Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 20 Jan 2010 15:10:38 -0500
From:      "Brian A. Seklecki" <lavalamp@spiritual-machines.org>
To:        freebsd-security@freebsd.org
Subject:   [Fwd: OpenSSL 1.0.0 beta5 release]
Message-ID:  <1264018238.18129.46.camel@soundwave.ws.pitbpa0.priv.collaborativefusion.com>

next in thread | raw e-mail | index | archive | help
All:

  Per Daniele Sluijters's inquiry on the 15th,CVE-2009-4355, as 
  well as with a provision/draft fix for CVE-2009-3555
  MITM/Renegotiation Venerability.

  I suspect we wont have a patch out for RELENG_6_3 by the 31st?  
  But I'm willing to maintain one for another few months.

~BAS

-------- Forwarded Message --------
From: OpenSSL <openssl@openssl.org>
Reply-to: openssl-users@openssl.org
To: openssl-users@openssl.org, openssl-announce@openssl.org
Subject: OpenSSL 1.0.0 beta5 release
Date: Wed, 20 Jan 2010 19:19:16 +0100

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


  OpenSSL version 1.0.0 Beta 5
  ============================

 [..snip...]

  Since the fourth beta, the following has happened:

    - Provisional TLS session renegotiation fix
    - Option to output hash using older algorithm in x509 utility
    - Compression session handling bug fix
    - Build system fixes.
    - Other bug fixes.

  Reports and patches should be sent to openssl-bugs@openssl.org.

[..snip...]





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1264018238.18129.46.camel>