diff options
author | Dima Dorfman <dd@FreeBSD.org> | 2001-08-06 05:26:06 +0000 |
---|---|---|
committer | Dima Dorfman <dd@FreeBSD.org> | 2001-08-06 05:26:06 +0000 |
commit | ae71ff3eb04043edd434d54cff25d5a3da4bfd2a (patch) | |
tree | 86a645b5d53dbad463a01772b0693059b05a8149 /release | |
parent | c32b1c2d74152019ae82b39e49f5275115fe45ff (diff) | |
download | src-ae71ff3eb04043edd434d54cff25d5a3da4bfd2a.tar.gz src-ae71ff3eb04043edd434d54cff25d5a3da4bfd2a.zip |
Remove old blurb about BIND being updated to 8.2.3.
Notes
Notes:
svn path=/head/; revision=81192
Diffstat (limited to 'release')
-rw-r--r-- | release/doc/en_US.ISO8859-1/relnotes/article.sgml | 4 | ||||
-rw-r--r-- | release/doc/en_US.ISO8859-1/relnotes/common/new.sgml | 4 |
2 files changed, 0 insertions, 8 deletions
diff --git a/release/doc/en_US.ISO8859-1/relnotes/article.sgml b/release/doc/en_US.ISO8859-1/relnotes/article.sgml index 447bad65ccee..ca6e938ec1c0 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/article.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/article.sgml @@ -887,10 +887,6 @@ cause it to abort processing has been fixed (see security advisory FreeBSD-SA-01:13). &merged;</para> - <para>To fix a remotely-exploitable buffer overflow, - <application>BIND</application> has been updated - to 8.2.3 (see security advisory FreeBSD-SA-01:18). &merged;</para> - <para><application>OpenSSH</application> now has code to prevent (instead of just mitigating through connection limits) an attack that can lead to guessing the server key (not host key) by diff --git a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml index 447bad65ccee..ca6e938ec1c0 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml @@ -887,10 +887,6 @@ cause it to abort processing has been fixed (see security advisory FreeBSD-SA-01:13). &merged;</para> - <para>To fix a remotely-exploitable buffer overflow, - <application>BIND</application> has been updated - to 8.2.3 (see security advisory FreeBSD-SA-01:18). &merged;</para> - <para><application>OpenSSH</application> now has code to prevent (instead of just mitigating through connection limits) an attack that can lead to guessing the server key (not host key) by |