From owner-freebsd-security@FreeBSD.ORG Fri Sep 30 23:10:55 2011 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 96CD3106566C for ; Fri, 30 Sep 2011 23:10:55 +0000 (UTC) (envelope-from glen.j.barber@gmail.com) Received: from mail-qw0-f54.google.com (mail-qw0-f54.google.com [209.85.216.54]) by mx1.freebsd.org (Postfix) with ESMTP id 4EC048FC13 for ; Fri, 30 Sep 2011 23:10:55 +0000 (UTC) Received: by qadz30 with SMTP id z30so919661qad.13 for ; Fri, 30 Sep 2011 16:10:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:x-enigmail-version:content-type :content-transfer-encoding; bh=K073Rccr0KDpNX/q/B+9N1XzuvuJjxvAoBQxkb/Sw6Y=; b=SGG59ImUQJ/eDjqSM00cthpEU6hkSKTYhZuxnFsSPBF2wI320EvbSKFRLvx5E+f4RA VNDtpKk5cPvLV5bG7IGs3TEcGVhl7dAbqmDP0bIaWJGQvQrEccr03xjubt1yqvsougfB JKwAl3VrpzBxS6hlgst4Joz4JuvYUs+t6zXr8= Received: by 10.224.9.145 with SMTP id l17mr9297433qal.207.1317424254519; Fri, 30 Sep 2011 16:10:54 -0700 (PDT) Received: from schism.local (c-76-124-49-145.hsd1.pa.comcast.net. [76.124.49.145]) by mx.google.com with ESMTPS id ed9sm7004066qab.5.2011.09.30.16.10.53 (version=SSLv3 cipher=OTHER); Fri, 30 Sep 2011 16:10:53 -0700 (PDT) Message-ID: <4E864C7B.8010000@gmail.com> Date: Fri, 30 Sep 2011 19:10:51 -0400 From: Glen Barber User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:6.0.2) Gecko/20110902 Thunderbird/6.0.2 MIME-Version: 1.0 To: Mike Brown References: <201109302239.p8UMdPQB019930@chilled.skew.org> In-Reply-To: <201109302239.p8UMdPQB019930@chilled.skew.org> X-Enigmail-Version: 1.3.2 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Cc: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-11:05.unix X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Sep 2011 23:10:55 -0000 On 9/30/11 6:39 PM, Mike Brown wrote: > FreeBSD Security Advisories wrote: >> FreeBSD-SA-11:05.unix Security Advisory >> [...] >> 2) To update your vulnerable system via a source code patch: >> [...] >> c) Recompile your kernel as described in >> and reboot the >> system. >> >> 3) To update your vulnerable system via a binary patch: >> >> Systems running 7.4-RELEASE, 7.3-RELEASE, 8.2-RELEASE, or 8.1-RELEASE on >> the i386 or amd64 platforms can be updated via the freebsd-update(8) >> utility: >> >> # freebsd-update fetch >> # freebsd-update install > > Quick question: after running freebsd-update install, do I reboot for this > one, or not? You should need to, because the patch affects the kernel. -- Glen Barber