From patchwork Mon Jan 26 15:23:47 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 79697 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E2F10D13C34 for ; Mon, 26 Jan 2026 15:24:07 +0000 (UTC) Received: from mail-qk1-f169.google.com (mail-qk1-f169.google.com [209.85.222.169]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.22084.1769441038023897743 for ; Mon, 26 Jan 2026 07:23:58 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=PZfNn/du; spf=pass (domain: gmail.com, ip: 209.85.222.169, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f169.google.com with SMTP id af79cd13be357-8c6b16bd040so525040485a.1 for ; Mon, 26 Jan 2026 07:23:57 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1769441037; x=1770045837; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=ZpQ4yxNnGFISj2ddzHjxlie5zuRqjO+Vy2T/8ybuFcg=; b=PZfNn/duRXNJnfFZtK+T9Amzi3EvgcguAoUltiI+HugRXhLXVxXSB+bG35Zcp7OySO 3xQSaBmYhpcRXdeQdT5RRsLOkopOSPF/Ih8WtT9ESggR5le7trYQ2+3godiVztL/zUVM 7mRlYJOQLCA1zKEM3M5VLojDz+radP8Qe4pfioaixS6xppaucnknxzCpRjPJIDjPJ03M R5DYagFS8+ydGrSirk2RUbE+4OOWQA33xD96Eu/HN/kWAlJk6Bv0Uvs1lc3txYngVEB+ wLZXshEr9JOWQsTGkdx11PL5J9Ug0SBcqArGeVpdTBMnnRyAq+OKDCsAcyAvoutCroON OaMw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769441037; x=1770045837; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=ZpQ4yxNnGFISj2ddzHjxlie5zuRqjO+Vy2T/8ybuFcg=; b=nPZYDDXbXNZgeEqc2L85zefmD7ovZremnCvCQApewyDv9Ehg7ROsRt8NWDmvFcj/Ev XhljpQiHz/GT29AlNR3m7/34qH3vhJqJOvOgwNkFVag5ol4U+2A9eyQHcqas2a3BxrDu OdjHXU9YBvGQ0MgrfvzMM3bBoDekqO1awUubyi3uExvuVwkkJOy+B0aXto+Wj4a4DX3F GArfFo31ZelQsAIkTmwh2A5FmCDYvLsfaLmA/rPcmaNGnp1NahnoEayWhVc6amSteDX7 MpLFfaVJhx4if7szXdIaIemdMbUggW6jh+Uqh2/6fhjSRdE3WA6pl+Zb7LWdKvN5xq8Z nKXg== X-Gm-Message-State: AOJu0YyIfeqVkcj65wFjGBF3ux2jKBnDHmSXswWZFB8wMf7FlFOj74qA vGuDXPqB4yd2Fn8JmK1KGk4SQTeKgGmo9UYMSKrsO2gDrGWRUPa0HOZX X-Gm-Gg: AZuq6aKB00VVmwFH0Dbepuz1un2S3l/RQWBeQuTvlHPgWdSCLK1AXQw/tOukQZWT/cR Ykx7CreMldd8PxSiSM8g1mF2bI8QOWGY3Ljxvhk9uGnD77DKb89XnxRXp7EKuZAm+zA/wFlKAGG OApVEVbw0Hp0xgaN0dImB4CXD883ZEfYCYDklkiZeykN4BdS2x52gBdTohjU/mtVC+eEW3XmgkE G5eP54XspwFkEOP4bTtAmGDGgP/7+kh328vY4rFhD8xIr2sV9P/CjHUhdZ9mJoRzckeJtHT/SLg N9qbQ66+en522vvF2TF4g1YlDgxsOvU8it1NziEcY6yaghxvv2Q84RsSjjJpUdOBWDRqlXKLSau pCqZun7Xx1eOc+CSjnO97wVZj9UeRys2IIFpvyDvQLtzkxG7Fh2zWYfs4wNWNKNoO24HQG8d5// 9Oq6GDB2PsrglpVsV4vNDboJyTcVOlNm4RZZBJu/Lh25P8XfRrAfn6drKcVipO7MNeZZQVRPAeF rq9qGS6BhEMR9k= X-Received: by 2002:a05:620a:269b:b0:8b2:e666:70d with SMTP id af79cd13be357-8c6f964323amr522936685a.43.1769441036762; Mon, 26 Jan 2026 07:23:56 -0800 (PST) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id af79cd13be357-8c6e3870c48sm1044157185a.51.2026.01.26.07.23.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 26 Jan 2026 07:23:55 -0800 (PST) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [meta][PATCH 01/07] linux-yocto/6.12: update to v6.12.65 Date: Mon, 26 Jan 2026 10:23:47 -0500 Message-ID: <20260126152353.2328046-2-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126152353.2328046-1-bruce.ashfield@gmail.com> References: <20260126152353.2328046-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 26 Jan 2026 15:24:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230012 From: Bruce Ashfield Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: 39cb076c7dc7 Linux 6.12.65 b00d41629d81 Revert "iommu/amd: Skip enabling command/event buffers for kdump" 69f542a54578 pwm: stm32: Always program polarity 828b59fdf8ef virtio_console: fix order of fields cols and rows 1b9c118fe318 sched/fair: Proportional newidle balance c6ae271bc5fd sched/fair: Small cleanup to update_newidle_cost() 52aa889c6f57 sched/fair: Small cleanup to sched_balance_newidle() 4888e1dcc341 net: Remove RTNL dance for SIOCBRADDIF and SIOCBRDELIF. b03136582acb cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes c4d18e9540bf drm/amdgpu: Forward VMID reservation errors 585dbb5cdbb8 net: phy: mediatek: fix nvmem cell reference leak in mt798x_phy_calibration 7b240a8935d5 wifi: mac80211: Discard Beacon frames to non-broadcast address 1c7c3a9314d8 mptcp: ensure context reset on disconnect() 58a32633d124 mm: consider non-anon swap cache folios in folio_expected_ref_count() 11f66b84fa7e mm: simplify folio_expected_ref_count() 914769048818 mm/page_alloc: change all pageblocks migrate type on coalescing 79f80a7a4784 mptcp: fallback earlier on simult connection Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 4113aaa21e..254a4b9c9f 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "07aa4b788a9075e4aaf221026df896d245d40a3a" -SRCREV_meta ?= "cc667785e15dd19fa8c38117d76ac1c7d60b5ec7" +SRCREV_machine ?= "9f8581c660c7b402312572cbf9cbe03833ed20aa" +SRCREV_meta ?= "12efb3470e9a439d7806984d360a3712350076d0" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.64" +LINUX_VERSION ?= "6.12.65" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 5a536f0d5a..6aa9dd7d56 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.64" +LINUX_VERSION ?= "6.12.65" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "9bd003fd4f7eb668ec3c1d7c5eae095d4b3764bd" -SRCREV_meta ?= "cc667785e15dd19fa8c38117d76ac1c7d60b5ec7" +SRCREV_machine ?= "5b6cf700d8a16b91937d61bd3bf0248bb1771644" +SRCREV_meta ?= "12efb3470e9a439d7806984d360a3712350076d0" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index a5184e5812..62f7e8a9bd 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "e7f4f79edddeab38061c2f88220becde45e3500c" -SRCREV_machine:qemuarm64 ?= "9bd003fd4f7eb668ec3c1d7c5eae095d4b3764bd" -SRCREV_machine:qemuloongarch64 ?= "9bd003fd4f7eb668ec3c1d7c5eae095d4b3764bd" -SRCREV_machine:qemumips ?= "a6540c970a91fa542babab0633acbd69818686a3" -SRCREV_machine:qemuppc ?= "9bd003fd4f7eb668ec3c1d7c5eae095d4b3764bd" -SRCREV_machine:qemuriscv64 ?= "9bd003fd4f7eb668ec3c1d7c5eae095d4b3764bd" -SRCREV_machine:qemuriscv32 ?= "9bd003fd4f7eb668ec3c1d7c5eae095d4b3764bd" -SRCREV_machine:qemux86 ?= "9bd003fd4f7eb668ec3c1d7c5eae095d4b3764bd" -SRCREV_machine:qemux86-64 ?= "9bd003fd4f7eb668ec3c1d7c5eae095d4b3764bd" -SRCREV_machine:qemumips64 ?= "4b238545c28a667ddd67ff02cb8efb018a5df96c" -SRCREV_machine ?= "9bd003fd4f7eb668ec3c1d7c5eae095d4b3764bd" -SRCREV_meta ?= "cc667785e15dd19fa8c38117d76ac1c7d60b5ec7" +SRCREV_machine:qemuarm ?= "b9671eac4ed537384b52ae04e7e1c728b631fb13" +SRCREV_machine:qemuarm64 ?= "5b6cf700d8a16b91937d61bd3bf0248bb1771644" +SRCREV_machine:qemuloongarch64 ?= "5b6cf700d8a16b91937d61bd3bf0248bb1771644" +SRCREV_machine:qemumips ?= "bb006b07c2a942338e7f52070f8026791f30c5f0" +SRCREV_machine:qemuppc ?= "5b6cf700d8a16b91937d61bd3bf0248bb1771644" +SRCREV_machine:qemuriscv64 ?= "5b6cf700d8a16b91937d61bd3bf0248bb1771644" +SRCREV_machine:qemuriscv32 ?= "5b6cf700d8a16b91937d61bd3bf0248bb1771644" +SRCREV_machine:qemux86 ?= "5b6cf700d8a16b91937d61bd3bf0248bb1771644" +SRCREV_machine:qemux86-64 ?= "5b6cf700d8a16b91937d61bd3bf0248bb1771644" +SRCREV_machine:qemumips64 ?= "d9af48f273a9d87a61a46c93d7642d9e72947514" +SRCREV_machine ?= "5b6cf700d8a16b91937d61bd3bf0248bb1771644" +SRCREV_meta ?= "12efb3470e9a439d7806984d360a3712350076d0" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "1a4a7249e794de9e022baabe6387d9c0f831b0be" +SRCREV_machine:class-devupstream ?= "39cb076c7dc7e44e3cab5c82ffda16a550ed8436" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.64" +LINUX_VERSION ?= "6.12.65" PV = "${LINUX_VERSION}+git" From patchwork Mon Jan 26 15:23:48 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 79699 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0803CD13C39 for ; Mon, 26 Jan 2026 15:24:08 +0000 (UTC) Received: from mail-qt1-f176.google.com (mail-qt1-f176.google.com [209.85.160.176]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.22594.1769441042498523310 for ; Mon, 26 Jan 2026 07:24:02 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=g2VlowHi; spf=pass (domain: gmail.com, ip: 209.85.160.176, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f176.google.com with SMTP id d75a77b69052e-5014e8b1615so50759631cf.3 for ; Mon, 26 Jan 2026 07:24:02 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1769441041; x=1770045841; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=HVH9oGSpX5jUdwWU33mBT6LQXhPx1sCFss1jpjrYy1U=; b=g2VlowHi6sM9YxjCyNkdqCSq4SkU/++E+Mha7usMcUuYF4bvB7bmJTcecJKxTy18gj eDwqsIcvvkoNY6PLq+wkVlLFxmCrgaZ/S9W8hjbjFYkon/Qks0VfeiYnOt3o5eF/CIYA hV6Vwr43jccgdUWFvfaJ0yb93nXH54io/4bshg0Gvi+sRlgRh95Ihyibq85tG57BG2VO sQkaq1OvRkz4bnDf2j91yeWYvdSaf9qbi5VAqPLOyTX3FyoOzPrOeqOdPRkVFpM0HSe3 Y2wlZUOfvjqISQ7F4Au4BXcQqdtMGXFWdmyz2NuMw4xOm+W+gmBn4f1oxjFpN8FWDhXS f/Gw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769441041; x=1770045841; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=HVH9oGSpX5jUdwWU33mBT6LQXhPx1sCFss1jpjrYy1U=; b=dmgIokxd4goTzE6qlL36ZfmV29do3fZtEFYkfXDfOLZeOo3nVWcMi05nFObbuwDCmB M3zcc86o+PnOG8jyK+HfommLUNuwnLcI2C+YlR3m1mXiPWZs0PIrCTbVoUa0C1/gD5J4 VkO9x/viHXaRJj9z4cTmYPDRchCDKQWT9IoKeb2uRNHQIXs+YQeVRUVkoWu33SdHdf6G 7XVN7IDrH3tKf6nqG0NYSs/9LaJ9w6U1dePqwkWrnMD4eKVRon/VTBxgIIomPO0fcRF7 g4C72aH/Nhg8ijGfGiR2e6Uz307rJ0tjXEzgpAi5yKBtK6nwIPr+QKQx6LhSNxQqPTi3 WchQ== X-Gm-Message-State: AOJu0YwMNM21dk6oHlQdnola8pV7PWltmCe/LQV46WYhqlBRj4XO8Hop F/l/tQo36lKzWF/XDlZWmoWbe3b2MdTEf85sZmUy3cteqBhCrSCAfCUR2/CpjhnwwIw= X-Gm-Gg: AZuq6aJ6utyxLbVYka7R25Qf0Rf6c3d2GdzCsYSX7OLyl9Z4t8k0NCTcR1+jyIDKTze WKlcytvbKKHtNBTJExxoIPq7frTxP2AUFW9XMRB2aGRHasFabUTPgnOr4tWQBntu7M68495i5Ps Pr+FdhofNwYLJ4LPaV1ylx+EqN6FV8efTaLNZmsNfDvDdKMVRwr+Nu2kKkBovAVi2mzAzmGlm6+ U4GJm/mSyeZibVbwwIGfcJP02XYTBYKeg+/ozBdfKQH7t3JD0pQh4BHO/YIif9qseotE5hKLoys ccYyzzxIDgizVeh3+IsrI7dI0N5xi8kzAeYk7Iu6ECrogSZ+IUdR3EpQH+edrJ4NbLBIMEoi6tB GdjV/7tSZBDvAh1cvnzTt7SUZymQZ4mEZkuahB4iQhL2nHHt/lcQQJFTUNfwNRJu5oZfOGp676s RbRildnM5XD3wciduNApc5pYCGTwmhgDoRZM93zCS0UGcHSgZ5Ip0FuuUP4QQR7OMfM2Pb+Qbxt 2zqzr7siIa2D7U= X-Received: by 2002:ac8:5981:0:b0:501:4e06:695c with SMTP id