Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 20 Sep 2003 11:20:35 -0700
From:      Will Andrews <will@csociety.org>
To:        FreeBSD ports <ports@FreeBSD.org>
Cc:        FreeBSD Ports Management Team <portmgr@freebsd.org>
Subject:   Re: [Fwd: LSH: Buffer overrun and remote root compromise in lshd]
Message-ID:  <20030920182035.GM47671@procyon.firepipe.net>
In-Reply-To: <3F6C9A0A.8080103@fillmore-labs.com>
References:  <3F6C9A0A.8080103@fillmore-labs.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Sep 20, 2003 at 08:18:50PM +0200, Oliver Eikemeier wrote:
> port security/lsh 1.5.2 has a remote root compromise,
> it seems that even the client part is affected.
> Either someone upgrades it to 1.5.3 or we mark it as
> broken for 4.9.
> 
> The announcement  is at:
>  <http://lists.lysator.liu.se/pipermail/lsh-bugs/2003q3/000127.html>;

Feel free to upgrade the port, it has portmgr approval.

Regards,
-- 
wca



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030920182035.GM47671>