Add SA-01:56, correct mislabeling of SA-01:55 as SA-01:54, fix up phrasing
of some other security-advisory-related items to be more consistent.
This commit is contained in:
parent
6910d12324
commit
1bf51f6304
Notes:
svn2git
2020-12-08 03:00:23 +00:00
svn path=/www/; revision=10454
1 changed files with 14 additions and 11 deletions
|
|
@ -1,10 +1,10 @@
|
|||
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN" [
|
||||
<!ENTITY base CDATA "../..">
|
||||
<!ENTITY date "$FreeBSD: www/en/releases/4.3R/errata.sgml,v 1.12 2001/08/17 22:14:53 bmah Exp $">
|
||||
<!ENTITY date "$FreeBSD: www/en/releases/4.3R/errata.sgml,v 1.13 2001/08/21 22:34:44 bmah Exp $">
|
||||
<!ENTITY title "FreeBSD 4.3 Errata Notes">
|
||||
<!ENTITY % includes SYSTEM "../../includes.sgml"> %includes;
|
||||
]>
|
||||
<!-- $FreeBSD: www/en/releases/4.3R/errata.sgml,v 1.12 2001/08/17 22:14:53 bmah Exp $ -->
|
||||
<!-- $FreeBSD: www/en/releases/4.3R/errata.sgml,v 1.13 2001/08/21 22:34:44 bmah Exp $ -->
|
||||
|
||||
<html>
|
||||
&header;
|
||||
|
|
@ -63,16 +63,19 @@ A vulnerability whereby a remote attacker could exhaust a target's
|
|||
pool of network buffers has been closed. More details, as well as a
|
||||
fix, can be found in security advisory FreeBSD-SA-01:52.
|
||||
|
||||
A flaw in the implementation of the ipfw(8) ``me'' rules on
|
||||
point-to-point links has been corrected. Formerly, ``me'' filter
|
||||
rules would match the remote IP address of a point-to-point interface
|
||||
in addition to the intended local IP address. More details, as well
|
||||
as a fix, can be found in security advisory FreeBSD-SA-01:53.
|
||||
A flaw existed in ipfw(8), in which ``me'' filter rules would match
|
||||
the remote IP address of a point-to-point interface in addition to the
|
||||
intended local IP address. More details, as well as a fix, can be
|
||||
found in security advisory FreeBSD-SA-01:53.
|
||||
|
||||
A vulnerability in procfs(5), which could allow a
|
||||
process to read sensitive information from another process's
|
||||
memory space, has been closed. For more details, as well as
|
||||
information on patches, see security advisory FreeBSD-SA-01:54.
|
||||
A vulnerability in procfs(5) could allow a process to read sensitive
|
||||
information from another process's memory space. For more details, as
|
||||
well as information on patches, see security advisory
|
||||
FreeBSD-SA-01:55.
|
||||
|
||||
PARANOID hostname checking in tcp_wrappers did not work correctly.
|
||||
For more details and information on patches, see security advisory
|
||||
FreeBSD-SA-01:56.
|
||||
|
||||
---- System Update Information:
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue