Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 1 Dec 2009 12:16:27 +0100
From:      Alex Huth <a.huth@tmr.net>
To:        freebsd-security@freebsd.org
Subject:   Re: Upcoming FreeBSD Security Advisory
Message-ID:  <20091201111627.GC4920@borusse.borussiapark>
In-Reply-To: <ov3Jq1IJ/c8KAXGQ501G8Os9xr8@Ll2tHa60cb%2BhiG8R4R8/VS21128>
References:  <200912010120.nB11Kjm9087476@freefall.freebsd.org> <ov3Jq1IJ/c8KAXGQ501G8Os9xr8@Ll2tHa60cb%2BhiG8R4R8/VS21128>

next in thread | previous in thread | raw e-mail | index | archive | help
* Eygene Ryabinkin schrieb:
> Colin, *, good day.
> 
> Tue, Dec 01, 2009 at 01:20:45AM +0000, FreeBSD Security Officer wrote:
> > A short time ago a "local root" exploit was posted to the full-disclosure
> > mailing list; as the name suggests, this allows a local user to execute
> > arbitrary code as root.

I am new to patching systems, so forgive "stupid" questions. We have some 6.1
systems. Are or will there be a patch for them or are they not involved in
this problem?

I am new to patching systems, so forgive me any stupid questions. We have some
6.1 and 6.3 systems. Are or will there be patches fro them or are they not
involved in this problem?

How do i apply such a patch? With freebsd-update? As far as i know is this
tool only for systems >= 6.3 or?

Thx

Alex



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20091201111627.GC4920>