From owner-freebsd-security Tue Jul 30 6:44:45 2002 Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.FreeBSD.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 2BA3537B400 for ; Tue, 30 Jul 2002 06:44:42 -0700 (PDT) Received: from mail47.fg.online.no (mail47-s.fg.online.no [148.122.161.47]) by mx1.FreeBSD.org (Postfix) with ESMTP id 3C6BE43E4A for ; Tue, 30 Jul 2002 06:44:41 -0700 (PDT) (envelope-from pulz@pulz.no) Received: from elixor (ti500720a080-0896.bb.online.no [80.213.75.128]) by mail47.fg.online.no (8.9.3/8.9.3) with SMTP id PAA21885 for ; Tue, 30 Jul 2002 15:44:40 +0200 (MET DST) Message-ID: <004001c237cf$23c00560$fa00a8c0@elixor> From: =?iso-8859-1?Q?Geir_R=E5ness?= To: Subject: About the openssl hole Date: Tue, 30 Jul 2002 15:43:50 +0200 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_003D_01C237DF.E6BDD370" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2600.0000 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org This is a multi-part message in MIME format. ------=_NextPart_000_003D_01C237DF.E6BDD370 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Shuld we start to edit the openssl port (I have emailed the maninter to = update to 96.e, "or supply the patch from openssl" in the = /usr/ports/security/openssl), or shuld we wait for an patch from the = freebsd team ? If you look at bugtrac there are already romours about exploits flying = around now. Read the Advisory from openssl here http://www.openssl.org/news/secadv_20020730.txt Best Regards Geir R=E5ness ------=_NextPart_000_003D_01C237DF.E6BDD370 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
Shuld we start to edit the openssl port = (I have=20 emailed the maninter to update to 96.e, "or supply the patch from=20 openssl" in the /usr/ports/security/openssl), or shuld we wait for = an patch=20 from the freebsd team ?
 
If you look at bugtrac there are = already romours=20 about exploits flying around now.
 
 
Read the Advisory from openssl = here
http://www.opens= sl.org/news/secadv_20020730.txt
 
 
Best Regards
Geir = R=E5ness
------=_NextPart_000_003D_01C237DF.E6BDD370-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message