Skip to content

[AUTOPATCHER-kernel] Kernel CVE - branch 3.0-dev - CVE-2024-43904 CVE-2024-49917 CVE-2024-43911 CVE-2024-36972 CVE-2024-49897 CVE-2024-44955 CVE-2024-49899 CVE-2024-50067 CVE-2024-42122 CVE-2024-41080 CVE-2024-43835 CVE-2024-43913 CVE-2024-49915 CVE-2024-36910 CVE-2024-49926 CVE-2024-49891 CVE-2024-49898 CVE-2024-44963 CVE-2024-42252 CVE-2024-27011 CVE-2024-41071 CVE-2024-46841 CVE-2024-50010 CVE-2024-49914 CVE-2024-49909 CVE-2024-42156 CVE-2024-43857 CVE-2024-40965 CVE-2024-49911 CVE-2024-44950 CVE-2023-52920 CVE-2024-49974 CVE-2024-50027 CVE-2024-49906 CVE-2024-53085 CVE-2024-49934 #35513

[AUTOPATCHER-kernel] Kernel CVE - branch 3.0-dev - CVE-2024-43904 CVE-2024-49917 CVE-2024-43911 CVE-2024-36972 CVE-2024-49897 CVE-2024-44955 CVE-2024-49899 CVE-2024-50067 CVE-2024-42122 CVE-2024-41080 CVE-2024-43835 CVE-2024-43913 CVE-2024-49915 CVE-2024-36910 CVE-2024-49926 CVE-2024-49891 CVE-2024-49898 CVE-2024-44963 CVE-2024-42252 CVE-2024-27011 CVE-2024-41071 CVE-2024-46841 CVE-2024-50010 CVE-2024-49914 CVE-2024-49909 CVE-2024-42156 CVE-2024-43857 CVE-2024-40965 CVE-2024-49911 CVE-2024-44950 CVE-2023-52920 CVE-2024-49974 CVE-2024-50027 CVE-2024-49906 CVE-2024-53085 CVE-2024-49934

[AUTOPATCHER-kernel] Kernel CVE - branch 3.0-dev - CVE-2024-43904 CVE-2024-49917 CVE-2024-43911 CVE-2024-36972 CVE-2024-49897 CVE-2024-44955 CVE-2024-49899 CVE-2024-50067 CVE-2024-42122 CVE-2024-41080 CVE-2024-43835 CVE-2024-43913 CVE-2024-49915 CVE-2024-36910 CVE-2024-49926 CVE-2024-49891 CVE-2024-49898 CVE-2024-44963 CVE-2024-42252 CVE-2024-27011 CVE-2024-41071 CVE-2024-46841 CVE-2024-50010 CVE-2024-49914 CVE-2024-49909 CVE-2024-42156 CVE-2024-43857 CVE-2024-40965 CVE-2024-49911 CVE-2024-44950 CVE-2023-52920 CVE-2024-49974 CVE-2024-50027 CVE-2024-49906 CVE-2024-53085 CVE-2024-49934 #35513

# Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
# This action checks that the licenses.json file is up-to-date
# and that the LICENSES-MAP.md file is up-to-date
name: Spec License Map Check
on:
push:
branches: [main, dev, 1.0*, 2.0*, 3.0*, fasttrack/*]
pull_request:
branches: [main, dev, 1.0*, 2.0*, 3.0*, fasttrack/*]
jobs:
check:
name: Spec License Map Check
runs-on: ubuntu-latest
steps:
# Checkout the branch of our repo that triggered this action
- name: Workflow trigger checkout
uses: actions/checkout@v4
- name: Setup Python 3.12
uses: actions/setup-python@v5
with:
python-version: 3.12
- name: Get Python dependencies
run: python3 -m pip install python-rpm-spec
- name: Run license map checking script
run: |
python3 ./toolkit/scripts/license_map.py \
./LICENSES-AND-NOTICES/SPECS/data/licenses.json \
./LICENSES-AND-NOTICES/SPECS/LICENSES-MAP.md \
./SPECS \
./SPECS-EXTENDED \
./SPECS-SIGNED