diff options
author | bmah <bmah@FreeBSD.org> | 2004-02-08 22:16:29 +0000 |
---|---|---|
committer | bmah <bmah@FreeBSD.org> | 2004-02-08 22:16:29 +0000 |
commit | fb646ca9f5a0c29a1d51b3ff7a9626bfcdf299ca (patch) | |
tree | 2b378cae92913fb918d275457b64f9fa94f02332 /release | |
parent | 05e08e2967a32ac8b18a8b142353490941ed489c (diff) | |
download | FreeBSD-src-fb646ca9f5a0c29a1d51b3ff7a9626bfcdf299ca.zip FreeBSD-src-fb646ca9f5a0c29a1d51b3ff7a9626bfcdf299ca.tar.gz |
New errata: SA-04:02.
Diffstat (limited to 'release')
-rw-r--r-- | release/doc/en_US.ISO8859-1/errata/article.sgml | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/release/doc/en_US.ISO8859-1/errata/article.sgml b/release/doc/en_US.ISO8859-1/errata/article.sgml index 5d7bfb2..68e362f 100644 --- a/release/doc/en_US.ISO8859-1/errata/article.sgml +++ b/release/doc/en_US.ISO8859-1/errata/article.sgml @@ -142,6 +142,17 @@ security fix branch. For more information, see security advisory <ulink url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:01.mksnap_ffs.asc">FreeBSD-SA-04:01</ulink>.</para> + <para>(8 Feb 2004) A bug with the System V Shared Memory interface + (specifically the &man.shmat.2; system call) + can cause a shared memory segment to reference + unallocated kernel memory. In turn, this can permit a local + attacker to gain unauthorized access to parts of kernel memory, + possibly resulting in disclosure of sensitive information, + bypass of access control mechanisms, or privilege escalation. + More details, including bugfix and workaround information, + can be found in security advisory <ulink + url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:02.shmat.asc">FreeBSD-SA-04:02</ulink>.</para> + ]]> </sect1> |