summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python3-django/CVE-2023-23969.patch
diff options
context:
space:
mode:
authorShinji Matsunaga <shin.matsunaga@fujitsu.com>2025-12-15 20:33:39 +0100
committerGyorgy Sarvari <skandigraun@gmail.com>2025-12-16 08:42:29 +0100
commit9b5b7102ca65f86eb024429a023707c9295b8fd9 (patch)
tree3c96b0abdb37301ecf6f6a36939bad3b8622605e /meta-python/recipes-devtools/python/python3-django/CVE-2023-23969.patch
parentea388c67e4d2a86fc2712b899c3a8a5bd703286a (diff)
downloadmeta-openembedded-9b5b7102ca65f86eb024429a023707c9295b8fd9.tar.gz
audit: Fix CVE_PRODUCT
Fix "audit" set in CVE_PRODUCT to "linux:audit" to detect only vulnerabilities where the vendor is "linux". Currently, CVE_PRODUCT also detects vulnerabilities where the vendor is "visionsoft", which are unrelated to the "audit" in this recipe. https://www.opencve.io/cve?vendor=visionsoft&product=audit In addition, all the vulnerabilities currently detected in "audit" have the vendor of "visionsoft" or "linux". Therefore, fix "audit" set in CVE_PRODUCT to "linux:audit". Signed-off-by: Shinji Matsunaga <shin.matsunaga@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> (cherry picked from commit e87e51da49fe121be8f6dd4cec3263a345f2f876) Adapted to Kirkstone. Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-django/CVE-2023-23969.patch')
0 files changed, 0 insertions, 0 deletions