Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 08 Apr 2014 20:54:35 +0200
From:      Niklaus Schiess <nschiess@adversec.com>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD's heartbleed response
In-Reply-To: <20140408195049.04129f2a@azsupport.com>
References:  <20140408174210.GA5433@behemoth> <CAMCLrkFXsnY-_KCw2PF0VtY6C0J-4CL03GzFskXmzUtLL2Ebig@mail.gmail.com> <20140408195049.04129f2a@azsupport.com>

| previous in thread | raw e-mail | index | archive | help
Plenty of FreeBSD deployments use 1.0.1x due to the lack of TLS 1.2
support in 0.9.x. So thats not an excuse.

On 08.04.2014 19:50, Andrei wrote:
> On Tue, 8 Apr 2014 10:46:12 -0700
> Mark Boolootian <booloo@ucsc.edu> wrote:
> 
>> While it may not be quite what you're looking for, ports contains
>> OpenSSL 1.0.1g.
> 
> And also FreeBSD 8.x/9.x not affected because have 0.9.x OpenSSL in base.
> _______________________________________________
> freebsd-security@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-security
> To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
> 

-- 
PGP FP: CB84 8C68 ADDB 6C50 7DF1 4227 F2A6 056A A799 76DA



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?>