Add information about the two most recent Security Advisories.

This commit is contained in:
Ken Smith 2004-03-30 05:23:50 +00:00
parent fedee1cf8f
commit 669fb1f244
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/www/; revision=20443

View file

@ -145,6 +145,24 @@ FreeBSD 5.2-RELEASE and 5.2.1-RELEASE. Security advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:04.tcp.asc"
target="_top">FreeBSD-SA-04:04</a> contains more details, as well as information on
patching existing systems.</p>
<p>(17 Mar 2004) By performing a specially crafted SSL/TLS handshake with
an application that uses OpenSSL a null pointer may be dereferenced. This
may in turn cause the application to crash, resulting in a denial of service
attack. For more information see the Security Advisory
<a href="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc"
target="_top">FreeBSD-SA-04:05</a> which contains more details and instructions
on how to patch existing systems.</p>
<p>(29 Mar 2004) A local attacker may take advantage of a programming error in the
handling of certain IPv6 socket options in the
<a href="http://www.FreeBSD.org/cgi/man.cgi?query=setsockopt&amp;sektion=2&amp;manpath=FreeBSD+5.2-current">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">setsockopt</span>(2)</span></a> system call
to read portions of kernel memory without proper authorization. This may result in disclosure of
sensitive data, or potentially cause a panic. See Security Advisory
<a href="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:06.ipv6.asc"
target="_top">FreeBSD-SA-04:06</a> for a more detailed description and instructions on
how to patch existing systems.</p>
</div>
<div class="SECT1">