Date: Sat, 20 Sep 2003 11:20:35 -0700 From: Will Andrews <will@csociety.org> To: FreeBSD ports <ports@FreeBSD.org> Cc: FreeBSD Ports Management Team <portmgr@freebsd.org> Subject: Re: [Fwd: LSH: Buffer overrun and remote root compromise in lshd] Message-ID: <20030920182035.GM47671@procyon.firepipe.net> In-Reply-To: <3F6C9A0A.8080103@fillmore-labs.com> References: <3F6C9A0A.8080103@fillmore-labs.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Sep 20, 2003 at 08:18:50PM +0200, Oliver Eikemeier wrote: > port security/lsh 1.5.2 has a remote root compromise, > it seems that even the client part is affected. > Either someone upgrades it to 1.5.3 or we mark it as > broken for 4.9. > > The announcement is at: > <http://lists.lysator.liu.se/pipermail/lsh-bugs/2003q3/000127.html> Feel free to upgrade the port, it has portmgr approval. Regards, -- wca
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030920182035.GM47671>