Regen from article.sgml 1.66.

This commit is contained in:
Bruce A. Mah 2004-03-05 04:21:08 +00:00
parent 11f16e8b80
commit e7c49549f2
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/www/; revision=20267
2 changed files with 24 additions and 6 deletions

View file

@ -18,8 +18,8 @@ alink="#0000FF">
<p class="COPYRIGHT">Copyright &copy; 2000, 2001, 2002, 2003, 2004 The FreeBSD <p class="COPYRIGHT">Copyright &copy; 2000, 2001, 2002, 2003, 2004 The FreeBSD
Documentation Project</p> Documentation Project</p>
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.65 <p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.66
2004/03/04 13:59:45 rushani Exp $<br /> 2004/03/05 04:19:06 bmah Exp $<br />
</p> </p>
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a> <div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
@ -134,8 +134,17 @@ environment to change its root directory to a different jail, giving it read and
access to the files and directories within. This vulnerability has been closed on the access to the files and directories within. This vulnerability has been closed on the
FreeBSD 5.2-RELEASE security fix branch and in FreeBSD 5.2.1-RELEASE. Information on the FreeBSD 5.2-RELEASE security fix branch and in FreeBSD 5.2.1-RELEASE. Information on the
bug fix can be found in security advisory <a bug fix can be found in security advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.mail.asc" href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.jail.asc"
target="_top">FreeBSD-SA-04:03</a>.</p> target="_top">FreeBSD-SA-04:03</a>.</p>
<p>(4 Mar 2004) It is possible for a remote attacker to conduct a low-bandwidth
denial-of-service attack against a machine providing TCP-based services, filling up the
target's memory buffers and potentially leading to a system crash. This vulnerability has
been addressed on the FreeBSD 5.2-RELEASE security fix branch, but is present in both
FreeBSD 5.2-RELEASE and 5.2.1-RELEASE. Security advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:04.tcp.asc"
target="_top">FreeBSD-SA-04:04</a> contains more details, as well as information on
patching existing systems.</p>
</div> </div>
<div class="SECT1"> <div class="SECT1">

View file

@ -18,8 +18,8 @@ alink="#0000FF">
<p class="COPYRIGHT">Copyright &copy; 2000, 2001, 2002, 2003, 2004 The FreeBSD <p class="COPYRIGHT">Copyright &copy; 2000, 2001, 2002, 2003, 2004 The FreeBSD
Documentation Project</p> Documentation Project</p>
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.65 <p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.66
2004/03/04 13:59:45 rushani Exp $<br /> 2004/03/05 04:19:06 bmah Exp $<br />
</p> </p>
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a> <div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
@ -134,8 +134,17 @@ environment to change its root directory to a different jail, giving it read and
access to the files and directories within. This vulnerability has been closed on the access to the files and directories within. This vulnerability has been closed on the
FreeBSD 5.2-RELEASE security fix branch and in FreeBSD 5.2.1-RELEASE. Information on the FreeBSD 5.2-RELEASE security fix branch and in FreeBSD 5.2.1-RELEASE. Information on the
bug fix can be found in security advisory <a bug fix can be found in security advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.mail.asc" href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.jail.asc"
target="_top">FreeBSD-SA-04:03</a>.</p> target="_top">FreeBSD-SA-04:03</a>.</p>
<p>(4 Mar 2004) It is possible for a remote attacker to conduct a low-bandwidth
denial-of-service attack against a machine providing TCP-based services, filling up the
target's memory buffers and potentially leading to a system crash. This vulnerability has
been addressed on the FreeBSD 5.2-RELEASE security fix branch, but is present in both
FreeBSD 5.2-RELEASE and 5.2.1-RELEASE. Security advisory <a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:04.tcp.asc"
target="_top">FreeBSD-SA-04:04</a> contains more details, as well as information on
patching existing systems.</p>
</div> </div>
<div class="SECT1"> <div class="SECT1">