Add SA-01:56, correct mislabeling of SA-01:55 as SA-01:54, fix up phrasing

of some other security-advisory-related items to be more consistent.
This commit is contained in:
Bruce A. Mah 2001-08-23 21:24:30 +00:00
parent 6910d12324
commit 1bf51f6304
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/www/; revision=10454

View file

@ -1,10 +1,10 @@
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN" [
<!ENTITY base CDATA "../..">
<!ENTITY date "$FreeBSD: www/en/releases/4.3R/errata.sgml,v 1.12 2001/08/17 22:14:53 bmah Exp $">
<!ENTITY date "$FreeBSD: www/en/releases/4.3R/errata.sgml,v 1.13 2001/08/21 22:34:44 bmah Exp $">
<!ENTITY title "FreeBSD 4.3 Errata Notes">
<!ENTITY % includes SYSTEM "../../includes.sgml"> %includes;
]>
<!-- $FreeBSD: www/en/releases/4.3R/errata.sgml,v 1.12 2001/08/17 22:14:53 bmah Exp $ -->
<!-- $FreeBSD: www/en/releases/4.3R/errata.sgml,v 1.13 2001/08/21 22:34:44 bmah Exp $ -->
<html>
&header;
@ -63,16 +63,19 @@ A vulnerability whereby a remote attacker could exhaust a target's
pool of network buffers has been closed. More details, as well as a
fix, can be found in security advisory FreeBSD-SA-01:52.
A flaw in the implementation of the ipfw(8) ``me'' rules on
point-to-point links has been corrected. Formerly, ``me'' filter
rules would match the remote IP address of a point-to-point interface
in addition to the intended local IP address. More details, as well
as a fix, can be found in security advisory FreeBSD-SA-01:53.
A flaw existed in ipfw(8), in which ``me'' filter rules would match
the remote IP address of a point-to-point interface in addition to the
intended local IP address. More details, as well as a fix, can be
found in security advisory FreeBSD-SA-01:53.
A vulnerability in procfs(5), which could allow a
process to read sensitive information from another process's
memory space, has been closed. For more details, as well as
information on patches, see security advisory FreeBSD-SA-01:54.
A vulnerability in procfs(5) could allow a process to read sensitive
information from another process's memory space. For more details, as
well as information on patches, see security advisory
FreeBSD-SA-01:55.
PARANOID hostname checking in tcp_wrappers did not work correctly.
For more details and information on patches, see security advisory
FreeBSD-SA-01:56.
---- System Update Information: