[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Exploit in ssh?



Colin Watson <cjwatson@debian.org> [2003:09:16:16:32:02+0100] scribed:
> On Tue, Sep 16, 2003 at 08:25:59AM -0700, moseley@hank.org wrote:
> > I saw this:
> > 
> > http://lists.netsys.com/pipermail/full-disclosure/2003-September/010116.html
> > 
> > Anyone know more about it?
> 
> Fixed packages are being prepared. The update for stable has already
> been released.

Also:

openssh (1:3.6.1p2-6.0.fixed) unstable; urgency=low

  * Apply http://www.freebsd.org/cgi/cvsweb.cgi/src/crypto/openssh/buffer.c.diff?r1=1.1.1.6&r2=1.1.1.7

 -- Ivo Timmermans <ivo@debian.org>  Tue, 16 Sep 2003 13:11:45 +0200

-- 
Best Regards,

mds
mds resource
877.596.8237
-
Dare to fix things before they break . . .
-
Our capacity for understanding is inversely proportional to how much
we think we know.  The more I know, the more I know I don't know . . .
--

Attachment: pgprEX0RvUsHr.pgp
Description: PGP signature


Reply to: