Date: Mon, 24 Jun 2002 22:33:11 -0400 (EDT) From: Garrett Wollman <wollman@lcs.mit.edu> To: Chris BeHanna <behanna@zbzoom.net> Cc: FreeBSD Security <security@FreeBSD.ORG> Subject: Re: [openssh-unix-announce] Re: Upcoming OpenSSH vulnerability (fwd) Message-ID: <200206250233.g5P2XBZi009480@khavrinen.lcs.mit.edu> In-Reply-To: <20020624212557.R7245-100000@topperwein.dyndns.org> References: <20020624163538.H10398-100000@yez.hyperreal.org> <20020624212557.R7245-100000@topperwein.dyndns.org>
next in thread | previous in thread | raw e-mail | index | archive | help
<<On Mon, 24 Jun 2002 21:35:06 -0400 (EDT), Chris BeHanna <behanna@zbzoom.net> said: > Result: it's possible to completely prevent the window of > vulnerability that usually exists between the announcement of an > exploit and the availability of a fix for same. Only if you run absolutely stock, bog-standard OpenSSH. Many of us have different operational requirements. -GAWollman To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200206250233.g5P2XBZi009480>