From: bruce.ashfield@gmail.com
To: richard.purdie@linuxfoundation.org
Cc: openembedded-core@lists.openembedded.org
Subject: [meta][PATCH 02/07] linux-yocto/6.12: update CVE exclusions (6.12.65)
Date: Mon, 26 Jan 2026 10:23:48 -0500 [thread overview]
Message-ID: <20260126152353.2328046-3-bruce.ashfield@gmail.com> (raw)
In-Reply-To: <20260126152353.2328046-1-bruce.ashfield@gmail.com>
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 10 changes (7 new | 3 updated): - 7 new CVEs: CVE-2025-61937, CVE-2025-61943, CVE-2025-64691, CVE-2025-64729, CVE-2025-64769, CVE-2025-65117, CVE-2025-65118 - 3 updated CVEs: CVE-2025-7195, CVE-2025-9903, CVE-2025-9904
Date: Fri, 16 Jan 2026 00:42:12 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
.../linux/cve-exclusion_6.12.inc | 284 +++++++++++++++++-
1 file changed, 280 insertions(+), 4 deletions(-)
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
index c08b091825..6ab3bd2bb3 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
@@ -1,11 +1,11 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2026-01-12 18:49:23.230016+00:00 for kernel version 6.12.64
-# From linux_kernel_cves cve_2026-01-12_1800Z-2-g66e4b29f774
+# Generated at 2026-01-16 00:43:33.551663+00:00 for kernel version 6.12.65
+# From linux_kernel_cves 2026-01-16_baseline-1-gc984786b0cf
python check_kernel_cve_status_version() {
- this_version = "6.12.64"
+ this_version = "6.12.65"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -16104,7 +16104,7 @@ CVE_STATUS[CVE-2025-22107] = "cpe-stable-backport: Backported in 6.12.59"
CVE_STATUS[CVE-2025-22110] = "fixed-version: only affects 6.14 onwards"
-# CVE-2025-22111 may need backporting (fixed from 6.12.65)
+CVE_STATUS[CVE-2025-22111] = "cpe-stable-backport: Backported in 6.12.65"
CVE_STATUS[CVE-2025-22112] = "cpe-stable-backport: Backported in 6.12.35"
@@ -20024,3 +20024,279 @@ CVE_STATUS[CVE-2025-68765] = "cpe-stable-backport: Backported in 6.12.63"
CVE_STATUS[CVE-2025-68766] = "cpe-stable-backport: Backported in 6.12.63"
+CVE_STATUS[CVE-2025-68767] = "cpe-stable-backport: Backported in 6.12.64"
+
+# CVE-2025-68768 needs backporting (fixed from 6.19rc2)
+
+CVE_STATUS[CVE-2025-68769] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68770] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68771] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68772] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68773] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68774] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68775] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68776] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68777] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68778] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68779] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-68780] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68781] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68782] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68783] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68784] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68785] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68786] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68787] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68788] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68789] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68790] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-68791] = "fixed-version: only affects 6.14 onwards"
+
+# CVE-2025-68792 needs backporting (fixed from 6.19rc1)
+
+CVE_STATUS[CVE-2025-68793] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-68794] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68795] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68796] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68797] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68798] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68799] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68800] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68801] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68802] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68803] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68804] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68805] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-68806] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68807] = "fixed-version: only affects 6.16 onwards"
+
+CVE_STATUS[CVE-2025-68808] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68809] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68810] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68811] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68812] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-68813] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68814] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68815] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68816] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68817] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68818] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68819] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68820] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68821] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-68822] = "cpe-stable-backport: Backported in 6.12.64"
+
+# CVE-2025-68823 needs backporting (fixed from 6.19rc2)
+
+CVE_STATUS[CVE-2025-71064] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71065] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71066] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71067] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71068] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71069] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71070] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-71071] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71072] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71073] = "cpe-stable-backport: Backported in 6.12.64"
+
+# CVE-2025-71074 needs backporting (fixed from 6.19rc1)
+
+CVE_STATUS[CVE-2025-71075] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71076] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71077] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71078] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71079] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71080] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71081] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71082] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71083] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71084] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71085] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71086] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71087] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71088] = "cpe-stable-backport: Backported in 6.12.65"
+
+CVE_STATUS[CVE-2025-71089] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71090] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-71091] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71092] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-71093] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71094] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71095] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71096] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71097] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71098] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71099] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71100] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71101] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71102] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71103] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-71104] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71105] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71106] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-71107] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71108] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71109] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71110] = "fixed-version: only affects 6.18 onwards"
+
+CVE_STATUS[CVE-2025-71111] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71112] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71113] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71114] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71115] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-71116] = "cpe-stable-backport: Backported in 6.12.64"
+
+# CVE-2025-71117 needs backporting (fixed from 6.19rc1)
+
+CVE_STATUS[CVE-2025-71118] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71119] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71120] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71121] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71122] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71123] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71124] = "fixed-version: only affects 6.13 onwards"
+
+CVE_STATUS[CVE-2025-71125] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71126] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71127] = "cpe-stable-backport: Backported in 6.12.65"
+
+CVE_STATUS[CVE-2025-71128] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-71129] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71130] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71131] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71132] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71133] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71134] = "cpe-stable-backport: Backported in 6.12.65"
+
+CVE_STATUS[CVE-2025-71135] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71136] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71137] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71138] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71139] = "fixed-version: only affects 6.17 onwards"
+
+CVE_STATUS[CVE-2025-71140] = "cpe-stable-backport: Backported in 6.12.64"
+
+# CVE-2025-71141 needs backporting (fixed from 6.19rc1)
+
+CVE_STATUS[CVE-2025-71142] = "fixed-version: only affects 6.15 onwards"
+
+CVE_STATUS[CVE-2025-71143] = "cpe-stable-backport: Backported in 6.12.64"
+
+CVE_STATUS[CVE-2025-71144] = "cpe-stable-backport: Backported in 6.12.65"
+
--
2.43.0
next prev parent reply other threads:[~2026-01-26 15:24 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-01-26 15:23 [PATCH 0/7] linux-yocto: -stable and -dev updates bruce.ashfield
2026-01-26 15:23 ` [meta][PATCH 01/07] linux-yocto/6.12: update to v6.12.65 bruce.ashfield
2026-01-26 15:23 ` bruce.ashfield [this message]
2026-01-26 15:23 ` [meta][PATCH 03/07] linux-yocto/6.12: update to v6.12.66 bruce.ashfield
2026-01-26 15:23 ` [meta][PATCH 04/07] linux-yocto/6.12: update CVE exclusions (6.12.66) bruce.ashfield
2026-01-26 15:23 ` [meta][PATCH 05/07] linux-yocto/6.18: update to v6.18.6 bruce.ashfield
2026-01-26 15:23 ` [meta][PATCH 06/07] linux-yocto/6.18: update CVE exclusions (6.18.6) bruce.ashfield
2026-01-26 15:23 ` [meta][PATCH 07/07] linux-yocto-dev: update to 6.19 bruce.ashfield
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260126152353.2328046-3-bruce.ashfield@gmail.com \
--to=bruce.ashfield@gmail.com \
--cc=openembedded-core@lists.openembedded.org \
--cc=richard.purdie@linuxfoundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox