Date: Fri, 10 Dec 1999 19:36:07 -0500 (EST) From: spork <spork@super-g.com> To: Kris Kennaway <kris@hub.freebsd.org> Cc: Todd Backman <todd@flyingcroc.net>, security@freebsd.org Subject: Re: Security Advisory: Buffer overflow in RSAREF2 (fwd) Message-ID: <Pine.BSF.4.00.9912101932300.21197-100000@super-g.inch.com> In-Reply-To: <Pine.BSF.4.21.9912021536050.6925-100000@hub.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Can someone clarify this for me? If ldd shows output like so:
root@ass[/usr/ports/security/rsaref]# ldd /usr/local/bin/ssh
/usr/local/bin/ssh:
libgmp.so.3 => /usr/lib/libgmp.so.3 (0x2806d000)
libz.so.2 => /usr/lib/libz.so.2 (0x28083000)
librsaref.so.2 => /usr/local/lib/librsaref.so.2 (0x28090000)
libcrypt.so.2 => /usr/lib/libcrypt.so.2 (0x28099000)
libutil.so.2 => /usr/lib/libutil.so.2 (0x280ae000)
libc.so.3 => /usr/lib/libc.so.3 (0x280b6000)
does this mean that simply patching, recompiling, and installing librsaref
will fix ssh (for this vuln, not the last)? I'm not a genius with all
this shared lib stuff, but I think I'm reading this right...
Thanks,
charles
On Thu, 2 Dec 1999, Kris Kennaway wrote:
> On Thu, 2 Dec 1999, Kris Kennaway wrote:
>
> > It's been patched: re-cvsup your ports and rebuild rsaref, followed by
> > anything which depends on it (i.e. which statically links to librsaref.a
> > - but easier and safer to just do all of the dependencies).
>
> I forgot to mention the easy way to get this list:
>
> cat /var/db/pkg/rsaref-2.0/+REQUIRED_BY
>
> before you rebuild.
>
> Kris
>
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.00.9912101932300.21197-100000>
