From 1fc63c100e7d4d1452906f57b645c29b7c22ca1e Mon Sep 17 00:00:00 2001 From: Daniel Lathrop Date: Mon, 28 Dec 2020 19:04:02 -0600 Subject: [PATCH] Spelling fix in 0.79.1 release notes was to were --- content/en/news/0.79.1-relnotes/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/en/news/0.79.1-relnotes/index.md b/content/en/news/0.79.1-relnotes/index.md index aa7b51c13..2a3f32765 100644 --- a/content/en/news/0.79.1-relnotes/index.md +++ b/content/en/news/0.79.1-relnotes/index.md @@ -11,7 +11,7 @@ images: Hugo depends on Go's `os/exec` for certain features, e.g. for rendering of Pandoc documents if these binaries are found in the system `%PATH%` on Windows. However, if a malicious file with the same name (`exe` or `bat`) was found in the current working directory at the time of running `hugo`, the malicious command would be invoked instead of the system one. -Windows users who ran `hugo` inside untrusted Hugo sites was affected. +Windows users who ran `hugo` inside untrusted Hugo sites were affected. The origin of this issue comes from Go, see https://github.com/golang/go/issues/38736