看板FB_security
标 题Re: http://heartbleed.com/
发信站FreeBSD (Tue Apr 8 05:41:25 2014)
转信站ptt!csnews.cs.nctu!news.cednctu!FreeBSD.cs.nctu!.POSTED!freebsd.org!ow
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--UdKbaQ2b8iM932vBiR62DvitLjKEuwEur
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
On 4/7/2014 3:49 PM, Thomas Steen Rasmussen wrote:
> Hello,
>=20
> http://heartbleed.com/ describes an openssl vulnerability published
> today. We are going to need an advisory for the openssl in base in
> FreeBSD 10 and we are also going to need an updated port.
>=20
> The implications of this vulnerability are pretty massive,
> certificates will need to be replaced and so on. I don't want to
> repeat the page, so go read that.
>=20
> Best regards,
>=20
>=20
> /Thomas Steen Rasmussen
>=20
> ps. there is a bit on the openssl site too:
> https://www.openssl.org/news/secadv_20140407.txt
The port has been updated. 1.0.1_10 has the fix.
--=20
Regards,
Bryan Drewery
--UdKbaQ2b8iM932vBiR62DvitLjKEuwEur
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Thunderbird -
http://www.enigmail.net/
iQEcBAEBAgAGBQJTQ2HWAAoJEDXXcbtuRpfPwlAIAKDtXjdC8TbcVGLJAC9iajLd
Cc+7cc/y9Rxs0ALQlzjPrt4NwTCdoCffJkRSDpvvUL/ciIU8hEjctEDAREEqLyg7
E2dM5YlXeqNzsu7X5x5dnh1+QjKZh6/9LvRPYYtgM8mFsIA86hATxuqb1XWYB8/V
k8cbPUEyVJk1LXKgh0VhTV6eqSygrhMG8cGMQ760vGG5CdXDkT+pmHFkOkH+0xMz
buA2XQI3lvr3Q0CzTDMUUayNDfBZoKJj20L46PoHYsamlzOVG+g3PDuQGAMfu83A
l2bzfHaehWgjyxlQev8XiXJZHbgIB9+68hO9og97XkI1750kL2HPCKJS4P2b2BM=
=8iwj
-----END PGP SIGNATURE-----
--UdKbaQ2b8iM932vBiR62DvitLjKEuwEur--