From patchwork Fri Apr 24 20:55:00 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86865 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 44F25FE520A for ; Fri, 24 Apr 2026 20:56:51 +0000 (UTC) Received: from mail-wm1-f49.google.com (mail-wm1-f49.google.com [209.85.128.49]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31958.1777064199684892796 for ; Fri, 24 Apr 2026 13:56:40 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=hya3Q2+i; spf=pass (domain: smile.fr, ip: 209.85.128.49, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f49.google.com with SMTP id 5b1f17b1804b1-48984d29fe3so91809925e9.0 for ; Fri, 24 Apr 2026 13:56:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064198; x=1777668998; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=7DQ6qCcq9LhnyiydxFfEQpjvQ3Jm0Tc32xr/wsDFXJg=; b=hya3Q2+ilXri4KhwQnUxk43cpyUlJ81oHpbbSStezVDecjc4NddEtI9xe9dF+v7zGa ktDpv3kDXJNhMTbktjk96LlDYTJx80M2KZpBvXCJjqV11YqGxlvynOx64JdWlE3Z37dG b7sIpu9g3SDy6HnadBbURmxmQUNY+A3M5ehf8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064198; x=1777668998; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=7DQ6qCcq9LhnyiydxFfEQpjvQ3Jm0Tc32xr/wsDFXJg=; b=L6daTHZ5KJx4SY5kJOmQmtUoGNyfjMAk2j+cAKcvHyWaKpGF4iAPa9mcWc7hC5kqMJ UYKp4FFJt40HyIZ2yJ1WJmGfpDM/eIT2nhDugC4qFhPr6Kc20mJ+bQmeySMLMqOrGA8p yrkZtEyAPva/aP2ypQKdjE7/ll6aEZ4cRy1sX1SQJnvPCKVvBcy2FzhiBqaY7XhbKRHK 1N3WasSMUnAb0WPfI2FpdwoUJt7JQAv7RgfQH4epCqTDgue6Ln8619QxxR6xLl15oWcm nB7WCPWkXw112erPRE8PbEMVDw2XD179cMDkgXFkRbsq9Psz5rLwI2dhcdtakAlcashE lN6A== X-Gm-Message-State: AOJu0YyD9GCIEAIgV/Z0v4F++mOd9vVAyOiWDNDGILZ2PDb7idLo9fSo K8FFy1JY2IqM9hlzurPPJFZ86BNQP9xIqC9i35JwtXNTJHf4y5st4cVzeAwhHPXV0WREYJr1BCy nju57b8E6kg== X-Gm-Gg: AeBDieueJIFKwEMichFQpzBWaNM3KWmOWXPgbw1AY0nbJaR6T/HR0OkQ0rvdJ7c4yQz DbCv+2HZlE+Z+2hqpOSgmtSZXuy7dtnotCHlfZmYLgrkiIX0BAJM2El5acCVNuguvDcMhUGjTzl xkslwhhRNfaaOSmdux8lnbexgveARmcCPG6LgD73yPUU2+20224y5sZdCQ5v/Nx6Eu/V3/vBKKY H8bvGA2kMZ60Y9XUSpeK5LxBFNZJdFuhwGkz966c/+tGDJIq6wAz/7JEsKnKJzdZYq5OcX85mbq q4r0MTmK8tFdTRL010cKf3u60Kn2tD18Eb+vnKs0JtQXBoDtyyPmja1uBz9LluXIVSL3VrqUudK RnbjcFOgfCo/gINjEW21/MmF2s83OQNExB5KvvDacbYvY3HMmm1gmqhIrgc7LAn01NKOglNagKE 8iMcRYxW+WrU1SlQrvAFXdBwkavSpCt54vj32GSfW/ZOZQISTWugvdeC/+QOQtWMzDlrBLUKsjD vvjMbjT5TddbPwcgzFYosfG6ow+lP65xWS4oQ== X-Received: by 2002:a05:600c:a408:b0:48a:592c:e632 with SMTP id 5b1f17b1804b1-48a592ce943mr155429125e9.16.1777064197861; Fri, 24 Apr 2026 13:56:37 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.37 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:37 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 01/66] spdx30_tasks: fix condition in create_spdx Date: Fri, 24 Apr 2026 22:55:00 +0200 Message-ID: <8071a93c6b619dc9fcc2a7f1bcf94994499defbe.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:51 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235874 From: João Marcos Costa (Schneider Electric) Considering that *detail* is an actual variable, not a string, remove the quotes to make the 'in' statement coherent. Signed-off-by: João Marcos Costa (Schneider Electric) Reviewed-by: Joshua Watt Signed-off-by: Yoann Congal --- meta/lib/oe/spdx30_tasks.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/lib/oe/spdx30_tasks.py b/meta/lib/oe/spdx30_tasks.py index 9c422d17573..b43d626df36 100644 --- a/meta/lib/oe/spdx30_tasks.py +++ b/meta/lib/oe/spdx30_tasks.py @@ -535,7 +535,7 @@ def create_spdx(d): # specified. if ( include_vex != "all" - and "detail" in ("fixed-version", "cpe-stable-backport") + and detail in ("fixed-version", "cpe-stable-backport") ): bb.debug(1, "Skipping %s since it is already fixed upstream" % cve_id) continue From patchwork Fri Apr 24 20:55:01 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86858 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 612C8FED3FE for ; Fri, 24 Apr 2026 20:56:50 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32570.1777064200509400573 for ; Fri, 24 Apr 2026 13:56:40 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=1xZ16Ecp; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488b3f8fa2bso82756515e9.1 for ; Fri, 24 Apr 2026 13:56:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064199; x=1777668999; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=GTbHO/EIJ5szmwYdNUhQOMlbAkQZ3OZy8i+BqtH2owA=; b=1xZ16EcpGCprXyegCkXK4YbJqIagcwCdJpOjjnO74KRrjifurFjvPjzQ6ewhfGeIzy 6eHEkr2+Lof8Oa6q19/HVlFM4mEti0jjyZemWu0HBPJxoHymTZ+p4/PT23RCA9qvwBqf 9lgiGHG3AKovFKULdvSKFx4GmjD3M7JXu3RdM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064199; x=1777668999; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=GTbHO/EIJ5szmwYdNUhQOMlbAkQZ3OZy8i+BqtH2owA=; b=cS3yDXRYO0WUrOPHPsMMeeqA+AB/GoNIQrPOQZpFTCVobLDggGqf/ch4NpPn/vNTg0 z2ztBhEu4FiktE61k6g+IRZsMAycVQCb58qIFxHa8Zu7qd6yadyTPqpoBqrVU5mrs5yF Tmj0/Cl+R1DW10dcp+UoIsoy0fZszwmGtHro2TpcJjeJNmU861dPHQe1/Yx49napaoWJ iAScUI5WzL+Nwch87kEMQEY0svbv3mgTikWQXfnC9/cIEHP64fObEy6AUUFQsys3J2zB a0aL+DeuU1TlWOVDe0Q8cv1+QfDoB8e18MiRdRb1VPnkxAh6+wckgDUKqOlMjXn3El6b hT9w== X-Gm-Message-State: AOJu0YztpVVN37S0m3IevTPkDcHxwdGGjI5P1xnTzUJhTJDZQgD9dwzW XnVk/dWOTghMNPn4VKjnt5myI9vxCpy1PuPnOMrjni3q3Qeb8yaiT6jRcPdrRWMhWcun3tmcRu6 N679rZuhXXsrY X-Gm-Gg: AeBDiesC9FpN9Q9Q/3jQ8Wx8xVruNN4am0Gj7CdkLPV1zM89Sdwgu6IR9K69x+R8W0M /7+Gpb+ml4Rj0OyLMtVdhEnBDXpaUG0E7ZtqF0nl+5RFEO4uF9UKKYPcCHo2Yr0wu78dQBi0vPI Gab6MCA9SwJNK0x642hqvG/cyq3+GaGVWmEgGQUEUgKAXnTpurlmx4pEYnM4k7Zu84Oc5yWJs0g hHqkIbINhMguI9MFC2BnxQp3BpMu140idHLGi7NGrQwsyT5fjE/6AZ585VccizfJc9QDAij20wB Wqcwai25/C4vBngiDMeSNdw7h9SEviy+GoAKy3NOmH8DkmqWytIYgWI1JKO60dvgmjrfUVNUNNw cRIJE79j3MH8KB4cWGieQQCq/9mBpIm/ZT126X6hVebkZfFNi3y4qwzSFOTqadC8I8c1iP29Ggn mo+B7EQCQLb0IBsBuhr2xwrPSomErihFNXP2WoNcHFnig7tgZz6FlG+zF5VYBGVT1YytUIZ19y0 t92oQCObzJHuV2dAfZGoBBASicK7jseMw8Xyg== X-Received: by 2002:a05:600c:3b2a:b0:48a:534a:eed8 with SMTP id 5b1f17b1804b1-48a534af0ffmr267687945e9.1.1777064198698; Fri, 24 Apr 2026 13:56:38 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.37 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:38 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 02/66] tzdata/tzcode-native: upgrade 2025c -> 2026a Date: Fri, 24 Apr 2026 22:55:01 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:50 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235875 From: Jinfeng Wang Signed-off-by: Jinfeng Wang Signed-off-by: Richard Purdie (cherry picked from commit 217ede26d64901d9a38fc119efa684487714c08a) Signed-off-by: Vijay Anusuri Signed-off-by: Yoann Congal --- meta/recipes-extended/timezone/timezone.inc | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/meta/recipes-extended/timezone/timezone.inc b/meta/recipes-extended/timezone/timezone.inc index 35f22d5a15a..71b034d1581 100644 --- a/meta/recipes-extended/timezone/timezone.inc +++ b/meta/recipes-extended/timezone/timezone.inc @@ -6,7 +6,7 @@ SECTION = "base" LICENSE = "PD & BSD-3-Clause" LIC_FILES_CHKSUM = "file://LICENSE;md5=c679c9d6b02bc2757b3eaf8f53c43fba" -PV = "2025c" +PV = "2026a" SRC_URI =" http://www.iana.org/time-zones/repository/releases/tzcode${PV}.tar.gz;name=tzcode;subdir=tz \ http://www.iana.org/time-zones/repository/releases/tzdata${PV}.tar.gz;name=tzdata;subdir=tz \ @@ -16,5 +16,5 @@ S = "${WORKDIR}/tz" UPSTREAM_CHECK_URI = "http://www.iana.org/time-zones" -SRC_URI[tzcode.sha256sum] = "697ebe6625444aef5080f58e49d03424bbb52e08bf483d3ddb5acf10cbd15740" -SRC_URI[tzdata.sha256sum] = "4aa79e4effee53fc4029ffe5f6ebe97937282ebcdf386d5d2da91ce84142f957" +SRC_URI[tzcode.sha256sum] = "f80a17a2eddd2b54041f9c98d75b0aa8038b016d7c5de72892a146d9938740e1" +SRC_URI[tzdata.sha256sum] = "77b541725937bb53bd92bd484c0b43bec8545e2d3431ee01f04ef8f2203ba2b7" From patchwork Fri Apr 24 20:55:02 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86869 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E0C18FC037D for ; Fri, 24 Apr 2026 20:56:50 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32571.1777064201860621300 for ; Fri, 24 Apr 2026 13:56:42 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=wDNFLFv6; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-4890098abbaso62799885e9.0 for ; Fri, 24 Apr 2026 13:56:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064200; x=1777669000; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=CN2hsHy1f9+r7BGavsbvI+gLY4+bduZll/6OF9nREFk=; b=wDNFLFv6y3djDRg/uq2TYst17Tan7KVSvChnf3Rm2DHM5btPpLQPohz6Qx57FsFNTt wQN3BchAzG8upgfDLRFWlFmTpj9lar7q3ctIJZe640pwklE8Wup1Af4FQuPKIKtDn6CM VtOjG2DX0tESW3pjCIgrDO+idOLxPYAX/qzo4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064200; x=1777669000; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=CN2hsHy1f9+r7BGavsbvI+gLY4+bduZll/6OF9nREFk=; b=XYBrpVwKCs57rp5S76s3Ata8Mk92k6EK0dJosv17CAxRspFnvAtSz7rUQz9+g581q7 UJsvpF6j7WwKwjw4Ilf6JOhcb6K1f6j3rDRNHJTEuuFB+KNcfI6IGpcR7waxkN+fF6vH T69wM2TM7lnWpa+0y9YLUt999oC+1NVZHq39TkDL5GOGMk1V+5+aTXUvdmI+L24VSqos U6oJCR1MKtjSW6FPOvlXPu2m5OTdCXOojS1n9IEHs0bXRySAl7f8wkszWJ3QH4oIAAci PXQ2Ya7q3AsWAGP/ycw717VfvPWCRwxwjDPaJjXqSMTDHkVDdyKxqeXiMm/8oGOuG8oR +b8Q== X-Gm-Message-State: AOJu0YyEtTH4kKch8R9yyvwEVpUm8+o5L4Zv3BuWb2c5WePzvD83a0UZ bQ/DMdATn31QedJY2JLxQOS0I1wj/6Cd8QfZ8+ZHlhP9FuMr1lCAYF3ouOeV/lZJTULl+3cPSpK dMHDKwTLV4Kfy X-Gm-Gg: AeBDievc2kx/tNjqmoQQgxyf8bEzrK83BsXEi2gDy0gn/WmpLHN5g2wsrmpb5BXw0SJ t1cAXSURKgCi4vp5jr7e45GG8cliELl1QoVy6v305Fa7l7Ocf0UDpH8BIdPkN2y98KphtDNNOOr WImUpDxYHPRNuZxcsa2qrE8/gp3cRkM47EMq28Srn7CXADGgoFDTH8qzF8+KJdhwUJMOYi3zQcu Cv6EeeG20L7QzVmZYsZn83xWHYrPk1Yd2JT2ISM759/oXSqAh5S/STvo6T3sMWPBskIXhztV0uE 3H8Nwihew61Uq/vTX7uyIpt0lsSKG9CaVMtczFu8UWPuEHZGyGeV0WzW8XMuGOAtmwV4taLfOEK 9UwviHH/WRu0tAOiyMUXrj/Zv2+N7QeRn5qelNTCwBZC9Zp2z/MtPe6xkmRps5bdzhr6t7T+1Aa yfUsBxGpmBSiq9IidJUebWw9c8skqgfl3HdDbi21Q96RrHMfdk/rIINT4SKZxHl5O2aPPq6P36q rgTxc3CPBLk5ErxPyhOKUe4POnK1JbacPhkRA== X-Received: by 2002:a05:600c:c10e:b0:488:8185:e672 with SMTP id 5b1f17b1804b1-488fb792e84mr380611065e9.30.1777064199600; Fri, 24 Apr 2026 13:56:39 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.38 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:38 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 03/66] libarchive: Fix CVE-2026-4111 Date: Fri, 24 Apr 2026 22:55:02 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:50 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235876 From: Vijay Anusuri Pick patch according to [1] [1] https://security-tracker.debian.org/tracker/CVE-2026-4111 [2] https://github.com/libarchive/libarchive/pull/2877 [3] https://access.redhat.com/errata/RHSA-2026:5063 Signed-off-by: Vijay Anusuri Signed-off-by: Yoann Congal --- .../libarchive/CVE-2026-4111-1.patch | 32 ++ .../libarchive/CVE-2026-4111-2.patch | 308 ++++++++++++++++++ .../libarchive/libarchive_3.7.9.bb | 2 + 3 files changed, 342 insertions(+) create mode 100644 meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-1.patch create mode 100644 meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-2.patch diff --git a/meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-1.patch b/meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-1.patch new file mode 100644 index 00000000000..f908b60775d --- /dev/null +++ b/meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-1.patch @@ -0,0 +1,32 @@ +From 7273d04803a1e5a482f26d8d0fbaf2b204a72168 Mon Sep 17 00:00:00 2001 +From: Tim Kientzle +Date: Sun, 1 Mar 2026 20:24:56 -0800 +Subject: [PATCH] Reject filters when the block length is nonsensical + +Credit: Grzegorz Antoniak @antekone + +Upstream-Status: Backport [https://github.com/libarchive/libarchive/commit/7273d04803a1e5a482f26d8d0fbaf2b204a72168] +CVE: CVE-2026-4111 +Signed-off-by: Vijay Anusuri +--- + libarchive/archive_read_support_format_rar5.c | 4 +++- + 1 file changed, 3 insertions(+), 1 deletion(-) + +diff --git a/libarchive/archive_read_support_format_rar5.c b/libarchive/archive_read_support_format_rar5.c +index 1dd0d88..736c95a 100644 +--- a/libarchive/archive_read_support_format_rar5.c ++++ b/libarchive/archive_read_support_format_rar5.c +@@ -2965,7 +2965,9 @@ static int parse_filter(struct archive_read* ar, const uint8_t* p) { + if(block_length < 4 || + block_length > 0x400000 || + filter_type > FILTER_ARM || +- !is_valid_filter_block_start(rar, block_start)) ++ !is_valid_filter_block_start(rar, block_start) || ++ (rar->cstate.window_size > 0 && ++ (ssize_t)block_length > rar->cstate.window_size >> 1)) + { + archive_set_error(&ar->archive, ARCHIVE_ERRNO_FILE_FORMAT, + "Invalid filter encountered"); +-- +2.43.0 + diff --git a/meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-2.patch b/meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-2.patch new file mode 100644 index 00000000000..18037ed61ac --- /dev/null +++ b/meta/recipes-extended/libarchive/libarchive/CVE-2026-4111-2.patch @@ -0,0 +1,308 @@ +From ef53e2023d75a205cf7cbddb5d01c4cc592e9ce4 Mon Sep 17 00:00:00 2001 +From: Tim Kientzle +Date: Sun, 1 Mar 2026 10:04:01 -0800 +Subject: [PATCH] Infinite loop in Rar5 decompression + +Found by: Elhanan Haenel + +Upstream-Status: Backport [https://github.com/libarchive/libarchive/commit/ef53e2023d75a205cf7cbddb5d01c4cc592e9ce4] +CVE: CVE-2026-4111 +Signed-off-by: Vijay Anusuri +--- + Makefile.am | 2 + + libarchive/test/CMakeLists.txt | 1 + + .../test/test_read_format_rar5_loop_bug.c | 53 +++++ + .../test_read_format_rar5_loop_bug.rar.uu | 189 ++++++++++++++++++ + 4 files changed, 245 insertions(+) + create mode 100644 libarchive/test/test_read_format_rar5_loop_bug.c + create mode 100644 libarchive/test/test_read_format_rar5_loop_bug.rar.uu + +diff --git a/Makefile.am b/Makefile.am +index 7627ec5..e37312e 100644 +--- a/Makefile.am ++++ b/Makefile.am +@@ -521,6 +521,7 @@ libarchive_test_SOURCES= \ + libarchive/test/test_read_format_rar_invalid1.c \ + libarchive/test/test_read_format_rar_overflow.c \ + libarchive/test/test_read_format_rar5.c \ ++ libarchive/test/test_read_format_rar5_loop_bug.c \ + libarchive/test/test_read_format_raw.c \ + libarchive/test/test_read_format_tar.c \ + libarchive/test/test_read_format_tar_concatenated.c \ +@@ -918,6 +919,7 @@ libarchive_test_EXTRA_DIST=\ + libarchive/test/test_read_format_rar5_invalid_dict_reference.rar.uu \ + libarchive/test/test_read_format_rar5_leftshift1.rar.uu \ + libarchive/test/test_read_format_rar5_leftshift2.rar.uu \ ++ libarchive/test/test_read_format_rar5_loop_bug.rar.uu \ + libarchive/test/test_read_format_rar5_multiarchive.part01.rar.uu \ + libarchive/test/test_read_format_rar5_multiarchive.part02.rar.uu \ + libarchive/test/test_read_format_rar5_multiarchive.part03.rar.uu \ +diff --git a/libarchive/test/CMakeLists.txt b/libarchive/test/CMakeLists.txt +index 59c5f5d..d7ec64e 100644 +--- a/libarchive/test/CMakeLists.txt ++++ b/libarchive/test/CMakeLists.txt +@@ -165,6 +165,7 @@ IF(ENABLE_TEST) + test_read_format_rar_filter.c + test_read_format_rar_overflow.c + test_read_format_rar5.c ++ test_read_format_rar5_loop_bug.c + test_read_format_raw.c + test_read_format_tar.c + test_read_format_tar_concatenated.c +diff --git a/libarchive/test/test_read_format_rar5_loop_bug.c b/libarchive/test/test_read_format_rar5_loop_bug.c +new file mode 100644 +index 0000000..77dd78c +--- /dev/null ++++ b/libarchive/test/test_read_format_rar5_loop_bug.c +@@ -0,0 +1,53 @@ ++/*- ++ * Copyright (c) 2026 Tim Kientzle ++ * All rights reserved. ++ * ++ * Redistribution and use in source and binary forms, with or without ++ * modification, are permitted provided that the following conditions ++ * are met: ++ * 1. Redistributions of source code must retain the above copyright ++ * notice, this list of conditions and the following disclaimer. ++ * 2. Redistributions in binary form must reproduce the above copyright ++ * notice, this list of conditions and the following disclaimer in the ++ * documentation and/or other materials provided with the distribution. ++ * ++ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR ++ * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES ++ * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. ++ * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT, ++ * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT ++ * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, ++ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY ++ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT ++ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF ++ * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ++ */ ++#include "test.h" ++ ++DEFINE_TEST(test_read_format_rar5_loop_bug) ++{ ++ const char *reffile = "test_read_format_rar5_loop_bug.rar"; ++ struct archive_entry *ae; ++ struct archive *a; ++ const void *buf; ++ size_t size; ++ la_int64_t offset; ++ ++ extract_reference_file(reffile); ++ assert((a = archive_read_new()) != NULL); ++ assertEqualIntA(a, ARCHIVE_OK, archive_read_support_filter_all(a)); ++ assertEqualIntA(a, ARCHIVE_OK, archive_read_support_format_all(a)); ++ assertEqualIntA(a, ARCHIVE_OK, archive_read_open_filename(a, reffile, 10240)); ++ ++ // This has just one entry ++ assertEqualIntA(a, ARCHIVE_OK, archive_read_next_header(a, &ae)); ++ ++ // Read blocks until the end of the entry ++ while (ARCHIVE_OK == archive_read_data_block(a, &buf, &size, &offset)) { ++ } ++ ++ assertEqualIntA(a, ARCHIVE_EOF, archive_read_next_header(a, &ae)); ++ ++ assertEqualIntA(a, ARCHIVE_OK, archive_read_close(a)); ++ assertEqualInt(ARCHIVE_OK, archive_free(a)); ++} +diff --git a/libarchive/test/test_read_format_rar5_loop_bug.rar.uu b/libarchive/test/test_read_format_rar5_loop_bug.rar.uu +new file mode 100644 +index 0000000..3e47004 +--- /dev/null ++++ b/libarchive/test/test_read_format_rar5_loop_bug.rar.uu +@@ -0,0 +1,189 @@ ++begin 644 test_read_format_rar5_loop_bug.rar ++M4F%R(1H'`0#%&C,R`P$``)T-9%L.`@+P0`"`@`P`@`,``6'(WFP@`?\7_U/^ ++M8@!.`B`H```````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++M```````````````````````````````````````````````````````````` ++5```````````````````Y^;*!`@4` ++` ++end +-- +2.43.0 + diff --git a/meta/recipes-extended/libarchive/libarchive_3.7.9.bb b/meta/recipes-extended/libarchive/libarchive_3.7.9.bb index b62c3d69b95..bc0d3ba0743 100644 --- a/meta/recipes-extended/libarchive/libarchive_3.7.9.bb +++ b/meta/recipes-extended/libarchive/libarchive_3.7.9.bb @@ -44,6 +44,8 @@ SRC_URI = "http://libarchive.org/downloads/libarchive-${PV}.tar.gz \ file://0001-Merge-pull-request-2768-from-Commandoss-master.patch \ file://CVE-2025-60753-01.patch \ file://CVE-2025-60753-02.patch \ + file://CVE-2026-4111-1.patch \ + file://CVE-2026-4111-2.patch \ " UPSTREAM_CHECK_URI = "http://libarchive.org/" From patchwork Fri Apr 24 20:55:03 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86867 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3B37EFE5215 for ; Fri, 24 Apr 2026 20:56:51 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31960.1777064202091204057 for ; Fri, 24 Apr 2026 13:56:42 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=Fdy6uN/R; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-48a3e9862f0so42144315e9.1 for ; Fri, 24 Apr 2026 13:56:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064200; x=1777669000; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=heXD1Inzkdy31u/ZFQfa039CDirI/gzWSWIknMZUfiA=; b=Fdy6uN/Rz6EbXe3eLANLW6yNaRDYOAv9j3S6N/Fypg3KenkACg0AykCvMfJgVTwyim /GYJrLUFA37Cw1H8r1acp6HzkFq6P0XlfjJCDDSrlAfggHzgcRwonLouCVmdebHUGRs4 ZcO374fNp9nwAmqkUY37Hdxt7baBkOHqEwMOc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064200; x=1777669000; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=heXD1Inzkdy31u/ZFQfa039CDirI/gzWSWIknMZUfiA=; b=cDhpjt6Z0DPKpoUZCcQiUVM3+SJaC7rLR8dJHzRY820ts66NkXH3Pk7WYTZy4ATtZy Q9wZoBqO2+6fkBwcg3u74TMcVeQ1VjKYpDC7oNEGb1UjD+Es0UcGWLm2rJvgXrJlr1DX 0f5kuqFnWflLU1yooop28SO2UdbonDYO7XAdTyC78PHlt2boTB4szW/CmyhQXC6VQkVy ZbbXgsxv1IJbJLZDPjFeaoqYN8tJ3YbvcaN+HnL9gIRylnSl3VQpjHCtKdsM948170uq keU+sIubh+SZcji7q3tFVw8UqcYTQk/PVOET/GwyRrTFzr5seeU96KExH1q95mw9dScG WX8A== X-Gm-Message-State: AOJu0YwyhG6cspYmtZ6mJoivqeitHa7zKM/UMrDv7+GPWeaL7cK60/tH +wXCrqUUjDfqUpKqSa9AI6Ij6Tjs2wKDFG3tuZnzY/2Iix801W/IzrxE7ib4LpqvHKGmHVKnJYG /RMUmSS0gTt85 X-Gm-Gg: AeBDievT2WOIy0RAYmt8r4aETEcFD7CLRqDYCMccVrpD3jkgZQwNOU6Qs0NmWVc72Ek 8kwoZ61ZWJV3wp0hqlrAtLRvw1twgg5pIXdXSeoUHUv7bfBgX0qNYUbmAFw++TvJGJu6A8ySfll Og1SElz0JqJRE1ZMiMWt+NGho1febm9w5XsrxHYXvsGGMlKOm3m3EWMF8jLJ/Qv4/RygZgRYU7Z 7DgoqKo12U0P0kGikGXuCqUbI5QmMIAounO5eXgbysw1N5vmTmFh/xLoEcFSFy1pzHJLglCkAWO J/DrBVMNof5jArc+8lzJZ73yPZ45a+rUPxPM/JOMqrOsKw364fKrLAeilv+eTHUXfzVaWXFfEe0 KLkxyUJi7ZUKSj1bhsTwZD2Ajs8JRzz5wkMivZasQDtzbmLLax017aHbMyaOPoT4sdPFZDbxuPy qMrzHLJWS2h9vGKJz4T7nSMUHGi1z/BSz8TnQSQCJNVPsgyu/x2Md440jqclI5j7SzAiDg8zhMf FmSyXPXfsVCBv4/7eL1jbrD6ROMImmtIF9mFQ== X-Received: by 2002:a05:600c:870e:b0:488:aa33:dc8f with SMTP id 5b1f17b1804b1-488fb84ffb8mr449607205e9.0.1777064200167; Fri, 24 Apr 2026 13:56:40 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.39 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:39 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 04/66] curl: patch CVE-2026-1965 Date: Fri, 24 Apr 2026 22:55:03 +0200 Message-ID: <0fc5d35a56900701b5ec8b53646448dd5fac537a.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:51 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235877 From: Vijay Anusuri pick patches from ubuntu per [1] [1] http://archive.ubuntu.com/ubuntu/pool/main/c/curl/curl_8.5.0-2ubuntu10.8.debian.tar.xz [2] https://ubuntu.com/security/CVE-2026-1965 [3] https://curl.se/docs/CVE-2026-1965.html Signed-off-by: Vijay Anusuri Signed-off-by: Yoann Congal --- .../curl/curl/CVE-2026-1965-1.patch | 102 ++++++++++++++++++ .../curl/curl/CVE-2026-1965-2.patch | 34 ++++++ meta/recipes-support/curl/curl_8.7.1.bb | 2 + 3 files changed, 138 insertions(+) create mode 100644 meta/recipes-support/curl/curl/CVE-2026-1965-1.patch create mode 100644 meta/recipes-support/curl/curl/CVE-2026-1965-2.patch diff --git a/meta/recipes-support/curl/curl/CVE-2026-1965-1.patch b/meta/recipes-support/curl/curl/CVE-2026-1965-1.patch new file mode 100644 index 00000000000..acc8bfe0442 --- /dev/null +++ b/meta/recipes-support/curl/curl/CVE-2026-1965-1.patch @@ -0,0 +1,102 @@ +From 34fa034d9a390c4bd65e2d05262755ec8646ac12 Mon Sep 17 00:00:00 2001 +From: Daniel Stenberg +Date: Thu, 5 Feb 2026 08:34:21 +0100 +Subject: [PATCH] url: fix reuse of connections using HTTP Negotiate + +Assume Negotiate means connection-based + +Reported-by: Zhicheng Chen +Closes #20534 + +Upstream-Status: Backport [https://github.com/curl/curl/commit/34fa034d9a390c4bd6] +Backported by Ubuntu team http://archive.ubuntu.com/ubuntu/pool/main/c/curl/curl_8.5.0-2ubuntu10.8.debian.tar.xz + +CVE: CVE-2026-1965 +Signed-off-by: Vijay Anusuri +--- + lib/url.c | 62 +++++++++++++++++++++++++++++++++++++++++++++++++++++++ + 1 file changed, 62 insertions(+) + +diff --git a/lib/url.c b/lib/url.c +index 1439c9e..792c422 100644 +--- a/lib/url.c ++++ b/lib/url.c +@@ -936,6 +936,18 @@ ConnectionExists(struct Curl_easy *data, + #else + bool wantProxyNTLMhttp = FALSE; + #endif ++#endif ++ ++#if !defined(CURL_DISABLE_HTTP) && defined(USE_SPNEGO) ++ bool wantNegohttp = ++ (data->state.authhost.want & CURLAUTH_NEGOTIATE) && ++ (needle->handler->protocol & PROTO_FAMILY_HTTP); ++#ifndef CURL_DISABLE_PROXY ++ bool wantProxyNegohttp = ++ needle->bits.proxy_user_passwd && ++ (data->state.authproxy.want & CURLAUTH_NEGOTIATE) && ++ (needle->handler->protocol & PROTO_FAMILY_HTTP); ++#endif + #endif + /* plain HTTP with upgrade */ + bool h2upgrade = (data->state.httpwant == CURL_HTTP_VERSION_2_0) && +@@ -1274,6 +1286,56 @@ ConnectionExists(struct Curl_easy *data, + } + #endif + ++#ifdef USE_SPNEGO ++ /* If we are looking for an HTTP+Negotiate connection, check if this is ++ already authenticating with the right credentials. If not, keep looking ++ so that we can reuse Negotiate connections if possible. */ ++ if(wantNegohttp) { ++ if(Curl_timestrcmp(needle->user, check->user) || ++ Curl_timestrcmp(needle->passwd, check->passwd)) ++ continue; ++ } ++ else if(check->http_negotiate_state != GSS_AUTHNONE) { ++ /* Connection is using Negotiate auth but we do not want Negotiate */ ++ continue; ++ } ++ ++#ifndef CURL_DISABLE_PROXY ++ /* Same for Proxy Negotiate authentication */ ++ if(wantProxyNegohttp) { ++ /* Both check->http_proxy.user and check->http_proxy.passwd can be ++ * NULL */ ++ if(!check->http_proxy.user || !check->http_proxy.passwd) ++ continue; ++ ++ if(Curl_timestrcmp(needle->http_proxy.user, ++ check->http_proxy.user) || ++ Curl_timestrcmp(needle->http_proxy.passwd, ++ check->http_proxy.passwd)) ++ continue; ++ } ++ else if(check->proxy_negotiate_state != GSS_AUTHNONE) { ++ /* Proxy connection is using Negotiate auth but we do not want Negotiate */ ++ continue; ++ } ++#endif ++ if(wantNTLMhttp || wantProxyNTLMhttp) { ++ /* Credentials are already checked, we may use this connection. We MUST ++ * use a connection where it has already been fully negotiated. If it has ++ * not, we keep on looking for a better one. */ ++ chosen = check; ++ if((wantNegohttp && ++ (check->http_negotiate_state != GSS_AUTHNONE)) || ++ (wantProxyNegohttp && ++ (check->proxy_negotiate_state != GSS_AUTHNONE))) { ++ /* We must use this connection, no other */ ++ *force_reuse = TRUE; ++ break; ++ } ++ continue; /* get another */ ++ } ++#endif ++ + if(CONN_INUSE(check)) { + DEBUGASSERT(canmultiplex); + DEBUGASSERT(check->bits.multiplex); +-- +2.43.0 + diff --git a/meta/recipes-support/curl/curl/CVE-2026-1965-2.patch b/meta/recipes-support/curl/curl/CVE-2026-1965-2.patch new file mode 100644 index 00000000000..07dbf4e973b --- /dev/null +++ b/meta/recipes-support/curl/curl/CVE-2026-1965-2.patch @@ -0,0 +1,34 @@ +From f1a39f221d57354990e3eeeddc3404aede2aff70 Mon Sep 17 00:00:00 2001 +From: Daniel Stenberg +Date: Sat, 21 Feb 2026 18:11:41 +0100 +Subject: [PATCH] url: fix copy and paste url_match_auth_nego mistake + +Follow-up to 34fa034 +Reported-by: dahmono on github +Closes #20662 + +Upstream-Status: Backport [https://github.com/curl/curl/commit/f1a39f221d57354990] +Backported by Ubuntu team http://archive.ubuntu.com/ubuntu/pool/main/c/curl/curl_8.5.0-2ubuntu10.8.debian.tar.xz + +CVE: CVE-2026-1965 +Signed-off-by: Vijay Anusuri +--- + lib/url.