From 962d08fb4077f44a1d2b6d6c6d29a466adebeb85 Mon Sep 17 00:00:00 2001 From: Peter Marko Date: Sat, 11 Oct 2025 23:35:37 +0200 Subject: [PATCH] vulnerabilities: update nvdcve file name The filename is outdated as its version was already bumped and there are also different files for different feed choices. Use glob to match any available file. (From yocto-docs rev: fca48e1239950ccf10f6b1b805c5734104144ded) Signed-off-by: Peter Marko Signed-off-by: Antonin Godard Signed-off-by: Steve Sakoman --- documentation/dev-manual/vulnerabilities.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/documentation/dev-manual/vulnerabilities.rst b/documentation/dev-manual/vulnerabilities.rst index eebb779020..53fad1613d 100644 --- a/documentation/dev-manual/vulnerabilities.rst +++ b/documentation/dev-manual/vulnerabilities.rst @@ -235,7 +235,7 @@ products defined in :term:`CVE_PRODUCT`. Then, for each found CVE: The CVE database is stored in :term:`DL_DIR` and can be inspected using ``sqlite3`` command as follows:: - sqlite3 downloads/CVE_CHECK/nvdcve_1.1.db .dump | grep CVE-2021-37462 + sqlite3 downloads/CVE_CHECK/nvd*.db .dump | grep CVE-2021-37462 When analyzing CVEs, it is recommended to: