Skip to content

[AUTOPATCHER-kernel] Kernel CVE - branch main - CVE-2024-43834 CVE-2024-47670 CVE-2021-47482 CVE-2024-46852 CVE-2024-38545 CVE-2024-47671 CVE-2024-50058 CVE-2022-48635 CVE-2024-46859 CVE-2024-46854 CVE-2024-36893 CVE-2024-26875 CVE-2024-43839 CVE-2024-50072 CVE-2024-38538 CVE-2024-41080 CVE-2024-50036 CVE-2024-43849 CVE-2024-47673 CVE-2024-43835 CVE-2023-52913 CVE-2024-46849 CVE-2024-44931 CVE-2024-50086 CVE-2024-36972 CVE-2024-50010 CVE-2024-47672 CVE-2024-46853 CVE-2023-52601 CVE-2024-46695 CVE-2024-46855 CVE-2024-43841 CVE-2024-43846 CVE-2024-39463 CVE-2024-46858 #34084

[AUTOPATCHER-kernel] Kernel CVE - branch main - CVE-2024-43834 CVE-2024-47670 CVE-2021-47482 CVE-2024-46852 CVE-2024-38545 CVE-2024-47671 CVE-2024-50058 CVE-2022-48635 CVE-2024-46859 CVE-2024-46854 CVE-2024-36893 CVE-2024-26875 CVE-2024-43839 CVE-2024-50072 CVE-2024-38538 CVE-2024-41080 CVE-2024-50036 CVE-2024-43849 CVE-2024-47673 CVE-2024-43835 CVE-2023-52913 CVE-2024-46849 CVE-2024-44931 CVE-2024-50086 CVE-2024-36972 CVE-2024-50010 CVE-2024-47672 CVE-2024-46853 CVE-2023-52601 CVE-2024-46695 CVE-2024-46855 CVE-2024-43841 CVE-2024-43846 CVE-2024-39463 CVE-2024-46858

[AUTOPATCHER-kernel] Kernel CVE - branch main - CVE-2024-43834 CVE-2024-47670 CVE-2021-47482 CVE-2024-46852 CVE-2024-38545 CVE-2024-47671 CVE-2024-50058 CVE-2022-48635 CVE-2024-46859 CVE-2024-46854 CVE-2024-36893 CVE-2024-26875 CVE-2024-43839 CVE-2024-50072 CVE-2024-38538 CVE-2024-41080 CVE-2024-50036 CVE-2024-43849 CVE-2024-47673 CVE-2024-43835 CVE-2023-52913 CVE-2024-46849 CVE-2024-44931 CVE-2024-50086 CVE-2024-36972 CVE-2024-50010 CVE-2024-47672 CVE-2024-46853 CVE-2023-52601 CVE-2024-46695 CVE-2024-46855 CVE-2024-43841 CVE-2024-43846 CVE-2024-39463 CVE-2024-46858 #34084

# Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
# This action checks that the licenses.json file is up-to-date
# and that the LICENSES-MAP.md file is up-to-date
name: Spec License Map Check
on:
push:
branches: [main, dev, 1.0*, 2.0*, fasttrack/*]
pull_request:
branches: [main, dev, 1.0*, 2.0*, fasttrack/*]
permissions: read-all
jobs:
check:
name: Spec License Map Check
runs-on: ubuntu-latest
steps:
# Checkout the branch of our repo that triggered this action
- name: Workflow trigger checkout
uses: actions/checkout@v4
- name: Setup Python 3.9
uses: actions/setup-python@v4
with:
python-version: 3.9
- name: Get Python dependencies
run: python3 -m pip install python-rpm-spec
- name: Run license map checking script
run: |
python3 ./toolkit/scripts/license_map.py \
./SPECS/LICENSES-AND-NOTICES/data/licenses.json \
./SPECS/LICENSES-AND-NOTICES/LICENSES-MAP.md \
./SPECS \
./SPECS-EXTENDED \
./SPECS-SIGNED