Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 05 May 2014 16:57:05 -0400
From: Mark Lee <mark@...kelee.com>
To: oss-security@...ts.openwall.com
Subject: Re: *Possible* ssh vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 05/05/2014 01:40 PM, RbN wrote:
> Looks like a fake, but I prefer to post it here anyway:
> http://pastebin.com/gjkivAf3
> 
> If anybody gets more info about it, please share ;)
> 
> 
> --
> RbN
> Archlinux CVE monitoring team
> 

To RbN,

Try posting it on the ssh list and see what the response is. I've been
monitoring that list for a while and haven't heard of this exploit.

From,
Mark
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)

iF4EAREIAAYFAlNn+yEACgkQZ/Z80n6+J/Z1PAEAjphhX1+SW5OdTkR3A2o7hq0G
npOXoYEeI66fW69eD/UA+wdge6V+ANrZMI5w9C3M+5W1ZmGhjSVU+apR9w5eUbsh
=njle
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.