From patchwork Thu Apr 23 15:44:52 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 86769 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id EBCBEFC0342 for ; Thu, 23 Apr 2026 15:45:22 +0000 (UTC) Received: from mail-qt1-f181.google.com (mail-qt1-f181.google.com [209.85.160.181]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.757.1776959114408280831 for ; Thu, 23 Apr 2026 08:45:14 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=b03VgtWC; spf=pass (domain: gmail.com, ip: 209.85.160.181, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f181.google.com with SMTP id d75a77b69052e-50fb4a7d704so27186481cf.1 for ; Thu, 23 Apr 2026 08:45:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776959113; x=1777563913; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=X8CwRnX1SyQ0W4uub0EHmOhkbPnRDovCh5+Fc2RWZoU=; b=b03VgtWCQVj1uLxUpbLngZveMM+jjHmqqTxrN49UAinnmDeS29Nn+ufefa/lWkPYlx QpokJ2/FhiL2SuY+2vwvB0nlBvQ2iS+nz2kAfN3YQ81voZ34G/MMh1EGOVtvC97grOGC hmt6Puhf0s4NhDLsldnLv4L9tWxEzG3Y6eZN04QEuHUmciUun93hAEBZbFD9Gvv0N9iA /8dzDjpImJ0lZ9mA3Nyt7SVEOGorEgSEZa/9SumhbMhCwy2o2YF5aizYgpBbeAE7yWZf a2IlLKJ2SquH2ek0Klps9s19B2kQXaF//xKpuwvZxWYlEUnbM8j9U9pNGsayrwZc1WpB tZoQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776959113; x=1777563913; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=X8CwRnX1SyQ0W4uub0EHmOhkbPnRDovCh5+Fc2RWZoU=; b=sL3jVegX9b4LnbEFZlvEVBR+xrOa5+fSja8EyIPabQJ4WtKODPZsWYfOyrILbZA37/ 4jnsRu+WyrmXkALA/DVCdAcF5KMX73mhNIlnC0WWmjP8cJxFm1TeSodw6gmOYc7GxPim ihEfm7fnT1G6+hdypkZzjCcfaHmW62tzjCuimJK6OJf1yAKV4EFGce+2FmiBaE04BGDy CpN87csw/4TOVFawC0pC8vxFNZKgNn0x/UB17S699GlHw8jbXrY1bgG8Q8C0LcpgzYGt Ju3e46eI2qWmRCFw298PH0iN5bfoXehYbskhFPB/S5PdXT2MuzhbqHLrGbw/4fIZ7ECP 9Y8A== X-Gm-Message-State: AOJu0YxEjiVVrWYsU9w7TVHGaF+jyON6Ug66WlILY/DUq1ZU4lM3fBoR iXdhUwrsbjOGphhV+c0Pi2X+mtKhqGZGUBe+8rH/BOSmKxff1NjGd8u+ZOPmEE1u X-Gm-Gg: AeBDietawu+svfWmSMIGSDDWr0MFhAvWmYsXM2ep8UnWhFp9p48WmtivBAca3mgYjnz BBt4H/C47Mvbk7lVbn8IZvAcAEzTiOs5E+RI/MdpzzowQd8yNYTQLGjNRYEOi9TzC1vMlMb4+sa 6TR77A5aKDZ7oYTPLoJdRxFkmk4ixzESzVZm+rPTLFloq67MjnNZcY3F/vd2egMPLa917riDT2J Gll6DUh8hk7fbUDDgNIayKMSzCqU0UPUglEeWchsjXSG23D71xuj6RioDbF9cFBZ2SjA3RaRxGi WngX6E61jxudGYP7fKkwf4KH8legpRC5BNUFCufZvVjTUWDh7HZjtPhJG7ha1yJQXJZJY8DCDSH /k+odTjZh47fXRLnxehfOUm6sAbO8ndUcDQyIUwS0yyRk/32kx+9LRRAD3wYEMD4vF75RgqcPC0 fUTuyBTc8GO0aCw2h2zREA+1hjGfUIJCWXOIrxHf1cC5ICcmWaIitAhCrTQE9UtCR1p/G4bKHFs 6leFtnkyK8UT6FjrnC5Zf7A60xtEfmQGyH+vZADJykioq0RfB98Ge3On70a43dKkSWuXA== X-Received: by 2002:ac8:5987:0:b0:509:25ab:f545 with SMTP id d75a77b69052e-50e368391c3mr410005601cf.11.1776959112327; Thu, 23 Apr 2026 08:45:12 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-50fb416b3f5sm74400031cf.28.2026.04.23.08.45.11 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Apr 2026 08:45:11 -0700 (PDT) From: bruce.ashfield@gmail.com To: yoann.congal@smile.fr Cc: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 01/18] linux-yocto/6.12: update to v6.12.72 Date: Thu, 23 Apr 2026 11:44:52 -0400 Message-ID: <20260423154509.1933646-2-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260423154509.1933646-1-bruce.ashfield@gmail.com> References: <20260423154509.1933646-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Apr 2026 15:45:22 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235801 From: Bruce Ashfield Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: 19b3cac2b50b5 Linux 6.12.72 2211d77892913 gpio: omap: do not register driver in probe() 5d810ba377edd wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add d9af3cf58bb4c PCI: endpoint: Avoid creating sub-groups asynchronously 1d411278dda29 xfs: fix UAF in xchk_btree_check_block_owner ae385826840a3 erofs: fix UAF issue for file-backed mounts w/ directio option 51223bdd0f60b mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() 9bef8beef1557 bus: mhi: host: pci_generic: Add Telit FE990B40 modem support 2a6bfa97d4d52 scsi: qla2xxx: Query FW again before proceeding with login 05fcd590e5fbb scsi: qla2xxx: Free sp in error path to fix system crash d70f71d4c92bc scsi: qla2xxx: Delay module unload while fabric scan in progress 387c26bf60042 scsi: qla2xxx: Allow recovery for tape devices 40ae93668226b scsi: qla2xxx: Validate sp before freeing associated memory 7d31dde1bd867 wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon() ea2278657ad0d nilfs2: Fix potential block overflow that cause system hang 687e1d4af79c3 crypto: virtio - Remove duplicated virtqueue_kick in virtio_crypto_skcipher_crypt_req c0a0ded3bb7fd crypto: virtio - Add spinlock protection with virtqueue notification c184341920ed7 crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly 1ff337fc7cefe crypto: octeontx - Fix length check to avoid truncation in ucode_load_store c77b33b585127 crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode 52b6e7417ff76 Bluetooth: btusb: Add USB ID 7392:e611 for Edimax EW-7611UXB cd0e0a76e40c2 driver core: enforce device_lock for driver_match_device() baf664fc90a61 smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() f7b1c2f5642bb ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths 3eaa22d688311 smb: client: split cached_fid bitfields to avoid shared-byte RMW races ae591174b1f2e Linux 6.12.71 aa9f6f353bcc3 vsock/test: verify socket options after setting them ceab30fec9ed2 io_uring/rw: recycle buffers manually for non-mshot reads 4ce768ac429ec net: tunnel: make skb_vlan_inet_prepare() return drop reasons 88969c951665e Linux 6.12.70 c1ae8301551f3 gpiolib-acpi: Update file references in the Documentation and MAINTAINERS 833a9452f59f4 ALSA: hda/realtek: Really fix headset mic for TongFang X6AR55xU. 6d6b23aada49c spi: tegra114: Preserve SPI mode bits in def_command1_reg 075415ae18b5b spi: tegra: Fix a memory leak in tegra_slink_probe() 947e6c7ba1578 spi: tegra210-quad: Protect curr_xfer clearing in tegra_qspi_non_combined_seq_xfer 6fd446178a610 spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer f5a8a27e6eea4 spi: tegra210-quad: Protect curr_xfer assignment in tegra_qspi_setup_transfer_one 62059d8ac0acf spi: tegra210-quad: Move curr_xfer read inside spinlock 69079e7b26d55 spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed transfer c9c14d2abe4c5 ASoC: amd: fix memory leak in acp3x pdm dma ops ae0aad8c49df8 ALSA: usb-audio: fix broken logic in snd_audigy2nx_led_update() d8143c54ceeba ipv6: Fix ECMP sibling count mismatch when clearing RTF_ADDRCONF 1444ff890b465 netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() 09dc5be323d4f hwmon: (occ) Mark occ_init_attribute() as __printf c0de1cc6a6943 drm/xe/pm: Disable D3Cold for BMG only on specific platforms c8a5ec95c9616 drm/xe/pm: Also avoid missing outer rpm warning on system suspend 422f646b4ab50 drm/xe/query: Fix topology query pointer advance 1aacebe9d4ccb drm/mgag200: fix mgag200_bmc_stop_scanout() b83557bc6f560 net: gro: fix outer network offset 642c8a50df4c7 net: ethernet: adi: adin1110: Check return value of devm_gpiod_get_optional() in adin1110_check_spi() d4d5d152d94f6 drm/amd/display: fix wrong color value mapping on MCM shaper LUT 5003e92af2b90 tipc: use kfree_sensitive() for session key material 73585e603dee8 net: don't touch dev->stats in BPF redirect paths 61c8091b7937f net: usb: r8152: fix resume reset deadlock 986967a162142 macvlan: fix error recovery in macvlan_common_newlink() 4a15468051d2c net: sfp: Fix quirk for Ubiquiti U-Fiber Instant SFP module d8f3c5b5543cf net: sfp: convert sfp quirks to modify struct sfp_module_support 248c29a4d3e47 net: sfp: pre-parse the module support ecd57017429e3 net: phy: add phy_interface_copy() 4dc7b69bca8ef net: phy: add phy_interface_weight() 2447edc367800 dpaa2-switch: add bounds check for if_id in IRQ handler 52b19b3a22306 net: liquidio: Fix off-by-one error in VF setup_nic_devices() cleanup f86bd16280a0f net: liquidio: Fix off-by-one error in PF setup_nic_devices() cleanup 1d4590fde856c net: liquidio: Initialize netdev pointer before queue setup 4acc40db06ffd dpaa2-switch: prevent ZERO_SIZE_PTR dereference when num_ifs is zero e41a23e61259f net/sched: cls_u32: use skb_header_pointer_careful() 8b6c7f1476646 net: add skb_header_pointer_careful() helper b64e3b5d8d759 smb/client: fix memory leak in smb2_open_file() 2b5e6819ff7ee platform/x86/intel/tpmi/plr: Make the file domain/status writeable bd3ecd6018cb5 platform/x86: hp-bioscfg: Skip empty attribute names 177f8c06e879f platform/x86: intel_telemetry: Fix PSS event register mask bf0474356875d platform/x86: toshiba_haps: Fix memory leaks in add/remove routines 071982199b47a ALSA: hda/realtek: ALC269 fixup for Lenovo Yoga Book 9i 13IRU8 audio a928eecf030a9 btrfs: reject new transactions if the fs is fully read-only 586c628c0bdd8 wifi: mac80211: don't increment crypto_tx_tailroom_needed_cnt twice 29443629fe745 wifi: mac80211: correctly check if CSA is active 48fe983e92de2 scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() 2901d799a26d9 ALSA: hda/realtek: Fix headset mic for TongFang X6AR55xU 41b86a9ec037b scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() 30f1507376d6e wifi: cfg80211: Fix bitrate calculation overflow for HE rates 811b45e2d795d regmap: maple: free entry on mas_store_gfp() failure 70b24ad9d84a9 spi: hisi-kunpeng: Fixed the wrong debugfs node name in hisi_spi debugfs initialization 58df2eca707c2 ASoC: tlv320adcx140: Propagate error codes during probe 1c1c8fafa0b91 ASoC: amd: yc: Fix microphone on ASUS M6500RE 6e0c7503a5803 nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() fa301aef50e3f nvme-fc: release admin tagset if init fails 1d5c634789492 ASoC: simple-card-utils: Check device node before overwrite direction e07de198dbcca ASoC: davinci-evm: Fix reference leak in davinci_evm_probe 66a7153fd67c8 wifi: mac80211: collect station statistics earlier when disconnect 95d2a20ae6873 HID: logitech: add HID++ support for Logitech MX Anywhere 3S 4cd8f9799981b ring-buffer: Avoid softlockup in ring_buffer_resize() during memory free c1853ebbec980 drm/amd/pm: Disable MMIO access during SMU Mode 1 reset ff8a020151798 HID: Apply quirk HID_QUIRK_ALWAYS_POLL to Edifier QR30 (2d99:a101) 786ec171788bd HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report() 81a074334c01f HID: quirks: Add another Chicony HP 5MP Cameras to hid_ignore_list 3521db9fcbd22 netfilter: replace -EEXIST with -EBUSY beb54a7f9c674 PCI: qcom: Remove ASPM L0s support for MSM8996 SoC dc60a7d2dc78b ALSA: hda/realtek: add HP Laptop 15s-eq1xxx mute LED quirk 04818a914fdce ALSA: hda/realtek: Add quirk for Acer Nitro AN517-55 cba4664a19f5a HID: playstation: Center initial joystick axes to prevent spurious events 40c3f16aa7235 HID: intel-ish-hid: Reset enum_devices_done before enumeration c45848936ebdb riscv: Sanitize syscall table indexing under speculation f3ee1732851ae btrfs: fix reservation leak in some error paths when inserting inline extent 626f39c9c8ed3 HID: multitouch: add MT_QUIRK_STICKY_FINGERS to MT_CLS_VTL 367ec17610106 HID: intel-ish-hid: Update ishtp bus match to support device ID table 8a15107c4c031 smb/server: fix refcount leak in parse_durable_handle_context() c49a28068363f LoongArch: Enable exception fixup for specific ADE subcode 39ca11ff158c9 smb/server: fix refcount leak in smb2_open() 165d1359f945b md: suspend array while updating raid_disks via sysfs 380d7c1af4bd3 LoongArch: Set correct protection_map[] for VM_NONE/VM_SHARED ac18761b530b5 smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe() 5fa0faf0e4d08 block,bfq: fix aux stat accumulation destination e297a64beff9f net: usb: sr9700: support devices with virtual driver CD 71de0b6e04bbe wifi: wlcore: ensure skb headroom before skb_push 536447521b3b9 wifi: mac80211: ocb: skip rx_no_sta when interface is not joined 76d035271e120 tracing: Fix ftrace event field alignments b9b97e6aeb534 procfs: avoid fetching build ID while holding VMA lock 87ff11143615c KVM: selftests: Add -U_FORTIFY_SOURCE to avoid some unpredictable test failures ee5e42e9a59ac binderfs: fix ida_alloc_max() upper bound 9eec6f49d3fae binder: fix BR_FROZEN_REPLY error log 5b5228964619b hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() 9bcc47343ee0e ublk: fix deadlock when reading partition table d288ba832d92d tools/power turbostat: fix GCC9 build regression 58130e7ce6cb6 PCI/ERR: Ensure error recoverability at all times ff48c9312d042 KVM: Don't clobber irqfd routing type when deassigning irqfd 5b794951541e8 Revert "drm/amd: Check if ASPM is enabled from PCIe subsystem" dfc3ab6bd6486 mm, shmem: prevent infinite loop on truncate race fe787920fac00 gve: Correct ethtool rx_dropped calculation 9fa0a755db3e1 gve: Fix stats report corruption on queue count change 8c9af7339de41 ceph: fix oops due to invalid pointer for kfree() in parse_longname() 60645e27e3ec6 ARM: 9468/1: fix memset64() on big-endian 41ededf7ef153 rbd: check for EOD after exclusive lock is ensured to be held c6f8326f26bd2 ceph: fix NULL pointer dereference in ceph_mds_auth_match() b8bc72587c79f mm/slab: Add alloc_tagging_slab_free_hook for memcg_alloc_abort_single 4390dcdabb5fc pmdomain: imx8m-blk-ctrl: fix out-of-range access of bc->domains e142106ee355e pmdomain: imx8mp-blk-ctrl: Keep usb phy power domain on for system wakeup b8ea101959ab1 pmdomain: imx: gpcv2: Fix the imx8mm gpu hang due to wrong adb400 reset fb14cb9a1cd69 pmdomain: imx8mp-blk-ctrl: Keep gpc power domain on for system wakeup ab99415e30f22 pmdomain: qcom: rpmpd: fix off-by-one error in clamping to the highest state bad15420050db ALSA: aloop: Fix racy access at PCM trigger e6ff2ebff427b platform/x86: intel_telemetry: Fix swapped arrays in PSS output 917ccf6fd180a x86/kfence: fix booting on 32bit non-PAE systems 2f467a92df61e x86/vmware: Fix hypercall clobbers 19672ae68d52f nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 5816902a7f..0f21f2e4d5 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -15,13 +15,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "35d6569f165579f64f76cbdfd1feb41a2b5359ec" -SRCREV_meta ?= "5b1ff7df002df6e7069a53b361d9e8f5f9df3aac" +SRCREV_machine ?= "6adb3759af2b8904cab35fdb1b40c12e17e313c1" +SRCREV_meta ?= "5025770c6104c36f0b102a1a813ee23d7151a755" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.69" +LINUX_VERSION ?= "6.12.72" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 5828ff986b..7cea4ea4f7 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc include recipes-kernel/linux/cve-exclusion.inc include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.69" +LINUX_VERSION ?= "6.12.72" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c" -SRCREV_meta ?= "5b1ff7df002df6e7069a53b361d9e8f5f9df3aac" +SRCREV_machine ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" +SRCREV_meta ?= "5025770c6104c36f0b102a1a813ee23d7151a755" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index 91b013f498..6f9906fb74 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "4c24c5ab253ea3f46bb578fe43d25877bc269206" -SRCREV_machine:qemuarm64 ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c" -SRCREV_machine:qemuloongarch64 ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c" -SRCREV_machine:qemumips ?= "377285b4e49c411f89784c6b1c374dbfb634e253" -SRCREV_machine:qemuppc ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c" -SRCREV_machine:qemuriscv64 ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c" -SRCREV_machine:qemuriscv32 ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c" -SRCREV_machine:qemux86 ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c" -SRCREV_machine:qemux86-64 ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c" -SRCREV_machine:qemumips64 ?= "f2e77270b007d80acbfc32114e81d1abc411e8b4" -SRCREV_machine ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c" -SRCREV_meta ?= "5b1ff7df002df6e7069a53b361d9e8f5f9df3aac" +SRCREV_machine:qemuarm ?= "c4d3cba9c7fe4e4f7275fdaa50e35d479108813f" +SRCREV_machine:qemuarm64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" +SRCREV_machine:qemuloongarch64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" +SRCREV_machine:qemumips ?= "e5e61bd34c2ce267b67502f95dd3f11dfdb5c77e" +SRCREV_machine:qemuppc ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" +SRCREV_machine:qemuriscv64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" +SRCREV_machine:qemuriscv32 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" +SRCREV_machine:qemux86 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" +SRCREV_machine:qemux86-64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" +SRCREV_machine:qemumips64 ?= "482153ceffc764c453274f27e950fee03a0fe17e" +SRCREV_machine ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" +SRCREV_meta ?= "5025770c6104c36f0b102a1a813ee23d7151a755" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "ff2177382799753070b71747f646963147eabc7c" +SRCREV_machine:class-devupstream ?= "19b3cac2b50b53cc000b4cd795415c7d03484707" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.69" +LINUX_VERSION ?= "6.12.72" PV = "${LINUX_VERSION}+git" From patchwork Thu Apr 23 15:44:53 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 86772 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3D576FC036C for ; Thu, 23 Apr 2026 15:45:23 +0000 (UTC) Received: from mail-qt1-f180.google.com (mail-qt1-f180.google.com [209.85.160.180]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.758.1776959115103682485 for ; Thu, 23 Apr 2026 08:45:15 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=tK4s32S0; spf=pass (domain: gmail.com, ip: 209.85.160.180, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f180.google.com with SMTP id d75a77b69052e-506a7bbe9d0so57358361cf.0 for ; Thu, 23 Apr 2026 08:45:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776959114; x=1777563914; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=kwAPokX0WIMnzGCRD4QVnd0tdfZyul39/vNJscsgxXE=; b=tK4s32S04uIhuNZTxcxHhFBFalnpZGYCH1VI5rjozKNaWb+NBFhnXrPLqKQVGMHNVR RS1EkTsGp3+gGLGVywZaQd4O+DRC2Hv9o3lzV5KIgGjO6KD2ikrthe8Ri31OnlvTxChz 1XocpHf07R+0LwySIzoYTM7CxdELAsvLV2MBFzjvx/BHzGJT5HxybbU5yWwd+6PLZv+K wxs94/JZLcUjBiiNS09SoEBUk2zJv/exDAco+0Z3CWDq2BDmXpVaFK97sTdHaXgh+it9 2ra5zB9ke8liDQUglGABTrUizf0zekgcxv5vY84Ktpwe11iXZOMDRYfW6ruIdV/FskTc h3JQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776959114; x=1777563914; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=kwAPokX0WIMnzGCRD4QVnd0tdfZyul39/vNJscsgxXE=; b=TTtnTxAvUTu3aVoYWNs36BLKY9oHvxTK+z0rFxOeeXJ78xwK5sfWCUwQMLHPBaX6fY fE72HT6ZrSSLC1SromXoog0SCE46IMXpUelnJQsFIrS7hMGizpWjk2HmLskpcNuhKDJ/ qOF1tmadn1tpEIZr+ypw3tHcFq9j1OXbJ8BcFtLDYuvmz5q863ux76tCc6BQa8BF2deh aYDemrThixdxZkLRQUmtgQANR5l42Vf6/uD2QgFomqUIvm67MpMQe3PDjRmN6YzgeZkL zpXqO9oCtCLH+h27VjAEJWtIHDJn2hrTyWWHbB5XZnE+j9zmMSgQ+bXyQodZ70/Dojn1 Ir3w== X-Gm-Message-State: AOJu0YxUZctxWUN3uTvsxx/ghOHUcMN06YG1mfLdD0wPuAdDzuXoSS0k ex6POfws1Tsr6oBMe40v/O/ByBtzBGwcLPIgDSe9npAmcT17JhgO9ul8Bd+X2yJm X-Gm-Gg: AeBDiesuouR90T3L2M29yFWULxh2oRtsScubKbG6vSvjrpcutFVeFkxhdGjhr8jAa82 gyN3KE9Q05Ipv8C/dZyxDqjDNnxUWRgzXPvauTYdBwRXscN7k/qTNsobsP13SwXVdBLueG168OU lShAXdz0rpf4PaFsrp3R5WgYtTAMZuEajZwb6c2M9p1/JPTp5XFhT3u3S5V2Dyc6Z4Yh+MjIyZo OORlaTIbSMmwCrzEs+NWg6A8E2wMkv21v3wXijr9j4phfiL3mhVMtk67+d/xXTILxcM2S0uYrzH 9EMZ/szYUi43NzcKuemJlBd0Wa0jZ5UOLFJiV1Z45XvV73G52O7qkaZxEiuce+/u2Wgh7Aas2YQ /rAu20tX+RJ14O7BrGAOZx6xCFBUAfmh5h2vfF2gEtIHwPih0Oh7YFjOGy3Yav9SPUhbg0O4JoF s5LNmPB2c2sNRqIv5B4/bnAwx79C7S8/e/XH+wY4v7RS+4/iHoNFKdW7gAdkDb5DMm6qnnvrJqn HUV24FlLAd/Ygf1N8eZSRyJM023Mq4mahSWTPpi3bx+TVTzOyXSuDj5sRs37zFLWYMmAw== X-Received: by 2002:a05:622a:d19:b0:50d:b164:5e40 with SMTP id d75a77b69052e-50e42a2fe3cmr276449151cf.37.1776959113702; Thu, 23 Apr 2026 08:45:13 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-50fb416b3f5sm74400031cf.28.2026.04.23.08.45.12 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Apr 2026 08:45:13 -0700 (PDT) From: bruce.ashfield@gmail.com To: yoann.congal@smile.fr Cc: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 02/18] linux-yocto/6.12: update CVE exclusions (6.12.72) Date: Thu, 23 Apr 2026 11:44:53 -0400 Message-ID: <20260423154509.1933646-3-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260423154509.1933646-1-bruce.ashfield@gmail.com> References: <20260423154509.1933646-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Apr 2026 15:45:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235802 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 1 changes (0 new | 1 updated): - 0 new CVEs: - 1 updated CVEs: CVE-2025-7195 Date: Mon, 16 Feb 2026 17:05:40 +0000 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.12.inc | 232 +++++++++++++++++- 1 file changed, 225 insertions(+), 7 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 64477c364e..089446fe87 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-02-10 02:33:33.917945+00:00 for kernel version 6.12.69 -# From linux_kernel_cves cve_2026-02-10_0100Z +# Generated at 2026-02-16 17:20:15.768713+00:00 for kernel version 6.12.72 +# From linux_kernel_cves cve_2026-02-16_1600Z-3-gf0e5d9ffdc0 python check_kernel_cve_status_version() { - this_version = "6.12.69" + this_version = "6.12.72" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -18980,7 +18980,7 @@ CVE_STATUS[CVE-2025-40080] = "cpe-stable-backport: Backported in 6.12.53" CVE_STATUS[CVE-2025-40081] = "cpe-stable-backport: Backported in 6.12.53" -CVE_STATUS[CVE-2025-40082] = "fixed-version: only affects 6.17 onwards" +CVE_STATUS[CVE-2025-40082] = "cpe-stable-backport: Backported in 6.12.70" CVE_STATUS[CVE-2025-40083] = "cpe-stable-backport: Backported in 6.12.57" @@ -20066,8 +20066,6 @@ CVE_STATUS[CVE-2025-68787] = "cpe-stable-backport: Backported in 6.12.64" CVE_STATUS[CVE-2025-68788] = "cpe-stable-backport: Backported in 6.12.64" -CVE_STATUS[CVE-2025-68789] = "cpe-stable-backport: Backported in 6.12.64" - CVE_STATUS[CVE-2025-68790] = "fixed-version: only affects 6.18 onwards" CVE_STATUS[CVE-2025-68791] = "fixed-version: only affects 6.14 onwards" @@ -20134,7 +20132,7 @@ CVE_STATUS[CVE-2025-68821] = "cpe-stable-backport: Backported in 6.12.64" CVE_STATUS[CVE-2025-68822] = "cpe-stable-backport: Backported in 6.12.64" -# CVE-2025-68823 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2025-68823] = "cpe-stable-backport: Backported in 6.12.70" CVE_STATUS[CVE-2025-71064] = "cpe-stable-backport: Backported in 6.12.64" @@ -20376,6 +20374,26 @@ CVE_STATUS[CVE-2025-71198] = "cpe-stable-backport: Backported in 6.12.68" CVE_STATUS[CVE-2025-71199] = "cpe-stable-backport: Backported in 6.12.68" +CVE_STATUS[CVE-2025-71200] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2025-71201] = "fixed-version: only affects 6.14 onwards" + +# CVE-2025-71202 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2025-71203] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2025-71204] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2025-71220] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2025-71221 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2025-71222] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2025-71223] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2025-71224] = "cpe-stable-backport: Backported in 6.12.70" + CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66" CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.12.66" @@ -20646,3 +20664,203 @@ CVE_STATUS[CVE-2026-23109] = "fixed-version: only affects 6.16 onwards" CVE_STATUS[CVE-2026-23110] = "cpe-stable-backport: Backported in 6.12.68" +CVE_STATUS[CVE-2026-23111] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23112] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23113] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23114] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23115] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23116] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23117] = "fixed-version: only affects 6.18.2 onwards" + +CVE_STATUS[CVE-2026-23118] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23119] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23120] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23121] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23122] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23123] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23124] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23125] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23126] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23127] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23128] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23129] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23130] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23131] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23132] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23133] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23134] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23135] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23136] = "cpe-stable-backport: Backported in 6.12.66" + +# CVE-2026-23137 needs backporting (fixed from 6.19) + +# CVE-2026-23138 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23139] = "cpe-stable-backport: Backported in 6.12.66" + +CVE_STATUS[CVE-2026-23140] = "cpe-stable-backport: Backported in 6.12.66" + +CVE_STATUS[CVE-2026-23141] = "cpe-stable-backport: Backported in 6.12.67" + +CVE_STATUS[CVE-2026-23142] = "cpe-stable-backport: Backported in 6.12.67" + +CVE_STATUS[CVE-2026-23143] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23144] = "cpe-stable-backport: Backported in 6.12.67" + +CVE_STATUS[CVE-2026-23145] = "cpe-stable-backport: Backported in 6.12.67" + +CVE_STATUS[CVE-2026-23146] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23147] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23148] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23149] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23150] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23151] = "cpe-stable-backport: Backported in 6.12.69" + +# CVE-2026-23152 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23153] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23154] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23155] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23156] = "cpe-stable-backport: Backported in 6.12.69" + +# CVE-2026-23157 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23158] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23159] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23160] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23161] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23162] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23163] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23164] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23165] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23166] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23167] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23168] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23169] = "cpe-stable-backport: Backported in 6.12.72" + +CVE_STATUS[CVE-2026-23170] = "cpe-stable-backport: Backported in 6.12.69" + +# CVE-2026-23171 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23172] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23173] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23174] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23175] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23176] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23177] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23178] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23179] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23180] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23181] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23182] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23183] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23184] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23185] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23186] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23187] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23188] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23189] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23190] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23191] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23192] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23193] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23194] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23195] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23196] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23197] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23198] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23199] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23200] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23201] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23202] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23203] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23204] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23205] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23206] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23207] = "fixed-version: only affects 6.18.2 onwards" + +# CVE-2026-23208 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23209] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2026-23210 needs backporting (fixed from 6.19) + From patchwork Thu Apr 23 15:44:54 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 86768 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id F385DFC0368 for ; Thu, 23 Apr 2026 15:45:22 +0000 (UTC) Received: from mail-qt1-f170.google.com (mail-qt1-f170.google.com [209.85.160.170]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.691.1776959115984906197 for ; Thu, 23 Apr 2026 08:45:16 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=OS8O/dYu; spf=pass (domain: gmail.com, ip: 209.85.160.170, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f170.google.com with SMTP id d75a77b69052e-506a747448dso49940221cf.0 for ; Thu, 23 Apr 2026 08:45:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776959115; x=1777563915; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=vm3uEiZBvQIZXNkj0aaK4zNa/LF6pynh1I2T3x8KkR8=; b=OS8O/dYuQ5pcws96OXLDuqN5GqXfWK6qV95eryU+4GFRK9150FFCps4cbJq1o3GyPm LpmzWWi0sFlvuY9ugJHS4+kTJyOk00HTYN1WPug5Gg8VeFbyL+KEJsyk39J8hX51mmsO y8U5pLR8n+GCP5aMlABuFVRuY/ELYAjOneXPKhxtAwiVCAPYVYQ8msPFin8km2ct3X85 OCrpSG68y4ls/NgRg3cIuFhrguM0JtGG3nPwywZ6JqImt/SXYBdt6hUlaCKNi+KDsXcG bLFdEX0kN8qPqCurxsi30inBgdxFao5McmfCNK9onfV8gj6s5/q3/cNzZ67yMzVGn6S3 E/Hw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776959115; x=1777563915; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=vm3uEiZBvQIZXNkj0aaK4zNa/LF6pynh1I2T3x8KkR8=; b=l6JKiQGYSyoRpcqIbtiaVUHwNrwwSe2m95gj1fffQzjCq0FJmFpNMueGk/n5Hi/hXO 2u2j+pY12MxQu7C24JZKCLDM4uoAMPpn9UfNYN5pU4PKII9xKxISeJ90npxMdgp0emSW x6BLV01A1UojOu1sbcAFy+5a7dIBixQ37xxLU2Ivj3EAeclC1siKMyNHqpQZJoRklZO8 pFxwXEVIu57lfFwUniyVXe7CDLoh9FAWiAIlQ74pNLmqvWwMt+pmmMrmsMyn3Q/nNFbr QSfmoTbgI3e749KOlb3x4dZaQz00f30ZoIJdANigILQR2rGUuJR4IxXoHmC8b3QRC5Ra eJWQ== X-Gm-Message-State: AOJu0YxPjyuQPGhFmWEGXWmSfTc+fIFllPcTlkIUORyMEgbgtAWU0I2S V0APXkrOwm+xd95yjpZKJmxIJV9w1ehg6EQIwZOZvwpm3L84QxClM4r1f0SbYipV X-Gm-Gg: AeBDietc5MwDAroH6BMH0i0o2CYWCiIdCkARfnUcZxt0SO5SDPfpSIrbofulyB820ht f1w9PwKT/o2p6t/FNsYRokfzQTRRUyEfnhCR0w5g8gwNMh0vgMmKhbxVKYpbeSJ2QQf6SF4D4+G ugNvG4wxaevtSBFZpDH2kcBiJuWN+6CAHX5z0eIPQzWZhb1XCTNDgP1aNnpmD7NvW3LnNXxqM5D e3wrfxWOP/gHhWy9Du930WHXmnv2cpUehRm0bAoFZ1m5hk11mWGWwXFLv3HEmwCfNui7IPy9A23 y6YSWTMGeurIenmG8rPV5cmGZ+EXGc4ZZVIjDNgD/w+I1o5d3tTLkinvNN21yBNIW+UDk+FpKtb DpvMPnw495HJ1plYlPt5v0KtIn4vUXPHPyQK1NFKpecVn+wNfelL/6KvgDWAm/KUZNRsbsMtCnN 5SRDcxW/1tP2gjo7IjG8vvT8UDRsOpWyqhy6cj/8OFCZOUfJELLFevvsIqhbFvd3KXtMmhLWCxw pqmSuGkoeQcnAf9zXFdIwsK++8ac+MjmZW9r6a/O1qwJq+C++3JmffI7u+D2tpxhfce7rO0NYkJ aarv X-Received: by 2002:a05:622a:1b1e:b0:50e:a1aa:2cd9 with SMTP id d75a77b69052e-50ea1aa2fafmr234789351cf.15.1776959114814; Thu, 23 Apr 2026 08:45:14 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-50fb416b3f5sm74400031cf.28.2026.04.23.08.45.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Apr 2026 08:45:14 -0700 (PDT) From: bruce.ashfield@gmail.com To: yoann.congal@smile.fr Cc: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 03/18] linux-yocto/6.12: update to v6.12.73 Date: Thu, 23 Apr 2026 11:44:54 -0400 Message-ID: <20260423154509.1933646-4-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260423154509.1933646-1-bruce.ashfield@gmail.com> References: <20260423154509.1933646-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Apr 2026 15:45:22 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235803 From: Bruce Ashfield Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: 5fb0303f6cb6a Linux 6.12.73 a7fa9460b86f8 Revert "driver core: enforce device_lock for driver_match_device()" Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 0f21f2e4d5..4572915cf4 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -15,13 +15,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "6adb3759af2b8904cab35fdb1b40c12e17e313c1" -SRCREV_meta ?= "5025770c6104c36f0b102a1a813ee23d7151a755" +SRCREV_machine ?= "1be6d1eaceba0860348c41af8951ccebfa5aa2c8" +SRCREV_meta ?= "6d166217a8feea3a7e961be354ea9deabeb8d356" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.72" +LINUX_VERSION ?= "6.12.73" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 7cea4ea4f7..d5c1c8c052 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc include recipes-kernel/linux/cve-exclusion.inc include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.72" +LINUX_VERSION ?= "6.12.73" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" -SRCREV_meta ?= "5025770c6104c36f0b102a1a813ee23d7151a755" +SRCREV_machine ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" +SRCREV_meta ?= "6d166217a8feea3a7e961be354ea9deabeb8d356" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index 6f9906fb74..5b6bf7ef0a 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "c4d3cba9c7fe4e4f7275fdaa50e35d479108813f" -SRCREV_machine:qemuarm64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" -SRCREV_machine:qemuloongarch64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" -SRCREV_machine:qemumips ?= "e5e61bd34c2ce267b67502f95dd3f11dfdb5c77e" -SRCREV_machine:qemuppc ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" -SRCREV_machine:qemuriscv64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" -SRCREV_machine:qemuriscv32 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" -SRCREV_machine:qemux86 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" -SRCREV_machine:qemux86-64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" -SRCREV_machine:qemumips64 ?= "482153ceffc764c453274f27e950fee03a0fe17e" -SRCREV_machine ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" -SRCREV_meta ?= "5025770c6104c36f0b102a1a813ee23d7151a755" +SRCREV_machine:qemuarm ?= "a7cf22192ce38f303c8a5070b750583953a34e09" +SRCREV_machine:qemuarm64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" +SRCREV_machine:qemuloongarch64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" +SRCREV_machine:qemumips ?= "9a4ed79b88cab20c169656abe310068f8cdab2c3" +SRCREV_machine:qemuppc ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" +SRCREV_machine:qemuriscv64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" +SRCREV_machine:qemuriscv32 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" +SRCREV_machine:qemux86 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" +SRCREV_machine:qemux86-64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" +SRCREV_machine:qemumips64 ?= "0a68bc37afffea25aa627239d1de74f4b7088824" +SRCREV_machine ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" +SRCREV_meta ?= "6d166217a8feea3a7e961be354ea9deabeb8d356" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "19b3cac2b50b53cc000b4cd795415c7d03484707" +SRCREV_machine:class-devupstream ?= "5fb0303f6cb6a89bcfb19bd7a68cb793c86e78b2" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.72" +LINUX_VERSION ?= "6.12.73" PV = "${LINUX_VERSION}+git" From patchwork Thu Apr 23 15:44:55 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 86770 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4E564FC0371 for ; Thu, 23 Apr 2026 15:45:23 +0000 (UTC) Received: from mail-qt1-f182.google.com (mail-qt1-f182.google.com [209.85.160.182]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.760.1776959117664892764 for ; Thu, 23 Apr 2026 08:45:17 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=U3F6+6nV; spf=pass (domain: gmail.com, ip: 209.85.160.182, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f182.google.com with SMTP id d75a77b69052e-50d6ab4476eso66678431cf.2 for ; Thu, 23 Apr 2026 08:45:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776959117; x=1777563917; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=G8PT5RIl3u0/DfOU8FQjySVM06upXMSsW7Hdcec0z0Q=; b=U3F6+6nV+ue7sezZy8HG5jTxPo2Muk9clgqk6ZOylobWwc61UfpVGcQh5M0uW/vfTR 9XpWFhpmdPD64zrpxr9wX4ZXv22DebTdJKLExGyitYeuGFGM5IHFwMmM5vAc5b5VEiHZ ZUbXBINYkq2a5MzKCOrMYmhL5vJqewTrKmVEjZj/45JzXkrQBAbczofR5fOozN7bsgwF yvc3yprrZBVu1bP6mMcyLujfpWmwvxk3vfGyFeOU8mLc8ZTa1AC7ioHzukRd0YnXuej4 7PVUqVCDKm4LH5hrwyBwQ82xvV9zI1Z+rStTd0g6F0MaMM7KXSAQA4lQWsxrxjaeoxtL mf3Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776959117; x=1777563917; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=G8PT5RIl3u0/DfOU8FQjySVM06upXMSsW7Hdcec0z0Q=; b=D07C6qKZKM+5RXGG0LIa3xmdVcNIOn5gToRrKfgrq0AqD/0pLYYDwmOYLW17+GLm7f khsB/rpKENxpOcmBOHpjmsWUEKkhcdlGV2NEwoOZPOz7iR8RB7WKHswojWBtRBIgC/Dk Zm7JD4NFZuC68sD2BZtZH5beGXf0YIXDwpjZ1Q4u5LiS56bdePIpbXeGcMgLPIRreQrW MQKYHJeC49sSj/ld1gE9U3WdEqpiZxD29hqpQqVslgFww3CpA75oMhMV/VdkhsrCVbO8 OmYSOyZ7Z8IOmUaG7TgJPAuXsuzPqc4ezbB9qN7UnkG6ickaoZlZVc1S7E9ydRm2LAvM q3Aw== X-Gm-Message-State: AOJu0YzXmGpl99d1CcJznOWUOCfkwX5MHWInbdGdSlyRmzhVlpeUaCvP E+aDzlDVhFOne2iGtGb2677uELeYqb/x5Xy2hCOir4a1q1bqtMIaS4EPno3RcNNG X-Gm-Gg: AeBDieuvSKByWvIyFSCbiP+4NsK2NbA/pC7NP+2lAtk4LTpug0XWpavYjXRG3yBiVd9 HziaetmJeIQ4iC4HY9WfI8N5o3IIrE6khWCjlnDwcuc9uhc3LlFkaN2qBKTbiHqLLF/kpJLN5tS 2GIbhA5kt8LagDIuC1NPZFt45hr/FFwk+POAzsLGCV9nCX6pDm2AgEsWKivhLfd7ApeAQY3Hb1S enA3ToyVnIaogBqBK1HDwUq1ZaNLwQbeqJurAPNWXKbboRgfh9VjMTbxpOJi9F5JvBYgCIa1r0W NrWZwcOML00v1ID3I9Xg0PViGIZhQ4rrwGnTWEhlarjXwsxO+jBVgLCywyyk9BwNpqz5V8En4J6 q9hum2wVsiKijhf+hHfrL+j00Yy2zk82ex3/R8mnqeY0hJ+ldcCCKMDxRv8rLwf9K5ffa6d2suV h76dfUm8R9o4Ja2i78iWud4Jjp4UDILY2pYzBUWHfETRBg4LXNmYEHi8jslF4t55YMPDSOLoAeK K6kneU+QHUUsN62QYLcfZww+JA0ejaKhEXwoM9Q0yDnAVnYRRKMyBKbf7NC17IDCfnh1g== X-Received: by 2002:ac8:5f4d:0:b0:50f:135e:d68 with SMTP id d75a77b69052e-50f135e1259mr237515961cf.58.1776959116198; Thu, 23 Apr 2026 08:45:16 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-50fb416b3f5sm74400031cf.28.2026.04.23.08.45.14 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Apr 2026 08:45:15 -0700 (PDT) From: bruce.ashfield@gmail.com To: yoann.congal@smile.fr Cc: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 04/18] linux-yocto/6.12: update CVE exclusions (6.12.73) Date: Thu, 23 Apr 2026 11:44:55 -0400 Message-ID: <20260423154509.1933646-5-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260423154509.1933646-1-bruce.ashfield@gmail.com> References: <20260423154509.1933646-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Apr 2026 15:45:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235804 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 9 changes (3 new | 6 updated): - 3 new CVEs: CVE-2026-0874, CVE-2026-0875, CVE-2026-23491 - 6 updated CVEs: CVE-2025-13601, CVE-2025-70062, CVE-2025-70063, CVE-2025-7195, CVE-2026-25500, CVE-2026-2661 Date: Wed, 18 Feb 2026 19:58:22 +0000 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.12.inc | 72 ++++++++++++++++++- 1 file changed, 69 insertions(+), 3 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 089446fe87..92a12f2c1f 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-02-16 17:20:15.768713+00:00 for kernel version 6.12.72 -# From linux_kernel_cves cve_2026-02-16_1600Z-3-gf0e5d9ffdc0 +# Generated at 2026-02-18 20:12:59.836870+00:00 for kernel version 6.12.73 +# From linux_kernel_cves cve_2026-02-18_1900Z-2-ge0bc67e5ce4 python check_kernel_cve_status_version() { - this_version = "6.12.72" + this_version = "6.12.73" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -20394,6 +20394,32 @@ CVE_STATUS[CVE-2025-71223] = "cpe-stable-backport: Backported in 6.12.70" CVE_STATUS[CVE-2025-71224] = "cpe-stable-backport: Backported in 6.12.70" +CVE_STATUS[CVE-2025-71225] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2025-71226 needs backporting (fixed from 6.19) + +# CVE-2025-71227 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2025-71228] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2025-71229 has no known resolution + +# CVE-2025-71230 has no known resolution + +# CVE-2025-71231 has no known resolution + +# CVE-2025-71232 has no known resolution + +# CVE-2025-71233 has no known resolution + +# CVE-2025-71234 has no known resolution + +# CVE-2025-71235 has no known resolution + +# CVE-2025-71236 has no known resolution + +# CVE-2025-71237 has no known resolution + CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66" CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.12.66" @@ -20864,3 +20890,43 @@ CVE_STATUS[CVE-2026-23209] = "cpe-stable-backport: Backported in 6.12.70" # CVE-2026-23210 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-23211] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23212] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23213] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23214] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23215] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23216] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2026-23217 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23218] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23219] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2026-23220 has no known resolution + +# CVE-2026-23221 has no known resolution + +# CVE-2026-23222 has no known resolution + +# CVE-2026-23223 has no known resolution + +# CVE-2026-23224 has no known resolution + +# CVE-2026-23225 has no known resolution + +# CVE-2026-23226 has no known resolution + +# CVE-2026-23227 has no known resolution + +# CVE-2026-23228 has no known resolution + +# CVE-2026-23229 has no known resolution + +# CVE-2026-23230 has no known resolution + From patchwork Thu Apr 23 15:44:56 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 86773 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5A814FC0373 for ; Thu, 23 Apr 2026 15:45:23 +0000 (UTC) Received: from mail-qt1-f176.google.com (mail-qt1-f176.google.com [209.85.160.176]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.761.1776959118442261672 for ; Thu, 23 Apr 2026 08:45:18 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=gI6iDL4L; spf=pass (domain: gmail.com, ip: 209.85.160.176, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f176.google.com with SMTP id d75a77b69052e-50faeb8317bso33155781cf.2 for ; Thu, 23 Apr 2026 08:45:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776959117; x=1777563917; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=NkhcL0ozvUDQFF3Ggt6o/RhIdOVi19VGgfZexFwDppI=; b=gI6iDL4LXBkterM6AwgDwfOA34ywdO1kzND76W+XHuqsgkWLnlZXRkTZtHaJoB8vqq kCKZtKgxUp8Ks+vz0jQ8wWhzLkRKos0aJt0bO00XfnaWMimI/GZvASotU72VjmlAFCZc 75t7s1yZMHpkKsvJism1uKRMyuz3WDFULYYz6gkkNOQqc1fduKoNxQg3kK6F9D4fcsjL BVVH/cxOo5FDlhLSkIikXUmAav7SXJ4b+4WnSADMgz5tQ5CxBp2ylaSQI3YpyFrxiQT+ /Rk4Vv8/RDJEaI0vWsNembh01CuuCtoYN0LB2ADnddY+vt56XYL/eus7iuouQSdMMnQd kRZA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776959117; x=1777563917; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=NkhcL0ozvUDQFF3Ggt6o/RhIdOVi19VGgfZexFwDppI=; b=bSHJw3mv2B9vDlsajf4enOk9+AErdc3gKn4omP2I99R6M4PL0YEoD7b7GavHUeGdF1 lXlgaIG5mEJWd1C3E68cuhDvczTP6GT5kDklJ+Is4TlhAxRI44W+wVZ8bAvCjElj4uq+ h0qqaAKl6gIVHUrvx6cgsjAaDGWQ2D2DdG5Xl39Mnm7d9u2NmXZwiA7m24ur5m1S/ZU+ wlqMfH3PL70n4P6cAuRAn9zW8+lub56I2GJ8nKc8m5Ua3eRsCzAbEk8MfOyPouK27VaX sRSviLE7yzduWTG30mftggAILuQArh7x1gVYRVJdIuIiITetVW/ooXTycA7DLQNsWo3W GTbg== X-Gm-Message-State: AOJu0Yz+aeEOXasbDKCujvBHNrH6hKlfdhV2rOr3h3eKxX1R/5Fd5eIO etg+nHcCxtDHDP7MF7CrBd4t4T/3Cc411JswSYwtebz1nxskNvBU/VGo+a8Cdg8o X-Gm-Gg: AeBDiesY29HfeL/qRY26D6cXyoiicFUmTwb4OJRjGU2HrTExE6Yq5yBt5Ps/SNrJcxN DY0xlDtrdOkTW9HjTUnAwOLTgxGIU04MtZ1bn1F5n6EsxiH8i858Rf6IFOW8dQUtnSjl+swN1+T GtPP5rLdETFr5vKThxiUGVEZk5qAxIWoW9VYW2l09QHdSqSQffLyk10mrPUvCfb378B466gA9jp PMZBS73E3qKsgeKtSlDFjH9RBa6cSUid/QCq+s0CMdXeNiFOkbqtAVxIZA3IRh94PiN6+rjQXlH L5mNGr10PzrLGq8Fe/SKMs1wWM8j3A6gF7o1IcV+Z/XwJiE9PCl/ZkOqox1dlFNiYTSw3X54FsI ghDVmMzvaF2NSFfksfS8gJGc+cYB/H6MnOwNtuxUT+3NzKa1q8B+rnL1yoBmrP0nN2eLox+muTx 05Kwb1FYfxspSttDGpa4/WLEQDIaVhvsjqFrCUryaJarEYJv6MkkOMPqg4GRXw3lFdXX9Mcp047 jjzeT8+usKQgkm4c+PH8TlvIvJd9DGLMf2deZiplrFzQGhWBhKmvPeRymsPUf7NvlQoUxcgPJlt PiWG X-Received: by 2002:a05:622a:1f99:b0:50d:a987:89b2 with SMTP id d75a77b69052e-50e36c12741mr401143191cf.31.1776959117246; Thu, 23 Apr 2026 08:45:17 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-50fb416b3f5sm74400031cf.28.2026.04.23.08.45.16 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Apr 2026 08:45:16 -0700 (PDT) From: bruce.ashfield@gmail.com To: yoann.congal@smile.fr Cc: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 05/18] linux-yocto/6.12: update to v6.12.74 Date: Thu, 23 Apr 2026 11:44:56 -0400 Message-ID: <20260423154509.1933646-6-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260423154509.1933646-1-bruce.ashfield@gmail.com> References: <20260423154509.1933646-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Apr 2026 15:45:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235805 From: Bruce Ashfield Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: 444b39ef6108 Linux 6.12.74 9001c6815e53 USB: serial: option: add Telit FN920C04 RNDIS compositions 962c167b0f26 f2fs: fix IS_CHECKPOINTED flag inconsistency issue caused by concurrent atomic commit and checkpoint writes cf4a9e1bc812 f2fs: fix to avoid UAF in f2fs_write_end_io() 121f787e740d iommu/arm-smmu-qcom: do not register driver in probe() 1ff415eef513 f2fs: fix to avoid mapping wrong physical block for swapfile 4ef30b9f1641 f2fs: fix out-of-bounds access in sysfs attribute read/write b72d775424f5 f2fs: fix to check sysfs filename w/ gc_pin_file_thresh correctly aeb70609e6b5 f2fs: fix to add gc count stat in f2fs_gc_range 52917e265aa5 fbdev: smscufx: properly copy ioctl memory to kernelspace 9efa0dc46270 fbdev: rivafb: fix divide error in nv3_arb() 7b7829839dac cpuset: Fix missing adaptation for cpuset_is_populated e94b369ff82f Revert "wireguard: device: enable threaded NAPI" 56db97af7c89 LoongArch: Rework KASAN initialization for PTW-enabled systems da06bb0ca45b mm/hugetlb: fix excessive IPI broadcasts when unsharing PMD tables using mmu_gather baa198a93401 mm/hugetlb: fix two comments related to huge_pmd_unshare() 3a18b452dd5f mm/hugetlb: fix hugetlb_pmd_shared() b285b1fd51fa mm/hugetlb: fix copy_hugetlb_page_range() to use ->pt_share_count 56ef68a5b8a1 gpiolib: acpi: Fix gpio count with string references daaf4fe333e0 ASoC: fsl_xcvr: fix missing lock in fsl_xcvr_mode_put() 67484f35c447 drm/amd/display: remove assert around dpp_base replacement 7165dc5133fb drm/amd/display: extend delta clamping logic to CM3 LUT helper 02d209bb018a tracing/dma: Cap dma_map_sg tracepoint arrays to prevent buffer overflow ded6043c3358 ASoC: cs42l43: Correct handling of 3-pole jack load detection b3851fb4aba8 platform/x86: panasonic-laptop: Fix sysfs group leak in error path bc3da98445cf platform/x86/amd/pmc: Add quirk for MECHREVO Wujie 15X Pro db8799e80cb7 ALSA: hda/realtek: Enable headset mic for Acer Nitro 5 c9575a0cd571 ASoC: amd: yc: Add quirk for HP 200 G2a 16 a1ad7bbeafd7 ASoC: Intel: sof_es8336: Add DMI quirk for Huawei BOD-WXX9 da6e06a5fdba platform/x86: classmate-laptop: Add missing NULL pointer checks 45668b63be01 drm/tegra: hdmi: sor: Fix error: variable ā€˜j’ set but not used 9b203b8ddd73 romfs: check sb_set_blocksize() return value 59ec2c61fe03 ALSA: hda/realtek - fixed speaker no sound 10a948cb71d1 ASoC: cs35l45: Corrects ASP_TX5 DAPM widget channel 284ded9e5b72 ALSA: hda/realtek: Add quirk for Inspur S14-G1 5beb4ddac6a9 gpio: sprd: Change sprd_gpio lock to raw_spin_lock 8a6e19a406d8 ASoC: amd: yc: Add ASUS ExpertBook PM1503CDA to quirks list 209d027747cb ALSA: hda/realtek: Fix headset mic for TongFang X6AR55xU dd8ba8c0c3f3 bus: fsl-mc: fix use-after-free in driver_override_show() b7a5b454b7f7 bus: fsl-mc: Replace snprintf and sprintf with sysfs_emit in sysfs show functions a22fe7581f11 bnxt_en: hide CONFIG_DETECT_HUNG_TASK specific code 7096cc734240 bnxt_en: Change FW message timeout warning 871f6236da96 scsi: qla2xxx: Fix bsg_done() causing double free Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 4572915cf4..a8d17a5c14 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -15,13 +15,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "1be6d1eaceba0860348c41af8951ccebfa5aa2c8" -SRCREV_meta ?= "6d166217a8feea3a7e961be354ea9deabeb8d356" +SRCREV_machine ?= "96b72162b68a3a6084945ef4bf357a3de5c196ed" +SRCREV_meta ?= "d427132ce6626fdae8a1690305e1b578a5509699" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.73" +LINUX_VERSION ?= "6.12.74" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index d5c1c8c052..22b15e69f2 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc include recipes-kernel/linux/cve-exclusion.inc include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.73" +LINUX_VERSION ?= "6.12.74" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" -SRCREV_meta ?= "6d166217a8feea3a7e961be354ea9deabeb8d356" +SRCREV_machine ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" +SRCREV_meta ?= "d427132ce6626fdae8a1690305e1b578a5509699" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index 5b6bf7ef0a..92807f9057 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "a7cf22192ce38f303c8a5070b750583953a34e09" -SRCREV_machine:qemuarm64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" -SRCREV_machine:qemuloongarch64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" -SRCREV_machine:qemumips ?= "9a4ed79b88cab20c169656abe310068f8cdab2c3" -SRCREV_machine:qemuppc ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" -SRCREV_machine:qemuriscv64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" -SRCREV_machine:qemuriscv32 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" -SRCREV_machine:qemux86 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" -SRCREV_machine:qemux86-64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" -SRCREV_machine:qemumips64 ?= "0a68bc37afffea25aa627239d1de74f4b7088824" -SRCREV_machine ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" -SRCREV_meta ?= "6d166217a8feea3a7e961be354ea9deabeb8d356" +SRCREV_machine:qemuarm ?= "f4b46d6d3a4e38d532c5e11866d3d071ae398f16" +SRCREV_machine:qemuarm64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" +SRCREV_machine:qemuloongarch64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" +SRCREV_machine:qemumips ?= "da8487babd144628f801a204696523e077829fa2" +SRCREV_machine:qemuppc ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" +SRCREV_machine:qemuriscv64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" +SRCREV_machine:qemuriscv32 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" +SRCREV_machine:qemux86 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" +SRCREV_machine:qemux86-64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" +SRCREV_machine:qemumips64 ?= "29ca2370cd8722cc5fd712f4a6b4757ad84fde3e" +SRCREV_machine ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" +SRCREV_meta ?= "d427132ce6626fdae8a1690305e1b578a5509699" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "5fb0303f6cb6a89bcfb19bd7a68cb793c86e78b2" +SRCREV_machine:class-devupstream ?