Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 8 Mar 2023 12:12:37 -0500
From:      Ed Maste <emaste@freebsd.org>
To:        =?UTF-8?B?QW5kcsOhcyBMw6FzemzDsyBGYXJrYXM=?= <farkas.andras.laszlo@gmail.com>
Cc:        secteam@freebsd.org, FreeBSD-security@freebsd.org
Subject:   Re: Question regarding FreeBSD-SA-22:15.ping (CVE-2022-23093)
Message-ID:  <CAPyFy2DH5CMTbWQ%2BiDVwLUqnbLsB_-iAxH6h8Gg4d-ZSQt__Ng@mail.gmail.com>
In-Reply-To: <CANRp5NnB%2BdcXfrWKa64Tw-ms7sZX4H9TJd7wbqmCjSOGtYENDg@mail.gmail.com>
References:  <CANRp5NnB%2BdcXfrWKa64Tw-ms7sZX4H9TJd7wbqmCjSOGtYENDg@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 6 Mar 2023 at 08:16, Andr=C3=A1s L=C3=A1szl=C3=B3 Farkas
<farkas.andras.laszlo@gmail.com> wrote:
>
> Dear FreeBSD Security support team.
>
> According to your official advisory on FreeBSD-SA-22:15.ping, the affecte=
d versions are "All supported versions of FreeBSD", which means in practice=
 12.3, 12.4 and 13.1.
>
> My question.:
> Is this vulnerability present in previous FreeBSD versions as well? My qu=
estion mainly concerns an old EoL version, which is the 6.2.

We have not analyzed EoL versions, so cannot say whether the bug
exists in 6.2 or not.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAPyFy2DH5CMTbWQ%2BiDVwLUqnbLsB_-iAxH6h8Gg4d-ZSQt__Ng>