diff mbox series

linux-yocto: refresh CVE exclusion list for 6.12.31

Message ID 20250605163219.1202465-1-ross.burton@arm.com
State Accepted, archived
Commit 890041f5ed06be1c0a655030af35484d98fe3e7a
Headers show
Series linux-yocto: refresh CVE exclusion list for 6.12.31 | expand

Commit Message

Ross Burton June 5, 2025, 4:32 p.m. UTC
Signed-off-by: Ross Burton <ross.burton@arm.com>
---
 .../linux/cve-exclusion_6.12.inc              | 26 ++++++++++++-------
 1 file changed, 17 insertions(+), 9 deletions(-)

Comments

patchtest@automation.yoctoproject.org June 5, 2025, 4:46 p.m. UTC | #1
Thank you for your submission. Patchtest identified one
or more issues with the patch. Please see the log below for
more information:

---
Testing patch /home/patchtest/share/mboxes/linux-yocto-refresh-CVE-exclusion-list-for-6.12.31.patch

FAIL: test commit message presence: Please include a commit message on your patch explaining the change (test_mbox.TestMbox.test_commit_message_presence)

PASS: test Signed-off-by presence (test_mbox.TestMbox.test_signed_off_by_presence)
PASS: test author valid (test_mbox.TestMbox.test_author_valid)
PASS: test commit message user tags (test_mbox.TestMbox.test_commit_message_user_tags)
PASS: test max line length (test_metadata.TestMetadata.test_max_line_length)
PASS: test mbox format (test_mbox.TestMbox.test_mbox_format)
PASS: test non-AUH upgrade (test_mbox.TestMbox.test_non_auh_upgrade)
PASS: test shortlog format (test_mbox.TestMbox.test_shortlog_format)
PASS: test shortlog length (test_mbox.TestMbox.test_shortlog_length)
PASS: test target mailing list (test_mbox.TestMbox.test_target_mailing_list)

SKIP: pretest pylint: No python related patches, skipping test (test_python_pylint.PyLint.pretest_pylint)
SKIP: pretest src uri left files: No modified recipes, skipping pretest (test_metadata.TestMetadata.pretest_src_uri_left_files)
SKIP: test CVE check ignore: No modified recipes or older target branch, skipping test (test_metadata.TestMetadata.test_cve_check_ignore)
SKIP: test CVE tag format: No new CVE patches introduced (test_patch.TestPatch.test_cve_tag_format)
SKIP: test Signed-off-by presence: No new CVE patches introduced (test_patch.TestPatch.test_signed_off_by_presence)
SKIP: test Upstream-Status presence: No new CVE patches introduced (test_patch.TestPatch.test_upstream_status_presence_format)
SKIP: test bugzilla entry format: No bug ID found (test_mbox.TestMbox.test_bugzilla_entry_format)
SKIP: test lic files chksum modified not mentioned: No modified recipes, skipping test (test_metadata.TestMetadata.test_lic_files_chksum_modified_not_mentioned)
SKIP: test lic files chksum presence: No added recipes, skipping test (test_metadata.TestMetadata.test_lic_files_chksum_presence)
SKIP: test license presence: No added recipes, skipping test (test_metadata.TestMetadata.test_license_presence)
SKIP: test pylint: No python related patches, skipping test (test_python_pylint.PyLint.test_pylint)
SKIP: test series merge on head: Merge test is disabled for now (test_mbox.TestMbox.test_series_merge_on_head)
SKIP: test src uri left files: No modified recipes, skipping pretest (test_metadata.TestMetadata.test_src_uri_left_files)
SKIP: test summary presence: No added recipes, skipping test (test_metadata.TestMetadata.test_summary_presence)

---

Please address the issues identified and
submit a new revision of the patch, or alternatively, reply to this
email with an explanation of why the patch should be accepted. If you
believe these results are due to an error in patchtest, please submit a
bug at https://bugzilla.yoctoproject.org/ (use the 'Patchtest' category
under 'Yocto Project Subprojects'). For more information on specific
failures, see: https://wiki.yoctoproject.org/wiki/Patchtest. Thank
you!
diff mbox series

Patch

diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
index d33880eae0f..199ea019d5b 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc
@@ -1,11 +1,11 @@ 
 
 # Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2025-05-29 10:54:43.823437+00:00 for kernel version 6.12.30
-# From cvelistV5 cve_2025-05-29_1000Z-1-g4f2590b715f
+# Generated at 2025-06-05 16:29:20.725105+00:00 for kernel version 6.12.31
+# From cvelistV5 cve_2025-06-05_1600Z
 
 
 python check_kernel_cve_status_version() {
-    this_version = "6.12.30"
+    this_version = "6.12.31"
     kernel_version = d.getVar("LINUX_VERSION")
     if kernel_version != this_version:
         bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -5054,8 +5054,6 @@  CVE_STATUS[CVE-2023-53023] = "fixed-version: Fixed from version 6.2"
 
 CVE_STATUS[CVE-2023-53024] = "fixed-version: Fixed from version 6.2"
 
-CVE_STATUS[CVE-2023-53025] = "fixed-version: Fixed from version 6.2"
-
 CVE_STATUS[CVE-2023-53026] = "fixed-version: Fixed from version 6.2"
 
 CVE_STATUS[CVE-2023-53028] = "fixed-version: Fixed from version 6.1.8"
@@ -12564,8 +12562,6 @@  CVE_STATUS[CVE-2025-37780] = "cpe-stable-backport: Backported in 6.12.25"
 
 CVE_STATUS[CVE-2025-37781] = "cpe-stable-backport: Backported in 6.12.25"
 
-CVE_STATUS[CVE-2025-37782] = "cpe-stable-backport: Backported in 6.12.25"
-
 CVE_STATUS[CVE-2025-37783] = "fixed-version: only affects 6.14 onwards"
 
 CVE_STATUS[CVE-2025-37784] = "cpe-stable-backport: Backported in 6.12.25"
@@ -12660,8 +12656,6 @@  CVE_STATUS[CVE-2025-37830] = "cpe-stable-backport: Backported in 6.12.26"
 
 CVE_STATUS[CVE-2025-37831] = "cpe-stable-backport: Backported in 6.12.26"
 
-CVE_STATUS[CVE-2025-37832] = "cpe-stable-backport: Backported in 6.12.26"
-
 CVE_STATUS[CVE-2025-37833] = "cpe-stable-backport: Backported in 6.12.26"
 
 CVE_STATUS[CVE-2025-37834] = "cpe-stable-backport: Backported in 6.12.26"
@@ -12978,6 +12972,20 @@  CVE_STATUS[CVE-2025-37991] = "cpe-stable-backport: Backported in 6.12.28"
 
 CVE_STATUS[CVE-2025-37992] = "cpe-stable-backport: Backported in 6.12.30"
 
+CVE_STATUS[CVE-2025-37993] = "cpe-stable-backport: Backported in 6.12.29"
+
+CVE_STATUS[CVE-2025-37994] = "cpe-stable-backport: Backported in 6.12.29"
+
+CVE_STATUS[CVE-2025-37995] = "cpe-stable-backport: Backported in 6.12.29"
+
+CVE_STATUS[CVE-2025-37996] = "fixed-version: only affects 6.14 onwards"
+
+CVE_STATUS[CVE-2025-37997] = "cpe-stable-backport: Backported in 6.12.29"
+
+CVE_STATUS[CVE-2025-37998] = "cpe-stable-backport: Backported in 6.12.29"
+
+CVE_STATUS[CVE-2025-37999] = "cpe-stable-backport: Backported in 6.12.29"
+
 CVE_STATUS[CVE-2025-38049] = "cpe-stable-backport: Backported in 6.12.23"
 
 # CVE-2025-38104 needs backporting (fixed from 6.15)