From owner-freebsd-security Fri Feb 9 14:30:21 2001 Delivered-To: freebsd-security@freebsd.org Received: from dell.dannyland.org (dell.dannyland.org [64.81.36.13]) by hub.freebsd.org (Postfix) with ESMTP id A217E37B401 for ; Fri, 9 Feb 2001 14:30:02 -0800 (PST) Received: by dell.dannyland.org (Postfix, from userid 1001) id 0D7525C2C; Fri, 9 Feb 2001 14:29:41 -0800 (PST) Date: Fri, 9 Feb 2001 14:29:40 -0800 From: dannyman To: freebsd-security@freebsd.org Subject: How builds OpenSSH 2.3? Message-ID: <20010209142940.F76316@dell.dannyland.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 1.0.1i Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Has anyone patched 4.x OpenSSH and/or the relevant ports to deal with the CRC checksum exploit? I've got to get 2.3 working on my 3.x box, but just incrementing the number in the Makefile causes patch-aa to go rejected ... -d -- http://dannyman.toldme.com/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message