Date: Fri, 02 Aug 2002 11:39:47 +0200 From: dirk.meyer@dinoex.sub.org (Dirk Meyer) To: freebsd-security@FreeBSD.ORG Subject: Re: About the openssl hole Message-ID: <5VuZasl8L8@dmeyer.dinoex.sub.org> References: <3D47402F.83B37CBA@pantherdragon.org> <B365B37E-A51B-11D6-809A-0030654D97EC@patpro.net>
next in thread | previous in thread | raw e-mail | index | archive | help
patpro wrote: > If I just : > - update openSSL port > - recompile every port that use openSSL (openSSH, Apache+mod_ssl, ....) > will I be safe from remote attack ? openSSH Apache+mod_ssl .... works fine. Ervery port that inlcudes Makefile.ssl will use the port version. You can check it with ldd: libcrypto.3 or libssl.3 are used. Some ports will still link with the base versions, there are open PR's about it ... kind regards Dirk - Dirk Meyer, Im Grund 4, 34317 Habichtswald, Germany - [dirk.meyer@dinoex.sub.org],[dirk.meyer@guug.de],[dinoex@FreeBSD.org] To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5VuZasl8L8>
