Regen from article.sgml 1.66.
This commit is contained in:
parent
11f16e8b80
commit
e7c49549f2
Notes:
svn2git
2020-12-08 03:00:23 +00:00
svn path=/www/; revision=20267
2 changed files with 24 additions and 6 deletions
|
@ -18,8 +18,8 @@ alink="#0000FF">
|
||||||
<p class="COPYRIGHT">Copyright © 2000, 2001, 2002, 2003, 2004 The FreeBSD
|
<p class="COPYRIGHT">Copyright © 2000, 2001, 2002, 2003, 2004 The FreeBSD
|
||||||
Documentation Project</p>
|
Documentation Project</p>
|
||||||
|
|
||||||
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.65
|
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.66
|
||||||
2004/03/04 13:59:45 rushani Exp $<br />
|
2004/03/05 04:19:06 bmah Exp $<br />
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
|
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
|
||||||
|
@ -134,8 +134,17 @@ environment to change its root directory to a different jail, giving it read and
|
||||||
access to the files and directories within. This vulnerability has been closed on the
|
access to the files and directories within. This vulnerability has been closed on the
|
||||||
FreeBSD 5.2-RELEASE security fix branch and in FreeBSD 5.2.1-RELEASE. Information on the
|
FreeBSD 5.2-RELEASE security fix branch and in FreeBSD 5.2.1-RELEASE. Information on the
|
||||||
bug fix can be found in security advisory <a
|
bug fix can be found in security advisory <a
|
||||||
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.mail.asc"
|
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.jail.asc"
|
||||||
target="_top">FreeBSD-SA-04:03</a>.</p>
|
target="_top">FreeBSD-SA-04:03</a>.</p>
|
||||||
|
|
||||||
|
<p>(4 Mar 2004) It is possible for a remote attacker to conduct a low-bandwidth
|
||||||
|
denial-of-service attack against a machine providing TCP-based services, filling up the
|
||||||
|
target's memory buffers and potentially leading to a system crash. This vulnerability has
|
||||||
|
been addressed on the FreeBSD 5.2-RELEASE security fix branch, but is present in both
|
||||||
|
FreeBSD 5.2-RELEASE and 5.2.1-RELEASE. Security advisory <a
|
||||||
|
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:04.tcp.asc"
|
||||||
|
target="_top">FreeBSD-SA-04:04</a> contains more details, as well as information on
|
||||||
|
patching existing systems.</p>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="SECT1">
|
<div class="SECT1">
|
||||||
|
|
|
@ -18,8 +18,8 @@ alink="#0000FF">
|
||||||
<p class="COPYRIGHT">Copyright © 2000, 2001, 2002, 2003, 2004 The FreeBSD
|
<p class="COPYRIGHT">Copyright © 2000, 2001, 2002, 2003, 2004 The FreeBSD
|
||||||
Documentation Project</p>
|
Documentation Project</p>
|
||||||
|
|
||||||
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.65
|
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.66
|
||||||
2004/03/04 13:59:45 rushani Exp $<br />
|
2004/03/05 04:19:06 bmah Exp $<br />
|
||||||
</p>
|
</p>
|
||||||
|
|
||||||
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
|
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
|
||||||
|
@ -134,8 +134,17 @@ environment to change its root directory to a different jail, giving it read and
|
||||||
access to the files and directories within. This vulnerability has been closed on the
|
access to the files and directories within. This vulnerability has been closed on the
|
||||||
FreeBSD 5.2-RELEASE security fix branch and in FreeBSD 5.2.1-RELEASE. Information on the
|
FreeBSD 5.2-RELEASE security fix branch and in FreeBSD 5.2.1-RELEASE. Information on the
|
||||||
bug fix can be found in security advisory <a
|
bug fix can be found in security advisory <a
|
||||||
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.mail.asc"
|
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.jail.asc"
|
||||||
target="_top">FreeBSD-SA-04:03</a>.</p>
|
target="_top">FreeBSD-SA-04:03</a>.</p>
|
||||||
|
|
||||||
|
<p>(4 Mar 2004) It is possible for a remote attacker to conduct a low-bandwidth
|
||||||
|
denial-of-service attack against a machine providing TCP-based services, filling up the
|
||||||
|
target's memory buffers and potentially leading to a system crash. This vulnerability has
|
||||||
|
been addressed on the FreeBSD 5.2-RELEASE security fix branch, but is present in both
|
||||||
|
FreeBSD 5.2-RELEASE and 5.2.1-RELEASE. Security advisory <a
|
||||||
|
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:04.tcp.asc"
|
||||||
|
target="_top">FreeBSD-SA-04:04</a> contains more details, as well as information on
|
||||||
|
patching existing systems.</p>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="SECT1">
|
<div class="SECT1">
|
||||||
|
|
Loading…
Reference in a new issue