From owner-freebsd-security@freebsd.org Tue Jul 28 20:51:35 2015 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 404B59AD556 for ; Tue, 28 Jul 2015 20:51:35 +0000 (UTC) (envelope-from freebsd-security@m.gmane.org) Received: from plane.gmane.org (plane.gmane.org [80.91.229.3]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 03C2E1E90 for ; Tue, 28 Jul 2015 20:51:34 +0000 (UTC) (envelope-from freebsd-security@m.gmane.org) Received: from list by plane.gmane.org with local (Exim 4.69) (envelope-from ) id 1ZKBqO-0007eQ-Me for freebsd-security@freebsd.org; Tue, 28 Jul 2015 22:51:24 +0200 Received: from c-98-240-227-76.hsd1.mn.comcast.net ([98.240.227.76]) by main.gmane.org with esmtp (Gmexim 0.1 (Debian)) id 1AlnuQ-0007hv-00 for ; Tue, 28 Jul 2015 22:51:24 +0200 Received: from josh.cepek by c-98-240-227-76.hsd1.mn.comcast.net with local (Gmexim 0.1 (Debian)) id 1AlnuQ-0007hv-00 for ; Tue, 28 Jul 2015 22:51:24 +0200 X-Injected-Via-Gmane: http://gmane.org/ To: freebsd-security@freebsd.org From: Josh Cepek Subject: Re: FreeBSD Security Advisory FreeBSD-SA-15:16.openssh Date: Tue, 28 Jul 2015 15:51:12 -0500 Lines: 34 Message-ID: References: <20150728203026.58055175C@freefall.freebsd.org> Mime-Version: 1.0 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 7Bit X-Complaints-To: usenet@ger.gmane.org X-Gmane-NNTP-Posting-Host: c-98-240-227-76.hsd1.mn.comcast.net User-Agent: KNode/4.13.3 X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 28 Jul 2015 20:51:35 -0000 FYI, the sys/conf/newvers.sh file still reports a version of RELEASE-p15 for the 10.1 releng SVN branch. Since some parts of the buildsystem use this value for those building from source, that should probably get bumped too. 9.3 is fine here. Thanks, -- Josh FreeBSD Security Advisories wrote: > ============================================================================= > FreeBSD-SA-15:16.openssh Security > Advisory > The FreeBSD > Project > > Topic: OpenSSH multiple vulnerabilities > > Category: contrib > Module: openssh > Announced: 2015-07-28 > Affects: All supported versions of FreeBSD. > Corrected: 2015-07-28 19:58:44 UTC (stable/10, 10.2-PRERELEASE) > 2015-07-28 19:58:44 UTC (stable/10, 10.2-BETA2-p2) > 2015-07-28 19:59:04 UTC (releng/10.2, 10.2-RC1-p1) > 2015-07-28 19:59:11 UTC (releng/10.1, 10.1-RELEASE-p16) > 2015-07-28 19:58:54 UTC (stable/9, 9.3-STABLE) > 2015-07-28 19:59:22 UTC (releng/9.3, 9.3-RELEASE-p21) > 2015-07-28 19:58:54 UTC (stable/8, 8.4-STABLE) > 2015-07-28 19:59:22 UTC (releng/8.4, 8.4-RELEASE-p35) > CVE Name: CVE-2014-2653, CVE-2015-5600