From owner-freebsd-security@FreeBSD.ORG Mon Apr 29 22:38:01 2013 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id D602B4F9 for ; Mon, 29 Apr 2013 22:38:01 +0000 (UTC) (envelope-from wbe@psr.com) Received: from psr.com (mail.psr.com [67.212.42.216]) by mx1.freebsd.org (Postfix) with ESMTP id 804351BDB for ; Mon, 29 Apr 2013 22:38:00 +0000 (UTC) Received: from psr.com (localhost [127.0.0.1]) by psr.com (8.14.5/8.14.5) with ESMTP id r3TMQOPT056591 for ; Mon, 29 Apr 2013 18:26:24 -0400 (EDT) (envelope-from wbe@psr.com) Received: (from wbe@localhost) by psr.com (8.14.5/8.14.5/Submit) id r3TMQOnI056590; Mon, 29 Apr 2013 18:26:24 -0400 (EDT) (envelope-from wbe) Message-Id: <201304292226.r3TMQOnI056590@psr.com> Date: Mon, 29 Apr 2013 18:26 EDT From: Winston To: freebsd-security@freebsd.org Subject: Re: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-13:05.nfsserver References: <20130429205552$12b7@rincewind.paeps.cx> In-Reply-To: <20130429205552$12b7@rincewind.paeps.cx> (FreeBSD Security Advisories's message of "Mon, 29 Apr 2013 22:55:52 +0200") X-Mailman-Approved-At: Tue, 30 Apr 2013 03:41:15 +0000 X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 29 Apr 2013 22:38:01 -0000 For the purpose of the NFS vulnerability in 9.0-RELEASE, does it make any difference whether one has used /etc/exports and an explicitly started nfsd, or exported the files using "zfs set sharenfs={options}" if the exported file system in both cases is ZFS? (That's probably similar to asking whether ZFS has its own NFSd code or uses /usr/sbin/nfsd.) Thanks in advance, -WBE