- 论坛徽章:
- 0
|
安全通告上有详细的说明。 命令写得很详细。
一个办法是升级代码到最新的stable版本,然后编译。
另一个办法是对源代码patch后编译部分代码。这个办法比较快。
比如最新的 FreeBSD-SA-08:05.openssh 中
V. Solution
Perform one of the following:
1) Upgrade your vulnerable system to 5-STABLE, 6-STABLE, or 7-STABLE,
or to the RELENG_7_0, RELENG_6_3, RELENG_6_2, RELENG_6_1, RELENG_5_5
security branch dated after the correction date.
2) To patch your present system:
The following patch has been verified to apply to FreeBSD 5.5, 6.1,
6.2, 6.3, and 7.0 systems.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
# fetch http://security.FreeBSD.org/patches/SA-08:05/openssh.patch
# fetch http://security.FreeBSD.org/patches/SA-08:05/openssh.patch.asc
b) Execute the following commands as root:
# cd /usr/src
# patch < /path/to/patch
# cd /usr/src/secure/lib/libssh
# make obj && make depend && make && make install
# cd /usr/src/secure/usr.sbin/sshd
# make obj && make depend && make && make install
# /etc/rc.d/sshd restart
[ 本帖最后由 doctorjxd 于 2008-5-19 19:03 编辑 ] |
|