[Bug 340] Segmentation Fault

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Mon Jul 8 21:12:00 EST 2002


http://bugzilla.mindrot.org/show_bug.cgi?id=340

dtucker at zip.com.au changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
            Summary|Segmentation Fault          |Segmentation Fault



------- Additional Comments From dtucker at zip.com.au  2002-07-08 21:11 -------
Correct me if I'm wrong but I get the impression you downloaded sunfreeware's 
binary packages?

If so then you should really contact them for help or to report bugs. They're 
the only ones who know how the packages were configured and compiled.

That said, my gut feel is that this is and OpenSSL library version issue (ie you 
got 0.9.6c and your binaries are linked against 0.9.6d or vice versa). Both 
versions have the same library version identifier (0.9.6) but are *NOT* binary 
compatible. The OpenSSL docs recommend against dynamically linking like that, I 
might add.

Also, 3.1p1 has a known vulnerability. Since 3.4p1 appears to be available for 
your platform I suggest you use that instead.



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.



More information about the openssh-unix-dev mailing list