From patchwork Tue Sep 16 15:51:16 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 70366 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1D9FBCAC598 for ; Tue, 16 Sep 2025 15:51:27 +0000 (UTC) Received: from mail-qv1-f48.google.com (mail-qv1-f48.google.com [209.85.219.48]) by mx.groups.io with SMTP id smtpd.web10.2132.1758037883364596616 for ; Tue, 16 Sep 2025 08:51:23 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=Q6i14H8j; spf=pass (domain: gmail.com, ip: 209.85.219.48, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f48.google.com with SMTP id 6a1803df08f44-78cce797cc2so8470706d6.2 for ; Tue, 16 Sep 2025 08:51:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1758037882; x=1758642682; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=0SRvrZz4D0KBj4R+M5Rd2N9nVGRAR/HxUPTp6fYsN8I=; b=Q6i14H8jAWb6gvfBZw4RjofXi0Ju7p7M3eJfKVC9HCvZJssbB50Od8UwrDGTSUqmS1 w6ukLnOIqz+hsVawvmdch8Mgo4dupknJ4f+0CcMcQBzQHP1GXOp0p5mmPjxBwb7rlIss ghT+QJVJHh6Ol4w0lrLvM4P6DDlSddGiya952iQY7LD/jh+ob3ozy01sIVT2ANeFJkQe Cab9Zu+AkK14BVxCDghkI6R4aoSQVVe4bf87Gt/IrG6smKGAd7pJok+HtnNqMCyXZOpb DHDK3DeDV4CyHju0/uc3B/uaMkuZXUK6i/RIpUiifa1qtRg8G2Eo0DglQdXZJB0MfzIJ NkYQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1758037882; x=1758642682; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=0SRvrZz4D0KBj4R+M5Rd2N9nVGRAR/HxUPTp6fYsN8I=; b=qsx4bii/MwFuz4/f2KGCGNGX7liqo/oZ03iuRaWrnF7Op7arCMAfIvFtwJAvHlj1zz 3zCSd4ASwBEYcgM6X+uuD5MG9nAup5J773G2EQ/HLCye452bbnj9dBMOiCnXgUGDwJ3E iLOw/RL1uUHb7Ah9lBsXY9UjOb936RIpTLkqhk1le7JMcQ8tUJgLV2nghWyebaMai2gt W+5WYZu7lPMKCQFckHFpKV8+Tc0WVBHpk3S6e/E6xSpf9igAgVblg4wm+dV+zcLIhBCj /Bk3+Yv/lxfRhs3u4R0XR7POQDxiNgmfpkZOb4WEDoSvg9xY1ZcmZwnC3o71/WuBk2Mu aSVA== X-Gm-Message-State: AOJu0YxCayd/daeE1E31ebIpnhmr7bcHM6Jvbrf/JzxZAVOW4JtLnROx h5yiof59F+FfEUhFBU/ticjjinSl00jOV8ZLOoEYvm8Gik8sovuP7bk9YPuCtb9h X-Gm-Gg: ASbGncs4zX8TN2O+jPuE9aqsXSNvyPGhmI/iXgBEt17e/z6/eGo0DPhHee5BbHiN/s9 PjeiIViqp+tmItwxqKULL4OsdscT8NRZbMEoyIbHi+CR9HR4wJlXSX5RDVIWmDcW2d8l0l+Uyeo nQBUkMgoOHh+vz9VdPTNBG8nhSRjxCU7XAZvjGeXHGbFAPWGDcTy88NZA86l9NP09xggWIKxgua LByttFK6sgWha28SFCbl5esECqZE8IwR9YpsC4utxvb71gRX8LIAT1FL+i07mHJaNK931yTwgsy O0fkR2ZI9LN3gPsk4VaS42Y0ijMHP3DItxCAInQrZUBcQwv13G4xat2osqF+JeS0wxOVG/IgRBh nwUQIp63nfayQqIWCq8c2pJv80Uab85JlPgVOJ9i76zuj/3+cRBcm807Va3Nb61wFaahBi75ScD 88RKNIcXcPY3X/NbuWPBbWVUk+2SrUH1JMU/NntlXSL8t1agPODNeizbM= X-Google-Smtp-Source: AGHT+IG81Sz2+JBvtui0Nv/BC6VAcgQtUK1HYdtzcyjWN1/QtxQ3KTclZarh65RNTO6baRMTyOLC5g== X-Received: by 2002:ad4:4ee5:0:b0:726:c288:a666 with SMTP id 6a1803df08f44-767c56218f4mr195042956d6.59.1758037881816; Tue, 16 Sep 2025 08:51:21 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-786c9c68cd2sm33724456d6.7.2025.09.16.08.51.20 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 16 Sep 2025 08:51:21 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 1/4] linux-yocto/6.16: update to v6.16.7 Date: Tue, 16 Sep 2025 11:51:16 -0400 Message-Id: <20250916155119.1583243-1-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 16 Sep 2025 15:51:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/223564 From: Bruce Ashfield Updating linux-yocto/6.16 to the latest korg -stable release that comprises the following commits: no ids found, dumping: 131e2001572ba Linux 6.16.7 a6b94f1030917 x86/vmscape: Add old Intel CPUs to affected list 2bb658abee57f x86/vmscape: Warn when STIBP is disabled with SMT 923ab9f5743de x86/bugs: Move cpu_bugs_smt_update() down 9c23a90648e83 x86/vmscape: Enable the mitigation 510603f504796 x86/vmscape: Add conditional IBPB mitigation d83e6111337f3 x86/vmscape: Enumerate VMSCAPE bug 781b69117c839 Documentation/hw-vuln: Add VMSCAPE documentation 1037d3a33ba60 Linux 6.16.6 b5b8685e13885 Revert "drm/i915/gem: Allow EXEC_CAPTURE on recoverable contexts on DG1" 6976744651f8c riscv: Fix sparse warning about different address spaces 8b94eb38bf7fc riscv: Fix sparse warning in __get_user_error() 0e2243cc719f3 riscv: kexec: Initialize kexec_buf struct 11d86a69dd7f6 riscv, bpf: use lw when reading int cpu in bpf_get_smp_processor_id fc11ff5cad08e riscv, bpf: use lw when reading int cpu in BPF_MOV64_PERCPU_REG b5176a7d4593b riscv: use lw when reading int cpu in asm_per_cpu b363a9e06b791 riscv: use lw when reading int cpu in new_vmalloc_check f4bf4771c33d7 riscv: uaccess: fix __put_user_nocheck for unaligned accesses b884f96b99e9c riscv: Only allow LTO with CMODEL_MEDANY 25acf99edbb91 ACPI: RISC-V: Fix FFH_CPPC_CSR error handling 4d9378e846a09 drm/i915/gem: Allow EXEC_CAPTURE on recoverable contexts on DG1 91b2601bd2b25 md: prevent incorrect update of resync/recovery offset fbd879fc77ebb md/raid1: fix data lost for writemostly rdev 927f06d82bc0a tools: gpio: remove the include directory on make clean 17c1e414bdf8a drm/amd/amdgpu: Fix missing error return on kzalloc failure e4de48e66af17 spi: spi-qpic-snand: unregister ECC engine on probe error and device remove 94ed86f35712c perf bpf-utils: Harden get_bpf_prog_info_linear 355746d9c4c03 perf bpf-utils: Constify bpil_array_desc f3bf21de0b192 perf bpf-event: Fix use-after-free in synthesis 9167bb686dfeb drm/bridge: ti-sn65dsi86: fix REFCLK setting 0b2cca4ace91a hwmon: (ina238) Correctly clamp power limits 6bc941d245246 hwmon: (ina238) Correctly clamp shunt voltage limit 765c24377ba87 spi: spi-fsl-lpspi: Clear status register after disabling the module 754f6170d9467 spi: spi-fsl-lpspi: Reset FIFO and disable module on transfer abort 2255b03e254c6 spi: spi-fsl-lpspi: Set correct chip-select polarity bit 6768188268067 spi: spi-fsl-lpspi: Fix transmissions when using CONT 28cd1a1938d2e scsi: sr: Reinstate rotational media flag db936356012c7 hwmon: (ina238) Correctly clamp temperature 71895f8bc84a2 hwmon: mlxreg-fan: Prevent fans from getting stuck at 0 RPM 74286dde3dff5 platform/x86/intel: power-domains: Use topology_logical_package_id() for package ID cbb4ff4faa02e platform/x86: acer-wmi: Stop using ACPI bitmap for platform profile choices e7a70326fb26b platform/x86: asus-wmi: Fix racy registrations 796eac3ab5e49 platform/x86: asus-wmi: Remove extra keys from ignore_key_wlan quirk 369bf6e241506 pcmcia: Add error handling for add_interval() in do_validate_mem() afc07186508fd pcmcia: omap: Add missing check for platform_get_resource bafcd9a0904c8 ALSA: hda: tas2781: reorder tas2563 calibration variables 5601628904a4e ALSA: hda: tas2781: fix tas2563 EFI data endianness 1dfa6e6660521 ALSA: hda/realtek: Fix headset mic for TongFang X6[AF]R5xxY cfe842782fa5e ALSA: hda/hdmi: Add pin fix for another HP EliteDesk 800 G4 model d4797bdb25ada rust: support Rust >= 1.91.0 target spec 0fe5997644db7 drm/dp: Change AUX DPCD probe address from LANE0_1_STATUS to TRAINING_PATTERN_SET a0d0606bfdc03 microchip: lan865x: Fix LAN8651 autoloading 1671a3ba1b20e microchip: lan865x: Fix module autoloading d9e6c6b87b3b3 net: pcs: rzn1-miic: Correct MODCTRL register offset 686b70cf18c7f net: dsa: mv88e6xxx: Fix fwnode reference leaks in mv88e6xxx_port_setup_leds 0aec321128348 e1000e: fix heap overflow in e1000_set_eeprom 3c26a8d30ed6b cifs: prevent NULL pointer dereference in UTF16 conversion a67c6397fcb7e batman-adv: fix OOB read/write in network-coding decode 9735a9dcc3074 audit: fix out-of-bounds read in audit_compare_dname_path() 576b3139e6a06 nouveau: Membar before between semaphore writes and the interrupt fc988f315be1a nouveau: fix disabling the nonstall irq due to storm code 897f64b01c124 scsi: lpfc: Fix buffer free/clear order in deferred receive path 0dd4a4cc9afdd platform/x86/amd/pmc: Add TUXEDO IB Pro Gen10 AMD to spurious 8042 quirks list dc2631d967657 drm/amdgpu/sdma: bump firmware version checks for user queue support 6c6eaa2686d05 drm/amd/display: Clear the CUR_ENABLE register on DCN314 w/out DPP PG 7d689cd99000e drm/amdgpu/mes11: make MES_MISC_OP_CHANGE_CONFIG failure non-fatal f4dbf2378a338 drm/amdgpu: drop hw access in non-DC audio fini 658e7c743b359 drm/xe: Fix incorrect migration of backed-up object to VRAM ac8a13f35d5b8 spi: microchip-core-qspi: stop checking viability of op->max_freq in supports_op callback 18dc52894e581 net: ethernet: oa_tc6: Handle failure of spi_setup e3d63ba3c8939 wifi: mt76: mt7925: skip EHT MLD TLV on non-MLD and pass conn_state for sta_cmd c7543945218b2 wifi: mt76: mt7925: fix the wrong bss cleanup for SAP f49502797dda5 wifi: mt76: mt7996: Initialize hdr before passing to skb_put_data() c6dbd5b27bee7 wifi: mt76: mt7925u: use connac3 tx aggr check in tx complete 5285b7009dc1e wifi: mwifiex: Initialize the chan_stats array to zero 2f2a09eb89716 wifi: mac80211: do not permit 40 MHz EHT operation on 5/6 GHz 6167d72fe59ab soc: qcom: mdt_loader: Deal with zero e_shentsize f3286ad8eeae1 of_numa: fix uninitialized memory nodes causing kernel panic c7468458f6222 proc: fix missing pde_set_flags() for net proc files 85e66331b6060 ocfs2: prevent release journal inode after journal shutdown 2616a517f9e2f kunit: kasan_test: disable fortify string checker on kasan_strings() test 26fb3a4b5dfe2 kasan: fix GCC mem-intrinsic prefix with sw tags b921c288cd8ab sched: Fix sched_numa_find_nth_cpu() if mask offline eb3240ffd243b mm: slub: avoid wake up kswapd in set_track_prepare 28bdebd1a96c9 mm: fix possible deadlock in kmemleak 458c3d3d5d0f3 mm: introduce and use {pgd,p4d}_populate_kernel() 469f9d2275147 mm: move page table sync declarations to linux/pgtable.h cba402a1654f5 mm: fix accounting of memmap pages bd1ee62759d0b mm/userfaultfd: fix kmap_local LIFO ordering for CONFIG_HIGHPTE 6bf9473727569 x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() 3baa1da473e6e mm/slub: avoid accessing metadata when pointer is invalid in object_err() 47c430e31bac0 rust: mm: mark VmaNew as transparent d7286005e8fde pcmcia: Fix a NULL pointer dereference in __iodyn_find_io_region() 6bb712ab08468 arm64: ftrace: fix unreachable PLT for ftrace_caller in init_module with CONFIG_DYNAMIC_FTRACE 01352cf09f616 ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() 565d2c15b6c36 accel/ivpu: Prevent recovery work from being queued during device removal 0bb3678a24cfe ALSA: usb-audio: Add mute TLV for playback volumes on some devices 38a96e12700ed phy: mscc: Stop taking ts_lock for tx_queue and use its own lock 539b6b94b1483 selftest: net: Fix weird setsockopt() in bind_bhash.c. 33a5bac5f1477 ppp: fix memory leak in pad_compress_skb 92e2fc92bc4eb net: xilinx: axienet: Add error handling for RX metadata pointer retrieval 008db2e0c171d net: atm: fix memory leak in atm_register_sysfs when device_register fail 48a3d045a01d7 netfilter: nf_tables: Introduce NFTA_DEVICE_PREFIX 96040b27f0cda selftests: netfilter: fix udpclash tool hang b1c71d674a308 ax25: properly unshare skbs in ax25_kiss_rcv() dec6117dc4faf mctp: return -ENOPROTOOPT for unknown getsockopt options e5ea3347004c8 net/smc: Remove validation of reserved bits in CLC Decline message 2e0a09caf438d ipv4: Fix NULL vs error pointer check in inet_blackhole_dev_init() ddb3952b8562d net: thunder_bgx: decrement cleanup index before use 3b25d378cea2d net: thunder_bgx: add a missing of_node_put 0c5eba454e885 net: lockless sock_i_ino() 242124e3e3a7f net: remove sock_i_uid() bb137937410b7 tools: ynl-gen: fix nested array counting 5cb7cab7adf9b wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() d7d989786ad38 wifi: libertas: cap SSID len in lbs_associate() a7b20f5e2e96f wifi: cw1200: cap SSID length in cw1200_do_join() 8cfa0f076842f vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects 0e8630f24c14d vxlan: Fix NPD when refreshing an FDB entry with a nexthop object 047a79ada2e0f net: ethernet: mtk_eth_soc: fix tx vlan tag for llc packets 3d2b356d994a8 net/tcp: Fix socket memory leak in TCP-AO failure handling for IPv6 9a394fd149502 wifi: ath11k: fix group data packet drops during rekey f1b8de7ff8d57 wifi: ath12k: Set EMLSR support flag in MLO flags for EML-capable stations 129c1cb8a081a ixgbe: fix incorrect map used in eee linkmode 9c21fc4cebd44 i40e: Fix potential invalid access when MAC list is empty 7d190963b80f4 i40e: remove read access to debugfs files 6275dc1c8c80e idpf: set mac type when adding and removing MAC filters 923c267bdbb64 ice: fix NULL access of tx->in_use in ice_ll_ts_intr 1467a873b2011 ice: fix NULL access of tx->in_use in ice_ptp_ts_irq 485302905bada net: ethernet: ti: am65-cpsw-nuss: Fix null pointer dereference for ndev d6c3e9bfe7350 net: mctp: usb: initialise mac header in RX path 058e422598330 net: mctp: mctp_fraq_queue should take ownership of passed skb 34f17cbe02705 net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync() a3b3c20a80c33 macsec: read MACSEC_SA_ATTR_PN with nla_get_uint a4cb0a15ab8e6 net: macb: Fix tx_ptr_lock locking 7b77d8841a98a eth: mlx4: Fix IS_ERR() vs NULL check bug in mlx4_en_create_rx_ring c3e20abfd33d8 icmp: fix icmp_ndo_send address translation for reply direction d7d0de9255c08 bnxt_en: fix incorrect page count in RX aggr ring log c274b62e70c8e selftests: drv-net: csum: fix interface name for remote host aaa30b728f346 mISDN: Fix memory leak in dsp_hwec_enable() f10d3c7267ac7 ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog 07edb776309b9 xirc2ps_cs: fix register access when enabling FullDuplex e79923824c48b net_sched: gen_estimator: fix est_timer() vs CONFIG_PREEMPT_RT=y d927db98d4989 netfilter: nft_flowtable.sh: re-run with random mtu sizes 3dff390f55ccd Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() 7cc08f2f127b9 Bluetooth: vhci: Prevent use-after-free by removing debugfs files early b9b9e95673f89 wifi: iwlwifi: cfg: add back more lost PCI IDs 79be7358b7abf wifi: iwlwifi: cfg: restore some 1000 series configs 60c2a809dac57 wifi: iwlwifi: uefi: check DSM item validity 5deadb93925b2 wifi: iwlwifi: acpi: check DSM func validity a530078dede8b wifi: iwlwifi: if scratch is ~0U, consider it a failure fb3cd5557e4af netfilter: conntrack: helper: Replace -EEXIST by -EBUSY a74abcf0f09f5 netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm c91a59b04f928 wifi: mt76: fix linked list corruption 79ed4e9d8624d wifi: mt76: free pending offchannel tx frames on wcid cleanup 8fa8eb52bc2eb wifi: mt76: mt7915: fix list corruption after hardware restart 69dcc19048fcd wifi: mt76: mt7996: add missing check for rx wcid entries 98fa445f046e4 wifi: mt76: mt7996: use the correct vif link for scanning/roc eb19d5fb07ce5 wifi: mt76: mt7996: disable beacons when going offchannel 731ea9b79921b wifi: mt76: prevent non-offchannel mgmt tx during scan/roc f614c33469f32 wifi: mt76: mt7925: fix locking in mt7925_change_vif_links() eab71f6d9c9e3 wifi: mt76: mt7921: don't disconnect when CSA to DFS chan 2f6fbc8e04ca1 wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work 912c4b66bef71 wifi: cfg80211: fix use-after-free in cmp_bss() ad5d04d3af6c5 ARM: dts: microchip: sama7d65: Force SDMMC Legacy mode 3da20d91bf3c3 arm64: dts: rockchip: Add supplies for eMMC on rk3588-orangepi-5 ab47aff6eacbd arm64: dts: rockchip: Fix the headphone detection on the orangepi 5 plus e193a598d44c5 arm64: dts: imx8mp: Fix missing microSD slot vqmmc on Data Modul i.MX8M Plus eDM SBC 4334484a9fab6 arm64: dts: imx8mp: Fix missing microSD slot vqmmc on DH electronics i.MX8M Plus DHCOM fad6a22f7c9ff arm64: dts: imx8mp-tqma8mpql: fix LDO5 power off 5d5cc7f07e309 tee: optee: ffa: fix a typo of "optee_ffa_api_is_compatible" d885fd7ea8767 arm64: dts: rockchip: Add vcc-supply to SPI flash on rk3399-pinebook-pro 477d1047b42bc arm64: dts: rockchip: mark eeprom as read-only for Radxa E52C 079cda5416f69 tee: fix memory leak in tee_dyn_shm_alloc_helper 5e07a4235bb85 tee: fix NULL pointer dereference in tee_shm_put c8c14adf80bd1 fs: writeback: fix use-after-free in __mark_inode_dirty() 016284a03e4b9 platform/x86/amd: pmc: Drop SMU F/W match for Cezanne 0800d979754e6 btrfs: zoned: skip ZONE FINISH of conventional zones 6edbd021384f2 btrfs: clear block dirty if submit_one_sector() failed e1ec77b94094a drm/rockchip: vop2: make vp registers nonvolatile 33224433facf0 Bluetooth: hci_sync: Avoid adding default advertising on startup 47f69d107dc89 cpupower: Fix a bug where the -t option of the set subcommand was not working. c4710623b0715 drm/amd/display: Don't warn when missing DCE encoder caps c89a3d2976926 cdc_ncm: Flag Intel OEM version of Fibocom L850-GL as WWAN c7f5d772cb457 LoongArch: Add cpuhotplug hooks to fix high cpu usage of vCPU threads b7c715b1f2db8 LoongArch: Save LBT before FPU in setup_sigcontext() 76ff6437b42f9 ALSA: usb-audio: Allow Focusrite devices to use low samplerates 1b1a33795a69f ASoC: SOF: Intel: WCL: Add the sdw_process_wakeen op 391203f7684a1 ASoC: rsnd: tidyup direction name on rsnd_dai_connect() 1d282dcd46d97 ASoC: soc-core: care NULL dirver name on snd_soc_lookup_component_nolocked() e4d126372b354 btrfs: avoid load/store tearing races when checking if an inode was logged e1ed129365590 btrfs: fix race between setting last_dir_index_offset and inode logging 6ef5d43fe1680 btrfs: fix race between logging inode and checking if it was logged before 4645fefac0b24 Linux 6.16.5 18e997eb3f197 thermal/drivers/mediatek/lvts_thermal: Add mt7988 lvts commands dcb1ca0f1292c thermal/drivers/mediatek/lvts_thermal: Add lvts commands and their sizes to driver data 277c236369d3e thermal/drivers/mediatek/lvts_thermal: Change lvts commands array to static const 05981233cf2e6 Revert "drm/dp: Change AUX DPCD probe address from DPCD_REV to LANE0_1_STATUS" 4e06c33aaa5dd firmware: qcom: scm: request the waitqueue irq *after* initializing SCM bcd14791ba62d firmware: qcom: scm: initialize tzmem before marking SCM as available 6e7c7570cec6a firmware: qcom: scm: take struct device as argument in SHM bridge enable 617ad64abf488 firmware: qcom: scm: remove unused arguments from SHM bridge routines 29f50d2d45773 net: rose: fix a typo in rose_clear_routes() 5d7f6c7c8e1f2 drm/amdgpu/gfx12: set MQD as appriopriate for queue types bd94b24e430dd drm/amdgpu/gfx11: set MQD as appriopriate for queue types b013c68c1e27c drm/amdgpu: update firmware version checks for user queue support 3f46d1d3028ed drm/amdgpu/userq: fix error handling of invalid doorbell 6c3f9d0e68cad drm/amd/amdgpu: disable hwmon power1_cap* for gfx 11.0.3 on vf mode fae58d0155a97 drm/mediatek: Fix device/node reference count leaks in mtk_drm_get_all_drm_priv e15b65e97a24a drm/msm/dpu: Initialize crtc_state to NULL in dpu_plane_virtual_atomic_check() b09382cf94f61 drm/nouveau: fix error path in nvkm_gsp_fwsec_v2 6badb500f28bd drm/nouveau/disp: Always accept linear modifier 84603ed1d73eb drm/xe/vm: Clear the scratch_pt pointer on error 39fc2742ca14f xfs: do not propagate ENODATA disk errors into xattr code 2809b4ad54d52 smb3 client: fix return code mapping of remap_file_range 9a1e84d931aae net: usb: qmi_wwan: add Telit Cinterion LE910C4-WWX new compositions cc82c6dff548f fs/smb: Fix inconsistent refcnt update f09b0b4737110 dma/pool: Ensure DMA_DIRECT_REMAP allocations are decrypted 6ed86bb11d564 blk-zoned: Fix a lockdep complaint about recursive locking 6a0f13941c3b8 arm64: mm: Fix CFI failure due to kpti_ng_pgd_alloc function signature 7f5fffcce99e2 Revert "drm/amdgpu: fix incorrect vm flags to map bo" 183def8e4d786 HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() 317daff171202 HID: wacom: Add a new Art Pen 2 7ad5732b5c8d9 HID: logitech: Add ids for G PRO 2 LIGHTSPEED c5a2cced95d5e HID: quirks: add support for Legion Go dual dinput modes b8194c1ce4911 HID: elecom: add support for ELECOM M-DT2DRBK c13e95587583d HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() 72a4ec018c9e9 HID: asus: fix UAF via HID_CLAIMED_INPUT validation 34ec932cdd270 x86/cpu/topology: Use initial APIC ID from XTOPOLOGY leaf on AMD/HYGON 1b101bd8771dc x86/microcode/AMD: Handle the case of no BIOS microcode 15bfe327c0d11 x86/cpu/intel: Fix the constant_tsc model check for Pentium 4 6d28659b692a0 RISC-V: KVM: fix stack overrun when loading vlenb f57a4bd8d6cb5 KVM: x86: use array_index_nospec with indices that come from guest c45fcd475d2a5 drm/mediatek: mtk_hdmi: Fix inverted parameters in some regmap_update_bits calls 390a61d284e1c io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths 3fdc52cb8471b net: macb: Disable clocks once 71581a82f38e5 efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare 3ac5f54e47eb3 fbnic: Move phylink resume out of service_task and into open/close 069eb65689974 l2tp: do not use sock_hold() in pppol2tp_session_get_sock() f6c2cc99fc238 sctp: initialize more fields in sctp_v6_from_sk() 384210cceb187 net: rose: include node references in rose_neigh refcount 203e4f42596ed net: rose: convert 'use' field to refcount_t 188ec77b9920b net: rose: split remove and free operations in rose_remove_neigh() f4f411c068402 io_uring/kbuf: fix signedness in this_len calculation 1505c0e01ce13 net: hv_netvsc: fix loss of early receive events from host during channel open. 19a592efa56f7 net: stmmac: Set CIC bit only for TX queues with COE 5a4ec12b2d6ee net: stmmac: xgmac: Correct supported speed modes f71b60e28658e net: stmmac: xgmac: Do not enable RX FIFO Overflow interrupts 7b1a7ce6e8f2f net/mlx5e: Set local Xoff after FW update 0802bdbd0e5d0 net/mlx5e: Update and set Xon/Xoff upon port speed set 58d33407a9fec net/mlx5e: Update and set Xon/Xoff upon MTU set a189ac7061062 net/mlx5: Prevent flow steering mode changes in switchdev mode 4b6789407d88c net/mlx5: Nack sync reset when SFs are present 06d897148e796 net/mlx5: Fix lockdep assertion on sync reset unload event d0ac0788647c4 net/mlx5: Reload auxiliary drivers on fw_activate ca20c7a9ac945 net/mlx5: HWS, Fix pattern destruction in mlx5hws_pat_get_pattern error path 3668ba8832f1f net/mlx5: HWS, Fix uninitialized variables in mlx5hws_pat_calc_nop error flow 051fd8576a2e4 net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow 86d13a6f49cb6 net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path 5c5f9f42680c2 bnxt_en: Fix stats context reservation logic c23655b69ec2a bnxt_en: Adjust TX rings if reservation is less than requested 9ab6a9950f152 bnxt_en: Fix memory corruption when FW resources change during ifdown 1228285399c56 net: macb: Fix offset error in gem_update_stats 11a6bd4c111b3 phy: mscc: Fix when PTP clock is register and unregister 8dc9a2db9e4d1 block: validate QoS before calling __rq_qos_done_bio() 26dc1731d305c drm/xe: Don't trigger rebind on initial dma-buf validation 70f7b3757644d drm/xe/vm: Don't pin the vm_resv during validation dc023a2821e41 drm/xe/xe_sync: avoid race during ufence signaling 630c0e6064daf efi: stmm: Fix incorrect buffer allocation method ba82313c3cb62 net: dlink: fix multicast stats being counted incorrectly 43fc5da8133ba mISDN: hfcpci: Fix warning when deleting uninitialized timer 130dbfea172b2 Octeontx2-af: Fix NIX X2P calibration failures 691d30b0cd45b octeontx2: Set appropriate PF, VF masks and shifts based on silicon aaec54254b02f drm/msm/dpu: Add a null ptr check for dpu_encoder_needs_modeset 4437134c70418 dt-bindings: display/msm: qcom,mdp5: drop lut clock 23786f49e1dba ixgbe: fix ixgbe_orom_civd_info struct layout 6fdfa22260f3b ice: fix incorrect counter for buffer allocation failures a9dd49ee69aed ice: use fixed adapter index for E825C embedded devices 379e7ef26c34b ice: don't leave device non-functional if Tx scheduler config fails db783756a7d7c ice: fix NULL pointer dereference in ice_unplug_aux_dev() on reset 7359123a27ac0 drm/nouveau: remove unused memory target test 0d6f4cb7b08fe drm/nouveau: remove unused increment in gm200_flcn_pio_imem_wr 3ab9f5ad9baef atm: atmtcp: Prevent arbitrary write in atmtcp_recv_control(). 4e37da7d8b730 Octeontx2-vf: Fix max packet length errors 69d75cb29e29a page_pool: fix incorrect mp_ops error handling 42f0533d5aa74 Bluetooth: hci_sync: fix set_local_name race condition 95fe796e047cb Bluetooth: hci_event: Disconnect device when BIG sync is lost b211e692e7312 Bluetooth: hci_event: Detect if HCI_EV_NUM_COMP_PKTS is unbalanced 038e265999bdb Bluetooth: hci_event: Mark connection as closed during suspend disconnect 03a54e430f827 Bluetooth: hci_event: Treat UNKNOWN_CONN_ID on disconnect as success 7af23ab3235a5 Bluetooth: hci_conn: Make unacked packet handling more robust 775fe690fd4a3 net: macb: fix unregister_netdev call order in macb_remove() 7b5b1eec9f615 idpf: stop Tx if there are insufficient buffer resources b2eb0df4a8b75 idpf: replace flow scheduling buffer ring with buffer pool 4de02114bab55 idpf: simplify and fix splitq Tx packet rollback error path 9e20a0a4b0106 idpf: add support for Tx refillqs in flow scheduling mode 207efc71c8b75 HID: input: report battery status changes immediately 7450f1b95d5c5 HID: input: rename hidinput_set_battery_charge_status() 8d49313e68927 powerpc/kvm: Fix ifdef to remove build warning 9a94e9d8b50bc drm/mediatek: Add error handling for old state CRTC in atomic_disable 82e74510142e4 drm/msm: update the high bitfield of certain DSI registers d7c5df524435a drm/msm/dpu: correct dpu_plane_virtual_atomic_check() 127cbbe8fefea drm/msm/kms: move snapshot init earlier in KMS init ba3a3c4929bf8 HID: intel-thc-hid: Intel-quicki2c: Enhance driver re-install flow 78d4cf0466c79 HID: intel-thc-hid: intel-thc: Fix incorrect pointer arithmetic in I2C regs save 4adce86d4b13d HID: intel-thc-hid: intel-quicki2c: Fix ACPI dsd ICRS/ISUB length ff9c072d6b89f of: reserved_mem: Restructure call site for dma_contiguous_early_fixup() 91b3d8efdfbea drm/msm: Defer fd_install in SUBMIT ioctl 018afe914b712 net: ipv4: fix regression in local-broadcast routes 6b4abb5b79280 vhost/net: Protect ubufs with rcu read lock in vhost_net_ubuf_put() d9eb5a95b4f99 platform/x86: int3472: add hpd pin support 88e6c42e40dea io_uring/io-wq: add check free worker before create new worker 9ee6dbfcf557e erofs: fix atomic context detection when !CONFIG_DEBUG_LOCK_ALLOC 15e8cc0bf27b7 erofs: Fallback to normal access if DAX is not supported on extra device 1e46ce777fa1f ASoC: rt1320: fix random cycle mute issue 7a33a93b3d897 ASoC: rt721: fix FU33 Boost Volume control not working 880bcc7b20ec8 ASoC: codecs: tx-macro: correct tx_macro_component_drv name 289f945acb20b smb: client: fix race with concurrent opens in rename(2) dddeed19782df smb: client: fix race with concurrent opens in unlink(2) b08a26b87b234 scsi: core: sysfs: Correct sysfs attributes access rights 857eb3e4d0333 vhost: Fix ioctl # for VHOST_[GS]ET_FORK_FROM_OWNER ba97b7a8a2089 Revert "virtio: reject shm region if length is zero" 8d947540ee118 perf symbol-minimal: Fix ehdr reading in filename__read_build_id fbd4cf7ee4db6 ftrace: Fix potential warning in trace_printk_seq during ftrace_dump aa316a7eb47ab fgraph: Copy args in intermediate storage with entry 10a5a83d0f2c8 of: dynamic: Fix use after free in of_changeset_add_prop_helper() da621fdd3b5b7 mips: lantiq: xway: sysctrl: rename the etop node 922336e35db11 mips: dts: lantiq: danube: add missing burst length property 437b883a58354 pinctrl: airoha: Fix return value in pinconf callbacks 548998501eaf8 pinctrl: STMFX: add missing HAS_IOMEM dependency 554589d67d939 of: reserved_mem: Add missing IORESOURCE_MEM flag on resources 28f023beca38a of: dynamic: Fix memleak when of_pci_add_properties() failed 000aa47a51233 trace/fgraph: Fix the warning caused by missing unregister notifier a9ae544dd70ca rtla: Check pkg-config install c535c699981b3 tools/latency-collector: Check pkg-config install d689135aa9c5e perf: Avoid undefined behavior from stopping/starting inactive events Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.16.bb | 6 ++-- .../linux/linux-yocto-tiny_6.16.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.16.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.16.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.16.bb index b86748d7d5..9f3f940b77 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.16.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.16.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "c631c6cf05de829937afe048e6ae2fea15634cc8" -SRCREV_meta ?= "6cd9824a84b5fd5c8557208a787252e31a063436" +SRCREV_machine ?= "4ad01ee57e42c93abe2d26816875854c5e475f9e" +SRCREV_meta ?= "d32229904a43cdac64d57932f997990519b6b773" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.16;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.16.4" +LINUX_VERSION ?= "6.16.7" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.16.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.16.bb index 254e6727fe..da4f1032ea 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.16.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.16.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.16.inc -LINUX_VERSION ?= "6.16.4" +LINUX_VERSION ?= "6.16.7" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "01bcf423b031a36a070c7a983e45992e634fceb7" -SRCREV_meta ?= "6cd9824a84b5fd5c8557208a787252e31a063436" +SRCREV_machine ?= "4f0f726a99be121940c4fb44634584d4027073b3" +SRCREV_meta ?= "d32229904a43cdac64d57932f997990519b6b773" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.16.bb b/meta/recipes-kernel/linux/linux-yocto_6.16.bb index a773d8a426..17d4ae35ee 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.16.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.16.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.16/standard/base" KBRANCH:qemuloongarch64 ?= "v6.16/standard/base" KBRANCH:qemumips64 ?= "v6.16/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "b1d9863cd54ffc3b03ee0e270c86e8c99c88462c" -SRCREV_machine:qemuarm64 ?= "01bcf423b031a36a070c7a983e45992e634fceb7" -SRCREV_machine:qemuloongarch64 ?= "01bcf423b031a36a070c7a983e45992e634fceb7" -SRCREV_machine:qemumips ?= "297e7bd12c944fd0746419990157ec1a7fb7ddf3" -SRCREV_machine:qemuppc ?= "01bcf423b031a36a070c7a983e45992e634fceb7" -SRCREV_machine:qemuriscv64 ?= "01bcf423b031a36a070c7a983e45992e634fceb7" -SRCREV_machine:qemuriscv32 ?= "01bcf423b031a36a070c7a983e45992e634fceb7" -SRCREV_machine:qemux86 ?= "01bcf423b031a36a070c7a983e45992e634fceb7" -SRCREV_machine:qemux86-64 ?= "01bcf423b031a36a070c7a983e45992e634fceb7" -SRCREV_machine:qemumips64 ?= "2459c29bf2c3d221fd6d3222c7200b368156986e" -SRCREV_machine ?= "01bcf423b031a36a070c7a983e45992e634fceb7" -SRCREV_meta ?= "6cd9824a84b5fd5c8557208a787252e31a063436" +SRCREV_machine:qemuarm ?= "29139e9a27fc305eb999bf2d02086deb441753ba" +SRCREV_machine:qemuarm64 ?= "4f0f726a99be121940c4fb44634584d4027073b3" +SRCREV_machine:qemuloongarch64 ?= "4f0f726a99be121940c4fb44634584d4027073b3" +SRCREV_machine:qemumips ?= "cd9be6bce5b979643b3ca76bbaf0fbe9680cc6c1" +SRCREV_machine:qemuppc ?= "4f0f726a99be121940c4fb44634584d4027073b3" +SRCREV_machine:qemuriscv64 ?= "4f0f726a99be121940c4fb44634584d4027073b3" +SRCREV_machine:qemuriscv32 ?= "4f0f726a99be121940c4fb44634584d4027073b3" +SRCREV_machine:qemux86 ?= "4f0f726a99be121940c4fb44634584d4027073b3" +SRCREV_machine:qemux86-64 ?= "4f0f726a99be121940c4fb44634584d4027073b3" +SRCREV_machine:qemumips64 ?= "14d54ff925a0fff26c30f6fe7eda8b0310f8f512" +SRCREV_machine ?= "4f0f726a99be121940c4fb44634584d4027073b3" +SRCREV_meta ?= "d32229904a43cdac64d57932f997990519b6b773" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "be15dab9a451155bdf3f5278608fe8dc67e07cc1" +SRCREV_machine:class-devupstream ?= "131e2001572ba68b6728bcba91c58647168d237f" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.16/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.16;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.16.4" +LINUX_VERSION ?= "6.16.7" PV = "${LINUX_VERSION}+git" From patchwork Tue Sep 16 15:51:17 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 70365 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 23D1BCAC59E for ; Tue, 16 Sep 2025 15:51:27 +0000 (UTC) Received: from mail-qv1-f50.google.com (mail-qv1-f50.google.com [209.85.219.50]) by mx.groups.io with SMTP id smtpd.web10.2133.1758037884276559360 for ; Tue, 16 Sep 2025 08:51:24 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=P2gimA1N; spf=pass (domain: gmail.com, ip: 209.85.219.50, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f50.google.com with SMTP id 6a1803df08f44-77bec8ab89fso30723786d6.3 for ; Tue, 16 Sep 2025 08:51:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1758037883; x=1758642683; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=uCmEUk+6z83oweYayU43cBGs27sLKL6/nccm/NbhGao=; b=P2gimA1N0k7pVJQ5O6Qt+QMbCeW0HGSMk9st5pQSGYTW1n0Dvz4Gk/NyIcYCfiY/eN Pq6qnBkHs6xVn9z/gM2riqWaqMG1YRs/wjKVHA5COBm3sumTlr3wED91J+t2XK0PQoM5 6cebzmXUUVnwpESJaCgOLAU7Kna5vGYTk+fdbBaBvYR71tHF/U1g2Oep4TgxjnfryvAJ WkVDprnGFXcjSwcjybS+572Ph/tHVT9o+DCZvjSPuvVSaaeuC1487H5zlzk79S2jdp3N VlvGymytEbEeUIO62jkP1BjbpqEoZ5KUN+w23amdfGzyrW0oNCMXHtDpx89Bt81d43LE 5z9w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1758037883; x=1758642683; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=uCmEUk+6z83oweYayU43cBGs27sLKL6/nccm/NbhGao=; b=hCcmd+iNHzjATpCxTJUeKQi0rV5+toGOGlyqWaWKjarcBGaxpMBcMwk9c4vgIBGar2 3VFstLzFCXaMuxFdKMWb0av73YvMsYgw7M1tnCIfxK1BCmiZAejdf5l2RndlXtY8484q dXIu95oVILlaLSG7UIytAmVODLRaEFxQOyhxPP5enDGqrbsEe2BWwtw5GjalgYgoK072 hQdAicJDkdguEyHtWKOJFHulOB59lzOygWcBk0EOn2LSrtQ+FmuF/b/7MYw46jfmYrEv Q/6GgYJjuay29F6Zai8LhmlqmPcsZTaFl9UONFpYDzU4mkH0bKy5R/4VDrxdOBiDCkq0 OHcQ== X-Gm-Message-State: AOJu0YznpYX76I1M+A7fxtZKVugueXuk4K27GVsFsVW/gwkR+rmBu7n4 YkZJtUNyV88mDHXJe4UHbvQkO8cPzCvEOxohmcDq5tkh8E/kud2nSTWFBHn7nhO8 X-Gm-Gg: ASbGncsi2Wqzkjm71TyaS+Y6YBroY70nvMxZQwr3VVejrbe3kScLPC2eEOTCjACFerW O1Mafw08DRBwizlwFNuptuT5Lng83pRIcAm53auKTqLcsSsu+VwXy6XIm5BLKZKjsU8J5M8RzLO TzIEsAxkZvnhsng4KWuG1sN5bn+yl6yBnion3/4X9nzFpYxxKVrKG5P2aszeyXMbzyigaIspqVZ 5qSKTypM3l80RFiVRSYoG5J4doRgnxxgGmRSFjgPtAXbd+jPYkfNKiyB35dGWPN8giSAEfYIdDU CEJKY2zveHlXo/7j8sSrRDOWt430S2diuHIIxObh95F2nlwnfrIxdo55OAq/POmQhiQhiD5UToa JroK/zXeZ53JotBUdtaMot9hkeFNHiyg8O4b8sYpo33Px51Ze0fXq4QpPEGTfIVyan643qil8x0 MuBrPLruk+v9kQu5NdOK0TrBRaq/luaEGgLPRmRhBrfkdIKtBObeJxQdg= X-Google-Smtp-Source: AGHT+IFa2eGBmBIBjKnYsaMoebB8ej8ohZR8JArDrF6qaPTKaJsReqaZ3HHjCYseKqso+eeq0edoZQ== X-Received: by 2002:a05:6214:1945:b0:77e:2384:84b6 with SMTP id 6a1803df08f44-77e2393c8f5mr115063346d6.51.1758037882902; Tue, 16 Sep 2025 08:51:22 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-786c9c68cd2sm33724456d6.7.2025.09.16.08.51.21 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 16 Sep 2025 08:51:22 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 2/4] linux-yocto/6.16: update CVE exclusions (6.16.7) Date: Tue, 16 Sep 2025 11:51:17 -0400 Message-Id: <20250916155119.1583243-2-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20250916155119.1583243-1-bruce.ashfield@gmail.com> References: <20250916155119.1583243-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 16 Sep 2025 15:51:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/223565 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 1 changes (1 new | 0 updated): - 1 new CVEs: CVE-2025-10127 - 0 updated CVEs: Date: Thu, 11 Sep 2025 19:51:09 +0000 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.16.inc | 360 +++++++++++++++++- 1 file changed, 351 insertions(+), 9 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.16.inc b/meta/recipes-kernel/linux/cve-exclusion_6.16.inc index f3fb0f9fb0..631d65f197 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.16.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.16.