看板FB_security
标 题Re: FreeBSD's heartbleed response
发信站NCTU CS FreeBSD Server (Tue Apr 8 23:09:20 2014)
转信站ptt!csnews.cs.nctu!news.cednctu!FreeBSD.cs.nctu!.POSTED!freebsd.org!ow
Uh, an excuse for what exactly? You must be talking about installing
1.0.1 from the ports. That was fixed yesterday by updating the version
in ports to 1.0.1g:
http://svnweb.freebsd.org/ports?view=revision&revision=350548
-nd.
On Tue, Apr 8, 2014 at 2:54 PM, Niklaus Schiess <
[email protected]> wrote:
> Plenty of FreeBSD deployments use 1.0.1x due to the lack of TLS 1.2
> support in 0.9.x. So thats not an excuse.
>
> On 08.04.2014 19:50, Andrei wrote:
>> On Tue, 8 Apr 2014 10:46:12 -0700
>> Mark Boolootian <
[email protected]> wrote:
>>
>>> While it may not be quite what you're looking for, ports contains
>>> OpenSSL 1.0.1g.
>>
>> And also FreeBSD 8.x/9.x not affected because have 0.9.x OpenSSL in base.
>> _______________________________________________
>>
[email protected] mailing list
>>
http://lists.freebsd.org/mailman/listinfo/freebsd-security
>> To unsubscribe, send any mail to "
[email protected]"
>>
>
> --
> PGP FP: CB84 8C68 ADDB 6C50 7DF1 4227 F2A6 056A A799 76DA
> _______________________________________________
> [email protected] mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-security
> To unsubscribe, send any mail to "[email protected]"
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "
[email protected]"