA-2016-1e39d934ed
- FEDORA-2016-1e39d934ed
- SUSE-SU-2016:1206
- SUSE-SU-2016:1206
- SUSE-SU-2016:1228
- SUSE-SU-2016:1228
- SUSE-SU-2016:1231
- SUSE-SU-2016:1231
- SUSE-SU-2016:1233
- SUSE-SU-2016:1233
- openSUSE-SU-2016:1237
- openSUSE-SU-2016:1237
- openSUSE-SU-2016:1238
- openSUSE-SU-2016:1238
- openSUSE-SU-2016:1239
- openSUSE-SU-2016:1239
- openSUSE-SU-2016:1240
- openSUSE-SU-2016:1240
- openSUSE-SU-2016:1241
- openSUSE-SU-2016:1241
- openSUSE-SU-2016:1242
- openSUSE-SU-2016:1242
- openSUSE-SU-2016:1243
- openSUSE-SU-2016:1243
- SUSE-SU-2016:1267
- SUSE-SU-2016:1267
- openSUSE-SU-2016:1273
- openSUSE-SU-2016:1273
- SUSE-SU-2016:1290
- SUSE-SU-2016:1290
- SUSE-SU-2016:1360
- SUSE-SU-2016:1360
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- RHSA-2016:0722
- RHSA-2016:0722
- RHSA-2016:0996
- RHSA-2016:0996
- RHSA-2016:1648
- RHSA-2016:1648
- RHSA-2016:1649
- RHSA-2016:1649
- RHSA-2016:1650
- RHSA-2016:1650
- RHSA-2016:2056
- RHSA-2016:2056
- RHSA-2016:2073
- RHSA-2016:2073
- RHSA-2016:2957
- RHSA-2016:2957
- 20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016
- 20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016
- DSA-3566
- DSA-3566
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 89744
- 89744
- 91787
- 91787
- 1035721
- 1035721
- SSA:2016-124-01
- SSA:2016-124-01
- USN-2959-1
- USN-2959-1
- https://bto.bluecoat.com/security-advisory/sa123
- https://bto.bluecoat.com/security-advisory/sa123
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=3f3582139fbb259a1c3cbb0a25236500a409bf26
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=3f3582139fbb259a1c3cbb0a25236500a409bf26
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
- https://kc.mcafee.com/corporate/index?page=content&id=SB10160
- https://kc.mcafee.com/corporate/index?page=content&id=SB10160
- GLSA-201612-16
- GLSA-201612-16
- https://security.netapp.com/advisory/ntap-20160504-0001/
- https://security.netapp.com/advisory/ntap-20160504-0001/
- https://source.android.com/security/bulletin/pixel/2017-11-01
- https://source.android.com/security/bulletin/pixel/2017-11-01
- https://support.apple.com/HT206903
- https://support.apple.com/HT206903
- FreeBSD-SA-16:17
- FreeBSD-SA-16:17
- https://www.openssl.org/news/secadv/20160503.txt
- https://www.openssl.org/news/secadv/20160503.txt
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
Modified: 2024-11-21
CVE-2016-2107
The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- APPLE-SA-2016-07-18-1
- APPLE-SA-2016-07-18-1
- FEDORA-2016-05c567df1a
- FEDORA-2016-05c567df1a
- FEDORA-2016-1411324654
- FEDORA-2016-1411324654
- FEDORA-2016-1e39d934ed
- FEDORA-2016-1e39d934ed
- SUSE-SU-2016:1206
- SUSE-SU-2016:1206
- SUSE-SU-2016:1228
- SUSE-SU-2016:1228
- SUSE-SU-2016:1233
- SUSE-SU-2016:1233
- openSUSE-SU-2016:1237
- openSUSE-SU-2016:1237
- openSUSE-SU-2016:1238
- openSUSE-SU-2016:1238
- openSUSE-SU-2016:1240
- openSUSE-SU-2016:1240
- openSUSE-SU-2016:1243
- openSUSE-SU-2016:1243
- openSUSE-SU-2016:1566
- openSUSE-SU-2016:1566
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- RHSA-2016:0722
- RHSA-2016:0722
- RHSA-2016:0996
- RHSA-2016:0996
- RHSA-2016:2073
- RHSA-2016:2073
- RHSA-2016:2957
- RHSA-2016:2957
- http://source.android.com/security/bulletin/2016-07-01.html
- http://source.android.com/security/bulletin/2016-07-01.html
- http://support.citrix.com/article/CTX212736
- http://support.citrix.com/article/CTX212736
- 20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016
- 20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016
- http://web-in-security.blogspot.ca/2016/05/curious-padding-oracle-in-openssl-cve.html
- http://web-in-security.blogspot.ca/2016/05/curious-padding-oracle-in-openssl-cve.html
- DSA-3566
- DSA-3566
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 89760
- 89760
- 91787
- 91787
- 1035721
- 1035721
- SSA:2016-124-01
- SSA:2016-124-01
- USN-2959-1
- USN-2959-1
- https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/
- https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/
- https://bto.bluecoat.com/security-advisory/sa123
- https://bto.bluecoat.com/security-advisory/sa123
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=68595c0c2886e7942a14f98c17a55a88afb6c292
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=68595c0c2886e7942a14f98c17a55a88afb6c292
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
- https://kc.mcafee.com/corporate/index?page=content&id=SB10160
- https://kc.mcafee.com/corporate/index?page=content&id=SB10160
- GLSA-201612-16
- GLSA-201612-16
- https://security.netapp.com/advisory/ntap-20160504-0001/
- https://security.netapp.com/advisory/ntap-20160504-0001/
- https://support.apple.com/HT206903
- https://support.apple.com/HT206903
- 39768
- 39768
- FreeBSD-SA-16:17
- FreeBSD-SA-16:17
- https://www.openssl.org/news/secadv/20160503.txt
- https://www.openssl.org/news/secadv/20160503.txt
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
Modified: 2024-11-21
CVE-2016-2108
The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- APPLE-SA-2016-07-18-1
- APPLE-SA-2016-07-18-1
- FEDORA-2016-05c567df1a
- FEDORA-2016-05c567df1a
- FEDORA-2016-1411324654
- FEDORA-2016-1411324654
- FEDORA-2016-1e39d934ed
- FEDORA-2016-1e39d934ed
- SUSE-SU-2016:1206
- SUSE-SU-2016:1206
- SUSE-SU-2016:1228
- SUSE-SU-2016:1228
- SUSE-SU-2016:1231
- SUSE-SU-2016:1231
- SUSE-SU-2016:1233
- SUSE-SU-2016:1233
- openSUSE-SU-2016:1237
- openSUSE-SU-2016:1237
- openSUSE-SU-2016:1238
- openSUSE-SU-2016:1238
- openSUSE-SU-2016:1239
- openSUSE-SU-2016:1239
- openSUSE-SU-2016:1240
- openSUSE-SU-2016:1240
- openSUSE-SU-2016:1241
- openSUSE-SU-2016:1241
- openSUSE-SU-2016:1242
- openSUSE-SU-2016:1242
- openSUSE-SU-2016:1243
- openSUSE-SU-2016:1243
- SUSE-SU-2016:1267
- SUSE-SU-2016:1267
- openSUSE-SU-2016:1273
- openSUSE-SU-2016:1273
- SUSE-SU-2016:1290
- SUSE-SU-2016:1290
- SUSE-SU-2016:1360
- SUSE-SU-2016:1360
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- RHSA-2016:0722
- RHSA-2016:0722
- RHSA-2016:0996
- RHSA-2016:0996
- RHSA-2016:2056
- RHSA-2016:2056
- RHSA-2016:2073
- RHSA-2016:2073
- RHSA-2016:2957
- RHSA-2016:2957
- http://source.android.com/security/bulletin/2016-07-01.html
- http://source.android.com/security/bulletin/2016-07-01.html
- http://support.citrix.com/article/CTX212736
- http://support.citrix.com/article/CTX212736
- 20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016
- 20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016
- DSA-3566
- DSA-3566
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 89752
- 89752
- 91787
- 91787
- 1035721
- 1035721
- SSA:2016-124-01
- SSA:2016-124-01
- USN-2959-1
- USN-2959-1
- RHSA-2016:1137
- RHSA-2016:1137
- RHSA-2017:0193
- RHSA-2017:0193
- RHSA-2017:0194
- RHSA-2017:0194
- https://bto.bluecoat.com/security-advisory/sa123
- https://bto.bluecoat.com/security-advisory/sa123
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=3661bb4e7934668bd99ca777ea8b30eedfafa871
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=3661bb4e7934668bd99ca777ea8b30eedfafa871
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=f5da52e308a6aeea6d5f3df98c4da295d7e9cc27
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03726en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05149345
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164862
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05386804
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
- GLSA-201612-16
- GLSA-201612-16
- https://security.netapp.com/advisory/ntap-20160504-0001/
- https://security.netapp.com/advisory/ntap-20160504-0001/
- https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067&languageid=en-fr
- https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00067&languageid=en-fr
- https://support.apple.com/HT206903
- https://support.apple.com/HT206903
- https://www.openssl.org/news/secadv/20160503.txt
- https://www.openssl.org/news/secadv/20160503.txt
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
Modified: 2024-11-21
CVE-2016-2109
The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- APPLE-SA-2016-07-18-1
- APPLE-SA-2016-07-18-1
- SUSE-SU-2016:1206
- SUSE-SU-2016:1206
- SUSE-SU-2016:1228
- SUSE-SU-2016:1228
- SUSE-SU-2016:1231
- SUSE-SU-2016:1231
- SUSE-SU-2016:1233
- SUSE-SU-2016:1233
- openSUSE-SU-2016:1237
- openSUSE-SU-2016:1237
- openSUSE-SU-2016:1238
- openSUSE-SU-2016:1238
- openSUSE-SU-2016:1239
- openSUSE-SU-2016:1239
- openSUSE-SU-2016:1240
- openSUSE-SU-2016:1240
- openSUSE-SU-2016:1241
- openSUSE-SU-2016:1241
- openSUSE-SU-2016:1242
- openSUSE-SU-2016:1242
- openSUSE-SU-2016:1243
- openSUSE-SU-2016:1243
- SUSE-SU-2016:1267
- SUSE-SU-2016:1267
- openSUSE-SU-2016:1273
- openSUSE-SU-2016:1273
- SUSE-SU-2016:1290
- SUSE-SU-2016:1290
- SUSE-SU-2016:1360
- SUSE-SU-2016:1360
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- http://packetstormsecurity.com/files/136912/Slackware-Security-Advisory-openssl-Updates.html
- RHSA-2016:0722
- RHSA-2016:0722
- RHSA-2016:0996
- RHSA-2016:0996
- RHSA-2016:2056
- RHSA-2016:2056
- RHSA-2016:2073
- RHSA-2016:2073
- RHSA-2016:2957
- RHSA-2016:2957
- 20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016
- 20160504 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: May 2016
- DSA-3566
- DSA-3566
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 87940
- 87940
- 91787
- 91787
- 1035721
- 1035721
- SSA:2016-124-01
- SSA:2016-124-01
- USN-2959-1
- USN-2959-1
- https://bto.bluecoat.com/security-advisory/sa123
- https://bto.bluecoat.com/security-advisory/sa123
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c62981390d6cf9e3d612c489b8b77c2913b25807
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c62981390d6cf9e3d612c489b8b77c2913b25807
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03756en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03765en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40202
- https://kc.mcafee.com/corporate/index?page=content&id=SB10160
- https://kc.mcafee.com/corporate/index?page=content&id=SB10160
- GLSA-201612-16
- GLSA-201612-16
- https://security.netapp.com/advisory/ntap-20160504-0001/
- https://security.netapp.com/advisory/ntap-20160504-0001/
- https://source.android.com/security/bulletin/2017-07-01
- https://source.android.com/security/bulletin/2017-07-01
- https://support.apple.com/HT206903
- https://support.apple.com/HT206903
- FreeBSD-SA-16:17
- FreeBSD-SA-16:17
- https://www.openssl.org/news/secadv/20160503.txt
- https://www.openssl.org/news/secadv/20160503.txt
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-3947
Heap-based buffer overflow in the Icmp6::Recv function in icmp/Icmp6.cc in the pinger utility in Squid before 3.5.16 and 4.x before 4.0.8 allows remote servers to cause a denial of service (performance degradation or transition failures) or write sensitive information to log files via an ICMPv6 packet.
