Commit c4a1c2bd authored by Kåre Thor Olsen's avatar Kåre Thor Olsen

HTML fixes, please check the generated files before committing them

parent 7e0cb2c6
<define-tag description>LTS security update</define-tag>
<define-tag moreinfo>
<p></pre><tt>Joergen Ibsen reported an issue with uriparser, a URI parsing library
</tt><tt>compliant with RFC 3986.
</tt><pre style="margin: 0em;"></p>
<p></pre><tt>An Out-of-bounds read for incomplete URIs with IPv6 addresses with
</tt><tt>embedded IPv4 address, e.g. &quot;//[::44.1&quot;, were possible.
</tt><pre style="margin: 0em;"></p>
<p>Joergen Ibsen reported an issue with uriparser, a URI parsing library
compliant with RFC 3986.</p>
<p>An Out-of-bounds read for incomplete URIs with IPv6 addresses with
embedded IPv4 address, e.g. &quot;//[::44.1&quot;, were possible.</p>
<p>For Debian 8 &quot;Jessie&quot;, this problem has been fixed in version
0.8.0.1-2+deb8u2.</p>
......
<define-tag description>LTS security update</define-tag>
<define-tag moreinfo>
<p></pre><tt>Several issues in elfutils, a collection of utilities to handle ELF
</tt><tt>objects, have been found either by fuzzing or by using an
</tt><tt>AddressSanitizer.
</tt><pre style="margin: 0em;"></p>
<p>Several issues in elfutils, a collection of utilities to handle ELF
objects, have been found either by fuzzing or by using an
AddressSanitizer.</p>
<ul>
......@@ -64,8 +63,9 @@
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-7608">CVE-2017-7608</a>
<p>By fuzzing a heap based buffer overflow has been detected.</p>
<p>By fuzzing a heap based buffer overflow has been detected.</p></li>
</ul>
<p>For Debian 8 &quot;Jessie&quot;, these problems have been fixed in version
0.159-4.2+deb8u1.</p>
......@@ -74,9 +74,8 @@
<p>Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
</ul>
</define-tag>
# do not modify the following line
......
<define-tag description>LTS security update</define-tag>
<define-tag moreinfo>
<p></pre><tt>Several issues have been found in exiv2, a EXIF/IPTC/XMP metadata
</tt><tt>manipulation tool.
</tt><pre style="margin: 0em;"></p>
<p>Several issues have been found in exiv2, a EXIF/IPTC/XMP metadata
manipulation tool.</p>
<ul>
......@@ -29,8 +28,9 @@
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-20097">CVE-2018-20097</a>
<p>A crafted image could result in a denial of service.</p>
<p>A crafted image could result in a denial of service.</p></li>
</ul>
<p>For Debian 8 &quot;Jessie&quot;, these problems have been fixed in version
0.24-4.1+deb8u3.</p>
......@@ -39,9 +39,8 @@
<p>Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
</ul>
</define-tag>
# do not modify the following line
......
......@@ -13,8 +13,9 @@
<p>Avoid assertion and thus causing named to deliberately exit when a
trust anchor's key is replaced with a key which uses an unsupported
algorithm.</p>
algorithm.</p></li>
</ul>
<p>For Debian 8 &quot;Jessie&quot;, these problems have been fixed in version
1:9.9.5.dfsg-9+deb8u17.</p>
......@@ -23,9 +24,8 @@
<p>Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
found at: <a rel="nofollow" href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
</ul>
</define-tag>
# do not modify the following line
......
......@@ -13,7 +13,9 @@ Security Service library.</p>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2018-18508">CVE-2018-18508</a>
<p>NULL pointer dereference in several CMS functions resulting in a
denial of service</p>
denial of service</p></li>
</ul>
<p>For Debian 8 <q>Jessie</q>, these problems have been fixed in version
2:3.26-1+debu8u4.</p>
......@@ -22,9 +24,8 @@ Security Service library.</p>
<p>Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p></li>
found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
</ul>
</define-tag>
# do not modify the following line
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment