[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [SECURITY] [DSA-134-4] OpenSSH Remote Challenge Vulnerability



On Thu, Jun 27, 2002 at 02:50:54PM +0200, Michael Stone remarked:
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> - ------------------------------------------------------------------------
> Debian Security Advisory DSA-134-4                   security@debian.org
> http://www.debian.org/security/                            Michael Stone
> June 27, 2002
> - ------------------------------------------------------------------------
> 
> Package        : ssh
> Problem type   : remote exploit
> Debian-specific: no
> CERT advisory  : CA-2002-18
> 
> This advisory is an update to DSA-134-3: this advisory contains
> updated information that is relevant to all Debian installations of
> OpenSSH (the ssh package). DSA-134-4 supersedes previous versions of
> DSA-134.
[snip]
> wget url
>         will fetch the file for you
> dpkg -i file.deb
>         will install the referenced file.
> 
> 
> Debian GNU/Linux 2.2 alias potato
> - ---------------------------------
> 
>   Potato was released for alpha, arm, i386, m68k, powerpc and sparc
[snip]
> 
> Debian GNU/Linux 3.0 alias woody
> - --------------------------------
> 
>   Woody will be released for alpha, arm, hppa, i386, ia64, m68k, mips,
>   mipsel, powerpc, s390 and sparc.
[snip]

Thank you *very* much for this clarification (this SSH
vulnerability has been a bit of a nightmare for users to
follow).

One additional question: (I have asked before but so far
received no satisfactory response)

Is the recommended action for Sid users to install the Woody
OpenSSH 3.4 deb package?  If not, what?

TIA,
Raymond

Attachment: pgpsJ9TyZxRZO.pgp
Description: PGP signature


Reply to: