Linux64 in place, tests good. 
          Now to conduct full testing... 
          LCR Computer Services, Inc. 
          
            Thanks for spotting that, looks like we updated that
              build in june last year for some reason. We'll check the
              others to be sure. 
            
            
            
            Full distributions will be done shortly but the above
              should be sufficient for anyone who needs a fix in a
              hurry. 
            (stop surgemail, replace the binary, start surgemail) 
            ChrisP. 
             
            Chris, 
            If all other platforms were running OpenSSL v0.98 until
              a few 
            days ago, why is our release (SurgeMail Version
              6.5b-52, Built 
            Jan 11 2014 10:30:54, Platform Linux_64 (Surgeweb
              Enabled)) 
            running 1.0.1e? 
            mail1:~# tellmail status | grep OpenSSL 
            SSL/TLS (OpenSSL 1.0.1e 11 Feb 2013), Allow=(*) 
            mail1:~# 
            Perhaps because we got a custom build? 
            Regards, 
            Frank 
            
            Sent: Tuesday, April 08, 2014 5:00 PM 
            
            Subject: re: Re: [SurgeMail List] CVE-2014-0160 a. k.
              a.Heartbleed 
            Right, as far as I can recall all platforms other than
              solaris 
            x86 were on 9.8 of openssl until a few days ago
              (because we 
            preferred the stability of that version) then about a
              week ago we 
            started changing to 1.0.1f on linux and windows to
              allow the use 
            of some of the better encryption features it provided
              to protect 
            ya'll from the NSA :-). 
            So to quickly check if you have a problem do this: 
            WINDOWS: tellmail status | find "OpenSSL" 
            SSL/TLS (OpenSSL 1.0.1f 6 Jan 2014), Allow=(*) 
            UNIX: tellmail status | grep "OpenSSL" 
            SSL/TLS (OpenSSL 1.0.1f 6 Jan 2014), Allow=(*) 
            If you see '1.0.1' then you have a problem, if you see
              0.9.8... 
            then you are all good and can relax. 
            We will be doing new builds for all affected systems in
              the next 
            hour or two and will post the 
            builds to this list. 
            ChrisP. 
            Both 6.5a and 6.6a for Solaris x64 are vulnerable. 
            It would be great to get some guidance from NetWin on
              this. 
            They may, of course, be busy right now. 
            Best, 
            Chris 
            Am 08.04.2014 um 23:35 schrieb Steffen 
            
            I am running Windows 6.6b-7 (has 0.9.8r) and it is
              statically 
            linked. So that is save. I hope that Netwin is not
              supplying a 
            build with 1..0.1f for Windows and other platforms.