Date: Fri, 29 Nov 2013 19:35:22 -0800 From: Xin Li <delphij@delphij.net> To: Rob <robtsgt@gmail.com>, freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-13:14.openssh [REVISED] Message-ID: <52995CFA.9060800@delphij.net> In-Reply-To: <AFE3C7EE-B8BE-42F6-BE3D-47E1B07E6FEA@gmail.com> References: <201311290108.rAT183ZZ087711@freefall.freebsd.org> <AFE3C7EE-B8BE-42F6-BE3D-47E1B07E6FEA@gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 11/29/13, 1:14 PM, Rob wrote: > Hi, > > Why isn't this bug being fixed in 9.1? FreeBSD 9.x are not affected because the earlier FreeBSD releases do not ship with OpenSSL that supports AES-GCM, therefore, OpenSSH would not support it and thus not vulnerable. Hope this helps. Cheers, -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJSmVz6AAoJEJW2GBstM+nsvY0P/A0jhMRLaIMO1OE3cZr7FodQ l7zpR35D3b35cdZy7EAnsRhnR4wGs60SDI0A0NTrM517TvlkUjJSc+FZ8DvTrhCV vp7EH4GtoOfplAtGlzwmTHc1dQfgBMEU4Xe2r81jIkfgyyA3XbXITgpEX34S3Qk5 Q51oTN0EqkVfnQ4qwV7brfaAItnjjqoX5g+MIKcRon4uD+DHA4FYqXZhH1qp2lz/ bd+QIJneq+WL1W9w81EbzTjdsSvqZFHdxG5I2CSYzvZiUq5X5jyFqzUCvH9mhtGs qxtEev3qNGsC8SwMYXskIOxApsfyXfuP0JZOeC9BQ7e+xn3ozotP2kjKYECCArL9 AS/U2S9JET2QwQUhsk/T1crlUC9QDv2lRB+fpUL/Ax0fEBUuNfyNwUbucSXrVl9/ IU7vrFSKn5Dod9N8mbKiWQsnqslYVW1/dyzsN0NsEmvSy8Xg7GyJkaiJaoUpRuA+ BS02TNgUUsusSh3doQYou6ZllDe7E460VFTh0T+iShQ0HjLHhXnt1kRFsMeTmYIk Ec7FvxguPqhR19qwIDhyr3OWOIKMgJbxhOV3iwLyZ8xPMPY9PIrP+L+57RZPzXWs IpjTk3KZdT5ANO39YJey1EbHPJRzdggIE7WFEnDGxg/ZLL0lINXlrOk8g14xqsnD wbz+mXFxkeHwudQBDdDV =zF9y -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?52995CFA.9060800>