Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 16 Sep 2003 12:26:59 -0700
From:      Kris Kennaway <kris@obsecurity.org>
To:        Craig Boston <craig@meoqu.gank.org>
Cc:        Ruben de Groot <mail23@bzerk.org>
Subject:   Re: Release Engineering Status Report
Message-ID:  <20030916192659.GA11518@rot13.obsecurity.org>
In-Reply-To: <200309161416.17241.craig@meoqu.gank.org>
References:  <xzpr82graow.fsf@dwp.des.no> <JCEIKJMCANNPGKFKGLKLAEPGDPAA.mikej@trigger.net> <20030916171436.GA12867@ei.bzerk.org> <200309161416.17241.craig@meoqu.gank.org>

next in thread | previous in thread | raw e-mail | index | archive | help

--RnlQjJ0d97Da+TV1
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Tue, Sep 16, 2003 at 02:16:17PM -0500, Craig Boston wrote:
> On Tuesday 16 September 2003 12:14 pm, Ruben de Groot wrote:
> > Fortunately, there's allready a patch in the source tree:
> >
> > http://www.freebsd.org/cgi/cvsweb.cgi/src/crypto/openssh/buffer.c.diff?=
r1=3D1
> >.1.1.6&r2=3D1.1.1.7&f=3Dh
>=20
> Yes, fortunately the patch is there.  I noticed however that in the versi=
on=20
> committed to the RELENG_4_8 branch, RCSID wasn't changed, so it's not=20
> possible to use ident to tell if your libssh needs to be patched or not (=
both=20
> old and new say 1.16)...  Was that an oversight or should I be using some=
=20
> other method to determine if I'm running a vulnerable version or not?

Err, the RCS ID is updated automatically upon CVS checkin..is that
really what you mean?

Kris

--RnlQjJ0d97Da+TV1
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (FreeBSD)

iD8DBQE/Z2QDWry0BWjoQKURAoy6AJ4kygv+aWJWVL8IzyIAWDPT+zKsXACfeHnk
xSaM+dcMUaybV/gO2yWEy0k=
=58AQ
-----END PGP SIGNATURE-----

--RnlQjJ0d97Da+TV1--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030916192659.GA11518>