Date: Wed, 25 Aug 2021 07:59:04 -0400 From: mike tancsa <mike@sentex.net> To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-21:16.openssl Message-ID: <44434c22-51c6-92cb-c9de-60fae4764347@sentex.net> In-Reply-To: <20210824205300.305BF72EF@freefall.freebsd.org> References: <20210824205300.305BF72EF@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On 8/24/2021 4:53 PM, FreeBSD Security Advisories wrote: > > Branch/path Hash Revision > ------------------------------------------------------------------------- > stable/13/ 9d31ae318711 stable/13-n246940 > releng/13.0/ 2261c814b7fa releng/13.0-n244759 > stable/12/ r370385 > releng/12.2/ r370396 > ------------------------------------------------------------------------- Hi All, Was reading the original advisory at https://www.openssl.org/news/secadv/20210824.txt and it says "OpenSSL versions 1.0.2y and below are affected by this [CVE-2021-3712] issue." Does it not then impact RELENG11 ? % openssl version OpenSSL 1.0.2u-freebsd 20 Dec 2019 I know RELENG_11 support ends in about a month, but should it not be flagged ? ---Mike
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?44434c22-51c6-92cb-c9de-60fae4764347>