= "444b39ef6108313e8452010b22aaba588e8fb92b" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.73" +LINUX_VERSION ?= "6.12.74" PV = "${LINUX_VERSION}+git" From patchwork Thu Apr 23 15:44:57 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 86771 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0FF3CFC036B for ; Thu, 23 Apr 2026 15:45:23 +0000 (UTC) Received: from mail-qt1-f173.google.com (mail-qt1-f173.google.com [209.85.160.173]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.693.1776959120279849150 for ; Thu, 23 Apr 2026 08:45:20 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=m90coPmG; spf=pass (domain: gmail.com, ip: 209.85.160.173, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f173.google.com with SMTP id d75a77b69052e-506a6cf8242so49090131cf.1 for ; Thu, 23 Apr 2026 08:45:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776959119; x=1777563919; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=Kn5kEVViL/uH01PMuBI96casTOGCMSkkm5O/AwwlGog=; b=m90coPmGR2KKBwtVvrlI7f65Zwg2LF2FuoHqXn2Bw5f156p1OAU8OC7GVUi0zhsiz9 T8brPfwmuo7ApO1hq6XAdh2tqCx53OU20D9NtaYui0XvLFajsnDUNWwheBnYKDKqU5Gh T0MP4mLVOjYhPG/4b8pyeh02BFqhV0fJ5YcrS0ePV4dzxFHzjf14s7PyPEB5aGeDXrp2 ltztavroyCoBu4iCPy2XwqDe8lyhvU4QiQyR0ojljaENXJoP/LlUX1z6YREyf6WAtR9i z0G1FsfpWDibp1FxXxcZC0Zu7pKsVmYOddO4WsWsgEJSXZnxYFGgEdUS3KDVKYC5Bzp5 e7JA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776959119; x=1777563919; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=Kn5kEVViL/uH01PMuBI96casTOGCMSkkm5O/AwwlGog=; b=h6bgMBmCkc+WL4x0xgdkpTERgdapM6NlVDzfcXG4ysap4SIQYvccUdQ5fKP0D6+vRb KWlTEVl6aHPt4x8rxvv4vrAv4bMvU+TuDSnEJkfBcX+IRiNAytQ3M5u9gEIcuXn8VcTS f5NWl5JkkFM1Mayx5kyaXYw0VshJUjCoAIUDM/fqBZHdZY2kqT+9191n+OZtkIEdbz2M 9aMAKezDwXD23jOuA2MAttJ5TSFH7r1rG7JlqTSAxoGdtY/JLBIGcrDXBW+XI2XMnoPB OBCwmrEoctV5/EJ89I3hIG0viyIUJEe178dvPvy3xSCSLb7Ch6uHGM8ZnNCqgKhjQIeF MJXg== X-Gm-Message-State: AOJu0YyJzYVRyeUAnheAH/tReyBRNnuJ5kWP+ZzYMXIyKelXrS4CPsYc c+eLDHfAXW/42A70PgQXLKhtjA4Udxj5P7H7KdLO/a85EEQYVJzv2WAoNl4j8KUz X-Gm-Gg: AeBDieuY/0JH6mHa3HMwoyFydPskVMqKVg/DRyzGVm+25QiISJw7meHW5lFpOESPY5+ zotreVj01YFhmloh1c52wBnH8WpaWLr4Mnj9+cYhn+LSP9kGqbuYq9ixHLwFU6K5sBnrAFRsdAe ERNghk2Yexk9gTdX/WQiWZmvtACziyZu42kpEc4kJwpb8/ypfTdcK6iie/4tNsdnxnJUtwQ5Qhu Se4SzcPUOa36hvV9wy+uZ3YlTJ5YK2x21C1VcBk9FYrYeqKncA+8o9X3s64C7nLs/68Pzqrjx09 ICNj30KgeDiV1s5Rj9eziBCUaEt1wEbLdnKAD3dU+4Y4dVFHjXUkTuuxUq9H0qhbytoveTvQB/z 52PLlj+6g2d1X0crtGH+jlwuxDbipxJtC4upo95amf6NdwWhl9cI2gvEuE97EyrLc/2pJaGKw/5 uiQ38wte0P1Py7wRW8+rtp69H2s6t+yRpOsKZkE8SKRlYmjPV43ltbyZUiZlhRm0aRfV0uhIAOl HuCpY1kI72qlhR0TTjCQ5qJepdguInNIwczoH5K70tUHu8y9WTNYuKkSqWMEzgmqSVoRQ== X-Received: by 2002:a05:622a:60d:b0:50d:7568:b904 with SMTP id d75a77b69052e-50e368209f8mr395201941cf.2.1776959118825; Thu, 23 Apr 2026 08:45:18 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-50fb416b3f5sm74400031cf.28.2026.04.23.08.45.17 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Apr 2026 08:45:17 -0700 (PDT) From: bruce.ashfield@gmail.com To: yoann.congal@smile.fr Cc: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 06/18] linux-yocto/6.12: update CVE exclusions (6.12.74) Date: Thu, 23 Apr 2026 11:44:57 -0400 Message-ID: <20260423154509.1933646-7-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260423154509.1933646-1-bruce.ashfield@gmail.com> References: <20260423154509.1933646-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Apr 2026 15:45:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235806 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 1 changes (1 new | 0 updated): - 1 new CVEs: CVE-2026-2971 - 0 updated CVEs: Date: Mon, 23 Feb 2026 04:58:05 +0000 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.12.inc | 48 +++++++++---------- 1 file changed, 24 insertions(+), 24 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 92a12f2c1f..c7726e1306 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-02-18 20:12:59.836870+00:00 for kernel version 6.12.73 -# From linux_kernel_cves cve_2026-02-18_1900Z-2-ge0bc67e5ce4 +# Generated at 2026-02-23 05:12:32.087151+00:00 for kernel version 6.12.74 +# From linux_kernel_cves cve_2026-02-23_0400Z-1-g3cbc7410733 python check_kernel_cve_status_version() { - this_version = "6.12.73" + this_version = "6.12.74" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -20402,23 +20402,23 @@ CVE_STATUS[CVE-2025-71225] = "cpe-stable-backport: Backported in 6.12.70" CVE_STATUS[CVE-2025-71228] = "cpe-stable-backport: Backported in 6.12.70" -# CVE-2025-71229 has no known resolution +CVE_STATUS[CVE-2025-71229] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2025-71230 has no known resolution +CVE_STATUS[CVE-2025-71230] = "fixed-version: only affects 6.13 onwards" -# CVE-2025-71231 has no known resolution +CVE_STATUS[CVE-2025-71231] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2025-71232 has no known resolution +CVE_STATUS[CVE-2025-71232] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2025-71233 has no known resolution +CVE_STATUS[CVE-2025-71233] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2025-71234 has no known resolution +CVE_STATUS[CVE-2025-71234] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2025-71235 has no known resolution +CVE_STATUS[CVE-2025-71235] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2025-71236 has no known resolution +CVE_STATUS[CVE-2025-71236] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2025-71237 has no known resolution +CVE_STATUS[CVE-2025-71237] = "cpe-stable-backport: Backported in 6.12.72" CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66" @@ -20668,7 +20668,7 @@ CVE_STATUS[CVE-2026-23098] = "cpe-stable-backport: Backported in 6.12.68" CVE_STATUS[CVE-2026-23099] = "cpe-stable-backport: Backported in 6.12.68" -CVE_STATUS[CVE-2026-23100] = "fixed-version: only affects 6.13 onwards" +CVE_STATUS[CVE-2026-23100] = "cpe-stable-backport: Backported in 6.12.74" CVE_STATUS[CVE-2026-23101] = "cpe-stable-backport: Backported in 6.12.68" @@ -20908,25 +20908,25 @@ CVE_STATUS[CVE-2026-23218] = "fixed-version: only affects 6.18 onwards" CVE_STATUS[CVE-2026-23219] = "cpe-stable-backport: Backported in 6.12.70" -# CVE-2026-23220 has no known resolution +CVE_STATUS[CVE-2026-23220] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2026-23221 has no known resolution +CVE_STATUS[CVE-2026-23221] = "cpe-stable-backport: Backported in 6.12.74" -# CVE-2026-23222 has no known resolution +CVE_STATUS[CVE-2026-23222] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2026-23223 has no known resolution +CVE_STATUS[CVE-2026-23223] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2026-23224 has no known resolution +CVE_STATUS[CVE-2026-23224] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2026-23225 has no known resolution +CVE_STATUS[CVE-2026-23225] = "fixed-version: only affects 6.19 onwards" -# CVE-2026-23226 has no known resolution +# CVE-2026-23226 needs backporting (fixed from 7.0rc1) -# CVE-2026-23227 has no known resolution +# CVE-2026-23227 needs backporting (fixed from 7.0rc1) -# CVE-2026-23228 has no known resolution +CVE_STATUS[CVE-2026-23228] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2026-23229 has no known resolution +CVE_STATUS[CVE-2026-23229] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2026-23230 has no known resolution +CVE_STATUS[CVE-2026-23230] = "cpe-stable-backport: Backported in 6.12.72" From patchwork Thu Apr 23 15:44:58 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 86774 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 25331FC036D for ; Thu, 23 Apr 2026 15:45:23 +0000 (UTC) Received: from mail-qt1-f173.google.com (mail-qt1-f173.google.com [209.85.160.173]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.763.1776959122259342285 for ; Thu, 23 Apr 2026 08:45:22 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=btE9cIkp; spf=pass (domain: gmail.com, ip: 209.85.160.173, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f173.google.com with SMTP id d75a77b69052e-50fae4d1f85so52564201cf.3 for ; Thu, 23 Apr 2026 08:45:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776959121; x=1777563921; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=TAWQKc8a6ij3eC0z2JL4mZjkl3BowYFFSXwrilauNSs=; b=btE9cIkpVJZpuNwyQpbWYC8gJ1kHHNp8oB22vmS2uAjkPUPhmUlrof5nadbdc3j/2u OfBWVCIpgQvmdG5Cj++oiDkhyQx5H9ro2Y90LHRm60WZMHCyeZTSDqaU022oLksrP6nY oo9z5qtyyX/n1GpJ+xz+NPMjiQQO5UKZXOV0ow7darhpJ8RrKKQMxc48Lqk7tDa1v6np J8EtnhEi6eYh29XQYfheCZgXljJZH0ZVE6qcS5tqY2oXN9jHblV243lqmzZCt6rLeARN 9Fl+Gx0RWzZE6ilk9V0Cu6ssvxpRi8r+GUMeYA03aoBebA1UVHIf/PJ4giKZXxMhU2CX x2Kw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776959121; x=1777563921; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=TAWQKc8a6ij3eC0z2JL4mZjkl3BowYFFSXwrilauNSs=; b=Itk3zzySsjVcgB6QEEUuI4F4ZfskkvhVkJVnLJj/Gey3xgdfmlBGcVX7PdutpKNVbz EZF+1IWGeQyMD5XIiBsa6uTaRtbWPzGg2/TXW7QXFdVvSSz1RmF6xgK6UPCDXP+bq4qx JkXBwWeidcfZbTXIUIC63GHJwOfolw9szSmtTuY1z2sLm/h6ao+av2h3/+wH4xEuHaJq jgquEMu4qg3vpTB6ogsuKLKXdxr42wC9xcB/7PwxSOUO/R1UYYtqKpxo9qEppgKlG31z pkq0kVR23iPVy/D5MUhhAA0YXXHa8cwfP1zieWjb9UF+aJt9LSg3JJm5EgCWp8ByTZwO oCkw== X-Gm-Message-State: AOJu0Yw0KpOZ3lc3r707bF42bu2Cv8A8ujs8mAvuWXFQywr544YX2OEU mBnLsLoq5epzAWOwjGlhN85/CmG9jTYKf+alNm967lODe6GHLX3/m9GVaFj71B2z X-Gm-Gg: AeBDieuB4CJaZiCBnnWP0f1VbipsheyR+nsGQE5RzXU5ogTGLQRDIoSW7vrHLE8s9Ep WEONdtUQYFxSeJBnWRHADrn5qve1iQ4LYTTLYr5AIyjj44bUPVRMpYeDqDULRASbSkwXfL3Rkw+ KShOxQdN3I1YuuxFuFeNn3o2XOtI5k7GdaU6tTPlX5Agm+3ar5lksAYoYxEH+KtoHF96rjuMkiZ 5VmgvuSM0sYSYA+L6xwx1jl1WkXz1evhq0RDTFfNkSphiztJ09oQn6dUxP0NKdhRE1QLc9hKR5f WTWjQqpOvgeUYsK8ANC1rjrbyMUwWsDMMGKMliGw8HpchevksdmMTOg/x7po2m5fsAqugfRsZv1 ma2bZ1eezKAW1Orz9fwXVThtE7f6Os/nmAqBdfOp2x7eLAar5eJB0al4hbWmfWeI4wsnIySkfDH Wj1C8MqCAVTTxO+FikNVpWbBQLz5SFKK5YjP0az7k/TbYaNUG9PgNxgz0Q0m2CAD+mtyweoASCd 52XpZjXgZANjPcPgQ6PgzCx20dUJzwpPfLBOYXDax55Jo6SyTkXAGKguK7xnLvb46dOoQ== X-Received: by 2002:a05:622a:84:b0:50d:912c:c2cb with SMTP id d75a77b69052e-50e36c4d835mr394126591cf.42.1776959120458; Thu, 23 Apr 2026 08:45:20 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-50fb416b3f5sm74400031cf.28.2026.04.23.08.45.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Apr 2026 08:45:19 -0700 (PDT) From: bruce.ashfield@gmail.com To: yoann.congal@smile.fr Cc: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 07/18] linux-yocto/6.12: update to v6.12.76 Date: Thu, 23 Apr 2026 11:44:58 -0400 Message-ID: <20260423154509.1933646-8-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260423154509.1933646-1-bruce.ashfield@gmail.com> References: <20260423154509.1933646-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Apr 2026 15:45:23 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235807 From: Bruce Ashfield Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: 39b686f8d57d Linux 6.12.76 412c9b54585c Revert "x86/kexec: add a sanity check on previous kernel's ima kexec buffer" c1924e059c72 Linux 6.12.75 bbfe49ffb892 most: core: fix leak on early registration failure 9f3ffd49da12 arm64: Fix sampling the "stable" virtual counter in preemptible section 1147ab1336bc xfs: fix copy-paste error in previous fix c2bc05dc5ff2 drm/i915/wakeref: clean up INTEL_WAKEREF_PUT_* flag macros 5af4761d11a7 ALSA: pcm: Revert bufs move in snd_pcm_xfern_frames_ioctl() 26034b60d806 NTB: ntb_transport: Fix too small buffer for debugfs_name af45c677dbf9 tracing: Wake up poll waiters for hist files when removing an event 588c08026d6a tracing: Fix checking of freed trace_event_file for hist files fea7c9a23c0f fgraph: Do not call handlers direct when not using ftrace_ops b4700c089a10 tracing: ring-buffer: Fix to check event length before using 3b91160e9a91 net: nfc: nci: Fix parameter validation for packet data bd135851106c drm/amdgpu: keep vga memory on MacBooks with switchable graphics 5fc0933641a8 arm64: Force the use of CNTVCT_EL0 in __delay() d95f0851cf40 x86/kexec: Copy ACPI root pointer address from config table 015cebdfcb97 net/sched: act_skbedit: fix divide-by-zero in tcf_skbedit_hash() 1b1371cd4032 net: ethernet: ec_bhf: Fix dma_free_coherent() dma handle 8122e05bd27b ASoC: amd: yc: Add DMI quirk for ASUS Vivobook Pro 15X M6501RR 1d731e512134 cifs: some missing initializations on replay f73b3653a4c3 fbcon: Remove struct fbcon_display.inverse 8225baf882d5 fbdev: ffb: fix corrupted video output on Sun FFB1 d6f34bbff074 fbdev: of: display_timing: fix refcount leak in of_get_display_timings() f47d5b9e8aa6 fbdev: vt8500lcdfb: fix missing dma_free_coherent() 0b038c0be682 fbcon: check return value of con2fb_acquire_newinfo() e93d898ee997 mm: numa_memblks: Identify the accurate NUMA ID of CFMW 0591d6509c2f ipv6: ioam: fix heap buffer overflow in __ioam6_fill_trace_data() 91892dafccb1 function_graph: Restore direct mode when callbacks drop to one 97900f512252 atm: fore200e: fix use-after-free in tasklets during device removal df4308cb52dc net: intel: fix PCI device ID conflict between i40e and ipw2200 f9fe092084cd procfs: fix possible double mmput() in do_procmap_query() 82a7ea35a152 drm/amdgpu: fix sync handling in amdgpu_dma_buf_move_notify 8f08df326752 drm/amd/display: Increase DCN35 SR enter/exit latency 5cfc202825ba io_uring/filetable: clamp alloc_hint to the configured alloc range 74f7e464ad88 tracing: Fix to set write permission to per-cpu buffer_size_kb 6e704e89f16f net: macb: Fix tx/rx malfunction after phy link down and up 86ad5c4ac790 net: ti: icssg-prueth: Add optional dependency on HSR ccef79af58b4 octeontx2-af: CGX: fix bitmap leaks 84b932bc9899 net: wan/fsl_ucc_hdlc: Fix dma_free_coherent() in uhdlc_memclean() f73c042724d9 net: ethernet: marvell: skge: remove incorrect conflicting PCI ID e6e65be0752f LoongArch: Disable instrumentation for setup_ptwalker() 35a384eb064e LoongArch: Guard percpu handler under !CONFIG_PREEMPT_RT 808ac152e46a LoongArch: Use %px to print unmodified unwinding address af7db33e5d2e LoongArch: Prefer top-down allocation after arch_mem_init() 92adfb707bee LoongArch: Make cpumask_of_node() robust against NUMA_NO_NODE 4f5b7016e552 rust: kbuild: pass `-Zunstable-options` for Rust 1.95.0 531a76c5a2e4 ceph: supply snapshot context in ceph_zero_partial_object() e7d70a77ad6f MIPS: rb532: Fix MMIO UART resource registration 601dd3b79769 cifs: Fix locking usage for tcon fields 7d9e0df82207 watchdog/softlockup: fix sample ring index wrap in need_counting_irqs() 3713af7e95a3 kcsan, compiler_types: avoid duplicate type issues in BPF Type Format 04d24a3654ed staging: rtl8723bs: fix null dereference in find_network 6d2dae6b97bd parisc: kernel: replace kfree() with put_device() in create_tree_node() 0425aaf20b40 PCI: Fix pci_slot_trylock() error handling 87ab6b527f07 net: cpsw_new: Fix unnecessary netdev unregistration in cpsw_probe() error path 75fb57efdd78 drm/amdkfd: Fix out-of-bounds write in kfd_event_page_set() 43bc12f6d611 tipc: fix RCU dereference race in tipc_aead_users_dec() a4b964b7377c mtd: rawnand: pl353: Fix software ECC support 42ef7c504ae5 usb: dwc2: fix resume failure if dr_mode is host a7a80c25b651 usb: dwc3: gadget: Move vbus draw to workqueue context f3132336db39 PCI: dwc: Fix msg_atu_index assignment b6e5cef4d6df mm/slab: use unsigned long for orig_size to ensure proper metadata align aac2fee7513d scsi: ufs: core: Flush exception handling work when RPM level is zero 00d69f21ef2a perf/arm-cmn: Reject unsupported hardware configurations 65379adf7d23 remoteproc: imx_rproc: Fix invalid loaded resource table detection e00549dd86f5 btrfs: continue trimming remaining devices on failure 2f926875dffe clk: rs9: Reserve 8 struct clk_hw slots for for 9FGV0841 0ca20d699b64 arm64: Fix non-atomic __READ_ONCE() with CONFIG_LTO=y 97c18f074ff1 PCI/IOV: Fix race between SR-IOV enable/disable and hotplug d47f27e145f8 Revert "PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV" 875355152b33 kexec: derive purgatory entry from symbol b2952dbeac2c ocfs2: fix reflink preserve cleanup issue 87272e3e70ec rapidio: replace rio_free_net() with kfree() in rio_scan_alloc_net() 68b5efd6c6b3 mm/highmem: fix __kmap_to_page() build error 27d953201eae mtd: spinand: Disable continuous read during probe 7037f3161a6d iio: gyro: itg3200: Fix unchecked return value in read_raw ca46d2092f30 powerpc/smp: Add check for kcalloc() failure in parse_thread_groups() ddb57354634b vhost: move vdpa group bound check to vhost_vdpa 74a29a02ff65 tools: Fix bitfield dependency failure 9bc366175509 arm64: poe: fix stale POR_EL0 values for ptrace 052c611bcb28 dm mpath: make pg_init_delay_msecs settable a7733b51cd74 bus: fsl-mc: fix an error handling in fsl_mc_device_add() d1d07cbeca04 io_uring/net: don't continue send bundle if poll was required for retry 37b14e59db5d usb: gadget: tegra-xudc: Add handling for BLCG_COREPLL_PWRDN 2efa9c02c9b4 mm/vmalloc: prevent RCU stalls in kasan_release_vmalloc_node f8f73bf0f8a5 x86/kexec: add a sanity check on previous kernel's ima kexec buffer 77a31097d6df nvmem: Drop OF node reference on nvmem_add_one_cell() failure 982815bb0455 nfsd: fix return error code for nfsd_map_name_to_[ug]id a437e3bf30e3 md/bitmap: fix GPF in write_page caused by resize race d69de525bc7a xfs: check for deleted cursors when revalidating two btrees d6f3f7d4dd8a xfs: check return value of xchk_scrub_create_subord 5de5be3ed7e7 xfs: only call xf{array,blob}_destroy if we have a valid pointer 078e78821d91 pinctrl: intel: Add code name documentation 339191811e6f PCI: endpoint: Fix swapped parameters in pci_{primary/secondary}_epc_epf_unlink() functions 9f2bfea51151 KVM: x86: Add SRCU protection for reading PDPTRs in __get_sregs2() 1c9b6aad70e5 xfs: fix remote xattr valuelblk check 084d39d7847f xfs: fix the xattr scrub to detect freemap/entries array collisions ef42a8766ff3 xfs: fix freemap adjustments when adding xattrs to leaf blocks e1b8c6452ee9 xfs: delete attr leaf freemap entries when empty a40f31608598 iio: accel: adxl380: Avoid reading more entries than present in FIFO 90cde30d8815 mfd: omap-usb-host: Fix OF populate on driver rebind 428cfd5d5a50 mfd: qcom-pm8xxx: Fix OF populate on driver rebind db131ef9d898 mfd: core: Add locking around 'mfd_of_node_list' 9813306610d0 iommu/vt-d: Flush dev-IOTLB only when PCIe device is accessible in scalable mode 34f36f9c6114 media: verisilicon: AV1: Fix tile info buffer size 2fbc8421d1db xfs: remove xfs_attr_leaf_hasname 3628a1a38404 xfs: mark data structures corrupt on EIO and ENODATA 96775be9f12f drm/bridge: anx7625: Fix invalid EDID size d764b8dd4200 drm/buddy: Prevent BUG_ON by validating rounded allocation 51d54ff2b750 selftests/mm/charge_reserved_hugetlb: drop mount size for hugetlbfs 11165f420b2a mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations cbae775b2265 drm: of: drm_of_panel_bridge_remove(): fix device_node leak 087d915bb1ea media: venus: vdec: restrict EOS addr quirk to IRIS2 only 99cf4a8fbf9e media: venus: vdec: fix error state assignment for zero bytesused 63922c96e137 arm64: dts: rockchip: Do not enable hdmi_sound node on Pinebook Pro fbcc04ad7aec dm-unstripe: fix mapping bug when there are multiple targets in a table c6138af1f545 dm-integrity: fix recalculation in bitmap mode 09d6efc6abd4 reset: gpio: suppress bind attributes in sysfs f0cddb616f75 s390/pci: Handle futile config accesses of disabled devices directly 5aa2b0450031 clk: tegra: tegra124-emc: Fix potential memory leak in tegra124_clk_register_emc() d5952a3bfdd6 media: i2c: ov01a10: Fix digital gain range 330d37a24ecb media: stm32: dcmipp: bytecap: clear all interrupts upon stream stop bac9fc78f367 soc: rockchip: grf: Support multiple grf to be handled 61dfbb6bb9ee soc: rockchip: grf: Fix wrong RK3576_IOCGRF_MISC_CON definition 5059221d2ead clk: clk-apple-nco: Add "apple,t8103-nco" compatible 5b958dfe278f bus: omap-ocp2scp: fix OF populate on driver rebind fce2fd4a2ca0 KVM: nSVM: Always use vmcb01 in VMLOAD/VMSAVE emulation 69aa67c1e22d soc: ti: pruss: Fix double free in pruss_clk_mux_setup() eaa16059f9af soc: ti: k3-socinfo: Fix regmap leak on probe failure e2e738e8dfbb dm: clear cloned request bio pointer when last clone bio completes b95a9810c38c dm-integrity: fix a typo in the code for write/discard race e438caff813f platform/x86: ISST: Add missing write block check fdc06d36dab7 media: ipu6: Fix RPM reference leak in probe error paths 92019e41c1fe media: ipu6: Fix typo and wrong constant in ipu6-mmu.c 13aa594f5f7e media: i2c: ov5647: use our own mutex for the ctrl lock e83c4debf2c1 media: ccs: Fix setting initial sub-device state ecba356cd7c6 media: i2c: ov5647: Fix PIXEL_RATE value for VGA mode fbf2a108ed5e media: i2c: ov5647: Sensor should report RAW color space ff65571ffae5 media: i2c: ov5647: Correct minimum VBLANK value 58f1767ad5c9 media: i2c: ov5647: Correct pixel array offset 2dedda97a64e media: i2c: ov5647: Initialize subdev before controls 32a21ed2ad74 media: ccs: Avoid possible division by zero 1b103307df6d media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update() b9c3b0a13636 media: i2c: ov01a10: Fix test-pattern disabling b32a74bdc0a6 media: i2c: ov01a10: Fix passing stream instead of pad to v4l2_subdev_state_get_format() 93804dda39f0 media: i2c: ov01a10: Add missing v4l2_subdev_cleanup() calls 79dff20b1a57 media: i2c: ov01a10: Fix analogue gain range fe3e92312a46 media: i2c: ov01a10: Fix reported pixel-rate value 577dafd9f68e media: i2c: ov01a10: Fix the horizontal flip control fb09d8b80046 media: i2c/tw9906: Fix potential memory leak in tw9906_probe() a114918270f0 media: i2c/tw9903: Fix potential memory leak in tw9903_probe() 2df98c45a74a media: cx25821: Add missing unmap in snd_cx25821_hw_params() 9c0a6ff53866 media: cx23885: Add missing unmap in snd_cx23885_hw_params() e3fb15aadfc8 media: cx88: Add missing unmap in snd_cx88_hw_params() 7fa9754f48cb media: radio-keene: fix memory leak in error path cffde73f0d5f media: verisilicon: AV1: Set IDR flag for intra_only frame type 5da29ade540b media: rockchip: rga: Fix possible ERR_PTR dereference in rga_buf_init() 4ff5b0fd1faa media: amphion: Drop min_queued_buffers assignment b19beca4ae66 arm64: dts: apple: t8112-j473: Keep the HDMI port powered on f1ceaaf93ea3 HID: logitech-hidpp: Check maxfield in hidpp_get_report_length() e7ac1cd823cd HID: prodikeys: Check presence of pm->input_ep82 922bd3e498a4 HID: magicmouse: Do not crash on missing msc->input 04e50f45b517 HID: hid-pl: handle probe errors 43a19467d3f3 arm64: Disable branch profiling for all arm64 code ce904c8a5bbe KVM: nSVM: Remove a user-triggerable WARN on nested_svm_load_cr3() succeeding c481d4edf070 KVM: x86: Return "unsupported" instead of "invalid" on access to unsupported PV MSR b61843503d54 ARM: omap2: Fix reference count leaks in omap_control_init() 8c73302be475 arm64: dts: qcom: x1e80100: Add missing TCSR ref clock to the DP PHYs 885e26f6845d media: verisilicon: AV1: Fix tx mode bit setting 72e6e79568f3 media: verisilicon: AV1: Fix enable cdef computation b73d85231d5b media: chips-media: wave5: Fix device cleanup order to prevent kernel panic 156020e889ed media: chips-media: wave5: Fix kthread worker destruction in polling mode 4f2a51433a3a media: mtk-mdp: Fix a reference leak bug in mtk_mdp_remove() c8737d33d4e8 media: mtk-mdp: Fix error handling in probe function fe17309d9bf7 media: mediatek: encoder: Fix uninitialized scalar variable issue 9b8dc1d327e2 dm-verity: correctly handle dm_bufio_client_create() failure ff613d11f78e phy: qcom: edp: Make the number of clocks flexible 6ad50d3a1670 Revert "PCI: qcom: Enable MSI interrupts together with Link up if 'Global IRQ' is supported" 57fa97ae2385 drm/tests: shmem: Swap names of export tests 501ace56f3f8 fpga: dfl: use subsys_initcall to allow built-in drivers to be added 885ec8577622 ASoC: SOF: ipc4-control: Keep the payload size up to date 20b55c3831cf ASoC: SOF: ipc4-control: Use the correct size for scontrol->ipc_control_data 491956b45b5f ASoC: SOF: ipc4-topology: Correct the allocation size for bytes controls 698988dda4db ASoC: SOF: ipc4-control: If there is no data do not send bytes update 47671671a370 clk: renesas: rzg2l: Select correct div round macro 2f7042ca608d clk: renesas: rzg2l: Fix intin variable size 7654e6e3cd6b rpmsg: core: fix race in driver_override_show() and use core helper 53d32735d77a netfilter: nf_conntrack_h323: fix OOB read in decode_choice() 8b841fd529db dpaa2-switch: validate num_ifs to prevent out-of-bounds write ea5d7787635e net: consume xmit errors of GSO frames e1407fb7c337 net/mlx5e: Fix "scheduling while atomic" in IPsec MAC address query c7bbd8632bcf net/mlx5e: Support routed networks during IPsec MACs initialization b32498dd7621 net/mlx5e: Separate address related variables to be in struct 2e4c69121156 net/mlx5: Fix missing devlink lock in SRIOV enable error path 53f5c553149a net/mlx5: E-switch, Clear legacy flag when moving to switchdev 6a825a26f9e3 net/mlx5: DR, Fix circular locking dependency in dump ba3bf0f1bf1d RDMA/umem: Fix double dma_buf_unpin in failure path 67ba6b13dbca net: usb: pegasus: enable basic endpoint checking f21d71a0962a RDMA/efa: Fix typo in efa_alloc_mr() 200bdb8d367c net: wan: farsync: Fix use-after-free bugs caused by unfinished tasklets 36abfc850cdf RDMA/core: Fix stale RoCE GIDs during netdev events at registration 075cbc1a4aa2 tipc: fix duplicate publication key in tipc_service_insert_publ() 9ea3671d70ee kcm: fix zero-frag skb in frag_list on partial sendmsg error a5de36d6cee7 tls: Fix race condition in tls_sw_cancel_work_tx() ec91078e1321 Bluetooth: L2CAP: Fix missing key size check for L2CAP_LE_CONN_REQ ffb7214f04da Bluetooth: L2CAP: Fix not checking output MTU is acceptable on L2CAP_ECRED_CONN_REQ 730058f51b8f Bluetooth: L2CAP: Fix response to L2CAP_ECRED_CONN_REQ 8285742519b5 Bluetooth: hci_qca: Cleanup on all setup failures 935f324e4b24 Bluetooth: L2CAP: Fix result of L2CAP_ECRED_CONN_RSP when MTU is too short 1e09410c98fe Bluetooth: L2CAP: Fix invalid response to L2CAP_ECRED_RECONF_REQ 464808911fb9 Remove WARN_ALL_UNSEEDED_RANDOM kernel config option f204c1379a98 wifi: cfg80211: wext: fix IGTK key ID off-by-one cf95db5e33bd bnxt_en: Fix deleting of Ntuple filters 348a5f8d06c7 bnxt_en: Fix RSS context delete logic 21d1e80d0d6e net: ethernet: xscale: Check for PTP support properly d077c45b34b8 net: ixp4xx_eth: convert to ndo_hwtstamp_get() and ndo_hwtstamp_set() b88194c1cfe7 net: usb: lan78xx: scan all MDIO addresses on LAN7801 9c79b839a639 net: usb: kaweth: remove TX queue manipulation in kaweth_set_rx_mode f7ad8b1d0e42 espintcp: Fix race condition in espintcp_close() a3c8fede034f xfrm: always flush state and policy upon NETDEV_UNREGISTER event 2dfbc8c17dd1 ipmi: ipmb: initialise event handler read bytes f1713988e932 xfrm: skip templates check for packet offload tunnel mode dc0abce05513 xfrm6: fix uninitialized saddr in xfrm6_get_saddr() 2e4d5e8d86a9 ntb: ntb_hw_switchtec: Fix shift-out-of-bounds for 0 mw lut 0e9304209451 ntb: ntb_hw_switchtec: Fix array-index-out-of-bounds access faf7f4073d5d rtc: zynqmp: correct frequency value d4c08521c77d drm/amd/display: Remove conditional for shaper 3DLUT power-on 5c3de2cae7ce arm64: hugetlbpage: avoid unused-but-set-parameter warning (gcc-16) 4f2eb019d87b btrfs: replace BUG() with error handling in __btrfs_balance() fc9e5af60dc1 ALSA: usb-audio: Add sanity check for OOB writes at silencing 7a3b0a893b94 drm/radeon: Add HAINAN clock adjustment f8431b867223 spi: spidev: fix lock inversion between spi_lock and buf_lock b701db9f535a drm/amd/display: bypass post csc for additional color spaces in dal 6561e0914ac9 drm/amdgpu: Add HAINAN clock adjustment 32a1f64f8ff6 ALSA: usb-audio: Update the number of packets properly at receiving 2d9cb8a280aa drm/amdgpu: Adjust usleep_range in fence wait 3fb5155a39ab drm/amd/display: Avoid updating surface with the same surface under MPO 761b208dfafc drm/amd/display: Fix system resume lag issue 9a4483972bf7 drm/amd/display: Fix writeback on DCN 3.2+ 8ec5b525221e ARM: 9467/1: mm: Don't use %pK through printk 44c8c02779bf include: uapi: netfilter_bridge.h: Cover for musl libc 09e437ba3f2d ACPI: x86: Force enabling of PWM2 on the Yogabook YB1-X90 ecd2fc9e4c32 thermal: int340x: Fix sysfs group leak on DLVR registration failure 1b275bd49e58 libceph: define and enforce CEPH_MAX_KEY_LEN a46cec9cc5b2 ceph: supply snapshot context in ceph_uninline_data() 39aef9080f27 fs/ntfs3: avoid calling run_get_entry() when run == NULL in ntfs_read_run_nb_ra() 9b877e5e1cbf fs/ntfs3: drop preallocated clusters for sparse and compressed files 7ef219656feb fs: ntfs3: fix infinite loop triggered by zero-sized ATTR_LIST 78b61f7eac37 fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata 398e768d1acc fs: ntfs3: check return value of indx_find to avoid infinite loop 0569822bb36c MIPS: Loongson: Make cpumask_of_node() robust against NUMA_NO_NODE f86bee0ef4fd iio: magnetometer: Remove IRQF_ONESHOT 48be61552318 iio: Use IRQF_NO_THREAD a4c154685855 mfd: intel-lpss: Add Intel Nova Lake-S PCI IDs 1fb137d985f2 Revert "mfd: da9052-spi: Change read-mask to write-mask" 0bfb54195be6 phy: fsl-imx8mq-usb: disable bind/unbind platform driver feature c435e63530f7 phy: mvebu-cp110-utmi: fix dr_mode property read from dts 5db6da613e9c watchdog: imx7ulp_wdt: handle the nowayout option 21cc92fddf4f binder: don't use %pK through printk bf66b535daed fix it87_wdt early reboot by reporting running timer 29e9413dfae9 serial: 8250: 8250_omap.c: Clear DMA RX running status only after DMA termination is done aebf83897bb6 serial: 8250: 8250_omap.c: Add support for handling UART error conditions 9f70f78e22b3 staging: rtl8723bs: fix memory leak on failure path 1b72b834511d usb: chipidea: udc: fix DMA and SG cleanup in _ep_nuke() f505b91db2c0 usb: gadget: f_fs: Fix ioctl error handling 3875c8eca2df usb: gadget: f_fs: fix DMA-BUF OUT queues 4d55fe3cd765 misc: eeprom: Fix EWEN/EWDS/ERAL commands for 93xx56 and 93xx66 aa97ccc3dc1e misc: bcm_vk: Fix possible null-pointer dereferences in bcm_vk_read() 297428ee6f6e phy: cadence-torrent: restore parent clock for refclk during resume 2930ddda9273 phy: ti: phy-j721e-wiz: restore mux selection during resume 874558ec341b dmaengine: stm32-mdma: initialize m2m_hw_period and ccr to fix warnings 340d7c73dab7 dmaengine: sun6i: Choose appropriate burst length under maxburst a49028a796d7 most: core: fix resource leak in most_register_interface error paths 12afc931e7c7 fpga: of-fpga-region: Fail if any bridge is missing 0945ed3284e9 usb: typec: ucsi: psy: Fix voltage and current max for non-Fixed PDOs 3590c1751c1d serial: 8250_dw: handle clock enable errors in runtime_resume 98d6bdb521f2 staging: rtl8723bs: fix missing status update on sdio_alloc_irq() failure 23aaf922bd3e soundwire: intel_auxdevice: add cs42l45 codec to wake_capable_list d6f73398da63 soundwire: dmi-quirks: add mapping for Avell B.ON (OEM rebranded of NUC15) 0e6bf9b4e291 dmaengine: stm32-dma3: use module_platform_driver a5d00dff9711 9p/xen: protect xen_9pfs_front_free against concurrent calls edc3261ceb73 m68k: nommu: fix memmove() with differently aligned src and dest for 68000 bc775cc7c085 HID: i2c-hid: Add FocalTech FT8112 563a6ab857b3 clk: microchip: core: correct return value on *_get_parent() 8d6bc7da8021 mailbox: sprd: clear delivery flag before handling TX done 22cfa9e10cfa remoteproc: mediatek: Break lock dependency to `prepare_lock` 34035ddfbd77 mailbox: sprd: mask interrupts that are not handled 9824db3eadb3 mailbox: imx: Skip the suspend flag for i.MX7ULP fa3635fa761a mailbox: pcc: Remove spurious IRQF_ONESHOT usage b74e552df8e5 remoteproc: imx_dsp_rproc: Skip RP_MBOX_SUSPEND_SYSTEM when mailbox TX channel is uninitialized 37b7cc18380c tracing: Fix false sharing in hwlat get_sample() f7fc25362c07 riscv: vector: init vector context with proper vlenb d42ec56b30ba scsi: ufs: mediatek: Fix page faults in ufs_mtk_clk_scale() trace event 2fcdc1ccc201 vhost: fix caching attributes of MMIO regions by setting them explicitly c45363db0d5f scsi: buslogic: Reduce stack usage dbf9416360aa hisi_acc_vfio_pci: update status after RAS error 9cf87b6bf6fb ata: libata: avoid long timeouts on hot-unplugged SATA DAS 9662e7b1e915 RDMA/rtrs-clt: For conn rejection use actual err number 78ac2b2f981f nfc: nxp-nci: remove interrupt trigger type 0ed3ab68c153 myri10ge: avoid uninitialized variable use cbda3855897f PCI: Mark Nvidia GB10 to avoid bus reset 7e9a64228209 PCI: Add ACS quirk for Qualcomm Hamoa & Glymur 7a126c1b6cfa PCI: Enable ACS after configuring IOMMU for OF platforms 63345c47ae43 PCI: Fix pci_slot_lock () device locking 7ac154e37a91 PCI/AER: Clear stale errors on reporting agents upon probe bc8710fd1b92 PCI: Mark ASM1164 SATA controller to avoid bus reset ba2e3472022f net/rds: Clear reconnect pending bit 7ebd51c3f032 vmw_vsock: bypass false-positive Wnonnull warning with gcc-16 73a92ae5a990 net: usb: sr9700: remove code to drive nonexistent multicast filter c8847a8eaacb bnxt_en: Allow ntuple filters for drops 39c6ab2d2eea wifi: ath10k: fix lock protection in ath10k_wmi_event_peer_sta_ps_state_chg() 16ca0282e099 wifi: rtw89: pci: restore LDO setting after device resume 2a4f7827e001 net: sfp: add quirk for Lantech 8330-265D cec2ceb35ce7 octeontx2-af: Workaround SQM/PSE stalls by disabling sticky 416c01dd95f4 Bluetooth: btusb: Add device ID for Realtek RTL8761BU 5d0b46ab5d55 Bluetooth: btusb: Add new VID/PID for RTL8852CE 0f5c4d8745d7 Bluetooth: hci_conn: use mod_delayed_work for active mode timeout a86ebcb3b08f Bluetooth: hci_conn: Set link_policy on incoming ACL connections 430bdb44c0b2 Bluetooth: btusb: Add support for MediaTek7920 0489:e158 cdcaafeb40f9 ipv4: fib: Annotate access to struct fib_alias.fa_state. de3974edd057 wifi: iwlegacy: add missing mutex protection in il3945_store_measurement() 7d355d937dc3 wifi: iwlegacy: add missing mutex protection in il4965_store_tx_power() b9074687ffea net: hns3: extend HCLGE_FD_AD_QID to 11 bits 70debb2b34a2 ipv4: igmp: annotate data-races around idev->mr_maxdelay 2803d02aa7a1 gro: change the BUG_ON() in gro_pull_from_frag0() b3978714bd4a ext4: propagate flags to convert_initialized_extent() 81248b1eb3c5 net/rds: No shortcut out of RDS_CONN_ERROR b0ea9e2a5644 wifi: rtw89: 8922a: add digital compensation for 2GHz 0a56a63a3bb3 wifi: rtw89: fix unable to receive probe responses under MLO connection a8347aa56749 wifi: iwlwifi: mvm: check the validity of noa_len 4cca2bb73717 net: usb: r8152: fix transmit queue timeout 6cb281662a63 openrisc: define arch-specific version of nop() 8b300f726640 netfilter: xt_tcpmss: check remaining length before reading optlen fb0af2fcee17 netfilter: nf_conntrack: Add allow_clash to generic protocol handler c51755090c94 ext4: use reserved metadata blocks when splitting extent on endio 5b5a9abdc5f4 ext4: mark group extend fast-commit ineligible 9e9fb259bcdd ext4: move ext4_percpu_param_init() before ext4_mb_init() 102428f145f9 ext4: mark group add fast-commit ineligible bd463fcd7f0c ipv6: exthdrs: annotate data-race over multiple sysctl 762e76c93823 ipv6: annotate data-races over sysctl.flowlabel_reflect 45e2b1cf2689 ipv6: annotate data-races in ip6_multipath_hash_{policy,fields}() 69b4bcaece65 wifi: cfg80211: allow only one NAN interface, also in multi radio e2ee86fefe01 wifi: ath12k: fix preferred hardware mode calculation 4234f2d90f7b wifi: ath11k: Fix failure to connect to a 6 GHz AP b71487cb692e wifi: ath11k: add pm quirk for Thinkpad Z13/Z16 Gen1 26c82ec5add2 wifi: rtw89: wow: add reason codes for disassociation in WoWLAN mode faac634c2795 wifi: rtw89: mac: correct page number for CSI response 715c263119fd iommu/amd: move wait_on_sem() out of spinlock b82073564373 wifi: libertas: fix WARNING in usb_tx_block 939dc5eddae6 net: wwan: mhi: Add network support for Foxconn T99W760 65bc40fea4fd iommu/arm-smmu-v3: Improve CMDQ lock fairness and efficiency cf2d06c9fd4b dm: remove fake timeout to avoid leak request 209149bd758e dm: replace -EEXIST with -EBUSY b4d46b4fb240 wifi: rtw88: Fix inadvertent sharing of struct ieee80211_supported_band data 9b5418070ee8 wifi: rtw88: Use devm_kmemdup() in rtw_set_supported_band() 46216a48cd89 wifi: rtw89: ser: enable error IMR after recovering from L1 e31daf5fbcda wifi: rtw89: 8922a: set random mac if efuse contains zeroes 1c7ad1b82ec4 wifi: rtw88: rtw8821cu: Add ID for Mercusys MU6H 0d0c2fb80ca4 wifi: rtw88: 8822b: Avoid WARNING in rtw8822b_config_trx_mode() 400ca64e87ac wifi: rtw88: fix DTIM period handling when conf->dtim_period is zero 5d77c36cd4b6 jfs: nlink overflow in jfs_rename aeecd32724c5 jfs: Add missing set_freezable() for freezable kthread de10c10eb0e8 ALSA: usb-audio: Add iface reset and delay quirk for AB13X USB Audio ae583f113d15 ALSA: mixer: oss: Add card disconnect checkpoints 72210c1ad2d4 ALSA: hda/realtek - Enable mute LEDs on HP ENVY x360 15-es0xxx bfefacf1996f ASoC: fsl: imx-rpmsg: use snd_soc_find_dai_with_mutex() in probe 21207c003700 spi: geni-qcom: Fix abort sequence execution for serial engine errors 10411f1f2c76 ASoC: SOF: Intel: hda: Fix NULL pointer dereference 566657cafa5d power: sequencing: fix missing state_lock in pwrseq_power_on() error path 648a26c3bda4 modpost: Amend ppc64 save/restfpr symnames for -Os build 31a37c62e6a5 ASoC: es8328: Add error unwind in resume c46992fa770a HID: logitech-hidpp: Add support for Logitech K980 2ec472ad5c19 hwmon: (f71882fg) Add F81968 support 066bbecaef26 hwmon: (nct6775) Add ASUS Pro WS WRX90E-SAGE SE 2c7a5235a8c8 hwmon: (dell-smm) Add support for Dell OptiPlex 7080 ba5d922b3153 ASoC: codecs: max98390: Check return value of devm_gpiod_get_optional() in max98390_i2c_probe() 5a22d4560c35 drm/amd/display: avoid dig reg access timeout on usb4 link training fail b21402b55722 drm/amd/display: Fix GFX12 family constant checks f1c5fcf80d77 spi: spi-mem: Protect dirmap_create() with spi_mem_access_start/end 6d802e37525b ASoC: sunxi: sun50i-dmic: Add missing check for devm_regmap_init_mmio 2a85a0ebd33c gpio: aspeed-sgpio: Change the macro to support deferred probe adae2d63f81d ALSA: hda/realtek: fix LG Gram Style 14 speakers 6e1664116a96 ALSA: hda/conexant: Add headset mic fix for MECHREVO Wujie 15X Pro f5623483341b HID: elecom: Add support for ELECOM HUGE Plus M-HT1MRBK 0fa0a82274c8 HID: multitouch: add eGalaxTouch EXC3188 support 0f5fe6ae25f9 media: rkisp1: Fix filter mode register configuration a205740a7231 drm/atmel-hlcdc: fix use-after-free of drm_crtc_commit after release cc18db0860c8 drm/atmel-hlcdc: don't reject the commit if the src rect has fractional parts 25e832a78307 drm/atmel-hlcdc: fix memory leak from the atomic_destroy_state callback fe3cf809c1e5 drm/amd/display: Disable FEC when powering down encoders c3b6733dd4c9 PCI: Add Intel Nova Lake audio Device ID 02a4d03515d4 ASoC: soc-acpi-intel-arl-match: change rt722 amp endpoint to aggregated ae57ffd142fa virt: vbox: uapi: Mark inner unions in packed structs as packed 359d29e76dba hyper-v: Mark inner union in hv_kvp_exchg_msg_value as packed 8e1664b9ee43 drm: Account property blob allocations to memcg cc904b44e4e6 drm/amdkfd: Fix GART PTE for non-4K pagesize in svm_migrate_gart_map() ee0dc6c66a91 drm/amdkfd: Relax size checking during queue buffer get a2dfdb19f856 ALSA: hda/realtek: add HP Victus 16-e0xxx mute LED quirk 2d9b17a177c0 media: ipu6: Always close firmware stream 1ff2c616944c media: ipu6: Close firmware streams on streaming enable failure a4257bf49221 media: ipu6: Ensure stream_mutex is acquired when dealing with node list 888523a37c93 media: mt9m114: Return -EPROBE_DEFER if no endpoint is found 22ffbc504a73 media: mt9m114: Avoid a reset low spike during probe() 461733d83e67 media: v4l2-async: Fix error handling on steps after finding a match e220ec4c4596 media: cx25821: Fix a resource leak in cx25821_dev_setup() 5849ae68d7b8 media: solo6x10: Check for out of bounds chip_id 58dd722b6c3d media: pvrusb2: fix URB leak in pvr2_send_request_ex a854c58dc989 media: adv7180: fix frame interval in progressive mode ec2f37bbb733 drm/panel: Fix a possible null-pointer dereference in jdi_panel_dsi_remove() 533bd1c1e2ca media: amphion: Clear last_buffer_dequeued flag for DEC_CMD_START aaced618189a spi: spi-mem: Limit octal DTR constraints to octal DTR situations bbc8396394f2 ASoC: wm8962: Don't report a microphone if it's shorted to ground on plug 64d7ff20fb03 ASoC: wm8962: Add WM8962_ADC_MONOMIX to "3D Coefficients" mask 5b27fcb5d1eb drm/xe: Only toggle scheduling in TDR if GuC is running 2193fe76d360 drm/amd/display: only power down dig on phy endpoints ef9ed9e786dd drm/amdgpu: Skip loading SDMA_RS64 in VF a951d6630b3a HID: apple: Add "SONiX KN85 Keyboard" to the list of non-apple keyboards 23e7150afc70 drm/amd/display: Add signal type check for dcn401 get_phyd32clk_src d89aef80790f drm/amdgpu: avoid a warning in timedout job handler 11718976c53a drm/amd/display: Fix dsc eDP issue eba3bc49971d drm/amdgpu: add support for HDP IP version 6.1.1 4394a810dd66 media: mediatek: vcodec: Don't try to decode 422/444 VP9 1ba3a56f4854 media: chips-media: wave5: Process ready frames when CMD_STOP sent to Encoder 2ed2feef3d2a media: chips-media: wave5: Fix conditional in start_streaming 39a624a65c77 media: omap3isp: set initial format b78de03a56ce media: omap3isp: isppreview: always clamp in preview_try_format() 89772f640b0b media: omap3isp: isp_video_mbus_to_pix/pix_to_mbus fixes cf510785f74e drm/v3d: Set DMA segment size to avoid debug warnings 86ba653114ba spi: stm32: fix Overrun issue at < 8bpw a57f1024b9d7 media: dvb-core: dmxdevfilter must always flush bufs 1aa3db5864d9 ASoC: SOF: ipc4: Support for sending payload along with LARGE_CONFIG_GET ca36d953d7bb drm/amd/display: Add USB-C DP Alt Mode lane limitation in DCN32 46e108c70227 spi-geni-qcom: use xfer->bits_per_word for can_dma() e15d7f3597de spi-geni-qcom: initialize mode related registers to 0 f3a26d1d0a37 drm/amdkfd: Handle GPU reset and drain retry fault race 29fd416e0e08 drm/amdgpu: fix NULL pointer issue buffer funcs 0c11e9f7cf94 gpu/panel-edp: add AUO panel entry for B140HAN06.4 3f44cdb5371f drm/display/dp_mst: Add protection against 0 vcpi 47af25d855b7 parisc: Prevent interrupts during reboot 589b7b0fc87e arm64: tegra: smaug: Add usb-role-switch support eece81eeda10 Revert "arm64: zynqmp: Add an OP-TEE node to the device tree" 3dcd45cfda1b firmware: arm_ffa: Unmap Rx/Tx buffers on init failure 8d849adfbc3e pstore: ram_core: fix incorrect success return when vmap() fails d53d092019f8 sched/debug: Fix updating of ppos on server write ops c821922bb768 char: tpm: cr50: Remove IRQF_ONESHOT 117fe6b91c51 mailbox: bcm-ferxrm-mailbox: Use default primary handler a321dd2b6356 crypto: hisilicon/qm - move the barrier before writing to the mailbox register 76f7abd4ee01 PCI/MSI: Unmap MSI-X region on error bd1be0d58b61 clocksource/drivers/timer-integrator-ap: Add missing Kconfig dependency on OF 88c76792180d clocksource/drivers/sh_tmu: Always leave device running after probe dea9989a3f39 bpf: Recognize special arithmetic shift in the verifier 4e3e57dbf46d bpf: crypto: Use the correct destructor kfunc type caa44eb450d9 perf/x86/cstate: Add Airmont NP af1e3d63c8e2 perf/x86/msr: Add Airmont NP 17440ef493aa bpf: verifier improvement in 32bit shift sign extension pattern 5ab9a958681e sparc: don't reference obsolete termio struct for TC* constants 8e6b0e2adf86 sparc: Synchronize user stack on fork and clone bfc2420bac71 block: decouple secure erase size limit from discard size limit 1f0221070f02 blk-mq-debugfs: add missing debugfs_mutex in blk_mq_debugfs_register_hctxs() 7fb2e1fa6e98 xenbus: Use .freeze/.thaw to handle xenbus devices 6ac7d51ae076 ACPI: battery: fix incorrect charging status when current is zero 7aa95b6f1465 ACPI: x86: s2idle: Invoke Microsoft _DSM Function 9 (Turn On Display) e3f21fdea4cb perf/cxlpmu: Replace IRQF_ONESHOT with IRQF_NO_THREAD 7f5a66a18b5c s390/perf: Disable register readout on sampling events e35db916e803 cpufreq: dt-platdev: Block the driver from probing on more QC platforms dec123825c1e md-cluster: fix NULL pointer dereference in process_metadata_update d4ca6ca2c6f5 alpha: fix user-space corruption during memory compaction 33f53ac8e9d5 powercap: intel_rapl: Add PL4 support for Ice Lake 61103a85e632 ACPICA: Abort AML bytecode execution when executing AML_FATAL_OP 5e7c8b5cce4c ACPI: resource: Add JWIPC JVC9100 to irq1_level_low_skip_override[] b803811485ac ACPI: processor: Fix NULL-pointer dereference in acpi_processor_errata_piix4() be10c1bdf64a EFI/CPER: don't go past the ARM processor CPER record buffer 242c652849d9 APEI/GHES: ARM processor Error: don't go past allocated memory b6be51a12441 APEI/GHES: ensure that won't go past CPER allocated record 7780c0bad2a3 EFI/CPER: don't dump the entire memory region 0cb30030b483 x86/xen/pvh: Enable PAE mode for 32-bit guest only when CONFIG_X86_PAE is set 7aac0a30dcf4 rnbd-srv: Zero the rsp buffer before using it 5dbe1f143597 arm64: Add support for TSV110 Spectre-BHB mitigation fc38a1f0d55f perf/arm-cmn: Support CMN-600AE c0ec4299b15b s390/purgatory: Add -Wno-default-const-init-unsafe to KBUILD_CFLAGS bcbfd4d81812 tools/power cpupower: Reset errno before strtoull() ab6564f416a6 smb: client: prevent races in ->query_interfaces() 5d2c4f182ea8 gfs2: fiemap page fault fix a20d029585c2 smb: client: add proper locking around ses->iface_last_update 0a45c428ad19 btrfs: handle user interrupt properly in btrfs_trim_fs() b034e842e326 btrfs: fallback to buffered IO if the data profile has duplication 67288113c5e6 dlm: validate length in dlm_search_rsb_tree f57ccd4657c7 minix: Add required sanity checking to minix_check_superblock() 91705db6642c i3c: mipi-i3c-hci: Reset RING_OPERATION1 fields during init 689d85945cbd i3c: master: svc: Initialize 'dev' to NULL in svc_i3c_master_ibi_isr() d209ebaee93f hfsplus: pretend special inodes as regular files 5632d14b2f2a audit: add missing syscalls to read class 727e5140e0cf fs/buffer: add alert in try_to_free_buffers() for folios without buffers 773855c2ef5f hfsplus: fix volume corruption issue for generic/498 3e762a03713e audit: add fchmodat2() to change attributes class 9c1c09c3d134 statmount: permission check should return EPERM 0fd52d901b69 rtc: interface: Alarm race handling should not discard preceding error 70a69f675b9f libperf build: Always place libperf includes first 5f15fa06dccb libperf: Don't remove -g when EXTRA_CFLAGS are used 73e1f48e5149 perf vendor events amd: Fix Zen 5 MAB allocation events f7ed915c96b3 perf annotate: Fix memcpy size in arch__grow_instructions() 08e16d9a3cef perf maps: Fix reference count leak in maps__find_ams() e9003b440603 libsubcmd: Fix null intersection case in exclude_cmds() 2edbcd501c7b perf callchain: Fix srcline printing with inlines ccfafeb79a91 perf unwind-libdw: Fix invalid reference counts 4062fb52682c perf test stat tests: Fix for virtualized machines 99dc6b1674fb perf test stat: Update test expectations and events 6b3dd1674005 ASoC: dt-bindings: asahi-kasei,ak5558: Fix the supply names 6eb2b702dd61 ASoC: dt-bindings: asahi-kasei,ak4458: Fix the supply names cbebce4ddfab ASoC: dt-bindings: asahi-kasei,ak4458: set unevaluatedProperties:false 596900f63aaf dt-bindings: phy: qcom-edp: Add missing clock for X Elite e464e26b2457 SUNRPC: fix gss_auth kref leak in gss_alloc_msg error path b4af38068467 SUNRPC: auth_gss: fix memory leaks in XDR decoding error paths 6bd22de73c12 Drivers: hv: vmbus: Use kthread for vmbus interrupts on PREEMPT_RT e77bcf83bc90 ata: libata-scsi: refactor ata_scsi_translate() 17df036a24aa ata: pata_ftide010: Fix some DMA timings f1cd271b431b ext4: use optimized mballoc scanning regardless of inode format 61e372122b6d ext4: fix dirtyclusters double decrement on fs shutdown c05033cfc5c7 ext4: fix e4b bitmap inconsistency reports 2f4b1052246c ext4: fix memory leak in ext4_ext_shift_extents() 120c6bd7ca9d ext4: drop extent cache when splitting extent fails d8ee559fccde ext4: drop extent cache after doing PARTIAL_VALID1 zeroout 96007fd3c106 ext4: don't cache extent during splitting extent d17857b4fb9b ext4: don't zero the entire extent if EXT4_EXT_DATA_PARTIAL_VALID1 c83f08394056 ext4: subdivide EXT4_EXT_DATA_VALID1 e3a6498a6339 MIPS: Work around LLVM bug when gp is used as global register variable 6038e092508f drm/amd/display: Use same max plane scaling limits for all 64 bpp formats 6610bc8fe927 ASoC: rockchip: i2s-tdm: Use param rate if not provided by set_sysclk b5f50519bf20 x86/hyperv: Fix error pointer dereference 0761447f6f51 btrfs: fix invalid leaf access in btrfs_quota_enable() if ref key not found 74a52716ec24 btrfs: use the correct type to initialize block reserve for delayed refs ba6b6f1502fa efi: Fix reservation of unaccepted memory table bc78bfd287f3 drm/xe/xe2_hpg: Fix handling of Wa_14019988906 & Wa_14019877138 c89bde96e8dd drm/xe/xe2_hpg: Add set of workarounds 9e18acc5aa0e drm/xe/ptl: Apply Wa_13011645652 8f6848b2f6ea drm/xe/mmio: Avoid double-adjust in 64-bit reads 26a40327c25c drm/xe: Switch MMIO interface to take xe_mmio instead of xe_gt f5508f1e656c drm/xe: Adjust mmio code to pass VF substructure to SRIOV code 9472d36b3de9 drm/xe: Add xe_tile backpointer to xe_mmio 74bff541ec88 drm/xe: Switch mmio_ext to use 'struct xe_mmio' 0b433e086b9f drm/xe: Populate GT's mmio iomap from tile during init 85354b21a548 drm/xe: Move GSI offset adjustment fields into 'struct xe_mmio' c31019bca815 drm/xe: Clarify size of MMIO region 6c5894d7acdb drm/xe: Create dedicated xe_mmio structure 4d4e940bc00b drm/xe: Move forcewake to 'gt.pm' substructure acb70e2949d4 s390/kexec: Make KEXEC_SIG available when CONFIG_MODULES=n 2c538a0b3472 spi: wpcm-fiu: Fix potential NULL pointer dereference in wpcm_fiu_probe() 29f3824b08a9 drm/amd/display: Fix out-of-bounds stream encoder index v3 c4e4df8ea642 drm/amd/display: Reject cursor plane on DCE when scaled differently than primary a0d367e13db6 drm/amdkfd: Fix watch_id bounds checking in debug address watch v2 288311849f8e ASoC: codecs: aw88261: Fix erroneous bitmask logic in Awinic init 42dbd7cadc2c drm/i915/acpi: free _DSM package when no connectors b0f74f5d24fe ASoC: fsl_xcvr: Revert fix missing lock in fsl_xcvr_mode_put() c11cd77a1811 drm/amdgpu: Fix memory leak in amdgpu_ras_init() 16e7e7ad8cdc drm/amdgpu: Use kvfree instead of kfree in amdgpu_gmc_get_nps_memranges() 18a7bbd11f17 drm/amdgpu: Fix memory leak in amdgpu_acpi_enumerate_xcc() 3f2d2cbe8e22 apparmor: fix aa_label to return state from compount and component match 19f2e4055626 apparmor: fix invalid deref of rawdata when export_binary is unset 202824a1f89a apparmor: avoid per-cpu hold underflow in aa_get_buffer 6c7e329629a4 apparmor: make label_match return a consistent value d5eb32cf3e14 apparmor: remove apply_modes_to_perms from label_match e43818b16815 apparmor: fix rlimit for posix cpu timers bd7df71b91d9 apparmor: return -ENOMEM in unpack_perms_table upon alloc failure 47e351dfef60 apparmor: Fix & Optimize table creation from possibly unaligned memory ec737e7fdf2f AppArmor: Allow apparmor to handle unaligned dfa tables 3852eb9a0392 apparmor: fix NULL sock in aa_sock_file_perm 77d2e4d03db6 net/mlx5e: Use unsigned for mlx5e_get_max_num_channels 481a86e5a0e5 net/mlx5: Fix multiport device check over light SFs c65cdf46ce34 bonding: alb: fix UAF in rlb_arp_recv during bond up/down 0ff788b84fa5 octeontx2-af: Fix default entries mcam entry action c480680be377 inet: move icmp_global_{credit,stamp} to a separate cache line 5aea79b91084 icmp: prevent possible overflow in icmp_global_allow() a1f686d273d1 macvlan: observe an RCU grace period in macvlan_common_newlink() error path 1ec0d56a8467 ping: annotate data-races in ping_lookup() 6ed7864a5c1a bpftool: Fix truncated netlink dumps f26af58f794d ipv6: fix a race in ip6_sock_set_v6only() f3fe58ce3792 netfilter: nf_tables: fix use-after-free in nf_tables_addchain() 959ea349c7e2 net: remove WARN_ON_ONCE when accessing forward path array 64af43033503 ipvs: do not keep dest_dst if dev is going down 06676b8ea98f netfilter: nf_conntrack_h323: don't pass uninitialised l3num value bb7ce39f8864 selftests: forwarding: vxlan_bridge_1d_ipv6: fix test failure with br_netfilter enabled 48f3c88a8eaa selftests: forwarding: vxlan_bridge_1d: fix test failure with br_netfilter enabled 724a405ce030 net: bridge: mcast: always update mdb_n_entries for vlan contexts ac30e78dd8de net/rds: rds_sendmsg should not discard payload_len ec4859ac5c93 xen-netback: reject zero-queue configuration from guest a488001a8197 net: usb: catc: enable basic endpoint checking ae3cfa51471c net: sparx5/lan969x: fix PTP clock max_adj value bf5009a06e03 ipv6: Fix out-of-bound access in fib6_add_rt2node(). 7ac58d883280 net: mscc: ocelot: add missing lock protection in ocelot_port_xmit_inj() 6702700ad94c net: mscc: ocelot: split xmit into FDMA and register injection paths 1bbcb4e9c02c net: mscc: ocelot: extract ocelot_xmit_timestamp() helper 9e1815472ae4 net: sparx5/lan969x: fix DWRR cost max to match hardware register width 569a833031d7 selftests: mlxsw: tc_restrictions: Fix test failure with new iproute2 8f6833d919ba cpuidle: Skip governor when only one idle state is available d08fb559b455 ACPI: PM: Add unused power resource quirk for THUNDEROBOT ZERO f712f7256324 objpool: fix the overestimation of object pooling metadata size cf27a5efbbfb selftests/memfd: use IPC semaphore instead of SIGSTOP/SIGCONT 42c7b5d00261 kbuild: Add objtool to top-level clean target 5c32bfbcefc0 powercap: intel_rapl_tpmi: Remove FW_BUG from invalid version check ff0641957bce ACPI: CPPC: Fix remaining for_each_possible_cpu() to use online CPUs c065541b71b7 fs/ntfs3: Fix slab-out-of-bounds read in DeleteIndexEntryRoot b97e371e5d1c fs/ntfs3: prevent infinite loops caused by the next valid being the same dd6c81527d09 fs/ntfs3: Initialize new folios before use 65521ecb8640 io_uring/cancel: de-unionize file and user_data in struct io_cancel_data 0d1f21220261 drbd: always set BLK_FEAT_STABLE_WRITES 68feac21bd4d dmaengine: fsl-edma: don't explicitly disable clocks in .remove() f076d69aae81 backlight: qcom-wled: Change PM8950 WLED configurations 92de557d5de4 backlight: qcom-wled: Support ovp values for PMI8994 37fa7dd13786 leds: qcom-lpg: Check the return value of regmap_bulk_write() 7814b1431848 pinctrl: single: fix refcount leak in pcs_add_gpio_func() 50a55756c90e pinctrl: qcom: sm8250-lpass-lpi: Fix i2s2_data_groups definition 103ac8e3a7f3 iio: sca3000: Fix a resource leak in sca3000_probe() 721f679d4eb2 ovl: Fix uninit-value in ovl_fill_real a7a7196185c3 pinctrl: equilibrium: Fix device node reference leak in pinbank_init() 8991b4e55f85 usb: bdc: fix sleep during atomic 024ea0d2ff89 drivers: iio: mpu3050: use dev_err_probe for regulator request 2b81db8a7f44 mfd: simple-mfd-i2c: Add Delta TN48M CPLD support 02302482205a mfd: simple-mfd-i2c: Keep compatible strings in alphabetical order 8993ca8904db mfd: simple-mfd-i2c: Add SpacemiT P1 support 5614db619980 mfd: simple-mfd-i2c: Add compatible strings for Layerscape QIXIS FPGA 0ecce3512344 mfd: simple-mfd-i2c: Add MAX77705 support e0527c09bcf1 mfd: arizona: Fix regulator resource leak on wm5102_clear_write_sequencer() failure d225e23c07a4 Revert "mmc: rtsx_pci_sdmmc: increase power-on settling delay to 5ms" a771b386cb6c phy: freescale: imx8qm-hsio: fix NULL pointer dereference 3fa4fdfe6883 coresight: etm3x: Fix cpulocked warning on cpuhp 151becfbe1fd watchdog: starfive-wdt: Fix PM reference leak in probe error path 91557f3459e5 iio: pressure: mprls0025pa: fix pressure calculation b843b1f47868 iio: pressure: mprls0025pa: fix scan_type struct 188273fcb3c5 iio: pressure: mprls0025pa: fix interrupt flag 14207e94fe36 iio: pressure: mprls0025pa: fix SPI CS delay violation 72158f9ae29a iio: pressure: mprls0025pa: fix spi_transfer struct initialisation b58f107f359d mmc: rtsx_pci_sdmmc: increase power-on settling delay to 5ms 1ec1a893ee2a serial: SH_SCI: improve "DMA support" prompt 5449736d2a84 serial: imx: change SERIAL_IMX_CONSOLE to bool 01b91cb3e748 staging: greybus: lights: avoid NULL deref b1e288645d69 iio: test: drop dangling symbol in gain-time-scale helpers 9d00bf5ca6d5 soundwire: intel_ace2x: add SND_HDA_CORE dependency 055273d82544 dma: dma-axi-dmac: fix HW scatter-gather not looking at the queue 2813261626d4 dma: dma-axi-dmac: fix SW cyclic transfers 25da519fb5e9 dmaengine: mediatek: uart-apdma: Fix above 4G addressing TX/RX 525858eb00fb interconnect: mediatek: Aggregate bandwidth with saturating add 5d7c7c54b6a5 interconnect: mediatek: Don't hijack parent device c5fa94489fe8 clk: mediatek: Fix error handling in runtime PM setup 56360aa4ddd7 clk: qcom: gfx3d: add parent to parent request map cb7b741e350f clk: qcom: dispcc-sm7150: Fix dispcc_mdss_pclk1_clk_src f9c45fb866d9 clk: qcom: dispcc-sdm845: Enable parents for pixel clocks c4a00b99dc6d clk: Move clk_{save,restore}_context() to COMMON_CLK section b109dd4970a0 clk: qcom: gcc-ipq5018: flag sleep clock as critical 596048c0d7ec clk: qcom: gcc-msm8917: Remove ALWAYS_ON flag from cpp_gdsc 6b3b27031c5b clk: qcom: gcc-msm8953: Remove ALWAYS_ON flag from cpp_gdsc a4fb5a9dc622 clk: qcom: gcc-qdu1000: Update the SDCC RCGs to use shared_floor_ops 0c74a63b797c clk: qcom: gcc-x1e80100: Update the SDCC RCGs to use shared_floor_ops 1936fe74af4a clk: qcom: gcc-sdx75: Update the SDCC RCGs to use shared_floor_ops daa1b65f23cd clk: qcom: gcc-sm4450: Update the SDCC RCGs to use shared_floor_ops 99db18b34fd6 clk: qcom: gcc-sm8450: Update the SDCC RCGs to use shared_floor_ops 762c69e6ed2a clk: meson: gxbb: Limit the HDMI PLL OD to /4 on GXL/GXM SoCs 909b48a3b3b4 clk: qcom: rcg2: compute 2d using duty fraction directly 662676d6e735 clk: qcom: gcc-sm8650: Use floor ops for SDCC RCGs b1b6935689b8 clk: qcom: gcc-sm8550: Use floor ops for SDCC RCGs 762a26818934 fbdev: au1200fb: Fix a memory leak in au1200fb_drv_probe() f620398f0db1 fbdev: of_display_timing: Fix device node reference leak in of_get_display_timings() bcd1aea42610 tracing: Remove duplicate ENABLE_EVENT_STR and DISABLE_EVENT_STR macros 9b0513905e05 tracing: Properly process error handling in event_hist_trigger_parse() 596c8b168cfd fs/nfs: Fix readdir slow-start regression 2eff9d3537b8 nvdimm: virtio_pmem: serialize flush requests 6037124dbf67 scsi: csiostor: Fix dereference of null pointer rn eb10468cef22 scsi: ufs: host: mediatek: Require CONFIG_PM d52e13122d37 scsi: smartpqi: Fix memory leak in pqi_report_phys_luns() b3a8b2bbc48e pNFS: fix a missing wake up while waiting on NFS_LAYOUT_DRAIN 84667e99a8bc RDMA/uverbs: Add __GFP_NOWARN to ib_uverbs_unmarshall_recv() kmalloc 2b3b3e0d8abf power: supply: qcom_battmgr: Recognize "LiP" as lithium-polymer 9fab0120907e power: supply: pm8916_lbc: Fix use-after-free for extcon in IRQ handler 896a54984905 mtd: spinand: Fix kernel doc fbd5b014a966 mtd: parsers: ofpart: fix OF node refcount leak in parse_fixed_partitions() 130381dd82e7 cxl: Fix premature commit_end increment on decoder commit failure 5c32cabddc4e RDMA/core: add rdma_rw_max_sge() helper for SQ sizing 3c2ae79fb19d RDMA/rxe: Fix race condition in QP timer handlers ee998cdbff66 RDMA/mlx5: Fix memory leak in GET_DATA_DIRECT_SYSFS_PATH handler d533425ac1f2 RDMA/uverbs: Validate wqe_size before using it in ib_uverbs_post_send 8d9798d6ff41 NFS/localio: use GFP_NOIO and non-memreclaim workqueue in nfs_local_commit af87ebd34318 nfs/localio: eliminate unnecessary kref in nfs_local_fsync_ctx e97f5fac8ce9 mtd: parsers: Fix memory leak in mtd_parser_tplink_safeloader_parse() d473b0677310 crypto: ccp - Send PSP_CMD_TEE_RING_DESTROY when PSP_CMD_TEE_RING_INIT fails 90c1858d4e65 crypto: ccp - Factor out ring destroy handling to a helper 809fd697dab0 crypto: ccp - Add an S4 restore flow 122c3cb563bd crypto: ccp - Declare PSP dead if PSP_CMD_TEE_RING_INIT fails 38c30ee6a626 platform/x86/amd/pmf: Prevent TEE errors after hibernate 3d2b60a8d682 vfio/pci: Lock upstream bridge for vfio_pci_core_disable() 12e07451ef98 mtd: rawnand: cadence: Fix return type of CDMA send-and-wait helper 9b67c7fd5bff IB/mlx5: Fix port speed query for representors c8fb5c965ac7 RDMA/mlx5: Fix UMR hang in LAG error state unload f143ea1ff6bd tools/power/x86/intel-speed-select: Fix file descriptor leak in isolate_cpus() 38c5b49fffa1 RDMA/iwcm: Fix workqueue list corruption by removing work_list ce6f8e007682 RDMA/rxe: Fix double free in rxe_srq_from_init 6b644871d4e4 RDMA/rtrs-srv: fix SG mapping 93bdf715d33c power: supply: wm97xx: Fix NULL pointer dereference in power_supply_changed() 352e364a56cc power: supply: bq27xxx: fix wrong errno when bus ops are unsupported e9667db8b17e power: reset: nvmem-reboot-mode: respect cell size for nvmem_cell_write 82d3eb97a976 power: supply: sbs-battery: Fix use-after-free in power_supply_changed() 2178dc65d45e power: supply: rt9455: Fix use-after-free in power_supply_changed() dbe579e620ef power: supply: pm8916_lbc: Fix use-after-free in power_supply_changed() b69bb88e20c6 power: supply: pm8916_bms_vm: Fix use-after-free in power_supply_changed() 4350505e82b4 power: supply: goldfish: Fix use-after-free in power_supply_changed() f3fbe309c9bf power: supply: cpcap-battery: Fix use-after-free in power_supply_changed() 4aeaf03c1726 power: supply: bq25980: Fix use-after-free in power_supply_changed() 83c27fdd696a power: supply: bq256xx: Fix use-after-free in power_supply_changed() 76a42ba547a9 power: supply: act8945a: Fix use-after-free in power_supply_changed() 847eeb6c0efc power: supply: ab8500: Fix use-after-free in power_supply_changed() 7ac44096bad0 RDMA/hns: Notify ULP of remaining soft-WCs during reset c3c45f367981 RDMA/hns: Fix RoCEv1 failure due to DSCP 562c96b1393d RDMA/hns: Fix WQ_MEM_RECLAIM warning 2adc6c08f960 IB/cache: update gid cache on client reregister event 46ccb0a0f950 RDMA/rtrs: server: remove dead code 6d59928f8b0e octeontx2-pf: Unregister devlink on probe failure 193a9e2d4d18 ionic: Rate limit unknown xcvr type messages 63692055743e octeon_ep_vf: ensure dbell BADDR updation 530a79f0589c octeon_ep: ensure dbell BADDR updation 2286bfef3368 octeon_ep: disable per ring interrupts 52731ef44381 serial: caif: fix use-after-free in caif_serial ldisc_close() b04061f89ffc xfrm: fix ip_rt_bug race in icmp_route_lookup reverse path 35e00df60f7e net: Switch to skb_dstref_steal/skb_dstref_restore for ip_route_input callers 791f028b1e42 net: Add skb_dstref_steal and skb_dstref_restore b89269bdb3ba net: sunhme: Fix sbus regression 21c303fec138 net: atm: fix crash due to unvalidated vcc pointer in sigd_send() e99f816a424e smb: client: correct value for smbd_max_fragmented_recv_size 73ec7c96601d procfs: fix missing RCU protection when reading real_parent in do_task_stat() d2c785733dfb net: hns3: fix double free issue for tx spare buffer 5cd63214b529 PCI: Add ACS quirk for Pericom PI7C9X2G404 switches [12d8:b404] 05feaf826390 netfilter: nft_set_rbtree: check for partial overlaps in anonymous sets afe1a28fa9de netfilter: nft_set_rbtree: fix bogus EEXIST with NLM_F_CREATE with null interval 4f899976eedc netfilter: nft_counter: fix reset of counters on 32bit archs bce4581e02d5 netfilter: nft_set_hash: fix get operation on big endian 79b713ef4261 netfilter: nfnetlink_queue: do shared-unconfirmed check before segmentation 371de2bef658 netfilter: nfnetlink_queue: optimize verdict lookup with hash table cf70cedce327 nfc: hci: shdlc: Stop timers and work before freeing context 19e42490c89b inet: RAW sockets using IPPROTO_RAW MUST drop incoming ICMP da637d725a11 bonding: only set speed/duplex to unknown, if getting speed failed 7d56ba306e93 octeontx2-af: Fix PF driver crash with kexec kernel booting 73db8a61af8b mptcp: fix receive space timestamp initialization 1f5433b23e2a of: unittest: fix possible null-pointer dereferences in of_unittest_property_copy() 530d1ecd3639 ucount: check for CAP_SYS_RESOURCE using ns_capable_noaudit() d075cf169e82 ipc: don't audit capability check in ipc_permissions() a4720c30ea77 selftests/mm: convert page_size to unsigned long 306c11e7b82e selftests/mm: pagemap_ioctl: Fix types mismatches shown by compiler options 3f3dc0663ca1 PCI/ACPI: Restrict program_hpx_type2() to AER bits 7d168610e727 PCI: Add defines for bridge window indexing f68179cc3d88 PCI: Initialize RCB from pci_configure_device() ef04714ef4ae wifi: ath10k: sdio: add missing lock protection in ath10k_sdio_fw_crashed_dump() 0f514a9bf432 PCI: Check parent for NULL in of_pci_bus_release_domain_nr() f4a681c870d1 tcp: tcp_tx_timestamp() must look at the rtx queue 955c5d670b5a fat: avoid parent link count underflow in rmdir 063a6f22478e nfsd: never defer requests during idmap lookup e4d0e135ee38 xdrgen: Initialize data pointer for zero-length items 25ad5d691390 NFS: NFSERR_INVAL is not defined by NFSv2 a3a05e5ae1bb xdrgen: Fix struct prefix for typedef types in program wrappers 771ba4c6a805 dm: use bio_clone_blkg_association a84d30e8d2ba iommu/vt-d: Clear Present bit before tearing down PASID entry e148b5194ad9 iommu/vt-d: Avoid draining PRQ in sva mm release path 191311180935 iommu/vt-d: Drain PRQs when domain removed from RID d5cd1db0ac93 iommu/vt-d: Separate page request queue from SVM 5962c30a6f05 iommu/vt-d: Flush cache for PASID table before using it 428a543c4ab1 PCI: Mark 3ware-9650SA Root Port Extended Tags as broken 19d0708a39ed kallsyms/ftrace: set module buildid in ftrace_mod_address_lookup() 0bdc4b1ad694 module: add helper function for reading module_buildid() 95d9748cc9b4 netfilter: nf_conncount: fix tracking of connections from localhost 63fece123bbe netfilter: nft_compat: add more restrictions on netlink attributes 3d0994ed0aa1 netfilter: nf_conncount: increase the connection clean up limit to 64 4fe47671aa29 netfilter: nf_conncount: make nf_conncount_gc_list() to disable BH 01726b9021cb netfilter: nf_tables: reset table validation state on abort f6c4c7a5cf5b wifi: cfg80211: stop NAN and P2P in cfg80211_leave fa9861e5c8af mctp i2c: initialise event handler read bytes 8468dd5bc1c4 net: mctp-i2c: fix duplicate reception of old data 414259caf81a quota: fix livelock between quotactl and freeze_super dec62b741a39 dm: use READ_ONCE in dm_blk_report_zones 175ac0a61154 dm: fix unlocked test for dm_suspended_md 160913364fcc PCI/portdrv: Fix potential resource leak d773a4826195 PCI: Do not attempt to set ExtTag for VFs c8c6cb9fa632 Documentation: tracing: Add PCI tracepoint documentation 2cacab8c7a05 Documentation: trace: Refactor toctree b53efc230ab2 docs: fix WARNING document not included in any toctree 51b7181cfbed PCI/P2PDMA: Release per-CPU pgmap ref when vm_insert_page() fails 33b2230edd86 wifi: cfg80211: Fix use_for flag update on BSS refresh 9e2b4159289c PCI/PM: Avoid redundant delays on D3hot->D3cold 29c4f6e0ac97 Documentation: PCI: endpoint: Fix ntb/vntb copy & paste errors e44b390e01c1 PCI: mediatek: Fix IRQ domain leak when MSI allocation fails d8308dff30bd hwmon: (pmbus/mpq8785) fix VOUT_MODE mismatch during identification 369d2ed2da20 hwmon: pmbus: mpq8785: Add support for MPM82504 8c311c726f1f hwmon: pmbus: mpq8785: Implement VOUT feedback resistor divider ratio configuration 7cd0bc5fe14c hwmon: pmbus: mpq8785: Prepare driver for multiple device support 914b47c9b824 Revert "hwmon: (ibmpex) fix use-after-free in high/low store" ee842490a604 spi: tools: Add include folder to .gitignore 0b605e8ce606 HID: intel-ish-hid: fix NULL-ptr-deref in ishtp_bus_remove_all_clients 1a2482e5fcb4 platform/chrome: cros_ec_lightbar: Fix response size initialization be7486307449 drm/xe: Unregister drm device on probe error 450d8e18ba8b evm: Use ordered xattrs list to calculate HMAC in evm_init_hmac() e25b9f071226 media: uvcvideo: Fix allocation for small frame sizes 9aae11893e55 platform/chrome: cros_typec_switch: Don't touch struct fwnode_handle::dev b61deabec46b drm/buddy: release free_trees array on buddy mm teardown af8294a2a51c drm/msm/a2xx: fix pixel shader start on A225 9f6453e5177a media: ccs: Accommodate C-PHY into the calculation 33a76dcced8c drm/msm/dpu: fix CMD panels on DPU 1.x - 3.x 9c53a12b3eb4 drm/msm/disp: set num_planes to 1 for interleaved YUV formats d955aeb26e12 HID: playstation: Add missing check for input_ff_create_memless db3cc304a9a6 regulator: core: move supply check earlier in set_machine_constraints() a2106181066a drm/msm/dpu: fix WD timer handling on DPU 8.x f5478534cd47 drm/msm/dpu: Set vsync source irrespective of mdp top support 03306604738b drm/msm/disp/dpu: add merge3d support for sc7280 ba4c9a09e360 drm/amdgpu: Use explicit VCN instance 0 in SR-IOV init 0d4c7c2cbdf9 drm/amdkfd: Fix signal_eviction_fence() bool return value 9654ca3790b1 drm/amd: Drop "amdgpu kernel modesetting enabled" message 52defdd4034d media: chips-media: wave5: Fix memory leak on codec_info allocation failure 3ad42057c5b8 ASoC: nau8821: Fixup nau8821_enable_jack_detect() 47e5bf04d05b ASoC: nau8821: Avoid unnecessary blocking in IRQ handler bbedfab10d49 ASoC: nau8821: Consistently clear interrupts before unmasking f8071500177f smack: /smack/doi: accept previously used values 17da2a78bd31 smack: /smack/doi must be > 0 b78e8a12edb3 drm/panthor: Evict groups before VM termination d12be704f710 ALSA: vmaster: Relax __free() variable declarations 37135ec54b97 ALSA: pcm: Relax __free() variable declarations 232cfc860a9d ALSA: pcm: use new array-copying-wrapper a54e02cc637b drm/panel: sw43408: Remove manual invocation of unprepare at remove 00b16c7b17b4 workqueue: Process rescuer work items one-by-one using a cursor 2178f0587c91 workqueue: Only assign rescuer work when really needed fa80f288a5e4 workqueue: Factor out assign_rescuer_work() 104504a773b3 drm/panthor: Make sure we resume the tick when new jobs are submitted 47b2d73b5a0e drm/panthor: Fix the logic that decides when to stop ticking 4f74f3da52cb drm/panthor: Fix immediate ticking on a disabled tick bab13dcc4404 drm/panthor: Fix the group priority rotation logic 202d532672b3 drm/panthor: Fix the full_tick check 8ec4f1b14a61 drm/panthor: Recover from panthor_gpu_flush_caches() failures 50a74e38ded1 arm64: dts: qcom: sm6115: Add CX_MEM/DBGC GPU regions b5dc5990ee32 arm64: dts: qcom: agatti: Add CX_MEM/DBGC GPU regions 5d31ca77c743 arm64: dts: qcom: x1e: bus is 40-bits (fix 64GB models) 466400375386 arm64: dts: qcom: sdm845-db845c: specify power for WiFi CH1 e3e856e399ed arm64: dts: qcom: sdm845-db845c: drop CS from SPIO0 982a23d5d35b arm64: dts: qcom: qrb4210-rb2: Fix UART3 wakeup IRQ storm 8f15df824262 arm64: dts: amlogic: g12: assign the MMC A signal clock 041037a24fbe arm64: dts: amlogic: g12: assign the MMC B and C signal clocks 8f5196fc8d17 arm64: dts: amlogic: gx: assign the MMC signal clocks 0378739bc8ce arm64: dts: amlogic: axg: assign the MMC signal clocks ddf288f21d7a arm64: dts: amlogic: c3: assign the MMC signal clocks d1ffd3c633a9 hwspinlock: omap: Handle devm_pm_runtime_enable() errors 03af8c0d468e arm64: dts: ti: k3-j784s4-j742s2-main-common.dtsi: Refactor watchdog instances for j784s4 3f1cb740e890 arm64: dts: ti: k3-j784s4-main.dtsi: Move c71_3 node to appropriate order 448d14117381 arm64: dts: amlogic: s4: fix mmc clock assignment 6cdbd53e0867 arm64: dts: amlogic: s4: assign mmc b clock to 24MHz 3d9d76bfaf28 arm64: dts: mediatek: mt8183-jacuzzi-pico6: Fix typo in pinmux node e018f7d42b58 arm: dts: lpc32xx: add clocks property to Motor Control PWM device tree node 4b992b5cadf6 ARM: dts: lpc32xx: Set motor PWM #pwm-cells property value to 3 cells f8b16d5764ee powerpc/eeh: fix recursive pci_lock_rescan_remove locking in EEH event handling a58c97828911 soc: mediatek: svs: Fix memory leak in svs_enable_debug_write() cdcc7e335f2d soc: qcom: cmd-db: Use devm_memremap() to fix memory leak in cmd_db_dev_probe 682d9d73d513 powerpc/uaccess: Move barrier_nospec() out of allow_read_{from/write}_user() 37cf81576dff ARM: dts: allwinner: sun5i-a13-utoo-p66: delete "power-gpios" property 5a6ebb6cc3c5 arm64: dts: qcom: msm8994-octagon: Fix Analog Devices vendor prefix of AD7147 dce238e12d94 arm64: dts: qcom: x1e80100: Fix USB combo PHYs SS1 and SS2 ref clocks a7037c3eb013 arm64: dts: qcom: sdm845-oneplus: Mark l14a regulator as boot-on c818d840c878 arm64: dts: qcom: sdm845-oneplus: Don't mark ts supply boot-on cd4b042521d2 arm64: dts: qcom: sdm630: fix gpu_speed_bin size 7aaa4384b871 clk: qcom: Return correct error code in qcom_cc_probe_by_index() 5c85820e3905 arm64: dts: tqma8mpql-mba8mp-ras314: Fix HDMI CEC pad control settings 255af53a67e1 arm64: dts: tqma8mpql-mba8mpxl: Fix HDMI CEC pad control settings 4a4ffd352a69 firmware: arm_ffa: Correct 32-bit response handling in NOTIFICATION_INFO_GET dca904ffd751 EDAC/i5400: Fix snprintf() limit calculation in calculate_dimm_size() 1fd7c29a1543 EDAC/i5000: Fix snprintf() size calculation in calculate_dimm_size() 35b034cfddca soc: qcom: smem: handle ENOMEM error during probe 9a6fc69a570c pstore/ram: fix buffer overflow in persistent_ram_save_old() d5b7730f0699 hwrng: core - use RCU and work_struct to fix race condition 24761c8441c4 hwrng: core - Allow runtime disabling of the HW RNG 38d80307decc crypto: starfive - Fix memory leak in starfive_aes_aead_do_one_req() acd06323c2c4 fs/tests: exec: drop duplicate bprm_stack_limits test vectors a6a73403733e sched/rt: Skip currently executing CPU in rto_next_cpu() 375622de010f sched/deadline: Clear the defer params 6e661a23d886 media: pci: mg4b: Use IRQF_NO_THREAD 8da4ba169435 mfd: wm8350-core: Use IRQF_ONESHOT 670abc7e5694 EDAC/altera: Remove IRQF_ONESHOT fb7481344f9e scsi: efct: Use IRQF_ONESHOT and default primary handler be3ff229b90a Bluetooth: btintel_pcie: Use IRQF_ONESHOT and default primary handler 5938fb0e3285 platform/x86: int0002: Remove IRQF_ONESHOT from request_irq() a13566c2f7b7 genirq: Set IRQF_COND_ONESHOT in devm_request_irq(). 0db169a91381 bpf: Fix bpf_xdp_store_bytes proto for read-only arg d5c6f254528c crypto: caam - fix netdev memory leak in dpaa2_caam_probe 96bac9ce2292 crypto: hisilicon/trng - support tfms sharing the device a9c6d178d822 x86/fgraph,bpf: Switch kprobe_multi program stack unwind to hw_regs path 41d766859df7 x86/fgraph,bpf: Fix stack ORC unwind from kprobe_multi return probe 3eb79d8d02c7 tracing: Add ftrace_fill_perf_regs() for perf event a142bbc11f8b tracing: Add ftrace_partial_regs() for converting ftrace_regs to pt_regs 33d4e904e24d fgraph: Replace fgraph_ret_regs with ftrace_regs fee2da394085 ftrace: Rename ftrace_regs_return_value to ftrace_regs_get_return_value ff57dbe037be ftrace: Use arch_ftrace_regs() for ftrace_regs_*() macros a701884d1398 ftrace: Consolidate ftrace_regs accessor functions for archs using pt_regs 550a16d87d33 ftrace: Make ftrace_regs abstract from direct use ef3166bd8d33 tracing: Add a comment about ftrace_regs definition c2681ce178a2 bpf, sockmap: Fix FIONREAD for sockmap 4f9f0cbb4b27 bpf, sockmap: Fix incorrect copied_seq calculation 57cd88f4b609 crypto: ccp - narrow scope of snp_range_list 1c3506ea8599 crypto: ccp - Ensure implicit SEV/SNP init and shutdown in ioctls cf8a8f13deb0 hrtimer: Fix trace oddity 0f893b33e6a7 selftests/bpf: Fix resource leak in serial_test_wq on attach failure 58059335e465 bpf: Preserve id of register in sync_linked_regs() 0bbfa5542670 crypto: hisilicon/sec2 - support skcipher/aead fallback for hardware queue unavailable 21ad2c1dcb18 crypto: hisilicon/zip - adjust the way to obtain the req in the callback function ce2e7e471da0 crypto: octeontx - fix dma_free_coherent() size dc8af9baf764 crypto: cavium - fix dma_free_coherent() size 4e39e4d847b0 ARM: VDSO: Patch out __vdso_clock_getres() if unavailable 5731312c4cb5 libbpf: Fix OOB read in btf_dump_get_bitfield_value 5478540eafbe selftests/bpf: veristat: fix printing order in output_stats() 138fc0ee9034 crypto: qat - fix warning on adf_pfvf_pf_proto.c 9faf20a1819b perf/x86/core: Do not set bit width for unavailable counters f96c5ccf95ae s390/cio: Fix device lifecycle handling in css_alloc_subchannel() 06b3e765fdc5 PM: sleep: wakeirq: harden dev_pm_clear_wake_irq() against races 73caf86fe92e cpufreq: intel_pstate: Enable asym capacity only when CPU SMT is not possible 26bec96bc5f3 perf: arm_spe: Properly set hw.state on failures b909d420d6b8 PM: wakeup: Handle empty list in wakeup_sources_walk_start() c94fd6e8a71e md/raid1: fix memory leak in raid1_run() aaac92c72d6e md/raid1: fix memory leak in raid1_run() if no active rdev db8c4b15deab Partial revert "x86/xen: fix balloon target initialization for PVH dom0" dbe8e81a2ec6 ublk: Validate SQE128 flag before accessing the cmd 8af710156c53 thermal/of: Fix reference leak in thermal_of_cm_lookup() 87283ce6218b iomap: fix submission side handling of completion side errors 10bb2f5d365d cpufreq: scmi: Fix device_node reference leak in scmi_cpu_domain_id() b114bc9f075c OPP: Return correct value in dev_pm_opp_get_level 9a205d16e88b md/raid10: fix any_working flag handling in raid10_sync_request fcb54ef1dbfc md/raid5: fix raid5_run() to return error when log_init() fails 3c08d86d0c8e thermal: intel: x86_pkg_temp_thermal: Handle invalid temperature 101cc8e5506a cpuidle: governors: menu: Always check timers with tick stopped c812673deb81 io_uring/sync: validate passed in offset cce354524da4 ACPICA: Fix NULL pointer dereference in acpi_ev_address_space_dispatch() a67a23e9dedf io_uring: use release-acquire ordering for IORING_SETUP_R_DISABLED becedc3aceca xen/virtio: Don't use grant-dma-ops when running as Dom0 4dd5c62c201c rnbd-srv: Fix server side setting of bi_size for special IOs 5afd2f4e1608 rnbd-srv: use bio_add_virt_nofail cef2315cb84e block: add a bio_add_virt_nofail helper 4d339b219004 smb: client: fix potential UAF and double free in smb2_open_file() 4eb830847d84 btrfs: fix block_group_tree dirty_list corruption af30ffbdeb05 btrfs: qgroup: return correct error when deleting qgroup relation item 8d582d65d20b erofs: handle end of filesystem properly for file-backed mounts 113eac582ccb erofs: get rid of raw bi_end_io() usage cc09d55f519e tpm: st33zp24: Fix missing cleanup on get_burstcount() error a61b8412e3eb tpm: tpm_i2c_infineon: Fix locality leak on get_burstcount() failure 140a45bd4f6d i3c: dw: Fix memory leak in dw_i3c_master_i2c_xfers() 7ff9c410dd26 i3c: dw: Initialize spinlock to avoid upsetting lockdep 87d4954b5c59 gfs2: Fix use-after-free in iomap inline data write path ca7c67bdd293 gfs2: Fix slab-use-after-free in qd_put ae4d9781ed0f gfs2: Retries missing in gfs2_{rename,exchange} 1d8a994edffa i3c: master: Update hot-join flag only on success 7edd798f191e fs: add for 'init_fs' 28050803c559 i3c: Move device name assignment after i3c_bus_init 01fd0ceb44e1 audit: move the compat_xxx_class[] extern declarations to audit_arch.h 1f16679a5aa6 rcu: Fix rcu_read_unlock() deadloop due to softirq 586a5effe50f rcu: Remove local_irq_save/restore() in rcu_preempt_deferred_qs_handler() 24d44e0f05ab rcu: Refactor expedited handling check in rcu_read_unlock_special() 51838112d9c2 hfsplus: return error when node already exists in hfs_bnode_create 517813eb6e73 auxdisplay: arm-charlcd: fix release_mem_region() size 9c80d688f402 RDMA/umad: Reject negative data_len in ib_umad_write 87b7a036d2c7 RDMA/siw: Fix potential NULL pointer dereference in header processing Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index a8d17a5c14..444cab413f 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -15,13 +15,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "96b72162b68a3a6084945ef4bf357a3de5c196ed" -SRCREV_meta ?= "d427132ce6626fdae8a1690305e1b578a5509699" +SRCREV_machine ?= "5c7879a7b2753ea23b696b6a3e7e4a38c40f5776" +SRCREV_meta ?= "9a7e5434a02c01df4901784d29694d940743d56c" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.74" +LINUX_VERSION ?= "6.12.76" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 22b15e69f2..63135de5c7 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc include recipes-kernel/linux/cve-exclusion.inc include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.74" +LINUX_VERSION ?= "6.12.76" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" -SRCREV_meta ?= "d427132ce6626fdae8a1690305e1b578a5509699" +SRCREV_machine ?= "b1a05d710b72913717bcc1139e714080d99e79a8" +SRCREV_meta ?= "9a7e5434a02c01df4901784d29694d940743d56c" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index 92807f9057..0e1b1fa61f 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "f4b46d6d3a4e38d532c5e11866d3d071ae398f16" -SRCREV_machine:qemuarm64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" -SRCREV_machine:qemuloongarch64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" -SRCREV_machine:qemumips ?= "da8487babd144628f801a204696523e077829fa2" -SRCREV_machine:qemuppc ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" -SRCREV_machine:qemuriscv64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" -SRCREV_machine:qemuriscv32 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" -SRCREV_machine:qemux86 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" -SRCREV_machine:qemux86-64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" -SRCREV_machine:qemumips64 ?= "29ca2370cd8722cc5fd712f4a6b4757ad84fde3e" -SRCREV_machine ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" -SRCREV_meta ?= "d427132ce6626fdae8a1690305e1b578a5509699" +SRCREV_machine:qemuarm ?= "9dcacd6df5189be895d0b0d59d728ef61743338d" +SRCREV_machine:qemuarm64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" +SRCREV_machine:qemuloongarch64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" +SRCREV_machine:qemumips ?= "eca7f78fe1f9f2bd98951df1100e46a8e39d0ea0" +SRCREV_machine:qemuppc ?= "b1a05d710b72913717bcc1139e714080d99e79a8" +SRCREV_machine:qemuriscv64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" +SRCREV_machine:qemuriscv32 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" +SRCREV_machine:qemux86 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" +SRCREV_machine:qemux86-64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" +SRCREV_machine:qemumips64 ?= "8acf70fbeddae4770f3d24cbd8548402ae6a4f9e" +SRCREV_machine ?= "b1a05d710b72913717bcc1139e714080d99e79a8" +SRCREV_meta ?= "9a7e5434a02c01df4901784d29694d940743d56c" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "444b39ef6108313e8452010b22aaba588e8fb92b" +SRCREV_machine:class-devupstream ?= "39b686f8d57d7506af7789e915fe7fd103b0fe57" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.74" +LINUX_VERSION ?= "6.12.76" PV = "${LINUX_VERSION}+git" From patchwork Thu Apr 23 15:44:59 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 86775 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5428DFC0342 for ; Thu, 23 Apr 2026 15:45:33 +0000 (UTC) Received: from mail-qt1-f177.google.com (mail-qt1-f177.google.com [209.85.160.177]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.696.1776959124451441469 for ; Thu, 23 Apr 2026 08:45:24 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=sqx8H49H; spf=pass (domain: gmail.com, ip: 209.85.160.177, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f177.google.com with SMTP id d75a77b69052e-50fb1932b62so28255421cf.2 for ; Thu, 23 Apr 2026 08:45:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776959123; x=1777563923; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=k236gXRs81CN9ie1/t9yvFXJqJdsZr1mLUPWAFS1JwM=; b=sqx8H49HQviEkfhVj4ei7vNyRyFy8t1cUQqwV3jo9zq1uRBU1v3kHCUdxXTN24RQ8v FUuh+FLW0eDWveJwUc4yccD5NyOkSUfIihwsdzJsLBbqHiqXvyGnDGKmU6KCQa5Sc7XC 1Bwfg91oktG5gUduypXP5sBGS689JTW5EeUNBIndNv9aJP6NHIySJmbbQC1nqV1TcE+m C7SYJcza3sICBlYWHMSdfOKKp+TyuDkspJnvYgJpwDUTVLiRy9xoYUIHCwpHQQVCJ4y6 GB9LPvlr9A6eYd59ZWanAEWo9wxO4sC0BpshPqByZsDQjrrf72QBxYpkN+lSbnfRdF/C zH3A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776959123; x=1777563923; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=k236gXRs81CN9ie1/t9yvFXJqJdsZr1mLUPWAFS1JwM=; b=AM5KyLKKTeSB6AB9V+0whvvGpmDFNcyOW25s2guMJr4krRKl2RgCtMtLrcS4HKmWjc ATZA1M6SXHBBHToK+RorOaWYLVMmpR7btuhGN0Ov8uUc3s546broSquOXfrozvXACmdv iv3AfLQvIuFg/Q51Gjy3ZBmfMCJJFRF+Kidxh0UKdPhfNHPD11c95R5PPfKyUOyMqhuV EA5jh3LtlvWYNTuLj4nlnTSShAqjLNjHPPC+FXMntkDr0ndH/4jbpe3Y57Y0n92M+AAc 9IkH2BoGum9xwawLtllZ3jFmx28cnlKFYuy/dhxCtA/YKlUJCQhnR9o0Nw8OIL/b/jgo rGVw== X-Gm-Message-State: AOJu0YydjQOvnOrpbCI0iPSNoKk7mS4QoJeT5ZbWXR/uM3P3YViZfteL G3OoC2Tz4/+cKFpttekAoeWW6KsIH+vSDij2puW4jYcVT0kpp5Ogbr4v X-Gm-Gg: AeBDieu/p8ZgNCNRDGVeC0mtNXMILNvzRXwzAkWznkY7xq54zIofTzjvLpeCml/O9qd q3ugUV5SMlv+iuJHCsjvwbCnvUW1kfLHdiEYIHnNQDsMbt2CHREKa72NVNBE8o8eDMUvvLG7zoU vkHMYoJREOpFXzpjG4rCk+eambjAvvyMNRKE0fx1Y8pTp3+9AwR+C6D29UMcmfu22d5NcEdunoM JD+P2regDHxgiHZcfmmkSLha/8Nfd1uPb/EjWAKrPlGrJ07XU7BFJRbhlzlmJ62gyxG9YbHwyh0 G+WFW+azlnAx6joIr4PS4DOz7Yu9nWRIH0tkpfyM/bV9fW9u4lK72gGNJKuFqwXtLTrA3IPIn2P g57b2FKc5eF+J81Ma0bZBQgQjNFUba/KAqD2HqY5kiyNC9Tb1MrSIbmN6NrkHycq644ldOlA+4d 7X9kHy03H5SxGUONMQaEDPHHCH5OA7DkiMv4k4rvLFikm/kHjDIFOeF09qjyMvo6n/bs84kvhJM 5LSvv+ZAu0bMLm4Jjsmv6W1eLcK1LgRLpmvqPePGPcBp7MokTkiuNeliGvN9GCASnF/+g== X-Received: by 2002:ac8:5807:0:b0:50b:4b2f:1606 with SMTP id d75a77b69052e-50e36b3da09mr450013221cf.15.1776959121727; Thu, 23 Apr 2026 08:45:21 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-50fb416b3f5sm74400031cf.28.2026.04.23.08.45.20 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Apr 2026 08:45:20 -0700 (PDT) From: bruce.ashfield@gmail.com To: yoann.congal@smile.fr Cc: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 08/18] linux-yocto/6.12: update CVE exclusions (6.12.76) Date: Thu, 23 Apr 2026 11:44:59 -0400 Message-ID: <20260423154509.1933646-9-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260423154509.1933646-1-bruce.ashfield@gmail.com> References: <20260423154509.1933646-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Apr 2026 15:45:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235808 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 3 changes (2 new | 1 updated): - 2 new CVEs: CVE-2025-70031, CVE-2026-0846 - 1 updated CVEs: CVE-2025-7195 Date: Mon, 9 Mar 2026 19:31:35 +0000 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.12.inc | 30 ++++++++++++++----- 1 file changed, 23 insertions(+), 7 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index c7726e1306..60d337b010 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-02-23 05:12:32.087151+00:00 for kernel version 6.12.74 -# From linux_kernel_cves cve_2026-02-23_0400Z-1-g3cbc7410733 +# Generated at 2026-03-09 19:34:33.465338+00:00 for kernel version 6.12.76 +# From linux_kernel_cves cve_2026-03-09_1900Z-1-gab0cca33c43 python check_kernel_cve_status_version() { - this_version = "6.12.74" + this_version = "6.12.76" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -9032,6 +9032,8 @@ CVE_STATUS[CVE-2023-54326] = "fixed-version: Fixed from version 6.5" CVE_STATUS[CVE-2023-7324] = "fixed-version: Fixed from version 6.3" +# CVE-2024-14027 needs backporting (fixed from 6.13) + CVE_STATUS[CVE-2024-26581] = "fixed-version: Fixed from version 6.8" CVE_STATUS[CVE-2024-26582] = "fixed-version: Fixed from version 6.8" @@ -20396,12 +20398,8 @@ CVE_STATUS[CVE-2025-71224] = "cpe-stable-backport: Backported in 6.12.70" CVE_STATUS[CVE-2025-71225] = "cpe-stable-backport: Backported in 6.12.70" -# CVE-2025-71226 needs backporting (fixed from 6.19) - # CVE-2025-71227 needs backporting (fixed from 6.19) -CVE_STATUS[CVE-2025-71228] = "cpe-stable-backport: Backported in 6.12.70" - CVE_STATUS[CVE-2025-71229] = "cpe-stable-backport: Backported in 6.12.72" CVE_STATUS[CVE-2025-71230] = "fixed-version: only affects 6.13 onwards" @@ -20420,6 +20418,8 @@ CVE_STATUS[CVE-2025-71236] = "cpe-stable-backport: Backported in 6.12.72" CVE_STATUS[CVE-2025-71237] = "cpe-stable-backport: Backported in 6.12.72" +CVE_STATUS[CVE-2025-71238] = "cpe-stable-backport: Backported in 6.12.74" + CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66" CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.12.66" @@ -20930,3 +20930,19 @@ CVE_STATUS[CVE-2026-23229] = "cpe-stable-backport: Backported in 6.12.72" CVE_STATUS[CVE-2026-23230] = "cpe-stable-backport: Backported in 6.12.72" +CVE_STATUS[CVE-2026-23231] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-23232] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23233] = "cpe-stable-backport: Backported in 6.12.74" + +CVE_STATUS[CVE-2026-23234] = "cpe-stable-backport: Backported in 6.12.74" + +CVE_STATUS[CVE-2026-23235] = "cpe-stable-backport: Backported in 6.12.74" + +CVE_STATUS[CVE-2026-23236] = "cpe-stable-backport: Backported in 6.12.74" + +CVE_STATUS[CVE-2026-23237] = "cpe-stable-backport: Backported in 6.12.74" + +CVE_STATUS[CVE-2026-23238] = "cpe-stable-backport: Backported in 6.12.74" + From patchwork Thu Apr 23 15:45:00 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 86779 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 804EFFC0372 for ; Thu, 23 Apr 2026 15:45:33 +0000 (UTC) Received: from mail-qt1-f171.google.com (mail-qt1-f171.google.com [209.85.160.171]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.697.1776959124918387930 for ; Thu, 23 Apr 2026 08:45:25 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=js22jjx3; spf=pass (domain: gmail.com, ip: 209.85.160.171, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f171.google.com with SMTP id d75a77b69052e-50fae4d1f85so52564741cf.3 for ; Thu, 23 Apr 2026 08:45:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776959124; x=1777563924; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=VWC8Ecuztcw6jF2Y27hX5VZnRr5MlT6MtjuZO9ZJqbk=; b=js22jjx31eLdsKbSmer6rgqnv+3KXTLmIsSnCAmGoBEiqe4QfR61qwiwENRPlfgFT+ +0FNyFcY0RS0O+OqvyzXni1kj4B4hq65ztMX41VQUpSv4q4nm6NoroPoTvsiYTqmEMl/ 1YUlwM3D5eAvuSf09ECzBR/fQsXfVVOGdF1aWK35dK3qBuNdofoQWqprG+CxevHacNA/ CsgfHRvWb4A1pOPfRQ8F5WoCGnyKzxm6LuiPBct8r8tjdiTuUayhi75LpcJZ/mq4Z5vk XK1ruj/hhobj1zFhyQL4OExf80aG6NpFJjfu6Dt5D9rH4vNqzIdushPHkMQDk2ZQho3y eGEg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776959124; x=1777563924; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=VWC8Ecuztcw6jF2Y27hX5VZnRr5MlT6MtjuZO9ZJqbk=; b=dS2WBUaE5jmt9r/PGW4b6QsC1kzGw4xuNkwKlxnVeXaPed58jVfmA1WynorRunDDEe 7N9Pz2VErzfBT9cotUJ5MG0H2V6Ow84oPvZyRZ8MJ14YAHjlrLhii4ySjbPgE5glxx7J 3OKnpM9O4KGcM6S6a/cF9GZTSuPV8KK/MmBhqlRHwCBQENv/wers49Mh5AqT/lgjwWWs e+GvlDsf3I202U/X5B3LUAqW2kdLuRoM9nNncQNg3oW0Pr1m4gnEFIJTofdSIulkjmrs CcOqr5YnHd2RFmxcR+FYOkJAIs7ci291Xvmi97J6DjuqrsV7dRvV4/+pDAK2YL6YhV0P RZUQ== X-Gm-Message-State: AOJu0Yx/hx7D4n2JjlfFKQxXUh1kz5sbKFIUfxjdaBhz/Q/FgTUVQota Mqhkxo9HAS2uHsH7akEZpdjNnfHGd05pgiKm6ZRkyrBNjTynJKFMIeOIb9Y4WQ1B X-Gm-Gg: AeBDievwqKdUWVA5xy/mDZabJC4YMSUm7tFFA1OQQ8eKqHmStG0hG49wArdm4ENjMvk BYFYp+VrKmHzQUfKkrKcsDkPGKex87NFJF+0gHDSbq2GtBvak9v07U5ws6uNukw4nbZ8yWaAaXK FzsaLAxILFKB6NHUeB3ZDRTHl5znlRQEvrAN2HWGcQAXf53vNF4oop7UJ64ZVdLE/EWmN/wsB+2 sF2xmlHsaY/ZMmy+br6gXpOwKVQxBzux7rw5Igvgqd4FnooKCYUh15GuJhBV/VY5V/LX+jGFpmc ksRbWSvv1LEblyKuC8hQaiP9s63Jooug8MPDI7W+j30LtfCNi2iJ+JbgsTZMOkewGdKV9VLWlG/ cHWLGPVVCdr6twEv1raU+iWw1t0cNwbzcp/KAaJl/U3BhoxEYd47gGBgB88SlwX8K92PeCg3X4w X3v5LK1EzqOTxuQoHH3y3tZc3eHGh0hy1T5RQfCwOe+Szl5aWqxVe8Wqt+wtRviSbZd4r4u2UEF 6o7jA8M1EtVmDYQmFr/DngkGHQ5uG+HW4LIWZ6Td9qM1OAFAVJK2gyqnfQcw4blpDPv6g== X-Received: by 2002:a05:622a:13ca:b0:50f:b978:82f3 with SMTP id d75a77b69052e-50fb97887a7mr160942241cf.52.1776959123422; Thu, 23 Apr 2026 08:45:23 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-50fb416b3f5sm74400031cf.28.2026.04.23.08.45.21 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Apr 2026 08:45:22 -0700 (PDT) From: bruce.ashfield@gmail.com To: yoann.congal@smile.fr Cc: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 09/18] linux-yocto/6.12: update to v6.12.77 Date: Thu, 23 Apr 2026 11:45:00 -0400 Message-ID: <20260423154509.1933646-10-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260423154509.1933646-1-bruce.ashfield@gmail.com> References: <20260423154509.1933646-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Apr 2026 15:45:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235809 From: Bruce Ashfield Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: 6f232446a629 Linux 6.12.77 1ba82a3bbc09 ata: libata-eh: Fix detection of deferred qc timeouts 0d12453818c3 ata: libata: cancel pending work after clearing deferred_qc d2459cba1d99 ata: libata-eh: correctly handle deferred qc timeouts 42ea6c476b27 ata: libata-core: fix cancellation of a port deferred qc work 08d9175578d6 ext4: fix potential null deref in ext4_mb_init() eecce0263999 apparmor: fix race between freeing data and fs accessing it f9761add6d10 apparmor: fix race on rawdata dereference 34fc60b125ed apparmor: fix differential encoding verification 0fc63dd91706 apparmor: fix unprivileged local user can do privileged policy management 86feeccd6b93 apparmor: Fix double free of ns_name in aa_replace_profiles() 76b4d36c5122 apparmor: fix missing bounds check on DEFAULT table in verify_dfa() b73c1dff8a9d apparmor: fix side-effect bug in match_char() macro usage 853ce31ca720 apparmor: fix: limit the number of levels of policy namespaces 999bd704b0b6 apparmor: replace recursive profile removal with iterative approach 786e2c2a87d9 apparmor: fix memory leak in verify_header 15c3eb8916e7 apparmor: validate DFA start states are in bounds in unpack_pdb 524ce8b4ea8f net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks 42b380f97d65 tracing: Add NULL pointer check to trigger_data_free() 1cf22986da18 selftest/arm64: Fix sve2p1_sigill() to hwcap test c7c790a07697 xdp: produce a warning when calculated tailroom is negative 581e209d1ff0 i40e: use xdp.frame_sz as XDP RxQ info frag_size 7f46fd89d863 i40e: fix registering XDP RxQ info addccd49c541 xsk: introduce helper to determine rxq->frag_size c12b63c87250 xdp: use modulo operation to calculate XDP frag tailroom 91a89d3bdc2f net/sched: act_ife: Fix metalist update behavior f7c9f8e36074 net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop f0373e9317bc net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled aa73deb3b6b7 net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled 4614301b900a selftests/harness: order TEST_F and XFAIL_ADD constructors 0b7cd6fa9aff kselftest/harness: Use helper to avoid zero-size memset warning b73dfe1ea7be net: ethernet: mtk_eth_soc: Reset prog ptr to old_prog in case of error in mtk_xdp_setup() c12d570d7192 netfilter: nft_set_pipapo: split gc into unlink and reclaim phase dcba62d4fade net: stmmac: Fix error handling in VLAN add and delete paths 78141b8832e1 nfc: rawsock: cancel tx_work before socket teardown 0beea51b28b2 nfc: nci: clear NCI_DATA_EXCHANGE before calling completion callback 3245801d44a4 nfc: nci: free skb on nci_transceive early error paths 0196f36ad01e net_sched: sch_fq: clear q->band_pkt_count[] in fq_reset() 2451949f0584 net: nfc: nci: Fix zero-length proprietary notifications 5bc4e69306ed net: sched: avoid qdisc_reset_all_tx_gt() vs dequeue race for lockless qdiscs 5c38a7ed9a9f hwmon: (max6639) fix inverted polarity d7040a5da952 hwmon: (max6639) : Configure based on DT property 15fb6d627484 nvme: fix memory allocation in nvme_pr_read_keys() a0167a4984ca nvme: reject invalid pr_read_keys() num_keys values 549b68ba830f drm/xe/reg_sr: Fix leak on xa_store failure 9507f9953a2a i2c: i801: Revert "i2c: i801: replace acpi_lock with I2C bus lock" 1e6eaf2150ef drm/sched: Fix kernel-doc warning for drm_sched_job_done() d6bdc685e19f amd-xgbe: fix sleep while atomic on suspend/resume 4bdc94d45d54 net: ipv4: fix ARM64 alignment fault in multipath hash seed 3310fc11fc47 ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu() 827c92c15ac8 smb/client: fix buffer size for smb311_posix_qinfo in SMB311_posix_query_info() 20a126dbd61e smb/client: fix buffer size for smb311_posix_qinfo in smb2_compound_op() cfcfa0ca0212 bpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim 3dfab6040c10 iavf: fix netdev->max_mtu to respect actual hardware limit 27e9019fe199 xen/acpi-processor: fix _CST detection using undersized evaluation buffer 8519e6883a94 net/rds: Fix circular locking dependency in rds_tcp_tune 1f8b8f0db008 indirect_call_wrapper: do not reevaluate function pointer 7b692dff8df0 wifi: mt76: Fix possible oob access in mt76_connac2_mac_write_txwi_80211() 3356464e50e1 wifi: mt76: mt7925: Fix possible oob access in mt7925_mac_write_txwi_80211() ca1adc04fc2c wifi: mt76: mt7996: Fix possible oob access in mt7996_mac_write_txwi_80211() 5feeea59ed14 wifi: wlcore: Fix a locking bug 35e173d7b878 wifi: cw1200: Fix locking in error paths 02973ef983cb octeon_ep_vf: avoid compiler and IQ/OQ reordering 4f3acd77273c octeon_ep_vf: Relocate counter updates before NAPI 496163a7292e octeon_ep: avoid compiler and IQ/OQ reordering 799cc585326f octeon_ep: Relocate counter updates before NAPI d36ad7e126c6 bpf/bonding: reject vlan+srcmac xmit_hash_policy change when XDP is loaded fcb74331c483 net: dsa: realtek: rtl8365mb: fix rtl8365mb_phy_ocp_write return value 6c8d7984cb25 kunit: tool: copy caller args in run_kernel to prevent mutation 8891bffb532a rust: kunit: fix warning when !CONFIG_PRINTK 1a42ea28e01b drm/xe: Do not preempt fence signaling CS instructions b64fbd718cf4 wifi: rsi: Don't default to -EOPNOTSUPP in rsi_mac80211_config 38063cc435b6 can: mcp251x: fix deadlock in error path of mcp251x_open 8bcf2d847adb can: bcm: fix locking for bcm_op runtime updates c8e57b713c17 amd-xgbe: fix MAC_TCR_SS register width for 2.5G and 10M speeds ff4d5a3e77f7 net: ti: icssg-prueth: Fix ping failure after offload mode setup when link speed is not 1G 2d9f57ea29a1 atm: lec: fix null-ptr-deref in lec_arp_clear_vccs fa4412cdc517 dpaa2-switch: Fix interrupt storm after receiving bad if_id in IRQ handler 3f2793713c13 xsk: Fix zero-copy AF_XDP fragment drop 2a9ea988465e xsk: Fix fragment node deletion to prevent buffer leak bf56bae0e5ec xsk: s/free_list_node/list_node/ fd5614763805 xsk: Get rid of xdp_buff_xsk::xskb_list_node ebcdcb5063dd net: ethernet: ti: am65-cpsw-nuss/cpsw-ale: Fix multicast entry handling in ALE table 98c92c9b2414 drm/solomon: Fix page start when updating rectangle in page addressing mode 54b631ac6935 e1000e: clear DPG_EN after reset to avoid autonomous power-gating b7e91827e1cf i40e: Fix preempt count leak in napi poll tracepoint 7f213357476b idpf: change IRQ naming to match netdev and ethtool queue numbering 31f22b8051ee hwmon: (it87) Check the it87_lock() return value 188ba3468cb7 pinctrl: cirrus: cs42l43: Fix double-put in cs42l43_pin_probe() c2611fc89506 HID: multitouch: new class MT_CLS_EGALAX_P80H84 bdaabb4cf660 HID: multitouch: add quirks for Lenovo Yoga Book 9i 6890141e856c platform/x86: thinkpad_acpi: Fix errors reading battery thresholds af3b0ec98dc1 pinctrl: equilibrium: fix warning trace on load 5818c3fcd072 pinctrl: equilibrium: rename irq_chip function callbacks d5e7ed87a3b6 hwmon: (aht10) Fix initialization commands for AHT20 947a50cf8abf hwmon: (aht10) Add support for dht20 64f87b96de0e nvme: fix admin queue leak on controller reset 8cad5463aec6 ACPI: APEI: GHES: Disable KASAN instrumentation when compile testing with clang < 18 400989c54567 btrfs: always fallback to buffered write if the inode requires checksum 5d219040ee7b net: stmmac: dwmac-loongson: Set clk_csr_i to 100-150MHz 4d1ea0416384 ARM: clean up the memset64() C wrapper d151b94967c8 xattr: switch to CLASS(fd) 8899f3d3f3fa selftests: mptcp: join: check removing signal+subflow endp 7141b5997c59 selftests: mptcp: more stable simult_flows tests ec5c17c687b1 scsi: core: Fix refcount leak for tagset_refcnt b746a357abfb smb: client: Don't log plaintext credentials in cifs_set_cifscreds 5b3aa7384329 smb: client: fix broken multichannel with krb5+signing 4a5c8e1b6a58 smb: client: fix cifs_pick_channel when channels are equally loaded 1e906c08594c drbd: fix null-pointer dereference on local read error eef1390125b6 drbd: fix "LOGIC BUG" in drbd_al_begin_io_nonblock() 9e9fa5ad37c9 Squashfs: check metadata block offset is within range 4fcfa424a581 scsi: target: Fix recursive locking in __configfs_open_file() 91f3e8d84c89 tracing: Fix WARN_ON in tracing_buffers_mmap_close 41170716421c nfsd: Fix cred ref leak in nfsd_nl_threads_set_doit(). 78b8d2f55a56 net/sched: ets: fix divide by zero in the offload path 2fd37450d271 RDMA/irdma: Fix kernel stack leak in irdma_create_user_ah() da8eaa73bc37 IB/mthca: Add missed mthca_unmap_user_db() for mthca_create_srq() f5d8af683410 wifi: mac80211: fix NULL pointer dereference in mesh_rx_csa_frame() bfde158d5d13 wifi: mac80211: bounds-check link_id in ieee80211_ml_reconfiguration 57e39fe8da57 wifi: cfg80211: cancel rfkill_block work in wiphy_unregister() 2a60c588d5d3 wifi: radiotap: reject radiotap with unknown bits d3904ca40515 ALSA: usb-audio: Use correct version for UAC3 header validation 9067651da90a platform/x86: dell-wmi: Add audio/mic mute key codes 0e6115c2f2fa platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data 399da820ecfe x86/efi: defer freeing of boot services memory 892dbaf46bb7 HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them 73f2354f5a33 can: usb: f81604: handle bulk write errors properly c5d69da6c919 can: usb: f81604: handle short interrupt urb messages properly b878444519fa can: usb: etas_es58x: correctly anchor the urb in the read bulk callback bd85f21a6219 can: ucan: Fix infinite loop from zero-length messages c001214e1220 can: usb: f81604: correctly anchor the urb in the read bulk callback 18f75b9cbdc3 can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message 95556b4e8797 net: usb: pegasus: validate USB endpoints 51c20ea5f155 net: usb: kalmia: validate USB endpoints f33e80d195a0 net: usb: kaweth: validate USB endpoints 7ff14eb070f0 nfc: pn533: properly drop the usb interface reference on disconnect d71781bad59b media: dvb-core: fix wrong reinitialization of ringbuffer on reopen d1398cca55cf namespace: fix proc mount iteration 029be23f553b eventpoll: Fix integer overflow in ep_loop_check_proc() 2ad8b01cb7ee net: arcnet: com20020-pci: fix support for 2.5Mbit cards ab6a494abecb ALSA: hda/conexant: Fix headphone jack handling on Acer Swift SF314 27e8f7a6a1b8 ALSA: hda/realtek: Add quirk for Samsung Galaxy Book3 Pro 360 (NP965QFG) a797f5ebfca8 ALSA: hda/realtek: Add quirk for Gigabyte G5 KF5 (2023) 57b36d4c3474 LoongArch: Remove some extern variables in source files 8eeb34ae9d4c LoongArch: Handle percpu handler address for ORC unwinder 5d8e3b81aee2 LoongArch: Remove unnecessary checks for ORC unwinder 2e6949777d1d LoongArch/orc: Use RCU in all users of __module_address(). 