Mark Andrews wrote:
Chris Marlatt wrote:
Doug Barton wrote:
plan to MFC it after 4 or 5 days. I am actually considering only
MFC'ing it to RELENG_6 to help provide some incentive for those on 5.x
to upgrade.

One would assume that the release would be supported up until the EOL provided on freebsd.org of May 31, 2008.
Yes, but whether a full upgrade is needed for "support" or not depends on your definition. Given that FreeBSD is not vulnerable to these issues in its default configuration, one could easily argue that an upgrade for RELENG_5 isn't necessary.

Doug

        The subject here is 9.3.4.  All the issues raised
        in this thread so far were addressed as of 9.3.2-P2
        / 9.3.3.  To the best of my knowledge these have
        already been addresed.

There are two new issue for 9.3.4.
        CVE-2007-0494 which is only a problem if you are
        doing DNSEC validation.

CVE-2007-0493 which any recursive 9.3.x (x<4) named is vulnerable.

Both of these are problems if you allow untrusted users access to the name server (likely if you're in a production environment). The way FreeBSD ships, named is off, and the example configuration files are set up to create a recursive resolver that only listens on 127.0.0.1. I would expect that users who rely on BIND in a production setting to either have upgraded to FreeBSD 6-stable, be using the port, or some other custom configuration, or both.

Doug

--

    This .signature sanitized for your protection

_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to