On Thu, Jun 27, 2002 at 02:50:54PM +0200, Michael Stone remarked: > -----BEGIN PGP SIGNED MESSAGE----- > > - ------------------------------------------------------------------------ > Debian Security Advisory DSA-134-4 security@debian.org > http://www.debian.org/security/ Michael Stone > June 27, 2002 > - ------------------------------------------------------------------------ > > Package : ssh > Problem type : remote exploit > Debian-specific: no > CERT advisory : CA-2002-18 > > This advisory is an update to DSA-134-3: this advisory contains > updated information that is relevant to all Debian installations of > OpenSSH (the ssh package). DSA-134-4 supersedes previous versions of > DSA-134. [snip] > wget url > will fetch the file for you > dpkg -i file.deb > will install the referenced file. > > > Debian GNU/Linux 2.2 alias potato > - --------------------------------- > > Potato was released for alpha, arm, i386, m68k, powerpc and sparc [snip] > > Debian GNU/Linux 3.0 alias woody > - -------------------------------- > > Woody will be released for alpha, arm, hppa, i386, ia64, m68k, mips, > mipsel, powerpc, s390 and sparc. [snip] Thank you *very* much for this clarification (this SSH vulnerability has been a bit of a nightmare for users to follow). One additional question: (I have asked before but so far received no satisfactory response) Is the recommended action for Sid users to install the Woody OpenSSH 3.4 deb package? If not, what? TIA, Raymond
Attachment:
pgpsJ9TyZxRZO.pgp
Description: PGP signature