From: Richard Purdie Date: Sat, 23 Dec 2023 08:45:07 +0000 (+0000) Subject: linux/cve-exclusion6.1: Update to latest kernel point release X-Git-Tag: uninative-4.4~626 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=c4ffd18d3e71b935acc050b106267db544d86df7;p=thirdparty%2Fopenembedded%2Fopenembedded-core.git linux/cve-exclusion6.1: Update to latest kernel point release Signed-off-by: Richard Purdie --- diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc index 56766acc012..3cf11d6daf6 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2023-12-18 14:15:17.069657+00:00 for version 6.1.65 +# Generated at 2023-12-23 08:44:42.304531+00:00 for version 6.1.68 python check_kernel_cve_status_version() { - this_version = "6.1.65" + this_version = "6.1.68" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))