From patchwork Mon Sep 29 18:59:27 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 71263 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 16148CCA468 for ; Mon, 29 Sep 2025 18:59:44 +0000 (UTC) Received: from mail-qt1-f169.google.com (mail-qt1-f169.google.com [209.85.160.169]) by mx.groups.io with SMTP id smtpd.web10.6640.1759172374068193321 for ; Mon, 29 Sep 2025 11:59:34 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=gi8cc9pd; spf=pass (domain: gmail.com, ip: 209.85.160.169, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f169.google.com with SMTP id d75a77b69052e-4df81016e59so23202721cf.3 for ; Mon, 29 Sep 2025 11:59:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1759172373; x=1759777173; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=Ff4YNkLxPeN09/CJXvt7OrMFww7yYU0w88ztjMIsxOU=; b=gi8cc9pde8vCKE5J/ZsxnxUjN9uyed5fiXzWpzctEVrQlyvHAhh/6I5ht+EiIaAWSd mz2Z/MEqK/ZoWysaPL1FH6DM1ZRbOnXadQXR+ewFYgfqp2ckSNeF23PLKVOrKUBLAQOx M/kdSA95CVPxHvSyN5MZk3l2A5FehwYzvkS4iOmzc/PFxOSPwGXZm6Wb10Ak94hwaLwS 6/X8TgtoPYjhfcw+rXf9VOTNGihSL3ppXbqGQ1Hr/LGkFyY0HKG97D5l/++byo8kR16+ qj96ofYSU3BAqx2/VsRQ/KxSGkFG2utGUnLQqHa10fuXYpTuYbhsVUtmXP57gd+LnK70 X7bw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1759172373; x=1759777173; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=Ff4YNkLxPeN09/CJXvt7OrMFww7yYU0w88ztjMIsxOU=; b=i7h31jfi3bUCQMNfSKm7uCcniOA5v+EQHcSONRmM2fHzySL3oCSAXJ4DmD7nQS7G3p PDIPPwtgMRbreCX2170XHBuuZCRMrrjLUtdhMjNQZSOcEemwj96ka8cCKf5IVYvSzQ/d G0xklYKDkjV/XoMQk+FewkF7k0F7QqfeKUnO0se+ni83FYnusvXJ6qYBkEQQk4vLXNmu hgiAMqZdZ82gZHrelE5J3Ezz6fh3IXd5TALRvyONocsdiYWhkUkTe+Vt80Fj3vKV4Va4 Da230rq5Da75ZdFgdNcAdIDQSlnwEhDJhuUsobD075p5rfUbR0dot2XRIeuKLR2/NRep OHPw== X-Gm-Message-State: AOJu0Yy5wwUGpw/T9WYOO8deTtLcY2RHpFjcDh5qW0lp2HpDIP/CDijv fXpd2UF/GhYVg1wXQ1ZaSHlMy4Ar8MMyF8MaD8bHzKJv10S48UmJA0s1BQh7Fw5Nl2M= X-Gm-Gg: ASbGncuVDzVgnVatmQPjbnKsgc3Io3ZGh/GKrGgJAfHwsQnujjgIEv+lslS2SvYlWfh POq/581R2KnFkTaNf5fO+MPzGHzlJBrN5zE+T/RFdKuJJeViMxuSCOhe8wMgyAprGp8SmeWVjbb oQjnMTdJSURXea9UpXTqwBv1l7AjYpXYGClmfV1QMwhl/63BiJNKcSmJ0rrcJYLnsw3gQton9p+ KtFFkXQ+gNpTkfQIpMbv5s6watNByX/W/2IwUwR9ai0QWUqnOX8TFziUw6EM8KpCgdEsXuM1Rg6 5ZNesfTh3tbOvupRbDYFJQ+cWO1bcFg+saFPHI5OCkdoTUhg2X6BgFv02etOMBzS9ccsczroTIu pEJ+te8V3AjdkhFADrs5iOAYDYswEDlQP0pZTWYuRjxyksiQAxEphEHWyJU108qDF+i1su42QJH i+Qou8Xf9oqtYdHZPxBEdthOzTW4+0+IRPCAHuS+0n9BSDHp1ekHBNGB0= X-Google-Smtp-Source: AGHT+IHClBc0oDIp/7VZVTgwq2fgoW1tdPEJ5U7AHVS2EWqrTzpMFHusIALVUQ7RVgNi3ddzjgvDTg== X-Received: by 2002:ac8:5f53:0:b0:4b7:7d98:d3d8 with SMTP id d75a77b69052e-4da4dcc6b08mr192634441cf.75.1759172372632; Mon, 29 Sep 2025 11:59:32 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id af79cd13be357-85c337a1e1csm873240285a.62.2025.09.29.11.59.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 29 Sep 2025 11:59:32 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 1/4] linux-yocto/6.16: update to v6.16.9 Date: Mon, 29 Sep 2025 14:59:27 -0400 Message-Id: <20250929185930.1689034-1-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 29 Sep 2025 18:59:44 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/224166 From: Bruce Ashfield Updating linux-yocto/6.16 to the latest korg -stable release that comprises the following commits: b0d8acc71198 Linux 6.16.9 f9fc28d1451b samples/damon/prcl: avoid starting DAMON before initialization 40108f69c372 clk: sunxi-ng: mp: Fix dual-divider clock rate readback f9fa006e3527 samples/damon/mtier: avoid starting DAMON before initialization 8f7dd196be59 samples/damon: change enable parameters to enabled 1338fb5d576a samples/damon/prcl: fix boot time enable crash 941452199941 dt-bindings: serial: 8250: move a constraint 95c9489abfc4 dt-bindings: serial: 8250: spacemit: set clocks property as required ceee5585720a dt-bindings: serial: 8250: allow clock 'uartclk' and 'reg' for nxp,lpc1850-uart fb0b1ef7055b mptcp: pm: nl: announce deny-join-id0 flag 46d6ff0da889 platform/x86: asus-wmi: Re-add extra keys to ignore_key_wlan quirk 1aa91f3d4f16 platform/x86: asus-wmi: Fix ROG button mapping, tablet mode on ASUS ROG Z13 50a98ce1ea69 io_uring: fix incorrect io_kiocb reference in io_link_skb 0991418bf98f smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path 9617c3ede9ff smb: client: fix file open check in __cifs_unlink() 5ba113d0b049 io_uring/msg_ring: kill alloc_cache for io_kiocb allocations 045ee26aa392 crypto: af_alg - Set merge to zero early in af_alg_sendmsg 3fabb1236f2e smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work) ac6fbc3d0030 smb: client: use disable[_delayed]_work_sync in smbdirect.c a39e32f03183 smb: client: fix filename matching of deferred files 581fb78e0388 smb: client: let recv_done verify data_offset, data_length and remaining_data_length cbda551b90a7 smb: client: make use of struct smbdirect_recv_io 089ea68aae42 smb: smbdirect: introduce struct smbdirect_recv_io 86b4bddb8292 smb: client: make use of smbdirect_socket->recv_io.expected f2ffba55b686 smb: smbdirect: introduce smbdirect_socket.recv_io.expected dd1a415dcfd5 drm/xe/guc: Set RCS/CCS yield policy 97207a4fed53 drm/xe/guc: Enable extended CAT error reporting 56f34936bf8c drm/xe: Fix error handling if PXP fails to start 09b473a80c1c ALSA: usb: qcom: Fix false-positive address space check b45cabfa717d drm/xe: Fix a NULL vs IS_ERR() in xe_vm_add_compute_exec_queue() e3fe0101463a drm: bridge: cdns-mhdp8546: Fix missing mutex unlock on error path 1a7ea294d57f drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ e6a1df8cf275 drm/xe/pf: Drop rounddown_pow_of_two fair LMEM limitation f32a0226e848 drm/xe/tile: Release kobject for the failure path 65c5cfbd6d93 ASoC: amd: acp: Fix incorrect retrival of acp_chip_info f7229775e41d iommu/amd: Fix alias device DTE setting 34f3a9e04e73 ASoC: Intel: catpt: Expose correct bit depth to userspace f6433733326b ASoC: SDCA: Fix return value in sdca_regmap_mbq_size() 9ff967d7e8d9 ASoC: SOF: Intel: hda-stream: Fix incorrect variable used in error message cd59ca8f75db ASoC: codec: sma1307: Fix memory corruption in sma1307_setting_loaded() 7c28b31b2209 ASoC: wm8974: Correct PLL rate rounding badf6143198e ASoC: wm8940: Correct typo in control name 7a372ac1e890 ASoC: wm8940: Correct PLL rate rounding 519b95c74f40 ALSA: hda/realtek: Fix mute led for HP Laptop 15-dw4xx ee8d393af37e selftests: mptcp: avoid spurious errors on TCP disconnect 47f8d4403995 selftests: mptcp: connect: catch IO errors on listen side 80d38ea27a1e mptcp: propagate shutdown to subflows when possible c62000bf27db rds: ib: Increment i_fastreg_wrs before bailing out bc509293c9d4 crypto: ccp - Always pass in an error pointer to __sev_platform_shutdown_locked() 27d94a2a52cb gpiolib: acpi: initialize acpi_gpio_info struct 21a39b958b4b net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer 6db60106a07f io_uring: include dying ring in task_work "should cancel" state f757ab3db457 io_uring/io-wq: fix `max_workers` breakage and `nr_workers` underflow 898aaf78480b drm/amd: Only restore cached manual clock settings in restore if OD enabled 20f87640ebe7 drm/amd/display: Allow RX6xxx & RX7700 to invoke amdgpu_irq_get/put 1ff89f5627ef drm/amdgpu: suspend KFD and KGD user queues for S0ix b477c5668ec6 drm/amdkfd: add proper handling for S0ix 0e2db61cc589 KVM: SVM: Sync TPR from LAPIC into VMCB::V_TPR even if AVIC is active c0603b80436d x86/sev: Guard sev_evict_cache() with CONFIG_AMD_MEM_ENCRYPT 79a9ba8da904 mmc: sdhci-uhs2: Fix calling incorrect sdhci_set_clock() function 7650c994ced2 mmc: sdhci-pci-gli: GL9767: Fix initializing the UHS-II interface during a power-on 7186d8e8bd96 mmc: sdhci: Move the code related to setting the clock from sdhci_set_ios_common() into sdhci_set_ios() d0b7ff384b7a mmc: mvsdio: Fix dma_unmap_sg() nents value 66e6d1c92806 ASoC: qcom: q6apm-lpass-dais: Fix missing set_fmt DAI op for I2S cc336b242ea7 ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed 59c4accddfeb ASoC: qcom: audioreach: Fix lpaif_type configuration for the I2S interface 8276c97dccee ASoC: SDCA: Add quirk for incorrect function types for 3 systems 417ed00d48e7 btrfs: tree-checker: fix the incorrect inode ref size check 359613f2fa00 iommu/s390: Make attach succeed when the device was surprise removed 17a58caf3863 iommu/s390: Fix memory corruption when using identity domain 7d462bdecb7d iommu/amd/pgtbl: Fix possible race while increase page table level b0c0e231060a iommu/amd: Fix ivrs_base memleak in early_amd_iommu_init() 7ff7d16649b2 iommu/vt-d: Fix __domain_mapping()'s usage of switch_to_super_page() 1c731284374a LoongArch: KVM: Fix VM migration failure with PTW enabled 960eedb14caf LoongArch: KVM: Avoid copy_*_user() with lock hold in kvm_pch_pic_regs_access() 55ba91b4e04d LoongArch: KVM: Avoid copy_*_user() with lock hold in kvm_eiointc_sw_status_access() 105605ca76e9 LoongArch: KVM: Avoid copy_*_user() with lock hold in kvm_eiointc_regs_access() 291d4b01d3b1 LoongArch: KVM: Avoid copy_*_user() with lock hold in kvm_eiointc_ctrl_access() 401363c839cb LoongArch: Handle jump tables options for RUST 1967642780cf LoongArch: Make LTO case independent in Makefile db65fea5f0aa LoongArch: Check the return value when creating kobj 5f2b63a398ed LoongArch: Align ACPI structures if ARCH_STRICT_ALIGN enabled a417571950f9 LoongArch: vDSO: Check kcalloc() result in init_vdso() 2feeecd7c685 LoongArch: Fix unreliable stack for live patching 5dbbc7b04c14 objtool/LoongArch: Mark special atomic instruction as INSN_BUG type e0aefa8f4612 objtool/LoongArch: Mark types based on break immediate code 953138ff0ff6 LoongArch: Update help info of ARCH_STRICT_ALIGN 1eda9ab8da6b mm: folio_may_be_lru_cached() unless folio_test_large() fb4e6d587a27 mm: revert "mm: vmscan.c: fix OOM on swap stress test" d0c8ba94cb70 mm/gup: local lru_add_drain() to avoid lru_add_drain_all() 163843e8c8f3 gup: optimize longterm pin_user_pages() for large folio 3958f9ec7251 mm: revert "mm/gup: clear the LRU flag of a page before adding to LRU batch" fdac0a3f58c0 mm/gup: check ref_count instead of lru before migration ee27658c239b dm-stripe: fix a possible integer overflow ba3a78db47ec dm-raid: don't set io_min and io_opt for raid1 e8f496001e0c btrfs: initialize inode::file_extent_tree after i_mode has been set 8ae09726773a Revert "sched_ext: Skip per-CPU tasks in scx_bpf_reenqueue_local()" a4ee54e68282 power: supply: bq27xxx: restrict no-battery detection to bq27000 d18d7035ecb8 power: supply: bq27xxx: fix error return in case of no bq27000 hdq battery 45bcf60fe49b crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg 7b7361da9e7f nilfs2: fix CFI failure when accessing /sys/fs/nilfs2/features/* ff750e9f2c4d zram: fix slot write race condition c64b915bb3d9 ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size 529b121b00a6 ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer 5ca20bb7b4bd octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() 0627e1481676 cnic: Fix use-after-free bugs in cnic_delete_task 45f71f4ac4aa net: liquidio: fix overflow in octeon_init_instr_queue() 6e1675c8b612 net: clear sk->sk_ino in sk_set_socket(sk, NULL) 53222fc8ebbc Revert "net/mlx5e: Update and set Xon/Xoff upon port speed set" 61ca2da5fb8f tls: make sure to abort the stream if headers are bogus ae313d14b45e tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). 