diff options
author | Bruce A. Mah <bmah@FreeBSD.org> | 2001-08-08 19:04:48 +0000 |
---|---|---|
committer | Bruce A. Mah <bmah@FreeBSD.org> | 2001-08-08 19:04:48 +0000 |
commit | 9e5ae78a4afb9b9fa5b5f90561c2a0f2e61c6569 (patch) | |
tree | 3c4720a7fa4313655e6c9ca796e0364bd6febb30 /release/doc | |
parent | 42abf713c922fea4deaad894e451468ff6d9ecaf (diff) | |
download | src-9e5ae78a4afb9b9fa5b5f90561c2a0f2e61c6569.tar.gz src-9e5ae78a4afb9b9fa5b5f90561c2a0f2e61c6569.zip |
Refer to SA-01:52 from the release note item documenting the fix.
Also move this item so that references to security advisories remain
in numerical order.
Notes
Notes:
svn path=/head/; revision=81301
Diffstat (limited to 'release/doc')
-rw-r--r-- | release/doc/en_US.ISO8859-1/relnotes/article.sgml | 12 | ||||
-rw-r--r-- | release/doc/en_US.ISO8859-1/relnotes/common/new.sgml | 12 |
2 files changed, 12 insertions, 12 deletions
diff --git a/release/doc/en_US.ISO8859-1/relnotes/article.sgml b/release/doc/en_US.ISO8859-1/relnotes/article.sgml index e60d0f668a1a..0063cfab256c 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/article.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/article.sgml @@ -943,12 +943,6 @@ <varname>net.inet.tcp.tcp_seq_genscheme</varname> sysctl variable.&merged;</para> - <para>The new <varname>net.inet.ip.maxfragpackets</varname> - and <varname>net.inet.ip6.maxfragpackets</varname> sysctl - variables limit the amount of memory that can be consumed by IPv4 - and IPv6 packet fragments, which defends against some denial of service - attacks. &merged;</para> - <para>A vulnerability in the &man.fts.3; routines (used by applications for recursively traversing a filesystem) could allow a program to operate on files outside the intended directory @@ -974,6 +968,12 @@ <para>A remote buffer overflow in &man.telnetd.8; has been fixed (see security advisory FreeBSD-SA-01:49). &merged;</para> + + <para>The new <varname>net.inet.ip.maxfragpackets</varname> + and <varname>net.inet.ip6.maxfragpackets</varname> sysctl + variables limit the amount of memory that can be consumed by IPv4 + and IPv6 packet fragments, which defends against some denial of service + attacks (see security advisory FreeBSD-SA-01:52). &merged;</para> </sect2> <sect2 id="userland"> <title>Userland Changes</title> diff --git a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml index e60d0f668a1a..0063cfab256c 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml @@ -943,12 +943,6 @@ <varname>net.inet.tcp.tcp_seq_genscheme</varname> sysctl variable.&merged;</para> - <para>The new <varname>net.inet.ip.maxfragpackets</varname> - and <varname>net.inet.ip6.maxfragpackets</varname> sysctl - variables limit the amount of memory that can be consumed by IPv4 - and IPv6 packet fragments, which defends against some denial of service - attacks. &merged;</para> - <para>A vulnerability in the &man.fts.3; routines (used by applications for recursively traversing a filesystem) could allow a program to operate on files outside the intended directory @@ -974,6 +968,12 @@ <para>A remote buffer overflow in &man.telnetd.8; has been fixed (see security advisory FreeBSD-SA-01:49). &merged;</para> + + <para>The new <varname>net.inet.ip.maxfragpackets</varname> + and <varname>net.inet.ip6.maxfragpackets</varname> sysctl + variables limit the amount of memory that can be consumed by IPv4 + and IPv6 packet fragments, which defends against some denial of service + attacks (see security advisory FreeBSD-SA-01:52). &merged;</para> </sect2> <sect2 id="userland"> <title>Userland Changes</title> |