diff --git a/docs/source/security/2016/20160503_openssl.rst b/docs/source/security/2016/20160503_openssl.rst index 33b94836b..5b58f1060 100644 --- a/docs/source/security/2016/20160503_openssl.rst +++ b/docs/source/security/2016/20160503_openssl.rst @@ -9,7 +9,7 @@ Advisory CVEs * CVE-2016-2108 - **Memory corruption in the ASN.1 encoder** (Severity:High) This issue affects all OpenSSL version prior to April 2015 - + OpenSSL 1.0.2 users should upgrade to 1.0.2c OpenSSL 1.0.1 users should upgrade to 1.0.1o @@ -21,12 +21,12 @@ Advisory CVEs OpenSSL 1.0.1 users should upgrade to 1.0.1t * CVE-2016-2105 - **EVP_EncodeUpdate overflow** (Severity:Low) - + OpenSSL 1.0.2 users should upgrade to 1.0.2h OpenSSL 1.0.1 users should upgrade to 1.0.1t * CVE-2016-2106 - **EVP_EncryptUpdate overflow** (Severity:Low) - + OpenSSL 1.0.2 users should upgrade to 1.0.2h OpenSSL 1.0.1 users should upgrade to 1.0.1t @@ -38,7 +38,7 @@ Advisory CVEs * CVE-2016-2176 - **EBCDIC overread** (Severity:Low) - + OpenSSL 1.0.2 users should upgrade to 1.0.2h OpenSSL 1.0.1 users should upgrade to 1.0.1t @@ -46,7 +46,7 @@ Advisory CVEs Action ------ -xCAT uses OpenSSL for client-server communication but **does not** ship it. +xCAT uses OpenSSL for client-server communication but **does not** ship it. -It is recommended to keep your OpenSSL levels up-to-date with the indicated versions in the security bulletins to prevent any potential security threats. +It is recommended to keep your OpenSSL levels up-to-date with the indicated versions in the security bulletins to prevent any potential security threats.