From owner-freebsd-ports Sat Nov 20 16:27:50 1999 Delivered-To: freebsd-ports@freebsd.org Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (Postfix) with ESMTP id AE74D14E98; Sat, 20 Nov 1999 16:27:49 -0800 (PST) (envelope-from cpiazza@FreeBSD.org) Received: (from cpiazza@localhost) by freefall.freebsd.org (8.9.3/8.9.2) id QAA44901; Sat, 20 Nov 1999 16:27:49 -0800 (PST) (envelope-from cpiazza@FreeBSD.org) Date: Sat, 20 Nov 1999 16:27:49 -0800 (PST) From: Message-Id: <199911210027.QAA44901@freefall.freebsd.org> To: N/A@FreeBSD.ORG, cpiazza@FreeBSD.org, freebsd-ports@FreeBSD.org Subject: Re: ports/14749: /usr/ports/security/ssh/ has remote buffer-overflow Sender: owner-freebsd-ports@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: /usr/ports/security/ssh/ has remote buffer-overflow State-Changed-From-To: open->closed State-Changed-By: cpiazza State-Changed-When: Sat Nov 20 16:27:08 PST 1999 State-Changed-Why: patch-ax, committed by imp@freebsd.org, fixes this problem. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message