From owner-cvs-all Thu Jun 27 16: 0:48 2002 Delivered-To: cvs-all@freebsd.org Received: from rwcrmhc53.attbi.com (rwcrmhc53.attbi.com [204.127.198.39]) by hub.freebsd.org (Postfix) with ESMTP id AEEAA37B405; Thu, 27 Jun 2002 16:00:28 -0700 (PDT) Received: from InterJet.elischer.org ([12.232.206.8]) by rwcrmhc53.attbi.com (InterMail vM.4.01.03.27 201-229-121-127-20010626) with ESMTP id <20020627230028.THRN15755.rwcrmhc53.attbi.com@InterJet.elischer.org>; Thu, 27 Jun 2002 23:00:28 +0000 Received: from localhost (localhost.elischer.org [127.0.0.1]) by InterJet.elischer.org (8.9.1a/8.9.1) with ESMTP id PAA71121; Thu, 27 Jun 2002 15:58:12 -0700 (PDT) Date: Thu, 27 Jun 2002 15:58:11 -0700 (PDT) From: Julian Elischer To: Dag-Erling Smorgrav Cc: cvs-committers@FreeBSD.org, cvs-all@FreeBSD.org Subject: Re: cvs commit: src/crypto/openssh - Imported sources In-Reply-To: <200206272231.g5RMVZAp039920@freefall.freebsd.org> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-cvs-all@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG On Thu, 27 Jun 2002, Dag-Erling Smorgrav wrote: > des 2002/06/27 15:31:35 PDT > > src/crypto/openssh - Imported sources > Update of /home/ncvs/src/crypto/openssh > In directory freefall.freebsd.org:/c/tmp/cvs-serv39879 > > Log Message: > Vendor import of OpenSSH 3.3p1. > Why not 3.4 as that is what they are trying to get everyone to go to? they say 3.4 has a bunch of other potential security holes closed after an audit... p.s. do you believe what they say about 2.3.0 (as shipped in 4.4) (and 4.5?) NOT being vunlerable? I wonder if any of the patches we applied since in the 4.4 branch have MADE them vulnerble? Julian To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message