Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 22 Apr 2020 09:31:26 +0200
From:      Miroslav Lachman <000.fbsd@quip.cz>
To:        freebsd-security@freebsd.org, FreeBSD Security Advisories <security-advisories@freebsd.org>
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-20:11.openssl
Message-ID:  <86c2a15b-a1d2-883a-51c7-245dcfbc1b94@quip.cz>
In-Reply-To: <20200421165520.51D141CE03@freefall.freebsd.org>
References:  <20200421165520.51D141CE03@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On 2020-04-21 18:55, FreeBSD Security Advisories wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
> 
> =============================================================================
> FreeBSD-SA-20:11.openssl                                    Security Advisory
>                                                            The FreeBSD Project
> 
> Topic:          OpenSSL remote denial of service vulnerability
> 
> Category:       contrib
> Module:         openssl
> Announced:      2020-04-21
> Credits:        Bernd Edlinger
> Affects:        FreeBSD 12.1
> Corrected:      2020-04-21 15:47:58 UTC (stable/12, 12.1-STABLE)
>                  2020-04-21 15:53:08 UTC (releng/12.1, 12.1-RELEASE-p4)
> CVE Name:       CVE-2020-1967

VuXML entry indicated 11.3 as vulnerable even if original SA has
Affected: 12.1 only.

https://vuxml.freebsd.org/freebsd/012809ce-83f3-11ea-92ab-00163e433440.html

Can you please update VuXML entry or original SA?

Kind regards
Miroslav Lachman





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86c2a15b-a1d2-883a-51c7-245dcfbc1b94>