Hello Bruce et al, For information, the linux_kernel_cves repo has now a banner "This repository has been archived by the owner on May 2, 2024. It is now read-only. ", so I guess this is the last update.
Greg has scripting for statistics of the new process, haven't looked into them yet. Regards, Marta On Fri, May 3, 2024 at 4:40 AM Bruce Ashfield via lists.openembedded.org <[email protected]> wrote: > > From: Bruce Ashfield <[email protected]> > > Data pulled from: https://github.com/nluedtke/linux_kernel_cves > > 1/1 [ > Author: Nicholas Luedtke > Email: [email protected] > Subject: Update 25Feb24 > Date: Sun, 25 Feb 2024 07:03:08 -0500 > > ] > > Signed-off-by: Bruce Ashfield <[email protected]> > --- > meta/recipes-kernel/linux/cve-exclusion_6.6.inc | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc > b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc > index bb9ba49c48..133cab88a3 100644 > --- a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc > +++ b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc > @@ -1,9 +1,9 @@ > > # Auto-generated CVE metadata, DO NOT EDIT BY HAND. > -# Generated at 2024-03-28 16:40:04.102652+00:00 for version 6.6.23 > +# Generated at 2024-04-04 03:23:25.421265+00:00 for version 6.6.24 > > python check_kernel_cve_status_version() { > - this_version = "6.6.23" > + this_version = "6.6.24" > kernel_version = d.getVar("LINUX_VERSION") > if kernel_version != this_version: > bb.warn("Kernel CVE status needs updating: generated for %s but > kernel is %s" % (this_version, kernel_version)) > -- > 2.39.2 > > > >
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#198966): https://lists.openembedded.org/g/openembedded-core/message/198966 Mute This Topic: https://lists.openembedded.org/mt/105881317/21656 Group Owner: [email protected] Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [[email protected]] -=-=-=-=-=-=-=-=-=-=-=-
