bind exploit, patch expected?
qpadla at gmail.com
Thu Jul 26 15:19:40 UTC 2007
On Thursday 26 July 2007 14:51:16 Stephen Clark wrote:
> Doug Barton wrote:
> >Steven Hartland wrote:
> >>I assume the security team are already working on this but
> >>cant hurt to ask:
> >Before you ask questions on a public list it's generally considered
> >polite to do a little checking yourself, especially in an open source
> >project. As Mike pointed out, the secteam had already addressed this
> >issue on -security, and I had already followed up in detail regarding
> >the upgrade plans.
> >In addition, at the time you posted the updates had all been done in
> >the ports, HEAD (-current), and RELENG_ (5 and 6-stable).
> >In any case, it's good that you're on top of your security
> >announcements, and I'm glad to say that this time anyway we're one
> >step ahead. :)
> Interesting - I just checked the FreeBSD.org security page and don't see
> any indication of
> a patch to fix the vulnerability for 6.1.
This is because RELENG_ is not a 6.1
- Best regards, Nikolay Pavlov. <<<-----------------------------
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 189 bytes
Desc: This is a digitally signed message part.
Url : http://lists.freebsd.org/pipermail/freebsd-stable/attachments/20070726/f257a765/attachment-0001.pgp
More information about the freebsd-stable