diff options
author | remko <remko@FreeBSD.org> | 2005-05-20 03:48:14 +0800 |
---|---|---|
committer | remko <remko@FreeBSD.org> | 2005-05-20 03:48:14 +0800 |
commit | e4e43884006a23c48fd551665cfed5c45c69a2a7 (patch) | |
tree | 6c45f593406be40c14ed33533061b820624daba7 /security/vuxml | |
parent | 18e0075edf2a858afb3b81dbceb98deea8d8d134 (diff) | |
download | freebsd-ports-gnome-e4e43884006a23c48fd551665cfed5c45c69a2a7.tar.gz freebsd-ports-gnome-e4e43884006a23c48fd551665cfed5c45c69a2a7.tar.zst freebsd-ports-gnome-e4e43884006a23c48fd551665cfed5c45c69a2a7.zip |
Reword the cdrdao entry, this includes comments from Simon which i overlooked.
Forgotten by: remko
Spotted by: simon
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 43054e79de73..9dede6c66151 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -43,11 +43,11 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. <description> <body xmlns="http://www.w3.org/1999/xhtml"> <p>The developers of cdrdao report that there is a potential - root exploit in the software. In order to be able to + root exploit in the software. In order to be able to succesfully exploit this vulnerability cdrdao must be - installed setuid root. When succesfully exploited a local - user might get escalated privileges. Default this port does - not install setuid root.</p> + installed setuid root. When succesfully exploited a local + user might get escalated privileges. By default this port is + not installed setuid root.</p> </body> </description> <references> |