[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: debian potato's SSH not affected by SSH bug?



Phil Brutsche <phil@tux.obix.com> writes:

> No, potato's ssh packages are vunlerable and updates have been made
> available; DSA-134 contains all the necessary information:
> http://www.debian.org/security/2002/dsa-134.

That DSA does not contain all the information currently available,
because it was written before the actual problem was known.

"Theo de Raadt announced that the OpenBSD team is working with ISS to
address a remote exploit for OpenSSH (a free implementation of the
Secure SHell protocol). They are refusing to provide any details on
the vulnerability but instead are advising users to upgrade to the
latest release, version 3.3."

-- 
Alan Shutko <ats@acm.org> - In a variety of flavors!
WinErr: 013 Unexpected error - Huh ?


-- 
To UNSUBSCRIBE, email to debian-user-request@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org



Reply to: