Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 29 Nov 2013 19:35:22 -0800
From:      Xin Li <delphij@delphij.net>
To:        Rob <robtsgt@gmail.com>, freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-13:14.openssh [REVISED]
Message-ID:  <52995CFA.9060800@delphij.net>
In-Reply-To: <AFE3C7EE-B8BE-42F6-BE3D-47E1B07E6FEA@gmail.com>
References:  <201311290108.rAT183ZZ087711@freefall.freebsd.org> <AFE3C7EE-B8BE-42F6-BE3D-47E1B07E6FEA@gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 11/29/13, 1:14 PM, Rob wrote:
> Hi,
> 
> Why isn't this bug being fixed in 9.1?

FreeBSD 9.x are not affected because the earlier FreeBSD releases do
not ship with OpenSSL that supports AES-GCM, therefore, OpenSSH would
not support it and thus not vulnerable.

Hope this helps.

Cheers,
-----BEGIN PGP SIGNATURE-----
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=zF9y
-----END PGP SIGNATURE-----



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?52995CFA.9060800>