Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 6 Dec 2001 17:56:11 -0600
From:      Christopher Farley <chris@northernbrewer.com>
To:        Matthew Luckie <kluckie@ihug.co.nz>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: Upgrading OpenSSH
Message-ID:  <20011206175609.B750@northernbrewer.com>
In-Reply-To: <003b01c17eaf$fcbd1030$1400a8c0@spandex>
References:  <003b01c17eaf$fcbd1030$1400a8c0@spandex>

next in thread | previous in thread | raw e-mail | index | archive | help
Matthew Luckie (kluckie@ihug.co.nz) wrote:

> Hi
> 
> I have a machine in the field with FreeBSD 4.1-RELEASE installed.
> The OpenSSH that shipped on that machine is vulnerable to a number of
> exploits.
> 
> What is the best way to fix this machine?  I am comfortable with using cvsup
> and the build tools.  I am happy to do a full cvsup to the system but I
> anticipate that that is a bit heavy handed to fix just openssh.

There may be other benefits, though, like fixing all the other
major vulnerabilities that have accumulated since 4.1-RELEASE.

> Should I be using one of the security branch fix trees?

If you've got a production machine, you might want to track RELENG_4_4
(the security branch fix). If you have less conservative requirements
and can accept the remote possibility of a bug creeping into the system,
the -STABLE branch (RELENG_4) has, for me, proven to be very reliable.

There are several other options for fixing OpenSSH: 
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01%3A63.openssh.asc

-- 
Christopher Farley
www.northernbrewer.com

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011206175609.B750>