4c2ca3160852 ksmbd: add chann_lock to protect ksmbd_chann_list xarray c9c00b85b85b ksmbd: check return value of xa_store() in krb5_authenticate 5345810d9a80 hwmon: (max16065) Use READ/WRITE_ONCE to avoid compiler optimization induced race 1b15298ef44b ALSA: hda/conexant: Add quirk for HP ZBook Studio G4 4b9d205dbc74 drm/amd: Fix hang on amdgpu unload by using pci_dev_is_disconnected() 56289298431e usb: cdns3: fix role switching during resume eef31e654661 usb: cdns3: call cdns_power_is_lost() only once in cdns_resume() 151b775f5dbf usb: cdns3: remove redundant if branch 2788b1562776 btrfs: zoned: fixup last alloc pointer after extent removal for RAID0/10 acefb51f406c btrfs: define the AUTO_KFREE/AUTO_KVFREE helper macros 531c755f2507 btrfs: zoned: fix stripe width calculation 3a5125dd004c btrfs: zoned: fixup last alloc pointer after extent removal for DUP 21b26c833bfd btrfs: zoned: fixup last alloc pointer after extent removal for RAID1 ea7cc214d3b3 btrfs: zoned: fix alloc_offset calculation for partly conventional block groups 80cf22e7ffc1 btrfs: fix periodic reclaim condition fcb261823f7a btrfs: fix reclaimed bytes accounting after automatic block group reclaim c41742dabb80 btrfs: get used bytes while holding lock at btrfs_reclaim_bgs_work() be5ee3033326 btrfs: drop unused parameter fs_info from do_reclaim_sweep() 6c9b043177e6 uprobes: Fix incorrect lockdep condition in filter_chain() 1d34cb886c82 uprobes: switch to RCU Tasks Trace flavor for better performance abfdf449fb3d drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free fe99afca8cea drm/exynos/vidi: Remove redundant error handling in vidi_get_modes() 4c4193829109 drm/exynos: vidi: fix to avoid directly dereferencing user pointer 51a31c0bc282 of/kexec: refactor ima_get_kexec_buffer() to use ima_validate_range() f11d7d088f5e ima: verify the previous kernel's IMA buffer lies in addressable RAM a3c9222702e1 ima: kexec: define functions to copy IMA log at soft boot 130e69879746 kexec: define functions to map and unmap segments 24d7c77955b8 ima: define and call ima_alloc_kexec_file_buf() be4ac8d25924 ima: rename variable the seq_file "file" to "ima_kexec_file" 9e6bd0a8c1af ima: kexec: silence RCU list traversal warning a97228fb32e1 clk: tegra: tegra124-emc: fix device leak on set_rate() 76cce803bf51 arm64: dts: rockchip: Fix rk3588 PCIe range mappings 497b04231b8f arm64: dts: rockchip: Fix rk356x PCIe range mappings 48b3f08e68b2 iommu/vt-d: Skip dev-iotlb flush for inaccessible PCIe device without scalable mode 9b5df5eedc02 Input: synaptics_i2c - guard polling restart in resume 432612bf478b Input: synaptics_i2c - replace use of system_wq with system_dfl_wq c8272cfe36bd workqueue: Add system_percpu_wq and system_dfl_wq 9eea2f57d11b ext4: always allocate blocks only from groups inode can use ec23aa36ddf3 ext4: implement linear-like traversal across order xarrays 5abec3fee594 ext4: refactor choose group to scan group d99d714f714c ext4: convert free groups order lists to xarrays 007967dab681 ext4: factor out ext4_mb_scan_group() 2475d11bc431 ext4: factor out ext4_mb_might_prefetch() ca4c90dd2aac ext4: factor out __ext4_mb_scan_group() f0bb92429c97 ext4: add ext4_try_lock_group() to skip busy groups 01d9a8c2615d mailbox: Prevent out-of-bounds access in fw_mbox_index_xlate() ac75c29c9c95 mailbox: Allow controller specific mapping using fwnode b9816026481e mailbox: Use guard/scoped_guard for con_mutex 186ad0c3034a mailbox: Use dev_err when there is error 0469ec15c923 mailbox: remove unused header files c7b57c4d294c mailbox: sort headers alphabetically 492c8eb02e81 mailbox: don't protect of_parse_phandle_with_args with con_mutex 2920ec61c98b ext4: don't set EXT4_GET_BLOCKS_CONVERT when splitting before submitting I/O 3e00915433df ext4: correct the comments place for EXT4_EXT_MAY_ZEROOUT 97ac11dbcb42 drm/tegra: dsi: fix device leak on probe ce22aaed0112 ata: libata-scsi: avoid Non-NCQ command starvation e44a35402439 ata: libata: Introduce ata_port_eh_scheduled() 87097457625a ata: libata: Remove ATA_DFLAG_ZAC device flag 4e0e3c784f37 ata: libata-scsi: Remove struct ata_scsi_args bcb93aeed8b2 ata: libata-scsi: Document all VPD page inquiry actors b057df339361 ata: libata-scsi: Refactor ata_scsiop_maint_in() d62d7321212b ata: libata-scsi: Refactor ata_scsiop_read_cap() 2b3717897c38 ata: libata-scsi: Refactor ata_scsi_simulate() 2657439265d3 KVM: x86: Ignore -EBUSY when checking nested events from vcpu_block() 630a61552e58 media: dw9714: Fix powerup sequence a4cf3497fb9a media: dw9714: add support for powerdown pin 1158193e7635 media: dw9714: move power sequences to dedicated functions 3ca2f0906173 media: tegra-video: Fix memory leak in __tegra_channel_try_format() a29639a34297 PCI: Use resource_set_range() that correctly sets ->end 889b5cb678c1 resource: Add resource set range and size helpers 52d89a64dd31 Revert "PCI: qcom: Don't wait for link if we can detect Link Up" 29ff60fda59f PCI: qcom: Don't wait for link if we can detect Link Up ff6c9a40e426 Revert "PCI: dw-rockchip: Don't wait for link since we can detect Link Up" fdf5e166058a PCI: dw-rockchip: Don't wait for link since we can detect Link Up 1f23a48ff2b8 memory: mtk-smi: fix device leak on larb probe 984992f31cfb memory: mtk-smi: fix device leaks on common probe a7df760f7074 x86/acpi/boot: Correct acpi_is_processor_usable() check again 2129ce65c83e PCI: Correct PCI_CAP_EXP_ENDPOINT_SIZEOF_V2 value d2c31d8e03d0 bpf: Fix stack-out-of-bounds write in devmap 80ad264da02c bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing 283cc83f63e0 btrfs: fix compat mask in error messages in btrfs_check_features() a78db325aca1 btrfs: print correct subvol num if active swapfile prevents deletion 390cc898680e btrfs: fix warning in scrub_verify_one_metadata() ca57b339e4a7 btrfs: fix objectid value in error message in check_extent_data_ref() 0226914e4d5e btrfs: fix incorrect key offset in error message in check_dev_extent_item() 0507cf9ae0a9 ALSA: hda: cs35l56: Fix signedness error in cs35l56_hda_posture_put() 1c84c68e7524 ALSA: pci: hda: use snd_kcontrol_chip() 1359449b33bb drm/amdgpu: Fix locking bugs in error paths 3a9828141d4b drm/amdgpu: Replace kzalloc + copy_from_user with memdup_user 0518ce29ad20 drm/amdgpu: Unlock a mutex before destroying it a7afb8f810c0 PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry 5e13ef9235c7 PCI: dwc: ep: Use align addr function for dw_pcie_ep_raise_{msi,msix}_irq() fd9528fbe2fb PCI: dwc: endpoint: Implement the pci_epc_ops::align_addr() operation 9373f0bf9954 PCI: endpoint: Introduce pci_epc_mem_map()/unmap() fa391a36e178 PCI: endpoint: Introduce pci_epc_function_is_valid() 00d5cf8c5978 s390/vtime: Fix virtual timer forwarding 3120d12adfbf s390/idle: Fix cpu idle exit cpu time accounting 5c48fdc4b462 perf: Fix __perf_event_overflow() vs perf_remove_from_context() race 367e4285127f ALSA: usb-audio: Use inclusive terms 192cc667e77e ALSA: usb-audio: Cap the packet size pre-calculations 1bcc4ea8207a scsi: ufs: core: Move link recovery for hibern8 exit failure to wl_resume 6e4f70034387 cgroup/cpuset: Fix incorrect use of cpuset_update_tasks_cpumask() in update_cpumasks_hier() 27d4450c8f2b rseq: Clarify rseq registration rseq_size bound check comment 3bc5887b0a2b x86/fred: Correct speculative safety in fred_extint() 5190fc2ba7a0 ALSA: usb-audio: Remove VALIDATE_RATES quirk for Focusrite devices 7cefc67b2c4f ALSA: scarlett2: Fix DSP filter control array handling 2fd1470ca412 ALSA: scarlett2: Fix redeclaration of loop variable c5dc39f8ae05 scsi: pm8001: Fix use-after-free in pm8001_queue_command() 734c2363eb8a scsi: lpfc: Properly set WC for DPP mapping 686eb378a4a5 irqchip/sifive-plic: Fix frozen interrupt due to affinity setting 016f1f7ccafd KVM: arm64: Hide S1POE from guests when not supported by the host 871630255ecd drm/logicvc: Fix device node reference leak in logicvc_drm_config_parse() 36cb28b6d303 drm/vmwgfx: Return the correct value in vmw_translate_ptr functions 0d9cb5860077 drm/vmwgfx: Fix invalid kref_put callback in vmw_bo_dirty_release Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 444cab413f..dd906d5ac6 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -15,13 +15,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "5c7879a7b2753ea23b696b6a3e7e4a38c40f5776" -SRCREV_meta ?= "9a7e5434a02c01df4901784d29694d940743d56c" +SRCREV_machine ?= "d684a294eb3f7a4122771290905565ddc36efd45" +SRCREV_meta ?= "19b5087399932add6bc893493fe1146fca7d4799" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.76" +LINUX_VERSION ?= "6.12.77" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 63135de5c7..2803d0215a 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc include recipes-kernel/linux/cve-exclusion.inc include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.76" +LINUX_VERSION ?= "6.12.77" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "b1a05d710b72913717bcc1139e714080d99e79a8" -SRCREV_meta ?= "9a7e5434a02c01df4901784d29694d940743d56c" +SRCREV_machine ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" +SRCREV_meta ?= "19b5087399932add6bc893493fe1146fca7d4799" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index 0e1b1fa61f..294431f5dd 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "9dcacd6df5189be895d0b0d59d728ef61743338d" -SRCREV_machine:qemuarm64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" -SRCREV_machine:qemuloongarch64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" -SRCREV_machine:qemumips ?= "eca7f78fe1f9f2bd98951df1100e46a8e39d0ea0" -SRCREV_machine:qemuppc ?= "b1a05d710b72913717bcc1139e714080d99e79a8" -SRCREV_machine:qemuriscv64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" -SRCREV_machine:qemuriscv32 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" -SRCREV_machine:qemux86 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" -SRCREV_machine:qemux86-64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" -SRCREV_machine:qemumips64 ?= "8acf70fbeddae4770f3d24cbd8548402ae6a4f9e" -SRCREV_machine ?= "b1a05d710b72913717bcc1139e714080d99e79a8" -SRCREV_meta ?= "9a7e5434a02c01df4901784d29694d940743d56c" +SRCREV_machine:qemuarm ?= "448ef862c891700b3d94201e63a831b34a7713e4" +SRCREV_machine:qemuarm64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" +SRCREV_machine:qemuloongarch64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" +SRCREV_machine:qemumips ?= "794aa4ace83aa50352e4abc39ed84229c864310c" +SRCREV_machine:qemuppc ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" +SRCREV_machine:qemuriscv64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" +SRCREV_machine:qemuriscv32 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" +SRCREV_machine:qemux86 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" +SRCREV_machine:qemux86-64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" +SRCREV_machine:qemumips64 ?= "3b21c90c913a00a52877a25a4cd1aff57fc14695" +SRCREV_machine ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" +SRCREV_meta ?= "19b5087399932add6bc893493fe1146fca7d4799" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "39b686f8d57d7506af7789e915fe7fd103b0fe57" +SRCREV_machine:class-devupstream ?= "6f232446a62980e51f537db1c655e686d869b9ed" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.76" +LINUX_VERSION ?= "6.12.77" PV = "${LINUX_VERSION}+git" From patchwork Thu Apr 23 15:45:01 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 86776 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9380EFC0374 for ; Thu, 23 Apr 2026 15:45:33 +0000 (UTC) Received: from mail-qt1-f173.google.com (mail-qt1-f173.google.com [209.85.160.173]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.764.1776959127753545981 for ; Thu, 23 Apr 2026 08:45:27 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=BNQ8j3hs; spf=pass (domain: gmail.com, ip: 209.85.160.173, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f173.google.com with SMTP id d75a77b69052e-50e97863425so42775401cf.0 for ; Thu, 23 Apr 2026 08:45:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776959127; x=1777563927; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=ZJGOXdYu10fwpMr9zBsLqeRD3t7DOwS/an95sVp0ipI=; b=BNQ8j3hsCX4beM7orXCckh+eD+FnV8Ml4Lz5fwmfvaCTf1fBK1Ok+dYKiLJc337t6K QX4eR83A7kKRWHKLw4TSipKnTeOBtW5I5b1mWFmztC3lEDAZJWj54lBc7oAYj9GftdMG xe0Pf+xG+NY9KposSSKqkk5AFNq9cbMh+v0zkhtFfre+qszRbF8EwB2VaiyKEs148wnQ 72PDeGsnMVX8KZYjs2SZ+Tu5d1jKLlOyZIjYQfHJt+IGzPsobf4fNbclmqbfqZTWjCs8 rHuxMiHF/LDxThM+wWRDcQJaRkNYYcb7h+Oaf8VWeK7z16fqXxUnXCaGg+9tOFZrWum/ srMA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776959127; x=1777563927; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=ZJGOXdYu10fwpMr9zBsLqeRD3t7DOwS/an95sVp0ipI=; b=VabEhtXAv3O+41IUZRewoN0p5r34m0+e3r9vg5CwoGR7QKF8T+aGdaj1TUh7+/YXnO hJkCv65O+v26MsABgG5pM4PDLRmjyTFb3h/Q6uysoRYhnpU2SCt01zc7gciD44qKV92w ogufkR1dGALJfghGzQTP7mMdKW90IiHos4UTHTcElS6kxNjxq8txNNah1u/1cfwTN+WE mDZYUAqg6cTyTrkNh4uAfaJPy31uqSpZKgU1CZh1D6t2iVNUL8I2Y3NKgZG09v+Co4v6 Ge8tWktbCqpyOjtt5yt9RXP51QujS0LkgpkVm4LLCmAVjlFbpROltrILRWm1Mj2izl8q kNWw== X-Gm-Message-State: AOJu0Yzs3cBfbjqMakg2XqH1jB4HfgVrQknJMZl9O397o/c2Uxg3oLtw m6KcMf3tLjigFjzpYSSd7947evn9GsBiLpDVHcTl8hWCfkit1UPk/FWKmY6USAVV X-Gm-Gg: AeBDievY/sLN+UcGuhK0RmoNrosLXdws9uQ4f+unrjl967xBJaIlvwamcTlktXyUx+q uTg0XJ94C386sE6SgK02jdJOo2Ff/ZREjNX6jY01h+xas+qGcemsLzcFG9hRpm0QF7DKn2D1Md8 I6mRFEck1G63Zdqdmryb04TKcMzj3aRFEKGX2nHUYquK/YkSogHGoQyTnaeABDtuG4v7AKs1zn3 NbU9NHCFD19Xo4CvKJmL/RiL4gcsf1x9DXHbbOF6BNszptOHcfLRb628eU34quUeXuFWnzJVX1l AYeU/mAN+4QRcZ/41+CX/MtJ3cCeFOZa2lAXl/sLrkWrSKRUKQHju6xnGpqQnRpDGRB7095DKsd BudVJBQpapUAGdztKyjj1GVdE5/s2dvkJ8p9AjlNKNrxC6q9OcQzWIBV93qdSaVkIULv9xMR1SK okGMPJV+B3W++EHDKIf5zkY5RY0Ct55KwGqYgkvo361XAHi7u4h4QBhEXM1kYp5zUs2lYZ04pD7 gvy/ikorMA2DdheSRT5yu5MkNc5qgfibwdZuuUHZYNb7c+tUhPexqRlPNjEEtpExIXDcQ== X-Received: by 2002:ac8:59cd:0:b0:50f:c5f0:f2fd with SMTP id d75a77b69052e-50fc5f0f44amr94754101cf.47.1776959126640; Thu, 23 Apr 2026 08:45:26 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-50fb416b3f5sm74400031cf.28.2026.04.23.08.45.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Apr 2026 08:45:23 -0700 (PDT) From: bruce.ashfield@gmail.com To: yoann.congal@smile.fr Cc: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 10/18] linux-yocto/6.12: update CVE exclusions (6.12.77) Date: Thu, 23 Apr 2026 11:45:01 -0400 Message-ID: <20260423154509.1933646-11-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260423154509.1933646-1-bruce.ashfield@gmail.com> References: <20260423154509.1933646-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Apr 2026 15:45:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235810 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 21 changes (20 new | 1 updated): - 20 new CVEs: CVE-2025-47873, CVE-2025-58427, CVE-2025-61952, CVE-2025-61979, CVE-2025-62403, CVE-2025-62500, CVE-2025-64301, CVE-2025-64733, CVE-2025-64735, CVE-2025-64776, CVE-2025-65119, CVE-2025-66000, CVE-2025-66042, CVE-2025-66342, CVE-2025-66503, CVE-2025-66617, CVE-2025-66633, CVE-2026-20726, CVE-2026-22882, CVE-2026-25790 - 1 updated CVEs: CVE-2026-3207 Date: Tue, 17 Mar 2026 18:55:39 +0000 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.12.inc | 20 +++++++++++++------ 1 file changed, 14 insertions(+), 6 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 60d337b010..5fa3966719 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-03-09 19:34:33.465338+00:00 for kernel version 6.12.76 -# From linux_kernel_cves cve_2026-03-09_1900Z-1-gab0cca33c43 +# Generated at 2026-03-17 19:07:54.629545+00:00 for kernel version 6.12.77 +# From linux_kernel_cves cve_2026-03-17_1800Z-2-g4ae4487ca91 python check_kernel_cve_status_version() { - this_version = "6.12.76" + this_version = "6.12.77" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -9032,7 +9032,7 @@ CVE_STATUS[CVE-2023-54326] = "fixed-version: Fixed from version 6.5" CVE_STATUS[CVE-2023-7324] = "fixed-version: Fixed from version 6.3" -# CVE-2024-14027 needs backporting (fixed from 6.13) +CVE_STATUS[CVE-2024-14027] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2024-26581] = "fixed-version: Fixed from version 6.8" @@ -20420,6 +20420,8 @@ CVE_STATUS[CVE-2025-71237] = "cpe-stable-backport: Backported in 6.12.72" CVE_STATUS[CVE-2025-71238] = "cpe-stable-backport: Backported in 6.12.74" +CVE_STATUS[CVE-2025-71239] = "cpe-stable-backport: Backported in 6.12.75" + CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66" CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.12.66" @@ -20920,9 +20922,9 @@ CVE_STATUS[CVE-2026-23224] = "cpe-stable-backport: Backported in 6.12.72" CVE_STATUS[CVE-2026-23225] = "fixed-version: only affects 6.19 onwards" -# CVE-2026-23226 needs backporting (fixed from 7.0rc1) +CVE_STATUS[CVE-2026-23226] = "cpe-stable-backport: Backported in 6.12.77" -# CVE-2026-23227 needs backporting (fixed from 7.0rc1) +CVE_STATUS[CVE-2026-23227] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23228] = "cpe-stable-backport: Backported in 6.12.72" @@ -20946,3 +20948,9 @@ CVE_STATUS[CVE-2026-23237] = "cpe-stable-backport: Backported in 6.12.74" CVE_STATUS[CVE-2026-23238] = "cpe-stable-backport: Backported in 6.12.74" +CVE_STATUS[CVE-2026-23239] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-23240] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-23241] = "cpe-stable-backport: Backported in 6.12.75" + From patchwork Thu Apr 23 15:45:02 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 86777 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5B45DFC036D for ; Thu, 23 Apr 2026 15:45:33 +0000 (UTC) Received: from mail-qt1-f169.google.com (mail-qt1-f169.google.com [209.85.160.169]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.700.1776959132705037468 for ; Thu, 23 Apr 2026 08:45:32 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=rOEOq9N9; spf=pass (domain: gmail.com, ip: 209.85.160.169, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f169.google.com with SMTP id d75a77b69052e-506362ac5f7so56186241cf.1 for ; Thu, 23 Apr 2026 08:45:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776959132; x=1777563932; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=wvN/g610r3y4tF+ZKaHrCLk6FrgJCjUMTKKHORp0W2o=; b=rOEOq9N9naQJ5OGHNqg5UoqdydX4llDGrVUR5eLaguo0GKaDBBPJd0ZUx4Nifyxpo2 2JyjUFbPDaM4NfCiSZ4vmX0kuuLdoPWO1zxmuaRvHebhJ5eevpMsHWaY2o2ljwMPeqlI FCSPDsyy2glUaJeqoFB4+ShqzKdp7pcwW0kw7S2Laq5Nk8hMnc6r6WZ4p4aDN6keSTWM fwXkiFdr/6PUKktLA7e0e669GRPMVz8AVw8QAkuKHUreuNsLNIeSkhmdVIe9zqOq0Yxz WVvYKcwfKqFfUfphs+qPF9vqnuCpvAin55mSe9aR2mjEy2RPtBNtzLyHDzU9Ti1vWNnE Lqhg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776959132; x=1777563932; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=wvN/g610r3y4tF+ZKaHrCLk6FrgJCjUMTKKHORp0W2o=; b=bYhl5w/SC+z4RCq/tdXc7Rxh9Sh4BS+P4B3unkDAkwnuwvgUgMfFFR2tn27i0ba4Hj uFHUdDMziqs5Xv/mmIkXMJcFIiQtFLKR1ts0s9sPNrNP74KV9P2izcf3Ou0JvACWBShU f6wrq1ijclJN6yWTAcTs0kindO9Z5hw3VGJfTb0el+3MixlUtpprxlSWymjgd5lOJuWQ vPq+qqlvJMjpM+iw9OEuaxcZink0luvKJHxavAMYsncV69N33U2pZYRovMbmSymZAt+H 9gXCYzhzBhkgL85l9lGtnXK06Hz1J0nyyeMXdAXCrvRI/q9Hh0+vwItXxrCjn8RlPqZh zlfg== X-Gm-Message-State: AOJu0Yy6f/hjr502hO7/vicSEmLGrnQSx8lgPD2srW1BZZs/Scja01fc V73UeWZ9ms9qPKXCvvQZwXfxkAkHI+gY98gmhyGvrQxYwqqVucQyMy/WFc7VfqLh X-Gm-Gg: AeBDieu2gNEBjOEQbp7U68lJ5tFm7UiW/iOMYfoLeJ6/Bd1da9azouBGZfnjo96yXEC ynX7e1E4ZulDfvWiqjJl7TACeC8uSXM7gGgw878QiAqZ6SHjjEGLih+LcU4vDjnPVhLqaWRK4D+ IaCf+CkzHfIsBYzNk6tj4ODV8HOAch+lS4++o5EJn+n8gxEz4YYJwc9LMUi9V6ZnER+kbyexa7O 2j4IoYqUp022qVjQgFpodrRgGkd6EiJjaB5p3q8lyYNh/dcjXuiikGQdgNVJCtFLeKMzspx8wEB JQ9bc35NBElXFoC0UwUz22IEi4remwOadf4RVpH9Ib0oEEag82Lw5tFLvKAJeQN7UXspKe0vimG HIFbkEoWVpWGi3XbNeSX28q0cQOUEHf3aO+cEsBFv868MdTMjz0h04H7vFtzj++zDNkKCaZACEO J8Z4kVN5Cxu5VOkSm8r9KNfpHKSxVoz0hgsXjqrVLI/wZaq6LiFzHxCm357oadxchOV703+3gik z9N6XEbiMnfdil/9LFLrvsz+0kGF2DxdprqfwDDXhOE2I93xnhrCcs/tLGpBkWebzF0yg== X-Received: by 2002:ac8:5807:0:b0:50d:7c44:e144 with SMTP id d75a77b69052e-50e36b3ecaamr466873321cf.11.1776959128500; Thu, 23 Apr 2026 08:45:28 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-50fb416b3f5sm74400031cf.28.2026.04.23.08.45.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Apr 2026 08:45:27 -0700 (PDT) From: bruce.ashfield@gmail.com To: yoann.congal@smile.fr Cc: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 11/18] linux-yocto/6.12: update to v6.12.79 Date: Thu, 23 Apr 2026 11:45:02 -0400 Message-ID: <20260423154509.1933646-12-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260423154509.1933646-1-bruce.ashfield@gmail.com> References: <20260423154509.1933646-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Apr 2026 15:45:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235812 From: Bruce Ashfield Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: c2d104a355013 Linux 6.12.79 62f01682102e0 Revert "LoongArch: Add machine_kexec_mask_interrupts() implementation" 4859112559405 Linux 6.12.78 1f00bad1b69b7 xen/privcmd: add boot control for restricted usage in domU 78432d8f0372c xen/privcmd: restrict usage in unprivileged domU 80b02e943613b perf/x86/intel: Add missing branch counters constraint apply e7c963868b67a hwmon: (max6639) Fix pulses-per-revolution implementation ebf6449effd94 tools/bootconfig: fix fd leak in load_xbc_file() on fstat failure 21156d04549d5 lib/bootconfig: check xbc_init_node() return in override path 1db7e11a2e2b9 fs/tests: exec: Remove bad test vector 2e20a886b443a drm/i915/gt: Check set_default_submission() before deferencing 568a25fd7bcdf ksmbd: fix use-after-free in durable v2 replay of active file handles c742b46a153d3 ksmbd: fix use-after-free of share_conf in compound request 131e4cafa7662 drm/amd: fix dcn 2.01 check 7f7d2c4a2333e drm/amd/display: Fix DisplayID not-found handling in parse_edid_displayid_vrr() 33d289267dfd9 mtd: rawnand: brcmnand: skip DMA during panic write f71ce0ae5aefe mtd: rawnand: serialize lock/unlock against other NAND operations 1bfd188284065 mm/shmem, swap: avoid redundant Xarray lookup during swapin 62414eec28583 mm/shmem, swap: improve cached mTHP handling and fix potential hang 1be8e41962f1f mm: shmem: avoid unpaired folio_unlock() in shmem_swapin_folio() b0e49178f2ed1 mm: shmem: fix potential data corruption during shmem swapin 246bbe3ee76f6 mtd: spi-nor: core: avoid odd length/address writes in 8D-8D-8D mode a0563931c0282 mtd: spi-nor: core: avoid odd length/address reads on 8D-8D-8D mode 9956d4892e788 x86/platform/uv: Handle deconfigured sockets da102725b4df3 ring-buffer: Fix to update per-subbuf entries of persistent ring buffer 93cad30c061f4 i2c: pxa: defer reset on Armada 3700 when recovery is used 3facec19f80cc i2c: fsi: Fix a potential leak in fsi_i2c_probe() 13ccf9b106bba i2c: cp2615: fix serial string NULL-deref at probe c6a24845728e9 USB: serial: f81232: fix incomplete serial port generation 3ccfbd4da541e drm/i915/psr: Compute PSR entry_setup_frames into intel_crtc_state 8b3267892b9ce hwmon: (pmbus/isl68137) Fix unchecked return value and use sysfs_emit() 15db8db56499f hwmon: (pmbus/mp2975) Add error check for pmbus_read_word_data() return value 9647e99d2a617 icmp: fix NULL pointer dereference in icmp_tag_validation() 665152cdd8ad0 net: dsa: bcm_sf2: fix missing clk_disable_unprepare() in error paths 7bd20f4b3ef30 net: mvpp2: guard flow control update with global_tx_fc in buffer switching ec8bf0571b142 nfnetlink_osf: validate individual option lengths in fingerprints 7e3955b282eae netfilter: nf_tables: release flowtable after rcu grace period on error cb2bf5efdb02a netfilter: bpf: defer hook memory release until rcu readers are done 6a3bb74e25d79 net: bonding: fix NULL deref in bond_debug_rlb_hash_show 9f036aa0fe46c udp_tunnel: fix NULL deref caused by udp_sock_create6 when CONFIG_IPV6=n 2051c709dce92 net/mlx5e: Fix race condition during IPSec ESN update c3db55dc0f334 net/mlx5e: Prevent concurrent access to IPSec ASO context 869ff44ecf693 net/mlx5: qos: Restrict RTNL area to avoid a lock cycle 25136c005f714 net: macb: fix uninitialized rx_fs_lock e0c470049344e ACPI: processor: Fix previous acpi_processor_errata_piix4() fix cfa64e2b3717b wifi: wlcore: Return -ENOMEM instead of -EAGAIN if there is not enough headroom a90279e7f7ea0 wifi: mac80211: fix NULL deref in mesh_matches_local() 97d97bf5b2d43 iavf: fix VLAN filter lost on add/delete race 5e4c90c94eb76 igc: fix page fault in XDP TX timestamps handling 79a230f90932a igc: fix missing update of skb->tail in igc_xmit_frame() 3267bcb744ee8 net: usb: aqc111: Do not perform PM inside suspend callback 37bef86e5428d clsact: Fix use-after-free in init/destroy rollback asymmetry af0d1613d6751 net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check 789204f980730 net: usb: cdc_ncm: add ndpoffset to NDP16 nframes bounds check 652ec118d8dc1 net: airoha: Remove airoha_dev_stop() in airoha_remove() 4cba4373abac7 net: airoha: Read completion queue data in airoha_qdma_tx_napi_poll() a04ac7bc97afe net: airoha: fix PSE memory configuration in airoha_fe_pse_ports_init() a9ed47c366321 net: airoha: read default PSE reserved pages value before updating afbc79a7770b2 net/sched: teql: Fix double-free in teql_master_xmit cadf3da46c155 net/smc: fix NULL dereference and UAF in smc_tcp_syn_recv_sock() 946bb6cacf0cc bonding: prevent potential infinite loop in bond_header_parse() c6febaacfb8a0 PM: runtime: Fix a race condition related to device removal bd2a8f06c263b sched: idle: Consolidate the handling of two special cases 2b001901f6890 net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown dcb88a003e390 net: bcmgenet: increase WoL poll timeout 633e8f87dad32 netfilter: nf_conntrack_h323: check for zero length in DecodeQ931() 171fe8e6da02c netfilter: xt_time: use unsigned int for monthday bit shift 19a230dec6bb8 netfilter: xt_CT: drop pending enqueued packets on template removal 6802ff8beceb9 netfilter: nft_ct: drop pending enqueued packets on removal d1354873cbe3b nf_tables: nft_dynset: fix possible stateful expression memleak in error path 774a434f8c9c8 netfilter: nf_conntrack_h323: fix OOB read in decode_int() CONS case 75fcaee5170e7 netfilter: nf_conntrack_sip: fix Content-Length u32 truncation in sip_help_tcp() f025171feef2a netfilter: ctnetlink: fix use-after-free in ctnetlink_dump_exp_ct() 078d33c95bf53 netfilter: ctnetlink: remove refcounting in expectation dumpers be3a573ba719f mpls: add missing unregister_netdevice_notifier to mpls_init 508f49ccbe032 net/rose: fix NULL pointer dereference in rose_transmit_link on reconnect e89dbd2736a45 bridge: cfm: Fix race condition in peer_mep deletion 8f8023ad95045 Bluetooth: qca: fix ROM version reading on WCN3998 chips c22a5e659959e Bluetooth: L2CAP: Fix use-after-free in l2cap_unregister_user 7c805b7d1e580 Bluetooth: HIDP: Fix possible UAF 695b45b2262fc Bluetooth: MGMT: Fix list corruption and UAF in command complete handlers 537a42a62e400 Bluetooth: hci_sync: Fix hci_le_create_conn_sync f678ea4b1315f Bluetooth: ISO: Fix defer tests being unstable c53c85583591b Bluetooth: SMP: make SM/PER/KDU/BI-04-C happy ca97abddf1968 Bluetooth: LE L2CAP: Disconnect if sum of payload sizes exceed SDU ab0b2de04d8de Bluetooth: LE L2CAP: Disconnect if received packet's SDU exceeds IMTU 158802642a695 firmware: arm_scpi: Fix device_node reference leak in probe path 71cdba40b4f8e firmware: arm_ffa: Remove vm_id argument in ffa_rxtx_unmap() b82eac7a1a38f arm64: dts: renesas: r9a09g057: Remove wdt{0,2,3} nodes d82a0f77999fb arm64: dts: renesas: r9a09g057: Add RTC node d32c07ef1880f wifi: cfg80211: cancel pmsr_free_wk in cfg80211_pmsr_wdev_down 29a1a350afcd2 wifi: mac80211: Fix static_branch_dec() underflow for aql_disable. af521c7d80ecc soc: fsl: cpm1: qmc: Fix error check for devm_ioremap_resource() in qmc_qe_init_resources() 751f60bd48eda soc: fsl: qbman: fix race condition in qman_destroy_fq 209551351a701 soc: rockchip: grf: Add missing of_node_put() when returning 44084194298cd cache: ax45mp: Fix device node reference leak in ax45mp_cache_init() bff13109276a6 cache: starfive: fix device node leak in starlink_cache_init() da4b44c42f405 soc: microchip: mpfs: Fix memory leak in mpfs_sys_controller_probe() e6b8133e0f51d btrfs: tree-checker: fix misleading root drop_level error message f556b1e09d054 btrfs: log new dentries when logging parent dir of a conflicting inode 18f67e5930724 ata: libata-scsi: report correct sense field pointer in ata_scsiop_maint_in() e9b76a88cf046 ata: libata-scsi: Return residual for emulated SCSI commands 6b949a6b33cbd Bluetooth: L2CAP: Fix accepting multiple L2CAP_ECRED_CONN_REQ e2b424aadecb6 drm/xe: Open-code GGTT MMIO access protection 91edd662f4d9f drm/xe/oa: Allow reading after disabling OA stream b7a629d07908b drm/amdgpu: apply state adjust rules to some additional HAINAN vairants 0285fc016a4fb drm/radeon: apply state adjust rules to some additional HAINAN vairants f99e8b813ae5c drm/imagination: Fix deadlock in soft reset sequence 5af0510112313 drm/amdgpu/mmhub4.1.0: add bounds checking for cid d23171e11a220 drm/amdgpu/mmhub3.0: add bounds checking for cid 76b0c2e88d1a2 drm/amdgpu/mmhub3.0.2: add bounds checking for cid 2acb07d01c435 drm/amdgpu/mmhub3.0.1: add bounds checking for cid 3ca77111881c4 drm/amdgpu/mmhub2.3: add bounds checking for cid 5b53680ff3f3d drm/amdgpu/mmhub2.0: add bounds checking for cid 04a789b30b002 drm/amdgpu/gmc9.0: add bounds checking for cid 68b2678c5f85e drm/amd/display: Wrap dcn32_override_min_req_memclk() in DC_FP_{START, END} 7e3ec3bf40151 drm: Fix use-after-free on framebuffers and property blobs when calling drm_dev_unplug 0866809dfe19d io_uring/kbuf: propagate BUF_MORE through early buffer commit path 04d57b332e37b serial: uartlite: fix PM runtime usage count underflow on probe 0bae1c670aa8c serial: 8250: Add late synchronize_irq() to shutdown to handle DW UART BUSY 2a72403b985ae serial: 8250: Fix TX deadlock when using DMA 868b44e2f6467 serial: 8250_pci: add support for the AX99100 31fd1e0281621 iommu/vt-d: Fix intel iommu iotlb sync hardlockup and retry 2025b2d1f9d5c mtd: Avoid boot crash in RedBoot partition table parser 0643441d70234 mtd: rawnand: cadence: Fix error check for dma_alloc_coherent() in cadence_nand_init() c96bae994552c mtd: rawnand: pl353: make sure optimal timings are applied df30056c78e8b spi: fix statistics allocation afe27c1f43aa5 spi: fix use-after-free on controller registration failure ea4fa54b83bb2 pmdomain: bcm: bcm2835-power: Increase ASB control timeout 45fd9d8352f22 mmc: sdhci: fix timing selection for 1-bit bus width 570bbd5264897 mmc: sdhci-pci-gli: fix GL9750 DMA write corruption 26760c3382d26 ata: libata-core: disable LPM on ADATA SU680 SSD 2ee1064926d33 net: macb: Reinitialize tx/rx queue pointer registers and rx ring during resume f1cf6177b2304 net: macb: Introduce gem_init_rx_ring() 6e40ebb999c2c batman-adv: avoid OGM aggregation when skb tailroom is insufficient e3d8efc157bc5 btrfs: fix transaction abort when snapshotting received subvolumes 4998dac563257 kprobes: Remove unneeded warnings from __arm_kprobe_ftrace() 7838880e78fd3 kprobes: Remove unneeded goto c75bdffc07599 powerpc64/bpf: fix kfunc call support a87072464ebb6 powerpc64/bpf: Fold bpf_jit_emit_func_call_hlp() into bpf_jit_emit_func_call_rel() cd3215d74b323 s390/zcrypt: Enable AUTOSEL_DOM for CCA serialnr sysfs attribute 1ec7d3c7dc8f2 drm/i915/psr: Write DSC parameters on Selective Update in ET mode 5329d725add8a drm/i915/dsc: Add helper for writing DSC Selective Update ET parameters 182d342b111f3 drm/i915/dsc: Add Selective Update register definitions ce00616bc1df6 ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION 89afe5e2dbea6 ksmbd: unset conn->binding on failed binding request d33cbf0bf8979 smb: client: fix krb5 mount with username option 9aeacde4da0f0 Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access d90150c72d2e6 Bluetooth: L2CAP: Fix type confusion in l2cap_ecred_reconf_rsp() 65c25b588994d mac80211: fix crash in ieee80211_chan_bw_change for AP_VLAN stations d646b038baea3 parisc: Flush correct cache in cacheflush() syscall 0bb848d8c6493 net: macb: fix use-after-free access to PTP clock 548a1bfe59136 NFC: nxp-nci: allow GPIOs to sleep 2970f0f4e7da7 LoongArch: Give more information if kmem access failed 2c638259ad750 nvdimm/bus: Fix potential use after free in asynchronous initialization 301670dcd098c sunrpc: fix cache_request leak in cache_release d6efaa50af62f HID: bpf: prevent buffer overflow in hid_hw_request 9cd1005cecfcc selftests/hid: fix compilation when bpf_wq and hid_device are not exported dad0c3c0a8e5d nfsd: fix heap overflow in NFSv4.0 LOCK replay cache e3d77f935639e NFSD: Hold net reference for the lifetime of /proc/fs/nfs/exports fd 0479268fdfaaf drm/amdgpu: Add basic validation for RAS header 0ea986a1cebae drm/amd/pm: Use pm_display_cfg in legacy DPM (v2) c179bece52fd2 drm/amd/display: Add pixel_clock to amd_pp_display_configuration b0e9965cebf9f drm/i915/psr: Repeat Selective Update area alignment bc4a6620e4243 drm/i915/alpm: ALPM disable fixes c962bdcd24b49 s390/xor: Fix xor_xc_2() inline assembly constraints 6949c35ef26e4 s390/stackleak: Fix __stackleak_poison() inline assembly constraint d2fc2dcfce47a sched/fair: Fix zero_vruntime tracking f3fb54e7a8b4a io_uring/kbuf: check if target buffer list is still legacy on recycle cc095cd305fdd sched_ext: Remove redundant css_put() in scx_cgroup_init() 08de46a75f91a mm: thp: deny THP for files on anonymous inodes ad07ea069f924 erofs: fix inline data read failure for ztailpacking pclusters 695455fbc4905 xfs: get rid of the xchk_xfile_*_descr calls 6cce7bc7fac84 binfmt_misc: restore write access before closing files opened by open_exec() b358fc6ff3b35 net: dsa: properly keep track of conduit reference fc023b8fab057 dmaengine: mmp_pdma: Fix race condition in mmp_pdma_residue() 7b4bfd02c934d blk-throttle: fix access race during throttle policy activation 25d2dc669f2a7 f2fs: fix to avoid migrating empty section cc81768212cdc f2fs: compress: fix UAF of f2fs_inode_info in f2fs_free_dic 7c002e242ddd0 f2fs: compress: change the first parameter of page_array_{alloc,free} to sbi cd19a32de5d05 net: stmmac: remove support for lpi_intr_o 7c1d221e475e3 mptcp: pm: in-kernel: always set ID as avail when rm endp 996092ba6df66 platform/x86/amd/pmc: Add support for Van Gogh SoC 5844e21800dc2 x86/uprobes: Fix XOL allocation failure for 32-bit tasks 55a88ab8a1314 io_uring/uring_cmd: fix too strict requirement on ioctl 079050a23de6b Octeontx2-af: Add proper checks for fwdata 19e18e6dabb1b tracing: Add recursion protection in kernel stack trace recording 8ac7dd0f813fb ice: fix devlink reload call trace 0c3666ec18864 btrfs: do not strictly require dirty metadata threshold for metadata writepages cf969bddd6e69 rxrpc: Fix recvmsg() unconditional requeue 4220cb3740691 dm-verity: disable recursive forward error correction bd0905e2122e3 ipv6: use RCU in ip6_xmit() 91c228f96fcfa drm/xe/sync: Cleanup partially initialized sync on parse failure 3729fd784d156 xfs: fix integer overflow in bmap intent sort comparator 1ab70c260cf16 crypto: atmel-sha204a - Fix OOM ->tfm_count leak 0e4b8faaaebe3 cifs: open files should not hold ref on superblock 88f974fe118cb net: macb: Shuffle the tx ring before enabling tx c20b47ae4f4dd drm/bridge: ti-sn65dsi83: halve horizontal syncs for dual LVDS output 3fe2d9ec166b7 ksmbd: Don't log keys in SMB3 signing and encryption key generation 60fe02840272d KVM: x86: Introduce KVM_X86_QUIRK_VMCS12_ALLOW_FREEZE_IN_SMM 0e729a5368925 KVM: nVMX: Add consistency checks for CR0.WP and CR4.CET 4055f250a3294 KVM: x86: Introduce Intel specific quirk KVM_X86_QUIRK_IGNORE_GUEST_PAT 18fd5e4bcf04d KVM: x86: Introduce supported_quirks to block disabling quirks 541304df9d989 KVM: x86: Allow vendor code to disable quirks 70bc291dcc804 KVM: x86: do not allow re-enabling quirks d3e2196c3e534 KVM: x86: Quirk initialization of feature MSRs to KVM's max configuration 715b07abac522 KVM: x86: Co-locate initialization of feature MSRs in kvm_arch_vcpu_create() 5bc7aeb75b65e fgraph: Fix thresh_return clear per-task notrace 2ca7125fff6bb iomap: reject delalloc mappings during writeback e0b14bf06393b sched_ext: Fix starvation of scx_enable() under fair-class saturation 41423912f7ac7 sched_ext: Disable preemption between scx_claim_exit() and kicking helper work 3376b345df155 nsfs: tighten permission checks for ns iteration ioctls fe8b548fb40da mm/kfence: fix KASAN hardware tag faults during late enablement e305204d7a5a8 mm/page_alloc: forward the gfp flags from alloc_contig_range() to post_alloc_hook() 05634a14e7437 mm/page_alloc: sort out the alloc_contig_range() gfp flags mess 9287df8de02e6 mm/page_alloc: move set_page_refcounted() to callers of post_alloc_hook() a10b3c5dec40e mmc: dw_mmc-rockchip: Fix runtime PM support for internal phase support 7457b35afafef mmc: dw_mmc-rockchip: Add memory clock auto-gating support bcb599684ef14 mmc: dw_mmc-rockchip: use modern PM macros 01651e7751edb KVM: SVM: Set/clear CR8 write interception when AVIC is (de)activated 04898c16f1bca KVM: SVM: Add a helper to look up the max physical ID for AVIC eb78f67f94d0e KVM: SVM: Limit AVIC physical max index based on configured max_vcpu_ids f962ca3b020e1 usb: gadget: f_tcm: Fix NULL pointer dereferences in nexus handling 93f116c3393a2 usb: gadget: f_ncm: Fix net_device lifecycle with device_move b1e8c177c033b cleanup: Provide retain_and_null_ptr() 88ced0d1aa62f can: gs_usb: gs_can_open(): always configure bitrates before starting device 970e13ead0a1e xfs: Fix error pointer dereference 035d0d09d5ab3 net/sched: act_gate: snapshot parameters with RCU on replace 03a072e0fbf99 kbuild: Leave objtool binary around with 'make clean' a60307872a2e3 selftests: mptcp: join: check RM_ADDR not sent over same subflow f6429557edd01 selftests: mptcp: add a check for 'add_addr_accepted' 27c9acbb9c81f drm/amd/display: Use GFP_ATOMIC in dc_create_stream_for_sink 5299c355c0921 mptcp: pm: avoid sending RM_ADDR over same subflow 67f34ab318807 mptcp: pm: in-kernel: always mark signal+subflow endp as used 3bc5856bd458b perf/x86/intel/uncore: Add per-scheduler IMC CAS count events 4597b9243fcce perf/x86/intel/uncore: Support more units on Granite Rapids d0155fe68f31b wifi: libertas: fix use-after-free in lbs_free_adapter() 0b6e86e18c354 platform/x86: hp-bioscfg: Support allocations of larger data 99e7b48c03972 x86/sev: Allow IBPB-on-Entry feature for SNP guests 241cd64cf2e32 net: phy: register phy led_triggers during probe to avoid AB-BA deadlock c171f90f58974 gve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL 65ed52200080e spi: cadence-quadspi: Implement refcount to handle unbind during busy 34d6691933682 ksmbd: call ksmbd_vfs_kern_path_end_removing() on some error paths f24a52948c95e dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() 7955a914cf935 smb: client: Compare MACs in constant time 2cdc56ed67615 ksmbd: Compare MACs in constant time 02669e2a4d207 net/tcp-md5: Fix MAC comparison to be constant-time 43515d1d4d826 drm/bridge: ti-sn65dsi86: Add support for DisplayPort mode with HPD d7159817b9f36 i3c: mipi-i3c-hci: Add missing TID field to no-op command descriptor bc729067d180a i3c: mipi-i3c-hci: Restart DMA ring correctly after dequeue abort 5775296df3cc2 i3c: mipi-i3c-hci: Use ETIMEDOUT instead of ETIME for timeout errors 451ec5e67444f iio: proximity: hx9023s: Protect against division by zero in set_samp_freq b776df251da87 iio: imu: inv_icm42600: fix odr switch when turning buffer off 1d9243d418153 iio: imu: inv_icm42600: fix odr switch to the same value 65932eadd9596 iio: gyro: mpu3050-i2c: fix pm_runtime error handling 66c0d1d600e7b iio: gyro: mpu3050-core: fix pm_runtime error handling 52b56f4377b78 iio: buffer: Fix wait_queue not being removed 3b99983617f9b iio: chemical: bme680: Fix measurement wait duration calculation bb99fac138b49 iio: potentiometer: mcp4131: fix double application of wiper shift 2a4d111a6a34a iio: chemical: sps30_i2c: fix buffer size in sps30_i2c_read_meas() 154a37c0d475a iio: chemical: sps30_serial: fix buffer size in sps30_serial_read_meas() 6bef4094e3c84 iio: frequency: adf4377: Fix duplicated soft reset mask d67832dc1dc96 iio: dac: ds4424: reject -128 RAW value 05d064e3633f3 btrfs: abort transaction on failure to update root in the received subvol ioctl 2e57b8cac2ba0 btrfs: fix transaction abort on set received ioctl due to item overflow 5e2ea10b800d1 btrfs: fix transaction abort on file creation due to name hash collision 7874947057851 smb: client: fix iface port assignment in parse_server_interfaces 52327268224fb smb: client: fix in-place encryption corruption in SMB2_write() b8dda19e36b1e smb: client: fix atomic open with O_DIRECT & O_SYNC ab10bf1645618 lib/bootconfig: check bounds before writing in __xbc_open_brace() 197c3716937ba lib/bootconfig: fix snprintf truncation check in xbc_node_compose_key_after() 1a85f84214f9d x86/apic: Disable x2apic on resume if the kernel expects so 2cb75e66b6f0c scsi: core: Fix error handling for scsi_alloc_sdev() 6a1b45a06880a lib/bootconfig: fix off-by-one in xbc_verify_tree() unclosed brace error b9f26a4b7f821 s390/dasd: Copy detected format information to secondary device 6413c7d2f71ef s390/dasd: Move quiesce state with pprc swap db353ade50dc3 xfs: ensure dquot item is deleted from AIL only after log shutdown e88ce9f0536f3 xfs: fix undersized l_iclog_roundoff values 2705ca90792b9 xfs: fix returned valued from xfs_defer_can_append 72a0bb8de73a7 cifs: make default value of retrans as zero f54fff845e469 qmi_wwan: allow max_mtu above hard_mtu to control rx_urb_size 06722ffc58135 tracing: Fix trace_buf_size= cmdline parameter with sizes >= 2G a8f96f00edcd2 tracing: Fix enabling multiple events on the kernel command line and bootconfig d34bc6eef9c5d drm/msm: Fix dma_free_attrs() buffer size 1c956f0fccc26 drm/i915: Fix potential overflow of shmem scatterlist length 3133acd82556a drm/bridge: ti-sn65dsi83: fix CHA_DSI_CLK_RANGE rounding 01c82133e226f drm/amd: Set num IP blocks to 0 if discovery fails 904025fa8bba1 drm/amdgpu: Fix use-after-free race in VM acquire a8de25f00bbf7 drm/amd/pm: remove invalid gpu_metrics.energy_accumulator on smu v13.0.x e80fef36c676c net: dsa: microchip: Fix error path in PTP IRQ setup d0f2386f52980 net: ethernet: arc: emac: quiesce interrupts before requesting IRQ 553366c271479 net: ncsi: fix skb leak in error paths abf4feaee6405 net: nexthop: fix percpu use-after-free in remove_nh_grp_entry 08aa9f3c8cf4d ksmbd: fix use-after-free by using call_rcu() for oplock_info 54b48ae83de8b smb: server: fix use-after-free in smb2_open() 960699317d39f ksmbd: fix use-after-free in smb_lazy_parent_lease_break_close() 7abf59e1852ed drm/amd/display: Fallback to boot snapshot for dispclk f897b72cc74d2 ata: libata-core: Disable LPM on ST1000DM010-2EP102 6b36695f5ec50 pmdomain: bcm: bcm2835-power: Fix broken reset status read 540e52dcf225a parisc: Check kernel mapping earlier at bootup 05d239f2c95e6 arm64: contpte: fix set_access_flags() no-op check for SMMU/ATS faults 7d1f55d8799a9 parisc: Fix initial page table creation for boot b48a0f8d4541a hwmon: (pmbus/q54sj108a2) fix stack overflow in debugfs read ab67221a6fdaf arm64: mm: Add PTE_DIRTY back to PAGE_KERNEL* to fix kexec/hibernation 6bdd2d70c338d nouveau/dpcd: return EBUSY for aux xfer if the device is asleep ce8ef2be6ae81 parisc: Increase initial mapping to 64 MB with KALLSYMS b7e5d8ddfdf1d batman-adv: Avoid double-rtnl_lock ELP metric worker 8be6ed64966da net/tcp-ao: Fix MAC comparison to be constant-time c2bbdee7650ca tracing: Fix syscall events activation by ensuring refcount hits zero efd959809cf6f ice: fix retry for AQ command 0x06EE 065783d651492 net: mana: Ring doorbell at 4 CQ wraparounds 145e50c2c700f media: dvb-net: fix OOB access in ULE extension header tables e14a1148f02e8 staging: rtl8723bs: fix potential out-of-bounds read in rtw_restruct_wmm_ie 821f7d759fb2d staging: rtl8723bs: properly validate the data in rtw_get_ie_ex() 27694ccbd8398 ixgbevf: fix link setup issue 0709748234159 ice: reintroduce retry mechanism for indirect AQ 0e4aaf5a3212b btrfs: fix chunk map leak in btrfs_map_block() after btrfs_chunk_map_num_copies() bb19587205443 irqchip/gic-v3-its: Limit number of per-device MSIs to the range the ITS supports 64dc258f9eec1 device property: Allow secondary lookup in fwnode_get_next_child_node() 02e87ec0bc706 nfsd: Fix cred ref leak in nfsd_nl_listener_set_doit(). 854f926195762 s390/pfault: Fix virtual vs physical address confusion 22d1abf8f5250 drm/bridge: ti-sn65dsi86: Enable HPD polling if IRQ is not used 0b07f7d2c5a40 drm/bridge: samsung-dsim: Fix memory leak in error path bde8659d8b51f drm/amd: Disable MES LR compute W/A 655d719aadbb8 Revert "tcpm: allow looking for role_sw device in the main node" 07faa2aaa6984 Fix CC_HAS_ASM_GOTO_OUTPUT on non-x86 architectures 391983c9118ea kbuild: Disable CC_HAS_ASM_GOTO_OUTPUT on clang < 17 40119a21d9769 scsi: hisi_sas: Fix NULL pointer exception during user_scan() 393763830ec84 scsi: hisi_sas: Use macro instead of magic number 890bcf9ef90ea scsi: hisi_sas: Add time interval between two H2D FIS following soft reset spec 2fcc2fc21cae7 scsi: ufs: core: Fix SError in ufshcd_rtc_work() during UFS suspend 980f18d058049 i3c: dw-i3c-master: Set SIR_REJECT in DAT on device attach and reattach 8ee08589549c2 time/jiffies: Mark jiffies_64_to_clock_t() notrace 5895d0164c84d ceph: fix memory leaks in ceph_mdsc_build_path() aedd29386b23f ceph: fix i_nlink underrun during async unlink f35736a3ae736 libceph: admit message frames only in CEPH_CON_S_OPEN state b268984ae88cb libceph: Use u32 for non-negative values in ceph_monmap_decode() dbd857a9e1e33 libceph: prevent potential out-of-bounds reads in process_message_header() 27a2a3c26ed30 libceph: reject preamble if control segment is empty ed024d2f4c79c libceph: Fix potential out-of-bounds access in ceph_handle_auth_reply() 644b47f0574fd ceph: add a bunch of missing ceph_path_info initializers b0ca81616a010 kprobes: avoid crash when rmmod/insmod after ftrace killed c2ebfbe63deb7 tipc: fix divide-by-zero in tipc_sk_filter_connect() 0da170b9e600d ASoC: qcom: qdsp6: Fix q6apm remove ordering during ADSP stop and start 45038e03f15e9 mmc: core: Avoid bitfield RMW for claim/retune flags 44520da00f6b2 mm/kfence: disable KFENCE upon KASAN HW tags enablement 590f8a4ad46c0 mmc: mmci: Fix device_node reference leak in of_get_dml_pipe_index() b07fc09a226c7 mm/tracing: rss_stat: ensure curr is false from kthread context 19a44efe43fec rust: kbuild: allow `unused_features` d4a400a6a4c4d usb: image: mdc800: kill download URB on timeout 7003be7a51189 usb: mdc800: handle signal and read racing 6287e0c01ccb8 usb: renesas_usbhs: fix use-after-free in ISR during device removal 276aef0fd2b92 usb: class: cdc-wdm: fix reordering issue in read code path 24b31a227f679 USB: core: Limit the length of unkillable synchronous timeouts 0535f84cb94c9 USB: usbtmc: Use usb_bulk_msg_killable() with user-specified timeouts 53ab34d522e50 USB: usbcore: Introduce usb_bulk_msg_killable() 5b561fabe682e usb: typec: altmode/displayport: set displayport signaling rate in configure message ed8c19af08423 usb: roles: get usb role switch from parent only for usb-b-connector c8eb4016c2571 usb: cdc-acm: Restore CAP_BRK functionnality to CH343 f43e86c19101c usb: core: don't power off roothub PHYs if phy_set_mode() fails 78aae91d7db26 usb: misc: uss720: properly clean up reference in uss720_probe() 5df5ce0cac6c2 usb: dwc3: pci: add support for the Intel Nova Lake -H 3cec135415a89 usb: yurex: fix race in probe 6f91f3f087194 usb: xhci: Prevent interrupt storm on host controller error (HCE) 807e4fb5140c7 usb: xhci: Fix memory leak in xhci_disable_slot() 015af103c06cb USB: ezcap401 needs USB_QUIRK_NO_BOS to function on 10gbs usb speed eb07da446ad97 usb/core/quirks: Add Huawei ME906S-device to wakeup quirk 41f33bd77bb51 USB: add QUIRK_NO_BOS for video capture several devices 43cbfb3bd6042 KVM: SVM: Initialize AVIC VMCB fields if AVIC is enabled with in-kernel APIC fe1c92383a771 ASoC: amd: yc: Add DMI quirk for ASUS EXPERTBOOK PM1503CDA 84e39ec13122b ata: libata-core: Add BRIDGE_OK quirk for QEMU drives 9037a536df46e net: usb: lan78xx: skip LTM configuration for LAN7850 cab4d982de09d net: usb: lan78xx: fix TX byte statistics for small packets b46d769ab2a05 net: usb: lan78xx: fix silent drop of packets with checksum errors b267255c15d2a ALSA: usb-audio: Check endpoint numbers at parsing Scarlett2 mixer interfaces ae8f8d30d334b ALSA: pcm: fix use-after-free on linked stream runtime in snd_pcm_drain() 9cca530c7cc1b cgroup: fix race between task migration and iteration ba76b18d8d2c8 Revert "arm64: dts: qcom: sdm845-oneplus: Mark l14a regulator as boot-on" 228b379363761 usb: gadget: f_mass_storage: Fix potential integer overflow in check_command_size_in_blocks() e4c887b673ec4 iio: imu: inv-mpu9150: fix irq ack preventing irq storms 1ecc39dc8cdc3 net: prevent NULL deref in ip[6]tunnel_xmit() 357fc9f07dbc3 octeontx2-af: devlink: fix NIX RAS reporter to use RAS interrupt status ad403c9607eb0 octeontx2-af: devlink: fix NIX RAS reporter recovery condition f18640b9236ea net: dsa: realtek: Fix LED group port bit for non-zero LED group c78f01abe5358 net: bonding: Fix nd_tbl NULL dereference when IPv6 is disabled 781110700ada2 drm/amdkfd: Unreserve bo if queue update failed 5f8d1ed366d86 ASoC: detect empty DMI strings 33de168afdd57 ASoC: amd: acp3x-rt5682-max9836: Add missing error check for clock acquisition 2ca9da563a5fc ACPI: OSL: fix __iomem type on return from acpi_os_map_generic_address() dd8ac1017b3c2 net: bcmgenet: fix broken EEE by converting to phylib-managed state fa5ba9867a55e e1000/e1000e: Fix leak in DMA error cleanup 5f205d2d640c8 i40e: fix src IP mask checks and memcpy argument names in cloud filter 843e913cef4e3 nvme-pci: Fix race bug in nvme_poll_irqdisable() 50bad78f03a02 nvme-pci: Fix slab-out-of-bounds in nvme_dbbuf_set 8d770de29989c sched: idle: Make skipping governor callbacks more consistent 6d9fc17dce6a2 perf ftrace: Fix hashmap__new() error checking baefa11ec8dc4 regulator: pca9450: Correct interrupt type 61e1a600338fc perf annotate: Fix hashmap__new() error checking 5e7ece24c5cb7 netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels 894c5780ddadd netfilter: nfnetlink_cthelper: fix OOB read in nfnl_cthelper_dump_table() cf4a4df38d174 netfilter: nfnetlink_queue: fix entry leak in bridge verdict error path 5b18b8b35c7cd netfilter: x_tables: guard option walkers against 1-byte tail reads dfbdac7191987 netfilter: nft_set_pipapo: fix stack out-of-bounds read in pipapo_drop() eb0948fa13298 netfilter: nf_tables: always walk all pending catchall elements 834c4f645726a net: add xmit recursion limit to tunnel xmit functions 0d070be560e6e xdp: register system page pool as an XDP memory model 2b1c64db6934f xdp: allow attaching already registered memory model to xdp_rxq_info 4f9c20113f87d amd-xgbe: prevent CRC errors during RX adaptation with AN disabled 9285fe46130ca amd-xgbe: fix link status handling in xgbe_rx_adaptation 0695712f3a6f1 mctp: route: hold key->lock in mctp_flow_prepare_output() 9baf26a91565b bonding: fix type confusion in bond_setup_by_slave() c8d250e0a8d61 bonding: use common function to compute the features 744c03df1002f net: add a common function to compute features for upper devices 00ed3c3ade696 bonding: Correctly support GSO ESP offload 999fed0236754 bonding: add ESP offload features when slaves support cde0bccc67739 can: hi311x: hi3110_open(): add check for hi3110_power_enable() return value 9f81be2ab9d8e mctp: i2c: fix skb memory leak in receive path acf162d8d7e91 bnxt_en: Fix RSS table size check when changing ethtool channels 27e43356d0def serial: caif: hold tty->link reference in ldisc_open and ser_release bbdf6d378e1dd net: sfp: improve Huawei MA5671a fixup 7dcf2de716560 ASoC: simple-card-utils: fix graph_util_is_ports0() for DT overlays 142a386a80580 ASoC: simple-card-utils: use __free(device_node) for device node eab71e11ce244 ASoC: soc-core: flush delayed work before removing DAIs and widgets b467eb43b5e98 ASoC: soc-core: drop delayed_work_pending() check before flush 3e41ae3fddcb7 drm/sitronix/st7586: fix bad pixel data due to byte swap 81a43e8005366 net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit 9c5ee9b981ee0 net/mlx5e: Fix DMA FIFO desync on error CQE SQ recovery 05c9a6df3646c net/mlx5: Fix crash when moving to switchdev mode 3c7313cb41b1b net/mlx5: Fix deadlock between devlink lock and esw->wq d7079f496a790 net/mlx5: Query to see if host PF is disabled 752e14738479c net/mlx5: IFC updates for disabled host PF eb9af3de556db bonding: handle BOND_LINK_FAIL, BOND_LINK_BACK as valid link states 9bd8c7a11c4ca drm/amd/pm: add missing od setting PP_OD_FEATURE_ZERO_FAN_BIT for smu v14 06a6e2d3c57b9 drm/msm/dsi: fix pclk rate calculation for bonded dsi 5a16ae6e3f174 net: dsa: realtek: rtl8365mb: remove ifOutDiscards from rx_packets 955387df028de perf disasm: Fix off-by-one bug in outside check 9937423c6647e workqueue: Use POOL_BH instead of WQ_BH when checking pool flags c1c08fd42a8ff btrfs: hold space_info->lock when clearing periodic reclaim ready 49f53ee4e2529 xprtrdma: Decrement re_receiving on the early exit paths 275dc9f8bc3c1 drm/msm/dsi: fix hdisplay calculation when programming dsi registers 7e2963773760a nfs: return EISDIR on nfs3_proc_create if d_alias is a dir d1e8b015bc621 smb/server: Fix another refcount leak in smb2_open() ca235eac5b3af powerpc: 83xx: km83xx: Fix keymile vendor prefix a8e66eed84608 remoteproc: mediatek: Unprepare SCP clock during system suspend ae48ed8c39686 remoteproc: sysmon: Correct subsys_name_len type in QMI request 631b7e154e58c powerpc/crash: adjust the elfcorehdr size b273e3a1b9ef3 powerpc/kexec/core: use big-endian types for crash variables c65c6ee4c56c5 kexec: Include kernel-end even without crashkernel 60331e09173fc kexec: Consolidate machine_kexec_mask_interrupts() implementation 7a03422aa3b47 powerpc/uaccess: Fix inline assembly for clang build on PPC32 394d89cf4626b ALSA: usb-audio: Check max frame size for implicit feedback mode, too 09927231a257f drm/amdgpu/vcn5: Add SMU dpm interface type 314f1b873862e ALSA: usb-audio: Avoid implicit feedback mode on DIYINHK USB Audio 2.0 6557af8245c07 scsi: ufs: core: Fix shift out of bounds when MAXQ=32 be730f9ee92ae scsi: ufs: core: Fix possible NULL pointer dereference in ufshcd_add_command_trace() f1d4b894076f4 ASoC: cs42l43: Report insert for exotic peripherals 20232d7bec4e5 ASoC: amd: yc: Add ASUS EXPERTBOOK BM1503CDA to quirk table af95b5735c822 scsi: ses: Fix devices attaching to different hosts c66c957bb7d2f ACPI: OSI: Add DMI quirk for Acer Aspire One D255 662d9f6d25d03 wifi: mac80211: set default WMM parameters on all links aa9ebc084505f unshare: fix unshare_fs() handling fe1dafba72ce4 ALSA: hda/realtek: Fix speaker pop on Star Labs StarFighter 78d3f201f8b60 scsi: mpi3mr: Add NULL checks when resetting request and reply queues 81b0e0276f5fe ACPI: PM: Save NVS memory on Lenovo G70-35 f8db760f4f52a scsi: storvsc: Fix scheduling while atomic on PREEMPT_RT Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index dd906d5ac6..609f2eaefb 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -15,13 +15,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "d684a294eb3f7a4122771290905565ddc36efd45" -SRCREV_meta ?= "19b5087399932add6bc893493fe1146fca7d4799" +SRCREV_machine ?= "7e842d87b9b4b32c87ffa1eff0923050b2fb4579" +SRCREV_meta ?= "50fc2fcce39b1abff6f5438f410b2ef015e10479" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.77" +LINUX_VERSION ?= "6.12.79" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 2803d0215a..2cd5b510d9 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc include recipes-kernel/linux/cve-exclusion.inc include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.77" +LINUX_VERSION ?= "6.12.79" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" -SRCREV_meta ?= "19b5087399932add6bc893493fe1146fca7d4799" +SRCREV_machine ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" +SRCREV_meta ?= "50fc2fcce39b1abff6f5438f410b2ef015e10479" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index 294431f5dd..7b34f33272 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "448ef862c891700b3d94201e63a831b34a7713e4" -SRCREV_machine:qemuarm64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" -SRCREV_machine:qemuloongarch64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" -SRCREV_machine:qemumips ?= "794aa4ace83aa50352e4abc39ed84229c864310c" -SRCREV_machine:qemuppc ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" -SRCREV_machine:qemuriscv64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" -SRCREV_machine:qemuriscv32 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" -SRCREV_machine:qemux86 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" -SRCREV_machine:qemux86-64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" -SRCREV_machine:qemumips64 ?= "3b21c90c913a00a52877a25a4cd1aff57fc14695" -SRCREV_machine ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" -SRCREV_meta ?= "19b5087399932add6bc893493fe1146fca7d4799" +SRCREV_machine:qemuarm ?= "bdecc68b604a59ee8f0bde1b96240d48938009c2" +SRCREV_machine:qemuarm64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" +SRCREV_machine:qemuloongarch64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" +SRCREV_machine:qemumips ?= "0f5e1025c5fe2f07e5e64dca977e10f4d42389db" +SRCREV_machine:qemuppc ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" +SRCREV_machine:qemuriscv64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" +SRCREV_machine:qemuriscv32 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" +SRCREV_machine:qemux86 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" +SRCREV_machine:qemux86-64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" +SRCREV_machine:qemumips64 ?= "b1f97d0b31600bbbf29d4b9e519bca2a7104a2b4" +SRCREV_machine ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" +SRCREV_meta ?= "50fc2fcce39b1abff6f5438f410b2ef015e10479" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "6f232446a62980e51f537db1c655e686d869b9ed" +SRCREV_machine:class-devupstream ?= "c2d104a355013a14bcd73e31fb2c4bc21922115a" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.77" +LINUX_VERSION ?= "6.12.79" PV = "${LINUX_VERSION}+git" From patchwork Thu Apr 23 15:45:03 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 86778 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A079DFC0376 for ; Thu, 23 Apr 2026 15:45:33 +0000 (UTC) Received: from mail-qt1-f178.google.com (mail-qt1-f178.google.com [209.85.160.178]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.698.1776959131119628606 for ; Thu, 23 Apr 2026 08:45:31 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=avb/C9AZ; spf=pass (domain: gmail.com, ip: 209.85.160.178, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f178.google.com with SMTP id d75a77b69052e-50fbd79350dso26749381cf.3 for ; Thu, 23 Apr 2026 08:45:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776959130; x=1777563930; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=KF0n7MZlQ6YTtg4pXSdRCRO/u7wPAwWV/g1Gw5B5iGI=; b=avb/C9AZEeTfHIRkGdpe4FMfjB0h0lidVPG4poaQau69BS/gJaAMmcJYvRrgfWgcIB 4aCzGgvQI9UvrruL+s7w27GpLIsq/Dd7IumvkM1VYfv945mI5d8oW7P1a18PgsBcUMA4 t8S735l0KU5M7+RXuh/CggUIUAl+KY2Y4I/2bZxVvXgoJPHMbrKE5yqvFDzk4w40J9lk 3SVDqPqe7vD86WVqmafeOxsiSKHr9c8t3noj5lIdtqIhLBadl+RqTHxTTz56aMuK6c6k NNXfAi6GClm6X3VBg7uH2QXLq4RKPGmlMZAJmeLWflQT3ZKX1HjNB7YGIMjbCIspf3+q f/pA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776959130; x=1777563930; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=KF0n7MZlQ6YTtg4pXSdRCRO/u7wPAwWV/g1Gw5B5iGI=; b=fVvVJTUZly3O1Lb5bq3Sl9VAKxC+Tn2u8/fkhv+IPOg0sd0lyvF/7Buewl4lw6OkEC 417nWBCdP+HaAWMK2jMf+DrEQe+khyNv4+qJ9IIxUlJMRyvs/VBGPOUTIGQRvlVEtEnn WkTXfcyAvWnbJiGOiRCobM/5fpMlNaCNLP1FbEgbTWmhwanxPxge0TJiwE3JWKwU96pM i2bi6wqNdKd4gGOKxUTBc4XktDj2ndHcssc1zWp0aZ1+LWyErbDh/9e37vGBpSp2znUP havl3bBmxjGE4Lzp5S5MUhWO1kAkboD+Vup1ijqZ0YQuJuHs+8sHW9vqUplSwWJ/0od8 MFsA== X-Gm-Message-State: AOJu0YytInCLJKK1nMy20J9SEnkE0JY5XT/l9b/SzVGHeRJw+7dYjoNV CB/zVdLl/9qpRI2w2JQVE46QlxX/byzdayq87fcvwswIAUpjUUOPZ8p7jEjxbkaA X-Gm-Gg: AeBDiet45MCqBPXpizO091aSrNMxBj/6z0EEXrd0/B/COs9zgxNyn1qhYAXEenJry7U DbcWf5SZa6OHIN2y1ILK+3KD5aZFaaawpLPyEa0tUgsHIwWxlaO7mt6XD/0POdQWjm65bOAFd+J WFlLIAKS4vMuM3qHnI1bzzqi+f718+eR9WJ2ILLMPGq1mlFzPI/l08UqLAEbZ1CVbJ5fUVOsj4T 8HLd6Al4OiW7WEBksThdhCcGzZgZI1wY4JBXOAVkiLsUqBhV8AzSTKfqAeSGaSXFT7aE70ZfMoa KyAJGg5ZvRY4GA006tdgqIZHFpFK9UFjuJvbT1Ax8nWAcLmG2N0QI3pJb9dkKRFR01d6vynBfgI e+9Or0gNhsWu305ccSYHvd1xed7wecCVaJqyoWihYdotBakBlH4+Db71SCGjzIUcH0b03uhzzyt gBLVdNpkd8B6ConQCrSsoLJ9TfuVCh7URh1x+s3ppndDZaKY4wQ5i2A1QcThzGHGkRh31xRuTif YEhgVQgaUo7bXfNzQ3i9msf/3v6/WbJFxkebWOwXOR89Xd8jI/KtvH1d73ERIU6hLvyVQ== X-Received: by 2002:a05:622a:230e:b0:4ff:c08a:52c4 with SMTP id d75a77b69052e-50e36b42814mr403225021cf.18.1776959129819; Thu, 23 Apr 2026 08:45:29 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-50fb416b3f5sm74400031cf.28.2026.04.23.08.45.28 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Apr 2026 08:45:28 -0700 (PDT) From: bruce.ashfield@gmail.com To: yoann.congal@smile.fr Cc: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 12/18] linux-yocto/6.12: update CVE exclusions (6.12.79) Date: Thu, 23 Apr 2026 11:45:03 -0400 Message-ID: <20260423154509.1933646-13-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260423154509.1933646-1-bruce.ashfield@gmail.com> References: <20260423154509.1933646-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Apr 2026 15:45:33 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235811 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 55 changes (8 new | 47 updated): - 8 new CVEs: CVE-2026-33044, CVE-2026-33045, CVE-2026-33654, CVE-2026-33739, CVE-2026-33765, CVE-2026-33868, CVE-2026-34205, CVE-2026-34475 - 47 updated CVEs: CVE-2022-2713, CVE-2023-7340, CVE-2025-15612, CVE-2025-15615, CVE-2025-15616, CVE-2025-15617, CVE-2025-4393, CVE-2025-4394, CVE-2025-53521, CVE-2025-59028, CVE-2025-59031, CVE-2025-59032, CVE-2025-67030, CVE-2025-70887, CVE-2026-0394, CVE-2026-1556, CVE-2026-20670, CVE-2026-20692, CVE-2026-22738, CVE-2026-22742, CVE-2026-22743, CVE-2026-22744, CVE-2026-24031, CVE-2026-27855, CVE-2026-28831, CVE-2026-28867, CVE-2026-28870, CVE-2026-28871, CVE-2026-28892, CVE-2026-28893, CVE-2026-29055, CVE-2026-2436, CVE-2026-2485, CVE-2026-30304, CVE-2026-30587, CVE-2026-32859, CVE-2026-33366, CVE-2026-33529, CVE-2026-33531, CVE-2026-33537, CVE-2026-33559, CVE-2026-3098, CVE-2026-3622, CVE-2026-3650, CVE-2026-4346, CVE-2026-4926, CVE-2026-4982 Date: Fri, 27 Mar 2026 19:52:09 +0000 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.12.inc | 376 ++++++++++++++++-- 1 file changed, 350 insertions(+), 26 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 5fa3966719..bba789c9e5 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-03-17 19:07:54.629545+00:00 for kernel version 6.12.77 -# From linux_kernel_cves cve_2026-03-17_1800Z-2-g4ae4487ca91 +# Generated at 2026-03-27 19:55:47.691205+00:00 for kernel version 6.12.79 +# From linux_kernel_cves cve_2026-03-27_1900Z-2-gb6d5823e23a python check_kernel_cve_status_version() { - this_version = "6.12.77" + this_version = "6.12.79" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -2770,8 +2770,6 @@ CVE_STATUS[CVE-2022-49265] = "fixed-version: Fixed from version 5.18" CVE_STATUS[CVE-2022-49266] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2022-49267] = "fixed-version: Fixed from version 5.18" - CVE_STATUS[CVE-2022-49268] = "fixed-version: Fixed from version 5.18" CVE_STATUS[CVE-2022-49269] = "fixed-version: Fixed from version 5.18" @@ -9916,8 +9914,6 @@ CVE_STATUS[CVE-2024-27040] = "fixed-version: Fixed from version 6.9" CVE_STATUS[CVE-2024-27041] = "fixed-version: Fixed from version 6.9" -CVE_STATUS[CVE-2024-27042] = "fixed-version: Fixed from version 6.9" - CVE_STATUS[CVE-2024-27043] = "fixed-version: Fixed from version 6.9" CVE_STATUS[CVE-2024-27044] = "fixed-version: Fixed from version 6.9" @@ -17552,7 +17548,7 @@ CVE_STATUS[CVE-2025-38424] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38425] = "cpe-stable-backport: Backported in 6.12.35" -# CVE-2025-38426 needs backporting (fixed from 6.16) +CVE_STATUS[CVE-2025-38426] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-38427] = "cpe-stable-backport: Backported in 6.12.35" @@ -17950,7 +17946,7 @@ CVE_STATUS[CVE-2025-38625] = "cpe-stable-backport: Backported in 6.12.42" CVE_STATUS[CVE-2025-38626] = "cpe-stable-backport: Backported in 6.12.42" -# CVE-2025-38627 needs backporting (fixed from 6.17) +CVE_STATUS[CVE-2025-38627] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-38628] = "cpe-stable-backport: Backported in 6.12.42" @@ -18352,7 +18348,7 @@ CVE_STATUS[CVE-2025-39761] = "cpe-stable-backport: Backported in 6.12.43" CVE_STATUS[CVE-2025-39763] = "cpe-stable-backport: Backported in 6.12.43" -# CVE-2025-39764 needs backporting (fixed from 6.17) +CVE_STATUS[CVE-2025-39764] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-39765] = "cpe-stable-backport: Backported in 6.12.44" @@ -18828,7 +18824,7 @@ CVE_STATUS[CVE-2025-40003] = "cpe-stable-backport: Backported in 6.12.54" CVE_STATUS[CVE-2025-40004] = "cpe-stable-backport: Backported in 6.12.53" -# CVE-2025-40005 needs backporting (fixed from 6.17) +CVE_STATUS[CVE-2025-40005] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-40006] = "cpe-stable-backport: Backported in 6.12.50" @@ -19086,7 +19082,7 @@ CVE_STATUS[CVE-2025-40133] = "cpe-stable-backport: Backported in 6.12.55" CVE_STATUS[CVE-2025-40134] = "cpe-stable-backport: Backported in 6.12.53" -# CVE-2025-40135 needs backporting (fixed from 6.18) +CVE_STATUS[CVE-2025-40135] = "cpe-stable-backport: Backported in 6.12.78" # CVE-2025-40136 needs backporting (fixed from 6.18) @@ -19108,13 +19104,13 @@ CVE_STATUS[CVE-2025-40145] = "fixed-version: only affects 6.15 onwards" # CVE-2025-40146 needs backporting (fixed from 6.18) -# CVE-2025-40147 needs backporting (fixed from 6.18) +CVE_STATUS[CVE-2025-40147] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-40148] = "fixed-version: only affects 6.16 onwards" CVE_STATUS[CVE-2025-40149] = "cpe-stable-backport: Backported in 6.12.66" -# CVE-2025-40150 needs backporting (fixed from 6.18) +CVE_STATUS[CVE-2025-40150] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-40151] = "fixed-version: only affects 6.17 onwards" @@ -19682,7 +19678,7 @@ CVE_STATUS[CVE-2025-68237] = "cpe-stable-backport: Backported in 6.12.60" CVE_STATUS[CVE-2025-68238] = "cpe-stable-backport: Backported in 6.12.60" -# CVE-2025-68239 needs backporting (fixed from 6.18) +CVE_STATUS[CVE-2025-68239] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-68240] = "cpe-stable-backport: Backported in 6.12.59" @@ -19844,7 +19840,7 @@ CVE_STATUS[CVE-2025-68332] = "cpe-stable-backport: Backported in 6.12.62" CVE_STATUS[CVE-2025-68333] = "cpe-stable-backport: Backported in 6.12.68" -# CVE-2025-68334 needs backporting (fixed from 6.18) +CVE_STATUS[CVE-2025-68334] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-68335] = "cpe-stable-backport: Backported in 6.12.62" @@ -20312,7 +20308,7 @@ CVE_STATUS[CVE-2025-71150] = "cpe-stable-backport: Backported in 6.12.64" CVE_STATUS[CVE-2025-71151] = "cpe-stable-backport: Backported in 6.12.64" -# CVE-2025-71152 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2025-71152] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-71153] = "cpe-stable-backport: Backported in 6.12.64" @@ -20330,7 +20326,7 @@ CVE_STATUS[CVE-2025-71159] = "fixed-version: only affects 6.18 onwards" CVE_STATUS[CVE-2025-71160] = "cpe-stable-backport: Backported in 6.12.66" -# CVE-2025-71161 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2025-71161] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-71162] = "cpe-stable-backport: Backported in 6.12.67" @@ -20388,7 +20384,7 @@ CVE_STATUS[CVE-2025-71204] = "cpe-stable-backport: Backported in 6.12.70" CVE_STATUS[CVE-2025-71220] = "cpe-stable-backport: Backported in 6.12.70" -# CVE-2025-71221 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2025-71221] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-71222] = "cpe-stable-backport: Backported in 6.12.70" @@ -20422,6 +20418,18 @@ CVE_STATUS[CVE-2025-71238] = "cpe-stable-backport: Backported in 6.12.74" CVE_STATUS[CVE-2025-71239] = "cpe-stable-backport: Backported in 6.12.75" +CVE_STATUS[CVE-2025-71265] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2025-71266] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2025-71267] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2025-71268] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2025-71269 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2025-71270] = "cpe-stable-backport: Backported in 6.12.70" + CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66" CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.12.66" @@ -20478,7 +20486,7 @@ CVE_STATUS[CVE-2026-23002] = "cpe-stable-backport: Backported in 6.12.67" CVE_STATUS[CVE-2026-23003] = "cpe-stable-backport: Backported in 6.12.67" -# CVE-2026-23004 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-23004] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23005] = "cpe-stable-backport: Backported in 6.12.67" @@ -20602,7 +20610,7 @@ CVE_STATUS[CVE-2026-23064] = "cpe-stable-backport: Backported in 6.12.68" CVE_STATUS[CVE-2026-23065] = "cpe-stable-backport: Backported in 6.12.68" -# CVE-2026-23066 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-23066] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23067] = "fixed-version: only affects 6.16 onwards" @@ -20610,7 +20618,7 @@ CVE_STATUS[CVE-2026-23068] = "cpe-stable-backport: Backported in 6.12.68" CVE_STATUS[CVE-2026-23069] = "cpe-stable-backport: Backported in 6.12.68" -# CVE-2026-23070 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-23070] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23071] = "cpe-stable-backport: Backported in 6.12.68" @@ -20678,7 +20686,7 @@ CVE_STATUS[CVE-2026-23101] = "cpe-stable-backport: Backported in 6.12.68" CVE_STATUS[CVE-2026-23103] = "cpe-stable-backport: Backported in 6.12.68" -# CVE-2026-23104 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-23104] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23105] = "cpe-stable-backport: Backported in 6.12.68" @@ -20746,7 +20754,7 @@ CVE_STATUS[CVE-2026-23136] = "cpe-stable-backport: Backported in 6.12.66" # CVE-2026-23137 needs backporting (fixed from 6.19) -# CVE-2026-23138 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-23138] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23139] = "cpe-stable-backport: Backported in 6.12.66" @@ -20784,7 +20792,7 @@ CVE_STATUS[CVE-2026-23155] = "cpe-stable-backport: Backported in 6.12.69" CVE_STATUS[CVE-2026-23156] = "cpe-stable-backport: Backported in 6.12.69" -# CVE-2026-23157 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-23157] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23158] = "cpe-stable-backport: Backported in 6.12.69" @@ -20952,5 +20960,321 @@ CVE_STATUS[CVE-2026-23239] = "cpe-stable-backport: Backported in 6.12.75" CVE_STATUS[CVE-2026-23240] = "cpe-stable-backport: Backported in 6.12.75" -CVE_STATUS[CVE-2026-23241] = "cpe-stable-backport: Backported in 6.12.75" +CVE_STATUS[CVE-2026-23241] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23242] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-23243] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-23244] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23245] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23246] = "cpe-stable-backport: Backported in 6.12.77" + +# CVE-2026-23247 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23248] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23249] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-23250] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-23251] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-23252] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23253] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23254] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2026-23255 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23256] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23257] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23258] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2026-23259 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23260] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23261] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23262] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23263] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23264] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2026-23265 needs backporting (fixed from 7.0rc1) + +CVE_STATUS[CVE-2026-23266] = "cpe-stable-backport: Backported in 6.12.74" + +CVE_STATUS[CVE-2026-23267] = "cpe-stable-backport: Backported in 6.12.74" + +CVE_STATUS[CVE-2026-23268] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23269] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23270] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23271] = "cpe-stable-backport: Backported in 6.12.77" + +# CVE-2026-23272 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23273] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-23274] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23275] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23276] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23277] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23278] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23279] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23280] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23281] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23282] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23283] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23284] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23285] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23286] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23287] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23288] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23289] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23290] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23291] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23292] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23293] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23294] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23295] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23296] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23297] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23298] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23299] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23300] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23301] = "fixed-version: only affects 6.19 onwards" + +# CVE-2026-23302 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23303] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23304] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23305] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23306] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23307] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23308] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23309] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23310] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23311] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23312] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23313] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23314] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23315] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23316] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23317] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23318] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23319] = "cpe-stable-backport: Backported in 6.12.77" + +# CVE-2026-23320 needs backporting (fixed from 7.0rc1) + +CVE_STATUS[CVE-2026-23321] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23322] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23323] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23324] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23325] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23326] = "fixed-version: only affects 6.13 onwards" + +# CVE-2026-23327 needs backporting (fixed from 7.0rc2) + +CVE_STATUS[CVE-2026-23328] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23329] = "fixed-version: only affects 6.18 onwards" + +# CVE-2026-23330 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23331] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23332] = "fixed-version: only affects 6.16 onwards" + +# CVE-2026-23333 has no known resolution + +CVE_STATUS[CVE-2026-23334] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23335] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23336] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23337] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23338] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23339] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23340] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23341] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23342] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23343] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23344] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23345] = "fixed-version: only affects 6.13 onwards" + +# CVE-2026-23346 needs backporting (fixed from 7.0rc2) + +CVE_STATUS[CVE-2026-23347] = "cpe-stable-backport: Backported in 6.12.77" + +# CVE-2026-23348 needs backporting (fixed from 7.0rc2) + +CVE_STATUS[CVE-2026-23349] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23350] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23351] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23352] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23353] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23354] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23355] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23356] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23357] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23358] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23359] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23360] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23361] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23362] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23363] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23364] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23365] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23366] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23367] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23368] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23369] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23370] = "cpe-stable-backport: Backported in 6.12.77" + +# CVE-2026-23371 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23372] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23373] = "cpe-stable-backport: Backported in 6.12.77" + +# CVE-2026-23374 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23375] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23376] = "fixed-version: only affects 6.18 onwards" + +# CVE-2026-23377 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23378] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23379] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23380] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23381] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23382] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23383] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23384] = "fixed-version: only affects 6.18 onwards" + +# CVE-2026-23385 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23386] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23387] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23388] = "cpe-stable-backport: Backported in 6.12.77" + +# CVE-2026-23389 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23390] = "cpe-stable-backport: Backported in 6.12.74" + +CVE_STATUS[CVE-2026-23391] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23392] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23393] = "cpe-stable-backport: Backported in 6.12.78" + +# CVE-2026-23394 needs backporting (fixed from 7.0rc5) + +CVE_STATUS[CVE-2026-23395] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23396] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23397] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23398] = "cpe-stable-backport: Backported in 6.12.78" + +# CVE-2026-31788 has no known resolution From patchwork Thu Apr 23 15:45:04 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 86780 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9BD2BFC0372 for ; Thu, 23 Apr 2026 15:45:43 +0000 (UTC) Received: from mail-qt1-f172.google.com (mail-qt1-f172.google.com [209.85.160.172]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.766.1776959134377193694 for ; Thu, 23 Apr 2026 08:45:34 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=sgI4hFHS; spf=pass (domain: gmail.com, ip: 209.85.160.172, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f172.google.com with SMTP id d75a77b69052e-506362ac5f7so56186591cf.1 for ; Thu, 23 Apr 2026 08:45:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776959133; x=1777563933; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=bePRjPo8vk9ma45/GGo5MZPB/JPQTQEeOPwKysYp7us=; b=sgI4hFHSshNX5O5Xm3hr3bQcMaL3nWsP9IBYrwBudtQZvPSYLy/DQJF/qkSZ1Lky4M 0KsHhyfAzOjOtKDV4KFQnSDcL5V6ygoh/x0ZPRZzhEK7l9nCyOX4YaK82sCSbcYLWGYW ie4glJelkgHu83oKXllZxwnvKPRCd0sRk0tVGMpSHGlo36yVWLBJws7XPN2Zadb7aKTn g+ywnwq2d0Mj6LKPp3Sw3pGI2HCVD6Fa69RdICqb09XpSJByAXk/O/7H42CT40zggsTj QsSax+jd1+JtwPovKPkRaevz48MzOUlRhjttJ/q+vJwPl0Q6GEvU37pcnC+RP76qNVUO K4sg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776959133; x=1777563933; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=bePRjPo8vk9ma45/GGo5MZPB/JPQTQEeOPwKysYp7us=; b=e3a5lJFpROmHPDXUyQYDUkIsDZLGUxMO/1cHPRnkxTQ9pOdFpt9ZQ6rZC2Aes25p5c 8kOY9rLBa5Im2NTfAkuQLAPjASluCtnQrBObM0+yjj/ScTwPrksn0QJt2a85t6yDm7O8 rz4XvrY8xeKTMnsqw24bwdfDkZd6PCWVTmo/T51i40hFWaXd/1FQRTbtzPHYVv50iK6t +Qq4KZFFV+JGcHQZVaUYlBq5CKuQGa1QW3LqiKAydDObiiRcOsmfG+4l1CcyMKYdqpl0 ffAAXBcjQc5ifvw2mKY5XuOyptKA5TUnBO862SSuFIGQENfBYa8aMW2sNYg5IefqNPhk zFDg== X-Gm-Message-State: AOJu0YwUyINsDULehmozwyCiuNL26jYiVdK9wsLa334Uh7UT/izDnA65 T3rTChsyxm0DiOqFyGJ1hR+5ABJYVubZ1YWgj+YYxbaYCoZK+pspWRih X-Gm-Gg: AeBDietSt1+uq6XIzAR5r+VyJr8GrokkPue3fd06DrPb/644V5dojSZcSpQzI1tvEc3 wce0QDjUlanKG1/nFJ3C1n2EW0B9jFaeG4ZVPn0ERL4v/qlrQGnEIvSTsZjatZJG6KYSuauL60g qrvGfAUIL1YE7avQos9avGRqBmHG6FRqIIAZg4OAgBgXoRbeIcevIGWHLkWhwZOfenY7qAcCSTA lczMMvVSH/bDE0CKleHwrk1aa0wRYvvOx/4z9SFkzvUekbFqsGpnk/IHRcu7EynGshKjfL8v+rP rsp81a5Pve/VifUSwn8L3dr1kHIsCsGUHCA40c4zSuTbPEleN42t/Mm7xRiaKwbYeTCjscQiJaT 4y7Y6eLXLtxw0iuQmwZfdjU16/uKw3OE8ZGClcyyDC3mnmvp6a7hl0YIiKU8Eo8kp9s/PA5cZYX KUoHPf00OjQm+2NnezrKNOkVOdhZwU9G+7OVsEk6ykMNjNaasgG3hikUxR22sIK3BK9geR76ZBn Dl8kD0nEnvd3viqmNhLsWc1JHILo8m/Kf9TAaQ/KddRJLiedzagJd6fza3FHp+mMYYgPw== X-Received: by 2002:ac8:5d4b:0:b0:50b:487c:f3d1 with SMTP id d75a77b69052e-50e36b3c940mr396967331cf.3.1776959130942; Thu, 23 Apr 2026 08:45:30 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-50fb416b3f5sm74400031cf.28.2026.04.23.08.45.29 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Apr 2026 08:45:30 -0700 (PDT) From: bruce.ashfield@gmail.com To: yoann.congal@smile.fr Cc: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 13/18] linux-yocto/6.12: update to v6.12.80 Date: Thu, 23 Apr 2026 11:45:04 -0400 Message-ID: <20260423154509.1933646-14-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260423154509.1933646-1-bruce.ashfield@gmail.com> References: <20260423154509.1933646-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Apr 2026 15:45:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235813 From: Bruce Ashfield Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: 00d7934ffcc35 Linux 6.12.80 7b8410e13e7d2 idpf: nullify pointers after they are freed acf942d0dccd8 net: bcmasp: Fix network filter wake for asp-3.0 1c0a49ce24c43 net: bcmasp: Restore programming of TX map vector register d94f9b0ba28a2 dmaengine: idxd: Fix leaking event log memory 027145ace09fa futex: Require sys_futex_requeue() to have identical flags 33dce5758914b xen/privcmd: unregister xenstore notifier on module exit d25552196dec0 btrfs: fix lost error when running device stats on multiple devices fs 1737ddeafbb13 btrfs: fix leak of kobject name for sub-group space_info 77a119d54c5d6 btrfs: fix super block offset in error message in btrfs_validate_super() ea56f1a604941 dmaengine: xilinx_dma: Fix reset related timeout with two-channel AXIDMA ba972cf9fe492 dmaengine: xilinx: xilinx_dma: Fix unmasked residue subtraction dc2c68f3aa13c dmaengine: xilinx: xilinx_dma: Fix residue calculation for cyclic DMA 7317ae215d3f1 dmaengine: xilinx: xilinx_dma: Fix dma_device directions e21da2ad88445 dmaengine: idxd: fix possible wrong descriptor completion in llist_abort_desc() 18c2e20b42dd2 netfs: Fix kernel BUG in netfs_limit_iter() for ITER_KVEC iterators 9787b3d9b9087 dmaengine: xilinx: xdma: Fix regmap init error handling 97e777f94f9ea dmaengine: dw-edma: Fix multiple times setting of the CYCLE_STATE and CYCLE_BIT bits for HDMA. 78727334d9c11 phy: ti: j721e-wiz: Fix device node reference leak in wiz_get_lane_phy_types() 379361cba6e5a dmaengine: idxd: Fix freeing the allocated ida too late 39c1504e0e76b dmaengine: idxd: Fix memory leak when a wq is reset d02c24af126de dmaengine: idxd: Fix not releasing workqueue on .release() 46dd1b07dcec4 ASoC: ak4458: Convert to RUNTIME_PM_OPS() & co a09380354d2f1 idpf: Fix RSS LUT NULL ptr issue after soft reset df2790b5228fb idpf: Fix RSS LUT NULL pointer crash on early ethtool operations 9ad3d0836d8bc idpf: detach and close netdevs while handling a reset 1ca996324eaca idpf: check error for register_netdev() on init ba0c7fff66160 ice: Fix PTP NULL pointer dereference during VSI rebuild 363377af2c9e8 ice: fix using untrusted value of pkt_len in ice_vc_fdir_parse_raw() 426d5b681b2f3 landlock: Fix handling of disconnected directories 17e8b80f199e2 landlock: Optimize file path walks and prepare for audit support dcefd3f0b9ed8 net: add proper RCU protection to /proc/net/ptype a079a62883e33 virt: tdx-guest: Fix handling of host controlled 'quote' buffer length c4d603e8e58a3 xfs: avoid dereferencing log items after push callbacks 6c0cfbe020c0f ovl: make fsync after metadata copy-up opt-in mount option 67f35bd8653cc ovl: Use str_on_off() helper in ovl_show_options() 4fcfeecef69b2 rust: pin-init: internal: init: document load-bearing fact of field accessors acc105db08267 rust: pin-init: add references to previously initialized fields 1e8da79267248 mm/damon/sysfs: check contexts->nr before accessing contexts_arr[0] a2008925ed736 media: nxp: imx8-isi: Fix streaming cleanup on release 84e926c1c272a spi: tegra210-quad: Protect curr_xfer check in IRQ handler de4c7c5c131c8 LoongArch: vDSO: Emit GNU_EH_FRAME correctly ccd41f110c608 drm/xe: always keep track of remap prev/next 03474a01c199d tracing: Fix potential deadlock in cpu hotplug with osnoise 43e5f6deb8bf7 tracing: Switch trace_osnoise.c code over to use guard() and __free() 7de55bba69cbf ksmbd: fix use-after-free and NULL deref in smb_grant_oplock() ff255e69911fe powerpc64/bpf: do not increment tailcall count when prog is NULL 95a16dcb49227 arm64: dts: imx8mn-tqma8mqnl: fix LDO5 power off 9b4d9dda6a71a ext4: always drain queued discard work in ext4_mb_release() 19782b4c793b4 ext4: fix iloc.bh leak in ext4_fc_replay_inode() error paths 4bec4a498ce86 ext4: handle wraparound when searching for blocks for indirect mapped blocks de009e11f31a8 ext4: fix the might_sleep() warnings in kvfree() 034053378dd81 ext4: fix use-after-free in update_super_work when racing with umount d787d3ae96648 ext4: reject mount if bigalloc with s_first_data_block != 0 9370207b36d26 ext4: avoid allocate block from corrupted group in ext4_mb_find_by_goal() 3a7667595bcad ext4: avoid infinite loops caused by residual data 407c944f217c1 ext4: validate p_idx bounds in ext4_ext_correct_indexes d4b3f370c3d8f ext4: replace BUG_ON with proper error handling in ext4_read_inline_folio 30c6e26562ec9 ext4: make recently_deleted() properly work with lazy itable initialization f8f7f9ed88462 ext4: fix fsync(2) for nojournal mode a29ceb262e957 ext4: fix stale xarray tags after writeback 7920dcc571cef ext4: convert inline data to extents when truncate exceeds inline size ff01e2f410f18 ext4: fix journal credit check when setting fscrypt context d5c3ed01f297b xfs: remove file_path tracepoint data b5c5a50c2f513 xfs: don't irele after failing to iget in xfs_attri_recover_work 23e45598f1a83 xfs: fix ri_total validation in xlog_recover_attri_commit_pass2 e822f535273af xfs: scrub: unlock dquot before early return in quota scrub d8fc60bbaf5ae xfs: save ailp before dropping the AIL lock in push callbacks a89434a6188d8 xfs: stop reclaim before pushing AIL during unmount 596c3f8069c47 LoongArch: KVM: Make kvm_get_vcpu_by_cpuid() more robust 151ba1721ac50 LoongArch: Workaround LS2K/LS7A GPU DMA hang bug 5e7fde2c551f8 LoongArch: Fix missing NULL checks for kstrdup() 9a6cbb4a5c168 drm/i915/dp_tunnel: Fix error handling when clearing stream BW in atomic state c0b3882836de8 drm/amdgpu: prevent immediate PASID reuse case 22d997add640f dmaengine: sh: rz-dmac: Move CHCTRL updates under spinlock d91c84906e4c1 dmaengine: sh: rz-dmac: Protect the driver specific lists abc1f0dabe505 dmaengine: fsl-edma: fix channel parameter config for fixed channel requests 7475dfad10a05 futex: Clear stale exiting pointer in futex_lock_pi() retry path 7b61e89c43cc5 irqchip/qcom-mpm: Add missing mailbox TX done acknowledgment be9237be3f120 jbd2: gracefully abort on checkpointing state corruptions 459158151a158 KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE 984350b37372f net: macb: Use dev_consume_skb_any() to free TX SKBs ff10e3682da0d net: macb: Protect access to net_device::ip_ptr with RCU lock 17970e0f6b62a net: macb: Move devm_{free,request}_irq() out of spin lock area c52df6a33345e scsi: ses: Handle positive SCSI error from ses_recv_diag() d1466bf991b23 scsi: ibmvfc: Fix OOB access in ibmvfc_discover_targets_done() 3699caf7d6601 ovl: fix wrong detection of 32bit inode numbers a9f911b6607b1 phy: qcom: qmp-ufs: Fix SM8650 PCS table for Gear 4 d7853d9fe94ab x86/cpu: Remove X86_CR4_FRED from the CR4 pinned bits mask 756e19fe86542 x86/cpu: Enable FSGSBASE early in cpu_init_exception_handling() 6d37ec779d563 alarmtimer: Fix argument order in alarm_timer_forward() 378949f46e897 erofs: add GFP_NOIO in the bio completion if needed f04733c4dc40c virtio_net: Fix UAF on dst_ops when IFF_XMIT_DST_RELEASE is cleared and napi_tx is false d8549a453d5bd media: mc, v4l2: serialize REINIT and REQBUFS with req_queue_mutex 922a500e94767 hwmon: (peci/cputemp) Fix off-by-one in cputemp_is_visible() 8149678ff2684 hwmon: (peci/cputemp) Fix crit_hyst returning delta instead of absolute temperature 3510b90b7dcd3 hwmon: (pmbus/isl68137) Add mutex protection for AVS enable sysfs attributes 68e5da7c5326b KVM: arm64: Discard PC update state on vcpu reset 9808571b27969 platform/x86: ISST: Correct locked bit width 72d35b92d329a cpufreq: conservative: Reset requested_freq on limits change 9649d051e5441 can: isotp: fix tx.buf use-after-free in isotp_sendmsg() c4e8eaa75fa0b can: gw: fix OOB heap access in cgw_csum_crc8_rel() d131feed8d3ce ASoC: SOF: ipc4-topology: Allow bytes controls without initial payload 8771d7152f8d3 ALSA: firewire-lib: fix uninitialized local variable 1d1888b4a7aec ksmbd: do not expire session on binding failure 91aeaa7256006 ksmbd: fix memory leaks and NULL deref in smb2_lock() 7aec5a769d235 ksmbd: fix potencial OOB in get_file_all_info() for compound requests 6aef1765d6807 ksmbd: replace hardcoded hdr2_len with offsetof() in smb2_calc_max_out_buf_len() 95c899cd79180 s390/entry: Scrub r12 register on kernel entry 54571224d8988 s390/barrier: Make array_index_mask_nospec() __always_inline f8c444b918d63 s390/syscalls: Add spectre boundary for syscall dispatch table d5d01f24bc6fb spi: spi-fsl-lpspi: fix teardown order issue (UAF) 432fa716e96ef ASoC: adau1372: Fix clock leak on PLL lock failure 2c678860898a2 ASoC: adau1372: Fix unchecked clk_prepare_enable() return value 82f8dc236dc55 sysctl: fix uninitialized variable in proc_do_large_bitmap 129d89223c43b hwmon: (pmbus) Introduce the concept of "write-only" attributes 9f7304720fb87 hwmon: (pmbus) Mark lowest/average/highest/rated attributes as read-only 881b8d5bbc12d hwmon: (pmbus/core) Fix various coding style issues 60a1b27313cee hwmon: (adm1177) fix sysfs ABI violation and current unit conversion 138e42be35ff2 drm/amdgpu: Fix fence put before wait in amdgpu_amdkfd_submit_ib 808c0f156f48d ACPI: EC: clean up handlers on probe failure in acpi_ec_setup() eedf220442d13 spi: use generic driver_override infrastructure 5cd46bebc4e0c spi: Group CS related fields in struct spi_device 10862e344b4d6 drm/amd/display: Do not skip unrelated mode changes in DSC validation 40ad0334c17b2 spi: meson-spicc: Fix double-put in remove path 8367b909e015a ASoC: Intel: catpt: Fix the device initialization 6eba074a8a05f spi: sn-f-ospi: Fix resource leak in f_ospi_probe() f14c9acb1a773 PM: hibernate: Drain trailing zero pages on userspace restore 6453341a0c734 drm/i915/gmbus: fix spurious timeout on 512-byte burst reads a246bcb5f7ca1 x86/efi: efi_unmap_boot_services: fix calculation of ranges_to_free size a5162ebfe0458 scsi: scsi_transport_sas: Fix the maximum channel scanning issue 6b4d3a91259a1 RDMA/irdma: Return EINVAL for invalid arp index error a8a1c7621127a RDMA/irdma: Fix deadlock during netdev reset with active connections bb22bf9bf054f RDMA/irdma: Remove reset check from irdma_modify_qp_to_err() bc20987765932 RDMA/irdma: Clean up unnecessary dereference of event->cm_node 0d845d7d834fa RDMA/irdma: Remove a NOP wait_event() in irdma_modify_qp_roce() 6d1a63d4f2f12 RDMA/irdma: Update ibqp state to error if QP is already in error state cd1534c8f4984 RDMA/irdma: Initialize free_qp completion before using it 49bbcb76c4c8a RDMA/rw: Fall back to direct SGE on MR pool exhaustion 08cd190baec5a ALSA: hda/realtek: Sequence GPIO2 on Star Labs StarFighter 9fea479f155d6 regmap: Synchronize cache for the page selector 9d74d10e4e266 net: macb: use the current queue number for stats 675c913b94048 netfilter: ctnetlink: use netlink policy range checks 7edca70751b9b netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp dcfcd95b3ae76 netfilter: nf_conntrack_expect: skip expectations in other netns via proc ded71f5684df1 netfilter: ip6t_rt: reject oversized addrnr in rt_mt6_check() a2f6ff3444b66 netfilter: nfnetlink_log: fix uninitialized padding leak in NFULA_PAYLOAD 6dc11e0bd0a54 tls: Purge async_hold in tls_decrypt_async_wait() 834cf890d2c3d Bluetooth: btusb: clamp SCO altsetting table indices 9a21a631ee034 Bluetooth: L2CAP: Fix ERTM re-init and zero pdu_len infinite loop e10a4cb724686 Bluetooth: btintel: serialize btintel_hw_error() with hci_req_sync_lock d2d4f0f15d531 Bluetooth: L2CAP: Fix send LE flow credits in ACL link b07431f47fe22 dma-mapping: add missing `inline` for `dma_free_attrs` c0e696a74b19e net: lan743x: fix duplex configuration in mac_link_up 6d3161fa3eee6 team: fix header_ops type confusion with non-Ethernet ports a0d9efb1e8f3f net: enetc: fix the output issue of 'ethtool --show-ring' f1bed05a832ae udp: Fix wildcard bind conflict check when using hash2 afb7c7f20f2e0 tcp: optimize inet_use_bhash2_on_bind() 75fe6db23705a net: fix fanout UAF in packet_release() via NETDEV_UP race c58c705939c75 ipv6: Don't remove permanent routes with exceptions from tb6_gc_hlist. d9b859a7bf1fe ipv6: Remove permanent routes from tb6_gc_hlist when all exceptions expire. 1f931dee5b726 iavf: fix out-of-bounds writes in iavf_get_ethtool_stats() 1beb6a1711502 ice: use ice_update_eth_stats() for representor stats 7829daee9ba5d ice: fix inverted ready check for VF representors 42830f80495bb platform/x86: intel-hid: disable wakeup_mode during hibernation 392b2369fb215 platform/olpc: olpc-xo175-ec: Fix overflow error message to print inlen 8244cc1ce64bc net: bcmasp: fix double disable of clk db060603452b2 net: bcmasp: Add support for asp-v3.0 121a6ad9cd42b net: bcmasp: fix double free of WoL irq 6c0a48684e380 net: bcmasp: streamline early exit in probe 88fff072ba83f net: bcmasp: Remove support for asp-v2.0 2463b69ccb617 net: bcm: asp2: convert to phylib managed EEE 5b9555915ab80 net: bcm: asp2: remove tx_lpi_enabled ef6469df19f49 net: bcm: asp2: fix LPI timer handling bd2e6b6367a29 rtnetlink: count IFLA_INFO_SLAVE_KIND in if_nlmsg_size 7bcb974c771c8 net/smc: fix double-free of smc_spd_priv when tee() duplicates splice pipe buffer 98de18d327ef8 openvswitch: validate MPLS set/set_masked payload length bbe7bd722bfae openvswitch: defer tunnel netdev_put to RCU release 43579baa17270 net: openvswitch: Avoid releasing netdev before teardown completes 1edc12d2bbcb7 nfc: nci: fix circular locking dependency in nci_close_device e324506b98bf6 ionic: fix persistent MAC address override on PF 3334494e69f39 pinctrl: mediatek: common: Fix probe failure for devices without EINT 0780f93338529 Bluetooth: L2CAP: Fix null-ptr-deref on l2cap_sock_ready_cb 5213ef54528dd Bluetooth: hci_ll: Fix firmware leak on error path 340666172cf74 Bluetooth: MGMT: Fix dangling pointer on mgmt_add_adv_patterns_monitor_complete 108b81514d8f2 Bluetooth: SCO: Fix use-after-free in sco_recv_frame() due to missing sock_hold 40c7f7eea2f4d Bluetooth: L2CAP: Validate PDU length before reading SDU length in l2cap_ecred_data_rcv() c8e1a27edb8b4 Bluetooth: L2CAP: Fix stack-out-of-bounds read in l2cap_ecred_conn_req 76d115b228e4d can: statistics: add missing atomic access in hot path d1ba7d6b3cd17 erofs: set fileio bio failed in short read case 1cf9fc3b190b3 dma: swiotlb: add KMSAN annotations to swiotlb_bounce() 7b18692c59afb af_key: validate families in pfkey_send_migrate() 56ea2257b83ee xfrm: prevent policy_hthresh.work from racing with netns teardown 32d0f44c2f14d xfrm: Fix work re-schedule after cancel in xfrm_nat_keepalive_net_fini() df6f995358dc1 esp: fix skb leak with espintcp and async crypto ddd2d7f20ab1c xfrm: Fix the usage of skb->sk 4092242a7347d xfrm: call xdo_dev_state_delete during state update 02c30fb68bed9 xfrm: fix the condition on x->pcpu_num in xfrm_sa_len 934e87be76f3b xfrm: add missing extack for XFRMA_SA_PCPU in add_acquire and allocspi bd635bcd0a517 i3c: master: dw-i3c: Fix missing of_node for virtual I2C adapter 63a5bca438cfb ALSA: hda/realtek: add quirk for ASUS UM6702RC 3a800ad9382ad spi: intel-pci: Add support for Nova Lake mobile SPI flash 601e6ff6e5133 usb: core: new quirk to handle devices with zero configurations 7a27049b5bc27 drm/amdgpu: fix gpu idle power consumption issue for gfx v12 49c7c50ee6325 nvmet: move async event work off nvmet-wq fee55fffbfcd9 objtool: Handle Clang RSP musical chairs 437b469c801b4 ALSA: hda/realtek: Add headset jack quirk for Thinkpad X390 b685eba97a5ae ALSA: hda/realtek: add HP Laptop 14s-dr5xxx mute LED quirk a41a9b8d19a98 btrfs: set BTRFS_ROOT_ORPHAN_CLEANUP during subvol create d81d519f1236d sched_ext: Use WRITE_ONCE() for the write side of dsq->seq update 31860c3f7ac66 HID: apple: avoid memory leak in apple_report_fixup() 9535c3eda0949 drm/ttm/tests: Fix build failure on PREEMPT_RT c8324d387c794 ALSA: hda/senary: Ensure EAPD is enabled during init 5858510917896 dma-buf: Include ioctl.h in UAPI header c4a5601fe0866 ASoC: fsl_easrc: Fix event generation in fsl_easrc_iec958_put_bits() 6a029865ef062 scsi: devinfo: Add BLIST_SKIP_IO_HINTS for Iomega ZIP 1d90b17aea622 scsi: mpi3mr: Clear reset history on ready and recheck state after timeout fddbd2fe91cd7 ASoC: fsl_easrc: Fix event generation in fsl_easrc_iec958_set_reg() ec2b22a58073f module: Fix kernel panic when a symbol st_shndx is out of bounds 4abc2186ed5b6 HID: asus: add xg mobile 2023 external hardware support 6bafb2e9b5b4e HID: mcp2221: cancel last I2C command on read error da89e7137b9db kbuild: install-extmod-build: Package resolve_btfids if necessary efe3f0d9bc252 net: usb: r8152: add TRENDnet TUC-ET2G 34221ae510833 HID: apple: Add EPOMAKER TH87 to the non-apple keyboards list 79e5dcc95d9ab HID: magicmouse: avoid memory leak in magicmouse_report_fixup() 1ba445e496b5f HID: magicmouse: fix battery reporting for Apple Magic Trackpad 2 acbc72dd1a09d nvme-pci: ensure we're polling a polled queue e3baa5a402237 platform/x86: touchscreen_dmi: Add quirk for y-inverted Goodix touchscreen on SUPI S10 e34c5f314fa60 platform/x86: intel-hid: Enable 5-button array on ThinkPad X1 Fold 16 Gen 1 c5a280ff4f745 nvme-fabrics: use kfree_sensitive() for DHCHAP secrets 242934c6ddfb4 nvme-pci: cap queue creation to used queues 5e9788df789ce platform/x86: intel-hid: Add Dell 14 Plus 2-in-1 to dmi_vgbs_allow_list 7a6d6e4d8af04 HID: asus: avoid memory leak in asus_report_fixup() 342aa1ee995ef bpf: Fix unsound scalar forking in maybe_fork_scalars() for BPF_OR 9ab1227765c44 bpf: Fix undefined behavior in interpreter sdiv/smod for INT_MIN b1f3c2ba6512e bpf: Release module BTF IDR before module unload 9a6086d2a828d driver core: platform: use generic driver_override infrastructure 78aba57ca3de5 driver core: generalize driver_override in struct device 8e655e0effd71 sh: platform_early: remove pdev->driver_override check 0064ad7695412 hwmon: axi-fan: don't use driver_override as IRQ name 92c47342c66d4 cxl/hdm: Avoid incorrect DVSEC fallback when HDM decoders are enabled 3a696e84a8b1f perf: Make sure to use pmu_ctx->pmu for groups 56af722756ed8 bpf: Fix constant blinding for PROBE_MEM32 stores d216a4bd138eb cxl/port: Fix use after free of parent_port in cxl_detach_ep() Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 609f2eaefb..4c754bcd21 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -15,13 +15,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "7e842d87b9b4b32c87ffa1eff0923050b2fb4579" -SRCREV_meta ?= "50fc2fcce39b1abff6f5438f410b2ef015e10479" +SRCREV_machine ?= "682f6c2088ea37c1dcc324905956034eda630d52" +SRCREV_meta ?= "8bb0dbe2b50860402b07a506a5aa3a4ef7aba0a7" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.79" +LINUX_VERSION ?= "6.12.80" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 2cd5b510d9..d760030c21 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc include recipes-kernel/linux/cve-exclusion.inc include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.79" +LINUX_VERSION ?= "6.12.80" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" -SRCREV_meta ?= "50fc2fcce39b1abff6f5438f410b2ef015e10479" +SRCREV_machine ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" +SRCREV_meta ?= "8bb0dbe2b50860402b07a506a5aa3a4ef7aba0a7" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index 7b34f33272..c50dc6dfac 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "bdecc68b604a59ee8f0bde1b96240d48938009c2" -SRCREV_machine:qemuarm64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" -SRCREV_machine:qemuloongarch64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" -SRCREV_machine:qemumips ?= "0f5e1025c5fe2f07e5e64dca977e10f4d42389db" -SRCREV_machine:qemuppc ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" -SRCREV_machine:qemuriscv64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" -SRCREV_machine:qemuriscv32 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" -SRCREV_machine:qemux86 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" -SRCREV_machine:qemux86-64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" -SRCREV_machine:qemumips64 ?= "b1f97d0b31600bbbf29d4b9e519bca2a7104a2b4" -SRCREV_machine ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" -SRCREV_meta ?= "50fc2fcce39b1abff6f5438f410b2ef015e10479" +SRCREV_machine:qemuarm ?= "dd1da548895086a19df2c3fc9586999789081636" +SRCREV_machine:qemuarm64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" +SRCREV_machine:qemuloongarch64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" +SRCREV_machine:qemumips ?= "14123935e5dd112c3a4daa4c5a756b82298ecf4d" +SRCREV_machine:qemuppc ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" +SRCREV_machine:qemuriscv64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" +SRCREV_machine:qemuriscv32 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" +SRCREV_machine:qemux86 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" +SRCREV_machine:qemux86-64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" +SRCREV_machine:qemumips64 ?= "d6af6b480ab453a08f04ce80ab25a131f54f8e34" +SRCREV_machine ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" +SRCREV_meta ?= "8bb0dbe2b50860402b07a506a5aa3a4ef7aba0a7" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "c2d104a355013a14bcd73e31fb2c4bc21922115a" +SRCREV_machine:class-devupstream ?= "00d7934ffcc35e65b113ba4991c8a3338bd85fc1" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.79" +LINUX_VERSION ?