Date: Wed, 15 Oct 2014 10:54:10 -0400 From: Ryan Steinmetz <zi@FreeBSD.org> To: Dag-Erling =?iso-8859-1?Q?Sm=F8rgrav?= <des@des.no> Cc: gecko@freebsd.org, ports-secteam@freebsd.org, chromium@freebsd.org Subject: Re: POODLE SSLv3 vulnerability Message-ID: <20141015145410.GA79014@exodus.zi0r.com> In-Reply-To: <86siipg4v8.fsf@nine.des.no> References: <86iojmgn40.fsf@nine.des.no> <20141015020813.GA5814@exodus.zi0r.com> <86siipg4v8.fsf@nine.des.no>
next in thread | previous in thread | raw e-mail | index | archive | help
On (10/15/14 09:38), Dag-Erling Sm=F8rgrav wrote: >Ryan Steinmetz <zi@FreeBSD.org> writes: >> It might be less surprising if we bundle the addon with the current >> installation. > >I disagree. The change I proposed is simple and unobtrusive. Please >consider this a formal request from the Security Officer. I do not have a way to test the patch. Will try to locate someone who can. -r > >DES >--=20 >Dag-Erling Sm=F8rgrav - des@des.no --=20 Ryan Steinmetz PGP: 9079 51A3 34EF 0CD4 F228 EDC6 1EF8 BA6B D028 46D7
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20141015145410.GA79014>