69 |
|
<h2><a href="security/">Security »</a></h2> |
70 |
|
|
71 |
|
<blockquote> |
72 |
< |
<p class="date">May 30, 2011</p> |
73 |
< |
<p class="update">0.3-RELEASE and 0.4-CURRENT contain a vulnerable version of BIND 9.6.x. Users who use BIND and a recursive DNS |
74 |
< |
server should update to 0.3-RELEASE-p2. More information can be found at <a href="http://www.kb.cert.org/vuls/id/795694">US-CERT</a> |
75 |
< |
</p> |
76 |
< |
<p class="more"><a href="security/#a20110530">Read more...</a></p> |
77 |
< |
</blockquote> |
78 |
< |
|
79 |
< |
|
80 |
< |
<blockquote> |
81 |
< |
<p class="date">October 12, 2010</p> |
82 |
< |
<p class="update">0.3-PRERELEASE and 0.4-CURRENT have an issue in all pseudofs based file systems including procfs and linprocfs |
83 |
< |
that either can be used to run code as the kernel or at best crash the system. |
72 |
> |
<p class="date">December 23, 2011</p> |
73 |
> |
<p class="update">Multiple security vulnerabilities impacting 0.3-RELEASE and 0.4-CURRENT have been patched in |
74 |
> |
MidnightBSD. |
75 |
|
</p> |
76 |
< |
<p class="more"><a href="security/#a20101012">Read more...</a></p> |
76 |
> |
<p class="more"><a href="security/#a20121223">Read more...</a></p> |
77 |
> |
</blockquote> |
78 |
> |
|
79 |
> |
<blockquote> |
80 |
> |
<p class="date">November 4, 2011</p> |
81 |
> |
<p class="update">MidnightBSD 0.3-RELEASE-p4<br> |
82 |
> |
Fix a problem with unix socket handling caused by the recent |
83 |
> |
patch to unix socket path handling. This allows network |
84 |
> |
apps to work under the linuxolator again.</p> |
85 |
> |
<p class="more"><a href="security/#a20110530">Read more...</a></p> |
86 |
|
</blockquote> |
87 |
|
</div> |
88 |
|
</div> |