From owner-freebsd-security Wed Nov 17 17:36:29 1999 Delivered-To: freebsd-security@freebsd.org Received: from norn.ca.eu.org (cr965240-b.abtsfd1.bc.wave.home.com [24.113.19.137]) by hub.freebsd.org (Postfix) with ESMTP id 4312914CA0 for ; Wed, 17 Nov 1999 17:36:27 -0800 (PST) (envelope-from cpiazza@norn.ca.eu.org) Received: by norn.ca.eu.org (Postfix, from userid 1000) id C2D67B7; Wed, 17 Nov 1999 17:36:26 -0800 (PST) Date: Wed, 17 Nov 1999 17:36:26 -0800 From: Chris Piazza To: spork Cc: Udo Schweigert , Mike Tancsa , freebsd-security@FreeBSD.ORG Subject: Re: Fwd: ssh-1.2.27 remote buffer overflow - exploitable (VD#7) Message-ID: <19991117173626.B262@norn.ca.eu.org> References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 1.0i In-Reply-To: ; from spork@super-g.com on Wed, Nov 17, 1999 at 12:00:02PM -0500 X-Operating-System: FreeBSD 4.0-CURRENT Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Wed, Nov 17, 1999 at 12:00:02PM -0500, spork wrote: > OK, I've put the patch here: > > ftp://ftp2.inch.com/pub/FreeBSD/patch-ssh-1.2.27-bsd.tty.chown > > Charles Thanks, I added it to the port. -Chris -- cpiazza@home.net cpiazza@FreeBSD.org Abbotsford, BC, Canada To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message