From: Bruce Ashfield Date: Wed, 3 Jan 2024 18:54:52 +0000 (-0500) Subject: linux-yocto/6.6: update CVE exclusions X-Git-Tag: yocto-5.2~4125 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=2624d3b982a0e063f2c1d4c413534723c713d8d6;p=thirdparty%2Fopenembedded%2Fopenembedded-core-contrib.git linux-yocto/6.6: update CVE exclusions Data pulled from: https://github.com/nluedtke/linux_kernel_cves 1/1 [ Author: Nicholas Luedtke Email: nicholas.luedtke@uwalumni.com Subject: Update 27Dec23 Date: Wed, 27 Dec 2023 19:47:13 -0500 ] Signed-off-by: Bruce Ashfield --- diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc index 758d26b8e16..ee7df04c4a2 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2023-12-28 01:32:49.747571+00:00 for version 6.6.8 +# Generated at 2024-01-03 18:54:52.866645+00:00 for version 6.6.9 python check_kernel_cve_status_version() { - this_version = "6.6.8" + this_version = "6.6.9" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))