git: ca283e012d - main - Correct CVE typo for SA-24:17.bhyve.

From: Gordon Tetlow <gordon_at_FreeBSD.org>
Date: Wed, 13 Nov 2024 04:10:56 UTC
The branch main has been updated by gordon:

URL: https://cgit.FreeBSD.org/doc/commit/?id=ca283e012d5568d6cdb214eafae753562937653a

commit ca283e012d5568d6cdb214eafae753562937653a
Author:     Gordon Tetlow <gordon@FreeBSD.org>
AuthorDate: 2024-11-13 04:10:07 +0000
Commit:     Gordon Tetlow <gordon@FreeBSD.org>
CommitDate: 2024-11-13 04:10:07 +0000

    Correct CVE typo for SA-24:17.bhyve.
    
    Approved by:    so
---
 .../security/advisories/FreeBSD-SA-24:17.bhyve.asc | 30 +++++++++++-----------
 1 file changed, 15 insertions(+), 15 deletions(-)

diff --git a/website/static/security/advisories/FreeBSD-SA-24:17.bhyve.asc b/website/static/security/advisories/FreeBSD-SA-24:17.bhyve.asc
index 1906b0cc8a..a81105daea 100644
--- a/website/static/security/advisories/FreeBSD-SA-24:17.bhyve.asc
+++ b/website/static/security/advisories/FreeBSD-SA-24:17.bhyve.asc
@@ -19,7 +19,7 @@ Corrected:      2024-10-19 15:42:15 UTC (stable/14, 14.1-STABLE)
                 2024-10-29 18:49:55 UTC (releng/13.4, 13.4-RELEASE-p2)
                 2024-10-29 18:53:41 UTC (releng/13.3, 13.3-RELEASE-p8)
 CVE Name:       CVE-2024-51562, CVE-2024-51563, CVE-2024-51564,
-                CVE-2024-51565, CVE-2024-51565
+                CVE-2024-51565, CVE-2024-51566
 
 For general information regarding FreeBSD Security Advisories,
 including descriptions of the fields above, security branches, and the
@@ -47,7 +47,7 @@ The hda driver is vulnerable to a buffer over-read from a guest-controlled
 value.  (CVE-2024-51565)
 
 The NVMe driver queue processing is vulernable to guest-induced infinite
-loops.  (CVE-2024-51565)
+loops.  (CVE-2024-51566)
 
 III. Impact
 
@@ -139,17 +139,17 @@ The latest revision of this advisory is available at
 <URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-24:17.bhyve.asc>
 -----BEGIN PGP SIGNATURE-----
 
-iQIzBAEBCgAdFiEEthUnfoEIffdcgYM7bljekB8AGu8FAmchUCUACgkQbljekB8A
-Gu/RJhAA5oWfn9F1Tdmwwl5CFbvIjSmHcWdDsTbQ66DrL8HcinrNoBSdhr2xuAQK
-mxsWuUI1V4Wb9Yp0EXjpNB2ZIpjDbEionVK7BEZJ2D09TCi1CFS84CiTdqBlkJ/A
-2K+eQD6BAG+wKu0yRlqu2wA8RgUWob8ORZ9PFyT4XH23OT4F60WUhPJ+917cqCru
-Ye7hKcSy/xaL0J95ZOG+qeuTf9RbBeQ4f+Sq2ERbtPXVRcBs3x2PEjg1ptuKNmst
-Hbvg+fIsfGWf99r50EhBP2yPJ/jNZBhYJ5gX+zdJsyuXRnJwnv2P6WNxFKoh2I2n
-RI4L3rJ7hJVPURhXZ3fkmiQ8qW/VxrR+2H4YxjuD2U7KQg22ZxCCFNFfN7gYI63U
-8/shw6Ez5OQqVyXl/+uD0/P6pnscKsQz9zNix7kI+G9meBZLnyA1/eGB0iFQVjYg
-NxepUWheMsraLX1ytURtI2lY8pr26Fd4xtY0mKpV13ohL59nQZ79fIeot50m8WMP
-++zqqErJa/9mk6MSZ/xXHWUbPLmQmuNyHere4kqvd4dTLLMOe17WB7NrPJch2S23
-BCcnfZNGwP9iPY27CHRStAYI2OIj2iL7oe2Z7jnh+afpcX3r5isxqZf3R6pw7C2a
-fDPHVTfKJ951yBloejhXJcPXdwgYMZ+8nd2MVafrIYD7dTZfCrU=
-=BYuX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+=9r+d
 -----END PGP SIGNATURE-----