From: bruce.ashfield@gmail.com
To: richard.purdie@linuxfoundation.org
Cc: openembedded-core@lists.openembedded.org
Subject: [PATCH 04/11] linux-yocto/6.1: update CVE exclusions
Date: Fri, 19 Jan 2024 16:14:12 -0500 [thread overview]
Message-ID: <e448aa602a899d30384f63b57ce5a124fb00d69f.1705698717.git.bruce.ashfield@gmail.com> (raw)
In-Reply-To: <cover.1705698717.git.bruce.ashfield@gmail.com>
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Data pulled from: https://github.com/nluedtke/linux_kernel_cves
1/1 [
Author: Nicholas Luedtke
Email: nicholas.luedtke@uwalumni.com
Subject: Update 27Dec23
Date: Wed, 27 Dec 2023 19:47:13 -0500
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
meta/recipes-kernel/linux/cve-exclusion_6.1.inc | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc
index 8d345831d3..9e0c5bc49e 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc
@@ -1,9 +1,9 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2024-01-03 21:24:21.156991+00:00 for version 6.1.70
+# Generated at 2024-01-11 18:31:26.124059+00:00 for version 6.1.72
python check_kernel_cve_status_version() {
- this_version = "6.1.70"
+ this_version = "6.1.72"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
--
2.39.2
next prev parent reply other threads:[~2024-01-19 21:14 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-01-19 21:14 [PATCH 00/11] linux-yocto: consolidated pull request bruce.ashfield
2024-01-19 21:14 ` [PATCH 01/11] linux-yocto/6.6: update to v6.6.11 bruce.ashfield
2024-01-19 21:14 ` [PATCH 02/11] linux-yocto/6.6: update CVE exclusions bruce.ashfield
2024-01-19 21:14 ` [PATCH 03/11] linux-yocto/6.1: update to v6.1.72 bruce.ashfield
2024-01-19 21:14 ` bruce.ashfield [this message]
2024-01-19 21:14 ` [PATCH 05/11] linux-yocto/6.6: cfg: arm: introduce page size fragments bruce.ashfield
2024-01-19 21:14 ` [PATCH 06/11] linux-yocto/6.6: security/cfg: add configs to harden protection bruce.ashfield
2024-01-19 21:14 ` [PATCH 07/11] linux-yocto/6.1: " bruce.ashfield
2024-01-19 21:14 ` [PATCH 08/11] linux-yocto/6.6: update to v6.6.12 bruce.ashfield
2024-01-19 21:14 ` [PATCH 09/11] linux-yocto/6.6: update CVE exclusions bruce.ashfield
2024-01-19 21:14 ` [PATCH 10/11] linux-yocto/6.1: update to v6.1.73 bruce.ashfield
2024-01-19 21:14 ` [PATCH 11/11] linux-yocto/6.1: update CVE exclusions bruce.ashfield
2024-01-26 16:45 ` [OE-core] [PATCH 00/11] linux-yocto: consolidated pull request Alexandre Belloni
2024-01-26 18:16 ` Bruce Ashfield
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=e448aa602a899d30384f63b57ce5a124fb00d69f.1705698717.git.bruce.ashfield@gmail.com \
--to=bruce.ashfield@gmail.com \
--cc=openembedded-core@lists.openembedded.org \
--cc=richard.purdie@linuxfoundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox