diff options
author | jptha-guest <guillonneau.jeanpaul@free.fr> | 2019-03-05 07:16:52 +0100 |
---|---|---|
committer | jptha-guest <guillonneau.jeanpaul@free.fr> | 2019-03-05 07:16:52 +0100 |
commit | 8661d6b95c7031d4bc9f375119eaf6852a01234b (patch) | |
tree | 24a78d57e20009d064eeea69b5511ed8e2d132f8 | |
parent | cfc2b3846934c403da78e7d464a023f5d83a9e40 (diff) | |
parent | f2c06ef0a874aeb21cd9ebce2275905d6ef34ac0 (diff) |
Merge branch 'master' of salsa.debian.org:webmaster-team/webwml
-rw-r--r-- | english/lts/security/2019/dla-1696.wml | 7 | ||||
-rw-r--r-- | english/lts/security/2019/dla-1702.wml | 7 |
2 files changed, 8 insertions, 6 deletions
diff --git a/english/lts/security/2019/dla-1696.wml b/english/lts/security/2019/dla-1696.wml index 3b60b4a8212..75dc4db250a 100644 --- a/english/lts/security/2019/dla-1696.wml +++ b/english/lts/security/2019/dla-1696.wml @@ -14,7 +14,9 @@ and file system.</p> <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16846">CVE-2018-16846</a> <p>It was found that authenticated ceph RGW users can cause a denial of - service against OMAPs holding bucket indices.</p> + service against OMAPs holding bucket indices.</p></li> + +</ul> <p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version 0.80.7-2+deb8u3.</p> @@ -23,9 +25,8 @@ and file system.</p> <p>Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be -found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li> +found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p> -</ul> </define-tag> # do not modify the following line diff --git a/english/lts/security/2019/dla-1702.wml b/english/lts/security/2019/dla-1702.wml index 28ed5c41879..0b3fa262d84 100644 --- a/english/lts/security/2019/dla-1702.wml +++ b/english/lts/security/2019/dla-1702.wml @@ -16,7 +16,9 @@ of recompression utilities.</p> <p>The png_compress function in pngex.cc in advpng has an integer overflow upon encountering an invalid PNG size, which results in - another heap based buffer overflow.</p> + another heap based buffer overflow.</p></li> + +</ul> <p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version 1.19-1+deb8u1.</p> @@ -25,9 +27,8 @@ of recompression utilities.</p> <p>Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be -found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li> +found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p> -</ul> </define-tag> # do not modify the following line |