看板FB_security
標 題Re: FreeBSD's heartbleed response
發信站NCTU CS FreeBSD Server (Tue Apr 8 22:45:40 2014)
轉信站ptt!csnews.cs.nctu!news.cednctu!FreeBSD.cs.nctu!.POSTED!freebsd.org!ow
Are you sure about that? The only email I saw stated that FreeBSD 8.x
and 9.x weren't vulnerable because they were using an older OpenSSL,
from before the vulnerability was introduced.
FreeBSD 10-STABLE, on the other hand, seems to use the vulnerable
OpenSSL 1.0.1e, and I didn't immediately see OPENSSL_NO_HEARTBEATS in
the Makefile there. So I may well be missing something, but it looks
vulnerable at first glance.
-nd.
On Tue, Apr 8, 2014 at 2:17 PM, Merijn Verstraaten
<
[email protected]> wrote:
> Unless I misunderstood earlier emails, the heartbeat extension os ALREADY
> disabled in base, therefore FreeBSD base isn't vulnerable and the only
> problem is people who installed a newer OpenSSL from ports.
>
> Cheers,
> Merijn
>
>
> ----- Reply message -----
> From: "Nathan Dorfman" <[email protected]>
> To: "Mike Tancsa" <[email protected]>
> Cc: <[email protected]>
> Subject: FreeBSD's heartbleed response
> Date: Tue, Apr 8, 2014 20:05
>
> Someone please correct me if I'm wrong, but I think simply adding
> -DOPENSSL_NO_HEARTBEATS to crypto/openssl/Makefile (and recompiling!) is
> sufficient to remove the vulnerability from the base system.
>
> -nd.
> _______________________________________________
> [email protected] mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-security
> To unsubscribe, send any mail to "[email protected]"
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "
[email protected]"