From owner-freebsd-stable@FreeBSD.ORG Wed Sep 17 06:32:06 2003 Return-Path: Delivered-To: freebsd-stable@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 1ED3016A4B3 for ; Wed, 17 Sep 2003 06:32:06 -0700 (PDT) Received: from mailhost.firstcallgroup.co.uk (dilbert.firstcallgroup.co.uk [194.200.93.142]) by mx1.FreeBSD.org (Postfix) with ESMTP id 7391843FBD for ; Wed, 17 Sep 2003 06:32:05 -0700 (PDT) (envelope-from pfrench@firstcallgroup.co.uk) Received: from pfrench by mailhost.firstcallgroup.co.uk with local (Exim 4.12) id 19zcPU-000Dm6-00 for stable@freebsd.org; Wed, 17 Sep 2003 14:31:56 +0100 To: stable@freebsd.org Message-Id: From: Pete French Date: Wed, 17 Sep 2003 14:31:56 +0100 Subject: Security hole in ssh ? X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 17 Sep 2003 13:32:06 -0000 Someone just forwarded me this link, is this old news or is it something which needs patching in FreeBSD ? The details seem sketchy, though there is a comment in there that 3.7.1p1 fixes it (whatever "it" may be). http://lists.netsys.com/pipermail/full-disclosure/2003-September/010116.html -pcf.