aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDima Dorfman <dd@FreeBSD.org>2001-08-06 05:26:06 +0000
committerDima Dorfman <dd@FreeBSD.org>2001-08-06 05:26:06 +0000
commitae71ff3eb04043edd434d54cff25d5a3da4bfd2a (patch)
tree86a645b5d53dbad463a01772b0693059b05a8149
parentc32b1c2d74152019ae82b39e49f5275115fe45ff (diff)
downloadsrc-ae71ff3eb04043edd434d54cff25d5a3da4bfd2a.tar.gz
src-ae71ff3eb04043edd434d54cff25d5a3da4bfd2a.zip
Remove old blurb about BIND being updated to 8.2.3.
Notes
Notes: svn path=/head/; revision=81192
-rw-r--r--release/doc/en_US.ISO8859-1/relnotes/article.sgml4
-rw-r--r--release/doc/en_US.ISO8859-1/relnotes/common/new.sgml4
2 files changed, 0 insertions, 8 deletions
diff --git a/release/doc/en_US.ISO8859-1/relnotes/article.sgml b/release/doc/en_US.ISO8859-1/relnotes/article.sgml
index 447bad65ccee..ca6e938ec1c0 100644
--- a/release/doc/en_US.ISO8859-1/relnotes/article.sgml
+++ b/release/doc/en_US.ISO8859-1/relnotes/article.sgml
@@ -887,10 +887,6 @@
cause it to abort processing has been fixed (see security advisory
FreeBSD-SA-01:13). &merged;</para>
- <para>To fix a remotely-exploitable buffer overflow,
- <application>BIND</application> has been updated
- to 8.2.3 (see security advisory FreeBSD-SA-01:18). &merged;</para>
-
<para><application>OpenSSH</application> now has code to prevent
(instead of just mitigating through connection limits) an attack
that can lead to guessing the server key (not host key) by
diff --git a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
index 447bad65ccee..ca6e938ec1c0 100644
--- a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
+++ b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
@@ -887,10 +887,6 @@
cause it to abort processing has been fixed (see security advisory
FreeBSD-SA-01:13). &merged;</para>
- <para>To fix a remotely-exploitable buffer overflow,
- <application>BIND</application> has been updated
- to 8.2.3 (see security advisory FreeBSD-SA-01:18). &merged;</para>
-
<para><application>OpenSSH</application> now has code to prevent
(instead of just mitigating through connection limits) an attack
that can lead to guessing the server key (not host key) by