> On 8 May 2026, at 09:17, Michael Paquier <[email protected]> wrote: > > On Fri, May 08, 2026 at 09:07:41AM +0200, Daniel Gustafsson wrote: >> Not sure I follow, anyone still building with a X years out of support >> OpenSSL >> will most likely keep doing so regardless of what CVE's are published. It >> could of course make backpatching trickier if thats what you mean? > > Argh. I've misread you here, reading a "lowest" rather than > "highest". Documenting that 3.6 is the highest version support on > 14-stable would also work here. My apologies for the confusion.
Ah, now it makes more sense =) > If the patches for REL_14_STABLE to add support for 4.0 prove to be > low-risk while messing with 1.0.1, that would the best course of > action, of course. I think the changes are straightforward enough that we can go ahead with them. I'll re-test and re-post a new patchset for all branches once the minors ship. -- Daniel Gustafsson
