Regen from article.sgml 1.66.

This commit is contained in:
Bruce A. Mah 2004-03-05 04:21:08 +00:00
parent 11f16e8b80
commit e7c49549f2
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/www/; revision=20267
2 changed files with 24 additions and 6 deletions

View file

@ -18,8 +18,8 @@ alink="#0000FF">
<p class="COPYRIGHT">Copyright &copy; 2000, 2001, 2002, 2003, 2004 The FreeBSD
Documentation Project</p>
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.65
2004/03/04 13:59:45 rushani Exp $<br />
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.66
2004/03/05 04:19:06 bmah Exp $<br />
</p>
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
@ -134,8 +134,17 @@ environment to change its root directory to a different jail, giving it read and
access to the files and directories within. This vulnerability has been closed on the
FreeBSD 5.2-RELEASE security fix branch and in FreeBSD 5.2.1-RELEASE. Information on the
bug fix can be found in security advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.mail.asc"
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.jail.asc"
target="_top">FreeBSD-SA-04:03</a>.</p>
<p>(4 Mar 2004) It is possible for a remote attacker to conduct a low-bandwidth
denial-of-service attack against a machine providing TCP-based services, filling up the
target's memory buffers and potentially leading to a system crash. This vulnerability has
been addressed on the FreeBSD 5.2-RELEASE security fix branch, but is present in both
FreeBSD 5.2-RELEASE and 5.2.1-RELEASE. Security advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:04.tcp.asc"
target="_top">FreeBSD-SA-04:04</a> contains more details, as well as information on
patching existing systems.</p>
</div>
<div class="SECT1">

View file

@ -18,8 +18,8 @@ alink="#0000FF">
<p class="COPYRIGHT">Copyright &copy; 2000, 2001, 2002, 2003, 2004 The FreeBSD
Documentation Project</p>
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.65
2004/03/04 13:59:45 rushani Exp $<br />
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.66
2004/03/05 04:19:06 bmah Exp $<br />
</p>
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
@ -134,8 +134,17 @@ environment to change its root directory to a different jail, giving it read and
access to the files and directories within. This vulnerability has been closed on the
FreeBSD 5.2-RELEASE security fix branch and in FreeBSD 5.2.1-RELEASE. Information on the
bug fix can be found in security advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.mail.asc"
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.jail.asc"
target="_top">FreeBSD-SA-04:03</a>.</p>
<p>(4 Mar 2004) It is possible for a remote attacker to conduct a low-bandwidth
denial-of-service attack against a machine providing TCP-based services, filling up the
target's memory buffers and potentially leading to a system crash. This vulnerability has
been addressed on the FreeBSD 5.2-RELEASE security fix branch, but is present in both
FreeBSD 5.2-RELEASE and 5.2.1-RELEASE. Security advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:04.tcp.asc"
target="_top">FreeBSD-SA-04:04</a> contains more details, as well as information on
patching existing systems.</p>
</div>
<div class="SECT1">