diff options
| author | Bruce Ashfield <bruce.ashfield@gmail.com> | 2024-02-06 15:53:31 -0500 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2024-02-08 10:59:06 +0000 |
| commit | e5f760b26fc3f0b9e46aacd5fbb10ce81c3ec3b7 (patch) | |
| tree | 8771ae2c823c093e34519109bb721bd82c5abfb0 /meta | |
| parent | 7483b2fe7fcc64bad1cb12c97e85e90bbbc32f35 (diff) | |
| download | poky-e5f760b26fc3f0b9e46aacd5fbb10ce81c3ec3b7.tar.gz | |
linux-yocto/6.6: update CVE exclusions
Data pulled from: https://github.com/nluedtke/linux_kernel_cves
1/1 [
Author: Nicholas Luedtke
Email: nicholas.luedtke@uwalumni.com
Subject: Update 15Jan24
Date: Mon, 15 Jan 2024 12:48:45 -0500
]
(From OE-Core rev: 619a16f974ce838baaa864054261e879a7f7e924)
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta')
| -rw-r--r-- | meta/recipes-kernel/linux/cve-exclusion_6.6.inc | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc index 3a4451b6f8..9398434082 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc | |||
| @@ -1,9 +1,9 @@ | |||
| 1 | 1 | ||
| 2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. | 2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. |
| 3 | # Generated at 2024-01-18 21:07:26.764606+00:00 for version 6.6.12 | 3 | # Generated at 2024-01-25 01:32:27.591716+00:00 for version 6.6.13 |
| 4 | 4 | ||
| 5 | python check_kernel_cve_status_version() { | 5 | python check_kernel_cve_status_version() { |
| 6 | this_version = "6.6.12" | 6 | this_version = "6.6.13" |
| 7 | kernel_version = d.getVar("LINUX_VERSION") | 7 | kernel_version = d.getVar("LINUX_VERSION") |
| 8 | if kernel_version != this_version: | 8 | if kernel_version != this_version: |
| 9 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) | 9 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) |
