<html>
<head>
<meta http-equiv="Content-Type" content="text/html;
charset=windows-1252">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<div class="moz-cite-prefix">On 12/04/18 07:57, Veetil, Vyshnav
wrote:<br>
</div>
<blockquote type="cite"
cite="mid:4c1efeeea09e4d7cb7e95e0bd6c99ea6@HIBDWSMB08.ad.harman.com">
<meta http-equiv="Content-Type" content="text/html;
charset=windows-1252">
<meta name="Generator" content="Microsoft Word 15 (filtered
medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
span.EmailStyle17
{mso-style-type:personal-compose;
font-family:"Calibri",sans-serif;
color:windowtext;}
.MsoChpDefault
{mso-style-type:export-only;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
<div class="WordSection1">
<p class="MsoNormal">Hi All,<o:p></o:p></p>
<p class="MsoNormal">Can you please tell me the expected release
of these rpms which is having the fix for below CVE’s.<o:p></o:p></p>
<p class="MsoNormal">1. expat rpm: <br>
CVE-2017-9233<o:p></o:p></p>
<p class="MsoNormal"><span
style="font-size:10.5pt;font-family:"Arial",sans-serif;color:#333333;background:whitesmoke"><o:p> </o:p></span></p>
<p class="MsoNormal">2.libxml2:<o:p></o:p></p>
<p class="MsoNormal">CVE-2015-8035 <o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">3. ntp and ntpdate RPM: <o:p></o:p></p>
<p class="MsoNormal">CVE-2017-6462 <o:p></o:p></p>
<p class="MsoNormal">CVE-2018-7170 <o:p></o:p></p>
<p class="MsoNormal">CVE-2018-7170 <o:p></o:p></p>
<p class="MsoNormal">CVE-2016-4954 <o:p></o:p></p>
<p class="MsoNormal">CVE-2016-4955 <o:p></o:p></p>
<p class="MsoNormal">CVE-2016-4956</p>
</div>
</blockquote>
You can check the status of CVE numbers by looking at e.g.
<a class="moz-txt-link-freetext" href="https://access.redhat.com/security/cve/cve-2017-9233">https://access.redhat.com/security/cve/cve-2017-9233</a><br>
<br>
That one is listed there as "Will not fix". Substitute your other
CVE numbers into the URL to check those too.<br>
<br>
Any that are listed with a section containing "Redhat Security
Errata" are fixed and the publication date of the RHSA announcement
listed will be when the fix was released. If it says 2018-04-10 then
the fix is part of 7.5 and will be released when CentOS 7.5 is
released. ETA unknown but ASAP.<br>
<br>
Trevor<br>
</body>
</html>