Date: Wed, 20 Jan 2010 14:56:52 -0500 From: "Brian A. Seklecki" <bseklecki@collaborativefusion.com> To: freebsd-security@freebsd.org Subject: [Fwd: OpenSSL 1.0.0 beta5 release] Message-ID: <1264017412.18129.38.camel@soundwave.ws.pitbpa0.priv.collaborativefusion.com>
index | next in thread | raw e-mail
[-- Attachment #1 --]
All:
Per Daniele Sluijters's inquiry on the 15th,CVE-2009-4355, as
well as with a provision/draft fix for CVE-2009-3555
MITM/Renegotiation Venerability.
I suspect we wont have a patch out for RELENG_6_3 by the 31st?
But I'm willing to maintain one for another few months.
~BAS
-------- Forwarded Message --------
From: OpenSSL <openssl@openssl.org>
Reply-to: openssl-users@openssl.org
To: openssl-users@openssl.org, openssl-announce@openssl.org
Subject: OpenSSL 1.0.0 beta5 release
Date: Wed, 20 Jan 2010 19:19:16 +0100
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
OpenSSL version 1.0.0 Beta 5
============================
[..snip...]
Since the fourth beta, the following has happened:
- Provisional TLS session renegotiation fix
- Option to output hash using older algorithm in x509 utility
- Compression session handling bug fix
- Build system fixes.
- Other bug fixes.
Reports and patches should be sent to openssl-bugs@openssl.org.
[..snip...]
[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEABECAAYFAktXYAQACgkQCne6BNDQ+R+M7ACcDjvjWE3h2ey2L1pwoCIb9S/Q
uT4Anjq57M5q333l0rqdATTw/piqR6ux
=SzGM
-----END PGP SIGNATURE-----
help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1264017412.18129.38.camel>
