Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 29 Nov 2017 10:36:37 -0800
From:      Xin LI <delphij@gmail.com>
To:        "George L. Yermulnik" <yz@yz.kiev.ua>
Cc:        "freebsd-security@freebsd.org" <freebsd-security@freebsd.org>
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-17:11.openssl
Message-ID:  <CAGMYy3vyBpVn_a8oO=v9nhGESpXNpmi7-qy378%2BGG4LU2mvNsA@mail.gmail.com>
In-Reply-To: <20171129175111.GE9006@yz.kiev.ua>
References:  <20171129061559.3E4FCC99B@freefall.freebsd.org> <20171129175111.GE9006@yz.kiev.ua>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Nov 29, 2017 at 9:51 AM, George L. Yermulnik <yz@yz.kiev.ua> wrote:
> Hello!
>
> On Wed, 29 Nov 2017 at 06:15:59 (+0000), FreeBSD Security Advisories wrote:
>
> [...]
>> 3) To update your vulnerable system via a source code patch:
>
>> The following patches have been verified to apply to the applicable
>> FreeBSD release branches.
>
>> a) Download the relevant patch from the location below, and verify the
>> detached PGP signature using your PGP utility.
>
>> [FreeBSD 10.3]
>> # fetch https://security.FreeBSD.org/patches/SA-17:11/openssl-10.patch
>> # fetch https://security.FreeBSD.org/patches/SA-17:11/openssl-10.patch.asc
>> # gpg --verify openssl-10.patch.asc
> [...]
>
> Is the patch above is indeed FreeBSD_10.3_specific as it might be
> considered according to the block name ("[FreeBSD 10.3]")?
> Would it apply cleanly on 10.4?

Yes it would apply cleanly on 10.4.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAGMYy3vyBpVn_a8oO=v9nhGESpXNpmi7-qy378%2BGG4LU2mvNsA>