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2025-09-03 19:14:52.747326+00:00 for kernel version 6.16.4 -# From linux_kernel_cves cve_2025-09-03_1900Z +# Generated at 2025-09-11 19:55:57.111103+00:00 for kernel version 6.16.7 +# From linux_kernel_cves cve_2025-09-11_1900Z-3-gccd3d370b06 python check_kernel_cve_status_version() { - this_version = "6.16.4" + this_version = "6.16.7" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -5848,8 +5848,6 @@ CVE_STATUS[CVE-2023-53135] = "fixed-version: Fixed from version 6.3" CVE_STATUS[CVE-2023-53136] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2023-53137] = "fixed-version: Fixed from version 6.3" - CVE_STATUS[CVE-2023-53138] = "fixed-version: Fixed from version 6.3" CVE_STATUS[CVE-2023-53139] = "fixed-version: Fixed from version 6.3" @@ -14756,8 +14754,6 @@ CVE_STATUS[CVE-2025-38601] = "cpe-stable-backport: Backported in 6.16.1" CVE_STATUS[CVE-2025-38602] = "cpe-stable-backport: Backported in 6.16.1" -CVE_STATUS[CVE-2025-38603] = "cpe-stable-backport: Backported in 6.16.1" - CVE_STATUS[CVE-2025-38604] = "cpe-stable-backport: Backported in 6.16.1" CVE_STATUS[CVE-2025-38605] = "cpe-stable-backport: Backported in 6.16.1" @@ -14772,8 +14768,6 @@ CVE_STATUS[CVE-2025-38609] = "cpe-stable-backport: Backported in 6.16.1" CVE_STATUS[CVE-2025-38610] = "cpe-stable-backport: Backported in 6.16.1" -CVE_STATUS[CVE-2025-38611] = "cpe-stable-backport: Backported in 6.16.1" - CVE_STATUS[CVE-2025-38612] = "cpe-stable-backport: Backported in 6.16.1" CVE_STATUS[CVE-2025-38613] = "cpe-stable-backport: Backported in 6.16.1" @@ -14908,16 +14902,362 @@ CVE_STATUS[CVE-2025-38677] = "cpe-stable-backport: Backported in 6.16.4" CVE_STATUS[CVE-2025-38678] = "cpe-stable-backport: Backported in 6.16.2" +CVE_STATUS[CVE-2025-38679] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38680] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38681] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38682] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38683] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38684] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38685] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38686] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38687] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38688] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38689] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38690] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38691] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38692] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38693] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38694] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38695] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38696] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38697] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38698] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38699] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38700] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38701] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38702] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38703] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38704] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38705] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38706] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38707] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38708] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38709] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38710] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38711] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38712] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38713] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38714] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38715] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38716] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38717] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38718] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38719] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38720] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38721] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38722] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38723] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38724] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38725] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38726] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38727] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38728] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38729] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38730] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-38731] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-38732] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-38733] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-38734] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-38735] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-38736] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-38737] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39673] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39674] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39675] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39676] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39677] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39678] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39679] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39680] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39681] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39682] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39683] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39684] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39685] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39686] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39687] = "cpe-stable-backport: Backported in 6.16.4" + CVE_STATUS[CVE-2025-39688] = "fixed-version: Fixed from version 6.15" +CVE_STATUS[CVE-2025-39689] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39690] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39691] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39692] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39693] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39694] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39695] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39696] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39697] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39698] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39699] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39700] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39701] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39702] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39703] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39704] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39705] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39706] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39707] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39708] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39709] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39710] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39711] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39712] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39713] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39714] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39715] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39716] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39717] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39718] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39719] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39720] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39721] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39722] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39723] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39724] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39725] = "fixed-version: Fixed from version 6.16" + +CVE_STATUS[CVE-2025-39726] = "fixed-version: Fixed from version 6.16" + +CVE_STATUS[CVE-2025-39727] = "cpe-stable-backport: Backported in 6.16.1" + CVE_STATUS[CVE-2025-39728] = "fixed-version: Fixed from version 6.15" +CVE_STATUS[CVE-2025-39729] = "cpe-stable-backport: Backported in 6.16.1" + +CVE_STATUS[CVE-2025-39730] = "cpe-stable-backport: Backported in 6.16.1" + +CVE_STATUS[CVE-2025-39731] = "cpe-stable-backport: Backported in 6.16.1" + +CVE_STATUS[CVE-2025-39732] = "cpe-stable-backport: Backported in 6.16.1" + +CVE_STATUS[CVE-2025-39733] = "cpe-stable-backport: Backported in 6.16.1" + +CVE_STATUS[CVE-2025-39734] = "cpe-stable-backport: Backported in 6.16.1" + CVE_STATUS[CVE-2025-39735] = "fixed-version: Fixed from version 6.15" +CVE_STATUS[CVE-2025-39736] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39737] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39738] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39739] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39740] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39741] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39742] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39743] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39744] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39745] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39746] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39747] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39748] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39749] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39750] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39751] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39752] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39753] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39754] = "cpe-stable-backport: Backported in 6.16.2" + CVE_STATUS[CVE-2025-39755] = "fixed-version: Fixed from version 6.15" +CVE_STATUS[CVE-2025-39756] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39757] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39758] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39759] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39760] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39761] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39762] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39763] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39764] = "cpe-stable-backport: Backported in 6.16.2" + +CVE_STATUS[CVE-2025-39765] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39766] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39767] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39768] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39769] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39770] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39771] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39772] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39773] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39774] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39775] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39776] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39777] = "cpe-stable-backport: Backported in 6.16.4" + CVE_STATUS[CVE-2025-39778] = "fixed-version: Fixed from version 6.15" +CVE_STATUS[CVE-2025-39779] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39780] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39781] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39782] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39783] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39784] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39785] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39786] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39787] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39788] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39789] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39790] = "cpe-stable-backport: