Displaying 20 results from an estimated 1100 matches similar to: "RELENG_6_2 EoL Date?"
2007 Jan 14
3
MOAB advisories
Hi Colin!
I would like to know, that these following "vulnerabilities" does
affect FreeBSD's reliability? If the answer is "yes", what version of
FreeBSD affected, when will be fixed, etc.
http://projects.info-pull.com/moab/MOAB-12-01-2007.html
http://projects.info-pull.com/moab/MOAB-10-01-2007.html
Thank you!
--
kobi
2003 Aug 24
3
EoL dates
Is there any reason why releases have EoL dates after only 12
months? While it's clear that some sort of EoL is important, I can't think
of any security advisories recently which weren't accompanied by patches
for all the security branches, even those which are no longer officially
supported.
Colin Percival
2007 Aug 30
0
Job Openings at Collaborative Fusion
Collaborative Fusion has a number of positions we're hoping to fill in the
near future. Specifically, there is an opening in the systems group.
My understanding is that we're looking for an entry-level sysadmin who
would help manage our growing network of FreeBSD servers.
Locality to Pittsburgh, PA is a plus, but I've a feeling we could
make allowances for the right person (can't
2006 Dec 06
2
FreeBSD Security Advisory FreeBSD-SA-06:25.kmem
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-06:25.kmem Security Advisory
The FreeBSD Project
Topic: Kernel memory disclosure in firewire(4)
Category: core
Module: sys_dev
Announced:
2007 Oct 18
1
FreeBSD 6.2 EoL =~ s/January/May/
Hello Everyone,
In light of the longer-than-expected window between 6.2-RELEASE and 6.2-RELEASE,
the End-of-Life date for FreeBSD 6.2 has been adjusted from January 31st, 2008
to May 31st, 2008. As a result, FreeBSD 5.5, FreeBSD 6.1, and FreeBSD 6.2 will
all cease to be supported at the end of May 2008.
FreeBSD users should plan on upgrading to either FreeBSD 6.3 or FreeBSD 7.0 once
those have
2007 Oct 18
1
FreeBSD 6.2 EoL =~ s/January/May/
Hello Everyone,
In light of the longer-than-expected window between 6.2-RELEASE and 6.2-RELEASE,
the End-of-Life date for FreeBSD 6.2 has been adjusted from January 31st, 2008
to May 31st, 2008. As a result, FreeBSD 5.5, FreeBSD 6.1, and FreeBSD 6.2 will
all cease to be supported at the end of May 2008.
FreeBSD users should plan on upgrading to either FreeBSD 6.3 or FreeBSD 7.0 once
those have
2005 Mar 05
2
Heads up: End of RELENG_4_8 support
At the end of March, the RELENG_4_8 (sometimes called 4.8-SECURITY)
branch will reach its designated End of Life and cease to be supported
by the FreeBSD Security Team.
Released in April 2003, FreeBSD 4.8 was the first release designated
for "extended" two-year security support instead of the normal one-year
support. Over this time, 27 security advisories have been issued which
have
2008 Apr 02
1
freebsd-security Digest, Vol 246, Issue 1
Here's another project for us. We'll want to upgrade to 6.3-RELEASE in May.
On Wed, Apr 2, 2008 at 7:00 AM, <freebsd-security-request@freebsd.org> wrote:
> Send freebsd-security mailing list submissions to
> freebsd-security@freebsd.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
>
2004 Oct 26
5
please test: Secure ports tree updating
CVSup is slow, insecure, and a memory hog. However, until now
it's been the only option for keeping an up-to-date ports tree,
and (thanks to all of the recent work on vuxml and portaudit)
it has become quite obvious that keeping an up-to-date ports
tree is very important.
To provide a secure, lightweight, and fast alternative to CVSup,
I've written portsnap. As the name suggests, this
2007 Feb 09
1
FreeBSD Security Advisory FreeBSD-SA-07:02.bind
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-07:02.bind Security Advisory
The FreeBSD Project
Topic: Multiple Denial of Service vulnerabilities in named(8)
Category: contrib
Module: bind
2007 Oct 05
4
missing Advisory at ftp.freebsd.org
Hi,
I am missing the advisory for openssl at ftp://ftp.freebsd.org/CERT/
Background:
For long time i used the the quickpatch utility at my workstation to
notify me about issues and *how* to fix it.
