diff options
author | aszh07 <mail2szahir@gmail.com> | 2024-10-17 11:01:42 +0530 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2024-11-11 09:16:26 -0800 |
commit | 26e83c3ca2fcc7ca209f567919fc2d27ff6d28ea (patch) | |
tree | fd2784bd97b04f6253e17bc9f725d3ccaff8c445 /scripts/cve-json-to-text.py | |
parent | 84bb73b74a63bc27c99a8b9bb9bd689835d4d794 (diff) | |
download | poky-26e83c3ca2fcc7ca209f567919fc2d27ff6d28ea.tar.gz |
ffmpeg: Add "libswresample libavcodec" to CVE_PRODUCT
Currently, CVE_PRODUCT only detects vulnerabilities where the product is "ffmpeg".
However, there are also vulnerabilities where the product is "libswresample",
and "libavcodec" as shown below.
https://app.opencve.io/vendors/?vendor=ffmpeg
Therefore, add "libswresample libavcodec" to CVE_PRODUCT to detect vulnerabilities
where the product is "libswresample libavcodec" as well.
(From OE-Core rev: 0b0299415ec719bb4c3764dfa0740e4ff6cc0362)
Signed-off-by: aszh07 <mail2szahir@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 9684eba5c543de229108008e29afd1dd021a9799)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'scripts/cve-json-to-text.py')
0 files changed, 0 insertions, 0 deletions