Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 02 Aug 2002 11:39:47 +0200
From:      dirk.meyer@dinoex.sub.org (Dirk Meyer)
To:        freebsd-security@FreeBSD.ORG
Subject:   Re: About the openssl hole
Message-ID:  <5VuZasl8L8@dmeyer.dinoex.sub.org>
References:  <3D47402F.83B37CBA@pantherdragon.org> <B365B37E-A51B-11D6-809A-0030654D97EC@patpro.net>

next in thread | previous in thread | raw e-mail | index | archive | help

patpro wrote:

> If I just :
> - update openSSL port
> - recompile every port that use openSSL (openSSH, Apache+mod_ssl, ....)
> will I be safe from remote attack ?

openSSH Apache+mod_ssl .... works fine.
Ervery port that inlcudes Makefile.ssl will use the port version.
You can check it with ldd: libcrypto.3 or libssl.3 are used.

Some ports will still link with the base versions,
there are open PR's about it ...

kind regards Dirk

- Dirk Meyer, Im Grund 4, 34317 Habichtswald, Germany
- [dirk.meyer@dinoex.sub.org],[dirk.meyer@guug.de],[dinoex@FreeBSD.org]

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5VuZasl8L8>