linux-yocto/6.1: update CVE exclusions

Data pulled from: https://github.com/nluedtke/linux_kernel_cves

    1/1 [
        Author: Nicholas Luedtke
        Email: nicholas.luedtke@uwalumni.com
        Subject: Update 27Dec23
        Date: Wed, 27 Dec 2023 19:47:13 -0500

    ]

(From OE-Core rev: 8960ae115972015de0176ceb202c4996f5a03c75)

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit c16ed90dae1f1954b582c4fb6783fca7e3171af3)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
This commit is contained in:
Bruce Ashfield
2024-01-19 16:14:12 -05:00
committed by Steve Sakoman
parent 434ebe75c3
commit 3f65155a06

View File

@@ -1,9 +1,9 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
# Generated at 2024-01-03 21:24:21.156991+00:00 for version 6.1.70
# Generated at 2024-01-11 18:31:26.124059+00:00 for version 6.1.72
python check_kernel_cve_status_version() {
this_version = "6.1.70"
this_version = "6.1.72"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))