bitsandnumbers
Dabbler
- Joined
- Apr 8, 2013
- Messages
- 39
Hi,
I wonder what we, as user, can do to fix the newly discovered NTP vulnerability (as seen here for instance: http://arstechnica.com/security/201...l-bugs-in-net-time-sync-puts-servers-at-risk/).
To sum this up, the vulnerability add one more way to escalate to root privileges for hackers, even beginners.
So since Freenas has a non persistent changes policy on its system (ie: as I understand, if I update ntp manually, the changes will not stick upon reboot), what is the best way to patch this vulnerability ? Thx
Envoyé de mon iPad à l'aide de Tapatalk
I wonder what we, as user, can do to fix the newly discovered NTP vulnerability (as seen here for instance: http://arstechnica.com/security/201...l-bugs-in-net-time-sync-puts-servers-at-risk/).
To sum this up, the vulnerability add one more way to escalate to root privileges for hackers, even beginners.
So since Freenas has a non persistent changes policy on its system (ie: as I understand, if I update ntp manually, the changes will not stick upon reboot), what is the best way to patch this vulnerability ? Thx
Envoyé de mon iPad à l'aide de Tapatalk