CVE-2014-3566

Priority
Medium
Description
The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products,
uses nondeterministic CBC padding, which makes it easier for
man-in-the-middle attackers to obtain cleartext data via a padding-oracle
attack, aka the "POODLE" issue.
References
Bugs
Notes
 mdeslaur> We recommend disabling SSLv3 on servers, if possible.
 mdeslaur>
 mdeslaur> Community-provided information on disabling SSLv3 can be found
 mdeslaur> here:
 mdeslaur>
 mdeslaur> http://askubuntu.com/a/537196
 mdeslaur>
 mdeslaur> SANS provided information on disabling SSLv3 can be found here:
 mdeslaur> https://isc.sans.edu/forums/diary/POODLE+Turning+off+SSLv3+for+various+servers+and+client+/18837
Assigned-to
mdeslaur
Package
Upstream:released (7u73)
Ubuntu 12.04 LTS (Precise Pangolin):released (7u75-2.5.4-1~precise1)
Ubuntu 14.04 LTS (Trusty Tahr):released (7u75-2.5.4-1~trusty1)
Ubuntu Touch 15.04:DNE
Ubuntu Core 15.04:DNE
Ubuntu 15.10 (Wily Werewolf):not-affected (7u75-2.5.4-1)
Ubuntu 16.04 (Xenial Xerus):DNE
Package
Upstream:ignored (reached end-of-life)
Ubuntu 12.04 LTS (Precise Pangolin):released (6b34-1.13.6-1ubuntu0.12.04.1)
Ubuntu 14.04 LTS (Trusty Tahr):released (6b34-1.13.6-1ubuntu0.14.04.1)
Ubuntu Touch 15.04:DNE
Ubuntu Core 15.04:DNE
Ubuntu 15.10 (Wily Werewolf):not-affected (6b34-1.13.6-1ubuntu1)
Ubuntu 16.04 (Xenial Xerus):DNE
Package
Source: pound (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 LTS (Precise Pangolin):needed
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu Touch 15.04:DNE
Ubuntu Core 15.04:DNE
Ubuntu 15.10 (Wily Werewolf):not-affected (2.6-6.1)
Ubuntu 16.04 (Xenial Xerus):not-affected (2.6-6.1)
Package
Upstream:needs-triage
Ubuntu 12.04 LTS (Precise Pangolin):needed
Ubuntu 14.04 LTS (Trusty Tahr):needed
Ubuntu Touch 15.04:DNE
Ubuntu Core 15.04:DNE
Ubuntu 15.10 (Wily Werewolf):DNE
Ubuntu 16.04 (Xenial Xerus):DNE
Package
Upstream:needs-triage
Ubuntu 12.04 LTS (Precise Pangolin):released (1.0.1-4ubuntu5.20)
Ubuntu 14.04 LTS (Trusty Tahr):released (1.0.1f-1ubuntu2.7)
Ubuntu Touch 15.04:released (1.0.1f-1ubuntu9)
Ubuntu Core 15.04:released (1.0.1f-1ubuntu9)
Ubuntu 15.10 (Wily Werewolf):released (1.0.1f-1ubuntu9)
Ubuntu 16.04 (Xenial Xerus):released (1.0.1f-1ubuntu9)
Patches:
Upstream:https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=c6a876473cbff0fd323c8abcaace98ee2d21863d (0.9.8)
Upstream:https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=dc5dfe431cffbc1fa8eeead0853bd03395e52e71 (0.9.8)
Upstream:https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=3f4d81e88b6f3cce83eae0448cc6542e3e251854 (0.9.8)
Upstream:https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=d2866063015d839569c2323cae85d1d27ccdb484 (0.9.8)
Upstream:https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=6bfe55380abbf7528e04e59f18921bd6c896af1c (1.0.1)
Upstream:https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=7d07c75c5b97a31edfdec8076bd720166fdde789 (1.0.1)
Upstream:https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=80fb4820cb1c849348b5246330b35ed4f51af562 (missing from 1.0.1)
Package
Source: nss (LP Ubuntu Debian)
Upstream:released (3.17.1)
Ubuntu 12.04 LTS (Precise Pangolin):not-affected (3.17.1-0ubuntu0.12.04.1)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (2:3.17.1-0ubuntu0.14.04.1)
Ubuntu Touch 15.04:not-affected (2:3.17.1-0ubuntu1)
Ubuntu Core 15.04:DNE
Ubuntu 15.10 (Wily Werewolf):not-affected (2:3.17.1-0ubuntu1)
Ubuntu 16.04 (Xenial Xerus):not-affected (2:3.17.1-0ubuntu1)
Patches:
Upstream:https://hg.mozilla.org/projects/nss/rev/45cb71fd7bca
More Information

Updated: 2016-04-21 23:19:34 UTC (commit 10924)