diff options
| author | Bruce Ashfield <bruce.ashfield@gmail.com> | 2024-01-03 16:24:21 -0500 |
|---|---|---|
| committer | Steve Sakoman <steve@sakoman.com> | 2024-01-31 04:10:24 -1000 |
| commit | 63520bce8f74d046a122620fe2b616b41f04265c (patch) | |
| tree | 888ebc2f4631963cedf0b103d61f609cf324e787 | |
| parent | e091288ef9d003638f640bbf018684373101186f (diff) | |
| download | poky-63520bce8f74d046a122620fe2b616b41f04265c.tar.gz | |
linux-yocto/6.1: update CVE exclusions
Data pulled from: https://github.com/nluedtke/linux_kernel_cves
1/1 [
Author: Nicholas Luedtke
Email: nicholas.luedtke@uwalumni.com
Subject: Update 27Dec23
Date: Wed, 27 Dec 2023 19:47:13 -0500
]
(From OE-Core rev: 31dc2d2952a15df902cef3755f9db4d5f2bd9944)
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
(cherry picked from commit b303a7dd260ad3f6a9e6f1b8099b86efcc8373a9)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
| -rw-r--r-- | meta/recipes-kernel/linux/cve-exclusion_6.1.inc | 44 |
1 files changed, 40 insertions, 4 deletions
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc index 1b51737c7d..0bf7edbce8 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc | |||
| @@ -1,9 +1,9 @@ | |||
| 1 | 1 | ||
| 2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. | 2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. |
| 3 | # Generated at 2023-12-23 08:44:42.304531+00:00 for version 6.1.68 | 3 | # Generated at 2024-01-03 21:24:21.156991+00:00 for version 6.1.70 |
| 4 | 4 | ||
| 5 | python check_kernel_cve_status_version() { | 5 | python check_kernel_cve_status_version() { |
| 6 | this_version = "6.1.68" | 6 | this_version = "6.1.70" |
| 7 | kernel_version = d.getVar("LINUX_VERSION") | 7 | kernel_version = d.getVar("LINUX_VERSION") |
| 8 | if kernel_version != this_version: | 8 | if kernel_version != this_version: |
| 9 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) | 9 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) |
| @@ -5106,11 +5106,21 @@ CVE_STATUS[CVE-2023-4881] = "cpe-stable-backport: Backported in 6.1.54" | |||
| 5106 | 5106 | ||
| 5107 | CVE_STATUS[CVE-2023-4921] = "cpe-stable-backport: Backported in 6.1.54" | 5107 | CVE_STATUS[CVE-2023-4921] = "cpe-stable-backport: Backported in 6.1.54" |
| 5108 | 5108 | ||
| 5109 | # CVE-2023-50431 has no known resolution | ||
| 5110 | |||
| 5109 | CVE_STATUS[CVE-2023-5090] = "cpe-stable-backport: Backported in 6.1.62" | 5111 | CVE_STATUS[CVE-2023-5090] = "cpe-stable-backport: Backported in 6.1.62" |
| 5110 | 5112 | ||
| 5111 | CVE_STATUS[CVE-2023-5158] = "cpe-stable-backport: Backported in 6.1.57" | 5113 | CVE_STATUS[CVE-2023-5158] = "cpe-stable-backport: Backported in 6.1.57" |
| 5112 | 5114 | ||
| 5113 | # CVE-2023-5178 needs backporting (fixed from 6.1.60) | 5115 | # CVE-2023-51779 needs backporting (fixed from 6.7rc7) |
| 5116 | |||
| 5117 | CVE_STATUS[CVE-2023-5178] = "cpe-stable-backport: Backported in 6.1.60" | ||
| 5118 | |||
| 5119 | CVE_STATUS[CVE-2023-51780] = "cpe-stable-backport: Backported in 6.1.69" | ||
| 5120 | |||
| 5121 | CVE_STATUS[CVE-2023-51781] = "cpe-stable-backport: Backported in 6.1.69" | ||
| 5122 | |||
| 5123 | CVE_STATUS[CVE-2023-51782] = "cpe-stable-backport: Backported in 6.1.69" | ||
| 5114 | 5124 | ||
| 5115 | CVE_STATUS[CVE-2023-5197] = "cpe-stable-backport: Backported in 6.1.56" | 5125 | CVE_STATUS[CVE-2023-5197] = "cpe-stable-backport: Backported in 6.1.56" |
| 5116 | 5126 | ||
| @@ -5120,7 +5130,7 @@ CVE_STATUS[CVE-2023-5633] = "fixed-version: only affects 6.2 onwards" | |||
| 5120 | 5130 | ||
| 5121 | # CVE-2023-5717 needs backporting (fixed from 6.1.60) | 5131 | # CVE-2023-5717 needs backporting (fixed from 6.1.60) |
| 5122 | 5132 | ||
| 5123 | # CVE-2023-5972 needs backporting (fixed from 6.6rc7) | 5133 | CVE_STATUS[CVE-2023-5972] = "fixed-version: only affects 6.2rc1 onwards" |
| 5124 | 5134 | ||
| 5125 | # CVE-2023-6039 needs backporting (fixed from 6.5rc5) | 5135 | # CVE-2023-6039 needs backporting (fixed from 6.5rc5) |
| 5126 | 5136 | ||
| @@ -5132,3 +5142,29 @@ CVE_STATUS[CVE-2023-6176] = "cpe-stable-backport: Backported in 6.1.54" | |||
| 5132 | 5142 | ||
| 5133 | # CVE-2023-6238 has no known resolution | 5143 | # CVE-2023-6238 has no known resolution |
| 5134 | 5144 | ||
| 5145 | # CVE-2023-6356 has no known resolution | ||
| 5146 | |||
| 5147 | # CVE-2023-6535 has no known resolution | ||
| 5148 | |||
| 5149 | # CVE-2023-6536 has no known resolution | ||
| 5150 | |||
| 5151 | CVE_STATUS[CVE-2023-6546] = "cpe-stable-backport: Backported in 6.1.47" | ||
| 5152 | |||
| 5153 | # CVE-2023-6560 needs backporting (fixed from 6.7rc4) | ||
| 5154 | |||
| 5155 | # CVE-2023-6606 needs backporting (fixed from 6.7rc7) | ||
| 5156 | |||
| 5157 | # CVE-2023-6610 needs backporting (fixed from 6.7rc7) | ||
| 5158 | |||
| 5159 | CVE_STATUS[CVE-2023-6622] = "cpe-stable-backport: Backported in 6.1.68" | ||
| 5160 | |||
| 5161 | # CVE-2023-6679 needs backporting (fixed from 6.7rc6) | ||
| 5162 | |||
| 5163 | CVE_STATUS[CVE-2023-6817] = "cpe-stable-backport: Backported in 6.1.68" | ||
| 5164 | |||
| 5165 | CVE_STATUS[CVE-2023-6931] = "cpe-stable-backport: Backported in 6.1.68" | ||
| 5166 | |||
| 5167 | CVE_STATUS[CVE-2023-6932] = "cpe-stable-backport: Backported in 6.1.66" | ||
| 5168 | |||
| 5169 | # CVE-2023-7042 has no known resolution | ||
| 5170 | |||
