diff options
author | Bruce Ashfield <bruce.ashfield@gmail.com> | 2024-01-03 16:24:21 -0500 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2024-01-31 04:10:24 -1000 |
commit | 63520bce8f74d046a122620fe2b616b41f04265c (patch) | |
tree | 888ebc2f4631963cedf0b103d61f609cf324e787 /meta | |
parent | e091288ef9d003638f640bbf018684373101186f (diff) | |
download | poky-63520bce8f74d046a122620fe2b616b41f04265c.tar.gz |
linux-yocto/6.1: update CVE exclusions
Data pulled from: https://github.com/nluedtke/linux_kernel_cves
1/1 [
Author: Nicholas Luedtke
Email: nicholas.luedtke@uwalumni.com
Subject: Update 27Dec23
Date: Wed, 27 Dec 2023 19:47:13 -0500
]
(From OE-Core rev: 31dc2d2952a15df902cef3755f9db4d5f2bd9944)
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
(cherry picked from commit b303a7dd260ad3f6a9e6f1b8099b86efcc8373a9)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta')
-rw-r--r-- | meta/recipes-kernel/linux/cve-exclusion_6.1.inc | 44 |
1 files changed, 40 insertions, 4 deletions
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc index 1b51737c7d..0bf7edbce8 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc | |||
@@ -1,9 +1,9 @@ | |||
1 | 1 | ||
2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. | 2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. |
3 | # Generated at 2023-12-23 08:44:42.304531+00:00 for version 6.1.68 | 3 | # Generated at 2024-01-03 21:24:21.156991+00:00 for version 6.1.70 |
4 | 4 | ||
5 | python check_kernel_cve_status_version() { | 5 | python check_kernel_cve_status_version() { |
6 | this_version = "6.1.68" | 6 | this_version = "6.1.70" |
7 | kernel_version = d.getVar("LINUX_VERSION") | 7 | kernel_version = d.getVar("LINUX_VERSION") |
8 | if kernel_version != this_version: | 8 | if kernel_version != this_version: |
9 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) | 9 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) |
@@ -5106,11 +5106,21 @@ CVE_STATUS[CVE-2023-4881] = "cpe-stable-backport: Backported in 6.1.54" | |||
5106 | 5106 | ||
5107 | CVE_STATUS[CVE-2023-4921] = "cpe-stable-backport: Backported in 6.1.54" | 5107 | CVE_STATUS[CVE-2023-4921] = "cpe-stable-backport: Backported in 6.1.54" |
5108 | 5108 | ||
5109 | # CVE-2023-50431 has no known resolution | ||
5110 | |||
5109 | CVE_STATUS[CVE-2023-5090] = "cpe-stable-backport: Backported in 6.1.62" | 5111 | CVE_STATUS[CVE-2023-5090] = "cpe-stable-backport: Backported in 6.1.62" |
5110 | 5112 | ||
5111 | CVE_STATUS[CVE-2023-5158] = "cpe-stable-backport: Backported in 6.1.57" | 5113 | CVE_STATUS[CVE-2023-5158] = "cpe-stable-backport: Backported in 6.1.57" |
5112 | 5114 | ||
5113 | # CVE-2023-5178 needs backporting (fixed from 6.1.60) | 5115 | # CVE-2023-51779 needs backporting (fixed from 6.7rc7) |
5116 | |||
5117 | CVE_STATUS[CVE-2023-5178] = "cpe-stable-backport: Backported in 6.1.60" | ||
5118 | |||
5119 | CVE_STATUS[CVE-2023-51780] = "cpe-stable-backport: Backported in 6.1.69" | ||
5120 | |||
5121 | CVE_STATUS[CVE-2023-51781] = "cpe-stable-backport: Backported in 6.1.69" | ||
5122 | |||
5123 | CVE_STATUS[CVE-2023-51782] = "cpe-stable-backport: Backported in 6.1.69" | ||
5114 | 5124 | ||
5115 | CVE_STATUS[CVE-2023-5197] = "cpe-stable-backport: Backported in 6.1.56" | 5125 | CVE_STATUS[CVE-2023-5197] = "cpe-stable-backport: Backported in 6.1.56" |
5116 | 5126 | ||
@@ -5120,7 +5130,7 @@ CVE_STATUS[CVE-2023-5633] = "fixed-version: only affects 6.2 onwards" | |||
5120 | 5130 | ||
5121 | # CVE-2023-5717 needs backporting (fixed from 6.1.60) | 5131 | # CVE-2023-5717 needs backporting (fixed from 6.1.60) |
5122 | 5132 | ||
5123 | # CVE-2023-5972 needs backporting (fixed from 6.6rc7) | 5133 | CVE_STATUS[CVE-2023-5972] = "fixed-version: only affects 6.2rc1 onwards" |
5124 | 5134 | ||
5125 | # CVE-2023-6039 needs backporting (fixed from 6.5rc5) | 5135 | # CVE-2023-6039 needs backporting (fixed from 6.5rc5) |
5126 | 5136 | ||
@@ -5132,3 +5142,29 @@ CVE_STATUS[CVE-2023-6176] = "cpe-stable-backport: Backported in 6.1.54" | |||
5132 | 5142 | ||
5133 | # CVE-2023-6238 has no known resolution | 5143 | # CVE-2023-6238 has no known resolution |
5134 | 5144 | ||
5145 | # CVE-2023-6356 has no known resolution | ||
5146 | |||
5147 | # CVE-2023-6535 has no known resolution | ||
5148 | |||
5149 | # CVE-2023-6536 has no known resolution | ||
5150 | |||
5151 | CVE_STATUS[CVE-2023-6546] = "cpe-stable-backport: Backported in 6.1.47" | ||
5152 | |||
5153 | # CVE-2023-6560 needs backporting (fixed from 6.7rc4) | ||
5154 | |||
5155 | # CVE-2023-6606 needs backporting (fixed from 6.7rc7) | ||
5156 | |||
5157 | # CVE-2023-6610 needs backporting (fixed from 6.7rc7) | ||
5158 | |||
5159 | CVE_STATUS[CVE-2023-6622] = "cpe-stable-backport: Backported in 6.1.68" | ||
5160 | |||
5161 | # CVE-2023-6679 needs backporting (fixed from 6.7rc6) | ||
5162 | |||
5163 | CVE_STATUS[CVE-2023-6817] = "cpe-stable-backport: Backported in 6.1.68" | ||
5164 | |||
5165 | CVE_STATUS[CVE-2023-6931] = "cpe-stable-backport: Backported in 6.1.68" | ||
5166 | |||
5167 | CVE_STATUS[CVE-2023-6932] = "cpe-stable-backport: Backported in 6.1.66" | ||
5168 | |||
5169 | # CVE-2023-7042 has no known resolution | ||
5170 | |||