Skip to content

[AUTOPATCHER-kernel] Kernel CVE - branch 3.0-dev - CVE-2024-41071 CVE-2024-36910 CVE-2024-49914 CVE-2024-44950 CVE-2024-41080 CVE-2024-49898 CVE-2024-50010 CVE-2024-40965 CVE-2024-50067 CVE-2024-53085 CVE-2024-43835 CVE-2023-52601 CVE-2024-49974 CVE-2024-49906 CVE-2024-44955 CVE-2024-46841 CVE-2024-49917 CVE-2024-49909 CVE-2024-49911 CVE-2024-26875 CVE-2024-43904 CVE-2023-52920 CVE-2024-49891 CVE-2024-27011 CVE-2024-49926 CVE-2024-49915 CVE-2024-36972 CVE-2024-44963 CVE-2024-50027 CVE-2024-49899 CVE-2024-43913 CVE-2024-42252 CVE-2024-43911 CVE-2024-42156 CVE-2024-42122 CVE-2024-49934 CVE-2024-43857 CVE-2024-49897 #37183

[AUTOPATCHER-kernel] Kernel CVE - branch 3.0-dev - CVE-2024-41071 CVE-2024-36910 CVE-2024-49914 CVE-2024-44950 CVE-2024-41080 CVE-2024-49898 CVE-2024-50010 CVE-2024-40965 CVE-2024-50067 CVE-2024-53085 CVE-2024-43835 CVE-2023-52601 CVE-2024-49974 CVE-2024-49906 CVE-2024-44955 CVE-2024-46841 CVE-2024-49917 CVE-2024-49909 CVE-2024-49911 CVE-2024-26875 CVE-2024-43904 CVE-2023-52920 CVE-2024-49891 CVE-2024-27011 CVE-2024-49926 CVE-2024-49915 CVE-2024-36972 CVE-2024-44963 CVE-2024-50027 CVE-2024-49899 CVE-2024-43913 CVE-2024-42252 CVE-2024-43911 CVE-2024-42156 CVE-2024-42122 CVE-2024-49934 CVE-2024-43857 CVE-2024-49897

[AUTOPATCHER-kernel] Kernel CVE - branch 3.0-dev - CVE-2024-41071 CVE-2024-36910 CVE-2024-49914 CVE-2024-44950 CVE-2024-41080 CVE-2024-49898 CVE-2024-50010 CVE-2024-40965 CVE-2024-50067 CVE-2024-53085 CVE-2024-43835 CVE-2023-52601 CVE-2024-49974 CVE-2024-49906 CVE-2024-44955 CVE-2024-46841 CVE-2024-49917 CVE-2024-49909 CVE-2024-49911 CVE-2024-26875 CVE-2024-43904 CVE-2023-52920 CVE-2024-49891 CVE-2024-27011 CVE-2024-49926 CVE-2024-49915 CVE-2024-36972 CVE-2024-44963 CVE-2024-50027 CVE-2024-49899 CVE-2024-43913 CVE-2024-42252 CVE-2024-43911 CVE-2024-42156 CVE-2024-42122 CVE-2024-49934 CVE-2024-43857 CVE-2024-49897 #37183

# Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
name: Check Manifests
on:
push:
branches: [main, dev, 1.0*, 2.0*, 3.0*, fasttrack/*]
pull_request:
branches: [main, dev, 1.0*, 2.0*, 3.0*, fasttrack/*]
jobs:
build:
name: Check Manifests
runs-on: ubuntu-latest
steps:
- name: Check out code
uses: actions/checkout@v4
# This PR runner uses an older Ubuntu with rpm version 4.17, which doesn't understand some newer macros like %bcond
- name: Define missing rpm macros
run: |
if [[ -n $(rpm --eval '%bcond test 1') ]]; then
echo '%bcond() %[ (%{2}) ? "%{expand:%%bcond_without %{1}}" : "%{expand:%%bcond_with %{1}}" ]' > ~/.rpmmacros
fi
- name: Check x86_64 manifests
run: |
echo ##########
echo "Ensure toolchain and pkggen manifests (./toolkit/resources/manifests/package/*) match the versions in the .spec files"
echo "Run './scripts/toolchain/check_manifests.sh -a "x86_64"' to validate locally"
echo ##########
pushd toolkit
./scripts/toolchain/check_manifests.sh -a "x86_64"
popd
- name: Check aarch64 manifests
run: |
echo ##########
echo "Ensure toolchain and pkggen manifests (./toolkit/resources/manifests/package/*) match the versions in the .spec files"
echo "Run './scripts/toolchain/check_manifests.sh -a "aarch64"' to validate locally"
echo ##########
pushd toolkit
./scripts/toolchain/check_manifests.sh -a "aarch64"
popd
if: always()