diff options
| author | Bruce Ashfield <bruce.ashfield@gmail.com> | 2024-05-02 22:52:30 -0400 |
|---|---|---|
| committer | Steve Sakoman <steve@sakoman.com> | 2024-05-15 09:44:14 -0700 |
| commit | bd0795ed5a55f43bcb575be83815b84b40d57296 (patch) | |
| tree | ae727f40dc04fdcde94329799e492366b6a9b791 /meta/recipes-kernel | |
| parent | f90f4e8d92a03a197a4638c8288778ea30932e28 (diff) | |
| download | poky-bd0795ed5a55f43bcb575be83815b84b40d57296.tar.gz | |
linux-yocto/5.15: update CVE exclusions (5.15.151)
Data pulled from: https://github.com/nluedtke/linux_kernel_cves
1/1 [
Author: Nicholas Luedtke
Email: nicholas.luedtke@uwalumni.com
Subject: Update 25Feb24
Date: Sun, 25 Feb 2024 07:03:08 -0500
]
(From OE-Core rev: a77933a5a677add08a4f7b102a7ea839bb6be7dc)
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta/recipes-kernel')
| -rw-r--r-- | meta/recipes-kernel/linux/cve-exclusion_5.15.inc | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/meta/recipes-kernel/linux/cve-exclusion_5.15.inc b/meta/recipes-kernel/linux/cve-exclusion_5.15.inc index 922d7f457f..32e066bda4 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_5.15.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_5.15.inc | |||
| @@ -1,9 +1,9 @@ | |||
| 1 | 1 | ||
| 2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. | 2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. |
| 3 | # Generated at 2024-03-08 10:36:30.059302 for version 5.15.150 | 3 | # Generated at 2024-03-12 23:12:55.402667 for version 5.15.151 |
| 4 | 4 | ||
| 5 | python check_kernel_cve_status_version() { | 5 | python check_kernel_cve_status_version() { |
| 6 | this_version = "5.15.150" | 6 | this_version = "5.15.151" |
| 7 | kernel_version = d.getVar("LINUX_VERSION") | 7 | kernel_version = d.getVar("LINUX_VERSION") |
| 8 | if kernel_version != this_version: | 8 | if kernel_version != this_version: |
| 9 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) | 9 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) |
