Both 10.1 and 10.2 are going to be unsupported by the end of this
year, that's probably the reason the fix was not included in them.

https://www.freebsd.org/security/#sup

-Kimmo

On Wed, Nov 2, 2016 at 3:57 PM, Martin Simmons <mar...@lispworks.com> wrote:
>>>>>> On Wed,  2 Nov 2016 07:55:33 +0000 (UTC), FreeBSD Security Advisories 
>>>>>> said:
>>
>> =============================================================================
>> FreeBSD-SA-16:33.openssh                                    Security Advisory
>>                                                           The FreeBSD Project
>>
>> Topic:          OpenSSH Remote Denial of Service vulnerability
>>
>> Category:       contrib
>> Module:         OpenSSH
>> Announced:      2016-11-02
>> Affects:        All supported versions of FreeBSD.
>> Corrected:      2016-11-02 06:56:35 UTC (stable/11, 11.0-STABLE)
>>                 2016-11-02 07:23:19 UTC (releng/11.0, 11.0-RELEASE-p3)
>>                 2016-11-02 06:58:47 UTC (stable/10, 10.3-STABLE)
>>                 2016-11-02 07:23:36 UTC (releng/10.3, 10.3-RELEASE-p12)
>> CVE Name:       CVE-2016-8858
>
> Should this be corrected in 10.1-RELEASE as well?
>
> I ask because Debian
> (https://security-tracker.debian.org/tracker/CVE-2016-8858) has marked it as
> vulnerable in OpenSSH 6.0 and OpenSSH 6.7 and it looks like 10.1-RELEASE
> contains OpenSSH 6.6, which I assume is also vulnerable.
>
> __Martin
> _______________________________________________
> freebsd-security@freebsd.org mailing list
> https://lists.freebsd.org/mailman/listinfo/freebsd-security
> To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"
_______________________________________________
freebsd-security@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to