From 65cc65fa8dc2c2855877bc053a6b4034956a886a Mon Sep 17 00:00:00 2001 From: Paul Eggleton Date: Sat, 22 Apr 2023 15:19:52 +1200 Subject: release-notes-4.1: fix some CVE links The "(ignored)" suffixes were included in the link value which broke the link. (From yocto-docs rev: bff0fb0e39f69101f036ddbc27a82c15047bdbcd) Signed-off-by: Paul Eggleton Signed-off-by: Richard Purdie --- documentation/migration-guides/release-notes-4.1.rst | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) (limited to 'documentation') diff --git a/documentation/migration-guides/release-notes-4.1.rst b/documentation/migration-guides/release-notes-4.1.rst index cd48e202ab..a0d5196128 100644 --- a/documentation/migration-guides/release-notes-4.1.rst +++ b/documentation/migration-guides/release-notes-4.1.rst @@ -238,20 +238,20 @@ Security Fixes in 4.1 - grub2: :cve:`2021-3695`, :cve:`2021-3696`, :cve:`2021-3697`, :cve:`2022-28733`, :cve:`2022-28734`, :cve:`2022-28735` - inetutils: :cve:`2022-39028` - libtirpc: :cve:`2021-46828` -- libxml2: :cve:`2016-3709 (ignored)` -- libxslt: :cve:`2022-29824 (not applicable)` +- libxml2: :cve:`2016-3709` (ignored) +- libxslt: :cve:`2022-29824` (not applicable) - linux-yocto/5.15: :cve:`2022-28796` - logrotate: :cve:`2022-1348` - lua: :cve:`2022-33099` -- nasm: :cve:`2020-18974 (ignored)` +- nasm: :cve:`2020-18974` (ignored) - ncurses: :cve:`2022-29458` - openssl: :cve:`2022-1292`, :cve:`2022-1343`, :cve:`2022-1434`, :cve:`2022-1473`, :cve:`2022-2068`, :cve:`2022-2274`, :cve:`2022-2097` -- python3: :cve:`2015-20107 (ignored)` -- qemu: :cve:`2021-20255 (ignored)`, :cve:`2019-12067 (ignored)`, :cve:`2021-3507`, :cve:`2022-0216`, :cve:`2022-2962`, :cve:`2022-35414` +- python3: :cve:`2015-20107` (ignored) +- qemu: :cve:`2021-20255` (ignored), :cve:`2019-12067` (ignored), :cve:`2021-3507`, :cve:`2022-0216`, :cve:`2022-2962`, :cve:`2022-35414` - rpm: :cve:`2021-35937`, :cve:`2021-35938`, :cve:`2021-35939` - rsync: :cve:`2022-29154` - subversion: :cve:`2021-28544`, :cve:`2022-24070` -- tiff: :cve:`2022-1210 (not applicable)`, :cve:`2022-1622`, :cve:`2022-1623 (invalid)`, :cve:`2022-2056`, :cve:`2022-2057`, :cve:`2022-2058`, :cve:`2022-2953`, :cve:`2022-34526` +- tiff: :cve:`2022-1210` (not applicable), :cve:`2022-1622`, :cve:`2022-1623` (invalid), :cve:`2022-2056`, :cve:`2022-2057`, :cve:`2022-2058`, :cve:`2022-2953`, :cve:`2022-34526` - unzip: :cve:`2022-0529`, :cve:`2022-0530` - vim: :cve:`2022-1381`, :cve:`2022-1420`, :cve:`2022-1621`, :cve:`2022-1629`, :cve:`2022-1674`, :cve:`2022-1733`, :cve:`2022-1735`, :cve:`2022-1769`, :cve:`2022-1771`, :cve:`2022-1785`, :cve:`2022-1796`, :cve:`2022-1927`, :cve:`2022-1942`, :cve:`2022-2257`, :cve:`2022-2264`, :cve:`2022-2284`, :cve:`2022-2285`, :cve:`2022-2286`, :cve:`2022-2287`, :cve:`2022-2816`, :cve:`2022-2817`, :cve:`2022-2819`, :cve:`2022-2845`, :cve:`2022-2849`, :cve:`2022-2862`, :cve:`2022-2874`, :cve:`2022-2889`, :cve:`2022-2980`, :cve:`2022-2946`, :cve:`2022-2982`, :cve:`2022-3099`, :cve:`2022-3134`, :cve:`2022-3234`, :cve:`2022-3278` - zlib: :cve:`2022-37434` -- cgit v1.2.3-54-g00ecf