-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dear all,
We are very concerned about the 'Heartbeat' security problem which has
been discovered with OpenSSL. Thanks to our out-of-date old-stable
version of debian, we are using:
openssl 0.9.8o-4squeeze14
This page also claims debian 6 (which
...@lists.noflag.org.uk
Betreff: Re: [SECURITY] [DSA 2896-1] openssl security update
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dear all,
We are very concerned about the 'Heartbeat' security problem which has
been discovered with OpenSSL. Thanks to our out-of-date old-stable
version
On 11.04.2014, at 17:26, daniel dan...@noflag.org.uk wrote:
We are very concerned about the 'Heartbeat' security problem which has
been discovered with OpenSSL. Thanks to our out-of-date old-stable
version of debian, we are using:
openssl 0.9.8o-4squeeze14
This page also claims debian
?
(for mod_spy you need an Apache HTTP Server 2.4.X, in squeeze there
is only 2.2.16 ...)
Gesendet: Freitag, 11. April 2014 um 17:26 Uhr Von: daniel
dan...@noflag.org.uk An: debian-security@lists.debian.org Cc: -
Noflag ad...@lists.noflag.org.uk Betreff: Re: [SECURITY] [DSA
2896-1] openssl
On Sat, Apr 12, 2014 at 10:01 AM, daniel wrote:
Mod_spdy has a statically-linked vulnerable version of OpenSSL
That sounds like a pretty bad bug in your copy of mod_spdy, please ask
the vendor of your copy of mod_spdy to fix this by depending on the
OpenSSL shared library instead of statically
5 matches
Mail list logo