Backported in 6.16.4" + +CVE_STATUS[CVE-2025-39791] = "cpe-stable-backport: Backported in 6.16.4" + CVE_STATUS[CVE-2025-39930] = "fixed-version: Fixed from version 6.15" CVE_STATUS[CVE-2025-39989] = "fixed-version: Fixed from version 6.15" @@ -14926,6 +15266,8 @@ CVE_STATUS[CVE-2025-40014] = "fixed-version: Fixed from version 6.15" CVE_STATUS[CVE-2025-40114] = "fixed-version: Fixed from version 6.15" +# CVE-2025-40300 has no known resolution + CVE_STATUS[CVE-2025-40325] = "fixed-version: Fixed from version 6.15" # CVE-2025-40364 has no known resolution From patchwork Tue Sep 16 15:51:18 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 70367 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1F476CAC59B for ; Tue, 16 Sep 2025 15:51:27 +0000 (UTC) Received: from mail-qv1-f48.google.com (mail-qv1-f48.google.com [209.85.219.48]) by mx.groups.io with SMTP id smtpd.web11.2138.1758037885842750087 for ; Tue, 16 Sep 2025 08:51:26 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=gppupLi8; spf=pass (domain: gmail.com, ip: 209.85.219.48, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f48.google.com with SMTP id 6a1803df08f44-76ce24d1dcaso35360146d6.1 for ; Tue, 16 Sep 2025 08:51:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1758037885; x=1758642685; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=upYIwn5AKqjNKOOgxAG8OURFwbdfmHmK5jP2NUK4CFQ=; b=gppupLi8ibwjW6BPAqjORiipPIGP4R7PVogCYHrBo5xrpCFB/O4MtCPYjVQku57Gy+ PCTy9Ix1VH/pQeK2uEqZTdE5XBm/9VQmKVt3Bq8qNsi7JEgv+ohe6EJMhdB6VWl/QQMc NUcGe6PjfUrtXPsJLGV2zyQ2O6Oz6I5W5Sal8hOho3+LxKZmxGAdd/9fa9rq/0M32J/o nmAIA/KqNEvKazhvkgWJ+yhYm76wpCGCrtOqg0x0f4cymL0+eEisZopQdfr5yGOOR44h +2LM8ADX08pEoZPZbw9JAAw3NfmS3GAxfUPog8VaIYZx9Q2Oh/CS29wO0Yo/H3tztJdT 0GIA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1758037885; x=1758642685; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=upYIwn5AKqjNKOOgxAG8OURFwbdfmHmK5jP2NUK4CFQ=; b=XyIYqeUajposIigHCutxNrYEoJzUWcuwlcRIqwSfomYGMNXyuwGVcqDzudf+d47h2T MJGEfLhwbw2UacS5pkPhUEZQ/PpOjGOoTX9qKzY6SHBn3NskSkzBxi6vgYOwXlJzrLhN dbLA5a522BHZlEPlMHPnR/ETsNTKz+Y81PYEEDqTZNMGZVoFmLUVrk5lRj/2Bi3u5kWi Gopyf7yGTGFt2o/OcPAqQHO4b9yl12e5z6pd1NF6RJEDAXzR5TFtQ9du7wwPpy2tj1vs FWCBj6waLHIY7DfPMQ/TfeOFXf64XYbsyXSBkMiiC7R3kVKPWi7OF54+4LglpKB3mzrR LN6Q== X-Gm-Message-State: AOJu0YwkezL5/Whxxnef8fv2H7i+IamADUHTcOjqbGetXnT+0dPIekYB tApzM/nybTNL8E2kQfk+8FsPFIzgziePOyjlrz3rt8hWJWPJfGrvAQPj/zAXXR8+ X-Gm-Gg: ASbGncuspEzunTcnWIxNPLldEXFsOcuDhjszOC/AO9cIeOrKyOhZYBvgD6WuW8dD6HO w6K6eAycyylWvYgtxoCDcJlm5NFt4MZilV9WZVSOs95EWzV0WFAinr4zGhf4rW/HMrLaKtvZWz8 FzALHLvPbaBiN+Nxut3FWh0qCV4QyfSuEcbSEjz17aT+EzvY/0MiOC3rtWhl9+xGTJ+CwnTha2S 0cUuP1V/fuOfHgqjPan/VqoTq+gCiivOYecsUOk3HMUcnxNwbHbgw3Gk45+NcrTK2yj2jhW7F0C 7fozVY3x/Fs3PBmERf/fOAd069WWVUEJnkxANswaJX+I0XB5939Rdq3VuTTjwvYV/r4GOmLYkiO PCxF7fHiKQdrqpLkT+vGGxVuSVOXGd18wf35TEo4YIxI/GNj/uuhmcPZfaTgZ8dG0sMkV5Z5xPY SfP2T1OtjxLI73KTd0JRaKJ/mvopiZozmjLdQB4RWgcQvN0oPzFl7Yw18= X-Google-Smtp-Source: AGHT+IF2MwqpdBqRLFxh2UW/E5y3JfsYReCHTRj0GoOi/Vj/rTumpG00/z9ueTamjzTNJHZUOQuVdg== X-Received: by 2002:ad4:5ca9:0:b0:78a:992a:951e with SMTP id 6a1803df08f44-78a992a9950mr65534726d6.6.1758037884426; Tue, 16 Sep 2025 08:51:24 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-786c9c68cd2sm33724456d6.7.2025.09.16.08.51.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 16 Sep 2025 08:51:23 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 3/4] linux-yocto/6.12: update to v6.12.47 Date: Tue, 16 Sep 2025 11:51:18 -0400 Message-Id: <20250916155119.1583243-3-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20250916155119.1583243-1-bruce.ashfield@gmail.com> References: <20250916155119.1583243-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 16 Sep 2025 15:51:27 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/223566 From: Bruce Ashfield Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: no ids found, dumping: f6cf124428f51 Linux 6.12.47 766424cef1e6b x86/vmscape: Add old Intel CPUs to affected list 8d675611b96a6 x86/vmscape: Warn when STIBP is disabled with SMT 28504e31029b1 x86/bugs: Move cpu_bugs_smt_update() down 459274c77b37a x86/vmscape: Enable the mitigation d7ddc93392e4a x86/vmscape: Add conditional IBPB mitigation 7c62c442b6eb9 x86/vmscape: Enumerate VMSCAPE bug 4c6fbb4dba3fc Documentation/hw-vuln: Add VMSCAPE documentation d497f0738df95 Linux 6.12.46 cf3c7fd1c466b dmaengine: mediatek: Fix a flag reuse error in mtk_cqdma_tx_status() fd0333fe3cb17 md/raid1: fix data lost for writemostly rdev 8352fdfc04db3 riscv, bpf: use lw when reading int cpu in bpf_get_smp_processor_id 1a1e84c284169 riscv, bpf: use lw when reading int cpu in BPF_MOV64_PERCPU_REG fecd903917861 riscv: use lw when reading int cpu in asm_per_cpu 8d164de928aa3 riscv: use lw when reading int cpu in new_vmalloc_check 489be48ea1059 riscv: Only allow LTO with CMODEL_MEDANY fce8d4599b8c7 ACPI: RISC-V: Fix FFH_CPPC_CSR error handling 514600ed8d85b md: prevent incorrect update of resync/recovery offset 1affb649e221d tools: gpio: remove the include directory on make clean e9998d65bca2c drm/amd/amdgpu: Fix missing error return on kzalloc failure 203719d82999b perf bpf-utils: Harden get_bpf_prog_info_linear 150101bbe24ab perf bpf-utils: Constify bpil_array_desc 25eac390c4af3 perf bpf-event: Fix use-after-free in synthesis beec8f807ecc2 drm/bridge: ti-sn65dsi86: fix REFCLK setting d0f379279cd84 spi: spi-fsl-lpspi: Clear status register after disabling the module 15d3ab4858797 spi: spi-fsl-lpspi: Reset FIFO and disable module on transfer abort 8d981d2230e90 spi: spi-fsl-lpspi: Set correct chip-select polarity bit ed635ec0b5458 spi: spi-fsl-lpspi: Fix transmissions when using CONT a5760d3fb6e35 scsi: sr: Reinstate rotational media flag 0073c41d4b99f block: add a queue_limits_commit_update_frozen helper 2ec315207ccb8 hwmon: mlxreg-fan: Prevent fans from getting stuck at 0 RPM 212e17721839d platform/x86/intel: power-domains: Use topology_logical_package_id() for package ID ee1df9ba388bd platform/x86: asus-wmi: Remove extra keys from ignore_key_wlan quirk 289b58f8ff319 pcmcia: Add error handling for add_interval() in do_validate_mem() 278842aca27e4 pcmcia: omap: Add missing check for platform_get_resource 2a7cf13dd6740 Revert "drm/amdgpu: Avoid extra evict-restore process." c5e6e56f2ce37 ALSA: hda/realtek: Fix headset mic for TongFang X6[AF]R5xxY ebdf11cf294aa ALSA: hda/hdmi: Add pin fix for another HP EliteDesk 800 G4 model 17cab7b45f4db rust: support Rust >= 1.91.0 target spec 585a593ad5e8b dmaengine: mediatek: Fix a possible deadlock error in mtk_cqdma_tx_status() 523aefb90b593 thermal/drivers/mediatek/lvts: Disable low offset IRQ for minimum threshold 1ee0e14814b88 mm: fix accounting of memmap pages a7f7d4223ff05 kunit: kasan_test: disable fortify string checker on kasan_strings() test 607b2bf5708fe nouveau: fix disabling the nonstall irq due to storm code dda6ec365ab04 mm/slub: avoid accessing metadata when pointer is invalid in object_err() 9cd3206f0126d mm, slab: cleanup slab_bug() parameters d06b739f41dcc mm: slub: call WARN() when detecting a slab corruption 20a54a8db4dd8 mm: slub: Print the broken data before restoring them 60196f92bbc79 md/md-bitmap: fix wrong bitmap_limit for clustermd when write sb 59599bce44af3 net: fix NULL pointer dereference in l3mdev_l3_rcv fa4abd439f275 wifi: ath11k: update channel list in worker when wait flag is set 26618c039b78a wifi: ath11k: update channel list in reg notifier instead reg worker eddca44ddf810 ext4: avoid journaling sb update on error if journal is destroying c868e9306ea6f ext4: define ext4_journal_destroy wrapper 2c46c14fd386a md/raid1,raid10: strip REQ_NOWAIT from member bios ed6aac13dd9d6 md/raid1,raid10: don't handle IO error for REQ_RAHEAD and REQ_NOWAIT 73506e581c0b1 md/raid1,raid10: don't ignore IO flags 3fbe3f4c57fda net: dsa: b53: do not enable EEE on bcm63xx b765b9ee4e5a8 net: dsa: b53/bcm_sf2: implement .support_eee() method cda6c5c095e19 net: dsa: provide implementation of .support_eee() f7976772b16a7 net: dsa: add hook to determine whether EEE is supported 6482c3dccbfb8 fs/fhandle.c: fix a race in call of has_locked_children() b9290581d2ecf microchip: lan865x: Fix LAN8651 autoloading fe03df84e19ef microchip: lan865x: Fix module autoloading bb8fd694ba6b4 net: pcs: rzn1-miic: Correct MODCTRL register offset b370f7b1f470a e1000e: fix heap overflow in e1000_set_eeprom 1f797f062b5cf cifs: prevent NULL pointer dereference in UTF16 conversion 20080709457bc batman-adv: fix OOB read/write in network-coding decode 367cb5ffd8a8a scsi: lpfc: Fix buffer free/clear order in deferred receive path cc5911dc2f989 platform/x86/amd/pmc: Add TUXEDO IB Pro Gen10 AMD to spurious 8042 quirks list 274668efe1a26 drm/amd/display: Clear the CUR_ENABLE register on DCN314 w/out DPP PG 608a015c65cc9 drm/amdgpu: drop hw access in non-DC audio fini 3573291c7901a net: ethernet: oa_tc6: Handle failure of spi_setup 089fd41902ee6 wifi: mt76: mt7925: fix the wrong bss cleanup for SAP eefa2ad9009b2 wifi: mt76: mt7996: Initialize hdr before passing to skb_put_data() a001c2f6a40c1 wifi: mt76: mt7925u: use connac3 tx aggr check in tx complete 06616410a3e5e wifi: mwifiex: Initialize the chan_stats array to zero 2fae927c25bbf soc: qcom: mdt_loader: Deal with zero e_shentsize c2daa6eb47407 of_numa: fix uninitialized memory nodes causing kernel panic 3eebe856d09b6 proc: fix missing pde_set_flags() for net proc files f4a917e6cd6c7 ocfs2: prevent release journal inode after journal shutdown 28ef61701e298 kasan: fix GCC mem-intrinsic prefix with sw tags b3ec50cc5eb5c sched: Fix sched_numa_find_nth_cpu() if mask offline 243b705a90ed8 mm: slub: avoid wake up kswapd in set_track_prepare cd0236550cf80 mm: fix possible deadlock in kmemleak 4f7537772011f mm: move page table sync declarations to linux/pgtable.h b051f70701896 mm/userfaultfd: fix kmap_local LIFO ordering for CONFIG_HIGHPTE b7f4051dd3388 x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() 094ba14a471cc io_uring/msg_ring: ensure io_kiocb freeing is deferred for RCU fafa7450075f4 pcmcia: Fix a NULL pointer dereference in __iodyn_find_io_region() 650c14abe3031 arm64: ftrace: fix unreachable PLT for ftrace_caller in init_module with CONFIG_DYNAMIC_FTRACE d2b18756dbbba ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() 54c49eca38dbd accel/ivpu: Prevent recovery work from being queued during device removal 47c72af327270 ALSA: usb-audio: Add mute TLV for playback volumes on some devices 594a8a74e02b1 phy: mscc: Stop taking ts_lock for tx_queue and use its own lock 3ed0d6a7b3220 selftest: net: Fix weird setsockopt() in bind_bhash.c. 631fc8ab5beb9 ppp: fix memory leak in pad_compress_skb d0ecda6fdd840 net: xilinx: axienet: Add error handling for RX metadata pointer retrieval 4a5633b22fc72 net: atm: fix memory leak in atm_register_sysfs when device_register fail 89064cf534bea ax25: properly unshare skbs in ax25_kiss_rcv() 5ad5be90414dc mctp: return -ENOPROTOOPT for unknown getsockopt options b3bab397a377e net/smc: Remove validation of reserved bits in CLC Decline message 8b3e9f5567433 ipv4: Fix NULL vs error pointer check in inet_blackhole_dev_init() ae9459f2acb35 net: thunder_bgx: decrement cleanup index before use 2a12c6d58de0a net: thunder_bgx: add a missing of_node_put 31229145e6ba5 wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() 92bedee7168d4 wifi: libertas: cap SSID len in lbs_associate() cedbbba8a8e82 wifi: cw1200: cap SSID length in cw1200_do_join() e211e3f4199ac vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects 317122c53d5f2 vxlan: Rename FDB Tx lookup function 02bebe7d0483d vxlan: Add RCU read-side critical