0357a37b4a8b octeon_ep: fix VF MAC address lifecycle handling e2019c7d3a3e bonding: don't set oif to bond dev when getting NS target destination 948381b58298 net/mlx5e: Add a miss level for ipsec crypto offload 8df354eb2dd6 net/mlx5e: Harden uplink netdev access against device unbind 805c7df4faca doc/netlink: Fix typos in operation attributes f05e82d85532 igc: don't fail igc_probe() on LED setup error 3ce36b3b9c69 ixgbe: destroy aci.lock later within ixgbe_remove path a4a4b796dcf6 ixgbe: initialize aci.lock before it's used 5ac700c61648 i40e: remove redundant memory barrier when cleaning Tx descs fcb5718ebfe7 ice: fix Rx page leak on multi-buffer frames 4f21a0b3c8c2 net: natsemi: fix `rx_dropped` double accounting on `netif_rx()` failure 5735f1fb81a8 selftests: mptcp: sockopt: fix error messages 7f501faddb3c mptcp: tfo: record 'deny join id0' info fa9a7f272b01 selftests: mptcp: userspace pm: validate deny-join-id0 flag f679e3dc6c01 mptcp: set remote_deny_join_id0 on SYN recv f3439ed58636 bonding: set random address only when slaves already exist 8b1dc0217f96 net: dst_metadata: fix IP_DF bit not extracted from tunnel headers 70affe82e38f qed: Don't collect too many protection override GRC elements 1c24b132c119 octeon_ep: Validate the VF ID 71571e187106 rxrpc: Fix untrusted unsigned subtract 8ac99c57029e rxrpc: Fix unhandled errors in rxgk_verify_packet_integrity() 64e76fcb5311 dpll: fix clock quality level reporting 993b734d31ab net/tcp: Fix a NULL pointer dereference when using TCP-AO with TCP_REPAIR d0c3f85a041a dpaa2-switch: fix buffer pool seeding for control traffic e1fa8f786c8d net/mlx5: Not returning mlx5_link_info table when speed is unknown 4c2c59cc838c um: Fix FD copy size in os_rcv_fd_msg() c2ff91255e01 um: virtio_uml: Fix use-after-free after put_device in probe 856e039ded02 smb: server: let smb_direct_writev() respect SMB_DIRECT_MAX_SEND_SGES 09ea55d02c89 pcmcia: omap_cf: Mark driver struct with __refdata to prevent section mismatch 0835c4592344 wifi: mac80211: fix incorrect type for ret 0dbad5f5549e wifi: mac80211: increase scan_ies_len for S1G 745418fc8229 wifi: mt76: do not add non-sta wcid entries to the poll list 778a062c131e ALSA: firewire-motu: drop EPOLLOUT from poll return values as write is not supported 0cdf320eb46c nvme: fix PI insert on write ae50f8562306 wifi: wilc1000: avoid buffer overflow in WID string configuration d06a83038bd6 perf maps: Ensure kmap is set up for all inserts 314a92e5950f btrfs: zoned: fix incorrect ASSERT in btrfs_zoned_reserve_data_reloc_bg() eff2bb3b300b btrfs: fix invalid extref key setup when replaying dentry 05e0b03447cf cgroup: split cgroup_destroy_wq into 3 workqueues Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.16.bb | 6 ++-- .../linux/linux-yocto-tiny_6.16.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.16.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.16.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.16.bb index 55df04e188..0d6ea9b392 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.16.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.16.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "d9ac79e651b849ad8b16bc3f96af4cc54c30148e" -SRCREV_meta ?= "cc3c965edfdad3a665bc69430e58ea726e02063f" +SRCREV_machine ?= "4f8446899dbe7700c1e7394bcc8afd497809ebc0" +SRCREV_meta ?= "1ac1d0ff730fe1dd1371823d562db8126750a98c" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.16;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.16.8" +LINUX_VERSION ?= "6.16.9" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.16.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.16.bb index d1af7c89bd..4ab4d22486 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.16.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.16.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.16.inc -LINUX_VERSION ?= "6.16.8" +LINUX_VERSION ?= "6.16.9" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "ff2318af3a2513c944b2598ab3df356dd7f15f34" -SRCREV_meta ?= "cc3c965edfdad3a665bc69430e58ea726e02063f" +SRCREV_machine ?= "3f9db490a81eeb0077be3c5a5aa1388a2372232f" +SRCREV_meta ?= "1ac1d0ff730fe1dd1371823d562db8126750a98c" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.16.bb b/meta/recipes-kernel/linux/linux-yocto_6.16.bb index fd180db380..1a633bad9b 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.16.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.16.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.16/standard/base" KBRANCH:qemuloongarch64 ?= "v6.16/standard/base" KBRANCH:qemumips64 ?= "v6.16/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "5fa52c596c9c560c6969fbcf0927c2d546e5d9a9" -SRCREV_machine:qemuarm64 ?= "ff2318af3a2513c944b2598ab3df356dd7f15f34" -SRCREV_machine:qemuloongarch64 ?= "ff2318af3a2513c944b2598ab3df356dd7f15f34" -SRCREV_machine:qemumips ?= "f421b1fee99c72d86eb152bb4828fdc078a268a8" -SRCREV_machine:qemuppc ?= "ff2318af3a2513c944b2598ab3df356dd7f15f34" -SRCREV_machine:qemuriscv64 ?= "ff2318af3a2513c944b2598ab3df356dd7f15f34" -SRCREV_machine:qemuriscv32 ?= "ff2318af3a2513c944b2598ab3df356dd7f15f34" -SRCREV_machine:qemux86 ?= "ff2318af3a2513c944b2598ab3df356dd7f15f34" -SRCREV_machine:qemux86-64 ?= "ff2318af3a2513c944b2598ab3df356dd7f15f34" -SRCREV_machine:qemumips64 ?= "e6f7e24a7b76c6d1b3eaa3716fa1c4185de94aa5" -SRCREV_machine ?= "ff2318af3a2513c944b2598ab3df356dd7f15f34" -SRCREV_meta ?= "cc3c965edfdad3a665bc69430e58ea726e02063f" +SRCREV_machine:qemuarm ?= "945e9592c57f30b248f1973ca70678556fd8b441" +SRCREV_machine:qemuarm64 ?= "3f9db490a81eeb0077be3c5a5aa1388a2372232f" +SRCREV_machine:qemuloongarch64 ?= "3f9db490a81eeb0077be3c5a5aa1388a2372232f" +SRCREV_machine:qemumips ?= "a924b211fade75edc1e28362ad8d321c08d428c8" +SRCREV_machine:qemuppc ?= "3f9db490a81eeb0077be3c5a5aa1388a2372232f" +SRCREV_machine:qemuriscv64 ?= "3f9db490a81eeb0077be3c5a5aa1388a2372232f" +SRCREV_machine:qemuriscv32 ?= "3f9db490a81eeb0077be3c5a5aa1388a2372232f" +SRCREV_machine:qemux86 ?= "3f9db490a81eeb0077be3c5a5aa1388a2372232f" +SRCREV_machine:qemux86-64 ?= "3f9db490a81eeb0077be3c5a5aa1388a2372232f" +SRCREV_machine:qemumips64 ?= "ccb566d859459b4dfef541f7c2af8d5eb6e47988" +SRCREV_machine ?= "3f9db490a81eeb0077be3c5a5aa1388a2372232f" +SRCREV_meta ?= "1ac1d0ff730fe1dd1371823d562db8126750a98c" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "62dae019823123ce3baa50e680219e2beb9a63a5" +SRCREV_machine:class-devupstream ?= "b0d8acc711981d712a59ee20b073cbc52a4109c5" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.16/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.16;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.16.8" +LINUX_VERSION ?= "6.16.9" PV = "${LINUX_VERSION}+git" From patchwork Mon Sep 29 18:59:28 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 71260 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1221CCAC5B0 for ; Mon, 29 Sep 2025 18:59:44 +0000 (UTC) Received: from mail-qk1-f169.google.com (mail-qk1-f169.google.com [209.85.222.169]) by mx.groups.io with SMTP id smtpd.web10.6641.1759172374890021321 for ; Mon, 29 Sep 2025 11:59:35 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=M/kQZcy2; spf=pass (domain: gmail.com, ip: 209.85.222.169, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f169.google.com with SMTP id af79cd13be357-869ecba3bd2so182399685a.0 for ; Mon, 29 Sep 2025 11:59:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1759172374; x=1759777174; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=FfvU23zbsMlZG+rEGc8QfedKPtGEAsX+Xu/Sv4QPA+Q=; b=M/kQZcy23QqoqC4v0TaLDJHkrxyxiHVusZ5IRO+CoZGr22h5pGwJitcX2HoiXV/FsI l0d3XTpaBhGwk/CbWGsFHw6IPebipGPpF34hKCOyXYNmQO/cI1YpFAJBlhVpec5/QY0b gheltlhSkzunU/AKOZoMB4CQ1NOfsMuV5RCLU//U8PQ/GxBbOK8Mv1DxAeuWD89wa9B3 uirouhG46fH1GTOMsVrYglj6E35aywcFoSoNEL6JknVinIbaYOHrgbL85kkMhGozipFY cYn/Wolir5VlDn8sGtjqUBQLT6/oD8BWVeveOrMwGxl7GIGBxHNcZnGCkztEluPqd4IR Hzsg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1759172374; x=1759777174; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=FfvU23zbsMlZG+rEGc8QfedKPtGEAsX+Xu/Sv4QPA+Q=; b=MoDjBHYs4cd7ZiYhg24vP9W9CiYExtPyR5sdr2ke8q6ZXZ8TrFGKPKkF1lLDbakUCq dfnq8A+lsuJ9rULNTBc74mf8rnzOBencfvJleZoL9kHQnKN2tJ3L124Eett3vrSwV2GN 3nvNi9vz+rg7gh2Nt5rb+DGV5IZ49H45QSzS5aSLGu8PCUt99C1SWUroWgpSG+AtEi9u 5cIG9B3+qpnso8dCVj9X8hGZ07/gSoHYu9BaEfY1W0hsJaGHEoe/aq2bS9irb6ERf3cD e8/i4bZX5Zoxk2hkLEwhEr3jRGV7mOhteyq+5V5qvGdyMImYYuTxwE/ZU9vYGFC1AFmQ 2T+A== X-Gm-Message-State: AOJu0YzoxLUEhvXHxqvi56d2glu4rKtJceHSmsIM6Gmzc2TM3442Ylfx QOU1JUUA+1DKXd2vimzHSyJt9MQSR9F5/IhkoJ9OytlF3rqXYu+sNbUo2mnlWLhACnw= X-Gm-Gg: ASbGnctfaHWiIfBIcM5auVpO8ROeNEwytXcVv8o7UoTE3eLWKk7tAMuzQ0mPixvmTa5 0QNVard2BLx8Ew+sw9HZi5O+1mFWqS+cei9sNfp/9+eYZyq/pnifhUKPBrYcWbqz+XA/hHjKhu+ HiuI85b2Bmm4Nx5/3ucdcEQDVyov3SHh8gj07ruzRiIXPQrEStaKQfUbS5JqtRAKW8of1gyp5Go qfPPaOVd4kAm18nfkxC99j/BUrRuxqpz/ZlqBWt3Zx6vu2L5Y7vVx3vxSo0zwtBn2lUpDkdJpul Gs6C4PC6/EMKB8vBdZTawDVuCtXTvsYWs1DV9A+nn7lW2qTqmEjNx3YsHQFtE+snZxqRAc3el1g E0vHEAmlG1NqsiHLIJvT0QHheqAsEP2B9Z/7e4BGoS42Ql56IN1Wdeirm6zi9Dbmg8EAjhXxP2H cePMRf7yL1s1WAqP033y3S3/CuWShEC8od85cJL0QKTFcum29cn1/TpcePWmL3eHC0ug== X-Google-Smtp-Source: AGHT+IGLQcFJ13/sNX6JRHLY6bdA7XeMwpc7tXwg54FgoHtcvwLIHD8+688j17XeDY2YF0SmbrFuOw== X-Received: by 2002:a05:620a:7083:b0:857:3c07:cd28 with SMTP id af79cd13be357-85ae8b3253emr2181369485a.69.1759172373604; Mon, 29 Sep 2025 11:59:33 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id af79cd13be357-85c337a1e1csm873240285a.62.2025.09.29.11.59.32 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 29 Sep 2025 11:59:33 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 2/4] linux-yocto/6.16: update CVE exclusions (6.16.9) Date: Mon, 29 Sep 2025 14:59:28 -0400 Message-Id: <20250929185930.1689034-2-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20250929185930.1689034-1-bruce.ashfield@gmail.com> References: <20250929185930.1689034-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 29 Sep 2025 18:59:44 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/224167 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 1 changes (1 new | 0 updated): - 1 new CVEs: CVE-2025-11135 - 0 updated CVEs: Date: Mon, 29 Sep 2025 01:40:51 +0000 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.16.inc | 58 +++++++++++++++++-- 1 file changed, 53 insertions(+), 5 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.16.inc b/meta/recipes-kernel/linux/cve-exclusion_6.16.inc index a6d72242e2..17776b59a0 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.16.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.16.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2025-09-22 03:24:59.110083+00:00 for kernel version 6.16.8 -# From linux_kernel_cves cve_2025-09-22_0200Z-2-gd662e5ed470 +# Generated at 2025-09-29 01:46:30.994598+00:00 for kernel version 6.16.9 +# From linux_kernel_cves cve_2025-09-29_0100Z python check_kernel_cve_status_version() { - this_version = "6.16.8" + this_version = "6.16.9" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -4984,8 +4984,6 @@ CVE_STATUS[CVE-2022-50401] = "fixed-version: Fixed from version 6.2" CVE_STATUS[CVE-2022-50402] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-50403] = "fixed-version: Fixed from version 6.2" - CVE_STATUS[CVE-2022-50404] = "fixed-version: Fixed from version 6.2" CVE_STATUS[CVE-2022-50405] = "fixed-version: Fixed from version 6.2" @@ -12944,6 +12942,8 @@ CVE_STATUS[CVE-2024-58239] = "fixed-version: Fixed from version 6.8" CVE_STATUS[CVE-2024-58240] = "fixed-version: Fixed from version 6.8" +CVE_STATUS[CVE-2024-58241] = "fixed-version: Fixed from version 6.12" + CVE_STATUS[CVE-2025-21629] = "fixed-version: Fixed from version 6.13" CVE_STATUS[CVE-2025-21631] = "fixed-version: Fixed from version 6.13" @@ -16348,6 +16348,54 @@ CVE_STATUS[CVE-2025-39865] = "cpe-stable-backport: Backported in 6.16.6" CVE_STATUS[CVE-2025-39866] = "cpe-stable-backport: Backported in 6.16.6" +CVE_STATUS[CVE-2025-39867] = "fixed-version: only affects 6.17rc1 