diff --git a/release/doc/en_US.ISO8859-1/relnotes/article.sgml b/release/doc/en_US.ISO8859-1/relnotes/article.sgml index f9405f24afdc..f4eafd5ef2cd 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/article.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/article.sgml @@ -1616,7 +1616,9 @@ options HZ=1000 # not compulsory but strongly recommended An off-by-one bug has been fixed in OpenSSH's multiplexing code. This bug - could have allowed a connecting SSH client to execute arbitrary + could have allowed an authenticated remote user to cause + &man.sshd.8; to execute arbitrary code with superuser + privileges, or allowed a connecting SSH client to execute arbitrary code with the privileges of the client user. (See security advisory FreeBSD-SA-02:13.) diff --git a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml index f9405f24afdc..f4eafd5ef2cd 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml @@ -1616,7 +1616,9 @@ options HZ=1000 # not compulsory but strongly recommended An off-by-one bug has been fixed in OpenSSH's multiplexing code. This bug - could have allowed a connecting SSH client to execute arbitrary + could have allowed an authenticated remote user to cause + &man.sshd.8; to execute arbitrary code with superuser + privileges, or allowed a connecting SSH client to execute arbitrary code with the privileges of the client user. (See security advisory FreeBSD-SA-02:13.)