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/lib/url.c b/lib/url.c +index 792c422..22ed0be 100644 +--- a/lib/url.c ++++ b/lib/url.c +@@ -1319,7 +1319,7 @@ ConnectionExists(struct Curl_easy *data, + continue; + } + #endif +- if(wantNTLMhttp || wantProxyNTLMhttp) { ++ if(wantNegohttp || wantProxyNegohttp) { + /* Credentials are already checked, we may use this connection. We MUST + * use a connection where it has already been fully negotiated. If it has + * not, we keep on looking for a better one. */ +-- +2.43.0 + diff --git a/meta/recipes-support/curl/curl_8.7.1.bb b/meta/recipes-support/curl/curl_8.7.1.bb index 9e37684b2cc..0b4c93ec66c 100644 --- a/meta/recipes-support/curl/curl_8.7.1.bb +++ b/meta/recipes-support/curl/curl_8.7.1.bb @@ -32,6 +32,8 @@ SRC_URI = " \ file://CVE-2025-14819.patch \ file://CVE-2025-15079.patch \ file://CVE-2025-15224.patch \ + file://CVE-2026-1965-1.patch \ + file://CVE-2026-1965-2.patch \ " SRC_URI:append:class-nativesdk = " \ From patchwork Fri Apr 24 20:55:04 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86870 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4F7FBFE5218 for ; Fri, 24 Apr 2026 20:56:51 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32573.1777064202600700732 for ; Fri, 24 Apr 2026 13:56:42 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=KFuUdff9; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488e1a8ac40so101192365e9.2 for ; Fri, 24 Apr 2026 13:56:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064201; x=1777669001; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=8YcwZ540DUifD4V6KsO5S8rGugtz37qMuR8sr2Em/PU=; b=KFuUdff9CjhHih6wH03T22dTOFTYNxDPaFO2VTuaBI3YJMGEglJCZxhDWicKJzQY7S SRA81JKLf8uzIc+c9QBo6OuOv6HbNLk02Ot29LZk2NnIA+lWfMpw8zawSkhbYvtAHH3E wQJlMgCF6MFsTdCGfOpij0chCtdcWxxL31PrA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064201; x=1777669001; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=8YcwZ540DUifD4V6KsO5S8rGugtz37qMuR8sr2Em/PU=; b=DDx0rSW/e2A/8H14MZli7CIKiUjcdlmInDEW+iqDS5MtydAEePFQmjzWxAoNNy/VlB 7yf7I5sgdrt8MxVDVGhfH+RByHtLBewrHpYX2CI5aum++Ya6xZnKb1DgKI3Drwp+iGMo hbf+G0oy1N/uYJH89Qn+fa7A55CjuE6Ij+H+j4UE/OiggXRtigYLrF6HiPSup6N03qdf mxPYx2JyJJ0oswJDADUUUltpJ1sdjBcQsuB7IdPjLfCiMFcPesCMwY8SUdwCFgEl/4Ih 1BTFabHMHJ8muexAZPdxh8EbkbX+DpWN06yaT/9vUf9axRSepyi4HYnVS/avDPBEn25e ef1A== X-Gm-Message-State: AOJu0Ywliex6TgX8CRQrwf1T1fhHEegayPrlHP+ykqt39hbY069933UZ ITKfWAGKkesBhsnkOkNRTyaLy6fkUlqT+LxUf0SdXZdbQi+K4fX+1ePYUUkXAry8l/whQLDiXee 4jFlC+ydxeShX X-Gm-Gg: AeBDietEpXbVK1+/7JNnO9Cd732ivyDqik4/bTQhUxfcYGx9snReXed+7eVJNAOSiNy 0gLZRSQDZBsflvi/ylKgu+g3G7+idvy/xTBqfFt5k3BBQikuyDvYFlp4jEqwVJqh5x+ODYR8eZm 7J+dDsEXKUM7wazdrkomCcY0MpimOk0odcu/mLgBwbyWkNS3nzMvIWRvKg3QL9a+I3kuZ3HY94m +UDLVOz2Z4jaW9IffZdEvhhlWXi8wr/snzrzqpnigz2gWcqGmeQ1jeQSMrs5/5i5i7l7KxoytYh Tgwx442ny3bw2bP3Q7uCvVcs/BfqTg/b8kNt6MeV0a5AHMuz0Muk8D03FjTli7n3DsrsbzkHOZh IbOo+niZAYzkePFoVOEOgw4QsfzxJaWHVDMGKcRxyZsvp045e1te8vMN/V2aNTC86B0fJfEHxem 61N9nOdmEmOcSBZmHbrqdqZsecaFUeg3MksEqIcN9+V4GJKRHbeCb83QCbRQHawHh+jMiH6mTxh HzHnXrvdFGtl5DseGPF4mUei7w2D2sGM7+uu5axipVs3gu2 X-Received: by 2002:a05:600c:c4ab:b0:487:1fb4:7e1 with SMTP id 5b1f17b1804b1-488fb7864c3mr475614255e9.22.1777064200734; Fri, 24 Apr 2026 13:56:40 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.40 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:40 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 05/66] curl: patch CVE-2026-3783 Date: Fri, 24 Apr 2026 22:55:04 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:51 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235878 From: Vijay Anusuri pick patches from ubuntu per [1] [1] http://archive.ubuntu.com/ubuntu/pool/main/c/curl/curl_8.5.0-2ubuntu10.8.debian.tar.xz [2] https://ubuntu.com/security/CVE-2026-3783 [3] https://curl.se/docs/CVE-2026-3783.html Signed-off-by: Vijay Anusuri Signed-off-by: Yoann Congal --- .../curl/curl/CVE-2026-3783.patch | 153 ++++++++++++++++++ meta/recipes-support/curl/curl_8.7.1.bb | 1 + 2 files changed, 154 insertions(+) create mode 100644 meta/recipes-support/curl/curl/CVE-2026-3783.patch diff --git a/meta/recipes-support/curl/curl/CVE-2026-3783.patch b/meta/recipes-support/curl/curl/CVE-2026-3783.patch new file mode 100644 index 00000000000..609b519ddb4 --- /dev/null +++ b/meta/recipes-support/curl/curl/CVE-2026-3783.patch @@ -0,0 +1,153 @@ +From e3d7401a32a46516c9e5ee877e613e62ed35bddc Mon Sep 17 00:00:00 2001 +From: Daniel Stenberg +Date: Fri, 6 Mar 2026 23:13:07 +0100 +Subject: [PATCH] http: only send bearer if auth is allowed + +Verify with test 2006 + +Closes #20843 + +Upstream-Status: Backport [https://github.com/curl/curl/commit/e3d7401a32a46516c9e5ee877] +Backported by Ubuntu team http://archive.ubuntu.com/ubuntu/pool/main/c/curl/curl_8.5.0-2ubuntu10.8.debian.tar.xz + +CVE: CVE-2026-3783 +Signed-off-by: Vijay Anusuri +--- + lib/http.c | 1 + + tests/data/Makefile.inc | 2 +- + tests/data/test2006 | 98 +++++++++++++++++++++++++++++++++++++++++ + 3 files changed, 100 insertions(+), 1 deletion(-) + create mode 100644 tests/data/test2006 + +diff --git a/lib/http.c b/lib/http.c +index a764d3c..b80bebf 100644 +--- a/lib/http.c ++++ b/lib/http.c +@@ -673,6 +673,7 @@ output_auth_headers(struct Curl_easy *data, + if(authstatus->picked == CURLAUTH_BEARER) { + /* Bearer */ + if((!proxy && data->set.str[STRING_BEARER] && ++ Curl_auth_allowed_to_host(data) && + !Curl_checkheaders(data, STRCONST("Authorization")))) { + auth = "Bearer"; + result = http_output_bearer(data); +diff --git a/tests/data/Makefile.inc b/tests/data/Makefile.inc +index 4c2cd52..9fb9274 100644 +--- a/tests/data/Makefile.inc ++++ b/tests/data/Makefile.inc +@@ -230,7 +230,7 @@ test1941 test1942 test1943 test1944 test1945 test1946 test1947 test1948 \ + test1955 test1956 test1957 test1958 test1959 test1960 test1964 \ + test1970 test1971 test1972 test1973 test1974 test1975 \ + \ +-test2000 test2001 test2002 test2003 test2004 test2005 \ ++test2000 test2001 test2002 test2003 test2004 test2005 test2006 \ + \ + test2023 \ + test2024 test2025 test2026 test2027 test2028 test2029 test2030 test2031 \ +diff --git a/tests/data/test2006 b/tests/data/test2006 +new file mode 100644 +index 0000000..4b8b269 +--- /dev/null ++++ b/tests/data/test2006 +@@ -0,0 +1,98 @@ ++ ++ ++ ++ ++netrc ++HTTP ++ ++ ++# Server-side ++ ++ ++HTTP/1.1 301 Follow this you fool ++Date: Tue, 09 Nov 2010 14:49:00 GMT ++Server: test-server/fake ++Last-Modified: Tue, 13 Jun 2000 12:10:00 GMT ++ETag: "21025-dc7-39462498" ++Accept-Ranges: bytes ++Content-Length: 6 ++Connection: close ++Location: http://b.com/%TESTNUMBER0002 ++ ++-foo- ++ ++ ++ ++HTTP/1.1 200 OK ++Date: Tue, 09 Nov 2010 14:49:00 GMT ++Server: test-server/fake ++Last-Modified: Tue, 13 Jun 2000 12:10:00 GMT ++ETag: "21025-dc7-39462498" ++Accept-Ranges: bytes ++Content-Length: 7 ++Connection: close ++ ++target ++ ++ ++ ++HTTP/1.1 301 Follow this you fool ++Date: Tue, 09 Nov 2010 14:49:00 GMT ++Server: test-server/fake ++Last-Modified: Tue, 13 Jun 2000 12:10:00 GMT ++ETag: "21025-dc7-39462498" ++Accept-Ranges: bytes ++Content-Length: 6 ++Connection: close ++Location: http://b.com/%TESTNUMBER0002 ++ ++HTTP/1.1 200 OK ++Date: Tue, 09 Nov 2010 14:49:00 GMT ++Server: test-server/fake ++Last-Modified: Tue, 13 Jun 2000 12:10:00 GMT ++ETag: "21025-dc7-39462498" ++Accept-Ranges: bytes ++Content-Length: 7 ++Connection: close ++ ++target ++ ++ ++ ++# Client-side ++ ++ ++http ++ ++ ++proxy ++ ++ ++.netrc default with redirect plus oauth2-bearer ++ ++ ++--netrc --netrc-file %LOGDIR/netrc%TESTNUMBER --oauth2-bearer SECRET_TOKEN -L -x http://%HOSTIP:%HTTPPORT/ http://a.com/ ++ ++ ++default login testuser password testpass ++ ++ ++ ++ ++ ++GET http://a.com/ HTTP/1.1 ++Host: a.com ++Authorization: Bearer SECRET_TOKEN ++User-Agent: curl/%VERSION ++Accept: */* ++Proxy-Connection: Keep-Alive ++ ++GET http://b.com/%TESTNUMBER0002 HTTP/1.1 ++Host: b.com ++User-Agent: curl/%VERSION ++Accept: */* ++Proxy-Connection: Keep-Alive ++ ++ ++ ++ +-- +2.43.0 + diff --git a/meta/recipes-support/curl/curl_8.7.1.bb b/meta/recipes-support/curl/curl_8.7.1.bb index 0b4c93ec66c..ff4524e1bd1 100644 --- a/meta/recipes-support/curl/curl_8.7.1.bb +++ b/meta/recipes-support/curl/curl_8.7.1.bb @@ -34,6 +34,7 @@ SRC_URI = " \ file://CVE-2025-15224.patch \ file://CVE-2026-1965-1.patch \ file://CVE-2026-1965-2.patch \ + file://CVE-2026-3783.patch \ " SRC_URI:append:class-nativesdk = " \ From patchwork Fri Apr 24 20:55:05 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86862 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 10944FDEE45 for ; Fri, 24 Apr 2026 20:56:51 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32574.1777064203151993172 for ; Fri, 24 Apr 2026 13:56:43 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=PGP3xaR4; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488b8bc6bc9so59583725e9.3 for ; Fri, 24 Apr 2026 13:56:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064201; x=1777669001; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=dVoGt3caDMmWOYK5iNGAgDLiWoHa2dIuOdBYvVZQrfc=; b=PGP3xaR4JPOUJkb+6eK7+F80r4+oMqA7Ko01uFWLl1SSeZYsti8Cxe2YhKWq75BikE 1KZNO1UtwSjDTqmQ9zd3Dsfgf9m3B8KUiLeexSniWAjOKt1wMVvKI7xrHv5ZYUZVnF5s fbOv0PDk6eBROX6rSZy8l9X4Y7r1DGXGyjIEY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064201; x=1777669001; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=dVoGt3caDMmWOYK5iNGAgDLiWoHa2dIuOdBYvVZQrfc=; b=AMwWV0PZM8AniJ5IpjFQEeA4jH44KcXUdBkpluLryE78NHFSCDzr2ryVTkAomkNYSf JaQdJAH/GRNBJnCjBGa9x8gBLOPGNi6QsA3axHV1y/qZ+tyl66J2AsQfJetjPBU7B9n5 pqksgbeK/ALFU2TE9BgNMZhuxZ8OsGn9UF3jQxiC+5vf8+CwEE+Sg8bSowUyE12SUkDa MMALQRa3rt+miTy+Xm0DSYhLTbKwdReD8HQPpBc5G3fg1S1ebDVGu0dmpqvj6IVfmd7T 5OcfEO3j/+HlLMO2C6iLQ2xZJh354CIHiMfTibrSheozSKJPRrWwK8agrPnu8/pXYS2K c1WA== X-Gm-Message-State: AOJu0Yz/LBQZsaZFHf0lthvK/DdgDkeFNn/B4qtVJOdis6SFuegA8gLr e8ItNmvXCV7Xrm1d/XUaCjab8T8IHTw2y8+nx8sSIHr82WBGtiPPObc5an2RC3HMQk/EwqRWfHz KnyoOhC/pWBLy X-Gm-Gg: AeBDievB/zfzge4Op1tp7kk3Os0kb+TmyxElsL8qonSAzVagn0SoU4wW4djgBHlFDNI zRJtY2Vsp1FKllpI7u+LOdIWWTsAi6YrQILXcrKILMs83UASsjO8JTJdbBoUEN5zmR2kdRQaf62 CIThTb1jJ6xZHTbW8RCo1e2/RqSoxM3WiAH/3mlLG9TEGMQ1wbv+xpORFNM9STOsd4DqI3sW6pk Urd4Sb1mU8UuKrBHE4x6KBwBVd3dZzK4I+YSAGWtrrPwXPKFSBLMlOBVaqubevVCZZj7142PRtI stWL8vyEQAz63g5DyNURon3K4CGgV22BHcp72e3S7P/BrocbsNw4yCV9fAIM4gqH6yfXpiLNdQ5 iBfnGLNIyJZU8Ng3Xd2Wvmayoys6CNNfpUtBqaN5WLf0eCXSxwkqZXRaoT5CrgIxrMYQ9QNGBtT N4jSBEEtZLSNqCvhab9gn4l1UQMxFsU3oxtz+Hz8kjmUYM344fV6heko6IAlvEwLeUXFbAx34+j ICYJe0Fa16i/duE6wD51xnsjPKuVC/RiOOp/Q== X-Received: by 2002:a05:600c:a414:b0:48a:53ea:13e6 with SMTP id 5b1f17b1804b1-48a53ea14d3mr214769505e9.25.1777064201274; Fri, 24 Apr 2026 13:56:41 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.40 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:40 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 06/66] curl: patch CVE-2026-3784 Date: Fri, 24 Apr 2026 22:55:05 +0200 Message-ID: <1142953d395cd8de187fbd0dc8c143b953c42612.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:51 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235879 From: Vijay Anusuri pick patch from ubuntu per [1] [1] http://archive.ubuntu.com/ubuntu/pool/main/c/curl/curl_8.5.0-2ubuntu10.8.debian.tar.xz [2] https://ubuntu.com/security/CVE-2026-3784 [3] https://curl.se/docs/CVE-2026-3784.html Signed-off-by: Vijay Anusuri Signed-off-by: Yoann Congal --- .../curl/curl/CVE-2026-3784.patch | 77 +++++++++++++++++++ meta/recipes-support/curl/curl_8.7.1.bb | 1 + 2 files changed, 78 insertions(+) create mode 100644 meta/recipes-support/curl/curl/CVE-2026-3784.patch diff --git a/meta/recipes-support/curl/curl/CVE-2026-3784.patch b/meta/recipes-support/curl/curl/CVE-2026-3784.patch new file mode 100644 index 00000000000..c3bdb672474 --- /dev/null +++ b/meta/recipes-support/curl/curl/CVE-2026-3784.patch @@ -0,0 +1,77 @@ +From 5f13a7645e565c5c1a06f3ef86e97afb856fb364 Mon Sep 17 00:00:00 2001 +From: Stefan Eissing +Date: Fri, 6 Mar 2026 14:54:09 +0100 +Subject: [PATCH] proxy-auth: additional tests + +Also eliminate the special handling for socks proxy match. + +Closes #20837 + +Upstream-Status: Backport [https://github.com/curl/curl/commit/5f13a7645e565c5c1a06f3] +Backported by Ubuntu team http://archive.ubuntu.com/ubuntu/pool/main/c/curl/curl_8.5.0-2ubuntu10.8.debian.tar.xz + +CVE: CVE-2026-3784 +Signed-off-by: Vijay Anusuri +--- + lib/url.c | 35 ++++++++--------------------------- + 1 file changed, 8 insertions(+), 27 deletions(-) + +diff --git a/lib/url.c b/lib/url.c +index 22ed0be..76360c8 100644 +--- a/lib/url.c ++++ b/lib/url.c +@@ -703,34 +703,15 @@ proxy_info_matches(const struct proxy_info *data, + { + if((data->proxytype == needle->proxytype) && + (data->port == needle->port) && +- strcasecompare(data->host.name, needle->host.name)) +- return TRUE; ++ curl_strequal(data->host.name, needle->host.name)) { + ++ if(Curl_timestrcmp(data->user, needle->user) || ++ Curl_timestrcmp(data->passwd, needle->passwd)) ++ return FALSE; ++ return TRUE; ++ } + return FALSE; + } +- +-static bool +-socks_proxy_info_matches(const struct proxy_info *data, +- const struct proxy_info *needle) +-{ +- if(!proxy_info_matches(data, needle)) +- return FALSE; +- +- /* the user information is case-sensitive +- or at least it is not defined as case-insensitive +- see https://datatracker.ietf.org/doc/html/rfc3986#section-3.2.1 */ +- +- /* curl_strequal does a case insensitive comparison, +- so do not use it here! */ +- if(Curl_timestrcmp(data->user, needle->user) || +- Curl_timestrcmp(data->passwd, needle->passwd)) +- return FALSE; +- return TRUE; +-} +-#else +-/* disabled, won't get called */ +-#define proxy_info_matches(x,y) FALSE +-#define socks_proxy_info_matches(x,y) FALSE + #endif + + /* A connection has to have been idle for a shorter time than 'maxage_conn' +@@ -1085,8 +1066,8 @@ ConnectionExists(struct Curl_easy *data, + continue; + + if(needle->bits.socksproxy && +- !socks_proxy_info_matches(&needle->socks_proxy, +- &check->socks_proxy)) ++ !proxy_info_matches(&needle->socks_proxy, ++ &check->socks_proxy)) + continue; + + if(needle->bits.httpproxy) { +-- +2.43.0 + diff --git a/meta/recipes-support/curl/curl_8.7.1.bb b/meta/recipes-support/curl/curl_8.7.1.bb index ff4524e1bd1..14d63d63733 100644 --- a/meta/recipes-support/curl/curl_8.7.1.bb +++ b/meta/recipes-support/curl/curl_8.7.1.bb @@ -35,6 +35,7 @@ SRC_URI = " \ file://CVE-2026-1965-1.patch \ file://CVE-2026-1965-2.patch \ file://CVE-2026-3783.patch \ + file://CVE-2026-3784.patch \ " SRC_URI:append:class-nativesdk = " \ From patchwork Fri Apr 24 20:55:06 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86857 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6FB6FFED3FF for ; Fri, 24 Apr 2026 20:56:50 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31961.1777064203583046120 for ; Fri, 24 Apr 2026 13:56:43 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=0HMainQ1; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488ad135063so74477925e9.0 for ; Fri, 24 Apr 2026 13:56:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064202; x=1777669002; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=P6hw1QO8xFNyYfIBMJbXy9KJji0ATuejEbaik00VuP0=; b=0HMainQ1z0PYe5cbKIoW7LlbLl02QHUqJWfX/zUiyTa7ZVopTNkB05CujBu1Pvqatb TzwgjBvCeGOVBxEnQ0tJts6QFo64shJ9uYD22GqlJW56dz3IPXobFYqtTYB/BDaXo9jd jo8QS0GxrumBmRbMwylVdGCRHsa1yd3BNFCWQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064202; x=1777669002; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=P6hw1QO8xFNyYfIBMJbXy9KJji0ATuejEbaik00VuP0=; b=X6LMUCvgp4vQA1UX1d2/XEdUuFuS29xktcjIxJ4ljZ8tNrdltP3q6DUxT12pqn2jGL //+F15PBTuK+oSp6EAPFD6FQavKhxUK2Zqhp5t1UTDHiq6qpPbwKP7vi39N0lj46Z5wm 5DediNHsv6A2QzYRMSc6ZASzc3NxK3bKSF9FBNVnEFb0RpvP8SeibJkA7zYfviHGSSkW QQnzo8/BN7tnIgiq+JzxbZGbtIT5UZKAzIcQpGGz6c/GVvtxCWt782Hq7hV8zrnsjxR4 C96r0zN7or3RKAi9vZuEEfocGguHZs6PWy9r9jZi2w7/bIAGQGEtakA4MJdop2WOaxZB UbOA== X-Gm-Message-State: AOJu0YwVYAxSIdUbXuVNbuc+xd06y6YywSIPclZz6ursaaAHXFJwlxJY Ub5vLyat3q1bS7yY+pAj8UEkVhNU+PbCtT/hEzAkrvl7CTDG7iv5t5UBwiTGVcWSjJKW7mSwYvu GdyGldWjIPJU/ X-Gm-Gg: AeBDiesLf7g7kGXr2AVb2k0A41TiHLrYCoDN/GoKy3kcK2eXV+mNbdwdZnBgJvRmkPi ACykTbbKGaMVj9Bd6ZzoGTlZ2KAb0ArkHtsliX/LIDI3XPK3NOVHfRvFeQ6cgpnpSF9htoO3RlA 8mebo+ADnmMPSGne6SkrJqdS6J3yK8BYqBr3TQUlcCCI9LHbTKKAJbrd2LlhgXNaq64DQiJ5joF i4JY9THLLOIIfpExVKJVSboJN4y7WdmAolX631C0DFd14QYVjBh4ZwkCcp6q/dIN9WStQ2fNQGt Rt+KVSv44Ps89BxY/v9st05QuiOaA2yln8Vi7NmQG3+KeW4rNGoyyD3eyaOZikqD+tsRFSgez2q jahAFFrTlPUN58usERBj/Rv50UekvebMj5d2GqCj+CM1Uj9PrnZSy3J7conFKX+tJ6o1Y41eRN/ MVv39HijICymLNY7nb4qe95+IDGN6E5krmqcWYS5XNTQwwukIBWxyiiOPK35I9+eNqcQ0fq1jDr EKHgW67etF4pnl6rnP8iPhk69efW0AmAcK3tg== X-Received: by 2002:a05:600c:8b55:b0:48a:57e1:d8cc with SMTP id 5b1f17b1804b1-48a57e1d8d4mr251777665e9.9.1777064201719; Fri, 24 Apr 2026 13:56:41 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.41 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:41 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 07/66] ncurses: fix for CVE-2025-69720 Date: Fri, 24 Apr 2026 22:55:06 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:50 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235880 From: Hitendra Prajapati Pick relevant part of snapshot commit 20251213, see [1]. That has: add a limit-check in infocmp -i option (report/example by Yixuan Cao). [1] https://invisible-island.net/ncurses/NEWS.html#index-t20251213 References: 1. https://github.com/Cao-Wuhui/CVE-2025-69720 2. https://nvd.nist.gov/vuln/detail/CVE-2025-69720 3. https://access.redhat.com/errata/RHSA-2026:5913 Signed-off-by: Hitendra Prajapati Signed-off-by: Yoann Congal --- .../ncurses/files/CVE-2025-69720.patch | 42 +++++++++++++++++++ meta/recipes-core/ncurses/ncurses_6.4.bb | 1 + 2 files changed, 43 insertions(+) create mode 100644 meta/recipes-core/ncurses/files/CVE-2025-69720.patch diff --git a/meta/recipes-core/ncurses/files/CVE-2025-69720.patch b/meta/recipes-core/ncurses/files/CVE-2025-69720.patch new file mode 100644 index 00000000000..8ab6953c855 --- /dev/null +++ b/meta/recipes-core/ncurses/files/CVE-2025-69720.patch @@ -0,0 +1,42 @@ +From 6f6db0e8fd14e40096a0ee6f8bdf32dedbd3fc9e Mon Sep 17 00:00:00 2001 +From: Hitendra Prajapati +Date: Mon, 6 Apr 2026 18:08:09 +0530 +Subject: [PATCH] add limit-check in infocmp + +origin : https://invisible-island.net/archives/ncurses/6.5/ncurses-6.5-20251213.patch.gz +Refer: https://github.com/Cao-Wuhui/CVE-2025-69720 +patch by : Thomas E. Dickey + +CVE: CVE-2025-69720 +Upstream-Status: Backport [https://github.com/ThomasDickey/ncurses-snapshots/commit/6f6db0e8fd14e40096a0ee6f8bdf32dedbd3fc9e] +Signed-off-by: Hitendra Prajapati +--- + progs/infocmp.c | 5 +++-- + 1 file changed, 3 insertions(+), 2 deletions(-) + +diff --git a/progs/infocmp.c b/progs/infocmp.c +index 171d794d..2fc1f035 100644 +--- a/progs/infocmp.c ++++ b/progs/infocmp.c +@@ -816,7 +816,7 @@ lookup_params(const assoc * table, char *dst, char *src) + static void + analyze_string(const char *name, const char *cap, TERMTYPE2 *tp) + { +- char buf2[MAX_TERMINFO_LENGTH]; ++ char buf2[MAX_TERMINFO_LENGTH + 1]; + const char *sp; + const assoc *ap; + int tp_lines = tp->Numbers[2]; +@@ -846,7 +846,8 @@ analyze_string(const char *name, const char *cap, TERMTYPE2 *tp) + if (VALID_STRING(cp) && + cp[0] != '\0' && + cp != cap) { +- len = strlen(cp); ++ if ((len = strlen(cp)) > MAX_TERMINFO_LENGTH) ++ len = MAX_TERMINFO_LENGTH; + _nc_STRNCPY(buf2, sp, len); + buf2[len] = '\0'; + +-- +2.50.1 + diff --git a/meta/recipes-core/ncurses/ncurses_6.4.bb b/meta/recipes-core/ncurses/ncurses_6.4.bb index d3b41061183..ac30a1a3c1e 100644 --- a/meta/recipes-core/ncurses/ncurses_6.4.bb +++ b/meta/recipes-core/ncurses/ncurses_6.4.bb @@ -9,6 +9,7 @@ SRC_URI += "file://0001-tic-hang.patch \ file://CVE-2023-50495.patch \ file://CVE-2023-45918.patch \ file://CVE-2025-6141.patch \ + file://CVE-2025-69720.patch \ " # commit id corresponds to the revision in package version SRCREV = "1003914e200fd622a27237abca155ce6bf2e6030" From patchwork Fri Apr 24 20:55:07 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86859 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A65E2FB44C0 for ; Fri, 24 Apr 2026 20:56:50 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31962.1777064204152118670 for ; Fri, 24 Apr 2026 13:56:44 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=EWUgwMfk; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488a88aeec9so103614255e9.2 for ; Fri, 24 Apr 2026 13:56:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064202; x=1777669002; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=w7g5RmySy4thRGK3jMwVlFKw6UPcgoD+tlmxp4lnHxU=; b=EWUgwMfkZTtBxZI80klzY+HIx5+mdFrgVSwg6SX1fkAiarHNVz8dkl0Tq1l8MqtQc3 xJEzMkVB2OXQLqgBHBE7yJR1u6mo0tu4YLlWLd4y1zf6NXVjXUbOy2m0Q41Mk9NgNv01 yRIELZNG/e7ZOnt00b2HLHaYZFEiJfUusqQgs= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064202; x=1777669002; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=w7g5RmySy4thRGK3jMwVlFKw6UPcgoD+tlmxp4lnHxU=; b=lXzHxX0l8u4W9PJWnxH0mS7FtYW1mXI3tSPuizIELKp/lQmRP7lPe5A3Ad6PNQ+Rae hBmb93KDD22lM26u9FfD/WxAU3U1VaMrnzKsyp1RhpjEcsqD2WY/n3Vd4RVSXR5l07zm O1gkl6gScrO66paxVJYutJU/RoXDpDl3QGG/obUAQZaXWS1pk3Kov5kf5lMExdzkoIIh WHesBeOcqXxom/y8w5AewYSVdM34DhmIamn3HABbpr1WXzaAiG+U7vFc+A8nUnW3E8IL QBYHbPpWzo6gxuab4hzbidDPEekV6FMZsbcMZMmEICa6SiUP86q35J/oAFTkR40+78Lj dwyw== X-Gm-Message-State: AOJu0Yx9uLUsPsdKL3HDiyNrA1JVTNnGcQTXZrgFATjSbCRciq9kAZCv urmPaW2nwLgxTQxd9MILqmlMMz1bJHH2LSpJZAwcwTK9+N1xTFdfXx0is9/wyqINEcGSbQzrw5Z cUQGOZ8FlCe3v X-Gm-Gg: AeBDietXC53Qp27kKK2El3xJwWqce56cdPRfyhWY1Yj4nDYn+WLXJVF5cuvdn1369U0 cJigt03xtZV60RHmm2OZEz4jdIpAT7UlI8S9+MU84FqGw3Mbx8JOwAgi3xUSoKzDqvPXcakRUUe 6ppoTYxWeqiGXM6V83OR5bbcsNrg4lI4t0zR32mS0GoYVtdZCSx1dxpAsINVkQkf8ria6WoI/L6 oS0DhoTDbD4bPBJ+EeM7wWsSbP0UHBaqf42fqNK2fngn1jy/okVg0ibHmMLqKw45KHDNoZRojZO fna5KOSjDzzcIQPNrdqQN5kZ9pCOgUxx/vToxGh6hqJL8/Do+NNAkJh36e+YKfCElx13b3eIP5i T08KgOUa53Pezrm9nXFlx72yOXEyAJOOr+f2PaqGUegcn3b42M5nfLYNrKj7+P4OWgyekEbtVAl dj5fTWSWarO1vWn5Q0ee8XFxQrDEYKNoNEh0ZhkGYXhcyYwrfu/VYDjazV73FXm+6ih0ob2EUsh AwnlKg5j+c6zhPb8OwuTt5Sf+NZ0QuSv1twVA== X-Received: by 2002:a05:600c:34c7:b0:489:1c32:210d with SMTP id 5b1f17b1804b1-4891c32266amr340024295e9.15.1777064202189; Fri, 24 Apr 2026 13:56:42 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.41 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:41 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 08/66] tcl: skip http11 tests Date: Fri, 24 Apr 2026 22:55:07 +0200 Message-ID: <96574e448abd040743655fb29cd1eeb6735e9df2.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:50 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235881 From: Ross Burton These tests are either unstable under load, or just unstable. A ticket has been filed upstream[1] but for now disable them. [ YOCTO #15467 ] [1] https://core.tcl-lang.org/tcl/tktview/3764f4e81f1483ab554c6d60f8483887bde28221 Signed-off-by: Ross Burton Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 8f1538518fd3a3017189b38437691ce358a2566a) Signed-off-by: Yoann Congal --- meta/recipes-devtools/tcltk/tcl/run-ptest | 3 +++ 1 file changed, 3 insertions(+) diff --git a/meta/recipes-devtools/tcltk/tcl/run-ptest b/meta/recipes-devtools/tcltk/tcl/run-ptest index c485e535c71..8a4edfdda39 100644 --- a/meta/recipes-devtools/tcltk/tcl/run-ptest +++ b/meta/recipes-devtools/tcltk/tcl/run-ptest @@ -19,6 +19,9 @@ SKIP="$SKIP \*io-46.1" SKIP="$SKIP io-13.6" # 14825 SKIP="$SKIP socket-\* socket_inet-\*" +# These tests seem to be unreliable: +# https://core.tcl-lang.org/tcl/tktview/3764f4e81f1483ab554c6d60f8483887bde28221 +SKIP="$SKIP http11-\*" for i in tests/*.test; do i=$(basename $i) From patchwork Fri Apr 24 20:55:08 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86863 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D5C42FB44D8 for ; Fri, 24 Apr 2026 20:56:50 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32575.1777064204634088387 for ; Fri, 24 Apr 2026 13:56:44 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=3AAs2wnC; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-488a9033b2cso88834235e9.2 for ; Fri, 24 Apr 2026 13:56:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064203; x=1777669003; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=tAqfv+OqSVbpeEJ+7m/ua2R9Jf4qLpWqXKMacFjNoBE=; b=3AAs2wnCxwvO9aIn/1GMxMrRfOAq9UrId1vDFBk57GtR1CJotAmUGIchLpXonOnY9Y ZaZxt3Mr5xDnMn1aTHz82eWYKsyJqoQS5WN2QGY+R8O+gHikiw+lXEz/n3JtB3ML3pgj fEFi42DvVYkb64lbohgvYfXQq9HZkdV6RhnHc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064203; x=1777669003; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=tAqfv+OqSVbpeEJ+7m/ua2R9Jf4qLpWqXKMacFjNoBE=; b=jj6XoHa6TDi3YTr9nPVXDQPUdeVZXSXq1JeKA1rZRyp5F9N5GEl0D8q4KX4cA7FCZm m3nOsIgls/vf/7SnjjspQ6a2+jEb32cGbFkxYpuDCcjnHHcc4WrDN1Ewwh+cGW2dVLNh uqwTklLAIqvu0vc8Q3FrKhrajBNHTJ0ziAWTrm6uuF6Hzscu2TYFd6B9q19UMNqDTwq+ zGdLjSTvn2d1y+O0gugWeYLh1IdKQoPG2Dn+TeUh+2qr9P3CWOo/RvYGgnxiZuIqZAIh HvFDvaZoB2wd5mkNkLS6ZbmQu27baOw8A4ZX6aB2pHPqcJH0XVCPdeNKO9aE24vvUxaQ zeAw== X-Gm-Message-State: AOJu0Yz1r5FW6hG+wQ8Ct1+DNdUDpApDKgZSfjbOT928Rz0DKvc6A2XG esp2uXN0taxS+cHn9/9uC9TUXxQTJGUTuM9+FjUaIF9bXylUL2ieN8iPMNtdpJ28XeiFsX2vFh9 G/NUG1VcjDqzP X-Gm-Gg: AeBDievFICnBEaTk91E4xOr9jb21+1jhGLNaI44TfaKz2r37sms+L6+zWNhb30PJA9z HeIQe96Mzxhucc6HUoUQBjA4guYIcH1ST9q1DBArpgIzfaL12MgRoKQcXc1nc2G7L+qU3O7nn/O UGEU9DxddyR9j7xutNZp/vVORdoUat58UvVneWuuLWEL9+ODcPen/e0VSQtsn5KJKlkGamXU+Rl xItB+reS9vhJ9U29I2vTMNw6ED8YbSRRG/ntKw2Y4DTwPjIqvmccEB3NYkqNQz3r6Q+1/j0xcoh 5rgkWTfZKmRfdeV7HPTEEqRA/1cJ09RLZpmqboxkZuhkBlLvraMSRF8G1RCbvnMDP8Tnoa5+E0W 7Z4AQdEGduLRDWwhY+CKiP2Hh+YNSMzkoCZCFLl17GrolIfm4t5U/k/9xvO+zmPUAu2b4OBvv0U gZErniOleaDfBpoXkktQ7GpMOp5YNnT5PHxoABqOMyRKGApVv3Cn4XwTPTk3w4fXaotR+cvqCSG s5ZD1CeFE6cLgrgrHXrBuUZi0FqXwAh7auNfQ== X-Received: by 2002:a05:600c:19d4:b0:48a:5339:ef0e with SMTP id 5b1f17b1804b1-48a5339ef15mr284992915e9.3.1777064202747; Fri, 24 Apr 2026 13:56:42 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.42 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:42 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 09/66] busybox: fix for CVE-2026-26157, CVE-2026-26158 Date: Fri, 24 Apr 2026 22:55:08 +0200 Message-ID: <086785b621a782aa87546921c58e1049528be3b3.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:50 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235882 From: Hitendra Prajapati Pick up patch from NVD report. More details : [1]: https://nvd.nist.gov/vuln/detail/CVE-2026-26157 [2]: https://nvd.nist.gov/vuln/detail/CVE-2026-26158 Note: We use patch from busybox mirror that looks trustworthy https://gogs.librecmc.org/OWEALS/busybox. Signed-off-by: Hitendra Prajapati Signed-off-by: Yoann Congal --- .../CVE-2026-26157-CVE-2026-26158-01.patch | 198 ++++++++++++++++++ .../CVE-2026-26157-CVE-2026-26158-02.patch | 37 ++++ meta/recipes-core/busybox/busybox_1.36.1.bb | 2 + 3 files changed, 237 insertions(+) create mode 100644 meta/recipes-core/busybox/busybox/CVE-2026-26157-CVE-2026-26158-01.patch create mode 100644 meta/recipes-core/busybox/busybox/CVE-2026-26157-CVE-2026-26158-02.patch diff --git a/meta/recipes-core/busybox/busybox/CVE-2026-26157-CVE-2026-26158-01.patch b/meta/recipes-core/busybox/busybox/CVE-2026-26157-CVE-2026-26158-01.patch new file mode 100644 index 00000000000..cdc23947949 --- /dev/null +++ b/meta/recipes-core/busybox/busybox/CVE-2026-26157-CVE-2026-26158-01.patch @@ -0,0 +1,198 @@ +From 3fb6b31c716669e12f75a2accd31bb7685b1a1cb Mon Sep 17 00:00:00 2001 +From: Denys Vlasenko +Date: Thu, 29 Jan 2026 11:48:02 +0100 +Subject: [PATCH] tar: strip unsafe hardlink components - GNU tar does the same + +Defends against files like these (python reproducer): + +import tarfile +ti = tarfile.TarInfo("leak_hosts") +ti.type = tarfile.LNKTYPE +ti.linkname = "/etc/hosts" # or "../etc/hosts" or ".." +ti.size = 0 +with tarfile.open("/tmp/hardlink.tar", "w") as t: + t.addfile(ti) + +function old new delta +skip_unsafe_prefix - 127 +127 +get_header_tar 1752 1754 +2 +.rodata 106861 106856 -5 +unzip_main 2715 2706 -9 +strip_unsafe_prefix 102 18 -84 +------------------------------------------------------------------------------ +(add/remove: 1/0 grow/shrink: 1/3 up/down: 129/-98) Total: 31 bytes + +Signed-off-by: Denys Vlasenko + +CVE: CVE-2026-26157, CVE-2026-26158 +Upstream-Status: Backport [https://git.busybox.net/busybox/commit/?id=3fb6b31c716669e12f75a2accd31bb7685b1a1cb] +(Alternative mirrored URL: https://gogs.librecmc.org/OWEALS/busybox/commit/3fb6b31c716669e12f75a2accd31bb7685b1a1cb) +Signed-off-by: Hitendra Prajapati +--- + archival/libarchive/data_extract_all.c | 7 +++-- + archival/libarchive/get_header_tar.c | 11 ++++++-- + archival/libarchive/unsafe_prefix.c | 30 +++++++++++++++++---- + archival/libarchive/unsafe_symlink_target.c | 1 + + archival/tar.c | 2 +- + archival/unzip.c | 2 +- + include/bb_archive.h | 3 ++- + 7 files changed, 42 insertions(+), 14 deletions(-) + +diff --git a/archival/libarchive/data_extract_all.c b/archival/libarchive/data_extract_all.c +index 8a69711..b84b960 100644 +--- a/archival/libarchive/data_extract_all.c ++++ b/archival/libarchive/data_extract_all.c +@@ -66,8 +66,8 @@ void FAST_FUNC data_extract_all(archive_handle_t *archive_handle) + } + #endif + #if ENABLE_FEATURE_PATH_TRAVERSAL_PROTECTION +- /* Strip leading "/" and up to last "/../" path component */ +- dst_name = (char *)strip_unsafe_prefix(dst_name); ++ /* Skip leading "/" and past last ".." path component */ ++ dst_name = (char *)skip_unsafe_prefix(dst_name); + #endif + // ^^^ This may be a problem if some applets do need to extract absolute names. + // (Probably will need to invent ARCHIVE_ALLOW_UNSAFE_NAME flag). +@@ -185,8 +185,7 @@ void FAST_FUNC data_extract_all(archive_handle_t *archive_handle) + + /* To avoid a directory traversal attack via symlinks, + * do not restore symlinks with ".." components +- * or symlinks starting with "/", unless a magic +- * envvar is set. ++ * or symlinks starting with "/" + * + * For example, consider a .tar created via: + * $ tar cvf bug.tar anything.txt +diff --git a/archival/libarchive/get_header_tar.c b/archival/libarchive/get_header_tar.c +index cc6f3f0..1c40ece 100644 +--- a/archival/libarchive/get_header_tar.c ++++ b/archival/libarchive/get_header_tar.c +@@ -454,8 +454,15 @@ char FAST_FUNC get_header_tar(archive_handle_t *archive_handle) + #endif + + /* Everything up to and including last ".." component is stripped */ +- overlapping_strcpy(file_header->name, strip_unsafe_prefix(file_header->name)); +-//TODO: do the same for file_header->link_target? ++ strip_unsafe_prefix(file_header->name); ++ if (file_header->link_target) { ++ /* GNU tar 1.34 examples: ++ * tar: Removing leading '/' from hard link targets ++ * tar: Removing leading '../' from hard link targets ++ * tar: Removing leading 'etc/../' from hard link targets ++ */ ++ strip_unsafe_prefix(file_header->link_target); ++ } + + /* Strip trailing '/' in directories */ + /* Must be done after mode is set as '/' is used to check if it's a directory */ +diff --git a/archival/libarchive/unsafe_prefix.c b/archival/libarchive/unsafe_prefix.c +index 6670811..89a371a 100644 +--- a/archival/libarchive/unsafe_prefix.c ++++ b/archival/libarchive/unsafe_prefix.c +@@ -5,11 +5,11 @@ + #include "libbb.h" + #include "bb_archive.h" + +-const char* FAST_FUNC strip_unsafe_prefix(const char *str) ++const char* FAST_FUNC skip_unsafe_prefix(const char *str) + { + const char *cp = str; + while (1) { +- char *cp2; ++ const char *cp2; + if (*cp == '/') { + cp++; + continue; +@@ -22,10 +22,25 @@ const char* FAST_FUNC strip_unsafe_prefix(const char *str) + cp += 3; + continue; + } +- cp2 = strstr(cp, "/../"); ++ cp2 = cp; ++ find_dotdot: ++ cp2 = strstr(cp2, "/.."); + if (!cp2) +- break; +- cp = cp2 + 4; ++ break; /* No (more) malicious components */ ++ ++ /* We found "/..something" */ ++ cp2 += 3; ++ if (*cp2 != '/') { ++ if (*cp2 == '\0') { ++ /* Trailing "/..": malicious, return "" */ ++ /* (causes harmless errors trying to create or hardlink a file named "") */ ++ return cp2; ++ } ++ /* "/..name" is not malicious, look for next "/.." */ ++ goto find_dotdot; ++ } ++ /* Found "/../": malicious, advance past it */ ++ cp = cp2 + 1; + } + if (cp != str) { + static smallint warned = 0; +@@ -37,3 +52,8 @@ const char* FAST_FUNC strip_unsafe_prefix(const char *str) + } + return cp; + } ++ ++void FAST_FUNC strip_unsafe_prefix(char *str) ++{ ++ overlapping_strcpy(str, skip_unsafe_prefix(str)); ++} +diff --git a/archival/libarchive/unsafe_symlink_target.c b/archival/libarchive/unsafe_symlink_target.c +index f8dc803..d764c89 100644 +--- a/archival/libarchive/unsafe_symlink_target.c ++++ b/archival/libarchive/unsafe_symlink_target.c +@@ -36,6 +36,7 @@ void FAST_FUNC create_links_from_list(llist_t *list) + *list->data ? "hard" : "sym", + list->data + 1, target + ); ++ /* Note: GNU tar 1.34 errors out only _after_ all links are (attempted to be) created */ + } + list = list->link; + } +diff --git a/archival/tar.c b/archival/tar.c +index 9de3759..cf8c2d1 100644 +--- a/archival/tar.c ++++ b/archival/tar.c +@@ -475,7 +475,7 @@ static int FAST_FUNC writeFileToTarball(struct recursive_state *state, + DBG("writeFileToTarball('%s')", fileName); + + /* Strip leading '/' and such (must be before memorizing hardlink's name) */ +- header_name = strip_unsafe_prefix(fileName); ++ header_name = skip_unsafe_prefix(fileName); + + if (header_name[0] == '\0') + return TRUE; +diff --git a/archival/unzip.c b/archival/unzip.c +index 691a2d8..5844215 100644 +--- a/archival/unzip.c ++++ b/archival/unzip.c +@@ -853,7 +853,7 @@ int unzip_main(int argc, char **argv) + unzip_skip(zip.fmt.extra_len); + + /* Guard against "/abspath", "/../" and similar attacks */ +- overlapping_strcpy(dst_fn, strip_unsafe_prefix(dst_fn)); ++ strip_unsafe_prefix(dst_fn); + + /* Filter zip entries */ + if (find_list_entry(zreject, dst_fn) +diff --git a/include/bb_archive.h b/include/bb_archive.h +index e0ef8fc..1dc77f3 100644 +--- a/include/bb_archive.h ++++ b/include/bb_archive.h +@@ -202,7 +202,8 @@ char get_header_tar_xz(archive_handle_t *archive_handle) FAST_FUNC; + void seek_by_jump(int fd, off_t amount) FAST_FUNC; + void seek_by_read(int fd, off_t amount) FAST_FUNC; + +-const char *strip_unsafe_prefix(const char *str) FAST_FUNC; ++const char *skip_unsafe_prefix(const char *str) FAST_FUNC; ++void strip_unsafe_prefix(char *str) FAST_FUNC; + void create_or_remember_link(llist_t **link_placeholders, + const char *target, + const char *linkname, +-- +2.50.1 + diff --git a/meta/recipes-core/busybox/busybox/CVE-2026-26157-CVE-2026-26158-02.patch b/meta/recipes-core/busybox/busybox/CVE-2026-26157-CVE-2026-26158-02.patch new file mode 100644 index 00000000000..00a276fa4f8 --- /dev/null +++ b/meta/recipes-core/busybox/busybox/CVE-2026-26157-CVE-2026-26158-02.patch @@ -0,0 +1,37 @@ +From 599f5dd8fac390c18b79cba4c14c334957605dae Mon Sep 17 00:00:00 2001 +From: Radoslav Kolev +Date: Mon, 16 Feb 2026 11:50:04 +0200 +Subject: [PATCH] tar: only strip unsafe components from hardlinks, not + symlinks + +commit 3fb6b31c7 introduced a check for unsafe components in +tar archive hardlinks, but it was being applied to symlinks too +which broke "Symlinks and hardlinks coexist" tar test. + +Signed-off-by: Radoslav Kolev +Signed-off-by: Denys Vlasenko + +CVE: CVE-2026-26157, CVE-2026-26158 +Upstream-Status: Backport [https://git.busybox.net/busybox/commit/?id=599f5dd8fac390c18b79cba4c14c334957605dae] +(Alternative mirrored URL: https://gogs.librecmc.org/OWEALS/busybox/commit/599f5dd8fac390c18b79cba4c14c334957605dae) +Signed-off-by: Hitendra Prajapati +--- + archival/libarchive/get_header_tar.