From patchwork Thu Jun 5 16:32:19 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ross Burton X-Patchwork-Id: 64395 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id F2527C5AE59 for ; Thu, 5 Jun 2025 16:32:32 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web11.12347.1749141142633780329 for ; Thu, 05 Jun 2025 09:32:22 -0700 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: ross.burton@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id C17C21688 for ; Thu, 5 Jun 2025 09:32:04 -0700 (PDT) Received: from cesw-amp-gbt-1s-m12830-04.lab.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id E93E63F673 for ; Thu, 5 Jun 2025 09:32:21 -0700 (PDT) From: Ross Burton To: openembedded-core@lists.openembedded.org Subject: [PATCH] linux-yocto: refresh CVE exclusion list for 6.12.31 Date: Thu, 5 Jun 2025 17:32:19 +0100 Message-ID: <20250605163219.1202465-1-ross.burton@arm.com> X-Mailer: git-send-email 2.43.0 MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 05 Jun 2025 16:32:32 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/218073 Signed-off-by: Ross Burton --- .../linux/cve-exclusion_6.12.inc | 26 ++++++++++++------- 1 file changed, 17 insertions(+), 9 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index d33880eae0f..199ea019d5b 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2025-05-29 10:54:43.823437+00:00 for kernel version 6.12.30 -# From cvelistV5 cve_2025-05-29_1000Z-1-g4f2590b715f +# Generated at 2025-06-05 16:29:20.725105+00:00 for kernel version 6.12.31 +# From cvelistV5 cve_2025-06-05_1600Z python check_kernel_cve_status_version() { - this_version = "6.12.30" + this_version = "6.12.31" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -5054,8 +5054,6 @@ CVE_STATUS[CVE-2023-53023] = "fixed-version: Fixed from version 6.2" CVE_STATUS[CVE-2023-53024] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-53025] = "fixed-version: Fixed from version 6.2" - CVE_STATUS[CVE-2023-53026] = "fixed-version: Fixed from version 6.2" CVE_STATUS[CVE-2023-53028] = "fixed-version: Fixed from version 6.1.8" @@ -12564,8 +12562,6 @@ CVE_STATUS[CVE-2025-37780] = "cpe-stable-backport: Backported in 6.12.25" CVE_STATUS[CVE-2025-37781] = "cpe-stable-backport: Backported in 6.12.25" -CVE_STATUS[CVE-2025-37782] = "cpe-stable-backport: Backported in 6.12.25" - CVE_STATUS[CVE-2025-37783] = "fixed-version: only affects 6.14 onwards" CVE_STATUS[CVE-2025-37784] = "cpe-stable-backport: Backported in 6.12.25" @@ -12660,8 +12656,6 @@ CVE_STATUS[CVE-2025-37830] = "cpe-stable-backport: Backported in 6.12.26" CVE_STATUS[CVE-2025-37831] = "cpe-stable-backport: Backported in 6.12.26" -CVE_STATUS[CVE-2025-37832] = "cpe-stable-backport: Backported in 6.12.26" - CVE_STATUS[CVE-2025-37833] = "cpe-stable-backport: Backported in 6.12.26" CVE_STATUS[CVE-2025-37834] = "cpe-stable-backport: Backported in 6.12.26" @@ -12978,6 +12972,20 @@ CVE_STATUS[CVE-2025-37991] = "cpe-stable-backport: Backported in 6.12.28" CVE_STATUS[CVE-2025-37992] = "cpe-stable-backport: Backported in 6.12.30" +CVE_STATUS[CVE-2025-37993] = "cpe-stable-backport: Backported in 6.12.29" + +CVE_STATUS[CVE-2025-37994] = "cpe-stable-backport: Backported in 6.12.29" + +CVE_STATUS[CVE-2025-37995] = "cpe-stable-backport: Backported in 6.12.29" + +CVE_STATUS[CVE-2025-37996] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-37997] = "cpe-stable-backport: Backported in 6.12.29" + +CVE_STATUS[CVE-2025-37998] = "cpe-stable-backport: Backported in 6.12.29" + +CVE_STATUS[CVE-2025-37999] = "cpe-stable-backport: Backported in 6.12.29" + CVE_STATUS[CVE-2025-38049] = "cpe-stable-backport: Backported in 6.12.23" # CVE-2025-38104 needs backporting (fixed from 6.15)