Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 25 Aug 2021 07:59:04 -0400
From:      mike tancsa <mike@sentex.net>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-21:16.openssl
Message-ID:  <44434c22-51c6-92cb-c9de-60fae4764347@sentex.net>
In-Reply-To: <20210824205300.305BF72EF@freefall.freebsd.org>
References:  <20210824205300.305BF72EF@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On 8/24/2021 4:53 PM, FreeBSD Security Advisories wrote:
>
> Branch/path                             Hash                     Revision
> -------------------------------------------------------------------------
> stable/13/                              9d31ae318711    stable/13-n246940
> releng/13.0/                            2261c814b7fa  releng/13.0-n244759
> stable/12/                                                        r370385
> releng/12.2/                                                      r370396
> -------------------------------------------------------------------------


Hi All,

    Was reading the original advisory at
https://www.openssl.org/news/secadv/20210824.txt and it says

"OpenSSL versions 1.0.2y and below are affected by this [CVE-2021-3712]
issue."

Does it not then impact RELENG11 ?

% openssl version
OpenSSL 1.0.2u-freebsd  20 Dec 2019

I know RELENG_11 support ends in about a month, but should it not be
flagged ?

    ---Mike




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?44434c22-51c6-92cb-c9de-60fae4764347>