Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Jul 2007 07:51:16 -0400
From:      Stephen Clark <Stephen.Clark@seclark.us>
To:        Doug Barton <dougb@FreeBSD.org>
Cc:        stable@FreeBSD.org, Steven Hartland <killing@multiplay.co.uk>
Subject:   Re: bind exploit, patch expected?
Message-ID:  <46A88AB4.1010808@seclark.us>
In-Reply-To: <46A78AB3.9090805@FreeBSD.org>
References:  <01e101c7cecb$380e6960$b6db87d4@multiplay.co.uk> <46A78AB3.9090805@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Doug Barton wrote:

>Steven Hartland wrote:
>  
>
>>I assume the security team are already working on this but
>>cant hurt to ask:
>>    
>>
>
>Before you ask questions on a public list it's generally considered
>polite to do a little checking yourself, especially in an open source
>project. As Mike pointed out, the secteam had already addressed this
>issue on -security, and I had already followed up in detail regarding
>the upgrade plans.
>
>In addition, at the time you posted the updates had all been done in
>the ports, HEAD (-current), and RELENG_[56] (5 and 6-stable).
>
>In any case, it's good that you're on top of your security
>announcements, and I'm glad to say that this time anyway we're one
>step ahead. :)
>
>Doug
>
>  
>
Interesting - I just checked the FreeBSD.org security page and don't see 
any indication of
a patch to fix the vulnerability for 6.1.

Steve

-- 

"They that give up essential liberty to obtain temporary safety, 
deserve neither liberty nor safety."  (Ben Franklin)

"The course of history shows that as a government grows, liberty 
decreases."  (Thomas Jefferson)






Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?46A88AB4.1010808>