Signed-off-by: Ján Tomko <jtomko@xxxxxxxxxx> --- notices/2008/0001.xml | 4 ++-- notices/2010/0004.xml | 2 +- notices/2011/0001.xml | 2 +- notices/2011/0003.xml | 2 +- notices/2013/0001.xml | 2 +- notices/2013/0007.xml | 2 +- notices/2013/0008.xml | 2 +- notices/2013/0010.xml | 2 +- notices/2017/0001.xml | 4 ++-- 9 files changed, 11 insertions(+), 11 deletions(-) diff --git a/notices/2008/0001.xml b/notices/2008/0001.xml index 7d2bfcf..d4f9355 100644 --- a/notices/2008/0001.xml +++ b/notices/2008/0001.xml @@ -6,8 +6,8 @@ <description> <![CDATA[The APIs virDomainMigrate, virDomainBlockPeek, virDomainMemoryPeek, virDomainSetAutostart, virNetworkSetAutostart, virConnectFindStoragePoolSources -and virStoragePoolSetAutostart did not check the read-only flag of the -connection. This allow unprivileged users to invoke APIs that they should +and virStoragePoolSetAutostart did not check the read-only flag of the +connection. This allowed unprivileged users to invoke APIs that they should not have access to.]]> </description> diff --git a/notices/2010/0004.xml b/notices/2010/0004.xml index 080114d..1f8202a 100644 --- a/notices/2010/0004.xml +++ b/notices/2010/0004.xml @@ -18,7 +18,7 @@ virtualization host, by checking if the source port is less than virtual network to gain access to network services only intended to be used by the host. For example, an NFS filesystem exported to the virtualization host relying on IP based security with the "secure" -option will be inadvertantly accessible to guests.]]> +option will be inadvertently accessible to guests.]]> </impact> <workaround> diff --git a/notices/2011/0001.xml b/notices/2011/0001.xml index a24dd0f..a5b275e 100644 --- a/notices/2011/0001.xml +++ b/notices/2011/0001.xml @@ -7,7 +7,7 @@ <![CDATA[The APIs virConnectDomainXMLToNative, virNodeDeviceDettach, virNodeDeviceReAttach, virNodeDeviceReset, virDomainRevertToSnapshot, virDomainSnapshotDelete did not check -the read-only flag of the connection. This allow unprivileged +the read-only flag of the connection. This allowed unprivileged users to invoke APIs that they should not have access to.]]> </description> diff --git a/notices/2011/0003.xml b/notices/2011/0003.xml index e772ff8..4aa655f 100644 --- a/notices/2011/0003.xml +++ b/notices/2011/0003.xml @@ -13,7 +13,7 @@ access to inappropriate host files.]]> <impact> <![CDATA[A malicious guest disk image could trick the security -drivre into providing access to inappropriate host files]]> +driver into providing access to inappropriate host files]]> </impact> <workaround> diff --git a/notices/2013/0001.xml b/notices/2013/0001.xml index 97d8949..9425a64 100644 --- a/notices/2013/0001.xml +++ b/notices/2013/0001.xml @@ -6,7 +6,7 @@ <description> <![CDATA[When reading and dispatching of a message failed the message was freed but was not removed from the message queue. -When the conneciton was later clsed this would result in an +When the connection was later closed this would result in an attempt to free uninitialized memory]]> </description> diff --git a/notices/2013/0007.xml b/notices/2013/0007.xml index 55ba600..2c8f409 100644 --- a/notices/2013/0007.xml +++ b/notices/2013/0007.xml @@ -5,7 +5,7 @@ <description> <![CDATA[The legacy Xen driver code for listing inactive domains -would stasrt populating an array at index -1. This causes memory +would start populating an array at index -1. This causes memory corruption leading to a crash of libvirtd]]> </description> diff --git a/notices/2013/0008.xml b/notices/2013/0008.xml index d690fe7..eb79599 100644 --- a/notices/2013/0008.xml +++ b/notices/2013/0008.xml @@ -1,7 +1,7 @@ <security-notice xmlns="http://security.libvirt.org/xmlns/security-notice/1.0"> <id>2013-0008</id> - <summary>Libvirt security driver does nto clear supplementary groups</summary> + <summary>Libvirt security driver does not clear supplementary groups</summary> <description> <![CDATA[When parsing the process security label for the DAC driver diff --git a/notices/2013/0010.xml b/notices/2013/0010.xml index 27515b0..056fc2b 100644 --- a/notices/2013/0010.xml +++ b/notices/2013/0010.xml @@ -6,7 +6,7 @@ <description> <![CDATA[The code handling the virDomainMemoryStats API in the libvirtd daemon dispatch did not correctly initialize variables -to NULL. This if RPC parameter validation failed it was possible +to NULL. Thus if RPC parameter validation failed it was possible for libvirtd to access uninitialized memory during cleanup.]]> </description> diff --git a/notices/2017/0001.xml b/notices/2017/0001.xml index 0c74ca0..3255c24 100644 --- a/notices/2017/0001.xml +++ b/notices/2017/0001.xml @@ -5,8 +5,8 @@ <description> <![CDATA[When calling the virConnectGetAllDomainStats API on a guest which has - a CDROM drive with no media present, libvirtd will crash on a NULL pointer - acess]]> + a CDROM drive with no media present, libvirtd will crash on a NULL pointer + access]]> </description> <impact> -- 2.20.1 -- libvir-list mailing list libvir-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/libvir-list