d75a77b69052e-50314c68d29mr63219561cf.59.1769441038497; Mon, 26 Jan 2026 07:23:58 -0800 (PST) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id af79cd13be357-8c6e3870c48sm1044157185a.51.2026.01.26.07.23.56 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 26 Jan 2026 07:23:57 -0800 (PST) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [meta][PATCH 02/07] linux-yocto/6.12: update CVE exclusions (6.12.65) Date: Mon, 26 Jan 2026 10:23:48 -0500 Message-ID: <20260126152353.2328046-3-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126152353.2328046-1-bruce.ashfield@gmail.com> References: <20260126152353.2328046-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 26 Jan 2026 15:24:08 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230015 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 10 changes (7 new | 3 updated): - 7 new CVEs: CVE-2025-61937, CVE-2025-61943, CVE-2025-64691, CVE-2025-64729, CVE-2025-64769, CVE-2025-65117, CVE-2025-65118 - 3 updated CVEs: CVE-2025-7195, CVE-2025-9903, CVE-2025-9904 Date: Fri, 16 Jan 2026 00:42:12 +0000 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.12.inc | 284 +++++++++++++++++- 1 file changed, 280 insertions(+), 4 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index c08b091825..6ab3bd2bb3 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-01-12 18:49:23.230016+00:00 for kernel version 6.12.64 -# From linux_kernel_cves cve_2026-01-12_1800Z-2-g66e4b29f774 +# Generated at 2026-01-16 00:43:33.551663+00:00 for kernel version 6.12.65 +# From linux_kernel_cves 2026-01-16_baseline-1-gc984786b0cf python check_kernel_cve_status_version() { - this_version = "6.12.64" + this_version = "6.12.65" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -16104,7 +16104,7 @@ CVE_STATUS[CVE-2025-22107] = "cpe-stable-backport: Backported in 6.12.59" CVE_STATUS[CVE-2025-22110] = "fixed-version: only affects 6.14 onwards" -# CVE-2025-22111 may need backporting (fixed from 6.12.65) +CVE_STATUS[CVE-2025-22111] = "cpe-stable-backport: Backported in 6.12.65" CVE_STATUS[CVE-2025-22112] = "cpe-stable-backport: Backported in 6.12.35" @@ -20024,3 +20024,279 @@ CVE_STATUS[CVE-2025-68765] = "cpe-stable-backport: Backported in 6.12.63" CVE_STATUS[CVE-2025-68766] = "cpe-stable-backport: Backported in 6.12.63" +CVE_STATUS[CVE-2025-68767] = "cpe-stable-backport: Backported in 6.12.64" + +# CVE-2025-68768 needs backporting (fixed from 6.19rc2) + +CVE_STATUS[CVE-2025-68769] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68770] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68771] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68772] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68773] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68774] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68775] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68776] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68777] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68778] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68779] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-68780] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68781] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68782] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68783] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68784] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68785] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68786] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68787] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68788] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68789] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68790] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-68791] = "fixed-version: only affects 6.14 onwards" + +# CVE-2025-68792 needs backporting (fixed from 6.19rc1) + +CVE_STATUS[CVE-2025-68793] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-68794] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68795] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68796] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68797] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68798] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68799] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68800] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68801] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68802] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68803] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68804] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68805] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-68806] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68807] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-68808] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68809] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68810] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68811] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68812] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-68813] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68814] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68815] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68816] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68817] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68818] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68819] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68820] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68821] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-68822] = "cpe-stable-backport: Backported in 6.12.64" + +# CVE-2025-68823 needs backporting (fixed from 6.19rc2) + +CVE_STATUS[CVE-2025-71064] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71065] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71066] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71067] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71068] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71069] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71070] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-71071] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71072] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71073] = "cpe-stable-backport: Backported in 6.12.64" + +# CVE-2025-71074 needs backporting (fixed from 6.19rc1) + +CVE_STATUS[CVE-2025-71075] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71076] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71077] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71078] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71079] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71080] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71081] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71082] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71083] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71084] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71085] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71086] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71087] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71088] = "cpe-stable-backport: Backported in 6.12.65" + +CVE_STATUS[CVE-2025-71089] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71090] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-71091] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71092] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-71093] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71094] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71095] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71096] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71097] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71098] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71099] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71100] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71101] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71102] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71103] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-71104] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71105] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71106] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-71107] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71108] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71109] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71110] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-71111] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71112] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71113] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71114] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71115] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-71116] = "cpe-stable-backport: Backported in 6.12.64" + +# CVE-2025-71117 needs backporting (fixed from 6.19rc1) + +CVE_STATUS[CVE-2025-71118] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71119] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71120] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71121] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71122] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71123] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71124] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-71125] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71126] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71127] = "cpe-stable-backport: Backported in 6.12.65" + +CVE_STATUS[CVE-2025-71128] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-71129] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71130] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71131] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71132] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71133] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71134] = "cpe-stable-backport: Backported in 6.12.65" + +CVE_STATUS[CVE-2025-71135] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71136] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71137] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71138] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71139] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-71140] = "cpe-stable-backport: Backported in 6.12.64" + +# CVE-2025-71141 needs backporting (fixed from 6.19rc1) + +CVE_STATUS[CVE-2025-71142] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-71143] = "cpe-stable-backport: Backported in 6.12.64" + +CVE_STATUS[CVE-2025-71144] = "cpe-stable-backport: Backported in 6.12.65" + From patchwork Mon Jan 26 15:23:49 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 79701 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1747AD13C3F for ; Mon, 26 Jan 2026 15:24:08 +0000 (UTC) Received: from mail-qv1-f67.google.com (mail-qv1-f67.google.com [209.85.219.