From owner-freebsd-security Fri Sep 21 11:22:29 2001 Delivered-To: freebsd-security@freebsd.org Received: from webs1.accretive-networks.net (webs1.accretive-networks.net [207.246.154.13]) by hub.freebsd.org (Postfix) with ESMTP id 813EE37B41C for ; Fri, 21 Sep 2001 11:22:23 -0700 (PDT) Received: from localhost (davidk@localhost) by webs1.accretive-networks.net (8.11.1/8.11.3) with ESMTP id f8LHHv735693; Fri, 21 Sep 2001 10:17:58 -0700 (PDT) Date: Fri, 21 Sep 2001 10:17:57 -0700 (PDT) From: David Kirchner X-X-Sender: To: "Andrey A. Chernov" Cc: Marc Rogers , Peter Pentchev , Rob Andrews , Subject: Re: login_conf vulnerability. In-Reply-To: <20010921093907.C85958-100000@localhost> Message-ID: <20010921101649.E85958-100000@localhost> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org On Fri, 21 Sep 2001, David Kirchner wrote: > This is from 4.2R source. Would this be the location to patch? Nevermind, that was just a stab at the dark. I haven't seen a fix on the OpenSSH site yet, so I'm guessing that this just isn't something they've fixed yet. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message