diff options
| author | Bruce Ashfield <bruce.ashfield@gmail.com> | 2025-08-13 16:49:16 -0400 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2025-08-14 10:31:11 +0100 |
| commit | 2a76e2027a7a0b0a0daa14434cffe2db1d74f599 (patch) | |
| tree | 80c61d657f97992df2c2e4e9ae80b5ca4ff056dd /meta | |
| parent | 7d70f3fd46d627f26e569d19ec2804ce2b028f21 (diff) | |
| download | poky-2a76e2027a7a0b0a0daa14434cffe2db1d74f599.tar.gz | |
linux-yocto/6.12: update CVE exclusions (6.12.39)
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 4 changes (1 new | 3 updated): - 1 new CVEs: CVE-2025-46002 - 3 updated CVEs: CVE-2025-5752, CVE-2025-6717, CVE-2025-7397
Date: Fri, 18 Jul 2025 14:11:28 +0000
]
(From OE-Core rev: a58b2c6f20ad6257036e144bee2eec1375e1a799)
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
| -rw-r--r-- | meta/recipes-kernel/linux/cve-exclusion_6.12.inc | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 02931bbf79..e428258bb1 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc | |||
| @@ -1,11 +1,11 @@ | |||
| 1 | 1 | ||
| 2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. | 2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. |
| 3 | # Generated at 2025-07-15 14:54:42.649263+00:00 for kernel version 6.12.38 | 3 | # Generated at 2025-07-18 14:17:49.367230+00:00 for kernel version 6.12.39 |
| 4 | # From linux_kernel_cves cve_2025-07-15_1400Z-4-gc77733e1fe6 | 4 | # From linux_kernel_cves cve_2025-07-18_1400Z |
| 5 | 5 | ||
| 6 | 6 | ||
| 7 | python check_kernel_cve_status_version() { | 7 | python check_kernel_cve_status_version() { |
| 8 | this_version = "6.12.38" | 8 | this_version = "6.12.39" |
| 9 | kernel_version = d.getVar("LINUX_VERSION") | 9 | kernel_version = d.getVar("LINUX_VERSION") |
| 10 | if kernel_version != this_version: | 10 | if kernel_version != this_version: |
| 11 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) | 11 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) |
| @@ -4132,7 +4132,7 @@ CVE_STATUS[CVE-2022-49962] = "fixed-version: Fixed from version 6.0" | |||
| 4132 | 4132 | ||
| 4133 | CVE_STATUS[CVE-2022-49963] = "fixed-version: Fixed from version 6.0" | 4133 | CVE_STATUS[CVE-2022-49963] = "fixed-version: Fixed from version 6.0" |
| 4134 | 4134 | ||
| 4135 | CVE_STATUS[CVE-2022-49964] = "fixed-version: Fixed from version 6.0" | 4135 | CVE_STATUS[CVE-2022-49964] = "fixed-version: Fixed from version 5.19.7" |
| 4136 | 4136 | ||
| 4137 | CVE_STATUS[CVE-2022-49965] = "fixed-version: Fixed from version 6.0" | 4137 | CVE_STATUS[CVE-2022-49965] = "fixed-version: Fixed from version 6.0" |
| 4138 | 4138 | ||
| @@ -5582,8 +5582,6 @@ CVE_STATUS[CVE-2023-52999] = "fixed-version: Fixed from version 6.2" | |||
| 5582 | 5582 | ||
| 5583 | CVE_STATUS[CVE-2023-53000] = "fixed-version: Fixed from version 6.2" | 5583 | CVE_STATUS[CVE-2023-53000] = "fixed-version: Fixed from version 6.2" |
| 5584 | 5584 | ||
| 5585 | CVE_STATUS[CVE-2023-53001] = "fixed-version: Fixed from version 6.2" | ||
| 5586 | |||
| 5587 | CVE_STATUS[CVE-2023-53002] = "fixed-version: Fixed from version 6.2" | 5585 | CVE_STATUS[CVE-2023-53002] = "fixed-version: Fixed from version 6.2" |
| 5588 | 5586 | ||
| 5589 | CVE_STATUS[CVE-2023-53003] = "fixed-version: Fixed from version 6.2" | 5587 | CVE_STATUS[CVE-2023-53003] = "fixed-version: Fixed from version 6.2" |
| @@ -13672,7 +13670,7 @@ CVE_STATUS[CVE-2025-38065] = "cpe-stable-backport: Backported in 6.12.31" | |||
| 13672 | 13670 | ||
| 13673 | CVE_STATUS[CVE-2025-38066] = "cpe-stable-backport: Backported in 6.12.31" | 13671 | CVE_STATUS[CVE-2025-38066] = "cpe-stable-backport: Backported in 6.12.31" |
| 13674 | 13672 | ||
| 13675 | # CVE-2025-38067 needs backporting (fixed from 6.15) | 13673 | CVE_STATUS[CVE-2025-38067] = "cpe-stable-backport: Backported in 6.12.39" |
| 13676 | 13674 | ||
| 13677 | CVE_STATUS[CVE-2025-38068] = "cpe-stable-backport: Backported in 6.12.31" | 13675 | CVE_STATUS[CVE-2025-38068] = "cpe-stable-backport: Backported in 6.12.31" |
| 13678 | 13676 | ||
| @@ -13746,7 +13744,7 @@ CVE_STATUS[CVE-2025-38102] = "cpe-stable-backport: Backported in 6.12.34" | |||
| 13746 | 13744 | ||
| 13747 | CVE_STATUS[CVE-2025-38103] = "cpe-stable-backport: Backported in 6.12.34" | 13745 | CVE_STATUS[CVE-2025-38103] = "cpe-stable-backport: Backported in 6.12.34" |
| 13748 | 13746 | ||
| 13749 | # CVE-2025-38104 needs backporting (fixed from 6.15) | 13747 | CVE_STATUS[CVE-2025-38104] = "cpe-stable-backport: Backported in 6.12.39" |
| 13750 | 13748 | ||
| 13751 | # CVE-2025-38105 needs backporting (fixed from 6.16rc1) | 13749 | # CVE-2025-38105 needs backporting (fixed from 6.16rc1) |
| 13752 | 13750 | ||
| @@ -14236,6 +14234,8 @@ CVE_STATUS[CVE-2025-38347] = "cpe-stable-backport: Backported in 6.12.35" | |||
| 14236 | 14234 | ||
| 14237 | CVE_STATUS[CVE-2025-38348] = "cpe-stable-backport: Backported in 6.12.35" | 14235 | CVE_STATUS[CVE-2025-38348] = "cpe-stable-backport: Backported in 6.12.35" |
| 14238 | 14236 | ||
| 14237 | CVE_STATUS[CVE-2025-38349] = "cpe-stable-backport: Backported in 6.12.39" | ||
| 14238 | |||
| 14239 | CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23" | 14239 | CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23" |
| 14240 | 14240 | ||
| 14241 | CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23" | 14241 | CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23" |
