<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability in Network and Storage Protocols</title>
    <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40831#M3769</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will that link be THE place for ongoing updates?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 11 Apr 2014 00:14:59 GMT</pubDate>
    <dc:creator>FULLSTEAM</dc:creator>
    <dc:date>2014-04-11T00:14:59Z</dc:date>
    <item>
      <title>What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40795#M3757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There was a major vulnerability disclosed in OpenSSL yesterday which is being referred to as heartbleed. While the specifics are still being investigated, it places all userid/passwords at risk when using OpenSSL. I know that some Netapp products use it and am trying to find out which are vulnerable and what the plans are for addressing it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2025 05:38:32 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40795#M3757</guid>
      <dc:creator>gregory_a_price</dc:creator>
      <dc:date>2025-06-05T05:38:32Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40800#M3759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OnCommand Core 5.2P2 is vulnerable.&amp;nbsp; Already case'd it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Apr 2014 19:23:02 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40800#M3759</guid>
      <dc:creator>FULLSTEAM</dc:creator>
      <dc:date>2014-04-09T19:23:02Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40808#M3762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NetApp takes the security of our products very seriously and is committed to resolving vulnerabilities to meet the needs of our customers and the broader technology community.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there is a security issue with a third-party software component that is used in a NetApp product, NetApp will attempt to verify the vulnerability and will prioritize it based on the relative severity of the vulnerability as well as the business needs of the organization. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NetApp is currently evaluating the impact of the OpenSSL vulnerability.&amp;nbsp; We will provide an update as additional information becomes available. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Apr 2014 00:33:26 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40808#M3762</guid>
      <dc:creator>ajosh</dc:creator>
      <dc:date>2014-04-10T00:33:26Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40813#M3764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A decidedly vague and unhelpful PR dodge.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please take a clue from many other vendors (e.g &lt;A href="http://kb.vmware.com/kb/2076225" title="http://kb.vmware.com/kb/2076225" target="_blank"&gt;http://kb.vmware.com/kb/2076225&lt;/A&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&amp;nbsp; Share what you know, as you know it, in a public spot, even if it's not much.&lt;/P&gt;&lt;P&gt;That it's been this long with technical radio silence and trade show song-and-dance on the social media feeds is insanity.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Apr 2014 00:42:27 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40813#M3764</guid>
      <dc:creator>FULLSTEAM</dc:creator>
      <dc:date>2014-04-10T00:42:27Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40817#M3766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a case open with Netapp currently for this and bugs 815987 &amp;amp; 816639 have been opened for investigation/handling of the vulnerability CVE-2014-0160:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://support.netapp.com/NOW/cgi-bin/bol?Type=Detail&amp;amp;Display=815987" title="http://support.netapp.com/NOW/cgi-bin/bol?Type=Detail&amp;amp;Display=815987" target="_blank"&gt;http://support.netapp.com/NOW/cgi-bin/bol?Type=Detail&amp;amp;Display=815987&lt;/A&gt; - no public-facing notes as yet but looks like no version of ONTAP ships with OpenSSL 1.0.1x, so ONTAP is unaffected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://support.netapp.com/NOW/cgi-bin/bol?Type=Detail&amp;amp;Display=816639" target="_blank"&gt;http://support.netapp.com/NOW/cgi-bin/bol?Type=Detail&amp;amp;Display=816639&lt;/A&gt; - this is a newly filed bug so may not have hit 24 hour mark yet until later today.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Apr 2014 08:51:09 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40817#M3766</guid>
      <dc:creator>JONATHAPQ</dc:creator>
      <dc:date>2014-04-10T08:51:09Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40821#M3767</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It appears that the SMI-S client is also vulnerable.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Apr 2014 20:31:56 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40821#M3767</guid>
      <dc:creator>gregory_a_price</dc:creator>
      <dc:date>2014-04-10T20:31:56Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40826#M3768</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have posted our current status for CVE-2014-0160 at the following URL:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://library.netapp.com/ecm/ecm_get_file/ECMP1516404" target="_blank"&gt;https://library.netapp.com/ecm/ecm_get_file/ECMP1516404&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We will continue to be making updates as new information is available.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Apr 2014 23:28:16 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40826#M3768</guid>
      <dc:creator>ajosh</dc:creator>
      <dc:date>2014-04-10T23:28:16Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40831#M3769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will that link be THE place for ongoing updates?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Apr 2014 00:14:59 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40831#M3769</guid>
      <dc:creator>FULLSTEAM</dc:creator>
      <dc:date>2014-04-11T00:14:59Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40836#M3770</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, this link will remain static and be the location for official communications regarding CVE-2014-0160.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Apr 2014 16:55:32 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40836#M3770</guid>
