diff options
author | Bruce Ashfield <bruce.ashfield@gmail.com> | 2025-08-13 16:49:18 -0400 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2025-09-22 12:21:23 -0700 |
commit | bc47b236c487fc01b5aca264b801ed80e2f99e9a (patch) | |
tree | 914c2452f57606b44370bf4918064b30e2e81b5c | |
parent | 487e8c7de1b644ab4ecc6787dd79f31a36b707a2 (diff) | |
download | poky-bc47b236c487fc01b5aca264b801ed80e2f99e9a.tar.gz |
linux-yocto/6.12: update CVE exclusions (6.12.40)
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 4 changes (1 new | 3 updated): - 1 new CVEs: CVE-2025-8126 - 3 updated CVEs: CVE-2025-31952, CVE-2025-31953, CVE-2025-31955
Date: Fri, 25 Jul 2025 02:18:30 +0000
]
(From OE-Core rev: 3dfad0c48a5b60bc9dd7c96c07ed914b020c463e)
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit e504bd7a9e908be0937d6fc9f6b9699b0acdc2aa)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
-rw-r--r-- | meta/recipes-kernel/linux/cve-exclusion_6.12.inc | 14 |
1 files changed, 10 insertions, 4 deletions
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index b408071a67..127350ca58 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc | |||
@@ -1,12 +1,12 @@ | |||
1 | 1 | ||
2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. | 2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. |
3 | # Generated at 2025-07-18 14:17:49.367230+00:00 for kernel version 6.12.39 | 3 | # Generated at 2025-07-25 02:49:32.259439+00:00 for kernel version 6.12.40 |
4 | # From linux_kernel_cves cve_2025-07-18_1400Z | 4 | # From linux_kernel_cves cve_2025-07-25_0100Z-1-g854b2f05e2c |
5 | 5 | ||
6 | 6 | ||
7 | 7 | ||
8 | python check_kernel_cve_status_version() { | 8 | python check_kernel_cve_status_version() { |
9 | this_version = "6.12.39" | 9 | this_version = "6.12.40" |
10 | kernel_version = d.getVar("LINUX_VERSION") | 10 | kernel_version = d.getVar("LINUX_VERSION") |
11 | if kernel_version != this_version: | 11 | if kernel_version != this_version: |
12 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) | 12 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) |
@@ -12939,7 +12939,7 @@ CVE_STATUS[CVE-2025-22112] = "cpe-stable-backport: Backported in 6.12.35" | |||
12939 | 12939 | ||
12940 | CVE_STATUS[CVE-2025-22114] = "fixed-version: only affects 6.14 onwards" | 12940 | CVE_STATUS[CVE-2025-22114] = "fixed-version: only affects 6.14 onwards" |
12941 | 12941 | ||
12942 | # CVE-2025-22115 needs backporting (fixed from 6.15) | 12942 | CVE_STATUS[CVE-2025-22115] = "cpe-stable-backport: Backported in 6.12.40" |
12943 | 12943 | ||
12944 | # CVE-2025-22116 needs backporting (fixed from 6.15) | 12944 | # CVE-2025-22116 needs backporting (fixed from 6.15) |
12945 | 12945 | ||
@@ -14237,6 +14237,12 @@ CVE_STATUS[CVE-2025-38348] = "cpe-stable-backport: Backported in 6.12.35" | |||
14237 | 14237 | ||
14238 | CVE_STATUS[CVE-2025-38349] = "cpe-stable-backport: Backported in 6.12.39" | 14238 | CVE_STATUS[CVE-2025-38349] = "cpe-stable-backport: Backported in 6.12.39" |
14239 | 14239 | ||
14240 | CVE_STATUS[CVE-2025-38350] = "cpe-stable-backport: Backported in 6.12.37" | ||
14241 | |||
14242 | # CVE-2025-38351 needs backporting (fixed from 6.16rc6) | ||
14243 | |||
14244 | CVE_STATUS[CVE-2025-38352] = "cpe-stable-backport: Backported in 6.12.34" | ||
14245 | |||
14240 | CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23" | 14246 | CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23" |
14241 | 14247 | ||
14242 | CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23" | 14248 | CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23" |