= "6.12.80" PV = "${LINUX_VERSION}+git" From patchwork Thu Apr 23 15:45:05 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 86785 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E9F23FC0375 for ; Thu, 23 Apr 2026 15:45:53 +0000 (UTC) Received: from mail-qt1-f170.google.com (mail-qt1-f170.google.com [209.85.160.170]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.776.1776959147246110163 for ; Thu, 23 Apr 2026 08:45:47 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=VgtH4k6T; spf=pass (domain: gmail.com, ip: 209.85.160.170, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f170.google.com with SMTP id d75a77b69052e-50e5bea4045so39825721cf.3 for ; Thu, 23 Apr 2026 08:45:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776959146; x=1777563946; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=2LxvkUaZGtggofX362DcE9Jv2M4/akaIkAA5ywVN73A=; b=VgtH4k6TECRaK5AYZWRYhU/jhT+H2MM9Kso/YUEjXhnj8K/wjisMzDzxpab0CWfJe3 uxNM5fcsG8WLDXkh5qzdEagwPudPLOnWuhEiT0yyey+Ko9163XxuqPI2K1z8ZjUdpAWK 2be1/i1l8piM8xMXAJ9ehTrN0IJ6q+Z8k5PywgGOxWVPvuG5Wypf2xIhPMpVFsQ4AY2q 9/PoChInsFYSIIuicS5fOVVZO9iyj/V+DywP9P0uJGxzZpWQo3mMaFWnuW1IDgpiHZrR tGZQyNKYyPSTmSkESI9dnv9L2D20/iNs86YNdmj7vvndyI55d+nx5oQxo0Ja4h3PgRSH OKNQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776959146; x=1777563946; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=2LxvkUaZGtggofX362DcE9Jv2M4/akaIkAA5ywVN73A=; b=hPxo8weMtwud/z0VTrYCCY1CROYFo6WhrKe4B2nvMz12SPp3TX+K4bEG4IXM7Jx+ek bO3VtFj7sqNP7+ny99i2T3cORMKppD1l0CM8HO/tg2Zms6RUO9tdNNKSZB1cpU4qVe1q bbMvhOppVkUjR9BVOan4AZ5MrJodZ81j3u+gEZQF9kSJFrhjomQq18MTu24h0aruHV+2 T0cI69SSfhIeOn9oMTR+Wxr/LW16GIXL+BNczMsPlgz20F8a4rrIns6hdraKTotNPJTC b5nEyR8CLW4JX0+MOxuA/iOQ8NMIyp9blM5qmWs2IZYpl1myto4/8nG6BetzQzwMKx5x 4sRw== X-Gm-Message-State: AOJu0YziSAE+D97mJMuMqB3IQ4iBKxKvpsL3VsGu2aG/bjXBu5muOGWp QP9j9X0RXaBSwfY+/BCnxyCO0qqkt5gZJ4r44yeMlJjEvFIpeFyycf0F5VHO1ybY X-Gm-Gg: AeBDietuyLDRmgsbyX1jtWqdqVL5BeMuYlE9w3fLpjCpxwkdyetJalWJXak2bentQRh JJG7F4k1ywiCU3sCfSMQ3Ur+VEP8HiHGdkdIwnw6wfbBGuVV3HOsgLoSng8yhQoKlzcIAWBF6Kr Smb0T5B4sTPK39XKOs9BA8LwChBmT66zI2/pmK2YpWPx37WrtDkRPNkWu/lu+TDlsGmw14TWA4A oHwU3lc2/lpchZcH7VV4atf1cPRQBSn0GJY7iAT7DFPMfBbGJNfakPZ7hcXFop85h1mZXBx4Dlz W7OI5N15B1S794WzLwlkG7tc33tj2cnfwRrIDYvx2rZQdXSxIMIuXzzGPw8/psdThQjQ8Szl/m5 ZM/vGOFOifazdCxwHKpXujcNTbXUG8UAOjwsLuGLpLodNN3CVOP85m1SUC/Ke8/H+CUIBonTurR xUXNsCVl4CP/wnQwfZZNlVnvzY2wKV9PGhYMz6KoaaJRPFXHjdR5HLgIZ7lhAGcyUzUia0Sr76R JS7SKtgGhqswl84Ygq135O5JJ4X7AU/yUVt9I6zsrAW1AglJwhOsFAJm+7yhGng+Rf/gg== X-Received: by 2002:a05:622a:6794:b0:50e:42ec:ca7f with SMTP id d75a77b69052e-50e42eccf9cmr239989431cf.18.1776959132230; Thu, 23 Apr 2026 08:45:32 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-50fb416b3f5sm74400031cf.28.2026.04.23.08.45.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Apr 2026 08:45:31 -0700 (PDT) From: bruce.ashfield@gmail.com To: yoann.congal@smile.fr Cc: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 14/18] linux-yocto/6.12: update CVE exclusions (6.12.80) Date: Thu, 23 Apr 2026 11:45:05 -0400 Message-ID: <20260423154509.1933646-15-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260423154509.1933646-1-bruce.ashfield@gmail.com> References: <20260423154509.1933646-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Apr 2026 15:45:53 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235818 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 49 changes (12 new | 37 updated): - 12 new CVEs: CVE-2026-39389, CVE-2026-39390, CVE-2026-39391, CVE-2026-39392, CVE-2026-39393, CVE-2026-39394, CVE-2026-39406, CVE-2026-39407, CVE-2026-39408, CVE-2026-39409, CVE-2026-39410, CVE-2026-39865 - 37 updated CVEs: CVE-2021-4473, CVE-2025-57854, CVE-2025-58713, CVE-2026-1342, CVE-2026-28264, CVE-2026-31790, CVE-2026-32712, CVE-2026-34765, CVE-2026-35023, CVE-2026-35035, CVE-2026-35463, CVE-2026-35484, CVE-2026-35488, CVE-2026-35533, CVE-2026-39319, CVE-2026-39332, CVE-2026-39356, CVE-2026-39369, CVE-2026-39374, CVE-2026-39688, CVE-2026-39690, CVE-2026-39692, CVE-2026-39694, CVE-2026-39696, CVE-2026-3243, CVE-2026-3296, CVE-2026-3480, CVE-2026-3600, CVE-2026-4065, CVE-2026-4111, CVE-2026-4300, CVE-2026-4330, CVE-2026-4785, CVE-2026-4788, CVE-2026-4808, CVE-2026-4931, CVE-2026-5300 Date: Wed, 8 Apr 2026 14:50:02 +0000 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.12.inc | 236 ++++++++++++++++-- 1 file changed, 216 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index bba789c9e5..e4e81ee492 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-03-27 19:55:47.691205+00:00 for kernel version 6.12.79 -# From linux_kernel_cves cve_2026-03-27_1900Z-2-gb6d5823e23a +# Generated at 2026-04-08 14:59:27.074934+00:00 for kernel version 6.12.80 +# From linux_kernel_cves cve_2026-04-08_1400Z python check_kernel_cve_status_version() { - this_version = "6.12.79" + this_version = "6.12.80" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -16110,9 +16110,9 @@ CVE_STATUS[CVE-2025-22114] = "fixed-version: only affects 6.14 onwards" CVE_STATUS[CVE-2025-22115] = "cpe-stable-backport: Backported in 6.12.40" -# CVE-2025-22116 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-22116] = "cpe-stable-backport: Backported in 6.12.80" -# CVE-2025-22117 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-22117] = "cpe-stable-backport: Backported in 6.12.80" CVE_STATUS[CVE-2025-22118] = "fixed-version: only affects 6.13 onwards" @@ -19248,7 +19248,7 @@ CVE_STATUS[CVE-2025-40216] = "cpe-stable-backport: Backported in 6.12.36" CVE_STATUS[CVE-2025-40218] = "cpe-stable-backport: Backported in 6.12.54" -CVE_STATUS[CVE-2025-40219] = "cpe-stable-backport: Backported in 6.12.54" +CVE_STATUS[CVE-2025-40219] = "cpe-stable-backport: Backported in 6.12.75" CVE_STATUS[CVE-2025-40220] = "cpe-stable-backport: Backported in 6.12.54" @@ -19554,7 +19554,7 @@ CVE_STATUS[CVE-2025-68173] = "cpe-stable-backport: Backported in 6.12.58" # CVE-2025-68174 needs backporting (fixed from 6.18) -# CVE-2025-68175 needs backporting (fixed from 6.18) +CVE_STATUS[CVE-2025-68175] = "cpe-stable-backport: Backported in 6.12.80" CVE_STATUS[CVE-2025-68176] = "cpe-stable-backport: Backported in 6.12.58" @@ -19958,7 +19958,7 @@ CVE_STATUS[CVE-2025-68734] = "cpe-stable-backport: Backported in 6.12.59" # CVE-2025-68735 needs backporting (fixed from 6.19) -# CVE-2025-68736 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2025-68736] = "cpe-stable-backport: Backported in 6.12.80" CVE_STATUS[CVE-2025-68737] = "fixed-version: only affects 6.18 onwards" @@ -20108,8 +20108,6 @@ CVE_STATUS[CVE-2025-68810] = "cpe-stable-backport: Backported in 6.12.64" CVE_STATUS[CVE-2025-68811] = "cpe-stable-backport: Backported in 6.12.64" -CVE_STATUS[CVE-2025-68812] = "fixed-version: only affects 6.15 onwards" - CVE_STATUS[CVE-2025-68813] = "cpe-stable-backport: Backported in 6.12.64" CVE_STATUS[CVE-2025-68814] = "cpe-stable-backport: Backported in 6.12.64" @@ -20440,7 +20438,7 @@ CVE_STATUS[CVE-2026-22979] = "cpe-stable-backport: Backported in 6.12.66" CVE_STATUS[CVE-2026-22980] = "cpe-stable-backport: Backported in 6.12.66" -# CVE-2026-22981 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-22981] = "cpe-stable-backport: Backported in 6.12.80" CVE_STATUS[CVE-2026-22982] = "cpe-stable-backport: Backported in 6.12.66" @@ -20448,7 +20446,7 @@ CVE_STATUS[CVE-2026-22983] = "fixed-version: only affects 6.18.4 onwards" CVE_STATUS[CVE-2026-22984] = "cpe-stable-backport: Backported in 6.12.66" -# CVE-2026-22985 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-22985] = "cpe-stable-backport: Backported in 6.12.80" # CVE-2026-22986 needs backporting (fixed from 6.19) @@ -20464,7 +20462,7 @@ CVE_STATUS[CVE-2026-22991] = "cpe-stable-backport: Backported in 6.12.66" CVE_STATUS[CVE-2026-22992] = "cpe-stable-backport: Backported in 6.12.66" -# CVE-2026-22993 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-22993] = "cpe-stable-backport: Backported in 6.12.80" CVE_STATUS[CVE-2026-22994] = "cpe-stable-backport: Backported in 6.12.66" @@ -20892,13 +20890,13 @@ CVE_STATUS[CVE-2026-23205] = "cpe-stable-backport: Backported in 6.12.70" CVE_STATUS[CVE-2026-23206] = "cpe-stable-backport: Backported in 6.12.70" -CVE_STATUS[CVE-2026-23207] = "fixed-version: only affects 6.18.2 onwards" +CVE_STATUS[CVE-2026-23207] = "cpe-stable-backport: Backported in 6.12.80" # CVE-2026-23208 needs backporting (fixed from 6.19) CVE_STATUS[CVE-2026-23209] = "cpe-stable-backport: Backported in 6.12.70" -# CVE-2026-23210 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-23210] = "cpe-stable-backport: Backported in 6.12.80" CVE_STATUS[CVE-2026-23211] = "fixed-version: only affects 6.18 onwards" @@ -20988,7 +20986,7 @@ CVE_STATUS[CVE-2026-23253] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23254] = "cpe-stable-backport: Backported in 6.12.70" -# CVE-2026-23255 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-23255] = "cpe-stable-backport: Backported in 6.12.80" CVE_STATUS[CVE-2026-23256] = "cpe-stable-backport: Backported in 6.12.70" @@ -21118,8 +21116,6 @@ CVE_STATUS[CVE-2026-23318] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23319] = "cpe-stable-backport: Backported in 6.12.77" -# CVE-2026-23320 needs backporting (fixed from 7.0rc1) - CVE_STATUS[CVE-2026-23321] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23322] = "fixed-version: only affects 6.18 onwards" @@ -21144,7 +21140,7 @@ CVE_STATUS[CVE-2026-23331] = "fixed-version: only affects 6.13 onwards" CVE_STATUS[CVE-2026-23332] = "fixed-version: only affects 6.16 onwards" -# CVE-2026-23333 has no known resolution +# CVE-2026-23333 needs backporting (fixed from 7.0rc1) CVE_STATUS[CVE-2026-23334] = "cpe-stable-backport: Backported in 6.12.77" @@ -21276,5 +21272,205 @@ CVE_STATUS[CVE-2026-23397] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23398] = "cpe-stable-backport: Backported in 6.12.78" -# CVE-2026-31788 has no known resolution +CVE_STATUS[CVE-2026-23399] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23400] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23401] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-23402] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23403] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23404] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23405] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23406] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23407] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23408] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23409] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23410] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23411] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23412] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23413] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23414] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-23415] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23416] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23417] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-23418] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23419] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23420] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23421] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23422] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23423] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23424] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23425] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23426] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23427] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23428] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23429] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23430] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23431] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23432] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23433] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23434] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23435] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23436] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23437] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23438] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23439] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23440] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23441] = "cpe-stable-backport: Backported in 6.12.78" + +# CVE-2026-23442 needs backporting (fixed from 7.0rc5) + +CVE_STATUS[CVE-2026-23443] = "cpe-stable-backport: Backported in 6.12.78" + +# CVE-2026-23444 needs backporting (fixed from 7.0rc5) + +CVE_STATUS[CVE-2026-23445] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23446] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23447] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23448] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23449] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23450] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23451] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23452] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23453] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23454] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23455] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23456] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23457] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23458] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23459] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23460] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23461] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23462] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23463] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23464] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23465] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23466] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23467] = "fixed-version: only affects 6.16 onwards" + +# CVE-2026-23468 needs backporting (fixed from 7.0rc5) + +# CVE-2026-23469 needs backporting (fixed from 7.0rc5) + +CVE_STATUS[CVE-2026-23470] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23471] = "cpe-stable-backport: Backported in 6.12.78" + +# CVE-2026-23472 needs backporting (fixed from 7.0rc5) + +# CVE-2026-23473 needs backporting (fixed from 7.0rc5) + +CVE_STATUS[CVE-2026-23474] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23475] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31389] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31390] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-31391] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31392] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31393] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31394] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31395] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-31396] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31397] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-31398] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-31399] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31400] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31401] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31402] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31403] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31404] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-31405] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31406] = "cpe-stable-backport: Backported in 6.12.80" + +# CVE-2026-31407 needs backporting (fixed from 7.0rc5) + +CVE_STATUS[CVE-2026-31408] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31409] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31410] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31411] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-31788] = "cpe-stable-backport: Backported in 6.12.78" From patchwork Thu Apr 23 15:45:06 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 86783 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id CD67BFC0377 for ; Thu, 23 Apr 2026 15:45:43 +0000 (UTC) Received: from mail-qt1-f179.google.com (mail-qt1-f179.google.com [209.85.160.179]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.769.1776959136007954157 for ; Thu, 23 Apr 2026 08:45:36 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=qB7dFsCl; spf=pass (domain: gmail.com, ip: 209.85.160.179, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f179.google.com with SMTP id d75a77b69052e-50d6b9bca48so12765851cf.2 for ; Thu, 23 Apr 2026 08:45:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776959135; x=1777563935; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=dLTbf0kSVZPafNnMl49b49G1rixCTmBLGVQCIjccl+k=; b=qB7dFsClTT8b3oZLBGhBzls8ud1E5fh1wA83IC2KikdB0B5GCUwdC0cmSxJxtZlWbi jQMvP4nYCVyfs6+7ftRnY7mOpVTJPZdm89pWVj3BfMLSS3pToZ/qTnKDl+7/K6E8zmQa 8G6Tj3X+SS7FDa3iv/A4qn3IQw4vuTROwIOjv/pvFtTw4/LOjeYGYND4SEbCY3O6o7Ux 2GpEY0NDaW/+TWJNaZKI0YrjJFLgwyZd3tdl5gZTBo3bCIUgcjjuerSYwLYPZhJYKZSv IeMPHhoBsj3W3n+vJNMccLu7uveRGSOd8+CxyRfhfcXXA20XN3YB3zybCyKsObjAH/Xy 3a6w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776959135; x=1777563935; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=dLTbf0kSVZPafNnMl49b49G1rixCTmBLGVQCIjccl+k=; b=XGVs3gYpgqni4fCsobmSQdTBBgPY+r7n8qrQIdMhEuKqc6peFV7XdyPOLRAI1HpQUx YK0rl0/2hTTc+GwGDyEimtUxO/kBkXsS8/4aGy8L6zBpqhpaZN88OP3wpEF8CkFkf7eS Zd4f03duXe8gK736TivFA9FL3S2PD9IJwfmKIbb9ErYjfOSShG9BfACz5DSn9JRxI7z+ UKDofI9vKJR0UYK6fEUH6K6A0J6mZrV9rXjW3WZtlSb4O8JzgizqqeT8NexIKCjw9QAr ZRtgon1nZtwmxT9Z07aQzYQLYf++KhpwXvBXCBYuWXVOF4A6oXAXNq1syAUg9//ozQRH hzUA== X-Gm-Message-State: AOJu0YwKYKm9gKfb0kFN/KJmDX5zPXaiKcOYA0uWV7qA6e66FaQWBab0 NWtvRkM4qzd5ObO3kdB7MynE0BUGDvLoCHHGvXsDQyPzOj1RjS07p0h1njDVTVTZ X-Gm-Gg: AeBDieuCuTK24cMb2lygmomwyqmA4WWIAYK/61S6UG9EImCGQ6sivM/9Wss66Ezks9J dbIWobVx++g4maXceAoiHGGvIqkHlUzsSV2i59AWHhHYN6tRQK3ODbtP5vhrobHZkUlF4cSGNK8 EQmp0U2x+otONLdcqqTLs95irGGvys4xCyU//Fqf2eYB9hdZDIREscFBmp+t180w2gQTPdZ11rK v3wo1a9TpC+nYaG11ZqK/vCar/8ZUKJXzlrlRTbIMiqZxPRVOufVodcplWVmspIjzyARC5KItAM sYtl0yI988aWFvaM4IbtCn4J5dNzqd7lZu6HrV13jTgJ31Q7WkgBt11hG3OEStlp2rsNmBqh6/p aUP9ZSNTOQIK+2E5x+jabbbK2JpoBvjr1CEmnLNcz4maE03ibcQBFSP9HNmYOIGJnhFC/oD37dS uKa8JUEVXOQhkWhiKPXikg09d6QTwSqRzPDsP6/zq21jWV+BzJP/wlLFy5lzfuvZsdGjf65XQKQ n+cvYcn/PUHxT24veBZEek4D35Ang5cOZ9QZbDbTiKg0rcfNrmQ6CtB7+oY8Z1V1c8ieA== X-Received: by 2002:a05:622a:a48f:b0:50e:5a9d:fb9a with SMTP id d75a77b69052e-50e5a9dfdc8mr277560131cf.15.1776959134704; Thu, 23 Apr 2026 08:45:34 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-50fb416b3f5sm74400031cf.28.2026.04.23.08.45.32 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Apr 2026 08:45:32 -0700 (PDT) From: bruce.ashfield@gmail.com To: yoann.congal@smile.fr Cc: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 15/18] linux-yocto/6.12: update to v6.12.81 Date: Thu, 23 Apr 2026 11:45:06 -0400 Message-ID: <20260423154509.1933646-16-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260423154509.1933646-1-bruce.ashfield@gmail.com> References: <20260423154509.1933646-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Apr 2026 15:45:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235814 From: Bruce Ashfield Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: e7a3953084a70 Linux 6.12.81 787781697f216 selftests/bpf: test refining u32/s32 bounds when ranges cross min/max boundary ded1ea20d0b77 bpf: Fix u32/s32 bounds when ranges cross min/max boundary 58d4c4a257ad4 bpf: Add third round of bounds deduction d7a73ec8015bc selftests/bpf: Test invariants on JSLT crossing sign 269d80981a5c7 selftests/bpf: Test cross-sign 64bits range refinement d7d7b4879d994 bpf: Improve bounds when s64 crosses sign boundary 3708bea44e732 drm/amd/display: Correct logic check error for fastboot 4ab0ca29df9af drm/amd: Disable ASPM on SI 2b5a2083c9eb7 drm/amd/display: Disable scaling on DCE6 for now 3ab5be94925f4 drm/amd/display: Adjust DCE 8-10 clock, don't overclock by 15% 85229e17e8d7e drm/amd/display: Fix DCE 6.0 and 6.4 PLL programming. fd1b69d047a4a drm/amd/display: Keep PLL0 running on DCE 6.0 and 6.4 207b18daaae25 drm/amd/display: Disable fastboot on DCE 6 too 1f9b3e72fd7da drm/amd/amdgpu: disable ASPM in some situations 8f187036a3e65 drm/amd/amdgpu: decouple ASPM with pcie dpm 2145a80f47cd5 x86/CPU/AMD: Add additional fixed RDSEED microcode revisions f496eee88c605 MPTCP: fix lock class name family in pm_nl_create_listen_socket ac69fbda177f3 s390/cpum_sf: Cap sampling rate to prevent lsctl exception a1d24d8e59c8d s390/perf_cpum_sf: Convert to use try_cmpxchg128() e76bcb727e487 ext4: publish jinode after initialization 38bac39274a3a drm/amd/pm: disable OD_FAN_CURVE if temp or pwm range invalid for smu v13 2b307be747cf7 mm/memory: fix PMD/PUD checks in follow_pfnmap_start() 9bcbf9ae7db8b mm: replace READ_ONCE() with standard page table accessors b8c49ad888892 mm/huge_memory: fix folio isn't locked in softleaf_to_folio() 70cad63b3bc63 x86/fred: Fix early boot failures on SEV-ES/SNP guests 7cbd69aaa507b scsi: target: tcm_loop: Drain commands in target_reset handler 43f5b19fd190f net: mana: fix use-after-free in add_adev() error path 33670f780e012 net: correctly handle tunneled traffic on IPV6_CSUM GSO fallback 022e3d4112afa spi: cadence-qspi: Fix exec_mem_op error handling c5fa98842783e wifi: virt_wifi: remove SET_NETDEV_DEV to avoid use-after-free be2d32f0c3fe3 usb: gadget: f_uac1_legacy: validate control request size f7d00ee1c8082 usb: gadget: f_hid: move list and spinlock inits from bind to alloc 1ef251aa63972 usb: gadget: f_rndis: Fix net_device lifecycle with device_move 70707ce668494 usb: gadget: f_subset: Fix net_device lifecycle with device_move a6b8bce01a30a usb: gadget: f_eem: Fix net_device lifecycle with device_move 5eaeac22240d9 usb: gadget: f_ecm: Fix net_device lifecycle with device_move 7d8fa3b8783ab usb: gadget: f_rndis: Protect RNDIS options with mutex cc8ec610cd14c usb: gadget: f_subset: Fix unbalanced refcnt in geth_free 8a1128d604c36 usb: gadget: uvc: fix NULL pointer dereference during unbind race 0326429e8ba99 usb: gadget: u_ether: Fix NULL pointer deref in eth_get_drvinfo bbb09bb89ffa5 usb: gadget: u_ether: Fix race between gether_disconnect and eth_stop 0a1fbbd780f04 btrfs: do not free data reservation in fallback from inline due to -ENOSPC b6310d040d715 btrfs: fix the qgroup data free range for inline data extents b23282218eca2 ice: Fix memory leak in ice_set_ringparam() f6dcbf2b024d5 usb: typec: ucsi: validate connector number in ucsi_notify_common() bc9e80feec629 usb: gadget: dummy_hcd: fix premature URB completion when ZLP follows partial transfer 94d4fab1dd9e6 USB: dummy-hcd: Fix interrupt synchronization error 805b1833d6ed6 USB: dummy-hcd: Fix locking/synchronization error d35df146eff91 thunderbolt: Fix property read in nhi_wake_supported() 0bdee4118340c misc: fastrpc: possible double-free of cctx->remote_heap 604da9c04c218 thermal: core: Fix thermal zone device registration error path bc49d5a3c049a gpio: mxc: map Both Edge pad wakeup to Rising Edge 427d048e4f6ac cpufreq: governor: fix double free in cpufreq_dbs_governor_init() error path 0b832aad33e6f net: ethernet: mtk_ppe: avoid NULL deref when gmac0 is disabled d45230081f19c net: ftgmac100: fix ring allocation unwind on open failure de20d2e3b9179 vxlan: validate ND option lengths in vxlan_na_create bdbf027a4504b crypto: tegra - Add missing CRYPTO_ALG_ASYNC 633dfbf0eb276 counter: rz-mtu3-cnt: do not use struct rz_mtu3_channel's dev member ced8b48420edd counter: rz-mtu3-cnt: prevent counter from being toggled multiple times b7eef00f08b92 netfilter: ipset: drop logically empty buckets in mtype_del 2f6e5b9964d0a nvmem: zynqmp_nvmem: Fix buffer size in DMA and memcpy 9c01cfe54a7d2 nvmem: imx: assign nvmem_cell_info::raw_len 5de15580ef147 dt-bindings: connector: add pd-disable dependency cad3327ab50d9 firmware: microchip: fail auto-update probe if no flash found 99f31aa98ab6e comedi: me4000: Fix potential overrun of firmware buffer 1bf8761eb59e9 comedi: me_daq: Fix potential overrun of firmware buffer 3848ae00b1642 comedi: ni_atmio16d: Fix invalid clean-up after failed attach 430291d8f3884 comedi: Reinit dev->spinlock between attachments to low-level drivers 65c528fbeddd8 comedi: dt2815: add hardware detection to prevent crash f0e520784d5ac cdc-acm: new quirk for EPSON HMD c49b9256bbacb bridge: br_nd_send: validate ND option lengths 0b7f1d1352e46 Revert "LoongArch/orc: Use RCU in all users of __module_address()." 8eb219e34da19 Revert "LoongArch: Remove unnecessary checks for ORC unwinder" c471e3ae674f5 Revert "LoongArch: Handle percpu handler address for ORC unwinder" c7e475ae3a559 usb: cdns3: gadget: fix state inconsistency on gadget init failure d61446dfc9d38 usb: cdns3: gadget: fix NULL pointer dereference in ep_queue af0d688a8d55d usb: core: phy: avoid double use of 'usb3-phy' 4ed9d2dd9f298 usb: dwc2: gadget: Fix spin_lock/unlock mismatch in dwc2_hsotg_udc_stop() 874c95ebbe595 usb: ehci-brcm: fix sleep during atomic d13318dec0c1e usb: usbtmc: Flush anchored URBs in usbtmc_release 8763f8317bb38 usb: ulpi: fix double free in ulpi_register_interface() error path f8f45359f9682 usb: quirks: add DELAY_INIT quirk for another Silicon Motion flash drive f5a6a5f412b3f iio: gyro: mpu3050: Fix out-of-sequence free_irq() 92f18aa86302f iio: gyro: mpu3050: Move iio_device_register() to correct location b52fd1644ad2c iio: gyro: mpu3050: Fix irq resource leak 8631e755fc07b iio: gyro: mpu3050: Fix incorrect free_irq() variable 10ec3158d4719 iio: imu: st_lsm6dsx: Set FIFO ODR for accelerometer and gyroscope only 42d4e0d4f12cd iio: imu: bmi160: Remove potential undefined behavior in bmi160_config_pin() b64050f926145 iio: light: vcnl4035: fix scan buffer on big-endian 87a2fb7162d3f iio: dac: ad5770r: fix error return in ad5770r_read_raw() 6c122c911e405 iio: accel: adxl380: fix FIFO watermark bit 8 always written as 0 4f420f4b46e7d iio: accel: fix ADXL355 temperature signature value acdeaf1dea613 iio: adc: aspeed: clear reference voltage bits before configuring vref f3f9c94e504fa Input: xpad - add support for Razer Wolverine V3 Pro 2348168b7d71d Input: xpad - add support for BETOP BTP-KP50B/C controller's wireless mode ff809b77f4cfb Input: bcm5974 - recover from failed mode switch c9e103994e33e Input: i8042 - add TUXEDO InfinityBook Max 16 Gen10 AMD to i8042 quirk table 86f10a395325b Input: synaptics-rmi4 - fix a locking bug in an error path 3ac9c06f80ada USB: core: add NO_LPM quirk for Razer Kiyo Pro webcam 5a19500e3461b USB: serial: option: add support for Rolling Wireless RW135R-GL 2a8f48cd3c6e2 USB: serial: io_edgeport: add support for Blackbox IC135A 79129c94aa8a0 drm/amdgpu/pm: drop SMU driver if version not matched messages 6b2614a0ff05a drm/amdgpu: Change AMDGPU_VA_RESERVED_TRAP_SIZE to 64KB 890ee92cc4fd9 drm/i915/dp: Use crtc_state->enhanced_framing properly on ivb/hsw CPU eDP 55efe8402f46a drm/i915/dsi: Don't do DSC horizontal timing adjustments in command mode 9c40e6294756a drm/ast: dp501: Fix initialization of SCU2C 7685e0e3e3448 iio: adc: ti-ads1119: Replace IRQF_ONESHOT with IRQF_NO_THREAD 054836eecc469 iio: adc: ti-ads1119: Reinit completion before wait_for_completion_timeout() 1da4cf3a06c37 iio: adc: ti-ads1119: Fix unbalanced pm reference count in ds1119_single_conversion() 67b3a91bdc482 iio: adc: ti-adc161s626: use DMA-safe memory for spi_read() 6165d8d71ce8a iio: adc: ti-adc161s626: fix buffer read on big-endian 93ca9febac89b drm/amdgpu: fix the idr allocation flags 6e965c91983a8 mips: mm: Allocate tlb_vpn array atomically bbbefc48f6617 hwmon: (occ) Fix division by zero in occ_show_power_1() a8d2212538051 MIPS: Fix the GCC version check for `__multi3' workaround ab9a172ca0822 MIPS: SiByte: Bring back cache initialisation d48c64fb80ad7 ksmbd: fix OOB write in QUERY_INFO for compound requests f5d446624345d Bluetooth: hci_sync: fix stack buffer overflow in hci_le_big_create_sync c8ff0ca650853 Bluetooth: SMP: force responder MITM requirements before building the pairing response 0afc846bd8007 Bluetooth: SMP: derive legacy responder STK authentication from MITM state 90ced24c500ad io_uring/net: fix slab-out-of-bounds read in io_bundle_nbufs() a0b45bdfffce9 ALSA: ctxfi: Fix missing SPDIFI1 index handling 3178b62e2e31b ALSA: caiaq: fix stack out-of-bounds read in init_card 84f3fab430d85 USB: serial: option: add MeiG Smart SRM825WN e67d8c626ace8 wifi: iwlwifi: mvm: fix potential out-of-bounds read in iwl_mvm_nd_match_info_handler() c97b2a0005960 wifi: wilc1000: fix u8 overflow in SSID scan buffer size calculation 4a41c2b18fc05 drm/ioc32: stop speculation on the drm_compat_ioctl path c289154aef97f riscv: kgdb: fix several debug register assignment bugs c089147074ed9 sched/fair: Fix zero_vruntime tracking fix 6277998e3abce sched/fair: Use protect_slice() instead of direct comparison e8fd60338545f mips: ralink: update CPU clock index 2c9b408807bc5 hwmon: (occ) Fix missing newline in occ_show_extended() 5fb6dd8beeefa hwmon: (tps53679) Fix device ID comparison and printing in tps53676_identify() f286132539060 dt-bindings: gpio: fix microchip #interrupt-cells 7fd4a5682c788 hwmon: (ltc4286) Add missing MODULE_IMPORT_NS("PMBUS") 96878fbb37bfe hwmon: (pxe1610) Check return value of page-select write in probe 08021f2d4a557 accel/qaic: Handle DBC deactivation if the owner went away 931d71104fd71 iio: imu: bno055: fix BNO055_SCAN_CH_COUNT off by one 8624e819a2dcf Revert "drm: Fix use-after-free on framebuffers and property blobs when calling drm_dev_unplug" 70abd9d118da2 bpf: reject direct access to nullable PTR_TO_BUF pointers 63fda74885555 ipv6: avoid overflows in ip6_datagram_send_ctl() c1ed6d68fbe17 net: hsr: fix VLAN add unwind on slave errors 9bf5fc36a43f7 net/sched: cls_flow: fix NULL pointer dereference on shared blocks 5cf41031922c1 net/sched: cls_fw: fix NULL pointer dereference on shared blocks 4e2d1bcef78d2 net/x25: Fix overflow when accumulating packets 524371398d846 net/x25: Fix potential double free of skb 0856789f6064a bnxt_en: Restore default stat ctxs for ULP when resource is available 2ebb13f3e8be0 net/mlx5: Fix switchdev mode rollback in case of failure d22c8bb054dc0 net/mlx5: Avoid "No data available" when FW version queries fail cfa774e6c920c net/mlx5: lag: Check for LAG device before creating debugfs e35dbfdb1b771 net: macb: properly unregister fixed rate clocks f310a836da90d net: macb: fix clk handling on PCI glue driver removal 13a66ca1e235d net/sched: sch_netem: fix out-of-bounds access in packet corruption 68187f18a89be bpf: sockmap: Fix use-after-free of sk->sk_socket in sk_psock_verdict_data_ready(). a5bfd14c9a299 rds: ib: reject FRMR registration before IB connection is established 0b706fb2294af Bluetooth: MGMT: validate mesh send advertising payload length 7cadb03be37e7 Bluetooth: hci_event: fix potential UAF in hci_le_remote_conn_param_req_evt 66d432e9b45ba Bluetooth: hci_conn: fix potential UAF in set_cig_params_sync 82f342b3b006c Bluetooth: MGMT: validate LTK enc_size on load 7e296ffdab5bd Bluetooth: SCO: fix race conditions in sco_sock_connect() 94445b8517a0b Bluetooth: hci_sync: call destroy in hci_cmd_sync_run if immediate f710691be163a netfilter: nf_tables: reject immediate NF_QUEUE verdict e7e1b6bcb389c netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP 0f6c33697ccfa netfilter: ctnetlink: ignore explicit helper on new expectations f8cebc41afd89 netfilter: nf_conntrack_expect: store netns and zone in expectation 4bd1b3d839172 netfilter: nf_conntrack_expect: use expect->helper afd5afd32ba82 netfilter: nf_conntrack_expect: honor expectation helper field fd002ff2ea030 netfilter: ctnetlink: zero expect NAT fields when CTA_EXPECT_NAT absent 2c16e4d64dd91 netfilter: nf_conntrack_helper: pass helper to expect cleanup 69acb09ef957c netfilter: ipset: use nla_strcmp for IPSET_ATTR_NAME attr 673bbd36cba21 netfilter: x_tables: ensure names are nul-terminated 6b419700e459f netfilter: nfnetlink_log: account for netlink header size 57c78bd2e2dd0 netfilter: flowtable: strictly check for maximum number of actions 8027964931785 net: ipv6: flowlabel: defer exclusive option free until RCU teardown 7241da033fdc5 bpf: Fix regsafe() for pointers to packet 8b079642413d6 ASoC: Intel: boards: fix unmet dependency on PINCTRL 6a2124da900a3 net: xilinx: axienet: Correct BD length masks to match AXIDMA IP spec f48ab6ee654ec NFC: pn533: bound the UART receive buffer d6db08484c6cb net: sched: cls_api: fix tc_chain_fill_node to initialize tcm_info to zero to prevent an info-leak f7a6cd508e9e8 net: use skb_header_pointer() for TCPv4 GSO frag_off check c3c09b7b771d4 net: introduce mangleid_features cce5027f9dc3a net: airoha: Add missing cleanup bits in airoha_qdma_cleanup_rx_queue() 25357b670afb5 ipv6: prevent possible UaF in addrconf_permanent_addr() 4045b72a0853f ASoC: ep93xx: Fix unchecked clk_prepare_enable() and add rollback on failure fdaa12c6682c0 net: enetc: check whether the RSS algorithm is Toeplitz 76dfdcef11199 net: sfp: Fix Ubiquiti U-Fiber Instant SFP module on mvneta b9e6431cbea8b net/sched: sch_hfsc: fix divide-by-zero in rtsc_min() 2ba4caba423ed bridge: br_nd_send: linearize skb before parsing ND options f513cdd55a480 eth: fbnic: Account for page fragments when updating BDQ tail 1063515ce15ff ip6_tunnel: clear skb2->cb[] in ip4ip6_err() e41953e7d118e ipv6: icmp: clear skb2->cb[] in ip6_err_gen_icmpv6_unreach() d8ce8e2dfd32c tg3: Fix race for querying speed/duplex 77695a69baca9 net/ipv6: ioam6: prevent schema length wraparound in trace fill 4f810c686fde5 net: ipv6: ndisc: fix ndisc_ra_useropt to initialize nduseropt_padX fields to zero to prevent an info-leak 69402908e277d net: qrtr: replace qrtr_tx_flow radix_tree with xarray to fix memory leak 5eb37a39ae80d net: fec: fix the PTP periodic output sysfs interface 44eafa39363e8 crypto: af-alg - fix NULL pointer dereference in scatterwalk c2fb4984fe09f crypto: caam - fix overflow on long hmac keys c0c133e0225d8 crypto: caam - fix DMA corruption on long hmac keys 08020567bf5fa wifi: ath11k: Pass the correct value of each TID during a stop AMPDU session 368bcaa8f3a03 dt-bindings: auxdisplay: ht16k33: Use unevaluatedProperties to fix common property warning 35783cb13a25e spi: geni-qcom: Check DMA interrupts early in ISR 53ceedd1eb628 btrfs: reject root items with drop_progress and zero drop_level 2b3cc69a318eb i2c: tegra: Don't mark devices with pins as IRQ safe bb6eb33c908ed btrfs: reserve enough transaction items for qgroup ioctls 6a4acd3e86fe5 HID: multitouch: Check to ensure report responses match the request 772f99cc8d6e5 HID: logitech-hidpp: Prevent use-after-free on force feedback initialisation failure e3da29787887c objtool: Fix Clang jump table detection ab319b5a8bca4 tg3: replace placeholder MAC address with device property 7eb0da6455986 btrfs: don't take device_list_mutex when querying zone info 3989740fa4978 atm: lec: fix use-after-free in sock_def_readable() 41026bcc0fdf8 HID: wacom: fix out-of-bounds read in wacom_intuos_bt_irq 8148c2fda4ebb wifi: mac80211: check tdls flag in ieee80211_tdls_oper 194c2e93e5ae2 HID: logitech-hidpp: Enable MX Master 4 over bluetooth c4bcd4a10edd3 arm64/scs: Fix handling of advance_loc4 fd65688547c99 io_uring/kbuf: propagate BUF_MORE through early buffer commit path 1593101304e64 io_uring/kbuf: fix missing BUF_MORE for incremental buffers at EOF 4399febfb1166 io_uring/kbuf: use WRITE_ONCE() for userspace-shared buffer ring fields 612c324f63965 io_uring/kbuf: use READ_ONCE() for userspace-mapped memory 91f262ea2a76a io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths c4dbca5be33c6 io_uring/kbuf: enable bundles for incrementally consumed buffers 341d13c23f79f io_uring/rw: check for NULL io_br_sel when putting a buffer c16afaebfdc65 io_uring/net: correct type for min_not_zero() cast 015f7e0507f40 io_uring: remove async/poll related provided buffer recycles 1249eae601f98 io_uring/kbuf: switch to storing struct io_buffer_list locally 7ba8b025035bb io_uring/net: use struct io_br_sel->val as the send finish value 72f60a59ef4ce io_uring/net: use struct io_br_sel->val as the recv finish value 0f045bf7287d3 io_uring/kbuf: use struct io_br_sel for multiple buffers picking 06877b3a72455 io_uring/kbuf: introduce struct io_br_sel ac6c9a9e5082a io_uring/kbuf: pass in struct io_buffer_list to commit/recycle helpers e6f280230e401 io_uring/net: clarify io_recv_buf_select() return value f7a76e3adf03f io_uring/net: don't use io_net_kbuf_recyle() for non-provided cases c0cdc6a0e9851 io_uring/kbuf: drop 'issue_flags' from io_put_kbuf(s)() arguments c6d48713644bf io_uring/kbuf: uninline __io_put_kbufs e802d79d11ce7 io_uring/kbuf: introduce io_kbuf_drop_legacy() bfd4739463ec4 io_uring/kbuf: open code __io_put_kbuf() 55de36310adce io_uring/kbuf: remove legacy kbuf caching 3fb42ddddfb17 io_uring/kbuf: simplify __io_put_kbuf badb3134c9113 io_uring/kbuf: remove legacy kbuf kmem cache 0e2e453f31359 io_uring/kbuf: remove legacy kbuf bulk allocation Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 4c754bcd21..5a7d17c21e 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -15,13 +15,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "682f6c2088ea37c1dcc324905956034eda630d52" -SRCREV_meta ?= "8bb0dbe2b50860402b07a506a5aa3a4ef7aba0a7" +SRCREV_machine ?= "4277a7a5b623fcf652c3c73d77baa1fc15c1faf4" +SRCREV_meta ?= "b507ba98ba3ecc385b14a231dddafaea3421f778" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.80" +LINUX_VERSION ?= "6.12.81" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index d760030c21..533da7130b 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc include recipes-kernel/linux/cve-exclusion.inc include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.80" +LINUX_VERSION ?= "6.12.81" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" -SRCREV_meta ?= "8bb0dbe2b50860402b07a506a5aa3a4ef7aba0a7" +SRCREV_machine ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" +SRCREV_meta ?= "b507ba98ba3ecc385b14a231dddafaea3421f778" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index c50dc6dfac..e48084fcd3 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "dd1da548895086a19df2c3fc9586999789081636" -SRCREV_machine:qemuarm64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" -SRCREV_machine:qemuloongarch64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" -SRCREV_machine:qemumips ?= "14123935e5dd112c3a4daa4c5a756b82298ecf4d" -SRCREV_machine:qemuppc ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" -SRCREV_machine:qemuriscv64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" -SRCREV_machine:qemuriscv32 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" -SRCREV_machine:qemux86 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" -SRCREV_machine:qemux86-64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" -SRCREV_machine:qemumips64 ?= "d6af6b480ab453a08f04ce80ab25a131f54f8e34" -SRCREV_machine ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" -SRCREV_meta ?= "8bb0dbe2b50860402b07a506a5aa3a4ef7aba0a7" +SRCREV_machine:qemuarm ?= "54a370021957bfa24b4580a75518248174890205" +SRCREV_machine:qemuarm64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" +SRCREV_machine:qemuloongarch64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" +SRCREV_machine:qemumips ?= "0b864eeca749237236d8ec10e7ed373958f497c4" +SRCREV_machine:qemuppc ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" +SRCREV_machine:qemuriscv64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" +SRCREV_machine:qemuriscv32 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" +SRCREV_machine:qemux86 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" +SRCREV_machine:qemux86-64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" +SRCREV_machine:qemumips64 ?= "20f68d6b803a62b9bd958a453a669cd9ac75d22a" +SRCREV_machine ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" +SRCREV_meta ?= "b507ba98ba3ecc385b14a231dddafaea3421f778" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "00d7934ffcc35e65b113ba4991c8a3338bd85fc1" +SRCREV_machine:class-devupstream ?= "e7a3953084a7050ca349010deb22546834c2e196" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.80" +LINUX_VERSION ?= "6.12.81" PV = "${LINUX_VERSION}+git" From patchwork Thu Apr 23 15:45:07 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 86781 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E376FFC0379 for ; Thu, 23 Apr 2026 15:45:43 +0000 (UTC) Received: from mail-qt1-f180.google.com (mail-qt1-f180.google.com [209.85.160.180]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.705.1776959137809220672 for ; Thu, 23 Apr 2026 08:45:37 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=brEfQqsw; spf=pass (domain: gmail.com, ip: 209.85.160.180, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f180.google.com with SMTP id d75a77b69052e-50e5ad864a6so43576281cf.0 for ; Thu, 23 Apr 2026 08:45:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776959137; x=1777563937; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=ewM10EDKJNObqgtlsBy5oYOEHrrSk+lXuj0hQ7wKbD4=; b=brEfQqswRbiQmiLoHP0wzmdwNNmYdmFSDsaPs/EoD00YiaWPA5GD/LJ5ijxkheq17M SdW9zHZr2AA8L5WC4J7Vdp7pqekCxOyNsKCYjpIiEQcnBEWMhaez6GLI4+qxcdDCQeXL KrJyxCLUssNJv8zKEU3zkpgWYMqcstWZOEctnC1u5piDDGsUc59xyK+KsCeYLoZ+wL2U xA0+mLQqsqzfTRTg1fxpw2IB2bnjE0T36JIG45OhBuNF5Fvcm8I1LCApzQB8q3CtN13Z uhA14VzRE5gA6Z6tviHeDMpfG9f1NcN44prfjytGacGZ89qpmXkFoK1Ls55K85OMqnVv BUgQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776959137; x=1777563937; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=ewM10EDKJNObqgtlsBy5oYOEHrrSk+lXuj0hQ7wKbD4=; b=LfbBNi4rzjhrIwZDvJqJ67tqA9Szlr4Shi1Yy5Y0EhiNVSvDyGrVUlg8hqC7icsb8e y9EkjUTxzIIr4WSI/CE3PGaZkeHB6d3+tKh7l1Etn/oXn1EVQNKw4ovWQFhPZGXIhtMo zErwbsPvWrRkeREvIvuBCF1prrYGj5q5K95m4s7Ox3JzaNyYz40rVgOsJGcW4PGsxgxA PuR4UpYxeHupLKZCV0CR0AjNjYEy1jauCfP+pxjZITvfNomKBkqwW9uuCJmGG7xNSCY5 /G0bb032bCve055DkLjMD/S2ifphHwEGrxGmllzg0920CLHY3IgheCSC0aTIuAmxymtY 7/gA== X-Gm-Message-State: AOJu0YyxbKOzE7vG0AHoJZcL98yJgpm2uACHbS0Sm25Nf18uO9n0N+tv UnRkONR5AEj+6xkQXOq1ak/fFS7sv4/m7dNxRpBKL4oHbhMrtowu73//fNtCeSYc X-Gm-Gg: AeBDievGFts0HzZFuaQL1QrQMYgUqxJKStsoHpo7gTHZzHutMQuTTIZzu+SSLKCd7j9 CyOPdlbR8Fj06q3e1iyNWaiMFV6D3XOrsjqnZ+7GKhcTnINvssd08m5q4bdgue+BuxGPcYMnV0V FHgEiSNnYRxqoa1Rzz0r/4aTO3KiDXspp2T1xrVIn5Bb0v6C9oemivzLJa2ZbXlH0VkdI/6wOyD /OJTj4xefehym3Yk87k3S3qewCZ9T/ZU/nh/AYY9tco/ILmB2bfe1SgWlK8ghpHmIOlo7fAWoT6 nDSfj/g8eyt41HfzXjTWqifWY3P9NYLQsYOMAm11MT4hP75PPwKeCJYOZ5Acb3Qjj4dFRPAbNJJ iiPS7CPAM/C1SApI14751KXyMs+ZYoO0jqzjCL9oNF8bZdc2SzcdrRchUgqmC5XeWC/XlNWnszB FkD/jLokLwrgjDgD0ZR+73Xl2+ceAJa7dkjs87QIMw7lXoZ9dmoJd8B/waCknZM/GE/iI6XP+PZ Xb0erxq/Z7ZXpSWaSS3JlUGT+UjtFyW8CVi82irqC6UKWnL+xS47hSzHLXFU/dDxZDwUA== X-Received: by 2002:a05:622a:1ba6:b0:50b:1e5d:9930 with SMTP id d75a77b69052e-50e36eb86f4mr406110101cf.58.1776959135704; Thu, 23 Apr 2026 08:45:35 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-50fb416b3f5sm74400031cf.28.2026.04.23.08.45.34 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Apr 2026 08:45:35 -0700 (PDT) From: bruce.ashfield@gmail.com To: yoann.congal@smile.fr Cc: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 16/18] linux-yocto/6.12: update CVE exclusions (6.12.81) Date: Thu, 23 Apr 2026 11:45:07 -0400 Message-ID: <20260423154509.1933646-17-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260423154509.1933646-1-bruce.ashfield@gmail.com> References: <20260423154509.1933646-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Apr 2026 15:45:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235815 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 4 changes (4 new | 0 updated): - 4 new CVEs: CVE-2026-24893, CVE-2026-25125, CVE-2026-25133, CVE-2026-27287 - 0 updated CVEs: Date: Tue, 14 Apr 2026 20:56:01 +0000 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.12.inc | 98 ++++++++++++------- 1 file changed, 64 insertions(+), 34 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index e4e81ee492..2ae4f461e5 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-04-08 14:59:27.074934+00:00 for kernel version 6.12.80 -# From linux_kernel_cves cve_2026-04-08_1400Z +# Generated at 2026-04-14 21:08:51.681656+00:00 for kernel version 6.12.81 +# From linux_kernel_cves cve_2026-04-14_2000Z-1-g4a280a922d3 python check_kernel_cve_status_version() { - this_version = "6.12.80" + this_version = "6.12.81" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -18450,7 +18450,7 @@ CVE_STATUS[CVE-2025-39814] = "fixed-version: only affects 6.16 onwards" CVE_STATUS[CVE-2025-39815] = "cpe-stable-backport: Backported in 6.12.45" -CVE_STATUS[CVE-2025-39816] = "cpe-stable-backport: Backported in 6.12.49" +CVE_STATUS[CVE-2025-39816] = "cpe-stable-backport: Backported in 6.12.81" CVE_STATUS[CVE-2025-39817] = "cpe-stable-backport: Backported in 6.12.45" @@ -20424,7 +20424,7 @@ CVE_STATUS[CVE-2025-71267] = "cpe-stable-backport: Backported in 6.12.75" CVE_STATUS[CVE-2025-71268] = "cpe-stable-backport: Backported in 6.12.70" -# CVE-2025-71269 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2025-71269] = "cpe-stable-backport: Backported in 6.12.81" CVE_STATUS[CVE-2025-71270] = "cpe-stable-backport: Backported in 6.12.70" @@ -20970,7 +20970,7 @@ CVE_STATUS[CVE-2026-23245] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23246] = "cpe-stable-backport: Backported in 6.12.77" -# CVE-2026-23247 needs backporting (fixed from 7.0rc3) +# CVE-2026-23247 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23248] = "fixed-version: only affects 6.14 onwards" @@ -21006,7 +21006,7 @@ CVE_STATUS[CVE-2026-23263] = "fixed-version: only affects 6.17 onwards" CVE_STATUS[CVE-2026-23264] = "cpe-stable-backport: Backported in 6.12.70" -# CVE-2026-23265 needs backporting (fixed from 7.0rc1) +# CVE-2026-23265 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23266] = "cpe-stable-backport: Backported in 6.12.74" @@ -21020,7 +21020,7 @@ CVE_STATUS[CVE-2026-23270] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23271] = "cpe-stable-backport: Backported in 6.12.77" -# CVE-2026-23272 needs backporting (fixed from 7.0rc3) +# CVE-2026-23272 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23273] = "cpe-stable-backport: Backported in 6.12.75" @@ -21052,7 +21052,7 @@ CVE_STATUS[CVE-2026-23286] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23287] = "cpe-stable-backport: Backported in 6.12.77" -CVE_STATUS[CVE-2026-23288] = "fixed-version: only affects 6.19 onwards" +CVE_STATUS[CVE-2026-23288] = "fixed-version: only affects 6.19.4 onwards" CVE_STATUS[CVE-2026-23289] = "cpe-stable-backport: Backported in 6.12.77" @@ -21080,7 +21080,7 @@ CVE_STATUS[CVE-2026-23300] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23301] = "fixed-version: only affects 6.19 onwards" -# CVE-2026-23302 needs backporting (fixed from 7.0rc3) +# CVE-2026-23302 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23303] = "cpe-stable-backport: Backported in 6.12.77" @@ -21128,20 +21128,18 @@ CVE_STATUS[CVE-2026-23325] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23326] = "fixed-version: only affects 6.13 onwards" -# CVE-2026-23327 needs backporting (fixed from 7.0rc2) +# CVE-2026-23327 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23328] = "fixed-version: only affects 6.14 onwards" CVE_STATUS[CVE-2026-23329] = "fixed-version: only affects 6.18 onwards" -# CVE-2026-23330 needs backporting (fixed from 7.0rc3) +# CVE-2026-23330 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23331] = "fixed-version: only affects 6.13 onwards" CVE_STATUS[CVE-2026-23332] = "fixed-version: only affects 6.16 onwards" -# CVE-2026-23333 needs backporting (fixed from 7.0rc1) - CVE_STATUS[CVE-2026-23334] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23335] = "cpe-stable-backport: Backported in 6.12.77" @@ -21156,7 +21154,7 @@ CVE_STATUS[CVE-2026-23339] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23340] = "cpe-stable-backport: Backported in 6.12.77" -CVE_STATUS[CVE-2026-23341] = "fixed-version: only affects 6.19 onwards" +CVE_STATUS[CVE-2026-23341] = "fixed-version: only affects 6.19.4 onwards" CVE_STATUS[CVE-2026-23342] = "fixed-version: only affects 6.18 onwards" @@ -21166,11 +21164,11 @@ CVE_STATUS[CVE-2026-23344] = "fixed-version: only affects 6.19 onwards" CVE_STATUS[CVE-2026-23345] = "fixed-version: only affects 6.13 onwards" -# CVE-2026-23346 needs backporting (fixed from 7.0rc2) +# CVE-2026-23346 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23347] = "cpe-stable-backport: Backported in 6.12.77" -# CVE-2026-23348 needs backporting (fixed from 7.0rc2) +# CVE-2026-23348 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23349] = "fixed-version: only affects 6.18 onwards" @@ -21184,7 +21182,7 @@ CVE_STATUS[CVE-2026-23353] = "fixed-version: only affects 6.19 onwards" CVE_STATUS[CVE-2026-23354] = "cpe-stable-backport: Backported in 6.12.77" -CVE_STATUS[CVE-2026-23355] = "fixed-version: only affects 6.18 onwards" +CVE_STATUS[CVE-2026-23355] = "fixed-version: only affects 6.18.14 onwards" CVE_STATUS[CVE-2026-23356] = "cpe-stable-backport: Backported in 6.12.77" @@ -21216,19 +21214,19 @@ CVE_STATUS[CVE-2026-23369] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23370] = "cpe-stable-backport: Backported in 6.12.77" -# CVE-2026-23371 needs backporting (fixed from 7.0rc3) +# CVE-2026-23371 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23372] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23373] = "cpe-stable-backport: Backported in 6.12.77" -# CVE-2026-23374 needs backporting (fixed from 7.0rc3) +# CVE-2026-23374 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23375] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23376] = "fixed-version: only affects 6.18 onwards" -# CVE-2026-23377 needs backporting (fixed from 7.0rc3) +# CVE-2026-23377 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23378] = "cpe-stable-backport: Backported in 6.12.77" @@ -21244,7 +21242,7 @@ CVE_STATUS[CVE-2026-23383] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23384] = "fixed-version: only affects 6.18 onwards" -# CVE-2026-23385 needs backporting (fixed from 7.0rc3) +# CVE-2026-23385 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23386] = "cpe-stable-backport: Backported in 6.12.78" @@ -21252,7 +21250,7 @@ CVE_STATUS[CVE-2026-23387] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23388] = "cpe-stable-backport: Backported in 6.12.77" -# CVE-2026-23389 needs backporting (fixed from 7.0rc3) +CVE_STATUS[CVE-2026-23389] = "cpe-stable-backport: Backported in 6.12.81" CVE_STATUS[CVE-2026-23390] = "cpe-stable-backport: Backported in 6.12.74" @@ -21262,7 +21260,7 @@ CVE_STATUS[CVE-2026-23392] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23393] = "cpe-stable-backport: Backported in 6.12.78" -# CVE-2026-23394 needs backporting (fixed from 7.0rc5) +# CVE-2026-23394 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23395] = "cpe-stable-backport: Backported in 6.12.78" @@ -21358,11 +21356,11 @@ CVE_STATUS[CVE-2026-23440] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23441] = "cpe-stable-backport: Backported in 6.12.78" -# CVE-2026-23442 needs backporting (fixed from 7.0rc5) +# CVE-2026-23442 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23443] = "cpe-stable-backport: Backported in 6.12.78" -# CVE-2026-23444 needs backporting (fixed from 7.0rc5) +# CVE-2026-23444 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23445] = "cpe-stable-backport: Backported in 6.12.78" @@ -21376,7 +21374,7 @@ CVE_STATUS[CVE-2026-23449] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23450] = "cpe-stable-backport: Backported in 6.12.78" -CVE_STATUS[CVE-2026-23451] = "fixed-version: only affects 6.18 onwards" +CVE_STATUS[CVE-2026-23451] = "fixed-version: only affects 6.18.19 onwards" CVE_STATUS[CVE-2026-23452] = "cpe-stable-backport: Backported in 6.12.78" @@ -21410,17 +21408,15 @@ CVE_STATUS[CVE-2026-23466] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23467] = "fixed-version: only affects 6.16 onwards" -# CVE-2026-23468 needs backporting (fixed from 7.0rc5) +# CVE-2026-23468 needs backporting (fixed from 7.0) -# CVE-2026-23469 needs backporting (fixed from 7.0rc5) +# CVE-2026-23469 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23470] = "cpe-stable-backport: Backported in 6.12.78" -CVE_STATUS[CVE-2026-23471] = "cpe-stable-backport: Backported in 6.12.78" - -# CVE-2026-23472 needs backporting (fixed from 7.0rc5) +# CVE-2026-23472 needs backporting (fixed from 7.0) -# CVE-2026-23473 needs backporting (fixed from 7.0rc5) +# CVE-2026-23473 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23474] = "cpe-stable-backport: Backported in 6.12.78" @@ -21462,7 +21458,7 @@ CVE_STATUS[CVE-2026-31405] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-31406] = "cpe-stable-backport: Backported in 6.12.80" -# CVE-2026-31407 needs backporting (fixed from 7.0rc5) +# CVE-2026-31407 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-31408] = "cpe-stable-backport: Backported in 6.12.80" @@ -21472,5 +21468,39 @@ CVE_STATUS[CVE-2026-31410] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-31411] = "cpe-stable-backport: Backported in 6.12.75" +CVE_STATUS[CVE-2026-31412] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31413] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31414] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31415] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31416] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31417] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31418] = "cpe-stable-backport: Backported in 6.12.81" + +# CVE-2026-31419 needs backporting (fixed from 7.0) + +# CVE-2026-31420 needs backporting (fixed from 7.0) + +CVE_STATUS[CVE-2026-31421] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31422] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31423] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31424] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31425] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31426] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31427] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31428] = "cpe-stable-backport: Backported in 6.12.80" + CVE_STATUS[CVE-2026-31788] = "cpe-stable-backport: Backported in 6.12.78" From patchwork Thu Apr 23 15:45:08 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 86782 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 05100FC037B for ; Thu, 23 Apr 2026 15:45:44 +0000 (UTC) Received: from mail-qt1-f180.google.com (mail-qt1-f180.google.com [209.85.160.180]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.770.1776959138492049193 for ; Thu, 23 Apr 2026 08:45:38 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=PGMXk3Br; spf=pass (domain: gmail.com, ip: 209.85.160.180, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f180.google.com with SMTP id d75a77b69052e-50e5dbd8e0eso43373471cf.1 for ; Thu, 23 Apr 2026 08:45:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776959137; x=1777563937; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=mMxLOiAYJSvQSsGSvuiJjs9c4ZA+NqZRFeoY6kOUIrI=; b=PGMXk3Brcgj8RmTIgmau7yZe8fRdLScOjDm0pUmdRjfkrLv2wlWhY1+U1JUYqU6X2S aqpR9U22PnsoONnTq3mIW93F180QUVk3DyQCMmH5GdPEwok1m/kWFd3y0bkXF7yU2D1j fmhgeMmVPVsBW+JQa8H/7GtvxGDYYeDUQ3TE5mbLtCeEjEAAfgoHvGMhCLFbQ/TQ7i4V SOO+aP6zUEMBj+AHw6dBspChwNAkFOTUs5VA5BET4nKrqP8xqa23GnNCX1lcVQ9YC/Xh 7EYBbZrvU6e8pOqXxn4Ig2X/qfuLHvxsB2k09WYNQwu+1Of5zOkaiX6CnU+ETlUqdy6c J60Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776959137; x=1777563937; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=mMxLOiAYJSvQSsGSvuiJjs9c4ZA+NqZRFeoY6kOUIrI=; b=OgKIQ/8Q8et8vtn4AEkKCg3GFgVE7Oi176trclCZW1y5rGTqPhLYFXp02ZSfDL4W8O hpArE6E+R3KD59q/s2iFLwL0cRUm0gOVQGXax/jDS7HEYhUF60emmH0WPHspRKM6x5FG MEwZll4bWMOT2t3IElKPexh58dZ04+id8E8Gi+j475DD+z1O7JulQskXo6HaSgATRWYQ e1E+Nn1+3wTDM6YJO5ljNOHi6b3BuAM42oxDz3BUgn2AG2iPSCZl/0VJttwjEcDXfTna Q4cKfqr+HjA092N7NxoR81CcjJ+LLt9H+nPypOxHnKMJkPeLy8MnZYSAff8eE0nnRX3K onwg== X-Gm-Message-State: AOJu0YyfU8O1CUB487NIxt/I7yf5goFFlszLDNmFgCf7F/si56M7RirY 3FmYf7KwM9KkY5gkc4gIV7GyU5rtYv1eP2m0zDH8R2ciaQZb8W6m5DprBkJZSduT X-Gm-Gg: AeBDietFAZIaVqGjsoNhEfWsyngfBTIo9005Ls4/qZYcdLFWkBOEmC4nonAOvIZJBpL EHRCCSG3bIPzkZcsZWPGJXMdrY99HIcgoOygUJnDXCsLEgC0+wi0e0nUkl7emMVAi81AsxvwyeB Np7pKnhlRL7iLLYtJA3/snyU/tZb9uslr+B+HxzA9o00I16zO4WdKWOZe5HVjr07VNg+oOwWXmd ixKa5PnUWiYpSGEr3GHsT5wyEoE4Jd4lAGnOvVaZX6k+56rO2lwf8WgJIOKkqUGKtqDS7L64GMi kYSlMZe1nht3QexvKEreGvn2c+3ziousV6+wH6Nxx8oKPJGknhEstvebeg8kKxl8vE83F9sdX/G wn1xxaHlT7NVUc8jmm3In2+x406SJa/oRKRhuDyZP/LIK5sj+Q9tcS0X0R2kQfMoqltTTrXlmUs EG51vgSGqvGJsA6zcydRyIO5xTsEDe3fgCvROY/CmHvUULuL4K0WCtxMZRiKULQ6unQAdzG7Jg6 18E4Zlmrodhyj1uu9gdYqphsp0UNMy61g2x9E2rJ6LKqhRAs8h7AL7JH/PzWqniBZlddA== X-Received: by 2002:a05:622a:4207:b0:50d:3e1e:7998 with SMTP id d75a77b69052e-50e36c13c89mr431720821cf.37.1776959137190; Thu, 23 Apr 2026 08:45:37 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-50fb416b3f5sm74400031cf.28.2026.04.23.08.45.