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/archival/libarchive/get_header_tar.c b/archival/libarchive/get_header_tar.c +index 1c40ece..606d806 100644 +--- a/archival/libarchive/get_header_tar.c ++++ b/archival/libarchive/get_header_tar.c +@@ -455,7 +455,7 @@ char FAST_FUNC get_header_tar(archive_handle_t *archive_handle) + + /* Everything up to and including last ".." component is stripped */ + strip_unsafe_prefix(file_header->name); +- if (file_header->link_target) { ++ if (file_header->link_target && !S_ISLNK(file_header->mode)) { + /* GNU tar 1.34 examples: + * tar: Removing leading '/' from hard link targets + * tar: Removing leading '../' from hard link targets +-- +2.50.1 + diff --git a/meta/recipes-core/busybox/busybox_1.36.1.bb b/meta/recipes-core/busybox/busybox_1.36.1.bb index d870e2ee10c..228bfdadd33 100644 --- a/meta/recipes-core/busybox/busybox_1.36.1.bb +++ b/meta/recipes-core/busybox/busybox_1.36.1.bb @@ -62,6 +62,8 @@ SRC_URI = "https://busybox.net/downloads/busybox-${PV}.tar.bz2;name=tarball \ file://CVE-2025-46394-01.patch \ file://CVE-2025-46394-02.patch \ file://CVE-2025-60876.patch \ + file://CVE-2026-26157-CVE-2026-26158-01.patch \ + file://CVE-2026-26157-CVE-2026-26158-02.patch \ " SRC_URI:append:libc-musl = " file://musl.cfg " # TODO http://lists.busybox.net/pipermail/busybox/2023-January/090078.html From patchwork Fri Apr 24 20:55:09 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86861 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id BD194FC0379 for ; Fri, 24 Apr 2026 20:56:50 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31963.1777064205123310151 for ; Fri, 24 Apr 2026 13:56:45 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=N7Wk0czO; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-48896199cbaso80392835e9.1 for ; Fri, 24 Apr 2026 13:56:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064203; x=1777669003; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=AkaEFcrzHtiCHYOPXLBZ+9n6etF3lqpWSa+xcs3KFtg=; b=N7Wk0czOsQslpOGaooVfwZBgCBbYOXgbNc6oBqjTPMDncm2ildiJGItMkg66gwEe/b 7oxZBk8PI6vGYFF/lvZcWMafP/pv9rfRPElRaMOcJ1VsTSg+3yOteOCuQT6YG/2NrK0w CUKg8stGHS5ZhWPL9PQZymia13HQ0lVwROSNU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064203; x=1777669003; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=AkaEFcrzHtiCHYOPXLBZ+9n6etF3lqpWSa+xcs3KFtg=; b=PFcislPd80iuPlbnxbkf5QYD+ZDZtdylMBftkOrZmHm7SWtW4txUQZwSPrhmbKGxCp qMuGjKI2hbKF2PfYLyEJkLIDfrp5Zt5LYXvrerMSmyFGNsksqoOGboLOp40RWL8IJ4EC 6YF/8n4LghUzlbww/dfj9ik+KMVKM9a7n3BYk1VsKFAJNwyRHhiNISvpgKk8cKksYMH5 HHGgJxqpQ+rrVd3/WcpQnpVXkQlW5tcC6WXA1K2l+03LroRl8P3X0JN4Ihf03HcBxLYP p8Y7+9FADhf5Wz491T1ffS7C70rPQTSamnk5JTbF2PZ8h0VOa5iJXdTuOMFb+amw10BR 3Jiw== X-Gm-Message-State: AOJu0YxQDwBigXLV2+ljSJl86aRlPF7J/UsGC/eDLr1QKhQg4nM/3SoW Aj4shMwLlXnJtqm6VydYsB11GtgXBbkmjSFVMYSuPn9EPX+2gwKC0asWXPIGAUflBWPYsFYgXEM aZtIq5MsjAUa+ X-Gm-Gg: AeBDieuQgBNnWSTxn3x6m7k7vleyaDDUV58XGvs8SoPBckTpNEeRxl0Ri3c6SLMSkjn JftL2l9S6n0Fb5Qxx0dd0ScE4zHFB03nsmin7TRGmqMRS0rqwUhc1m2DSEsKWw6UnM0cKvCbMMj SgXkEqiLUL8+pTdIripn2n6lYNUEuzbtWevqSs4Vlg49Kt9lie2up/PwpdtJFx9ElH/U90u+NNL YXsZN5eBiR01IuoOLJR1YmGzzD/968/3y3jhKkZbtAjIko7KKIPnUS+4dmJr9fCj/ovSFoHlhuf kGkyq1Whp8JquXqEfQm7q1kPW53RcFBd0hj1zxmeIf4dWHDNcggl20hg+p42B/zFWN7IZcsc8RH tc/pmSirvJshn369DQ2fUgiIje2G1W2x5lHgyzr5yKVfY/0dD4l2R59MwS/woUikP5uKvjIGlkg aPkogsN3MIlfxVHkChxM/UgtHQFf9L7ZW8DCA0RftFEjvV/Yp6Nz/qse8FWfY4dEoI5FD+PLQY2 szrZeIHr7lI88u82XaS3v0rhwSNJvqCg5qx0Q== X-Received: by 2002:a05:600c:a416:b0:488:e7e4:8425 with SMTP id 5b1f17b1804b1-488fb787674mr379604485e9.23.1777064203249; Fri, 24 Apr 2026 13:56:43 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.42 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:42 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 10/66] binutils: mark CVE-2025-69650 and CVE-2025-69651 as disputed Date: Fri, 24 Apr 2026 22:55:09 +0200 Message-ID: <55a0d8abad8a81f7d900557c2eb2d9327ee115df.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:50 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235883 From: Adarsh Jagadish Kamini Both CVEs are disputed by third parties. The observed behavior (double free / invalid pointer free in readelf) only occurred in pre-release code and did not affect any tagged version [1][2]. CVE_STATUS[CVE-2025-69650] = "disputed: observed behavior only in pre-release code, does not affect any tagged version" CVE_STATUS[CVE-2025-69651] = "disputed: observed behavior only in pre-release code, does not affect any tagged version" [1] https://www.cve.org/CVERecord?id=CVE-2025-69650 [2] https://www.cve.org/CVERecord?id=CVE-2025-69651 Signed-off-by: Adarsh Jagadish Kamini (cherry picked from commit 9c6df56fe18237880c391798c2083dca595566f4) Signed-off-by: Yoann Congal --- meta/recipes-devtools/binutils/binutils-2.42.inc | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta/recipes-devtools/binutils/binutils-2.42.inc b/meta/recipes-devtools/binutils/binutils-2.42.inc index 839d31242ef..e27502af72e 100644 --- a/meta/recipes-devtools/binutils/binutils-2.42.inc +++ b/meta/recipes-devtools/binutils/binutils-2.42.inc @@ -20,6 +20,8 @@ UPSTREAM_CHECK_GITTAGREGEX = "binutils-(?P\d+_(\d_?)*)" CVE_STATUS[CVE-2023-25584] = "cpe-incorrect: Applies only for version 2.40 and earlier" CVE_STATUS[CVE-2025-1180] = "patched: fixed by patch for CVE-2025-1176" +CVE_STATUS[CVE-2025-69650] = "disputed: observed behavior only in pre-release code, does not affect any tagged version" +CVE_STATUS[CVE-2025-69651] = "disputed: observed behavior only in pre-release code, does not affect any tagged version" SRCREV ?= "f9488b0d92b591bdf3ff8cce485cb0e1b3727cc0" BINUTILS_GIT_URI ?= "git://sourceware.org/git/binutils-gdb.git;branch=${SRCBRANCH};protocol=https" From patchwork Fri Apr 24 20:55:10 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86864 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 37589FE5209 for ; Fri, 24 Apr 2026 20:56:51 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31964.1777064205709649009 for ; Fri, 24 Apr 2026 13:56:46 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=FI1h7RlW; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-488ff90d6c7so68176055e9.2 for ; Fri, 24 Apr 2026 13:56:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064204; x=1777669004; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=ZCyOJp46iP7V4VfchF1AzJEyNlstjdhm455p98Do7Hw=; b=FI1h7RlWQOIgyyNzM//HTMt4yjSOtygC63LxQD0sOTb/Hfv6EdIWSxV2u3bnrAUJFV UqH5wJADLrKLPGPEVIejtakbpLRV9jdO6VOiD3buCf1aBF8wj0l1pS/tOmBNs/FSl7x+ 9+VFDUhlXbDtwPSLiPnAW5q1iuIbHutnNIQJA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064204; x=1777669004; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=ZCyOJp46iP7V4VfchF1AzJEyNlstjdhm455p98Do7Hw=; b=REmQfkXoBFnjuvlKk18eCGh4t8ccePCq7cvewytkiKxqLTYWnHDEPIpi5M02mSWWUg ex7ujC97rso6FvuubsKL5HdtdJosQa6yunTJ1Y4FB3rbxNmzAXHBI4mn0jrSJ01rlipd +dUE1Ck9upoRA9uvHfWQCr0hCCMXy1Ct7IymqY4C5XAeFRi7aeHWG7opNTBq4N2dmyOD x7k06HdrejqUHL7YfD00nHcQLyuCfZbgR+9Wm4bImSd3Gi6SLMMmkGuAes+ZzMnGLXFy do7FNLYSAnAp5t43XsWeHuqjiqBoZC2PApM+4vgW/f2bobNwBtpFvhsWJim7dNdKeuRo A1rw== X-Gm-Message-State: AOJu0YwHWx+gVWXuPZxzZ5YR3dlem4pmLXl9tPmI5PKxujLRFc8YaHLO YupwKkrAZ5U8Y1PI4b19U0/DyItVmnHLz1nWeNDq1rqI/8SG1F1M/kyMqxM7BcEEHbdwL73NE4x ZgYKn3R13rGGk X-Gm-Gg: AeBDieu/3c8VprRz14t5rjlR8OkJWy2lHxrvnDYqQItCDhGFI9EaQsDSLF6DjWfS4Ec 6a52f1PQs/yVhXNU5U0cLmdHOz/d4reyL05dg6Fvu6MKrlc/hofG5oadxEbPi+vY8IYMhQfwRZe uDd1UDTO7Wa0/79zeAnmZptUUl1A53n+jJtLXYilZircpGZWoF8dTsvuThwrbY37qGanMv0L21t EdQKcLboGg5QkR/+S2ffZx+aMVsdoC4inzqYOO5epFH0ce3VO51qkirCtby9PEpiLfF1i2bX6Ub yLgPcoqkoaMO/BnYe4s8Pp4xsVB4Zc4Run9+9nQuLZxq3MSsueR2PyKzg1RIce5AsibEvCPgHE9 damfKoRod29GpE6fOviaa54OjBmvgHCnOXaikpWocBldK+vlN9B3Uwjhzi+8ngtznC9Cd6s0wYF i4h9pW9WxjQA1VN23lai72URDAjQW8LRNlnY2NhNESXMXZnyZeW2jau7q1t50KZCpOEV5dPJhJd WWnAAeC9JkniUrDZZDQ9kz6eiH5TRPea5+6hg== X-Received: by 2002:a05:600c:628c:b0:48a:52d4:888c with SMTP id 5b1f17b1804b1-48a52d48985mr300082325e9.3.1777064203791; Fri, 24 Apr 2026 13:56:43 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.43 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:43 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 11/66] vim: Fix CVE-2026-25749 Date: Fri, 24 Apr 2026 22:55:10 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:51 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235884 From: Anil Dongare Pick patch from [1] also mentioned in [2] [1] https://github.com/vim/vim/commit/0714b15940b245108e6e9d7aa2260dd849a26fa9 [2] https://nvd.nist.gov/vuln/detail/CVE-2026-25749 Signed-off-by: Anil Dongare Signed-off-by: Yoann Congal --- .../vim/files/CVE-2026-25749.patch | 64 +++++++++++++++++++ meta/recipes-support/vim/vim.inc | 1 + 2 files changed, 65 insertions(+) create mode 100644 meta/recipes-support/vim/files/CVE-2026-25749.patch diff --git a/meta/recipes-support/vim/files/CVE-2026-25749.patch b/meta/recipes-support/vim/files/CVE-2026-25749.patch new file mode 100644 index 00000000000..8b04379b9b7 --- /dev/null +++ b/meta/recipes-support/vim/files/CVE-2026-25749.patch @@ -0,0 +1,64 @@ +From e0065a61a42bdff9c75aa18104f8ff546938395f Mon Sep 17 00:00:00 2001 +From: Christian Brabandt +Date: Thu, 5 Feb 2026 18:51:54 +0000 +Subject: [PATCH] patch 9.1.2132: [security]: buffer-overflow in 'helpfile' + option handling + +Problem: [security]: buffer-overflow in 'helpfile' option handling by + using strcpy without bound checks (Rahul Hoysala) +Solution: Limit strncpy to the length of the buffer (MAXPATHL) + +Github Advisory: +https://github.com/vim/vim/security/advisories/GHSA-5w93-4g67-mm43 + +CVE: CVE-2026-25749 +Upstream-Status: Backport [https://github.com/vim/vim/commit/0714b15940b245108e6e9d7aa2260dd849a26fa9] + +Backport Changes: +- Excluded changes to src/version.c and runtime/doc/version9.txt + from this backport. This file only tracks upstream version increments. + We are applying a security fix, not a version upgrade. These changes + were skipped to maintain current package versioning and avoid merge conflicts. + +Signed-off-by: Christian Brabandt +(cherry picked from commit 0714b15940b245108e6e9d7aa2260dd849a26fa9) +Signed-off-by: Anil Dongare +--- + src/tag.c | 2 +- + src/testdir/test_help.vim | 9 +++++++++ + 2 files changed, 10 insertions(+), 1 deletion(-) + +diff --git a/src/tag.c b/src/tag.c +index 6912e8743..a32bbb245 100644 +--- a/src/tag.c ++++ b/src/tag.c +@@ -3348,7 +3348,7 @@ get_tagfname( + if (tnp->tn_hf_idx > tag_fnames.ga_len || *p_hf == NUL) + return FAIL; + ++tnp->tn_hf_idx; +- STRCPY(buf, p_hf); ++ vim_strncpy(buf, p_hf, MAXPATHL - 1); + STRCPY(gettail(buf), "tags"); + #ifdef BACKSLASH_IN_FILENAME + slash_adjust(buf); +diff --git a/src/testdir/test_help.vim b/src/testdir/test_help.vim +index dac153d86..f9e4686bb 100644 +--- a/src/testdir/test_help.vim ++++ b/src/testdir/test_help.vim +@@ -222,4 +222,13 @@ func Test_helptag_navigation() + endfunc + + ++" This caused a buffer overflow ++func Test_helpfile_overflow() ++ let _helpfile = &helpfile ++ let &helpfile = repeat('A', 5000) ++ help ++ helpclose ++ let &helpfile = _helpfile ++endfunc ++ + " vim: shiftwidth=2 sts=2 expandtab +-- +2.43.7 + diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc index 289f31be707..ae1c95973dc 100644 --- a/meta/recipes-support/vim/vim.inc +++ b/meta/recipes-support/vim/vim.inc @@ -16,6 +16,7 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https \ file://disable_acl_header_check.patch \ file://0001-src-Makefile-improve-reproducibility.patch \ file://no-path-adjust.patch \ + file://CVE-2026-25749.patch \ " PV .= ".1683" From patchwork Fri Apr 24 20:55:11 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86860 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 92B32FB44B2 for ; Fri, 24 Apr 2026 20:56:50 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31965.1777064206172398120 for ; Fri, 24 Apr 2026 13:56:46 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=vlzcZYAd; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488ad135063so74478165e9.0 for ; Fri, 24 Apr 2026 13:56:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064204; x=1777669004; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=6PI8D1nkoA5g1m9MsnkiKc7DywRhVUEpC1cG/brEw+Q=; b=vlzcZYAdNt9mi2FLfOH7eqvhpr8xleSZKXnzWnKX5ig+20sjjgv+gAuVPXkLaGJQYL rOLKE0PYWJ0qQvGNvJRyguxaIIZ/U9Sa+rbK4XbSbxB4kDV+3JnMhBd2BZiyYn7pkTA8 mpDsF3IDhrrBgAWL72oqCIgVdyVE2clvmZ8no= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064204; x=1777669004; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=6PI8D1nkoA5g1m9MsnkiKc7DywRhVUEpC1cG/brEw+Q=; b=Rx8SQcNQUwlxqkwrrWYthf/Px9Q8oxYoSfS4krEZ8nD94WPvYmrIqZomNxqJ1+m4B7 YqJqw+uDsdbho/MEXkunuhVHDWpxKXEOAr7aHxu7rF+NaS2DLkKSQeaNzQmvlu8DIuwS AtqWhbSDFJ8zgIODVOxTct+C0zjh92sh0hzvjIPDzblolRCpRjlqwOhLc982eUtCvrky dUdbLjGcZxbwfqbMY8mhap49++WMQSFJNUtL9gn0MO9NPYtaGeNwfz9XyGeI81W1ZqA7 1Su3ppUu1nWxCX7/9UWVJJLuFrjTEX1DKv72iVBt2LZicQnjOQ1ZQ4Egb/golf9PjIJB ZQVw== X-Gm-Message-State: AOJu0YxmR+7sHowvMn+Dpc2Ntj30+dhoQSVL2dVAt03CgXXRglqenRh+ alb/VEuR5ZHmxv5RhD9UUOQz/nMoHMx3z0f+IGc4UHjBGWymIkRA4xCd4TnTva3cGn63YQZbQZE rQ5dVNQ854Eg/ X-Gm-Gg: AeBDiet2LThgbc5JdswD4nRDxvLAMOG3CoMsCrfaf0HZBw0SpVI6FZ4R6EpRJTJ/8C3 3v/ztnaXzURNIhnwD2WTZsec+PKaIH0HXftFmIav/9k77dmD8odizpqNebkaHhBkcyDHoi7pthF YyJcADtgjIplWK4bDCHcbi6Vy97cUqYzMvNnjuXnJg7YCifD4i0mHCKezogSojX9hxw8T/RBLI2 3czqPIimfrN8KjaV5wizK/+w6CfYScmhqOoOoQAh/o+AGl90u3jt350BXYBYK/Su/N+RqgCK6T9 WeJ1u6Dn6tHwxYEDv7m11hoORX1mv/eDUPrkPq9K8eAD5hzACzsm0WnpsrfDVIbd88tZhCZ9UX8 GLrwAxKVKu5/ek7s3dVmQWEOCr2E+LE6QDRNtesFs/zTB3C8CXClQF7f9OqXbD+JcHV5IdL/Vtg hQa/igTg+u0y6g6kl1W8eNtVrtJJOh0EhZ17wMjA3xprKdKSJMhDNNEuGlXRBmzZ1jEmGCBzEjr NAGBZFx+BKuIYIdSd+XxlwfQuVnIhGy5AwyOQ== X-Received: by 2002:a05:600c:8587:b0:485:3f30:6250 with SMTP id 5b1f17b1804b1-488fb7856b9mr363188795e9.20.1777064204284; Fri, 24 Apr 2026 13:56:44 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.43 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:43 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 12/66] vim: Fix CVE-2026-26269 Date: Fri, 24 Apr 2026 22:55:11 +0200 Message-ID: <1d870ab25eea1c0204fb7abe109251aa55326b76.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:50 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235885 From: Anil Dongare Pick patch from [1] also mentioned in [2] [1] https://github.com/vim/vim/commit/c5f312aad8e4179e437f81ad39a860cd0ef11970 [2] https://nvd.nist.gov/vuln/detail/CVE-2026-26269 Signed-off-by: Anil Dongare Signed-off-by: Yoann Congal --- .../vim/files/CVE-2026-26269.patch | 150 ++++++++++++++++++ meta/recipes-support/vim/vim.inc | 1 + 2 files changed, 151 insertions(+) create mode 100644 meta/recipes-support/vim/files/CVE-2026-26269.patch diff --git a/meta/recipes-support/vim/files/CVE-2026-26269.patch b/meta/recipes-support/vim/files/CVE-2026-26269.patch new file mode 100644 index 00000000000..1f9a72bca1d --- /dev/null +++ b/meta/recipes-support/vim/files/CVE-2026-26269.patch @@ -0,0 +1,150 @@ +From 3cc246980b800454dda0603af410c77a8c1926e0 Mon Sep 17 00:00:00 2001 +From: Christian Brabandt +Date: Fri, 13 Feb 2026 10:27:12 +0100 +Subject: [PATCH] patch 9.1.2148: [security]: Buffer overflow in netbeans + interface + +Problem: [security]: Buffer overflow in netbeans special_keys() handling +Solution: Limit writing to max KEYBUFLEN bytes to prevent writing out of + bounds. + +Github Advisory: +https://github.com/vim/vim/security/advisories/GHSA-9w5c-hwr9-hc68 + +CVE: CVE-2026-26269 +Upstream-Status: Backport [https://github.com/vim/vim/commit/c5f312aad8e4179e437f81ad39a860cd0ef11970] + +Backport Changes: +- Excluded changes to src/version.c from this backport. This file only tracks + upstream version increments. We are applying a security fix, not a version + upgrade. These changes were skipped to maintain current package versioning + and avoid merge conflicts. + +Signed-off-by: Christian Brabandt +(cherry picked from commit c5f312aad8e4179e437f81ad39a860cd0ef11970) +Signed-off-by: Anil Dongare +--- + runtime/doc/version9.txt | 5 +++ + src/netbeans.c | 2 +- + src/testdir/test_netbeans.py | 4 ++- + src/testdir/test_netbeans.vim | 57 +++++++++++++++++++++++++++++++++++ + 4 files changed, 66 insertions(+), 2 deletions(-) + +diff --git a/runtime/doc/version9.txt b/runtime/doc/version9.txt +index b82071757..b32400f17 100644 +--- a/runtime/doc/version9.txt ++++ b/runtime/doc/version9.txt +@@ -41899,4 +41899,9 @@ features, but does not include runtime file changes (syntax, indent, ftplugin, + documentation, etc.) + + ++Patch 9.1.2148 ++Problem: [security]: Buffer overflow in netbeans special_keys() handling ++Solution: Limit writing to max KEYBUFLEN bytes to prevent writing out of ++ bounds. ++ + vim:tw=78:ts=8:noet:ft=help:norl:fdm=manual:nofoldenable +diff --git a/src/netbeans.c b/src/netbeans.c +index 4f5378512..8a341a20b 100644 +--- a/src/netbeans.c ++++ b/src/netbeans.c +@@ -2302,7 +2302,7 @@ special_keys(char_u *args) + if ((sep = strchr(tok, '-')) != NULL) + { + *sep = NUL; +- while (*tok) ++ while (*tok && i + 2 < KEYBUFLEN) + { + switch (*tok) + { +diff --git a/src/testdir/test_netbeans.py b/src/testdir/test_netbeans.py +index 0d6b09680..585886fb4 100644 +--- a/src/testdir/test_netbeans.py ++++ b/src/testdir/test_netbeans.py +@@ -112,7 +112,9 @@ class ThreadedTCPRequestHandler(socketserver.BaseRequestHandler): + 'startAtomic_Test' : '0:startAtomic!94\n', + 'endAtomic_Test' : '0:endAtomic!95\n', + 'AnnoScale_Test' : "".join(['2:defineAnnoType!60 ' + str(i) + ' "s' + str(i) + '" "x" "=>" blue none\n' for i in range(2, 26)]), +- 'detach_Test' : '2:close!96\n1:close!97\nDETACH\n' ++ 'detach_Test' : '2:close!96\n1:close!97\nDETACH\n', ++ 'specialKeys_overflow_Test' : '0:specialKeys!200 "' + 'A'*80 + '-X"\n' ++ + } + # execute the specified test + if cmd not in testmap: +diff --git a/src/testdir/test_netbeans.vim b/src/testdir/test_netbeans.vim +index d3d5e8baf..d1be5066e 100644 +--- a/src/testdir/test_netbeans.vim ++++ b/src/testdir/test_netbeans.vim +@@ -958,6 +958,58 @@ func Nb_bwipe_buffer(port) + sleep 10m + endfunc + ++func Nb_specialKeys_overflow(port) ++ call delete("Xnetbeans") ++ call writefile([], "Xnetbeans") ++ ++ " Last line number in the Xnetbeans file. Used to verify the result of the ++ " communication with the netbeans server ++ let g:last = 0 ++ ++ " Establish the connection with the netbeans server ++ exe 'nbstart :localhost:' .. a:port .. ':bunny' ++ call WaitFor('len(ReadXnetbeans()) > (g:last + 2)') ++ let l = ReadXnetbeans() ++ call assert_equal(['AUTH bunny', ++ \ '0:version=0 "2.5"', ++ \ '0:startupDone=0'], l[-3:]) ++ let g:last += 3 ++ ++ " Open the command buffer to communicate with the server ++ split Xcmdbuf ++ let cmdbufnr = bufnr() ++ call WaitFor('len(ReadXnetbeans()) > (g:last + 2)') ++ let l = ReadXnetbeans() ++ call assert_equal('0:fileOpened=0 "Xcmdbuf" T F', ++ \ substitute(l[-3], '".*/', '"', '')) ++ call assert_equal('send: 1:putBufferNumber!15 "Xcmdbuf"', ++ \ substitute(l[-2], '".*/', '"', '')) ++ call assert_equal('1:startDocumentListen!16', l[-1]) ++ let g:last += 3 ++ ++ " Keep the command buffer loaded for communication ++ hide ++ ++ sleep 1m ++ ++ " Open the command buffer to communicate with the server ++ split Xcmdbuf ++ let cmdbufnr = bufnr() ++ call appendbufline(cmdbufnr, '$', 'specialKeys_overflow_Test') ++ call WaitFor('len(ReadXnetbeans()) >= (g:last + 6)') ++ call WaitForAssert({-> assert_match('send: 0:specialKeys!200 "A\{80}-X"', ++ \ ReadXnetbeans()[-1])}) ++ ++ " Verify that specialKeys test, still works after the previous junk ++ call appendbufline(cmdbufnr, '$', 'specialKeys_Test') ++ call WaitFor('len(ReadXnetbeans()) >= (g:last + 1)') ++ call WaitForAssert({-> assert_match('^send: 0:specialKeys!91 "F12 F13 C-F13"$', ++ \ ReadXnetbeans()[-1])}) ++ let g:last += 1 ++ ++ sleep 10m ++endfunc ++ + " This test used to reference a buffer after it was freed leading to an ASAN + " error. + func Test_nb_bwipe_buffer() +@@ -967,4 +1019,9 @@ func Test_nb_bwipe_buffer() + nbclose + endfunc + ++" Verify that the specialKeys argument does not overflow ++func Test_nb_specialKeys_overflow() ++ call s:run_server('Nb_specialKeys_overflow') ++endfunc ++ + " vim: shiftwidth=2 sts=2 expandtab +-- +2.43.7 + diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc index ae1c95973dc..640aa2c9da1 100644 --- a/meta/recipes-support/vim/vim.inc +++ b/meta/recipes-support/vim/vim.inc @@ -17,6 +17,7 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https \ file://0001-src-Makefile-improve-reproducibility.patch \ file://no-path-adjust.patch \ file://CVE-2026-25749.patch \ + file://CVE-2026-26269.patch \ " PV .= ".1683" From patchwork Fri Apr 24 20:55:12 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86868 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2557CFDEE55 for ; Fri, 24 Apr 2026 20:56:51 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32577.1777064206710951302 for ; Fri, 24 Apr 2026 13:56:47 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=1vLl/3Lu; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-48a563e4ef7so47911675e9.0 for ; Fri, 24 Apr 2026 13:56:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064205; x=1777669005; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=55Y7L25TOWINX3f157tQ+cU68068vDkT8HdhS71eb6A=; b=1vLl/3LuffP88LafOqLP6/J+iVRjkJ/lSCwx08zg2Bb6T2uJKvHUFJOTjZS2snSEzU 7/2tmbPCJ9K4v1aYlubUUjiIKUi1jXAxPIn8MHu6e9fYMz7rKwbeE0K9LZb0qB/ofo5w ZOQFcp1qdDqMrr/vWWBMWIO2E8cugU8FoSB5c= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064205; x=1777669005; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=55Y7L25TOWINX3f157tQ+cU68068vDkT8HdhS71eb6A=; b=YhhR5DsrnB1IGL1LNriKtyoeScsd3Y/c0Pjdvo2c2qOecHl/F69E2FYlrtW2TOYkwM 8w3l8cTH/dCkbdpOSGRiDAI7ypaMfIdIYw9BIt8AzFCQNpdZTrNLT38nQzItzAvwppdI UB7FVFTLOclcJa6TCbjyk7wFpkOEMVRdRtPyMfzsiN7nzRNQ0nKugIn6kMVgh6BiH6e3 33xmPjCoBHj6a4YbFSFA6hR6lRSKL869/hFPqut8UJ61UawACuVPH3vsO3xFftv/G5OA ZngvgGbvacuf4Y5GNV32cnxlrF6R/nv6SgCpS66SZdJYI3cPoxy3O/CupHP05ilkGJV9 xr2g== X-Gm-Message-State: AOJu0YyGEmLaOnwe6xa29/kcWm2FA2xBcWBRWjqgfKrZwveDcD/f7V5T cfW2FHtJQJyioA9Fbt2lIfZWVwkK5k+5di0Xcic5KDsL42UVd0yEJKwjASjrqyWpFRdMu3726x0 Z04NXaaZfq3I1 X-Gm-Gg: AeBDieszIo+vB9rks3OpRevWdvLTdaqhd87HpazWYNcpZOHZPQJwQDFt22RwWCsS3mI QO8KyVxA1n/baGOsQXCgMYNDYSImbcE5REVMXbCaNHTDCeE3A7plz/xJ5JiYL9jHxurGZgnzlKe gUjbv7ItwSS58xBTccXksowppxN+xOFvVOiIvddEvLGq1ElYC7MZ+OmdcJqRZZfjg9t3Xyf8bel qGBmvrtaPxM2JO0KakPatDji7GERCYzy3YeOL8c5ncNPPciRwYLqGH736xO2W4G7hqaMBaw+By2 4gS1ONe5bTT2MfAkudK54p/P36v04fNFolRd34au9xs/xu/qfGaWSRgrD3+F6OhkHRqEzW4lVlE /A8IKhbZyLssHZFk5egYLD2luwLr9kujNsgLJ5qVL9PmfuQwsolwwC5f4woleVropNeEPTYC5xX 3WoDaN30K8GqpurWLjgxgUl5kBZPliYRArVWdLpyrJN+KzwE/R/PrHV6i6IzYy++N4JXdkBNl3k SK1H7HIN2YyS9avLRBveEiie0plmdCB9oPImg== X-Received: by 2002:a05:600c:5297:b0:485:9a50:3370 with SMTP id 5b1f17b1804b1-488fb74a431mr527606105e9.8.1777064204776; Fri, 24 Apr 2026 13:56:44 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.44 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:44 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 13/66] vim: Fix CVE-2026-33412 Date: Fri, 24 Apr 2026 22:55:12 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:51 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235886 From: Hitendra Prajapati Pick patch from [1] also mentioned in NVD report with [2] [1] https://github.com/vim/vim/commit/645ed6597d1ea896c712cd7ddbb6edee79577e9a [2] https://nvd.nist.gov/vuln/detail/CVE-2026-33412 Signed-off-by: Hitendra Prajapati Signed-off-by: Yoann Congal --- .../vim/files/CVE-2026-33412.patch | 61 +++++++++++++++++++ meta/recipes-support/vim/vim.inc | 1 + 2 files changed, 62 insertions(+) create mode 100644 meta/recipes-support/vim/files/CVE-2026-33412.patch diff --git a/meta/recipes-support/vim/files/CVE-2026-33412.patch b/meta/recipes-support/vim/files/CVE-2026-33412.patch new file mode 100644 index 00000000000..62daa308b58 --- /dev/null +++ b/meta/recipes-support/vim/files/CVE-2026-33412.patch @@ -0,0 +1,61 @@ +From 645ed6597d1ea896c712cd7ddbb6edee79577e9a Mon Sep 17 00:00:00 2001 +From: pyllyukko +Date: Thu, 19 Mar 2026 19:58:05 +0000 +Subject: [PATCH] patch 9.2.0202: [security]: command injection via newline in + glob() + +Problem: The glob() function on Unix-like systems does not escape + newline characters when expanding wildcards. A maliciously + crafted string containing '\n' can be used as a command + separator to execute arbitrary shell commands via + mch_expand_wildcards(). This depends on the user's 'shell' + setting. +Solution: Add the newline character ('\n') to the SHELL_SPECIAL + definition to ensure it is properly escaped before being + passed to the shell (pyllyukko). + +closes: #19746 + +Github Advisory: +https://github.com/vim/vim/security/advisories/GHSA-w5jw-f54h-x46c + +Signed-off-by: pyllyukko +Signed-off-by: Christian Brabandt + +CVE: CVE-2026-33412 +Upstream-Status: Backport [https://github.com/vim/vim/commit/645ed6597d1ea896c712cd7ddbb6edee79577e9a] +Signed-off-by: Hitendra Prajapati +--- + src/os_unix.c | 2 +- + src/version.c | 2 ++ + 2 files changed, 3 insertions(+), 1 deletion(-) + +diff --git a/src/os_unix.c b/src/os_unix.c +index cf195e62e1..d767956b1a 100644 +--- a/src/os_unix.c ++++ b/src/os_unix.c +@@ -7106,7 +7106,7 @@ mch_expandpath( + # define SEEK_END 2 + #endif + +-#define SHELL_SPECIAL (char_u *)"\t \"&'$;<>()\\|" ++# define SHELL_SPECIAL (char_u *)"\t \"&'$;<>()\\|\n" + + int + mch_expand_wildcards( +diff --git a/src/version.c b/src/version.c +index 4f3912aedd..712a3e637c 100644 +--- a/src/version.c ++++ b/src/version.c +@@ -724,6 +724,8 @@ static char *(features[]) = + + static int included_patches[] = + { /* Add new patch number below this line */ ++/**/ ++ 1684, + /**/ + 1683, + /**/ +-- +2.50.1 + diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc index 640aa2c9da1..4553c69c55f 100644 --- a/meta/recipes-support/vim/vim.inc +++ b/meta/recipes-support/vim/vim.inc @@ -18,6 +18,7 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https \ file://no-path-adjust.patch \ file://CVE-2026-25749.patch \ file://CVE-2026-26269.patch \ + file://CVE-2026-33412.patch \ " PV .