OpenSSH memory leak

b0z0 at SDF.ORG b0z0 at SDF.ORG
Wed May 7 19:31:52 PDT 2014



This is bs.

https://news.ycombinator.com/item?id=7701208




On Tue, 6 May 2014, Odinn Cyberguerrilla wrote:

> Date: Tue, 6 May 2014 09:41:57 -0700
> From: Odinn Cyberguerrilla <odinn.cyberguerrilla at riseup.net>
> To: Matej Kovacic <matej.kovacic at owca.info>
> Cc: cypherpunks at cpunks.org
> Subject: Re: OpenSSH memory leak
> 
>> Hi,
>>
>> (NOT OpenSSL!)
>>
>> in case you didn't came aroud this:
>>
>> http://pastebin.com/gjkivAf3
>>
>> Unfortunately, there is no patch yet...
>>
>>
>> Regards,
>>
>> M.
>>
>
> Possibly related is this:
>
> Let's say you are in some garden variety Ubuntu and as of May 5 or
> thereabouts, you were happily sitting on the best version available of
> OpenSSL which would be (as of April 2014): OpenSSL1.0.1g 7 Apr 2014
> And then sometime late on May 5, 2014 you decided to do this in your
> terminal...
>
> sudo apt-get update && sudo apt-get upgrade
>
> Oh, well that was interesting
>
> Now go back in and do this
>
> openssl version -a
>
> Wait a minute...
>
> yes, most people are going to have to go back in and
>
> curl https://www.openssl.org/source/openssl-1.0.1g.tar.gz | tar xz && cd
> openssl-1.0.1g && sudo ./config && sudo make && sudo make install
>
> History repeats itself
>
>

b0z0 at sdf.lonestar.org
SDF Public Access UNIX System - http://sdf.lonestar.org



More information about the cypherpunks mailing list