Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 08 Apr 2014 15:21:23 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD's heartbleed response
Message-ID:  <53444C33.4060408@sentex.net>
In-Reply-To: <20140408190227.70A5CDB9@hub.freebsd.org>
References:  <20140408174210.GA5433@behemoth> <CAMCLrkFXsnY-_KCw2PF0VtY6C0J-4CL03GzFskXmzUtLL2Ebig@mail.gmail.com> <20140408195049.04129f2a@azsupport.com> <20140408190227.70A5CDB9@hub.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On 4/8/2014 2:54 PM, Niklaus Schiess wrote:
> Plenty of FreeBSD deployments use 1.0.1x due to the lack of TLS 1.2
> support in 0.9.x. So thats not an excuse.

The FreeBSD security team only maintains advisories for the base 
distributions. What people install from the ports are not covered by 
those advisories.

Issues affecting the FreeBSD Ports Collection are covered in 
http://vuxml.freebsd.org/

	---Mike


-- 
-------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike@sentex.net
Providing Internet services since 1994 www.sentex.net
Cambridge, Ontario Canada   http://www.tancsa.com/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?53444C33.4060408>