From: Bruce Ashfield Date: Fri, 3 May 2024 02:40:38 +0000 (-0400) Subject: linux-yocto/6.6: update CVE exclusions (6.6.28) X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=aa8325d9a499039bb2701ad10925c1aee02a22e2;p=thirdparty%2Fopenembedded%2Fopenembedded-core-contrib.git linux-yocto/6.6: update CVE exclusions (6.6.28) Data pulled from: https://github.com/nluedtke/linux_kernel_cves 1/1 [ Author: Nicholas Luedtke Email: nicholas.luedtke@uwalumni.com Subject: Update 8Apr24 Date: Tue, 9 Apr 2024 18:19:11 -0400 ] Signed-off-by: Bruce Ashfield Signed-off-by: Richard Purdie (cherry picked from commit f0683a02772e83ef1c54a60664f68364079540f7) Signed-off-by: Steve Sakoman --- diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc index 9e5be066a5a..df09c1fd1d3 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2024-04-15 16:05:11.813475+00:00 for version 6.6.27 +# Generated at 2024-04-25 18:59:44.140399+00:00 for version 6.6.28 python check_kernel_cve_status_version() { - this_version = "6.6.27" + this_version = "6.6.28" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))