Regen from article.sgml 1.52.
This commit is contained in:
parent
74f0de051e
commit
f2bbbb77b5
Notes:
svn2git
2020-12-08 03:00:23 +00:00
svn path=/www/; revision=18334
1 changed files with 31 additions and 2 deletions
|
@ -18,8 +18,8 @@ alink="#0000FF">
|
|||
<p class="COPYRIGHT">Copyright © 2000, 2001, 2002, 2003 by The FreeBSD Documentation
|
||||
Project</p>
|
||||
|
||||
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.50
|
||||
2003/09/20 00:17:52 bmah Exp $<br />
|
||||
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v 1.52
|
||||
2003/10/05 09:17:25 hrs Exp $<br />
|
||||
</p>
|
||||
|
||||
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
|
||||
|
@ -127,6 +127,35 @@ via a vendor-supplied patch on the 5.1-RELEASE security fix branch. More details
|
|||
found in security advisory <a
|
||||
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:13.sendmail.asc"
|
||||
target="_top">FreeBSD-SA-03:13</a>.</p>
|
||||
|
||||
<p>The FreeBSD ARP code contains a bug that could allow the kernel to cause resource
|
||||
starvation which eventually results in a system panic. This bug has been fixed on the
|
||||
5-CURRENT development branch and the 5.1-RELEASE security fix branch. More information
|
||||
can be found in security advisory <a
|
||||
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:14.arp.asc"
|
||||
target="_top">FreeBSD-SA-03:14</a>.</p>
|
||||
|
||||
<p>The implementation of the <a
|
||||
href="http://www.FreeBSD.org/cgi/man.cgi?query=procfs&sektion=5&manpath=FreeBSD+5.1-current">
|
||||
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">procfs</span>(5)</span></a> and
|
||||
the <a
|
||||
href="http://www.FreeBSD.org/cgi/man.cgi?query=linprocfs&sektion=5&manpath=FreeBSD+5.1-current">
|
||||
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">linprocfs</span>(5)</span></a>
|
||||
contain a bug that could result in disclosing the contents of kernel memory. This bug has
|
||||
been fixed on the 5-CURRENT development branch and the 5.1-RELEASE security fix branch.
|
||||
More information can be found in security advisory <a
|
||||
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:17.procfs.asc"
|
||||
target="_top">FreeBSD-SA-03:17</a>.</p>
|
||||
|
||||
<p><b class="APPLICATION">OpenSSL</b> contains several bugs which could allow a remote
|
||||
attacker to crash an <b class="APPLICATION">OpenSSL</b>-using application or to execute
|
||||
arbitrary code with the privileges of the application. These bugs have been fixed via a
|
||||
vendor-supplied patch on the 5-CURRENT development branch and the 5.1-RELEASE security
|
||||
fix branch. Note that only applications that use <b class="APPLICATION">OpenSSL</b>'s
|
||||
ASN.1 or X.509 handling code are affected (<b class="APPLICATION">OpenSSH</b> is
|
||||
unaffected, for example). More information can be found in security advisory <a
|
||||
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:18.openssl.asc"
|
||||
target="_top">FreeBSD-SA-03:18</a>.</p>
|
||||
</div>
|
||||
|
||||
<div class="SECT1">
|
||||
|
|
Loading…
Reference in a new issue