With the web based advisory this is not possible since the .asc file
contains only the pgp signature (no more details).
Regards,
olli
2005 Jun 15
2
FreeBSD 5.4 SMP kernels now available via FreeBSD Update
It sounds like the SMP kernel I provided for FreeBSD 5.3 was quite
popular, so I've started building an SMP kernel for FreeBSD 5.4 as
well, in addition to the usual GENERIC kernel. To take advantage
of this on your FreeBSD 5.4 SMP system, run the following commands
as root:
# touch /boot/kernel/SMP
# freebsd-update fetch
# freebsd-update install
# echo 'bootfile="SMP"'
2006 May 10
4
Freebsd-update and 6.1-RELEASE
Hi guys,
Does anybody know if freebsd-update is going to be available for
6.1-RELEASE before the end of Colin's "summer of FreeBSD work"?
I wouldn't like to bother Colin directly via e-mail, so if anyone
already asked for this or something....
Thanx, regards
--
Pietro Cerutti
<pietro.cerutti@gmail.com>
2007 Apr 26
4
FreeBSD Security Advisory FreeBSD-SA-07:03.ipv6
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-07:03.ipv6 Security Advisory
The FreeBSD Project
Topic: IPv6 Routing Header 0 is dangerous
Category: core
Module: ipv6
Announced:
2006 Oct 10
3
iDefense Security Advisory 10.10.06: FreeBSD ptrace PT_LWPINFO Denial of Service Vulnerability
Bill Moran wrote:
> This report seems pretty vague. I'm unsure as to whether the alleged
> "bug" gives the user any more permissions than he'd already have? Anyone
> know any details?
This is a local denial of service bug, which was fixed 6 weeks ago in HEAD
and RELENG_6. There is no opportunity for either remote denial of service
or any privilege escalation.
>
2014 Sep 22
2
[PATCH] drm/nv84+: fix fence context seqno's
This fixes a regression introduced by "drm/nouveau: rework to new fence interface"
(commit 29ba89b2371d466).
The fence sequence should not be reset after creation, the old value is used instead.
On destruction the final value is written, to prevent another source of accidental
wraparound in case of a channel being destroyed after a hang, and unblocking any other
channel that may wait on
2005 Mar 17
1
no patch, is there a problem
http://www.securityfocus.com/bid/12825/info/
no patch or anything, is there any action on this?
2006 Mar 28
5
Your RoR 1.1 Adoption Prediction?
What is the likelyhood that major inexpensive webhosts like godaddy,
bluehost, etc. will upgrade to RoR 1.1? Is this going to be like PHP 5
where it has to percolate for a year or more before it becomes widly
available? Your thoughts?
Along the same lines... is it possible to adopt some of the new improved
Ajax / javascript capabilities without actually upgrading the ruby
installation?
2003 Dec 10
1
cvs version 1.11.10 import? [security fix]
On a recent NetBSD commit I saw that they have imported cvs 1.11.10 as a
security fix yesterday:
http://mail-index.netbsd.org/source-changes/2003/12/10/0025.html
http://mail-index.netbsd.org/source-changes/2003/12/10/0026.html
itojun has clairfied the commit in a mail sent to tech-userlevel list of
NetBSD:
http://mail-index.netbsd.org/tech-userlevel/2003/12/10/0003.html
Will this affect
2008 Apr 01
0
HEADS UP: FreeBSD 5.5, 6.1, and 6.2 EoLs coming soon
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello Everyone,
On May 31st, FreeBSD 5.5, FreeBSD 6.1, and FreeBSD 6.2 will have reached
their End of Life and will no longer be supported by the FreeBSD Security
Team. Since FreeBSD 5.5 is the last remaining supported release from the
FreeBSD 5.x stable branch, support for the FreeBSD 5.x stable branch will
also cease at the same point. Users of