aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorbdrewery <bdrewery@FreeBSD.org>2014-04-08 10:26:45 +0800
committerbdrewery <bdrewery@FreeBSD.org>2014-04-08 10:26:45 +0800
commit6498cccd3833ca14a6c1789042c77d1364277bba (patch)
tree0eea8f729e5d0c4d8cd5cd83224dfa75046c78d0 /security
parentbda56fc4b25e642e8805fd15d777cabe592f80ad (diff)
downloadfreebsd-ports-gnome-6498cccd3833ca14a6c1789042c77d1364277bba.tar.gz
freebsd-ports-gnome-6498cccd3833ca14a6c1789042c77d1364277bba.tar.zst
freebsd-ports-gnome-6498cccd3833ca14a6c1789042c77d1364277bba.zip
Add more information for OpenSSL bug
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml9
1 files changed, 9 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index eca71389625c..85831a0eebf3 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -68,6 +68,15 @@ Note: Please add new entries to the beginning of this file.
<p>Affected users should upgrade to OpenSSL 1.0.1g. Users unable to immediately
upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS.</p>
</blockquote>
+ <blockquote cite="http://www.heartbleed.com">
+ <p>The bug allows anyone on the Internet to read the memory of the
+ systems protected by the vulnerable versions of the OpenSSL software.
+ This compromises the secret keys used to identify the service
+ providers and to encrypt the traffic, the names and passwords of the
+ users and the actual content. This allows attackers to eavesdrop
+ communications, steal data directly from the services and users and
+ to impersonate services and users.</p>
+ </blockquote>
<p>This also covers:</p>
<blockquote cite="https://www.openssl.org/news/vulnerabilities.html#2014-0076">
<p>Fix for the attack described in the paper "Recovering OpenSSL