Home
last modified time | relevance | path

Searched refs:nvd (Results 1 – 18 of 18) sorted by relevance

/openbmc/openbmc/poky/meta/conf/distro/include/
H A Dcve-extra-exclusions.inc18 # strace https://nvd.nist.gov/vuln/detail/CVE-2000-0006
22 # epiphany https://nvd.nist.gov/vuln/detail/CVE-2005-0238
30 # glibc https://nvd.nist.gov/vuln/detail/CVE-2010-4756
37 # go https://nvd.nist.gov/vuln/detail/CVE-2020-29509
38 # go https://nvd.nist.gov/vuln/detail/CVE-2020-29511
68 # qemu:qemu-native:qemu-system-native https://nvd.nist.gov/vuln/detail/CVE-2021-20255
74 # qemu:qemu-native:qemu-system-native https://nvd.nist.gov/vuln/detail/CVE-2019-12067
80 # nasm:nasm-native https://nvd.nist.gov/vuln/detail/CVE-2020-18974
/openbmc/openbmc/poky/meta/recipes-core/glibc/
H A Dglibc_2.39.bb4 # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010022
5 # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010023
6 # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010024
13 # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010025
/openbmc/u-boot/drivers/mtd/
H A DKconfig32 option. Visit <http://www.amd.com/products/nvd/overview/cfi.html>
43 option. Visit <http://www.amd.com/products/nvd/overview/cfi.html>
/openbmc/openbmc/poky/meta/recipes-core/meta/
H A Dcve-update-nvd2-native.bb18 NVDCVE_URL ?= "https://services.nvd.nist.gov/rest/json/cves/2.0"
20 # If you have a NVD API key (https://nvd.nist.gov/developers/request-an-api-key)
35 # Number of attempts for each http query to nvd server before giving up
127 NVD API documentation: https://nvd.nist.gov/developers/vulnerabilities
/openbmc/openbmc/poky/documentation/dev-manual/
H A Dvulnerabilities.rst75 MORE INFORMATION: https://nvd.nist.gov/vuln/detail/CVE-2016-6354
86 MORE INFORMATION: https://nvd.nist.gov/vuln/detail/CVE-2019-6293
110 upstream `NIST CVE database <https://nvd.nist.gov/>`__.
127 NVD about CVE entries can be provided through the `NVD contact form <https://nvd.nist.gov/info/cont…
281 - study the latest information in `CVE database <https://nvd.nist.gov/vuln/search>`__.
/openbmc/openbmc/meta-security/recipes-security/ecryptfs-utils/files/
H A Decryptfs-utils-CVE-2016-6224.patch14 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6224
/openbmc/qemu/hw/acpi/
H A Dnvdimm.c193 NVDIMMDevice *nvd = list->data; in nvdimm_get_device_by_handle() local
194 int slot = object_property_get_int(OBJECT(nvd), PC_DIMM_SLOT_PROP, in nvdimm_get_device_by_handle()
198 nvdimm = nvd; in nvdimm_get_device_by_handle()
/openbmc/openbmc/poky/meta/recipes-multimedia/ffmpeg/
H A Dffmpeg_6.1.1.bb29 # https://nvd.nist.gov/vuln/detail/CVE-2023-39018
/openbmc/openbmc/poky/meta/classes/
H A Dcve-check.bbclass482 nvd_link = "https://nvd.nist.gov/vuln/detail/"
577 nvd_link = "https://nvd.nist.gov/vuln/detail/"
/openbmc/linux/drivers/mtd/chips/
H A DKconfig14 option. Visit <https://www.amd.com/products/nvd/overview/cfi.html>
/openbmc/openbmc/poky/documentation/migration-guides/
H A Dmigration-4.2.rst54 .. _migration-4.2-new-nvd-api:
/openbmc/docs/security/
H A Dnetwork-security-considerations.md58 [cve 1999-0524]: https://nvd.nist.gov/vuln/detail/CVE-1999-0524
/openbmc/openbmc/poky/meta/recipes-devtools/qemu/
H A Dqemu.inc68 # As per https://nvd.nist.gov/vuln/detail/CVE-2023-0664
/openbmc/linux/Documentation/devicetree/bindings/display/panel/
H A Dpanel-simple.yaml260 - nvd,9128
/openbmc/linux/arch/arm/boot/dts/nxp/imx/
H A Dimx53-ppd.dts278 compatible = "nvd,9128";
/openbmc/linux/Documentation/devicetree/bindings/
H A Dvendor-prefixes.yaml966 "^nvd,.*":
/openbmc/openbmc/poky/documentation/ref-manual/
H A Dclasses.rst594 via the `NVD feedback form <https://nvd.nist.gov/info/contact-form>`__.
H A Dvariables.rst1709 against the name in the upstream `NIST CVE database <https://nvd.nist.gov/>`__.
1759 against the version in the `NIST CVE database <https://nvd.nist.gov/>`__