Skip to content

Commit 7fa55fc

Browse files
Alibaba Cloud Linux 3 Security Advisory (#12465)
1 parent c4dbe4f commit 7fa55fc

File tree

2 files changed

+3
-0
lines changed

2 files changed

+3
-0
lines changed

dojo/settings/settings.dist.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1810,6 +1810,7 @@ def saml2_attrib_map_format(din):
18101810
"ALAS": "https://alas.aws.amazon.com/AL2/&&.html", # e.g. https://alas.aws.amazon.com/alas2.html
18111811
"ALBA-": "https://osv.dev/vulnerability/", # e.g. https://osv.dev/vulnerability/ALBA-2019:3411
18121812
"ALINUX2-SA-": "https://mirrors.aliyun.com/alinux/cve/", # e.g. https://mirrors.aliyun.com/alinux/cve/alinux2-sa-20250007.xml
1813+
"ALINUX3-SA-": "https://mirrors.aliyun.com/alinux/3/cve/", # e.g. https://mirrors.aliyun.com/alinux/3/cve/alinux3-sa-20250059.xml
18131814
"ALSA-": "https://osv.dev/vulnerability/", # e.g. https://osv.dev/vulnerability/ALSA-2024:0827
18141815
"ASA-": "https://security.archlinux.org/", # e.g. https://security.archlinux.org/ASA-202003-8
18151816
"AVD": "https://avd.aquasec.com/misconfig/", # e.g. https://avd.aquasec.com/misconfig/avd-ksv-01010

dojo/templatetags/display_tags.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -781,6 +781,8 @@ def vulnerability_url(vulnerability_id):
781781
if vulnerability_id.upper().startswith(key):
782782
if key == "ALINUX2-SA-":
783783
return settings.VULNERABILITY_URLS[key] + str(vulnerability_id.replace(":", "").lower()) + ".xml"
784+
if key == "ALINUX3-SA-":
785+
return settings.VULNERABILITY_URLS[key] + str(vulnerability_id.replace(":", "").lower()) + ".xml"
784786
if key == "GLSA":
785787
return settings.VULNERABILITY_URLS[key] + str(vulnerability_id.replace("GLSA-", "glsa/"))
786788
if key == "SSA:":

0 commit comments

Comments
 (0)