summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBruce Ashfield <bruce.ashfield@gmail.com>2025-08-13 16:49:18 -0400
committerSteve Sakoman <steve@sakoman.com>2025-09-22 12:21:23 -0700
commitbc47b236c487fc01b5aca264b801ed80e2f99e9a (patch)
tree914c2452f57606b44370bf4918064b30e2e81b5c
parent487e8c7de1b644ab4ecc6787dd79f31a36b707a2 (diff)
downloadpoky-bc47b236c487fc01b5aca264b801ed80e2f99e9a.tar.gz
linux-yocto/6.12: update CVE exclusions (6.12.40)
Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 4 changes (1 new | 3 updated): - 1 new CVEs: CVE-2025-8126 - 3 updated CVEs: CVE-2025-31952, CVE-2025-31953, CVE-2025-31955 Date: Fri, 25 Jul 2025 02:18:30 +0000 ] (From OE-Core rev: 3dfad0c48a5b60bc9dd7c96c07ed914b020c463e) Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit e504bd7a9e908be0937d6fc9f6b9699b0acdc2aa) Signed-off-by: Steve Sakoman <steve@sakoman.com>
-rw-r--r--meta/recipes-kernel/linux/cve-exclusion_6.12.inc14
1 files changed, 10 insertions, 4 deletions
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
index b408071a67..127350ca58 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
@@ -1,12 +1,12 @@
1 1
2# Auto-generated CVE metadata, DO NOT EDIT BY HAND. 2# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
3# Generated at 2025-07-18 14:17:49.367230+00:00 for kernel version 6.12.39 3# Generated at 2025-07-25 02:49:32.259439+00:00 for kernel version 6.12.40
4# From linux_kernel_cves cve_2025-07-18_1400Z 4# From linux_kernel_cves cve_2025-07-25_0100Z-1-g854b2f05e2c
5 5
6 6
7 7
8python check_kernel_cve_status_version() { 8python check_kernel_cve_status_version() {
9 this_version = "6.12.39" 9 this_version = "6.12.40"
10 kernel_version = d.getVar("LINUX_VERSION") 10 kernel_version = d.getVar("LINUX_VERSION")
11 if kernel_version != this_version: 11 if kernel_version != this_version:
12 bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) 12 bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -12939,7 +12939,7 @@ CVE_STATUS[CVE-2025-22112] = "cpe-stable-backport: Backported in 6.12.35"
12939 12939
12940CVE_STATUS[CVE-2025-22114] = "fixed-version: only affects 6.14 onwards" 12940CVE_STATUS[CVE-2025-22114] = "fixed-version: only affects 6.14 onwards"
12941 12941
12942# CVE-2025-22115 needs backporting (fixed from 6.15) 12942CVE_STATUS[CVE-2025-22115] = "cpe-stable-backport: Backported in 6.12.40"
12943 12943
12944# CVE-2025-22116 needs backporting (fixed from 6.15) 12944# CVE-2025-22116 needs backporting (fixed from 6.15)
12945 12945
@@ -14237,6 +14237,12 @@ CVE_STATUS[CVE-2025-38348] = "cpe-stable-backport: Backported in 6.12.35"
14237 14237
14238CVE_STATUS[CVE-2025-38349] = "cpe-stable-backport: Backported in 6.12.39" 14238CVE_STATUS[CVE-2025-38349] = "cpe-stable-backport: Backported in 6.12.39"
14239 14239
14240CVE_STATUS[CVE-2025-38350] = "cpe-stable-backport: Backported in 6.12.37"
14241
14242# CVE-2025-38351 needs backporting (fixed from 6.16rc6)
14243
14244CVE_STATUS[CVE-2025-38352] = "cpe-stable-backport: Backported in 6.12.34"
14245
14240CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23" 14246CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23"
14241 14247
14242CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23" 14248CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23"