Date: Mon, 07 Apr 2014 22:27:09 -0400 From: Mike Tancsa <mike@sentex.net> To: d@delphij.net, freebsd-security@freebsd.org Subject: Re: http://heartbleed.com/ Message-ID: <53435E7D.5000801@sentex.net> In-Reply-To: <53431275.4080906@delphij.net> References: <53430F72.1040307@gibfest.dk> <53431275.4080906@delphij.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On 4/7/2014 5:02 PM, Xin Li wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > Hi, Thomas, > > On 04/07/14 13:49, Thomas Steen Rasmussen wrote: >> Hello, >> >> http://heartbleed.com/ describes an openssl vulnerability >> published today. We are going to need an advisory for the openssl >> in base in FreeBSD 10 and we are also going to need an updated >> port. >> >> The implications of this vulnerability are pretty massive, >> certificates will need to be replaced and so on. I don't want to >> repeat the page, so go read that. > > We are already working on this but building, reviewing, etc. would > take some time. > Hi, The webpage lists FreeBSD 8.4 (OpenSSL 1.0.1e) and 9.1 (OpenSSL 1.0.1c) I take it this is only if you installed from the ports no ? ---Mike -- ------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike@sentex.net Providing Internet services since 1994 www.sentex.net Cambridge, Ontario Canada http://www.tancsa.com/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?53435E7D.5000801>