lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAJVRA1Si6HXVwYp2rtsdjS+YoaekHn-fYUPJ5rW9h92=eqhKvg@mail.gmail.com> Date: Fri, 8 Nov 2013 23:50:35 -0800 From: coderman <coderman@...il.com> To: Bob Man Van Kim <evdo.hsdpa@...il.com> Cc: Full Disclosure <full-disclosure@...ts.grok.org.uk> Subject: Re: OpenSSH Security Advisory: gcmrekey.adv On Fri, Nov 8, 2013 at 8:28 PM, Bob Man Van Kim <evdo.hsdpa@...il.com> wrote: > Actually, guys... im wondering if the lack of response is due to falling > user participation... clearly we need more vulnerable installations. please reply with to this email with your IPv4 listen addr and port once you've updated to OpenSSH 6.2 or 6.3 sans calloc(). best regards, your friendly host configuration verifier _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists