|
Message-ID: <5344D03D.1040801@oracle.com> Date: Tue, 08 Apr 2014 21:44:45 -0700 From: Alan Coopersmith <alan.coopersmith@...cle.com> To: oss-security@...ts.openwall.com CC: Kurt Seifried <kseifried@...hat.com> Subject: Re: Other instances of CVE-2014-0160 - mod_spdy from Google On 04/ 8/14 08:59 PM, Kurt Seifried wrote: > So it appears there are projects that statically compile OpenSSL into > their software, one example: > > https://code.google.com/p/mod-spdy/ https://www.stunnel.org/sdf_ChangeLog.html lists: Version 5.01, 2014.04.08, urgency: HIGH: Security bugfixes OpenSSL DLLs updated to version 1.0.1g. This version mitigates TLS heartbeat read overrun (CVE-2014-0160). but that appears be only for the precompiled Windows binaries they offer for download, as it doesn't contain a copy of OpenSSL in the source tarballs for Linux/UNIX distros, but instead searches for one in configure.ac. -- -Alan Coopersmith- alan.coopersmith@...cle.com Oracle Solaris Engineering - http://blogs.oracle.com/alanc
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.