sections in the Tx path 9238419f6de35 vxlan: Avoid unnecessary updates to FDB 'used' time 300b4e8ff890a vxlan: Refresh FDB 'updated' time upon 'NTF_USE' c1ce8ee5d7c6a net: vxlan: rename SKB_DROP_REASON_VXLAN_NO_REMOTE 6fa0469be9cf5 net: vxlan: use kfree_skb_reason() in vxlan_mdb_xmit() da1178c6e9bb4 net: vxlan: use kfree_skb_reason() in vxlan_xmit() e89198454fb62 net: vxlan: make vxlan_set_mac() return drop reasons 4ff4f3104da65 vxlan: Fix NPD when refreshing an FDB entry with a nexthop object 5cf22915f2c37 net: vxlan: make vxlan_snoop() return drop reasons b186fb3bb3cd0 net: vxlan: add skb drop reasons to vxlan_rcv() 74872113f895d net: tunnel: add pskb_inet_may_pull_reason() helper 14f0d3c704b92 net: skb: add pskb_network_may_pull_reason() helper f8b4b6f7c2bbf net: ethernet: mtk_eth_soc: fix tx vlan tag for llc packets 46d33c878fc0b net/tcp: Fix socket memory leak in TCP-AO failure handling for IPv6 609a8ffff5a0d wifi: ath11k: fix group data packet drops during rekey 682105ab63826 ixgbe: fix incorrect map used in eee linkmode 66e7cdbda74ee i40e: Fix potential invalid access when MAC list is empty 70d3dad7d5ad0 i40e: remove read access to debugfs files b862a132b43ec idpf: set mac type when adding and removing MAC filters 2cde98a02da95 ice: fix NULL access of tx->in_use in ice_ll_ts_intr 18cdfd7f699b9 net: mctp: mctp_fraq_queue should take ownership of passed skb eb929910bd4b4 net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync() 0925c3c0c6d05 macsec: read MACSEC_SA_ATTR_PN with nla_get_uint 7db8aa3fc4ed0 net: macb: Fix tx_ptr_lock locking f3d761e527c55 icmp: fix icmp_ndo_send address translation for reply direction dd70cd6a44f5c bnxt_en: fix incorrect page count in RX aggr ring log 29b58eedbc5ac selftests: drv-net: csum: fix interface name for remote host 349f7dbe3b5ab mISDN: Fix memory leak in dsp_hwec_enable() 63480696b872a xirc2ps_cs: fix register access when enabling FullDuplex a22ec2ee824be net_sched: gen_estimator: fix est_timer() vs CONFIG_PREEMPT_RT=y e7a903c429e5c netfilter: nft_flowtable.sh: re-run with random mtu sizes 306b0991413b4 Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() 1503756fffe76 Bluetooth: vhci: Prevent use-after-free by removing debugfs files early c2e32ac3f107e wifi: iwlwifi: uefi: check DSM item validity 7614b00f16e53 netfilter: conntrack: helper: Replace -EEXIST by -EBUSY c47ca77fee907 netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm e4d5a5fc61fdc wifi: mt76: fix linked list corruption 2aef3667e6b0f wifi: mt76: free pending offchannel tx frames on wcid cleanup 1fb26fd3f6015 wifi: mt76: prevent non-offchannel mgmt tx during scan/roc d9f2fb6a2ac83 wifi: mt76: mt7925: fix locking in mt7925_change_vif_links() 3e789f8475f6c wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work 5b7ae04969f82 wifi: cfg80211: fix use-after-free in cmp_bss() 863443b02837d mmc: sdhci-of-arasan: Ensure CD logic stabilization before power-up b32990fb5738f mmc: sdhci-of-arasan: Support for emmc hardware reset 1ec1b0d5e2758 LoongArch: vDSO: Remove -nostdlib complier flag 0a97a654a26a7 LoongArch: vDSO: Remove --hash-style=sysv ed6a4c0ca7c53 net: usb: qmi_wwan: add Telit Cinterion FN990A w/audio composition 9c111e6e31e88 net: usb: qmi_wwan: fix Telit Cinterion FE990A name 67ffb6a337b1d net: usb: qmi_wwan: fix Telit Cinterion FN990A name d3b504146c111 HID: core: Harden s32ton() against conversion to 0 bits d6cfa97a4d6f3 HID: stop exporting hid_snto32() 7a7ba33110698 HID: simplify snto32() a905edfec7447 arm64: dts: imx8mp: Fix missing microSD slot vqmmc on Data Modul i.MX8M Plus eDM SBC 12fa00b401c0e arm64: dts: imx8mp: Fix missing microSD slot vqmmc on DH electronics i.MX8M Plus DHCOM b9e9092995aae arm64: dts: imx8mp-tqma8mpql: fix LDO5 power off 606ae71e158d3 tee: optee: ffa: fix a typo of "optee_ffa_api_is_compatible" 02a90ca443676 arm64: dts: rockchip: Add vcc-supply to SPI flash on rk3399-pinebook-pro 3f3d54180accf tee: fix memory leak in tee_dyn_shm_alloc_helper 963fca19fe34c tee: fix NULL pointer dereference in tee_shm_put e63052921f1b2 fs: writeback: fix use-after-free in __mark_inode_dirty() 6839108b660b4 btrfs: zoned: skip ZONE FINISH of conventional zones 70a6e89b338bb Bluetooth: hci_sync: Avoid adding default advertising on startup e04e08c2c3878 cpupower: Fix a bug where the -t option of the set subcommand was not working. 5817d249d3cc0 drm/amd/display: Don't warn when missing DCE encoder caps d619c55d7455e cdc_ncm: Flag Intel OEM version of Fibocom L850-GL as WWAN 8e504a5ad6d98 LoongArch: Save LBT before FPU in setup_sigcontext() 8446ff5a8377c btrfs: avoid load/store tearing races when checking if an inode was logged 3d9c5e1512422 btrfs: fix race between setting last_dir_index_offset and inode logging 37c491006e539 btrfs: fix race between logging inode and checking if it was logged before 41688d1fc5d16 bpf: Fix oob access in cgroup local storage f1f241ee13403 bpf: Move cgroup iterator helpers to bpf.h f13441c171d56 bpf: Move bpf map owner out of common struct 963e79f6bdac5 bpf: Add cookie object to bpf maps b0c51e95f54e5 Linux 6.12.45 9a7141d4808dc thermal/drivers/mediatek/lvts_thermal: Add mt7988 lvts commands 739229eb4d5cd thermal/drivers/mediatek/lvts_thermal: Add lvts commands and their sizes to driver data d1f4b09d9bb99 thermal/drivers/mediatek/lvts_thermal: Change lvts commands array to static const 79f6a6460ef30 Revert "drm/dp: Change AUX DPCD probe address from DPCD_REV to LANE0_1_STATUS" 7259d9d6f0ae7 PCI: dwc: Ensure that dw_pcie_wait_for_link() waits 100 ms after link up 72fdedb69cad9 PCI: Rename PCIE_RESET_CONFIG_DEVICE_WAIT_MS to PCIE_RESET_CONFIG_WAIT_MS 1d9c73561c581 net: rose: fix a typo in rose_clear_routes() 56f376507b1a0 drm/amd/amdgpu: disable hwmon power1_cap* for gfx 11.0.3 on vf mode 31ce7c089b50c drm/mediatek: Fix device/node reference count leaks in mtk_drm_get_all_drm_priv c5e42567724ee drm/nouveau: fix error path in nvkm_gsp_fwsec_v2 2de53596eeb20 drm/nouveau/disp: Always accept linear modifier c8277d229c784 drm/xe/vm: Clear the scratch_pt pointer on error dcdf36f1b6788 xfs: do not propagate ENODATA disk errors into xattr code 806fdb4422128 smb3 client: fix return code mapping of remap_file_range 6c1f8cef93dbd net: usb: qmi_wwan: add Telit Cinterion LE910C4-WWX new compositions 4735f5991f514 fs/smb: Fix inconsistent refcnt update 23d7325151d43 dma/pool: Ensure DMA_DIRECT_REMAP allocations are decrypted c50747a963c49 blk-zoned: Fix a lockdep complaint about recursive locking 07b367f7ebb14 Revert "drm/amdgpu: fix incorrect vm flags to map bo" 98520a9a3d69a HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() 82e721413565d HID: wacom: Add a new Art Pen 2 64eb2737fa351 HID: logitech: Add ids for G PRO 2 LIGHTSPEED 14dfac42f5334 HID: quirks: add support for Legion Go dual dinput modes 3055309821dd3 HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() c0d77e3441a92 HID: asus: fix UAF via HID_CLAIMED_INPUT validation 44bce62994fa2 x86/cpu/topology: Use initial APIC ID from XTOPOLOGY leaf on AMD/HYGON 43be33b8a2f2b x86/microcode/AMD: Handle the case of no BIOS microcode c76bf8359188a RISC-V: KVM: fix stack overrun when loading vlenb 67a05679621b7 KVM: x86: use array_index_nospec with indices that come from guest 7b6b76e3f0790 net: macb: Disable clocks once c2925cd620707 efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare 7aab65c62a8a8 fbnic: Move phylink resume out of service_task and into open/close d2d08fc3577f1 l2tp: do not use sock_hold() in pppol2tp_session_get_sock() 1bbc0c02aea1f sctp: initialize more fields in sctp_v6_from_sk() d7563b456ed44 net: rose: include node references in rose_neigh refcount 0085b250fcc79 net: rose: convert 'use' field to refcount_t 8e88504a28743 net: rose: split remove and free operations in rose_remove_neigh() e98884092a53c net: hv_netvsc: fix loss of early receive events from host during channel open. 22b6f45719672 hv_netvsc: Link queues to NAPIs 6037d6f243c18 net: stmmac: Set CIC bit only for TX queues with COE 62c8b75da2d70 net: stmmac: xgmac: Correct supported speed modes 160a7e072a0ce net: stmmac: xgmac: Do not enable RX FIFO Overflow interrupts fe67f30b41f13 net/mlx5e: Set local Xoff after FW update 628df4d5d8e09 net/mlx5e: Update and set Xon/Xoff upon port speed set 1f5f18acd8dd8 net/mlx5e: Update and set Xon/Xoff upon MTU set bde946b2a06d3 net/mlx5: Nack sync reset when SFs are present 0c87dba9ccd38 net/mlx5: Fix lockdep assertion on sync reset unload event 00a098e960454 net/mlx5: Reload auxiliary drivers on fw_activate 17209bada19e9 bnxt_en: Fix stats context reservation logic 35e129b060444 bnxt_en: Adjust TX rings if reservation is less than requested d00e98977ef51 bnxt_en: Fix memory corruption when FW resources change during ifdown 3d6a89fecf41d phy: mscc: Fix when PTP clock is register and unregister 2c697970da492 drm/xe: Don't trigger rebind on initial dma-buf validation 83f94a04074e2 drm/xe/xe_sync: avoid race during ufence signaling 77ff27ff0e452 efi: stmm: Fix incorrect buffer allocation method ee8c2f7d8f653 net: dlink: fix multicast stats being counted incorrectly c1cd3cede22e2 dt-bindings: display/msm: qcom,mdp5: drop lut clock 32c8031015d2f ice: fix incorrect counter for buffer allocation failures e8b97c7cda142 ice: use fixed adapter index for E825C embedded devices 5ff0860d1f618 ice: don't leave device non-functional if Tx scheduler config fails 43f72994e4dda drm/nouveau: remove unused memory target test 0d70a166dec65 drm/nouveau: remove unused increment in gm200_flcn_pio_imem_wr 33f9e6dc66b32 atm: atmtcp: Prevent arbitrary write in atmtcp_recv_control(). 2651657f57e77 Bluetooth: hci_sync: fix set_local_name race condition 7c3df1b8a3a9f Bluetooth: hci_event: Detect if HCI_EV_NUM_COMP_PKTS is unbalanced d1f4364d84059 Bluetooth: hci_event: Mark connection as closed during suspend disconnect aacecaee1b454 Bluetooth: hci_event: Treat UNKNOWN_CONN_ID on disconnect as success ff0d3bad32108 net: macb: fix unregister_netdev call order in macb_remove() 8ac194ad5254b HID: input: report battery status changes immediately e2cf56faa25f1 HID: input: rename hidinput_set_battery_charge_status() eb7eafbfd1a27 powerpc/kvm: Fix ifdef to remove build warning 7d5cc22efa44e drm/mediatek: Add error handling for old state CRTC in atomic_disable 469a026cac4a2 drm/msm: update the high bitfield of certain DSI registers bc0aff1e703fd drm/msm/kms: move snapshot init earlier in KMS init 46efab01648a0 of: reserved_mem: Restructure call site for dma_contiguous_early_fixup() 7536b29903344 drm/msm: Defer fd_install in SUBMIT ioctl 81ff76c1b0882 net: ipv4: fix regression in local-broadcast routes cbc00a76a5ff9 vhost/net: Protect ubufs with rcu read lock in vhost_net_ubuf_put() f5da8116cd52e ACPI: EC: Add device to acpi_ec_no_wakeup[] qurik list cc2ec79a6cb14 erofs: fix atomic context detection when !CONFIG_DEBUG_LOCK_ALLOC cd79a25f451e9 ASoC: codecs: tx-macro: correct tx_macro_component_drv name c9991af5e0992 smb: client: fix race with concurrent opens in rename(2) c2c9d0ae69714 smb: client: fix race with concurrent opens in unlink(2) ba884ba29cc94 scsi: core: sysfs: Correct sysfs attributes access rights 7bab8fb51d3b1 vhost: Fix ioctl # for VHOST_[GS]ET_FORK_FROM_OWNER 2e6e208825bf9 perf symbol-minimal: Fix ehdr reading in filename__read_build_id ced94e137e6cd ftrace: Fix potential warning in trace_printk_seq during ftrace_dump 0d3471ab7186c of: dynamic: Fix use after free in of_changeset_add_prop_helper() 76c872066d75f mips: lantiq: xway: sysctrl: rename the etop node 41534a4790620 mips: dts: lantiq: danube: add missing burst length property f945cb27fea12 pinctrl: STMFX: add missing HAS_IOMEM dependency 9362d520b2b44 of: dynamic: Fix memleak when of_pci_add_properties() failed 2a2deb9f8df70 trace/fgraph: Fix the warning caused by missing unregister notifier f471b3e24d1ec rtla: Check pkg-config install 9903b4afd70f3 tools/latency-collector: Check pkg-config install Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index aba255dfa3..e04450bf99 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "2f3bb461fad19a35096f049d947cc639f517e22b" -SRCREV_meta ?= "b14d2173319779e94720b45b7be544da8a5f4026" +SRCREV_machine ?= "b463156a724cd3f095e1dadd87bf3c1c8115c9ff" +SRCREV_meta ?= "fb30a9a1d027d938de70890be92c22b33e0194b1" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.44" +LINUX_VERSION ?= "6.12.47" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 75d4116c3c..03582980bd 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.44" +LINUX_VERSION ?= "6.12.47" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "cb57c5e0ea50dc87ee76514c4237291a365c2cd9" -SRCREV_meta ?= "b14d2173319779e94720b45b7be544da8a5f4026" +SRCREV_machine ?= "8161e9a0fe4611484f3f055a7c633759a513bd84" +SRCREV_meta ?= "fb30a9a1d027d938de70890be92c22b33e0194b1" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index 1873fcc195..47590bd0f4 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "62c2bce13752b28ac71dae8ea8d9364e55443b60" -SRCREV_machine:qemuarm64 ?= "cb57c5e0ea50dc87ee76514c4237291a365c2cd9" -SRCREV_machine:qemuloongarch64 ?= "cb57c5e0ea50dc87ee76514c4237291a365c2cd9" -SRCREV_machine:qemumips ?= "2a0916216246246cacbe4cccab8ec82bf5632df4" -SRCREV_machine:qemuppc ?= "cb57c5e0ea50dc87ee76514c4237291a365c2cd9" -SRCREV_machine:qemuriscv64 ?= "cb57c5e0ea50dc87ee76514c4237291a365c2cd9" -SRCREV_machine:qemuriscv32 ?= "cb57c5e0ea50dc87ee76514c4237291a365c2cd9" -SRCREV_machine:qemux86 ?= "cb57c5e0ea50dc87ee76514c4237291a365c2cd9" -SRCREV_machine:qemux86-64 ?= "cb57c5e0ea50dc87ee76514c4237291a365c2cd9" -SRCREV_machine:qemumips64 ?= "8d94c777a9e942a599e10384f6747b3404368264" -SRCREV_machine ?= "cb57c5e0ea50dc87ee76514c4237291a365c2cd9" -SRCREV_meta ?= "b14d2173319779e94720b45b7be544da8a5f4026" +SRCREV_machine:qemuarm ?= "ace248eb90be5ddc94caea17db41d7190fc87817" +SRCREV_machine:qemuarm64 ?= "8161e9a0fe4611484f3f055a7c633759a513bd84" +SRCREV_machine:qemuloongarch64 ?= "8161e9a0fe4611484f3f055a7c633759a513bd84" +SRCREV_machine:qemumips ?= "a766160558c9434368462f9fada2ac0871017cbd" +SRCREV_machine:qemuppc ?= "8161e9a0fe4611484f3f055a7c633759a513bd84" +SRCREV_machine:qemuriscv64 ?= "8161e9a0fe4611484f3f055a7c633759a513bd84" +SRCREV_machine:qemuriscv32 ?= "8161e9a0fe4611484f3f055a7c633759a513bd84" +SRCREV_machine:qemux86 ?= "8161e9a0fe4611484f3f055a7c633759a513bd84" +SRCREV_machine:qemux86-64 ?= "8161e9a0fe4611484f3f055a7c633759a513bd84" +SRCREV_machine:qemumips64 ?= "ea35e13b7cd3d7cea1c2e8c17f8144209496a8b7" +SRCREV_machine ?= "8161e9a0fe4611484f3f055a7c633759a513bd84" +SRCREV_meta ?= "fb30a9a1d027d938de70890be92c22b33e0194b1" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "11a24528d080a6ac23f07d6031da9e271728d62d" +SRCREV_machine:class-devupstream ?= "f6cf124428f51e3ef07a8e54c743873face9d2b2" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.44" +LINUX_VERSION ?= "6.12.47" PV = "${LINUX_VERSION}+git" From patchwork Tue Sep 16 15:51:19 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 70368 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EF8EACAC598 for ; Tue, 16 Sep 2025 15:51:36 +0000 (UTC) Received: from mail-qv1-f44.google.com (mail-qv1-f44.google.com [209.85.219.44]) by mx.groups.io with SMTP id smtpd.web11.2139.1758037886952036616 for ; Tue, 16 Sep 2025 08:51:27 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=UGDDSXXr; spf=pass (domain: gmail.com, ip: 209.85.219.44, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f44.google.com with SMTP id 6a1803df08f44-782ba4488b8so26172156d6.3 for ; Tue, 16 Sep 2025 08:51:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1758037886; x=1758642686; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=tE+Z2uOveLKwo8QgaaliDJfk3j4gHTiLLJI/9lkrzos=; b=UGDDSXXrzurDezvUcmtRkcnpgXkv3SD4c5xRL1Icx6jOWL8vhcnuJgdHiHI2w47+FW z612wv7wRCXMdPFXftr0AdC1Twz2gIAmdXANGxo83/BLlt/W8fOXmxcICHPZzi/YjrLG UboAaVkLuBZ6x9WLO80L2VxLahah2CIdKHaDVZ1kANWqCVygfeyD1JskhYiJN0DqWaGA vvzMAP3Xg1eDbd6Mqz3ZWk7xF1DRLsty2o18T9EqnWPioVVcBWXSbT0PFD4ZFcurwpn7 WeD+VcHhndTT7Qqj6lVN5th0VG2wAIK5vGy7R0WyuUtfXTZoOxf+3FUXydR+tEvqBW+V JzMg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1758037886; x=1758642686; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=tE+Z2uOveLKwo8QgaaliDJfk3j4gHTiLLJI/9lkrzos=; b=JHMlCWlqjgcqn2z6SUzDTDFBLEtNt1/xAHAwR3FdeVDE96tRdhkQMc/B+vuxc889X4 r98GAaNW1B4q9wBK+tSZSr/17kTXUarx7OaNOjZnrDa2TtEZ+3Eo2MG+qL9DjaRbTnTG ZNzGuXX2UrPb80MNueiWlm/ibci0fXPfGVPVm3P6+C48OWNqgeRbHBoQo+LAmx0zANQ9 mOC292ivoPzvuNzF/+ptEB9gPBaRzdw9RDyRAlUIeUD2DvP4KxNkPEK0M7FKua89/78/ zx30RzXohGAs3GmREEjp1UHjAaVDEr6AvJpuMzPkYzn6xOp2QgFwwu/H7wKEH0pg7vwc GvHg== X-Gm-Message-State: AOJu0YxCjF8okcf1UzpexE4w/p55CQrDi7gD+P6WSTu7JT9wwAX9eX2M l8eP7iNmw6RmAF0ot32CwADu811dkyML9xmpcBk5q3D8cznagNEr/GUlMv3vtB7/ X-Gm-Gg: ASbGnctLMb3uHcfnWwrlnZiyALic96Sr4kHya3wzmpWxdT8i48rElOu5NE1DXbsVO5x 5S0ZI2hZRscE7auMGvwOfzF3eBXSTbL6Xh2s1paDosc//Y0xJuptnPiOzc8O8QrzoULVT8xkDP3 6q3CTkR9oHLPHmH8pSf6Y4of+7XP++CxnrKFINZW1sLfm2Sz5Dgu6wAtZb0tr+bnGEDIfZeVKWE d8F7/Z9ZA7+hx5N81z9aydwSdcBwQ1aiWoW2BqiD3A+vduPJIfeHs7whD2AO5I0f5W+SD2Kr1a/ pthR0zE3NswLWTd0Ek5dlAASU6M9eRcq/HyvijXCZTDVq0VNIHamyZgkiPT8FE4fN2zKZuHQSCq eRgWmricvojzMOaPCKXKPGlHwB2M3UazM2uVA2BYLNA47j8+RH0yNIfA2WUZdhSlqWeEDDVkUzU PLtWUOWUHFjr8n3rHgzvyjU7rpSgJXgqGqHSNz7pKIZQE1SZwl73fwRjE= X-Google-Smtp-Source: AGHT+IGwg+g8YLnPFqWRNa2LXPuWKs34nd3tuuPCB4xQhw7n2vhyToRPsPGzEDWTZvUjIkkucmtAVw== X-Received: by 2002:a05:6214:5192:b0:728:854:6c5d with SMTP id 6a1803df08f44-767c1f720camr199316046d6.40.1758037885409; Tue, 16 Sep 2025 08:51:25 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-786c9c68cd2sm33724456d6.7.2025.09.16.08.51.24 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 16 Sep 2025 08:51:24 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 4/4] linux-yocto/6.12: update CVE exclusions (6.12.47) Date: Tue, 16 Sep 2025 11:51:19 -0400 Message-Id: <20250916155119.1583243-4-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20250916155119.1583243-1-bruce.ashfield@gmail.com> References: <20250916155119.1583243-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Tue, 16 Sep 2025 15:51:36 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/223567 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 1 changes (1 new | 0 updated): - 1 new CVEs: CVE-2025-10421 - 0 updated CVEs: Date: Mon, 15 Sep 2025 02:20:02 +0000 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.12.inc | 396 +++++++++++++++++- 1 file changed, 377 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 57b735ed34..a33f7d5403 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2025-09-03 20:06:37.780942+00:00 for kernel version 6.12.44 -# From linux_kernel_cves cve_2025-09-03_1900Z-6-ga45e93ffde5 +# Generated at 2025-09-15 02:51:11.905579+00:00 for kernel version 6.12.47 +# From linux_kernel_cves cve_2025-09-15_0200Z python check_kernel_cve_status_version() { - this_version = "6.12.44" + this_version = "6.12.47" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -5848,8 +5848,6 @@ CVE_STATUS[CVE-2023-53135] = "fixed-version: Fixed from version 6.3" CVE_STATUS[CVE-2023-53136] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2023-53137] = "fixed-version: Fixed from version 6.3" - CVE_STATUS[CVE-2023-53138] = "fixed-version: Fixed from version 6.3" CVE_STATUS[CVE-2023-53139] = "fixed-version: Fixed from version 6.3" @@ -12932,7 +12930,7 @@ CVE_STATUS[CVE-2025-22101] = "cpe-stable-backport: Backported in 6.12.36" CVE_STATUS[CVE-2025-22102] = "cpe-stable-backport: Backported in 6.12.30" -# CVE-2025-22103 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-22103] = "cpe-stable-backport: Backported in 6.12.46" # CVE-2025-22104 needs backporting (fixed from 6.15) @@ -12952,7 +12950,7 @@ CVE_STATUS[CVE-2025-22110] = "fixed-version: only affects 6.14 onwards" CVE_STATUS[CVE-2025-22112] = "cpe-stable-backport: Backported in 6.12.35" -# CVE-2025-22113 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-22113] = "cpe-stable-backport: Backported in 6.12.46" CVE_STATUS[CVE-2025-22114] = "fixed-version: only affects 6.14 onwards" @@ -12974,9 +12972,9 @@ CVE_STATUS[CVE-2025-22122] = "cpe-stable-backport: Backported in 6.12.33" CVE_STATUS[CVE-2025-22123] = "cpe-stable-backport: Backported in 6.12.33" -# CVE-2025-22124 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-22124] = "cpe-stable-backport: Backported in 6.12.46" -# CVE-2025-22125 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-22125] = "cpe-stable-backport: Backported in 6.12.46" CVE_STATUS[CVE-2025-22126] = "cpe-stable-backport: Backported in 6.12.25" @@ -12992,7 +12990,7 @@ CVE_STATUS[CVE-2025-22128] = "cpe-stable-backport: Backported in 6.12.35" # CVE-2025-23132 needs backporting (fixed from 6.15) -# CVE-2025-23133 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-23133] = "cpe-stable-backport: Backported in 6.12.46" CVE_STATUS[CVE-2025-23134] = "cpe-stable-backport: Backported in 6.12.23" @@ -14094,7 +14092,7 @@ CVE_STATUS[CVE-2025-38270] = "cpe-stable-backport: Backported in 6.12.34" CVE_STATUS[CVE-2025-38271] = "fixed-version: only affects 6.15 onwards" -# CVE-2025-38272 needs backporting (fixed from 6.16) +CVE_STATUS[CVE-2025-38272] = "cpe-stable-backport: Backported in 6.12.46" CVE_STATUS[CVE-2025-38273] = "cpe-stable-backport: Backported in 6.12.34" @@ -14162,7 +14160,7 @@ CVE_STATUS[CVE-2025-38304] = "cpe-stable-backport: Backported in 6.12.34" CVE_STATUS[CVE-2025-38305] = "cpe-stable-backport: Backported in 6.12.34" -# CVE-2025-38306 needs backporting (fixed from 6.16) +CVE_STATUS[CVE-2025-38306] = "cpe-stable-backport: Backported in 6.12.46" CVE_STATUS[CVE-2025-38307] = "cpe-stable-backport: Backported in 6.12.34" @@ -14456,7 +14454,7 @@ CVE_STATUS[CVE-2025-38451] = "cpe-stable-backport: Backported in 6.12.39" CVE_STATUS[CVE-2025-38452] = "cpe-stable-backport: Backported in 6.12.39" -# CVE-2025-38453 needs backporting (fixed from 6.16) +CVE_STATUS[CVE-2025-38453] = "cpe-stable-backport: Backported in 6.12.46" CVE_STATUS[CVE-2025-38454] = "cpe-stable-backport: Backported in 6.12.39" @@ -14554,7 +14552,7 @@ CVE_STATUS[CVE-2025-38500] = "cpe-stable-backport: Backported in 6.12.41" CVE_STATUS[CVE-2025-38501] = "cpe-stable-backport: Backported in 6.12.42" -# CVE-2025-38502 needs backporting (fixed from 6.17rc1) +CVE_STATUS[CVE-2025-38502] = "cpe-stable-backport: Backported in 6.12.46" CVE_STATUS[CVE-2025-38503] = "cpe-stable-backport: Backported in 6.12.39" @@ -14662,7 +14660,7 @@ CVE_STATUS[CVE-2025-38554] = "fixed-version: only affects 6.15 onwards" CVE_STATUS[CVE-2025-38555] = "cpe-stable-backport: Backported in 6.12.42" -# CVE-2025-38556 needs backporting (fixed from 6.17rc1) +CVE_STATUS[CVE-2025-38556] = "cpe-stable-backport: Backported in 6.12.46" CVE_STATUS[CVE-2025-38557] = "cpe-stable-backport: Backported in 6.12.42" @@ -14756,8 +14754,6 @@ CVE_STATUS[CVE-2025-38601] = "cpe-stable-backport: Backported in 6.12.42" CVE_STATUS[CVE-2025-38602] = "cpe-stable-backport: Backported in 6.12.42" -CVE_STATUS[CVE-2025-38603] = "fixed-version: only affects 6.16 onwards" - CVE_STATUS[CVE-2025-38604] = "cpe-stable-backport: Backported in 6.12.42" # CVE-2025-38605 needs backporting (fixed from 6.17rc1) @@ -14772,8 +14768,6 @@ CVE_STATUS[CVE-2025-38609] = "cpe-stable-backport: Backported in 6.12.42" CVE_STATUS[CVE-2025-38610] = "cpe-stable-backport: Backported in 6.12.42" -CVE_STATUS[CVE-2025-38611] = "cpe-stable-backport: Backported in 6.12.42" - CVE_STATUS[CVE-2025-38612] = "cpe-stable-backport: Backported in 6.12.42" CVE_STATUS[CVE-2025-38613] = "fixed-version: only affects 6.13 onwards" @@ -14908,16 +14902,378 @@ CVE_STATUS[CVE-2025-38677] = "cpe-stable-backport: Backported in 6.12.44" # CVE-2025-38678 needs backporting (fixed from 