Date: Mon, 07 Apr 2014 21:41:25 -0500 From: Bryan Drewery <bdrewery@FreeBSD.org> To: freebsd-security@freebsd.org Subject: Re: http://heartbleed.com/ Message-ID: <534361D5.6070109@FreeBSD.org> In-Reply-To: <53430F72.1040307@gibfest.dk> References: <53430F72.1040307@gibfest.dk>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] On 4/7/2014 3:49 PM, Thomas Steen Rasmussen wrote: > Hello, > > http://heartbleed.com/ describes an openssl vulnerability published > today. We are going to need an advisory for the openssl in base in > FreeBSD 10 and we are also going to need an updated port. > > The implications of this vulnerability are pretty massive, > certificates will need to be replaced and so on. I don't want to > repeat the page, so go read that. > > Best regards, > > > /Thomas Steen Rasmussen > > ps. there is a bit on the openssl site too: > https://www.openssl.org/news/secadv_20140407.txt The port has been updated. 1.0.1_10 has the fix. -- Regards, Bryan Drewery [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (MingW32) Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/ iQEcBAEBAgAGBQJTQ2HWAAoJEDXXcbtuRpfPwlAIAKDtXjdC8TbcVGLJAC9iajLd Cc+7cc/y9Rxs0ALQlzjPrt4NwTCdoCffJkRSDpvvUL/ciIU8hEjctEDAREEqLyg7 E2dM5YlXeqNzsu7X5x5dnh1+QjKZh6/9LvRPYYtgM8mFsIA86hATxuqb1XWYB8/V k8cbPUEyVJk1LXKgh0VhTV6eqSygrhMG8cGMQ760vGG5CdXDkT+pmHFkOkH+0xMz buA2XQI3lvr3Q0CzTDMUUayNDfBZoKJj20L46PoHYsamlzOVG+g3PDuQGAMfu83A l2bzfHaehWgjyxlQev8XiXJZHbgIB9+68hO9og97XkI1750kL2HPCKJS4P2b2BM= =8iwj -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?534361D5.6070109>
