Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 14 Jan 2016 12:03:18 -0600
From:      Mark Felder <feld@FreeBSD.org>
To:        freebsd-security@freebsd.org, FreeBSD Security Advisories <security-advisories@freebsd.org>
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-16:06.bsnmpd
Message-ID:  <1452794598.3272417.492278658.0BA706B8@webmail.messagingengine.com>
In-Reply-To: <20160114100455.52C3A1623@freefall.freebsd.org>
References:  <20160114100455.52C3A1623@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help


On Thu, Jan 14, 2016, at 04:04, FreeBSD Security Advisories wrote:
> 
> V.   Solution
> 
> This vulnerability can be fixed by modifying the permission on
> /etc/bsnmpd.conf to owner root:wheel and permission 0600.
> 
> The patch is provided mainly for third party vendors who deploy FreeBSD
> and provide a safe default.  The patch itself DOES NOT fix the
> permissions
> for existing installations.
> 

Are we paranoid of breaking someone's special snowflake install, or is
freebsd-update unable to only do a permissions change?

-- 
  Mark Felder
  ports-secteam member
  feld@FreeBSD.org



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1452794598.3272417.492278658.0BA706B8>