Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 01 Jul 2002 10:30:44 -0600
From:      Brett Glass <brett@lariat.org>
To:        David Pick <d.m.pick@qmul.ac.uk>, security@FreeBSD.ORG
Subject:   Re: security risk: ktrace(2) in FreeBSD prior to -current. 
Message-ID:  <4.3.2.7.2.20020701102105.022a44f0@localhost>
In-Reply-To: <E17P2Ol-0002Jf-00@xi.css.qmw.ac.uk>
References:  <Your message of "01 Jul 2002 16:01:34 %2B0200." <xzpelenim2p.fsf@flood.ping.uio.no>

next in thread | previous in thread | raw e-mail | index | archive | help

At 08:43 AM 7/1/2002, David Pick wrote:

>At least we can build a binary update "package"
>for the "ports" version using a simple "make package"; it's
>harder for the version integrated into the base. 

You can make a binary updater using the currently available
port. Just do

cd /usr/ports/security/openssh-portable && make -DOPENSSH_OVERWRITE_BASE package

Beware, though, that you'll also want to install the latest
OpenSSL "engine". I believe that you can make this into
a binary package as well.

>Please note that I have *not* asked for a binary update.
>I don't want to get flamed the way Brett does...

...for asking something reasonable? ;-)

Seriously: Please do ask. If we do not have up-to-date binary
packages, a large percentage of the new installs of FreeBSD 
(both network installs and those from CD-ROM) will be vulnerable 
from the start, even though the holes have long been identified. 
This is not only unethical but also terrible for FreeBSD's 
reputation. 

Already, the Apache/FreeBSD worm is making the rounds. Why 
allow new installs to be vulnerable?

--Brett


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.3.2.7.2.20020701102105.022a44f0>