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.22593.1769441040984587733 for ; Mon, 26 Jan 2026 07:24:01 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=COq/kmUe; spf=pass (domain: gmail.com, ip: 209.85.219.67, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f67.google.com with SMTP id 6a1803df08f44-89473dca8aaso61466346d6.0 for ; Mon, 26 Jan 2026 07:24:00 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1769441040; x=1770045840; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=43MOS2gyCYSH7YLMdhqR5qCJctEnOjl6y5SO1yOiZlM=; b=COq/kmUe7HtvUjAta8SJzctZAUH5wCNJIZ7HQuy7s4wNbO33AdUx10G5mlm1TsLB1J 8DA93cU8AIrOI9E+4+XB+ZyWIGPThkIHQn1RkUVJWAgW8YdIKG5LwczmBm6J0jYjSNE/ BeRVjCczdNZYQxRnocFVBw9pb+H3YCmvwl0rxgv028a1nrPrAARFUfgcTgW7XzWxIw6I UVZFahLac4h5wJndV51wjXrf1xjfTRezA6ULkjljWWeQ/9E7H4kxh1w9TeVjMkXJK1XF hSk/rwU0ul4wwtaD4RL3gUAdxWedHhVBFL12uHNdL2U9hCHFVfmjijPgOyS4oJgPVMFj kO6A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769441040; x=1770045840; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=43MOS2gyCYSH7YLMdhqR5qCJctEnOjl6y5SO1yOiZlM=; b=K2KsnMgtUkYLFS+4ychuCnZfE7zBDo/GfZeSKhOgvI5qbB6KkZgQb28Su9CpAVu0eT CHIh6y6KCAdvzGqVgrg5pjqCP+7nD66XKhwUZxmBjfmv7ENhs4fPAxA/KjWs+2EhG0FD VzB4CjdcKIfABL5YCQ1rxUYNoRO1B6nNweM62Ab77efazEQqxatLbMny69K9B2vO4bw+ r058pKsssL0e/Xa1F3vRv1TEPYjBAEQUAEaKE7AygvPj7Kpj702a1hNnJ4+YLy2P/YXd Yp/HCCkwBRjgMk11+JpzAEOJ82w2Q3LxhQRxljcla3h906VDdG5+2dSjN+pNJ0zfg2/0 XL6A== X-Gm-Message-State: AOJu0Yx/sWLrBvo51z7iBIeT4GA3bSzJO/TKah2wK5iqHon4SKxfBT4h EtJEnQteAEXuvpmVaaxaT9G2xpf4dg93lxjGW4Hcl8bA2L331eM7kN/V X-Gm-Gg: AZuq6aKcRC+fJ2ELY3QsF4tjYUBCj7Pv8cZxk/tF4K88Jbzpf6nseho8hTORnrdvRJf AdYfjAyoPALTUaZ/FL6jR2iNrapRxPLShxGkTtEueEkEyArn7NUVogczi00gwETrFcX6z3Ih2ok 7cmJPEmSI36KKkDPhVGBVU9aJGfzZ8L1nTufYxoXE7m1VEmTV1vCalqgCIBz6bPaMZcbGe3JGX8 O7RnJY6Xo6ClWB56kmF3n6+InU03FdXw2wD980gTmsy5OdFi6RuYjOVAqB70IjItk11JZYNJjey 21lLd/ODCQ2i1gMoAu/AOjALEnl/2SrPPjSRsAsRB9L6p6kz9pvVjyyfB7cCefTHL3YZA+hUSHD +qOYmrzkkeQluFUS/9xOhLqSNZ1P65LyDfFELbNf3GaVq+SYx83HA/1+yJWRfQo8WGZ87+3J5HM C+PB//npk7s/jx3I4M2VCEMI7X8zBYDDjQl/yU+z+x53F6tK++e6Z5IipSOuNX2AXWLXz+imW5v Aracc29kmuKL6k= X-Received: by 2002:ad4:5dc6:0:b0:894:6b9e:253e with SMTP id 6a1803df08f44-894b0782d3amr63036096d6.52.1769441039525; Mon, 26 Jan 2026 07:23:59 -0800 (PST) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id af79cd13be357-8c6e3870c48sm1044157185a.51.2026.01.26.07.23.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 26 Jan 2026 07:23:59 -0800 (PST) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [meta][PATCH 03/07] linux-yocto/6.12: update to v6.12.66 Date: Mon, 26 Jan 2026 10:23:49 -0500 Message-ID: <20260126152353.2328046-4-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126152353.2328046-1-bruce.ashfield@gmail.com> References: <20260126152353.2328046-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 26 Jan 2026 15:24:08 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230013 From: Bruce Ashfield Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: f6044d1fd846 Linux 6.12.66 9e3f8fa53348 bpf: test_run: Fix ctx leak in bpf_prog_test_run_xdp error path f8b406198778 ALSA: hda: intel-dsp-config: Prefer legacy driver as fallback 47e676ce4d68 tpm2-sessions: Fix out of range indexing in name_size 42440155fe27 spi: cadence-quadspi: Prevent lost complete() call during indirect read 3762535fbbc0 scsi: sg: Fix occasional bogus elapsed time that exceeds timeout 0810c8e94d6b ASoC: fsl_sai: Add missing registers to cache default 1d2a10913089 ALSA: hda/realtek: enable woofer speakers on Medion NM14LNL 8072299bf13f ASoC: amd: yc: Add quirk for Honor MagicBook X16 2025 44ed8fae346f ALSA: usb-audio: Update for native DSD support quirks ba6f0d1832ee can: j1939: make j1939_session_activate() fail if device is no longer registered 47206d70d1fb drm/amdkfd: Fix improper NULL termination of queue restore SMI event string 1c06d85c3d51 spi: mt65xx: Use IRQF_ONESHOT with threaded IRQ f609041424d5 drm/amd/display: Fix DP no audio issue 9f6cf07687be ata: libata-core: Disable LPM on ST2000DM008-2FR102 14fa3d1927f1 netfilter: nf_tables: avoid chain re-validation if possible feb28b6827ec powercap: fix sscanf() error return value handling 3835d59f6999 powercap: fix race condition in register_control_type() 7b60aed82db1 net: sfp: extend Potron XGSPON quirk to cover additional EEPROM variant fb9ef40cccdb bpf: Fix reference count leak in bpf_prog_test_run_xdp() 6447e697cfa8 bpf, test_run: Subtract size of xdp_frame from allowed metadata size 6611a73b2991 bpf: Support specifying linear xdp packet data size for BPF_PROG_TEST_RUN 0eb6e9d3b724 bpf: Make variables in bpf_prog_test_run_xdp less confusing 202c5b915e22 bpf: Fix an issue in bpf_prog_test_run_xdp when page size greater than 4K 5c647749bce3 btrfs: fix beyond-EOF write handling afbb57899612 btrfs: use variable for end offset in extent_writepage_io() a915072e5ac3 btrfs: truncate ordered extent when skipping writeback past i_size 7216d78ca34f btrfs: remove btrfs_fs_info::sectors_per_page ced5459df05a btrfs: add extra error messages for delalloc range related errors fb4fa3f9012b btrfs: subpage: dump the involved bitmap when ASSERT() failed 9ed14c3b787b btrfs: fix error handling of submit_uncompressed_range() fcc04c92cbb5 ALSA: ac97: fix a double free in snd_ac97_controller_register() 71138011dc01 ALSA: ac97bus: Use guard() for mutex locks 7388ba6e5ccd erofs: fix file-backed mounts no longer working on EROFS partitions d47b03775d55 erofs: don't bother with s_stack_depth increasing for now dd6ccec088ad arp: do not assume dev_hard_header() does not change skb->head de77d2cd178a net: enetc: fix build warning when PAGE_SIZE is greater than 128K 471dfb97599e net: usb: pegasus: fix memory leak in update_eth_regs_async() 43497313d0da net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset 3d67e8c22685 HID: quirks: work around VID/PID conflict for appledisplay 4969d6fa61af net: netdevsim: fix inconsistent carrier state after link/unlink d916df47a031 idpf: cap maximum Rx buffer size a4212d6732e3 idpf: fix memory leak in idpf_vport_rel() be3d31276199 idpf: keep the netdev when a reset fails 3264881431e3 net: fix memory leak in skb_segment_list for GRO packets 92ff65c660eb riscv: pgtable: Cleanup useless VA_USER_XXX definitions 1eeaaeceafcf btrfs: only enforce free space tree if v1 cache is required for bs < ps cases 6762937a8b45 vsock: Make accept()ed sockets use custom setsockopt() f1029391e604 bnxt_en: Fix potential data corruption with HW GRO/LRO 57f1dd8fa966 net: wwan: iosm: Fix memory leak in ipc_mux_deinit() 9e0f54294fae net/mlx5e: Don't print error message due to invalid module b71d08b96864 netdev: preserve NETIF_F_ALL_FOR_ALL across TSO updates 005671c60fcf net: sock: fix hardened usercopy panic in sock_recv_errqueue 50f65526b33d inet: ping: Fix icmp out counting 03fb1708b7d1 net: mscc: ocelot: Fix crash when adding interface under a lag 269c9283ff7f bridge: fix C-VLAN preservation in 802.1ad vlan_tunnel egress 3950054c9512 net: marvell: prestera: fix NULL dereference on devlink_alloc() failure 26a82dce2bee netfilter: nf_conncount: update last_gc only when GC has been performed e1a436981ac9 netfilter: nf_tables: fix memory leak in nf_tables_newrule() cdafa52ad39b gpio: pca953x: handle short interrupt pulses on PCAL devices d4f333a0155d gpio: pca953x: Add support for level-triggered interrupts dd42e23b6d9e netfilter: nft_synproxy: avoid possible data-race on update operation 16b4508e8717 netfilter: nft_set_pipapo: fix range overlap detection b397bb9c34ac arm64: dts: mba8mx: Fix Ethernet PHY IRQ support 97fdde3189b6 arm64: dts: imx8qm-ss-dma: correct the dma channels of lpuart 35b38dd6a792 arm64: dts: imx8mp: Fix LAN8740Ai PHY reference clock on DH electronics i.MX8M Plus DHCOM 88d60cff3000 ARM: dts: imx6q-ba16: fix RTC interrupt level 3e458210ee2c arm64: dts: add off-on-delay-us for usdhc2 regulator 06b1dfa40090 crypto: qat - fix duplicate restarting msg during AER error 8f6afb166402 arm64: dts: ti: k3-am62-lp-sk-nand: Rename pinctrls to fix schema warnings 75e2bc2985f4 drm/amd/display: Apply e4479aecf658 to dml 163df8d79a0d drm/amd/display: Respect user's CONFIG_FRAME_WARN more for dml files 582ba48e4a4c btrfs: fix NULL dereference on root when tracing inode eviction ec3695dd0acd btrfs: tracepoints: use btrfs_root_id() to get the id of a root 53df7a4c3a56 btrfs: qgroup: update all parent qgroups when doing quick inherit b9b19fecad7d btrfs: fix qgroup_snapshot_quick_inherit() squota bug dedec6e6b421 scsi: Revert "scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed" 496ca70a15f4 scsi: ufs: core: Fix EH failure after W-LUN resume error f373695d62e0 scsi: ipr: Enable/disable IRQD_NO_BALANCING during reset 261233f765d2 smb/client: fix NT_STATUS_NO_DATA_DETECTED value 596d1b968660 smb/client: fix NT_STATUS_DEVICE_DOOR_OPEN value b1dd68601676 smb/client: fix NT_STATUS_UNABLE_TO_FREE_VM value e83af97d5c39 drm/amd/display: shrink struct members a8559efcd576 NFS: Fix up the automount fs_context to use the correct cred 71029266093b ASoC: rockchip: Fix Wvoid-pointer-to-enum-cast warning (again) e1df03e293a0 NFSv4: ensure the open stateid seqid doesn't go backwards 6a1099604b0c dm-snapshot: fix 'scheduling while atomic' on real-time kernels f002df3a3305 alpha: don't reference obsolete termio struct for TC* constants 1b645cd729ef ARM: 9461/1: Disable HIGHPTE on PREEMPT_RT kernels 7010683101b5 csky: fix csky_cmpxchg_fixup not working 32dc49f49ea0 drm/xe: Ensure GT is in C0 during resumes e724d0261b7c drm/xe: make xe_gt_idle_disable_c6() handle the forcewake internally f09cd209359a tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock(). 