From owner-freebsd-security Fri Jul 12 17:13:29 2002 Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.FreeBSD.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 1F63E37B400 for ; Fri, 12 Jul 2002 17:13:24 -0700 (PDT) Received: from malkavian.org (malkavian.org [206.136.132.23]) by mx1.FreeBSD.org (Postfix) with ESMTP id 5B84A43E72 for ; Fri, 12 Jul 2002 17:13:23 -0700 (PDT) (envelope-from rbw@myplace.org) Received: from malkavian.org (rbw@localhost [127.0.0.1]) by malkavian.org (8.12.3/8.12.3) with ESMTP id g6D0DH2F072005; Fri, 12 Jul 2002 20:13:17 -0400 (EDT) (envelope-from rbw@myplace.org) Received: (from rbw@localhost) by malkavian.org (8.12.3/8.12.3/Submit) id g6D0DH6D072004; Fri, 12 Jul 2002 17:13:17 -0700 (MST) X-Authentication-Warning: malkavian.org: rbw set sender to rbw@myplace.org using -f Date: Fri, 12 Jul 2002 17:13:17 -0700 From: "brian j. peterson" To: Darren Pilgrim , freebsd-security@FreeBSD.ORG Subject: Re: FreeBSD Security Advisory FreeBSD-SA-02:30.ktrace Message-ID: <20020713001317.GD8059@malkavian.org> Mail-Followup-To: Darren Pilgrim , freebsd-security@FreeBSD.ORG References: <200207122046.g6CKkDFN099899@freefall.freebsd.org> <3D2F531B.453A6855@pantherdragon.org> <20020712230903.GA25363@peitho.fxp.org> <3D2F6A38.72F41EE1@pantherdragon.org> <20020712235125.GA91126@peitho.fxp.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20020712235125.GA91126@peitho.fxp.org> User-Agent: Mutt/1.4i X-URL: http://rbw.myplace.org/ Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org if you are tracking RELENG_4_6 (or any RELENG_x_y), /usr/src/UPDATING will tell you what security patches have been applied to your source. i find this very helpful for situations like this. from /usr/src/UPDATING: ******** 20020712: p2 FreeBSD-SA-02:29.tcpdump A buffer overflow in tcpdump has been corrected. 20020711: FreeBSD-SA-02:30.ktrace Prevent users from tracing previously privileged processes. 20020708: A tags bug in the ata(4) subsystem has been corrected. 20020626: p1 A fix for a buffer overflow in libc has been corrected. 20020615: FreeBSD 4.6-RELEASE. ******** -brian On Fri, Jul 12, 2002 at 07:51:25PM -0400, Chris Faulhaber wrote: > On Fri, Jul 12, 2002 at 04:46:00PM -0700, Darren Pilgrim wrote: > > Chris Faulhaber wrote: > > > On Fri, Jul 12, 2002 at 03:07:23PM -0700, Darren Pilgrim wrote: > > > > When will this patch be merged into the security branches, or was it > > > > included with the tcpdump fix and the merge just not mentioned? > > > > > > ??? > > > > In the tcpdump SA, for example, we were told that updating to > > 4.6-RELEASE-p2 would fix the problem for 4.6. There was no such > > statement in the ktrace SA, so we're left with either going to stable > > Ah, ok. Yeah, looks like that was left out. > > > or applying the patch. While patching isn't much effort at all, I > > just don't like it. One of the big attractors to FreeBSD is the CVS > > method for getting all updates, fixes, and upgrades. It makes things > > work really well without the worry of version conflicts and source > > discrepancies that patching can induce. > > > > I guess the better question should have been: is the ktrace fix > > included in 4.6-RELEASE-p2? > > Yes, 4.6-RELEASE-p2 does contain the fix. > > -- > Chris D. Faulhaber - jedgar@fxp.org - jedgar@FreeBSD.org > -------------------------------------------------------- > FreeBSD: The Power To Serve - http://www.FreeBSD.org -- --===-----=======-----------=============-----------------=================== bjp aka rbw | and did you exchange a walk on part in the war rbw@myplace.org | for a lead role in a cage? ===================-----------------=============-----------=======-----===-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message