Date: Sun, 11 Dec 2016 17:14:33 +0100 From: Dimitry Andric <dim@FreeBSD.org> To: Michelle Sullivan <michelle@sorbs.net> Cc: FreeBSD-STABLE Mailing List <freebsd-stable@freebsd.org>, Xin LI <delphij@freebsd.org> Subject: Re: CVE-2016-7434 NTP Message-ID: <5AA6183C-44B5-4A0E-81E8-9B50FFE087F2@FreeBSD.org> In-Reply-To: <5848EAB6.8040909@sorbs.net> References: <5848EAB6.8040909@sorbs.net>
next in thread | previous in thread | raw e-mail | index | archive | help
--Apple-Mail=_28F0395E-2D45-426E-BC41-B0C067CF2665 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=us-ascii On 08 Dec 2016, at 06:08, Michelle Sullivan <michelle@sorbs.net> wrote: > > Are we going to get a patch for CVE-2016-7434 on FreeBSD 9.3? On Nov 22, in r309009, Xin Li merged ntp 4.2.8p9, which fixes this issue, to stable/9: https://svnweb.freebsd.org/changeset/base/309009 Unfortunately the commit message did not mention the CVE identifier. I can't find any corresponding security advisory either. -Dimitry --Apple-Mail=_28F0395E-2D45-426E-BC41-B0C067CF2665 Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=signature.asc Content-Type: application/pgp-signature; name=signature.asc Content-Description: Message signed with OpenPGP using GPGMail -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.30 iEYEARECAAYFAlhNe3IACgkQsF6jCi4glqOuCwCfUDoUNiUEfXQLWmHql5hYz4wa kyYAn1A+UZbiOtgGzn2djZ+Mz7D1WOWC =m3zx -----END PGP SIGNATURE----- --Apple-Mail=_28F0395E-2D45-426E-BC41-B0C067CF2665--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5AA6183C-44B5-4A0E-81E8-9B50FFE087F2>