6f468f6ff233 libceph: make calc_target() set t->paused, not just clear it e94075e950a6 libceph: reset sparse-read state in osd_fault() d2c4a5f69966 libceph: return the handler error from mon_handle_auth_done() c4c2152a858c libceph: make free_choose_arg_map() resilient to partial allocation 6c6cec3db3b4 libceph: replace overzealous BUG_ON in osdmap_apply_incremental() 2802ef3380fa libceph: prevent potential out-of-bounds reads in handle_auth_done() f94f95b81736 wifi: mac80211: restore non-chanctx injection behaviour 024f71a57d56 wifi: avoid kernel-infoleak from struct iw_point fcb7500bfa24 pinctrl: qcom: lpass-lpi: mark the GPIO controller as sleeping 321e17ff3142 gpio: rockchip: mark the GPIO controller as sleeping 7500ab83bad2 drm/radeon: Remove __counted_by from ClockInfoArray.clockInfo[] bc96db7051cc drm/pl111: Fix error handling in pl111_amba_probe 90b4b130a20d drm/amdgpu: Fix query for VPE block_type and ip_count 49a66829dd36 counter: interrupt-cnt: Drop IRQF_NO_THREAD flag c61440f1e741 counter: 104-quad-8: Fix incorrect return value in IRQ handler 196e8fd7424b lib/crypto: aes: Fix missing MMU protection for AES S-box 97130283b83f mei: me: add nova lake point S DID 0c2413c69129 btrfs: always detect conflicting inodes when logging inode refs 8b402146e3a8 arm64: Fix cleared E0POE bit after cpu_suspend()/resume() 2f05f7737e16 net: 3com: 3c59x: fix possible null dereference in vortex_probe1() 1320d94a4df1 atm: Fix dma_free_coherent() size 3f5d7f3865c6 NFSD: Remove NFSERR_EAGAIN 8c1cf63ed465 NFSD: net ref data still needs to be freed even if net hasn't startup d95499900fe5 nfsd: check that server is running in unlock_filesystem 03c68f94fad1 nfsd: use correct loop termination in nfsd4_revoke_states() ba4811c8b433 nfsd: provide locking for v4_end_grace 6b7ad17f4dd5 NFSD: Fix permission check for read access to executable-only files Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 254a4b9c9f..c463840c80 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "9f8581c660c7b402312572cbf9cbe03833ed20aa" -SRCREV_meta ?= "12efb3470e9a439d7806984d360a3712350076d0" +SRCREV_machine ?= "e9cbfbc05015c935e7bc4991c443602122f4b819" +SRCREV_meta ?= "46ae7e7d4ce1ee55091957bff63e0f54a761a93d" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.65" +LINUX_VERSION ?= "6.12.66" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 6aa9dd7d56..f5610a2d41 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.65" +LINUX_VERSION ?= "6.12.66" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "5b6cf700d8a16b91937d61bd3bf0248bb1771644" -SRCREV_meta ?= "12efb3470e9a439d7806984d360a3712350076d0" +SRCREV_machine ?= "59d7360e98794225985c1da95ec614563320c61b" +SRCREV_meta ?= "46ae7e7d4ce1ee55091957bff63e0f54a761a93d" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index 62f7e8a9bd..fbb4f31107 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "b9671eac4ed537384b52ae04e7e1c728b631fb13" -SRCREV_machine:qemuarm64 ?= "5b6cf700d8a16b91937d61bd3bf0248bb1771644" -SRCREV_machine:qemuloongarch64 ?= "5b6cf700d8a16b91937d61bd3bf0248bb1771644" -SRCREV_machine:qemumips ?= "bb006b07c2a942338e7f52070f8026791f30c5f0" -SRCREV_machine:qemuppc ?= "5b6cf700d8a16b91937d61bd3bf0248bb1771644" -SRCREV_machine:qemuriscv64 ?= "5b6cf700d8a16b91937d61bd3bf0248bb1771644" -SRCREV_machine:qemuriscv32 ?= "5b6cf700d8a16b91937d61bd3bf0248bb1771644" -SRCREV_machine:qemux86 ?= "5b6cf700d8a16b91937d61bd3bf0248bb1771644" -SRCREV_machine:qemux86-64 ?= "5b6cf700d8a16b91937d61bd3bf0248bb1771644" -SRCREV_machine:qemumips64 ?= "d9af48f273a9d87a61a46c93d7642d9e72947514" -SRCREV_machine ?= "5b6cf700d8a16b91937d61bd3bf0248bb1771644" -SRCREV_meta ?= "12efb3470e9a439d7806984d360a3712350076d0" +SRCREV_machine:qemuarm ?= "6a83054dc7e21d30a030ef52b5ff4c2531c56bf2" +SRCREV_machine:qemuarm64 ?= "59d7360e98794225985c1da95ec614563320c61b" +SRCREV_machine:qemuloongarch64 ?= "59d7360e98794225985c1da95ec614563320c61b" +SRCREV_machine:qemumips ?= "033446da85710e7854f8bbca5b4058d3d158d218" +SRCREV_machine:qemuppc ?= "59d7360e98794225985c1da95ec614563320c61b" +SRCREV_machine:qemuriscv64 ?= "59d7360e98794225985c1da95ec614563320c61b" +SRCREV_machine:qemuriscv32 ?= "59d7360e98794225985c1da95ec614563320c61b" +SRCREV_machine:qemux86 ?= "59d7360e98794225985c1da95ec614563320c61b" +SRCREV_machine:qemux86-64 ?= "59d7360e98794225985c1da95ec614563320c61b" +SRCREV_machine:qemumips64 ?= "57df96df5815eeedc9ab958e7464cf43c7494053" +SRCREV_machine ?= "59d7360e98794225985c1da95ec614563320c61b" +SRCREV_meta ?= "46ae7e7d4ce1ee55091957bff63e0f54a761a93d" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "39cb076c7dc7e44e3cab5c82ffda16a550ed8436" +SRCREV_machine:class-devupstream ?= "f6044d1fd846ed1ae457975738267214b538a222" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.65" +LINUX_VERSION ?= "6.12.66" PV = "${LINUX_VERSION}+git" From patchwork Mon Jan 26 15:23:50 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 79698 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 06923D13C3C for ; Mon, 26 Jan 2026 15:24:08 +0000 (UTC) Received: from mail-qv1-f43.google.com (mail-qv1-f43.google.com [209.85.219.43]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.22089.1769441041633094487 for ; Mon, 26 Jan 2026 07:24:01 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=UsD3GO2g; spf=pass (domain: gmail.com, ip: 209.85.219.43, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f43.google.com with SMTP id 6a1803df08f44-88a3d2f3299so50599976d6.2 for ; Mon, 26 Jan 2026 07:24:01 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1769441041; x=1770045841; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=bxWwkxiiaG1A/qA1KniTckI+8LwcF57R+MdRdOOr93E=; b=UsD3GO2gL/kRg3SKegkEJehfUtYYpo5ehPdeqiFaS8eenXBEU700PBcg3IL7U0tBVk 1l4xKcirhQG+Tr0TNVpTVNzhHSlycT/Kt8byOyjQgU69sYM3Imm1knza+jqm0V3OFYK6 /XoyQkdpGL3xoUof+v6QGFtQec8bTP4ONg1NjDWULMGTxSXSQAD+p9oIqz1WlFMSf+78 +aDaXojeZKjgAWFwP6pY+gLEwuIcYhDVS0CPueRsflHtp2vN7rnpnbMHagK3eRz2Myrs A7+fY4HzjNTEi7C9cWO9kGcfm1HiNGwE4YyQysFQHeknFq15qY+ubSeByQhyWyOjJxbv nDlQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769441041; x=1770045841; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=bxWwkxiiaG1A/qA1KniTckI+8LwcF57R+MdRdOOr93E=; b=G9gHCqUtPNQ3Wo6JYQqrpFP08iUYCnUIHHkaSE9eCcyoGmNJMPRDAijfc0U5WLNJ59 iSnjzzgigsnFQitkNBa6HkEMKTNf1bCLShGRjFsQpzrgxUwVskWo2kBvezekgFfK7Y8D 8L77qkKE7T7cTUnqfIYijfW8ZonfLui7lNay+3OjoDC/UTK5LwIqMgEPVROKBFzWbkW8 CSr0DwaBX/etqY1UFEEMjNF9f5weqD9k90v856ze+1q1geFVVi25UtlqSu3Fs5jUIZ2/ 2Mr6p8H67J821BuuGmuzVjIiBPbjDACRPzg5eLzXOol+/rMfTH4+D1We+7vEKuZJHXWk lSnQ== X-Gm-Message-State: AOJu0YxzMERQ1Ub2m3ydaSmquxf6/4WJeE+VlZIxGAqUv1SFvV4SQf4r qgSn0EgzZNYkLO3JnuaiV+u3V6uuIcA4BmSnGAZRZ1c/XfEjFlSp1j9BLTB7abkiwHo= X-Gm-Gg: AZuq6aLqb1p1f5WHqIupF/zhABX3kX1+r3XWUvaHwtGiNdKqcMorYoxNYcGXo1+a+sq 3xKj12A+jAz6hHn/fg38RWBu8/bKb5u22fONKTmA+jrMV7vLsoPwt34irNcRlVZzUMH69IHx+IS +frC7Jl4xD0oTtFMRJALkP2YOoRV4VqWssXYIuBfgo0GyZuwY5XGHpOHdIOgrUW9O/BrDQlx0QU PfQdXrtm6p3NYYnODANq2ZupCRePI03IBpJzd5NTjnhu+KpFUXpfipN2sc0UkY7dtkfvLJqsjk7 kOegj4YKwIkH5UUdfzr7mLjSTDjECf2d+OAZMNWUsKXrRRRps9f8JmnCCU1eizMm4QzJirkxKPV j/Nfafn8mYVNINpOMFoNic7rC2eJQul15nFLEir3l+n8rN7fWeM9V5b0Vvx2TZ1iE0nnOBwQWn5 lVY0pVEt0pnlHIHmMVqoT25cmCpykpaXWkjfnzr6t3nF5cv8vTyr1nb98I2RNx9IxZn4u/5L3Vm i4It0mGwu6UW1l0QR/1+MU8mQ== X-Received: by 2002:a05:620a:372a:b0:8b2:e704:5626 with SMTP id af79cd13be357-8c6f95e0ea5mr591127585a.38.1769441040535; Mon, 26 Jan 2026 07:24:00 -0800 (PST) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id af79cd13be357-8c6e3870c48sm1044157185a.51.2026.01.26.07.23.