From norn@norn.ca.eu.org  Sat Jan 30 15:29:12 1999
Received: from norn.ca.eu.org (cr164328-a.abtsfd1.bc.wave.home.com [24.112.125.94])
          by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id PAA04688
          for <FreeBSD-gnats-submit@freebsd.org>; Sat, 30 Jan 1999 15:29:07 -0800 (PST)
          (envelope-from norn@norn.ca.eu.org)
Received: (from norn@localhost)
	by norn.ca.eu.org (8.9.2/8.9.2) id PAA18102;
	Sat, 30 Jan 1999 15:29:05 -0800 (PST)
	(envelope-from norn)
Message-Id: <199901302329.PAA18102@norn.ca.eu.org>
Date: Sat, 30 Jan 1999 15:29:05 -0800 (PST)
From: cpiazza@home.net
Reply-To: cpiazza@home.net
To: FreeBSD-gnats-submit@freebsd.org
Subject: Missing word from security(7) man page 
X-Send-Pr-Version: 3.2

>Number:         9822
>Category:       docs
>Synopsis:       security(7) man page is missing a word
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-doc
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          doc-bug
>Submitter-Id:   current-users
>Arrival-Date:   Sat Jan 30 15:30:01 PST 1999
>Closed-Date:    Mon Mar 1 21:55:46 CST 1999
>Last-Modified:  Mon Mar  1 21:55:58 CST 1999
>Originator:     Chris Piazza
>Release:        FreeBSD 4.0-CURRENT i386
>Organization:
n/a 
>Environment:

	FreeBSD

>Description:

	The security(7) man page reads (under the securiing root - root run
	servers and suid/sgid binaries):
	 If an intruder can break an sgid-kmem binary the intruder might be able
         to read /dev/kmem and thus read the crypted password file, potentially
         compromising any passworded account.  An intruder that breaks the tty
         group can write to almost user's tty.
	 
	Obviously this should be ``can write to almost any user's tty.''
	(or similar)

>How-To-Repeat:

	man 7 security

>Fix:
	
--- security.7.orig     Sat Jan 30 15:27:47 1999
+++ security.7  Sat Jan 30 15:28:02 1999
@@ -206,7 +206,7 @@
 can be almost as dangerous.  If an intruder can break an sgid-kmem binary the
 intruder might be able to read /dev/kmem and thus read the crypted password
 file, potentially compromising any passworded account.  An intruder that breaks
-the tty group can write to almost user's tty.  If a user is running a terminal
+the tty group can write to almost any user's tty.  If a user is running a terminal
 program or emulator with a talk-back feature, the intruder can potentially 
 generate a data stream that causes the user's terminal to echo a command, which
 is then run as that user.

-Chris
>Release-Note:
>Audit-Trail:
State-Changed-From-To: open->closed 
State-Changed-By: ghelmer 
State-Changed-When: Mon Mar 1 21:55:46 CST 1999 
State-Changed-Why:  
Fixed, thanks! 
>Unformatted:
