On Thursday 26 July 2007 14:51:16 Stephen Clark wrote:
> Doug Barton wrote:
> >Steven Hartland wrote:
> >>I assume the security team are already working on this but
> >>cant hurt to ask:
> >
> >Before you ask questions on a public list it's generally considered
> >polite to do a little checking yourself, especially in an open source
> >project. As Mike pointed out, the secteam had already addressed this
> >issue on -security, and I had already followed up in detail regarding
> >the upgrade plans.
> >
> >In addition, at the time you posted the updates had all been done in
> >the ports, HEAD (-current), and RELENG_[56] (5 and 6-stable).
> >
> >In any case, it's good that you're on top of your security
> >announcements, and I'm glad to say that this time anyway we're one
> >step ahead. :)
> >
> >Doug
>
> Interesting - I just checked the FreeBSD.org security page and don't see
> any indication of
> a patch to fix the vulnerability for 6.1.
>
> Steve

This is because RELENG_[56] is not a 6.1

RTFM
http://www.freebsd.org/doc/en_US.ISO8859-1/articles/releng/release-proc.html

-- 
================================================================
- Best regards, Nikolay Pavlov. <<<-----------------------------
================================================================

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to