Data pulled from: https://github.com/nluedtke/linux_kernel_cves
1/1 [
Author: Nicholas Luedtke
Email: nicholas.luedtke@uwalumni.com
Subject: Update
27Dec23
Date: Wed, 27 Dec 2023 19:47:13 -0500
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit
c16ed90dae1f1954b582c4fb6783fca7e3171af3)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2024-01-03 21:24:21.156991+00:00 for version 6.1.70
+# Generated at 2024-01-11 18:31:26.124059+00:00 for version 6.1.72
python check_kernel_cve_status_version() {
- this_version = "6.1.70"
+ this_version = "6.1.72"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))