From 354ad05b66a66bfae0df03598f165b2dada97949 Mon Sep 17 00:00:00 2001 From: John Haugabook Date: Wed, 7 Aug 2024 14:50:03 -0400 Subject: [PATCH] CVE-2024-6197.md: spell check Closes #370 --- docs/CVE-2024-6197.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/CVE-2024-6197.md b/docs/CVE-2024-6197.md index 0b10a2f1f5..699fd934c5 100644 --- a/docs/CVE-2024-6197.md +++ b/docs/CVE-2024-6197.md @@ -18,7 +18,7 @@ available chunks. This leads to the overwriting of nearby stack memory. The content of the overwrite is decided by the `free()` implementation; likely to be memory pointers and a set of flags. -The most likely outcome of exploting this flaw is a crash, although it cannot +The most likely outcome of exploiting this flaw is a crash, although it cannot be ruled out that more serious results can be had in special circumstances. INFO