On Mon, 7 Apr 2014 18:38:58 -0700 Dave Taht <[email protected]> wrote:
> This one looks pretty nasty. > > see http://lwn.net/Articles/593683/ for more details. > > The headache and cost of updating all the gear I maintain is insanely high. > > Some of my OSes are so old as to no longer have updates, others have ssl certs > that I can now no longer trust for email or imap, still others work on > the vpn... and I only have a few dozen machines to fix, personally. Actually, not as bad as it looks. The old OS's did not get more recent versions of OpenSSL which have the bug. So in this case lazy vendors win out. >From heartbleed.com: Some operating system distributions that have shipped with potentially vulnerable OpenSSL version: Debian Wheezy (stable), OpenSSL 1.0.1e-2+deb7u4 Ubuntu 12.04.4 LTS, OpenSSL 1.0.1-4ubuntu5.11 CentOS 6.5, OpenSSL 1.0.1e-15 Fedora 18, OpenSSL 1.0.1e-4 OpenBSD 5.3 (OpenSSL 1.0.1c 10 May 2012) and 5.4 (OpenSSL 1.0.1c 10 May 2012) FreeBSD 10.0 - OpenSSL 1.0.1e 11 Feb 2013 NetBSD 5.0.2 (OpenSSL 1.0.1e) OpenSUSE 12.2 (OpenSSL 1.0.1c) Operating system distribution with versions that are not vulnerable: Debian Squeeze (oldstable), OpenSSL 0.9.8o-4squeeze14 SUSE Linux Enterprise Server FreeBSD 8.4 - OpenSSL 0.9.8y 5 Feb 2013 FreeBSD 9.2 - OpenSSL 0.9.8y 5 Feb 2013 FreeBSD Ports - OpenSSL 1.0.1g (At 7 Apr 21:46:40 2014 UTC) _______________________________________________ Cerowrt-devel mailing list [email protected] https://lists.bufferbloat.net/listinfo/cerowrt-devel
