@@ -1,9 +1,9 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2023-09-08 09:54:36.039631 for version 6.1.52
+# Generated at 2023-09-15 17:26:47.557521+00:00 for version 6.1.53
python check_kernel_cve_status_version() {
- this_version = "6.1.52"
+ this_version = "6.1.53"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
@@ -4518,9 +4518,9 @@ CVE_STATUS[CVE-2022-4382] = "cpe-stable-backport: Backported in 6.1.8"
CVE_STATUS[CVE-2022-43945] = "fixed-version: Fixed from version 6.1rc1"
-# CVE-2022-44032 has no known resolution
+# CVE-2022-44032 needs backporting (fixed from 6.4rc1)
-# CVE-2022-44033 has no known resolution
+# CVE-2022-44033 needs backporting (fixed from 6.4rc1)
# CVE-2022-44034 has no known resolution
@@ -4532,13 +4532,13 @@ CVE_STATUS[CVE-2022-45869] = "fixed-version: Fixed from version 6.1rc7"
# CVE-2022-45885 has no known resolution
-# CVE-2022-45886 has no known resolution
+CVE_STATUS[CVE-2022-45886] = "cpe-stable-backport: Backported in 6.1.33"
-# CVE-2022-45887 has no known resolution
+CVE_STATUS[CVE-2022-45887] = "cpe-stable-backport: Backported in 6.1.33"
# CVE-2022-45888 needs backporting (fixed from 6.2rc1)
-# CVE-2022-45919 has no known resolution
+CVE_STATUS[CVE-2022-45919] = "cpe-stable-backport: Backported in 6.1.33"
CVE_STATUS[CVE-2022-45934] = "fixed-version: Fixed from version 6.1"
@@ -4786,7 +4786,7 @@ CVE_STATUS[CVE-2023-23559] = "cpe-stable-backport: Backported in 6.1.9"
CVE_STATUS[CVE-2023-23586] = "fixed-version: Fixed from version 5.12rc1"
-# CVE-2023-2430 needs backporting (fixed from 6.2rc5)
+CVE_STATUS[CVE-2023-2430] = "cpe-stable-backport: Backported in 6.1.50"
CVE_STATUS[CVE-2023-2483] = "cpe-stable-backport: Backported in 6.1.22"
@@ -4794,6 +4794,8 @@ CVE_STATUS[CVE-2023-25012] = "cpe-stable-backport: Backported in 6.1.16"
CVE_STATUS[CVE-2023-2513] = "fixed-version: Fixed from version 6.0rc1"
+# CVE-2023-25775 has no known resolution
+
CVE_STATUS[CVE-2023-2598] = "fixed-version: only affects 6.3rc1 onwards"
# CVE-2023-26242 has no known resolution
@@ -4972,6 +4974,8 @@ CVE_STATUS[CVE-2023-3773] = "cpe-stable-backport: Backported in 6.1.47"
CVE_STATUS[CVE-2023-3776] = "cpe-stable-backport: Backported in 6.1.40"
+CVE_STATUS[CVE-2023-3777] = "cpe-stable-backport: Backported in 6.1.42"
+
CVE_STATUS[CVE-2023-3812] = "fixed-version: Fixed from version 6.1rc4"
CVE_STATUS[CVE-2023-38409] = "cpe-stable-backport: Backported in 6.1.25"
@@ -4996,6 +5000,8 @@ CVE_STATUS[CVE-2023-4004] = "cpe-stable-backport: Backported in 6.1.42"
# CVE-2023-4010 has no known resolution
+CVE_STATUS[CVE-2023-4015] = "cpe-stable-backport: Backported in 6.1.43"
+
CVE_STATUS[CVE-2023-40283] = "cpe-stable-backport: Backported in 6.1.45"
CVE_STATUS[CVE-2023-4128] = "cpe-stable-backport: Backported in 6.1.45"
@@ -5012,6 +5018,12 @@ CVE_STATUS[CVE-2023-4155] = "cpe-stable-backport: Backported in 6.1.46"
CVE_STATUS[CVE-2023-4194] = "fixed-version: only affects 6.3rc1 onwards"
+CVE_STATUS[CVE-2023-4206] = "cpe-stable-backport: Backported in 6.1.45"
+
+CVE_STATUS[CVE-2023-4207] = "cpe-stable-backport: Backported in 6.1.45"
+
+CVE_STATUS[CVE-2023-4208] = "cpe-stable-backport: Backported in 6.1.45"
+
CVE_STATUS[CVE-2023-4273] = "cpe-stable-backport: Backported in 6.1.45"
CVE_STATUS[CVE-2023-4385] = "fixed-version: Fixed from version 5.19rc1"
@@ -5024,3 +5036,13 @@ CVE_STATUS[CVE-2023-4394] = "fixed-version: Fixed from version 6.0rc3"
CVE_STATUS[CVE-2023-4459] = "fixed-version: Fixed from version 5.18"
+# CVE-2023-4563 needs backporting (fixed from 6.5rc6)
+
+CVE_STATUS[CVE-2023-4569] = "cpe-stable-backport: Backported in 6.1.47"
+
+CVE_STATUS[CVE-2023-4611] = "fixed-version: only affects 6.4rc1 onwards"
+
+# CVE-2023-4622 needs backporting (fixed from 6.5rc1)
+
+# CVE-2023-4623 has no known resolution
+
@@ -14,13 +14,13 @@ python () {
raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it")
}
-SRCREV_machine ?= "7327e7ab3b5508182380405a51f2657f5bf669b4"
-SRCREV_meta ?= "9e389e7f44a22bc637328f15e106f6d60631780e"
+SRCREV_machine ?= "af2faa46d440ee11170ba8233eec0f818988f256"
+SRCREV_meta ?= "59e0fce122a66f7dcaf7a2a8294d81c4b78197dc"
SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \
git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https"
-LINUX_VERSION ?= "6.1.52"
+LINUX_VERSION ?= "6.1.53"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
@@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc
# CVE exclusions
include recipes-kernel/linux/cve-exclusion_6.1.inc
-LINUX_VERSION ?= "6.1.52"
+LINUX_VERSION ?= "6.1.53"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}"
@@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native"
KMETA = "kernel-meta"
KCONF_BSP_AUDIT_LEVEL = "2"
-SRCREV_machine ?= "b3879adf00e338e66e92431a434fa2549ac88b83"
-SRCREV_meta ?= "9e389e7f44a22bc637328f15e106f6d60631780e"
+SRCREV_machine ?= "51f0e0b74445fb47b6544b26667f9d58b2017695"
+SRCREV_meta ?= "59e0fce122a66f7dcaf7a2a8294d81c4b78197dc"
PV = "${LINUX_VERSION}+git"
@@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.1/standard/base"
KBRANCH:qemuloongarch64 ?= "v6.1/standard/base"
KBRANCH:qemumips64 ?= "v6.1/standard/mti-malta64"
-SRCREV_machine:qemuarm ?= "3028542fe5ece9dd32c8e3b9b14b2c9f4c9cafac"
-SRCREV_machine:qemuarm64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83"
-SRCREV_machine:qemuloongarch64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83"
-SRCREV_machine:qemumips ?= "33c0b5a0c1af6abb4dee11ffa5ece66ffd01d3c8"
-SRCREV_machine:qemuppc ?= "b3879adf00e338e66e92431a434fa2549ac88b83"
-SRCREV_machine:qemuriscv64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83"
-SRCREV_machine:qemuriscv32 ?= "b3879adf00e338e66e92431a434fa2549ac88b83"
-SRCREV_machine:qemux86 ?= "b3879adf00e338e66e92431a434fa2549ac88b83"
-SRCREV_machine:qemux86-64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83"
-SRCREV_machine:qemumips64 ?= "ee418f38dbc9794b7976ad11fd74f5a3490c7c5e"
-SRCREV_machine ?= "b3879adf00e338e66e92431a434fa2549ac88b83"
-SRCREV_meta ?= "9e389e7f44a22bc637328f15e106f6d60631780e"
+SRCREV_machine:qemuarm ?= "b11af7d1c8b4337347747977173c878e7672eb15"
+SRCREV_machine:qemuarm64 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695"
+SRCREV_machine:qemuloongarch64 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695"
+SRCREV_machine:qemumips ?= "81af09853cc4318fad59e780c830c9cc8ccdc898"
+SRCREV_machine:qemuppc ?= "51f0e0b74445fb47b6544b26667f9d58b2017695"
+SRCREV_machine:qemuriscv64 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695"
+SRCREV_machine:qemuriscv32 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695"
+SRCREV_machine:qemux86 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695"
+SRCREV_machine:qemux86-64 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695"
+SRCREV_machine:qemumips64 ?= "6ec5ef2f6fa90a5823e131805845738453bc553a"
+SRCREV_machine ?= "51f0e0b74445fb47b6544b26667f9d58b2017695"
+SRCREV_meta ?= "59e0fce122a66f7dcaf7a2a8294d81c4b78197dc"
# set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll
# get the <version>/base branch, which is pure upstream -stable, and the same
# meta SRCREV as the linux-yocto-standard builds. Select your version using the
# normal PREFERRED_VERSION settings.
BBCLASSEXTEND = "devupstream:target"
-SRCREV_machine:class-devupstream ?= "59b13c2b647e464dd85622c89d7f16c15d681e96"
+SRCREV_machine:class-devupstream ?= "09045dae0d902f9f78901a26c7ff1714976a38f9"
PN:class-devupstream = "linux-yocto-upstream"
KBRANCH:class-devupstream = "v6.1/base"
@@ -45,7 +45,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA
SRC_URI += "file://0001-perf-cpumap-Make-counter-as-unsigned-ints.patch"
LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46"
-LINUX_VERSION ?= "6.1.52"
+LINUX_VERSION ?= "6.1.53"
PV = "${LINUX_VERSION}+git"