onwards" + +CVE_STATUS[CVE-2025-39868] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39869] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39870] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39871] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39872] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39873] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39874] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39875] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39876] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39877] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39878] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39879] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39880] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39881] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39882] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39883] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39884] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39885] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39886] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39887] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39888] = "cpe-stable-backport: Backported in 6.16.8" + +CVE_STATUS[CVE-2025-39889] = "fixed-version: Fixed from version 6.15" + +CVE_STATUS[CVE-2025-39890] = "fixed-version: Fixed from version 6.16" + CVE_STATUS[CVE-2025-39930] = "fixed-version: Fixed from version 6.15" CVE_STATUS[CVE-2025-39989] = "fixed-version: Fixed from version 6.15" From patchwork Mon Sep 29 18:59:29 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 71261 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 16FCACCA46F for ; Mon, 29 Sep 2025 18:59:44 +0000 (UTC) Received: from mail-qk1-f169.google.com (mail-qk1-f169.google.com [209.85.222.169]) by mx.groups.io with SMTP id smtpd.web10.6642.1759172375883641167 for ; Mon, 29 Sep 2025 11:59:36 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=V12/wqEf; spf=pass (domain: gmail.com, ip: 209.85.222.169, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f169.google.com with SMTP id af79cd13be357-85d5cd6fe9fso374572785a.0 for ; Mon, 29 Sep 2025 11:59:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1759172375; x=1759777175; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=KY8UWgZuF2w3u1m7SuMPVYjH8ggyj3ttBP2DG7oty/A=; b=V12/wqEfIFHri7NkmnADU9ecJeNQzF7TTl4D9mc+GlCRwpN2qQ2AmkCWUS5UpWS2L9 7zEalTxSit3qvcq0CZ9uIR8FOQTXTiLAHQbckhXKh8uoqnZffIB1LCm9G7rWdTnzjnTm SXt8+AUoPYZhiVDtCgdb6/JS1Rvwz5X5xYpQL28ntrXUk7O9ayQaAqoGPkSf0GIE46Nh 7zUj/TwRwC+U0rcNAuqSLUoUeF5dhhmSE3LSDRiuW6qDyktPRHYTeZYEUbkmUHqhqrk+ rIcy9ZRWHSMigJl3TarzoCi5zgfTRreLpGJJmyJQ4gKm0fqjuA2Kl8pdh12VV5er4Rxl KbtA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1759172375; x=1759777175; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=KY8UWgZuF2w3u1m7SuMPVYjH8ggyj3ttBP2DG7oty/A=; b=vYywzGKNRNZ5VRPvFiWIBVENZQEt0iFY8VtaqhZzwD04d5MURzr1Vxvz7xZaPuq+He bInccyx3hjwi+Zpzvli6EnGb9sXPg24EulEHAv/B2E3vb59FZxgOmlV1A64LG6UJb5uW RiCVT9hgh6SA/8Lpy54ibbb5jwGu5PIOvCRyx6ZMyR4w8pr0fqS0/qtkf4DNKtekny7w fgOPUnSrZAYc8UIs0KMmC4DP2D4FGP8xCF6UbAS9LkH/WaX51e0gPEz0Rx1UcxDGxt9W BYp0ZJUHtVmGb/zegn+cO0nlomYhh2gCJLtgN8jVD61AaVD0V7mhpp3Lw9XEKjK1NEKA CDGw== X-Gm-Message-State: AOJu0YxUTiEJs92mj4KrDKhpB0nSPpi8Kz+KiZqpqiMGoic+yRs+/p2b mz6HQjG847GmNc9fzljgRNbBHothN049fX0WkJg98m5M9zlrAKt5/htgjQfsXjgkIqc= X-Gm-Gg: ASbGncsvHQ3MV86CwZkGpPvciBwjteAoC6v0FOzg1sEgyc0cJpxLNChZ1eWWJbRE3rs z0cXi3kVxi5KDaws+WcI+2WZyYviaWLHObVuAq+XXB6ZzNm2Lg/76vgvOtH+LJxxusj0sWsCXrO UOfhcGn6MsQHQMMKK0nKC5HQ20O6vmK6wrgBRqqVP1CN43Ce94noc0baqQ4W9JB9Fg6kNArfKQH N97oFsylsgHVOGmSPPibdOATT5cQltTxFXQLYlh44NQi1CcY80RCtvXbb5pbKhFF2gepve2OkSS 4T3u1/7M0leC9Bd39nqW/cepBIE2dWaTnIsYXn/x7InYAbX9bfeIrfIlFTNEl/u8g2ktMZ+FQyn UZCGHX3d/Vtira4967ggatQU0EUFg+rO5rOL+DlqV8O82fc05JTEevFYB7sUHAMKKoStATJ4wT2 h5mfkMgoZVeDD6URApUWHBRu5oizCzAb62tJ9tDVnXF+RmzoHIVuFswUI= X-Google-Smtp-Source: AGHT+IHBiOCGHcLZaQo6eKpgZt8AGRPdOswh6HXctT6mqgbnxmmiR45GnkJxo67GKhmM/ebAsY1phA== X-Received: by 2002:a05:620a:1710:b0:865:4739:3dc3 with SMTP id af79cd13be357-8654757c353mr1013698885a.30.1759172374587; Mon, 29 Sep 2025 11:59:34 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id af79cd13be357-85c337a1e1csm873240285a.62.2025.09.29.11.59.33 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 29 Sep 2025 11:59:34 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 3/4] linux-yocto/6.12: update to v6.12.49 Date: Mon, 29 Sep 2025 14:59:29 -0400 Message-Id: <20250929185930.1689034-3-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20250929185930.1689034-1-bruce.ashfield@gmail.com> References: <20250929185930.1689034-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 29 Sep 2025 18:59:44 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/224168 From: Bruce Ashfield Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: da274362a7bd Linux 6.12.49 6553fdf0f7d4 minmax.h: remove some #defines that are only expanded once cf5fe0b36f10 minmax.h: simplify the variants of clamp() 5c2b06b31da6 minmax.h: move all the clamp() definitions after the min/max() ones 5f6818002047 minmax.h: use BUILD_BUG_ON_MSG() for the lo < hi test in clamp() e94ce277b568 minmax.h: reduce the #define expansion of min(), max() and clamp() ab58f71b8fdf minmax.h: update some comments d9c5ccf6b69b minmax.h: add whitespace around operators and after commas 63fd831aa5dc rtc: pcf2127: fix SPI command byte for PCF2131 backport 207fa0d49522 xhci: dbc: Fix full DbC transfer ring after several reconnects 490f1ca013b5 xhci: dbc: decouple endpoint allocation from initialization 9b28ef1e4cc0 usb: xhci: remove option to change a default ring's TRB cycle bit e5051c055926 usb: xhci: introduce macro for ring segment list iteration c839be6df4da mptcp: pm: nl: announce deny-join-id0 flag 34f351c0fa95 mm/gup: check ref_count instead of lru before migration 096c5b1fde51 