Date: Sun, 7 Jan 2024 22:19:53 GMT From: "Jason E. Hale" <jhale@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 7e5e34519552 - main - security/vuxml: Fix copypasta typo Message-ID: <202401072219.407MJrbk069274@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by jhale: URL: https://cgit.FreeBSD.org/ports/commit/?id=7e5e345195524b1a884dfad708bf5f1e6a2dced8 commit 7e5e345195524b1a884dfad708bf5f1e6a2dced8 Author: Jason E. Hale <jhale@FreeBSD.org> AuthorDate: 2024-01-07 22:19:22 +0000 Commit: Jason E. Hale <jhale@FreeBSD.org> CommitDate: 2024-01-07 22:19:22 +0000 security/vuxml: Fix copypasta typo --- security/vuxml/vuln/2024.xml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index b45d24cddd4d..d3bb17a9446a 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -15,7 +15,7 @@ <p>Andy Shaw reports:</p> <blockquote cite="https://www.qt.io/blog/security-advisory-potential-integer-overflow-in-qts-http2-implementation"> <p>A potential integer overflow has been discovered in Qt's HTTP2 - implementation. If the HTTP2 implementation receives more then 4GiB + implementation. If the HTTP2 implementation receives more than 4GiB in total headers, or more than 2GiB for any given header pair, then the internal buffers may overflow.</p> </blockquote>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202401072219.407MJrbk069274>