Date: Tue, 1 Dec 2009 12:16:27 +0100 From: Alex Huth <a.huth@tmr.net> To: freebsd-security@freebsd.org Subject: Re: Upcoming FreeBSD Security Advisory Message-ID: <20091201111627.GC4920@borusse.borussiapark> In-Reply-To: <ov3Jq1IJ/c8KAXGQ501G8Os9xr8@Ll2tHa60cb%2BhiG8R4R8/VS21128> References: <200912010120.nB11Kjm9087476@freefall.freebsd.org> <ov3Jq1IJ/c8KAXGQ501G8Os9xr8@Ll2tHa60cb%2BhiG8R4R8/VS21128>
next in thread | previous in thread | raw e-mail | index | archive | help
* Eygene Ryabinkin schrieb: > Colin, *, good day. > > Tue, Dec 01, 2009 at 01:20:45AM +0000, FreeBSD Security Officer wrote: > > A short time ago a "local root" exploit was posted to the full-disclosure > > mailing list; as the name suggests, this allows a local user to execute > > arbitrary code as root. I am new to patching systems, so forgive "stupid" questions. We have some 6.1 systems. Are or will there be a patch for them or are they not involved in this problem? I am new to patching systems, so forgive me any stupid questions. We have some 6.1 and 6.3 systems. Are or will there be patches fro them or are they not involved in this problem? How do i apply such a patch? With freebsd-update? As far as i know is this tool only for systems >= 6.3 or? Thx Alex
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20091201111627.GC4920>