Date: Wed, 29 Nov 2017 10:36:37 -0800 From: Xin LI <delphij@gmail.com> To: "George L. Yermulnik" <yz@yz.kiev.ua> Cc: "freebsd-security@freebsd.org" <freebsd-security@freebsd.org> Subject: Re: FreeBSD Security Advisory FreeBSD-SA-17:11.openssl Message-ID: <CAGMYy3vyBpVn_a8oO=v9nhGESpXNpmi7-qy378%2BGG4LU2mvNsA@mail.gmail.com> In-Reply-To: <20171129175111.GE9006@yz.kiev.ua> References: <20171129061559.3E4FCC99B@freefall.freebsd.org> <20171129175111.GE9006@yz.kiev.ua>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Nov 29, 2017 at 9:51 AM, George L. Yermulnik <yz@yz.kiev.ua> wrote: > Hello! > > On Wed, 29 Nov 2017 at 06:15:59 (+0000), FreeBSD Security Advisories wrote: > > [...] >> 3) To update your vulnerable system via a source code patch: > >> The following patches have been verified to apply to the applicable >> FreeBSD release branches. > >> a) Download the relevant patch from the location below, and verify the >> detached PGP signature using your PGP utility. > >> [FreeBSD 10.3] >> # fetch https://security.FreeBSD.org/patches/SA-17:11/openssl-10.patch >> # fetch https://security.FreeBSD.org/patches/SA-17:11/openssl-10.patch.asc >> # gpg --verify openssl-10.patch.asc > [...] > > Is the patch above is indeed FreeBSD_10.3_specific as it might be > considered according to the block name ("[FreeBSD 10.3]")? > Would it apply cleanly on 10.4? Yes it would apply cleanly on 10.4.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAGMYy3vyBpVn_a8oO=v9nhGESpXNpmi7-qy378%2BGG4LU2mvNsA>