From owner-freebsd-security@FreeBSD.ORG Wed Apr 30 13:55:20 2014 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 6EDD89CD for ; Wed, 30 Apr 2014 13:55:20 +0000 (UTC) Received: from ns1.mdounin.ru (ns1.mdounin.ru [88.198.19.180]) by mx1.freebsd.org (Postfix) with ESMTP id 3208714CD for ; Wed, 30 Apr 2014 13:55:19 +0000 (UTC) Received: from mdounin.ru (ns1.mdounin.ru [88.198.19.180]) by ns1.mdounin.ru (Postfix) with ESMTP id 34870ED8C00; Wed, 30 Apr 2014 17:47:07 +0400 (MSK) Date: Wed, 30 Apr 2014 17:47:07 +0400 From: Maxim Dounin To: Cstdenis Subject: Re: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-14:09.openssl Message-ID: <20140430134706.GD34696@mdounin.ru> References: <201404300435.s3U4ZA17093706@freefall.freebsd.org> <536089BC.3060002@ctgameinfo.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <536089BC.3060002@ctgameinfo.com> User-Agent: Mutt/1.5.22 (2013-10-16) Cc: freebsd-security@freebsd.org X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Apr 2014 13:55:20 -0000 Hello! On Tue, Apr 29, 2014 at 10:27:24PM -0700, Cstdenis wrote: > Based on the CVE, it looks like older versions may also be vulnerable. > http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5298 Information on the link in question is misleading. Affected code appeared in OpenSSL 1.0.0 and doesn't exists in previous versions, hence this problem only affects FreeBSD 10.x. -- Maxim Dounin http://nginx.org/