-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
To all: Has the openssh setup shipped with Fedora addressed the potential buffer overflow mentioned in Cert advisory CA-2003-24?
I ask because I've encountered a couple of people who are worried that Fedora hasn't shipped a version of 3.7.1 in order to address this issue and are therefore calling into question the security and reliability of the Fedora project and are using it out of hand to dismiss it as a desktop alternative, preferring instead to opt for RHEL WS.
Sorry for the run-on mega sentence... - -- - ---------- Doug Stewart Systems Administrator/Web Applications Developer Lockheed Martin Advanced Technology Labs [email protected]
Quidquid latine dictum sit, altum viditur
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQE/u5e1N50Q8DVvcvkRAlVfAJ4/uJKmnndQlPGbNqMIi4cKcJibGwCcCOrn OJNAH+et6oGMMpTu5yJcXxo= =jbfn -----END PGP SIGNATURE-----