Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 17 Nov 1999 17:36:26 -0800
From:      Chris Piazza <cpiazza@home.net>
To:        spork <spork@super-g.com>
Cc:        Udo Schweigert <ust@cert.siemens.de>, Mike Tancsa <mike@sentex.net>, freebsd-security@FreeBSD.ORG
Subject:   Re: Fwd: ssh-1.2.27 remote buffer overflow - exploitable  (VD#7)
Message-ID:  <19991117173626.B262@norn.ca.eu.org>
In-Reply-To: <Pine.BSF.4.00.9911171158460.5363-100000@super-g.com>; from spork@super-g.com on Wed, Nov 17, 1999 at 12:00:02PM -0500
References:  <Pine.BSF.4.00.9911161739451.13005-100000@super-g.com> <Pine.BSF.4.00.9911171158460.5363-100000@super-g.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Nov 17, 1999 at 12:00:02PM -0500, spork wrote:
> OK, I've put the patch here:
> 
> ftp://ftp2.inch.com/pub/FreeBSD/patch-ssh-1.2.27-bsd.tty.chown
> 
> Charles

Thanks, I added it to the port.

-Chris
--
cpiazza@home.net   cpiazza@FreeBSD.org
        Abbotsford, BC, Canada


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19991117173626.B262>