From owner-freebsd-security Fri Feb 9 14:55:21 2001 Delivered-To: freebsd-security@freebsd.org Received: from dell.dannyland.org (dell.dannyland.org [64.81.36.13]) by hub.freebsd.org (Postfix) with ESMTP id AADDD37B401 for ; Fri, 9 Feb 2001 14:55:04 -0800 (PST) Received: by dell.dannyland.org (Postfix, from userid 1001) id F04915C2B; Fri, 9 Feb 2001 14:54:42 -0800 (PST) Date: Fri, 9 Feb 2001 14:54:42 -0800 From: dannyman To: Kris Kennaway Cc: freebsd-security@freebsd.org Subject: Re: How builds OpenSSH 2.3? Message-ID: <20010209145442.G76316@dell.dannyland.org> References: <20010209142940.F76316@dell.dannyland.org> <20010209144040.A69512@mollari.cthul.hu> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 1.0.1i In-Reply-To: <20010209144040.A69512@mollari.cthul.hu>; from kris@obsecurity.org on Fri, Feb 09, 2001 at 02:40:40PM -0800 X-Loop: djhoward@uiuc.edu X-URL: http://www.dannyland.org/~dannyman/ Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Fri, Feb 09, 2001 at 02:40:40PM -0800, Kris Kennaway wrote: > On Fri, Feb 09, 2001 at 02:29:40PM -0800, dannyman wrote: > > Has anyone patched 4.x OpenSSH and/or the relevant ports to deal with the CRC > > checksum exploit? I've got to get 2.3 working on my 3.x box, but just > > incrementing the number in the Makefile causes patch-aa to go rejected ... > > I've just committed the security patch plus alfred's patches for > building on older versions of FreeBSD. The port is still at 2.2.0, but > should be secure. * Just now finds Alfred's patch and gets it working. Awesome, folks! :) Thanks! -danny To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message