summaryrefslogtreecommitdiffstats
path: root/release/doc
diff options
context:
space:
mode:
authorhrs <hrs@FreeBSD.org>2005-04-06 18:28:54 +0000
committerhrs <hrs@FreeBSD.org>2005-04-06 18:28:54 +0000
commitd14f6a2d55071d54d2b96dd95e1dd4b015887baf (patch)
treeeedb3a66c079f2d091d7a551dd4dad9a22fbd0e9 /release/doc
parente45b89dcfdd1eb10ed256a1c94e1b4c336ed2517 (diff)
downloadFreeBSD-src-d14f6a2d55071d54d2b96dd95e1dd4b015887baf.zip
FreeBSD-src-d14f6a2d55071d54d2b96dd95e1dd4b015887baf.tar.gz
New release notes: FreeBSD-SA-05:03.amd64.
Diffstat (limited to 'release/doc')
-rw-r--r--release/doc/en_US.ISO8859-1/relnotes/article.sgml7
-rw-r--r--release/doc/en_US.ISO8859-1/relnotes/common/new.sgml7
2 files changed, 14 insertions, 0 deletions
diff --git a/release/doc/en_US.ISO8859-1/relnotes/article.sgml b/release/doc/en_US.ISO8859-1/relnotes/article.sgml
index fd31e88..99d1a83 100644
--- a/release/doc/en_US.ISO8859-1/relnotes/article.sgml
+++ b/release/doc/en_US.ISO8859-1/relnotes/article.sgml
@@ -143,6 +143,13 @@
<ulink url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:02.sendfile.asc">FreeBSD-SA-05:02.sendfile</ulink>.
&merged;</para>
+ <para>A possible privilege escalation vulnerability on &os;/amd64
+ has been fixed. This allows unprivileged users to gain direct
+ access to some hardware which cannot be accessed
+ without the elevated privilege level. More details are in security advisory
+ <ulink url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:03.amd64.asc">FreeBSD-SA-05:03.amd64</ulink>.
+ &merged;</para>
+
</sect2>
<sect2 id="kernel">
diff --git a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
index fd31e88..99d1a83 100644
--- a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
+++ b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
@@ -143,6 +143,13 @@
<ulink url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:02.sendfile.asc">FreeBSD-SA-05:02.sendfile</ulink>.
&merged;</para>
+ <para>A possible privilege escalation vulnerability on &os;/amd64
+ has been fixed. This allows unprivileged users to gain direct
+ access to some hardware which cannot be accessed
+ without the elevated privilege level. More details are in security advisory
+ <ulink url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:03.amd64.asc">FreeBSD-SA-05:03.amd64</ulink>.
+ &merged;</para>
+
</sect2>
<sect2 id="kernel">
OpenPOWER on IntegriCloud