diff --git a/release/doc/en_US.ISO8859-1/relnotes/article.sgml b/release/doc/en_US.ISO8859-1/relnotes/article.sgml index b7d3c5c8d221..f786980f257b 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/article.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/article.sgml @@ -129,6 +129,17 @@ group. For more information, see security advisory FreeBSD-SA-04:01. + A bug with the System V Shared Memory interface + (specifically the &man.shmat.2; system call) has been fixed. + This bug can cause a shared memory segment to reference + unallocated kernel memory. In turn, this can permit a local + attacker to gain unauthorized access to parts of kernel memory, + possibly resulting in disclosure of sensitive information, + bypass of access control mechanisms, or privilege escalation. + More details can be found in security advisory FreeBSD-SA-04:02. + &merged; + diff --git a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml index b7d3c5c8d221..f786980f257b 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml @@ -129,6 +129,17 @@ group. For more information, see security advisory FreeBSD-SA-04:01. + A bug with the System V Shared Memory interface + (specifically the &man.shmat.2; system call) has been fixed. + This bug can cause a shared memory segment to reference + unallocated kernel memory. In turn, this can permit a local + attacker to gain unauthorized access to parts of kernel memory, + possibly resulting in disclosure of sensitive information, + bypass of access control mechanisms, or privilege escalation. + More details can be found in security advisory FreeBSD-SA-04:02. + &merged; +