Skip to content

[AUTOPATCHER-kernel] Kernel CVE - branch 3.0-dev - CVE-2024-43904 CVE-2024-49917 CVE-2024-43911 CVE-2024-36972 CVE-2024-49897 CVE-2024-44955 CVE-2024-49899 CVE-2024-50067 CVE-2024-42122 CVE-2024-41080 CVE-2024-43835 CVE-2024-43913 CVE-2024-49915 CVE-2024-36910 CVE-2024-49926 CVE-2024-49891 CVE-2024-49898 CVE-2024-44963 CVE-2024-42252 CVE-2024-27011 CVE-2024-41071 CVE-2024-46841 CVE-2024-50010 CVE-2024-49914 CVE-2024-49909 CVE-2024-42156 CVE-2024-43857 CVE-2024-40965 CVE-2024-49911 CVE-2024-44950 CVE-2023-52920 CVE-2024-49974 CVE-2024-50027 CVE-2024-49906 CVE-2024-53085 CVE-2024-49934 #35923

[AUTOPATCHER-kernel] Kernel CVE - branch 3.0-dev - CVE-2024-43904 CVE-2024-49917 CVE-2024-43911 CVE-2024-36972 CVE-2024-49897 CVE-2024-44955 CVE-2024-49899 CVE-2024-50067 CVE-2024-42122 CVE-2024-41080 CVE-2024-43835 CVE-2024-43913 CVE-2024-49915 CVE-2024-36910 CVE-2024-49926 CVE-2024-49891 CVE-2024-49898 CVE-2024-44963 CVE-2024-42252 CVE-2024-27011 CVE-2024-41071 CVE-2024-46841 CVE-2024-50010 CVE-2024-49914 CVE-2024-49909 CVE-2024-42156 CVE-2024-43857 CVE-2024-40965 CVE-2024-49911 CVE-2024-44950 CVE-2023-52920 CVE-2024-49974 CVE-2024-50027 CVE-2024-49906 CVE-2024-53085 CVE-2024-49934

[AUTOPATCHER-kernel] Kernel CVE - branch 3.0-dev - CVE-2024-43904 CVE-2024-49917 CVE-2024-43911 CVE-2024-36972 CVE-2024-49897 CVE-2024-44955 CVE-2024-49899 CVE-2024-50067 CVE-2024-42122 CVE-2024-41080 CVE-2024-43835 CVE-2024-43913 CVE-2024-49915 CVE-2024-36910 CVE-2024-49926 CVE-2024-49891 CVE-2024-49898 CVE-2024-44963 CVE-2024-42252 CVE-2024-27011 CVE-2024-41071 CVE-2024-46841 CVE-2024-50010 CVE-2024-49914 CVE-2024-49909 CVE-2024-42156 CVE-2024-43857 CVE-2024-40965 CVE-2024-49911 CVE-2024-44950 CVE-2023-52920 CVE-2024-49974 CVE-2024-50027 CVE-2024-49906 CVE-2024-53085 CVE-2024-49934 #35923

# Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
# This action checks that certain groups of specs have matching tags.
# The main use case is to ensure that signed specs have the same Version and
# Release tags as their unsigned counterparts
name: Spec Entanglement Mismatch Check
on:
push:
branches: [main, dev, 1.0*, 2.0*, 3.0*, fasttrack/*]
pull_request:
branches: [main, dev, 1.0*, 2.0*, 3.0*, fasttrack/*]
jobs:
check:
name: Spec Entanglement Mismatch Check
runs-on: ubuntu-latest
steps:
# Checkout the branch of our repo that triggered this action
- name: Workflow trigger checkout
uses: actions/checkout@v4
# For consistency, we use the same major/minor version of Python that Azure Linux ships
- name: Setup Python 3.12
uses: actions/setup-python@v5
with:
python-version: 3.12
- name: Get Python dependencies
run: python3 -m pip install -r toolkit/scripts/requirements.txt
- name: Run entanglement checking script
run: python3 toolkit/scripts/check_entangled_specs.py .