From: Ross Burton Date: Tue, 4 Jul 2023 13:32:51 +0000 (+0100) Subject: linux-yocto/cve-exclusion: ignore more backported CVEs X-Git-Tag: lucaceresoli/bug-15201-perf-libtraceevent-missing~421 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=278503d1d335707f85ad79aea3a7a3af0c80a843;p=thirdparty%2Fopenembedded%2Fopenembedded-core-contrib.git linux-yocto/cve-exclusion: ignore more backported CVEs Signed-off-by: Ross Burton Signed-off-by: Richard Purdie --- diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc index 6717cbeeebb..49b4159b347 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc @@ -13,6 +13,9 @@ CVE_CHECK_IGNORE += "CVE-2019-3819" # Fixed with 5.2 CVE_CHECK_IGNORE += "CVE-2019-3887" +# This is specific to aufs, which is not in linux-yocto +CVE_CHECK_IGNORE += "CVE-2020-11935" + # https://nvd.nist.gov/vuln/detail/CVE-2020-27784 # Introduced in version v4.1 b26394bd567e5ebe57ec4dee7fe6cd14023c96e9 # Patched in kernel since v5.10 e8d5f92b8d30bb4ade76494490c3c065e12411b1 @@ -336,6 +339,8 @@ CVE_CHECK_IGNORE += "CVE-2022-42896" # * https://lore.kernel.org/all/CAODzB9q3OBD0k6W2bcWrSZo2jC3EvV0PrLyWmO07rxR4nQgkJA@mail.gmail.com/T/ CVE_CHECK_IGNORE += "CVE-2022-38457 CVE-2022-40133" +# Backported to 6.1.33 +CVE_CHECK_IGNORE += "CVE-2022-48425" # 2023 @@ -514,6 +519,9 @@ CVE_CHECK_IGNORE += "CVE-2023-1998" # Fixed in 6.1.27 CVE_CHECK_IGNORE += "CVE-2023-2002" +# Backported to 6.1.33 +CVE_CHECK_IGNORE += "CVE-2023-2124" + # https://www.linuxkernelcves.com/cves/CVE-2023-2156 # Fixed in 6.1.26 CVE_CHECK_IGNORE += "CVE-2023-2156" @@ -537,6 +545,21 @@ CVE_CHECK_IGNORE += "CVE-2023-2985" # Backported to 6.1.30 as 9a342d4 CVE_CHECK_IGNORE += "CVE-2023-3141" +# Backported to 6.1.11 +CVE_CHECK_IGNORE += "CVE-2023-3161" + +# Backported to 6.1.33 +CVE_CHECK_IGNORE += "CVE-2023-3212" + +# Only in 6.2.0 to 6.2.14, and 6.3.0 to 6.3.1 +CVE_CHECK_IGNORE += "CVE-2023-3312" + +# Backported to 6.1.16 +CVE_CHECK_IGNORE += "CVE-2023-3220" + +# Backported to 6.1.28 +CVE_CHECK_IGNORE += "CVE-2023-3268" + # https://nvd.nist.gov/vuln/detail/CVE-2023-23005 # Introduced in version v6.1 7b88bda3761b95856cf97822efe8281c8100067b # Patched in kernel since v6.2 4a625ceee8a0ab0273534cb6b432ce6b331db5ee @@ -551,6 +574,9 @@ CVE_CHECK_IGNORE += "CVE-2023-23005" # Fixed with 6.1.2 CVE_CHECK_IGNORE += "CVE-2023-28328" +# Only in 6.3-rc +CVE_CHECK_IGNORE += "CVE-2023-28464" + # https://nvd.nist.gov/vuln/detail/CVE-2023-28466 # Introduced in version v4.13 3c4d7559159bfe1e3b94df3a657b2cda3a34e218 # Patched in kernel since v6.3-rc2 49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962 @@ -590,3 +616,21 @@ CVE_CHECK_IGNORE += "CVE-2023-33288" # https://www.linuxkernelcves.com/cves/CVE-2023-34256 # Fixed in 6.1.29 CVE_CHECK_IGNORE += "CVE-2023-34256" + +# Backported to 6.1.28 +CVE_CHECK_IGNORE += "CVE-2023-35823" + +# Backported to 6.1.28 +CVE_CHECK_IGNORE += "CVE-2023-35824" + +# Backported to 6.1.28 +CVE_CHECK_IGNORE += "CVE-2023-35826" + +# Backported to 6.1.28 +CVE_CHECK_IGNORE += "CVE-2023-35828" + +# Backported to 6.1.28 +CVE_CHECK_IGNORE += "CVE-2023-35829" + +# Backported to 6.1.33 +CVE_CHECK_IGNORE += "CVE-2023-35788"