mm: add folio_expected_ref_count() for reference count calculation 23da4e0bb2a3 vmxnet3: unregister xdp rxq info in the reset path ca8938704142 KVM: SVM: Set/clear SRSO's BP_SPEC_REDUCE on 0 <=> 1 VM count transitions e5a3331a2e98 x86/bugs: KVM: Add support for SRSO_MSR_FIX f9c6aec2a6dd x86/bugs: Add SRSO_USER_KERNEL_NO support 0a3ac13d8686 platform/x86: asus-wmi: Re-add extra keys to ignore_key_wlan quirk 7228ed156377 platform/x86: asus-wmi: Fix ROG button mapping, tablet mode on ASUS ROG Z13 a89c34babc2e io_uring: fix incorrect io_kiocb reference in io_link_skb 922338efaad6 smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path 24c1106504c6 crypto: af_alg - Set merge to zero early in af_alg_sendmsg 6ae90a2baf92 smb: client: let smbd_destroy() call disable_work_sync(&info->post_send_credits_work) b814660334bb smb: client: fix filename matching of deferred files ea5cbcecd54d drm/xe: Fix a NULL vs IS_ERR() in xe_vm_add_compute_exec_queue() f108c98c7005 drm: bridge: cdns-mhdp8546: Fix missing mutex unlock on error path 0da73f782769 drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ 503de75db426 drm/xe/tile: Release kobject for the failure path 22814abfd961 ASoC: Intel: catpt: Expose correct bit depth to userspace b51ded0f604e ASoC: SOF: Intel: hda-stream: Fix incorrect variable used in error message e5c10cec7a1b ASoC: wm8974: Correct PLL rate rounding 987b1d5e39b9 ASoC: wm8940: Correct typo in control name ccba708502b6 ASoC: wm8940: Correct PLL rate rounding 695673eb5711 io_uring/kbuf: drop WARN_ON_ONCE() from incremental length check 93e9d0293d3b io_uring/msg_ring: kill alloc_cache for io_kiocb allocations e6b2b4a0ffd8 io_uring: include dying ring in task_work "should cancel" state d7a38ee4f0be io_uring: backport io_should_terminate_tw() 9b71bfefc405 io_uring/cmd: let cmds to know about dying task 9ffc5f132a35 ALSA: hda/realtek: Fix mute led for HP Laptop 15-dw4xx acab5c56a6fa selftests: mptcp: avoid spurious errors on TCP disconnect 2b5b0674686f selftests: mptcp: connect: catch IO errors on listen side ca261278c6b7 mptcp: propagate shutdown to subflows when possible 60b07b9f6093 rds: ib: Increment i_fastreg_wrs before bailing out 21ba85d9d508 net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer 232e74984061 drm/amd/display: Allow RX6xxx & RX7700 to invoke amdgpu_irq_get/put 2ae6d79a769b KVM: SVM: Sync TPR from LAPIC into VMCB::V_TPR even if AVIC is active bd5524ec7155 mmc: mvsdio: Fix dma_unmap_sg() nents value 6dbac7d814a7 ASoC: qcom: q6apm-lpass-dais: Fix missing set_fmt DAI op for I2S 9c534dbfd172 ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed d1c96316e4c1 ASoC: qcom: audioreach: Fix lpaif_type configuration for the I2S interface bf46ed89bf24 btrfs: tree-checker: fix the incorrect inode ref size check cd92c8ab336c iommu/amd/pgtbl: Fix possible race while increase page table level c023b4f4444f iommu/vt-d: Fix __domain_mapping()'s usage of switch_to_super_page() 1e68a5f046e9 LoongArch: Check the return value when creating kobj 05a76baf2700 LoongArch: Align ACPI structures if ARCH_STRICT_ALIGN enabled 382f5ff57010 LoongArch: vDSO: Check kcalloc() result in init_vdso() 040f278cc1a5 LoongArch: Fix unreliable stack for live patching b6f29fa5f603 objtool/LoongArch: Mark special atomic instruction as INSN_BUG type 89d40cc647da objtool/LoongArch: Mark types based on break immediate code 1766f14c8f97 LoongArch: Update help info of ARCH_STRICT_ALIGN cbb8cd66d0bc mm: revert "mm: vmscan.c: fix OOM on swap stress test" f6e161f3fa99 gup: optimize longterm pin_user_pages() for large folio f8f64254bca5 dm-stripe: fix a possible integer overflow cb58eaad2235 dm-raid: don't set io_min and io_opt for raid1 7061e566ce5d power: supply: bq27xxx: restrict no-battery detection to bq27000 f91359651678 power: supply: bq27xxx: fix error return in case of no bq27000 hdq battery 9aee87da5572 crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg 1adc72411f3d nilfs2: fix CFI failure when accessing /sys/fs/nilfs2/features/* 9644798294c7 ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size 8be498fcbd5b ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer e97c45c770f5 perf/x86/intel: Fix crash in icl_update_topdown_event() ff27e23b311f octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() 6e33a7eed587 cnic: Fix use-after-free bugs in cnic_delete_task acf8d06b8b97 net: liquidio: fix overflow in octeon_init_instr_queue() f07c925bb70e Revert "net/mlx5e: Update and set Xon/Xoff upon port speed set" 208640e6225c tls: make sure to abort the stream if headers are bogus fa4749c06564 tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect(). 0c691ea3852c octeon_ep: fix VF MAC address lifecycle handling 4c0bfb2dc6ab bonding: don't set oif to bond dev when getting NS target destination d1f3db4e7a3b net/mlx5e: Harden uplink netdev access against device unbind bec504867acc igc: don't fail igc_probe() on LED setup error 610332f7ac20 i40e: remove redundant memory barrier when cleaning Tx descs 80555adb5c89 ice: fix Rx page leak on multi-buffer frames 1644ee7696f3 ice: store max_frame and rx_buf_len only in ice_rx_ring 3e3be7bbe4a5 net: natsemi: fix `rx_dropped` double accounting on `netif_rx()` failure 13e7a6e96076 selftests: mptcp: sockopt: fix error messages 10e54bf7cb6e mptcp: tfo: record 'deny join id0' info bb7a3f09e9d4 selftests: mptcp: userspace pm: validate deny-join-id0 flag 7f5b09cc84e0 mptcp: set remote_deny_join_id0 on SYN recv 9a958802080c bonding: set random address only when slaves already exist 660b2a8f5a30 qed: Don't collect too many protection override GRC elements 5f445eb25990 net/tcp: Fix a NULL pointer dereference when using TCP-AO with TCP_REPAIR 79320035973f dpaa2-switch: fix buffer pool seeding for control traffic 3112c70b2e01 um: Fix FD copy size in os_rcv_fd_msg() 00e98b5a6903 um: virtio_uml: Fix use-after-free after put_device in probe 9c416e76a57f btrfs: fix invalid extref key setup when replaying dentry ded4d207a320 cgroup: split cgroup_destroy_wq into 3 workqueues eed66faed623 pcmcia: omap_cf: Mark driver struct with __refdata to prevent section mismatch 8df33f4d4a0b wifi: mac80211: fix incorrect type for ret 32adb020b0c3 wifi: mac80211: increase scan_ies_len for S1G 814952c1b1ff ALSA: firewire-motu: drop EPOLLOUT from poll return values as write is not supported b146e0434feb nvme: fix PI insert on write 2203ef417044 wifi: wilc1000: avoid buffer overflow in WID string configuration Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.12.bb | 6 ++--- .../linux/linux-yocto-tiny_6.12.bb | 6 ++--- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 26 +++++++++---------- 3 files changed, 19 insertions(+), 19 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 8ef8085adb..37233199f0 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "ea24c2991c68b041981a182bd57d818f0dc683f8" -SRCREV_meta ?= "b26293f57cc7090add0aead45f294e256287641b" +SRCREV_machine ?= "b82952f1b1b128089e27cadf3b16c11a7be2644d" +SRCREV_meta ?= "8eec73988615290c4a3370553c44d2d3bdbf4034" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.48" +LINUX_VERSION ?= "6.12.49" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index fe6f9595fe..b934b925b4 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.48" +LINUX_VERSION ?= "6.12.49" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "17a823196be18a8b859307b2fd53de3895893ebd" -SRCREV_meta ?= "b26293f57cc7090add0aead45f294e256287641b" +SRCREV_machine ?= "6c5bd29f94e71fb7269a41f7402e1902867fac14" +SRCREV_meta ?= "8eec73988615290c4a3370553c44d2d3bdbf4034" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index a2c80b9402..b1b7f95bb5 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,18 +18,18 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "febf5dbebc3c6d987c7e6529c9cc6175c04f6610" -SRCREV_machine:qemuarm64 ?= "17a823196be18a8b859307b2fd53de3895893ebd" -SRCREV_machine:qemuloongarch64 ?= "17a823196be18a8b859307b2fd53de3895893ebd" -SRCREV_machine:qemumips ?= "95bd1155f0d490344743ddfffb7a8b9522ce481c" -SRCREV_machine:qemuppc ?= "17a823196be18a8b859307b2fd53de3895893ebd" -SRCREV_machine:qemuriscv64 ?= "17a823196be18a8b859307b2fd53de3895893ebd" -SRCREV_machine:qemuriscv32 ?= "17a823196be18a8b859307b2fd53de3895893ebd" -SRCREV_machine:qemux86 ?= "17a823196be18a8b859307b2fd53de3895893ebd" -SRCREV_machine:qemux86-64 ?= "17a823196be18a8b859307b2fd53de3895893ebd" -SRCREV_machine:qemumips64 ?= "3cdb66bba9057d03c019086417843daee40ef906" -SRCREV_machine ?= "17a823196be18a8b859307b2fd53de3895893ebd" -SRCREV_meta ?= "b26293f57cc7090add0aead45f294e256287641b" +SRCREV_machine:qemuarm ?= "b522400a3cd8c649a7a040398eecd4adc5cbecd2" +SRCREV_machine:qemuarm64 ?= "6c5bd29f94e71fb7269a41f7402e1902867fac14" +SRCREV_machine:qemuloongarch64 ?= "6c5bd29f94e71fb7269a41f7402e1902867fac14" +SRCREV_machine:qemumips ?= "e3476588db698ac8f2f47cc6b7594f0740b80a40" +SRCREV_machine:qemuppc ?= "6c5bd29f94e71fb7269a41f7402e1902867fac14" +SRCREV_machine:qemuriscv64 ?= "6c5bd29f94e71fb7269a41f7402e1902867fac14" +SRCREV_machine:qemuriscv32 ?= "6c5bd29f94e71fb7269a41f7402e1902867fac14" +SRCREV_machine:qemux86 ?= "6c5bd29f94e71fb7269a41f7402e1902867fac14" +SRCREV_machine:qemux86-64 ?= "6c5bd29f94e71fb7269a41f7402e1902867fac14" +SRCREV_machine:qemumips64 ?= "fd00218b9063fff14c5815dfff6be2e0e5bb5861" +SRCREV_machine ?= "6c5bd29f94e71fb7269a41f7402e1902867fac14" +SRCREV_meta ?= "8eec73988615290c4a3370553c44d2d3bdbf4034" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.48" +LINUX_VERSION ?= "6.12.49" PV = "${LINUX_VERSION}+git" From patchwork Mon Sep 29 18:59:30 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 71262 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 23BBDCAC5B9 for ; Mon, 29 Sep 2025 18:59:44 +0000 (UTC) Received: from mail-qk1-f172.google.com (mail-qk1-f172.google.com [209.85.222.172]) by mx.groups.io with SMTP id smtpd.web11.6457.1759172376714327436 for ; Mon, 29 Sep 2025 11:59:36 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=EFrsY9qX; spf=pass (domain: gmail.com, ip: 209.85.222.172, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f172.google.com with SMTP id af79cd13be357-85b94fe19e2so493900885a.3 for ; Mon, 29 Sep 2025 11:59:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1759172376; x=1759777176; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=HqooK4VdquudD0yVtR0g/2Om3WYE6PrsZwP+SIFXUcg=; b=EFrsY9qXNMOWxfdZ5fJTft/2Z4TQPOGsJBPrb0XEIfolkxSLsz+nLVFkRWM79ZpPio Z5A6lWCpEm5iUY8J4I3UJY7r8/5Ul94KyXBw4iquRYcPpHBZVYEiQo+PAehi7zFHH5AM nTwTu2kvscrpD1rPCRJp7k4305CJGs2MgX1KYfcXp4fr39DZ5v5GL4CtrI5XrgBWgMOX /tb2EqlogEWP/QKBp7NFrkehr08qYdYsEJL8IUDVOKezHLQie/kqJjic627OKU5uQe/6 pyMWNgTtsQE64U4WeAd4/bORZ2y8+8xXi5eIT/6v0rrN4pUmqvzjIGfWNMC4m13Wlz0s 67dA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1759172376; x=1759777176; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=HqooK4VdquudD0yVtR0g/2Om3WYE6PrsZwP+SIFXUcg=; b=tRzWawd4fdvYA6J3e1Kba022OqtetfLAlTTLBgPWUnzc9jH+My5XaMY9yOq/MhC0Dw OrdpSVya1LELvGHhz1Ww2VsKxqcK4xiKVYrlUS+iKtGPW1B1PWEYW5/00LgwryhzH0+r U1XTwTJuvFfthv0Q4uFyZorPFsiFZdS1jFtdj1uIwGpOjC+VyIvUlrArhe2qHufrvQgF Zyl/pLyJ+6gAAPv9tAtsCel6p2GDmRCKQ/oBt1pHdsDoUEl3DzqNjYyeEJZ8JZKqzWSs jbE5pisjlHCVH36aYd42WfNSqVpjmvpOmYCzYTVgYRjISPvZMW73NurB/wKAAiCaBcgH yWNQ== X-Gm-Message-State: AOJu0YzKkjHLZfXiP9EcoWyEhCyOl09YIbZlvkukBgyrmIx7VmSwfwQl 585oOrERakuNY4NKElH2ksmFHk5K4Ach74qpUKRhYuSdbLljmXjTzcPRVC04W5aWWaU= X-Gm-Gg: ASbGncv4aZPka6MgFcXESMpsjr0hLGb0ttAtSJK+Sh0waRfslEsu0sknr4Y4U64/78+ ROamnCW7FxpntQc7kYmC5LXkj13gdAMRxAiLB7rqMPruJW8kjlFIqXD2oWeHYuxBeR6sgDTB9+1 IedCkHNHeJBJjwXSn2ev2bGGStixczIXygWxLZWb22KSh9mF65ulblTn+98sBCKHDaEj942nYnw KGJxshetreuMCWCc2IAzRWplO+N18XQCpcJO1AjmywgU+Qz022fLa43pire3BdZUrfsZq0rHUHD wWwJskWBLmOEdW4+2tUW6Ice+SeGhjGvbwyhh8qC9MTTazgziLuuQ1nTB4MwtQcxFJwU39DY+ao FfSoClmS5qJFfqYQ/cQ1tXN6kA9BDpycK3Kmyw+ek54rl/VBe/BA1d7sTmufQd9FDpFWtmWt9FJ L+Lbgm4n89cDTCxSmsn5p/OqQ9x0ynRmYOJ2z9HRW4Y+H+K5F6giQQ5CFsEx4iI1De+A== X-Google-Smtp-Source: AGHT+IFXR9T+jpQe8OmQV40POm89SV8HqJxLztvPCHrrlx1i2Byk/XVsuhM2U3BrhKjq8m8q9ccucw== X-Received: by 2002:a05:620a:4081:b0:85f:89:e109 with SMTP id af79cd13be357-85f0089e549mr1970062585a.38.1759172375530; Mon, 29 Sep 2025 11:59:35 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id af79cd13be357-85c337a1e1csm873240285a.62.2025.09.29.11.59.34 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 29 Sep 2025 11:59:35 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 4/4] linux-yocto/6.12: update CVE exclusions (6.12.49) Date: Mon, 29 Sep 2025 14:59:30 -0400 Message-Id: <20250929185930.1689034-4-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20250929185930.1689034-1-bruce.ashfield@gmail.com> References: <20250929185930.1689034-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 29 Sep 2025 18:59:44 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/224169 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 1 changes (1 new | 0 updated): - 1 new CVEs: CVE-2025-11135 - 0 updated CVEs: Date: Mon, 29 Sep 2025 01:40:51 +0000 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.12.inc | 64 ++++++++++++++++--- 1 file changed, 56 insertions(+), 8 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 74d9e2867d..6c327e489a 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2025-09-22 03:24:27.411969+00:00 for kernel version 6.12.48 -# From linux_kernel_cves cve_2025-09-22_0200Z-2-gd662e5ed470 +# Generated at 2025-09-29 01:53:40.204255+00:00 for kernel version 6.12.49 +# From linux_kernel_cves cve_2025-09-29_0100Z python check_kernel_cve_status_version() { - this_version = "6.12.48" + this_version = "6.12.49" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -4984,8 +4984,6 @@ CVE_STATUS[CVE-2022-50401] = "fixed-version: Fixed from version 6.2" CVE_STATUS[CVE-2022-50402] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-50403] = "fixed-version: Fixed from version 6.2" - CVE_STATUS[CVE-2022-50404] = "fixed-version: Fixed from version 6.2" CVE_STATUS[CVE-2022-50405] = "fixed-version: Fixed from version 6.2" @@ -12944,6 +12942,8 @@ CVE_STATUS[CVE-2024-58239] = "fixed-version: Fixed from version 6.8" CVE_STATUS[CVE-2024-58240] = "fixed-version: Fixed from version 6.8" +CVE_STATUS[CVE-2024-58241] = "fixed-version: Fixed from version 6.12" + CVE_STATUS[CVE-2025-21629] = "cpe-stable-backport: Backported in 6.12.9" CVE_STATUS[CVE-2025-21631] = "cpe-stable-backport: Backported in 6.12.10" @@ -13878,7 +13878,7 @@ CVE_STATUS[CVE-2025-22103] = "cpe-stable-backport: Backported in 6.12.46" # CVE-2025-22105 needs backporting (fixed from 6.15) -# CVE-2025-22106 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-22106] = "cpe-stable-backport: Backported in 6.12.49" # CVE-2025-22107 needs backporting (fixed from 6.15) @@ -15134,7 +15134,7 @@ CVE_STATUS[CVE-2025-38320] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38321] = "cpe-stable-backport: Backported in 6.12.35" -# CVE-2025-38322 needs backporting (fixed from 6.16) +CVE_STATUS[CVE-2025-38322] = "cpe-stable-backport: Backported in 6.12.49" CVE_STATUS[CVE-2025-38323] = "cpe-stable-backport: Backported in 6.12.35" @@ -16246,7 +16246,7 @@ CVE_STATUS[CVE-2025-39814] = "fixed-version: only affects 6.16 onwards" CVE_STATUS[CVE-2025-39815] = "cpe-stable-backport: Backported in 6.12.45" -# CVE-2025-39816 needs backporting (fixed from 6.17rc4) +CVE_STATUS[CVE-2025-39816] = "cpe-stable-backport: Backported in 6.12.49" CVE_STATUS[CVE-2025-39817] = "cpe-stable-backport: Backported in 6.12.45" @@ -16348,6 +16348,54 @@ CVE_STATUS[CVE-2025-39865] = "cpe-stable-backport: Backported in 6.12.46" CVE_STATUS[CVE-2025-39866] = "cpe-stable-backport: Backported in 6.12.46" +CVE_STATUS[CVE-2025-39867] = "fixed-version: only affects 6.17rc1 onwards" + +CVE_STATUS[CVE-2025-39868] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39869] = "cpe-stable-backport: Backported in 6.12.48" + +CVE_STATUS[CVE-2025-39870] = "cpe-stable-backport: Backported in 6.12.48" + +CVE_STATUS[CVE-2025-39871] = "cpe-stable-backport: Backported in 6.12.48" + +CVE_STATUS[CVE-2025-39872] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-39873] = "cpe-stable-backport: Backported in 6.12.48" + +CVE_STATUS[CVE-2025-39874] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39875] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-39876] = "cpe-stable-backport: Backported in 6.12.48" + +CVE_STATUS[CVE-2025-39877] = "cpe-stable-backport: Backported in 6.12.48" + +CVE_STATUS[CVE-2025-39878] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39879] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39880] = "cpe-stable-backport: Backported in 6.12.48" + +CVE_STATUS[CVE-2025-39881] = "cpe-stable-backport: Backported in 6.12.48" + +CVE_STATUS[CVE-2025-39882] = "cpe-stable-backport: Backported in 6.12.48" + +CVE_STATUS[CVE-2025-39883] = "cpe-stable-backport: Backported in 6.12.48" + +CVE_STATUS[CVE-2025-39884] = "cpe-stable-backport: Backported in 6.12.48" + +CVE_STATUS[CVE-2025-39885] = "cpe-stable-backport: Backported in 6.12.48" + +CVE_STATUS[CVE-2025-39886] = "cpe-stable-backport: Backported in 6.12.48" + +CVE_STATUS[CVE-2025-39887] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39888] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39889] = "cpe-stable-backport: Backported in 6.12.25" + +CVE_STATUS[CVE-2025-39890] = "cpe-stable-backport: Backported in 6.12.34" + CVE_STATUS[CVE-2025-39930] = "fixed-version: only affects 6.14 onwards" CVE_STATUS[CVE-2025-39989] = "cpe-stable-backport: Backported in 6.12.23"