DNS server startup script security issue

We’ve identified security issue in bind DNS server startup scripts. Users who use the BIND DNS server should upgrade to the very latest version, service/network/dns/[email protected] 9.14.3, not only to obtain the latest version of BIND, but to also include an additional OpenIndiana-specific privilege reduction for BIND processes.  Before this version update, BIND ran with additional privileges beyond what it was supposed to have, which might have allowed easier access to the operating system files after a BIND exploit.