Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 29 Nov 2017 19:51:11 +0200
From:      "George L. Yermulnik" <yz@yz.kiev.ua>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-17:11.openssl
Message-ID:  <20171129175111.GE9006@yz.kiev.ua>
In-Reply-To: <20171129061559.3E4FCC99B@freefall.freebsd.org>
References:  <20171129061559.3E4FCC99B@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Hello!

On Wed, 29 Nov 2017 at 06:15:59 (+0000), FreeBSD Security Advisories wrote:

[...]
> 3) To update your vulnerable system via a source code patch:

> The following patches have been verified to apply to the applicable
> FreeBSD release branches.

> a) Download the relevant patch from the location below, and verify the
> detached PGP signature using your PGP utility.

> [FreeBSD 10.3]
> # fetch https://security.FreeBSD.org/patches/SA-17:11/openssl-10.patch
> # fetch https://security.FreeBSD.org/patches/SA-17:11/openssl-10.patch.asc
> # gpg --verify openssl-10.patch.asc
[...]

Is the patch above is indeed FreeBSD_10.3_specific as it might be
considered according to the block name ("[FreeBSD 10.3]")?
Would it apply cleanly on 10.4?

-- 
George L. Yermulnik
[YZ-RIPE]



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20171129175111.GE9006>