Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 22 Apr 2020 13:30:12 -0700
From:      Gordon Tetlow <gordon@tetlows.org>
To:        Miroslav Lachman <000.fbsd@quip.cz>
Cc:        freebsd-security <freebsd-security@freebsd.org>,  FreeBSD Security Advisories <security-advisories@freebsd.org>
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-20:11.openssl
Message-ID:  <CAKghNw0cyUaopBP3OiOeJShJStUe70jW1iD2HcC40gFmeh-g8A@mail.gmail.com>
In-Reply-To: <86c2a15b-a1d2-883a-51c7-245dcfbc1b94@quip.cz>
References:  <20200421165520.51D141CE03@freefall.freebsd.org> <86c2a15b-a1d2-883a-51c7-245dcfbc1b94@quip.cz>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Apr 22, 2020 at 12:31 AM Miroslav Lachman <000.fbsd@quip.cz> wrote:

> On 2020-04-21 18:55, FreeBSD Security Advisories wrote:
> > -----BEGIN PGP SIGNED MESSAGE-----
> > Hash: SHA512
> >
> >
> =============================================================================
> > FreeBSD-SA-20:11.openssl                                    Security
> Advisory
> >                                                            The FreeBSD
> Project
> >
> > Topic:          OpenSSL remote denial of service vulnerability
> >
> > Category:       contrib
> > Module:         openssl
> > Announced:      2020-04-21
> > Credits:        Bernd Edlinger
> > Affects:        FreeBSD 12.1
> > Corrected:      2020-04-21 15:47:58 UTC (stable/12, 12.1-STABLE)
> >                  2020-04-21 15:53:08 UTC (releng/12.1, 12.1-RELEASE-p4)
> > CVE Name:       CVE-2020-1967
>
> VuXML entry indicated 11.3 as vulnerable even if original SA has
> Affected: 12.1 only.
>
> https://vuxml.freebsd.org/freebsd/012809ce-83f3-11ea-92ab-00163e433440.html
>
> Can you please update VuXML entry or original SA?
>

I've updated VuXML to remove it. Too many copy and pastes.

Thanks for the report!
Gordon



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAKghNw0cyUaopBP3OiOeJShJStUe70jW1iD2HcC40gFmeh-g8A>