File tree 2 files changed +3
-0
lines changed
2 files changed +3
-0
lines changed Original file line number Diff line number Diff line change @@ -1807,6 +1807,7 @@ def saml2_attrib_map_format(din):
1807
1807
VULNERABILITY_URLS = {
1808
1808
"ALAS" : "https://alas.aws.amazon.com/AL2/&&.html" , # e.g. https://alas.aws.amazon.com/alas2.html
1809
1809
"ALBA-" : "https://osv.dev/vulnerability/" , # e.g. https://osv.dev/vulnerability/ALBA-2019:3411
1810
+ "ALINUX2-SA-" : "https://mirrors.aliyun.com/alinux/cve/" , # e.g. https://mirrors.aliyun.com/alinux/cve/alinux2-sa-20250007.xml
1810
1811
"ALSA-" : "https://osv.dev/vulnerability/" , # e.g. https://osv.dev/vulnerability/ALSA-2024:0827
1811
1812
"ASA-" : "https://security.archlinux.org/" , # e.g. https://security.archlinux.org/ASA-202003-8
1812
1813
"AVD" : "https://avd.aquasec.com/misconfig/" , # e.g. https://avd.aquasec.com/misconfig/avd-ksv-01010
Original file line number Diff line number Diff line change @@ -779,6 +779,8 @@ def vulnerability_url(vulnerability_id):
779
779
780
780
for key in settings .VULNERABILITY_URLS :
781
781
if vulnerability_id .upper ().startswith (key ):
782
+ if key == "ALINUX2-SA-" :
783
+ return settings .VULNERABILITY_URLS [key ] + str (vulnerability_id .replace (":" , "" ).lower ()) + ".xml"
782
784
if key == "GLSA" :
783
785
return settings .VULNERABILITY_URLS [key ] + str (vulnerability_id .replace ("GLSA-" , "glsa/" ))
784
786
if key == "SSA:" :
You can’t perform that action at this time.
0 commit comments