diff options
author | Ross Burton <ross.burton@arm.com> | 2023-06-12 14:10:30 +0100 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2023-06-13 22:16:27 +0100 |
commit | 86aee302673146dca10f313d0c70b69d6c4bdc7d (patch) | |
tree | 89cbcb5dbfa9d160340255110e42483eeee59151 /meta/conf/distro/include/cve-extra-exclusions.inc | |
parent | 9adffbb9b5fcd67d9c4e98d97bc459cbcc1b9c05 (diff) | |
download | openembedded-core-contrib-86aee302673146dca10f313d0c70b69d6c4bdc7d.tar.gz |
cve-extra-exclusions: add more ignores for 2023 kernel CVEs
All of these CVEs have been fixed in the kernel point release that we
currently ship, so ignore them.
Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/conf/distro/include/cve-extra-exclusions.inc')
-rw-r--r-- | meta/conf/distro/include/cve-extra-exclusions.inc | 52 |
1 files changed, 52 insertions, 0 deletions
diff --git a/meta/conf/distro/include/cve-extra-exclusions.inc b/meta/conf/distro/include/cve-extra-exclusions.inc index ff5d381523..41d751a7ae 100644 --- a/meta/conf/distro/include/cve-extra-exclusions.inc +++ b/meta/conf/distro/include/cve-extra-exclusions.inc @@ -591,6 +591,10 @@ CVE_CHECK_IGNORE += "CVE-2023-1990" # Fixed in 6.1.16 CVE_CHECK_IGNORE += "CVE-2023-1998" +# https://www.linuxkernelcves.com/cves/CVE-2023-2002 +# Fixed in 6.1.27 +CVE_CHECK_IGNORE += "CVE-2023-2002" + # https://www.linuxkernelcves.com/cves/CVE-2023-2156 # Fixed in 6.1.26 CVE_CHECK_IGNORE += "CVE-2023-2156" @@ -598,3 +602,51 @@ CVE_CHECK_IGNORE += "CVE-2023-2156" # https://www.linuxkernelcves.com/cves/CVE-2023-2162 # Fixed in 6.1.11 CVE_CHECK_IGNORE += "CVE-2023-2162" + +# https://www.linuxkernelcves.com/cves/CVE-2023-2194 +# Fixed with 6.1.22 +CVE_CHECK_IGNORE += "CVE-2023-2194" + +# https://www.linuxkernelcves.com/cves/CVE-2023-2235 +# Fixed with 6.1.21 +CVE_CHECK_IGNORE += "CVE-2023-2235" + +# https://www.linuxkernelcves.com/cves/CVE-2023-28328 +# Fixed with 6.1.2 +CVE_CHECK_IGNORE += "CVE-2023-28328" + +# https://www.linuxkernelcves.com/cves/CVE-2023-2985 +# Fixed in 6.1.16 +CVE_CHECK_IGNORE += "CVE-2023-2985" + +# https://www.linuxkernelcves.com/cves/CVE-2023-28866 +# Fixed with 6.1.22 +CVE_CHECK_IGNORE += "CVE-2023-28866" + +# https://www.linuxkernelcves.com/cves/CVE-2023-30456 +# Fixed with 6.1.21 +CVE_CHECK_IGNORE += "CVE-2023-30456" + +# https://www.linuxkernelcves.com/cves/CVE-2023-30772 +# Fixed with 6.1.22 +CVE_CHECK_IGNORE += "CVE-2023-30772" + +# https://www.linuxkernelcves.com/cves/CVE-2023-31436 +# Fixed with 6.1.26 +CVE_CHECK_IGNORE += "CVE-2023-31436" + +# https://www.linuxkernelcves.com/cves/CVE-2023-32233 +# Fixed with 6.1.28 +CVE_CHECK_IGNORE += "CVE-2023-32233" + +# https://www.linuxkernelcves.com/cves/CVE-2023-33203 +# Fixed with 6.1.22 +CVE_CHECK_IGNORE += "CVE-2023-33203" + +# https://www.linuxkernelcves.com/cves/CVE-2023-33288 +# Fixed with 6.1.22 +CVE_CHECK_IGNORE += "CVE-2023-33288" + +# https://www.linuxkernelcves.com/cves/CVE-2023-34256 +# Fixed in 6.1.29 +CVE_CHECK_IGNORE += "CVE-2023-34256" |