summaryrefslogtreecommitdiffstats
path: root/release
diff options
context:
space:
mode:
authorbmah <bmah@FreeBSD.org>2002-03-18 20:26:04 +0000
committerbmah <bmah@FreeBSD.org>2002-03-18 20:26:04 +0000
commit3b5e42c16dfd0105cd2a678258f9cb49d6479393 (patch)
treea117b0ee4fabfb6895311cf2d4f28110c172bce3 /release
parent4da5f64312101ad6da9364eca85ebf9d1637d776 (diff)
downloadFreeBSD-src-3b5e42c16dfd0105cd2a678258f9cb49d6479393.zip
FreeBSD-src-3b5e42c16dfd0105cd2a678258f9cb49d6479393.tar.gz
Fix wording (hopefully for the last time) of my summary of SA-02:13.
Submitted by: ue Reviewed by: nectar
Diffstat (limited to 'release')
-rw-r--r--release/doc/en_US.ISO8859-1/relnotes/article.sgml4
-rw-r--r--release/doc/en_US.ISO8859-1/relnotes/common/new.sgml4
2 files changed, 4 insertions, 4 deletions
diff --git a/release/doc/en_US.ISO8859-1/relnotes/article.sgml b/release/doc/en_US.ISO8859-1/relnotes/article.sgml
index 7b923ad..6dfa3a9 100644
--- a/release/doc/en_US.ISO8859-1/relnotes/article.sgml
+++ b/release/doc/en_US.ISO8859-1/relnotes/article.sgml
@@ -1634,8 +1634,8 @@ options HZ=1000 # not compulsory but strongly recommended</programlisting>
<application>OpenSSH</application>'s multiplexing code. This bug
could have allowed an authenticated remote user to cause
&man.sshd.8; to execute arbitrary code with superuser
- privileges, or allowed a connecting SSH client to execute arbitrary
- code with the privileges of the client user. (See security
+ privileges, or allowed a malicious SSH server to execute arbitrary
+ code on the client system with the privileges of the client user. (See security
advisory <ulink
url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc">FreeBSD-SA-02:13</ulink>.)
&merged;</para>
diff --git a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
index 7b923ad..6dfa3a9 100644
--- a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
+++ b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
@@ -1634,8 +1634,8 @@ options HZ=1000 # not compulsory but strongly recommended</programlisting>
<application>OpenSSH</application>'s multiplexing code. This bug
could have allowed an authenticated remote user to cause
&man.sshd.8; to execute arbitrary code with superuser
- privileges, or allowed a connecting SSH client to execute arbitrary
- code with the privileges of the client user. (See security
+ privileges, or allowed a malicious SSH server to execute arbitrary
+ code on the client system with the privileges of the client user. (See security
advisory <ulink
url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc">FreeBSD-SA-02:13</ulink>.)
&merged;</para>
OpenPOWER on IntegriCloud