ALT-PU-2016-2020-1
Package ruby-httpclient updated to version 2.8.2.4-alt1 for branch p8 in task 169907.
Closed vulnerabilities
Published: 2014-10-15
BDU:2015-00642
Уязвимость программного обеспечения OpenSSL, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
Severity: MEDIUM (4.3)
References:
Published: 2014-10-15
Modified: 2024-11-27
Modified: 2024-11-27
CVE-2014-3566
The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
Severity: LOW (3.4)
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
References:
- NetBSD-SA2014-015
- NetBSD-SA2014-015
- http://advisories.mageia.org/MGASA-2014-0416.html
- http://advisories.mageia.org/MGASA-2014-0416.html
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc
- http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc
- APPLE-SA-2014-10-16-1
- APPLE-SA-2014-10-16-1
- APPLE-SA-2014-10-16-3
- APPLE-SA-2014-10-16-3
- http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
- http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
- http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html
- http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html
- http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/
- http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/
- http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx
- http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx
- http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf
- http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf
- http://downloads.asterisk.org/pub/security/AST-2014-011.html
- http://downloads.asterisk.org/pub/security/AST-2014-011.html
- http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
- http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
- HPSBUX03281
- HPSBUX03281
- http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
- http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- APPLE-SA-2015-01-27-4
- APPLE-SA-2015-01-27-4
- APPLE-SA-2015-09-16-2
- APPLE-SA-2015-09-16-2
- FEDORA-2014-12951
- FEDORA-2014-12951
- FEDORA-2014-13069
- FEDORA-2014-13069
- FEDORA-2014-13012
- FEDORA-2014-13012
- FEDORA-2015-9110
- FEDORA-2015-9110
- FEDORA-2015-9090
- FEDORA-2015-9090
- openSUSE-SU-2014:1331
- openSUSE-SU-2014:1331
- SUSE-SU-2014:1357
- SUSE-SU-2014:1357
- SUSE-SU-2014:1361
- SUSE-SU-2014:1361
- SUSE-SU-2014:1526
- SUSE-SU-2014:1526
- SUSE-SU-2014:1549
- SUSE-SU-2014:1549
- openSUSE-SU-2015:0190
- openSUSE-SU-2015:0190
- SUSE-SU-2015:0336
- SUSE-SU-2015:0336
- SUSE-SU-2015:0344
- SUSE-SU-2015:0344
- SUSE-SU-2015:0345
- SUSE-SU-2015:0345
- SUSE-SU-2015:0376
- SUSE-SU-2015:0376
- SUSE-SU-2015:0392
- SUSE-SU-2015:0392
- SUSE-SU-2015:0503
- SUSE-SU-2015:0503
- SUSE-SU-2015:0578
- SUSE-SU-2015:0578
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- SUSE-SU-2016:1457
- SUSE-SU-2016:1457
- SUSE-SU-2016:1459
- SUSE-SU-2016:1459
- HPSBMU03152
- HPSBMU03152
- HPSBHF03156
- HPSBHF03156
- HPSBUX03162
- HPSBUX03162
- HPSBUX03162
- HPSBUX03162
- SSRT101767
- SSRT101767
- SSRT101767
- SSRT101767
- HPSBGN03191
- HPSBGN03191
- HPSBMU03184
- HPSBMU03184
- HPSBGN03164
- HPSBGN03164
- HPSBGN03192
- HPSBGN03192
- HPSBMU03183
- HPSBMU03183
- HPSBMU03214
- HPSBMU03214
- HPSBGN03201
- HPSBGN03201
- HPSBGN03203
- HPSBGN03203
- HPSBGN03202
- HPSBGN03202
- HPSBGN03209
- HPSBGN03209
- HPSBGN03205
- HPSBGN03205
- HPSBGN03222
- HPSBGN03222
- HPSBGN03208
- HPSBGN03208
- HPSBGN03208
- HPSBGN03208
- SSRT101838
- SSRT101838
- SSRT101838
- SSRT101838
- HPSBMU03221
- HPSBMU03221
- HPSBMU03221
- HPSBMU03221
- SSRT101849
- SSRT101849
- SSRT101849
- SSRT101849
- HPSBOV03227
- HPSBOV03227
- HPSBOV03227
- HPSBOV03227
- SSRT101779
- SSRT101779
- SSRT101779
- SSRT101779
- HPSBGN03233
- HPSBGN03233
- HPSBGN03233
- HPSBGN03233
- HPSBGN03233
- HPSBGN03233
- SSRT101739
- SSRT101739
- SSRT101739
- SSRT101739
- SSRT101739
- SSRT101739
- SSRT101868
- SSRT101868
- SSRT101868
- SSRT101868
- SSRT101868
- SSRT101868
- HPSBGN03237
- HPSBGN03237
- HPSBGN03237
- HPSBGN03237
- SSRT101854
- SSRT101854
- SSRT101854
- SSRT101854
- HPSBGN03253
- HPSBGN03253
- HPSBGN03253
- HPSBGN03253
- SSRT101897
- SSRT101897
- SSRT101897
- SSRT101897
- HPSBGN03254
- HPSBGN03254
- HPSBGN03254
- HPSBGN03254
- SSRT101898
- SSRT101898
- SSRT101898
- SSRT101898
- HPSBGN03252
- HPSBGN03252
- HPSBGN03252
- HPSBGN03252
- SSRT101896
- SSRT101896
- SSRT101896
- SSRT101896
- HPSBGN03251
- HPSBGN03251
- HPSBGN03251
- HPSBGN03251
- SSRT101899
- SSRT101899
- SSRT101899
- SSRT101899
- HPSBGN03255
- HPSBGN03255
- HPSBGN03255
- HPSBGN03255
- SSRT101928
- SSRT101928
- SSRT101928
- SSRT101928
- HPSBMU03260
- HPSBMU03260
- HPSBMU03260
- HPSBMU03260
- SSRT101894
- SSRT101894
- SSRT101894
- SSRT101894
- HPSBUX03273
- HPSBUX03273
- HPSBUX03273
- HPSBUX03273
- SSRT101951
- SSRT101951
- SSRT101951
- SSRT101951
- HPSBST03265
- HPSBST03265
- SSRT101968
- SSRT101968
- HPSBMU03267
- HPSBMU03267
- SSRT101922
- SSRT101922
- HPSBMU03259
- HPSBMU03259
- HPSBMU03283
- HPSBMU03283
- HPSBMU03283
- HPSBMU03283
- SSRT101916
- SSRT101916
- SSRT101916
- SSRT101916
- HPSBMU03262
- HPSBMU03262
- HPSBMU03262
- HPSBMU03262
- SSRT101921
- SSRT101921
- SSRT101921
- SSRT101921
- HPSBHF03293
- HPSBHF03293
- HPSBHF03293
- HPSBHF03293
- SSRT101846
- SSRT101846
- SSRT101846
- SSRT101846
- HPSBMU03301
- HPSBMU03301
- HPSBMU03301
- HPSBMU03301
- SSRT101998
- SSRT101998
- SSRT101998
- SSRT101998
- HPSBHF03275
- HPSBHF03275
- HPSBHF03275
- HPSBHF03275
- SSRT101790
- SSRT101790
- SSRT101790
- SSRT101790
- HPSBMU03294
- HPSBMU03294
- HPSBMU03294
- HPSBMU03294
- SSRT101795
- SSRT101795
- SSRT101795
- SSRT101795
- HPSBMU03304
- HPSBMU03304
- HPSBHF03300
- HPSBHF03300
- HPSBST03195
- HPSBST03195
- HPSBGN03305
- HPSBGN03305
- HPSBMU03241
- HPSBMU03241
- HPSBMU03241
- HPSBMU03241
- SSRT101892
- SSRT101892
- SSRT101892
- SSRT101892
- HPSBUX03194
- HPSBUX03194
- HPSBUX03194
- HPSBUX03194
- SSRT101834
- SSRT101834
- SSRT101834
- SSRT101834
- HPSBGN03332
- HPSBGN03332
- HPSBMU03263
- HPSBMU03263
- HPSBMU03261
- HPSBMU03261
- HPSBMU03223
- HPSBMU03223
- HPSBPI03107
- HPSBPI03107
- HPSBPI03360
- HPSBPI03360
- HPSBMU03234
- HPSBMU03234
- HPSBMU03416
- HPSBMU03416
- HPSBST03418
- HPSBST03418
- HPSBGN03391
- HPSBGN03391
- HPSBGN03569
- HPSBGN03569
- [openssl-dev] 20141014 Patch to mitigate CVE-2014-3566 ("POODLE")
- [openssl-dev] 20141014 Patch to mitigate CVE-2014-3566 ("POODLE")
- http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html
- http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html
- RHSA-2014:1652
- RHSA-2014:1652
- RHSA-2014:1653
- RHSA-2014:1653
- RHSA-2014:1692
- RHSA-2014:1692
- RHSA-2014:1876
- RHSA-2014:1876
- RHSA-2014:1877
- RHSA-2014:1877
- RHSA-2014:1880
- RHSA-2014:1880
- RHSA-2014:1881
- RHSA-2014:1881
- RHSA-2014:1882
- RHSA-2014:1882
- RHSA-2014:1920
- RHSA-2014:1920
- RHSA-2014:1948
- RHSA-2014:1948
- RHSA-2015:0068
- RHSA-2015:0068
- RHSA-2015:0079
- RHSA-2015:0079
- RHSA-2015:0080
- RHSA-2015:0080
- RHSA-2015:0085
- RHSA-2015:0085
- RHSA-2015:0086
- RHSA-2015:0086
- RHSA-2015:0264
- RHSA-2015:0264
- RHSA-2015:0698
- RHSA-2015:0698
- RHSA-2015:1545
- RHSA-2015:1545
- RHSA-2015:1546
- RHSA-2015:1546
- 59627
- 59627
- 60056
- 60056
- 60206
- 60206
- 60792
- 60792
- 60859
- 60859
- 61019
- 61019
- 61130
- 61130
- 61303
- 61303
- 61316
- 61316
- 61345
- 61345
- 61359
- 61359
- 61782
- 61782
- 61810
- 61810
- 61819
- 61819
- 61825
- 61825
- 61827
- 61827
- 61926
- 61926
- 61995
- 61995
- http://support.apple.com/HT204244
- http://support.apple.com/HT204244
- http://support.citrix.com/article/CTX200238
- http://support.citrix.com/article/CTX200238
- 20141014 SSL Padding Oracle On Downgraded Legacy Encryption (POODLE) Vulnerability
- 20141014 SSL Padding Oracle On Downgraded Legacy Encryption (POODLE) Vulnerability
- DSA-3053
- DSA-3053
- DSA-3144
- DSA-3144
- DSA-3147
- DSA-3147
- DSA-3253
- DSA-3253
- DSA-3489
- DSA-3489
- VU#577193
- VU#577193
- MDVSA-2014:203
- MDVSA-2014:203
- MDVSA-2015:062
- MDVSA-2015:062
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- APPLE-SA-2014-10-16-4
- APPLE-SA-2014-10-16-4
- APPLE-SA-2014-10-20-2
- APPLE-SA-2014-10-20-2
- APPLE-SA-2014-10-20-1
- APPLE-SA-2014-10-20-1
- 70574
- 70574
- 1031029
- 1031029
- 1031039
- 1031039
- 1031085
- 1031085
- 1031086
- 1031086
- 1031087
- 1031087
- 1031088
- 1031088
- 1031089
- 1031089
- 1031090
- 1031090
- 1031091
- 1031091
- 1031092
- 1031092
- 1031093
- 1031093
- 1031094
- 1031094
- 1031095
- 1031095
- 1031096
- 1031096
- 1031105
- 1031105
- 1031106
- 1031106
- 1031107
- 1031107
- 1031120
- 1031120
- 1031123
- 1031123
- 1031124
- 1031124
- 1031130
- 1031130
- 1031131
- 1031131
- 1031132
- 1031132
- USN-2486-1
- USN-2486-1
- USN-2487-1
- USN-2487-1
- TA14-290A
- TA14-290A
- http://www.vmware.com/security/advisories/VMSA-2015-0003.html
- http://www.vmware.com/security/advisories/VMSA-2015-0003.html
- http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
- http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439
- http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439
- http://www-01.ibm.com/support/docview.wss?uid=swg21686997
- http://www-01.ibm.com/support/docview.wss?uid=swg21686997
- http://www-01.ibm.com/support/docview.wss?uid=swg21687172
- http://www-01.ibm.com/support/docview.wss?uid=swg21687172
- http://www-01.ibm.com/support/docview.wss?uid=swg21687611
- http://www-01.ibm.com/support/docview.wss?uid=swg21687611
- http://www-01.ibm.com/support/docview.wss?uid=swg21688283
- http://www-01.ibm.com/support/docview.wss?uid=swg21688283
- http://www-01.ibm.com/support/docview.wss?uid=swg21692299
- http://www-01.ibm.com/support/docview.wss?uid=swg21692299
- http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm
- http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm
- https://access.redhat.com/articles/1232123
- https://access.redhat.com/articles/1232123
- https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
- https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
- https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6
- https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6
- https://bto.bluecoat.com/security-advisory/sa83
- https://bto.bluecoat.com/security-advisory/sa83
- https://bugzilla.mozilla.org/show_bug.cgi?id=1076983
- https://bugzilla.mozilla.org/show_bug.cgi?id=1076983
- https://bugzilla.redhat.com/show_bug.cgi?id=1152789
- https://bugzilla.redhat.com/show_bug.cgi?id=1152789
- https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip
- https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip
- https://github.com/mpgn/poodle-PoC
- https://github.com/mpgn/poodle-PoC
- https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
- https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
- https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
- https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
- https://kc.mcafee.com/corporate/index?page=content&id=SB10090
- https://kc.mcafee.com/corporate/index?page=content&id=SB10090
- https://kc.mcafee.com/corporate/index?page=content&id=SB10091
- https://kc.mcafee.com/corporate/index?page=content&id=SB10091
- https://kc.mcafee.com/corporate/index?page=content&id=SB10104
- https://kc.mcafee.com/corporate/index?page=content&id=SB10104
- [cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html
- [cxf-commits] 20200319 svn commit: r1058035 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html
- [cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html
- [cxf-commits] 20200116 svn commit: r1055336 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2019-12423.txt.asc security-advisories.data/CVE-2019-17573.txt.asc security-advisories.html
- [cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html
- [cxf-commits] 20201112 svn commit: r1067927 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2020-13954.txt.asc security-advisories.html
- [cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html
- [cxf-commits] 20210402 svn commit: r1073270 - in /websites/production/cxf/content: cache/main.pageCache security-advisories.data/CVE-2021-22696.txt.asc security-advisories.html
- [cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html
- [cxf-commits] 20210616 svn commit: r1075801 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2021-30468.txt.asc security-advisories.html
- [cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html
- [cxf-commits] 20200401 svn commit: r1058573 - in /websites/production/cxf/content: cache/main.pageCache index.html security-advisories.data/CVE-2020-1954.txt.asc security-advisories.html
- https://puppet.com/security/cve/poodle-sslv3-vulnerability
- https://puppet.com/security/cve/poodle-sslv3-vulnerability
- GLSA-201507-14
- GLSA-201507-14
- GLSA-201606-11
- GLSA-201606-11
- https://security.netapp.com/advisory/ntap-20141015-0001/
- https://security.netapp.com/advisory/ntap-20141015-0001/
- https://support.apple.com/HT205217
- https://support.apple.com/HT205217
- https://support.apple.com/kb/HT6527
- https://support.apple.com/kb/HT6527
- https://support.apple.com/kb/HT6529
- https://support.apple.com/kb/HT6529
- https://support.apple.com/kb/HT6531
- https://support.apple.com/kb/HT6531
- https://support.apple.com/kb/HT6535
- https://support.apple.com/kb/HT6535
- https://support.apple.com/kb/HT6536
- https://support.apple.com/kb/HT6536
- https://support.apple.com/kb/HT6541
- https://support.apple.com/kb/HT6541
- https://support.apple.com/kb/HT6542
- https://support.apple.com/kb/HT6542
- https://support.citrix.com/article/CTX216642
- https://support.citrix.com/article/CTX216642
- https://support.lenovo.com/product_security/poodle
- https://support.lenovo.com/product_security/poodle
- https://support.lenovo.com/us/en/product_security/poodle
- https://support.lenovo.com/us/en/product_security/poodle
- https://technet.microsoft.com/library/security/3009008.aspx
- https://technet.microsoft.com/library/security/3009008.aspx
- https://templatelab.com/ssl-poodle/
- https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7
- https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7
- https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
- https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
- https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
- https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
- https://www.elastic.co/blog/logstash-1-4-3-released
- https://www.elastic.co/blog/logstash-1-4-3-released
- https://www.imperialviolet.org/2014/10/14/poodle.html
- https://www.imperialviolet.org/2014/10/14/poodle.html
- https://www.openssl.org/~bodo/ssl-poodle.pdf
- https://www.openssl.org/~bodo/ssl-poodle.pdf
- https://www.openssl.org/news/secadv_20141015.txt
- https://www.openssl.org/news/secadv_20141015.txt
- https://www.suse.com/support/kb/doc.php?id=7015773
- https://www.suse.com/support/kb/doc.php?id=7015773
- https://www-01.ibm.com/support/docview.wss?uid=swg21688165
- https://www-01.ibm.com/support/docview.wss?uid=swg21688165