Date: Wed, 15 Dec 1999 09:24:34 -0800 (PST) From: Roger Marquis <marquis@roble.com> To: security@FreeBSD.ORG Subject: Re: Security Advisory: Buffer overflow in RSAREF2 Message-ID: <Pine.GSO.3.96.991215091819.13345A-100000@roble2.roble.com> In-Reply-To: <bulk.27566.19991211131617@hub.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
spork <spork@super-g.com> wrote: > does this mean that simply patching, recompiling, and installing librsaref > will fix ssh (for this vuln, not the last)? You could also edit the ssh/Makefile to change CONFIGURE_ARGS: CONFIGURE_ARGS+= #CONFIGURE_ARGS+= --with-rsaref and recompile/reinstall. -- Roger Marquis Roble Systems Consulting http://www.roble.com/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.GSO.3.96.991215091819.13345A-100000>