= ".1683" From patchwork Fri Apr 24 20:55:13 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86856 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6D330FED3FD for ; Fri, 24 Apr 2026 20:56:50 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31966.1777064207602097906 for ; Fri, 24 Apr 2026 13:56:47 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=Rxt4NhGH; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-488af96f6b2so105874495e9.0 for ; Fri, 24 Apr 2026 13:56:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064206; x=1777669006; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=fe8FCftxG6H36GzZtbInjJCULYbuXNivwLRqvOXn1hE=; b=Rxt4NhGHdOLurbanTmZwZzMczEcJTBloleqqndibqMf41Df/gG8EIn0nM8K5id5uHS tjtks2CNgift4NpD1pvDp8WwIsf0boM+UPvV4u8Ddbvkz+TSaomU4kuvn41miNQmTh9P 12uG7R8wuc0awckchfRUaVNt6UWHbjcWa7mig= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064206; x=1777669006; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=fe8FCftxG6H36GzZtbInjJCULYbuXNivwLRqvOXn1hE=; b=qITZlApJy2Ct2abTbhpuBukw89c+gzkolhIq82iHudyyagSU6U/xo+S4b9N18TKAGr xcsqefx42+V3bIR9rwQtM7Y56QfBHUcRb5SyAB9bytmLXvrWmShwYF+5t9zkg4vOEta7 0Kw/1UA3CpVXodt+m2B4J70WBliBzGMVVaTi0ecvl7clHBGf50OjFhK4crEqbTs5hkpH +8j7jVMxnToWN8hs6FGA9BVva7eLMKat2bXt+uOtUoA0aPnbM3eguMzxJEwfd4vihqvB pVfFjo+FZxuQOCklq0EVcgnGOIRX2KO6S+pTOvr3iHmgqQCV1xMpq1Ogu3S3iJGPoJko J7+g== X-Gm-Message-State: AOJu0YzIcNdfHW9RqPsafbpaj+/oLbnYLZYg39yokFoDSjD1hoursZk/ js9ZP3suwJEgeQiCpkoyh0Fxc+DTBP1M83HX6d2r2tInDbR0vqq80mNuu+vpRS7r4metv5YGqVE cs09aujZjRicF X-Gm-Gg: AeBDievJSon/K/G+vsRGoAK6rT8sPJK6o74YZrqX3t4RB5KPErFLtgGLdZuKWC29Djr JeH0qkeR/ENXnq11myotuJz5R++qMPp61Csg/jWUIGAfIBzNkSkw9yeo7MEFkP6kOO5fPm4v18y n+uWMD2lA2lZAGP7P1EEx/OMm8fs+cFA5R5R99fE2Z96+RSWoomjDXZZSeksOMwvXo77lzqk0AU z22rARbCpsGTXL7tzusvuFxXerxMRWpFlkYztxeut6Cg8EooNJkLkJXnfJ2nOMZl2rImtcDredB oR3Pkyz4dW5MkhJ59qpa5wE10wDNSR1U8j+vKE4+4ab+hnKiCglg9zJfAT/MQKGEp68AIxPQK/J oFMWF6kNK+6mgbX0NKV90muXl+ha321NSIsJOjbAGwj+fk6KH/2Q06WNiYVjRWxCqKg716Crt6k AXcv5jdnS2jnCfAVB9JuHWcrqPZuFCGO8E/Eu+KXc8hikue9K5HA+vjCcUPdftPCkInutHDBlhE 5jM5ioSwSinWdulab2C4/R0pUcTWowEYRWQQQ== X-Received: by 2002:a05:600c:a086:b0:48a:568f:ae82 with SMTP id 5b1f17b1804b1-48a568fb009mr246314725e9.10.1777064205682; Fri, 24 Apr 2026 13:56:45 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.44 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:44 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 14/66] sqlite3: Fix CVE-2025-70873 Date: Fri, 24 Apr 2026 22:55:13 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:50 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235887 From: Vijay Anusuri Pick patch as per [1] [1] https://sqlite.org/src/info/3d459f1fb1bd1b5e [2] https://sqlite.org/forum/forumpost/761eac3c82 [3] https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054 Signed-off-by: Vijay Anusuri Signed-off-by: Yoann Congal --- .../sqlite/sqlite3/CVE-2025-70873.patch | 33 +++++++++++++++++++ meta/recipes-support/sqlite/sqlite3_3.45.3.bb | 1 + 2 files changed, 34 insertions(+) create mode 100644 meta/recipes-support/sqlite/sqlite3/CVE-2025-70873.patch diff --git a/meta/recipes-support/sqlite/sqlite3/CVE-2025-70873.patch b/meta/recipes-support/sqlite/sqlite3/CVE-2025-70873.patch new file mode 100644 index 00000000000..2125110f6af --- /dev/null +++ b/meta/recipes-support/sqlite/sqlite3/CVE-2025-70873.patch @@ -0,0 +1,33 @@ +From 5a05c59d4d75c03f23d5fb70feac9f789954bf8a Mon Sep 17 00:00:00 2001 +From: drh <> +Date: Sat, 6 Dec 2025 20:41:24 +0000 +Subject: [PATCH] In the zipfile extension, only return as many bytes as + Inflate actually generated. [forum:/forumpost/761eac3c82|Forum post + 761eac3c82]. Adjust ./configure so that it builds zipfile into testfixture if + ZLIB is available, so that tests get run on unix platforms. + +FossilOrigin-Name: 3d459f1fb1bd1b5e723629c463ab392af7b206ece3388bda216c6a4c26160909 + +Upstream-Status: Backport [https://github.com/sqlite/sqlite/commit/5a05c59d4d75c03f23d5fb70feac9f789954bf8a] +CVE: CVE-2025-70873 +Signed-off-by: Vijay Anusuri +--- + shell.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/shell.c b/shell.c +index ecace5a..8c3740c 100644 +--- a/shell.c ++++ b/shell.c +@@ -10277,7 +10277,7 @@ static void zipfileInflate( + if( err!=Z_STREAM_END ){ + zipfileCtxErrorMsg(pCtx, "inflate() failed (%d)", err); + }else{ +- sqlite3_result_blob(pCtx, aRes, nOut, zipfileFree); ++ sqlite3_result_blob(pCtx, aRes, (int)str.total_out, zipfileFree); + aRes = 0; + } + } +-- +2.43.0 + diff --git a/meta/recipes-support/sqlite/sqlite3_3.45.3.bb b/meta/recipes-support/sqlite/sqlite3_3.45.3.bb index 05bfaac1af9..1b3ac83b58d 100644 --- a/meta/recipes-support/sqlite/sqlite3_3.45.3.bb +++ b/meta/recipes-support/sqlite/sqlite3_3.45.3.bb @@ -8,6 +8,7 @@ SRC_URI = "http://www.sqlite.org/2024/sqlite-autoconf-${SQLITE_PV}.tar.gz \ file://CVE-2025-29088.patch \ file://CVE-2025-6965.patch \ file://CVE-2025-7709.patch \ + file://CVE-2025-70873.patch \ " SRC_URI[sha256sum] = "b2809ca53124c19c60f42bf627736eae011afdcc205bb48270a5ee9a38191531" From patchwork Fri Apr 24 20:55:14 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86866 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 18F60FDEE3E for ; Fri, 24 Apr 2026 20:56:51 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31967.1777064208077790765 for ; Fri, 24 Apr 2026 13:56:48 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=TFyN3zOM; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-488a14c31eeso66527805e9.0 for ; Fri, 24 Apr 2026 13:56:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064206; x=1777669006; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=MffMAA+ldKCr97stuFCm4kUVOy2AlXh8wWGczznJjE8=; b=TFyN3zOM/nzbVFEqismeKu31Ku/h0EEQTBUk1se+p8sfqufk0bLindUABdKN/oVizc gU4kubazUfBm4RnUJ6sO2oCuEeBMVcB/vQHtMv2PvIXkhIAB++uo+mhAONNS5htNv75f h1T8NRh+ZYDIyQ4vPQSBXqdjUyrtzCwwpA3fs= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064206; x=1777669006; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=MffMAA+ldKCr97stuFCm4kUVOy2AlXh8wWGczznJjE8=; b=cJ7xG9uqPMQF4dssnKBSHT+AODuz7uWCahyv+fCTjK113zNS4ZkuFP17RiEjLWK+GM hNLFsG/EIq3uyVj61BkBSqJXp9IRJUpAEgNvKL2hkKw0rJObLDXareEcIuk+STH1UxSY 2+0uE2c+Q5Lbh9vG361n6CRDFFm8aRrxTAP43oL9RO8D3exH4L1B5LrCxXF0iewq4o3I XuaNjTjdjR2PLN5fDyBRcQ1pZAGwRx1PvjeJaUSBr9JxBqBCbT5C6ET9qxcaroBQ9TuO gipA/Y7d12PQhdz2/naIoapkEiqFnUp+ComsNci5hDhnJBPeczw8cPat3lp21IMSDM+m C9AQ== X-Gm-Message-State: AOJu0Yx6L1VHta0/sCqBM1b//yQKt/rKCj0BACnV2CmSfIt21AGFnUDj g2MtYM8im8wdroXHY+Nf/P9tVCUmeMU7d9B79umpYok9azgqD2+x+R45VqvCpMlcIc9Eef9jyip Wb/6wOXMPQkmi X-Gm-Gg: AeBDieuTZQcwcOEuzUbsi1GINqf+KWe2kBO4BD+TjPodIh3m9GoPp2GKUB919Gz/vbD RozHt8W22wxtw+wis6oN53mOXSGTki/6SSiky8hD5f6T4ppSBG7i1SgBQC4ivo4l1tJexyZ8cDK Hp6gIYRoq9smPKwAUl1OjfZis78le20uq2LH3iH3LPtp6jodONi6BmNChdTEqErFg48jxo1SXGi gA947ZfG+YzPDkXzVW5cbRfmOYcaTfWneXjJ4UiEqPNVFgGD6PqNYIBxxNNjFC8ABXMxjWEUioc Bq0rLgsxwXp61W2kM7eWE5qC8OXoQsww1qYmlHotFq7wLh0ZFMGlVoYgpx8PnmcLwL3e69yeHp2 Ffrnul9OktGaVb2tgYllSWpRm4OrEmZeTUPmS8GrMqVFv2IwudMAlK0Q+kqWD9QjYULsi5nUNwR uXjHQsL8CM/OXAvwvvkD8anJN85BsRr75O484O4SmRgayU9WGdjVN3hN41XnHby/ovOwL2F79S5 XiyfJGJIp/KqapUGtQa14bQTLsjN5sSAqzz3A== X-Received: by 2002:a05:600c:a31a:b0:488:b239:77ec with SMTP id 5b1f17b1804b1-488fb778db4mr369203555e9.17.1777064206219; Fri, 24 Apr 2026 13:56:46 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.45 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:45 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 15/66] unfs3: Fix race issue causing a glibc test hang Date: Fri, 24 Apr 2026 22:55:14 +0200 Message-ID: <34f34512e5eeefc24b36b102a36fc90f14e2f7d2.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:51 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235888 From: Hemanth Kumar M D When running glibc tests under user mode NFS, tst-syslog was causing a hang. The hang was traced to unfsd exitting with a buffer overflow being detected. This was traced down to mksocket() where we'd see: socket path '/media/build/poky/build/build-st-2118464/tmp/work/x86-64-v3-poky-linux/glibc-testsuite/2.42+git/build-x86_64-poky-linux/testroot.root/dev/log' is too long at 141 vs 108 There is a length check in mknod_args() but obj may not be setup at this point by cat_name() since the functions can be executed out of order according to C. To avoid this, make the order explict. This means the length is checked and we avoid the buffer overflow. This will likely cause the glibc test to fail however it won't hang, which is a win. [YOCTO #16113] Signed-off-by: Richard Purdie Signed-off-by: Hemanth Kumar M D (cherry picked from commit e51d5e19cb1ba1d5ad7442064b64821d178bc9ca) Signed-off-by: Yoann Congal --- .../unfs3/unfs3/fixrace.patch | 38 +++++++++++++++++++ meta/recipes-devtools/unfs3/unfs3_git.bb | 1 + 2 files changed, 39 insertions(+) create mode 100644 meta/recipes-devtools/unfs3/unfs3/fixrace.patch diff --git a/meta/recipes-devtools/unfs3/unfs3/fixrace.patch b/meta/recipes-devtools/unfs3/unfs3/fixrace.patch new file mode 100644 index 00000000000..ebdb0d79f57 --- /dev/null +++ b/meta/recipes-devtools/unfs3/unfs3/fixrace.patch @@ -0,0 +1,38 @@ +When running glibc tests under user mode NFS, tst-syslog was causing a hang. The +hang was traced to unfsd exitting with a buffer overflow being detected. + +This was traced down to mksocket() where we'd see: + +socket path '/media/build/poky/build/build-st-2118464/tmp/work/x86-64-v3-poky-linux/glibc-testsuite/2.42+git/build-x86_64-poky-linux/testroot.root/dev/log' is too long at 141 vs 108 + +There is a length check in mknod_args() but obj may not be setup at this point by +cat_name() since the functions can be executed out of order according to C. + +To avoid this, make the order explict. This means the length is checked and we +avoid the buffer overflow. This will likely cause the glibc test to fail however +it won't hang, which is a win. + +Upstream-Status: Pending + +Signed-off-by: Richard Purdie +Signed-off-by: Hemanth Kumar M D + +diff --git a/nfs.c b/nfs.c +index 3e92f87..784089a 100644 +--- a/nfs.c ++++ b/nfs.c +@@ -776,9 +776,11 @@ MKNOD3res *nfsproc3_mknod_3_svc(MKNOD3args * argp, struct svc_req * rqstp) + + PREP(path, argp->where.dir); + pre = get_pre_cached(); +- result.status = +- join3(cat_name(path, argp->where.name, obj), +- mknod_args(argp->what, obj, &new_mode, &dev), exports_rw()); ++ result.status = cat_name(path, argp->where.name, obj); ++ if (result.status == NFS3_OK) ++ result.status = mknod_args(argp->what, obj, &new_mode, &dev); ++ if (result.status == NFS3_OK) ++ result.status = exports_rw(); + + cluster_create(obj, rqstp, &result.status); + diff --git a/meta/recipes-devtools/unfs3/unfs3_git.bb b/meta/recipes-devtools/unfs3/unfs3_git.bb index c5b7898b3c1..50d5cd272f0 100644 --- a/meta/recipes-devtools/unfs3/unfs3_git.bb +++ b/meta/recipes-devtools/unfs3/unfs3_git.bb @@ -18,6 +18,7 @@ SRC_URI = "git://github.com/unfs3/unfs3.git;protocol=https;branch=master \ file://0001-locate.c-Include-attr.h.patch \ file://0001-fix-building-on-macOS.patch \ file://0001-attr-fix-utime-for-symlink.patch \ + file://fixrace.patch \ " SRCREV = "c8f2d2cd4529955419bad0e163f88d47ff176b8d" UPSTREAM_CHECK_GITTAGREGEX = "unfs3\-(?P\d+(\.\d+)+)" From patchwork Fri Apr 24 20:55:15 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86854 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3F2B5FED3FA for ; Fri, 24 Apr 2026 20:56:50 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32578.1777064208519229303 for ; Fri, 24 Apr 2026 13:56:48 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=AVo4W+zf; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-488e1a8ac40so101193445e9.2 for ; Fri, 24 Apr 2026 13:56:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064207; x=1777669007; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=ti+aFxRA6CDGxD/PuP5GG5RdOqM0hd3VXI1YRahzRTM=; b=AVo4W+zfMIEPy/eTmSMQt7OZdcwPOHYKZzGQWFyp6PeoDO2kLtzYmOnNw/dywR5low mHNjK8LhKNBxWecLWK1FuTjPfYEeIynNFvyQqg3GCkw5mq01ptQSu2QipwYJjWZI8b0k sTSgQdYAVTs0kOSXP1MRO8QIj3qG0gf/qKgas= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064207; x=1777669007; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=ti+aFxRA6CDGxD/PuP5GG5RdOqM0hd3VXI1YRahzRTM=; b=Hb9rVAl+a2H1KH69EF1RdB2s/3ElbBe66U7jPx7cR7IzDZezIgkDCFcKn96oWq6EQo Dv7oGxQ7c4FFY1ZvUFBjlj0HWTxQRM8cDQf4B1I/EgqLpYbahxKNex9pOVlOdU+c6/aL gmeV4U7bUFK4hffip9y8RH2iVGBUx1CAR7fHdePDM6jV4BRjlFTo3hMkQYyaZGIIQ8bR TCjaTUOiDKS+Jg/LgjcSHjxKEyNNAUBqAE60gUHNNuIDwful2rrrpcp4tS4WGSGNnR3/ Gq4l6eD2HTBen6JKEptX670vl5aXbPFXArrL4dZMzkYWUEbPfjt1L7PKTCCDs1wSZpfx a71A== X-Gm-Message-State: AOJu0Yx+t+nIfo0n04J73+LjlvbLUAYYdBPijPy0Qut6SMp8zA9f/oN7 f68IjcsZlXO8ScFzp6CxFlGtdbUpOXyWhdSLOOCa9gtbMT0TgNr1ZBLPhSb98Uf1ozeV47RAGQz c9Jj+udy+XAff X-Gm-Gg: AeBDievt+63XQQyXqO2THHt6Sm1QM7ghdX/9zQsCGBA8r3YaBpYG/4AmxJMKloFGAr6 qSSMDhGXBEJxNlAfBshf5jNIvBrzXemN1WlBQ6mLtD78le3CDyJSOwY/3LYBljPr0RVxdnIckZF SDarn0G9+tZ9LnmsuZJvAZi3yiQMIAqufEzK3Iv0gylbEC4IshJTm7luuZrPovxs9tT3hBah2gF MiDGqYV9AOjPLWDjEp3t9Rm0WngXmdkrCwKWSTrwj9aaC+6Ra3UfaE9po6EJtIxd4ECo8AgZujH FebCFxhW40SJU30dFF7ywnLRYUp7I8qLZN6k4l85cV5XYadEBD3h5Yd9VR4djEPzPCGtgXiXaAx /OzrJIrDVd1VU6vZEPqI6m3yg9cfwyC+RczOvE05Fx8P148y7bs1F0k0ZO3vYKqVxH9ujr6g+SB XFo7cXroIaSKHexT8uUU38+apNAyp8Z2v05qPE4D+tkPKfIefCjAG9PeuCtLwx1nMPMtTecUy1d 6N7U3BRBzBpbPKWi0kMPsA+4LGp5knO8CnY96QMXnvqX2Iw X-Received: by 2002:a05:600c:3f0c:b0:48a:563c:c8e0 with SMTP id 5b1f17b1804b1-48a563cd16bmr236799215e9.1.1777064206618; Fri, 24 Apr 2026 13:56:46 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.46 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:46 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 16/66] nghttp2: Fix CVE-2026-27135 Date: Fri, 24 Apr 2026 22:55:15 +0200 Message-ID: <892fdc819660ab67d9930e0ccb71e4138fcf1750.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:50 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235889 From: Anil Dongare Pick patch from [1] also mentioned in [2] [1] https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1 [2] https://nvd.nist.gov/vuln/detail/CVE-2026-27135 Signed-off-by: Anil Dongare Signed-off-by: Yoann Congal --- .../nghttp2/nghttp2/CVE-2026-27135.patch | 110 ++++++++++++++++++ .../recipes-support/nghttp2/nghttp2_1.61.0.bb | 4 +- 2 files changed, 113 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-support/nghttp2/nghttp2/CVE-2026-27135.patch diff --git a/meta/recipes-support/nghttp2/nghttp2/CVE-2026-27135.patch b/meta/recipes-support/nghttp2/nghttp2/CVE-2026-27135.patch new file mode 100644 index 00000000000..c4977cded01 --- /dev/null +++ b/meta/recipes-support/nghttp2/nghttp2/CVE-2026-27135.patch @@ -0,0 +1,110 @@ +From f9812d447b14435de77751077ef48214ebf252ec Mon Sep 17 00:00:00 2001 +From: Tatsuhiro Tsujikawa +Date: Wed, 18 Feb 2026 18:04:30 +0900 +Subject: [PATCH] Fix missing iframe->state validations to avoid assertion + failure + +CVE: CVE-2026-27135 +Upstream-Status: Backport [https://github.com/nghttp2/nghttp2/commit/5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1] + +(cherry picked from commit 5c7df8fa815ac1004d9ecb9d1f7595c4d37f46e1) +Signed-off-by: Anil Dongare +--- + lib/nghttp2_session.c | 32 ++++++++++++++++++++++++++++++++ + 1 file changed, 32 insertions(+) + +diff --git a/lib/nghttp2_session.c b/lib/nghttp2_session.c +index 004a4dff..54312588 100644 +--- a/lib/nghttp2_session.c ++++ b/lib/nghttp2_session.c +@@ -6079,6 +6079,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session, + return rv; + } + ++ if (iframe->state == NGHTTP2_IB_IGN_ALL) { ++ return (nghttp2_ssize)inlen; ++ } ++ + on_begin_frame_called = 1; + + rv = session_process_headers_frame(session); +@@ -6445,6 +6449,9 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session, + if (nghttp2_is_fatal(rv)) { + return rv; + } ++ if (iframe->state == NGHTTP2_IB_IGN_ALL) { ++ return (nghttp2_ssize)inlen; ++ } + } + } + +@@ -6701,6 +6708,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session, + return rv; + } + ++ if (iframe->state == NGHTTP2_IB_IGN_ALL) { ++ return (nghttp2_ssize)inlen; ++ } ++ + session_inbound_frame_reset(session); + + break; +@@ -7004,6 +7015,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session, + if (nghttp2_is_fatal(rv)) { + return rv; + } ++ ++ if (iframe->state == NGHTTP2_IB_IGN_ALL) { ++ return (nghttp2_ssize)inlen; ++ } + } else { + iframe->state = NGHTTP2_IB_IGN_HEADER_BLOCK; + } +@@ -7169,6 +7184,11 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session, + rv = session->callbacks.on_data_chunk_recv_callback( + session, iframe->frame.hd.flags, iframe->frame.hd.stream_id, + in - readlen, (size_t)data_readlen, session->user_data); ++ ++ if (iframe->state == NGHTTP2_IB_IGN_ALL) { ++ return (nghttp2_ssize)inlen; ++ } ++ + if (rv == NGHTTP2_ERR_PAUSE) { + return (nghttp2_ssize)(in - first); + } +@@ -7256,6 +7276,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session, + return rv; + } + ++ if (iframe->state == NGHTTP2_IB_IGN_ALL) { ++ return (nghttp2_ssize)inlen; ++ } ++ + if (rv != 0) { + busy = 1; + +@@ -7274,6 +7298,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session, + return rv; + } + ++ if (iframe->state == NGHTTP2_IB_IGN_ALL) { ++ return (nghttp2_ssize)inlen; ++ } ++ + session_inbound_frame_reset(session); + + break; +@@ -7302,6 +7330,10 @@ nghttp2_ssize nghttp2_session_mem_recv2(nghttp2_session *session, + return rv; + } + ++ if (iframe->state == NGHTTP2_IB_IGN_ALL) { ++ return (nghttp2_ssize)inlen; ++ } ++ + session_inbound_frame_reset(session); + + break; +-- +2.43.7 + diff --git a/meta/recipes-support/nghttp2/nghttp2_1.61.0.bb b/meta/recipes-support/nghttp2/nghttp2_1.61.0.bb index ad85576dcbc..ebba15db282 100644 --- a/meta/recipes-support/nghttp2/nghttp2_1.61.0.bb +++ b/meta/recipes-support/nghttp2/nghttp2_1.61.0.bb @@ -4,7 +4,9 @@ SECTION = "libs" LICENSE = "MIT" LIC_FILES_CHKSUM = "file://COPYING;md5=764abdf30b2eadd37ce47dcbce0ea1ec" -SRC_URI = "${GITHUB_BASE_URI}/download/v${PV}/nghttp2-${PV}.tar.xz" +SRC_URI = "${GITHUB_BASE_URI}/download/v${PV}/nghttp2-${PV}.tar.xz \ + file://CVE-2026-27135.patch \ + " SRC_URI[sha256sum] = "c0e660175b9dc429f11d25b9507a834fb752eea9135ab420bb7cb7e9dbcc9654" inherit cmake manpages python3native github-releases From patchwork Fri Apr 24 20:55:16 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86855 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2E346FED3FC for ; Fri, 24 Apr 2026 20:56:50 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32579.1777064209080665983 for ; Fri, 24 Apr 2026 13:56:49 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=BPXqgZOO; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-4891c0620bcso53507985e9.1 for ; Fri, 24 Apr 2026 13:56:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064207; x=1777669007; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=tM9dy3xZ7fO4lcMOdD3JEC93WMKYTqcEWdhopusC+b0=; b=BPXqgZOOFsDc/B42ehQfc7yu9u+4Iw/7GE6+qmWG9angwpaNZ39afbZFNheeO5UpAE icnHtIrpthwXINBNIY73bZKZj5X7p7X5eLgiFDfIVESSvl8cebFMkfAmvuxBwhd9t5Sp EznsmifBCncXtlxjgY4vbZts80b5fSTQRCwp0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064207; x=1777669007; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=tM9dy3xZ7fO4lcMOdD3JEC93WMKYTqcEWdhopusC+b0=; b=AMRtwaKH71cEgifinFQRR7fU0SEHjjXsM4aPk3IUe4ezT0eGPIdl2DiJzv/pocgaKD gkLdOLrM3ACiKu0HmSt62/lby/mqw621OsL/gvIp7HWP9HePApljI7k3zXO5b6VlIcQT 9vsy3Aq4/P9WRbjMKx4l1IP+lNDeHoU8dDesQFBNAs7mt8FX/w2+tCkD2wm0F/Y73y4Z q1ey/HR070rLE+m7vRo8utYNk/BM/N8ybXciaK0Q62yr4nZY9Gxbk3T96WtFxmgGZ0ZP NGuh9ZDSeKsizeocEERLzTb7u6BbA6kiDgZ43IW4R4f6qVEcjUjQMqqVv5XJ7SjYvYmJ 9OFA== X-Gm-Message-State: AOJu0YyFfR4LGDM3YmpvEmEYuO1kLFr/dtxUbZce4e8eJuLp2ecSsLgE oQ0ThphtLG1F4KJoscZQhazdyrhl8htrVbfiNT9Ar8j7CbUFMH6RjSN5APOpv7lLKvYgql8Twlw ciFw0C80hmNzJ X-Gm-Gg: AeBDievUXqMNiXXcBbyjQfXp55HGvLkd/MuU7iSveAwMBS664bCwezzFJVMGSZBJkC6 hTejqjlnocRWGzqTPthujDzPasylY9HoWQ6eoz8u0C/OKUfIi93EYY00kQ2g2OKB0UUSdYGKdBD Eux9jhalq0qkPv0U8J4Z648396Xfyu/Q/bSzrv/j+Su8ucxBsyi/jJE1RYc+wfuv6sQL53/hd5v Vl85OiM4+IIgN9yH1gOiJrCbGXgCggjwoNi4tMzWLd3rig+BlHt2UakulLs6Y7eY1yn56vhvqLa bpKTFEPkta9aA/B164sfyKxfHAQ6bHZZO6VJETYO46HuAIdZUomiWzN1cXVJWW/+/h06wh+Aow2 XEMo86HMovIJP6Jj5dt3xvnvPlY8ojyCvHG7JYm1mhAPnHaHB/1pFijskJFcP2jO9TcD2+xh6cs VoTYiFowvqfDcYhS4wecxfUI1Bmgh3pKxd0ST4GrlhLCmudH9N/9RiungmWNNAAMKr35/u6DqGX +/7haTkOGiumBc6CwT5otdTv0OpZA5zJ2TeTw== X-Received: by 2002:a05:600c:468f:b0:489:1cd2:610a with SMTP id 5b1f17b1804b1-4891cd2624fmr310641285e9.9.1777064207160; Fri, 24 Apr 2026 13:56:47 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.46 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:46 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 17/66] linux/generate-cve-exclusions: backport script from master branch Date: Fri, 24 Apr 2026 22:55:16 +0200 Message-ID: <66a13f93403533b95ed27eed24931aa310f8ce79.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:50 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235890 From: João Marcos Costa (Schneider Electric) The current version of this script in Scarthgap is outdated, since it still uses data from linux_kernel_cves. This repository was archived in 2024. To avoid any risks of conflicts, and/or a patch series longer than it needs to be, I copied the generate-cve-exclusions.py script from oe-core's master branch (rev. "e954a94b5b528b2430e8da331107d7d58287f89b") as-is. Signed-off-by: João Marcos Costa (Schneider Electric) Signed-off-by: Yoann Congal --- .../linux/generate-cve-exclusions.py | 122 +++++++++++++----- 1 file changed, 90 insertions(+), 32 deletions(-) diff --git a/meta/recipes-kernel/linux/generate-cve-exclusions.py b/meta/recipes-kernel/linux/generate-cve-exclusions.py index aa9195aab4f..5139b110558 100755 --- a/meta/recipes-kernel/linux/generate-cve-exclusions.py +++ b/meta/recipes-kernel/linux/generate-cve-exclusions.py @@ -1,7 +1,7 @@ #! /usr/bin/env python3 # Generate granular CVE status metadata for a specific version of the kernel -# using data from linuxkernelcves.com. +# using json data from cvelistV5 or vulns repository # # SPDX-License-Identifier: GPL-2.0-only @@ -9,7 +9,9 @@ import argparse import datetime import json import pathlib -import re +import os +import glob +import subprocess from packaging.version import Version @@ -25,26 +27,82 @@ def parse_version(s): return Version(s) return None +def get_fixed_versions(cve_info, base_version): + ''' + Get fixed versionss + ''' + first_affected = None + fixed = None + fixed_backport = None + next_version = Version(str(base_version) + ".5000") + for affected in cve_info["containers"]["cna"]["affected"]: + # In case the CVE info is not complete, it might not have default status and therefore + # we don't know the status of this CVE. + if not "defaultStatus" in affected: + return first_affected, fixed, fixed_backport + if affected["defaultStatus"] == "affected": + for version in affected["versions"]: + v = Version(version["version"]) + if v == Version('0'): + #Skiping non-affected + continue + if version["status"] == "unaffected" and first_affected and v < first_affected: + first_affected = Version(f"{v.major}.{v.minor}") + if version["status"] == "affected" and not first_affected: + first_affected = v + elif (version["status"] == "unaffected" and + version['versionType'] == "original_commit_for_fix"): + fixed = v + elif base_version < v and v < next_version: + fixed_backport = v + elif affected["defaultStatus"] == "unaffected": + # Only specific versions are affected. We care only about our base version + if "versions" not in affected: + continue + for version in affected["versions"]: + if "versionType" not in version: + continue + if version["versionType"] == "git": + continue + v = Version(version["version"]) + # in case it is not in our base version + less_than = Version(version["lessThan"]) + + if not first_affected: + first_affected = v + fixed = less_than + if base_version < v and v < next_version: + fixed_backport = less_than + + return first_affected, fixed, fixed_backport + +def is_linux_cve(cve_info): + '''Return true is the CVE belongs to Linux''' + if not "affected" in cve_info["containers"]["cna"]: + return False + for affected in cve_info["containers"]["cna"]["affected"]: + if not "product" in affected: + return False + if affected["product"] == "Linux" and affected["vendor"] == "Linux": + return True + return False def main(argp=None): parser = argparse.ArgumentParser() - parser.add_argument("datadir", type=pathlib.Path, help="Path to a clone of https://github.com/nluedtke/linux_kernel_cves") + parser.add_argument("datadir", type=pathlib.Path, help="Path to a clone of https://github.com/CVEProject/cvelistV5 or https://git.kernel.org/pub/scm/linux/security/vulns.git") parser.add_argument("version", type=Version, help="Kernel version number to generate data for, such as 6.1.38") args = parser.parse_args(argp) - datadir = args.datadir + datadir = args.datadir.resolve() version = args.version - base_version = f"{version.major}.{version.minor}" + base_version = Version(f"{version.major}.{version.minor}") - with open(datadir / "data" / "kernel_cves.json", "r") as f: - cve_data = json.load(f) - - with open(datadir / "data" / "stream_fixes.json", "r") as f: - stream_data = json.load(f) + data_version = subprocess.check_output(("git", "describe", "--tags", "--always", "HEAD"), cwd=datadir, text=True) print(f""" # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at {datetime.datetime.now(datetime.timezone.utc)} for version {version} +# Generated at {datetime.datetime.now(datetime.timezone.utc)} for kernel version {version} +# From {datadir.name} {data_version} python check_kernel_cve_status_version() {{ this_version = "{version}" @@ -55,17 +113,23 @@ python check_kernel_cve_status_version() {{ do_cve_check[prefuncs] += "check_kernel_cve_status_version" """) - for cve, data in cve_data.items(): - if "affected_versions" not in data: - print(f"# Skipping {cve}, no affected_versions") - print() - continue + # Loop though all CVES and check if they are kernel related, newer than 2015 + pattern = os.path.join(datadir, '**', "CVE-20*.json") - affected = data["affected_versions"] - first_affected, fixed = re.search(r"(.+) to (.+)", affected).groups() - first_affected = parse_version(first_affected) - fixed = parse_version(fixed) + files = glob.glob(pattern, recursive=True) + for cve_file in sorted(files): + # Get CVE Id + cve = cve_file[cve_file.rfind("/")+1:cve_file.rfind(".json")] + # We process from 2015 data, old request are not properly formated + year = cve.split("-")[1] + if int(year) < 2015: + continue + with open(cve_file, 'r', encoding='utf-8') as json_file: + cve_info = json.load(json_file) + if not is_linux_cve(cve_info): + continue + first_affected, fixed, backport_ver = get_fixed_versions(cve_info, base_version) if not fixed: print(f"# {cve} has no known resolution") elif first_affected and version < first_affected: @@ -75,19 +139,13 @@ do_cve_check[prefuncs] += "check_kernel_cve_status_version" f'CVE_STATUS[{cve}] = "fixed-version: Fixed from version {fixed}"' ) else: - if cve in stream_data: - backport_data = stream_data[cve] - if base_version in backport_data: - backport_ver = Version(backport_data[base_version]["fixed_version"]) - if backport_ver <= version: - print( - f'CVE_STATUS[{cve}] = "cpe-stable-backport: Backported in {backport_ver}"' - ) - else: - # TODO print a note that the kernel needs bumping - print(f"# {cve} needs backporting (fixed from {backport_ver})") + if backport_ver: + if backport_ver <= version: + print( + f'CVE_STATUS[{cve}] = "cpe-stable-backport: Backported in {backport_ver}"' + ) else: - print(f"# {cve} needs backporting (fixed from {fixed})") + print(f"# {cve} may need backporting (fixed from {backport_ver})") else: print(f"# {cve} needs backporting (fixed from {fixed})") From patchwork Fri Apr 24 20:55:17 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86873 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9EB72FF8840 for ; Fri, 24 Apr 2026 20:56:51 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31969.1777064209903365135 for ; Fri, 24 Apr 2026 13:56:50 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=wOQpcZvU; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-4852a9c6309so77005855e9.0 for ; Fri, 24 Apr 2026 13:56:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064208; x=1777669008; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=ZCFwxJihhmZNya3rrRVo5mrbGg3/IGHSY5XyxUM4ZIs=; b=wOQpcZvUUZNWQ3w724tcddWedPZK2Fe4cWGomy6epHbnPLODmVA/9ZJrklAzaqvuRL 4pVT32XOCn6XlkzOFF9F/sULGUSBSODZgpC8xxMEaNcCOlwlTWNwxZSX3PQvTCURrJUr bFVPAL42y+wuE9Vg1Hi5E4GBW3gT1IQMeCSoI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064208; x=1777669008; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=ZCFwxJihhmZNya3rrRVo5mrbGg3/IGHSY5XyxUM4ZIs=; b=Jl4aDwcj+lfW/8FTf3W6LSQwelUWGdLS0vO9YZUBvyU2d+4YVtls0IYKi2Y7YQ7Ser y+Gh6ME30qYQZ2X/aG1zoT53kreynDVbdjAyf5LaQfp1OKzn3qPDAKoaPUZhQEhrpexJ IBgtuVi+gPWkQ9JYTDltLn87b5g0UPfDv3hTyBozEiAqFzoAk+Wyhwmk/vHp9HC+liex 8pQscN4pHGOjo5q0Slo5FAEJtThS763fEfiPQPXs5lX6yDkuWFa9W/U/BHFzHIC6pR6Z KCxmN2CF3IQDX1BQS+DtUE//+3cn1DoDsEAScaJsKP3NUCDboYBtGpoUObE/4N8QdzWY W67g== X-Gm-Message-State: AOJu0YztfMx3a/E1ZK/cjzRkhtJaXAR2Bvh3qPNeDtxl+KjUwHwobZx5 eTfiZ+hxLkDAKD4tMggMzqPqY54zNnIKVoATQzDmWC8i5UMw/+y/1ZBPESyZLZ+XXFkuYaEKSwQ VhARtY6W3ezNB X-Gm-Gg: AeBDies3DITwFMNnBSGbGa1z5cQZX6G9wsAZqtRADuZbIpys3Egpe6B5SxaMe76zyqN 7iiDebKvFuEIq/9SEqQC2sUkUyLTjWtsfneClbznj85MTS15meMze1wBuQIlXNSZo/zBUG6JPva JjnL0Ab91PrSeDMtt1LvJk9fu2UC7RGxaWqV6oeTxy0QWPC6Q4rt6hS6GMnd9xABm3fb7qAmi4O +EqiRSrPPqTSVvC+Y4NQuaSzpFqmC04fc3KKA3U4O8ipqT6oGs39qcFVYGY3XTh6pLFUi6dONhN TGLqQLgs5E2iEYrdLJtQ2z8BuvAO0Cy03F9jfYp4EJloGJf3AjnOfhv38jgIxw5DumT8s00W0FQ BoCGoWMuQaOeHKmvdqKnwaQKUlU3nVZ87dxswI9dLBIn4CVAL2duu9guYdGntrKCsWWE7A/MU31 Gm80u4VGK5ZjB7pc9ig3DR7GWk8XdtyuY/XgI0kSYpuQ9EZXh+NAXLpNHjL1wVtKTmI0zLDWP6l tHL9EIJLxlwqi4Mvvf9Iew9DmgdoanuNYwMOw== X-Received: by 2002:a05:600c:890c:b0:485:3ff1:d5ed with SMTP id 5b1f17b1804b1-488fb739cd9mr397660335e9.1.1777064207733; Fri, 24 Apr 2026 13:56:47 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.47 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:47 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 18/66] python3: upgrade 3.12.12 -> 3.12.13 Date: Fri, 24 Apr 2026 22:55:17 +0200 Message-ID: <8b0c626633a1e443cfb6e5f73c6120bff5f6a5ef.