mirror of
https://git.yoctoproject.org/poky
synced 2026-01-29 21:08:42 +01:00
release-notes-4.1: fix some CVE links
The "(ignored)" suffixes were included in the link value which broke the link. (From yocto-docs rev: bff0fb0e39f69101f036ddbc27a82c15047bdbcd) Signed-off-by: Paul Eggleton <bluelightning@bluelightning.org> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
committed by
Richard Purdie
parent
57bf1f17d7
commit
86b1247db4
@@ -238,20 +238,20 @@ Security Fixes in 4.1
|
||||
- grub2: :cve:`2021-3695`, :cve:`2021-3696`, :cve:`2021-3697`, :cve:`2022-28733`, :cve:`2022-28734`, :cve:`2022-28735`
|
||||
- inetutils: :cve:`2022-39028`
|
||||
- libtirpc: :cve:`2021-46828`
|
||||
- libxml2: :cve:`2016-3709 (ignored)`
|
||||
- libxslt: :cve:`2022-29824 (not applicable)`
|
||||
- libxml2: :cve:`2016-3709` (ignored)
|
||||
- libxslt: :cve:`2022-29824` (not applicable)
|
||||
- linux-yocto/5.15: :cve:`2022-28796`
|
||||
- logrotate: :cve:`2022-1348`
|
||||
- lua: :cve:`2022-33099`
|
||||
- nasm: :cve:`2020-18974 (ignored)`
|
||||
- nasm: :cve:`2020-18974` (ignored)
|
||||
- ncurses: :cve:`2022-29458`
|
||||
- openssl: :cve:`2022-1292`, :cve:`2022-1343`, :cve:`2022-1434`, :cve:`2022-1473`, :cve:`2022-2068`, :cve:`2022-2274`, :cve:`2022-2097`
|
||||
- python3: :cve:`2015-20107 (ignored)`
|
||||
- qemu: :cve:`2021-20255 (ignored)`, :cve:`2019-12067 (ignored)`, :cve:`2021-3507`, :cve:`2022-0216`, :cve:`2022-2962`, :cve:`2022-35414`
|
||||
- python3: :cve:`2015-20107` (ignored)
|
||||
- qemu: :cve:`2021-20255` (ignored), :cve:`2019-12067` (ignored), :cve:`2021-3507`, :cve:`2022-0216`, :cve:`2022-2962`, :cve:`2022-35414`
|
||||
- rpm: :cve:`2021-35937`, :cve:`2021-35938`, :cve:`2021-35939`
|
||||
- rsync: :cve:`2022-29154`
|
||||
- subversion: :cve:`2021-28544`, :cve:`2022-24070`
|
||||
- tiff: :cve:`2022-1210 (not applicable)`, :cve:`2022-1622`, :cve:`2022-1623 (invalid)`, :cve:`2022-2056`, :cve:`2022-2057`, :cve:`2022-2058`, :cve:`2022-2953`, :cve:`2022-34526`
|
||||
- tiff: :cve:`2022-1210` (not applicable), :cve:`2022-1622`, :cve:`2022-1623` (invalid), :cve:`2022-2056`, :cve:`2022-2057`, :cve:`2022-2058`, :cve:`2022-2953`, :cve:`2022-34526`
|
||||
- unzip: :cve:`2022-0529`, :cve:`2022-0530`
|
||||
- vim: :cve:`2022-1381`, :cve:`2022-1420`, :cve:`2022-1621`, :cve:`2022-1629`, :cve:`2022-1674`, :cve:`2022-1733`, :cve:`2022-1735`, :cve:`2022-1769`, :cve:`2022-1771`, :cve:`2022-1785`, :cve:`2022-1796`, :cve:`2022-1927`, :cve:`2022-1942`, :cve:`2022-2257`, :cve:`2022-2264`, :cve:`2022-2284`, :cve:`2022-2285`, :cve:`2022-2286`, :cve:`2022-2287`, :cve:`2022-2816`, :cve:`2022-2817`, :cve:`2022-2819`, :cve:`2022-2845`, :cve:`2022-2849`, :cve:`2022-2862`, :cve:`2022-2874`, :cve:`2022-2889`, :cve:`2022-2980`, :cve:`2022-2946`, :cve:`2022-2982`, :cve:`2022-3099`, :cve:`2022-3134`, :cve:`2022-3234`, :cve:`2022-3278`
|
||||
- zlib: :cve:`2022-37434`
|
||||
|
||||
Reference in New Issue
Block a user