diff mbox series

[meta-selinux,v1] selinux_common: Correct `CVE_PRODUCT` value

Message ID 20260309090953.1399082-1-hetpat@cisco.com
State New
Headers show
Series [meta-selinux,v1] selinux_common: Correct `CVE_PRODUCT` value | expand

Commit Message

From: Het Patel <hetpat@cisco.com>

The current `CVE_PRODUCT` value (`kernel:selinux`) is incorrect for
this recipe.

Root Cause Analysis:
`CVE-2020-10751` is reported against the `kernel:selinux` CPE, and
its fix (https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ff)
applies to the Linux kernel source tree. This change is unrelated to
the source code used by this recipe.

Change Justification:
`CVE-2021-36084` is reported against the `selinux_project:selinux`
CPE. Its fix (https://github.com/SELinuxProject/selinux/commit/f34d3d30c832)
directly applies to the SELinux source repository used by this recipe,
confirming the vulnerability is applicable to this product.

Based on this analysis, `CVE_PRODUCT` has been updated to the
correct value: `selinux_project:selinux`

Signed-off-by: Het Patel <hetpat@cisco.com>
---
 recipes-security/selinux/selinux_common.inc | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
diff mbox series

Patch

diff --git a/recipes-security/selinux/selinux_common.inc b/recipes-security/selinux/selinux_common.inc
index a7f704d..aaf0b90 100644
--- a/recipes-security/selinux/selinux_common.inc
+++ b/recipes-security/selinux/selinux_common.inc
@@ -20,4 +20,4 @@  do_install() {
         SHLIBDIR="${base_libdir}"
 }
 
-CVE_PRODUCT ?= "kernel:selinux"
+CVE_PRODUCT ?= "selinux_project:selinux"