[Secure-testing-commits] r29657 - data/CVE

Kurt Roeckx kroeckx at moszumanska.debian.org
Sun Oct 26 11:47:50 UTC 2014


Author: kroeckx
Date: 2014-10-26 11:47:50 +0000 (Sun, 26 Oct 2014)
New Revision: 29657

Modified:
   data/CVE/list
Log:
CVE-2014-3566/POODLE: Add all ssl implementations, webservers and webbrowsers

Some websersers and browsers might not be affected in testing/unstable because
they use libssl1.0.0 which disabled SSL v3.0, but they're still affected in
other suites.

For webbrowsers I've tried to look at those that support javascript since as far
as I know that's the only way to exploit it.


Modified: data/CVE/list
===================================================================
--- data/CVE/list	2014-10-26 09:23:50 UTC (rev 29656)
+++ data/CVE/list	2014-10-26 11:47:50 UTC (rev 29657)
@@ -11375,14 +11375,50 @@
 	{DSA-3053-1}
 	- openssl 1.0.1j-1
 CVE-2014-3566 (The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other ...)
+	- aolserver4-nsopenssl <unfixed>
+	- apache2 2.4.10-6
+	- arora <unfixed>
+	- bouncycastle <unfixed>
+	- chromium <unfixed>
+	- chromium-browser <unfixed>
+	- conkeror <unfixed>
+	- cyassl <unfixed>
+	- dwb <unfixed>
 	- openssl 1.0.1j-1
-	- nss <unfixed>
+	- galeon <unfixed>
 	- gnutls26 <unfixed>
 	- gnutls28 <unfixed>
-	[wheezy] - iceweasel <unfixed>
+	- kazehakase <unfixed>
+	[squeeze] - kdebase <unfixed>
+	- kde-baseapps <unfixed>
+	- epiphany-browser <unfixed>
+	- fossil <unfixed>
+	- gatling <unfixed>
+	- haskell-tls <unfixed>
+	- icedove <unfixed>
+	[squeeze] - icedove <end-of-life>
+	- iceweasel <unfixed>
 	[squeeze] - iceweasel <end-of-life>
-	[wheezy] - icedove <unfixed>
-	[squeeze] - icedove <end-of-life>
+	- konqueror <unfixed>
+	- libtomcatjss-java <unfixed>
+	- lighttpd <unfixed>
+	- matrixssl <unfixed>
+	- midori <unfixed>
+	- mini-httpd <unfixed>
+	- netsurf <unfixed>
+	- nginx <unfixed>
+	- nss <unfixed>
+	- ocsigenserver <unfixed>
+	- openjdk-6 <unfixed>
+	- openjdk-7 <unfixed>
+	- openjdk-8 <unfixed>
+	- polarssl <unfixed>
+	- python-tlslite <unfixed>
+	- surf <unfixed>
+	- tntnet <unfixed>
+	- uzbl <unfixed>
+	- webfs <unfixed>
+	- yaws <unfixed>
 	NOTE: https://www.openssl.org/~bodo/ssl-poodle.pdf
 	NOTE: http://googleonlinesecurity.blogspot.fr/2014/10/this-poodle-bites-exploiting-ssl-30.html
 	NOTE: This is only about the SSLv3 CBC padding, not about any downgrade attack or support for the fallback SCSV




More information about the Secure-testing-commits mailing list