From 447ca52429fae0bffb0e325cc26261494cc8578e Mon Sep 17 00:00:00 2001 From: Richard Purdie Date: Sat, 23 Dec 2023 08:45:07 +0000 Subject: [PATCH] linux/cve-exclusion6.1: Update to latest kernel point release (From OE-Core rev: c4ffd18d3e71b935acc050b106267db544d86df7) Signed-off-by: Richard Purdie --- meta/recipes-kernel/linux/cve-exclusion_6.1.inc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc index 56766acc01..3cf11d6daf 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2023-12-18 14:15:17.069657+00:00 for version 6.1.65 +# Generated at 2023-12-23 08:44:42.304531+00:00 for version 6.1.68 python check_kernel_cve_status_version() { - this_version = "6.1.65" + this_version = "6.1.68" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))