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 26 Jan 2026 07:24:00 -0800 (PST) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [meta][PATCH 04/07] linux-yocto/6.12: update CVE exclusions (6.12.66) Date: Mon, 26 Jan 2026 10:23:50 -0500 Message-ID: <20260126152353.2328046-5-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126152353.2328046-1-bruce.ashfield@gmail.com> References: <20260126152353.2328046-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 26 Jan 2026 15:24:08 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230014 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 10 changes (5 new | 5 updated): - 5 new CVEs: CVE-2026-22278, CVE-2026-23761, CVE-2026-23762, CVE-2026-23763, CVE-2026-23764 - 5 updated CVEs: CVE-2021-47746, CVE-2021-47748, CVE-2025-64097, CVE-2025-69821, CVE-2026-1328 Date: Thu, 22 Jan 2026 16:23:30 +0000 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.12.inc | 18 +++++++++++------- 1 file changed, 11 insertions(+), 7 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 6ab3bd2bb3..52ab4eb807 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-01-16 00:43:33.551663+00:00 for kernel version 6.12.65 -# From linux_kernel_cves 2026-01-16_baseline-1-gc984786b0cf +# Generated at 2026-01-22 16:37:18.329435+00:00 for kernel version 6.12.66 +# From linux_kernel_cves cve_2026-01-22_1600Z-1-g55b49f6e4ba python check_kernel_cve_status_version() { - this_version = "6.12.65" + this_version = "6.12.66" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -18466,7 +18466,7 @@ CVE_STATUS[CVE-2025-39820] = "fixed-version: only affects 6.15 onwards" CVE_STATUS[CVE-2025-39821] = "fixed-version: only affects 6.16 onwards" -# CVE-2025-39822 needs backporting (fixed from 6.17) +CVE_STATUS[CVE-2025-39822] = "fixed-version: only affects 6.15 onwards" CVE_STATUS[CVE-2025-39823] = "cpe-stable-backport: Backported in 6.12.45" @@ -19112,7 +19112,7 @@ CVE_STATUS[CVE-2025-40145] = "fixed-version: only affects 6.15 onwards" CVE_STATUS[CVE-2025-40148] = "fixed-version: only affects 6.16 onwards" -# CVE-2025-40149 needs backporting (fixed from 6.18) +CVE_STATUS[CVE-2025-40149] = "cpe-stable-backport: Backported in 6.12.66" # CVE-2025-40150 needs backporting (fixed from 6.18) @@ -19630,7 +19630,7 @@ CVE_STATUS[CVE-2025-68210] = "cpe-stable-backport: Backported in 6.12.59" CVE_STATUS[CVE-2025-68211] = "cpe-stable-backport: Backported in 6.12.59" -CVE_STATUS[CVE-2025-68212] = "fixed-version: only affects 6.14 onwards" +CVE_STATUS[CVE-2025-68212] = "fixed-version: only affects 6.15 onwards" CVE_STATUS[CVE-2025-68213] = "cpe-stable-backport: Backported in 6.12.60" @@ -20074,7 +20074,7 @@ CVE_STATUS[CVE-2025-68790] = "fixed-version: only affects 6.18 onwards" CVE_STATUS[CVE-2025-68791] = "fixed-version: only affects 6.14 onwards" -# CVE-2025-68792 needs backporting (fixed from 6.19rc1) +CVE_STATUS[CVE-2025-68792] = "cpe-stable-backport: Backported in 6.12.66" CVE_STATUS[CVE-2025-68793] = "fixed-version: only affects 6.17 onwards" @@ -20300,3 +20300,7 @@ CVE_STATUS[CVE-2025-71143] = "cpe-stable-backport: Backported in 6.12.64" CVE_STATUS[CVE-2025-71144] = "cpe-stable-backport: Backported in 6.12.65" +CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66" + +CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.12.66" + From patchwork Mon Jan 26 15:23:51 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 79702 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id F102FD13C37 for ; Mon, 26 Jan 2026 15:24:07 +0000 (UTC) Received: from mail-qv1-f66.google.com (mail-qv1-f66.google.com [209.85.219.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.22091.1769441043256467873 for ; Mon, 26 Jan 2026 07:24:03 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=kaIUmU2G; spf=pass (domain: gmail.com, ip: 209.85.219.66, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f66.google.com with SMTP id 6a1803df08f44-894774491deso74729796d6.2 for ; Mon, 26 Jan 2026 07:24:03 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1769441042; x=1770045842; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=yVu1ReH+c7rd4aE1iXaT/w2lsFOnYMZrk5qdB84Rw/4=; b=kaIUmU2GPG3htwlisAxcugBfrBCO3oQ5jGiE0G6wgUzS9BJL7Mf1jIV4zgghcYaUlq JJBgbR7HMZJyNPe/7XfGwS6LEfiK11fwq9Dt6cocAUA9cdAWZVTIIp9HF3wcnkHa1cRf 2FoBNU9N3ok/RshKZfHhm1t5t1YsI8KOX1abo5c+PVcazpwJxPqgaU4wlYqeJAoAw9OM Rxp7PBU7hF3L4oHV5TNTXm/lKHNFJkAtDTEIgBivJCCOWlLwzPq/+d9bZNnN0HassKAS JDMS4w68lhJKc3k2mVPEk8OrFN/Ddm3AE1vhC49ETOx0QWN771i7Q+a3cG0JgMMcEO+J hXUA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769441042; x=1770045842; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=yVu1ReH+c7rd4aE1iXaT/w2lsFOnYMZrk5qdB84Rw/4=; b=UPDeHyQGju8byin0XXPs0YsvS/C2eTlCtcW1UEOOZsMG3x/OqYKGcQT35I5OAm+wJH mH23q9t/TecmJV+GmJTLKXceSikeFwZcgCP2GaJPw2Iint7H/QtYSF7yUZ6kG72Gl4MI /VUu0LQSN8HIDpcpdWsJ+aZrnWj39jOO1cb9jiCbZC2PU7QND6uFO1ocee/JCKH8Z4DR S1GgtEwcfj0n3CN2j/b37mBdBe1Ahv5wjFb2rSO/eTjeXL3NQKV02v7I/XJ+axA8N6qx TOtv7bh6WXdQlCYq6cEOjquRbbb5ASl2d2qyRIY7YIpI0lzmKDBcWuiVHuUMU1FGFGTy kmbg== X-Gm-Message-State: AOJu0YxIUfIGwT3euehGmMuaI9nPwvTSOs1xNXelO0EdMpVh83kqUtBj oe9pngVagxIFZc9m9jwocr3dZZWcSSpF0uy0MfP79SvZ48dTkCWnaidy/VYAvudzBhvjZw== X-Gm-Gg: AZuq6aIlYgAueMxq+kfP1NNSi4ccllHLaAECz/JMWtYC+Mx1GhUyaXvdL5fEfxzRHzi uP0Z1zL1TFVVgUOeMnNOAlFECvm98Ah+g0AEYz8mKoNHpZemcjfHeMAl2Q7Aj2wQuSyBWz0/0Oy KLgRafSLIVthlLrIx/SMiRkCWjtBUFXseTfhFTdhlX62iBgoMk0XaZcfHyMvCfymnks9lPgiENg 3yDrYm96VjPM6LjzQyk0pttCXs7c/rh7AnJ05XC2C+eTu0IW5kTtS6fhhv5EtRyNqZK4k5jyt7D qOznMFZwhKjm7AmAXQg5Zusg0r9fteRMQJvn2cJLSWoG9JMhFB+OU3l6U7RwEYZwXa2sNPqHdPq b8MCCe7NJDIV1XTPO3MT+Yw2iGwot8ii1KDiZB/IQvGhXvwI8Y6L20Rs/zhf/eYWen2vQB6/fn0 phEe5rpHyJU7aYm4GGk/8w89fUWr7M3j8ThuBjTSkpadG+t1XxGaVYj7UVwY3GBQ23IQDk3sYwi xBZDtKq2pY+E00WKz56fW7Kkw== X-Received: by 2002:a05:6214:5091:b0:88f:cd1c:68a8 with SMTP id 6a1803df08f44-894b08d6cdfmr62337906d6.49.1769441041956; Mon, 26 Jan 2026 07:24:01 -0800 (PST) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id af79cd13be357-8c6e3870c48sm1044157185a.51.2026.01.26.07.24.00 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 26 Jan 2026 07:24:00 -0800 (PST) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [meta][PATCH 05/07] linux-yocto/6.18: update to v6.18.6 Date: Mon, 26 Jan 2026 10:23:51 -0500 Message-ID: <20260126152353.2328046-6-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126152353.2328046-1-bruce.ashfield@gmail.com> References: <20260126152353.2328046-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 26 Jan 2026 15:24:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230016 From: Bruce Ashfield Updating linux-yocto/6.18 to the latest korg -stable release that comprises the following commits: b6fe42bc55af Linux 6.18.6 69695f5331d4 spi: cadence-quadspi: Prevent lost complete() call during indirect read 81531bdea972 scsi: sg: Fix occasional bogus elapsed time that exceeds timeout 90f5dd44d9bf ASoC: fsl_sai: Add missing registers to cache default b3f89f6582e0 ALSA: hda/realtek: enable woofer speakers on Medion NM14LNL 65f6ae1fdf22 ASoC: amd: yc: Add quirk for Honor MagicBook X16 2025 003994f3b014 ALSA: usb-audio: Update for native DSD support quirks 530ec35c211e block: validate pi_offset integrity limit 79dd3f1d9dd3 can: j1939: make j1939_session_activate() fail if device is no longer registered 9fd86747daa6 drm/amdkfd: Fix improper NULL termination of queue restore SMI event string 6fcfcf792ce8 spi: mt65xx: Use IRQF_ONESHOT with threaded IRQ 6db8e186c977 drm/amd/display: Fix DP no audio issue 6a2049b7391b accel/amdxdna: Block running under a hypervisor a70fd483c4b9 ata: libata-core: Disable LPM on ST2000DM008-2FR102 09d6074995c1 netfilter: nf_tables: avoid chain re-validation if possible 9e2fcfc32467 powercap: fix sscanf() error return value handling d33cc39e9f7e powercap: fix race condition in register_control_type() cbbf6c1fe62b net: sfp: extend Potron XGSPON quirk to cover additional EEPROM variant 737be05a7657 bpf: Fix reference count leak in bpf_prog_test_run_xdp() 31e37f44b606 bpf, test_run: Subtract size of xdp_frame from allowed metadata size 7ea26e6dcabc gpio: mpsse: fix reference leak in gpio_mpsse_probe() error paths 7882637ea5cc gpio: mpsse: add quirk support 472d900c8bca gpio: mpsse: ensure worker is torn down 4374a1cac13e btrfs: fix beyond-EOF write handling 9cb1a586c78a btrfs: use variable for end offset in extent_writepage_io() 3b7ca18f3509 btrfs: truncate ordered extent when skipping writeback past i_size ebdc99345399 erofs: fix file-backed mounts no longer working on EROFS partitions c65f0bafc98f erofs: don't bother with s_stack_depth increasing for now 234409e0db77 irqchip/gic-v5: Fix gicv5_its_map_event() ITTE read endianness 72e28774e964 ublk: fix use-after-free in ublk_partition_scan_work 949647e7771a arp: do not assume dev_hard_header() does not change skb->head d93ba83fc3f5 net: enetc: fix build warning when PAGE_SIZE is greater than 128K ce6eef731aba net: usb: pegasus: fix memory leak in update_eth_regs_async() 51ffd447bc37 net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset 1251bbdb8f5b wifi: mac80211_hwsim: fix typo in frequency notification 72f93dc6d1a6 net: airoha: Fix schedule while atomic in airoha_ppe_deinit() 9e17d06663f3 HID: quirks: work around VID/PID conflict for appledisplay fb08fec72131 sparc/PCI: Correct 64-bit non-pref -> pref BAR resources 397691633112 trace: ftrace_dump_on_oops[] is not exported, make it static 6c0d642e8c58 block: don't merge bios with different app_tags 086e2928c1da net: netdevsim: fix inconsistent carrier state after link/unlink 334bbbbf4c80 selftests: drv-net: Bring back tool() to driver __init__s 67550a1130b6 net/sched: act_api: avoid dereferencing ERR_PTR in tcf_idrinfo_destroy 06dc322dcb20 net: sfp: return the number of written bytes for smbus single byte access 0c63d5683eae udp: call skb_orphan() before skb_attempt_defer_free() 2d6cde9953f9 Revert "dsa: mv88e6xxx: make serdes SGMII/Fiber tx amplitude configurable" 0ad6d6e50e9d idpf: fix aux device unplugging when rdma is not supported by vport 258e7c55f939 idpf: cap maximum Rx buffer size bfeb4dfc8050 idpf: Fix error handling in idpf_vport_open() ab92fa4dd81b idpf: Fix RSS LUT NULL ptr issue after soft reset 9abe73eff87d idpf: Fix RSS LUT configuration on down interfaces b29a5a7dd1f4 idpf: Fix RSS LUT NULL pointer crash on early ethtool operations fe33b4252e4b idpf: fix issue with ethtool -n command display 1aedff70a5e9 idpf: fix memory leak of flow steer list on rmmod a514c374edcd idpf: fix error handling in the init_task on load 23391db8a00c idpf: fix memory leak in idpf_vc_core_deinit() ec602a2a4071 idpf: fix memory leak in idpf_vport_rel() ac122f5fb050 idpf: detach and close netdevs while handling a reset a9f5b61591d3 idpf: convert vport state to bitmap 14c4fea11536 idpf: keep the netdev when a reset fails 309a4c2fa676 PCI/VGA: Don't assume the only VGA device on a system is `boot_vga` c114a32a2e70 net: fix memory leak in skb_segment_list for GRO packets 177c71d2709f riscv: pgtable: Cleanup useless VA_USER_XXX definitions 5bfaf4fa3dc2 riscv: cpufeature: Fix Zk bundled extension missing Zknh 8a6b410e3d0f net: airoha: Fix npu rx DMA definitions 6d1b61b8e1e4 btrfs: fix NULL pointer dereference in do_abort_log_replay() 07effd536ddc btrfs: only enforce free space tree if v1 cache is required for bs < ps