From owner-freebsd-security@FreeBSD.ORG Tue Apr 8 18:00:04 2014 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id BABFF831 for ; Tue, 8 Apr 2014 18:00:04 +0000 (UTC) Received: from as1.azsupport.com (azsupport.com [74.52.186.194]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "azsupport.com", Issuer "PositiveSSL CA 2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 9F7F41D8A for ; Tue, 8 Apr 2014 18:00:04 +0000 (UTC) Date: Tue, 8 Apr 2014 19:50:49 +0200 From: Andrei To: freebsd-security@freebsd.org Subject: Re: FreeBSD's heartbleed response Message-ID: <20140408195049.04129f2a@azsupport.com> In-Reply-To: References: <20140408174210.GA5433@behemoth> Organization: azsupport.com X-Mailer: Claws Mail 3.9.3 (GTK+ 2.24.22; amd64-portbld-freebsd11.0) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 08 Apr 2014 18:00:04 -0000 On Tue, 8 Apr 2014 10:46:12 -0700 Mark Boolootian wrote: > While it may not be quite what you're looking for, ports contains > OpenSSL 1.0.1g. And also FreeBSD 8.x/9.x not affected because have 0.9.x OpenSSL in base.