diff options
| author | Bruce A. Mah <bmah@FreeBSD.org> | 2002-03-18 20:26:04 +0000 |
|---|---|---|
| committer | Bruce A. Mah <bmah@FreeBSD.org> | 2002-03-18 20:26:04 +0000 |
| commit | c3123ab6bf19498d4cb9ea771d0704a4baeb438e (patch) | |
| tree | a117b0ee4fabfb6895311cf2d4f28110c172bce3 | |
| parent | 87aedd4eaa1b8faeea0389a72b4e3bac787f9d87 (diff) | |
Notes
| -rw-r--r-- | release/doc/en_US.ISO8859-1/relnotes/article.sgml | 4 | ||||
| -rw-r--r-- | release/doc/en_US.ISO8859-1/relnotes/common/new.sgml | 4 |
2 files changed, 4 insertions, 4 deletions
diff --git a/release/doc/en_US.ISO8859-1/relnotes/article.sgml b/release/doc/en_US.ISO8859-1/relnotes/article.sgml index 7b923ad06177..6dfa3a9393aa 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/article.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/article.sgml @@ -1634,8 +1634,8 @@ options HZ=1000 # not compulsory but strongly recommended</programlisting> <application>OpenSSH</application>'s multiplexing code. This bug could have allowed an authenticated remote user to cause &man.sshd.8; to execute arbitrary code with superuser - privileges, or allowed a connecting SSH client to execute arbitrary - code with the privileges of the client user. (See security + privileges, or allowed a malicious SSH server to execute arbitrary + code on the client system with the privileges of the client user. (See security advisory <ulink url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc">FreeBSD-SA-02:13</ulink>.) &merged;</para> diff --git a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml index 7b923ad06177..6dfa3a9393aa 100644 --- a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml +++ b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml @@ -1634,8 +1634,8 @@ options HZ=1000 # not compulsory but strongly recommended</programlisting> <application>OpenSSH</application>'s multiplexing code. This bug could have allowed an authenticated remote user to cause &man.sshd.8; to execute arbitrary code with superuser - privileges, or allowed a connecting SSH client to execute arbitrary - code with the privileges of the client user. (See security + privileges, or allowed a malicious SSH server to execute arbitrary + code on the client system with the privileges of the client user. (See security advisory <ulink url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc">FreeBSD-SA-02:13</ulink>.) &merged;</para> |
