delorie.com/archives/browse.cgi   search  
Mail Archives: cygwin/2003/07/07/15:28:49

Mailing-List: contact cygwin-help AT cygwin DOT com; run by ezmlm
List-Subscribe: <mailto:cygwin-subscribe AT cygwin DOT com>
List-Archive: <http://sources.redhat.com/ml/cygwin/>
List-Post: <mailto:cygwin AT cygwin DOT com>
List-Help: <mailto:cygwin-help AT cygwin DOT com>, <http://sources.redhat.com/ml/#faqs>
Sender: cygwin-owner AT cygwin DOT com
Mail-Followup-To: cygwin AT cygwin DOT com
Delivered-To: mailing list cygwin AT cygwin DOT com
Message-ID: <EF3C4DA34DEFD411AE6200A0C9F2A35819BF88F6@uswaumsx06medge.med.ge.com>
From: "Menon, Girish (MED, WIPRO-GE MED)" <Girish DOT Menon AT med DOT ge DOT com>
To: cygwin AT cygwin DOT com
Subject: bufffer overflow in telnetd
Date: Mon, 7 Jul 2003 14:28:01 -0500
MIME-Version: 1.0

> Does anyone know whether a patch has been released for the security
> hole CAN-2001-0554 about buffer overflow in telnetd (CA- 2001-21)?
> http://www.cert.org/advisories/CA-2001-21.html
> I am unable to find it on the cygwin web site.

--
Unsubscribe info:      http://cygwin.com/ml/#unsubscribe-simple
Problem reports:       http://cygwin.com/problems.html
Documentation:         http://cygwin.com/docs.html
FAQ:                   http://cygwin.com/faq/

- Raw text -


  webmaster     delorie software   privacy  
  Copyright © 2019   by DJ Delorie     Updated Jul 2019