linux-yocto/6.6: update CVE exclusions (6.6.29)

Data pulled from: https://github.com/nluedtke/linux_kernel_cves

    1/1 [
        Author: Nicholas Luedtke
        Email: nicholas.luedtke@uwalumni.com
        Subject: Update 8Apr24
        Date: Tue, 9 Apr 2024 18:19:11 -0400

    ]

(From OE-Core rev: fa67b0075d17b1bae7400e9c9bbe5855bf11ae60)

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit a6660bc4980ad8161522075e3964fa400817f27f)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
This commit is contained in:
Bruce Ashfield 2024-05-02 22:40:40 -04:00 committed by Steve Sakoman
parent 1b87dbafb1
commit c3b5a35412

View File

@ -1,9 +1,9 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
# Generated at 2024-04-25 18:59:44.140399+00:00 for version 6.6.28
# Generated at 2024-05-02 12:41:43.351358+00:00 for version 6.6.29
python check_kernel_cve_status_version() {
this_version = "6.6.28"
this_version = "6.6.29"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))