Date: Sat, 04 Oct 2003 00:26:05 -0600 (MDT) From: "M. Warner Losh" <imp@bsdimp.com> To: barney@databus.com Cc: current@freebsd.org Subject: Re: [security-advisories@freebsd.org: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-03:17.procfs] Message-ID: <20031004.002605.65822565.imp@bsdimp.com> In-Reply-To: <20031004021041.GA33705@pit.databus.com> References: <20031004014527.GB32411@pit.databus.com> <20031004015404.GW72999@procyon.firepipe.net> <20031004021041.GA33705@pit.databus.com>
next in thread | previous in thread | raw e-mail | index | archive | help
In message: <20031004021041.GA33705@pit.databus.com> Barney Wolff <barney@databus.com> writes: : On Fri, Oct 03, 2003 at 06:54:04PM -0700, Will Andrews wrote: : > On Fri, Oct 03, 2003 at 09:45:27PM -0400, Barney Wolff wrote: : > > I'm finally motivated to ask, why don't security advisories contain : > > the equivalent revs for -head? Surely I can't be the only person : > > following -current who doesn't build every day. : > : > Simply because the SO does not support -CURRENT. : : Does this mean that the situation can ever arise where a security bug : is corrected in the advisory's announced releases but not in -current? Typically yes. However, see below. : Or, can we assume that as of the time of the security announcement : the vulnerability has *always* been corrected in -current? Standard operating proceedure is to commit to head, then to the branches. However, it is theoretically possible that a bug exists in current that is exploitable in the same way that an advisory addresses. I think we've had this issue only once in the project's history. The code was in the kernel and the then-current -current was so different from stable that patches to stable didn't fix the problem on current and it took a while to realize that there was a problem and to fix it. Warner
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20031004.002605.65822565.imp>