cases 92a559085114 btrfs: release path before initializing extent tree in btrfs_read_locked_inode() 0185dc4b5b0e vsock: Make accept()ed sockets use custom setsockopt() 543f8537b470 drm/amd/pm: force send pcie parmater on navi1x a1c0a4ccbe6d drm/amd/pm: fix wrong pcie parameter on navi1x deee9dfb111a perf: Ensure swevent hrtimer is properly destroyed 088ca99dbb03 inet: frags: drop fraglist conntrack references a5e2d902f64c virtio_net: fix device mismatch in devm_kzalloc/devm_kfree e3c738138975 bnxt_en: Fix potential data corruption with HW GRO/LRO 8181c79757cc net: wwan: iosm: Fix memory leak in ipc_mux_deinit() f2c4bcfa193e net/ena: fix missing lock when update devlink params b46675e1c593 net/mlx5e: Dealloc forgotten PSP RX modify header d35ab9fb5794 net/mlx5e: Don't print error message due to invalid module cba6cc0f4654 net/mlx5e: Don't gate FEC histograms on ppcnt_statistical_group 658496325824 net/mlx5: Lag, multipath, give priority for routes with smaller network prefix 8bdc624bf33d netdev: preserve NETIF_F_ALL_FOR_ALL across TSO updates e00b169eaac5 net: sock: fix hardened usercopy panic in sock_recv_errqueue fe71b71f0fe0 net: phy: mxl-86110: Add power management and soft reset support 1511ba2d6846 inet: ping: Fix icmp out counting f490af47bbee net: mscc: ocelot: Fix crash when adding interface under a lag b53fca69f455 bridge: fix C-VLAN preservation in 802.1ad vlan_tunnel egress 326a4b7e61d0 net: marvell: prestera: fix NULL dereference on devlink_alloc() failure 8bdafdf49000 netfilter: nf_conncount: update last_gc only when GC has been performed 7f066cba650c netfilter: nf_tables: fix memory leak in nf_tables_newrule() 58dac9b28a57 gpio: pca953x: handle short interrupt pulses on PCAL devices fb674c8f1a5d gpiolib: fix race condition for gdev->srcu aaa24eeb63ad gpiolib: rename GPIO chip printk macros 97531f8e50d9 gpiolib: remove unnecessary 'out of memory' messages 75bfb05067d6 netfilter: nft_synproxy: avoid possible data-race on update operation 704c0258f0d7 netfilter: nft_set_pipapo: fix range overlap detection 499c0db5862f arm64: dts: mba8mx: Fix Ethernet PHY IRQ support 646d415f9860 arm64: dts: imx8qm-ss-dma: correct the dma channels of lpuart 4977cac699a4 arm64: dts: imx8mp: Fix LAN8740Ai PHY reference clock on DH electronics i.MX8M Plus DHCOM 5b5ef7049ebe arm64: dts: freescale: tx8p-ml81: fix eqos nvmem-cells f267ced2bcb0 arm64: dts: freescale: moduline-display: fix compatible 2c3f04f1f70c ARM: dts: imx6q-ba16: fix RTC interrupt level 88244021003b arm64: dts: add off-on-delay-us for usdhc2 regulator c200328fd57f arm64: dts: imx8qm-mek: correct the light sensor interrupt type to low level 42b66f4557a2 crypto: qat - fix duplicate restarting msg during AER error 7fd534abaa39 pinctrl: mediatek: mt8189: restore previous register base name array order 5b5482c0e5ee netfs: Fix early read unlock of page with EOF in middle b95a6e3b0d5d HID: Intel-thc-hid: Intel-thc: Fix wrong register reading a5eeebb994bf HID: Intel-thc-hid: Intel-thc: fix dma_unmap_sg() nents value 737f341080f4 gpio: it87: balance superio enter/exit calls in error path 43c2e3670334 gpu: nova-core: select RUST_FW_LOADER_ABSTRACTIONS 93900292af11 arm64: dts: ti: k3-am62-lp-sk-nand: Rename pinctrls to fix schema warnings c5ebc38066ce arm64: dts: ti: k3-am642-phyboard-electra-x27-gpio1-spi1-uart3: Fix schema warnings 0d4087c74869 arm64: dts: ti: k3-am642-phyboard-electra-peb-c-010: Fix icssg-prueth schema warning f09b0f705bd7 of: unittest: Fix memory leak in unittest_data_add() c8385851a543 btrfs: fix use-after-free warning in btrfs_get_or_create_delayed_node() 99e057f3d3ef btrfs: fix NULL dereference on root when tracing inode eviction 1ee62906cbd9 btrfs: qgroup: update all parent qgroups when doing quick inherit 7d59377ada9f btrfs: fix qgroup_snapshot_quick_inherit() squota bug 5f0fd06d7571 scsi: Revert "scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed" f1e2d448ccc1 scsi: ufs: core: Fix EH failure after W-LUN resume error 3a96f7f2677a scsi: ipr: Enable/disable IRQD_NO_BALANCING during reset 382028023669 scsi: mpi3mr: Prevent duplicate SAS/SATA device entries in channel 1 aba03b371632 smb/client: fix NT_STATUS_NO_DATA_DETECTED value d4959a7900af smb/client: fix NT_STATUS_DEVICE_DOOR_OPEN value e2c146263966 smb/client: fix NT_STATUS_UNABLE_TO_FREE_VM value f1ae589310e1 drm/amd/display: shrink struct members 93ee5471731b ALSA: hda/realtek: Add support for ASUS UM3406GA ab775cc784f6 NFS: Fix up the automount fs_context to use the correct cred 8e73e0ee4530 ASoC: rockchip: Fix Wvoid-pointer-to-enum-cast warning (again) d82f6d1d43b3 NFSv4: ensure the open stateid seqid doesn't go backwards 6930c0229fb3 dm-snapshot: fix 'scheduling while atomic' on real-time kernels 232948cf600f dm-verity: disable recursive forward error correction fea0f86e4613 alpha: don't reference obsolete termio struct for TC* constants 9f53cfb9f4c2 ARM: 9461/1: Disable HIGHPTE on PREEMPT_RT kernels 8ad9e930fb91 csky: fix csky_cmpxchg_fixup not working c88717b10792 ALSA: hda: intel-dsp-config: Prefer legacy driver as fallback a1d420370a24 ublk: reorder tag_set initialization before queue allocation 5647d42c47b5 libceph: make calc_target() set t->paused, not just clear it 10b7c7281036 libceph: reset sparse-read state in osd_fault() 9e0101e57534 libceph: return the handler error from mon_handle_auth_done() f21c3fdb9683 libceph: make free_choose_arg_map() resilient to partial allocation 6348d70af847 libceph: replace overzealous BUG_ON in osdmap_apply_incremental() 2d653bb63d59 libceph: prevent potential out-of-bounds reads in handle_auth_done() b97be67dc06e wifi: mac80211: restore non-chanctx injection behaviour e3c35177103e wifi: avoid kernel-infoleak from struct iw_point 5c12a13522f4 Revert "drm/mediatek: dsi: Fix DSI host and panel bridge pre-enable order" b7a883b0135d PM: hibernate: Fix crash when freeing invalid crypto compressor ea7a54393d50 pinctrl: qcom: lpass-lpi: mark the GPIO controller as sleeping 391adca8e213 PCI: meson: Report that link is up while in ASPM L0s and L1 states 2b9c15286a17 io_uring/io-wq: fix incorrect io_wq_for_each_worker() termination logic 3aa67687d558 gpio: rockchip: mark the GPIO controller as sleeping b88191562d92 drm/radeon: Remove __counted_by from ClockInfoArray.clockInfo[] 227997d16a53 drm/tidss: Fix enable/disable order 124b9d19e1d5 drm/pl111: Fix error handling in pl111_amba_probe 8a8bf7ed8230 drm/atomic-helper: Export and namespace some functions 1f50931f79dc drm/amdgpu: Fix query for VPE block_type and ip_count b023b3f236e8 drm/amd/display: Apply e4479aecf658 to dml 1d8b1ac985c9 arm64: dts: imx95: correct I3C2 pclk to IMX95_CLK_BUSWAKEUP 00d880c469b7 ALSA: hda/tas2781: properly initialize speaker_id for TAS2563 cb73d37ac18b ALSA: ac97: fix a double free in snd_ac97_controller_register() c12df0f5ca41 Revert "drm/atomic-helper: Re-order bridge chain pre-enable and post-disable" 0ce45b2426f9 nouveau: don't attempt fwsec on sb on newer platforms. 64a0d47e0c32 riscv: boot: Always make Image from vmlinux, not vmlinux.unstripped 5b7f91acffd2 tracing: Add recursion protection in kernel stack trace recording 425886b1f830 counter: interrupt-cnt: Drop IRQF_NO_THREAD flag 844f521604bd counter: 104-quad-8: Fix incorrect return value in IRQ handler a0b28dd06a9a lib/crypto: aes: Fix missing MMU protection for AES S-box 30a98c97f787 rust_binder: remove spin_lock() in rust_shrink_free_page() 86e49948b0e6 mei: me: add nova lake point S DID d52af58dd463 btrfs: always detect conflicting inodes when logging inode refs 0174d5466cae bnxt_en: Fix NULL pointer crash in bnxt_ptp_enable during error cleanup e86c4ee5a029 arm64: Fix cleared E0POE bit after cpu_suspend()/resume() ffa2be496ef6 net: do not write to msg_get_inq in callee d82796a57cc0 net: 3com: 3c59x: fix possible null dereference in vortex_probe1() 4ae815bfcfad atm: Fix dma_free_coherent() size 0f7fb819d63f NFSD: Remove NFSERR_EAGAIN db78fa4b9f1f NFSD: net ref data still needs to be freed even if net hasn't startup e06c9f6c0f55 nfsd: check that server is running in unlock_filesystem 099a880ef541 nfsd: use correct loop termination in nfsd4_revoke_states() 53f07d095e7e nfsd: provide locking for v4_end_grace a339b0168251 NFSD: Fix permission check for read access to executable-only files Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.18.bb | 6 ++--- .../linux/linux-yocto-tiny_6.18.bb | 6 ++--- meta/recipes-kernel/linux/linux-yocto_6.18.bb | 24 +++++++++---------- 3 files changed, 18 insertions(+), 18 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.18.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.18.bb index 76eb891a04..2a10815684 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.18.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.18.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "878f4a23dbbd21b2eaa97cd82be39db3131f26e3" -SRCREV_meta ?= "d8bded29848649b362d0376692bd86a5f6ebc7e0" +SRCREV_machine ?= "2ec883ec1af76529a27558fde434a5ae64dee7ab" +SRCREV_meta ?= "1fbfcbd8a3ce8df814f51ef8710fc0197ff01986" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.18;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.18.5" +LINUX_VERSION ?= "6.18.6" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.18.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.18.bb index 6904ce5f56..ce564d842c 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.18.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.18.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.18.inc -LINUX_VERSION ?= "6.18.5" +LINUX_VERSION ?= "6.18.6" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "0d1b47da567fe4d6ff80c562b706e7a9232d3553" -SRCREV_meta ?= "d8bded29848649b362d0376692bd86a5f6ebc7e0" +SRCREV_machine ?= "3e243d2a1151b1ccb42f80f81c6d77f0af327a3d" +SRCREV_meta ?