Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 07 Apr 2014 21:41:25 -0500
From:      Bryan Drewery <bdrewery@FreeBSD.org>
To:        freebsd-security@freebsd.org
Subject:   Re: http://heartbleed.com/
Message-ID:  <534361D5.6070109@FreeBSD.org>
In-Reply-To: <53430F72.1040307@gibfest.dk>
References:  <53430F72.1040307@gibfest.dk>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On 4/7/2014 3:49 PM, Thomas Steen Rasmussen wrote:
> Hello,
> 
> http://heartbleed.com/ describes an openssl vulnerability published
> today. We are going to need an advisory for the openssl in base in
> FreeBSD 10 and we are also going to need an updated port.
> 
> The implications of this vulnerability are pretty massive,
> certificates will need to be replaced and so on. I don't want to
> repeat the page, so go read that.
> 
> Best regards,
> 
> 
> /Thomas Steen Rasmussen
> 
> ps. there is a bit on the openssl site too:
> https://www.openssl.org/news/secadv_20140407.txt

The port has been updated. 1.0.1_10 has the fix.

-- 
Regards,
Bryan Drewery


[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJTQ2HWAAoJEDXXcbtuRpfPwlAIAKDtXjdC8TbcVGLJAC9iajLd
Cc+7cc/y9Rxs0ALQlzjPrt4NwTCdoCffJkRSDpvvUL/ciIU8hEjctEDAREEqLyg7
E2dM5YlXeqNzsu7X5x5dnh1+QjKZh6/9LvRPYYtgM8mFsIA86hATxuqb1XWYB8/V
k8cbPUEyVJk1LXKgh0VhTV6eqSygrhMG8cGMQ760vGG5CdXDkT+pmHFkOkH+0xMz
buA2XQI3lvr3Q0CzTDMUUayNDfBZoKJj20L46PoHYsamlzOVG+g3PDuQGAMfu83A
l2bzfHaehWgjyxlQev8XiXJZHbgIB9+68hO9og97XkI1750kL2HPCKJS4P2b2BM=
=8iwj
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?534361D5.6070109>