diff options
author | Carsten Schoenert <c.schoenert@t-online.de> | 2019-04-13 10:35:26 +0200 |
---|---|---|
committer | Carsten Schoenert <c.schoenert@t-online.de> | 2019-04-13 10:51:42 +0200 |
commit | 907a0371eb05342911768c66ad56f028349d3301 (patch) | |
tree | b8e44531a6321423bf227d583d6cd0ed8620fdd9 | |
parent | 4ff185451f938a539b60146c7d7cb64568d1a08f (diff) |
dsa-4430: fix non escaped ampersand symbol
The DSA entry for dsa-4430 was added by by 8f89f4f84d1b, bu a used
ampersand symbol wasn't using the correct HTML Ampersand Character Code
'&'.
-rw-r--r-- | english/security/2019/dsa-4430.wml | 2 | ||||
-rw-r--r-- | korean/security/2019/dsa-4430.wml | 2 | ||||
-rw-r--r-- | swedish/security/2019/dsa-4430.wml | 2 |
3 files changed, 3 insertions, 3 deletions
diff --git a/english/security/2019/dsa-4430.wml b/english/security/2019/dsa-4430.wml index ba189ba5804..c3153d3d9b2 100644 --- a/english/security/2019/dsa-4430.wml +++ b/english/security/2019/dsa-4430.wml @@ -1,6 +1,6 @@ <define-tag description>security update</define-tag> <define-tag moreinfo> -<p>Mathy Vanhoef (NYUAD) and Eyal Ronen (Tel Aviv University & KU Leuven) found +<p>Mathy Vanhoef (NYUAD) and Eyal Ronen (Tel Aviv University & KU Leuven) found multiple vulnerabilities in the WPA implementation found in wpa_supplication (station) and hostapd (access point). These vulnerability are also collectively known as <q>Dragonblood</q>.</p> diff --git a/korean/security/2019/dsa-4430.wml b/korean/security/2019/dsa-4430.wml index d0cc229f26b..db631e5dfd6 100644 --- a/korean/security/2019/dsa-4430.wml +++ b/korean/security/2019/dsa-4430.wml @@ -1,7 +1,7 @@ #use wml::debian::translation-check translation="8f89f4f84d1b72c6872f117662668a6e94dbb51a" maintainer="Sebul" <define-tag description>보안 업데이트</define-tag> <define-tag moreinfo> -<p>Mathy Vanhoef (NYUAD) and Eyal Ronen (Tel Aviv University & KU Leuven) found +<p>Mathy Vanhoef (NYUAD) and Eyal Ronen (Tel Aviv University & KU Leuven) found multiple vulnerabilities in the WPA implementation found in wpa_supplication (station) and hostapd (access point). These vulnerability are also collectively known as <q>Dragonblood</q>.</p> diff --git a/swedish/security/2019/dsa-4430.wml b/swedish/security/2019/dsa-4430.wml index 4e4e4d20001..4e4edd29dd8 100644 --- a/swedish/security/2019/dsa-4430.wml +++ b/swedish/security/2019/dsa-4430.wml @@ -1,7 +1,7 @@ #use wml::debian::translation-check translation="8f89f4f84d1b72c6872f117662668a6e94dbb51a" mindelta="1" <define-tag description>säkerhetsuppdatering</define-tag> <define-tag moreinfo> -<p>Mathy Vanhoef (NYUAD) och Eyal Ronen (Tel Avivs Universitet & KU Leuven) +<p>Mathy Vanhoef (NYUAD) och Eyal Ronen (Tel Avivs Universitet & KU Leuven) upptäckte flera sårbarheter i WPA-implementation som finns wpa_supplication (station) och hostapd (accesspunkt). Dessa såbarheter är även kollektivt kända som <q>Dragonblood</q>.</p> |