[libvirt] [security-notice PATCH] notices: fix some typos

Ján Tomko jtomko at redhat.com
Thu Jun 20 12:04:08 UTC 2019


Signed-off-by: Ján Tomko <jtomko at redhat.com>
---
 notices/2008/0001.xml | 4 ++--
 notices/2010/0004.xml | 2 +-
 notices/2011/0001.xml | 2 +-
 notices/2011/0003.xml | 2 +-
 notices/2013/0001.xml | 2 +-
 notices/2013/0007.xml | 2 +-
 notices/2013/0008.xml | 2 +-
 notices/2013/0010.xml | 2 +-
 notices/2017/0001.xml | 4 ++--
 9 files changed, 11 insertions(+), 11 deletions(-)

diff --git a/notices/2008/0001.xml b/notices/2008/0001.xml
index 7d2bfcf..d4f9355 100644
--- a/notices/2008/0001.xml
+++ b/notices/2008/0001.xml
@@ -6,8 +6,8 @@
   <description>
 <![CDATA[The APIs virDomainMigrate, virDomainBlockPeek, virDomainMemoryPeek,
  virDomainSetAutostart, virNetworkSetAutostart, virConnectFindStoragePoolSources
-and virStoragePoolSetAutostart  did not check the read-only flag of the
-connection. This allow unprivileged users to invoke APIs that they should
+and virStoragePoolSetAutostart did not check the read-only flag of the
+connection. This allowed unprivileged users to invoke APIs that they should
 not have access to.]]>
   </description>
 
diff --git a/notices/2010/0004.xml b/notices/2010/0004.xml
index 080114d..1f8202a 100644
--- a/notices/2010/0004.xml
+++ b/notices/2010/0004.xml
@@ -18,7 +18,7 @@ virtualization host, by checking if the source port is less than
 virtual network to gain access to network services only intended
 to be used by the host. For example, an NFS filesystem exported to
 the virtualization host relying on IP based security with the "secure"
-option will be inadvertantly accessible to guests.]]>
+option will be inadvertently accessible to guests.]]>
   </impact>
 
   <workaround>
diff --git a/notices/2011/0001.xml b/notices/2011/0001.xml
index a24dd0f..a5b275e 100644
--- a/notices/2011/0001.xml
+++ b/notices/2011/0001.xml
@@ -7,7 +7,7 @@
 <![CDATA[The APIs virConnectDomainXMLToNative,
 virNodeDeviceDettach, virNodeDeviceReAttach, virNodeDeviceReset,
 virDomainRevertToSnapshot, virDomainSnapshotDelete did not check
-the read-only flag of the connection. This allow unprivileged
+the read-only flag of the connection. This allowed unprivileged
 users to invoke APIs that they should not have access to.]]>
   </description>
 
diff --git a/notices/2011/0003.xml b/notices/2011/0003.xml
index e772ff8..4aa655f 100644
--- a/notices/2011/0003.xml
+++ b/notices/2011/0003.xml
@@ -13,7 +13,7 @@ access to inappropriate host files.]]>
 
   <impact>
 <![CDATA[A malicious guest disk image could trick the security
-drivre into providing access to inappropriate host files]]>
+driver into providing access to inappropriate host files]]>
   </impact>
 
   <workaround>
diff --git a/notices/2013/0001.xml b/notices/2013/0001.xml
index 97d8949..9425a64 100644
--- a/notices/2013/0001.xml
+++ b/notices/2013/0001.xml
@@ -6,7 +6,7 @@
   <description>
 <![CDATA[When reading and dispatching of a message failed the
 message was freed but was not removed from the message queue.
-When the conneciton was later clsed this would result in an
+When the connection was later closed this would result in an
 attempt to free uninitialized memory]]>
   </description>
 
diff --git a/notices/2013/0007.xml b/notices/2013/0007.xml
index 55ba600..2c8f409 100644
--- a/notices/2013/0007.xml
+++ b/notices/2013/0007.xml
@@ -5,7 +5,7 @@
 
   <description>
 <![CDATA[The legacy Xen driver code for listing inactive domains
-would stasrt populating an array at index -1. This causes memory
+would start populating an array at index -1. This causes memory
 corruption leading to a crash of libvirtd]]>
   </description>
 
diff --git a/notices/2013/0008.xml b/notices/2013/0008.xml
index d690fe7..eb79599 100644
--- a/notices/2013/0008.xml
+++ b/notices/2013/0008.xml
@@ -1,7 +1,7 @@
 <security-notice xmlns="http://security.libvirt.org/xmlns/security-notice/1.0">
   <id>2013-0008</id>
 
-  <summary>Libvirt security driver does nto clear supplementary groups</summary>
+  <summary>Libvirt security driver does not clear supplementary groups</summary>
 
   <description>
 <![CDATA[When parsing the process security label for the DAC driver
diff --git a/notices/2013/0010.xml b/notices/2013/0010.xml
index 27515b0..056fc2b 100644
--- a/notices/2013/0010.xml
+++ b/notices/2013/0010.xml
@@ -6,7 +6,7 @@
   <description>
 <![CDATA[The code handling the virDomainMemoryStats API in the
 libvirtd daemon dispatch did not correctly initialize variables
-to NULL. This if RPC parameter validation failed it was possible
+to NULL. Thus if RPC parameter validation failed it was possible
 for libvirtd to access uninitialized memory during cleanup.]]>
   </description>
 
diff --git a/notices/2017/0001.xml b/notices/2017/0001.xml
index 0c74ca0..3255c24 100644
--- a/notices/2017/0001.xml
+++ b/notices/2017/0001.xml
@@ -5,8 +5,8 @@
 
   <description>
     <![CDATA[When calling the virConnectGetAllDomainStats API on a guest which has
-	     a CDROM drive with no media present, libvirtd will crash on a NULL pointer
-	     acess]]>
+          a CDROM drive with no media present, libvirtd will crash on a NULL pointer
+          access]]>
   </description>
 
   <impact>
-- 
2.20.1




More information about the libvir-list mailing list