Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 13 May 2019 09:51:29 -0600
From:      Brett Glass <brett@lariat.org>
To:        FreeBSD-security@freebsd.org
Subject:   Re: POC and patch for the CVE-2018-15473
Message-ID:  <201905131551.JAA27159@mail.lariat.net>

next in thread | raw e-mail | index | archive | help
My company has remained with FreeBSD 11 for now because we have 
encountered NIC driver stability problems under heavy loads with FreeBSD 12.0.

As an ISP, we also endure constant brute force username and 
password guessing attacks, so a fix for this problem is of interest to us.

Is the FreeBSD port of OpenSSH 7.8 available for FreeBSD 11-STABLE 
from the ports collection and as a binary package? If not, shouldn't it be?

--Brett Glass

>Brahmanand Reddy <brahma.gdb@gmail.com> writes:
> > regarding the CVE-2018-15473 dint find find official patch from the openssh
> > on freebsd OS base.
>
>CVE-2018-15473 is a user existence oracle bug which does not meet our
>criteria for security advisories.
>
>FreeBSD 12 has OpenSSH 7.8, which is patched.  FreeBSD 11 has OpenSSH
>7.5, which is not.
>
>DES
>--
>Dag-Erling Smørgrav - des@FreeBSD.org
>_______________________________________________
>freebsd-security@freebsd.org mailing list
>https://lists.freebsd.org/mailman/listinfo/freebsd-security
>To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201905131551.JAA27159>