[Bug 340] Segmentation Fault
bugzilla-daemon at mindrot.org
bugzilla-daemon at mindrot.org
Mon Jul 8 21:12:00 EST 2002
http://bugzilla.mindrot.org/show_bug.cgi?id=340
dtucker at zip.com.au changed:
What |Removed |Added
----------------------------------------------------------------------------
Summary|Segmentation Fault |Segmentation Fault
------- Additional Comments From dtucker at zip.com.au 2002-07-08 21:11 -------
Correct me if I'm wrong but I get the impression you downloaded sunfreeware's
binary packages?
If so then you should really contact them for help or to report bugs. They're
the only ones who know how the packages were configured and compiled.
That said, my gut feel is that this is and OpenSSL library version issue (ie you
got 0.9.6c and your binaries are linked against 0.9.6d or vice versa). Both
versions have the same library version identifier (0.9.6) but are *NOT* binary
compatible. The OpenSSL docs recommend against dynamically linking like that, I
might add.
Also, 3.1p1 has a known vulnerability. Since 3.4p1 appears to be available for
your platform I suggest you use that instead.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
More information about the openssh-unix-dev
mailing list