[prev in list] [next in list] [prev in thread] [next in thread]
List: gentoo-user
Subject: Re: [gentoo-user] logjam vulnerability
From: "Stefan G. Weichinger" <lists () xunil ! at>
Date: 2015-05-21 16:16:41
Message-ID: 555E04E9.80601 () xunil ! at
[Download RAW message or body]
On 21.05.2015 17:09, Paul Tobias wrote:
>> for apache-2.2.29 (=stable gentoo package) I googled that one has to
>>
>> # cat dhparams.pem >> /my/ssl_cert_file
>>
>> and restart apache
>
> Hmm, where did you read that?
for example, in here:
http://serverfault.com/questions/693241/how-to-fix-logjam-vulnerability-in-apache-httpd/693244#693244
but also in a german thread somewhere.
> With apache 2.2 you'll have to patch manually for now, for example
> this patch: http://serverfault.com/a/693448/88476 I don't run any
> apache 2.2 instances so I can't test.
>
> Fortunately it's quite easy to apply custom patches with gentoo:
> https://wiki.gentoo.org/wiki//etc/portage/patches
sure, no problem.
Don't you think there will be an updated ebuild in portage soon?
so far nothing on b.g.o.
Stefan
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic