Date: Wed, 29 Nov 2017 19:51:11 +0200 From: "George L. Yermulnik" <yz@yz.kiev.ua> To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-17:11.openssl Message-ID: <20171129175111.GE9006@yz.kiev.ua> In-Reply-To: <20171129061559.3E4FCC99B@freefall.freebsd.org> References: <20171129061559.3E4FCC99B@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Hello! On Wed, 29 Nov 2017 at 06:15:59 (+0000), FreeBSD Security Advisories wrote: [...] > 3) To update your vulnerable system via a source code patch: > The following patches have been verified to apply to the applicable > FreeBSD release branches. > a) Download the relevant patch from the location below, and verify the > detached PGP signature using your PGP utility. > [FreeBSD 10.3] > # fetch https://security.FreeBSD.org/patches/SA-17:11/openssl-10.patch > # fetch https://security.FreeBSD.org/patches/SA-17:11/openssl-10.patch.asc > # gpg --verify openssl-10.patch.asc [...] Is the patch above is indeed FreeBSD_10.3_specific as it might be considered according to the block name ("[FreeBSD 10.3]")? Would it apply cleanly on 10.4? -- George L. Yermulnik [YZ-RIPE]
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20171129175111.GE9006>