Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 31 Jul 2002 07:57:30 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        Sune Stjerneby <sst@vmunix.dk>
Cc:        security@freebsd.org
Subject:   Re: apache mod_ssl ?
Message-ID:  <5.1.0.14.0.20020731075521.04b14d70@192.168.0.12>
In-Reply-To: <20020731085657.GA33775@fnyx.vmunix.dk>
References:  <5.1.0.14.0.20020730231635.040ee248@192.168.0.12> <5.1.0.14.0.20020730231635.040ee248@192.168.0.12>

next in thread | previous in thread | raw e-mail | index | archive | help


Thanks, looks like my local copy libphp4.so as well :-(  Anyone know of any 
other apps statically compiled with bits of the vulnerable openssl out of 
the ports that would be affected ?

         ---Mike

At 10:56 AM 7/31/2002 +0200, Sune Stjerneby wrote:
>Mike Tancsa writes:
> >After a buildworld, do I need to worry about apache with mod_ssl ? Are
> >there parts that are statically compiled using openSSL ?
>
>I suspect so,
>
>% strings /usr/local/libexec/apache/libssl.so | egrep "0\.9\.6"
>OpenSSL 0.9.6a 5 Apr 2001
>
>After a rebuild, it reads "OpenSSL 0.9.6e 30 Jul 2002" in
>apache/libssl.so.
>
>--
>Sune Stjerneby <sst@vmunix.dk>
>  % bloto flem rech rech kini

--------------------------------------------------------------------
Mike Tancsa,                          	          tel +1 519 651 3400
Sentex Communications,     			  mike@sentex.net
Providing Internet since 1994                    www.sentex.net
Cambridge, Ontario Canada			  www.sentex.net/mike


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.0.14.0.20020731075521.04b14d70>