diff options
author | den <den@FreeBSD.org> | 2005-04-18 08:29:25 +0000 |
---|---|---|
committer | den <den@FreeBSD.org> | 2005-04-18 08:29:25 +0000 |
commit | 3cea5460cfe6c81f58ed307b78a98b773b65e662 (patch) | |
tree | aee1f62c1e3559997e73e0c2ebeb900584b1b4b5 /release/doc | |
parent | 21903fff7a861912dc4d648ae658d4c86a9cabc7 (diff) | |
download | FreeBSD-src-3cea5460cfe6c81f58ed307b78a98b773b65e662.zip FreeBSD-src-3cea5460cfe6c81f58ed307b78a98b773b65e662.tar.gz |
Print amd64-specific security advisory only for amd64
Reviewed by: re (hrs)
Diffstat (limited to 'release/doc')
-rw-r--r-- | release/doc/en_US.ISO8859-1/relnotes/article.sgml | 2 | ||||
-rw-r--r-- | release/doc/en_US.ISO8859-1/relnotes/common/new.sgml | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/release/doc/en_US.ISO8859-1/relnotes/article.sgml b/release/doc/en_US.ISO8859-1/relnotes/article.sgml index cd83c66..cdad33a 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/article.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/article.sgml @@ -143,7 +143,7 @@ <ulink url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:02.sendfile.asc">FreeBSD-SA-05:02.sendfile</ulink>. &merged;</para> - <para>A possible privilege escalation vulnerability on &os;/amd64 + <para arch="amd64">A possible privilege escalation vulnerability on &os;/amd64 has been fixed. This allows unprivileged users to gain direct access to some hardware which cannot be accessed without the elevated privilege level. More details are in security advisory diff --git a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml index cd83c66..cdad33a 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml @@ -143,7 +143,7 @@ <ulink url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:02.sendfile.asc">FreeBSD-SA-05:02.sendfile</ulink>. &merged;</para> - <para>A possible privilege escalation vulnerability on &os;/amd64 + <para arch="amd64">A possible privilege escalation vulnerability on &os;/amd64 has been fixed. This allows unprivileged users to gain direct access to some hardware which cannot be accessed without the elevated privilege level. More details are in security advisory |