- scripts/check-kernel-fix: output blacklist info
- scripts/common-functions: handling non-CVE commits
c-k-f was only using blacklist info when the entry had a cve reference (e.i. "$sha # CVE-xxxx-xxxxx").
Added blacklist info in output to provide extra context to user.
> ./scripts/check-kernel-fix 72cf9e94f32fc18096be3cc21216a78f50220e03
[...]
SL-16.0: MANUAL: backport 72cf9e94f32fc18096be3cc21216a78f50220e03 (Fixes v6.12)
SLE15-SP6: MANUAL: backport 72cf9e94f32fc18096be3cc21216a78f50220e03 (Fixes ea41367b2a60)
WW 72cf9e94f32fc18096be3cc21216a78f50220e03 # unsupported feature (WSL on cifs)
WW blacklist entry
> ./scripts/check-kernel-fix 6173a77b7e9d3e202bdb9897b23f2a8afe7bf286
Security fix for CVE-2023-53116 bsc#1242411 with CVSS 5.5
[...]
SLE12-SP3-TD: MANUAL: backport 6173a77b7e9d3e202bdb9897b23f2a8afe7bf286 (Fixes a07b4970f464)
SLE12-SP5: MANUAL: backport 6173a77b7e9d3e202bdb9897b23f2a8afe7bf286 (Fixes v4.12)
WW 6173a77b7e9d3e202bdb9897b23f2a8afe7bf286 # no nvme core/fabric fixes to missing infrastructure
WW blacklist entry without CVE reference. Recheck and remove or update the reference