Deutsch   English   Français   Italiano  
<ydcyij44c7.fsf@UBEblock.psr.com>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder9.news.weretis.net!news.quux.org!eternal-september.org!feeder2.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Winston <wbe@UBEBLOCK.psr.com.invalid>
Newsgroups: comp.unix.bsd.freebsd.misc
Subject: 14.1-RELEASE-p6 kernel same as -p5?
Date: Mon, 25 Nov 2024 12:21:12 -0500
Organization: A noiseless patient Spider
Lines: 25
Message-ID: <ydcyij44c7.fsf@UBEblock.psr.com>
MIME-Version: 1.0
Content-Type: text/plain
Injection-Date: Mon, 25 Nov 2024 18:21:17 +0100 (CET)
Injection-Info: dont-email.me; posting-host="56ba57182ebe4698d8e2bac0d91b0c03";
	logging-data="3041910"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX19wIhdp82xVGOudFXGnOO9G"
User-Agent: Gnus/5.13 (Gnus v5.13)
Cancel-Lock: sha1:Rf2UUScDzk+X7nkCjmy60X7um8Q=
	sha1:H+toOpo7t/CabPB6gZkNxuvlZ7c=
Mail-Copies-To: never
Bytes: 1891

I used freebsd-update to binary upgrade an amd64 system running
14.1-RELEASE-p5 GENERIC to -p6.  Doing so observably updated
/boot/kernel/ctl.ko, presumably fixing CVE-2024-45289 (the ctl
unbounded allocation problem).

However, I see that /boot/kernel/kernel itself did not change:
it is the same as /boot/kernel.old/kernel in both content and date
and thus contains the string 14.1-RELEASE-p5.

The system has been rebooted.

Despite the upgrade and reboot, and likely because 'kernel' itself is
unchanged, the nightly pkg audit test of the kernel still reports:

FreeBSD-kernel-14.1_5 is vulnerable:
  FreeBSD -- Unbounded allocation in ctl(4) CAM Target Layer

So, my question is: Should the kernel have changed?

'freebsd-update IDS' says the SHA256 hash is wrong, but that's maybe to
be expected when comparing a built-from-scratch -p6 kernel with the -p5
kernel if freebsd-update figured it didn't need to be updated.

TIA,
 -WBE