aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorCarsten Schoenert <c.schoenert@t-online.de>2019-04-13 10:35:26 +0200
committerCarsten Schoenert <c.schoenert@t-online.de>2019-04-13 10:51:42 +0200
commit907a0371eb05342911768c66ad56f028349d3301 (patch)
treeb8e44531a6321423bf227d583d6cd0ed8620fdd9
parent4ff185451f938a539b60146c7d7cb64568d1a08f (diff)
dsa-4430: fix non escaped ampersand symbol
The DSA entry for dsa-4430 was added by by 8f89f4f84d1b, bu a used ampersand symbol wasn't using the correct HTML Ampersand Character Code '&amp;'.
-rw-r--r--english/security/2019/dsa-4430.wml2
-rw-r--r--korean/security/2019/dsa-4430.wml2
-rw-r--r--swedish/security/2019/dsa-4430.wml2
3 files changed, 3 insertions, 3 deletions
diff --git a/english/security/2019/dsa-4430.wml b/english/security/2019/dsa-4430.wml
index ba189ba5804..c3153d3d9b2 100644
--- a/english/security/2019/dsa-4430.wml
+++ b/english/security/2019/dsa-4430.wml
@@ -1,6 +1,6 @@
<define-tag description>security update</define-tag>
<define-tag moreinfo>
-<p>Mathy Vanhoef (NYUAD) and Eyal Ronen (Tel Aviv University & KU Leuven) found
+<p>Mathy Vanhoef (NYUAD) and Eyal Ronen (Tel Aviv University &amp; KU Leuven) found
multiple vulnerabilities in the WPA implementation found in wpa_supplication
(station) and hostapd (access point). These vulnerability are also collectively
known as <q>Dragonblood</q>.</p>
diff --git a/korean/security/2019/dsa-4430.wml b/korean/security/2019/dsa-4430.wml
index d0cc229f26b..db631e5dfd6 100644
--- a/korean/security/2019/dsa-4430.wml
+++ b/korean/security/2019/dsa-4430.wml
@@ -1,7 +1,7 @@
#use wml::debian::translation-check translation="8f89f4f84d1b72c6872f117662668a6e94dbb51a" maintainer="Sebul"
<define-tag description>보안 업데이트</define-tag>
<define-tag moreinfo>
-<p>Mathy Vanhoef (NYUAD) and Eyal Ronen (Tel Aviv University & KU Leuven) found
+<p>Mathy Vanhoef (NYUAD) and Eyal Ronen (Tel Aviv University &amp; KU Leuven) found
multiple vulnerabilities in the WPA implementation found in wpa_supplication
(station) and hostapd (access point). These vulnerability are also collectively
known as <q>Dragonblood</q>.</p>
diff --git a/swedish/security/2019/dsa-4430.wml b/swedish/security/2019/dsa-4430.wml
index 4e4e4d20001..4e4edd29dd8 100644
--- a/swedish/security/2019/dsa-4430.wml
+++ b/swedish/security/2019/dsa-4430.wml
@@ -1,7 +1,7 @@
#use wml::debian::translation-check translation="8f89f4f84d1b72c6872f117662668a6e94dbb51a" mindelta="1"
<define-tag description>säkerhetsuppdatering</define-tag>
<define-tag moreinfo>
-<p>Mathy Vanhoef (NYUAD) och Eyal Ronen (Tel Avivs Universitet & KU Leuven)
+<p>Mathy Vanhoef (NYUAD) och Eyal Ronen (Tel Avivs Universitet &amp; KU Leuven)
upptäckte flera sårbarheter i WPA-implementation som finns wpa_supplication
(station) och hostapd (accesspunkt). Dessa såbarheter är även kollektivt kända
som <q>Dragonblood</q>.</p>

© 2014-2024 Faster IT GmbH | imprint | privacy policy