Date: Thu, 26 Jul 2007 07:51:16 -0400 From: Stephen Clark <Stephen.Clark@seclark.us> To: Doug Barton <dougb@FreeBSD.org> Cc: stable@FreeBSD.org, Steven Hartland <killing@multiplay.co.uk> Subject: Re: bind exploit, patch expected? Message-ID: <46A88AB4.1010808@seclark.us> In-Reply-To: <46A78AB3.9090805@FreeBSD.org> References: <01e101c7cecb$380e6960$b6db87d4@multiplay.co.uk> <46A78AB3.9090805@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Doug Barton wrote: >Steven Hartland wrote: > > >>I assume the security team are already working on this but >>cant hurt to ask: >> >> > >Before you ask questions on a public list it's generally considered >polite to do a little checking yourself, especially in an open source >project. As Mike pointed out, the secteam had already addressed this >issue on -security, and I had already followed up in detail regarding >the upgrade plans. > >In addition, at the time you posted the updates had all been done in >the ports, HEAD (-current), and RELENG_[56] (5 and 6-stable). > >In any case, it's good that you're on top of your security >announcements, and I'm glad to say that this time anyway we're one >step ahead. :) > >Doug > > > Interesting - I just checked the FreeBSD.org security page and don't see any indication of a patch to fix the vulnerability for 6.1. Steve -- "They that give up essential liberty to obtain temporary safety, deserve neither liberty nor safety." (Ben Franklin) "The course of history shows that as a government grows, liberty decreases." (Thomas Jefferson)
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?46A88AB4.1010808>