= "1fbfcbd8a3ce8df814f51ef8710fc0197ff01986" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.18.bb b/meta/recipes-kernel/linux/linux-yocto_6.18.bb index 599a3d13b8..daa0cb51d1 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.18.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.18.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.18/standard/base" KBRANCH:qemuloongarch64 ?= "v6.18/standard/base" KBRANCH:qemumips64 ?= "v6.18/standard/mti-malta" -SRCREV_machine:qemuarm ?= "9e147c72113ebc9bc50a4709953834da3c7f76dc" -SRCREV_machine:qemuarm64 ?= "0d1b47da567fe4d6ff80c562b706e7a9232d3553" -SRCREV_machine:qemuloongarch64 ?= "0d1b47da567fe4d6ff80c562b706e7a9232d3553" +SRCREV_machine:qemuarm ?= "ee78c602479902ccc042f3b2c6467a6a1b2010e1" +SRCREV_machine:qemuarm64 ?= "3e243d2a1151b1ccb42f80f81c6d77f0af327a3d" +SRCREV_machine:qemuloongarch64 ?= "3e243d2a1151b1ccb42f80f81c6d77f0af327a3d" SRCREV_machine:qemumips ?= "62ea92a539f58803a222be98b81118403074206e" -SRCREV_machine:qemuppc ?= "0d1b47da567fe4d6ff80c562b706e7a9232d3553" -SRCREV_machine:qemuriscv64 ?= "0d1b47da567fe4d6ff80c562b706e7a9232d3553" -SRCREV_machine:qemuriscv32 ?= "0d1b47da567fe4d6ff80c562b706e7a9232d3553" -SRCREV_machine:qemux86 ?= "0d1b47da567fe4d6ff80c562b706e7a9232d3553" -SRCREV_machine:qemux86-64 ?= "0d1b47da567fe4d6ff80c562b706e7a9232d3553" +SRCREV_machine:qemuppc ?= "3e243d2a1151b1ccb42f80f81c6d77f0af327a3d" +SRCREV_machine:qemuriscv64 ?= "3e243d2a1151b1ccb42f80f81c6d77f0af327a3d" +SRCREV_machine:qemuriscv32 ?= "3e243d2a1151b1ccb42f80f81c6d77f0af327a3d" +SRCREV_machine:qemux86 ?= "3e243d2a1151b1ccb42f80f81c6d77f0af327a3d" +SRCREV_machine:qemux86-64 ?= "3e243d2a1151b1ccb42f80f81c6d77f0af327a3d" SRCREV_machine:qemumips64 ?= "9fb4ff0187c85426f21fd40d4c61b742800f65c4" -SRCREV_machine ?= "0d1b47da567fe4d6ff80c562b706e7a9232d3553" -SRCREV_meta ?= "d8bded29848649b362d0376692bd86a5f6ebc7e0" +SRCREV_machine ?= "3e243d2a1151b1ccb42f80f81c6d77f0af327a3d" +SRCREV_meta ?= "1fbfcbd8a3ce8df814f51ef8710fc0197ff01986" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "dc554c8fb361f13580da3f5a98ad8b494a788666" +SRCREV_machine:class-devupstream ?= "b6fe42bc55af3fb17c8c03def2f8a1f7fa907af6" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.18/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.18;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.18.5" +LINUX_VERSION ?= "6.18.6" PV = "${LINUX_VERSION}+git" From patchwork Mon Jan 26 15:23:52 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 79700 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E942AD13C32 for ; Mon, 26 Jan 2026 15:24:07 +0000 (UTC) Received: from mail-qk1-f171.google.com (mail-qk1-f171.google.com [209.85.222.171]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.22093.1769441044131734016 for ; Mon, 26 Jan 2026 07:24:04 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=PUnez7r7; spf=pass (domain: gmail.com, ip: 209.85.222.171, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f171.google.com with SMTP id af79cd13be357-8c07bc2ad13so308866385a.2 for ; Mon, 26 Jan 2026 07:24:04 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1769441043; x=1770045843; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=wT7wOQRE77lJm4m8EAA3XNlops+KR4IHjz6TEVvAQaU=; b=PUnez7r74/a+VQVn5ZJ6RcKEbwJti0Ii56zfNqfFvohGSbQy4iXt9vZmGzMwema6zH tOigyFvWo/w1FROmyLXGHZ/Gj/74rpHG8bzSjIqnJ5jZKrNReey2iuYN4yb4IvSX/LuU qdqQqldNuOfQJl4nrXijTSL88V8gTxz4YWQrSfB0QLcwG2rKxk8HV+AAuiIrlXnZ9z81 +BJpE70WSVogW+GSyqtj4lTYHitj8nsLB34KcGHPY7bswmWgYb6bLSFmjxjGbyH3uLZ3 iB8M06fBiTPJ3uv8mce3PNAuffwFM7HkiShjW5w8xPyPwkeuiYa7sVZmXG/6zkMinZqH wFmw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769441043; x=1770045843; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=wT7wOQRE77lJm4m8EAA3XNlops+KR4IHjz6TEVvAQaU=; b=ppveTWKi8w8ap9N+h49k0jz65Qj8YRG5M7ZP2KceuIXqnHsQ98eX3pIKwdPr2ptwM+ qcu7QN8ZN9XhNyNz7SkTJT2ipPiRvlVaZWZKbIcoLlMqVUefpuv8pQ8CiPJGowpVet5Z dr+Fl4uKlcmIyIDzeHRerYx8X8SCPPyCqrgEGf+9wETRdeBTTQwuNThrFXnosIVF2gPS YnjzGHnxVE9PLCZl9e2O8QBtSNsvAemVi8xQY/gZwTe86bFTSEzO0JKGq3APzqHfH3ET yoZXIdyJxOhu91y5iLti6/GtUB3RZtFIXsydZKwN1JJog/H69TMeDvh/ry8UFUd15FSq /dtg== X-Gm-Message-State: AOJu0Yyf6EUUPW//9kE0tNOAkdOGU03GdQNr/VUeya5zGkwTSadugdjW hmnrbtAVkmK+aqV0mtT8kujK3rzZ0sEkYnP9iT0eol3Sh5pfCI8n9/30Z8VQW4ZSlVU= X-Gm-Gg: AZuq6aJ4Nf5vMSuGlr6pUftM7sbf6mcdtGddx16+6nc/Qb1kty1QqPM/c6itnspm0oL 8dn+VI/kFzdn+bGvQU5EYYPObTL2S0IAJHek97MB4DltY+UlSdM9onad8p+iomKxQRhAYkcDlL4 oksf5S75eW+9HHZklhnQqOegXxggfvedm+K5vLW/yWWd8yTQZEv+smAgVR3IUME3FUtnticwf98 bbP+n4nkWmcYzAm8OT56Pez3LNpThLU/GEhbKTHfOWKjOAOpthyNXzzBKqw7VRHGbZmHpJGf58y 5tNp6Yykl22wfkJgO605sscV4R3IFx2SH4Y+5oSk2oNuLid+NybKgB8FkSPxNHEmSmo6Jx89xnp qB2eDNl0e6HumMGHxwt9ujkQ9mZ5Q/vdwabzlfjDxrFfDqCnDTjudS68xRW1VMPj4LxaDakYSp5 CVJR3cLu/j01tS3XVdfkP1KNRRGrYKH2elsRoTZErG1kobJ2ygUgLM6YHQpFzOGElOOjkxI1Yun RHtMzC5H4nH9kXsmN2j4JCzTg== X-Received: by 2002:a05:620a:7001:b0:8c6:adfc:48fe with SMTP id af79cd13be357-8c6f9584da5mr480085685a.23.1769441042926; Mon, 26 Jan 2026 07:24:02 -0800 (PST) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id af79cd13be357-8c6e3870c48sm1044157185a.51.2026.01.26.07.24.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 26 Jan 2026 07:24:02 -0800 (PST) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [meta][PATCH 06/07] linux-yocto/6.18: update CVE exclusions (6.18.6) Date: Mon, 26 Jan 2026 10:23:52 -0500 Message-ID: <20260126152353.2328046-7-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126152353.2328046-1-bruce.ashfield@gmail.com> References: <20260126152353.2328046-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 26 Jan 2026 15:24:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230017 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 14 changes (0 new | 14 updated): - 0 new CVEs: - 14 updated CVEs: CVE-2024-23147, CVE-2024-23148, CVE-2024-23156, CVE-2024-23157, CVE-2024-37000, CVE-2024-37006, CVE-2025-13335, CVE-2025-63896, CVE-2025-9452, CVE-2025-9456, CVE-2025-9457, CVE-2025-9458, CVE-2026-1225, CVE-2026-1332 Date: Thu, 22 Jan 2026 14:20:53 +0000 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.18.inc | 286 +++++++++++++++++- 1 file changed, 283 insertions(+), 3 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.18.inc b/meta/recipes-kernel/linux/cve-exclusion_6.18.inc index 708c5a8506..38f260d231 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.18.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.18.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-01-12 16:52:57.037978+00:00 for kernel version 6.18.5 -# From linux_kernel_cves cve_2026-01-12_1600Z-2-g6b70380b71e +# Generated at 2026-01-22 14:32:14.186712+00:00 for kernel version 6.18.6 +# From linux_kernel_cves cve_2026-01-22_1400Z python check_kernel_cve_status_version() { - this_version = "6.18.5" + this_version = "6.18.6" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -20024,3 +20024,283 @@ CVE_STATUS[CVE-2025-68765] = "cpe-stable-backport: Backported in 6.18.2" CVE_STATUS[CVE-2025-68766] = "cpe-stable-backport: Backported in 6.18.2" +CVE_STATUS[CVE-2025-68767] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68768] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68769] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68770] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68771] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68772] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68773] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68774] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68775] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68776] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68777] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68778] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68779] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68780] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68781] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68782] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68783] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68784] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68785] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68786] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68787] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68788] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68789] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68790] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68791] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68792] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68793] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68794] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68795] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68796] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68797] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68798] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68799] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68800] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68801] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68802] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68803] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68804] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68805] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68806] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68807] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68808] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68809] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68810] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68811] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68812] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68813] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68814] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68815] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