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:51 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235891 From: Vijay Anusuri Drop upstreamed patches. Release information: * https://www.python.org/downloads/release/python-31213/ * The release you're looking at is Python 3.12.13, a security bugfix release for the legacy 3.12 series. Handles CVE-2024-6923 CVE-2025-12084 CVE-2025-13836 CVE-2025-13837 CVE-2025-15282 CVE-2025-59375 CVE-2026-0865 CVE-2026-24515 CVE-2026-25210 Signed-off-by: Vijay Anusuri [YC: Full changelog: https://docs.python.org/release/3.12.13/whatsnew/changelog.html#python-3-12-13] Signed-off-by: Yoann Congal --- .../python/python3/CVE-2025-12084.patch | 144 ------- .../python/python3/CVE-2025-13836.patch | 162 -------- .../python/python3/CVE-2025-13837.patch | 162 -------- .../python/python3/CVE-2025-6075.patch | 355 ------------------ ...{python3_3.12.12.bb => python3_3.12.13.bb} | 6 +- 5 files changed, 1 insertion(+), 828 deletions(-) delete mode 100644 meta/recipes-devtools/python/python3/CVE-2025-12084.patch delete mode 100644 meta/recipes-devtools/python/python3/CVE-2025-13836.patch delete mode 100644 meta/recipes-devtools/python/python3/CVE-2025-13837.patch delete mode 100644 meta/recipes-devtools/python/python3/CVE-2025-6075.patch rename meta/recipes-devtools/python/{python3_3.12.12.bb => python3_3.12.13.bb} (98%) diff --git a/meta/recipes-devtools/python/python3/CVE-2025-12084.patch b/meta/recipes-devtools/python/python3/CVE-2025-12084.patch deleted file mode 100644 index b7c0650cdc5..00000000000 --- a/meta/recipes-devtools/python/python3/CVE-2025-12084.patch +++ /dev/null @@ -1,144 +0,0 @@ -From 9c9dda6625a2a90d2a06c657eee021d6be19842d Mon Sep 17 00:00:00 2001 -From: "Miss Islington (bot)" - <31488909+miss-islington@users.noreply.github.com> -Date: Mon, 22 Dec 2025 14:48:49 +0100 -Subject: [PATCH] [3.12] gh-142145: Remove quadratic behavior in node ID cache - clearing (GH-142146) (#142211) - -* gh-142145: Remove quadratic behavior in node ID cache clearing (GH-142146) -* gh-142754: Ensure that Element & Attr instances have the ownerDocument attribute (GH-142794) -(cherry picked from commit 1cc7551b3f9f71efbc88d96dce90f82de98b2454) -(cherry picked from commit 08d8e18ad81cd45bc4a27d6da478b51ea49486e4) -(cherry picked from commit 8d2d7bb2e754f8649a68ce4116271a4932f76907) - -Co-authored-by: Jacob Walls <38668450+jacobtylerwalls@users.noreply.github.com> -Co-authored-by: Seth Michael Larson -Co-authored-by: Petr Viktorin -Co-authored-by: Hugo van Kemenade <1324225+hugovk@users.noreply.github.com> -Co-authored-by: Gregory P. Smith <68491+gpshead@users.noreply.github.com> -Co-authored-by: Hugo van Kemenade <1324225+hugovk@users.noreply.github.com> -Co-authored-by: Gregory P. Smith <68491+gpshead@users.noreply.github.com> -Co-authored-by: Gregory P. Smith - -CVE: CVE-2025-12084 -Upstream-Status: Backport [https://github.com/python/cpython/commit/9c9dda6625a2a90d2a06c657eee021d6be19842d] -Signed-off-by: Peter Marko ---- - Lib/test/test_minidom.py | 33 ++++++++++++++++++- - Lib/xml/dom/minidom.py | 11 ++----- - ...-12-01-09-36-45.gh-issue-142145.tcAUhg.rst | 6 ++++ - 3 files changed, 41 insertions(+), 9 deletions(-) - create mode 100644 Misc/NEWS.d/next/Security/2025-12-01-09-36-45.gh-issue-142145.tcAUhg.rst - -diff --git a/Lib/test/test_minidom.py b/Lib/test/test_minidom.py -index 699265ccadc..ab4823c8315 100644 ---- a/Lib/test/test_minidom.py -+++ b/Lib/test/test_minidom.py -@@ -2,13 +2,14 @@ - - import copy - import pickle -+import time - import io - from test import support - import unittest - - import xml.dom.minidom - --from xml.dom.minidom import parse, Attr, Node, Document, parseString -+from xml.dom.minidom import parse, Attr, Node, Document, Element, parseString - from xml.dom.minidom import getDOMImplementation - from xml.parsers.expat import ExpatError - -@@ -176,6 +177,36 @@ class MinidomTest(unittest.TestCase): - self.confirm(dom.documentElement.childNodes[-1].data == "Hello") - dom.unlink() - -+ @support.requires_resource('cpu') -+ def testAppendChildNoQuadraticComplexity(self): -+ impl = getDOMImplementation() -+ -+ newdoc = impl.createDocument(None, "some_tag", None) -+ top_element = newdoc.documentElement -+ children = [newdoc.createElement(f"child-{i}") for i in range(1, 2 ** 15 + 1)] -+ element = top_element -+ -+ start = time.monotonic() -+ for child in children: -+ element.appendChild(child) -+ element = child -+ end = time.monotonic() -+ -+ # This example used to take at least 30 seconds. -+ # Conservative assertion due to the wide variety of systems and -+ # build configs timing based tests wind up run under. -+ # A --with-address-sanitizer --with-pydebug build on a rpi5 still -+ # completes this loop in <0.5 seconds. -+ self.assertLess(end - start, 4) -+ -+ def testSetAttributeNodeWithoutOwnerDocument(self): -+ # regression test for gh-142754 -+ elem = Element("test") -+ attr = Attr("id") -+ attr.value = "test-id" -+ elem.setAttributeNode(attr) -+ self.assertEqual(elem.getAttribute("id"), "test-id") -+ - def testAppendChildFragment(self): - dom, orig, c1, c2, c3, frag = self._create_fragment_test_nodes() - dom.documentElement.appendChild(frag) -diff --git a/Lib/xml/dom/minidom.py b/Lib/xml/dom/minidom.py -index ef8a159833b..cada981f39f 100644 ---- a/Lib/xml/dom/minidom.py -+++ b/Lib/xml/dom/minidom.py -@@ -292,13 +292,6 @@ def _append_child(self, node): - childNodes.append(node) - node.parentNode = self - --def _in_document(node): -- # return True iff node is part of a document tree -- while node is not None: -- if node.nodeType == Node.DOCUMENT_NODE: -- return True -- node = node.parentNode -- return False - - def _write_data(writer, data): - "Writes datachars to writer." -@@ -355,6 +348,7 @@ class Attr(Node): - def __init__(self, qName, namespaceURI=EMPTY_NAMESPACE, localName=None, - prefix=None): - self.ownerElement = None -+ self.ownerDocument = None - self._name = qName - self.namespaceURI = namespaceURI - self._prefix = prefix -@@ -680,6 +674,7 @@ class Element(Node): - - def __init__(self, tagName, namespaceURI=EMPTY_NAMESPACE, prefix=None, - localName=None): -+ self.ownerDocument = None - self.parentNode = None - self.tagName = self.nodeName = tagName - self.prefix = prefix -@@ -1539,7 +1534,7 @@ def _clear_id_cache(node): - if node.nodeType == Node.DOCUMENT_NODE: - node._id_cache.clear() - node._id_search_stack = None -- elif _in_document(node): -+ elif node.ownerDocument: - node.ownerDocument._id_cache.clear() - node.ownerDocument._id_search_stack= None - -diff --git a/Misc/NEWS.d/next/Security/2025-12-01-09-36-45.gh-issue-142145.tcAUhg.rst b/Misc/NEWS.d/next/Security/2025-12-01-09-36-45.gh-issue-142145.tcAUhg.rst -new file mode 100644 -index 00000000000..05c7df35d14 ---- /dev/null -+++ b/Misc/NEWS.d/next/Security/2025-12-01-09-36-45.gh-issue-142145.tcAUhg.rst -@@ -0,0 +1,6 @@ -+Remove quadratic behavior in ``xml.minidom`` node ID cache clearing. In order -+to do this without breaking existing users, we also add the *ownerDocument* -+attribute to :mod:`xml.dom.minidom` elements and attributes created by directly -+instantiating the ``Element`` or ``Attr`` class. Note that this way of creating -+nodes is not supported; creator functions like -+:py:meth:`xml.dom.Document.documentElement` should be used instead. diff --git a/meta/recipes-devtools/python/python3/CVE-2025-13836.patch b/meta/recipes-devtools/python/python3/CVE-2025-13836.patch deleted file mode 100644 index b90fc5f0ec3..00000000000 --- a/meta/recipes-devtools/python/python3/CVE-2025-13836.patch +++ /dev/null @@ -1,162 +0,0 @@ -From 14b1fdb0a94b96f86fc7b86671ea9582b8676628 Mon Sep 17 00:00:00 2001 -From: "Miss Islington (bot)" - <31488909+miss-islington@users.noreply.github.com> -Date: Mon, 22 Dec 2025 14:50:18 +0100 -Subject: [PATCH] [3.12] gh-119451: Fix a potential denial of service in - http.client (GH-119454) (#142140) - -gh-119451: Fix a potential denial of service in http.client (GH-119454) - -Reading the whole body of the HTTP response could cause OOM if -the Content-Length value is too large even if the server does not send -a large amount of data. Now the HTTP client reads large data by chunks, -therefore the amount of consumed memory is proportional to the amount -of sent data. -(cherry picked from commit 5a4c4a033a4a54481be6870aa1896fad732555b5) - -Co-authored-by: Serhiy Storchaka - -CVE: CVE-2025-13836 -Upstream-Status: Backport [https://github.com/python/cpython/commit/14b1fdb0a94b96f86fc7b86671ea9582b8676628] -Signed-off-by: Peter Marko ---- - Lib/http/client.py | 28 ++++++-- - Lib/test/test_httplib.py | 66 +++++++++++++++++++ - ...-05-23-11-47-48.gh-issue-119451.qkJe9-.rst | 5 ++ - 3 files changed, 95 insertions(+), 4 deletions(-) - create mode 100644 Misc/NEWS.d/next/Security/2024-05-23-11-47-48.gh-issue-119451.qkJe9-.rst - -diff --git a/Lib/http/client.py b/Lib/http/client.py -index fb29923d942..70451d67d4c 100644 ---- a/Lib/http/client.py -+++ b/Lib/http/client.py -@@ -111,6 +111,11 @@ responses = {v: v.phrase for v in http.HTTPStatus.__members__.values()} - _MAXLINE = 65536 - _MAXHEADERS = 100 - -+# Data larger than this will be read in chunks, to prevent extreme -+# overallocation. -+_MIN_READ_BUF_SIZE = 1 << 20 -+ -+ - # Header name/value ABNF (http://tools.ietf.org/html/rfc7230#section-3.2) - # - # VCHAR = %x21-7E -@@ -639,10 +644,25 @@ class HTTPResponse(io.BufferedIOBase): - reading. If the bytes are truly not available (due to EOF), then the - IncompleteRead exception can be used to detect the problem. - """ -- data = self.fp.read(amt) -- if len(data) < amt: -- raise IncompleteRead(data, amt-len(data)) -- return data -+ cursize = min(amt, _MIN_READ_BUF_SIZE) -+ data = self.fp.read(cursize) -+ if len(data) >= amt: -+ return data -+ if len(data) < cursize: -+ raise IncompleteRead(data, amt - len(data)) -+ -+ data = io.BytesIO(data) -+ data.seek(0, 2) -+ while True: -+ # This is a geometric increase in read size (never more than -+ # doubling out the current length of data per loop iteration). -+ delta = min(cursize, amt - cursize) -+ data.write(self.fp.read(delta)) -+ if data.tell() >= amt: -+ return data.getvalue() -+ cursize += delta -+ if data.tell() < cursize: -+ raise IncompleteRead(data.getvalue(), amt - data.tell()) - - def _safe_readinto(self, b): - """Same as _safe_read, but for reading into a buffer.""" -diff --git a/Lib/test/test_httplib.py b/Lib/test/test_httplib.py -index 01f5a101901..e46dac00779 100644 ---- a/Lib/test/test_httplib.py -+++ b/Lib/test/test_httplib.py -@@ -1452,6 +1452,72 @@ class BasicTest(TestCase): - thread.join() - self.assertEqual(result, b"proxied data\n") - -+ def test_large_content_length(self): -+ serv = socket.create_server((HOST, 0)) -+ self.addCleanup(serv.close) -+ -+ def run_server(): -+ [conn, address] = serv.accept() -+ with conn: -+ while conn.recv(1024): -+ conn.sendall( -+ b"HTTP/1.1 200 Ok\r\n" -+ b"Content-Length: %d\r\n" -+ b"\r\n" % size) -+ conn.sendall(b'A' * (size//3)) -+ conn.sendall(b'B' * (size - size//3)) -+ -+ thread = threading.Thread(target=run_server) -+ thread.start() -+ self.addCleanup(thread.join, 1.0) -+ -+ conn = client.HTTPConnection(*serv.getsockname()) -+ try: -+ for w in range(15, 27): -+ size = 1 << w -+ conn.request("GET", "/") -+ with conn.getresponse() as response: -+ self.assertEqual(len(response.read()), size) -+ finally: -+ conn.close() -+ thread.join(1.0) -+ -+ def test_large_content_length_truncated(self): -+ serv = socket.create_server((HOST, 0)) -+ self.addCleanup(serv.close) -+ -+ def run_server(): -+ while True: -+ [conn, address] = serv.accept() -+ with conn: -+ conn.recv(1024) -+ if not size: -+ break -+ conn.sendall( -+ b"HTTP/1.1 200 Ok\r\n" -+ b"Content-Length: %d\r\n" -+ b"\r\n" -+ b"Text" % size) -+ -+ thread = threading.Thread(target=run_server) -+ thread.start() -+ self.addCleanup(thread.join, 1.0) -+ -+ conn = client.HTTPConnection(*serv.getsockname()) -+ try: -+ for w in range(18, 65): -+ size = 1 << w -+ conn.request("GET", "/") -+ with conn.getresponse() as response: -+ self.assertRaises(client.IncompleteRead, response.read) -+ conn.close() -+ finally: -+ conn.close() -+ size = 0 -+ conn.request("GET", "/") -+ conn.close() -+ thread.join(1.0) -+ - def test_putrequest_override_domain_validation(self): - """ - It should be possible to override the default validation -diff --git a/Misc/NEWS.d/next/Security/2024-05-23-11-47-48.gh-issue-119451.qkJe9-.rst b/Misc/NEWS.d/next/Security/2024-05-23-11-47-48.gh-issue-119451.qkJe9-.rst -new file mode 100644 -index 00000000000..6d6f25cd2f8 ---- /dev/null -+++ b/Misc/NEWS.d/next/Security/2024-05-23-11-47-48.gh-issue-119451.qkJe9-.rst -@@ -0,0 +1,5 @@ -+Fix a potential memory denial of service in the :mod:`http.client` module. -+When connecting to a malicious server, it could cause -+an arbitrary amount of memory to be allocated. -+This could have led to symptoms including a :exc:`MemoryError`, swapping, out -+of memory (OOM) killed processes or containers, or even system crashes. diff --git a/meta/recipes-devtools/python/python3/CVE-2025-13837.patch b/meta/recipes-devtools/python/python3/CVE-2025-13837.patch deleted file mode 100644 index 0f2e06a4912..00000000000 --- a/meta/recipes-devtools/python/python3/CVE-2025-13837.patch +++ /dev/null @@ -1,162 +0,0 @@ -From 5a8b19677d818fb41ee55f310233772e15aa1a2b Mon Sep 17 00:00:00 2001 -From: Serhiy Storchaka -Date: Mon, 22 Dec 2025 15:49:44 +0200 -Subject: [PATCH] [3.12] gh-119342: Fix a potential denial of service in - plistlib (GH-119343) (#142149) - -Reading a specially prepared small Plist file could cause OOM because file's -read(n) preallocates a bytes object for reading the specified amount of -data. Now plistlib reads large data by chunks, therefore the upper limit of -consumed memory is proportional to the size of the input file. -(cherry picked from commit 694922cf40aa3a28f898b5f5ee08b71b4922df70) - -CVE: CVE-2025-13837 -Upstream-Status: Backport [https://github.com/python/cpython/commit/5a8b19677d818fb41ee55f310233772e15aa1a2b] -Signed-off-by: Peter Marko ---- - Lib/plistlib.py | 31 ++++++++++------ - Lib/test/test_plistlib.py | 37 +++++++++++++++++-- - ...-05-21-22-11-31.gh-issue-119342.BTFj4Z.rst | 5 +++ - 3 files changed, 59 insertions(+), 14 deletions(-) - create mode 100644 Misc/NEWS.d/next/Security/2024-05-21-22-11-31.gh-issue-119342.BTFj4Z.rst - -diff --git a/Lib/plistlib.py b/Lib/plistlib.py -index 3292c30d5f..c5554ea1f7 100644 ---- a/Lib/plistlib.py -+++ b/Lib/plistlib.py -@@ -73,6 +73,9 @@ from xml.parsers.expat import ParserCreate - PlistFormat = enum.Enum('PlistFormat', 'FMT_XML FMT_BINARY', module=__name__) - globals().update(PlistFormat.__members__) - -+# Data larger than this will be read in chunks, to prevent extreme -+# overallocation. -+_MIN_READ_BUF_SIZE = 1 << 20 - - class UID: - def __init__(self, data): -@@ -499,12 +502,24 @@ class _BinaryPlistParser: - - return tokenL - -+ def _read(self, size): -+ cursize = min(size, _MIN_READ_BUF_SIZE) -+ data = self._fp.read(cursize) -+ while True: -+ if len(data) != cursize: -+ raise InvalidFileException -+ if cursize == size: -+ return data -+ delta = min(cursize, size - cursize) -+ data += self._fp.read(delta) -+ cursize += delta -+ - def _read_ints(self, n, size): -- data = self._fp.read(size * n) -+ data = self._read(size * n) - if size in _BINARY_FORMAT: - return struct.unpack(f'>{n}{_BINARY_FORMAT[size]}', data) - else: -- if not size or len(data) != size * n: -+ if not size: - raise InvalidFileException() - return tuple(int.from_bytes(data[i: i + size], 'big') - for i in range(0, size * n, size)) -@@ -561,22 +576,16 @@ class _BinaryPlistParser: - - elif tokenH == 0x40: # data - s = self._get_size(tokenL) -- result = self._fp.read(s) -- if len(result) != s: -- raise InvalidFileException() -+ result = self._read(s) - - elif tokenH == 0x50: # ascii string - s = self._get_size(tokenL) -- data = self._fp.read(s) -- if len(data) != s: -- raise InvalidFileException() -+ data = self._read(s) - result = data.decode('ascii') - - elif tokenH == 0x60: # unicode string - s = self._get_size(tokenL) * 2 -- data = self._fp.read(s) -- if len(data) != s: -- raise InvalidFileException() -+ data = self._read(s) - result = data.decode('utf-16be') - - elif tokenH == 0x80: # UID -diff --git a/Lib/test/test_plistlib.py b/Lib/test/test_plistlib.py -index fa46050658..229a5a242e 100644 ---- a/Lib/test/test_plistlib.py -+++ b/Lib/test/test_plistlib.py -@@ -841,8 +841,7 @@ class TestPlistlib(unittest.TestCase): - - class TestBinaryPlistlib(unittest.TestCase): - -- @staticmethod -- def decode(*objects, offset_size=1, ref_size=1): -+ def build(self, *objects, offset_size=1, ref_size=1): - data = [b'bplist00'] - offset = 8 - offsets = [] -@@ -854,7 +853,11 @@ class TestBinaryPlistlib(unittest.TestCase): - len(objects), 0, offset) - data.extend(offsets) - data.append(tail) -- return plistlib.loads(b''.join(data), fmt=plistlib.FMT_BINARY) -+ return b''.join(data) -+ -+ def decode(self, *objects, offset_size=1, ref_size=1): -+ data = self.build(*objects, offset_size=offset_size, ref_size=ref_size) -+ return plistlib.loads(data, fmt=plistlib.FMT_BINARY) - - def test_nonstandard_refs_size(self): - # Issue #21538: Refs and offsets are 24-bit integers -@@ -963,6 +966,34 @@ class TestBinaryPlistlib(unittest.TestCase): - with self.assertRaises(plistlib.InvalidFileException): - plistlib.loads(b'bplist00' + data, fmt=plistlib.FMT_BINARY) - -+ def test_truncated_large_data(self): -+ self.addCleanup(os_helper.unlink, os_helper.TESTFN) -+ def check(data): -+ with open(os_helper.TESTFN, 'wb') as f: -+ f.write(data) -+ # buffered file -+ with open(os_helper.TESTFN, 'rb') as f: -+ with self.assertRaises(plistlib.InvalidFileException): -+ plistlib.load(f, fmt=plistlib.FMT_BINARY) -+ # unbuffered file -+ with open(os_helper.TESTFN, 'rb', buffering=0) as f: -+ with self.assertRaises(plistlib.InvalidFileException): -+ plistlib.load(f, fmt=plistlib.FMT_BINARY) -+ for w in range(20, 64): -+ s = 1 << w -+ # data -+ check(self.build(b'\x4f\x13' + s.to_bytes(8, 'big'))) -+ # ascii string -+ check(self.build(b'\x5f\x13' + s.to_bytes(8, 'big'))) -+ # unicode string -+ check(self.build(b'\x6f\x13' + s.to_bytes(8, 'big'))) -+ # array -+ check(self.build(b'\xaf\x13' + s.to_bytes(8, 'big'))) -+ # dict -+ check(self.build(b'\xdf\x13' + s.to_bytes(8, 'big'))) -+ # number of objects -+ check(b'bplist00' + struct.pack('>6xBBQQQ', 1, 1, s, 0, 8)) -+ - - class TestKeyedArchive(unittest.TestCase): - def test_keyed_archive_data(self): -diff --git a/Misc/NEWS.d/next/Security/2024-05-21-22-11-31.gh-issue-119342.BTFj4Z.rst b/Misc/NEWS.d/next/Security/2024-05-21-22-11-31.gh-issue-119342.BTFj4Z.rst -new file mode 100644 -index 0000000000..04fd8faca4 ---- /dev/null -+++ b/Misc/NEWS.d/next/Security/2024-05-21-22-11-31.gh-issue-119342.BTFj4Z.rst -@@ -0,0 +1,5 @@ -+Fix a potential memory denial of service in the :mod:`plistlib` module. -+When reading a Plist file received from untrusted source, it could cause -+an arbitrary amount of memory to be allocated. -+This could have led to symptoms including a :exc:`MemoryError`, swapping, out -+of memory (OOM) killed processes or containers, or even system crashes. diff --git a/meta/recipes-devtools/python/python3/CVE-2025-6075.patch b/meta/recipes-devtools/python/python3/CVE-2025-6075.patch deleted file mode 100644 index 346af4df948..00000000000 --- a/meta/recipes-devtools/python/python3/CVE-2025-6075.patch +++ /dev/null @@ -1,355 +0,0 @@ -From 9ab89c026aa9611c4b0b67c288b8303a480fe742 Mon Sep 17 00:00:00 2001 -From: Łukasz Langa -Date: Fri, 31 Oct 2025 17:58:09 +0100 -Subject: [PATCH] gh-136065: Fix quadratic complexity in os.path.expandvars() - (GH-134952) (GH-140845) - -(cherry picked from commit f029e8db626ddc6e3a3beea4eff511a71aaceb5c) - -Co-authored-by: Serhiy Storchaka -Co-authored-by: Łukasz Langa - -CVE: CVE-2025-6075 - -Upstream-Status: Backport [https://github.com/python/cpython/commit/9ab89c026aa9611c4b0b67c288b8303a480fe742] - -Signed-off-by: Praveen Kumar ---- - Lib/ntpath.py | 126 ++++++------------ - Lib/posixpath.py | 43 +++--- - Lib/test/test_genericpath.py | 14 ++ - Lib/test/test_ntpath.py | 18 ++- - ...-05-30-22-33-27.gh-issue-136065.bu337o.rst | 1 + - 5 files changed, 92 insertions(+), 110 deletions(-) - create mode 100644 Misc/NEWS.d/next/Security/2025-05-30-22-33-27.gh-issue-136065.bu337o.rst - -diff --git a/Lib/ntpath.py b/Lib/ntpath.py -index 1bef630..393d358 100644 ---- a/Lib/ntpath.py -+++ b/Lib/ntpath.py -@@ -409,17 +409,23 @@ def expanduser(path): - # XXX With COMMAND.COM you can use any characters in a variable name, - # XXX except '^|<>='. - -+_varpattern = r"'[^']*'?|%(%|[^%]*%?)|\$(\$|[-\w]+|\{[^}]*\}?)" -+_varsub = None -+_varsubb = None -+ - def expandvars(path): - """Expand shell variables of the forms $var, ${var} and %var%. - - Unknown variables are left unchanged.""" - path = os.fspath(path) -+ global _varsub, _varsubb - if isinstance(path, bytes): - if b'$' not in path and b'%' not in path: - return path -- import string -- varchars = bytes(string.ascii_letters + string.digits + '_-', 'ascii') -- quote = b'\'' -+ if not _varsubb: -+ import re -+ _varsubb = re.compile(_varpattern.encode(), re.ASCII).sub -+ sub = _varsubb - percent = b'%' - brace = b'{' - rbrace = b'}' -@@ -428,94 +434,44 @@ def expandvars(path): - else: - if '$' not in path and '%' not in path: - return path -- import string -- varchars = string.ascii_letters + string.digits + '_-' -- quote = '\'' -+ if not _varsub: -+ import re -+ _varsub = re.compile(_varpattern, re.ASCII).sub -+ sub = _varsub - percent = '%' - brace = '{' - rbrace = '}' - dollar = '$' - environ = os.environ -- res = path[:0] -- index = 0 -- pathlen = len(path) -- while index < pathlen: -- c = path[index:index+1] -- if c == quote: # no expansion within single quotes -- path = path[index + 1:] -- pathlen = len(path) -- try: -- index = path.index(c) -- res += c + path[:index + 1] -- except ValueError: -- res += c + path -- index = pathlen - 1 -- elif c == percent: # variable or '%' -- if path[index + 1:index + 2] == percent: -- res += c -- index += 1 -- else: -- path = path[index+1:] -- pathlen = len(path) -- try: -- index = path.index(percent) -- except ValueError: -- res += percent + path -- index = pathlen - 1 -- else: -- var = path[:index] -- try: -- if environ is None: -- value = os.fsencode(os.environ[os.fsdecode(var)]) -- else: -- value = environ[var] -- except KeyError: -- value = percent + var + percent -- res += value -- elif c == dollar: # variable or '$$' -- if path[index + 1:index + 2] == dollar: -- res += c -- index += 1 -- elif path[index + 1:index + 2] == brace: -- path = path[index+2:] -- pathlen = len(path) -- try: -- index = path.index(rbrace) -- except ValueError: -- res += dollar + brace + path -- index = pathlen - 1 -- else: -- var = path[:index] -- try: -- if environ is None: -- value = os.fsencode(os.environ[os.fsdecode(var)]) -- else: -- value = environ[var] -- except KeyError: -- value = dollar + brace + var + rbrace -- res += value -- else: -- var = path[:0] -- index += 1 -- c = path[index:index + 1] -- while c and c in varchars: -- var += c -- index += 1 -- c = path[index:index + 1] -- try: -- if environ is None: -- value = os.fsencode(os.environ[os.fsdecode(var)]) -- else: -- value = environ[var] -- except KeyError: -- value = dollar + var -- res += value -- if c: -- index -= 1 -+ -+ def repl(m): -+ lastindex = m.lastindex -+ if lastindex is None: -+ return m[0] -+ name = m[lastindex] -+ if lastindex == 1: -+ if name == percent: -+ return name -+ if not name.endswith(percent): -+ return m[0] -+ name = name[:-1] - else: -- res += c -- index += 1 -- return res -+ if name == dollar: -+ return name -+ if name.startswith(brace): -+ if not name.endswith(rbrace): -+ return m[0] -+ name = name[1:-1] -+ -+ try: -+ if environ is None: -+ return os.fsencode(os.environ[os.fsdecode(name)]) -+ else: -+ return environ[name] -+ except KeyError: -+ return m[0] -+ -+ return sub(repl, path) - - - # Normalize a path, e.g. A//B, A/./B and A/foo/../B all become A\B. -diff --git a/Lib/posixpath.py b/Lib/posixpath.py -index 90a6f54..6306f14 100644 ---- a/Lib/posixpath.py -+++ b/Lib/posixpath.py -@@ -314,42 +314,41 @@ def expanduser(path): - # This expands the forms $variable and ${variable} only. - # Non-existent variables are left unchanged. - --_varprog = None --_varprogb = None -+_varpattern = r'\$(\w+|\{[^}]*\}?)' -+_varsub = None -+_varsubb = None - - def expandvars(path): - """Expand shell variables of form $var and ${var}. Unknown variables - are left unchanged.""" - path = os.fspath(path) -- global _varprog, _varprogb -+ global _varsub, _varsubb - if isinstance(path, bytes): - if b'$' not in path: - return path -- if not _varprogb: -+ if not _varsubb: - import re -- _varprogb = re.compile(br'\$(\w+|\{[^}]*\})', re.ASCII) -- search = _varprogb.search -+ _varsubb = re.compile(_varpattern.encode(), re.ASCII).sub -+ sub = _varsubb - start = b'{' - end = b'}' - environ = getattr(os, 'environb', None) - else: - if '$' not in path: - return path -- if not _varprog: -+ if not _varsub: - import re -- _varprog = re.compile(r'\$(\w+|\{[^}]*\})', re.ASCII) -- search = _varprog.search -+ _varsub = re.compile(_varpattern, re.ASCII).sub -+ sub = _varsub - start = '{' - end = '}' - environ = os.environ -- i = 0 -- while True: -- m = search(path, i) -- if not m: -- break -- i, j = m.span(0) -- name = m.group(1) -- if name.startswith(start) and name.endswith(end): -+ -+ def repl(m): -+ name = m[1] -+ if name.startswith(start): -+ if not name.endswith(end): -+ return m[0] - name = name[1:-1] - try: - if environ is None: -@@ -357,13 +356,11 @@ def expandvars(path): - else: - value = environ[name] - except KeyError: -- i = j -+ return m[0] - else: -- tail = path[j:] -- path = path[:i] + value -- i = len(path) -- path += tail -- return path -+ return value -+ -+ return sub(repl, path) - - - # Normalize a path, e.g. A//B, A/./B and A/foo/../B all become A/B. -diff --git a/Lib/test/test_genericpath.py b/Lib/test/test_genericpath.py -index 3eefb72..1cec587 100644 ---- a/Lib/test/test_genericpath.py -+++ b/Lib/test/test_genericpath.py -@@ -7,6 +7,7 @@ import os - import sys - import unittest - import warnings -+from test import support - from test.support import is_emscripten - from test.support import os_helper - from test.support import warnings_helper -@@ -443,6 +444,19 @@ class CommonTest(GenericTest): - os.fsencode('$bar%s bar' % nonascii)) - check(b'$spam}bar', os.fsencode('%s}bar' % nonascii)) - -+ @support.requires_resource('cpu') -+ def test_expandvars_large(self): -+ expandvars = self.pathmodule.expandvars -+ with os_helper.EnvironmentVarGuard() as env: -+ env.clear() -+ env["A"] = "B" -+ n = 100_000 -+ self.assertEqual(expandvars('$A'*n), 'B'*n) -+ self.assertEqual(expandvars('${A}'*n), 'B'*n) -+ self.assertEqual(expandvars('$A!'*n), 'B!'*n) -+ self.assertEqual(expandvars('${A}A'*n), 'BA'*n) -+ self.assertEqual(expandvars('${'*10*n), '${'*10*n) -+ - def test_abspath(self): - self.assertIn("foo", self.pathmodule.abspath("foo")) - with warnings.catch_warnings(): -diff --git a/Lib/test/test_ntpath.py b/Lib/test/test_ntpath.py -index ced9dc4..f4d5063 100644 ---- a/Lib/test/test_ntpath.py -+++ b/Lib/test/test_ntpath.py -@@ -7,6 +7,7 @@ import sys - import unittest - import warnings - from ntpath import ALLOW_MISSING -+from test import support - from test.support import cpython_only, os_helper - from test.support import TestFailed, is_emscripten - from test.support.os_helper import FakePath -@@ -58,7 +59,7 @@ def tester(fn, wantResult): - fn = fn.replace("\\", "\\\\") - gotResult = eval(fn) - if wantResult != gotResult and _norm(wantResult) != _norm(gotResult): -- raise TestFailed("%s should return: %s but returned: %s" \ -+ raise support.TestFailed("%s should return: %s but returned: %s" \ - %(str(fn), str(wantResult), str(gotResult))) - - # then with bytes -@@ -74,7 +75,7 @@ def tester(fn, wantResult): - warnings.simplefilter("ignore", DeprecationWarning) - gotResult = eval(fn) - if _norm(wantResult) != _norm(gotResult): -- raise TestFailed("%s should return: %s but returned: %s" \ -+ raise support.TestFailed("%s should return: %s but returned: %s" \ - %(str(fn), str(wantResult), repr(gotResult))) - - -@@ -882,6 +883,19 @@ class TestNtpath(NtpathTestCase): - check('%spam%bar', '%sbar' % nonascii) - check('%{}%bar'.format(nonascii), 'ham%sbar' % nonascii) - -+ @support.requires_resource('cpu') -+ def test_expandvars_large(self): -+ expandvars = ntpath.expandvars -+ with os_helper.EnvironmentVarGuard() as env: -+ env.clear() -+ env["A"] = "B" -+ n = 100_000 -+ self.assertEqual(expandvars('%A%'*n), 'B'*n) -+ self.assertEqual(expandvars('%A%A'*n), 'BA'*n) -+ self.assertEqual(expandvars("''"*n + '%%'), "''"*n + '%') -+ self.assertEqual(expandvars("%%"*n), "%"*n) -+ self.assertEqual(expandvars("$$"*n), "$"*n) -+ - def test_expanduser(self): - tester('ntpath.expanduser("test")', 'test') - -diff --git a/Misc/NEWS.d/next/Security/2025-05-30-22-33-27.gh-issue-136065.bu337o.rst b/Misc/NEWS.d/next/Security/2025-05-30-22-33-27.gh-issue-136065.bu337o.rst -new file mode 100644 -index 0000000..1d152bb ---- /dev/null -+++ b/Misc/NEWS.d/next/Security/2025-05-30-22-33-27.gh-issue-136065.bu337o.rst -@@ -0,0 +1 @@ -+Fix quadratic complexity in :func:`os.path.expandvars`. --- -2.40.0 diff --git a/meta/recipes-devtools/python/python3_3.12.12.bb b/meta/recipes-devtools/python/python3_3.12.13.bb similarity index 98% rename from meta/recipes-devtools/python/python3_3.12.12.bb rename to meta/recipes-devtools/python/python3_3.12.13.bb index ce2c830655d..5fa25235fe8 100644 --- a/meta/recipes-devtools/python/python3_3.12.12.bb +++ b/meta/recipes-devtools/python/python3_3.12.13.bb @@ -34,17 +34,13 @@ SRC_URI = "http://www.python.org/ftp/python/${PV}/Python-${PV}.tar.xz \ file://0001-test_deadlock-skip-problematic-test.patch \ file://0001-test_active_children-skip-problematic-test.patch \ file://0001-test_readline-skip-limited-history-test.patch \ - file://CVE-2025-6075.patch \ - file://CVE-2025-12084.patch \ - file://CVE-2025-13836.patch \ - file://CVE-2025-13837.patch \ " SRC_URI:append:class-native = " \ file://0001-Lib-sysconfig.py-use-prefix-value-from-build-configu.patch \ " -SRC_URI[sha256sum] = "fb85a13414b028c49ba18bbd523c2d055a30b56b18b92ce454ea2c51edc656c4" +SRC_URI[sha256sum] = "c08bc65a81971c1dd5783182826503369466c7e67374d1646519adf05207b684" # exclude pre-releases for both python 2.x and 3.x UPSTREAM_CHECK_REGEX = "[Pp]ython-(?P\d+(\.\d+)+).tar" From patchwork Fri Apr 24 20:55:18 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86871 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 778B5FF8841 for ; Fri, 24 Apr 2026 20:56:51 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32580.1777064210095154988 for ; Fri, 24 Apr 2026 13:56:50 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=fX51ZfHV; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-48a3e9862f0so42144955e9.1 for ; Fri, 24 Apr 2026 13:56:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064208; x=1777669008; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=EVZn56Z+EO8gXCc5bBC4olKUsP8bV9S8R/6BjNte8lQ=; b=fX51ZfHVrItkQZ6mwuvaLMRrcxSNPQFZeDLxvTtmKdRAzoG9N8EQKzc1VKB9Y2GFgo ds12f7v2CYr3u07F7gK3bRCVX+ceAfLqdNiPoOKVve5O5swQFOdh6XB+ffJu6gA+eLBX 8Jp2YpdhP2EYWlOQJXmJdoI3qGqKUCH7U/Hfc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064208; x=1777669008; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=EVZn56Z+EO8gXCc5bBC4olKUsP8bV9S8R/6BjNte8lQ=; b=TAQlnH4iLqTHLXe/q4ffkq+40LPPNXeaLav0BfhTCOLZvFCCHCqNy+Z9H72EdAOi3b 1Uxi8PUVBdIAORUVOT2sQ3NjovsVT5mpKdwtyBjExlxyxCsYXrLTzRippIN2fiYuJscl euqKO9Q+dU1RzDGIy9ZhTXrl0sTSzCnVsiAmUXhPdgUZY2MvfKwnHYHNoKqoZtf1qJZP jaMlXF8tEcH/GDi3MTJxoFZdsQJ87ZqeiX8d/gbLep0OsCA7rAMdtsF6rC5YvE5gYFnB 4htlPqAjY6doKOyzgrwKDoFK6mhs6VEfRq08NyD9k+PkURX+5G6NyWznQCcK+9ZGgBhd ojtw== X-Gm-Message-State: AOJu0YzZ64M7mjFWq+lD1oO0t56MZXoYixOo56p7JKVi4m/F+x9hdt8p pEbEvzMRZXWzA97wO61XqRF+r3650I+wiL2QFB4krOxKgp54z4gzAce411X4DkbtGw6Zzm54zV1 a9ZxRVR8jHthM X-Gm-Gg: AeBDietT03QyUeku53EZW2AZtnMM9HhdB6l1Lw9GfYs6xXqho19fPQCgWf+/S/PuRzl 7y9OuGxFW/ezXzwmNHoedvV573wOxLa6CoU0GZI2sV+WpuVP3K0Lqz/obj+VYSSQsL3ZxdyyKwq JxD5BYKMfeGIp+FSrLzIHNRndrMCa9uqa5+J0J4mVLhLNxP877j7FuNnxIYcluVHxPYe/mw1Njz ZtWB28osiDNu16Jw4y8GTYOrFkkaypPh+ZLfh8xUFYowiA3CAOCL3bPa3gw48WyRRPx0MMThpNf vzkFPCAOy6B4Mb3W1RFjDE3MMs9uuZT5tKNqYygukQ1LkoooNNibtH52XpJICfHBAR+SSC77htO ux0Me19Vy1ITZrFNsCo9OefVnSe82Ifr0niK+0HQwCCMxAgMQLpy+1CG144yGi3A1BGZ/OgOHDB 3W+GkNB9OTHw00WlfvtN6pLCdemmy8l8oXDUiqZYDMnRVefwo7+/cKbvd/jVBn8fff6nM3nw2Fo vn9IafiLKDLV39vP/3z7JX/x1zOi8xU0hAKoA== X-Received: by 2002:a05:600c:b96:b0:48a:5339:a46 with SMTP id 5b1f17b1804b1-48a53390f6cmr266036825e9.9.1777064208204; Fri, 24 Apr 2026 13:56:48 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.47 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:47 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 19/66] vim: Fix CVE-2026-28418 Date: Fri, 24 Apr 2026 22:55:18 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:51 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235892 From: Hitendra Prajapati Pick patch from [1] also mentioned in [2] [1] https://github.com/vim/vim/commit/f6a7f469a9c0d09e84cd6cb46c3a9e76f684da2d [2] https://nvd.nist.gov/vuln/detail/CVE-2026-28418 Signed-off-by: Hitendra Prajapati Signed-off-by: Yoann Congal --- .../vim/files/CVE-2026-28418.patch | 78 +++++++++++++++++++ meta/recipes-support/vim/vim.inc | 1 + 2 files changed, 79 insertions(+) create mode 100644 meta/recipes-support/vim/files/CVE-2026-28418.patch diff --git a/meta/recipes-support/vim/files/CVE-2026-28418.patch b/meta/recipes-support/vim/files/CVE-2026-28418.patch new file mode 100644 index 00000000000..3a80ba77f7d --- /dev/null +++ b/meta/recipes-support/vim/files/CVE-2026-28418.patch @@ -0,0 +1,78 @@ +From f6a7f469a9c0d09e84cd6cb46c3a9e76f684da2d Mon Sep 17 00:00:00 2001 +From: Christian Brabandt +Date: Mon, 23 Feb 2026 18:30:11 +0000 +Subject: [PATCH] patch 9.2.0074: [security]: Crash with overlong emacs tag + file + +Problem: Crash with overlong emacs tag file, because of an OOB buffer + read (ehdgks0627, un3xploitable) +Solution: Check for end of buffer and return early. + +Github Advisory: +https://github.com/vim/vim/security/advisories/GHSA-h4mf-vg97-hj8j + +Signed-off-by: Christian Brabandt + +CVE: CVE-2026-28418 +Upstream-Status: Backport [https://github.com/vim/vim/commit/f6a7f469a9c0d09e84cd6cb46c3a9e76f684da2d] +Signed-off-by: Hitendra Prajapati +--- + src/tag.c | 3 +++ + src/testdir/test_taglist.vim | 15 +++++++++++++++ + src/version.c | 2 ++ + 3 files changed, 20 insertions(+) + +diff --git a/src/tag.c b/src/tag.c +index a32bbb2459..45af67f20d 100644 +--- a/src/tag.c ++++ b/src/tag.c +@@ -1902,6 +1902,9 @@ emacs_tags_new_filename(findtags_state_T *st) + + for (p = st->ebuf; *p && *p != ','; p++) + ; ++ // invalid ++ if (*p == NUL) ++ return; + *p = NUL; + + // check for an included tags file. +diff --git a/src/testdir/test_taglist.vim b/src/testdir/test_taglist.vim +index 5a946042be..506e64f7ae 100644 +--- a/src/testdir/test_taglist.vim ++++ b/src/testdir/test_taglist.vim +@@ -301,4 +301,19 @@ func Test_tag_complete_with_overlong_line() + set tags& + endfunc + ++" This used to crash Vim ++func Test_evil_emacs_tagfile() ++ CheckFeature emacs_tags ++ let longline = repeat('a', 515) ++ call writefile([ ++ \ "\x0c", ++ \ longline ++ \ ], 'Xtags', 'D') ++ set tags=Xtags ++ ++ call assert_fails(':tag a', 'E426:') ++ ++ set tags& ++endfunc ++ + " vim: shiftwidth=2 sts=2 expandtab +diff --git a/src/version.c b/src/version.c +index 712a3e637c..7d265ab641 100644 +--- a/src/version.c ++++ b/src/version.c +@@ -724,6 +724,8 @@ static char *(features[]) = + + static int included_patches[] = + { /* Add new patch number below this line */ ++/**/ ++ 1685, + /**/ + 1684, + /**/ +-- +2.50.1 + diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc index 4553c69c55f..37534c696b1 100644 --- a/meta/recipes-support/vim/vim.inc +++ b/meta/recipes-support/vim/vim.inc @@ -19,6 +19,7 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https \ file://CVE-2026-25749.patch \ file://CVE-2026-26269.patch \ file://CVE-2026-33412.patch \ + file://CVE-2026-28418.patch \ " PV .= ".1683" From patchwork Fri Apr 24 20:55:19 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86872 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 90E53FF8842 for ; Fri, 24 Apr 2026 20:56:51 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32581.1777064210922121993 for ; Fri, 24 Apr 2026 13:56:51 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=m00UuFEC; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-4891c0620bcso53508195e9.1 for ; Fri, 24 Apr 2026 13:56:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064209; x=1777669009; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=tJGaAq0rTcZqLgoZS+Ul7DUemylemdKvrIv1X9zr90A=; b=m00UuFECHUS4d56A4GDW9oWhOzs327jiKXexyCvTnj/VVaplxm1DQcSZffJyvMLRGa BWkhlFI77ZWdc2cZvmJ6DLn4T3ggXoaWt8lrhKvldP/JpO46G8anKEn0AXuUveEQnb9a V/TNogr1dxbsPGhmHKksbMLsOKxxssN+qDf0c= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064209; x=1777669009; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=tJGaAq0rTcZqLgoZS+Ul7DUemylemdKvrIv1X9zr90A=; b=rGPGifau2V1vOPWSRPngG2ZirF0gG+wL7RKJ9/CW8DH5MtmiEzs9+sjiXT4XYIkkIN FmSjvva6PvbKBac5ZCCpbeA+jUW20POe0+9mNMi8RdT9TOoqfSY6swe/Sh68zIPz/IHM Ib3j32LpDd811ig7QczORjawRprEBW1MhXhtl8ROZOxI9iPcIXQ7KYmen1q69nxghLaj SDYnHXNcAFbWw/9dK8dUsmGzLJU2MUmI7FUnWeNa6r8I/p4F9omhwovzTZdzeMw4jaSt urlHxIS6j5HkRZh7WmBAD8JEW4lYvDnPRw+PrcmvWk54FAZGfK6upFGw2COuoAfg7KSo ATyg== X-Gm-Message-State: AOJu0YzFilYtE1Cjown+7TQ5NkiYkbl6pQyQjHma6Yf943cnYbAHeaMy 1fSMj3ZvGzb2s3jwGm3Zx/YBewcOXdZVmF3lMULc7XAy6mrYBmL/qxBhcpFUhB8Ux24ZndtF0+C R+w+NCvYDCYOt X-Gm-Gg: AeBDiesFpeDNf2Sj47ikVvfh96w1CnuWGezYzv7hufcKj9EzV5JjRjgAEOeR5Lqh9Is d5wWuVag+Rw2aO4LnlIR0KIxVEOkxLDDpHy50VMxE8l2XvO7YdWUn8k+YJKJRVdft/m+VvSraVO 9MAvMZu4Rb370vHdeh/CFtJSSkyKF6qdzevlkogEHLlh8Dm/XcEIw2bjmuOigvqOgzfMxQRAfSG nYDtZ1l0wpz5nUUOyILr5PVUJ4iUvk/SpsGkq7bos5HffchXceQcg87BGdDlEvuJjbFhh65dF0H z1XVljr5tnlE5zNGRNfzXsN+KUTVV8gsc/5VZbVxVsYeSHdXKtmB075Aq2HipPL8QCFyeL9MqHR aZsgf+UAhJGxzZ7+FdBa5OgujRnvmaX2sDm5ClEqN9GfV7Qnb/oijVJf3qSson9CYglnCY/AIvN lBSzrKTMBb8/FRdcm3W513NVfOlQ+1ndBQIVp+Q/x+SXg8YE7EeswHpKsWxgefx5SQMYzmNByib qbxr4TG412W/OmL6CZIKVDorgPrKh5KTe+37w== X-Received: by 2002:a05:600c:8b8c:b0:489:1d74:56d with SMTP id 5b1f17b1804b1-4891d7406famr363457155e9.29.1777064209086; Fri, 24 Apr 2026 13:56:49 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.48 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:48 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 20/66] vim: Fix CVE-2026-28419 Date: Fri, 24 Apr 2026 22:55:19 +0200 Message-ID: <5e05e5e86d4ac5cc8a8d39ceb4f784feb9b0d327.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:56:51 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235893 From: Hitendra Prajapati Pick patch from [1] also mentioned in [2] [1] https://github.com/vim/vim/commit/9b7dfa2948c9e1e5e32a5812812d580c7879f4a0 [2] https://nvd.nist.gov/vuln/detail/CVE-2026-28419 Signed-off-by: Hitendra Prajapati Signed-off-by: Yoann Congal --- .../vim/files/CVE-2026-28419.patch | 86 +++++++++++++++++++ meta/recipes-support/vim/vim.inc | 1 + 2 files changed, 87 insertions(+) create mode 100644 meta/recipes-support/vim/files/CVE-2026-28419.patch diff --git a/meta/recipes-support/vim/files/CVE-2026-28419.patch b/meta/recipes-support/vim/files/CVE-2026-28419.patch new file mode 100644 index 00000000000..91100a7e91e --- /dev/null +++ b/meta/recipes-support/vim/files/CVE-2026-28419.patch @@ -0,0 +1,86 @@ +From 9b7dfa2948c9e1e5e32a5812812d580c7879f4a0 Mon Sep 17 00:00:00 2001 +From: Christian Brabandt +Date: Mon, 23 Feb 2026 19:35:25 +0000 +Subject: [PATCH] patch 9.2.0075: [security]: Buffer underflow with emacs tag + file + +Problem: When parsing a malformed Emacs-style tags file, a 1-byte + heap-buffer-underflow read occurs if the 0x7f delimiter + appears at the very beginning of a line. This happens + because the code attempts to scan backward for a tag + name from the delimiter without checking if space exists. + (ehdgks0627, un3xploitable) +Solution: Add a check to ensure the delimiter (p_7f) is not at the + start of the buffer (lbuf) before attempting to isolate + the tag name. + +GitHub Advisory: +https://github.com/vim/vim/security/advisories/GHSA-xcc8-r6c5-hvwv + +Signed-off-by: Christian Brabandt + + +CVE: CVE-2026-28419 +Upstream-Status: Backport [https://github.com/vim/vim/commit/9b7dfa2948c9e1e5e32a5812812d580c7879f4a0] +Signed-off-by: Hitendra Prajapati +--- + src/tag.c | 3 +++ + src/testdir/test_taglist.vim | 16 ++++++++++++++++ + src/version.c | 2 ++ + 3 files changed, 21 insertions(+) + +diff --git a/src/tag.c b/src/tag.c +index 45af67f20d..d3a73997bb 100644 +--- a/src/tag.c ++++ b/src/tag.c +@@ -2023,6 +2023,9 @@ etag_fail: + } + else // second format: isolate tagname + { ++ if (p_7f == lbuf) ++ goto etag_fail; ++ + // find end of tagname + for (p = p_7f - 1; !vim_iswordc(*p); --p) + if (p == lbuf) +diff --git a/src/testdir/test_taglist.vim b/src/testdir/test_taglist.vim +index 506e64f7ae..42ecc4b76e 100644 +--- a/src/testdir/test_taglist.vim ++++ b/src/testdir/test_taglist.vim +@@ -316,4 +316,20 @@ func Test_evil_emacs_tagfile() + set tags& + endfunc + ++" This used to crash Vim due to a heap-buffer-underflow ++func Test_emacs_tagfile_underflow() ++ CheckFeature emacs_tags ++ " The sequence from the crash artifact: ++ let lines = [ ++ \ "\x0c\xff\xffT\x19\x8a", ++ \ "\x19\x19\x0dtags\x19\x19\x19\x00\xff\xff\xff", ++ \ "\x7f3\x0c" ++ \ ] ++ call writefile(lines, 'Xtags', 'D') ++ set tags=Xtags ++ call assert_fails(':tag a', 'E431:') ++ ++ set tags& ++endfunc ++ + " vim: shiftwidth=2 sts=2 expandtab +diff --git a/src/version.c b/src/version.c +index 7d265ab641..4f47ec2688 100644 +--- a/src/version.c ++++ b/src/version.c +@@ -724,6 +724,8 @@ static char *(features[]) = + + static int included_patches[] = + { /* Add new patch number below this line */ ++/**/ ++ 1686, + /**/ + 1685, + /**/ +-- +2.50.1 + diff --git a/meta/recipes-support/vim/vim.inc b/meta/recipes-support/vim/vim.inc index 37534c696b1..9456cf3e13c 100644 --- a/meta/recipes-support/vim/vim.inc +++ b/meta/recipes-support/vim/vim.inc @@ -20,6 +20,7 @@ SRC_URI = "git://github.com/vim/vim.git;branch=master;protocol=https \ file://CVE-2026-26269.patch \ file://CVE-2026-33412.patch \ file://CVE-2026-28418.patch \ + file://CVE-2026-28419.patch \ " PV .= ".1683" From patchwork Fri Apr 24 20:55:20 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86893 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 314E7FF8852 for ; Fri, 24 Apr 2026 20:57:03 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31970.1777064211389741649 for ; Fri, 24 Apr 2026 13:56:51 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=UfXN/1xy; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-48a3e9862f0so42145115e9.1 for ; Fri, 24 Apr 2026 13:56:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064209; x=1777669009; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=MoMcgzoLpXpqYvQc7ydpHkfpgJk63v4iY1o3AgO5UVw=; b=UfXN/1xypiigDcS3mZaoO40DXOXM38dTW8DnVm059/GsGEhs0s3+9VWTLYIMM6z49G aHOyRum5W0xOZC7SXCnaMMHE0ze9jPej1SVQiTqrToCTCUoWSBsjfwGQXDdhYuuKp0tX mN68XLQLTGLVm8++dJ5DIz9RV9nII3DZOLKcA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064209; x=1777669009; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=MoMcgzoLpXpqYvQc7ydpHkfpgJk63v4iY1o3AgO5UVw=; b=qPjJX0fpxrAvLfH1T7S3y+9AN+f56CKzltkl/C7PVUkgqseF64Zie1rYiVQoB0C5MI j7W65A1Z4qvA9HDiLBdsYnEll1spUP6wDKgSqy0ML7znhK4WhV4WKppyugmr+OV9WNwk 4l35M2v8RFeNuMjWNhDCqgdmncWdTmBjG90eC1MeqcELGATMwJ7612MzUyDBw26T/GpI xBkJxmXNzuL9Fkx54ftXoEQS7e0hLrLVIUD+nRX0iytCXtc8qNcfMHp8fDnRmYKCcjLI b/dMQOUfZ0w3FNpQ3i8S3bQL4rRkP3CzwcQqxE/q+Hd2GxG4VxMuZu8TvkFecH7BkGZ3 BT2w== X-Gm-Message-State: AOJu0YxW1VRnYt0iL/DvqgEQhO+hg5p7e8VXEYi3NmF66nluN/i+XjX+ UHncyFgsRrgb1D/2ZNHV6T5+2U/+9bsBK0CmL1QDRHb1MhcuZIfAHJh14AjM2p+swCf+jmtCCua JedlDPL/f/WF6 X-Gm-Gg: AeBDieu6RqDnfXuNUiJHURWqqPYvpYaV3PIzWntV/ehlMgrMFOjU2uVh5MuyEpW64rW R19Gt659nUA8iqt8K85twcYOwjKoCP4CP1urCyMk/XPqp/mpipzNU7K1kUmuE0nq9jYpjfMhnsi 9Z0TWr0P1MZYVzJh0lrnd2yejpEoiJ6LO9zn62acfjfW3yUj7aOXkuAQHPaAahxKbr3MXfji/2e 9tX99YZZ5RguoVmluGa5NfI0fcpNqtjqIKTnVObs2R0B6Pp0ZAD3Y9cESaoI65pFf3gIUXCnwns jtgv5Hei8qCnZpqEhvh85l0Tyh+rfTSSa4Jm8oxA7Fj0zkSKEuw7TYN/yGOaBt0VfpWhQk1a4CP vIlnnmgLtfclcqw8bavxxmA64NB+VkiIwnKaHriCHcua9kcw6zDLscm6ArE1l4fIocdzyK+55Vc tJCoGmp5hpblA7BoO2Qv7cCcubmcOFRYfRDt/6sfdZx0hhaUKLTStytJAfwCwS30RUHbpbH+UT/ bWHu5bRTt2kZRwzqX+7+BHYjF04Xa9v1f73+Q== X-Received: by 2002:a05:600d:8447:b0:486:f893:56c6 with SMTP id 5b1f17b1804b1-488fb8b18d1mr332468165e9.10.1777064209541; Fri, 24 Apr 2026 13:56:49 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.49 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:49 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 21/66] openssl: upgrade 3.5.5 -> 3.5.6 Date: Fri, 24 Apr 2026 22:55:20 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:03 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235894 From: Peter Marko Release information [1]: OpenSSL 3.5.6 is a security patch release. The most severe CVE fixed in this release is Medium. This release incorporates the following bug fixes and mitigations: * Fixed incorrect failure handling in RSA KEM RSASVE encapsulation. (CVE-2026-31790) * Fixed loss of key agreement group tuple structure when the DEFAULT keyword is used in the server-side configuration of the key-agreement group list. (CVE-2026-2673) * Fixed potential use-after-free in DANE client code. (CVE-2026-28387) * Fixed NULL pointer dereference when processing a delta CRL. (CVE-2026-28388) * Fixed possible NULL dereference when processing CMS KeyAgreeRecipientInfo. (CVE-2026-28389) * Fixed possible NULL dereference when processing CMS KeyTransportRecipientInfo. (CVE-2026-28390) * Fixed heap buffer overflow in hexadecimal conversion. (CVE-2026-31789) [1] https://github.com/openssl/openssl/blob/openssl-3.5/NEWS.md#major-changes-between-openssl-355-and-openssl-356-7-apr-2026 Signed-off-by: Peter Marko Signed-off-by: Richard Purdie (cherry picked from commit fc25ce383ddcb1185c193ff2b10f9116741eb316) Signed-off-by: Yoann Congal --- ...1-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch | 2 +- .../openssl/{openssl_3.5.5.bb => openssl_3.5.6.bb} | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) rename meta/recipes-connectivity/openssl/{openssl_3.5.5.bb => openssl_3.5.6.bb} (99%) diff --git a/meta/recipes-connectivity/openssl/openssl/0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch b/meta/recipes-connectivity/openssl/openssl/0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch index dadc034c913..bfbfedbd67e 100644 --- a/meta/recipes-connectivity/openssl/openssl/0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch +++ b/meta/recipes-connectivity/openssl/openssl/0001-buildinfo-strip-sysroot-and-debug-prefix-map-from-co.patch @@ -38,7 +38,7 @@ diff --git a/Configurations/unix-Makefile.tmpl b/Configurations/unix-Makefile.tm index 09303c4..011bda1 100644 --- a/Configurations/unix-Makefile.tmpl +++ b/Configurations/unix-Makefile.tmpl -@@ -513,13 +513,27 @@ BIN_LDFLAGS={- join(' ', $target{bin_lflags} || (), +@@ -514,13 +514,27 @@ BIN_LDFLAGS={- join(' ', $target{bin_lflags} || (), '$(CNF_LDFLAGS)', '$(LDFLAGS)') -} BIN_EX_LIBS=$(CNF_EX_LIBS) $(EX_LIBS) diff --git a/meta/recipes-connectivity/openssl/openssl_3.5.5.bb b/meta/recipes-connectivity/openssl/openssl_3.5.6.bb similarity index 99% rename from meta/recipes-connectivity/openssl/openssl_3.5.5.bb rename to meta/recipes-connectivity/openssl/openssl_3.5.6.bb index 1321adda92a..3bf78eff5c2 100644 --- a/meta/recipes-connectivity/openssl/openssl_3.5.5.bb +++ b/meta/recipes-connectivity/openssl/openssl_3.5.6.bb @@ -19,7 +19,7 @@ SRC_URI:append:class-nativesdk = " \ file://environment.d-openssl.sh \ " -SRC_URI[sha256sum] = "b28c91532a8b65a1f983b4c28b7488174e4a01008e29ce8e69bd789f28bc2a89" +SRC_URI[sha256sum] = "deae7c80cba99c4b4f940ecadb3c3338b13cb77418409238e57d7f31f2a3b736" inherit lib_package multilib_header multilib_script ptest perlnative manpages MULTILIB_SCRIPTS = "${PN}-bin:${bindir}/c_rehash" From patchwork Fri Apr 24 20:55:21 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86875 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id BE832FF8841 for ; Fri, 24 Apr 2026 20:57:01 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31971.1777064211878994980 for ; Fri, 24 Apr 2026 13:56:52 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=iktwrI+W; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488ab2db91aso113197835e9.3 for ; Fri, 24 Apr 2026 13:56:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064210; x=1777669010; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=8YvIPmB8lPugDIpjyrF9hiCVTsMemgecDbGvGhKJGJU=; b=iktwrI+W7mX/hJ8flS3PM35hHDyjNA00ATxty1nlEU75+y0oY+JufHF5uXGINVmbS/ itRS/6RGQ7oN9be5kLdYW1jgkNXZ+8m9COBNeKeKueiduRP9ppzpJLFf3dC+1086b72h 6z1j4PpnV6Dwpp3eRmXpQ/Zdeo014K38MjXNM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064210; x=1777669010; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=8YvIPmB8lPugDIpjyrF9hiCVTsMemgecDbGvGhKJGJU=; b=hj6BaDwTWrTLf8FDZj6jYckEQNxSmeuCLJwp73dLwa6h53WRYv4xBp/rwFJ1ptZRni GJMDGR+BGamc+O9sNXPeTuIURCWxCjH2jnpLokOw/1Oe6YScW+8lG7+AdU/mM1OrBqWt OFrFqHs/RQjKrP6vjBKjttMACBHjZKBRa1WitPbh6nE/oW4r6bOW3XHdbkhKmxGIyBfm SrmUGqk5w9GvCskfhdSC0MS1ZPZvwZgbgdECdqLbRN1I3jjPL4ooT2wE/a8bb7NHkuqd HbIA7qI20w7oEYREQIQRPftqUsa2c27EIrRjuPEAhBAYgZtmLQ2sfqTDGQXHEdfCDyou 5rzQ== X-Gm-Message-State: AOJu0Yypqjt2kefSILB+7caa0Vgo2hAa1NapZTewhA8sE2UAVEHlAS3v YYpOR6Q9d+FjtVIC74HXQN1b+f15w/Has91I6q382bGx5ChD+K2oUJflRwm7EPTCR9sl19fExHG H/GGRMcMHfGCM X-Gm-Gg: AeBDietO87AhgyWQtj0IrxOrQIBl9vo2Msl+N9l6Qt1OTKAXv2TcQZgNuuf1FVA7BE/ NmXatAHjaCHmVNbDFWh0ncomVeC2cLMbcwpkkEiiBGZGsFzEmAPFdfKINuFkun2kmVk98Z8DCju lh82KHvV+fhFWKfOq4G9CHt1wjKtGzZA+rAHLcvr+3dHrw4Skzu06I4lQZ1z8rv8W2Coj1rQKqP q6FEpomYJteEloM3hNrCon6FvIFhsEKTN2ofL2E+cjLuYY84MYqy8vK9scbSx/4WzjZO/oAV1iv wTu+SnfM2ZcljXqfoJ1BXWbGAaH4+npSG8/QGwd9BjyUO2IasJuWJn1D6D5cr97g6Nxp1v+Z6+v w1kF/Oeq3roX0PUoVEeRfpw3aoI5t80h1PhLEy80izb/y1DqA6gi889ka+hozToWCtQzP8JPKVF H7kZ3hGziEXq3h8Kk6HQC3tvMGdooTu92rkwxH+t3hUw+IabobGfsqLxJFzkQQJKJlQEVsmPgp2 AYEY4AFYeVAZZGXhKYpu9Oa0oGuIflSWot8qSXrTc/5kNpb X-Received: by 2002:a05:600c:1f83:b0:488:8840:e5ae with SMTP id 5b1f17b1804b1-488fb787afemr469121365e9.24.1777064210012; Fri, 24 Apr 2026 13:56:50 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.49 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:49 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 22/66] gi-docgen: fix CVE-2025-11687 Date: Fri, 24 Apr 2026 22:55:21 +0200 Message-ID: <76c1f08fadad94098bd265d662eb5a0408c95efc.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:01 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235895 From: Zhang Peng CVE-2025-11687: A flaw was found in the gi-docgen. This vulnerability allows arbitrary JavaScript execution in the context of the page — enabling DOM access, session cookie theft and other client-side attacks — via a crafted URL that supplies a malicious value to the q GET parameter (reflected DOM XSS). Reference: [https://nvd.nist.gov/vuln/detail/CVE-2025-11687] Upstream patch: [https://gitlab.gnome.org/GNOME/gi-docgen/-/commit/c53d2640bfa5823bbdf33683d95c160267c0ec68] Signed-off-by: Zhang Peng Signed-off-by: Jinfeng Wang Signed-off-by: Yoann Congal --- .../gi-docgen/files/CVE-2025-11687.patch | 90 +++++++++++++++++++ .../gi-docgen/gi-docgen_2023.3.bb | 5 +- 2 files changed, 94 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-gnome/gi-docgen/files/CVE-2025-11687.patch diff --git a/meta/recipes-gnome/gi-docgen/files/CVE-2025-11687.patch b/meta/recipes-gnome/gi-docgen/files/CVE-2025-11687.patch new file mode 100644 index 00000000000..8a0c15e4a88 --- /dev/null +++ b/meta/recipes-gnome/gi-docgen/files/CVE-2025-11687.patch @@ -0,0 +1,90 @@ +From 0e97b155ff1b15bc3173118561316d8ea28ec9b7 Mon Sep 17 00:00:00 2001 +From: Emmanuele Bassi +Date: Fri, 10 Oct 2025 17:06:22 +0100 +Subject: [PATCH] Make sure to escape query strings + +Unescaped query strings should not be passed to the HTML parser, to +avoid unwanted execution of JavaScript. + +The query is shown in the header of the search results, so we can easily +split the header from the results; then we use a plain text node to +represent the query, and let the browser escape it. + +See: https://cheatsheetseries.owasp.org/cheatsheets/DOM_based_XSS_Prevention_Cheat_Sheet.html + +Fixes: #228 + +CVE: CVE-2025-11687 +Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/gi-docgen/-/commit/c53d2640bfa5823bbdf33683d95c160267c0ec68] + +Signed-off-by: Zhang Peng +--- + gidocgen/templates/basic/search.js | 30 +++++++++++++++++++----------- + 1 file changed, 19 insertions(+), 11 deletions(-) + +diff --git a/gidocgen/templates/basic/search.js b/gidocgen/templates/basic/search.js +index 29c204f..628f0a6 100644 +--- a/gidocgen/templates/basic/search.js ++++ b/gidocgen/templates/basic/search.js +@@ -182,17 +182,24 @@ function hideSearchResults() { + } + } + +-function renderResults(query, results) { +- let html = ""; ++function createResultsTitle(query, n_results) { ++ // Ensure we're returning an escaped query string, to ensure we ++ // prevent XSS vulnerabilities ++ let h1 = document.createElement("h1"); ++ let text = document.createTextNode("Results for “" + query + "” (" + n_results + ")"); ++ h1.appendChild(text) ++ return h1; ++} + +- html += "

Results for "" + query + "" (" + results.length + ")

" + +- "
" ++function createResultsContent(results) { ++ let search_results = document.createElement("div"); ++ search_results.setAttribute("id", "search-results"); + + if (results.length === 0) { +- html += "No results found."; ++ search_results.textContent = "No results found."; + } + else { +- html += "
"; ++ let html = "
"; + results.forEach(function(item) { + html += "
" + + "" + item.text + "" + +@@ -204,11 +211,11 @@ function renderResults(query, results) { + "
" + item.summary + "
"; + }); + html += "
"; +- } + +- html += "
"; ++ search_results.innerHTML = html; ++ } + +- return html; ++ return search_results; + } + + function showResults(query, results) { +@@ -218,9 +225,10 @@ function showResults(query, results) { + window.history.replaceState(refs.input.value, "", baseUrl + extra + window.location.hash); + } + +- window.title = "Results for: " + query; ++ window.title = "Results for “" + query + "” (" + results.length + ")"; + window.scroll({ top: 0 }) +- refs.search.innerHTML = renderResults(query, results); ++ refs.search.appendChild(createResultsTitle(query, results.length)); ++ refs.search.appendChild(createResultsContent(results)); + showSearchResults(search); + } + +-- +2.50.0 + diff --git a/meta/recipes-gnome/gi-docgen/gi-docgen_2023.3.bb b/meta/recipes-gnome/gi-docgen/gi-docgen_2023.3.bb index 54d7ef75136..53641bcbe33 100644 --- a/meta/recipes-gnome/gi-docgen/gi-docgen_2023.3.bb +++ b/meta/recipes-gnome/gi-docgen/gi-docgen_2023.3.bb @@ -8,7 +8,10 @@ HOMEPAGE = "https://gnome.pages.gitlab.gnome.org/gi-docgen/" LICENSE = "GPL-3.0-or-later & Apache-2.0" LIC_FILES_CHKSUM = "file://gi-docgen.py;beginline=1;endline=5;md5=2dc0f1f01202478cfe813c0e7f80b326" -SRC_URI = "git://gitlab.gnome.org/GNOME/gi-docgen.git;protocol=https;branch=main" +SRC_URI = "\ + git://gitlab.gnome.org/GNOME/gi-docgen.git;protocol=https;branch=main \ + file://CVE-2025-11687.patch \ + " SRCREV = "96f2e9b93e1d8a5338eb05b87fd879856ab7b3cc" From patchwork Fri Apr 24 20:55:22 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86890 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id CD6DFFF884D for ; Fri, 24 Apr 2026 20:57:02 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32582.1777064212367009879 for ; Fri, 24 Apr 2026 13:56:52 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=qU8AuaHc; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-48334ee0aeaso86444545e9.1 for ; Fri, 24 Apr 2026 13:56:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064210; x=1777669010; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=8PHTAoYMechlICcHFSLBbuvfuG1b0qobvUGKIP9HpNM=; b=qU8AuaHcz/0DXFqqrWDSv06oOwoYun5dqiW4cxstAaPkHflhCZrw7VWK4YtcNuHO+k +YqqIGTwbyI/j045Rr4MMHlsdEfE/zSFYxo2Lr/nStOJPAzy5FuKlb5cmXdmUxacrhdU Qp/xvxECb/WE6PN/sY2tcW95OBGxvKFSlwQ5M= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064210; x=1777669010; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=8PHTAoYMechlICcHFSLBbuvfuG1b0qobvUGKIP9HpNM=; b=m4DySYd9wCpBEfuKG+OZX1Mwl/K7vbw4DZydfGtQX22w+z3c9uSL0LDcPm2vg7NPzR jsleA5icnG7t6oyU3lXI/OfxdCQM0eKsCSjGVl11i+YBg+YJS7OHGBkcNYUCtBfQNKCT XayDnujNhvOxrtuMjhmJM/w/6sor3lp8mNQBlUli6jWMLzuJOCp6zJIQ2wgIVG+XmAXT oxnSyQ7zRe8D04euztXUvgxaqpSwTBwt8c5vpXTI6xXpd2o4+oVq2p2S6fF4/76/LDYh jcAw5mZKh1P0pXKmsrlzGEQzgnj0Ijd9ufgbIi5kGr63mFBWHdBlP0F3qNivs4fooLIY FOBw== X-Gm-Message-State: AOJu0YyydHH0l9P6C+vtN8eswg0z4+9s5Wd7GlPwglhQDITan3H7ZGA+ xmx7s1pzNxqUk1VoWP7qYDvZCtLBCxg7AQK8L5u4PMjk3lVdoafadrylttb6oqthIXu9RGAQ++x picyJPEUBSPZM X-Gm-Gg: AeBDieuzI5Skwh2zwuLgHjR5xP0RVIHlxKavo9dzdPumj9s49OU4I/nFhaIr77Rhswu 2D+HDcwH57FpqDOpODSoqZM24dE8cMv75ixofW8EUzQ4wu1iR/prjCzIs0lPWqKkCSUKhbzWP03 JWrW98aT2G3HOpsfLeNToLpqhuyu8b0mb6/itoA+pIL7/QBvRrj3TsBIcsHM7zwKcHjVQsqE1+v /g/NpWHLJOsCDCO5Ong5x4tgok0tEwCiTeqOHpHV0o6t5pS7E91/EaDXxBGkNR/grlfpWxPfkD6 riX1FGeZ4afILwJMJ3AjdIIZ4vdGJDkd77uitZPfnwx+KYC2vOTBKNalkZBDAEH45JAt/IAv7Yf mrZE0va7iyygF8r19Vh4nP2cwMeb6LDbf4F5Dr+X06WqjnN+L3ptK2NsGV0J7yg9G1I+3GpXThv n7U5NlMhoT6R/OE04tax1cEumowOX7DX/broZsFTpmbFAfIAnLuEXO5/AwHCK2ralaOpO1fHeda eiK6lpkqlGXIct6LI2qjQkQTDgFaHS2jb5E1A== X-Received: by 2002:a05:600d:8408:b0:488:b8bc:6a32 with SMTP id 5b1f17b1804b1-488fb7857c6mr353663885e9.23.1777064210488; Fri, 24 Apr 2026 13:56:50 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.50 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:50 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 23/66] python3-pyasn1: fix CVE-2026-23490 Date: Fri, 24 Apr 2026 22:55:22 +0200 Message-ID: <205d360b49c7bbaa8709cb5a0b2e57457c32ad22.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235896 From: Jiaying Song pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.2, a Denial-of-Service issue has been found that leads to memory exhaustion from malformed RELATIVE-OID with excessive continuation octets. This vulnerability is fixed in 0.6.2. References: https://nvd.nist.gov/vuln/detail/CVE-2026-23490 Signed-off-by: Jiaying Song Signed-off-by: Jinfeng Wang Signed-off-by: Yoann Congal --- .../recipes-devtools/python/python-pyasn1.inc | 3 +- .../python3-pyasn1/CVE-2026-23490.patch | 136 ++++++++++++++++++ 2 files changed, 138 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-devtools/python/python3-pyasn1/CVE-2026-23490.patch diff --git a/meta/recipes-devtools/python/python-pyasn1.inc b/meta/recipes-devtools/python/python-pyasn1.inc index 530ff1c7c36..96b4a3b52a6 100644 --- a/meta/recipes-devtools/python/python-pyasn1.inc +++ b/meta/recipes-devtools/python/python-pyasn1.inc @@ -18,7 +18,8 @@ inherit ptest SRC_URI += " \ file://run-ptest \ - " + file://CVE-2026-23490.patch \ +" RDEPENDS:${PN}-ptest += " \ python3-pytest \ diff --git a/meta/recipes-devtools/python/python3-pyasn1/CVE-2026-23490.patch b/meta/recipes-devtools/python/python3-pyasn1/CVE-2026-23490.patch new file mode 100644 index 00000000000..a79774003be --- /dev/null +++ b/meta/recipes-devtools/python/python3-pyasn1/CVE-2026-23490.patch @@ -0,0 +1,136 @@ +From d98d7bc91864e1e368d4849c26568e33c0dd0e27 Mon Sep 17 00:00:00 2001 +From: Simon Pichugin +Date: Wed, 28 Jan 2026 16:31:29 +0800 +Subject: [PATCH] Merge commit from fork + +Add limit of 20 continuation octets per OID arc to prevent a potential +memory exhaustion from excessive continuation bytes input. + +CVE: CVE-2026-23490 + +Upstream-Status: Backport [https://github.com/pyasn1/pyasn1/commit/3908f14422] + +Signed-off-by: Jiaying Song +--- + pyasn1/codec/ber/decoder.py | 13 ++++++- + tests/codec/ber/test_decoder.py | 65 +++++++++++++++++++++++++++++++++ + 2 files changed, 77 insertions(+), 1 deletion(-) + +diff --git a/pyasn1/codec/ber/decoder.py b/pyasn1/codec/ber/decoder.py +index 7cc863d..be8ba65 100644 +--- a/pyasn1/codec/ber/decoder.py ++++ b/pyasn1/codec/ber/decoder.py +@@ -35,6 +35,10 @@ noValue = base.noValue + + SubstrateUnderrunError = error.SubstrateUnderrunError + ++# Maximum number of continuation octets (high-bit set) allowed per OID arc. ++# 20 octets allows up to 140-bit integers, supporting UUID-based OIDs ++MAX_OID_ARC_CONTINUATION_OCTETS = 20 ++ + + class AbstractPayloadDecoder(object): + protoComponent = None +@@ -431,7 +435,14 @@ class ObjectIdentifierPayloadDecoder(AbstractSimplePayloadDecoder): + # Construct subid from a number of octets + nextSubId = subId + subId = 0 ++ continuationOctetCount = 0 + while nextSubId >= 128: ++ continuationOctetCount += 1 ++ if continuationOctetCount > MAX_OID_ARC_CONTINUATION_OCTETS: ++ raise error.PyAsn1Error( ++ 'OID arc exceeds maximum continuation octets limit (%d) ' ++ 'at position %d' % (MAX_OID_ARC_CONTINUATION_OCTETS, index) ++ ) + subId = (subId << 7) + (nextSubId & 0x7F) + if index >= substrateLen: + raise error.SubstrateUnderrunError( +@@ -1872,7 +1883,7 @@ class StreamingDecoder(object): + :py:class:`~pyasn1.error.SubstrateUnderrunError` object indicating + insufficient BER/CER/DER serialization on input to fully recover ASN.1 + objects from it. +- ++ + In the latter case the caller is advised to ensure some more data in + the input stream, then call the iterator again. The decoder will resume + the decoding process using the newly arrived data. +diff --git a/tests/codec/ber/test_decoder.py b/tests/codec/ber/test_decoder.py +index 3b97ce4..f033dfd 100644 +--- a/tests/codec/ber/test_decoder.py ++++ b/tests/codec/ber/test_decoder.py +@@ -450,6 +450,71 @@ class ObjectIdentifierDecoderTestCase(BaseTestCase): + ints2octs((0x06, 0x13, 0x88, 0x37, 0x83, 0xC6, 0xDF, 0xD4, 0xCC, 0xB3, 0xFF, 0xFF, 0xFE, 0xF0, 0xB8, 0xD6, 0xB8, 0xCB, 0xE2, 0xB6, 0x47)) + ) == ((2, 999, 18446744073709551535184467440737095), null) + ++ def testExcessiveContinuationOctets(self): ++ """Test that OID arcs with excessive continuation octets are rejected.""" ++ # Create a payload with 25 continuation octets (exceeds 20 limit) ++ # 0x81 bytes are continuation octets, 0x01 terminates ++ malicious_payload = bytes([0x06, 26]) + bytes([0x81] * 25) + bytes([0x01]) ++ try: ++ decoder.decode(malicious_payload) ++ except error.PyAsn1Error: ++ pass ++ else: ++ assert 0, 'Excessive continuation octets tolerated' ++ ++ def testMaxAllowedContinuationOctets(self): ++ """Test that OID arcs at the maximum continuation octets limit work.""" ++ # Create a payload with exactly 20 continuation octets (at limit) ++ # This should succeed ++ payload = bytes([0x06, 21]) + bytes([0x81] * 20) + bytes([0x01]) ++ try: ++ decoder.decode(payload) ++ except error.PyAsn1Error: ++ assert 0, 'Valid OID with 20 continuation octets rejected' ++ ++ def testOneOverContinuationLimit(self): ++ """Test boundary: 21 continuation octets (one over limit) is rejected.""" ++ payload = bytes([0x06, 22]) + bytes([0x81] * 21) + bytes([0x01]) ++ try: ++ decoder.decode(payload) ++ except error.PyAsn1Error: ++ pass ++ else: ++ assert 0, '21 continuation octets tolerated (should be rejected)' ++ ++ def testExcessiveContinuationInSecondArc(self): ++ """Test that limit applies to subsequent arcs, not just the first.""" ++ # First arc: valid simple byte (0x55 = 85, decodes to arc 2.5) ++ # Second arc: excessive continuation octets ++ payload = bytes([0x06, 27]) + bytes([0x55]) + bytes([0x81] * 25) + bytes([0x01]) ++ try: ++ decoder.decode(payload) ++ except error.PyAsn1Error: ++ pass ++ else: ++ assert 0, 'Excessive continuation in second arc tolerated' ++ ++ def testMultipleArcsAtLimit(self): ++ """Test multiple arcs each at the continuation limit work correctly.""" ++ # Two arcs, each with 20 continuation octets (both at limit) ++ arc1 = bytes([0x81] * 20) + bytes([0x01]) # 21 bytes ++ arc2 = bytes([0x81] * 20) + bytes([0x01]) # 21 bytes ++ payload = bytes([0x06, 42]) + arc1 + arc2 ++ try: ++ decoder.decode(payload) ++ except error.PyAsn1Error: ++ assert 0, 'Multiple valid arcs at limit rejected' ++ ++ def testExcessiveContinuationWithMaxBytes(self): ++ """Test with 0xFF continuation bytes (maximum value, not just 0x81).""" ++ # 0xFF bytes are also continuation octets (high bit set) ++ malicious_payload = bytes([0x06, 26]) + bytes([0xFF] * 25) + bytes([0x01]) ++ try: ++ decoder.decode(malicious_payload) ++ except error.PyAsn1Error: ++ pass ++ else: ++ assert 0, 'Excessive 0xFF continuation octets tolerated' + + class RealDecoderTestCase(BaseTestCase): + def testChar(self): +-- +2.34.1 + From patchwork Fri Apr 24 20:55:23 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86891 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2A134FF8851 for ; Fri, 24 Apr 2026 20:57:03 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31972.1777064212827576691 for ; Fri, 24 Apr 2026 13:56:53 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=O3Aae69Z; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-483487335c2so80856935e9.2 for ; Fri, 24 Apr 2026 13:56:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064211; x=1777669011; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=qozM4YuVB+E8yz5SkZyKTb9/T6T5zkYDAMFZ/1shzak=; b=O3Aae69ZvIZsj5k73KKHIi3k/v7iw5biwpXmtk548dcD07kL0XcTJ3vNfXHw7FWHns TNfAZzzDMmc4Q3jwSUGlUfHG2pVSXZhgURQAb3kA5T5vzJPu3JZ1pO49DnKqMyEnPbsf y2EMb+GpUAG3CI8iIsDS8yz3Wo1mGuBq/tqwY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064211; x=1777669011; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=qozM4YuVB+E8yz5SkZyKTb9/T6T5zkYDAMFZ/1shzak=; b=khc6UcoLwNTQLFOGd3W6LaqjTZP9tWh7zdoH6rzscbr3OyAcEt1ORv6bpgAMQ6vlk9 0juhrKRmPBfvItI9FZKogurBMhCXkZ1v+GGO3nN34D4vTmr2FcBQ1u93SBC7tmvagbpp x2bzoBK3SBAO/OTVULmfYFtQdaOMldRzUNjbn76T6JID1jLDudQE1EsrnTBt59aCnlWk p2lea4zNxY4fHYq9jhgTT40wYO2oGvP7nvDTF2TrKYfl4v/KwyVeuM6IGckunDY4nQT6 bvbP86GX1bERB4KSaoEoRkch209HssXAAROwtvOF1gjIhtvtmLc0d8qQ+nX7nwgJ4WrH wKgA== X-Gm-Message-State: AOJu0YyQLvMWKWQDzFGInNAbd2PmCKZ/6tgzIpgbsX9CqbLVpAY9FR6u GdPE6513zsUQyQrBckaa/qiRzD4prodiMamrTjZyrnYd6jozHKXy8Qf8lFytXR68bTL62OcbQf2 1/yn6dQ15gDWx X-Gm-Gg: AeBDiesLYnOUCcvJSueQFj8NFWyUBKkQg5pHx7MoxUWqY2ZNxFJG9qORZHhQM1z0hzH 6iMKxjsjtYtE4Q2uuCiqZlRTx0wyNuOb5ABtiQ00QLw3Upn7b9IZY43eSy4bXHQKDY2GlgydAzO Lfnk4z7i01VyJGa30UyZPgwYd6PdC7TQ35T3PNKgOUHPhv1xd17Gqz5xeeZaZTBRjgc9PfUqOCR TqyUQ1VC1VewivQ6n20Qc9n4Rh4tOLhW+DZLs1ykS8JUTp5LDfIRcbhipTvYAriBcmztEaDfthv VkphNbMKr63F8mKhGy25t/Fkn5933QrgsYrWEkiKrNIR0Q4qETlmMHLapl8rvuI4vi6ykhxR3X0 zPz0GQd7T4kyOZEE2sQSnJJ2JznYo6JqgImhYoIWmLzDOiQIB0IkGXNgUVKkhX2s5oLNA5Dde1c 2PQeDhRPfYhMx0HtemXHi2pOua624fyXX93CVCkVMkhnPodpaLPzLxpmZQGoVTQa92ru7FL2QfO xGX2N6NBixAz6tqlp4F/8gZpl5UqCWVBmoiFA== X-Received: by 2002:a05:600c:8284:b0:489:1f3e:5f69 with SMTP id 5b1f17b1804b1-4891f3e629bmr326672205e9.18.1777064210980; Fri, 24 Apr 2026 13:56:50 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.50 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:50 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 24/66] python3-wheel: fix CVE-2026-24049 Date: Fri, 24 Apr 2026 22:55:23 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:03 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235897 From: Guocai He Backport patch to fix CVE-2026-24049 per reference [1] [2]. [1] https://security-tracker.debian.org/tracker/CVE-2026-24049 [2] https://github.com/pypa/wheel/commit/7a7d2de96b Signed-off-by: Guocai He Signed-off-by: Jinfeng Wang Signed-off-by: Yoann Congal --- .../python/python3-wheel/CVE-2026-24049.patch | 73 +++++++++++++++++++ .../python/python3-wheel_0.42.0.bb | 2 + 2 files changed, 75 insertions(+) create mode 100644 meta/recipes-devtools/python/python3-wheel/CVE-2026-24049.patch diff --git a/meta/recipes-devtools/python/python3-wheel/CVE-2026-24049.patch b/meta/recipes-devtools/python/python3-wheel/CVE-2026-24049.patch new file mode 100644 index 00000000000..89a848c1007 --- /dev/null +++ b/meta/recipes-devtools/python/python3-wheel/CVE-2026-24049.patch @@ -0,0 +1,73 @@ +From 363aef740d670c37d76b6fd86e2a28886de23f45 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Alex=20Gr=C3=B6nholm?= +Date: Thu, 22 Jan 2026 01:41:14 +0200 +Subject: [PATCH] Fixed security issue around wheel unpack (#675) + +A maliciously crafted wheel could cause the permissions of a file outside the unpack tree to be altered. + +Fixes CVE-2026-24049. + +CVE: CVE-2026-24049 + +In test case, the API "run_command" is not defined and use "unpack" directly. + +Upstream-Status: Backport [https://github.com/pypa/wheel/commit/7a7d2de96b] + +Signed-off-by: Guocai He +--- + src/wheel/cli/unpack.py | 4 ++-- + tests/cli/test_unpack.py | 22 ++++++++++++++++++++++ + 2 files changed, 24 insertions(+), 2 deletions(-) + +diff --git a/src/wheel/cli/unpack.py b/src/wheel/cli/unpack.py +index d48840e..83dc742 100644 +--- a/src/wheel/cli/unpack.py ++++ b/src/wheel/cli/unpack.py +@@ -19,12 +19,12 @@ def unpack(path: str, dest: str = ".") -> None: + destination = Path(dest) / namever + print(f"Unpacking to: {destination}...", end="", flush=True) + for zinfo in wf.filelist: +- wf.extract(zinfo, destination) ++ target_path = Path(wf.extract(zinfo, destination)) + + # Set permissions to the same values as they were set in the archive + # We have to do this manually due to + # https://github.com/python/cpython/issues/59999 + permissions = zinfo.external_attr >> 16 & 0o777 +- destination.joinpath(zinfo.filename).chmod(permissions) ++ target_path.chmod(permissions) + + print("OK") +diff --git a/tests/cli/test_unpack.py b/tests/cli/test_unpack.py +index ae584af..96d1391 100644 +--- a/tests/cli/test_unpack.py ++++ b/tests/cli/test_unpack.py +@@ -34,3 +34,25 @@ def test_unpack_executable_bit(tmp_path): + unpack(str(wheel_path), str(tmp_path)) + assert not script_path.is_dir() + assert stat.S_IMODE(script_path.stat().st_mode) == 0o755 ++ ++@pytest.mark.skipif( ++ platform.system() == "Windows", reason="Windows does not support chmod()" ++) ++def test_chmod_outside_unpack_tree(tmp_path_factory: TempPathFactory) -> None: ++ wheel_path = tmp_path_factory.mktemp("build") / "test-1.0-py3-none-any.whl" ++ with WheelFile(wheel_path, "w") as wf: ++ wf.writestr( ++ "test-1.0.dist-info/METADATA", ++ "Metadata-Version: 2.4\nName: test\nVersion: 1.0\n", ++ ) ++ wf.writestr("../../system-file", b"malicious data") ++ ++ extract_root_path = tmp_path_factory.mktemp("extract") ++ system_file = extract_root_path / "system-file" ++ extract_path = extract_root_path / "subdir" ++ system_file.write_bytes(b"important data") ++ system_file.chmod(0o755) ++ unpack(str(wheel_path), str(extract_path)) ++ ++ assert system_file.read_bytes() == b"important data" ++ assert stat.S_IMODE(system_file.stat().st_mode) == 0o755 +-- +2.34.1 + diff --git a/meta/recipes-devtools/python/python3-wheel_0.42.0.bb b/meta/recipes-devtools/python/python3-wheel_0.42.0.bb index 807888e6c00..934f258a93d 100644 --- a/meta/recipes-devtools/python/python3-wheel_0.42.0.bb +++ b/meta/recipes-devtools/python/python3-wheel_0.42.0.bb @@ -8,6 +8,8 @@ SRC_URI[sha256sum] = "c45be39f7882c9d34243236f2d63cbd58039e360f85d0913425fbd7cee inherit python_flit_core pypi +SRC_URI += "file://CVE-2026-24049.patch" + BBCLASSEXTEND = "native nativesdk" # This used to use the bootstrap install which didn't compile. Until we bump the From patchwork Fri Apr 24 20:55:24 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86892 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3D0E3FF8854 for ; Fri, 24 Apr 2026 20:57:03 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32584.1777064213273722934 for ; Fri, 24 Apr 2026 13:56:53 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=1nKkmVfg; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-488ad135063so74478855e9.0 for ; Fri, 24 Apr 2026 13:56:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064211; x=1777669011; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=bQqguPAs1cDpwLUq6OfIDRz384iT2SYSwHdo1ttWwOM=; b=1nKkmVfgSUJmhOSA+WBA1l4xQBumQNT3j+rGafHEVKtsmgZi8SbUSC2ANJ73G9WXi4 RtdCxoIIoWQvHnXAp0cv27BNvzcgCnswTdW//M/3jN3y9cN6KAglfWJm2ogwRbXgDJ6O l9ZGO0LZ6u3HtOeQ4JhMFfUMNqZRSu3E6IqNU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064211; x=1777669011; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=bQqguPAs1cDpwLUq6OfIDRz384iT2SYSwHdo1ttWwOM=; b=RJ8azmUR4F8RjTeNu4uB0l3Q2pDLQxBzPu4hMomHhwBqLNPFQvWS2XrhBz83OFmG4q vW+nbb9+WKina9edl09pizMjP5Qp+bcCNPep3+xNME+RazY4tw6Ho1Y7xTCLF257NLXs bzt+XincG8x5tApY5ojfKqmMq8Df6gHrtciLHydpF0QfiAB2r+OSIGmM8BbW0+jUWKOx FCXlQJSt5eLQOMiSOzKCC744kU0SeA0kS7mkHMxsjCtVhA5yAtaVWWTo6VBQg6voI/p1 SB6z9BkvFFI62yCpZlmnawZuMlFp9uEu572jXLm/X2E68+lEySuLUEJHo2H7nG5sBXrl 6niQ== X-Gm-Message-State: AOJu0YwbB19Fa15bGgGrvmgv3kHmUmgGytGW9U32Jx/EiCSWCtDKMEnU mblCaQjjpzpVfe748tAumj/S67IBxEpXokUZr3HGFoZc4mjNlYT4yWg+d3Nfef4OeWvkzTxwSmz JXP4r862Kr5la X-Gm-Gg: AeBDiesdXNfGwJC3GHXXI/e7AlNNK4KMkU92MDKaJFnYzNQtKZQd5h+1Kj/GRTZ3Kw6 hfwneNrJrMQJLxeCgD+E3zD0jZgmmE6HCVaeHdo7c6zmtW+qz4/udLw3elzRxexG+P5d6NWlGT4 vB4L7w3zGTjU9sZ9aIA2H4cgr/fqmjOgKWkc/m4YAHJRtse4+AlUMVGGsbVLw5KDtQwKY67SBjA YpdPJGDPwK0ZoYZ6is4dR5k8wfrtQa21oJ28F/fMZy8Y4RD7JJQUugrctdNnXZra7sIWWadDxXU HtM6RXh/ECB2Ww4SvwoTxxvXPRe3hEcDL82VzRqflJKWtUXWXrLvppnn7kNHv+OAiyAJlFWBd19 X7ByMp0JEBV7flmuEr23qmzVhY+5aTWDsIcNBL2nooE7LcxJ/Lic3SJxnj1Ta0fsnBItCspM5R1 H36jsBb6fSxFwtbFbHrxL172aikYUpT23ZhOvmuZdy+3MgPrr1ESuNSrUqtSXhiBfx8AjBi43wE rms0QVp1d73IjhsWKFxo4JTBJ/75YnvyOPS0Q== X-Received: by 2002:a05:600c:1e09:b0:489:1f6b:6276 with SMTP id 5b1f17b1804b1-4891f6b6464mr313057885e9.15.1777064211419; Fri, 24 Apr 2026 13:56:51 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.51 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:51 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 25/66] gnupg: fix CVE-2026-24882 Date: Fri, 24 Apr 2026 22:55:24 +0200 Message-ID: <0adf2e2d511f0d6bf9d70c88cbdda6a6ba7be45e.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:03 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235898 From: Guocai He Backport patch to fix CVE-2026-24882 per reference [1] [2]. [1] https://security-tracker.debian.org/tracker/CVE-2026-24882 [2] https://dev.gnupg.org/T8045 Signed-off-by: Guocai He Signed-off-by: Jinfeng Wang Signed-off-by: Yoann Congal --- .../gnupg/gnupg/CVE-2026-24882-0001.patch | 70 +++++++++++++++++++ .../gnupg/gnupg/CVE-2026-24882-0002.patch | 47 +++++++++++++ meta/recipes-support/gnupg/gnupg_2.4.8.bb | 2 + 3 files changed, 119 insertions(+) create mode 100644 meta/recipes-support/gnupg/gnupg/CVE-2026-24882-0001.patch create mode 100644 meta/recipes-support/gnupg/gnupg/CVE-2026-24882-0002.patch diff --git a/meta/recipes-support/gnupg/gnupg/CVE-2026-24882-0001.patch b/meta/recipes-support/gnupg/gnupg/CVE-2026-24882-0001.patch new file mode 100644 index 00000000000..6e6d44c3729 --- /dev/null +++ b/meta/recipes-support/gnupg/gnupg/CVE-2026-24882-0001.patch @@ -0,0 +1,70 @@ +From d07e2f19134129d59014fe181642cd122dc2e29f Mon Sep 17 00:00:00 2001 +From: Werner Koch +Date: Mon, 26 Jan 2026 11:13:44 +0100 +Subject: [PATCH 1/2] tpm: Fix possible buffer overflow in PKDECRYPT + +* tpm2d/tpm2.c (tpm2_ecc_decrypt): Bail out on too long CIPHERTEXT. +(tpm2_rsa_decrypt): Ditto. +-- + +Cherry pick master commit of: + 93fa34d9a346020355cd51d54102d30d4f177323 + +GnuPG-bug-id: 8045 +Co-authored-by: NIIBE Yutaka +Reported-by: OpenAI Security Research + +CVE: CVE-2026-24882 +Upstream-Status: Backport [https://github.com/gpg/gnupg/commit/01c130031] + +Signed-off-by: Guocai He +--- + tpm2d/tpm2.c | 22 +++++++++++++++++++++- + 1 file changed, 21 insertions(+), 1 deletion(-) + +diff --git a/tpm2d/tpm2.c b/tpm2d/tpm2.c +index 3e908dd..cd0347c 100644 +--- a/tpm2d/tpm2.c ++++ b/tpm2d/tpm2.c +@@ -917,10 +917,20 @@ tpm2_ecc_decrypt (ctrl_t ctrl, TSS_CONTEXT *tssc, TPM_HANDLE key, + size_t len; + int ret; + ++#if defined(TPM2_MAX_ECC_KEY_BYTES) /* Intel stack */ ++ if (ciphertext_len > 2*TPM2_MAX_ECC_KEY_BYTES + 1) ++ return GPG_ERR_TOO_LARGE; ++#elif defined(MAX_ECC_KEY_BYTES) /* IBM stack */ ++ if (ciphertext_len > 2*MAX_ECC_KEY_BYTES + 1) ++ return GPG_ERR_TOO_LARGE; ++#else ++# error TMP2 header are not correctly installed ++#endif ++ + /* This isn't really a decryption per se. The ciphertext actually + * contains an EC Point which we must multiply by the private key number. + * +- * The reason is to generate a diffe helman agreement on a shared ++ * The reason is to generate a diffie-hellman agreement on a shared + * point. This shared point is then used to generate the per + * session encryption key. + */ +@@ -976,6 +986,16 @@ tpm2_rsa_decrypt (ctrl_t ctrl, TSS_CONTEXT *tssc, TPM_HANDLE key, + TPM_HANDLE ah; + char *auth; + ++#if defined(TPM2_MAX_RSA_KEY_BYTES) /* Intel stack */ ++ if (ciphertext_len > TPM2_MAX_RSA_KEY_BYTES) ++ return GPG_ERR_TOO_LARGE; ++#elif defined(MAX_RSA_KEY_BYTES) /* IBM stack */ ++ if (ciphertext_len > MAX_RSA_KEY_BYTES) ++ return GPG_ERR_TOO_LARGE; ++#else ++# error TMP2 header are not correctly installed ++#endif ++ + inScheme.scheme = TPM_ALG_RSAES; + /* + * apparent gcrypt error: occasionally rsa ciphertext will +-- +2.34.1 + diff --git a/meta/recipes-support/gnupg/gnupg/CVE-2026-24882-0002.patch b/meta/recipes-support/gnupg/gnupg/CVE-2026-24882-0002.patch new file mode 100644 index 00000000000..2e872ea491f --- /dev/null +++ b/meta/recipes-support/gnupg/gnupg/CVE-2026-24882-0002.patch @@ -0,0 +1,47 @@ +From e8eaa9bf018d3276d613f371207c91c1ffa3e16c Mon Sep 17 00:00:00 2001 +From: NIIBE Yutaka +Date: Thu, 12 Feb 2026 11:51:17 +0900 +Subject: [PATCH 2/2] agent: Fix the regression in pkdecrypt with TPM RSA. + +* agent/divert-tpm2.c (divert_tpm2_pkdecrypt): Care about additional +0x00. + +-- + +Cherry pick master commit of: + 6eed3959303c81c9699fe9273030e480732f72be + +GnuPG-bug-id: 8045 +Signed-off-by: NIIBE Yutaka + +CVE: CVE-2026-24882 +Upstream-Status: Backport [https://github.com/gpg/gnupg/commit/555a9f5b3] + +Signed-off-by: Guocai He +--- + agent/divert-tpm2.c | 9 +++++++++ + 1 file changed, 9 insertions(+) + +diff --git a/agent/divert-tpm2.c b/agent/divert-tpm2.c +index 2496d09..5b5bd14 100644 +--- a/agent/divert-tpm2.c ++++ b/agent/divert-tpm2.c +@@ -135,6 +135,15 @@ divert_tpm2_pkdecrypt (ctrl_t ctrl, + if (!smatch (&s, n, "a")) + return gpg_error (GPG_ERR_UNKNOWN_SEXP); + n = snext (&s); ++ /* NOTE: gpg-agent protocol uses signed integer for RSA (%m in ++ * MPI), where 0x00 is added when the MSB is 1. TPM2 uses ++ * unsigned integer. We need to remove this 0x00, or else ++ * it may result GPG_ERR_TOO_LARGE in tpm2daemon. */ ++ if (!*s && (n&1)) ++ { ++ s++; ++ n--; ++ } + } + else if (smatch (&s, n, "ecdh")) + { +-- +2.34.1 + diff --git a/meta/recipes-support/gnupg/gnupg_2.4.8.bb b/meta/recipes-support/gnupg/gnupg_2.4.8.bb index 2d27f4454e5..6a865ed57d9 100644 --- a/meta/recipes-support/gnupg/gnupg_2.4.8.bb +++ b/meta/recipes-support/gnupg/gnupg_2.4.8.bb @@ -19,6 +19,8 @@ SRC_URI = "${GNUPG_MIRROR}/${BPN}/${BPN}-${PV}.tar.bz2 \ file://0004-autogen.sh-fix-find-version-for-beta-checking.patch \ file://0001-Woverride-init-is-not-needed-with-gcc-9.patch \ file://CVE-2025-68973.patch \ + file://CVE-2026-24882-0001.patch \ + file://CVE-2026-24882-0002.patch \ " SRC_URI:append:class-native = " file://0001-configure.ac-use-a-custom-value-for-the-location-of-.patch \ file://relocate.patch" From patchwork Fri Apr 24 20:55:25 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86884 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E5F76FF884C for ; Fri, 24 Apr 2026 20:57:02 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31974.1777064213903389665 for ; Fri, 24 Apr 2026 13:56:54 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=3N+CR50g; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-4891e86fabeso82268675e9.1 for ; Fri, 24 Apr 2026 13:56:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064212; x=1777669012; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=sxuFQGMXJ2OPiHHoSfyjByy5s/UCFEyYbvXhsGBjbOM=; b=3N+CR50gXz0aH0mmYyRY4/LEILIButepO6Wgi9owesG/CSGaoPLLNEPuLCia/SJUqb ELdYWJ1HTEQ3CAlbiIQzdbDCchLFdVaBjGGrPijtG6JxdxnL1qqxXRS5MuEW74q7WqgV AmaNn02SM45HMU6zg3/iInqtSEIB2T83cqkrE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064212; x=1777669012; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=sxuFQGMXJ2OPiHHoSfyjByy5s/UCFEyYbvXhsGBjbOM=; b=oV7CWT29pupBlcs63xk70ws53+UMC5Vv3PFiCQLcjvvmMjj3JNl51qzHMBa2FwyBhl eG30qyg5bXunfXtjwgJTZo2dMRF/+6j/6eecosdCL7VrwPe5UYU3iawVUFI4PiSSgev9 GRJqHLepJKpnICBe5rjOL6lms6+BgggsFSZ237eNdOJmGPerDX2fJWLqXUYlmQnyaECI e0gngHMlpKBQZNsLIWWlBsQ56aiMnCKn7l2CmsDzbLKSxf+YrscqHbuQypSL5pZLlLCX kfSsP3/Uneb16/FiDgS/LC1X8wYq2ygGEm5I4uvLlN5eIelfcuZ549jLD82pVyjB+3VV 8ueA== X-Gm-Message-State: AOJu0YzB4gM7P7K5Fj75zy2uun8++pDjzM5otILDX/tWoQ0b3FiJ/yDB N1crdrk25sShyZm5gQDgtNx4HYudAxbkGyiZzr6VXSaaZ7QhTJRE29XTiCWWULKLkQwct6Qi5C2 m2g6XFuCo70ng X-Gm-Gg: AeBDiesiF8bjzCacKZTAHV8wVwvWDlBnHbz68nNbPiP5Z6lmJGA+TJBPJYK4bF1vkC8 d+1vjpCfiIB0JWVJnvDA3ozt3GRB/8A0KXi/cbjwDLZtLFtcEtoO4+14ZaGj5BmsUfEF9B8D6gH 2Fc4QaWA5YxCCaMi/6zsD2qq2as6iGU2ai9v0WON19HMP1M8gbA/PH9zlC8o4CHdxVegeazSOta g5Q9hUnYIoa4u6kqnXk9W3E74pSukuoOoyJ2hJBrahBQu42VshCuXu2skrHMHEaDJjtoFcV/9RK EHpvvv0mF/1CG0BrLDPKffy09MaJs6p/0ZYj5yt4c4zbyKkoSWCD66h1Qog1atmQD/9peY+fiN6 fl+55B53DXRJ/vzyYlewZxGGp9skqQd8P+ABuHztC3Y/XGu9GOmzH3UvkRvslFoyPa6OWHI0erx TnpTd6+x67JrhAiZDElMeDRjEH3T5LfN9ZUYFFXxoXde4EzZKB5PB//r9ipSIh83brvA2PHiTx5 2tBiW0x2sv/XZdrv/oz+/wZgYwwsERDd75JIQ== X-Received: by 2002:a05:600c:a416:b0:488:90ac:8f71 with SMTP id 5b1f17b1804b1-488fb73a9fcmr387360395e9.5.1777064211919; Fri, 24 Apr 2026 13:56:51 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.51 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:51 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 26/66] libxml2: Fix CVE-2026-1757 Date: Fri, 24 Apr 2026 22:55:25 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235899 From: Mingli Yu Backport patch [1] to fix CVE-2026-1757. The shell is refactored [2], so backport the related code from shell.c to debugXML.c. [1] https://gitlab.gnome.org/GNOME/libxml2/-/commit/160c8a43 [2] https://gitlab.gnome.org/GNOME/libxml2/-/commit/1341deac Signed-off-by: Mingli Yu Signed-off-by: Jinfeng Wang [YC: see https://security-tracker.debian.org/tracker/CVE-2026-1757 ] Signed-off-by: Yoann Congal --- .../libxml/libxml2/CVE-2026-1757.patch | 49 +++++++++++++++++++ meta/recipes-core/libxml/libxml2_2.12.10.bb | 1 + 2 files changed, 50 insertions(+) create mode 100644 meta/recipes-core/libxml/libxml2/CVE-2026-1757.patch diff --git a/meta/recipes-core/libxml/libxml2/CVE-2026-1757.patch b/meta/recipes-core/libxml/libxml2/CVE-2026-1757.patch new file mode 100644 index 00000000000..b6e6373ab0c --- /dev/null +++ b/meta/recipes-core/libxml/libxml2/CVE-2026-1757.patch @@ -0,0 +1,49 @@ +From bbe186902eddca01cc2049780a1d1a37937d3862 Mon Sep 17 00:00:00 2001 +From: Mingli Yu +Date: Wed, 25 Feb 2026 16:16:14 +0800 +Subject: [PATCH] shell: free cmdline before continue + +This patch frees the cmdline when it's not empty but it doesn't contain +any actual character. + +If the cmdline is just whitespaces or \r and \n, the loop continues +without freeing the cmdline string, so it's a leak. + +Fix #1009 + +Reference https://gitlab.gnome.org/GNOME/libxml2/-/commit/160c8a43 + +CVE: CVE-2026-1757 + +Upstream-Status: Backport [https://gitlab.gnome.org/GNOME/libxml2/-/commit/160c8a43] + +The shell is refactored [1], so backport the related code from shell.c +to debugXML.c. + +[1] https://gitlab.gnome.org/GNOME/libxml2/-/commit/1341deac + +Signed-off-by: Mingli Yu +--- + debugXML.c | 5 ++++- + 1 file changed, 4 insertions(+), 1 deletion(-) + +diff --git a/debugXML.c b/debugXML.c +index 9d9618f..2d5c99d 100644 +--- a/debugXML.c ++++ b/debugXML.c +@@ -2866,8 +2866,11 @@ xmlShell(xmlDocPtr doc, char *filename, xmlShellReadlineFunc input, + command[i++] = *cur++; + } + command[i] = 0; +- if (i == 0) ++ if (i == 0) { ++ free(cmdline); ++ cmdline = NULL; + continue; ++ } + + /* + * Parse the argument +-- +2.34.1 + diff --git a/meta/recipes-core/libxml/libxml2_2.12.10.bb b/meta/recipes-core/libxml/libxml2_2.12.10.bb index 25da11bd2d3..2bfa78324f6 100644 --- a/meta/recipes-core/libxml/libxml2_2.12.10.bb +++ b/meta/recipes-core/libxml/libxml2_2.12.10.bb @@ -30,6 +30,7 @@ SRC_URI += "http://www.w3.org/XML/Test/xmlts20130923.tar;subdir=${BP};name=testt file://CVE-2026-0992-01.patch \ file://CVE-2026-0992-02.patch \ file://CVE-2026-0992-03.patch \ + file://CVE-2026-1757.patch \ " SRC_URI[archive.sha256sum] = "c3d8c0c34aa39098f66576fe51969db12a5100b956233dc56506f7a8679be995" From patchwork Fri Apr 24 20:55:26 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86877 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id CB3D1FF8843 for ; Fri, 24 Apr 2026 20:57:01 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31975.1777064214460526693 for ; Fri, 24 Apr 2026 13:56:54 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=YUTqgDSy; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-4891f625344so70029125e9.0 for ; Fri, 24 Apr 2026 13:56:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064213; x=1777669013; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=DofcECmFw24VOklyYm97DOu/2rdzDm0DeI5TPdy+O9w=; b=YUTqgDSyWQlPsiLuxUct6MILD+Du/0kK3MKjkAQWO9Kw9/Jhq5TZERs1eqLtXTqqmA GgFllNSFLxWg+RsTuvtV3qz1vfzR7G4zxgbRRlkcCZWtvJFoea0qZYoJ4KqE7LX2xg1W mcmJzfRkCng+FkTozDGe0l8BbOZOBh3ya2e9U= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064213; x=1777669013; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=DofcECmFw24VOklyYm97DOu/2rdzDm0DeI5TPdy+O9w=; b=BRechFB9mdX5x44ljIvh1eDPCPXFqWF6LLmyoaokAI7FXTgshc8kwg9/5gJNyQiUDN 8RyI7lRnr0AfCqVI+/Y+6XM34dib2Y1ON2eM20C3Q2duoneXhIxY0oLsVXYBAXJjOE07 nQjxH5BGP5/hf0kq7m8/2+ujjqUubjSvtLysrWDsmh020F9lin1SfnybdRdC+uoFqmz/ rKFBNhvl8X/PPfvBtsnfHhuJu1g8yKYQJua8/uZIFjS7rOydlFWpscgwpiW0IQ/MnqTi JayHNNpe7oZU4ofJdr35FjX4+4cf94ZlNFOiwGIlY/p9MhMRX8zm+COx1PcFmv56Awfb nn9g== X-Gm-Message-State: AOJu0YxXj9avAtNTUTQX9RsCffX3i8S9qJTx2Pkag+DnJHSm6Ywrz8t1 jO0OuPbXiEc0IMZzGycBLRRCiuGkt9/4lStFOhg+HmIp9qCWhZxgH1xTLYBqtz51s7Kn6TgDm/Z QjnCYqYWGLrpd X-Gm-Gg: AeBDiesqBHHtv4OpvclXcHzGcau4GwawlqVMMGjwXzxu22lljMGalwP3RsDHUd8hJD5 tbLO6WWtnlY6BW04XA7TKtfRhz6cjbvmfggx5u0uOIcEh7QRdfgwqdSwdmmcJg1guIivwR1Xpwd yQFSDR+B/w4Y5xaOYl88Hb5NtYvy85qpSoJU/x9J1DggOHHdeEnafLlGT3HRVl9zKPzWoFb2nAo x7s7IIklwnIj9F7ex6JW1+ozxjvZBtQoyD4kaqIiRw6VvbqwfM8Z53aGvfqT16BEH0lN6qh7M7V x7V0u81TIJq1mL6GEtlKtjSWXXB9UmGCvfoheKOqh3nyRs3gP/FMk7lJ1Qqman/hyCFpEiplTqt EonbT9UUnUxKs49fH1JNtVHIkmn1VbqGCPpx8Bn9evHhHuXWvOCaJPcsx82lWKCzLg7TMGeURD8 4vVgJBRluJE2XZQk9hSxJHRSPfaTQBfT8INDhQf3VVp4E4wyRb69WIAu1QBGjtRQb+GOu/PFVFK XQd44+qYtdH2OofvGYrN6bJtp1bq8SVWu54yFilqiQRoict X-Received: by 2002:a05:600c:1d05:b0:489:1baf:8c03 with SMTP id 5b1f17b1804b1-4891baf8d2cmr320510345e9.11.1777064212548; Fri, 24 Apr 2026 13:56:52 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.52 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:52 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 27/66] base-passwd: upgrade 3.6.3 -> 3.6.8 Date: Fri, 24 Apr 2026 22:55:26 +0200 Message-ID: <9b90dbf36fe8fb766f30e3f6c96d5c286b58e6d0.