diff mbox series

[2/3] linux-yocto/6.6: update CVE exclusions

Message ID ee5018a567623eadccf200d22f9dd510ea30261d.1708113821.git.bruce.ashfield@gmail.com
State Accepted, archived
Commit 5336ef12e661590ab1bf982a3e7b82ae2be727a3
Headers show
Series [1/3] linux-yocto/6.6: update to v6.6.16 | expand

Commit Message

Bruce Ashfield Feb. 16, 2024, 8:05 p.m. UTC
From: Bruce Ashfield <bruce.ashfield@gmail.com>

Data pulled from: https://github.com/nluedtke/linux_kernel_cves

    1/1 [
        Author: Nicholas Luedtke
        Email: nicholas.luedtke@uwalumni.com
        Subject: Update 9Feb24
        Date: Fri, 9 Feb 2024 18:02:45 -0500

    ]

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
---
 .../linux/cve-exclusion_6.6.inc               | 28 +++++++++++++++++--
 1 file changed, 25 insertions(+), 3 deletions(-)
diff mbox series

Patch

diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc
index f3b3f32736..501e9541d4 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc
@@ -1,9 +1,9 @@ 
 
 # Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2024-02-04 13:08:50.287438+00:00 for version 6.6.15
+# Generated at 2024-02-14 17:05:05.638255+00:00 for version 6.6.16
 
 python check_kernel_cve_status_version() {
-    this_version = "6.6.15"
+    this_version = "6.6.16"
     kernel_version = d.getVar("LINUX_VERSION")
     if kernel_version != this_version:
         bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -5166,6 +5166,8 @@  CVE_STATUS[CVE-2023-6200] = "cpe-stable-backport: Backported in 6.6.9"
 
 # CVE-2023-6238 has no known resolution
 
+# CVE-2023-6240 has no known resolution
+
 # CVE-2023-6270 has no known resolution
 
 # CVE-2023-6356 has no known resolution
@@ -5232,19 +5234,39 @@  CVE_STATUS[CVE-2024-1085] = "cpe-stable-backport: Backported in 6.6.14"
 
 CVE_STATUS[CVE-2024-1086] = "cpe-stable-backport: Backported in 6.6.15"
 
+CVE_STATUS[CVE-2024-1312] = "fixed-version: Fixed from version 6.5rc4"
+
 # CVE-2024-21803 has no known resolution
 
 # CVE-2024-22099 has no known resolution
 
+# CVE-2024-22386 has no known resolution
+
 CVE_STATUS[CVE-2024-22705] = "cpe-stable-backport: Backported in 6.6.10"
 
+# CVE-2024-23196 has no known resolution
+
 # CVE-2024-23307 has no known resolution
 
 # CVE-2024-23848 has no known resolution
 
-# CVE-2024-23849 has no known resolution
+CVE_STATUS[CVE-2024-23849] = "cpe-stable-backport: Backported in 6.6.15"
 
 # CVE-2024-23850 has no known resolution
 
 # CVE-2024-23851 has no known resolution
 
+# CVE-2024-24855 has no known resolution
+
+# CVE-2024-24857 has no known resolution
+
+# CVE-2024-24858 has no known resolution
+
+# CVE-2024-24859 has no known resolution
+
+# CVE-2024-24860 has no known resolution
+
+# CVE-2024-24861 has no known resolution
+
+# CVE-2024-24864 has no known resolution
+