Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 18 Aug 2015 16:25:37 -0400
From:      Philip Gollucci <pgollucci@gocurb.com>
To:        freebsd-stable@freebsd.org
Cc:        FreeBSD Errata Notices <errata-notices@freebsd.org>
Subject:   Re: [FreeBSD-Announce] FreeBSD Errata Notice FreeBSD-EN-15:12.netstat
Message-ID:  <CADDV2kfvZ%2BHoEE=BDhgKrOZ7tgPFwKuLmOZoA0e4KJQUw7qVtQ@mail.gmail.com>
In-Reply-To: <20150818201541.C15361893@freefall.freebsd.org>
References:  <20150818201541.C15361893@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
We do not run 32bit.

On Tue, Aug 18, 2015 at 4:15 PM, FreeBSD Errata Notices <
errata-notices@freebsd.org> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
>
>
> =============================================================================
> FreeBSD-EN-15:12.netstat                                        Errata
> Notice
>                                                           The FreeBSD
> Project
>
> Topic:          Incorrect netstat(1) data handling on 32-bit systems
>
> Category:       core
> Module:         netstat
> Announced:      2015-08-18
> Credits:        Mark Johnston
> Affects:        FreeBSD 10.2-RELEASE
> Corrected:      2015-07-31 00:21:41 UTC (stable/10, 10.2-STABLE)
>                 2015-08-18 19:30:17 UTC (releng/10.2, 10.2-RC3-p1)
>                 2015-08-18 19:30:17 UTC (releng/10.2, 10.2-RELEASE-p1)
>
> For general information regarding FreeBSD Errata Notices and Security
> Advisories, including descriptions of the fields above, security
> branches, and the following sections, please visit
> <URL:https://security.freebsd.org/>.
>
> I.   Background
>
> The netstat(1) utility displays the contents of various network related
> data
> structures.
>
> II.  Problem Description
>
> The netstat(1) utility incorrectly handles reported values on 32-bit
> systems.
>
> III. Impact
>
> Due to how netstat(1) processes IPSEC counters, the utility may produce
> incorrect output on 32-bit systems.
>
> IV.  Workaround
>
> No workaround is available, however systems without IPSEC compiled into the
> kernel are not affected.
>
> V.   Solution
>
> Perform one of the following:
>
> 1) Upgrade your system to a supported FreeBSD stable or release / security
> branch (releng) dated after the correction date.
>
> 2) To update your present system via a binary patch:
>
> Systems running a RELEASE version of FreeBSD on the i386 or amd64
> platforms can be updated via the freebsd-update(8) utility:
>
> # freebsd-update fetch
> # freebsd-update install
>
> 3) To update your present system via a source code patch:
>
> The following patches have been verified to apply to the applicable
> FreeBSD release branches.
>
> a) Download the relevant patch from the location below, and verify the
> detached PGP signature using your PGP utility.
>
> # fetch https://security.FreeBSD.org/patches/EN-15:12/netstat.patch
> # fetch https://security.FreeBSD.org/patches/EN-15:12/netstat.patch.asc
> # gpg --verify netstat.patch.asc
>
> b) Apply the patch.  Execute the following commands as root:
>
> # cd /usr/src
> # patch < /path/to/patch
>
> c) Recompile the operating system using buildworld and installworld as
> described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.
>
> VI.  Correction details
>
> The following list contains the correction revision numbers for each
> affected branch.
>
> Branch/path                                                      Revision
> - -------------------------------------------------------------------------
> stable/10/                                                        r286099
> releng/10.2/                                                      r286901
> - -------------------------------------------------------------------------
>
> To see which files were modified by a particular revision, run the
> following command, replacing NNNNNN with the revision number, on a
> machine with Subversion installed:
>
> # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
>
> Or visit the following URL, replacing NNNNNN with the revision number:
>
> <URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>;
>
> VII. References
>
> <URL:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201700>;
>
> The latest revision of this Errata Notice is available at
> https://security.FreeBSD.org/advisories/FreeBSD-EN-15:12.netstat.asc
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2.1.7 (FreeBSD)
>
> iQIcBAEBCgAGBQJV05A1AAoJEO1n7NZdz2rnAzIQANyLdOOQhe9dHyAV4N5YKM3B
> Z/86dY/KIIViVb1uzkBASBNnkHlG+mCMOQpzX2x8yCPF4i7bIEfPa4r2Bzw9pvCF
> RWRKvZXERESh/RndQFhxcmJMAyYPq7MdK0IZzG53vinlMoSz2WTKj2vSR7t2jfo+
> ObTfgdkqN/PZs/W+AQY8a4DMdxCLg1KCZiSpQRO7ea+4AxsI8qNgoytvG6HRno/z
> uGe6Ad82ZfysKgqe9JO4gvRTR77ebQAVSSr3qylQcOGHohy9tFHcI2FEAAqLJrQY
> b5DDLOawLRsQm0hwkLCTOZX2QvIFgz0gGRpvPcN9ZKValMc5DKQv36z3hOByK+3i
> dDHFG/Diy2JNP0tsKtW8IyyLvW2DAUoTs1nVaWMvLKkMUr+loOYvoaLdGT0xQP2d
> M6UT40mRMznfH/Gq/0DJFArsYcyB9YRl7rD0dy1HhqApogHQrTjsT+1vtBtpaTmv
> LHA77tHyzI0TxOvmx3hglj/z4BLZDPU6ydXr3zeOYBpLz5p02GKxHUc+JrmWBfOV
> Jep0+Fr2fYST5bGVtExNQV6cTlBZPnGR4JxJEUQA6a+FdyJcDuzOTNcs0YzwjuSC
> dIk5pdxI3nkc+zf9GZLXUdLcxXfo6jBUy0fSWkzirGzBfo0wxseE6cbxxTH7vumx
> CLGGmHiqxVuF/nP4ScHi
> =3aK1
> -----END PGP SIGNATURE-----
> _______________________________________________
> freebsd-announce@freebsd.org mailing list
> https://lists.freebsd.org/mailman/listinfo/freebsd-announce
> To unsubscribe, send any mail to "freebsd-announce-unsubscribe@freebsd.org
> "
>



-- 
*PHILIP M. GOLLUCCI*
Sr. Director of IT | *Curb*
*w.* 703-579-6947
*m.* 703-336-9354
@gocurb <http://twitter.com/gocurb>;

Enter code* p6magic* for $10 off your first ride



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CADDV2kfvZ%2BHoEE=BDhgKrOZ7tgPFwKuLmOZoA0e4KJQUw7qVtQ>