diff --git a/release/doc/en_US.ISO8859-1/relnotes/article.sgml b/release/doc/en_US.ISO8859-1/relnotes/article.sgml
index b7d3c5c8d221..f786980f257b 100644
--- a/release/doc/en_US.ISO8859-1/relnotes/article.sgml
+++ b/release/doc/en_US.ISO8859-1/relnotes/article.sgml
@@ -129,6 +129,17 @@
group. For more information, see security advisory FreeBSD-SA-04:01.
+ A bug with the System V Shared Memory interface
+ (specifically the &man.shmat.2; system call) has been fixed.
+ This bug can cause a shared memory segment to reference
+ unallocated kernel memory. In turn, this can permit a local
+ attacker to gain unauthorized access to parts of kernel memory,
+ possibly resulting in disclosure of sensitive information,
+ bypass of access control mechanisms, or privilege escalation.
+ More details can be found in security advisory FreeBSD-SA-04:02.
+ &merged;
+
diff --git a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
index b7d3c5c8d221..f786980f257b 100644
--- a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
+++ b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
@@ -129,6 +129,17 @@
group. For more information, see security advisory FreeBSD-SA-04:01.
+ A bug with the System V Shared Memory interface
+ (specifically the &man.shmat.2; system call) has been fixed.
+ This bug can cause a shared memory segment to reference
+ unallocated kernel memory. In turn, this can permit a local
+ attacker to gain unauthorized access to parts of kernel memory,
+ possibly resulting in disclosure of sensitive information,
+ bypass of access control mechanisms, or privilege escalation.
+ More details can be found in security advisory FreeBSD-SA-04:02.
+ &merged;
+