Regen from errata/article.sgml 1.69.2.24.

This commit is contained in:
Bruce A. Mah 2005-06-30 19:42:09 +00:00
parent d8f5dd5a01
commit f4859284c7
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/www/; revision=24991

View file

@ -20,7 +20,7 @@ alink="#0000FF">
Documentation Project</p>
<p class="PUBDATE">$FreeBSD: src/release/doc/en_US.ISO8859-1/errata/article.sgml,v
1.69.2.23 2005/06/24 08:52:41 hrs Exp $<br />
1.69.2.24 2005/06/30 19:39:45 bmah Exp $<br />
</p>
<div class="LEGALNOTICE"><a id="TRADEMARKS" name="TRADEMARKS"></a>
@ -143,6 +143,34 @@ target="_top">SA-05:12.bind9</a></td>
<p>BIND 9 DNSSEC remote denial of service vulnerability</p>
</td>
</tr>
<tr>
<td><a href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:13.ipfw.asc"
target="_top">SA-05:13.ipfw</a></td>
<td>29&nbsp;Jun&nbsp;2005</td>
<td>
<p>ipfw packet matching errors with address tables</p>
</td>
</tr>
<tr>
<td><a
href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:14.bzip2.asc"
target="_top">SA-05:14.bzip2</a></td>
<td>29&nbsp;Jun&nbsp;2005</td>
<td>
<p>bzip2 denial of service and permission race vulnerabilities</p>
</td>
</tr>
<tr>
<td><a href="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:15.tcp.asc"
target="_top">SA-05:15.tcp</a></td>
<td>29&nbsp;Jun&nbsp;2005</td>
<td>
<p>TCP connection stall denial of service</p>
</td>
</tr>
</tbody>
</table>
</div>
@ -162,15 +190,15 @@ target="_top">SA-05:12.bind9</a></td>
<p>(6 May 2005) An error in the default permissions on the <tt
class="FILENAME">/dev/iir</tt> device node, which allowed unprivileged local users to
send commands to the hardware supported by the <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=iir&sektion=4&manpath=FreeBSD+5.3-stable"><span
class="CITEREFENTRY"><span class="REFENTRYTITLE">iir</span>(4)</span></a> driver.
href="http://www.FreeBSD.org/cgi/man.cgi?query=iir&amp;sektion=4&amp;manpath=FreeBSD+5.3-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">iir</span>(4)</span></a> driver.
Although the error was fixed prior to 5.4-RELEASE, it was applied too late in the release
cycle to be mentioned in the release notes. For more information, see security advisory
<a href="ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:06.iir.asc"
target="_top">FreeBSD-SA-05:06.iir</a>.</p>
<p>(6 May 2005) A bug in the validation of <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=i386_get_ldt&sektion=2&manpath=FreeBSD+5.3-stable">
href="http://www.FreeBSD.org/cgi/man.cgi?query=i386_get_ldt&amp;sektion=2&amp;manpath=FreeBSD+5.3-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">i386_get_ldt</span>(2)</span></a>
system call input arguments, which may allow kernel memory may be disclosed to the user
process, has been fixed. This bug was fixed prior to 5.4-RELEASE, although not in time to
@ -189,7 +217,7 @@ FreeBSD/sparc64 GENERIC kernel prior to the upcoming 6.0-RELEASE officially only
serial consoles. This is especially true for the FreeBSD/sparc64 5.4-RELEASE GENERIC
kernel because the ofw_console(4) driver which also provides limited indirect support for
graphical consoles has been replaced with the <a
href="http://www.FreeBSD.org/cgi/man.cgi?query=uart&sektion=4&manpath=FreeBSD+5.3-stable">
href="http://www.FreeBSD.org/cgi/man.cgi?query=uart&amp;sektion=4&amp;manpath=FreeBSD+5.3-stable">
<span class="CITEREFENTRY"><span class="REFENTRYTITLE">uart</span>(4)</span></a> driver
in favor better serial support.</p>