Date: Thu, 23 Jul 2020 14:43:55 +0000 (UTC) From: Jochen Neumeister <joneum@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r542935 - head/security/vuxml Message-ID: <202007231443.06NEhtnY018314@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: joneum Date: Thu Jul 23 14:43:55 2020 New Revision: 542935 URL: https://svnweb.freebsd.org/changeset/ports/542935 Log: Fix typo Sponsored by: Netzkommune GmbH Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Jul 23 14:42:25 2020 (r542934) +++ head/security/vuxml/vuln.xml Thu Jul 23 14:43:55 2020 (r542935) @@ -89,7 +89,7 @@ Notes: requests with invalid payload lengths could lead to a denial of service.</p> <p>A specially crafted sequence of HTTP/2 requests could trigger high CPU usage for several seconds. If a sufficient number of such requests were - +made on concurrent HTTP/2 connections, the server could become unresponsive.</p> + made on concurrent HTTP/2 connections, the server could become unresponsive.</p> </body> </description> <references>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202007231443.06NEhtnY018314>