OpenSSL buffer overflow attack
According to this:
http://apache.slashdot.org/article.p...72&threshold=4 Openssl <e is vulnerable to a buffer overflow attack an is prevelent in default installs of many Linux distros. My question is this: I'm installing the newest version from the openssl site. They're tarballs. Do I have to reboot for it to take effect? Thanks |
nope,
you usually have to only log out of your account and then back in |
U also needa relink everything linked into it
|
Bah, I'll just reboot it. I don't want to mess anything up. Thanks.
|
After you've rebuilt the OpenSSL binaries, you'll need to relink anything that is statically linked to the libraries, such as SSH or mod_ssl.
|
All times are GMT -5. The time now is 12:29 PM. |