diff mbox series

[meta-selinux,scarthgap] selinux: Mark CVE-2020-10751 as Patched

Message ID 20250120052019.2945142-1-madmarri@cisco.com
State New
Headers show
Series [meta-selinux,scarthgap] selinux: Mark CVE-2020-10751 as Patched | expand

Commit Message

Madhu Marri Jan. 20, 2025, 5:20 a.m. UTC
Bug Details: https://nvd.nist.gov/vuln/detail/CVE-2020-10751
Type: Security Advisory
CVE: CVE-2020-10751
Score: 6.1
Patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ff

Analysis:
- This is a selinux cve which is addressed in kernel.
- The fix is available at [1].
- Hence, marking the CVE as patched.

Reference:
[1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ff

Signed-off-by: Madhu Marri <madmarri@cisco.com>
---
 recipes-security/selinux/selinux_common.inc | 2 ++
 1 file changed, 2 insertions(+)

Comments

Madhu Marri Feb. 3, 2025, 3:45 a.m. UTC | #1
Hi Team,

Could you please update on this patchset review.

Thanks
Madhu
Madhu Marri Feb. 28, 2025, 4:05 a.m. UTC | #2
Hi Team,

Any updates on the patch review.

Thanks
Madhu
Joe MacDonald March 7, 2025, 7:54 p.m. UTC | #3
Hi Madhu,

Sorry about the delay, it should be merged to the scarthgap branch now,
please have a look and let me know if there's any trouble.

Thanks.
-Joe.

[Re: [yocto-patches] [meta-selinux] [scarthgap] [PATCH] selinux: Mark CVE-2020-10751 as Patched] On 25.02.28 (Fri 04:05) Madhu Marri via lists.yoctoproject.org wrote:

> Hi Team,
> 
> Any updates on the patch review. 
> 
> Thanks
> Madhu
> 
> ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
> From: Madhu Marri -X (madmarri - E INFOCHIPS PRIVATE LIMITED at Cisco)
> <madmarri@cisco.com>
> Sent: Monday, February 3, 2025 9:15 AM
> To: yocto-patches@lists.yoctoproject.org <yocto-patches@lists.yoctoproject.org>
> Cc: xe-linux-external(mailer list) <xe-linux-external@cisco.com>
> Subject: Re: [meta-selinux] [scarthgap] [PATCH] selinux: Mark CVE-2020-10751 as
> Patched
>  
> Hi Team,
> 
> Could you please update on this patchset review. 
> 
> Thanks
> Madhu
> 
> ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
> From: Madhu Marri <madmarri@cisco.com>
> Sent: Monday, January 20, 2025 10:50 AM
> To: yocto-patches@lists.yoctoproject.org <yocto-patches@lists.yoctoproject.org>
> Cc: xe-linux-external(mailer list) <xe-linux-external@cisco.com>; Madhu Marri
> -X (madmarri - E INFOCHIPS PRIVATE LIMITED at Cisco) <madmarri@cisco.com>
> Subject: [meta-selinux] [scarthgap] [PATCH] selinux: Mark CVE-2020-10751 as
> Patched
>  
> Bug Details: https://nvd.nist.gov/vuln/detail/CVE-2020-10751
> Type: Security Advisory
> CVE: CVE-2020-10751
> Score: 6.1
> Patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
> commit/?id=fb73974172ff
> 
> Analysis:
> - This is a selinux cve which is addressed in kernel.
> - The fix is available at [1].
> - Hence, marking the CVE as patched.
> 
> Reference:
> [1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?
> id=fb73974172ff
> 
> Signed-off-by: Madhu Marri <madmarri@cisco.com>
> ---
>  recipes-security/selinux/selinux_common.inc | 2 ++
>  1 file changed, 2 insertions(+)
> 
> diff --git a/recipes-security/selinux/selinux_common.inc b/recipes-security/
> selinux/selinux_common.inc
> index cecb0b5..d8c91ac 100644
> --- a/recipes-security/selinux/selinux_common.inc
> +++ b/recipes-security/selinux/selinux_common.inc
> @@ -19,3 +19,5 @@ do_install() {
>  }
>  
>  CVE_PRODUCT ?= "kernel:selinux"
> +
> +CVE_STATUS[CVE-2020-10751] = "fixed-version: Fix is present in the current
> kernel version."
> --
> 2.44.1
> 
> _._,_._,_
> ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
> Links:
> 
> You receive all messages sent to this group.
> 
> View/Reply Online (#1136) | Reply to Group | Reply to Sender | Mute This Topic
> | New Topic
> Your Subscription | Contact Group Owner | Unsubscribe [joe@deserted.net]
> _._,_._,_
diff mbox series

Patch

diff --git a/recipes-security/selinux/selinux_common.inc b/recipes-security/selinux/selinux_common.inc
index cecb0b5..d8c91ac 100644
--- a/recipes-security/selinux/selinux_common.inc
+++ b/recipes-security/selinux/selinux_common.inc
@@ -19,3 +19,5 @@  do_install() {
 }
 
 CVE_PRODUCT ?= "kernel:selinux"
+
+CVE_STATUS[CVE-2020-10751] = "fixed-version: Fix is present in the current kernel version."