Regen from rev.1.69.2.15.

This commit is contained in:
Hiroki Sato 2004-11-22 17:22:36 +00:00
parent 13511c92ec
commit c59e116c97
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/www/; revision=23004

View file

@ -6,6 +6,7 @@
<title>FreeBSD 5.3-RELEASE Errata</title>
<meta name="GENERATOR" content="Modular DocBook HTML Stylesheet Version 1.7" />
<link rel="STYLESHEET" type="text/css" href="docbook.css" />
<meta http-equiv="Content-Type" content='text/html; charset="iso-8859-1"' />
</head>
<body class="ARTICLE" bgcolor="#FFFFFF" text="#000000" link="#0000FF" vlink="#840084"
alink="#0000FF">
@ -19,7 +20,7 @@ alink="#0000FF">
Documentation Project</p>
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v
1.69.2.14 2004/11/12 13:30:38 hrs Exp $<br />
1.69.2.15 2004/11/22 17:20:42 hrs Exp $<br />
</p>
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
@ -87,7 +88,13 @@ target="_top">ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/</a>.</p>
<hr />
<h2 class="SECT1"><a id="SECURITY" name="SECURITY">2 Security Advisories</a></h2>
<p>No advisories.</p>
<p>(18 Nov 2004) A bug in the <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=fetch&sektion=1&manpath=FreeBSD+5.3-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">fetch</span>(1)</span></a> utility
which allows a malicious HTTP server to cause arbitrary portions of the client's memory
to be overwritten, has been fixed. For more information, see security advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:16.fetch.asc"
target="_top">FreeBSD-SA-04:16</a>.</p>
</div>
<div class="SECT1">