migration-guides: use new cve_mitre macro

(From yocto-docs rev: 9dc21e807e76c5ea8429ac31b57ad7b352fbaa71)

Signed-off-by: Michael Opdenacker <michael.opdenacker@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
Michael Opdenacker 2023-05-24 19:26:04 +02:00 committed by Richard Purdie
parent a618060cce
commit 9323f4160d
3 changed files with 7 additions and 7 deletions

View File

@ -7,7 +7,7 @@ Security Fixes in Yocto-4.0.7
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- binutils: Fix :cve:`2022-4285`
- curl: Fix :cve:`2022-43551` and `CVE-2022-43552 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552>`__
- curl: Fix :cve:`2022-43551` and :cve_mitre:`2022-43552`
- ffmpeg: Fix :cve:`2022-3109` and :cve:`2022-3341`
- go: Fix :cve:`2022-41715` and :cve:`2022-41717`
- libX11: Fix :cve:`2022-3554` and :cve:`2022-3555`
@ -24,7 +24,7 @@ Security Fixes in Yocto-4.0.7
- sqlite: Fix :cve:`2022-46908`
- systemd: Fix :cve:`2022-45873`
- vim: Fix :cve:`2023-0049`, :cve:`2023-0051`, :cve:`2023-0054` and :cve:`2023-0088`
- webkitgtk: Fix :cve:`2022-32886`, `CVE-2022-32891 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891>`__ and :cve:`2022-32912`
- webkitgtk: Fix :cve:`2022-32886`, :cve_mitre:`2022-32891` and :cve:`2022-32912`
Fixes in Yocto-4.0.7

View File

@ -24,8 +24,8 @@ Security Fixes in Yocto-4.1.3
- sudo: Fix :cve:`2023-22809`
- tar: Fix :cve:`2022-48303`
- vim: Fix :cve:`2023-0049`, :cve:`2023-0051`, :cve:`2023-0054`, :cve:`2023-0288`, :cve:`2023-0433` and :cve:`2023-0512`
- xserver-xorg: Fix `CVE-2023-0494 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494>`__
- xwayland: Fix `CVE-2023-0494 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494>`__
- xserver-xorg: Fix :cve_mitre:`2023-0494`
- xwayland: Fix :cve_mitre:`2023-0494`
Fixes in Yocto-4.1.3

View File

@ -348,7 +348,7 @@ The following corrections have been made to the :term:`LICENSE` values set by re
Security Fixes in 4.2
~~~~~~~~~~~~~~~~~~~~~
- binutils: :cve:`2022-4285`, `CVE-2023-25586 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25586>`__
- binutils: :cve:`2022-4285`, :cve_mitre:`2023-25586`
- curl: :cve:`2022-32221`, :cve:`2022-35260`, :cve:`2022-42915`, :cve:`2022-42916`
- epiphany: :cve:`2023-26081`
- expat: :cve:`2022-43680`
@ -356,7 +356,7 @@ Security Fixes in 4.2
- git: :cve:`2022-39260`, :cve:`2022-41903`, :cve:`2022-23521`, :cve:`2022-41953` (ignored)
- glibc: :cve:`2023-25139` (ignored)
- go: :cve:`2023-24532`, :cve:`2023-24537`
- grub2: :cve:`2022-2601`, :cve:`2022-3775`, `CVE-2022-28736 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28736>`__
- grub2: :cve:`2022-2601`, :cve:`2022-3775`, :cve_mitre:`2022-28736`
- inetutils: :cve:`2019-0053`
- less: :cve:`2022-46663`
- libarchive: :cve:`2022-36227`
@ -368,7 +368,7 @@ Security Fixes in 4.2
- openssl: :cve:`2022-3358`, :cve:`2022-3786`, :cve:`2022-3602`, :cve:`2022-3996`, :cve:`2023-0286`, :cve:`2022-4304`, :cve:`2022-4203`, :cve:`2023-0215`, :cve:`2022-4450`, :cve:`2023-0216`, :cve:`2023-0217`, :cve:`2023-0401`, :cve:`2023-0464`
- ppp: :cve:`2022-4603`
- python3-cryptography{-vectors}: :cve:`2022-3602`, :cve:`2022-3786`, :cve:`2023-23931`
- python3: `CVE-2022-37460 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37460>`__
- python3: :cve_mitre:`2022-37460`
- qemu: :cve:`2022-3165`
- rust: :cve:`2022-46176`
- rxvt-unicode: :cve:`2022-4170`