parent
7edf46a72d
commit
0cbfa48de3
|
@ -90,3 +90,4 @@
|
|||
/pki-11.2.0-beta2.tar.gz
|
||||
/pki-11.2.0-beta3.tar.gz
|
||||
/pki-11.2.0.tar.gz
|
||||
/pki-11.2.1.tar.gz
|
||||
|
|
|
@ -9,7 +9,7 @@ Name: pki-core
|
|||
# Upstream version number:
|
||||
%global major_version 11
|
||||
%global minor_version 2
|
||||
%global update_version 0
|
||||
%global update_version 1
|
||||
|
||||
# Downstream release number:
|
||||
# - development/stabilization (unsupported): 0.<n> where n >= 1
|
||||
|
@ -1260,6 +1260,10 @@ fi
|
|||
|
||||
################################################################################
|
||||
%changelog
|
||||
* Thu Aug 04 2022 Red Hat PKI Team <rhcs-maint@redhat.com> - 11.2.1-1
|
||||
- Rebase to PKI 11.2.1
|
||||
- Bug #2107336 - CVE-2022-2414 pki-core: access to external entities when parsing XML can lead to XXE [rhel-9.1.0]
|
||||
|
||||
* Fri Jul 01 2022 Red Hat PKI Team <rhcs-maint@redhat.com> - 11.2.0-1
|
||||
- Rebase to PKI 11.2.0
|
||||
- Bug #2084639 ipa cert-request ssl error
|
||||
|
|
2
sources
2
sources
|
@ -1 +1 @@
|
|||
SHA512 (pki-11.2.0.tar.gz) = ea38e3b7b2ae5d543dfd97d134241744117499b34b28f463c937dc27793717b238514ceb99944ab311887a9df37eb52dac28f7510891f24c813469d5da73101c
|
||||
SHA512 (pki-11.2.1.tar.gz) = 359fafd7345a96e17c36872f15d169ac62634df519e01a0db4fd5d7b2354f7d303680f0f7eab3a94ef6f7efdd9b12e9e6fd3c9ac66d1b10b846e0bad67bae284
|
||||
|
|
Loading…
Reference in New Issue