Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 8 Apr 2014 02:26:46 +0000 (UTC)
From:      Bryan Drewery <bdrewery@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r350560 - head/security/vuxml
Message-ID:  <201404080226.s382QkQb053010@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: bdrewery
Date: Tue Apr  8 02:26:45 2014
New Revision: 350560
URL: http://svnweb.freebsd.org/changeset/ports/350560
QAT: https://qat.redports.org/buildarchive/r350560/

Log:
  Add more information for OpenSSL bug

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Apr  8 00:50:33 2014	(r350559)
+++ head/security/vuxml/vuln.xml	Tue Apr  8 02:26:45 2014	(r350560)
@@ -68,6 +68,15 @@ Note:  Please add new entries to the beg
 	  <p>Affected users should upgrade to OpenSSL 1.0.1g. Users unable to immediately
 	    upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS.</p>
 	</blockquote>
+	<blockquote cite="http://www.heartbleed.com">;
+	  <p>The bug allows anyone on the Internet to read the memory of the
+	  systems protected by the vulnerable versions of the OpenSSL software.
+	  This compromises the secret keys used to identify the service
+	  providers and to encrypt the traffic, the names and passwords of the
+	  users and the actual content. This allows attackers to eavesdrop
+	  communications, steal data directly from the services and users and
+	  to impersonate services and users.</p>
+	</blockquote>
 	<p>This also covers:</p>
 	<blockquote cite="https://www.openssl.org/news/vulnerabilities.html#2014-0076">;
 	  <p>Fix for the attack described in the paper "Recovering OpenSSL



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201404080226.s382QkQb053010>