Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 07 Apr 2014 22:27:09 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        d@delphij.net, freebsd-security@freebsd.org
Subject:   Re: http://heartbleed.com/
Message-ID:  <53435E7D.5000801@sentex.net>
In-Reply-To: <53431275.4080906@delphij.net>
References:  <53430F72.1040307@gibfest.dk> <53431275.4080906@delphij.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On 4/7/2014 5:02 PM, Xin Li wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
>
> Hi, Thomas,
>
> On 04/07/14 13:49, Thomas Steen Rasmussen wrote:
>> Hello,
>>
>> http://heartbleed.com/ describes an openssl vulnerability
>> published today. We are going to need an advisory for the openssl
>> in base in FreeBSD 10 and we are also going to need an updated
>> port.
>>
>> The implications of this vulnerability are pretty massive,
>> certificates will need to be replaced and so on. I don't want to
>> repeat the page, so go read that.
>
> We are already working on this but building, reviewing, etc. would
> take some time.
>

Hi,
The webpage lists

FreeBSD 8.4 (OpenSSL 1.0.1e) and 9.1 (OpenSSL 1.0.1c)

I take it this is only if you installed from the ports no ?

	---Mike




-- 
-------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike@sentex.net
Providing Internet services since 1994 www.sentex.net
Cambridge, Ontario Canada   http://www.tancsa.com/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?53435E7D.5000801>