linux-yocto/6.6: update CVE exclusions (6.6.24)

Data pulled from: https://github.com/nluedtke/linux_kernel_cves

    1/1 [
        Author: Nicholas Luedtke
        Email: nicholas.luedtke@uwalumni.com
        Subject: Update 25Feb24
        Date: Sun, 25 Feb 2024 07:03:08 -0500

    ]

(From OE-Core rev: 265c96e36ee4c49c970bee315bf9614dc958a8ae)

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit d941200509cd215e1c8cde5be9875b5e61ec76ce)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
This commit is contained in:
Bruce Ashfield
2024-05-02 22:40:30 -04:00
committed by Steve Sakoman
parent 2553adc7bc
commit abf0f4d53e

View File

@@ -1,9 +1,9 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
# Generated at 2024-03-28 16:40:04.102652+00:00 for version 6.6.23
# Generated at 2024-04-04 03:23:25.421265+00:00 for version 6.6.24
python check_kernel_cve_status_version() {
this_version = "6.6.23"
this_version = "6.6.24"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))