Home
last modified time | relevance | path

Searched refs:nvd (Results 1 – 18 of 18) sorted by relevance

/openbmc/openbmc/poky/meta/conf/distro/include/
H A Dcve-extra-exclusions.inc18 # strace https://nvd.nist.gov/vuln/detail/CVE-2000-0006
22 # epiphany https://nvd.nist.gov/vuln/detail/CVE-2005-0238
30 # glibc https://nvd.nist.gov/vuln/detail/CVE-2010-4756
37 # go https://nvd.nist.gov/vuln/detail/CVE-2020-29509
38 # go https://nvd.nist.gov/vuln/detail/CVE-2020-29511
68 # qemu:qemu-native:qemu-system-native https://nvd.nist.gov/vuln/detail/CVE-2021-20255
74 # qemu:qemu-native:qemu-system-native https://nvd.nist.gov/vuln/detail/CVE-2019-12067
80 # nasm:nasm-native https://nvd.nist.gov/vuln/detail/CVE-2020-18974
/openbmc/openbmc/poky/meta/recipes-core/glibc/
H A Dglibc_2.40.bb4 # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010022
5 # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010023
6 # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010024
13 # glibc https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-1010025
/openbmc/u-boot/drivers/mtd/
H A DKconfig32 option. Visit <http://www.amd.com/products/nvd/overview/cfi.html>
43 option. Visit <http://www.amd.com/products/nvd/overview/cfi.html>
/openbmc/openbmc/poky/meta/recipes-core/meta/
H A Dcve-update-nvd2-native.bb17 NVDCVE_URL ?= "https://services.nvd.nist.gov/rest/json/cves/2.0"
19 # If you have a NVD API key (https://nvd.nist.gov/developers/request-an-api-key)
34 # Number of attempts for each http query to nvd server before giving up
140 NVD API documentation: https://nvd.nist.gov/developers/vulnerabilities
/openbmc/openbmc/poky/documentation/dev-manual/
H A Dvulnerabilities.rst79 MORE INFORMATION: https://nvd.nist.gov/vuln/detail/CVE-2016-6354
90 MORE INFORMATION: https://nvd.nist.gov/vuln/detail/CVE-2019-6293
114 upstream `NIST CVE database <https://nvd.nist.gov/>`__.
131 NVD about CVE entries can be provided through the `NVD contact form <https://nvd.nist.gov/info/cont…
285 - study the latest information in `CVE database <https://nvd.nist.gov/vuln/search>`__.
/openbmc/openbmc/meta-security/recipes-security/ecryptfs-utils/files/
H A Decryptfs-utils-CVE-2016-6224.patch14 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6224
/openbmc/qemu/hw/acpi/
H A Dnvdimm.c193 NVDIMMDevice *nvd = list->data; in nvdimm_get_device_by_handle() local
194 int slot = object_property_get_int(OBJECT(nvd), PC_DIMM_SLOT_PROP, in nvdimm_get_device_by_handle()
198 nvdimm = nvd; in nvdimm_get_device_by_handle()
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-support/libtar/files/
H A DCVE-2013-4420.patch32 [1] https://nvd.nist.gov/vuln/detail/CVE-2013-4420
/openbmc/openbmc/poky/meta/recipes-multimedia/ffmpeg/
H A Dffmpeg_7.1.bb31 # https://nvd.nist.gov/vuln/detail/CVE-2023-39018
/openbmc/openbmc/poky/meta/classes/
H A Dvex.bbclass239 nvd_link = "https://nvd.nist.gov/vuln/detail/"
H A Dcve-check.bbclass497 nvd_link = "https://nvd.nist.gov/vuln/detail/"
/openbmc/linux/drivers/mtd/chips/
H A DKconfig14 option. Visit <https://www.amd.com/products/nvd/overview/cfi.html>
/openbmc/openbmc/poky/documentation/migration-guides/
H A Dmigration-4.2.rst54 .. _migration-4.2-new-nvd-api:
/openbmc/docs/security/
H A Dnetwork-security-considerations.md59 [cve 1999-0524]: https://nvd.nist.gov/vuln/detail/CVE-1999-0524
/openbmc/linux/arch/arm/boot/dts/nxp/imx/
H A Dimx53-ppd.dts278 compatible = "nvd,9128";
/openbmc/openbmc/poky/documentation/ref-manual/
H A Dvariables.rst1727 against the name in the upstream `NIST CVE database <https://nvd.nist.gov/>`__.
1777 against the version in the `NIST CVE database <https://nvd.nist.gov/>`__
5667 at the `NVD developer's page <https://nvd.nist.gov/developers/start-here>`__.
5670 `Request an API Key <https://nvd.nist.gov/developers/request-an-api-key>`__
H A Dclasses.rst605 via the `NVD feedback form <https://nvd.nist.gov/info/contact-form>`__.
/openbmc/linux/
H A Dopengrok2.0.log[all...]