Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 28 Jul 2015 15:51:12 -0500
From:      Josh Cepek <josh.cepek@usa.net>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-15:16.openssh
Message-ID:  <mp8q00$c2b$1@ger.gmane.org>
References:  <20150728203026.58055175C@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
FYI, the sys/conf/newvers.sh file still reports a version of RELEASE-p15 for 
the 10.1 releng SVN branch. Since some parts of the buildsystem use this 
value for those building from source, that should probably get bumped too. 
9.3 is fine here.

Thanks,

--
Josh

FreeBSD Security Advisories wrote:
> 
=============================================================================
> FreeBSD-SA-15:16.openssh                                    Security
> Advisory
>                                                           The FreeBSD
>                                                           Project
> 
> Topic:          OpenSSH multiple vulnerabilities
> 
> Category:       contrib
> Module:         openssh
> Announced:      2015-07-28
> Affects:        All supported versions of FreeBSD.
> Corrected:      2015-07-28 19:58:44 UTC (stable/10, 10.2-PRERELEASE)
>                 2015-07-28 19:58:44 UTC (stable/10, 10.2-BETA2-p2)
>                 2015-07-28 19:59:04 UTC (releng/10.2, 10.2-RC1-p1)
>                 2015-07-28 19:59:11 UTC (releng/10.1, 10.1-RELEASE-p16)
>                 2015-07-28 19:58:54 UTC (stable/9, 9.3-STABLE)
>                 2015-07-28 19:59:22 UTC (releng/9.3, 9.3-RELEASE-p21)
>                 2015-07-28 19:58:54 UTC (stable/8, 8.4-STABLE)
>                 2015-07-28 19:59:22 UTC (releng/8.4, 8.4-RELEASE-p35)
> CVE Name:       CVE-2014-2653, CVE-2015-5600





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?mp8q00$c2b$1>