Date: Wed, 22 Apr 2020 09:31:26 +0200 From: Miroslav Lachman <000.fbsd@quip.cz> To: freebsd-security@freebsd.org, FreeBSD Security Advisories <security-advisories@freebsd.org> Subject: Re: FreeBSD Security Advisory FreeBSD-SA-20:11.openssl Message-ID: <86c2a15b-a1d2-883a-51c7-245dcfbc1b94@quip.cz> In-Reply-To: <20200421165520.51D141CE03@freefall.freebsd.org> References: <20200421165520.51D141CE03@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On 2020-04-21 18:55, FreeBSD Security Advisories wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > ============================================================================= > FreeBSD-SA-20:11.openssl Security Advisory > The FreeBSD Project > > Topic: OpenSSL remote denial of service vulnerability > > Category: contrib > Module: openssl > Announced: 2020-04-21 > Credits: Bernd Edlinger > Affects: FreeBSD 12.1 > Corrected: 2020-04-21 15:47:58 UTC (stable/12, 12.1-STABLE) > 2020-04-21 15:53:08 UTC (releng/12.1, 12.1-RELEASE-p4) > CVE Name: CVE-2020-1967 VuXML entry indicated 11.3 as vulnerable even if original SA has Affected: 12.1 only. https://vuxml.freebsd.org/freebsd/012809ce-83f3-11ea-92ab-00163e433440.html Can you please update VuXML entry or original SA? Kind regards Miroslav Lachman
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86c2a15b-a1d2-883a-51c7-245dcfbc1b94>