diff options
author | bdrewery <bdrewery@FreeBSD.org> | 2014-04-08 10:26:45 +0800 |
---|---|---|
committer | bdrewery <bdrewery@FreeBSD.org> | 2014-04-08 10:26:45 +0800 |
commit | 6498cccd3833ca14a6c1789042c77d1364277bba (patch) | |
tree | 0eea8f729e5d0c4d8cd5cd83224dfa75046c78d0 /security | |
parent | bda56fc4b25e642e8805fd15d777cabe592f80ad (diff) | |
download | freebsd-ports-gnome-6498cccd3833ca14a6c1789042c77d1364277bba.tar.gz freebsd-ports-gnome-6498cccd3833ca14a6c1789042c77d1364277bba.tar.zst freebsd-ports-gnome-6498cccd3833ca14a6c1789042c77d1364277bba.zip |
Add more information for OpenSSL bug
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index eca71389625c..85831a0eebf3 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -68,6 +68,15 @@ Note: Please add new entries to the beginning of this file. <p>Affected users should upgrade to OpenSSL 1.0.1g. Users unable to immediately upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS.</p> </blockquote> + <blockquote cite="http://www.heartbleed.com"> + <p>The bug allows anyone on the Internet to read the memory of the + systems protected by the vulnerable versions of the OpenSSL software. + This compromises the secret keys used to identify the service + providers and to encrypt the traffic, the names and passwords of the + users and the actual content. This allows attackers to eavesdrop + communications, steal data directly from the services and users and + to impersonate services and users.</p> + </blockquote> <p>This also covers:</p> <blockquote cite="https://www.openssl.org/news/vulnerabilities.html#2014-0076"> <p>Fix for the attack described in the paper "Recovering OpenSSL |