Re: FreeBSD Security Advisory FreeBSD-SA-13:05.nfsserver

看板FB_security作者時間12年前 (2013/04/30 12:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串3/19 (看更多)
Please be advised that, when using freebsd-update(8) to install the patch for this security problem, freebsd-update will move the current kernel to /boot/kernel.old, and install a new GENERIC kernel in /boot/kernel, even if you have built a custom kernel and created a copy of the GENERIC kernel in /boot/GENERIC. The kernel in /boot/GENERIC is NOT updated, nor are the modules in that directory updated. What's more, if you did not build modules for your custom kernel, you will not get copies of the updated NFS modules. This is probably not the behavior most users who have built custom kernels will want or expect. (I would have hoped that the GENERIC kernel, its modules, and the kernel sources would be updated and that I'd be reminded to rebuild my custom kernel if necessary.) --Brett Glass At 02:55 PM 4/29/2013, FreeBSD Security Advisories wrote: >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > >============================================================================= >FreeBSD-SA-13:05.nfsserver Security Advisory > The FreeBSD Project > >Topic: Insufficient input validation in the NFS server _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1HVq7_Wg (FB_security)
討論串 (同標題文章)
文章代碼(AID): #1HVq7_Wg (FB_security)