Date: Thu, 14 Jan 2016 12:03:18 -0600 From: Mark Felder <feld@FreeBSD.org> To: freebsd-security@freebsd.org, FreeBSD Security Advisories <security-advisories@freebsd.org> Subject: Re: FreeBSD Security Advisory FreeBSD-SA-16:06.bsnmpd Message-ID: <1452794598.3272417.492278658.0BA706B8@webmail.messagingengine.com> In-Reply-To: <20160114100455.52C3A1623@freefall.freebsd.org> References: <20160114100455.52C3A1623@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jan 14, 2016, at 04:04, FreeBSD Security Advisories wrote: > > V. Solution > > This vulnerability can be fixed by modifying the permission on > /etc/bsnmpd.conf to owner root:wheel and permission 0600. > > The patch is provided mainly for third party vendors who deploy FreeBSD > and provide a safe default. The patch itself DOES NOT fix the > permissions > for existing installations. > Are we paranoid of breaking someone's special snowflake install, or is freebsd-update unable to only do a permissions change? -- Mark Felder ports-secteam member feld@FreeBSD.org
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1452794598.3272417.492278658.0BA706B8>