67 |
|
</div> |
68 |
|
<div id="security"> |
69 |
|
<h2><a href="security/">Security »</a></h2> |
70 |
+ |
|
71 |
+ |
<blockquote> |
72 |
+ |
<p class="date">May 30, 2011</p> |
73 |
+ |
<p class="update">0.3-RELEASE and 0.4-CURRENT contain a vulnerable version of BIND 9.6.x. Users who use BIND and a recursive DNS |
74 |
+ |
server should update to 0.3-RELEASE-p2. More information can be found at <a href="http://www.kb.cert.org/vuls/id/795694">US-CERT</a> |
75 |
+ |
</p> |
76 |
+ |
<p class="more"><a href="security/#a20110530">Read more...</a></p> |
77 |
+ |
</blockquote> |
78 |
+ |
|
79 |
|
|
80 |
|
<blockquote> |
81 |
|
<p class="date">October 12, 2010</p> |
84 |
|
</p> |
85 |
|
<p class="more"><a href="security/#a20101012">Read more...</a></p> |
86 |
|
</blockquote> |
78 |
– |
|
79 |
– |
<blockquote> |
80 |
– |
<p class="date">September 2, 2010</p> |
81 |
– |
<p class="update">A minor vulnerability in libutil was reported. It can cause uses of some services such as OpenSSH to bypass |
82 |
– |
cpu...</p> |
83 |
– |
<p class="more"><a href="security/#a20100902">Read more...</a></p> |
84 |
– |
</blockquote> |
87 |
|
</div> |
88 |
|
</div> |
89 |
|
<!--#include virtual="/footer.html"--> |