From owner-freebsd-security Wed Jun 26 13: 2:54 2002 Delivered-To: freebsd-security@freebsd.org Received: from bunning.skiltech.com (bunning.skiltech.com [216.235.79.240]) by hub.freebsd.org (Postfix) with ESMTP id 07E5F37C3E3 for ; Wed, 26 Jun 2002 12:27:41 -0700 (PDT) Received: (from root@localhost) by bunning.skiltech.com (8.11.6/8.11.6) id g5QJQbN47356 for freebsd-security@freebsd.org; Wed, 26 Jun 2002 15:26:37 -0400 (EDT) (envelope-from minter) Received: (from minter@localhost) by bunning.skiltech.com (8.11.6/8.11.6) id g5QJQYs47343; Wed, 26 Jun 2002 15:26:34 -0400 (EDT) (envelope-from minter) Date: Wed, 26 Jun 2002 15:26:34 -0400 (EDT) From: "H. Wade Minter" X-X-Sender: minter@bunning.skiltech.com To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-02:28.resolv In-Reply-To: <200206261908.g5QJ8MOE035394@freefall.freebsd.org> Message-ID: <20020626152504.Q45972-100000@bunning.skiltech.com> X-Folkin-Excellent: Eddie From Ohio (efohio.com) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII X-Virus-Scanned: by AMaViS perl-11 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org On Wed, 26 Jun 2002, FreeBSD Security Advisories wrote: > ============================================================================= > FreeBSD-SA-02:28.resolv Security Advisory > The FreeBSD Project > > Topic: buffer overflow in resolver > > Category: core > Module: libc [snip] > Do one of the following: > > 1) Upgrade your vulnerable system to 4.6-STABLE; or to the RELENG_4_6 > or RELENG_4_5 security branch dated after the correction date > (4.6-RELEASE-p1 or 4.5-RELEASE-p7). > > 2) To patch your present system: > > The following patch has been verified to apply to FreeBSD 4.5 and > FreeBSD 4.6 systems. > > a) Download the relevant patch from the location below, and verify the > detached PGP signature using your PGP utility. > > # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-02:28/resolv.patch > # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-02:28/resolv.patch.asc > > b) Execute the following commands as root: > > # cd /usr/src > # patch < /path/to/patch So am I correct in assuming that this fix requires a complete system rebuild (make buildworld) as opposed to just rebuilding a particular module? --Wade -- 'I say to you that the VCR is to the American film producer and the American public as the Boston strangler is to the woman home alone.' Jack Valenti on VCRs, 1982 'It's getting clear -- alarmingly clear, I might add -- that we are in the midst of the possibility of Armageddon.' Jack Valenti on the Internet, 2002 http://www.digitalconsumer.org/ http://digitalspeech.org/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message