From owner-freebsd-security@freebsd.org Wed Apr 22 07:31:31 2020 Return-Path: Delivered-To: freebsd-security@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6D27E2A9588 for ; Wed, 22 Apr 2020 07:31:31 +0000 (UTC) (envelope-from SRS0=Wzxz=6G=quip.cz=000.fbsd@elsa.codelab.cz) Received: from elsa.codelab.cz (elsa.codelab.cz [94.124.105.4]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 496XDg0GXDz3LqD; Wed, 22 Apr 2020 07:31:30 +0000 (UTC) (envelope-from SRS0=Wzxz=6G=quip.cz=000.fbsd@elsa.codelab.cz) Received: from elsa.codelab.cz (localhost [127.0.0.1]) by elsa.codelab.cz (Postfix) with ESMTP id 521DC28438; Wed, 22 Apr 2020 09:31:28 +0200 (CEST) Received: from illbsd.quip.test (ip-62-24-92-232.net.upcbroadband.cz [62.24.92.232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by elsa.codelab.cz (Postfix) with ESMTPSA id 28BAF28433; Wed, 22 Apr 2020 09:31:27 +0200 (CEST) Subject: Re: FreeBSD Security Advisory FreeBSD-SA-20:11.openssl To: freebsd-security@freebsd.org, FreeBSD Security Advisories References: <20200421165520.51D141CE03@freefall.freebsd.org> From: Miroslav Lachman <000.fbsd@quip.cz> Message-ID: <86c2a15b-a1d2-883a-51c7-245dcfbc1b94@quip.cz> Date: Wed, 22 Apr 2020 09:31:26 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.6.0 MIME-Version: 1.0 In-Reply-To: <20200421165520.51D141CE03@freefall.freebsd.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 496XDg0GXDz3LqD X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-6.00 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; REPLY(-4.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 22 Apr 2020 07:31:31 -0000 On 2020-04-21 18:55, FreeBSD Security Advisories wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > ============================================================================= > FreeBSD-SA-20:11.openssl Security Advisory > The FreeBSD Project > > Topic: OpenSSL remote denial of service vulnerability > > Category: contrib > Module: openssl > Announced: 2020-04-21 > Credits: Bernd Edlinger > Affects: FreeBSD 12.1 > Corrected: 2020-04-21 15:47:58 UTC (stable/12, 12.1-STABLE) > 2020-04-21 15:53:08 UTC (releng/12.1, 12.1-RELEASE-p4) > CVE Name: CVE-2020-1967 VuXML entry indicated 11.3 as vulnerable even if original SA has Affected: 12.1 only. https://vuxml.freebsd.org/freebsd/012809ce-83f3-11ea-92ab-00163e433440.html Can you please update VuXML entry or original SA? Kind regards Miroslav Lachman