diff --git a/docs/source/security/2016/20160128_openssl.rst b/docs/source/security/2016/20160128_openssl.rst index a4b5f567a..ed1f2f536 100644 --- a/docs/source/security/2016/20160128_openssl.rst +++ b/docs/source/security/2016/20160128_openssl.rst @@ -8,14 +8,14 @@ Advisory CVEs * CVE-2016-0701 - **DH small subgroups** (Severity:High) - This issue affects OpenSSL version 1.0.2. + This issue affects OpenSSL version 1.0.2. OpenSSL 1.0.2 users should upgrade to 1.0.2f * CVE-2015-3197 - **SSLv2 doesn't block disabled ciphers** (Severity:Low) - This issue affects OpenSSL versions 1.0.2 and 1.0.1. + This issue affects OpenSSL versions 1.0.2 and 1.0.1. - OpenSSL 1.0.2 users should upgrade to 1.0.2f + OpenSSL 1.0.2 users should upgrade to 1.0.2f OpenSSL 1.0.1 users should upgrade to 1.0.1r @@ -24,5 +24,5 @@ Action xCAT uses OpenSSL for client-server communication but **does not** ship it. -It is recommended to keep your OpenSSL levels up-to-date with the indicated versions in the security bulletins to prevent any potential security threats. +It is recommended to keep your OpenSSL levels up-to-date with the indicated versions in the security bulletins to prevent any potential security threats.