Commit 96635cc8 authored by Kenton Varda's avatar Kenton Varda

Merge pull request #242 from jwilk/spelling

Fix typos.
parents c09583d8 f29bb0da
...@@ -91,7 +91,7 @@ following preventative measures going forward: ...@@ -91,7 +91,7 @@ following preventative measures going forward:
4. We will continue to require that all tests (including the new fuzz test) run 4. We will continue to require that all tests (including the new fuzz test) run
cleanly under Valgrind before each release. cleanly under Valgrind before each release.
5. We will commission a professional security review before any 1.0 release. 5. We will commission a professional security review before any 1.0 release.
Until that time, we continue to recommend agaisnt using Cap'n Proto to Until that time, we continue to recommend against using Cap'n Proto to
interpret data from potentially-malicious sources. interpret data from potentially-malicious sources.
I am pleased that measures 1, 2, and 3 all detected this bug, suggesting that I am pleased that measures 1, 2, and 3 all detected this bug, suggesting that
......
...@@ -21,7 +21,7 @@ CVE-2015-2312 ...@@ -21,7 +21,7 @@ CVE-2015-2312
Impact Impact
====== ======
- Remotely cause a peer to use excessive CPU time and other resoucres to - Remotely cause a peer to use excessive CPU time and other resources to
process a very small message, possibly enabling a DoS attack. process a very small message, possibly enabling a DoS attack.
Fixed in Fixed in
...@@ -69,6 +69,6 @@ Preventative measures ...@@ -69,6 +69,6 @@ Preventative measures
===================== =====================
This problem was discovered through fuzz testing using American Fuzzy Lop, This problem was discovered through fuzz testing using American Fuzzy Lop,
wich identified the problem as a "hang", although in fact the test case just which identified the problem as a "hang", although in fact the test case just
took a very long time to complete. We are incorporating testing with AFL into took a very long time to complete. We are incorporating testing with AFL into
our release process going forward. our release process going forward.
...@@ -43,7 +43,7 @@ Details ...@@ -43,7 +43,7 @@ Details
======= =======
Advisory [2015-03-02-2][1] described a bug allowing a remote attacker to Advisory [2015-03-02-2][1] described a bug allowing a remote attacker to
consume excessive CPU time or other resources usin a specially-crafted message. consume excessive CPU time or other resources using a specially-crafted message.
The present advisory is simply another case of the same bug which was initially The present advisory is simply another case of the same bug which was initially
missed. missed.
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment