diff mbox series

linux-yocto: update CVE exclusions

Message ID 20231205132311.2485515-1-ross.burton@arm.com
State Accepted, archived
Commit 34835847442c15ebe12970bc31b6a949e66da48e
Headers show
Series linux-yocto: update CVE exclusions | expand

Commit Message

Ross Burton Dec. 5, 2023, 1:23 p.m. UTC
From: Ross Burton <ross.burton@arm.com>

Signed-off-by: Ross Burton <ross.burton@arm.com>
---
 .../linux/cve-exclusion_6.1.inc               | 26 +++++++++++++++----
 .../linux/cve-exclusion_6.5.inc               | 22 +++++++++++++---
 2 files changed, 40 insertions(+), 8 deletions(-)

Comments

Ross Burton Dec. 5, 2023, 1:24 p.m. UTC | #1
Note that this depends on Bruce’s latest kernel patches.

Ross

> On 5 Dec 2023, at 13:23, Ross Burton via lists.openembedded.org <ross.burton=arm.com@lists.openembedded.org> wrote:
> 
> From: Ross Burton <ross.burton@arm.com>
> 
> Signed-off-by: Ross Burton <ross.burton@arm.com>
> ---
> .../linux/cve-exclusion_6.1.inc               | 26 +++++++++++++++----
> .../linux/cve-exclusion_6.5.inc               | 22 +++++++++++++---
> 2 files changed, 40 insertions(+), 8 deletions(-)
> 
> diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc
> index 1216e0c2ddd..1e366481ff6 100644
> --- a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc
> +++ b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc
> @@ -1,9 +1,9 @@
> 
> # Auto-generated CVE metadata, DO NOT EDIT BY HAND.
> -# Generated at 2023-11-09 17:12:27.365962+00:00 for version 6.1.61
> +# Generated at 2023-12-05 13:22:34.961692+00:00 for version 6.1.65
> 
> python check_kernel_cve_status_version() {
> -    this_version = "6.1.61"
> +    this_version = "6.1.65"
>     kernel_version = d.getVar("LINUX_VERSION")
>     if kernel_version != this_version:
>         bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
> @@ -4524,7 +4524,7 @@ CVE_STATUS[CVE-2022-43945] = "fixed-version: Fixed from version 6.1rc1"
> 
> # CVE-2022-44033 needs backporting (fixed from 6.4rc1)
> 
> -# CVE-2022-44034 has no known resolution
> +# CVE-2022-44034 needs backporting (fixed from 6.4rc1)
> 
> # CVE-2022-4543 has no known resolution
> 
> @@ -5016,6 +5016,10 @@ CVE_STATUS[CVE-2023-39193] = "cpe-stable-backport: Backported in 6.1.53"
> 
> CVE_STATUS[CVE-2023-39194] = "cpe-stable-backport: Backported in 6.1.47"
> 
> +CVE_STATUS[CVE-2023-39197] = "cpe-stable-backport: Backported in 6.1.39"
> +
> +CVE_STATUS[CVE-2023-39198] = "cpe-stable-backport: Backported in 6.1.47"
> +
> CVE_STATUS[CVE-2023-4004] = "cpe-stable-backport: Backported in 6.1.42"
> 
> # CVE-2023-4010 has no known resolution
> @@ -5104,7 +5108,7 @@ CVE_STATUS[CVE-2023-4881] = "cpe-stable-backport: Backported in 6.1.54"
> 
> CVE_STATUS[CVE-2023-4921] = "cpe-stable-backport: Backported in 6.1.54"
> 
> -# CVE-2023-5090 needs backporting (fixed from 6.6rc7)
> +CVE_STATUS[CVE-2023-5090] = "cpe-stable-backport: Backported in 6.1.62"
> 
> CVE_STATUS[CVE-2023-5158] = "cpe-stable-backport: Backported in 6.1.57"
> 
> @@ -5114,7 +5118,19 @@ CVE_STATUS[CVE-2023-5197] = "cpe-stable-backport: Backported in 6.1.56"
> 
> CVE_STATUS[CVE-2023-5345] = "cpe-stable-backport: Backported in 6.1.56"
> 
> -# CVE-2023-5633 needs backporting (fixed from 6.6rc6)
> +CVE_STATUS[CVE-2023-5633] = "fixed-version: only affects 6.2 onwards"
> 
> CVE_STATUS[CVE-2023-5717] = "cpe-stable-backport: Backported in 6.1.60"
> 
> +# CVE-2023-5972 needs backporting (fixed from 6.6rc7)
> +
> +# CVE-2023-6039 needs backporting (fixed from 6.5rc5)
> +
> +CVE_STATUS[CVE-2023-6111] = "fixed-version: only affects 6.6rc3 onwards"
> +
> +# CVE-2023-6121 needs backporting (fixed from 6.7rc3)
> +
> +CVE_STATUS[CVE-2023-6176] = "cpe-stable-backport: Backported in 6.1.54"
> +
> +# CVE-2023-6238 has no known resolution
> +
> diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.5.inc b/meta/recipes-kernel/linux/cve-exclusion_6.5.inc
> index b4086d436c4..6304d80844c 100644
> --- a/meta/recipes-kernel/linux/cve-exclusion_6.5.inc
> +++ b/meta/recipes-kernel/linux/cve-exclusion_6.5.inc
> @@ -1,9 +1,9 @@
> 
> # Auto-generated CVE metadata, DO NOT EDIT BY HAND.
> -# Generated at 2023-11-09 17:13:01.267965+00:00 for version 6.5.10
> +# Generated at 2023-12-05 13:22:43.339114+00:00 for version 6.5.13
> 
> python check_kernel_cve_status_version() {
> -    this_version = "6.5.10"
> +    this_version = "6.5.13"
>     kernel_version = d.getVar("LINUX_VERSION")
>     if kernel_version != this_version:
>         bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
> @@ -4524,7 +4524,7 @@ CVE_STATUS[CVE-2022-44032] = "fixed-version: Fixed from version 6.4rc1"
> 
> CVE_STATUS[CVE-2022-44033] = "fixed-version: Fixed from version 6.4rc1"
> 
> -# CVE-2022-44034 has no known resolution
> +CVE_STATUS[CVE-2022-44034] = "fixed-version: Fixed from version 6.4rc1"
> 
> # CVE-2022-4543 has no known resolution
> 
> @@ -5016,6 +5016,10 @@ CVE_STATUS[CVE-2023-39193] = "cpe-stable-backport: Backported in 6.5.3"
> 
> CVE_STATUS[CVE-2023-39194] = "fixed-version: Fixed from version 6.5rc7"
> 
> +CVE_STATUS[CVE-2023-39197] = "fixed-version: Fixed from version 6.5rc1"
> +
> +CVE_STATUS[CVE-2023-39198] = "fixed-version: Fixed from version 6.5rc7"
> +
> CVE_STATUS[CVE-2023-4004] = "fixed-version: Fixed from version 6.5rc3"
> 
> # CVE-2023-4010 has no known resolution
> @@ -5118,3 +5122,15 @@ CVE_STATUS[CVE-2023-5633] = "cpe-stable-backport: Backported in 6.5.8"
> 
> CVE_STATUS[CVE-2023-5717] = "cpe-stable-backport: Backported in 6.5.9"
> 
> +CVE_STATUS[CVE-2023-5972] = "cpe-stable-backport: Backported in 6.5.9"
> +
> +CVE_STATUS[CVE-2023-6039] = "fixed-version: Fixed from version 6.5rc5"
> +
> +CVE_STATUS[CVE-2023-6111] = "fixed-version: only affects 6.6rc3 onwards"
> +
> +# CVE-2023-6121 needs backporting (fixed from 6.7rc3)
> +
> +CVE_STATUS[CVE-2023-6176] = "cpe-stable-backport: Backported in 6.5.4"
> +
> +# CVE-2023-6238 has no known resolution
> +
> -- 
> 2.34.1
> 
> 
> -=-=-=-=-=-=-=-=-=-=-=-
> Links: You receive all messages sent to this group.
> View/Reply Online (#191818): https://lists.openembedded.org/g/openembedded-core/message/191818
> Mute This Topic: https://lists.openembedded.org/mt/102991079/6875888
> Group Owner: openembedded-core+owner@lists.openembedded.org
> Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [ross.burton@arm.com]
> -=-=-=-=-=-=-=-=-=-=-=-
>
diff mbox series

