From: Andreas K. Hüttel Date: Sat, 26 Jul 2025 13:21:27 +0000 (+0200) Subject: advisories: s/CVE-id/CVE-Id/ (the lowercase i breaks our tooling) X-Git-Tag: glibc-2.42~11 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=4d585d0afb2db97ce4356c56ee63ac58f44ebe29;p=thirdparty%2Fglibc.git advisories: s/CVE-id/CVE-Id/ (the lowercase i breaks our tooling) Signed-off-by: Andreas K. Hüttel --- diff --git a/advisories/GLIBC-SA-2025-0002 b/advisories/GLIBC-SA-2025-0002 index 25a5aeec31..161da13dd4 100644 --- a/advisories/GLIBC-SA-2025-0002 +++ b/advisories/GLIBC-SA-2025-0002 @@ -12,7 +12,7 @@ discovered at the time of publishing this advisory, but the presence of custom setuid programs, although strongly discouraged as a security practice, cannot be discounted. -CVE-id: CVE-2025-4802 +CVE-Id: CVE-2025-4802 Public-Date: 2025-05-16 Vulnerable-Commit: 10e93d968716ab82931d593bada121c17c0a4b93 (2.27) Fix-Commit: 5451fa962cd0a90a0e2ec1d8910a559ace02bba0 (2.39) diff --git a/advisories/GLIBC-SA-2025-0003 b/advisories/GLIBC-SA-2025-0003 index 1252b5559a..2adeb3ce00 100644 --- a/advisories/GLIBC-SA-2025-0003 +++ b/advisories/GLIBC-SA-2025-0003 @@ -21,7 +21,7 @@ so: export GLIBC_TUNABLES=glibc.cpu.hwcaps=-arch_3_1 -CVE-id: CVE-2025-5702 +CVE-Id: CVE-2025-5702 Public-Date: 2025-06-04 Vulnerable-Commit: 3367d8e180848030d1646f088759f02b8dfe0d6f (2.39) Fix-Commit: 15808c77b35319e67ee0dc8f984a9a1a434701bc (2.42) diff --git a/advisories/GLIBC-SA-2025-0004 b/advisories/GLIBC-SA-2025-0004 index c7dda66d8f..9409ca27c4 100644 --- a/advisories/GLIBC-SA-2025-0004 +++ b/advisories/GLIBC-SA-2025-0004 @@ -21,7 +21,7 @@ so: export GLIBC_TUNABLES=glibc.cpu.hwcaps=-arch_3_1 -CVE-id: CVE-2025-5745 +CVE-Id: CVE-2025-5745 Public-Date: 2025-06-05 Vulnerable-Commit: 23f0d81608d0ca6379894ef81670cf30af7fd081 (2.40) Fix-Commit: 63c60101ce7c5eac42be90f698ba02099b41b965 (2.42)