[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [SECURITY] [DSA-134-2] Unknown OpenSSH remote vulnerability



On Tue, Jun 25, 2002 at 02:37:12PM +0200, Wichert Akkerman remarked:
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> - ------------------------------------------------------------------------
> Debian Security Advisory DSA-134-2                   security@debian.org
> http://www.debian.org/security/                         Wichert Akkerman
> June 25, 2002
> - ------------------------------------------------------------------------
> 
> 
> Package        : ssh
> Problem type   : remote exploit
> Debian-specific: no
> 
> This advisory is an update to DSA-134-1: some extra information is
> provided on broken or changed functionality in this new release and
> packages for Debian GNU/Linux 2.2/potato are now available.
[snip]
> wget url
>         will fetch the file for you
> dpkg -i file.deb
>         will install the referenced file.
> 
> 
> Debian GNU/Linux 2.2 alias potato
> - ---------------------------------
> 
>   Potato was released for alpha, arm, i386, m68k, powerpc and sparc
>   Packages for m68k are not available at this moment.
[snip]
> Debian GNU/Linux 3.0 alias woody
> - ---------------------------------
> 
>   Woody will be released for alpha, arm, hppa, i386, ia64, m68k, mips,
>   mipsel, powerpc, s390 and sparc. Packages for m68k are not available
>   at this moment.
[snip]

Potato and Woody are both patched then.  What is the recommended
course of action for those running Sid?  Should Sid users
install the Woody patch, or is this a bad idea?

Thanks for all the hard work Debian Security people!

Cheers,
Raymond

Attachment: pgpOo6XnC0gjx.pgp
Description: PGP signature


Reply to: