diff options
author | hrs <hrs@FreeBSD.org> | 2005-04-06 18:28:54 +0000 |
---|---|---|
committer | hrs <hrs@FreeBSD.org> | 2005-04-06 18:28:54 +0000 |
commit | d14f6a2d55071d54d2b96dd95e1dd4b015887baf (patch) | |
tree | eedb3a66c079f2d091d7a551dd4dad9a22fbd0e9 /release/doc | |
parent | e45b89dcfdd1eb10ed256a1c94e1b4c336ed2517 (diff) | |
download | FreeBSD-src-d14f6a2d55071d54d2b96dd95e1dd4b015887baf.zip FreeBSD-src-d14f6a2d55071d54d2b96dd95e1dd4b015887baf.tar.gz |
New release notes: FreeBSD-SA-05:03.amd64.
Diffstat (limited to 'release/doc')
-rw-r--r-- | release/doc/en_US.ISO8859-1/relnotes/article.sgml | 7 | ||||
-rw-r--r-- | release/doc/en_US.ISO8859-1/relnotes/common/new.sgml | 7 |
2 files changed, 14 insertions, 0 deletions
diff --git a/release/doc/en_US.ISO8859-1/relnotes/article.sgml b/release/doc/en_US.ISO8859-1/relnotes/article.sgml index fd31e88..99d1a83 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/article.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/article.sgml @@ -143,6 +143,13 @@ <ulink url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:02.sendfile.asc">FreeBSD-SA-05:02.sendfile</ulink>. &merged;</para> + <para>A possible privilege escalation vulnerability on &os;/amd64 + has been fixed. This allows unprivileged users to gain direct + access to some hardware which cannot be accessed + without the elevated privilege level. More details are in security advisory + <ulink url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:03.amd64.asc">FreeBSD-SA-05:03.amd64</ulink>. + &merged;</para> + </sect2> <sect2 id="kernel"> diff --git a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml index fd31e88..99d1a83 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml @@ -143,6 +143,13 @@ <ulink url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:02.sendfile.asc">FreeBSD-SA-05:02.sendfile</ulink>. &merged;</para> + <para>A possible privilege escalation vulnerability on &os;/amd64 + has been fixed. This allows unprivileged users to gain direct + access to some hardware which cannot be accessed + without the elevated privilege level. More details are in security advisory + <ulink url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:03.amd64.asc">FreeBSD-SA-05:03.amd64</ulink>. + &merged;</para> + </sect2> <sect2 id="kernel"> |