aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorgavin <gavin@FreeBSD.org>2012-05-26 08:59:38 +0800
committergavin <gavin@FreeBSD.org>2012-05-26 08:59:38 +0800
commitcbbc2579241128f4ed79e68b7de5cb2702c759ef (patch)
tree98a660243da592b49dee72a9401371a6f2daa20d /security
parente058baba01a6d54ad13c452e51d69a057ba18a38 (diff)
downloadfreebsd-ports-gnome-cbbc2579241128f4ed79e68b7de5cb2702c759ef.tar.gz
freebsd-ports-gnome-cbbc2579241128f4ed79e68b7de5cb2702c759ef.tar.zst
freebsd-ports-gnome-cbbc2579241128f4ed79e68b7de5cb2702c759ef.zip
Correct spelling mistake, FreeSD -> FreeBSD
Reviewed by: nox
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml2
1 files changed, 1 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 033c89947933..5065c2affb49 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -27119,7 +27119,7 @@ Note: Please add new entries to the beginning of this file.
Mandatory Access Control (MAC) restrictions.</p>
<h1>Workaround:</h1>
<p>No workaround is available, but only systems running the 64
- bit FreeSD/amd64 kernels are vulnerable.</p>
+ bit FreeBSD/amd64 kernels are vulnerable.</p>
<p>Systems with 64 bit capable CPUs, but running the 32 bit
FreeBSD/i386 kernel are not vulnerable.</p>
</body>