You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@couchdb.apache.org by wo...@apache.org on 2020/05/19 16:26:34 UTC

[couchdb-documentation] 03/05: Update src/cve/2020-1955.rst

This is an automated email from the ASF dual-hosted git repository.

wohali pushed a commit to branch 3.0.x-cve
in repository https://gitbox.apache.org/repos/asf/couchdb-documentation.git

commit 0674346f8d70ac73fe0634457693c994c57bd2e2
Author: Jan Lehnardt <ja...@apache.org>
AuthorDate: Tue May 19 15:58:28 2020 +0200

    Update src/cve/2020-1955.rst
    
    Co-authored-by: Jonathan Hall <fl...@flimzy.com>
---
 src/cve/2020-1955.rst | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/src/cve/2020-1955.rst b/src/cve/2020-1955.rst
index 7f55ef7..085adf2 100644
--- a/src/cve/2020-1955.rst
+++ b/src/cve/2020-1955.rst
@@ -47,7 +47,7 @@ CouchDB versions :ref:`3.0.1 <release/3.0.1>` and :ref:`3.1.0
 Mitigation
 ==========
 
-Users that have not enabled `require_valid_user_except_for_up` are not
+Users who have not enabled `require_valid_user_except_for_up` are not
 affected.
 
 Users that have it enabled can either disable it again, or upgrade to