[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [cobalt-security] OPENSSL vulnerability
- Subject: Re: [cobalt-security] OPENSSL vulnerability
- From: Michael Stauber <cobalt@xxxxxxxxxxxxxx>
- Date: Tue, 30 Jul 2002 20:05:27 +0000
- Organization: SOLARSPEED.NET
- List-id: Mailing list for users to address network security on Cobalt products. <cobalt-security.list.cobalt.com>
Hi Gerald,
> I know, I thought we were to place it somewhere other than /usr/local?
You can (by omitting the "make install" part), but then it won't replace the
shared libraries and no application which is not specifically linked against
the new OpenSSL will make use of it.
> I get a lot of these on make install
>
> /usr/bin/pod2man does not work properly ('MultilineTest' failed).
> Looking for another pod2man ...
Darn. Yeah, sure. The Perl on the RaQs is crippled and lacks pod2man. I forgot
about that as my boxes usually have my Spam-Filter installed which brings the
missing pod2man aboard.
Fire up RPMfind.net and look for PodParser-1.18-1.i386.rpm and/or
podlators-1.19-1.i386.rpm. Dunno which one of both brings pod2man aboard.
Of grab 'em here:
http://www.solarspeed.net/free/PodParser-1.18-1.i386.rpm
http://www.solarspeed.net/free/podlators-1.19-1.i386.rpm
--
With best regards,
Michael Stauber
mstauber@xxxxxxxxxxxxxx
Unix/Linux Support Engineer