aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorremko <remko@FreeBSD.org>2005-05-20 03:48:14 +0800
committerremko <remko@FreeBSD.org>2005-05-20 03:48:14 +0800
commite4e43884006a23c48fd551665cfed5c45c69a2a7 (patch)
tree6c45f593406be40c14ed33533061b820624daba7 /security
parent18e0075edf2a858afb3b81dbceb98deea8d8d134 (diff)
downloadfreebsd-ports-gnome-e4e43884006a23c48fd551665cfed5c45c69a2a7.tar.gz
freebsd-ports-gnome-e4e43884006a23c48fd551665cfed5c45c69a2a7.tar.zst
freebsd-ports-gnome-e4e43884006a23c48fd551665cfed5c45c69a2a7.zip
Reword the cdrdao entry, this includes comments from Simon which i overlooked.
Forgotten by: remko Spotted by: simon
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml8
1 files changed, 4 insertions, 4 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 43054e79de73..9dede6c66151 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -43,11 +43,11 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>The developers of cdrdao report that there is a potential
- root exploit in the software. In order to be able to
+ root exploit in the software. In order to be able to
succesfully exploit this vulnerability cdrdao must be
- installed setuid root. When succesfully exploited a local
- user might get escalated privileges. Default this port does
- not install setuid root.</p>
+ installed setuid root. When succesfully exploited a local
+ user might get escalated privileges. By default this port is
+ not installed setuid root.</p>
</body>
</description>
<references>