Regen from article.sgml 1.66.
This commit is contained in:
parent
11f16e8b80
commit
e7c49549f2
Notes:
svn2git
2020-12-08 03:00:23 +00:00
svn path=/www/; revision=20267
2 changed files with 24 additions and 6 deletions
|
@ -18,8 +18,8 @@ alink="#0000FF">
|
|||
<p class="COPYRIGHT">Copyright © 2000, 2001, 2002, 2003, 2004 The FreeBSD
|
||||
Documentation Project</p>
|
||||
|
||||
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.65
|
||||
2004/03/04 13:59:45 rushani Exp $<br />
|
||||
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.66
|
||||
2004/03/05 04:19:06 bmah Exp $<br />
|
||||
</p>
|
||||
|
||||
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
|
||||
|
@ -134,8 +134,17 @@ environment to change its root directory to a different jail, giving it read and
|
|||
access to the files and directories within. This vulnerability has been closed on the
|
||||
FreeBSD 5.2-RELEASE security fix branch and in FreeBSD 5.2.1-RELEASE. Information on the
|
||||
bug fix can be found in security advisory <a
|
||||
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.mail.asc"
|
||||
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.jail.asc"
|
||||
target="_top">FreeBSD-SA-04:03</a>.</p>
|
||||
|
||||
<p>(4 Mar 2004) It is possible for a remote attacker to conduct a low-bandwidth
|
||||
denial-of-service attack against a machine providing TCP-based services, filling up the
|
||||
target's memory buffers and potentially leading to a system crash. This vulnerability has
|
||||
been addressed on the FreeBSD 5.2-RELEASE security fix branch, but is present in both
|
||||
FreeBSD 5.2-RELEASE and 5.2.1-RELEASE. Security advisory <a
|
||||
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:04.tcp.asc"
|
||||
target="_top">FreeBSD-SA-04:04</a> contains more details, as well as information on
|
||||
patching existing systems.</p>
|
||||
</div>
|
||||
|
||||
<div class="SECT1">
|
||||
|
|
|
@ -18,8 +18,8 @@ alink="#0000FF">
|
|||
<p class="COPYRIGHT">Copyright © 2000, 2001, 2002, 2003, 2004 The FreeBSD
|
||||
Documentation Project</p>
|
||||
|
||||
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.65
|
||||
2004/03/04 13:59:45 rushani Exp $<br />
|
||||
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.66
|
||||
2004/03/05 04:19:06 bmah Exp $<br />
|
||||
</p>
|
||||
|
||||
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
|
||||
|
@ -134,8 +134,17 @@ environment to change its root directory to a different jail, giving it read and
|
|||
access to the files and directories within. This vulnerability has been closed on the
|
||||
FreeBSD 5.2-RELEASE security fix branch and in FreeBSD 5.2.1-RELEASE. Information on the
|
||||
bug fix can be found in security advisory <a
|
||||
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.mail.asc"
|
||||
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.jail.asc"
|
||||
target="_top">FreeBSD-SA-04:03</a>.</p>
|
||||
|
||||
<p>(4 Mar 2004) It is possible for a remote attacker to conduct a low-bandwidth
|
||||
denial-of-service attack against a machine providing TCP-based services, filling up the
|
||||
target's memory buffers and potentially leading to a system crash. This vulnerability has
|
||||
been addressed on the FreeBSD 5.2-RELEASE security fix branch, but is present in both
|
||||
FreeBSD 5.2-RELEASE and 5.2.1-RELEASE. Security advisory <a
|
||||
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:04.tcp.asc"
|
||||
target="_top">FreeBSD-SA-04:04</a> contains more details, as well as information on
|
||||
patching existing systems.</p>
|
||||
</div>
|
||||
|
||||
<div class="SECT1">
|
||||
|
|
Loading…
Reference in a new issue