delorie.com/archives/browse.cgi | search |
Mailing-List: | contact cygwin-help AT cygwin DOT com; run by ezmlm |
List-Subscribe: | <mailto:cygwin-subscribe AT cygwin DOT com> |
List-Archive: | <http://sources.redhat.com/ml/cygwin/> |
List-Post: | <mailto:cygwin AT cygwin DOT com> |
List-Help: | <mailto:cygwin-help AT cygwin DOT com>, <http://sources.redhat.com/ml/#faqs> |
Sender: | cygwin-owner AT cygwin DOT com |
Mail-Followup-To: | cygwin AT cygwin DOT com |
Delivered-To: | mailing list cygwin AT cygwin DOT com |
Message-ID: | <EF3C4DA34DEFD411AE6200A0C9F2A35819BF88F6@uswaumsx06medge.med.ge.com> |
From: | "Menon, Girish (MED, WIPRO-GE MED)" <Girish DOT Menon AT med DOT ge DOT com> |
To: | cygwin AT cygwin DOT com |
Subject: | bufffer overflow in telnetd |
Date: | Mon, 7 Jul 2003 14:28:01 -0500 |
MIME-Version: | 1.0 |
> Does anyone know whether a patch has been released for the security > hole CAN-2001-0554 about buffer overflow in telnetd (CA- 2001-21)? > http://www.cert.org/advisories/CA-2001-21.html > I am unable to find it on the cygwin web site. -- Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple Problem reports: http://cygwin.com/problems.html Documentation: http://cygwin.com/docs.html FAQ: http://cygwin.com/faq/
webmaster | delorie software privacy |
Copyright © 2019 by DJ Delorie | Updated Jul 2019 |