- SUSE-SU-2016:1996
- SUSE-SU-2016:1996
- SUSE-SU-2016:2089
- SUSE-SU-2016:2089
- openSUSE-SU-2016:2081
- openSUSE-SU-2016:2081
- 1035457
- 1035457
- http://www.squid-cache.org/Advisories/SQUID-2016_3.txt
- http://www.squid-cache.org/Advisories/SQUID-2016_3.txt
- http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10495.patch
- http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10495.patch
- http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11839.patch
- http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11839.patch
- http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12694.patch
- http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12694.patch
- http://www.squid-cache.org/Versions/v3/3.4/changesets/squid-3.4-13232.patch
- http://www.squid-cache.org/Versions/v3/3.4/changesets/squid-3.4-13232.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14015.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14015.patch
- USN-2995-1
- USN-2995-1
- GLSA-201607-01
- GLSA-201607-01
Modified: 2024-11-21
CVE-2016-3948
Squid 3.x before 3.5.16 and 4.x before 4.0.8 improperly perform bounds checking, which allows remote attackers to cause a denial of service via a crafted HTTP response, related to Vary headers.
- SUSE-SU-2016:1996
- SUSE-SU-2016:1996
- SUSE-SU-2016:2089
- SUSE-SU-2016:2089
- openSUSE-SU-2016:2081
- openSUSE-SU-2016:2081
- RHSA-2016:2600
- RHSA-2016:2600
- 1035458
- 1035458
- http://www.squid-cache.org/Advisories/SQUID-2016_4.txt
- http://www.squid-cache.org/Advisories/SQUID-2016_4.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14016.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14016.patch
- GLSA-201607-01
- GLSA-201607-01
- USN-3557-1
- USN-3557-1
Modified: 2024-11-21
CVE-2016-4051
Buffer overflow in cachemgr.cgi in Squid 2.x, 3.x before 3.5.17, and 4.x before 4.0.9 might allow remote attackers to cause a denial of service or execute arbitrary code by seeding manager reports with crafted data.
- SUSE-SU-2016:1996
- SUSE-SU-2016:1996
- SUSE-SU-2016:2089
- SUSE-SU-2016:2089
- openSUSE-SU-2016:2081
- openSUSE-SU-2016:2081
- DSA-3625
- DSA-3625
- [oss-security] 20160421 CVE Request: Squid HTTP Caching Proxy multiple issues
- [oss-security] 20160421 CVE Request: Squid HTTP Caching Proxy multiple issues
- [oss-security] 20160420 Re: CVE Request: Squid HTTP Caching Proxy multiple issues
- [oss-security] 20160420 Re: CVE Request: Squid HTTP Caching Proxy multiple issues
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 86788
- 86788
- 91787
- 91787
- 1035646
- 1035646
- http://www.squid-cache.org/Advisories/SQUID-2016_5.txt
- http://www.squid-cache.org/Advisories/SQUID-2016_5.txt
- USN-2995-1
- USN-2995-1
- RHSA-2016:1138
- RHSA-2016:1138
- RHSA-2016:1139
- RHSA-2016:1139
- RHSA-2016:1140
- RHSA-2016:1140
- GLSA-201607-01
- GLSA-201607-01
Modified: 2024-11-21
CVE-2016-4052
Multiple stack-based buffer overflows in Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote HTTP servers to cause a denial of service or execute arbitrary code via crafted Edge Side Includes (ESI) responses.
