diff options
| author | Ross Burton <ross.burton@arm.com> | 2023-07-04 14:32:51 +0100 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2023-07-10 11:36:34 +0100 |
| commit | b2fdcd72a9d69f0d205176336fea5e91ffb6a240 (patch) | |
| tree | 8215ebd2d6b6ddb308450462ceee2db1f9e99c12 | |
| parent | 2ff5c043d732abc7a8ba1dc324ab4747bd0e9299 (diff) | |
| download | poky-b2fdcd72a9d69f0d205176336fea5e91ffb6a240.tar.gz | |
linux-yocto/cve-exclusion: ignore more backported CVEs
(From OE-Core rev: 278503d1d335707f85ad79aea3a7a3af0c80a843)
Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
| -rw-r--r-- | meta/recipes-kernel/linux/cve-exclusion_6.1.inc | 44 |
1 files changed, 44 insertions, 0 deletions
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc index 6717cbeeeb..49b4159b34 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc | |||
| @@ -13,6 +13,9 @@ CVE_CHECK_IGNORE += "CVE-2019-3819" | |||
| 13 | # Fixed with 5.2 | 13 | # Fixed with 5.2 |
| 14 | CVE_CHECK_IGNORE += "CVE-2019-3887" | 14 | CVE_CHECK_IGNORE += "CVE-2019-3887" |
| 15 | 15 | ||
| 16 | # This is specific to aufs, which is not in linux-yocto | ||
| 17 | CVE_CHECK_IGNORE += "CVE-2020-11935" | ||
| 18 | |||
| 16 | # https://nvd.nist.gov/vuln/detail/CVE-2020-27784 | 19 | # https://nvd.nist.gov/vuln/detail/CVE-2020-27784 |
| 17 | # Introduced in version v4.1 b26394bd567e5ebe57ec4dee7fe6cd14023c96e9 | 20 | # Introduced in version v4.1 b26394bd567e5ebe57ec4dee7fe6cd14023c96e9 |
| 18 | # Patched in kernel since v5.10 e8d5f92b8d30bb4ade76494490c3c065e12411b1 | 21 | # Patched in kernel since v5.10 e8d5f92b8d30bb4ade76494490c3c065e12411b1 |
| @@ -336,6 +339,8 @@ CVE_CHECK_IGNORE += "CVE-2022-42896" | |||
| 336 | # * https://lore.kernel.org/all/CAODzB9q3OBD0k6W2bcWrSZo2jC3EvV0PrLyWmO07rxR4nQgkJA@mail.gmail.com/T/ | 339 | # * https://lore.kernel.org/all/CAODzB9q3OBD0k6W2bcWrSZo2jC3EvV0PrLyWmO07rxR4nQgkJA@mail.gmail.com/T/ |
| 337 | CVE_CHECK_IGNORE += "CVE-2022-38457 CVE-2022-40133" | 340 | CVE_CHECK_IGNORE += "CVE-2022-38457 CVE-2022-40133" |
| 338 | 341 | ||
| 342 | # Backported to 6.1.33 | ||
| 343 | CVE_CHECK_IGNORE += "CVE-2022-48425" | ||
| 339 | 344 | ||
| 340 | # 2023 | 345 | # 2023 |
| 341 | 346 | ||
| @@ -514,6 +519,9 @@ CVE_CHECK_IGNORE += "CVE-2023-1998" | |||
| 514 | # Fixed in 6.1.27 | 519 | # Fixed in 6.1.27 |
| 515 | CVE_CHECK_IGNORE += "CVE-2023-2002" | 520 | CVE_CHECK_IGNORE += "CVE-2023-2002" |
| 516 | 521 | ||
| 522 | # Backported to 6.1.33 | ||
| 523 | CVE_CHECK_IGNORE += "CVE-2023-2124" | ||
| 524 | |||
| 517 | # https://www.linuxkernelcves.com/cves/CVE-2023-2156 | 525 | # https://www.linuxkernelcves.com/cves/CVE-2023-2156 |
| 518 | # Fixed in 6.1.26 | 526 | # Fixed in 6.1.26 |
| 519 | CVE_CHECK_IGNORE += "CVE-2023-2156" | 527 | CVE_CHECK_IGNORE += "CVE-2023-2156" |
| @@ -537,6 +545,21 @@ CVE_CHECK_IGNORE += "CVE-2023-2985" | |||
