Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Jul 2007 09:45:20 -0400
From:      Jeff Love <jl@burghcom.com>
To:        freebsd-stable@freebsd.org
Subject:   Re: bind exploit, patch expected?
Message-ID:  <20070726094520.rb9eu8wsg0ggggsw@atomic.burghcom.com>
In-Reply-To: <46A78AB3.9090805@FreeBSD.org>
References:  <01e101c7cecb$380e6960$b6db87d4@multiplay.co.uk> <46A78AB3.9090805@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
> Steven Hartland wrote:
>> I assume the security team are already working on this but
>> cant hurt to ask:
>
> Before you ask questions on a public list it's generally considered
> polite to do a little checking yourself, especially in an open source
> project. As Mike pointed out, the secteam had already addressed this
> issue on -security, and I had already followed up in detail regarding
> the upgrade plans.
>
> In addition, at the time you posted the updates had all been done in
> the ports, HEAD (-current), and RELENG_[56] (5 and 6-stable).
>
> In any case, it's good that you're on top of your security
> announcements, and I'm glad to say that this time anyway we're one
> step ahead. :)
>
> Doug

I disagree that this should not have been posted here. I agree that it  
'can't hurt'.
Thanks for the heads up, Steve.

Jeff Love
Burgh Gaming



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20070726094520.rb9eu8wsg0ggggsw>