diff options
author | bmah <bmah@FreeBSD.org> | 2002-03-18 20:26:04 +0000 |
---|---|---|
committer | bmah <bmah@FreeBSD.org> | 2002-03-18 20:26:04 +0000 |
commit | 3b5e42c16dfd0105cd2a678258f9cb49d6479393 (patch) | |
tree | a117b0ee4fabfb6895311cf2d4f28110c172bce3 /release | |
parent | 4da5f64312101ad6da9364eca85ebf9d1637d776 (diff) | |
download | FreeBSD-src-3b5e42c16dfd0105cd2a678258f9cb49d6479393.zip FreeBSD-src-3b5e42c16dfd0105cd2a678258f9cb49d6479393.tar.gz |
Fix wording (hopefully for the last time) of my summary of SA-02:13.
Submitted by: ue
Reviewed by: nectar
Diffstat (limited to 'release')
-rw-r--r-- | release/doc/en_US.ISO8859-1/relnotes/article.sgml | 4 | ||||
-rw-r--r-- | release/doc/en_US.ISO8859-1/relnotes/common/new.sgml | 4 |
2 files changed, 4 insertions, 4 deletions
diff --git a/release/doc/en_US.ISO8859-1/relnotes/article.sgml b/release/doc/en_US.ISO8859-1/relnotes/article.sgml index 7b923ad..6dfa3a9 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/article.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/article.sgml @@ -1634,8 +1634,8 @@ options HZ=1000 # not compulsory but strongly recommended</programlisting> <application>OpenSSH</application>'s multiplexing code. This bug could have allowed an authenticated remote user to cause &man.sshd.8; to execute arbitrary code with superuser - privileges, or allowed a connecting SSH client to execute arbitrary - code with the privileges of the client user. (See security + privileges, or allowed a malicious SSH server to execute arbitrary + code on the client system with the privileges of the client user. (See security advisory <ulink url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc">FreeBSD-SA-02:13</ulink>.) &merged;</para> diff --git a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml index 7b923ad..6dfa3a9 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml @@ -1634,8 +1634,8 @@ options HZ=1000 # not compulsory but strongly recommended</programlisting> <application>OpenSSH</application>'s multiplexing code. This bug could have allowed an authenticated remote user to cause &man.sshd.8; to execute arbitrary code with superuser - privileges, or allowed a connecting SSH client to execute arbitrary - code with the privileges of the client user. (See security + privileges, or allowed a malicious SSH server to execute arbitrary + code on the client system with the privileges of the client user. (See security advisory <ulink url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc">FreeBSD-SA-02:13</ulink>.) &merged;</para> |