FreeBSD 7.1 and BIND exploit
subhro.kar at gmail.com
Sun Jul 20 03:44:13 UTC 2008
You need to understand the release engineering process of FreeeBSD.
The release edition is essential created from the stabe edition. 7.1R
would not be something new which is *not* present on 7-STABLE today.
In addition, while a particular branch is alive (not declared as end
of life) all security updates are backported. The fix which you are
looking for is also present on 7.0-R so you may well install that.
On Sun, Jul 20, 2008 at 8:50 AM, Brett Glass <brett at lariat.net> wrote:
> I'd like to install a fully tested 7.1-RELEASE, rather than
> a snapshot of 7-STABLE (in which there have, apparently, been
> some problems due to driver updates and work on the TCP stack).
> Alas, I haven't seen any schedule or "to do" list for the release
> process yet -- just a note saying that 7.1-RELEASE is scheduled
> for August.
> I'm sure that a lot of folks are in the same boat as I: they'd
> like to start with a complete release that doesn't need patching
> and recompiling.
> --Brett Glass
> At 09:02 PM 7/19/2008, Xin LI wrote:
>>Yes. FreeBSD 7-STABLE and RELENG_7_0 errata branches are already
>>patched and not vulnerable to the problem.
>>Xin LI <delphij at delphij.net> http://www.delphij.net/
> freebsd-stable at freebsd.org mailing list
> To unsubscribe, send any mail to "freebsd-stable-unsubscribe at freebsd.org"
Dynamic Digital Technologies Pvt. Ltd.
EPY-3, Sector: V
Salt Lake City
More information about the freebsd-stable