Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 8 Mar 2023 12:12:37 -0500
From:      Ed Maste <emaste@freebsd.org>
To:        =?UTF-8?B?QW5kcsOhcyBMw6FzemzDsyBGYXJrYXM=?= <farkas.andras.laszlo@gmail.com>
Cc:        secteam@freebsd.org, FreeBSD-security@freebsd.org
Subject:   Re: Question regarding FreeBSD-SA-22:15.ping (CVE-2022-23093)
Message-ID:  <CAPyFy2DH5CMTbWQ%2BiDVwLUqnbLsB_-iAxH6h8Gg4d-ZSQt__Ng@mail.gmail.com>
In-Reply-To: <CANRp5NnB%2BdcXfrWKa64Tw-ms7sZX4H9TJd7wbqmCjSOGtYENDg@mail.gmail.com>
References:  <CANRp5NnB%2BdcXfrWKa64Tw-ms7sZX4H9TJd7wbqmCjSOGtYENDg@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help

On Mon, 6 Mar 2023 at 08:16, András László Farkas
<farkas.andras.laszlo@gmail.com> wrote:
>
> Dear FreeBSD Security support team.
>
> According to your official advisory on FreeBSD-SA-22:15.ping, the affected versions are "All supported versions of FreeBSD", which means in practice 12.3, 12.4 and 13.1.
>
> My question.:
> Is this vulnerability present in previous FreeBSD versions as well? My question mainly concerns an old EoL version, which is the 6.2.

We have not analyzed EoL versions, so cannot say whether the bug
exists in 6.2 or not.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAPyFy2DH5CMTbWQ%2BiDVwLUqnbLsB_-iAxH6h8Gg4d-ZSQt__Ng>