Date: Mon, 15 Nov 1999 20:57:39 -0700 From: Warner Losh <imp@village.org> To: Mike Tancsa <mike@sentex.net> Cc: freebsd-security@freebsd.org, security-officer@freebsd.org Subject: Re: Fwd: ssh-1.2.27 remote buffer overflow - exploitable (VD#7) Message-ID: <199911160357.UAA01885@harmony.village.org> In-Reply-To: Your message of "Sun, 14 Nov 1999 00:08:12 EST." <4.1.19991114000355.04d7f230@granite.sentex.ca> References: <4.1.19991114000355.04d7f230@granite.sentex.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <4.1.19991114000355.04d7f230@granite.sentex.ca> Mike Tancsa writes: : Is there a patch to this ? Or is openssh the way to go ? Damn. I had a patch before taking off for the weekend, but didn't have time to commit it. I'll commit it in a little bit if no one has done so already. Warner To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199911160357.UAA01885>