Openssh 3.6.1

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

To all:
Has the openssh setup shipped with Fedora addressed the potential buffer
overflow mentioned in Cert advisory CA-2003-24?

www.kb.cert.org/vuls/id/333628

I ask because I've encountered a couple of people who are worried that
Fedora hasn't shipped a version of 3.7.1 in order to address this issue
and are therefore calling into question the security and reliability of
the Fedora project and are using it out of hand to dismiss it as a
desktop alternative, preferring instead to opt for RHEL WS.

Sorry for the run-on mega sentence...
- --
- ----------
Doug Stewart
Systems Administrator/Web Applications Developer
Lockheed Martin Advanced Technology Labs
dstewart@xxxxxxxxxxxx

Quidquid latine dictum sit, altum viditur

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQE/u5e1N50Q8DVvcvkRAlVfAJ4/uJKmnndQlPGbNqMIi4cKcJibGwCcCOrn
OJNAH+et6oGMMpTu5yJcXxo=
=jbfn
-----END PGP SIGNATURE-----




[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux