From owner-freebsd-bugs@FreeBSD.ORG Thu Oct 16 23:24:16 2003 Return-Path: Delivered-To: freebsd-bugs@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 528A116A4C0; Thu, 16 Oct 2003 23:24:16 -0700 (PDT) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id 7B06D43FB1; Thu, 16 Oct 2003 23:24:15 -0700 (PDT) (envelope-from kris@FreeBSD.org) Received: from freefall.freebsd.org (kris@localhost [127.0.0.1]) by freefall.freebsd.org (8.12.9/8.12.9) with ESMTP id h9H6OFFY069114; Thu, 16 Oct 2003 23:24:15 -0700 (PDT) (envelope-from kris@freefall.freebsd.org) Received: (from kris@localhost) by freefall.freebsd.org (8.12.9/8.12.9/Submit) id h9H6OFS3069110; Thu, 16 Oct 2003 23:24:15 -0700 (PDT) (envelope-from kris) Date: Thu, 16 Oct 2003 23:24:15 -0700 (PDT) From: Kris Kennaway Message-Id: <200310170624.h9H6OFS3069110@freefall.freebsd.org> To: j_guojun@lbl.gov, kris@FreeBSD.org, freebsd-bugs@FreeBSD.org Subject: Re: bin/58153: 4.9 default with vulnerable openssh 3.5 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 17 Oct 2003 06:24:16 -0000 X-List-Received-Date: Fri, 17 Oct 2003 06:24:16 -0000 Synopsis: 4.9 default with vulnerable openssh 3.5 State-Changed-From-To: open->closed State-Changed-By: kris State-Changed-When: Thu Oct 16 23:23:37 PDT 2003 State-Changed-Why: As documented in the recent advisory, OpenSSH has been patched in all supported versions of FreeBSD. http://www.freebsd.org/cgi/query-pr.cgi?pr=58153