Date: Tue, 28 Jul 2015 15:51:12 -0500 From: Josh Cepek <josh.cepek@usa.net> To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-15:16.openssh Message-ID: <mp8q00$c2b$1@ger.gmane.org> References: <20150728203026.58055175C@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
FYI, the sys/conf/newvers.sh file still reports a version of RELEASE-p15 for the 10.1 releng SVN branch. Since some parts of the buildsystem use this value for those building from source, that should probably get bumped too. 9.3 is fine here. Thanks, -- Josh FreeBSD Security Advisories wrote: > ============================================================================= > FreeBSD-SA-15:16.openssh Security > Advisory > The FreeBSD > Project > > Topic: OpenSSH multiple vulnerabilities > > Category: contrib > Module: openssh > Announced: 2015-07-28 > Affects: All supported versions of FreeBSD. > Corrected: 2015-07-28 19:58:44 UTC (stable/10, 10.2-PRERELEASE) > 2015-07-28 19:58:44 UTC (stable/10, 10.2-BETA2-p2) > 2015-07-28 19:59:04 UTC (releng/10.2, 10.2-RC1-p1) > 2015-07-28 19:59:11 UTC (releng/10.1, 10.1-RELEASE-p16) > 2015-07-28 19:58:54 UTC (stable/9, 9.3-STABLE) > 2015-07-28 19:59:22 UTC (releng/9.3, 9.3-RELEASE-p21) > 2015-07-28 19:58:54 UTC (stable/8, 8.4-STABLE) > 2015-07-28 19:59:22 UTC (releng/8.4, 8.4-RELEASE-p35) > CVE Name: CVE-2014-2653, CVE-2015-5600
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?mp8q00$c2b$1>