Re: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-10:05.opie

2010-05-27 Thread Lena
> # fetch http://security.FreeBSD.org/patches/SA-10-05/opie.patch > # fetch http://security.FreeBSD.org/patches/SA-10-05/opie.patch.asc A typo: ~ # fetch http://security.FreeBSD.org/patches/SA-10-05/opie.patch fetch: http://security.FreeBSD.org/patches/SA-10-05/opie.patch: Not Found Correct URL

Re: FreeBSD Security Advisory FreeBSD-SA-14:06.openssl

2014-04-09 Thread Lena
> >systems that do not use OpenSSL to implement > >the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) > >protocols implementation and do not use the ECDSA implementation from OpenSSL > >are not vulnerable. > > Please help me find out if my systems are vulnerable. > > I use

Re: Security Advisory FreeBSD-SA-15:06.openssl

2015-03-19 Thread Lena
> No workaround is available. Isn't using OpenSSL from ports a workaround? ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org

openssl-1.0.2l

2017-05-26 Thread Lena
Under FreeBSD 8 (with GCC 4.2.1): cc -I.. -I../.. -I../modes -I../asn1 -I../evp -I../../include -fPIC -DOPENSSL_P IC -DZLIB_SHARED -DZLIB -DOPENSSL_THREADS -pthread -D_THREAD_SAFE -D_REENTRANT - DDSO_DLFCN -DHAVE_DLFCN_H -Wa,--noexecstack -DL_ENDIAN -O3 -fomit-frame-pointer -Wall -O2 -pipe -march

Re: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-18:12.elf

2018-10-06 Thread Lena
> Insufficient validation was performed in the ELF header parser, and malformed > or otherwise invalid ELF binaries were not rejected as they should be. What is invalid in the /usr/local/share/google-earth/googleearth-bin binary of the port google-earth-7.1.5.1557,3 ? FreeBSD 11.2-RELEASE-p4 Sep