summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--release/doc/en_US.ISO8859-1/relnotes/article.sgml12
-rw-r--r--release/doc/en_US.ISO8859-1/relnotes/common/new.sgml12
2 files changed, 12 insertions, 12 deletions
diff --git a/release/doc/en_US.ISO8859-1/relnotes/article.sgml b/release/doc/en_US.ISO8859-1/relnotes/article.sgml
index e60d0f6..0063cfa 100644
--- a/release/doc/en_US.ISO8859-1/relnotes/article.sgml
+++ b/release/doc/en_US.ISO8859-1/relnotes/article.sgml
@@ -943,12 +943,6 @@
<varname>net.inet.tcp.tcp_seq_genscheme</varname> sysctl
variable.&merged;</para>
- <para>The new <varname>net.inet.ip.maxfragpackets</varname>
- and <varname>net.inet.ip6.maxfragpackets</varname> sysctl
- variables limit the amount of memory that can be consumed by IPv4
- and IPv6 packet fragments, which defends against some denial of service
- attacks. &merged;</para>
-
<para>A vulnerability in the &man.fts.3; routines (used by
applications for recursively traversing a filesystem) could
allow a program to operate on files outside the intended directory
@@ -974,6 +968,12 @@
<para>A remote buffer overflow in &man.telnetd.8; has been
fixed (see security advisory FreeBSD-SA-01:49). &merged;</para>
+
+ <para>The new <varname>net.inet.ip.maxfragpackets</varname>
+ and <varname>net.inet.ip6.maxfragpackets</varname> sysctl
+ variables limit the amount of memory that can be consumed by IPv4
+ and IPv6 packet fragments, which defends against some denial of service
+ attacks (see security advisory FreeBSD-SA-01:52). &merged;</para>
</sect2>
<sect2 id="userland">
<title>Userland Changes</title>
diff --git a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
index e60d0f6..0063cfa 100644
--- a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
+++ b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
@@ -943,12 +943,6 @@
<varname>net.inet.tcp.tcp_seq_genscheme</varname> sysctl
variable.&merged;</para>
- <para>The new <varname>net.inet.ip.maxfragpackets</varname>
- and <varname>net.inet.ip6.maxfragpackets</varname> sysctl
- variables limit the amount of memory that can be consumed by IPv4
- and IPv6 packet fragments, which defends against some denial of service
- attacks. &merged;</para>
-
<para>A vulnerability in the &man.fts.3; routines (used by
applications for recursively traversing a filesystem) could
allow a program to operate on files outside the intended directory
@@ -974,6 +968,12 @@
<para>A remote buffer overflow in &man.telnetd.8; has been
fixed (see security advisory FreeBSD-SA-01:49). &merged;</para>
+
+ <para>The new <varname>net.inet.ip.maxfragpackets</varname>
+ and <varname>net.inet.ip6.maxfragpackets</varname> sysctl
+ variables limit the amount of memory that can be consumed by IPv4
+ and IPv6 packet fragments, which defends against some denial of service
+ attacks (see security advisory FreeBSD-SA-01:52). &merged;</para>
</sect2>
<sect2 id="userland">
<title>Userland Changes</title>
OpenPOWER on IntegriCloud