Michael Paoli
2014-04-12 21:37:07 UTC
HeartBleed: BALUG.org & SF-LUG.{org,com} NOT vulnerable
For those that may be wondering if the BALUG.org and/or SF-LUG.{org,com}
sites are or were vulnerable to the HeartBleed OpenSSL security bug,
the answer is they are not and were not vulnerable.
Technical details:
BALUG
BALUG's hosts under the BALUG.org domain are running:
Debian GNU/Linux 6.0.x "Squeeze" ("oldstable")
One of those hosts is qemu-kvm guest which runs atop physical host:
"vicki"
see also references further below
SF-LUG
[www.]SF-LUG.{org,com} is qemu-kvm guest host running:
Debian GNU/Linux 6.0.x "Squeeze" ("oldstable")
that guest host runs on physical host "vicki"
see also references further below
"vicki":
physical host running:
Debian GNU/Linux 6.0.x "Squeeze" ("oldstable")
see also references further below
Debian GNU/Linux 6.0.x "Squeeze" ("oldstable")
Not vulnerable, see:
https://lists.debian.org/debian-security-announce/2014/msg00071.html
see also:
https://lists.debian.org/debian-security-announce/2014/msg00072.html
For those that may be wondering if the BALUG.org and/or SF-LUG.{org,com}
sites are or were vulnerable to the HeartBleed OpenSSL security bug,
the answer is they are not and were not vulnerable.
Technical details:
BALUG
BALUG's hosts under the BALUG.org domain are running:
Debian GNU/Linux 6.0.x "Squeeze" ("oldstable")
One of those hosts is qemu-kvm guest which runs atop physical host:
"vicki"
see also references further below
SF-LUG
[www.]SF-LUG.{org,com} is qemu-kvm guest host running:
Debian GNU/Linux 6.0.x "Squeeze" ("oldstable")
that guest host runs on physical host "vicki"
see also references further below
"vicki":
physical host running:
Debian GNU/Linux 6.0.x "Squeeze" ("oldstable")
see also references further below
Debian GNU/Linux 6.0.x "Squeeze" ("oldstable")
Not vulnerable, see:
https://lists.debian.org/debian-security-announce/2014/msg00071.html
see also:
https://lists.debian.org/debian-security-announce/2014/msg00072.html