Date: Tue, 16 Sep 2003 12:26:59 -0700 From: Kris Kennaway <kris@obsecurity.org> To: Craig Boston <craig@meoqu.gank.org> Cc: Ruben de Groot <mail23@bzerk.org> Subject: Re: Release Engineering Status Report Message-ID: <20030916192659.GA11518@rot13.obsecurity.org> In-Reply-To: <200309161416.17241.craig@meoqu.gank.org> References: <xzpr82graow.fsf@dwp.des.no> <JCEIKJMCANNPGKFKGLKLAEPGDPAA.mikej@trigger.net> <20030916171436.GA12867@ei.bzerk.org> <200309161416.17241.craig@meoqu.gank.org>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] On Tue, Sep 16, 2003 at 02:16:17PM -0500, Craig Boston wrote: > On Tuesday 16 September 2003 12:14 pm, Ruben de Groot wrote: > > Fortunately, there's allready a patch in the source tree: > > > > http://www.freebsd.org/cgi/cvsweb.cgi/src/crypto/openssh/buffer.c.diff?r1=1 > >.1.1.6&r2=1.1.1.7&f=h > > Yes, fortunately the patch is there. I noticed however that in the version > committed to the RELENG_4_8 branch, RCSID wasn't changed, so it's not > possible to use ident to tell if your libssh needs to be patched or not (both > old and new say 1.16)... Was that an oversight or should I be using some > other method to determine if I'm running a vulnerable version or not? Err, the RCS ID is updated automatically upon CVS checkin..is that really what you mean? Kris [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (FreeBSD) iD8DBQE/Z2QDWry0BWjoQKURAoy6AJ4kygv+aWJWVL8IzyIAWDPT+zKsXACfeHnk xSaM+dcMUaybV/gO2yWEy0k= =58AQ -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030916192659.GA11518>
