48 |
|
<div id="security"> |
49 |
|
<h2><a href="security/">Security »</a></h2> |
50 |
|
|
51 |
+ |
<blockquote> |
52 |
+ |
<p class="date">August 22, 2013</p> |
53 |
+ |
<p class="update">MidnightBSD 0.4-RELEASE-p2<br> |
54 |
+ |
Fix two vulnerabilities in MidnightBSD related to IP_MULTICAST and SCTP. |
55 |
+ |
</p> |
56 |
+ |
<p class="more"><a href="security/#a20130822">Read more ...</a></p> |
57 |
+ |
</blockquote> |
58 |
+ |
|
59 |
|
<blockquote> |
60 |
|
<p class="date">July 28, 2013</p> |
61 |
|
<p class="update">MidnightBSD 0.4-RELEASE-p1<br> |
63 |
|
resulting in a possible denial of service attack with malformed rdata in a query. This |
64 |
|
affects only systems running named and not DNS clients. |
65 |
|
</p> |
66 |
< |
<p class="more"><a href="security/#a20120728">Read more ...</a></p> |
66 |
> |
<p class="more"><a href="security/#a20130728">Read more ...</a></p> |
67 |
|
</blockquote> |
60 |
– |
|
61 |
– |
<blockquote> |
62 |
– |
<p class="date">June 6, 2012</p> |
63 |
– |
<p class="update">MidnightBSD 0.3-RELEASE-p9<br> |
64 |
– |
A vulnerability exists in bind related to resource records. A zero length |
65 |
– |
request can cause bind to crash resulting in a denial of service or |
66 |
– |
disclosure of information. |
67 |
– |
</p> |
68 |
– |
<p class="more"><a href="security/#a20120612">Read more...</a></p> |
69 |
– |
</blockquote> |
68 |
|
</div> |
69 |
|
<div id="tweets"> |
70 |
|
<a class="twitter-timeline" href="https://twitter.com/midnightbsd" data-widget-id="340874433373806593">Tweets by @midnightbsd</a> |