diff mbox series

[meta-oe,kirkstone,1/2] audit: Fix CVE_PRODUCT

Message ID 20251215193340.1057380-1-skandigraun@gmail.com
State New
Headers show
Series [meta-oe,kirkstone,1/2] audit: Fix CVE_PRODUCT | expand

Commit Message

Gyorgy Sarvari Dec. 15, 2025, 7:33 p.m. UTC
From: Shinji Matsunaga <shin.matsunaga@fujitsu.com>

Fix "audit" set in CVE_PRODUCT to "linux:audit" to detect only vulnerabilities where the vendor is "linux".

Currently, CVE_PRODUCT also detects vulnerabilities where the vendor is "visionsoft",
which are unrelated to the "audit" in this recipe.
https://www.opencve.io/cve?vendor=visionsoft&product=audit

In addition, all the vulnerabilities currently detected in "audit" have the vendor of "visionsoft" or "linux".
Therefore, fix "audit" set in CVE_PRODUCT to "linux:audit".

Signed-off-by: Shinji Matsunaga <shin.matsunaga@fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit e87e51da49fe121be8f6dd4cec3263a345f2f876)

Adapted to Kirkstone.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
---
 meta-oe/recipes-security/audit/audit_2.8.5.bb | 2 ++
 meta-oe/recipes-security/audit/audit_3.0.8.bb | 2 ++
 2 files changed, 4 insertions(+)
diff mbox series

Patch

diff --git a/meta-oe/recipes-security/audit/audit_2.8.5.bb b/meta-oe/recipes-security/audit/audit_2.8.5.bb
index 347c855063..c8f235b1a3 100644
--- a/meta-oe/recipes-security/audit/audit_2.8.5.bb
+++ b/meta-oe/recipes-security/audit/audit_2.8.5.bb
@@ -107,3 +107,5 @@  do_install:append() {
 	# Create /var/spool/audit directory for audisp-remote
 	install -m 0700 -d ${D}${localstatedir}/spool/audit
 }
+
+CVE_PRODUCT = "linux:audit"
diff --git a/meta-oe/recipes-security/audit/audit_3.0.8.bb b/meta-oe/recipes-security/audit/audit_3.0.8.bb
index c17899d4f6..759d8a40bc 100644
--- a/meta-oe/recipes-security/audit/audit_3.0.8.bb
+++ b/meta-oe/recipes-security/audit/audit_3.0.8.bb
@@ -113,3 +113,5 @@  do_install:append() {
 	# Create /var/spool/audit directory for audisp-remote
 	install -m 0700 -d ${D}${localstatedir}/spool/audit
 }
+
+CVE_PRODUCT = "linux:audit"