[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
OpenSSH memory leak
- To: Mark Steward <[email protected]>
- Subject: OpenSSH memory leak
- From: [email protected] (Pavol Luptak)
- Date: Tue, 6 May 2014 11:09:39 +0200
- Cc: [email protected]
- In-reply-to: <CAPyX2ncpc+7t208ehwc-Xnp7V8wW7rxyUFVn=FkLUeWDHENGWQ@mail.gmail.com>
- References: <[email protected]> <CAPyX2ncpc+7t208ehwc-Xnp7V8wW7rxyUFVn=FkLUeWDHENGWQ@mail.gmail.com>
I think, it's a scam similar to this:
http://seclists.org/fulldisclosure/2014/Apr/292
but you can try it and sacrifice your 20 BTC :) (and there is no escrow...)
On Tue, May 06, 2014 at 08:42:06AM +0100, Mark Steward wrote:
> Very drole.
>
> Mark
>
> On 6 May 2014 08:28, "Matej Kovacic" <[email protected]> wrote:
>
> Hi,
>
> (NOT OpenSSL!)
>
> in case you didn't came aroud this:
>
> http://pastebin.com/gjkivAf3
>
> Unfortunately, there is no patch yet...
>
> Regards,
>
> M.
--
______________________________________________________________________________
[Pavol Luptak, Nethemba s.r.o.] [http://www.nethemba.com] [tel: +421905400542]
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 4812 bytes
Desc: not available
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20140506/47cc0157/attachment.bin>