mirror of
https://github.com/xcat2/xcat-core.git
synced 2025-08-02 01:27:36 +00:00
Remove trailing spaces in file docs/source/security/2016/20160503_openssl.rst
This commit is contained in:
@@ -9,7 +9,7 @@ Advisory CVEs
|
||||
* CVE-2016-2108 - **Memory corruption in the ASN.1 encoder** (Severity:High)
|
||||
|
||||
This issue affects all OpenSSL version prior to April 2015
|
||||
|
||||
|
||||
OpenSSL 1.0.2 users should upgrade to 1.0.2c
|
||||
OpenSSL 1.0.1 users should upgrade to 1.0.1o
|
||||
|
||||
@@ -21,12 +21,12 @@ Advisory CVEs
|
||||
OpenSSL 1.0.1 users should upgrade to 1.0.1t
|
||||
|
||||
* CVE-2016-2105 - **EVP_EncodeUpdate overflow** (Severity:Low)
|
||||
|
||||
|
||||
OpenSSL 1.0.2 users should upgrade to 1.0.2h
|
||||
OpenSSL 1.0.1 users should upgrade to 1.0.1t
|
||||
|
||||
* CVE-2016-2106 - **EVP_EncryptUpdate overflow** (Severity:Low)
|
||||
|
||||
|
||||
OpenSSL 1.0.2 users should upgrade to 1.0.2h
|
||||
OpenSSL 1.0.1 users should upgrade to 1.0.1t
|
||||
|
||||
@@ -38,7 +38,7 @@ Advisory CVEs
|
||||
|
||||
|
||||
* CVE-2016-2176 - **EBCDIC overread** (Severity:Low)
|
||||
|
||||
|
||||
OpenSSL 1.0.2 users should upgrade to 1.0.2h
|
||||
OpenSSL 1.0.1 users should upgrade to 1.0.1t
|
||||
|
||||
@@ -46,7 +46,7 @@ Advisory CVEs
|
||||
Action
|
||||
------
|
||||
|
||||
xCAT uses OpenSSL for client-server communication but **does not** ship it.
|
||||
xCAT uses OpenSSL for client-server communication but **does not** ship it.
|
||||
|
||||
It is recommended to keep your OpenSSL levels up-to-date with the indicated versions in the security bulletins to prevent any potential security threats.
|
||||
It is recommended to keep your OpenSSL levels up-to-date with the indicated versions in the security bulletins to prevent any potential security threats.
|
||||
|
||||
|
Reference in New Issue
Block a user