Regen from article.sgml 1.1.2.70.

This commit is contained in:
Bruce A. Mah 2002-06-27 17:31:28 +00:00
parent 2a16f3d896
commit dcc2333cdf
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/www/; revision=13496

View file

@ -22,7 +22,7 @@
<p class="PUBDATE">$FreeBSD:
src/release/doc/en_US.ISO8859-1/errata/article.sgml,v
1.1.2.69 2002/06/19 18:57:20 bmah Exp $<br>
1.1.2.70 2002/06/27 17:01:35 bmah Exp $<br>
</p>
<hr>
</div>
@ -83,13 +83,20 @@
<h1 class="SECT1"><a name="AEN25">2 Security
Advisories</a></h1>
<p>No active security advisories.</p>
<p>A buffer overflow in the resolver could be exploited by
a malicious domain name server or an attacker forging DNS
messages. This could potentially be used to force arbitrary
code to run on a client machine with the privileges of a
resolver-using application. See security advisory <a href=
"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:28.resolv.asc"
target="_top">FreeBSD-SA-02:28</a> for more information
and a fix.</p>
</div>
<div class="SECT1">
<hr>
<h1 class="SECT1"><a name="AEN28">3 Late-Breaking
<h1 class="SECT1"><a name="AEN29">3 Late-Breaking
News</a></h1>
<p>In FreeBSD 4.6-RELEASE, the default maximum TCP window
@ -242,7 +249,7 @@
<p align="center"><small>This file, and other release-related
documents, can be downloaded from <a href=
"ftp://releng4.FreeBSD.org/pub/FreeBSD/">ftp://releng4.FreeBSD.org/pub/FreeBSD/</a>.</small></p>
"http://snapshots.jp.FreeBSD.org/">http://snapshots.jp.FreeBSD.org/</a>.</small></p>
<p align="center"><small>For questions about FreeBSD, read the
<a href="http://www.FreeBSD.org/docs.html">documentation</a>