Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 15 Nov 1999 20:57:39 -0700
From:      Warner Losh <imp@village.org>
To:        Mike Tancsa <mike@sentex.net>
Cc:        freebsd-security@freebsd.org, security-officer@freebsd.org
Subject:   Re: Fwd: ssh-1.2.27 remote buffer overflow - exploitable (VD#7) 
Message-ID:  <199911160357.UAA01885@harmony.village.org>
In-Reply-To: Your message of "Sun, 14 Nov 1999 00:08:12 EST." <4.1.19991114000355.04d7f230@granite.sentex.ca> 
References:  <4.1.19991114000355.04d7f230@granite.sentex.ca>  

next in thread | previous in thread | raw e-mail | index | archive | help
In message <4.1.19991114000355.04d7f230@granite.sentex.ca> Mike Tancsa writes:
: Is there a patch to this ? Or is openssh the way to go ?

Damn.  I had a patch before taking off for the weekend, but didn't
have time to commit it.  I'll commit it in a little bit if no one has
done so already.

Warner


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199911160357.UAA01885>