linux-yocto/6.6: update CVE exclusions (6.6.28)

Data pulled from: https://github.com/nluedtke/linux_kernel_cves

    1/1 [
        Author: Nicholas Luedtke
        Email: nicholas.luedtke@uwalumni.com
        Subject: Update 8Apr24
        Date: Tue, 9 Apr 2024 18:19:11 -0400

    ]

(From OE-Core rev: aa8325d9a499039bb2701ad10925c1aee02a22e2)

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit f0683a02772e83ef1c54a60664f68364079540f7)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
This commit is contained in:
Bruce Ashfield
2024-05-02 22:40:38 -04:00
committed by Steve Sakoman
parent bd54a598cb
commit 366f0a5641

View File

@@ -1,9 +1,9 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
# Generated at 2024-04-15 16:05:11.813475+00:00 for version 6.6.27
# Generated at 2024-04-25 18:59:44.140399+00:00 for version 6.6.28
python check_kernel_cve_status_version() {
this_version = "6.6.27"
this_version = "6.6.28"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))