asterisk
--
backintime
--
botan1.10
--
bzr
--
cacti
--
exiv2
--
jasperreports
--
lame
--
libcatalyst-plugin-static-simple-perl
--
libextractor
--
libidn
--
libjpeg-turbo
--
libofx
--
libraw
--
libvorbis
--
libxml2
--
mysql-connector-net
--
opencv
--
openexr
--
openjpeg2
--
php-horde-gollem
--
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4033-1 secur...@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
November 13, 2017
Hi
On Mon, Nov 13, 2017 at 09:19:45PM +0100, Bastian Blank wrote:
> On Mon, Nov 13, 2017 at 12:57:48PM +, Adam Weremczuk wrote:
> > Our quarterly PCI compliance scan has just challenged us on the following:
> > https://vulners.com/nessus/OPENSSH_76.NASL
> > Also referred to as OSVDB-166706.
>
On Mon, Nov 13, 2017 at 12:57:48PM +, Adam Weremczuk wrote:
> Our quarterly PCI compliance scan has just challenged us on the following:
> https://vulners.com/nessus/OPENSSH_76.NASL
> Also referred to as OSVDB-166706.
The only security fix in OpenSSH 7.6 is:
| * sftp-server(8): in read-only
Hello,
Our quarterly PCI compliance scan has just challenged us on the following:
https://vulners.com/nessus/OPENSSH_76.NASL
Also referred to as OSVDB-166706.
As it's quite new I can't find much information on it online in terms of
potential hotfixes and workarounds.
There is no openssh
5 matches
Mail list logo