aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorjptha-guest <guillonneau.jeanpaul@free.fr>2019-03-05 07:16:52 +0100
committerjptha-guest <guillonneau.jeanpaul@free.fr>2019-03-05 07:16:52 +0100
commit8661d6b95c7031d4bc9f375119eaf6852a01234b (patch)
tree24a78d57e20009d064eeea69b5511ed8e2d132f8
parentcfc2b3846934c403da78e7d464a023f5d83a9e40 (diff)
parentf2c06ef0a874aeb21cd9ebce2275905d6ef34ac0 (diff)
Merge branch 'master' of salsa.debian.org:webmaster-team/webwml
-rw-r--r--english/lts/security/2019/dla-1696.wml7
-rw-r--r--english/lts/security/2019/dla-1702.wml7
2 files changed, 8 insertions, 6 deletions
diff --git a/english/lts/security/2019/dla-1696.wml b/english/lts/security/2019/dla-1696.wml
index 3b60b4a8212..75dc4db250a 100644
--- a/english/lts/security/2019/dla-1696.wml
+++ b/english/lts/security/2019/dla-1696.wml
@@ -14,7 +14,9 @@ and file system.</p>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16846">CVE-2018-16846</a>
<p>It was found that authenticated ceph RGW users can cause a denial of
- service against OMAPs holding bucket indices.</p>
+ service against OMAPs holding bucket indices.</p></li>
+
+</ul>
<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
0.80.7-2+deb8u3.</p>
@@ -23,9 +25,8 @@ and file system.</p>
<p>Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
+found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</ul>
</define-tag>
# do not modify the following line
diff --git a/english/lts/security/2019/dla-1702.wml b/english/lts/security/2019/dla-1702.wml
index 28ed5c41879..0b3fa262d84 100644
--- a/english/lts/security/2019/dla-1702.wml
+++ b/english/lts/security/2019/dla-1702.wml
@@ -16,7 +16,9 @@ of recompression utilities.</p>
<p>The png_compress function in pngex.cc in advpng has an integer
overflow upon encountering an invalid PNG size, which results in
- another heap based buffer overflow.</p>
+ another heap based buffer overflow.</p></li>
+
+</ul>
<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
1.19-1+deb8u1.</p>
@@ -25,9 +27,8 @@ of recompression utilities.</p>
<p>Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
-found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
+found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
-</ul>
</define-tag>
# do not modify the following line

© 2014-2024 Faster IT GmbH | imprint | privacy policy