Date: Mon, 1 Jul 2024 18:54:09 +0200 From: Andrea Venturoli <ml@netfence.it> To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-24:04.openssh Message-ID: <83513e2f-89c2-46bc-9729-110af95878d2@netfence.it> In-Reply-To: <20240701085840.0EA17B51@freefall.freebsd.org>
index | next in thread | previous in thread | raw e-mail
On 7/1/24 10:58, FreeBSD Security Advisories wrote: > ============================================================================= > FreeBSD-SA-24:04.openssh Security Advisory > The FreeBSD Project Hello. Assuming: a) a machine is on the previous patch level (e.g. 13.3p3 or 14.0p7); b) source has been updated and "make buildworld" completed. Would the following be enough to close this vulnerability? > cd /usr/src/secure/usr.sbin/ssh > make install > service sshd restart Or is something similar available? bye & Thanks av.home | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?83513e2f-89c2-46bc-9729-110af95878d2>
