Date: Sun, 13 Jul 2008 17:42:30 -0700 From: Doug Barton <dougb@FreeBSD.org> To: "Simon L. Nielsen" <simon@FreeBSD.org> Cc: freebsd-security@freebsd.org Subject: Re: OpenSSL warning from dns/bind95 build...? Message-ID: <487AA0F6.1010801@FreeBSD.org> In-Reply-To: <20080713222344.GB15766@zaphod.nitro.dk> References: <DEB25E89-7447-4EA0-8800-23897C593756@mac.com> <20080713222344.GB15766@zaphod.nitro.dk>
next in thread | previous in thread | raw e-mail | index | archive | help
Simon L. Nielsen wrote:
> On 2008.07.11 13:14:09 -0700, Chuck Swiger wrote:
>
> [quote edited to contain important part]
>
>>> WARNING Your OpenSSL crypto library may be vulnerable to
>>> WARNING one or more of the the following known security
>>> WARNING flaws:
>>> WARNING
>>> WARNING CAN-2002-0659, CAN-2006-4339, CVE-2006-2937 and
>>> WARNING CVE-2006-2940.
>>> WARNING
> [...]
>> Is the version of OpenSSL now included with RELENG_6 (OpenSSL 0.9.7e-p1)
>> OK, or is it at risk as reported?
>
> Just so there is no doubt - the base system OpenSSL isn't actually
> vulnerable to those issues. They were fixed in SA-02:33.openssl,
> FreeBSD-SA-06:19.openssl, and FreeBSD-SA-06:23.openssl.
>
> The BIND build system just has no way to see this since they were
> patched instead of upgraded.
... hence the false economy of not doing a "standard" upgrade of the
version in the base. :) It's nice to know that for the particular set
of problems listed in this version of BIND's warning message our users
should not be at risk though.
I used the ports openssl on my 6-stable boxes without problems, but I
did not have that many ports installed, and I nuked the base openssl
first. YMMV.
Doug
--
This .signature sanitized for your protection
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?487AA0F6.1010801>
