Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 7 Jan 2024 22:19:53 GMT
From:      "Jason E. Hale" <jhale@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 7e5e34519552 - main - security/vuxml: Fix copypasta typo
Message-ID:  <202401072219.407MJrbk069274@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by jhale:

URL: https://cgit.FreeBSD.org/ports/commit/?id=7e5e345195524b1a884dfad708bf5f1e6a2dced8

commit 7e5e345195524b1a884dfad708bf5f1e6a2dced8
Author:     Jason E. Hale <jhale@FreeBSD.org>
AuthorDate: 2024-01-07 22:19:22 +0000
Commit:     Jason E. Hale <jhale@FreeBSD.org>
CommitDate: 2024-01-07 22:19:22 +0000

    security/vuxml: Fix copypasta typo
---
 security/vuxml/vuln/2024.xml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml
index b45d24cddd4d..d3bb17a9446a 100644
--- a/security/vuxml/vuln/2024.xml
+++ b/security/vuxml/vuln/2024.xml
@@ -15,7 +15,7 @@
 	<p>Andy Shaw reports:</p>
 	<blockquote cite="https://www.qt.io/blog/security-advisory-potential-integer-overflow-in-qts-http2-implementation">;
 	  <p>A potential integer overflow has been discovered in Qt's HTTP2
-	  implementation. If the HTTP2 implementation receives more then 4GiB
+	  implementation. If the HTTP2 implementation receives more than 4GiB
 	  in total headers, or more than 2GiB for any given header pair, then
 	  the internal buffers may overflow.</p>
 	</blockquote>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202401072219.407MJrbk069274>