Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 10 Dec 1999 19:36:07 -0500 (EST)
From:      spork <spork@super-g.com>
To:        Kris Kennaway <kris@hub.freebsd.org>
Cc:        Todd Backman <todd@flyingcroc.net>, security@freebsd.org
Subject:   Re: Security Advisory: Buffer overflow in RSAREF2 (fwd)
Message-ID:  <Pine.BSF.4.00.9912101932300.21197-100000@super-g.inch.com>
In-Reply-To: <Pine.BSF.4.21.9912021536050.6925-100000@hub.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Can someone clarify this for me?  If ldd shows output like so:

root@ass[/usr/ports/security/rsaref]# ldd /usr/local/bin/ssh
/usr/local/bin/ssh:
        libgmp.so.3 => /usr/lib/libgmp.so.3 (0x2806d000)
        libz.so.2 => /usr/lib/libz.so.2 (0x28083000)
        librsaref.so.2 => /usr/local/lib/librsaref.so.2 (0x28090000)
        libcrypt.so.2 => /usr/lib/libcrypt.so.2 (0x28099000)
        libutil.so.2 => /usr/lib/libutil.so.2 (0x280ae000)
        libc.so.3 => /usr/lib/libc.so.3 (0x280b6000)        

does this mean that simply patching, recompiling, and installing librsaref
will fix ssh (for this vuln, not the last)?  I'm not a genius with all
this shared lib stuff, but I think I'm reading this right...

Thanks,

charles

On Thu, 2 Dec 1999, Kris Kennaway wrote:

> On Thu, 2 Dec 1999, Kris Kennaway wrote:
> 
> > It's been patched: re-cvsup your ports and rebuild rsaref, followed by
> > anything which depends on it (i.e. which statically links to librsaref.a
> > - but easier and safer to just do all of the dependencies).
> 
> I forgot to mention the easy way to get this list:
> 
> cat /var/db/pkg/rsaref-2.0/+REQUIRED_BY
> 
> before you rebuild.
> 
> Kris
> 
> 
> 
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
> 



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.00.9912101932300.21197-100000>