FreeBSD 7.1 and BIND exploit

Subhro subhro.kar at
Sun Jul 20 03:44:13 UTC 2008


You need to understand the release engineering process of FreeeBSD.
The release edition is essential created from the stabe edition. 7.1R
would not be something new which is *not* present on 7-STABLE today.

In addition, while a particular branch is alive (not declared as end
of life) all security updates are backported. The fix which you are
looking for is also present on 7.0-R so you may well install that.


On Sun, Jul 20, 2008 at 8:50 AM, Brett Glass <brett at> wrote:
> I'd like to install a fully tested 7.1-RELEASE, rather than
> a snapshot of 7-STABLE (in which there have, apparently, been
> some problems due to driver updates and work on the TCP stack).
> Alas, I haven't seen any schedule or "to do" list for the release
> process yet -- just a note saying that 7.1-RELEASE is scheduled
> for August.
> I'm sure that a lot of folks are in the same boat as I: they'd
> like to start with a complete release that doesn't need patching
> and recompiling.
> --Brett Glass
> At 09:02 PM 7/19/2008, Xin LI wrote:
>>Yes.  FreeBSD 7-STABLE and RELENG_7_0 errata branches are already
>>patched and not vulnerable to the problem.
>>- --
>>Xin LI <delphij at>
> _______________________________________________
> freebsd-stable at mailing list
> To unsubscribe, send any mail to "freebsd-stable-unsubscribe at"

Subhro Kar
Software Engineer
Dynamic Digital Technologies Pvt. Ltd.
EPY-3, Sector: V
Salt Lake City

More information about the freebsd-stable mailing list