lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <BANLkTin6wPS0ZfQhMmM9VPpRcp7bT0pw9A@mail.gmail.com> Date: Fri, 1 Jul 2011 01:34:58 -0400 From: Jeffrey Walton <noloader@...il.com> To: root <root_@...ertel.com.ar> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: OpenSSH 3.5p1 Remote Root Exploit for FreeBSD On Fri, Jul 1, 2011 at 1:32 AM, root <root_@...ertel.com.ar> wrote: > On 06/30/2011 12:39 PM, Marc Olive wrote: >> Are you talking about 7 years old bug? >> > > The famous 7year bug. > Isn't that the one Trinity uses in the future? You'd think it would be fixed by the time she gets to it...... _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists