Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 3 Mar 2004 16:40:12 +0000
From:      Matthew Seaman <m.seaman@infracaninophile.co.uk>
To:        Ronald Clark <rclark@swbanktx.com>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: latest security advisory and 5.1R
Message-ID:  <20040303164012.GC32905@happy-idiot-talk.infracaninophile.co.uk>
In-Reply-To: <B8AC1F276C2A1A4FB6E3BBA9B464DBDF6C9604@excrtw03.swbtx.com>
References:  <B8AC1F276C2A1A4FB6E3BBA9B464DBDF6C9604@excrtw03.swbtx.com>

next in thread | previous in thread | raw e-mail | index | archive | help

--0lnxQi9hkpPO77W3
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Wed, Mar 03, 2004 at 08:35:00AM -0600, Ronald Clark wrote:

> I have what I hope is a simple question. If I cvsup my sources and
> complete the makeworld and installworld processes, will that install the
> patch, or do I need to apply manually and recompile the kernel? (I have
> been under the impression that doing a cvsup would download and install
> the patch when sources were updated)

So long as you are cvsup'ing one of the branches where the fix has
been applied: that's HEAD, RELENG_5_2, RELENG_4_9, RELENG_4_8 or
RELENG_4, then yes: cvsup, followed by make
{build,install}{world,kernel} will remove the vulnerability.  It seems
that the fix has not been applied to the RELENG_5_1 branch, so
5.1-RELEASE users really should think about upgrading to
5.2.1-RELEASE.

You can download the patches as shown in the advisory and apply them
by hand if you really want to, but that should be left to masochists
only as it does pretty well exactly what cvsup'ing does, except it
takes a lot more concentration and has a greater risk of fat-fingering
the keyboard and so shooting yourself in the foot.

	Cheers,

	Matthew

--=20
Dr Matthew J Seaman MA, D.Phil.                       26 The Paddocks
                                                      Savill Way
PGP: http://www.infracaninophile.co.uk/pgpkey         Marlow
Tel: +44 1628 476614                                  Bucks., SL7 1TH UK

--0lnxQi9hkpPO77W3
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (FreeBSD)

iD8DBQFARgpsdtESqEQa7a0RAs2AAJ9Aq4Ss6lrj+MU5QZW6jNpDBK9MEACeLRu2
EhMrNQMqof/YUSIy+1e9cQY=
=wbMf
-----END PGP SIGNATURE-----

--0lnxQi9hkpPO77W3--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040303164012.GC32905>