Date: Wed, 20 Dec 2000 12:02:04 -0800 From: "Bruce A. Mah" <bmah@FreeBSD.ORG> To: Chris Faulhaber <jedgar@fxp.org> Cc: Slawek Zak <zaks@prioris.mini.pw.edu.pl>, freebsd-security@FreeBSD.ORG Subject: Re: SSH update Message-ID: <200012202002.eBKK24j26307@bmah-freebsd-0.cisco.com> In-Reply-To: <20001220143328.A9618@peitho.fxp.org> References: <87k88u99nz.fsf@pf39.warszawa.sdi.tpnet.pl> <20001220143328.A9618@peitho.fxp.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--==_Exmh_1134604096P Content-Type: text/plain; charset=us-ascii If memory serves me right, Chris Faulhaber wrote: > On Wed, Dec 20, 2000 at 08:26:08PM +0100, Slawek Zak wrote: > > Has SSH in 4.2-RELEASE been updated to prevent the latest attack > > (unauthorized agent and X11 connection forwarding)? > > > > Yes, OpenSSH was patched on 2000-11-14 (before FreeBSD 4.2 was released). > See http://www.FreeBSD.org/cgi/cvsweb.cgi/src/crypto/openssh/clientloop.c > for more details. ...a fact which should have been in the release notes file for 4.2-RELEASE, but for some reason wasn't (the MFC is noted in the release notes for -CURRENT, however). Oopsie. :-( Bruce. --==_Exmh_1134604096P Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (FreeBSD) Comment: Exmh version 2.2 06/23/2000 iD8DBQE6QRA82MoxcVugUsMRAvyfAJ4kD68mlzgJy7X6zfkKGZfddG0x7QCg7cuM Dtgz31tOG0/VvoGRW7c73Bo= =h3XK -----END PGP SIGNATURE----- --==_Exmh_1134604096P-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200012202002.eBKK24j26307>