Message ID | 20250120052019.2945142-1-madmarri@cisco.com |
---|---|
State | New |
Headers | show |
Series | [meta-selinux,scarthgap] selinux: Mark CVE-2020-10751 as Patched | expand |
diff --git a/recipes-security/selinux/selinux_common.inc b/recipes-security/selinux/selinux_common.inc index cecb0b5..d8c91ac 100644 --- a/recipes-security/selinux/selinux_common.inc +++ b/recipes-security/selinux/selinux_common.inc @@ -19,3 +19,5 @@ do_install() { } CVE_PRODUCT ?= "kernel:selinux" + +CVE_STATUS[CVE-2020-10751] = "fixed-version: Fix is present in the current kernel version."
Bug Details: https://nvd.nist.gov/vuln/detail/CVE-2020-10751 Type: Security Advisory CVE: CVE-2020-10751 Score: 6.1 Patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ff Analysis: - This is a selinux cve which is addressed in kernel. - The fix is available at [1]. - Hence, marking the CVE as patched. Reference: [1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ff Signed-off-by: Madhu Marri <madmarri@cisco.com> --- recipes-security/selinux/selinux_common.inc | 2 ++ 1 file changed, 2 insertions(+)