diff options
author | dd <dd@FreeBSD.org> | 2001-08-06 05:26:06 +0000 |
---|---|---|
committer | dd <dd@FreeBSD.org> | 2001-08-06 05:26:06 +0000 |
commit | 947433403cee31c0248eb42457ef3a2d114ecb53 (patch) | |
tree | 86a645b5d53dbad463a01772b0693059b05a8149 | |
parent | 412563a03125b18be3db4352f4364140574f902a (diff) | |
download | FreeBSD-src-947433403cee31c0248eb42457ef3a2d114ecb53.zip FreeBSD-src-947433403cee31c0248eb42457ef3a2d114ecb53.tar.gz |
Remove old blurb about BIND being updated to 8.2.3.
-rw-r--r-- | release/doc/en_US.ISO8859-1/relnotes/article.sgml | 4 | ||||
-rw-r--r-- | release/doc/en_US.ISO8859-1/relnotes/common/new.sgml | 4 |
2 files changed, 0 insertions, 8 deletions
diff --git a/release/doc/en_US.ISO8859-1/relnotes/article.sgml b/release/doc/en_US.ISO8859-1/relnotes/article.sgml index 447bad6..ca6e938 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/article.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/article.sgml @@ -887,10 +887,6 @@ cause it to abort processing has been fixed (see security advisory FreeBSD-SA-01:13). &merged;</para> - <para>To fix a remotely-exploitable buffer overflow, - <application>BIND</application> has been updated - to 8.2.3 (see security advisory FreeBSD-SA-01:18). &merged;</para> - <para><application>OpenSSH</application> now has code to prevent (instead of just mitigating through connection limits) an attack that can lead to guessing the server key (not host key) by diff --git a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml index 447bad6..ca6e938 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml @@ -887,10 +887,6 @@ cause it to abort processing has been fixed (see security advisory FreeBSD-SA-01:13). &merged;</para> - <para>To fix a remotely-exploitable buffer overflow, - <application>BIND</application> has been updated - to 8.2.3 (see security advisory FreeBSD-SA-01:18). &merged;</para> - <para><application>OpenSSH</application> now has code to prevent (instead of just mitigating through connection limits) an attack that can lead to guessing the server key (not host key) by |