68816] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68817] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68818] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68819] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68820] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68821] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68822] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-68823] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71064] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71065] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71066] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71067] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71068] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71069] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71070] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71071] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71072] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71073] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71074] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71075] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71076] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71077] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71078] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71079] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71080] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71081] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71082] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71083] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71084] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71085] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71086] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71087] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71088] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71089] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71090] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71091] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71092] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71093] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71094] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71095] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71096] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71097] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71098] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71099] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71100] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71101] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71102] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71103] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71104] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71105] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71106] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71107] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71108] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71109] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71110] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71111] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71112] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71113] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71114] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71115] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71116] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71117] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71118] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71119] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71120] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71121] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71122] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71123] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71124] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71125] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71126] = "cpe-stable-backport: Backported in 6.18.3" + +CVE_STATUS[CVE-2025-71127] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71128] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71129] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71130] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71131] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71132] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71133] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71134] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71135] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71136] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71137] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71138] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71139] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71140] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71141] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71142] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71143] = "cpe-stable-backport: Backported in 6.18.4" + +CVE_STATUS[CVE-2025-71144] = "cpe-stable-backport: Backported in 6.18.5" + +CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.18.6" + +CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.18.6" + From patchwork Mon Jan 26 15:23:53 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 79696 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E4BB5D13C36 for ; Mon, 26 Jan 2026 15:24:07 +0000 (UTC) Received: from mail-qk1-f174.google.com (mail-qk1-f174.google.com [209.85.222.174]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.22094.1769441045412250945 for ; Mon, 26 Jan 2026 07:24:05 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=VJG09nvq; spf=pass (domain: gmail.com, ip: 209.85.222.174, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f174.google.com with SMTP id af79cd13be357-8c655e0ee70so587279685a.3 for ; Mon, 26 Jan 2026 07:24:05 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1769441044; x=1770045844; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=XhmK2ryI7Yquj9Dh0sDVeRuSnqsBQdUIyevqjlCuZZg=; b=VJG09nvqBO8+BSejx2Sx5V59icNGU71jZMv3gcXNdTj/ZTLg6DenkwPoTRzve9tKpH pZ5FOap2kWJsrljiH3xHmd0QbIT1vIdTnELl2+9pK/xFZv7XXXWCvplYLZT4NzA7TOAm GA5w8MpWjbIMRHBdQRxyGTIBZK3JmbbXYUdjB/vpL0RoioGE7euKgNWeCECu4HmxCG4E Czu+OhhQsejfubpcEOQrmWRPQ9q6WkciueqjYaz62gnxm99OyiXT4x+AKEsLwixm33o2 P9XPVGoUGqLV30ZU0iXMlTelYpBhP3Ni0/TTqtqjl3/1lARrN4HkOeQYnZtVurROJqH/ I6AA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769441044; x=1770045844; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=XhmK2ryI7Yquj9Dh0sDVeRuSnqsBQdUIyevqjlCuZZg=; b=Xo/mlizHmgSLgNMoIn3AIwZFR+5ogw3ygdqIJ/9eLYXDBK+TJMl2zSJa7bpM/kYWl/ YgpAjbD1gxlQHUEonp6v1VzU1y2o5inwc787Nf+1U5sDZLfFUtc4mly1JKovmKsEjZOu 3BiZtuqw2LWgmqseKKq3/16igZ7z7AaIBGO1BlMIFRQb8tfZRip7rYR6l9E36o+xsakQ Nc2MILkaNTnZ6jEBc7Oo4Dq5Fz+EwNKYJf/7+vWC6SBSKByO53gAnAC6nWGdH6icfoM3 JcCE42IBSznBBK3yMGxOSxswYBdQTfZDGD5de+I6LgKoIGKjZGwNM9w4nO52oJ2/Lb5j NY+g== X-Gm-Message-State: AOJu0YwlNq9ACYgT7YmT2GDMLHq5wXVb40jqJBLuRS3rP9X/0qwdJpcb fwIodvSFJoa0IxdJxOMWDIYpAZHeO8nFPNM6WXUP1SkVplBw/5xT47aEWlQyqTNqfYI= X-Gm-Gg: AZuq6aKIjNk2YqhcplZ+KR551EOBXEpgZC+DXQCBSUc21t7M++lrZ4ga9uXL+9cPx0n uxZIZsNonBYRu13UjBcfBwn1Xt5SSlDMlm51koJp9aBIgQFBs7lx7Ozwjf/4e1EfHbGf1/0njXN MWPKlcblHjZyPDV+BvkNdCmX3/5nvslSqUpUjdOEF2hwyshwzEHpV3Cq9JLa6FO6tWDe2AyheoY feMcfk9rItImaVAqhwkIYQP7OOSVGyZGsBD0ZGKo8dA2cgu1hJeHbkLOFZ40D75TUM/FP+j2kbu Gh/VMsNcvlqMtPIFu7bH6ZBS7c8Az6tygMaTwH216b2+fyuJA+pQc1WEvw7qaphDt8LWyEMLoRM VnDeCvJtZWfQ3JWdm2MfIQcvSTp+QtjvtgtVcQk2v9olwRDFOb+tqKvtm17fNhrwHLJuUlmYH47 XCZSSHSgGNptllcwqVnw/uK9KH3dFE9Mc8lcDjlAsNHgGPhD0KcqwHlgoEn760RyBWGGHaBRFXU xhU7NMbzr9Xzcg= X-Received: by 2002:a05:620a:4620:b0:8b1:728f:952e with SMTP id af79cd13be357-8c6f95fdbefmr555246585a.31.1769441044374; Mon, 26 Jan 2026 07:24:04 -0800 (PST) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id af79cd13be357-8c6e3870c48sm1044157185a.51.2026.01.26.07.24.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 26 Jan 2026 07:24:03 -0800 (PST) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [meta][PATCH 07/07] linux-yocto-dev: update to 6.19 Date: Mon, 26 Jan 2026 10:23:53 -0500 Message-ID: <20260126152353.2328046-8-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260126152353.2328046-1-bruce.ashfield@gmail.com> References: <20260126152353.2328046-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 26 Jan 2026 15:24:07 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/230018 From: Bruce Ashfield Bumping the -dev kernel to 6.19. Boot and tests have been run on all major architectures. Signed-off-by: Bruce Ashfield --- meta/recipes-kernel/linux/linux-yocto-dev.bb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-dev.bb b/meta/recipes-kernel/linux/linux-yocto-dev.bb index fb4e0864d2..2ca7777a5e 100644 --- a/meta/recipes-kernel/linux/linux-yocto-dev.bb +++ b/meta/recipes-kernel/linux/linux-yocto-dev.bb @@ -14,7 +14,7 @@ require recipes-kernel/linux/linux-yocto.inc # provide this .inc to set specific revisions include recipes-kernel/linux/linux-yocto-dev-revisions.inc -KBRANCH = "v6.18/standard/base" +KBRANCH = "v6.19/standard/base" KMETA = "kernel-meta" SRC_URI = "git://git.yoctoproject.org/linux-yocto-dev.git;branch=${KBRANCH};name=machine;protocol=https \ @@ -28,7 +28,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto-dev.git;branch=${KBRANCH};name SRCREV_machine ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}' SRCREV_meta ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}' -LINUX_VERSION ?= "6.18" +LINUX_VERSION ?= "6.19" LINUX_VERSION_EXTENSION ?= "-yoctodev-${LINUX_KERNEL_TYPE}" PV = "${LINUX_VERSION}+git"