diff options
| author | Shinji Matsunaga <shin.matsunaga@fujitsu.com> | 2025-12-15 20:33:39 +0100 |
|---|---|---|
| committer | Gyorgy Sarvari <skandigraun@gmail.com> | 2025-12-16 08:42:29 +0100 |
| commit | 9b5b7102ca65f86eb024429a023707c9295b8fd9 (patch) | |
| tree | 3c96b0abdb37301ecf6f6a36939bad3b8622605e /meta-python/recipes-devtools/python/python3-django/CVE-2023-46695.patch | |
| parent | ea388c67e4d2a86fc2712b899c3a8a5bd703286a (diff) | |
| download | meta-openembedded-9b5b7102ca65f86eb024429a023707c9295b8fd9.tar.gz | |
audit: Fix CVE_PRODUCT
Fix "audit" set in CVE_PRODUCT to "linux:audit" to detect only vulnerabilities where the vendor is "linux".
Currently, CVE_PRODUCT also detects vulnerabilities where the vendor is "visionsoft",
which are unrelated to the "audit" in this recipe.
https://www.opencve.io/cve?vendor=visionsoft&product=audit
In addition, all the vulnerabilities currently detected in "audit" have the vendor of "visionsoft" or "linux".
Therefore, fix "audit" set in CVE_PRODUCT to "linux:audit".
Signed-off-by: Shinji Matsunaga <shin.matsunaga@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit e87e51da49fe121be8f6dd4cec3263a345f2f876)
Adapted to Kirkstone.
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-django/CVE-2023-46695.patch')
0 files changed, 0 insertions, 0 deletions
