On Thursday 26 July 2007 14:51:16 Stephen Clark wrote: > Doug Barton wrote: > >Steven Hartland wrote: > >>I assume the security team are already working on this but > >>cant hurt to ask: > > > >Before you ask questions on a public list it's generally considered > >polite to do a little checking yourself, especially in an open source > >project. As Mike pointed out, the secteam had already addressed this > >issue on -security, and I had already followed up in detail regarding > >the upgrade plans. > > > >In addition, at the time you posted the updates had all been done in > >the ports, HEAD (-current), and RELENG_[56] (5 and 6-stable). > > > >In any case, it's good that you're on top of your security > >announcements, and I'm glad to say that this time anyway we're one > >step ahead. :) > > > >Doug > > Interesting - I just checked the FreeBSD.org security page and don't see > any indication of > a patch to fix the vulnerability for 6.1. > > Steve
This is because RELENG_[56] is not a 6.1 RTFM http://www.freebsd.org/doc/en_US.ISO8859-1/articles/releng/release-proc.html -- ================================================================ - Best regards, Nikolay Pavlov. <<<----------------------------- ================================================================
signature.asc
Description: This is a digitally signed message part.