diff options
author | Kåre Thor Olsen <kaare@nightcall.dk> | 2019-03-05 06:36:12 +0100 |
---|---|---|
committer | Kåre Thor Olsen <kaare@nightcall.dk> | 2019-03-05 06:36:12 +0100 |
commit | f2c06ef0a874aeb21cd9ebce2275905d6ef34ac0 (patch) | |
tree | 0cc4b79aad79a4981fe843dff8ba8ef28a3f45be | |
parent | c3aba639227f792b02b83bf19f9cc83f0b663235 (diff) |
HTML fixes, please check the generated files before committing them
-rw-r--r-- | english/lts/security/2019/dla-1696.wml | 7 | ||||
-rw-r--r-- | english/lts/security/2019/dla-1702.wml | 7 |
2 files changed, 8 insertions, 6 deletions
diff --git a/english/lts/security/2019/dla-1696.wml b/english/lts/security/2019/dla-1696.wml index 3b60b4a8212..75dc4db250a 100644 --- a/english/lts/security/2019/dla-1696.wml +++ b/english/lts/security/2019/dla-1696.wml @@ -14,7 +14,9 @@ and file system.</p> <li><a href="https://security-tracker.debian.org/tracker/CVE-2018-16846">CVE-2018-16846</a> <p>It was found that authenticated ceph RGW users can cause a denial of - service against OMAPs holding bucket indices.</p> + service against OMAPs holding bucket indices.</p></li> + +</ul> <p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version 0.80.7-2+deb8u3.</p> @@ -23,9 +25,8 @@ and file system.</p> <p>Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be -found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li> +found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p> -</ul> </define-tag> # do not modify the following line diff --git a/english/lts/security/2019/dla-1702.wml b/english/lts/security/2019/dla-1702.wml index 28ed5c41879..0b3fa262d84 100644 --- a/english/lts/security/2019/dla-1702.wml +++ b/english/lts/security/2019/dla-1702.wml @@ -16,7 +16,9 @@ of recompression utilities.</p> <p>The png_compress function in pngex.cc in advpng has an integer overflow upon encountering an invalid PNG size, which results in - another heap based buffer overflow.</p> + another heap based buffer overflow.</p></li> + +</ul> <p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version 1.19-1+deb8u1.</p> @@ -25,9 +27,8 @@ of recompression utilities.</p> <p>Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be -found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li> +found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p> -</ul> </define-tag> # do not modify the following line |