Hello! 2010/5/27 FreeBSD Security Advisories <[email protected]>: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > ============================================================================= > FreeBSD-SA-10:05.opie Security Advisory > The FreeBSD Project ...
> IV. Workaround > No workaround is available, but systems without OPIE capable services > running are not vulnerable. Wouldn't just commenting out all references to pam_opie* in /etc/pam.d/* create a viable workaround? > a) Download the relevant patch from the location below, and verify the > detached PGP signature using your PGP utility. > > # fetch http://security.FreeBSD.org/patches/SA-10-05/opie.patch > # fetch http://security.FreeBSD.org/patches/SA-10-05/opie.patch.asc Apparently correct URLs are # fetch http://security.FreeBSD.org/patches/SA-10:05/opie.patch # fetch http://security.FreeBSD.org/patches/SA-10:05/opie.patch.asc -- Sincerely, Dmitry nic-hdl: LYNX-RIPE _______________________________________________ [email protected] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "[email protected]"
