FreeBSD's heartbleed response

Nathan Dorfman na at rtfm.net
Tue Apr 8 19:09:21 UTC 2014


Uh, an excuse for what exactly? You must be talking about installing
1.0.1 from the ports. That was fixed yesterday by updating the version
in ports to 1.0.1g:

http://svnweb.freebsd.org/ports?view=revision&revision=350548

-nd.

On Tue, Apr 8, 2014 at 2:54 PM, Niklaus Schiess <nschiess at adversec.com> wrote:
> Plenty of FreeBSD deployments use 1.0.1x due to the lack of TLS 1.2
> support in 0.9.x. So thats not an excuse.
>
> On 08.04.2014 19:50, Andrei wrote:
>> On Tue, 8 Apr 2014 10:46:12 -0700
>> Mark Boolootian <booloo at ucsc.edu> wrote:
>>
>>> While it may not be quite what you're looking for, ports contains
>>> OpenSSL 1.0.1g.
>>
>> And also FreeBSD 8.x/9.x not affected because have 0.9.x OpenSSL in base.
>> _______________________________________________
>> freebsd-security at freebsd.org mailing list
>> http://lists.freebsd.org/mailman/listinfo/freebsd-security
>> To unsubscribe, send any mail to "freebsd-security-unsubscribe at freebsd.org"
>>
>
> --
> PGP FP: CB84 8C68 ADDB 6C50 7DF1 4227 F2A6 056A A799 76DA
> _______________________________________________
> freebsd-security at freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-security
> To unsubscribe, send any mail to "freebsd-security-unsubscribe at freebsd.org"


More information about the freebsd-security mailing list