Regen from article.sgml 1.1.2.120.
This commit is contained in:
parent
9efc8813e3
commit
abe62abba9
Notes:
svn2git
2020-12-08 03:00:23 +00:00
svn path=/www/; revision=19995
1 changed files with 17 additions and 6 deletions
|
@ -19,7 +19,7 @@ alink="#0000FF">
|
|||
Project</p>
|
||||
|
||||
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v
|
||||
1.1.2.119 2003/12/05 00:01:30 bmah Exp $<br />
|
||||
1.1.2.120 2004/02/08 22:26:05 bmah Exp $<br />
|
||||
</p>
|
||||
|
||||
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
|
||||
|
@ -83,17 +83,28 @@ target="_top">ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/</a>.</p>
|
|||
<hr />
|
||||
<h2 class="SECT1"><a id="AEN32" name="AEN32">2 Security Advisories</a></h2>
|
||||
|
||||
<p><b class="APPLICATION">BIND</b> contains the potential for a denial-of-service attack.
|
||||
This vulnerability has been addressed by a vendor patch on the 4.9-RELEASE security fix
|
||||
branch and by the import of a new version to the 4-STABLE development branch. For more
|
||||
information, see <a
|
||||
<p>(5 Dec 2003) <b class="APPLICATION">BIND</b> contains the potential for a
|
||||
denial-of-service attack. This vulnerability has been addressed by a vendor patch on the
|
||||
4.9-RELEASE security fix branch and by the import of a new version to the 4-STABLE
|
||||
development branch. For more information, see <a
|
||||
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:19.bind.asc"
|
||||
target="_top">FreeBSD-SA-03:19</a>.</p>
|
||||
|
||||
<p>(8 Feb 2004) A bug with the System V Shared Memory interface (specifically the <a
|
||||
href="http://www.FreeBSD.org/cgi/man.cgi?query=shmat&sektion=2&manpath=FreeBSD+4.8-stable">
|
||||
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">shmat</span>(2)</span></a> system
|
||||
call) can cause a shared memory segment to reference unallocated kernel memory. In turn,
|
||||
this can permit a local attacker to gain unauthorized access to parts of kernel memory,
|
||||
possibly resulting in disclosure of sensitive information, bypass of access control
|
||||
mechanisms, or privilege escalation. More details, including bugfix and workaround
|
||||
information, can be found in security advisory <a
|
||||
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:02.shmat.asc"
|
||||
target="_top">FreeBSD-SA-04:02</a>.</p>
|
||||
</div>
|
||||
|
||||
<div class="SECT1">
|
||||
<hr />
|
||||
<h2 class="SECT1"><a id="AEN37" name="AEN37">3 Late-Breaking News</a></h2>
|
||||
<h2 class="SECT1"><a id="AEN42" name="AEN42">3 Late-Breaking News</a></h2>
|
||||
|
||||
<p>(28 Oct 2003) Very late in the release cycle, a change was made to the HyperThreading
|
||||
(HTT) support on <span class="TRADEMARK">Intel</span>® processors. HTT support is now
|
||||
|
|
Loading…
Reference in a new issue