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Apr 2026 08:45:36 -0700 (PDT) From: bruce.ashfield@gmail.com To: yoann.congal@smile.fr Cc: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 17/18] linux-yocto/6.12: update to v6.12.83 Date: Thu, 23 Apr 2026 11:45:08 -0400 Message-ID: <20260423154509.1933646-18-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260423154509.1933646-1-bruce.ashfield@gmail.com> References: <20260423154509.1933646-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Apr 2026 15:45:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235816 From: Bruce Ashfield Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: eefc95626b5c Linux 6.12.83 817daf163312 PCI: Revert "Enable ACS after configuring IOMMU for OF platforms" bc9843c39f99 ipv6: add NULL checks for idev in SRv6 paths f8f55a226aab PCI: Fix placement of pci_save_state() in pci_bus_add_device() 29f05b91d8da rxrpc: Fix key quota calculation for multitoken keys 947f953978b0 ocfs2: fix out-of-bounds write in ocfs2_write_end_inline c1de19e891be ocfs2: validate inline data i_size during inode read fad0e70f4ace ocfs2: add inline inode consistency check to ocfs2_validate_inode_block() 98a0a81ce780 media: hackrf: fix to not free memory after the device is registered in hackrf_probe() be57e52e27c7 media: vidtv: fix pass-by-value structs causing MSAN warnings 449ec5fc99f4 nilfs2: fix NULL i_assoc_inode dereference in nilfs_mdt_save_to_shadow_map 582fbecb3756 media: as102: fix to not free memory after the device is registered in as102_usb_probe() add4982510f3 bcache: fix cached_dev.sb_bio use-after-free and crash af75b486f7e8 ALSA: 6fire: fix use-after-free on disconnect c78e1d4e48f2 hwmon: (powerz) Fix use-after-free on USB disconnect 5fb294032772 media: em28xx: fix use-after-free in em28xx_v4l2_open() a8a55913552a media: mediatek: vcodec: fix use-after-free in encoder release path 98c22210aead media: vidtv: fix nfeeds state corruption on start_streaming failure dfc8292a1d67 mm: blk-cgroup: fix use-after-free in cgwb_release_workfn() a05f77cb227c mm/kasan: fix double free for kasan pXds b7412ed789ff ASoC: qcom: q6apm: move component registration to unmanaged version b5a02d37eb07 KVM: x86: Use scratch field in MMIO fragment to hold small write values b1e13fdc27ca x86-64/arm64/powerpc: clean up and rename __copy_from_user_flushcache f5945c8904e5 x86: rename and clean up __copy_from_user_inatomic_nocache() 14b9194db4a2 x86-64: rename misleadingly named '__copy_user_nocache()' function e46a2cbd942c checkpatch: add support for Assisted-by tag 300fb45afa7c KVM: x86: Use __DECLARE_FLEX_ARRAY() for UAPI structures with VLAs b46ef44fe927 KVM: Remove subtle "struct kvm_stats_desc" pseudo-overlay 74c2471eb891 kernel: be more careful about dup_mmap() failures and uprobe registering af2648ee5847 net: sched: fix TCF_LAYER_TRANSPORT handling in tcf_get_base_ptr() 1ef731547dfd gpiolib: fix race condition for gdev->srcu 3dc1f48c42f2 gpiolib: unify two loops initializing GPIO descriptors ab423e589282 KVM: SEV: Drop WARN on large size for KVM_MEMORY_ENCRYPT_REG_REGION d93f7c00d884 KVM: SEV: Disallow LAUNCH_FINISH if vCPUs are actively being created c9609847ae65 KVM: SEV: Reject attempts to sync VMSA of an already-launched/encrypted vCPU 6773cc24c004 PCI: endpoint: pci-epf-vntb: Stop cmd_handler work in epf_ntb_epc_cleanup 911b557dd781 ocfs2: handle invalid dinode in ocfs2_group_extend 4cf2768a0291 ocfs2: fix use-after-free in ocfs2_fault() when VM_FAULT_RETRY 2b884d52273c ocfs2: fix possible deadlock between unlink and dio_end_io_write e589de36da10 media: vidtv: fix NULL pointer dereference in vidtv_channel_pmt_match_sections ddd57ebce245 dcache: Limit the minimal number of bucket to two 365c36e1a126 ALSA: ctxfi: Limit PTP to a single page 3be0d8895704 Docs/admin-guide/mm/damon/reclaim: warn commit_inputs vs param updates race 6e921c599161 USB: serial: option: add Telit Cinterion FN990A MBIM composition 2f640c6043ae staging: sm750fb: fix division by zero in ps_to_hz() a4f4371d194d wifi: rtw88: fix device leak on probe failure 4b762046b1bd scripts: generate_rust_analyzer.py: avoid FD leak 03797cdee38e fbdev: udlfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO ad279de5d6f1 usb: port: add delay after usb_hub_set_port_power() c6c0d13db5d0 usb: gadget: f_hid: don't call cdev_init while cdev in use 603d5a711083 USB: cdc-acm: Add quirks for Yoga Book 9 14IAH10 INGENIC touchscreen 57662bd432f3 usb: storage: Expand range of matched versions for VL817 quirks entry 8d155e2d1c41 usbip: validate number_of_packets in usbip_pack_ret_submit() dd577cb55588 ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc 08f9e6d899b5 ksmbd: require 3 sub-authorities before reading sub_auth[2] 551dfb15b182 ksmbd: validate EaNameLength in smb2_get_ea() 5cc0574c84aa smb: client: fix off-by-8 bounds check in check_wsl_eas() adb8014599fd usb: gadget: renesas_usb3: validate endpoint index in standard request handlers c9315ce9da36 usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete() 8757a2593631 usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb() 53cb4e79a071 fbdev: tdfxfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO e103f98f6615 ALSA: fireworks: bound device-supplied status before string array lookup ef2ee9db13b6 drm/vc4: platform_get_irq_byname() returns an int 1bec5698b55a NFC: digital: Bounds check NFC-A cascade depth in SDD response handler a23b1b1aaf41 net: usb: cdc-phonet: fix skb frags[] overflow in rx_complete() 58386f00af71 HID: core: clamp report_size in s32ton() to avoid undefined shift 8eed7bce7a4c HID: alps: fix NULL pointer dereference in alps_raw_event() d5b8f5f8d6fc staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify() d87d5620125a i2c: s3c24xx: check the size of the SMBUS message before using it 572f0bf536eb can: raw: fix ro->uniq use-after-free in raw_rcv() 796e0cac0582 nfc: llcp: add missing return after LLCP_CLOSED checks b448529f2f29 idpf: fix PREEMPT_RT raw/bh spinlock nesting for async VC handling 09e17780dc0c ALSA: usb-audio: Improve Focusrite sample rate filtering 1a6d2b001eb7 thermal: core: Address thermal zone removal races with resume ac72b577dadb thermal: core: Mark thermal zones as exiting before unregistration 5d40cb3ba31b Revert "drm/xe: Switch MMIO interface to take xe_mmio instead of xe_gt" 94a14a68ad31 Revert "drm/xe/mmio: Avoid double-adjust in 64-bit reads" 9174d28f3f15 netfilter: conntrack: add missing netlink policy validations af2fa2fbbced crypto: algif_aead - Fix minimum RX size check for decryption d66792919d4f sched/deadline: Use revised wakeup rule for dl_server 6cfc187d85f1 perf/x86/intel/uncore: Skip discovery table for offline dies 9bf3e6ccfdcf crypto: af_alg - limit RX SG extraction by receive buffer budget 4ee7dcd76ce9 gpio: tegra: fix irq_release_resources calling enable instead of disable 77c1489398c8 l2tp: Drop large packets with UDP encap 2bf18b643c46 net: ipa: fix event ring index not programmed for IPA v5.0+ d1c66396796f net: ipa: fix GENERIC_CMD register field masks for IPA v5.0+ 0c739f3785f8 af_unix: read UNIX_DIAG_VFS data under unix_state_lock 16eb3c2f86de net: txgbe: leave space for null terminators on property_entry 22730cb96093 netfilter: nfnetlink_queue: make hash table per queue 7bc3f58c452f netfilter: nfnetlink_queue: nfqnl_instance GFP_ATOMIC -> GFP_KERNEL_ACCOUNT allocation 9eda5478746e netfilter: ip6t_eui64: reject invalid MAC header for all packets aec14808271f netfilter: xt_multiport: validate range encoding in checkentry d1399632ba25 netfilter: nfnetlink_log: initialize nfgenmsg in NLMSG_DONE terminator 403995931500 ipvs: fix NULL deref in ip_vs_add_service error path c2275ac1a9a3 selftests: net: bridge_vlan_mcast: wait for h1 before querier check 5a1a4b049ddd xfrm_user: fix info leak in build_mapping() 21e235a36cfb xfrm: fix refcount leak in xfrm_migrate_policy_find 438b1f668ad5 xfrm: Wait for RCU readers during policy netns exit f669d60db11d xsk: validate MTU against usable frame size on bind b412b5e33943 xsk: fix XDP_UMEM_SG_FLAG issues a4ee85f55a2d xsk: respect tailroom for ZC setups 0ec4d3f6e693 xsk: tighten UMEM headroom validation to account for tailroom and min frame dc230df28471 e1000: check return value of e1000_read_eeprom 2270ebab5312 ixgbevf: add missing negotiate_features op to Hyper-V ops table 83f2daf5297b tracing/probe: reject non-closed empty immediate strings 96f8efe50464 dt-bindings: net: Fix Tegra234 MGBE PTP clock 9a3351cf1b2c net: stmmac: Fix PTP ref clock for Tegra234 7c31f7a599cf nfc: s3fwrn5: allocate rx skb before consuming bytes be638321b0da net: increase IP_TUNNEL_RECURSION_LIMIT to 5 6be325206850 ipv4: icmp: fix null-ptr-deref in icmp_build_probe() 615517f3f8d5 ipv4: nexthop: allocate skb dynamically in rtm_get_nexthop() e20b85bfbed8 ipv4: nexthop: avoid duplicate NHA_HW_STATS_ENABLE on nexthop group dump 328bb2cff5c2 net: lapbether: handle NETDEV_PRE_TYPE_CHANGE a69738efea09 net: sched: act_csum: validate nested VLAN headers 5b1173b16542 eventpoll: defer struct eventpoll free to RCU grace period 0768598cf753 drm/vc4: Protect madv read in vc4_gem_object_mmap() with madv_lock d8fdd6adc07b drm/vc4: Fix a memory leak in hang state error path 0d3c014a8439 drm/vc4: Fix memory leak of BO array in hang state 44361a76b151 drm/vc4: Release runtime PM reference after binding V3D 2c41283d94af xfrm: account XFRMA_IF_ID in aevent size calculation c5c13f1a6dc4 HID: amd_sfh: don't log error when device discovery fails with -EOPNOTSUPP 5fde03df639d PCI: hv: Set default NUMA node to 0 for devices without affinity info 29af688c457a tools/power/turbostat: Fix microcode patch level output for AMD/Hygon c93ca7c5a72e soc: qcom: pd-mapper: Fix element length in servreg_loc_pfr_req_ei 2d3248fe5663 arm64: dts: imx93-tqma9352: improve eMMC pad configuration 7a5082db69e6 arm64: dts: imx93-9x9-qsb: change usdhc tuning step for eMMC and SD 42e3ff61bbd6 arm64: dts: imx8mq: Set the correct gpu_ahb clock frequency 35550eb71aaf arm64: dts: qcom: hamoa/x1: fix idle exit latency cd4aab4d7b61 soc: aspeed: socinfo: Mask table entries for accurate SoC ID matching 4ec47edcf3cd ASoC: stm32_sai: fix incorrect BCLK polarity for DSP_A/B, LEFT_J 9224ba3215a9 net: sfp: add quirks for Hisense and HSGQ GPON ONT SFP modules 9fca68c2512a wifi: brcmfmac: validate bsscfg indices in IF events ee95f3c56a0d ata: ahci: force 32-bit DMA for JMicron JMB582/JMB585 e16a6d11bd77 HID: roccat: fix use-after-free in roccat_report_event 609057040da9 ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14IAH10 1753b0c6fd53 HID: quirks: add HID_QUIRK_ALWAYS_POLL for 8BitDo Pro 3 a712242521be platform/x86/amd: pmc: Add Thinkpad L14 Gen3 to quirk_s2idle_bug 66dd07f0b93c pinctrl: intel: Fix the revision for new features (1kOhm PD, HW debouncer) 361b9cddf20b ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14IMH9 f9ac49dda21e ASoC: amd: yc: Add DMI entry for HP Laptop 15-fc0xxx 2d29214448ec fs/smb/client: fix out-of-bounds read in cifs_sanitize_prepath 8db2ca260d56 ALSA: usb-audio: Fix quirk flags for NeuralDSP Quad Cortex 50eed7986f23 ALSA: hda/realtek: Add quirk for Samsung Book2 Pro 360 (NP950QED) ade07920ca2c ASoC: soc-core: call missing INIT_LIST_HEAD() for card_aux_list df15adc692a8 wifi: wl1251: validate packet IDs before indexing tx_frames 0843006565bd ALSA: hda/realtek: add quirk for Framework F111:000F 3d53f9aafd46 netfilter: nft_set_pipapo_avx2: don't return non-matching entry on expiry 48a21d309343 drm/amdgpu: Handle GPU page faults correctly on non-4K page systems b46e7a31e5d2 ALSA: hda/realtek: Add mute LED quirk for HP Pavilion 15-eg0xxx 32372781d664 btrfs: tracepoints: get correct superblock from dentry in event btrfs_sync_file() 7a8886444cc6 platform/x86: asus-nb-wmi: add DMI quirk for ASUS ROG Flow Z13-KJP GZ302EAC a06d3a930973 can: mcp251x: add error handling for power enable in open and resume 06d4938e41d6 ASoC: SOF: topology: reject invalid vendor array size in token parser c5dfe0fb6a43 ASoC: amd: yc: Add DMI quirk for Thin A15 B7VF 6e539907c0d1 Bluetooth: hci_sync: annotate data-races around hdev->req_status ec010891da57 ALSA: asihpi: avoid write overflow check warning c7630d574e33 media: rkvdec: reduce stack usage in rkvdec_init_v4l2_vp9_count_tbl() 545206174816 ALSA: hda/realtek: Add quirk for ASUS ROG Flow Z13-KJP GZ302EAC e3c263cb6e28 ALSA: hda/realtek: Add HP ENVY Laptop 13-ba0xxx quirk dcc2ab487da1 ASoC: amd: yc: Add DMI quirk for ASUS EXPERTBOOK BM1403CDA 66964118f1f5 RDMA/irdma: Fix double free related to rereg_user_mr d75ae3350fe8 Linux 6.12.82 b731aca06387 x86/CPU: Fix FPDSS on Zen1 ed918050c9ec ALSA: hda/hdmi: Add quirk for TUXEDO IBS14G6 60313768a8ed net: skb: fix cross-cache free of KFENCE-allocated skb head e9c369d58785 rxrpc: Fix missing error checks for rxkad encryption/decryption failure 57cf7625db25 rxrpc: Fix key/keyring checks in setsockopt(RXRPC_SECURITY_KEY/KEYRING) 12de9e0e0b0b rxrpc: fix reference count leak in rxrpc_server_keyring() a149dcae2330 rxrpc: reject undecryptable rxkad response tickets 0c156aff8a2d rxrpc: Only put the call ref if one was acquired e6b7943c5dc8 rxrpc: Fix key reference count leak from call->key c63abf25203b rxrpc: Fix call removal to use RCU safe deletion 502ff04fa3aa rxrpc: Fix anonymous key handling 691082c0b93c net: lan966x: fix use-after-free and leak in lan966x_fdma_reload() 73e940c4249d net: lan966x: fix page pool leak in error paths 305832c53551 net: lan966x: fix page_pool error handling in lan966x_fdma_rx_alloc_page_pool() 116cface1b13 idpf: set the payload size before calling the async handler 6911b7e365bf idpf: improve locking around idpf_vc_xn_push_free() 633ab680c405 mm: filemap: fix nr_pages calculation overflow in filemap_map_pages() 2c91b3991227 net: stmmac: fix integer underflow in chain mode 546cfc65c4bf net: qualcomm: qca_uart: report the consumed byte on RX skb allocation failure 53f2642d77ab mmc: vub300: fix NULL-deref on disconnect 3086374e8bc7 pmdomain: imx8mp-blk-ctrl: Keep the NOC_HDCP clock enabled a1a416134fc1 net/mlx5: Update the list of the PCI supported devices fe3b2f2084b1 drm/i915/psr: Do not use pipe_src as borders for SU area a00e92bf6583 drm/i915/gt: fix refcount underflow in intel_engine_park_heartbeat 7962b5222226 batman-adv: hold claim backbone gateways by reference 9f3ec44aeb58 net: altera-tse: fix skb leak on DMA mapping error in tse_start_xmit() aa9facde6c50 net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption d20e98c2df93 EDAC/mc: Fix error path ordering in edac_mc_alloc() 30ab358fad0c X.509: Fix out-of-bounds access when parsing extensions f970646b9a39 batman-adv: reject oversized global TT response buffers a9495069b43b nfc: pn533: allocate rx skb before consuming bytes bc7ee8cb8b3f arm64: dts: hisilicon: hi3798cv200: Add missing dma-ranges 53be38076032 arm64: dts: hisilicon: poplar: Correct PCIe reset GPIO polarity b7ea2a650ac4 arm64: dts: imx8mq-librem5: Bump BUCK1 suspend voltage up to 0.85V ec5cf6e8a125 Revert "arm64: dts: imx8mq-librem5: Set the DVS voltages lower" c17a2340d38b platform/x86/intel-uncore-freq: Handle autonomous UFS status bit 77263f053963 wifi: brcmsmac: Fix dma_free_coherent() size a2ea1ef0167d tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG eda30846ea54 xfrm: clear trailing padding in build_polexpire() 36a36105d957 workqueue: Add pool_workqueue to pending_pwqs list when unplugging multiple inactive works aa7cfa16f98f netfilter: nft_ct: fix use-after-free in timeout object destroy c1678b76541b LoongArch: Handle percpu handler address for ORC unwinder a9f522e12df8 LoongArch: Remove unnecessary checks for ORC unwinder c494448bb522 net: annotate data-races around sk->sk_{data_ready,write_space} 96bfd850d5d3 Revert "mptcp: add needs_id for netlink appending addr" ca685511f7af sched_ext: Fix stale direct dispatch state in ddsp_dsq_id 038cb4a94ed0 misc: fastrpc: check qcom_scm_assign_mem() return in rpmsg_probe 7854c0f118d8 arm64: dts: renesas: white-hawk-cpu-common: Add pin control for DSI-eDP IRQ 702029337b05 nfc: nci: complete pending data exchange on device close e5584932ac1d blktrace: fix __this_cpu_read/write in preemptible context 4125a194db4a btrfs: fix incorrect return value after changing leaf in lookup_extent_data_ref() 42995e4e034b btrfs: remove pointless out labels from extent-tree.c 8a340c39a33a btrfs: remove unused flag EXTENT_BUFFER_CORRUPT 70d34bd2a35c btrfs: remove unused flag EXTENT_BUFFER_READAHEAD 3e6ac6c4b395 btrfs: split waiting from read_extent_buffer_pages(), drop parameter wait 00f0fbd71440 btrfs: remove unused define WAIT_PAGE_LOCK for extent io 781da277d05c btrfs: make wait_on_extent_buffer_writeback() static inline 16a49e3fda33 ASoC: simple-card-utils: Don't use __free(device_node) at graph_util_parse_dai() 5bc51bc77f22 MIPS: mm: Rewrite TLB uniquification for the hidden bit feature 497f7f978946 MIPS: mm: Suppress TLB uniquification on EHINV hardware d937204d13f9 MIPS: Always record SEGBITS in cpu_data.vmbits b8acc3914594 Input: uinput - take event lock when submitting FF request "event" a3d6c9c053c9 Input: uinput - fix circular locking dependency with ff-core 6305ad032b03 seg6: separate dst_cache for input and output paths in seg6 lwtunnel eb9c6aeb512f mptcp: fix slab-use-after-free in __inet_lookup_established 82843afc1901 net: rfkill: prevent unlimited numbers of rfkill events from being created ff5ee5073023 xfrm_user: fix info leak in build_report() b245db719bc7 wifi: rt2x00usb: fix devres lifetime 632544de0fd9 usb: typec: ucsi: skip connector validation before init 1d761e5a7340 lib/crypto: chacha: Zeroize permuted_state before it leaves scope Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 5a7d17c21e..03cd397db0 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -15,13 +15,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "4277a7a5b623fcf652c3c73d77baa1fc15c1faf4" -SRCREV_meta ?= "b507ba98ba3ecc385b14a231dddafaea3421f778" +SRCREV_machine ?= "151d19206b5cd4a4cf6fd3ec8939463bf30d4b6b" +SRCREV_meta ?= "1a28be589c9aa79335563af67fbce0dadf570537" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.81" +LINUX_VERSION ?= "6.12.83" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 533da7130b..802205b38d 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc include recipes-kernel/linux/cve-exclusion.inc include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.81" +LINUX_VERSION ?= "6.12.83" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" -SRCREV_meta ?= "b507ba98ba3ecc385b14a231dddafaea3421f778" +SRCREV_machine ?= "f35602ea0c4f5b913a843251bc60949f65fda47c" +SRCREV_meta ?= "1a28be589c9aa79335563af67fbce0dadf570537" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index e48084fcd3..3e91d22469 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "54a370021957bfa24b4580a75518248174890205" -SRCREV_machine:qemuarm64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" -SRCREV_machine:qemuloongarch64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" -SRCREV_machine:qemumips ?= "0b864eeca749237236d8ec10e7ed373958f497c4" -SRCREV_machine:qemuppc ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" -SRCREV_machine:qemuriscv64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" -SRCREV_machine:qemuriscv32 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" -SRCREV_machine:qemux86 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" -SRCREV_machine:qemux86-64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" -SRCREV_machine:qemumips64 ?= "20f68d6b803a62b9bd958a453a669cd9ac75d22a" -SRCREV_machine ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" -SRCREV_meta ?= "b507ba98ba3ecc385b14a231dddafaea3421f778" +SRCREV_machine:qemuarm ?= "429bd391e936b7a9d8164b1446d9c2e591680af4" +SRCREV_machine:qemuarm64 ?= "f35602ea0c4f5b913a843251bc60949f65fda47c" +SRCREV_machine:qemuloongarch64 ?= "f35602ea0c4f5b913a843251bc60949f65fda47c" +SRCREV_machine:qemumips ?= "4c9c4e63b8b075890e9837591cb3b5aa87599938" +SRCREV_machine:qemuppc ?= "f35602ea0c4f5b913a843251bc60949f65fda47c" +SRCREV_machine:qemuriscv64 ?= "f35602ea0c4f5b913a843251bc60949f65fda47c" +SRCREV_machine:qemuriscv32 ?= "f35602ea0c4f5b913a843251bc60949f65fda47c" +SRCREV_machine:qemux86 ?= "f35602ea0c4f5b913a843251bc60949f65fda47c" +SRCREV_machine:qemux86-64 ?= "f35602ea0c4f5b913a843251bc60949f65fda47c" +SRCREV_machine:qemumips64 ?= "aab15ddcde0fa7d8e367a6488ff5206fc12679ee" +SRCREV_machine ?= "f35602ea0c4f5b913a843251bc60949f65fda47c" +SRCREV_meta ?= "1a28be589c9aa79335563af67fbce0dadf570537" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "e7a3953084a7050ca349010deb22546834c2e196" +SRCREV_machine:class-devupstream ?= "eefc95626b5cb02ea6268d1ae58237768004a60d" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.81" +LINUX_VERSION ?= "6.12.83" PV = "${LINUX_VERSION}+git" From patchwork Thu Apr 23 15:45:09 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 86784 X-Patchwork-Delegate: yoann.congal@smile.fr Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A7EFDFC0375 for ; Thu, 23 Apr 2026 15:45:43 +0000 (UTC) Received: from mail-qt1-f169.google.com (mail-qt1-f169.google.com [209.85.160.169]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.708.1776959140627103735 for ; Thu, 23 Apr 2026 08:45:40 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20251104 header.b=gst7TVo3; spf=pass (domain: gmail.com, ip: 209.85.160.169, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qt1-f169.google.com with SMTP id d75a77b69052e-506362ac5f7so56187931cf.1 for ; Thu, 23 Apr 2026 08:45:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776959140; x=1777563940; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=sMAGsMmrEu1gAHbgWQyuUfwEsi1cqaEoSWJ0x3W9ARI=; b=gst7TVo3EzCENLj4CLoSt0ggDiBjrE719XQe7pguAlEXJJViFCxad2peLquDQkFtwK zon8UGQfvz/FBiksNsvcOWmJ8kdRLTsuXsZVJ4L6PCOTxIbB5eAa7meDjEGe8jKntHl0 Y4Q6Jbxd+LDh/yyQUoXpF9S6+RQy9FnNTScZApzqoYSEjZF8bw+iDWxvQu2Qwz9LsJBx 7pfvKvmMzxcs/omPzt10+gXL2HUDSE5uV0xEm7QDvdDAcu2z70o2n0TZd4UwfGzSQ3L/ HWO3dnSIIOoZ2DpePAZ8KH5ntcDFnsDGAGrU+cnK5v3naubRyIUsWigRuCEHHuv02C4F EgSg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776959140; x=1777563940; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=sMAGsMmrEu1gAHbgWQyuUfwEsi1cqaEoSWJ0x3W9ARI=; b=lYYWeP3L7RCllPyxktDgmJHRURgr176QgeIGPtz6469Uu8/gVfR634XG7NoGTLp0aT mfoMN5NCcGvW6v1L/dQD3x2ZZ+komPDU6lZhMQ13ZPBcyF6zDQTVDUWmn0KBy6dBlZO/ 5ebumi8CUOSgGWxZWoxAzm49XL5A5NB+ec33WbfX2qcn83ZCTL6dCZMc93czBBGkkCg+ CMZCVgoL0kjbV8FiUz0h+Y/Gp4Q+h06P5u/kV+Kk3VtTwHTXuvgLaJDPMQHNnDR0R6Ps iG7eqUmflQXkBNw8I+5r+kQ/9IWfPTDiFZX+ZhjDzYi/dNiTKMDceNJuYDB224qllCQ8 KJ3g== X-Gm-Message-State: AOJu0YxjtkFBymrJv0ONNzvH5qibF3FYDMl9hagUGcRPVzjM68i+JxkM VxjLuIgzffSAJb8jkE0LWg0mA1I75NHVMtRh9KMmia5p/OXEr1jzS9S7oBLe4e1F X-Gm-Gg: AeBDiesUtD4C8s21iEAv3byc0kOh5RLdib5bs/eU/9wIc3W+3ILPwpfrcajYAB4OBg+ OhSZlJSAMKha1dP/fBwFXLC+JVQUW+miZUfaORoYJb5A5cFWWYWFtscW7DWdG8ql/jOPG20/eiF JGE5SXeHMy0TVlwIf1mndENuv7LOf2je7Z6gEaT+xW62IcRbCHT0fUfrd+KmjHAw5NN5bwjFq3L 3a9WmUVIJSwwVedw689cHEL8lxROicABii0JtfKB/8gX+okulAwoC+gqFD1uDSS2uoVCsyAuTro sBYP51dCfuGCZx6uKiVXfCJZyOU8myiOqsZwU9Vi/o4jHFLosoR69BAaL38XVMl9sv4qC6hnhjZ GDL2/Svta/ZusJ7Rrl4e0GgYgSuLNlD5QB8ZCTjiIWW5ngPfiwbL2LjvHvBHECTQDS2bW2EtYf1 Glx/syO9jUeFD/Ewh87NA3HQwilMAszu3dVOKqXili5/gHSwk8uBis01xZ6f3705839Wb4UTeu0 B3IJsUyCMkD5GtNbKopU0UTs3qrbuIzK2I9YkEnvnnOKY8ZdJC/r592LsIurFr+ZwjSYQGzMCkf M+5R X-Received: by 2002:a05:622a:64d:b0:50f:ae24:ecdb with SMTP id d75a77b69052e-50fae24f0dcmr224417621cf.37.1776959138310; Thu, 23 Apr 2026 08:45:38 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id d75a77b69052e-50fb416b3f5sm74400031cf.28.2026.04.23.08.45.37 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Apr 2026 08:45:37 -0700 (PDT) From: bruce.ashfield@gmail.com To: yoann.congal@smile.fr Cc: openembedded-core@lists.openembedded.org Subject: [openembedded-core][whinlatter][PATCH 18/18] linux-yocto/6.12: update CVE exclusions (6.12.83) Date: Thu, 23 Apr 2026 11:45:09 -0400 Message-ID: <20260423154509.1933646-19-bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260423154509.1933646-1-bruce.ashfield@gmail.com> References: <20260423154509.1933646-1-bruce.ashfield@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Apr 2026 15:45:43 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235817 From: Bruce Ashfield Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 9101 changes (4 new | 9097 updated): - 4 new CVEs: CVE-2025-70994, CVE-2026-35225, CVE-2026-41460, CVE-2026-41461 - 9097 updated CVEs: CVE-2018-25259, CVE-2018-25267, CVE-2022-41650, CVE-2022-43472, CVE-2022-44578, CVE-2022-45806, CVE-2022-45819, CVE-2022-45832, CVE-2022-45840, CVE-2022-45841, CVE-2022-46795, CVE-2022-46796, CVE-2022-46807, CVE-2022-46811, CVE-2022-46838, CVE-2022-46840, CVE-2022-46846, CVE-2022-47168, CVE-2022-47176, CVE-2022-47182, CVE-2022-47429, CVE-2022-47594, CVE-2022-47601, CVE-2023-22697, CVE-2023-22701, CVE-2023-22708, CVE-2023-23715, CVE-2023-23716, CVE-2023-23725, CVE-2023-23726, CVE-2023-23729, CVE-2023-23814, CVE-2023-23823, CVE-2023-23825, CVE-2023-23834, CVE-2023-23868, CVE-2023-23886, CVE-2023-23887, CVE-2023-23893, CVE-2023-23895, CVE-2023-23975, CVE-2023-23986, CVE-2023-23987, CVE-2023-23989, CVE-2023-24375, CVE-2023-24407, CVE-2023-25026, CVE-2023-25035, CVE-2023-25037, CVE-2023-25048, CVE-2023-25060, CVE-2023-25067, CVE-2023-25068, CVE-2023-25445, CVE-2023-25446, CVE-2023-25454, CVE-2023-25455, CVE-2023-25469, CVE-2023-25486, CVE-2023-25703, CVE-2023-25714, CVE-2023-25791, CVE-2023-25959, CVE-2023-25966, CVE-2023-25988, CVE-2023-25993, CVE-2023-25995, CVE-2023-25997, CVE-2023-25998, CVE-2023-25999, CVE-2023-26000, CVE-2023-26001, CVE-2023-26002, CVE-2023-26003, CVE-2023-26005, CVE-2023-26520, CVE-2023-26522, CVE-2023-27428, CVE-2023-27449, CVE-2023-27454, CVE-2023-27456, CVE-2023-27609, CVE-2023-27625, CVE-2023-27626, CVE-2023-28165, CVE-2023-28168, CVE-2023-28416, CVE-2023-28417, CVE-2023-28532, CVE-2023-28534, CVE-2023-28536, CVE-2023-28619, CVE-2023-28689, CVE-2023-28990, CVE-2023-29173, CVE-2023-29235, CVE-2023-29237, CVE-2023-29239, CVE-2023-29422, CVE-2023-29429, CVE-2023-29431, CVE-2023-29433, CVE-2023-30476, CVE-2023-30479, CVE-2023-30486, CVE-2023-30488, CVE-2023-30490, CVE-2023-30783, CVE-2023-30870, CVE-2023-30873, CVE-2023-30874, CVE-2023-31073, CVE-2023-31078, CVE-2023-31214, CVE-2023-32094, CVE-2023-32117, CVE-2023-32126, CVE-2023-32240, CVE-2023-32293, CVE-2023-32299, CVE-2023-32506, CVE-2023-32507, CVE-2023-32519, CVE-2023-32520, CVE-2023-32574, CVE-2023-32581, CVE-2023-32585, CVE-2023-32586, CVE-2023-32593, CVE-2023-32599, CVE-2023-32601, CVE-2023-32798, CVE-2023-32963, CVE-2023-33215, CVE-2023-33324, CVE-2023-33928, CVE-2023-33994, CVE-2023-33995, CVE-2023-33996, CVE-2023-33998, CVE-2023-34009, CVE-2023-34014, CVE-2023-34019, CVE-2023-34376, CVE-2023-34381, CVE-2023-34387, CVE-2023-35037, CVE-2023-35040, CVE-2023-35046, CVE-2023-35051, CVE-2023-35052, CVE-2023-35091, CVE-2023-35777, CVE-2023-35875, CVE-2023-36385, CVE-2023-36506, CVE-2023-36509, CVE-2023-36510, CVE-2023-36518, CVE-2023-36519, CVE-2023-36526, CVE-2023-36528, CVE-2023-36531, CVE-2023-36680, CVE-2023-36681, CVE-2023-37885, CVE-2023-37886, CVE-2023-37887, CVE-2023-37967, CVE-2023-37969, CVE-2023-37971, CVE-2023-37984, CVE-2023-37987, CVE-2023-37989, CVE-2023-38383, CVE-2023-38385, CVE-2023-38475, CVE-2023-38477, CVE-2023-38479, CVE-2023-38480, CVE-2023-38483, CVE-2023-38512, CVE-2023-38514, CVE-2023-39305, CVE-2023-39920, CVE-2023-39994, CVE-2023-39995, CVE-2023-39996, CVE-2023-39997, CVE-2023-40001, CVE-2023-40003, CVE-2023-40005, CVE-2023-40011, CVE-2023-40203, CVE-2023-40205, CVE-2023-40209, CVE-2023-40213, CVE-2023-40331, CVE-2023-40334, CVE-2023-40670, CVE-2023-40678, CVE-2023-41130, CVE-2023-41132, CVE-2023-41133, CVE-2023-41649, CVE-2023-41664, CVE-2023-41671, CVE-2023-41683, CVE-2023-41686, CVE-2023-41688, CVE-2023-41689, CVE-2023-41690, CVE-2023-41695, CVE-2023-41729, CVE-2023-41730, CVE-2023-41802, CVE-2023-41803, CVE-2023-41848, CVE-2023-41849, CVE-2023-41857, CVE-2023-41862, CVE-2023-41865, CVE-2023-41866, CVE-2023-41869, CVE-2023-41870, CVE-2023-41873, CVE-2023-41875, CVE-2023-41951, CVE-2023-41952, CVE-2023-44142, CVE-2023-44147, CVE-2023-44149, CVE-2023-44258, CVE-2023-44988, CVE-2023-45002, CVE-2023-45045, CVE-2023-45061, CVE-2023-45101, CVE-2023-45104, CVE-2023-45110, CVE-2023-45271, CVE-2023-45272, CVE-2023-45275, CVE-2023-45631, CVE-2023-45633, CVE-2023-45636, CVE-2023-45649, CVE-2023-45760, CVE-2023-45765, CVE-2023-45766, CVE-2023-45828, CVE-2023-46073, CVE-2023-46079, CVE-2023-46080, CVE-2023-46082, CVE-2023-46083, CVE-2023-46188, CVE-2023-46195, CVE-2023-46196, CVE-2023-46203, CVE-2023-46206, CVE-2023-46309, CVE-2023-46605, CVE-2023-46606, CVE-2023-46607, CVE-2023-46608, CVE-2023-46609, CVE-2023-46610, CVE-2023-46611, CVE-2023-46612, CVE-2023-46616, CVE-2023-46628, CVE-2023-46631, CVE-2023-46632, CVE-2023-46633, CVE-2023-46635, CVE-2023-46637, CVE-2023-46639, CVE-2023-46644, CVE-2023-47179, CVE-2023-47180, CVE-2023-47183, CVE-2023-47187, CVE-2023-47188, CVE-2023-47224, CVE-2023-47225, CVE-2023-47241, CVE-2023-47515, CVE-2023-47517, CVE-2023-47523, CVE-2023-47525, CVE-2023-47557, CVE-2023-47647, CVE-2023-47648, CVE-2023-47661, CVE-2023-47689, CVE-2023-47692, CVE-2023-47693, CVE-2023-47694, CVE-2023-47698, CVE-2023-47756, CVE-2023-47759, CVE-2023-47760, CVE-2023-47761, CVE-2023-47762, CVE-2023-47763, CVE-2023-47764, CVE-2023-47776, CVE-2023-47778, CVE-2023-47780, CVE-2023-47793, CVE-2023-47805, CVE-2023-47807, CVE-2023-47820, CVE-2023-47823, CVE-2023-47826, CVE-2023-47830, CVE-2023-47832, CVE-2023-47836, CVE-2023-47838, CVE-2023-47841, CVE-2023-47847, CVE-2023-47849, CVE-2023-47869, CVE-2023-47871, CVE-2023-48274, CVE-2023-48277, CVE-2023-48286, CVE-2023-48287, CVE-2023-48324, CVE-2023-48332, CVE-2023-48739, CVE-2023-48740, CVE-2023-48750, CVE-2023-48758, CVE-2023-48774, CVE-2023-48775, CVE-2023-48776, CVE-2023-48779, CVE-2023-49154, CVE-2023-49156, CVE-2023-49158, CVE-2023-49167, CVE-2023-49192, CVE-2023-49193, CVE-2023-49194, CVE-2023-49196, CVE-2023-49754, CVE-2023-49755, CVE-2023-49756, CVE-2023-49757, CVE-2023-49758, CVE-2023-49817, CVE-2023-49818, CVE-2023-49831, CVE-2023-49832, CVE-2023-49835, CVE-2023-49845, CVE-2023-49848, CVE-2023-49849, CVE-2023-49850, CVE-2023-49851, CVE-2023-49856, CVE-2023-49857, CVE-2023-49858, CVE-2023-49859, CVE-2023-49861, CVE-2023-50373, CVE-2023-50375, CVE-2023-50850, CVE-2023-50854, CVE-2023-50876, CVE-2023-50877, CVE-2023-50882, CVE-2023-50884, CVE-2023-50887, CVE-2023-50899, CVE-2023-50903, CVE-2023-50904, CVE-2023-50905, CVE-2023-51353, CVE-2023-51355, CVE-2023-51357, CVE-2023-51359, CVE-2023-51360, CVE-2023-51362, CVE-2023-51484, CVE-2023-51486, CVE-2023-52135, CVE-2023-52190, CVE-2024-10676, CVE-2024-11402, CVE-2024-1435, CVE-2024-22145, CVE-2024-22162, CVE-2024-22289, CVE-2024-22307, CVE-2024-23500, CVE-2024-23506, CVE-2024-23507, CVE-2024-24831, CVE-2024-24833, CVE-2024-24871, CVE-2024-24878, CVE-2024-25100, CVE-2024-25599, CVE-2024-25932, CVE-2024-27188, CVE-2024-27193, CVE-2024-27195, CVE-2024-27949, CVE-2024-27950, CVE-2024-27965, CVE-2024-27971, CVE-2024-27987, CVE-2024-27993, CVE-2024-27994, CVE-2024-27997, CVE-2024-27998, CVE-2024-28000, CVE-2024-29093, CVE-2024-29095, CVE-2024-29125, CVE-2024-29134, CVE-2024-29136, CVE-2024-29137, CVE-2024-29138, CVE-2024-29777, CVE-2024-29792, CVE-2024-29921, CVE-2024-29931, CVE-2024-2889, CVE-2024-30178, CVE-2024-30182, CVE-2024-30193, CVE-2024-30194, CVE-2024-30197, CVE-2024-30199, CVE-2024-30221, CVE-2024-30229, CVE-2024-30236, CVE-2024-30238, CVE-2024-30244, CVE-2024-30245, CVE-2024-30422, CVE-2024-30424, CVE-2024-30425, CVE-2024-30428, CVE-2024-30435, CVE-2024-30488, CVE-2024-30493, CVE-2024-30503, CVE-2024-30505, CVE-2024-30529, CVE-2024-30534, CVE-2024-31246, CVE-2024-31281, CVE-2024-31303, CVE-2024-31359, CVE-2024-31373, CVE-2024-31374, CVE-2024-31376, CVE-2024-31382, CVE-2024-31421, CVE-2024-31424, CVE-2024-31433, CVE-2024-31924, CVE-2024-31929, CVE-2024-31942, CVE-2024-32082, CVE-2024-32090, CVE-2024-32101, CVE-2024-32126, CVE-2024-32140, CVE-2024-32141, CVE-2024-32433, CVE-2024-32435, CVE-2024-32444, CVE-2024-32445, CVE-2024-32505, CVE-2024-32507, CVE-2024-32523, CVE-2024-32553, CVE-2024-32555, CVE-2024-32564, CVE-2024-32566, CVE-2024-32568, CVE-2024-32573, CVE-2024-32589, CVE-2024-32599, CVE-2024-32679, CVE-2024-32698, CVE-2024-32699, CVE-2024-32701, CVE-2024-32702, CVE-2024-32703, CVE-2024-32704, CVE-2024-32705, CVE-2024-32706, CVE-2024-32711, CVE-2024-32719, CVE-2024-32725, CVE-2024-32778, CVE-2024-32782, CVE-2024-32791, CVE-2024-32792, CVE-2024-32796, CVE-2024-32810, CVE-2024-32815, CVE-2024-32817, CVE-2024-32824, CVE-2024-32825, CVE-2024-32832, CVE-2024-32836, CVE-2024-32956, CVE-2024-32959, CVE-2024-32961, CVE-2024-33568, CVE-2024-33570, CVE-2024-33571, CVE-2024-33572, CVE-2024-33648, CVE-2024-33678, CVE-2024-33689, CVE-2024-33907, CVE-2024-33939, CVE-2024-34371, CVE-2024-34373, CVE-2024-34385, CVE-2024-34438, CVE-2024-34443, CVE-2024-34444, CVE-2024-34546, CVE-2024-34556, CVE-2024-34557, CVE-2024-34569, CVE-2024-34757, CVE-2024-34763, CVE-2024-34770, CVE-2024-34794, CVE-2024-34795, CVE-2024-34800, CVE-2024-34801, CVE-2024-34807, CVE-2024-34812, CVE-2024-34813, CVE-2024-34814, CVE-2024-34815, CVE-2024-34819, CVE-2024-34821, CVE-2024-34826, CVE-2024-34828, CVE-2024-35169, CVE-2024-35172, CVE-2024-35633, CVE-2024-35637, CVE-2024-35639, CVE-2024-35645, CVE-2024-35646, CVE-2024-35650, CVE-2024-35653, CVE-2024-35655, CVE-2024-35659, CVE-2024-35664, CVE-2024-35674, CVE-2024-35679, CVE-2024-35680, CVE-2024-35684, CVE-2024-35693, CVE-2024-35694, CVE-2024-35698, CVE-2024-35700, CVE-2024-35709, CVE-2024-35723, CVE-2024-35729, CVE-2024-35732, CVE-2024-35739, CVE-2024-35759, CVE-2024-35760, CVE-2024-35764, CVE-2024-35768, CVE-2024-35769, CVE-2024-37093, CVE-2024-37102, CVE-2024-37103, CVE-2024-37104, CVE-2024-37114, CVE-2024-37202, CVE-2024-37213, CVE-2024-37228, CVE-2024-37235, CVE-2024-37236, CVE-2024-37237, CVE-2024-37238, CVE-2024-37239, CVE-2024-37240, CVE-2024-37241, CVE-2024-37242, CVE-2024-37243, CVE-2024-37255, CVE-2024-37259, CVE-2024-37261, CVE-2024-37270, CVE-2024-37271, CVE-2024-37272, CVE-2024-37274, CVE-2024-37275, CVE-2024-37409, CVE-2024-37410, CVE-2024-37411, CVE-2024-37412, CVE-2024-37413, CVE-2024-37415, CVE-2024-37417, CVE-2024-37421, CVE-2024-37422, CVE-2024-37426, CVE-2024-37429, CVE-2024-37430, CVE-2024-37431, CVE-2024-37433, CVE-2024-37434, CVE-2024-37435, CVE-2024-37437, CVE-2024-37438, CVE-2024-37440, CVE-2024-37441, CVE-2024-37444, CVE-2024-37448, CVE-2024-37449, CVE-2024-37450, CVE-2024-37451, CVE-2024-37452, CVE-2024-37458, CVE-2024-37467, CVE-2024-37472, CVE-2024-37473, CVE-2024-37478, CVE-2024-37481, CVE-2024-37482, CVE-2024-37483, CVE-2024-37488, CVE-2024-37490, CVE-2024-37491, CVE-2024-37493, CVE-2024-37495, CVE-2024-37497, CVE-2024-37502, CVE-2024-37503, CVE-2024-37508, CVE-2024-37511, CVE-2024-37518, CVE-2024-37519, CVE-2024-37520, CVE-2024-37540, CVE-2024-37541, CVE-2024-37543, CVE-2024-37544, CVE-2024-37554, CVE-2024-37555, CVE-2024-37560, CVE-2024-37918, CVE-2024-37922, CVE-2024-37923, CVE-2024-37925, CVE-2024-37929, CVE-2024-37930, CVE-2024-37931, CVE-2024-37937, CVE-2024-37943, CVE-2024-37945, CVE-2024-37946, CVE-2024-37962, CVE-2024-38687, CVE-2024-38691, CVE-2024-38706, CVE-2024-38708, CVE-2024-38712, CVE-2024-38714, CVE-2024-38729, CVE-2024-38731, CVE-2024-38732, CVE-2024-38735, CVE-2024-38751, CVE-2024-38753, CVE-2024-38754, CVE-2024-38762, CVE-2024-38763, CVE-2024-38764, CVE-2024-38765, CVE-2024-38766, CVE-2024-38771, CVE-2024-38778, CVE-2024-38787, CVE-2024-38789, CVE-2024-38790, CVE-2024-38795, CVE-2024-39619, CVE-2024-39620, CVE-2024-39621, CVE-2024-39622, CVE-2024-39623, CVE-2024-39624, CVE-2024-39626, CVE-2024-39631, CVE-2024-39637, CVE-2024-39646, CVE-2024-39647, CVE-2024-39649, CVE-2024-39654, CVE-2024-39663, CVE-2024-43117, CVE-2024-43118, CVE-2024-43136, CVE-2024-43153, CVE-2024-43158, CVE-2024-43159, CVE-2024-43208, CVE-2024-43214, CVE-2024-43216, CVE-2024-43218, CVE-2024-43222, CVE-2024-43228, CVE-2024-43229, CVE-2024-43230, CVE-2024-43237, CVE-2024-43238, CVE-2024-43239, CVE-2024-43240, CVE-2024-43241, CVE-2024-43243, CVE-2024-43252, CVE-2024-43253, CVE-2024-43254, CVE-2024-43255, CVE-2024-43259, CVE-2024-43264, CVE-2024-43266, CVE-2024-43283, CVE-2024-43290, CVE-2024-43299, CVE-2024-43300, CVE-2024-43306, CVE-2024-43313, CVE-2024-43318, CVE-2024-43333, CVE-2024-43334, CVE-2024-43336, CVE-2024-43338, CVE-2024-43349, CVE-2024-43353, CVE-2024-43927, CVE-2024-43932, CVE-2024-43933, CVE-2024-43938, CVE-2024-43944, CVE-2024-43953, CVE-2024-43954, CVE-2024-43955, CVE-2024-43956, CVE-2024-43959, CVE-2024-43971, CVE-2024-43973, CVE-2024-43975, CVE-2024-43976, CVE-2024-43977, CVE-2024-43978, CVE-2024-43989, CVE-2024-44000, CVE-2024-44001, CVE-2024-44002, CVE-2024-44003, CVE-2024-44004, CVE-2024-44005, CVE-2024-44006, CVE-2024-44007, CVE-2024-44008, CVE-2024-44009, CVE-2024-44010, CVE-2024-44011, CVE-2024-44012, CVE-2024-44013, CVE-2024-44014, CVE-2024-44015, CVE-2024-44016, CVE-2024-44017, CVE-2024-44018, CVE-2024-44019, CVE-2024-44020, CVE-2024-44021, CVE-2024-44022, CVE-2024-44023, CVE-2024-44024, CVE-2024-44025, CVE-2024-44026, CVE-2024-44027, CVE-2024-44028, CVE-2024-44029, CVE-2024-44030, CVE-2024-44031, CVE-2024-44032, CVE-2024-44033, CVE-2024-44034, CVE-2024-44035, CVE-2024-44036, CVE-2024-44037, CVE-2024-44038, CVE-2024-44039, CVE-2024-44040, CVE-2024-44041, CVE-2024-44042, CVE-2024-44043, CVE-2024-44044, CVE-2024-44045, CVE-2024-44046, CVE-2024-44047, CVE-2024-44048, CVE-2024-44049, CVE-2024-44050, CVE-2024-44051, CVE-2024-44052, CVE-2024-44055, CVE-2024-44059, CVE-2024-44061, CVE-2024-44064, CVE-2024-45451, CVE-2024-45452, CVE-2024-45453, CVE-2024-45454, CVE-2024-45455, CVE-2024-45456, CVE-2024-45457, CVE-2024-45458, CVE-2024-45459, CVE-2024-45460, CVE-2024-47297, CVE-2024-47298, CVE-2024-47299, CVE-2024-47300, CVE-2024-47301, CVE-2024-47302, CVE-2024-47303, CVE-2024-47304, CVE-2024-47305, CVE-2024-47306, CVE-2024-47307, CVE-2024-47308, CVE-2024-47309, CVE-2024-47310, CVE-2024-47311, CVE-2024-47312, CVE-2024-47313, CVE-2024-47314, CVE-2024-47315, CVE-2024-47316, CVE-2024-47317, CVE-2024-47318, CVE-2024-47319, CVE-2024-47320, CVE-2024-47321, CVE-2024-47322, CVE-2024-47323, CVE-2024-47324, CVE-2024-47325, CVE-2024-47326, CVE-2024-47327, CVE-2024-47328, CVE-2024-47329, CVE-2024-47331, CVE-2024-47332, CVE-2024-47333, CVE-2024-47334, CVE-2024-47335, CVE-2024-47336, CVE-2024-47337, CVE-2024-47338, CVE-2024-47339, CVE-2024-47340, CVE-2024-47341, CVE-2024-47342, CVE-2024-47343, CVE-2024-47344, CVE-2024-47345, CVE-2024-47346, CVE-2024-47347, CVE-2024-47348, CVE-2024-47349, CVE-2024-47350, CVE-2024-47351, CVE-2024-47352, CVE-2024-47353, CVE-2024-47354, CVE-2024-47355, CVE-2024-47356, CVE-2024-47357, CVE-2024-47358, CVE-2024-47359, CVE-2024-47360, CVE-2024-47361, CVE-2024-47362, CVE-2024-47363, CVE-2024-47364, CVE-2024-47365, CVE-2024-47366, CVE-2024-47367, CVE-2024-47368, CVE-2024-47369, CVE-2024-47370, CVE-2024-47371, CVE-2024-47372, CVE-2024-47373, CVE-2024-47374, CVE-2024-47375, CVE-2024-47376, CVE-2024-47377, CVE-2024-47378, CVE-2024-47379, CVE-2024-47380, CVE-2024-47381, CVE-2024-47382, CVE-2024-47383, CVE-2024-47384, CVE-2024-47385, CVE-2024-47386, CVE-2024-47387, CVE-2024-47388, CVE-2024-47389, CVE-2024-47390, CVE-2024-47391, CVE-2024-47392, CVE-2024-47393, CVE-2024-47394, CVE-2024-47395, CVE-2024-47396, CVE-2024-47621, CVE-2024-47622, CVE-2024-47623, CVE-2024-47624, CVE-2024-47625, CVE-2024-47626, CVE-2024-47627, CVE-2024-47628, CVE-2024-47629, CVE-2024-47630, CVE-2024-47631, CVE-2024-47632, CVE-2024-47633, CVE-2024-47634, CVE-2024-47635, CVE-2024-47636, CVE-2024-47637, CVE-2024-47638, CVE-2024-47639, CVE-2024-47640, CVE-2024-47641, CVE-2024-47642, CVE-2024-47643, CVE-2024-47644, CVE-2024-47645, CVE-2024-47646, CVE-2024-47647, CVE-2024-47648, CVE-2024-47649, CVE-2024-47650, CVE-2024-48020, CVE-2024-48021, CVE-2024-48022, CVE-2024-48023, CVE-2024-48024, CVE-2024-48025, CVE-2024-48026, CVE-2024-48027, CVE-2024-48028, CVE-2024-48029, CVE-2024-48030, CVE-2024-48031, CVE-2024-48032, CVE-2024-48033, CVE-2024-48034, CVE-2024-48035, CVE-2024-48036, CVE-2024-48037, CVE-2024-48038, CVE-2024-48039, CVE-2024-48040, CVE-2024-48041, CVE-2024-48042, CVE-2024-48043, CVE-2024-48044, CVE-2024-48045, CVE-2024-48046, CVE-2024-48047, CVE-2024-48048, CVE-2024-48049, CVE-2024-49222, CVE-2024-49225, CVE-2024-49228, CVE-2024-49229, CVE-2024-49231, CVE-2024-49232, CVE-2024-49233, CVE-2024-49234, CVE-2024-49236, CVE-2024-49237, CVE-2024-49241, CVE-2024-49243, CVE-2024-49249, CVE-2024-49250, CVE-2024-49251, CVE-2024-49252, CVE-2024-49254, CVE-2024-49255, CVE-2024-49256, CVE-2024-49257, CVE-2024-49258, CVE-2024-49259, CVE-2024-49260, CVE-2024-49261, CVE-2024-49262, CVE-2024-49263, CVE-2024-49264, CVE-2024-49265, CVE-2024-49266, CVE-2024-49267, CVE-2024-49268, CVE-2024-49270, CVE-2024-49271, CVE-2024-49272, CVE-2024-49273, CVE-2024-49274, CVE-2024-49275, CVE-2024-49276, CVE-2024-49277, CVE-2024-49278, CVE-2024-49279, CVE-2024-49280, CVE-2024-49281, CVE-2024-49282, CVE-2024-49283, CVE-2024-49284, CVE-2024-49285, CVE-2024-49286, CVE-2024-49287, CVE-2024-49288, CVE-2024-49289, CVE-2024-49290, CVE-2024-49291, CVE-2024-49292, CVE-2024-49293, CVE-2024-49294, CVE-2024-49295, CVE-2024-49296, CVE-2024-49297, CVE-2024-49298, CVE-2024-49299, CVE-2024-49300, CVE-2024-49301, CVE-2024-49302, CVE-2024-49303, CVE-2024-49304, CVE-2024-49305, CVE-2024-49306, CVE-2024-49307, CVE-2024-49308, CVE-2024-49309, CVE-2024-49310, CVE-2024-49311, CVE-2024-49312, CVE-2024-49313, CVE-2024-49316, CVE-2024-49318, CVE-2024-49319, CVE-2024-49320, CVE-2024-49323, CVE-2024-49324, CVE-2024-49325, CVE-2024-49326, CVE-2024-49327, CVE-2024-49328, CVE-2024-49329, CVE-2024-49330, CVE-2024-49331, CVE-2024-49332, CVE-2024-49333, CVE-2024-49334, CVE-2024-49335, CVE-2024-49604, CVE-2024-49605, CVE-2024-49606, CVE-2024-49607, CVE-2024-49608, CVE-2024-49609, CVE-2024-49610, CVE-2024-49611, CVE-2024-49612, CVE-2024-49613, CVE-2024-49614, CVE-2024-49615, CVE-2024-49616, CVE-2024-49617, CVE-2024-49618, CVE-2024-49619, CVE-2024-49620, CVE-2024-49621, CVE-2024-49622, CVE-2024-49623, CVE-2024-49624, CVE-2024-49627, CVE-2024-49628, CVE-2024-49629, CVE-2024-49630, CVE-2024-49631, CVE-2024-49632, CVE-2024-49633, CVE-2024-49634, CVE-2024-49635, CVE-2024-49636, CVE-2024-49637, CVE-2024-49638, CVE-2024-49639, CVE-2024-49640, CVE-2024-49641, CVE-2024-49642, CVE-2024-49643, CVE-2024-49644, CVE-2024-49645, CVE-2024-49646, CVE-2024-49647, CVE-2024-49648, CVE-2024-49649, CVE-2024-49650, CVE-2024-49651, CVE-2024-49652, CVE-2024-49653, CVE-2024-49654, CVE-2024-49655, CVE-2024-49656, CVE-2024-49657, CVE-2024-49658, CVE-2024-49659, CVE-2024-49660, CVE-2024-49661, CVE-2024-49662, CVE-2024-49663, CVE-2024-49664, CVE-2024-49665, CVE-2024-49666, CVE-2024-49667, CVE-2024-49668, CVE-2024-49669, CVE-2024-49670, CVE-2024-49671, CVE-2024-49672, CVE-2024-49673, CVE-2024-49674, CVE-2024-49675, CVE-2024-49676, CVE-2024-49677, CVE-2024-49678, CVE-2024-49679, CVE-2024-49680, CVE-2024-49681, CVE-2024-49682, CVE-2024-49683, CVE-2024-49684, CVE-2024-49685, CVE-2024-49686, CVE-2024-49687, CVE-2024-49688, CVE-2024-49689, CVE-2024-49690, CVE-2024-49691, CVE-2024-49692, CVE-2024-49693, CVE-2024-49694, CVE-2024-49695, CVE-2024-49696, CVE-2024-49697, CVE-2024-49698, CVE-2024-49699, CVE-2024-49700, CVE-2024-49701, CVE-2024-49702, CVE-2024-49703, CVE-2024-4689, CVE-2024-4746, CVE-2024-50407, CVE-2024-50408, CVE-2024-50409, CVE-2024-50410, CVE-2024-50411, CVE-2024-50412, CVE-2024-50413, CVE-2024-50414, CVE-2024-50415, CVE-2024-50416, CVE-2024-50417, CVE-2024-50418, CVE-2024-50419, CVE-2024-50420, CVE-2024-50421, CVE-2024-50422, CVE-2024-50423, CVE-2024-50424, CVE-2024-50425, CVE-2024-50426, CVE-2024-50427, CVE-2024-50428, CVE-2024-50429, CVE-2024-50430, CVE-2024-50431, CVE-2024-50432, CVE-2024-50433, CVE-2024-50434, CVE-2024-50435, CVE-2024-50436, CVE-2024-50437, CVE-2024-50438, CVE-2024-50439, CVE-2024-50440, CVE-2024-50441, CVE-2024-50442, CVE-2024-50445, CVE-2024-50446, CVE-2024-50447, CVE-2024-50448, CVE-2024-50449, CVE-2024-50450, CVE-2024-50451, CVE-2024-50453, CVE-2024-50454, CVE-2024-50455, CVE-2024-50456, CVE-2024-50457, CVE-2024-50458, CVE-2024-50459, CVE-2024-50460, CVE-2024-50461, CVE-2024-50462, CVE-2024-50463, CVE-2024-50464, CVE-2024-50465, CVE-2024-50467, CVE-2024-50468, CVE-2024-50469, CVE-2024-50470, CVE-2024-50471, CVE-2024-50472, CVE-2024-50473, CVE-2024-50475, CVE-2024-50476, CVE-2024-50477, CVE-2024-50478, CVE-2024-50479, CVE-2024-50480, CVE-2024-50481, CVE-2024-50482, CVE-2024-50483, CVE-2024-50484, CVE-2024-50485, CVE-2024-50486, CVE-2024-50487, CVE-2024-50488, CVE-2024-50489, CVE-2024-50490, CVE-2024-50491, CVE-2024-50492, CVE-2024-50493, CVE-2024-50494, CVE-2024-50495, CVE-2024-50496, CVE-2024-50497, CVE-2024-50498, CVE-2024-50500, CVE-2024-50501, CVE-2024-50502, CVE-2024-50503, CVE-2024-50504, CVE-2024-50506, CVE-2024-50507, CVE-2024-50508, CVE-2024-50509, CVE-2024-50510, CVE-2024-50511, CVE-2024-50512, CVE-2024-50513, CVE-2024-50514, CVE-2024-50515, CVE-2024-50516, CVE-2024-50517, CVE-2024-50518, CVE-2024-50519, CVE-2024-50520, CVE-2024-50521, CVE-2024-50522, CVE-2024-50523, CVE-2024-50524, CVE-2024-50525, CVE-2024-50526, CVE-2024-50527, CVE-2024-50528, CVE-2024-50529, CVE-2024-50530, CVE-2024-50531, CVE-2024-50532, CVE-2024-50533, CVE-2024-50534, CVE-2024-50535, CVE-2024-50536, CVE-2024-50537, CVE-2024-50538, CVE-2024-50539, CVE-2024-50540, CVE-2024-50541, CVE-2024-50542, CVE-2024-50543, CVE-2024-50544, CVE-2024-50545, CVE-2024-50546, CVE-2024-50547, CVE-2024-50548, CVE-2024-50549, CVE-2024-50550, CVE-2024-50551, CVE-2024-50552, CVE-2024-50553, CVE-2024-50554, CVE-2024-50556, CVE-2024-51570, CVE-2024-51571, CVE-2024-51572, CVE-2024-51573, CVE-2024-51574, CVE-2024-51575, CVE-2024-51576, CVE-2024-51577, CVE-2024-51578, CVE-2024-51579, CVE-2024-51580, CVE-2024-51581, CVE-2024-51582, CVE-2024-51583, CVE-2024-51584, CVE-2024-51585, CVE-2024-51586, CVE-2024-51587, CVE-2024-51588, CVE-2024-51589, CVE-2024-51590, CVE-2024-51591, CVE-2024-51592, CVE-2024-51593, CVE-2024-51594, CVE-2024-51595, CVE-2024-51596, CVE-2024-51597, CVE-2024-51598, CVE-2024-51599, CVE-2024-51601, CVE-2024-51602, CVE-2024-51603, CVE-2024-51604, CVE-2024-51605, CVE-2024-51606, CVE-2024-51607, CVE-2024-51608, CVE-2024-51609, CVE-2024-51610, CVE-2024-51611, CVE-2024-51612, CVE-2024-51613, CVE-2024-51614, CVE-2024-51615, CVE-2024-51616, CVE-2024-51617, CVE-2024-51618, CVE-2024-51619, CVE-2024-51620, CVE-2024-51621, CVE-2024-51622, CVE-2024-51623, CVE-2024-51624, CVE-2024-51625, CVE-2024-51626, CVE-2024-51627, CVE-2024-51628, CVE-2024-51629, CVE-2024-51630, CVE-2024-51631, CVE-2024-51632, CVE-2024-51633, CVE-2024-51634, CVE-2024-51635, CVE-2024-51636, CVE-2024-51637, CVE-2024-51638, CVE-2024-51639, CVE-2024-51640, CVE-2024-51641, CVE-2024-51642, CVE-2024-51643, CVE-2024-51644, CVE-2024-51645, CVE-2024-51648, CVE-2024-51649, CVE-2024-51650, CVE-2024-51651, CVE-2024-51652, CVE-2024-51653, CVE-2024-51654, CVE-2024-51655, CVE-2024-51656, CVE-2024-51657, CVE-2024-51658, CVE-2024-51659, CVE-2024-51660, CVE-2024-51661, CVE-2024-51662, CVE-2024-51663, CVE-2024-51664, CVE-2024-51665, CVE-2024-51666, CVE-2024-51667, CVE-2024-51668, CVE-2024-51669, CVE-2024-51670, CVE-2024-51671, CVE-2024-51672, CVE-2024-51673, CVE-2024-51674, CVE-2024-51675, CVE-2024-51676, CVE-2024-51677, CVE-2024-51678, CVE-2024-51679, CVE-2024-51680, CVE-2024-51681, CVE-2024-51682, CVE-2024-51683, CVE-2024-51684, CVE-2024-51685, CVE-2024-51686, CVE-2024-51687, CVE-2024-51688, CVE-2024-51689, CVE-2024-51690, CVE-2024-51691, CVE-2024-51692, CVE-2024-51693, CVE-2024-51694, CVE-2024-51695, CVE-2024-51696, CVE-2024-51697, CVE-2024-51698, CVE-2024-51699, CVE-2024-51700, CVE-2024-51701, CVE-2024-51702, CVE-2024-51703, CVE-2024-51704, CVE-2024-51705, CVE-2024-51706, CVE-2024-51707, CVE-2024-51708, CVE-2024-51709, CVE-2024-51710, CVE-2024-51711, CVE-2024-51712, CVE-2024-51713, CVE-2024-51714, CVE-2024-51715, CVE-2024-51716, CVE-2024-51717, CVE-2024-51718