On Tue, Jun 25, 2002 at 02:37:12PM +0200, Wichert Akkerman remarked: > -----BEGIN PGP SIGNED MESSAGE----- > > - ------------------------------------------------------------------------ > Debian Security Advisory DSA-134-2 [EMAIL PROTECTED] > http://www.debian.org/security/ Wichert Akkerman > June 25, 2002 > - ------------------------------------------------------------------------ > > > Package : ssh > Problem type : remote exploit > Debian-specific: no > > This advisory is an update to DSA-134-1: some extra information is > provided on broken or changed functionality in this new release and > packages for Debian GNU/Linux 2.2/potato are now available. [snip] > wget url > will fetch the file for you > dpkg -i file.deb > will install the referenced file. > > > Debian GNU/Linux 2.2 alias potato > - --------------------------------- > > Potato was released for alpha, arm, i386, m68k, powerpc and sparc > Packages for m68k are not available at this moment. [snip] > Debian GNU/Linux 3.0 alias woody > - --------------------------------- > > Woody will be released for alpha, arm, hppa, i386, ia64, m68k, mips, > mipsel, powerpc, s390 and sparc. Packages for m68k are not available > at this moment. [snip]
Potato and Woody are both patched then. What is the recommended course of action for those running Sid? Should Sid users install the Woody patch, or is this a bad idea? Thanks for all the hard work Debian Security people! Cheers, Raymond
pgpal2czmlTwx.pgp
Description: PGP signature