""The intruder did deploy the modified packages, and
the modified SSH package may have captured passphrases for a short
time," Frields reported. "However, the investigation supports the
conclusion that the modified packages were discovered before anyone
accessed the system to sign any packages using the modified RPM
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.