On 4/7/23 16:24, Richard Purdie wrote:
> Add some information about some further kernel CVEs which don't apply for
> either linux-yocto or don't apply for linux-yocto 6.1.
> 
> Signed-off-by: Richard Purdie <[email protected]>

Perfect!
Reviewed-by: Yoann Congal <[email protected]>

> ---
>  meta/conf/distro/include/cve-extra-exclusions.inc | 9 +++++++++
>  meta/recipes-kernel/linux/cve-exclusion_6.1.inc   | 9 ++++++++-
>  2 files changed, 17 insertions(+), 1 deletion(-)
> 
> diff --git a/meta/conf/distro/include/cve-extra-exclusions.inc 
> b/meta/conf/distro/include/cve-extra-exclusions.inc
> index 439d569f7d0..8965a15b371 100644
> --- a/meta/conf/distro/include/cve-extra-exclusions.inc
> +++ b/meta/conf/distro/include/cve-extra-exclusions.inc
> @@ -438,6 +438,15 @@ CVE_CHECK_IGNORE += "CVE-2023-1073"
>  # Backported in version 6.1.9 9f08bb650078dca24a13fea1c375358ed6292df3
>  CVE_CHECK_IGNORE += "CVE-2023-1074"
>  
> +# https://nvd.nist.gov/vuln/detail/CVE-2023-1076
> +# Patched in kernel v6.3 a096ccca6e503a5c575717ff8a36ace27510ab0a
> +# Backported in version v5.4.235 d92d87000eda9884d49f1acec1c1fccd63cd9b11
> +# Backported in version v5.10.173 9a31af61f397500ccae49d56d809b2217d1e2178
> +# Backported in version v5.15.99 67f9f02928a34aad0a2c11dab5eea269f5ecf427
> +# Backported in version v6.1.16 b4ada752eaf1341f47bfa3d8ada377eca75a8d44
> +# Backported in version v6.2.3 4aa4b4b3b3e9551c4de2bf2987247c28805fb8f6
> +CVE_CHECK_IGNORE += "CVE-2023-1076"
> +
>  # https://nvd.nist.gov/vuln/detail/CVE-2023-1077
>  # Patched in kernel 6.3rc1 7c4a5b89a0b5a57a64b601775b296abf77a9fe97
>  # Backported in version 5.15.99 2c36c390a74981d03f04f01fe7ee9c3ac3ea11f7
> diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc 
> b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc
> index 8b32c2b2dfb..aeea77a2249 100644
> --- a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc
> +++ b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc
> @@ -13,7 +13,6 @@ CVE_CHECK_IGNORE += "CVE-2022-3566"
>  # Patched in kernel since v6.1 364f997b5cfe1db0d63a390fe7c801fa2b3115f6
>  CVE_CHECK_IGNORE += "CVE-2022-3567"
>  
> -
>  # 2023
>  
>  # https://nvd.nist.gov/vuln/detail/CVE-2022-38457
> @@ -27,3 +26,11 @@ CVE_CHECK_IGNORE += "CVE-2022-3567"
>  #  * https://www.linuxkernelcves.com/cves/CVE-2022-40133
>  #  * 
> https://lore.kernel.org/all/caodzb9q3obd0k6w2bcwrszo2jc3evv0prlywmo07rxr4nqg...@mail.gmail.com/T/
>  CVE_CHECK_IGNORE += "CVE-2022-38457 CVE-2022-40133"
> +
> +# https://nvd.nist.gov/vuln/detail/CVE-2023-1075
> +# Introduced in v4.20 a42055e8d2c30d4decfc13ce943d09c7b9dad221
> +# Patched in kernel v6.2 ffe2a22562444720b05bdfeb999c03e810d84cbb
> +# Backported in version 6.1.11 37c0cdf7e4919e5f76381ac60817b67bcbdacb50
> +# 5.15 still has issue, include/net/tls.h:is_tx_ready() would need patch
> +CVE_CHECK_IGNORE += "CVE-2023-1075"
> +
> 
> 
> 
> 
> 

-- 
Yoann Congal
Smile ECS - Tech Expert
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#179827): 
https://lists.openembedded.org/g/openembedded-core/message/179827
Mute This Topic: https://lists.openembedded.org/mt/98125330/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to