diff mbox series

[2/2] linux-yocto/cve-exclusion: ignore more backported CVEs

Message ID 20230704140748.3685070-2-ross.burton@arm.com
State Accepted, archived
Commit 278503d1d335707f85ad79aea3a7a3af0c80a843
Headers show
Series [1/2] linux-yocto/cve-exclusion: move entries from cve-extra-exclusions | expand

Commit Message

Ross Burton July 4, 2023, 2:07 p.m. UTC
From: Ross Burton <ross.burton@arm.com>

Signed-off-by: Ross Burton <ross.burton@arm.com>
---
 .../linux/cve-exclusion_6.1.inc               | 44 +++++++++++++++++++
 1 file changed, 44 insertions(+)
diff mbox series

Patch

diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc
index 6717cbeeebb..49b4159b347 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc
@@ -13,6 +13,9 @@  CVE_CHECK_IGNORE += "CVE-2019-3819"
 # Fixed with 5.2
 CVE_CHECK_IGNORE += "CVE-2019-3887"
 
+# This is specific to aufs, which is not in linux-yocto
+CVE_CHECK_IGNORE += "CVE-2020-11935"
+
 # https://nvd.nist.gov/vuln/detail/CVE-2020-27784
 # Introduced in version v4.1 b26394bd567e5ebe57ec4dee7fe6cd14023c96e9
 # Patched in kernel since v5.10	e8d5f92b8d30bb4ade76494490c3c065e12411b1
@@ -336,6 +339,8 @@  CVE_CHECK_IGNORE += "CVE-2022-42896"
 #  * https://lore.kernel.org/all/CAODzB9q3OBD0k6W2bcWrSZo2jC3EvV0PrLyWmO07rxR4nQgkJA@mail.gmail.com/T/
 CVE_CHECK_IGNORE += "CVE-2022-38457 CVE-2022-40133"
 
+# Backported to 6.1.33
+CVE_CHECK_IGNORE += "CVE-2022-48425"
 
 # 2023
 
@@ -514,6 +519,9 @@  CVE_CHECK_IGNORE += "CVE-2023-1998"
 # Fixed in 6.1.27
 CVE_CHECK_IGNORE += "CVE-2023-2002"
 
+# Backported to 6.1.33
+CVE_CHECK_IGNORE += "CVE-2023-2124"
+
 # https://www.linuxkernelcves.com/cves/CVE-2023-2156
 # Fixed in 6.1.26
 CVE_CHECK_IGNORE += "CVE-2023-2156"
@@ -537,6 +545,21 @@  CVE_CHECK_IGNORE += "CVE-2023-2985"
 # Backported to 6.1.30 as 9a342d4
 CVE_CHECK_IGNORE += "CVE-2023-3141"
 
+# Backported to 6.1.11
+CVE_CHECK_IGNORE += "CVE-2023-3161"
+
+# Backported to 6.1.33
+CVE_CHECK_IGNORE += "CVE-2023-3212"
+
+# Only in 6.2.0 to 6.2.14, and 6.3.0 to 6.3.1
+CVE_CHECK_IGNORE += "CVE-2023-3312"
+
+# Backported to 6.1.16
+CVE_CHECK_IGNORE += "CVE-2023-3220"
+
+# Backported to 6.1.28
+CVE_CHECK_IGNORE += "CVE-2023-3268"
+
 # https://nvd.nist.gov/vuln/detail/CVE-2023-23005
 # Introduced in version v6.1 7b88bda3761b95856cf97822efe8281c8100067b
 # Patched in kernel since v6.2 4a625ceee8a0ab0273534cb6b432ce6b331db5ee
@@ -551,6 +574,9 @@  CVE_CHECK_IGNORE += "CVE-2023-23005"
 # Fixed with 6.1.2
 CVE_CHECK_IGNORE += "CVE-2023-28328"
 
+# Only in 6.3-rc
+CVE_CHECK_IGNORE += "CVE-2023-28464"
+
 # https://nvd.nist.gov/vuln/detail/CVE-2023-28466
 # Introduced in version v4.13 3c4d7559159bfe1e3b94df3a657b2cda3a34e218
 # Patched in kernel since v6.3-rc2 49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962
@@ -590,3 +616,21 @@  CVE_CHECK_IGNORE += "CVE-2023-33288"
 # https://www.linuxkernelcves.com/cves/CVE-2023-34256
 # Fixed in 6.1.29
 CVE_CHECK_IGNORE += "CVE-2023-34256"
+
+# Backported to 6.1.28
+CVE_CHECK_IGNORE += "CVE-2023-35823"
+
+# Backported to 6.1.28
+CVE_CHECK_IGNORE += "CVE-2023-35824"
+
+# Backported to 6.1.28
+CVE_CHECK_IGNORE += "CVE-2023-35826"
+
+# Backported to 6.1.28
+CVE_CHECK_IGNORE += "CVE-2023-35828"
+
+# Backported to 6.1.28
+CVE_CHECK_IGNORE += "CVE-2023-35829"
+
+# Backported to 6.1.33
+CVE_CHECK_IGNORE += "CVE-2023-35788"