      <dc:creator>ajosh</dc:creator>
      <dc:date>2014-04-11T16:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40840#M3771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So now I have to monitor some static PDF page to find when a patch is released?&amp;nbsp; Meanwhile, we are going to get completely nailed by regulatory audits since Nessus has a plug-in to detect this.....please NetApp PATCH THIS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Apr 2014 17:36:49 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40840#M3771</guid>
      <dc:creator>JLOCKIE_CEFCU</dc:creator>
      <dc:date>2014-04-17T17:36:49Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40845#M3772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This document isn't even current!&amp;nbsp; There's a patch for OnCommand Unified Manager Core, but the PDF still lists it as vulnerable.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, this is a very poor communication.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Apr 2014 17:06:37 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40845#M3772</guid>
      <dc:creator>JLOCKIE_CEFCU</dc:creator>
      <dc:date>2014-04-22T17:06:37Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40850#M3773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The document is being updated almost daily.&amp;nbsp; Please reference the section entitled "Software Versions and Fixes" for patch information.&amp;nbsp; The list of Vulnerable products does not change as patches are released.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Apr 2014 17:12:41 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40850#M3773</guid>
      <dc:creator>ajosh</dc:creator>
      <dc:date>2014-04-22T17:12:41Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40855#M3774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I suggest you add an executive summary then, or at the very least put a note to the right of the vulnerable products stating "patched - see below".....NetApp has way too many products to expect customers who are only using a handful of them to skim a huge list (on a PDF none the less).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Apr 2014 17:16:34 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40855#M3774</guid>
      <dc:creator>JLOCKIE_CEFCU</dc:creator>
      <dc:date>2014-04-22T17:16:34Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40860#M3775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ctrl+f ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Apr 2014 08:31:26 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40860#M3775</guid>
      <dc:creator>JONATHAPQ</dc:creator>
      <dc:date>2014-04-23T08:31:26Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40864#M3776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The changelog for oncommand core 5.2r1 indicates it's added support for "&lt;SPAN style="color: #454545; font-family: Arial, sans-serif; font-size: 12px;"&gt;OpenSSL 1.0.1e&lt;/SPAN&gt;" - which is still vulnerable.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Apr 2014 12:33:17 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40864#M3776</guid>
      <dc:creator>bazmercer</dc:creator>
      <dc:date>2014-04-23T12:33:17Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40868#M3777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;well, the updated version was still running 1.0.1e (although it may well have been compiled differently). As I can't tell, I've replaced it with 1.0.1g and it seems ok. This is probably unsupported so do so at your own risk etc etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Apr 2014 14:16:26 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40868#M3777</guid>
      <dc:creator>bazmercer</dc:creator>
      <dc:date>2014-04-23T14:16:26Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40873#M3778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;RHAT's patch for openssl was a backport into 1.0.1e; could be what they did here.&amp;nbsp; Eh, whatever, 5.2R1 scanned cleanly as-deployed without jimmying it.&lt;/P&gt;&lt;P&gt;Though, what you did (symlinking/copying a known-good lib over OC's static library) was our last-ditch plan if the patch was going to take too long.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Apr 2014 14:55:29 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40873#M3778</guid>
      <dc:creator>FULLSTEAM</dc:creator>
      <dc:date>2014-04-23T14:55:29Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40877#M3780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can also confirm it scans clean after patching.&amp;nbsp; No need to mess with it.&amp;nbsp; It was lighting up like a Christmas tree on previous scans.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would be nice if they used Apache 2.4.6 instead of 2.4.4 due to CVE-2013-2249.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Apr 2014 15:06:49 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40877#M3780</guid>
      <dc:creator>JLOCKIE_CEFCU</dc:creator>
      <dc:date>2014-04-23T15:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40881#M3782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ah ok fair enough. I didn't have any scan tools so was just playing it safe. Thanks for the info.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Apr 2014 15:12:46 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40881#M3782</guid>
      <dc:creator>bazmercer</dc:creator>
      <dc:date>2014-04-23T15:12:46Z</dc:date>
    </item>
    <item>
      <title>Re: What Netapp Products are subject to OpenSSL Heartbleed Vulnerability</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40885#M3784</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="http://gobuild.io/download/github.com/titanous/heartbleeder" title="http://gobuild.io/download/github.com/titanous/heartbleeder" target="_blank"&gt;http://gobuild.io/download/github.com/titanous/heartbleeder&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Apr 2014 15:16:04 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/What-Netapp-Products-are-subject-to-OpenSSL-Heartbleed-Vulnerability/m-p/40885#M3784</guid>
      <dc:creator>FULLSTEAM</dc:creator>
      <dc:date>2014-04-23T15:16:04Z</dc:date>
    </item>
  </channel>
</rss>

