summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorBruce A. Mah <bmah@FreeBSD.org>2002-03-18 20:26:04 +0000
committerBruce A. Mah <bmah@FreeBSD.org>2002-03-18 20:26:04 +0000
commitc3123ab6bf19498d4cb9ea771d0704a4baeb438e (patch)
treea117b0ee4fabfb6895311cf2d4f28110c172bce3
parent87aedd4eaa1b8faeea0389a72b4e3bac787f9d87 (diff)
Notes
-rw-r--r--release/doc/en_US.ISO8859-1/relnotes/article.sgml4
-rw-r--r--release/doc/en_US.ISO8859-1/relnotes/common/new.sgml4
2 files changed, 4 insertions, 4 deletions
diff --git a/release/doc/en_US.ISO8859-1/relnotes/article.sgml b/release/doc/en_US.ISO8859-1/relnotes/article.sgml
index 7b923ad06177..6dfa3a9393aa 100644
--- a/release/doc/en_US.ISO8859-1/relnotes/article.sgml
+++ b/release/doc/en_US.ISO8859-1/relnotes/article.sgml
@@ -1634,8 +1634,8 @@ options HZ=1000 # not compulsory but strongly recommended</programlisting>
<application>OpenSSH</application>'s multiplexing code. This bug
could have allowed an authenticated remote user to cause
&man.sshd.8; to execute arbitrary code with superuser
- privileges, or allowed a connecting SSH client to execute arbitrary
- code with the privileges of the client user. (See security
+ privileges, or allowed a malicious SSH server to execute arbitrary
+ code on the client system with the privileges of the client user. (See security
advisory <ulink
url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc">FreeBSD-SA-02:13</ulink>.)
&merged;</para>
diff --git a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
index 7b923ad06177..6dfa3a9393aa 100644
--- a/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
+++ b/release/doc/en_US.ISO8859-1/relnotes/common/new.sgml
@@ -1634,8 +1634,8 @@ options HZ=1000 # not compulsory but strongly recommended</programlisting>
<application>OpenSSH</application>'s multiplexing code. This bug
could have allowed an authenticated remote user to cause
&man.sshd.8; to execute arbitrary code with superuser
- privileges, or allowed a connecting SSH client to execute arbitrary
- code with the privileges of the client user. (See security
+ privileges, or allowed a malicious SSH server to execute arbitrary
+ code on the client system with the privileges of the client user. (See security
advisory <ulink
url="ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:13.openssh.asc">FreeBSD-SA-02:13</ulink>.)
&merged;</para>