Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 19 Dec 2023 19:11:51 -0800
From:      Gordon Tetlow <gordon@tetlows.org>
To:        mike tancsa <mike@sentex.net>
Cc:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-23:19.openssh
Message-ID:  <75D32904-562B-473D-B6DF-AA7237276138@tetlows.org>

next in thread | raw e-mail | index | archive | help

--Apple-Mail-16364797-F70B-490B-8BD2-D1F1CF5ED527
Content-Type: text/plain;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

=EF=BB=BF


> On Dec 19, 2023, at 14:08, mike tancsa <mike@sentex.net> wrote:
> =EF=BB=BFOn 12/19/2023 4:33 PM, FreeBSD Security Advisories wrote:
>> with 12.4 are encouraged to either implement the documented workaround or=

>> leverage an up to date version of OpenSSH from the ports/pkg collection.
>=20
> Hi,
>=20
> Is the version of security/openssh-portable not vulnerable to this issue t=
oo ? I dont see any update since Oct

I=E2=80=99ve posted a review for an update to 9.6p1: https://reviews.freebsd=
.org/D43132

Gordon=

--Apple-Mail-16364797-F70B-490B-8BD2-D1F1CF5ED527
Content-Type: text/html;
	charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html><head><meta http-equiv=3D"content-type" content=3D"text/html; charset=3D=
utf-8"></head><body dir=3D"auto"><div dir=3D"ltr">=EF=BB=BF<meta http-equiv=3D=
"content-type" content=3D"text/html; charset=3Dutf-8"><div dir=3D"ltr"></div=
><div dir=3D"ltr"><br></div><div dir=3D"ltr"><br><blockquote type=3D"cite">O=
n Dec 19, 2023, at 14:08, mike tancsa &lt;mike@sentex.net&gt; wrote:<br><br>=
</blockquote></div><blockquote type=3D"cite"><div dir=3D"ltr">=EF=BB=BF<span=
>On 12/19/2023 4:33 PM, FreeBSD Security Advisories wrote:</span><br><blockq=
uote type=3D"cite"><span>with 12.4 are encouraged to either implement the do=
cumented workaround or</span><br></blockquote><blockquote type=3D"cite"><spa=
n>leverage an up to date version of OpenSSH from the ports/pkg collection.</=
span><br></blockquote><span></span><br><span>Hi,</span><br><span></span><br>=
<span>Is the version of security/openssh-portable not vulnerable to this iss=
ue too ? I dont see any update since Oct</span><br></div></blockquote><br><d=
iv>I=E2=80=99ve posted a review for an update to 9.6p1:&nbsp;<a href=3D"http=
s://reviews.freebsd.org/D43132" style=3D"font-family: Helvetica; font-size: 1=
2px;">https://reviews.freebsd.org/D43132</a></div><div><br></div><div>Gordon=
</div></div></body></html>=

--Apple-Mail-16364797-F70B-490B-8BD2-D1F1CF5ED527--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?75D32904-562B-473D-B6DF-AA7237276138>