48 |
|
<div id="security"> |
49 |
|
<h2><a href="security/">Security »</a></h2> |
50 |
|
|
51 |
< |
<blockquote> |
52 |
< |
<p class="date">August 22, 2013</p> |
53 |
< |
<p class="update">MidnightBSD 0.4-RELEASE-p2<br> |
54 |
< |
Fix two vulnerabilities in MidnightBSD related to IP_MULTICAST and SCTP. |
55 |
< |
</p> |
56 |
< |
<p class="more"><a href="security/#a20130822">Read more ...</a></p> |
57 |
< |
</blockquote> |
51 |
> |
<blockquote> |
52 |
> |
<p class="date">September 10, 2013</p> |
53 |
> |
<p class="update">MidnightBSD 0.4-RELEASE-p4<br> |
54 |
> |
nullfs(5) and ifioctl... |
55 |
> |
</p> |
56 |
> |
<p class="more"><a href="security/#a20130910">Read more ...</a></p> |
57 |
> |
</blockquote> |
58 |
|
|
59 |
|
<blockquote> |
60 |
< |
<p class="date">July 28, 2013</p> |
61 |
< |
<p class="update">MidnightBSD 0.4-RELEASE-p1<br> |
62 |
< |
Vulnerabilities were reported in BIND and NFS Server. BIND has a defect |
63 |
< |
resulting in a possible denial of service attack with malformed rdata in a query. This |
64 |
< |
affects only systems running named and not DNS clients. |
65 |
< |
</p> |
66 |
< |
<p class="more"><a href="security/#a20130728">Read more ...</a></p> |
67 |
< |
</blockquote> |
60 |
> |
<p class="date">August 22, 2013</p> |
61 |
> |
<p class="update">MidnightBSD 0.4-RELEASE-p2<br> |
62 |
> |
Fix two vulnerabilities in MidnightBSD related to IP_MULTICAST and SCTP. |
63 |
> |
</p> |
64 |
> |
<p class="more"><a href="security/#a20130822">Read more ...</a></p> |
65 |
> |
</blockquote> |
66 |
> |
|
67 |
|
</div> |
68 |
|
<div id="tweets"> |
69 |
|
<a class="twitter-timeline" href="https://twitter.com/midnightbsd" data-widget-id="340874433373806593">Tweets by @midnightbsd</a> |