From owner-freebsd-security@FreeBSD.ORG Sat Nov 30 03:35:24 2013 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 32A0AAB7 for ; Sat, 30 Nov 2013 03:35:24 +0000 (UTC) Received: from anubis.delphij.net (anubis.delphij.net [IPv6:2001:470:1:117::25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 1150014FD for ; Sat, 30 Nov 2013 03:35:24 +0000 (UTC) Received: from delphij-macbook.local (c-67-188-85-47.hsd1.ca.comcast.net [67.188.85.47]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by anubis.delphij.net (Postfix) with ESMTPSA id 51E991FA0F; Fri, 29 Nov 2013 19:35:23 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=delphij.net; s=anubis; t=1385782523; bh=Uf5VjO0xXMp79/JnL0e0gVw33F3dBoGNSJLWX2pufMU=; h=Date:From:Reply-To:To:Subject:References:In-Reply-To; b=LzI7OU5H0uHJfwQW8viyIDt0QIaQNk0/Pq8q9/hXDEXj0szkaOO7TQ3C9CLfwcKKz SiSy0mZZOCw1ID1OmgFuR2G5yJQ9+lv+8ZpGk/LxmAGHvGvMTJN0ONaZkNT9UBB/Xm CA+QgABsYa5b1v76E4U7sMqjfCvkZSMzTdgKnh88= Message-ID: <52995CFA.9060800@delphij.net> Date: Fri, 29 Nov 2013 19:35:22 -0800 From: Xin Li Organization: The FreeBSD Project MIME-Version: 1.0 To: Rob , freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-13:14.openssh [REVISED] References: <201311290108.rAT183ZZ087711@freefall.freebsd.org> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.16 Precedence: list Reply-To: d@delphij.net List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 30 Nov 2013 03:35:24 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 11/29/13, 1:14 PM, Rob wrote: > Hi, > > Why isn't this bug being fixed in 9.1? FreeBSD 9.x are not affected because the earlier FreeBSD releases do not ship with OpenSSL that supports AES-GCM, therefore, OpenSSH would not support it and thus not vulnerable. Hope this helps. Cheers, -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJSmVz6AAoJEJW2GBstM+nsvY0P/A0jhMRLaIMO1OE3cZr7FodQ l7zpR35D3b35cdZy7EAnsRhnR4wGs60SDI0A0NTrM517TvlkUjJSc+FZ8DvTrhCV vp7EH4GtoOfplAtGlzwmTHc1dQfgBMEU4Xe2r81jIkfgyyA3XbXITgpEX34S3Qk5 Q51oTN0EqkVfnQ4qwV7brfaAItnjjqoX5g+MIKcRon4uD+DHA4FYqXZhH1qp2lz/ bd+QIJneq+WL1W9w81EbzTjdsSvqZFHdxG5I2CSYzvZiUq5X5jyFqzUCvH9mhtGs qxtEev3qNGsC8SwMYXskIOxApsfyXfuP0JZOeC9BQ7e+xn3ozotP2kjKYECCArL9 AS/U2S9JET2QwQUhsk/T1crlUC9QDv2lRB+fpUL/Ax0fEBUuNfyNwUbucSXrVl9/ IU7vrFSKn5Dod9N8mbKiWQsnqslYVW1/dyzsN0NsEmvSy8Xg7GyJkaiJaoUpRuA+ BS02TNgUUsusSh3doQYou6ZllDe7E460VFTh0T+iShQ0HjLHhXnt1kRFsMeTmYIk Ec7FvxguPqhR19qwIDhyr3OWOIKMgJbxhOV3iwLyZ8xPMPY9PIrP+L+57RZPzXWs IpjTk3KZdT5ANO39YJey1EbHPJRzdggIE7WFEnDGxg/ZLL0lINXlrOk8g14xqsnD wbz+mXFxkeHwudQBDdDV =zF9y -----END PGP SIGNATURE-----