Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 20 Dec 2000 12:02:04 -0800
From:      "Bruce A. Mah" <bmah@FreeBSD.ORG>
To:        Chris Faulhaber <jedgar@fxp.org>
Cc:        Slawek Zak <zaks@prioris.mini.pw.edu.pl>, freebsd-security@FreeBSD.ORG
Subject:   Re: SSH update 
Message-ID:  <200012202002.eBKK24j26307@bmah-freebsd-0.cisco.com>
In-Reply-To: <20001220143328.A9618@peitho.fxp.org> 
References:  <87k88u99nz.fsf@pf39.warszawa.sdi.tpnet.pl> <20001220143328.A9618@peitho.fxp.org>

next in thread | previous in thread | raw e-mail | index | archive | help
--==_Exmh_1134604096P
Content-Type: text/plain; charset=us-ascii

If memory serves me right, Chris Faulhaber wrote:
> On Wed, Dec 20, 2000 at 08:26:08PM +0100, Slawek Zak wrote:
> > Has SSH in 4.2-RELEASE been updated to prevent the latest attack
> > (unauthorized agent and X11 connection forwarding)?
> > 
> 
> Yes, OpenSSH was patched on 2000-11-14 (before FreeBSD 4.2 was released).
> See http://www.FreeBSD.org/cgi/cvsweb.cgi/src/crypto/openssh/clientloop.c
> for more details.

...a fact which should have been in the release notes file for
4.2-RELEASE, but for some reason wasn't (the MFC is noted in the release
notes for -CURRENT, however).

Oopsie.  :-(

Bruce.




--==_Exmh_1134604096P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (FreeBSD)
Comment: Exmh version 2.2 06/23/2000

iD8DBQE6QRA82MoxcVugUsMRAvyfAJ4kD68mlzgJy7X6zfkKGZfddG0x7QCg7cuM
Dtgz31tOG0/VvoGRW7c73Bo=
=h3XK
-----END PGP SIGNATURE-----

--==_Exmh_1134604096P--


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200012202002.eBKK24j26307>