Signed-off-by: Ján Tomko <jtomko(a)redhat.com>
---
notices/2008/0001.xml | 4 ++--
notices/2010/0004.xml | 2 +-
notices/2011/0001.xml | 2 +-
notices/2011/0003.xml | 2 +-
notices/2013/0001.xml | 2 +-
notices/2013/0007.xml | 2 +-
notices/2013/0008.xml | 2 +-
notices/2013/0010.xml | 2 +-
notices/2017/0001.xml | 4 ++--
9 files changed, 11 insertions(+), 11 deletions(-)
diff --git a/notices/2008/0001.xml b/notices/2008/0001.xml
index 7d2bfcf..d4f9355 100644
--- a/notices/2008/0001.xml
+++ b/notices/2008/0001.xml
@@ -6,8 +6,8 @@
<description>
<![CDATA[The APIs virDomainMigrate, virDomainBlockPeek, virDomainMemoryPeek,
virDomainSetAutostart, virNetworkSetAutostart, virConnectFindStoragePoolSources
-and virStoragePoolSetAutostart did not check the read-only flag of the
-connection. This allow unprivileged users to invoke APIs that they should
+and virStoragePoolSetAutostart did not check the read-only flag of the
+connection. This allowed unprivileged users to invoke APIs that they should
not have access to.]]>
</description>
diff --git a/notices/2010/0004.xml b/notices/2010/0004.xml
index 080114d..1f8202a 100644
--- a/notices/2010/0004.xml
+++ b/notices/2010/0004.xml
@@ -18,7 +18,7 @@ virtualization host, by checking if the source port is less than
virtual network to gain access to network services only intended
to be used by the host. For example, an NFS filesystem exported to
the virtualization host relying on IP based security with the "secure"
-option will be inadvertantly accessible to guests.]]>
+option will be inadvertently accessible to guests.]]>
</impact>
<workaround>
diff --git a/notices/2011/0001.xml b/notices/2011/0001.xml
index a24dd0f..a5b275e 100644
--- a/notices/2011/0001.xml
+++ b/notices/2011/0001.xml
@@ -7,7 +7,7 @@
<![CDATA[The APIs virConnectDomainXMLToNative,
virNodeDeviceDettach, virNodeDeviceReAttach, virNodeDeviceReset,
virDomainRevertToSnapshot, virDomainSnapshotDelete did not check
-the read-only flag of the connection. This allow unprivileged
+the read-only flag of the connection. This allowed unprivileged
users to invoke APIs that they should not have access to.]]>
</description>
diff --git a/notices/2011/0003.xml b/notices/2011/0003.xml
index e772ff8..4aa655f 100644
--- a/notices/2011/0003.xml
+++ b/notices/2011/0003.xml
@@ -13,7 +13,7 @@ access to inappropriate host files.]]>
<impact>
<![CDATA[A malicious guest disk image could trick the security
-drivre into providing access to inappropriate host files]]>
+driver into providing access to inappropriate host files]]>
</impact>
<workaround>
diff --git a/notices/2013/0001.xml b/notices/2013/0001.xml
index 97d8949..9425a64 100644
--- a/notices/2013/0001.xml
+++ b/notices/2013/0001.xml
@@ -6,7 +6,7 @@
<description>
<![CDATA[When reading and dispatching of a message failed the
message was freed but was not removed from the message queue.
-When the conneciton was later clsed this would result in an
+When the connection was later closed this would result in an
attempt to free uninitialized memory]]>
</description>
diff --git a/notices/2013/0007.xml b/notices/2013/0007.xml
index 55ba600..2c8f409 100644
--- a/notices/2013/0007.xml
+++ b/notices/2013/0007.xml
@@ -5,7 +5,7 @@
<description>
<![CDATA[The legacy Xen driver code for listing inactive domains
-would stasrt populating an array at index -1. This causes memory
+would start populating an array at index -1. This causes memory
corruption leading to a crash of libvirtd]]>
</description>
diff --git a/notices/2013/0008.xml b/notices/2013/0008.xml
index d690fe7..eb79599 100644
--- a/notices/2013/0008.xml
+++ b/notices/2013/0008.xml
@@ -1,7 +1,7 @@
<security-notice
xmlns="http://security.libvirt.org/xmlns/security-notice/1.0">
<id>2013-0008</id>
- <summary>Libvirt security driver does nto clear supplementary
groups</summary>
+ <summary>Libvirt security driver does not clear supplementary
groups</summary>
<description>
<![CDATA[When parsing the process security label for the DAC driver
diff --git a/notices/2013/0010.xml b/notices/2013/0010.xml
index 27515b0..056fc2b 100644
--- a/notices/2013/0010.xml
+++ b/notices/2013/0010.xml
@@ -6,7 +6,7 @@
<description>
<![CDATA[The code handling the virDomainMemoryStats API in the
libvirtd daemon dispatch did not correctly initialize variables
-to NULL. This if RPC parameter validation failed it was possible
+to NULL. Thus if RPC parameter validation failed it was possible
for libvirtd to access uninitialized memory during cleanup.]]>
</description>
diff --git a/notices/2017/0001.xml b/notices/2017/0001.xml
index 0c74ca0..3255c24 100644
--- a/notices/2017/0001.xml
+++ b/notices/2017/0001.xml
@@ -5,8 +5,8 @@
<description>
<![CDATA[When calling the virConnectGetAllDomainStats API on a guest which has
- a CDROM drive with no media present, libvirtd will crash on a NULL pointer
- acess]]>
+ a CDROM drive with no media present, libvirtd will crash on a NULL pointer
+ access]]>
</description>
<impact>
--
2.20.1