- SUSE-SU-2016:1996
- SUSE-SU-2016:1996
- SUSE-SU-2016:2089
- SUSE-SU-2016:2089
- openSUSE-SU-2016:2081
- openSUSE-SU-2016:2081
- DSA-3625
- DSA-3625
- [oss-security] 20160421 CVE Request: Squid HTTP Caching Proxy multiple issues
- [oss-security] 20160421 CVE Request: Squid HTTP Caching Proxy multiple issues
- [oss-security] 20160420 Re: CVE Request: Squid HTTP Caching Proxy multiple issues
- [oss-security] 20160420 Re: CVE Request: Squid HTTP Caching Proxy multiple issues
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 86788
- 86788
- 91787
- 91787
- 1035647
- 1035647
- http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
- http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
- USN-2995-1
- USN-2995-1
- RHSA-2016:1138
- RHSA-2016:1138
- RHSA-2016:1139
- RHSA-2016:1139
- RHSA-2016:1140
- RHSA-2016:1140
- GLSA-201607-01
- GLSA-201607-01
Modified: 2024-11-21
CVE-2016-4053
Squid 3.x before 3.5.17 and 4.x before 4.0.9 allow remote attackers to obtain sensitive stack layout information via crafted Edge Side Includes (ESI) responses, related to incorrect use of assert and compiler optimization.
- SUSE-SU-2016:1996
- SUSE-SU-2016:1996
- SUSE-SU-2016:2089
- SUSE-SU-2016:2089
- openSUSE-SU-2016:2081
- openSUSE-SU-2016:2081
- DSA-3625
- DSA-3625
- [oss-security] 20160421 CVE Request: Squid HTTP Caching Proxy multiple issues
- [oss-security] 20160421 CVE Request: Squid HTTP Caching Proxy multiple issues
- [oss-security] 20160420 Re: CVE Request: Squid HTTP Caching Proxy multiple issues
- [oss-security] 20160420 Re: CVE Request: Squid HTTP Caching Proxy multiple issues
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 86788
- 86788
- 91787
- 91787
- 1035647
- 1035647
- http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
- http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
- USN-2995-1
- USN-2995-1
- RHSA-2016:1138
- RHSA-2016:1138
- RHSA-2016:1139
- RHSA-2016:1139
- RHSA-2016:1140
- RHSA-2016:1140
- GLSA-201607-01
- GLSA-201607-01
Modified: 2024-11-21
CVE-2016-4054
Buffer overflow in Squid 3.x before 3.5.17 and 4.x before 4.0.9 allows remote attackers to execute arbitrary code via crafted Edge Side Includes (ESI) responses.
- SUSE-SU-2016:1996
- SUSE-SU-2016:1996
- SUSE-SU-2016:2089
- SUSE-SU-2016:2089
- openSUSE-SU-2016:2081
- openSUSE-SU-2016:2081
- DSA-3625
- DSA-3625
- [oss-security] 20160421 CVE Request: Squid HTTP Caching Proxy multiple issues
- [oss-security] 20160421 CVE Request: Squid HTTP Caching Proxy multiple issues
- [oss-security] 20160420 Re: CVE Request: Squid HTTP Caching Proxy multiple issues
- [oss-security] 20160420 Re: CVE Request: Squid HTTP Caching Proxy multiple issues
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 86788
- 86788
- 1035647
- 1035647
- http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
- http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
- USN-2995-1
- USN-2995-1
- RHSA-2016:1138
- RHSA-2016:1138
- RHSA-2016:1139
- RHSA-2016:1139
- RHSA-2016:1140
- RHSA-2016:1140
- GLSA-201607-01
- GLSA-201607-01