, CVE-2024-51719, CVE-2024-51759, CVE-2024-51760, CVE-2024-51761, CVE-2024-51762, CVE-2024-51763, CVE-2024-51776, CVE-2024-51778, CVE-2024-51779, CVE-2024-51780, CVE-2024-51781, CVE-2024-51782, CVE-2024-51783, CVE-2024-51784, CVE-2024-51785, CVE-2024-51786, CVE-2024-51787, CVE-2024-51788, CVE-2024-51789, CVE-2024-51790, CVE-2024-51791, CVE-2024-51792, CVE-2024-51793, CVE-2024-51794, CVE-2024-51795, CVE-2024-51796, CVE-2024-51797, CVE-2024-51798, CVE-2024-51799, CVE-2024-51800, CVE-2024-51801, CVE-2024-51802, CVE-2024-51803, CVE-2024-51804, CVE-2024-51805, CVE-2024-51806, CVE-2024-51807, CVE-2024-51808, CVE-2024-51809, CVE-2024-51810, CVE-2024-51811, CVE-2024-51812, CVE-2024-51813, CVE-2024-51814, CVE-2024-51815, CVE-2024-51816, CVE-2024-51817, CVE-2024-51818, CVE-2024-51819, CVE-2024-51820, CVE-2024-51821, CVE-2024-51822, CVE-2024-51823, CVE-2024-51824, CVE-2024-51825, CVE-2024-51826, CVE-2024-51827, CVE-2024-51828, CVE-2024-51829, CVE-2024-51830, CVE-2024-51831, CVE-2024-51832, CVE-2024-51833, CVE-2024-51834, CVE-2024-51835, CVE-2024-51836, CVE-2024-51837, CVE-2024-51838, CVE-2024-51839, CVE-2024-51840, CVE-2024-51841, CVE-2024-51842, CVE-2024-51843, CVE-2024-51844, CVE-2024-51845, CVE-2024-51846, CVE-2024-51847, CVE-2024-51848, CVE-2024-51849, CVE-2024-51850, CVE-2024-51851, CVE-2024-51852, CVE-2024-51853, CVE-2024-51854, CVE-2024-51855, CVE-2024-51856, CVE-2024-51857, CVE-2024-51858, CVE-2024-51859, CVE-2024-51860, CVE-2024-51861, CVE-2024-51862, CVE-2024-51863, CVE-2024-51864, CVE-2024-51865, CVE-2024-51866, CVE-2024-51867, CVE-2024-51868, CVE-2024-51869, CVE-2024-51870, CVE-2024-51871, CVE-2024-51872, CVE-2024-51873, CVE-2024-51874, CVE-2024-51875, CVE-2024-51876, CVE-2024-51877, CVE-2024-51878, CVE-2024-51879, CVE-2024-51880, CVE-2024-51881, CVE-2024-51882, CVE-2024-51883, CVE-2024-51884, CVE-2024-51885, CVE-2024-51886, CVE-2024-51887, CVE-2024-51888, CVE-2024-51889, CVE-2024-51890, CVE-2024-51891, CVE-2024-51892, CVE-2024-51893, CVE-2024-51894, CVE-2024-51895, CVE-2024-51896, CVE-2024-51897, CVE-2024-51898, CVE-2024-51899, CVE-2024-51900, CVE-2024-51901, CVE-2024-51902, CVE-2024-51903, CVE-2024-51904, CVE-2024-51905, CVE-2024-51906, CVE-2024-51907, CVE-2024-51908, CVE-2024-51909, CVE-2024-51910, CVE-2024-51911, CVE-2024-51912, CVE-2024-51913, CVE-2024-51914, CVE-2024-51916, CVE-2024-51917, CVE-2024-51918, CVE-2024-51919, CVE-2024-51920, CVE-2024-51921, CVE-2024-51922, CVE-2024-51923, CVE-2024-51924, CVE-2024-51925, CVE-2024-51926, CVE-2024-51927, CVE-2024-51928, CVE-2024-51929, CVE-2024-51930, CVE-2024-51931, CVE-2024-51932, CVE-2024-51933, CVE-2024-51934, CVE-2024-51935, CVE-2024-51936, CVE-2024-51937, CVE-2024-51938, CVE-2024-51939, CVE-2024-51940, CVE-2024-52339, CVE-2024-52340, CVE-2024-52341, CVE-2024-52342, CVE-2024-52343, CVE-2024-52344, CVE-2024-52345, CVE-2024-52346, CVE-2024-52347, CVE-2024-52348, CVE-2024-52349, CVE-2024-52350, CVE-2024-52351, CVE-2024-52352, CVE-2024-52353, CVE-2024-52354, CVE-2024-52355, CVE-2024-52356, CVE-2024-52357, CVE-2024-52358, CVE-2024-52369, CVE-2024-52370, CVE-2024-52371, CVE-2024-52372, CVE-2024-52373, CVE-2024-52374, CVE-2024-52375, CVE-2024-52376, CVE-2024-52377, CVE-2024-52378, CVE-2024-52379, CVE-2024-52380, CVE-2024-52381, CVE-2024-52382, CVE-2024-52383, CVE-2024-52384, CVE-2024-52385, CVE-2024-52386, CVE-2024-52388, CVE-2024-52389, CVE-2024-52390, CVE-2024-52391, CVE-2024-52392, CVE-2024-52393, CVE-2024-52394, CVE-2024-52395, CVE-2024-52396, CVE-2024-52397, CVE-2024-52398, CVE-2024-52399, CVE-2024-52400, CVE-2024-52401, CVE-2024-52402, CVE-2024-52403, CVE-2024-52404, CVE-2024-52405, CVE-2024-52406, CVE-2024-52407, CVE-2024-52408, CVE-2024-52409, CVE-2024-52410, CVE-2024-52411, CVE-2024-52412, CVE-2024-52413, CVE-2024-52414, CVE-2024-52415, CVE-2024-52416, CVE-2024-52417, CVE-2024-52418, CVE-2024-52419, CVE-2024-52420, CVE-2024-52421, CVE-2024-52422, CVE-2024-52423, CVE-2024-52424, CVE-2024-52425, CVE-2024-52426, CVE-2024-52427, CVE-2024-52428, CVE-2024-52429, CVE-2024-52430, CVE-2024-52431, CVE-2024-52432, CVE-2024-52433, CVE-2024-52434, CVE-2024-52435, CVE-2024-52436, CVE-2024-52437, CVE-2024-52438, CVE-2024-52439, CVE-2024-52440, CVE-2024-52441, CVE-2024-52442, CVE-2024-52443, CVE-2024-52444, CVE-2024-52445, CVE-2024-52446, CVE-2024-52447, CVE-2024-52448, CVE-2024-52449, CVE-2024-52450, CVE-2024-52451, CVE-2024-52452, CVE-2024-52453, CVE-2024-52454, CVE-2024-52455, CVE-2024-52456, CVE-2024-52457, CVE-2024-52458, CVE-2024-52459, CVE-2024-52460, CVE-2024-52461, CVE-2024-52462, CVE-2024-52463, CVE-2024-52464, CVE-2024-52465, CVE-2024-52466, CVE-2024-52467, CVE-2024-52468, CVE-2024-52469, CVE-2024-52470, CVE-2024-52471, CVE-2024-52472, CVE-2024-52473, CVE-2024-52474, CVE-2024-52475, CVE-2024-52476, CVE-2024-52477, CVE-2024-52478, CVE-2024-52479, CVE-2024-52482, CVE-2024-52483, CVE-2024-52484, CVE-2024-52485, CVE-2024-52486, CVE-2024-52487, CVE-2024-52489, CVE-2024-52490, CVE-2024-52491, CVE-2024-52492, CVE-2024-52493, CVE-2024-52494, CVE-2024-52495, CVE-2024-52496, CVE-2024-52497, CVE-2024-52498, CVE-2024-52499, CVE-2024-52500, CVE-2024-52501, CVE-2024-52502, CVE-2024-52503, CVE-2024-53707, CVE-2024-53708, CVE-2024-53709, CVE-2024-53710, CVE-2024-53711, CVE-2024-53712, CVE-2024-53713, CVE-2024-53714, CVE-2024-53715, CVE-2024-53716, CVE-2024-53717, CVE-2024-53718, CVE-2024-53719, CVE-2024-53720, CVE-2024-53721, CVE-2024-53722, CVE-2024-53723, CVE-2024-53724, CVE-2024-53725, CVE-2024-53726, CVE-2024-53727, CVE-2024-53728, CVE-2024-53729, CVE-2024-53730, CVE-2024-53731, CVE-2024-53732, CVE-2024-53733, CVE-2024-53734, CVE-2024-53735, CVE-2024-53736, CVE-2024-53737, CVE-2024-53738, CVE-2024-53739, CVE-2024-53740, CVE-2024-53741, CVE-2024-53742, CVE-2024-53743, CVE-2024-53744, CVE-2024-53745, CVE-2024-53746, CVE-2024-53747, CVE-2024-53748, CVE-2024-53749, CVE-2024-53750, CVE-2024-53751, CVE-2024-53752, CVE-2024-53753, CVE-2024-53754, CVE-2024-53755, CVE-2024-53756, CVE-2024-53757, CVE-2024-53758, CVE-2024-53759, CVE-2024-53760, CVE-2024-53761, CVE-2024-53762, CVE-2024-53763, CVE-2024-53764, CVE-2024-53765, CVE-2024-53766, CVE-2024-53767, CVE-2024-53768, CVE-2024-53769, CVE-2024-53770, CVE-2024-53771, CVE-2024-53772, CVE-2024-53773, CVE-2024-53774, CVE-2024-53775, CVE-2024-53776, CVE-2024-53777, CVE-2024-53778, CVE-2024-53779, CVE-2024-53780, CVE-2024-53781, CVE-2024-53782, CVE-2024-53783, CVE-2024-53784, CVE-2024-53785, CVE-2024-53786, CVE-2024-53787, CVE-2024-53788, CVE-2024-53789, CVE-2024-53790, CVE-2024-53791, CVE-2024-53792, CVE-2024-53793, CVE-2024-53794, CVE-2024-53795, CVE-2024-53796, CVE-2024-53797, CVE-2024-53798, CVE-2024-53799, CVE-2024-53801, CVE-2024-53802, CVE-2024-53803, CVE-2024-53805, CVE-2024-53806, CVE-2024-53807, CVE-2024-53808, CVE-2024-53809, CVE-2024-53810, CVE-2024-53811, CVE-2024-53812, CVE-2024-53813, CVE-2024-53814, CVE-2024-53815, CVE-2024-53816, CVE-2024-53817, CVE-2024-53818, CVE-2024-53819, CVE-2024-53820, CVE-2024-53821, CVE-2024-53822, CVE-2024-53823, CVE-2024-53824, CVE-2024-53825, CVE-2024-53826, CVE-2024-54205, CVE-2024-54206, CVE-2024-54207, CVE-2024-54208, CVE-2024-54209, CVE-2024-54210, CVE-2024-54211, CVE-2024-54212, CVE-2024-54213, CVE-2024-54214, CVE-2024-54215, CVE-2024-54216, CVE-2024-54217, CVE-2024-54218, CVE-2024-54219, CVE-2024-54220, CVE-2024-54221, CVE-2024-54223, CVE-2024-54224, CVE-2024-54225, CVE-2024-54226, CVE-2024-54227, CVE-2024-54228, CVE-2024-54229, CVE-2024-54230, CVE-2024-54231, CVE-2024-54232, CVE-2024-54233, CVE-2024-54234, CVE-2024-54235, CVE-2024-54236, CVE-2024-54237, CVE-2024-54238, CVE-2024-54239, CVE-2024-54240, CVE-2024-54241, CVE-2024-54242, CVE-2024-54243, CVE-2024-54244, CVE-2024-54245, CVE-2024-54246, CVE-2024-54247, CVE-2024-54248, CVE-2024-54249, CVE-2024-54250, CVE-2024-54251, CVE-2024-54252, CVE-2024-54253, CVE-2024-54254, CVE-2024-54255, CVE-2024-54256, CVE-2024-54257, CVE-2024-54258, CVE-2024-54259, CVE-2024-54260, CVE-2024-54261, CVE-2024-54262, CVE-2024-54264, CVE-2024-54265, CVE-2024-54266, CVE-2024-54267, CVE-2024-54268, CVE-2024-54269, CVE-2024-54270, CVE-2024-54271, CVE-2024-54272, CVE-2024-54273, CVE-2024-54274, CVE-2024-54275, CVE-2024-54276, CVE-2024-54277, CVE-2024-54278, CVE-2024-54280, CVE-2024-54282, CVE-2024-54283, CVE-2024-54284, CVE-2024-54285, CVE-2024-54286, CVE-2024-54287, CVE-2024-54288, CVE-2024-54289, CVE-2024-54290, CVE-2024-54291, CVE-2024-54292, CVE-2024-54293, CVE-2024-54294, CVE-2024-54295, CVE-2024-54296, CVE-2024-54297, CVE-2024-54298, CVE-2024-54299, CVE-2024-54300, CVE-2024-54301, CVE-2024-54302, CVE-2024-54303, CVE-2024-54304, CVE-2024-54305, CVE-2024-54306, CVE-2024-54307, CVE-2024-54308, CVE-2024-54309, CVE-2024-54310, CVE-2024-54311, CVE-2024-54312, CVE-2024-54313, CVE-2024-54314, CVE-2024-54315, CVE-2024-54316, CVE-2024-54317, CVE-2024-54318, CVE-2024-54319, CVE-2024-54320, CVE-2024-54321, CVE-2024-54322, CVE-2024-54323, CVE-2024-54324, CVE-2024-54325, CVE-2024-54326, CVE-2024-54327, CVE-2024-54328, CVE-2024-54329, CVE-2024-54330, CVE-2024-54331, CVE-2024-54332, CVE-2024-54333, CVE-2024-54334, CVE-2024-54335, CVE-2024-54336, CVE-2024-54337, CVE-2024-54338, CVE-2024-54339, CVE-2024-54340, CVE-2024-54341, CVE-2024-54342, CVE-2024-54343, CVE-2024-54344, CVE-2024-54345, CVE-2024-54346, CVE-2024-54347, CVE-2024-54348, CVE-2024-54349, CVE-2024-54350, CVE-2024-54351, CVE-2024-54352, CVE-2024-54353, CVE-2024-54354, CVE-2024-54355, CVE-2024-54356, CVE-2024-54357, CVE-2024-54358, CVE-2024-54359, CVE-2024-54360, CVE-2024-54361, CVE-2024-54362, CVE-2024-54363, CVE-2024-54364, CVE-2024-54365, CVE-2024-54366, CVE-2024-54367, CVE-2024-54368, CVE-2024-54369, CVE-2024-54370, CVE-2024-54372, CVE-2024-54373, CVE-2024-54374, CVE-2024-54375, CVE-2024-54376, CVE-2024-54378, CVE-2024-54379, CVE-2024-54380, CVE-2024-54381, CVE-2024-54382, CVE-2024-54383, CVE-2024-54384, CVE-2024-54385, CVE-2024-54386, CVE-2024-54387, CVE-2024-54388, CVE-2024-54389, CVE-2024-54390, CVE-2024-54391, CVE-2024-54392, CVE-2024-54393, CVE-2024-54394, CVE-2024-54395, CVE-2024-54396, CVE-2024-54397, CVE-2024-54398, CVE-2024-54399, CVE-2024-54400, CVE-2024-54401, CVE-2024-54402, CVE-2024-54403, CVE-2024-54404, CVE-2024-54405, CVE-2024-54406, CVE-2024-54407, CVE-2024-54408, CVE-2024-54409, CVE-2024-54410, CVE-2024-54411, CVE-2024-54412, CVE-2024-54413, CVE-2024-54414, CVE-2024-54415, CVE-2024-54416, CVE-2024-54417, CVE-2024-54418, CVE-2024-54419, CVE-2024-54420, CVE-2024-54421, CVE-2024-54422, CVE-2024-54423, CVE-2024-54424, CVE-2024-54425, CVE-2024-54426, CVE-2024-54427, CVE-2024-54428, CVE-2024-54429, CVE-2024-54430, CVE-2024-54431, CVE-2024-54432, CVE-2024-54433, CVE-2024-54434, CVE-2024-54435, CVE-2024-54436, CVE-2024-54437, CVE-2024-54438, CVE-2024-54439, CVE-2024-54440, CVE-2024-54441, CVE-2024-54442, CVE-2024-54443, CVE-2024-54444, CVE-2024-55972, CVE-2024-55973, CVE-2024-55974, CVE-2024-55975, CVE-2024-55976, CVE-2024-55977, CVE-2024-55978, CVE-2024-55979, CVE-2024-55980, CVE-2024-55981, CVE-2024-55982, CVE-2024-55983, CVE-2024-55984, CVE-2024-55985, CVE-2024-55986, CVE-2024-55987, CVE-2024-55988, CVE-2024-55989, CVE-2024-55990, CVE-2024-55991, CVE-2024-55992, CVE-2024-55993, CVE-2024-55994, CVE-2024-55995, CVE-2024-55996, CVE-2024-55997, CVE-2024-55998, CVE-2024-55999, CVE-2024-56001, CVE-2024-56002, CVE-2024-56003, CVE-2024-56004, CVE-2024-56005, CVE-2024-56006, CVE-2024-56007, CVE-2024-56008, CVE-2024-56009, CVE-2024-56010, CVE-2024-56011, CVE-2024-56012, CVE-2024-56013, CVE-2024-56014, CVE-2024-56015, CVE-2024-56016, CVE-2024-56017, CVE-2024-56018, CVE-2024-56019, CVE-2024-56020, CVE-2024-56021, CVE-2024-56022, CVE-2024-56023, CVE-2024-56024, CVE-2024-56025, CVE-2024-56026, CVE-2024-56027, CVE-2024-56028, CVE-2024-56029, CVE-2024-56030, CVE-2024-56031, CVE-2024-56032, CVE-2024-56033, CVE-2024-56034, CVE-2024-56035, CVE-2024-56036, CVE-2024-56037, CVE-2024-56038, CVE-2024-56039, CVE-2024-56040, CVE-2024-56041, CVE-2024-56042, CVE-2024-56043, CVE-2024-56044, CVE-2024-56045, CVE-2024-56046, CVE-2024-56047, CVE-2024-56048, CVE-2024-56049, CVE-2024-56050, CVE-2024-56051, CVE-2024-56052, CVE-2024-56053, CVE-2024-56054, CVE-2024-56055, CVE-2024-56057, CVE-2024-56058, CVE-2024-56059, CVE-2024-56060, CVE-2024-56061, CVE-2024-56062, CVE-2024-56063, CVE-2024-56064, CVE-2024-56065, CVE-2024-56066, CVE-2024-56068, CVE-2024-56069, CVE-2024-56070, CVE-2024-56071, CVE-2024-56203, CVE-2024-56204, CVE-2024-56205, CVE-2024-56206, CVE-2024-56207, CVE-2024-56209, CVE-2024-56210, CVE-2024-56211, CVE-2024-56212, CVE-2024-56213, CVE-2024-56214, CVE-2024-56215, CVE-2024-56216, CVE-2024-56217, CVE-2024-56218, CVE-2024-56219, CVE-2024-56220, CVE-2024-56221, CVE-2024-56222, CVE-2024-56223, CVE-2024-56224, CVE-2024-56225, CVE-2024-56226, CVE-2024-56227, CVE-2024-56228, CVE-2024-56229, CVE-2024-56230, CVE-2024-56231, CVE-2024-56232, CVE-2024-56233, CVE-2024-56234, CVE-2024-56235, CVE-2024-56236, CVE-2024-56237, CVE-2024-56238, CVE-2024-56239, CVE-2024-56240, CVE-2024-56241, CVE-2024-56242, CVE-2024-56243, CVE-2024-56244, CVE-2024-56245, CVE-2024-56246, CVE-2024-56247, CVE-2024-56248, CVE-2024-56249, CVE-2024-56250, CVE-2024-56251, CVE-2024-56252, CVE-2024-56253, CVE-2024-56254, CVE-2024-56255, CVE-2024-56256, CVE-2024-56257, CVE-2024-56258, CVE-2024-56259, CVE-2024-56260, CVE-2024-56261, CVE-2024-56262, CVE-2024-56263, CVE-2024-56264, CVE-2024-56265, CVE-2024-56266, CVE-2024-56267, CVE-2024-56268, CVE-2024-56270, CVE-2024-56271, CVE-2024-56272, CVE-2024-56273, CVE-2024-56274, CVE-2024-56275, CVE-2024-56276, CVE-2024-56278, CVE-2024-56279, CVE-2024-56280, CVE-2024-56281, CVE-2024-56282, CVE-2024-56283, CVE-2024-56284, CVE-2024-56285, CVE-2024-56286, CVE-2024-56287, CVE-2024-56288, CVE-2024-56289, CVE-2024-56290, CVE-2024-56291, CVE-2024-56292, CVE-2024-56293, CVE-2024-56294, CVE-2024-56295, CVE-2024-56296, CVE-2024-56297, CVE-2024-56298, CVE-2024-56299, CVE-2024-56300, CVE-2024-56301, CVE-2024-56302, CVE-2024-58344, CVE-2024-7399, CVE-2024-7590, CVE-2024-9146, CVE-2025-10019, CVE-2025-10549, CVE-2025-12549, CVE-2025-12550, CVE-2025-12551, CVE-2025-13504, CVE-2025-13763, CVE-2025-13835, CVE-2025-14314, CVE-2025-14358, CVE-2025-14359, CVE-2025-14360, CVE-2025-14429, CVE-2025-14430, CVE-2025-14431, CVE-2025-15635, CVE-2025-15636, CVE-2025-1249, CVE-2025-22260, CVE-2025-22261, CVE-2025-22262, CVE-2025-22263, CVE-2025-22264, CVE-2025-22265, CVE-2025-22267, CVE-2025-22268, CVE-2025-22269, CVE-2025-22276, CVE-2025-22277, CVE-2025-22278, CVE-2025-22279, CVE-2025-22280, CVE-2025-22281, CVE-2025-22282, CVE-2025-22283, CVE-2025-22284, CVE-2025-22286, CVE-2025-22289, CVE-2025-22290, CVE-2025-22291, CVE-2025-22292, CVE-2025-22293, CVE-2025-22294, CVE-2025-22296, CVE-2025-22297, CVE-2025-22298, CVE-2025-22299, CVE-2025-22300, CVE-2025-22301, CVE-2025-22302, CVE-2025-22303, CVE-2025-22304, CVE-2025-22305, CVE-2025-22306, CVE-2025-22307, CVE-2025-22308, CVE-2025-22309, CVE-2025-22310, CVE-2025-22311, CVE-2025-22312, CVE-2025-22313, CVE-2025-22314, CVE-2025-22315, CVE-2025-22316, CVE-2025-22317, CVE-2025-22318, CVE-2025-22319, CVE-2025-22320, CVE-2025-22321, CVE-2025-22322, CVE-2025-22323, CVE-2025-22324, CVE-2025-22325, CVE-2025-22326, CVE-2025-22327, CVE-2025-22328, CVE-2025-22329, CVE-2025-22330, CVE-2025-22331, CVE-2025-22332, CVE-2025-22333, CVE-2025-22334, CVE-2025-22335, CVE-2025-22336, CVE-2025-22337, CVE-2025-22338, CVE-2025-22339, CVE-2025-22340, CVE-2025-22341, CVE-2025-22342, CVE-2025-22343, CVE-2025-22344, CVE-2025-22345, CVE-2025-22346, CVE-2025-22347, CVE-2025-22348, CVE-2025-22349, CVE-2025-22350, CVE-2025-22351, CVE-2025-22352, CVE-2025-22354, CVE-2025-22355, CVE-2025-22356, CVE-2025-22357, CVE-2025-22358, CVE-2025-22359, CVE-2025-22360, CVE-2025-22361, CVE-2025-22362, CVE-2025-22363, CVE-2025-22364, CVE-2025-22365, CVE-2025-22496, CVE-2025-22497, CVE-2025-22498, CVE-2025-22499, CVE-2025-22500, CVE-2025-22501, CVE-2025-22502, CVE-2025-22503, CVE-2025-22504, CVE-2025-22505, CVE-2025-22506, CVE-2025-22507, CVE-2025-22508, CVE-2025-22509, CVE-2025-22510, CVE-2025-22511, CVE-2025-22512, CVE-2025-22513, CVE-2025-22514, CVE-2025-22515, CVE-2025-22516, CVE-2025-22517, CVE-2025-22518, CVE-2025-22519, CVE-2025-22520, CVE-2025-22521, CVE-2025-22522, CVE-2025-22523, CVE-2025-22524, CVE-2025-22525, CVE-2025-22526, CVE-2025-22528, CVE-2025-22529, CVE-2025-22530, CVE-2025-22532, CVE-2025-22533, CVE-2025-22534, CVE-2025-22535, CVE-2025-22536, CVE-2025-22537, CVE-2025-22538, CVE-2025-22539, CVE-2025-22540, CVE-2025-22541, CVE-2025-22542, CVE-2025-22543, CVE-2025-22544, CVE-2025-22545, CVE-2025-22546, CVE-2025-22547, CVE-2025-22548, CVE-2025-22549, CVE-2025-22550, CVE-2025-22551, CVE-2025-22552, CVE-2025-22553, CVE-2025-22554, CVE-2025-22555, CVE-2025-22556, CVE-2025-22557, CVE-2025-22558, CVE-2025-22559, CVE-2025-22560, CVE-2025-22561, CVE-2025-22562, CVE-2025-22563, CVE-2025-22564, CVE-2025-22565, CVE-2025-22566, CVE-2025-22567, CVE-2025-22568, CVE-2025-22569, CVE-2025-22570, CVE-2025-22571, CVE-2025-22572, CVE-2025-22573, CVE-2025-22574, CVE-2025-22575, CVE-2025-22576, CVE-2025-22577, CVE-2025-22578, CVE-2025-22579, CVE-2025-22580, CVE-2025-22581, CVE-2025-22582, CVE-2025-22583, CVE-2025-22584, CVE-2025-22585, CVE-2025-22586, CVE-2025-22587, CVE-2025-22588, CVE-2025-22589, CVE-2025-22590, CVE-2025-22591, CVE-2025-22592, CVE-2025-22593, CVE-2025-22594, CVE-2025-22595, CVE-2025-22628, CVE-2025-22629, CVE-2025-22630, CVE-2025-22631, CVE-2025-22632, CVE-2025-22634, CVE-2025-22635, CVE-2025-22636, CVE-2025-22637, CVE-2025-22638, CVE-2025-22639, CVE-2025-22640, CVE-2025-22641, CVE-2025-22642, CVE-2025-22643, CVE-2025-22644, CVE-2025-22646, CVE-2025-22647, CVE-2025-22648, CVE-2025-22649, CVE-2025-22651, CVE-2025-22652, CVE-2025-22653, CVE-2025-22654, CVE-2025-22655, CVE-2025-22656, CVE-2025-22657, CVE-2025-22658, CVE-2025-22659, CVE-2025-22660, CVE-2025-22661, CVE-2025-22662, CVE-2025-22663, CVE-2025-22664, CVE-2025-22665, CVE-2025-22667, CVE-2025-22668, CVE-2025-22669, CVE-2025-22670, CVE-2025-22671, CVE-2025-22672, CVE-2025-22673, CVE-2025-22674, CVE-2025-22675, CVE-2025-22676, CVE-2025-22677, CVE-2025-22678, CVE-2025-22679, CVE-2025-22680, CVE-2025-22681, CVE-2025-22682, CVE-2025-22683, CVE-2025-22684, CVE-2025-22685, CVE-2025-22686, CVE-2025-22687, CVE-2025-22688, CVE-2025-22689, CVE-2025-22690, CVE-2025-22691, CVE-2025-22692, CVE-2025-22693, CVE-2025-22694, CVE-2025-22695, CVE-2025-22696, CVE-2025-22697, CVE-2025-22699, CVE-2025-22700, CVE-2025-22701, CVE-2025-22702, CVE-2025-22703, CVE-2025-22704, CVE-2025-22705, CVE-2025-22706, CVE-2025-22707, CVE-2025-22708, CVE-2025-22709, CVE-2025-22710, CVE-2025-22712, CVE-2025-22713, CVE-2025-22714, CVE-2025-22715, CVE-2025-22716, CVE-2025-22717, CVE-2025-22718, CVE-2025-22719, CVE-2025-22720, CVE-2025-22721, CVE-2025-22722, CVE-2025-22723, CVE-2025-22725, CVE-2025-22726, CVE-2025-22727, CVE-2025-22728, CVE-2025-22729, CVE-2025-22730, CVE-2025-22731, CVE-2025-22732, CVE-2025-22733, CVE-2025-22734, CVE-2025-22735, CVE-2025-22736, CVE-2025-22737, CVE-2025-22738, CVE-2025-22739, CVE-2025-22740, CVE-2025-22742, CVE-2025-22743, CVE-2025-22744, CVE-2025-22745, CVE-2025-22746, CVE-2025-22747, CVE-2025-22748, CVE-2025-22749, CVE-2025-22750, CVE-2025-22751, CVE-2025-22752, CVE-2025-22753, CVE-2025-22755, CVE-2025-22757, CVE-2025-22758, CVE-2025-22759, CVE-2025-22760, CVE-2025-22761, CVE-2025-22762, CVE-2025-22763, CVE-2025-22764, CVE-2025-22765, CVE-2025-22766, CVE-2025-22767, CVE-2025-22768, CVE-2025-22770, CVE-2025-22771, CVE-2025-22772, CVE-2025-22774, CVE-2025-22775, CVE-2025-22776, CVE-2025-22777, CVE-2025-22778, CVE-2025-22779, CVE-2025-22780, CVE-2025-22781, CVE-2025-22782, CVE-2025-22783, CVE-2025-22784, CVE-2025-22785, CVE-2025-22786, CVE-2025-22787, CVE-2025-22788, CVE-2025-22789, CVE-2025-22790, CVE-2025-22791, CVE-2025-22792, CVE-2025-22794, CVE-2025-22795, CVE-2025-22796, CVE-2025-22797, CVE-2025-22798, CVE-2025-22799, CVE-2025-22800, CVE-2025-22801, CVE-2025-22802, CVE-2025-22803, CVE-2025-22804, CVE-2025-22805, CVE-2025-22806, CVE-2025-22807, CVE-2025-22808, CVE-2025-22809, CVE-2025-22810, CVE-2025-22811, CVE-2025-22812, CVE-2025-22813, CVE-2025-22814, CVE-2025-22815, CVE-2025-22816, CVE-2025-22817, CVE-2025-22818, CVE-2025-22819, CVE-2025-22820, CVE-2025-22821, CVE-2025-22822, CVE-2025-22823, CVE-2025-22824, CVE-2025-22825, CVE-2025-22826, CVE-2025-22827, CVE-2025-23422, CVE-2025-23423, CVE-2025-23424, CVE-2025-23425, CVE-2025-23426, CVE-2025-23427, CVE-2025-23428, CVE-2025-23430, CVE-2025-23431, CVE-2025-23433, CVE-2025-23435, CVE-2025-23436, CVE-2025-23437, CVE-2025-23438, CVE-2025-23439, CVE-2025-23440, CVE-2025-23441, CVE-2025-23442, CVE-2025-23443, CVE-2025-23445, CVE-2025-23446, CVE-2025-23447, CVE-2025-23448, CVE-2025-23449, CVE-2025-23450, CVE-2025-23451, CVE-2025-23452, CVE-2025-23453, CVE-2025-23454, CVE-2025-23455, CVE-2025-23456, CVE-2025-23457, CVE-2025-23458, CVE-2025-23459, CVE-2025-23460, CVE-2025-23461, CVE-2025-23462, CVE-2025-23463, CVE-2025-23464, CVE-2025-23465, CVE-2025-23466, CVE-2025-23467, CVE-2025-23468, CVE-2025-23469, CVE-2025-23470, CVE-2025-23471, CVE-2025-23472, CVE-2025-23473, CVE-2025-23474, CVE-2025-23475, CVE-2025-23476, CVE-2025-23477, CVE-2025-23478, CVE-2025-23479, CVE-2025-23480, CVE-2025-23481, CVE-2025-23482, CVE-2025-23483, CVE-2025-23484, CVE-2025-23485, CVE-2025-23486, CVE-2025-23487, CVE-2025-23488, CVE-2025-23489, CVE-2025-23490, CVE-2025-23491, CVE-2025-23492, CVE-2025-23493, CVE-2025-23494, CVE-2025-23495, CVE-2025-23496, CVE-2025-23497, CVE-2025-23498, CVE-2025-23499, CVE-2025-23500, CVE-2025-23501, CVE-2025-23502, CVE-2025-23503, CVE-2025-23505, CVE-2025-23506, CVE-2025-23507, CVE-2025-23508, CVE-2025-23509, CVE-2025-23510, CVE-2025-23511, CVE-2025-23512, CVE-2025-23513, CVE-2025-23514, CVE-2025-23515, CVE-2025-23516, CVE-2025-23517, CVE-2025-23518, CVE-2025-23519, CVE-2025-23520, CVE-2025-23521, CVE-2025-23522, CVE-2025-23523, CVE-2025-23524, CVE-2025-23525, CVE-2025-23526, CVE-2025-23527, CVE-2025-23529, CVE-2025-23530, CVE-2025-23531, CVE-2025-23532, CVE-2025-23533, CVE-2025-23534, CVE-2025-23535, CVE-2025-23536, CVE-2025-23537, CVE-2025-23538, CVE-2025-23539, CVE-2025-23540, CVE-2025-23541, CVE-2025-23542, CVE-2025-23543, CVE-2025-23544, CVE-2025-23545, CVE-2025-23546, CVE-2025-23547, CVE-2025-23548, CVE-2025-23549, CVE-2025-23550, CVE-2025-23551, CVE-2025-23552, CVE-2025-23553, CVE-2025-23554, CVE-2025-23555, CVE-2025-23556, CVE-2025-23557, CVE-2025-23558, CVE-2025-23559, CVE-2025-23560, CVE-2025-23561, CVE-2025-23562, CVE-2025-23563, CVE-2025-23564, CVE-2025-23565, CVE-2025-23566, CVE-2025-23567, CVE-2025-23568, CVE-2025-23569, CVE-2025-23570, CVE-2025-23571, CVE-2025-23572, CVE-2025-23573, CVE-2025-23574, CVE-2025-23575, CVE-2025-23576, CVE-2025-23577, CVE-2025-23578, CVE-2025-23579, CVE-2025-23580, CVE-2025-23581, CVE-2025-23582, CVE-2025-23583, CVE-2025-23584, CVE-2025-23585, CVE-2025-23586, CVE-2025-23587, CVE-2025-23588, CVE-2025-23589, CVE-2025-23590, CVE-2025-23591, CVE-2025-23592, CVE-2025-23593, CVE-2025-23594, CVE-2025-23595, CVE-2025-23596, CVE-2025-23597, CVE-2025-23598, CVE-2025-23599, CVE-2025-23600, CVE-2025-23601, CVE-2025-23602, CVE-2025-23603, CVE-2025-23604, CVE-2025-23605, CVE-2025-23606, CVE-2025-23607, CVE-2025-23608, CVE-2025-23609, CVE-2025-23610, CVE-2025-23611, CVE-2025-23612, CVE-2025-23613, CVE-2025-23614, CVE-2025-23615, CVE-2025-23616, CVE-2025-23617, CVE-2025-23618, CVE-2025-23619, CVE-2025-23620, CVE-2025-23621, CVE-2025-23622, CVE-2025-23623, CVE-2025-23624, CVE-2025-23625, CVE-2025-23626, CVE-2025-23627, CVE-2025-23628, CVE-2025-23629, CVE-2025-23630, CVE-2025-23631, CVE-2025-23632, CVE-2025-23633, CVE-2025-23634, CVE-2025-23635, CVE-2025-23636, CVE-2025-23637, CVE-2025-23638, CVE-2025-23639, CVE-2025-23640, CVE-2025-23641, CVE-2025-23642, CVE-2025-23643, CVE-2025-23644, CVE-2025-23645, CVE-2025-23646, CVE-2025-23647, CVE-2025-23648, CVE-2025-23649, CVE-2025-23650, CVE-2025-23651, CVE-2025-23652, CVE-2025-23653, CVE-2025-23654, CVE-2025-23655, CVE-2025-23656, CVE-2025-23657, CVE-2025-23658, CVE-2025-23659, CVE-2025-23660, CVE-2025-23661, CVE-2025-23662, CVE-2025-23663, CVE-2025-23664, CVE-2025-23665, CVE-2025-23666, CVE-2025-23667, CVE-2025-23668, CVE-2025-23669, CVE-2025-23670, CVE-2025-23671, CVE-2025-23672, CVE-2025-23673, CVE-2025-23674, CVE-2025-23675, CVE-2025-23676, CVE-2025-23677, CVE-2025-23678, CVE-2025-23679, CVE-2025-23680, CVE-2025-23681, CVE-2025-23682, CVE-2025-23683, CVE-2025-23684, CVE-2025-23685, CVE-2025-23686, CVE-2025-23687, CVE-2025-23688, CVE-2025-23689, CVE-2025-23690, CVE-2025-23691, CVE-2025-23692, CVE-2025-23693, CVE-2025-23694, CVE-2025-23695, CVE-2025-23696, CVE-2025-23697, CVE-2025-23698, CVE-2025-23699, CVE-2025-23700, CVE-2025-23701, CVE-2025-23702, CVE-2025-23703, CVE-2025-23704, CVE-2025-23705, CVE-2025-23706, CVE-2025-23707, CVE-2025-23708, CVE-2025-23709, CVE-2025-23710, CVE-2025-23711, CVE-2025-23712, CVE-2025-23713, CVE-2025-23714, CVE-2025-23715, CVE-2025-23716, CVE-2025-23717, CVE-2025-23718, CVE-2025-23719, CVE-2025-23720, CVE-2025-23721, CVE-2025-23722, CVE-2025-23723, CVE-2025-23724, CVE-2025-23725, CVE-2025-23726, CVE-2025-23727, CVE-2025-23728, CVE-2025-23729, CVE-2025-23730, CVE-2025-23731, CVE-2025-23732, CVE-2025-23733, CVE-2025-23734, CVE-2025-23735, CVE-2025-23736, CVE-2025-23737, CVE-2025-23738, CVE-2025-23739, CVE-2025-23740, CVE-2025-23741, CVE-2025-23742, CVE-2025-23743, CVE-2025-23744, CVE-2025-23745, CVE-2025-23746, CVE-2025-23747, CVE-2025-23748, CVE-2025-23749, CVE-2025-23750, CVE-2025-23751, CVE-2025-23752, CVE-2025-23753, CVE-2025-23754, CVE-2025-23755, CVE-2025-23756, CVE-2025-23757, CVE-2025-23758, CVE-2025-23759, CVE-2025-23760, CVE-2025-23761, CVE-2025-23762, CVE-2025-23763, CVE-2025-23764, CVE-2025-23765, CVE-2025-23766, CVE-2025-23767, CVE-2025-23768, CVE-2025-23769, CVE-2025-23770, CVE-2025-23771, CVE-2025-23772, CVE-2025-23773, CVE-2025-23774, CVE-2025-23775, CVE-2025-23776, CVE-2025-23777, CVE-2025-23778, CVE-2025-23779, CVE-2025-23780, CVE-2025-23781, CVE-2025-23782, CVE-2025-23783, CVE-2025-23785, CVE-2025-23786, CVE-2025-23787, CVE-2025-23788, CVE-2025-23789, CVE-2025-23790, CVE-2025-23791, CVE-2025-23792, CVE-2025-23793, CVE-2025-23794, CVE-2025-23795, CVE-2025-23796, CVE-2025-23797, CVE-2025-23798, CVE-2025-23799, CVE-2025-23800, CVE-2025-23801, CVE-2025-23802, CVE-2025-23803, CVE-2025-23804, CVE-2025-23805, CVE-2025-23807, CVE-2025-23808, CVE-2025-23809, CVE-2025-23810, CVE-2025-23811, CVE-2025-23812, CVE-2025-23813, CVE-2025-23814, CVE-2025-23815, CVE-2025-23816, CVE-2025-23817, CVE-2025-23818, CVE-2025-23819, CVE-2025-23820, CVE-2025-23821, CVE-2025-23822, CVE-2025-23823, CVE-2025-23824, CVE-2025-23825, CVE-2025-23826, CVE-2025-23827, CVE-2025-23828, CVE-2025-23829, CVE-2025-23830, CVE-2025-23831, CVE-2025-23832, CVE-2025-23833, CVE-2025-23834, CVE-2025-23835, CVE-2025-23836, CVE-2025-23837, CVE-2025-23838, CVE-2025-23839, CVE-2025-23840, CVE-2025-23841, CVE-2025-23842, CVE-2025-23843, CVE-2025-23844, CVE-2025-23845, CVE-2025-23846, CVE-2025-23847, CVE-2025-23848, CVE-2025-23849, CVE-2025-23850, CVE-2025-23851, CVE-2025-23852, CVE-2025-23853, CVE-2025-23854, CVE-2025-23855, CVE-2025-23856, CVE-2025-23857, CVE-2025-23858, CVE-2025-23859, CVE-2025-23860, CVE-2025-23861, CVE-2025-23862, CVE-2025-23863, CVE-2025-23864, CVE-2025-23865, CVE-2025-23866, CVE-2025-23867, CVE-2025-23868, CVE-2025-23869, CVE-2025-23870, CVE-2025-23871, CVE-2025-23872, CVE-2025-23873, CVE-2025-23874, CVE-2025-23875, CVE-2025-23876, CVE-2025-23877, CVE-2025-23878, CVE-2025-23879, CVE-2025-23880, CVE-2025-23881, CVE-2025-23882, CVE-2025-23883, CVE-2025-23884, CVE-2025-23885, CVE-2025-23886, CVE-2025-23887, CVE-2025-23888, CVE-2025-23889, CVE-2025-23890, CVE-2025-23891, CVE-2025-23892, CVE-2025-23893, CVE-2025-23894, CVE-2025-23895, CVE-2025-23896, CVE-2025-23897, CVE-2025-23898, CVE-2025-23899, CVE-2025-23900, CVE-2025-23901, CVE-2025-23902, CVE-2025-23903, CVE-2025-23904, CVE-2025-23905, CVE-2025-23906, CVE-2025-23907, CVE-2025-23908, CVE-2025-23909, CVE-2025-23910, CVE-2025-23911, CVE-2025-23912, CVE-2025-23913, CVE-2025-23914, CVE-2025-23915, CVE-2025-23916, CVE-2025-23917, CVE-2025-23918, CVE-2025-23919, CVE-2025-23920, CVE-2025-23921, CVE-2025-23922, CVE-2025-23923, CVE-2025-23924, CVE-2025-23925, CVE-2025-23926, CVE-2025-23927, CVE-2025-23928, CVE-2025-23929, CVE-2025-23930, CVE-2025-23931, CVE-2025-23932, CVE-2025-23933, CVE-2025-23934, CVE-2025-23935, CVE-2025-23936, CVE-2025-23937, CVE-2025-23938, CVE-2025-23939, CVE-2025-23940, CVE-2025-23941, CVE-2025-23942, CVE-2025-23943, CVE-2025-23944, CVE-2025-23945, CVE-2025-23946, CVE-2025-23947, CVE-2025-23948, CVE-2025-23949, CVE-2025-23950, CVE-2025-23951, CVE-2025-23952, CVE-2025-23953, CVE-2025-23954, CVE-2025-23955, CVE-2025-23956, CVE-2025-23957, CVE-2025-23958, CVE-2025-23959, CVE-2025-23960, CVE-2025-23961, CVE-2025-23962, CVE-2025-23963, CVE-2025-23964, CVE-2025-23965, CVE-2025-23966, CVE-2025-23967, CVE-2025-23968, CVE-2025-23969, CVE-2025-23970, CVE-2025-23971, CVE-2025-23972, CVE-2025-23973, CVE-2025-23974, CVE-2025-23975, CVE-2025-23976, CVE-2025-23977, CVE-2025-23978, CVE-2025-23979, CVE-2025-23980, CVE-2025-23981, CVE-2025-23982, CVE-2025-23983, CVE-2025-23984, CVE-2025-23985, CVE-2025-23986, CVE-2025-23987, CVE-2025-23988, CVE-2025-23989, CVE-2025-23990, CVE-2025-23991, CVE-2025-23992, CVE-2025-23993, CVE-2025-23994, CVE-2025-23995, CVE-2025-23996, CVE-2025-23997, CVE-2025-23998, CVE-2025-23999, CVE-2025-24000, CVE-2025-24001, CVE-2025-24533, CVE-2025-24534, CVE-2025-24535, CVE-2025-24536, CVE-2025-24537, CVE-2025-24538, CVE-2025-24539, CVE-2025-24540, CVE-2025-24541, CVE-2025-24542, CVE-2025-24543, CVE-2025-24544, CVE-2025-24545, CVE-2025-24546, CVE-2025-24547, CVE-2025-24548, CVE-2025-24549, CVE-2025-24550, CVE-2025-24551, CVE-2025-24552, CVE-2025-24553, CVE-2025-24554, CVE-2025-24555, CVE-2025-24557, CVE-2025-24558, CVE-2025-24559, CVE-2025-24560, CVE-2025-24561, CVE-2025-24562, CVE-2025-24563, CVE-2025-24564, CVE-2025-24565, CVE-2025-24566, CVE-2025-24567, CVE-2025-24568, CVE-2025-24569, CVE-2025-24570, CVE-2025-24571, CVE-2025-24572, CVE-2025-24573, CVE-2025-24574, CVE-2025-24575, CVE-2025-24576, CVE-2025-24577, CVE-2025-24578, CVE-2025-24579, CVE-2025-24580, CVE-2025-24581, CVE-2025-24582, CVE-2025-24583, CVE-2025-24584, CVE-2025-24585, CVE-2025-24586, CVE-2025-24587, CVE-2025-24588, CVE-2025-24589, CVE-2025-24590, CVE-2025-24591, CVE-2025-24592, CVE-2025-24593, CVE-2025-24594, CVE-2025-24595, CVE-2025-24596, CVE-2025-24597, CVE-2025-24598, CVE-2025-24599, CVE-2025-24600, CVE-2025-24601, CVE-2025-24602, CVE-2025-24603, CVE-2025-24604, CVE-2025-24605, CVE-2025-24608, CVE-2025-24609, CVE-2025-24610, CVE-2025-24611, CVE-2025-24612, CVE-2025-24613, CVE-2025-24614, CVE-2025-24615, CVE-2025-24616, CVE-2025-24617, CVE-2025-24618, CVE-2025-24619, CVE-2025-24620, CVE-2025-24621, CVE-2025-24622, CVE-2025-24623, CVE-2025-24624, CVE-2025-24625, CVE-2025-24626, CVE-2025-24627, CVE-2025-24629, CVE-2025-24630, CVE-2025-24631, CVE-2025-24632, CVE-2025-24633, CVE-2025-24634, CVE-2025-24635, CVE-2025-24636, CVE-2025-24637, CVE-2025-24638, CVE-2025-24639, CVE-2025-24640, CVE-2025-24641, CVE-2025-24642, CVE-2025-24644, CVE-2025-24645, CVE-2025-24646, CVE-2025-24647, CVE-2025-24648, CVE-2025-24649, CVE-2025-24650, CVE-2025-24652, CVE-2025-24653, CVE-2025-24654, CVE-2025-24655, CVE-2025-24656, CVE-2025-24657, CVE-2025-24658, CVE-2025-24659, CVE-2025-24660, CVE-2025-24661, CVE-2025-24662, CVE-2025-24663, CVE-2025-24664, CVE-2025-24665, CVE-2025-24666, CVE-2025-24667, CVE-2025-24668, CVE-2025-24669, CVE-2025-24670, CVE-2025-24671, CVE-2025-24672, CVE-2025-24673, CVE-2025-24674, CVE-2025-24675, CVE-2025-24676, CVE-2025-24677, CVE-2025-24678, CVE-2025-24679, CVE-2025-24680, CVE-2025-24681, CVE-2025-24682, CVE-2025-24683, CVE-2025-24684, CVE-2025-24685, CVE-2025-24686, CVE-2025-24687, CVE-2025-24688, CVE-2025-24689, CVE-2025-24690, CVE-2025-24691, CVE-2025-24692, CVE-2025-24693, CVE-2025-24694, CVE-2025-24695, CVE-2025-24696, CVE-2025-24697, CVE-2025-24698, CVE-2025-24699, CVE-2025-24700, CVE-2025-24701, CVE-2025-24702, CVE-2025-24703, CVE-2025-24704, CVE-2025-24705, CVE-2025-24706, CVE-2025-24707, CVE-2025-24708, CVE-2025-24709, CVE-2025-24710, CVE-2025-24711, CVE-2025-24712, CVE-2025-24713, CVE-2025-24714, CVE-2025-24715, CVE-2025-24716, CVE-2025-24717, CVE-2025-24718, CVE-2025-24719, CVE-2025-24720, CVE-2025-24721, CVE-2025-24722, CVE-2025-24723, CVE-2025-24724, CVE-2025-24725, CVE-2025-24726, CVE-2025-24727, CVE-2025-24728, CVE-2025-24729, CVE-2025-24730, CVE-2025-24731, CVE-2025-24732, CVE-2025-24733, CVE-2025-24734, CVE-2025-24736, CVE-2025-24737, CVE-2025-24738, CVE-2025-24739, CVE-2025-24740, CVE-2025-24741, CVE-2025-24742, CVE-2025-24743, CVE-2025-24744, CVE-2025-24745, CVE-2025-24746, CVE-2025-24747, CVE-2025-24748, CVE-2025-24749, CVE-2025-24750, CVE-2025-24751, CVE-2025-24752, CVE-2025-24753, CVE-2025-24754, CVE-2025-24755, CVE-2025-24756, CVE-2025-24757, CVE-2025-24758, CVE-2025-24759, CVE-2025-24760, CVE-2025-24761, CVE-2025-24762, CVE-2025-24763, CVE-2025-24764, CVE-2025-24765, CVE-2025-24766, CVE-2025-24767, CVE-2025-24768, CVE-2025-24769, CVE-2025-24770, CVE-2025-24771, CVE-2025-24772, CVE-2025-24773, CVE-2025-24774, CVE-2025-24775, CVE-2025-24776, CVE-2025-24777, CVE-2025-24778, CVE-2025-24779, CVE-2025-24780, CVE-2025-24781, CVE-2025-24782, CVE-2025-25070, CVE-2025-25071, CVE-2025-25072, CVE-2025-25073, CVE-2025-25074, CVE-2025-25075, CVE-2025-25076, CVE-2025-25077, CVE-2025-25078, CVE-2025-25079, CVE-2025-25080, CVE-2025-25081, CVE-2025-25082, CVE-2025-25083, CVE-2025-25085, CVE-2025-25086, CVE-2025-25087, CVE-2025-25088, CVE-2025-25089, CVE-2025-25090, CVE-2025-25091, CVE-2025-25092, CVE-2025-25093, CVE-2025-25094, CVE-2025-25095, CVE-2025-25096, CVE-2025-25097, CVE-2025-25098, CVE-2025-25099, CVE-2025-25100, CVE-2025-25101, CVE-2025-25102, CVE-2025-25103, CVE-2025-25104, CVE-2025-25105, CVE-2025-25106, CVE-2025-25107, CVE-2025-25108, CVE-2025-25109, CVE-2025-25110, CVE-2025-25111, CVE-2025-25112, CVE-2025-25113, CVE-2025-25114, CVE-2025-25115, CVE-2025-25116, CVE-2025-25117, CVE-2025-25118, CVE-2025-25119, CVE-2025-25120, CVE-2025-25121, CVE-2025-25122, CVE-2025-25123, CVE-2025-25124, CVE-2025-25125, CVE-2025-25126, CVE-2025-25127, CVE-2025-25128, CVE-2025-25129, CVE-2025-25130, CVE-2025-25131, CVE-2025-25132, CVE-2025-25133, CVE-2025-25134, CVE-2025-25135, CVE-2025-25136, CVE-2025-25137, CVE-2025-25138, CVE-2025-25139, CVE-2025-25140, CVE-2025-25141, CVE-2025-25142, CVE-2025-25143, CVE-2025-25144, CVE-2025-25145, CVE-2025-25146, CVE-2025-25147, CVE-2025-25148, CVE-2025-25149, CVE-2025-25150, CVE-2025-25151, CVE-2025-25152, CVE-2025-25153, CVE-2025-25154, CVE-2025-25155, CVE-2025-25156, CVE-2025-25157, CVE-2025-25158, CVE-2025-25159, CVE-2025-25160, CVE-2025-25161, CVE-2025-25162, CVE-2025-25163, CVE-2025-25164, CVE-2025-25165, CVE-2025-25166, CVE-2025-25167, CVE-2025-25168, CVE-2025-25169, CVE-2025-25170, CVE-2025-25171, CVE-2025-25172, CVE-2025-25173, CVE-2025-25174, CVE-2025-26534, CVE-2025-26535, CVE-2025-26536, CVE-2025-26537, CVE-2025-26538, CVE-2025-26539, CVE-2025-26540, CVE-2025-26541, CVE-2025-26542, CVE-2025-26543, CVE-2025-26544, CVE-2025-26545, CVE-2025-26546, CVE-2025-26547, CVE-2025-26548, CVE-2025-26549, CVE-2025-26550, CVE-2025-26551, CVE-2025-26552, CVE-2025-26553, CVE-2025-26554, CVE-2025-26555, CVE-2025-26556, CVE-2025-26557, CVE-2025-26558, CVE-2025-26559, CVE-2025-26560, CVE-2025-26561, CVE-2025-26562, CVE-2025-26563, CVE-2025-26564, CVE-2025-26565, CVE-2025-26566, CVE-2025-26567, CVE-2025-26568, CVE-2025-26569, CVE-2025-26570, CVE-2025-26571, CVE-2025-26572, CVE-2025-26573, CVE-2025-26574, CVE-2025-26575, CVE-2025-26576, CVE-2025-26577, CVE-2025-26578, CVE-2025-26579, CVE-2025-26580, CVE-2025-26581, CVE-2025-26582, CVE-2025-26583, CVE-2025-26584, CVE-2025-26585, CVE-2025-26586, CVE-2025-26587, CVE-2025-26588, CVE-2025-26589, CVE-2025-26590, CVE-2025-26591, CVE-2025-26592, CVE-2025-26593, CVE-2025-26730, CVE-2025-26731, CVE-2025-26732, CVE-2025-26733, CVE-2025-26734, CVE-2025-26735, CVE-2025-26736, CVE-2025-26737, CVE-2025-26738, CVE-2025-26739, CVE-2025-26740, CVE-2025-26741, CVE-2025-26742, CVE-2025-26743, CVE-2025-26744, CVE-2025-26745, CVE-2025-26746, CVE-2025-26747, CVE-2025-26748, CVE-2025-26749, CVE-2025-26750, CVE-2025-26751, CVE-2025-26752, CVE-2025-26753, CVE-2025-26754, CVE-2025-26755, CVE-2025-26756, CVE-2025-26757, CVE-2025-26758, CVE-2025-26759, CVE-2025-26761, CVE-2025-26762, CVE-2025-26763, CVE-2025-26764, CVE-2025-26765, CVE-2025-26766, CVE-2025-26767, CVE-2025-26768, CVE-2025-26769, CVE-2025-26770, CVE-2025-26771, CVE-2025-26772, CVE-2025-26773, CVE-2025-26774, CVE-2025-26775, CVE-2025-26776, CVE-2025-26778, CVE-2025-26779, CVE-2025-26867, CVE-2025-26868, CVE-2025-26870, CVE-2025-26871, CVE-2025-26872, CVE-2025-26873, CVE-2025-26874, CVE-2025-26875, CVE-2025-26876, CVE-2025-26877, CVE-2025-26878, CVE-2025-26880, CVE-2025-26881, CVE-2025-26882, CVE-2025-26883, CVE-2025-26884, CVE-2025-26886, CVE-2025-26887, CVE-2025-26888, CVE-2025-26889, CVE-2025-26890, CVE-2025-26891, CVE-2025-26892, CVE-2025-26893, CVE-2025-26894, CVE-2025-26895, CVE-2025-26896, CVE-2025-26897, CVE-2025-26898, CVE-2025-26899, CVE-2025-26900, CVE-2025-26901, CVE-2025-26902, CVE-2025-26903, CVE-2025-26904, CVE-2025-26905, CVE-2025-26906, CVE-2025-26907, CVE-2025-26908, CVE-2025-26909, CVE-2025-26910, CVE-2025-26911, CVE-2025-26912, CVE-2025-26913, CVE-2025-26914, CVE-2025-26915, CVE-2025-26916, CVE-2025-26918, CVE-2025-26919, CVE-2025-26920, CVE-2025-26921, CVE-2025-26922, CVE-2025-26923, CVE-2025-26924, CVE-2025-26925, CVE-2025-26926, CVE-2025-26927, CVE-2025-26928, CVE-2025-26929, CVE-2025-26930, CVE-2025-26931, CVE-2025-26932, CVE-2025-26933, CVE-2025-26934, CVE-2025-26935, CVE-2025-26936, CVE-2025-26937, CVE-2025-26938, CVE-2025-26939, CVE-2025-26940, CVE-2025-26941, CVE-2025-26943, CVE-2025-26944, CVE-2025-26945, CVE-2025-26946, CVE-2025-26947, CVE-2025-26948, CVE-2025-26949, CVE-2025-26950, CVE-2025-26951, CVE-2025-26952, CVE-2025-26954, CVE-2025-26955, CVE-2025-26956, CVE-2025-26957, CVE-2025-26959, CVE-2025-26960, CVE-2025-26961, CVE-2025-26962, CVE-2025-26963, CVE-2025-26964, CVE-2025-26966, CVE-2025-26967, CVE-2025-26968, CVE-2025-26969, CVE-2025-26970, CVE-2025-26971, CVE-2025-26972, CVE-2025-26973, CVE-2025-26974, CVE-2025-26975, CVE-2025-26976, CVE-2025-26977, CVE-2025-26978, CVE-2025-26979, CVE-2025-26980, CVE-2025-26981, CVE-2025-26982, CVE-2025-26983, CVE-2025-26984, CVE-2025-26985, CVE-2025-26986, CVE-2025-26987, CVE-2025-26988, CVE-2025-26989, CVE-2025-26990, CVE-2025-26991, CVE-2025-26992, CVE-2025-26993, CVE-2025-26994, CVE-2025-26995, CVE-2025-26996, CVE-2025-26997, CVE-2025-26998, CVE-2025-26999, CVE-2025-27000, CVE-2025-27001, CVE-2025-27002, CVE-2025-27003, CVE-2025-27004, CVE-2025-27005, CVE-2025-27006, CVE-2025-27007, CVE-2025-27008, CVE-2025-27009, CVE-2025-27010, CVE-2025-27011, CVE-2025-27012, CVE-2025-27013, CVE-2025-27014, CVE-2025-27015, CVE-2025-27016, CVE-2025-27263, CVE-2025-27264, CVE-2025-27265, CVE-2025-27266, CVE-2025-27267, CVE-2025-27268, CVE-2025-27269, CVE-2025-27270, CVE-2025-27271, CVE-2025-27272, CVE-2025-27273, CVE-2025-27274, CVE-2025-27275, CVE-2025-27276, CVE-2025-27277, CVE-2025-27278, CVE-2025-27279, CVE-2025-27280, CVE-2025-27281, CVE-2025-27282, CVE-2025-27283, CVE-2025-27284, CVE-2025-27285, CVE-2025-27286, CVE-2025-27287, CVE-2025-27288, CVE-2025-27289, CVE-2025-27290, CVE-2025-27291, CVE-2025-27292, CVE-2025-27293, CVE-2025-27294, CVE-2025-27295, CVE-2025-27296, CVE-2025-27297, CVE-2025-27298, CVE-2025-27299, CVE-2025-27300, CVE-2025-27301, CVE-2025-27302, CVE-2025-27303, CVE-2025-27304, CVE-2025-27305, CVE-2025-27306, CVE-2025-27307, CVE-2025-27308, CVE-2025-27309, CVE-2025-27310, CVE-2025-27311, CVE-2025-27312, CVE-2025-27313, CVE-2025-27314, CVE-2025-27315, CVE-2025-27316, CVE-2025-27317, CVE-2025-27318, CVE-2025-27319, CVE-2025-27320, CVE-2025-27321, CVE-2025-27322, CVE-2025-27323, CVE-2025-27324, CVE-2025-27325, CVE-2025-27326, CVE-2025-27327, CVE-2025-27328, CVE-2025-27329, CVE-2025-27330, CVE-2025-27331, CVE-2025-27332, CVE-2025-27333, CVE-2025-27334, CVE-2025-27335, CVE-2025-27336, CVE-2025-27337, CVE-2025-27338, CVE-2025-27339, CVE-2025-27340, CVE-2025-27341, CVE-2025-27342, CVE-2025-27343, CVE-2025-27344, CVE-2025-27345, CVE-2025-27347, CVE-2025-27348, CVE-2025-27349, CVE-2025-27350, CVE-2025-27351, CVE-2025-27352, CVE-2025-27353, CVE-2025-27354, CVE-2025-27355, CVE-2025-27356, CVE-2025-27357, CVE-2025-27358, CVE-2025-27359, CVE-2025-27360, CVE-2025-27361, CVE-2025-27362, CVE-2025-28855, CVE-2025-28856, CVE-2025-28857, CVE-2025-28859, CVE-2025-28860, CVE-2025-28861, CVE-2025-28862, CVE-2025-28863, CVE-2025-28864, CVE-2025-28865, CVE-2025-28866, CVE-2025-28867, CVE-2025-28868, CVE-2025-28869, CVE-2025-28870, CVE-2025-28871, CVE-2025-28872, CVE-2025-28873, CVE-2025-28874, CVE-2025-28875, CVE-2025-28876, CVE-2025-28877, CVE-2025-28878, CVE-2025-28879, CVE-2025-28880, CVE-2025-28881, CVE-2025-28882, CVE-2025-28883, CVE-2025-28884, CVE-2025-28885, CVE-2025-28886, CVE-2025-28887, CVE-2025-28888, CVE-2025-28889, CVE-2025-28890, CVE-2025-28891, CVE-2025-28892, CVE-2025-28893, CVE-2025-28894, CVE-2025-28895, CVE-2025-28896, CVE-2025-28897, CVE-2025-28898, CVE-2025-28899, CVE-2025-28900, CVE-2025-28901, CVE-2025-28902, CVE-2025-28903, CVE-2025-28904, CVE-2025-28905, CVE-2025-28906, CVE-2025-28907, CVE-2025-28908, CVE-2025-28909, CVE-2025-28910, CVE-2025-28911, CVE-2025-28912, CVE-2025-28913, CVE-2025-28914, CVE-2025-28915, CVE-2025-28916, CVE-2025-28917, CVE-2025-28918, CVE-2025-28919, CVE-2025-28920, CVE-2025-28921, CVE-2025-28922, CVE-2025-28923, CVE-2025-28924, CVE-2025-28925, CVE-2025-28926, CVE-2025-28927, CVE-2025-28928, CVE-2025-28929, CVE-2025-28930, CVE-2025-28931, CVE-2025-28932,... Date: Thu, 23 Apr 2026 14:56:21 +0000 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.12.inc | 230 +++++++++++++++++- 1 file changed, 219 insertions(+), 11 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 2ae4f461e5..88a2da476c 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-04-14 21:08:51.681656+00:00 for kernel version 6.12.81 -# From linux_kernel_cves cve_2026-04-14_2000Z-1-g4a280a922d3 +# Generated at 2026-04-23 14:57:09.231573+00:00 for kernel version 6.12.83 +# From linux_kernel_cves cve_2026-04-23_1300Z-1-g8aa5543fc90 python check_kernel_cve_status_version() { - this_version = "6.12.81" + this_version = "6.12.83" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -15308,7 +15308,7 @@ CVE_STATUS[CVE-2025-21707] = "cpe-stable-backport: Backported in 6.12.13" CVE_STATUS[CVE-2025-21708] = "cpe-stable-backport: Backported in 6.12.13" -# CVE-2025-21709 needs backporting (fixed from 6.14) +CVE_STATUS[CVE-2025-21709] = "cpe-stable-backport: Backported in 6.12.83" CVE_STATUS[CVE-2025-21710] = "cpe-stable-backport: Backported in 6.12.13" @@ -18674,7 +18674,7 @@ CVE_STATUS[CVE-2025-39928] = "fixed-version: only affects 6.13 onwards" CVE_STATUS[CVE-2025-39929] = "cpe-stable-backport: Backported in 6.12.49" -CVE_STATUS[CVE-2025-39930] = "fixed-version: only affects 6.14 onwards" +CVE_STATUS[CVE-2025-39930] = "cpe-stable-backport: Backported in 6.12.82" CVE_STATUS[CVE-2025-39931] = "cpe-stable-backport: Backported in 6.12.49" @@ -20448,7 +20448,7 @@ CVE_STATUS[CVE-2026-22984] = "cpe-stable-backport: Backported in 6.12.66" CVE_STATUS[CVE-2026-22985] = "cpe-stable-backport: Backported in 6.12.80" -# CVE-2026-22986 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-22986] = "cpe-stable-backport: Backported in 6.12.83" CVE_STATUS[CVE-2026-22987] = "fixed-version: only affects 6.17 onwards" @@ -21080,7 +21080,7 @@ CVE_STATUS[CVE-2026-23300] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23301] = "fixed-version: only affects 6.19 onwards" -# CVE-2026-23302 needs backporting (fixed from 7.0) +CVE_STATUS[CVE-2026-23302] = "cpe-stable-backport: Backported in 6.12.82" CVE_STATUS[CVE-2026-23303] = "cpe-stable-backport: Backported in 6.12.77" @@ -21134,7 +21134,7 @@ CVE_STATUS[CVE-2026-23328] = "fixed-version: only affects 6.14 onwards" CVE_STATUS[CVE-2026-23329] = "fixed-version: only affects 6.18 onwards" -# CVE-2026-23330 needs backporting (fixed from 7.0) +CVE_STATUS[CVE-2026-23330] = "cpe-stable-backport: Backported in 6.12.82" CVE_STATUS[CVE-2026-23331] = "fixed-version: only affects 6.13 onwards" @@ -21220,7 +21220,7 @@ CVE_STATUS[CVE-2026-23372] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23373] = "cpe-stable-backport: Backported in 6.12.77" -# CVE-2026-23374 needs backporting (fixed from 7.0) +CVE_STATUS[CVE-2026-23374] = "cpe-stable-backport: Backported in 6.12.82" CVE_STATUS[CVE-2026-23375] = "cpe-stable-backport: Backported in 6.12.78" @@ -21356,7 +21356,7 @@ CVE_STATUS[CVE-2026-23440] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23441] = "cpe-stable-backport: Backported in 6.12.78" -# CVE-2026-23442 needs backporting (fixed from 7.0) +CVE_STATUS[CVE-2026-23442] = "cpe-stable-backport: Backported in 6.12.83" CVE_STATUS[CVE-2026-23443] = "cpe-stable-backport: Backported in 6.12.78" @@ -21458,7 +21458,7 @@ CVE_STATUS[CVE-2026-31405] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-31406] = "cpe-stable-backport: Backported in 6.12.80" -# CVE-2026-31407 needs backporting (fixed from 7.0) +CVE_STATUS[CVE-2026-31407] = "cpe-stable-backport: Backported in 6.12.83" CVE_STATUS[CVE-2026-31408] = "cpe-stable-backport: Backported in 6.12.80" @@ -21502,5 +21502,213 @@ CVE_STATUS[CVE-2026-31427] = "cpe-stable-backport: Backported in 6.12.80" CVE_STATUS[CVE-2026-31428] = "cpe-stable-backport: Backported in 6.12.80" +CVE_STATUS[CVE-2026-31429] = "cpe-stable-backport: Backported in 6.12.82" + +CVE_STATUS[CVE-2026-31430] = "cpe-stable-backport: Backported in 6.12.82" + +# CVE-2026-31431 needs backporting (fixed from 7.0) + +CVE_STATUS[CVE-2026-31432] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31433] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31434] = "cpe-stable-backport: Backported in 6.12.80" + +# CVE-2026-31435 needs backporting (fixed from 7.0) + +CVE_STATUS[CVE-2026-31436] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31437] = "fixed-version: only affects 6.18.17 onwards" + +CVE_STATUS[CVE-2026-31438] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31439] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31440] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31441] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31442] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-31443] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-31444] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31445] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-31446] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31447] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31448] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31449] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31450] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31451] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31452] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31453] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31454] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31455] = "cpe-stable-backport: Backported in 6.12.80" + +# CVE-2026-31456 needs backporting (fixed from 7.0) + +CVE_STATUS[CVE-2026-31457] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-31458] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31459] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-31460] = "fixed-version: only affects 6.19 onwards" + +# CVE-2026-31461 needs backporting (fixed from 7.0) + +CVE_STATUS[CVE-2026-31462] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31463] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-31464] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31465] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-31466] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31467] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31468] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-31469] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31470] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31471] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-31472] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-31473] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31474] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31475] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-31476] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31477] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31478] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31479] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31480] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31481] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-31482] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31483] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31484] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-31485] = "cpe-stable-backport: Backported in 6.12.80" + +# CVE-2026-31486 needs backporting (fixed from 7.0) + +CVE_STATUS[CVE-2026-31487] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31488] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31489] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31490] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-31491] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-31492] = "cpe-stable-backport: Backported in 6.12.80" + +# CVE-2026-31493 needs backporting (fixed from 7.0) + +CVE_STATUS[CVE-2026-31494] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31495] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31496] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31497] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31498] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31499] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-31500] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31501] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-31502] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31503] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31504] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31505] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31506] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31507] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31508] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31509] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31510] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31511] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31512] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31513] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31514] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31515] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31516] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31517] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-31518] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31519] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31520] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31521] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31522] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31523] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31524] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31525] = "cpe-stable-backport: Backported in 6.12.80" + +# CVE-2026-31526 needs backporting (fixed from 7.0) + +CVE_STATUS[CVE-2026-31527] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31528] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31529] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-31530] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31531] = "cpe-stable-backport: Backported in 6.12.83" + +# CVE-2026-31532 has no known resolution + CVE_STATUS[CVE-2026-31788] = "cpe-stable-backport: Backported in 6.12.78"