summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authordd <dd@FreeBSD.org>2001-08-06 05:26:06 +0000
committerdd <dd@FreeBSD.org>2001-08-06 05:26:06 +0000
commit947433403cee31c0248eb42457ef3a2d114ecb53 (patch)
tree86a645b5d53dbad463a01772b0693059b05a8149
parent412563a03125b18be3db4352f4364140574f902a (diff)
downloadFreeBSD-src-947433403cee31c0248eb42457ef3a2d114ecb53.zip
FreeBSD-src-947433403cee31c0248eb42457ef3a2d114ecb53.tar.gz
Remove old blurb about BIND being updated to 8.2.3.
-rw-r--r--release/doc/en_US.ISO8859-1/relnotes/article.sgml4
-rw-r--r--release/doc/en_US.ISO8859-1/relnotes/common/new.sgml4
2 files changed, 0 insertions, 8 deletions
diff --git a/release/doc/en_US.ISO8859-1/relnotes/article.sgml b/release/doc/en_US.ISO8859-1/relnotes/article.sgml
index 447bad6..ca6e938 100644
--- a/release/doc/en_US.ISO8859-1/relnotes/article.sgml
+++ b/release/doc/en_US.ISO8859-1/relnotes/article.sgml
@@ -887,10 +887,6 @@
cause it to abort processing has been fixed (see security advisory
FreeBSD-SA-01:13). &merged;</para>
- <para>To fix a remotely-exploitable buffer overflow,
- <application>BIND</application> has been updated
- to 8.2.3 (see security advisory FreeBSD-SA-01:18). &merged;</para>
-
<para><application>OpenSSH</application> now has code to prevent
(instead of just mitigating through connection limits) an attack
that can lead to guessing the server key (not host key) by
diff --git a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
index 447bad6..ca6e938 100644
--- a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
+++ b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
@@ -887,10 +887,6 @@
cause it to abort processing has been fixed (see security advisory
FreeBSD-SA-01:13). &merged;</para>
- <para>To fix a remotely-exploitable buffer overflow,
- <application>BIND</application> has been updated
- to 8.2.3 (see security advisory FreeBSD-SA-01:18). &merged;</para>
-
<para><application>OpenSSH</application> now has code to prevent
(instead of just mitigating through connection limits) an attack
that can lead to guessing the server key (not host key) by
OpenPOWER on IntegriCloud