File tree Expand file tree Collapse file tree 2 files changed +3
-0
lines changed Expand file tree Collapse file tree 2 files changed +3
-0
lines changed Original file line number Diff line number Diff line change @@ -1810,6 +1810,7 @@ def saml2_attrib_map_format(din):
1810
1810
"ALAS" : "https://alas.aws.amazon.com/AL2/&&.html" , # e.g. https://alas.aws.amazon.com/alas2.html
1811
1811
"ALBA-" : "https://osv.dev/vulnerability/" , # e.g. https://osv.dev/vulnerability/ALBA-2019:3411
1812
1812
"ALINUX2-SA-" : "https://mirrors.aliyun.com/alinux/cve/" , # e.g. https://mirrors.aliyun.com/alinux/cve/alinux2-sa-20250007.xml
1813
+ "ALINUX3-SA-" : "https://mirrors.aliyun.com/alinux/3/cve/" , # e.g. https://mirrors.aliyun.com/alinux/3/cve/alinux3-sa-20250059.xml
1813
1814
"ALSA-" : "https://osv.dev/vulnerability/" , # e.g. https://osv.dev/vulnerability/ALSA-2024:0827
1814
1815
"ASA-" : "https://security.archlinux.org/" , # e.g. https://security.archlinux.org/ASA-202003-8
1815
1816
"AVD" : "https://avd.aquasec.com/misconfig/" , # e.g. https://avd.aquasec.com/misconfig/avd-ksv-01010
Original file line number Diff line number Diff line change @@ -781,6 +781,8 @@ def vulnerability_url(vulnerability_id):
781
781
if vulnerability_id .upper ().startswith (key ):
782
782
if key == "ALINUX2-SA-" :
783
783
return settings .VULNERABILITY_URLS [key ] + str (vulnerability_id .replace (":" , "" ).lower ()) + ".xml"
784
+ if key == "ALINUX3-SA-" :
785
+ return settings .VULNERABILITY_URLS [key ] + str (vulnerability_id .replace (":" , "" ).lower ()) + ".xml"
784
786
if key == "GLSA" :
785
787
return settings .VULNERABILITY_URLS [key ] + str (vulnerability_id .replace ("GLSA-" , "glsa/" ))
786
788
if key == "SSA:" :
You can’t perform that action at this time.
0 commit comments