diff options
author | Tobias Nießen <tniessen@tnie.de> | 2018-04-04 22:23:23 +0300 |
---|---|---|
committer | Tobias Nießen <tniessen@tnie.de> | 2018-04-13 18:50:22 +0300 |
commit | ba9dc748388618c64af42006bc92f2c1d1abde09 (patch) | |
tree | 7c593854c6d38e4f0cc84d176e38bc29df39326e /README.md | |
parent | 04148b1121e6a63359a623729e3b717389f24539 (diff) |
doc: fix typo in README
PR-URL: https://github.com/nodejs/node/pull/20011
Refs: https://github.com/nodejs/node/pull/14485
Reviewed-By: Ruben Bridgewater <ruben@bridgewater.de>
Reviewed-By: Vse Mozhet Byt <vsemozhetbyt@gmail.com>
Reviewed-By: James M Snell <jasnell@gmail.com>
Reviewed-By: Richard Lau <riclau@uk.ibm.com>
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/README.md b/README.md index 74b0bac0d12..57d1e02fc97 100644 --- a/README.md +++ b/README.md @@ -213,7 +213,7 @@ us a report nonetheless. - [#5507](https://github.com/nodejs/node/pull/5507): _Fix a defect that makes the CacheBleed Attack possible_. Many, though not all, OpenSSL vulnerabilities - in the TLS/SSL protocols also effect Node.js. + in the TLS/SSL protocols also affect Node.js. - [CVE-2016-2216](https://nodejs.org/en/blog/vulnerability/february-2016-security-releases/): _Fix defects in HTTP header parsing for requests and responses that can allow |