Red Hat and the openssl_1.0.1 heartbleed bug

This document (7014998) is provided subject to the disclaimer at the end of this document.


Red Hat 6


The openssl versions openssl-1.0.1e-15 through openssl-1.0.1e-16.el6_5.4 had a significant bug called "heartbleed" CVE-2014-0160.  The bug allows anyone with access to the server through the internet to read parts of memory.  It was limited to 64kb at a time but can be repeated multiple times to gain confidential information even over a secure network since the bug is local to the server.  Security keys, passwords, usernames, emails, and other confidential information could be leaked.  While a hacker cannot request specific information it gets whatever is passing through RAM at that moment. 


The openssl-1.0.1e-16.el6_5.7 patch was released and needs to be applied.  Patch using the normal Red Hat methods through the Subscription Management Tool (TID 7004324) or SuSE Manager (documentation).


Additional Information


This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7014998
  • Creation Date: 02-May-2014
  • Modified Date:03-Mar-2020
    • SUSE Linux Enterprise Server

< Back to Support Search

For questions or concerns with the SUSE Knowledgebase please contact:

SUSE Support Forums

Get your questions answered by experienced Sys Ops or interact with other SUSE community experts.

Join Our Community

Support Resources

Learn how to get the most from the technical support you receive with your SUSE Subscription, Premium Support, Academic Program, or Partner Program.

SUSE Customer Support Quick Reference Guide SUSE Technical Support Handbook Update Advisories
Support FAQ

Open an Incident

Open an incident with SUSE Technical Support, manage your subscriptions, download patches, or manage user access.

Go to Customer Center