Patch

diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc
index 1216e0c2ddd..1e366481ff6 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc
@@ -1,9 +1,9 @@ 
 
 # Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2023-11-09 17:12:27.365962+00:00 for version 6.1.61
+# Generated at 2023-12-05 13:22:34.961692+00:00 for version 6.1.65
 
 python check_kernel_cve_status_version() {
-    this_version = "6.1.61"
+    this_version = "6.1.65"
     kernel_version = d.getVar("LINUX_VERSION")
     if kernel_version != this_version:
         bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -4524,7 +4524,7 @@  CVE_STATUS[CVE-2022-43945] = "fixed-version: Fixed from version 6.1rc1"
 
 # CVE-2022-44033 needs backporting (fixed from 6.4rc1)
 
-# CVE-2022-44034 has no known resolution
+# CVE-2022-44034 needs backporting (fixed from 6.4rc1)
 
 # CVE-2022-4543 has no known resolution
 
@@ -5016,6 +5016,10 @@  CVE_STATUS[CVE-2023-39193] = "cpe-stable-backport: Backported in 6.1.53"
 
 CVE_STATUS[CVE-2023-39194] = "cpe-stable-backport: Backported in 6.1.47"
 
+CVE_STATUS[CVE-2023-39197] = "cpe-stable-backport: Backported in 6.1.39"
+
+CVE_STATUS[CVE-2023-39198] = "cpe-stable-backport: Backported in 6.1.47"
+
 CVE_STATUS[CVE-2023-4004] = "cpe-stable-backport: Backported in 6.1.42"
 
 # CVE-2023-4010 has no known resolution
@@ -5104,7 +5108,7 @@  CVE_STATUS[CVE-2023-4881] = "cpe-stable-backport: Backported in 6.1.54"
 
 CVE_STATUS[CVE-2023-4921] = "cpe-stable-backport: Backported in 6.1.54"
 
-# CVE-2023-5090 needs backporting (fixed from 6.6rc7)
+CVE_STATUS[CVE-2023-5090] = "cpe-stable-backport: Backported in 6.1.62"
 
 CVE_STATUS[CVE-2023-5158] = "cpe-stable-backport: Backported in 6.1.57"
 
@@ -5114,7 +5118,19 @@  CVE_STATUS[CVE-2023-5197] = "cpe-stable-backport: Backported in 6.1.56"
 
 CVE_STATUS[CVE-2023-5345] = "cpe-stable-backport: Backported in 6.1.56"
 
-# CVE-2023-5633 needs backporting (fixed from 6.6rc6)
+CVE_STATUS[CVE-2023-5633] = "fixed-version: only affects 6.2 onwards"
 
 CVE_STATUS[CVE-2023-5717] = "cpe-stable-backport: Backported in 6.1.60"
 
+# CVE-2023-5972 needs backporting (fixed from 6.6rc7)
+
+# CVE-2023-6039 needs backporting (fixed from 6.5rc5)
+
+CVE_STATUS[CVE-2023-6111] = "fixed-version: only affects 6.6rc3 onwards"
+
+# CVE-2023-6121 needs backporting (fixed from 6.7rc3)
+
+CVE_STATUS[CVE-2023-6176] = "cpe-stable-backport: Backported in 6.1.54"
+
+# CVE-2023-6238 has no known resolution
+
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.5.inc b/meta/recipes-kernel/linux/cve-exclusion_6.5.inc
index b4086d436c4..6304d80844c 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.5.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.5.inc
@@ -1,9 +1,9 @@ 
 
 # Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2023-11-09 17:13:01.267965+00:00 for version 6.5.10
+# Generated at 2023-12-05 13:22:43.339114+00:00 for version 6.5.13
 
 python check_kernel_cve_status_version() {
-    this_version = "6.5.10"
+    this_version = "6.5.13"
     kernel_version = d.getVar("LINUX_VERSION")
     if kernel_version != this_version:
         bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -4524,7 +4524,7 @@  CVE_STATUS[CVE-2022-44032] = "fixed-version: Fixed from version 6.4rc1"
 
 CVE_STATUS[CVE-2022-44033] = "fixed-version: Fixed from version 6.4rc1"
 
-# CVE-2022-44034 has no known resolution
+CVE_STATUS[CVE-2022-44034] = "fixed-version: Fixed from version 6.4rc1"
 
 # CVE-2022-4543 has no known resolution
 
@@ -5016,6 +5016,10 @@  CVE_STATUS[CVE-2023-39193] = "cpe-stable-backport: Backported in 6.5.3"
 
 CVE_STATUS[CVE-2023-39194] = "fixed-version: Fixed from version 6.5rc7"
 
+CVE_STATUS[CVE-2023-39197] = "fixed-version: Fixed from version 6.5rc1"
+
+CVE_STATUS[CVE-2023-39198] = "fixed-version: Fixed from version 6.5rc7"
+
 CVE_STATUS[CVE-2023-4004] = "fixed-version: Fixed from version 6.5rc3"
 
 # CVE-2023-4010 has no known resolution
@@ -5118,3 +5122,15 @@  CVE_STATUS[CVE-2023-5633] = "cpe-stable-backport: Backported in 6.5.8"
 
 CVE_STATUS[CVE-2023-5717] = "cpe-stable-backport: Backported in 6.5.9"
 
+CVE_STATUS[CVE-2023-5972] = "cpe-stable-backport: Backported in 6.5.9"
+
+CVE_STATUS[CVE-2023-6039] = "fixed-version: Fixed from version 6.5rc5"
+
+CVE_STATUS[CVE-2023-6111] = "fixed-version: only affects 6.6rc3 onwards"
+
+# CVE-2023-6121 needs backporting (fixed from 6.7rc3)
+
+CVE_STATUS[CVE-2023-6176] = "cpe-stable-backport: Backported in 6.5.4"
+
+# CVE-2023-6238 has no known resolution
+