Commit a18410e1 authored by sajolida's avatar sajolida
Browse files

Apply style guide #vulnerabilities

parent 96ffe5af
......@@ -6,7 +6,7 @@
<!--
This release fixes [[many security
vulnerabilities|security/Numerous_security_holes_in_$VERSION-1]]. You should upgrade as soon as possible.
vulnerabilities|security/Known_security_vulnerabilities_in_$VERSION-1]]. You should upgrade as soon as possible.
OR
......@@ -14,7 +14,7 @@ This release is an emergency release to fix a critical security
vulnerability in $APPLICATION.
It also fixes [[other security
vulnerabilities|security/Numerous_security_holes_in_$VERSION-1]]. You should upgrade as soon as possible.
vulnerabilities|security/Known_security_vulnerabilities_in_$VERSION-1]]. You should upgrade as soon as possible.
-->
......
......@@ -1232,14 +1232,14 @@ Ensure our [[contribute/working_together/roles/technical_writer]] has
announcement for the release in `wiki/src/news/version_${TAG:?}.mdwn`.
Write an announcement listing the security bugs affecting the previous version
in `wiki/src/security/Numerous_security_holes_in_${PREVIOUS_STABLE_VERSION:?}.mdwn`, in
in `wiki/src/security/Known_security_vulnerabilities_in_${PREVIOUS_STABLE_VERSION:?}.mdwn`, in
order to let the users of the old versions know that they have to upgrade:
./bin/generate-security-advisory \
--previous-version "${PREVIOUS_STABLE_VERSION:?}" \
--version "${VERSION:?}" \
--tag "${TAG:?}" \
> "wiki/src/security/Numerous_security_holes_in_${PREVIOUS_STABLE_VERSION:?}.mdwn"
> "wiki/src/security/Known_security_vulnerabilities_in_${PREVIOUS_STABLE_VERSION:?}.mdwn"
Remove obsolete bits from `wiki/src/home/testing.html`. For example,
remove any text that's specific to a release candidate we may have
......
......@@ -19,17 +19,17 @@ unfixed security bugs.
> Experience has shown that "security through obscurity" does
not work. Public disclosure allows for more rapid and better solutions to
security problems. In that vein, this page addresses Debian's status with
respect to various known security holes, which could potentially affect
respect to various known security vulnerabilities, which could potentially affect
Debian.
# Current holes
# Current security vulnerabilities
[[!inline pages="page(security/*) and ! tagged(security/probable)
and !security/audits and !security/audits.* and !security/audits/*
and ! tagged(security/fixed) and currentlang() and created_after(security/Numerous_security_holes_in_1.2)"
actions=no archive=yes feeds=no show=0 sort="-meta(date) age -path"]]
# Probable holes
# Probable security vulnerabilities
Until an [[!tails_ticket 5769 desc="audit"]] of the bundled network
applications is done, information leakages at the protocol level
......@@ -38,12 +38,12 @@ should be considered as − at the very least − possible.
[[!inline pages="page(security/*) and tagged(security/probable) and currentlang()"
actions=no archive=yes feeds=no show=0 sort="-meta(date) age -path"]]
# Fixed holes
# Fixed security vulnerabilities
**WARNING**: some of these holes may only be fixed in [[Git|contribute/git]].
**WARNING**: some of these vulnerabilities may only be fixed in [[Git|contribute/git]].
Please carefully read the "Affected versions" sections below.
[[!inline pages="page(security/*) and tagged(security/fixed) and (currentlang() or security/Numerous_security_holes_in_*)"
[[!inline pages="page(security/*) and tagged(security/fixed) and (currentlang() or security/Numerous_security_holes_in_* or security/Known_security_vulnerabilities_in_*)"
actions=no archive=yes feeds=no show=0 sort="-meta(date) age -path"]]
# Audits
......
......@@ -190,7 +190,7 @@ configuration or leak private information.
1. They can track and reveal information about your browsing behaviour, browsing
history, or system information, either on purpose or by mistake.
2. They can have bugs and security holes that can be remotely exploited by an
2. They can have bugs and security vulnerabilities that can be remotely exploited by an
attacker.
3. They can have bugs breaking the security offered by other add-ons
......
[[!map pages="tagged(security/probable)"]]
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment