[Fwd: LSH: Buffer overrun and remote root compromise in lshd]
Will Andrews
will at csociety.org
Sat Sep 20 11:20:36 PDT 2003
On Sat, Sep 20, 2003 at 08:18:50PM +0200, Oliver Eikemeier wrote:
> port security/lsh 1.5.2 has a remote root compromise,
> it seems that even the client part is affected.
> Either someone upgrades it to 1.5.3 or we mark it as
> broken for 4.9.
>
> The announcement is at:
> <http://lists.lysator.liu.se/pipermail/lsh-bugs/2003q3/000127.html>
Feel free to upgrade the port, it has portmgr approval.
Regards,
--
wca
More information about the freebsd-ports
mailing list