6.17rc2) +CVE_STATUS[CVE-2025-38679] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38680] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38681] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38682] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-38683] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38684] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38685] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38686] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38687] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38688] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38689] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-38690] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-38691] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38692] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38693] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38694] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38695] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38696] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38697] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38698] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38699] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38700] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38701] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38702] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38703] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38704] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38705] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38706] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38707] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38708] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38709] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38710] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38711] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38712] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38713] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38714] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38715] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38716] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38717] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38718] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38719] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38720] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38721] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38722] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38723] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38724] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38725] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38726] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38727] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38728] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38729] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-38730] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-38731] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38732] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-38733] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-38734] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-38735] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-38736] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-38737] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39673] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39674] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39675] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39676] = "cpe-stable-backport: Backported in 6.12.44" + +# CVE-2025-39677 needs backporting (fixed from 6.17rc3) + +# CVE-2025-39678 needs backporting (fixed from 6.17rc3) + +CVE_STATUS[CVE-2025-39679] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39680] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-39681] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39682] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39683] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39684] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39685] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39686] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39687] = "cpe-stable-backport: Backported in 6.12.44" + CVE_STATUS[CVE-2025-39688] = "cpe-stable-backport: Backported in 6.12.23" +CVE_STATUS[CVE-2025-39689] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39690] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39691] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39692] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39693] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39694] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39695] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39696] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39697] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39698] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39699] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-39700] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39701] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39702] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39703] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39704] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-39705] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39706] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39707] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39708] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39709] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39710] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39711] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39712] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39713] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39714] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39715] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39716] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39717] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39718] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39719] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39720] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39721] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39722] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39723] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39724] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39725] = "cpe-stable-backport: Backported in 6.12.41" + +CVE_STATUS[CVE-2025-39726] = "cpe-stable-backport: Backported in 6.12.41" + +CVE_STATUS[CVE-2025-39727] = "cpe-stable-backport: Backported in 6.12.42" + CVE_STATUS[CVE-2025-39728] = "cpe-stable-backport: Backported in 6.12.23" +CVE_STATUS[CVE-2025-39729] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39730] = "cpe-stable-backport: Backported in 6.12.42" + +CVE_STATUS[CVE-2025-39731] = "cpe-stable-backport: Backported in 6.12.42" + +CVE_STATUS[CVE-2025-39732] = "cpe-stable-backport: Backported in 6.12.42" + +CVE_STATUS[CVE-2025-39733] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39734] = "cpe-stable-backport: Backported in 6.12.42" + CVE_STATUS[CVE-2025-39735] = "cpe-stable-backport: Backported in 6.12.23" +CVE_STATUS[CVE-2025-39736] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39737] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39738] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39739] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39740] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39741] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39742] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39743] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39744] = "cpe-stable-backport: Backported in 6.12.43" + +# CVE-2025-39745 needs backporting (fixed from 6.17rc1) + +CVE_STATUS[CVE-2025-39746] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39747] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39748] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39749] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39750] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39751] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39752] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39753] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39754] = "cpe-stable-backport: Backported in 6.12.43" + CVE_STATUS[CVE-2025-39755] = "fixed-version: only affects 6.13 onwards" +CVE_STATUS[CVE-2025-39756] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39757] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39758] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39759] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39760] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39761] = "cpe-stable-backport: Backported in 6.12.43" + +# CVE-2025-39762 needs backporting (fixed from 6.17rc1) + +CVE_STATUS[CVE-2025-39763] = "cpe-stable-backport: Backported in 6.12.43" + +# CVE-2025-39764 needs backporting (fixed from 6.17rc2) + +CVE_STATUS[CVE-2025-39765] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39766] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39767] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39768] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39769] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39770] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39771] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39772] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39773] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39774] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-39775] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-39776] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39777] = "fixed-version: only affects 6.16 onwards" + CVE_STATUS[CVE-2025-39778] = "cpe-stable-backport: Backported in 6.12.23" +CVE_STATUS[CVE-2025-39779] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39780] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39781] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39782] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39783] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39784] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-39785] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39786] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-39787] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39788] = "cpe-stable-backport: Backported in 6.12.44" + +# CVE-2025-39789 needs backporting (fixed from 6.17rc1) + +CVE_STATUS[CVE-2025-39790] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39791] = "cpe-stable-backport: Backported in 6.12.44" + +CVE_STATUS[CVE-2025-39792] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39793] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-39794] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39795] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39796] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39797] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39798] = "cpe-stable-backport: Backported in 6.12.43" + +CVE_STATUS[CVE-2025-39799] = "fixed-version: only affects 6.17rc1 onwards" + CVE_STATUS[CVE-2025-39930] = "fixed-version: only affects 6.14 onwards" CVE_STATUS[CVE-2025-39989] = "cpe-stable-backport: Backported in 6.12.23" @@ -14926,6 +15282,8 @@ CVE_STATUS[CVE-2025-39989] = "cpe-stable-backport: Backported in 6.12.23" CVE_STATUS[CVE-2025-40114] = "cpe-stable-backport: Backported in 6.12.23" +# CVE-2025-40300 has no known resolution + # CVE-2025-40325 needs backporting (fixed from 6.15) # CVE-2025-40364 has no known resolution