On Sun, Oct 21, 2001 at 04:41:17PM -0500, Mike Renfro wrote: > On Fri, Oct 19, 2001 at 03:26:18PM -0800, Ethan Benson wrote: > > On Fri, Oct 19, 2001 at 06:06:34PM -0400, [EMAIL PROTECTED] wrote: > > > Has debian released a new ssh dpkg yet? > > > > no > > If this is about the buffer overflow exploit that's supposed to be > going around now, wasn't this fixed in the following:
well i assumed he was referring to the OpenSSH2 problems with authorized_keys2 among others fixed in 2.9.9p2. while this is not relevant to stable it does affect unstable users, and the sid ssh packages are still not updated to 2.9.9p2. this is not the responisibility of the security team of course. there is also the so called traffic analysis problems which stable ssh has no workarounds for. (there are patches to counteract that problem). > openssh (1:1.2.3-9.2) stable; urgency=high > > * Non-maintainer upload by Security Team > * Added backported fix for a buffer overflow (thanks to Piotr > Roszatycki) > * Added modified build dependencies from unstable for convenience > * Added patch that fixes an rsa key exchange problem made public by CORE > SDI. > > -- Martin Schulze <[EMAIL PROTECTED]> Thu, 8 Feb 2001 22:15:04 +0100 > > If it's a different exploit entirely, please ignore. > > -- > Mike Renfro / R&D Engineer, Center for Manufacturing Research, > 931 372-3601 / Tennessee Technological University -- [EMAIL PROTECTED] > > > -- > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED] > -- Ethan Benson http://www.alaska.net/~erbenson/
pgpoH9ybLHoUr.pgp
Description: PGP signature