diff options
author | Bryan Drewery <bdrewery@FreeBSD.org> | 2014-04-08 10:26:45 +0800 |
---|---|---|
committer | Bryan Drewery <bdrewery@FreeBSD.org> | 2014-04-08 10:26:45 +0800 |
commit | d7cc8f7f009c5ce75407b1c89bd9fadc5b1570ad (patch) | |
tree | 0eea8f729e5d0c4d8cd5cd83224dfa75046c78d0 | |
parent | 504c95912c00288f4c189639ec35591edb85154d (diff) | |
download | freebsd-ports-gnome-d7cc8f7f009c5ce75407b1c89bd9fadc5b1570ad.tar.gz freebsd-ports-gnome-d7cc8f7f009c5ce75407b1c89bd9fadc5b1570ad.tar.zst freebsd-ports-gnome-d7cc8f7f009c5ce75407b1c89bd9fadc5b1570ad.zip |
Add more information for OpenSSL bug
-rw-r--r-- | security/vuxml/vuln.xml | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index eca71389625c..85831a0eebf3 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -68,6 +68,15 @@ Note: Please add new entries to the beginning of this file. <p>Affected users should upgrade to OpenSSL 1.0.1g. Users unable to immediately upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS.</p> </blockquote> + <blockquote cite="http://www.heartbleed.com"> + <p>The bug allows anyone on the Internet to read the memory of the + systems protected by the vulnerable versions of the OpenSSL software. + This compromises the secret keys used to identify the service + providers and to encrypt the traffic, the names and passwords of the + users and the actual content. This allows attackers to eavesdrop + communications, steal data directly from the services and users and + to impersonate services and users.</p> + </blockquote> <p>This also covers:</p> <blockquote cite="https://www.openssl.org/news/vulnerabilities.html#2014-0076"> <p>Fix for the attack described in the paper "Recovering OpenSSL |