)]}'
{"ossa/OSSA-2021-004.yaml":[{"author":{"_account_id":5263,"name":"Jeremy Stanley","display_name":"fungi","email":"fungi@yuggoth.org","username":"fungi","status":"missing, presumed fed"},"change_message_id":"cd0907b6e6e8849db8fb04ca713c0c1b70d1678f","unresolved":false,"context_lines":[{"line_number":1,"context_line":"date: 2021-08-17"},{"line_number":2,"context_line":""},{"line_number":3,"context_line":"id: OSSA-2021-004"},{"line_number":4,"context_line":""}],"source_content_type":"text/x-yaml","patch_set":1,"id":"76bb8d1f_ac163caa","line":1,"updated":"2021-08-10 16:52:45.000000000","message":"Expected publication date, depending on how fast we can move on getting the remaining backports reviewed, turn-around time from MITRE on CVE assignment, and so on. I\u0027ll adjust with a new revision prior to approval, if needed.","commit_id":"46cc1e6c3c73420b33fab4f0bba690d78c2f6c01"},{"author":{"_account_id":5263,"name":"Jeremy Stanley","display_name":"fungi","email":"fungi@yuggoth.org","username":"fungi","status":"missing, presumed fed"},"change_message_id":"cd0907b6e6e8849db8fb04ca713c0c1b70d1678f","unresolved":false,"context_lines":[{"line_number":1,"context_line":"date: 2021-08-17"},{"line_number":2,"context_line":""},{"line_number":3,"context_line":"id: OSSA-2021-004"},{"line_number":4,"context_line":""},{"line_number":5,"context_line":"title: Linuxbridge ARP filter bypass on Netfilter platforms"},{"line_number":6,"context_line":""}],"source_content_type":"text/x-yaml","patch_set":1,"id":"eb6b1976_ec2efe9b","line":3,"updated":"2021-08-10 16:52:45.000000000","message":"Anticipated OSSA ID, assuming we don\u0027t have another merged before this one. If that does happen (which is unlikely), I\u0027ll increase it.","commit_id":"46cc1e6c3c73420b33fab4f0bba690d78c2f6c01"},{"author":{"_account_id":5263,"name":"Jeremy Stanley","display_name":"fungi","email":"fungi@yuggoth.org","username":"fungi","status":"missing, presumed fed"},"change_message_id":"cd0907b6e6e8849db8fb04ca713c0c1b70d1678f","unresolved":false,"context_lines":[{"line_number":15,"context_line":""},{"line_number":16,"context_line":"affected-products:"},{"line_number":17,"context_line":"  - product: Neutron"},{"line_number":18,"context_line":"    version: \u0027\u003c16.4.1, \u003e\u003d17.0.0 \u003c17.1.3, \u003d\u003d18.0.0\u0027"},{"line_number":19,"context_line":""},{"line_number":20,"context_line":"vulnerabilities:"},{"line_number":21,"context_line":"  - cve-id: TBD"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"cf468be4_4463166d","line":18,"updated":"2021-08-10 16:52:45.000000000","message":"The stable/wallaby fix was included in the first stable point release (18.1.0), hence the \u003d\u003d here.","commit_id":"46cc1e6c3c73420b33fab4f0bba690d78c2f6c01"},{"author":{"_account_id":5263,"name":"Jeremy Stanley","display_name":"fungi","email":"fungi@yuggoth.org","username":"fungi","status":"missing, presumed fed"},"change_message_id":"cd0907b6e6e8849db8fb04ca713c0c1b70d1678f","unresolved":false,"context_lines":[{"line_number":18,"context_line":"    version: \u0027\u003c16.4.1, \u003e\u003d17.0.0 \u003c17.1.3, \u003d\u003d18.0.0\u0027"},{"line_number":19,"context_line":""},{"line_number":20,"context_line":"vulnerabilities:"},{"line_number":21,"context_line":"  - cve-id: TBD"},{"line_number":22,"context_line":""},{"line_number":23,"context_line":"reporters:"},{"line_number":24,"context_line":"  - name: Jake Yip"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"3bf0b07a_ecedc05f","line":21,"updated":"2021-08-10 16:52:45.000000000","message":"Will update with an actual CVE once we get one assigned.","commit_id":"46cc1e6c3c73420b33fab4f0bba690d78c2f6c01"},{"author":{"_account_id":5263,"name":"Jeremy Stanley","display_name":"fungi","email":"fungi@yuggoth.org","username":"fungi","status":"missing, presumed fed"},"change_message_id":"cd0907b6e6e8849db8fb04ca713c0c1b70d1678f","unresolved":false,"context_lines":[{"line_number":24,"context_line":"  - name: Jake Yip"},{"line_number":25,"context_line":"    affiliation: Nectar"},{"line_number":26,"context_line":"    reported:"},{"line_number":27,"context_line":"      - TBD"},{"line_number":28,"context_line":""},{"line_number":29,"context_line":"issues:"},{"line_number":30,"context_line":"  links:"}],"source_content_type":"text/x-yaml","patch_set":1,"id":"686be697_6a429c0d","line":27,"updated":"2021-08-10 16:52:45.000000000","message":"Will update with an actual CVE once we get one assigned.","commit_id":"46cc1e6c3c73420b33fab4f0bba690d78c2f6c01"},{"author":{"_account_id":5263,"name":"Jeremy Stanley","display_name":"fungi","email":"fungi@yuggoth.org","username":"fungi","status":"missing, presumed fed"},"change_message_id":"cd0907b6e6e8849db8fb04ca713c0c1b70d1678f","unresolved":false,"context_lines":[{"line_number":48,"context_line":""},{"line_number":49,"context_line":"notes:"},{"line_number":50,"context_line":"  - The stable/train branch is under extended maintenance and will receive no"},{"line_number":51,"context_line":"    new point releases, but a patch for it is provided as a courtesy."}],"source_content_type":"text/x-yaml","patch_set":1,"id":"204eb52a_08768072","line":51,"updated":"2021-08-10 16:52:45.000000000","message":"We can adjust this and extend the list of extended maintenance backports if more are proposed between now and publication.","commit_id":"46cc1e6c3c73420b33fab4f0bba690d78c2f6c01"}]}
