Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 11 Dec 2016 17:14:33 +0100
From:      Dimitry Andric <dim@FreeBSD.org>
To:        Michelle Sullivan <michelle@sorbs.net>
Cc:        FreeBSD-STABLE Mailing List <freebsd-stable@freebsd.org>, Xin LI <delphij@freebsd.org>
Subject:   Re: CVE-2016-7434 NTP
Message-ID:  <5AA6183C-44B5-4A0E-81E8-9B50FFE087F2@FreeBSD.org>
In-Reply-To: <5848EAB6.8040909@sorbs.net>
References:  <5848EAB6.8040909@sorbs.net>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On 08 Dec 2016, at 06:08, Michelle Sullivan <michelle@sorbs.net> wrote:
> 
> Are we going to get a patch for CVE-2016-7434 on FreeBSD 9.3?

On Nov 22, in r309009, Xin Li merged ntp 4.2.8p9, which fixes this
issue, to stable/9:

https://svnweb.freebsd.org/changeset/base/309009

Unfortunately the commit message did not mention the CVE identifier.  I
can't find any corresponding security advisory either.

-Dimitry


[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.30

iEYEARECAAYFAlhNe3IACgkQsF6jCi4glqOuCwCfUDoUNiUEfXQLWmHql5hYz4wa
kyYAn1A+UZbiOtgGzn2djZ+Mz7D1WOWC
=m3zx
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5AA6183C-44B5-4A0E-81E8-9B50FFE087F2>