Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 15 Dec 1999 09:24:34 -0800 (PST)
From:      Roger Marquis <marquis@roble.com>
To:        security@FreeBSD.ORG
Subject:   Re: Security Advisory: Buffer overflow in RSAREF2
Message-ID:  <Pine.GSO.3.96.991215091819.13345A-100000@roble2.roble.com>
In-Reply-To: <bulk.27566.19991211131617@hub.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
spork <spork@super-g.com> wrote:
> does this mean that simply patching, recompiling, and installing librsaref
> will fix ssh (for this vuln, not the last)? 

You could also edit the ssh/Makefile to change CONFIGURE_ARGS:

	CONFIGURE_ARGS+=
	#CONFIGURE_ARGS+= --with-rsaref

and recompile/reinstall.

--
Roger Marquis
Roble Systems Consulting
http://www.roble.com/



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.GSO.3.96.991215091819.13345A-100000>