On Wed, Apr 22, 2020 at 12:31 AM Miroslav Lachman <000.f...@quip.cz> wrote:
> On 2020-04-21 18:55, FreeBSD Security Advisories wrote: > > -----BEGIN PGP SIGNED MESSAGE----- > > Hash: SHA512 > > > > > ============================================================================= > > FreeBSD-SA-20:11.openssl Security > Advisory > > The FreeBSD > Project > > > > Topic: OpenSSL remote denial of service vulnerability > > > > Category: contrib > > Module: openssl > > Announced: 2020-04-21 > > Credits: Bernd Edlinger > > Affects: FreeBSD 12.1 > > Corrected: 2020-04-21 15:47:58 UTC (stable/12, 12.1-STABLE) > > 2020-04-21 15:53:08 UTC (releng/12.1, 12.1-RELEASE-p4) > > CVE Name: CVE-2020-1967 > > VuXML entry indicated 11.3 as vulnerable even if original SA has > Affected: 12.1 only. > > https://vuxml.freebsd.org/freebsd/012809ce-83f3-11ea-92ab-00163e433440.html > > Can you please update VuXML entry or original SA? > I've updated VuXML to remove it. Too many copy and pastes. Thanks for the report! Gordon _______________________________________________ freebsd-security@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"