Am 17.10.2014 um 19:38 schrieb Thomas Eriksson
:
> On 10/17/2014 09:53 AM, James B. Byrne wrote:
>>
>> I read this on the RHN commentary respecting cve-2014-3566:
>>
>>
>> https://securityblog.redhat.com/2014/10/15/poodle-a-ssl3-vulnerability-cve-2014-3566/:
>>
> ...
>>
>> If read the advisor
On 10/17/2014 09:53 AM, James B. Byrne wrote:
>
> I read this on the RHN commentary respecting cve-2014-3566:
>
>
> https://securityblog.redhat.com/2014/10/15/poodle-a-ssl3-vulnerability-cve-2014-3566/:
>
...
>
> If read the advisory aright then TLSv1.0 suffers from exactly the same flaw as
>
I read this on the RHN commentary respecting cve-2014-3566:
https://securityblog.redhat.com/2014/10/15/poodle-a-ssl3-vulnerability-cve-2014-3566/:
. . .
The first aspect of POODLE, the SSL 3.0 protocol vulnerability, has already
been fixed through iterative protocol improvements, leading to the
3 matches
Mail list logo