diff options
| -rw-r--r-- | meta/recipes-kernel/linux/cve-exclusion_6.1.inc | 8 | ||||
| -rw-r--r-- | meta/recipes-kernel/linux/cve-exclusion_6.4.inc | 8 |
2 files changed, 8 insertions, 8 deletions
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc index 5988327103..41ee8bcad5 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc | |||
| @@ -1,9 +1,9 @@ | |||
| 1 | 1 | ||
| 2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. | 2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. |
| 3 | # Generated at 2023-09-05 05:17:33.070404+00:00 for version 6.1.46 | 3 | # Generated at 2023-09-07 15:29:54.983415+00:00 for version 6.1.51 |
| 4 | 4 | ||
| 5 | python check_kernel_cve_status_version() { | 5 | python check_kernel_cve_status_version() { |
| 6 | this_version = "6.1.46" | 6 | this_version = "6.1.51" |
| 7 | kernel_version = d.getVar("LINUX_VERSION") | 7 | kernel_version = d.getVar("LINUX_VERSION") |
| 8 | if kernel_version != this_version: | 8 | if kernel_version != this_version: |
| 9 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) | 9 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) |
| @@ -4966,9 +4966,9 @@ CVE_STATUS[CVE-2023-3611] = "cpe-stable-backport: Backported in 6.1.40" | |||
| 4966 | 4966 | ||
| 4967 | # CVE-2023-37454 has no known resolution | 4967 | # CVE-2023-37454 has no known resolution |
| 4968 | 4968 | ||
| 4969 | # CVE-2023-3772 needs backporting (fixed from 6.1.47) | 4969 | CVE_STATUS[CVE-2023-3772] = "cpe-stable-backport: Backported in 6.1.47" |
| 4970 | 4970 | ||
| 4971 | # CVE-2023-3773 needs backporting (fixed from 6.1.47) | 4971 | CVE_STATUS[CVE-2023-3773] = "cpe-stable-backport: Backported in 6.1.47" |
| 4972 | 4972 | ||
| 4973 | CVE_STATUS[CVE-2023-3776] = "cpe-stable-backport: Backported in 6.1.40" | 4973 | CVE_STATUS[CVE-2023-3776] = "cpe-stable-backport: Backported in 6.1.40" |
| 4974 | 4974 | ||
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.4.inc b/meta/recipes-kernel/linux/cve-exclusion_6.4.inc index 712794428d..5a5eb9a755 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.4.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.4.inc | |||
| @@ -1,9 +1,9 @@ | |||
| 1 | 1 | ||
| 2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. | 2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. |
| 3 | # Generated at 2023-09-05 05:17:35.599561+00:00 for version 6.4.11 | 3 | # Generated at 2023-09-07 15:30:03.897686+00:00 for version 6.4.14 |
| 4 | 4 | ||
| 5 | python check_kernel_cve_status_version() { | 5 | python check_kernel_cve_status_version() { |
| 6 | this_version = "6.4.11" | 6 | this_version = "6.4.14" |
| 7 | kernel_version = d.getVar("LINUX_VERSION") | 7 | kernel_version = d.getVar("LINUX_VERSION") |
| 8 | if kernel_version != this_version: | 8 | if kernel_version != this_version: |
| 9 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) | 9 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) |
| @@ -4966,9 +4966,9 @@ CVE_STATUS[CVE-2023-3611] = "cpe-stable-backport: Backported in 6.4.5" | |||
| 4966 | 4966 | ||
| 4967 | # CVE-2023-37454 has no known resolution | 4967 | # CVE-2023-37454 has no known resolution |
| 4968 | 4968 | ||
| 4969 | # CVE-2023-3772 needs backporting (fixed from 6.4.12) | 4969 | CVE_STATUS[CVE-2023-3772] = "cpe-stable-backport: Backported in 6.4.12" |
| 4970 | 4970 | ||
| 4971 | # CVE-2023-3773 needs backporting (fixed from 6.4.12) | 4971 | CVE_STATUS[CVE-2023-3773] = "cpe-stable-backport: Backported in 6.4.12" |
| 4972 | 4972 | ||
| 4973 | CVE_STATUS[CVE-2023-3776] = "cpe-stable-backport: Backported in 6.4.5" | 4973 | CVE_STATUS[CVE-2023-3776] = "cpe-stable-backport: Backported in 6.4.5" |
| 4974 | 4974 | ||
