From 39d91a74cde0daa11bbdda7e7f191f3d3346b09f Mon Sep 17 00:00:00 2001 From: GONG Jie Date: Sun, 31 Dec 2017 23:59:59 +0000 Subject: [PATCH] Remove trailing spaces in file docs/source/security/2017/20170216_openssl.rst --- docs/source/security/2017/20170216_openssl.rst | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/source/security/2017/20170216_openssl.rst b/docs/source/security/2017/20170216_openssl.rst index 9f430f713..9af3743d5 100644 --- a/docs/source/security/2017/20170216_openssl.rst +++ b/docs/source/security/2017/20170216_openssl.rst @@ -1,13 +1,13 @@ 2017-02-16 - OpenSSL Vulnerabilities ==================================== -*Feb 16, 2017*, OpenSSL announced the following security advisories: https://www.openssl.org/news/secadv/20170216.txt +*Feb 16, 2017*, OpenSSL announced the following security advisories: https://www.openssl.org/news/secadv/20170216.txt Advisory CVEs ------------- -* CVE-2017-3733 - **Encrypt-Then-Mac renegotiation crash** (Severity:High) +* CVE-2017-3733 - **Encrypt-Then-Mac renegotiation crash** (Severity:High) OpenSSL 1.1.0 users should upgrade to 1.1.0e @@ -18,8 +18,8 @@ Please see the security bulletin above for patch, upgrade, or suggested work aro Action ------ -xCAT uses OpenSSL for client-server communication but **does not** ship it. +xCAT uses OpenSSL for client-server communication but **does not** ship it. -It is highly recommended to keep your OpenSSL levels up-to-date with the indicated versions in the security bulletins to prevent any potential security threats. Obtain the updated software packages from your Operating system distribution channels. +It is highly recommended to keep your OpenSSL levels up-to-date with the indicated versions in the security bulletins to prevent any potential security threats. Obtain the updated software packages from your Operating system distribution channels.