| 537 | # Backported to 6.1.30 as 9a342d4 | 545 | # Backported to 6.1.30 as 9a342d4 |
| 538 | CVE_CHECK_IGNORE += "CVE-2023-3141" | 546 | CVE_CHECK_IGNORE += "CVE-2023-3141" |
| 539 | 547 | ||
| 548 | # Backported to 6.1.11 | ||
| 549 | CVE_CHECK_IGNORE += "CVE-2023-3161" | ||
| 550 | |||
| 551 | # Backported to 6.1.33 | ||
| 552 | CVE_CHECK_IGNORE += "CVE-2023-3212" | ||
| 553 | |||
| 554 | # Only in 6.2.0 to 6.2.14, and 6.3.0 to 6.3.1 | ||
| 555 | CVE_CHECK_IGNORE += "CVE-2023-3312" | ||
| 556 | |||
| 557 | # Backported to 6.1.16 | ||
| 558 | CVE_CHECK_IGNORE += "CVE-2023-3220" | ||
| 559 | |||
| 560 | # Backported to 6.1.28 | ||
| 561 | CVE_CHECK_IGNORE += "CVE-2023-3268" | ||
| 562 | |||
| 540 | # https://nvd.nist.gov/vuln/detail/CVE-2023-23005 | 563 | # https://nvd.nist.gov/vuln/detail/CVE-2023-23005 |
| 541 | # Introduced in version v6.1 7b88bda3761b95856cf97822efe8281c8100067b | 564 | # Introduced in version v6.1 7b88bda3761b95856cf97822efe8281c8100067b |
| 542 | # Patched in kernel since v6.2 4a625ceee8a0ab0273534cb6b432ce6b331db5ee | 565 | # Patched in kernel since v6.2 4a625ceee8a0ab0273534cb6b432ce6b331db5ee |
| @@ -551,6 +574,9 @@ CVE_CHECK_IGNORE += "CVE-2023-23005" | |||
| 551 | # Fixed with 6.1.2 | 574 | # Fixed with 6.1.2 |
| 552 | CVE_CHECK_IGNORE += "CVE-2023-28328" | 575 | CVE_CHECK_IGNORE += "CVE-2023-28328" |
| 553 | 576 | ||
| 577 | # Only in 6.3-rc | ||
| 578 | CVE_CHECK_IGNORE += "CVE-2023-28464" | ||
| 579 | |||
| 554 | # https://nvd.nist.gov/vuln/detail/CVE-2023-28466 | 580 | # https://nvd.nist.gov/vuln/detail/CVE-2023-28466 |
| 555 | # Introduced in version v4.13 3c4d7559159bfe1e3b94df3a657b2cda3a34e218 | 581 | # Introduced in version v4.13 3c4d7559159bfe1e3b94df3a657b2cda3a34e218 |
| 556 | # Patched in kernel since v6.3-rc2 49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962 | 582 | # Patched in kernel since v6.3-rc2 49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962 |
| @@ -590,3 +616,21 @@ CVE_CHECK_IGNORE += "CVE-2023-33288" | |||
| 590 | # https://www.linuxkernelcves.com/cves/CVE-2023-34256 | 616 | # https://www.linuxkernelcves.com/cves/CVE-2023-34256 |
| 591 | # Fixed in 6.1.29 | 617 | # Fixed in 6.1.29 |
| 592 | CVE_CHECK_IGNORE += "CVE-2023-34256" | 618 | CVE_CHECK_IGNORE += "CVE-2023-34256" |
| 619 | |||
| 620 | # Backported to 6.1.28 | ||
| 621 | CVE_CHECK_IGNORE += "CVE-2023-35823" | ||
| 622 | |||
| 623 | # Backported to 6.1.28 | ||
| 624 | CVE_CHECK_IGNORE += "CVE-2023-35824" | ||
| 625 | |||
| 626 | # Backported to 6.1.28 | ||
| 627 | CVE_CHECK_IGNORE += "CVE-2023-35826" | ||
| 628 | |||
| 629 | # Backported to 6.1.28 | ||
| 630 | CVE_CHECK_IGNORE += "CVE-2023-35828" | ||
| 631 | |||
| 632 | # Backported to 6.1.28 | ||
| 633 | CVE_CHECK_IGNORE += "CVE-2023-35829" | ||
| 634 | |||
| 635 | # Backported to 6.1.33 | ||
| 636 | CVE_CHECK_IGNORE += "CVE-2023-35788" | ||
