[AUTOPATCHER-kernel] Kernel CVE - branch 3.0-dev - CVE-2024-43904 CVE-2024-49917 CVE-2024-43911 CVE-2024-36972 CVE-2024-49897 CVE-2024-44955 CVE-2024-49899 CVE-2024-50067 CVE-2024-42122 CVE-2024-41080 CVE-2024-43835 CVE-2024-43913 CVE-2024-49915 CVE-2024-36910 CVE-2024-49926 CVE-2024-49891 CVE-2024-49898 CVE-2024-44963 CVE-2024-42252 CVE-2024-27011 CVE-2024-41071 CVE-2024-46841 CVE-2024-50010 CVE-2024-49914 CVE-2024-49909 CVE-2024-42156 CVE-2024-43857 CVE-2024-40965 CVE-2024-49911 CVE-2024-44950 CVE-2023-52920 CVE-2024-49974 CVE-2024-50027 CVE-2024-49906 CVE-2024-53085 CVE-2024-49934 #35923
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Copyright (c) Microsoft Corporation. | |
# Licensed under the MIT License. | |
# This action checks that certain groups of specs have matching tags. | |
# The main use case is to ensure that signed specs have the same Version and | |
# Release tags as their unsigned counterparts | |
name: Spec Entanglement Mismatch Check | |
on: | |
push: | |
branches: [main, dev, 1.0*, 2.0*, 3.0*, fasttrack/*] | |
pull_request: | |
branches: [main, dev, 1.0*, 2.0*, 3.0*, fasttrack/*] | |
jobs: | |
check: | |
name: Spec Entanglement Mismatch Check | |
runs-on: ubuntu-latest | |
steps: | |
# Checkout the branch of our repo that triggered this action | |
- name: Workflow trigger checkout | |
uses: actions/checkout@v4 | |
# For consistency, we use the same major/minor version of Python that Azure Linux ships | |
- name: Setup Python 3.12 | |
uses: actions/setup-python@v5 | |
with: | |
python-version: 3.12 | |
- name: Get Python dependencies | |
run: python3 -m pip install -r toolkit/scripts/requirements.txt | |
- name: Run entanglement checking script | |
run: python3 toolkit/scripts/check_entangled_specs.py . |