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:01 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235900 From: Daniel Turull Changelog for base-passwd: 3.6.3 -> 3.6.8 ============================================================ base-passwd (3.6.8) unstable; urgency=medium * Debconf translations: - Turkish (thanks, Nuri KÜÇÜKLER; closes: #1102464). * update-passwd(8) translations: - French (thanks, Baptiste Jammet; closes: #1119914). -- Colin Watson Mon, 03 Nov 2025 11:03:53 +0000 base-passwd (3.6.7) unstable; urgency=medium [ Marc Haber ] * Add myself to Uploaders. [ Colin Watson ] * Debconf translations: - Catalan (thanks, Carles Pina i Estany; closes: #1101110). -- Colin Watson Sun, 23 Mar 2025 15:30:08 +0000 base-passwd (3.6.6) unstable; urgency=medium * Move to team maintenance under pkg-shadow-devel. -- Colin Watson Sun, 29 Dec 2024 13:43:54 +0000 base-passwd (3.6.5) unstable; urgency=medium [ Colin Watson ] * Apply X-Style: black. * Add Romanian translation of update-passwd(8) (thanks, Remus-Gabriel Chelu; closes: #1055383). [ Maks Mishin ] * Fix potential descriptor leaks. -- Colin Watson Mon, 21 Oct 2024 18:26:50 +0100 base-passwd (3.6.4) unstable; urgency=medium [ Chris Hofstaedtler ] * Ensure that /etc/subuid and /etc/subgid exist (closes: #1074121). -- Colin Watson Mon, 01 Jul 2024 12:20:04 +0100 Signed-off-by: Daniel Turull Signed-off-by: Yoann Congal --- .../0001-Add-a-shutdown-group.patch | 6 +++--- .../0001-base-passwd-Add-the-sgx-group.patch | 4 ++-- ...instead-of-bin-bash-for-the-root-user.patch | 4 ++-- ...ot-since-we-do-not-have-an-etc-shadow.patch | 4 ++-- ...input-group-for-the-dev-input-devices.patch | 4 ++-- .../base-passwd/0005-Add-kvm-group.patch | 6 +++--- .../base-passwd/0007-Add-wheel-group.patch | 18 +++++++++++++----- ...se-passwd_3.6.3.bb => base-passwd_3.6.8.bb} | 2 +- 8 files changed, 28 insertions(+), 20 deletions(-) rename meta/recipes-core/base-passwd/{base-passwd_3.6.3.bb => base-passwd_3.6.8.bb} (98%) diff --git a/meta/recipes-core/base-passwd/base-passwd/0001-Add-a-shutdown-group.patch b/meta/recipes-core/base-passwd/base-passwd/0001-Add-a-shutdown-group.patch index e50efc9623f..f0e1539ca7f 100644 --- a/meta/recipes-core/base-passwd/base-passwd/0001-Add-a-shutdown-group.patch +++ b/meta/recipes-core/base-passwd/base-passwd/0001-Add-a-shutdown-group.patch @@ -1,4 +1,4 @@ -From 8f3ace87df3aaad85946c22cae240532ea3e73b8 Mon Sep 17 00:00:00 2001 +From 6f714635792a14fd3ee8d2ce0318c0185add5c00 Mon Sep 17 00:00:00 2001 From: Saul Wold Date: Fri, 29 Apr 2022 13:32:27 +0000 Subject: [PATCH] Add a shutdown group @@ -14,10 +14,10 @@ Signed-off-by: Saul Wold 1 file changed, 1 insertion(+) diff --git a/group.master b/group.master -index ad1dd2d..1b5e2fb 100644 +index 3e7bf1c..72108a8 100644 --- a/group.master +++ b/group.master -@@ -35,5 +35,6 @@ sasl:*:45: +@@ -34,5 +34,6 @@ sasl:*:45: plugdev:*:46: staff:*:50: games:*:60: diff --git a/meta/recipes-core/base-passwd/base-passwd/0001-base-passwd-Add-the-sgx-group.patch b/meta/recipes-core/base-passwd/base-passwd/0001-base-passwd-Add-the-sgx-group.patch index e1340e1b70c..d50136b24e1 100644 --- a/meta/recipes-core/base-passwd/base-passwd/0001-base-passwd-Add-the-sgx-group.patch +++ b/meta/recipes-core/base-passwd/base-passwd/0001-base-passwd-Add-the-sgx-group.patch @@ -1,4 +1,4 @@ -From 9e57771d138ac423d5139b984b8c869122ce4976 Mon Sep 17 00:00:00 2001 +From ff622d69e9c06c00dacdffc163a383f8d2903475 Mon Sep 17 00:00:00 2001 From: Alex Kiernan Date: Fri, 28 Jul 2023 10:28:57 +0100 Subject: [PATCH] base-passwd: Add the sgx group @@ -17,7 +17,7 @@ Signed-off-by: Alex Kiernan 1 file changed, 1 insertion(+) diff --git a/group.master b/group.master -index d34d2b832d43..e54fd1d2c6dc 100644 +index d34d2b8..e54fd1d 100644 --- a/group.master +++ b/group.master @@ -34,6 +34,7 @@ video:*:44: diff --git a/meta/recipes-core/base-passwd/base-passwd/0002-Use-bin-sh-instead-of-bin-bash-for-the-root-user.patch b/meta/recipes-core/base-passwd/base-passwd/0002-Use-bin-sh-instead-of-bin-bash-for-the-root-user.patch index 09f8cfea9c6..0fa6b8138d0 100644 --- a/meta/recipes-core/base-passwd/base-passwd/0002-Use-bin-sh-instead-of-bin-bash-for-the-root-user.patch +++ b/meta/recipes-core/base-passwd/base-passwd/0002-Use-bin-sh-instead-of-bin-bash-for-the-root-user.patch @@ -1,4 +1,4 @@ -From 4411fc0df77566d52bee11ec0bad4be30a96e99e Mon Sep 17 00:00:00 2001 +From c30862c6892d17ae2f4578101dcb050250956cec Mon Sep 17 00:00:00 2001 From: Scott Garman Date: Fri, 29 Apr 2022 13:32:27 +0000 Subject: [PATCH] Use /bin/sh instead of /bin/bash for the root user @@ -12,7 +12,7 @@ Signed-off-by: Scott Garman 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/passwd.master b/passwd.master -index 7cd4e24..041685a 100644 +index 90514a5..bd3efc2 100644 --- a/passwd.master +++ b/passwd.master @@ -1,4 +1,4 @@ diff --git a/meta/recipes-core/base-passwd/base-passwd/0003-Remove-for-root-since-we-do-not-have-an-etc-shadow.patch b/meta/recipes-core/base-passwd/base-passwd/0003-Remove-for-root-since-we-do-not-have-an-etc-shadow.patch index 06222ab04ce..4be487cc3f5 100644 --- a/meta/recipes-core/base-passwd/base-passwd/0003-Remove-for-root-since-we-do-not-have-an-etc-shadow.patch +++ b/meta/recipes-core/base-passwd/base-passwd/0003-Remove-for-root-since-we-do-not-have-an-etc-shadow.patch @@ -1,4 +1,4 @@ -From 13a1a284a134d18a454625a5b4485c0d99079ae9 Mon Sep 17 00:00:00 2001 +From 0d35229f01e3a38a27338320e67c4cb5652a3249 Mon Sep 17 00:00:00 2001 From: Scott Garman Date: Fri, 29 Apr 2022 13:32:28 +0000 Subject: [PATCH] Remove "*" for root since we do not have an /etc/shadow @@ -10,7 +10,7 @@ Signed-off-by: Scott Garman 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/passwd.master b/passwd.master -index 041685a..31a84d4 100644 +index bd3efc2..66e9033 100644 --- a/passwd.master +++ b/passwd.master @@ -1,4 +1,4 @@ diff --git a/meta/recipes-core/base-passwd/base-passwd/0004-Add-an-input-group-for-the-dev-input-devices.patch b/meta/recipes-core/base-passwd/base-passwd/0004-Add-an-input-group-for-the-dev-input-devices.patch index 394a0f01d32..a3502c3d861 100644 --- a/meta/recipes-core/base-passwd/base-passwd/0004-Add-an-input-group-for-the-dev-input-devices.patch +++ b/meta/recipes-core/base-passwd/base-passwd/0004-Add-an-input-group-for-the-dev-input-devices.patch @@ -1,4 +1,4 @@ -From c5f012750f8102ff54af73ccc2d2b7bfa1f26db4 Mon Sep 17 00:00:00 2001 +From d2cdd4c8d7332d05ac86fb0625e8c2b3c7bf7728 Mon Sep 17 00:00:00 2001 From: Darren Hart Date: Fri, 29 Apr 2022 13:32:28 +0000 Subject: [PATCH] Add an input group for the /dev/input/* devices @@ -10,7 +10,7 @@ Signed-off-by: Darren Hart 1 file changed, 1 insertion(+) diff --git a/group.master b/group.master -index 1b5e2fb..cea9d60 100644 +index 72108a8..7d794b2 100644 --- a/group.master +++ b/group.master @@ -12,6 +12,7 @@ uucp:*:10: diff --git a/meta/recipes-core/base-passwd/base-passwd/0005-Add-kvm-group.patch b/meta/recipes-core/base-passwd/base-passwd/0005-Add-kvm-group.patch index 72e6ee333c9..4f8278e5cd1 100644 --- a/meta/recipes-core/base-passwd/base-passwd/0005-Add-kvm-group.patch +++ b/meta/recipes-core/base-passwd/base-passwd/0005-Add-kvm-group.patch @@ -1,4 +1,4 @@ -From 6cf19461fb31d7a7a3010629aae9aab49c26a01b Mon Sep 17 00:00:00 2001 +From 07af34abb10b1455e065cfb1ce7ce766614da7e8 Mon Sep 17 00:00:00 2001 From: Jacob Kroon Date: Wed, 30 Jan 2019 04:53:48 +0000 Subject: [PATCH] Add kvm group @@ -10,10 +10,10 @@ Signed-off-by: Jacob Kroon 1 file changed, 1 insertion(+) diff --git a/group.master b/group.master -index cea9d60..5b62284 100644 +index 7d794b2..7fdd8bf 100644 --- a/group.master +++ b/group.master -@@ -34,6 +34,7 @@ utmp:*:43: +@@ -33,6 +33,7 @@ utmp:*:43: video:*:44: sasl:*:45: plugdev:*:46: diff --git a/meta/recipes-core/base-passwd/base-passwd/0007-Add-wheel-group.patch b/meta/recipes-core/base-passwd/base-passwd/0007-Add-wheel-group.patch index d77122789d5..91bbb453e32 100644 --- a/meta/recipes-core/base-passwd/base-passwd/0007-Add-wheel-group.patch +++ b/meta/recipes-core/base-passwd/base-passwd/0007-Add-wheel-group.patch @@ -1,3 +1,7 @@ +From 3c88afb923de603d126f89f2979b2cd232a180c8 Mon Sep 17 00:00:00 2001 +From: Louis Rannou +Date: Thu, 15 Jun 2023 13:43:55 +0200 +Subject: [PATCH] base-passwd: add the wheel group We need to have a wheel group which has some system privileges to consult the systemd journal or manage printers with cups. @@ -7,11 +11,15 @@ Upstream says the group does not exist by default. Upstream-Status: Inappropriate [enable feature] Signed-off-by: Louis Rannou -Index: base-passwd-3.5.26/group.master -=================================================================== ---- base-passwd-3.5.29.orig/group.master -+++ base-passwd-3.5.29/group.master -@@ -38,5 +38,6 @@ +--- + group.master | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/group.master b/group.master +index 7fdd8bf..d34d2b8 100644 +--- a/group.master ++++ b/group.master +@@ -37,5 +37,6 @@ kvm:*:47: staff:*:50: games:*:60: shutdown:*:70: diff --git a/meta/recipes-core/base-passwd/base-passwd_3.6.3.bb b/meta/recipes-core/base-passwd/base-passwd_3.6.8.bb similarity index 98% rename from meta/recipes-core/base-passwd/base-passwd_3.6.3.bb rename to meta/recipes-core/base-passwd/base-passwd_3.6.8.bb index bf50b01fd5a..a072791dcf1 100644 --- a/meta/recipes-core/base-passwd/base-passwd_3.6.3.bb +++ b/meta/recipes-core/base-passwd/base-passwd_3.6.8.bb @@ -15,7 +15,7 @@ SRC_URI = "https://launchpad.net/debian/+archive/primary/+files/${BPN}_${PV}.tar file://0001-base-passwd-Add-the-sgx-group.patch \ " -SRC_URI[sha256sum] = "83575327d8318a419caf2d543341215c046044073d1afec2acc0ac4d8095ff39" +SRC_URI[sha256sum] = "fab3d0e6e8b641e116bda9bd5f7a7ed24482384c1513f6a369b506327fbc8dde" # the package is taken from launchpad; that source is static and goes stale # so we check the latest upstream from a directory that does get updated From patchwork Fri Apr 24 20:55:27 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86886 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 748E0FF884A for ; Fri, 24 Apr 2026 20:57:02 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32585.1777064214910721876 for ; Fri, 24 Apr 2026 13:56:55 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=dZ3g5kmb; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488b0046078so74970595e9.1 for ; Fri, 24 Apr 2026 13:56:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064213; x=1777669013; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=1dZxuKNIF9OjfCPgFvZFUTmJOkl7uhIEw/mjDjCckxE=; b=dZ3g5kmbGS9VmZ0YNyh0pHgRSjBfELGPr1ugyOHAtNj5xnMN8Xz6QduWcGAS55UtVL MG5JvXhCLgieCYNzN3kzHuAqq2tlySVeI+Z2dUDAJRGNGGCMQsDvEAaNU8Q4cKGcw2I9 nnvURoy003gsJiEn/fbfefdvs0NM6sCPiMaGw= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064213; x=1777669013; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=1dZxuKNIF9OjfCPgFvZFUTmJOkl7uhIEw/mjDjCckxE=; b=VeJUAEGS4x/GyN2aMvS5AcsyrsFRCsOw+6ndVHrLzdwmiu2/8YG/VRtxZF2l7YLoDi W5sOZ/KGA7bMYbJG6KOTxcLE7TufuDav9/gYzMGJ58hbH4ec+G6/rqu16GWv8N0+gKJV FoI3O3HjsTi2rnRqWZV1SSEgSkUMpWZykfVumO5xS3Lca8uN7TGVBzJQag7pwceoKYBr zU5YuvWhhFLmTcsWRarLZrhSq689S1ErjRdU+7L/q0gFkFfDquSt5nBFOvXBHxIYgdyT lGgGiOTy3fRD8GDJkLsZR11VLNiqbyitEYHsIw6mlUSDenDNhjpSKbOTfr6Kp/9Ahkne WtZw== X-Gm-Message-State: AOJu0Yyc12Jo6CeZRLipoqjDERQWPv9ovDZlnb4kGZhJk+g9qyUsBCF5 4rxq+TuQ+sv1Zo62iv9AVJuOyPHshtGd8OvXmqw+c/rI4ZbawuCYxwqr4FDwd79/Xe1vP4+IO+g RFHEGYwslQZKD X-Gm-Gg: AeBDievcaiWFLQsbP1UWGQuA3k7abF3nTKrxT9KGW96XmDf/4kAV0gLAK2qBDEMdASJ UYfYGyd6f4rEd59WvRirFYmBOUUxHvxAVR3UWb0+6PbC8j13gGbUGGvRXuAC4ho+NtrUfEsfBck Zpu4dkbm/cyLfDu+0jFXVsBW12I0mdolpMJcrXQOGA8RK9vbIHA0w4Vv1By0SdFpLfRpU0pByoM MKKNG4KBUEMFLvMOWKLnNpbtGH9mt751nLlPuRgeykyZVeG2HUD4i/JA3g5QRhryOyhab94BN9D bZk+l9jbqZK4EsJp08YyH0DlCu4xEpLAmotofdQ5XLSnfo/9jGGnASwOvLYEPN/q95tbbvYnrkg Le9XA3OlF/v7Hu/MI2P13F5Qif0kDV7GLHqKblz5ViOZJRg3mHs5VAsMpZCxDkcIYmBTGyQ8zan qlCICkjOx03t7XhljDooN2MO2tBKpal5wv+qTs7/Tu7Zb6ZJBblYtOEPdLRTPljXggWeLjsQmkH +Mvnxt2nAjY8/C/7Y8kB/uIFX0x0sFe0FPGH6b4nGHSl/Yq X-Received: by 2002:a05:600c:b90:b0:488:b99b:4177 with SMTP id 5b1f17b1804b1-488fb78ee4emr463744785e9.25.1777064212997; Fri, 24 Apr 2026 13:56:52 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.52 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:52 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 28/66] mesa: fix build on host with glibc-2.43 Date: Fri, 24 Apr 2026 22:55:27 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235901 From: Martin Jansa Signed-off-by: Martin Jansa Signed-off-by: Yoann Congal --- .../0001-c11-threads-fix-build-on-c23.patch | 56 +++++++++++++++++++ meta/recipes-graphics/mesa/mesa.inc | 1 + 2 files changed, 57 insertions(+) create mode 100644 meta/recipes-graphics/mesa/files/0001-c11-threads-fix-build-on-c23.patch diff --git a/meta/recipes-graphics/mesa/files/0001-c11-threads-fix-build-on-c23.patch b/meta/recipes-graphics/mesa/files/0001-c11-threads-fix-build-on-c23.patch new file mode 100644 index 00000000000..f4de5e61a9b --- /dev/null +++ b/meta/recipes-graphics/mesa/files/0001-c11-threads-fix-build-on-c23.patch @@ -0,0 +1,56 @@ +From 3f007af78283aea2e8c1a3addff7aeae862d8b28 Mon Sep 17 00:00:00 2001 +From: Dave Airlie +Date: Fri, 7 Nov 2025 13:14:56 +1000 +Subject: [PATCH] c11/threads: fix build on c23 + +C23/glibc is now including once_init in stdlib.h + +https://patchwork.sourceware.org/project/glibc/patch/78061085-f04a-0c45-107b-5a8a15521083@redhat.com/#213088 + +Just fix up our use of it. + +Cc: mesa-stable +Reviewed-by: Yonggang Luo +Part-of: + +Upstream-Status: Backport [v26.0.0 179e744f7577d98df7c79d7324c22acfb32a0154] +Signed-off-by: Martin Jansa +--- + src/c11/impl/threads_posix.c | 3 ++- + src/c11/threads.h | 2 ++ + 2 files changed, 4 insertions(+), 1 deletion(-) + +diff --git a/src/c11/impl/threads_posix.c b/src/c11/impl/threads_posix.c +index 2540e3e0c49..f75774fc51d 100644 +--- a/src/c11/impl/threads_posix.c ++++ b/src/c11/impl/threads_posix.c +@@ -70,12 +70,13 @@ impl_thrd_routine(void *p) + + /*--------------- 7.25.2 Initialization functions ---------------*/ + // 7.25.2.1 ++#ifndef __once_flag_defined + void + call_once(once_flag *flag, void (*func)(void)) + { + pthread_once(flag, func); + } +- ++#endif + + /*------------- 7.25.3 Condition variable functions -------------*/ + // 7.25.3.1 +diff --git a/src/c11/threads.h b/src/c11/threads.h +index dbcb3459a9b..c849f385e30 100644 +--- a/src/c11/threads.h ++++ b/src/c11/threads.h +@@ -118,8 +118,10 @@ typedef pthread_cond_t cnd_t; + typedef pthread_t thrd_t; + typedef pthread_key_t tss_t; + typedef pthread_mutex_t mtx_t; ++#ifndef __once_flag_defined + typedef pthread_once_t once_flag; + # define ONCE_FLAG_INIT PTHREAD_ONCE_INIT ++#endif + # ifdef PTHREAD_DESTRUCTOR_ITERATIONS + # define TSS_DTOR_ITERATIONS PTHREAD_DESTRUCTOR_ITERATIONS + # else diff --git a/meta/recipes-graphics/mesa/mesa.inc b/meta/recipes-graphics/mesa/mesa.inc index 9157fe9c3f2..eb23a3f82c3 100644 --- a/meta/recipes-graphics/mesa/mesa.inc +++ b/meta/recipes-graphics/mesa/mesa.inc @@ -19,6 +19,7 @@ SRC_URI = "https://mesa.freedesktop.org/archive/mesa-${PV}.tar.xz \ file://0001-drisw-fix-build-without-dri3.patch \ file://0002-glxext-don-t-try-zink-if-not-enabled-in-mesa.patch \ file://0001-Revert-meson-do-not-pull-in-clc-for-clover.patch \ + file://0001-c11-threads-fix-build-on-c23.patch \ " SRC_URI[sha256sum] = "7454425f1ed4a6f1b5b107e1672b30c88b22ea0efea000ae2c7d96db93f6c26a" From patchwork Fri Apr 24 20:55:28 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86885 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B5371FF884B for ; Fri, 24 Apr 2026 20:57:02 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32586.1777064215392917730 for ; Fri, 24 Apr 2026 13:56:55 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=BJkdh/Td; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488a8ca4aadso113586045e9.3 for ; Fri, 24 Apr 2026 13:56:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064213; x=1777669013; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=0jIwELe46Nf7KEte855mgXR45G9tM3rbNUwcA5o5fP8=; b=BJkdh/Tdyu4qrB4WyJeJj036eQStsCSSsqi8+HDmSLscd+NRDgxFHfXzuKzHGTo0rh wJYuM05E3hK0iBsOgFAPP4Iv0+SZXan2hW233zlKyeDCCF9VZz+vU8ikZe7MCgN5pWIC vZVsAWIdvgj8vcBMjbZOtgIf7PohVOTaCvpXg= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064213; x=1777669013; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=0jIwELe46Nf7KEte855mgXR45G9tM3rbNUwcA5o5fP8=; b=ENPVAjxrpIbaa/yrub1QcYd+MLv2xbqp9i49WdOE4njx3JDnQrFeeoAdInV0mb8Bk4 KyPYFtb8m0STX2U4JNLEQubeqKbRsYZbE2cC9Mk+vPfZUZEKr7YKaZX8xRMnxAe67PEw DPcZNciPY/OsvsxCtqBX4/jiCADh/e35wUyPa7ihackzQ1x/hmRM2v/BhK25QAhHai/B CARpr7HtMkNmRNz3u6DjoqbDAIoo4BrY4ZZcqYJOPymOCJg7Lz+jn/YNnuXZwmWGxNlN RRU+cryoLwL2JPEuTq5dVZoSCff5uPHJHywg1eAMPP1cZZIyarKrMYIGWl/LBsnCDY61 mikQ== X-Gm-Message-State: AOJu0YxmU40JgubOHbEdDagujfZ4fSYgXEMRrJRLyZc7tk7UQbq4K73S Ocrw1bmBU1PMSy4QJ4tSX358KyBruveB/p7JZ2dcCyi4V2aK56nkU5EPk/QnhZ/JFgxggK7PhQl HuqOcU0ZMvFH0 X-Gm-Gg: AeBDies6PoIQyNQ61NXH13eJoOCbGHQqHNzPuVYmE39NSltP2mqTgg50TqrnCh6n4N+ B13EWRCgid5y+l70CfuTCaVSXtI6IluS4HkJvvJbptVA8FRaQrRU6KiHhrSpHoKftq3BPMOdUQD 0ux5G82eUH2z0YZsghENDLhcMysYXnQbmRi3UkkmfpCy04zLD/dHqgaJcfrk0RvEugr7MIsEw3v thKoTl7yQTGFv3MXbFBisnLFiYHEVezVbcjPEfJmuoCpn+Nzgeax+pkLBhUUyht59NWymrMzZPu j01YKgeJ4qXZShVjHKq5XQrdFggIThifybhOU+QyVQZb3p7Z2XRAeWh850wto6Hb5Xhmn4QfU9C bIWdr7I6ejOW5fHFzHA1/6lvOlzhu3GjVMDY87Fn8lIdPkfjpthILJ/Wokxfp6VDWUjdoLzBrQ8 mit6qn3Qj93GBQc9aPk4371vKEpaz11xR6/GOtp++XXrdc8TMZqqQbQA/AM5Tg0HRpX6m0Vaa6a 311hDK2f7Hj/V1YlnTdxFyRXuMaBvZ8KX8ddA== X-Received: by 2002:a05:600c:3110:b0:488:8c89:cfaa with SMTP id 5b1f17b1804b1-488fb73841dmr482733415e9.3.1777064213567; Fri, 24 Apr 2026 13:56:53 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.53 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:53 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 29/66] virglrenderer: Fix build with glibc 2.43+ Date: Fri, 24 Apr 2026 22:55:28 +0200 Message-ID: <73be494b2586d8b73cc14dddebfc1753df233530.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235902 From: Khem Raj Signed-off-by: Khem Raj Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Martin Jansa (cherry picked from commit 8e85dc6b7f5f7668a610b5fd3754c716f0af65b0) Signed-off-by: Yoann Congal --- ...once_flag-ONCE_FLAG_INIT-when-presen.patch | 55 +++++++++++++++++++ .../virglrenderer/virglrenderer_1.0.1.bb | 1 + 2 files changed, 56 insertions(+) create mode 100644 meta/recipes-graphics/virglrenderer/virglrenderer/0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch diff --git a/meta/recipes-graphics/virglrenderer/virglrenderer/0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch b/meta/recipes-graphics/virglrenderer/virglrenderer/0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch new file mode 100644 index 00000000000..1740d7605f8 --- /dev/null +++ b/meta/recipes-graphics/virglrenderer/virglrenderer/0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch @@ -0,0 +1,55 @@ +From 179e744f7577d98df7c79d7324c22acfb32a0154 Mon Sep 17 00:00:00 2001 +From: Dave Airlie +Date: Fri, 7 Nov 2025 13:14:56 +1000 +Subject: [PATCH] c11/threads: fix build on c23 + +C23/glibc is now including once_init in stdlib.h + +https://patchwork.sourceware.org/project/glibc/patch/78061085-f04a-0c45-107b-5a8a15521083@redhat.com/#213088 + +Just fix up our use of it. + +Upstream-Status: Submitted [https://gitlab.freedesktop.org/virgl/virglrenderer/-/merge_requests/1567] +Signed-off-by: Khem Raj +--- + src/mesa/compat/c11/impl/threads_posix.c | 3 ++- + 2 files changed, 4 insertions(+), 1 deletion(-) + +--- a/src/mesa/compat/c11/threads_posix.h ++++ b/src/mesa/compat/c11/threads_posix.h +@@ -51,7 +51,9 @@ Configuration macro: + #include + + /*---------------------------- macros ----------------------------*/ ++#ifndef __once_flag_defined + #define ONCE_FLAG_INIT PTHREAD_ONCE_INIT ++#endif + #ifdef INIT_ONCE_STATIC_INIT + #define TSS_DTOR_ITERATIONS PTHREAD_DESTRUCTOR_ITERATIONS + #else +@@ -66,8 +68,9 @@ typedef pthread_cond_t cnd_t; + typedef pthread_t thrd_t; + typedef pthread_key_t tss_t; + typedef pthread_mutex_t mtx_t; ++#ifndef __once_flag_defined + typedef pthread_once_t once_flag; +- ++#endif + + /* + Implementation limits: +@@ -90,12 +93,13 @@ impl_thrd_routine(void *p) + + /*--------------- 7.25.2 Initialization functions ---------------*/ + // 7.25.2.1 ++#ifndef __once_flag_defined + static inline void + call_once(once_flag *flag, void (*func)(void)) + { + pthread_once(flag, func); + } +- ++#endif + + /*------------- 7.25.3 Condition variable functions -------------*/ + // 7.25.3.1 diff --git a/meta/recipes-graphics/virglrenderer/virglrenderer_1.0.1.bb b/meta/recipes-graphics/virglrenderer/virglrenderer_1.0.1.bb index 87f25a34610..a6145c15f6d 100644 --- a/meta/recipes-graphics/virglrenderer/virglrenderer_1.0.1.bb +++ b/meta/recipes-graphics/virglrenderer/virglrenderer_1.0.1.bb @@ -13,6 +13,7 @@ SRCREV = "690680e5f0f952e22424fca1538c1b24457a0868" SRC_URI = "git://gitlab.freedesktop.org/virgl/virglrenderer.git;branch=main;protocol=https \ file://0001-meson.build-use-python3-directly-for-python.patch \ file://0001-vrend-Fix-int-conversion-fatal-build-error-with-GCC-.patch \ + file://0001-c11-use-glibc-s-once_flag-ONCE_FLAG_INIT-when-presen.patch \ " S = "${WORKDIR}/git" From patchwork Fri Apr 24 20:55:29 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86882 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5459AFF8840 for ; Fri, 24 Apr 2026 20:57:02 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31978.1777064215957745708 for ; Fri, 24 Apr 2026 13:56:56 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=3mj2jdjw; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-4891e5b9c1fso64690545e9.2 for ; Fri, 24 Apr 2026 13:56:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064214; x=1777669014; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=T1M/PmWk62OhFa3ip1rilOlBy6C1FV1RusQweKoNTRA=; b=3mj2jdjweJ7xQsQDAdKcJtorAsMlG44LidQYkPP5mKWcMiDIKnBv9dpSXlbx3rVbGx vvlm+VRfAUXii/vyzECxTM8yQQP6qUdGr6m6uZZ8sMmYnGkbqV+12l/EdApfNlpCeivk 0KLuMilJNLlSymoj4O280PWvdbMKKXHSmYhVE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064214; x=1777669014; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=T1M/PmWk62OhFa3ip1rilOlBy6C1FV1RusQweKoNTRA=; b=UsZ08264alKDnkXUHGtnnS7YHfqDFpyryjoyHfb33QIQ9MK8DhXwO7XMypzMAKSS+k JRq9H4uzK1hEBu5PAM0okSo/scWt31RK6gjU6qJav8oPxSetOulPjAHRZNWRaGZOduc4 H8FG/rNpZbzBQhD08vH8+yIfp8VEDV20Ojuj53xQSq5wX0jWB+V5sc0k8TY46DNprofa /jGmy4XVyC1ATaRAqczqkx7/rsPrx307AkYP52hSoPVhb0p81ZqZ1l04gkYjhfI4U+pr Vu1CrJrFPReUzxL+X5dZGYQ7gUYZLlJpHZiaVaYOfe+oHKEUWAGGE14YpWm55Mbxjicl tQKQ== X-Gm-Message-State: AOJu0YxV9Jb3H2nl1W3apaEpWif2SfXl8bsHtIozoLACjrswo+3YqZZ+ 9M8/GtuuU4uc+dQentur4CDQeKGyPSoYFgi8xKsd/v+QlUCa8ao+hXP6V2bc5BT0MsMlTf1gFZe P8x51aRhdQtDn X-Gm-Gg: AeBDiettiVJTRhr5vKPzArZ6oOjmAnU8Ka5zLSy87NfriFcEMBMhOmM8heBFhFbWN7j qjiAFns8uKQpDEAuHggKvuSHEnIkemoYBWrkN6Zq7zfC8nR2zarrY/onTwLSuSx1bM2qtFIw1Vr tGnRwyunJlUb6k/t3wZPi24xOQSyA237guAU/Q+a/jo3kJeDNR9c3BLTh+pcMLUKw0+gs8KsWkQ Irncyv+J6nx9OmyT72ZnP4Jx6M4CkP+4n0B9368Ksm/01i4iGe1ZxJJXRXE8UJwvrZfx+uR9qc5 h6+D4a4vxqo3NgrLj4gFH2mPE0h6+63NJ+aojEorVt8Ojfbso04Pz2OlSkBiS2l9vwoTkkI6VbI Rbniamd2cjvn6WGA/uT8ipE8iyBmT7nPdB/0fAJwWKSzS7prJxbCH7bfjuzw6s/FjA2syuyY678 Bc7Rcvf9TCna0dWGdGzRYq3r+rfHsEkmLPCJmkM0rFPA4sq4ye7tupW3cEjnvy72RXm9K1EGpMp V14JJ8xdpX7mD+YyykdFuo1PMlcgcK7/tW2lA== X-Received: by 2002:a05:600c:3b04:b0:48a:5574:3a57 with SMTP id 5b1f17b1804b1-48a55743eb7mr240785255e9.29.1777064214047; Fri, 24 Apr 2026 13:56:54 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.53 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:53 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 30/66] cmake: backport a fix for gcc-16 on host Date: Fri, 24 Apr 2026 22:55:29 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235903 From: Martin Jansa Signed-off-by: Martin Jansa Signed-off-by: Yoann Congal --- .../cmake/cmake-native_3.28.3.bb | 1 + ...mpilation-with-gcc-16-devirtualizati.patch | 36 +++++++++++++++++++ meta/recipes-devtools/cmake/cmake_3.28.3.bb | 4 ++- 3 files changed, 40 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-devtools/cmake/cmake/0001-bootstrap-Fix-compilation-with-gcc-16-devirtualizati.patch diff --git a/meta/recipes-devtools/cmake/cmake-native_3.28.3.bb b/meta/recipes-devtools/cmake/cmake-native_3.28.3.bb index 7b250752d80..eecc2df5387 100644 --- a/meta/recipes-devtools/cmake/cmake-native_3.28.3.bb +++ b/meta/recipes-devtools/cmake/cmake-native_3.28.3.bb @@ -8,6 +8,7 @@ SRC_URI += "file://OEToolchainConfig.cmake \ file://0005-Disable-use-of-ext2fs-ext2_fs.h-by-cmake-s-internal-.patch \ file://0001-CMakeLists.txt-disable-USE_NGHTTP2.patch \ file://CVE-2025-9301.patch \ + file://0001-bootstrap-Fix-compilation-with-gcc-16-devirtualizati.patch \ " LICENSE:append = " & BSD-1-Clause & MIT & BSD-2-Clause & curl" diff --git a/meta/recipes-devtools/cmake/cmake/0001-bootstrap-Fix-compilation-with-gcc-16-devirtualizati.patch b/meta/recipes-devtools/cmake/cmake/0001-bootstrap-Fix-compilation-with-gcc-16-devirtualizati.patch new file mode 100644 index 00000000000..2f28e3a7ba9 --- /dev/null +++ b/meta/recipes-devtools/cmake/cmake/0001-bootstrap-Fix-compilation-with-gcc-16-devirtualizati.patch @@ -0,0 +1,36 @@ +From 0f8fdfb55950e383d9780b875bc8d7213db8a42a Mon Sep 17 00:00:00 2001 +From: Brad King +Date: Wed, 24 Sep 2025 12:02:37 -0400 +Subject: [PATCH] bootstrap: Fix compilation with gcc 16 devirtualization + +Avoid including a header for a subclass whose implementation is not +compiled during bootstrap. + +Fixes: #27256 + +Upstream-Status: Backport [v3.31.10 ea04e19daf7010781d0df980b9683a642093e381 https://gitlab.kitware.com/cmake/cmake/-/merge_requests/11243] +Signed-off-by: Martin Jansa +--- + Source/cmake.cxx | 6 +++--- + 1 file changed, 3 insertions(+), 3 deletions(-) + +diff --git a/Source/cmake.cxx b/Source/cmake.cxx +index 636a0da5b8..0e05afb7a6 100644 +--- a/Source/cmake.cxx ++++ b/Source/cmake.cxx +@@ -124,12 +124,12 @@ + # include "cmExtraEclipseCDT4Generator.h" + # include "cmExtraKateGenerator.h" + # include "cmExtraSublimeTextGenerator.h" +-#endif + + // NOTE: the __linux__ macro is predefined on Android host too, but + // main CMakeLists.txt filters out this generator by host name. +-#if (defined(__linux__) && !defined(__ANDROID__)) || defined(_WIN32) +-# include "cmGlobalGhsMultiGenerator.h" ++# if (defined(__linux__) && !defined(__ANDROID__)) || defined(_WIN32) ++# include "cmGlobalGhsMultiGenerator.h" ++# endif + #endif + + #if defined(__APPLE__) diff --git a/meta/recipes-devtools/cmake/cmake_3.28.3.bb b/meta/recipes-devtools/cmake/cmake_3.28.3.bb index 1841bfd1cfd..f018ca21ff1 100644 --- a/meta/recipes-devtools/cmake/cmake_3.28.3.bb +++ b/meta/recipes-devtools/cmake/cmake_3.28.3.bb @@ -11,7 +11,9 @@ SRC_URI:append:class-nativesdk = " \ file://cmake-setup.py \ file://environment.d-cmake.sh \ " -SRC_URI += "file://CVE-2025-9301.patch" +SRC_URI += "file://CVE-2025-9301.patch \ + file://0001-bootstrap-Fix-compilation-with-gcc-16-devirtualizati.patch \ +" LICENSE:append = " & BSD-1-Clause & MIT" LIC_FILES_CHKSUM:append = " \ From patchwork Fri Apr 24 20:55:30 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86887 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A4C5EFF8849 for ; Fri, 24 Apr 2026 20:57:02 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32587.1777064216487785683 for ; Fri, 24 Apr 2026 13:56:56 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=VomUbtp/; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-488b8bc6bc9so59585835e9.3 for ; Fri, 24 Apr 2026 13:56:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064215; x=1777669015; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=MQDuPc9bhB3dO5utOBrutkoDHvvYRPyPOqFagkaTkEU=; b=VomUbtp/pM/Qw5Rz69nwUgff6079hdWU7IIZ7hiw4MTFYrk8eNeGYTWRo3oWnl2RU+ jEx4hApmoLzv6UIGt0LI7AeyDTWlysH5MjN2GDMaAklBvegFc938KpU8ulsa4NOpSktk PvScZ9QQgdYZFYXPG0yO/PtzJvRN3sCp2LnIw= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064215; x=1777669015; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=MQDuPc9bhB3dO5utOBrutkoDHvvYRPyPOqFagkaTkEU=; b=tM7xtvjW1EdpiMIcndcsyTQiYXwFmhi/WnFUsg1CSc6RHlpU6bXFXzhidZi81Pzjbx aGP44uzNJNVfzmKImyude1quoZN/CsbKYOIT8PUR2FXvrY2VsnM/jsb0HeA6TcDlukau BfmztXcKc4nUrXHaiiuJriwSKnqrN/cxBO9hMp0RP81r65sPQGxHVXGJG8ytpsZzDdxn psHK9WLAE080Pwr0+fGxuttoNEKAu88AnfjilERLYNGeZF0p0T21HbknYEgwm2Rn6el1 N5JwjA9zVaY3Ppnk+TgegERg+oQyZl726xvRt89YjE/q2ZghrduIj++l1iRpHSbLyuXF HhqA== X-Gm-Message-State: AOJu0YwZ97GK2LRbgNbgDAdpNN9QTgtSNfasXirI9VusX8Qtm7J/5AEE CQ5idu+PxdBG1YdiMIzvhpWkauqcu7U4TBB4L4w3JzA5El1PjeQaddvGUqn2JMroKGZ8gipO4Ih b+tKrtiRdE6tc X-Gm-Gg: AeBDievCt921T4HvNrxC7Cy3D03WFKDZuibgCSwE4UE8Swc4QvOt79DaoOL5nfjWEga 8ddVeKdpDl5BL9lnxe9RoYWB85zWURagCdVpRl/OfHzcUQcgUayHDtes6UVNwHGDgF76eud/H8G uIw7Z3DC8rG/RaAZDifm+QxEfVr59GeXERXnlbErJd0sotM3zeB+LLUgVS/l4rEqU3jlkiOtv2f EdHX70He3bu6/IvgHfcm8Z052KwYRiE8IGKoprAXGiPU5XF8At8j0Np0+m2I8nLRJufyq0d3faf Bynlaj3utZaS1TUnutONl99istDpsomgEMy5+eeEBKJ+tq4U4/ZYjwDgK6CEWN9y6/C+jDeyQ0z 7QuzBCZajVZCUVDlMPMePn6bHhagJYlT878Cx2kO98TTKql9uReN5Ml4Ncc4sFaYxqhL+wmp40E EJccv1Yf7id0njRqZj74zIqMJYMZLNXg6teTtAjqVbp/H/VMztO3wrpkghM+hLn8WexuYa/pr6C K0UH5Hq72HOyi0ePPLNPLCMbSXqcxrNAHXAhg== X-Received: by 2002:a05:600c:8207:b0:485:3193:6ddb with SMTP id 5b1f17b1804b1-488fb73cf74mr520409735e9.3.1777064214566; Fri, 24 Apr 2026 13:56:54 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.54 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:54 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 31/66] gcc: backport a fix for building with gcc-16 Date: Fri, 24 Apr 2026 22:55:30 +0200 Message-ID: <53f86b988210506e191f28138b9a58a254ec4615.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235904 From: Martin Jansa Fixes: https://errors.yoctoproject.org/Errors/Details/905192/ when building on host with gcc-16 Compared to 15.2 used in whinlatter this needs 2 additional backports. Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 9eabea38f0c17d41d97284d63a25e45da3c9bbcc) Signed-off-by: Martin Jansa Signed-off-by: Yoann Congal --- meta/recipes-devtools/gcc/gcc-13.4.inc | 3 + ...dy-Make-it-buildable-by-C-11-to-C-26.patch | 257 ++++++++++++++++++ ...build-Remove-INCLUDE_MEMORY-PR117737.patch | 46 ++++ ...am-include-above-safe-ctype.h-PR1177.patch | 54 ++++ 4 files changed, 360 insertions(+) create mode 100644 meta/recipes-devtools/gcc/gcc/0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch create mode 100644 meta/recipes-devtools/gcc/gcc/0029-build-Remove-INCLUDE_MEMORY-PR117737.patch create mode 100644 meta/recipes-devtools/gcc/gcc/0030-build-Move-sstream-include-above-safe-ctype.h-PR1177.patch diff --git a/meta/recipes-devtools/gcc/gcc-13.4.inc b/meta/recipes-devtools/gcc/gcc-13.4.inc index eefae13530e..2017c444986 100644 --- a/meta/recipes-devtools/gcc/gcc-13.4.inc +++ b/meta/recipes-devtools/gcc/gcc-13.4.inc @@ -66,6 +66,9 @@ SRC_URI = "${BASEURI} \ file://0024-Avoid-hardcoded-build-paths-into-ppc-libgcc.patch \ file://0025-gcc-testsuite-tweaks-for-mips-OE.patch \ file://0027-Fix-gcc-vect-module-testcases.patch \ + file://0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch \ + file://0029-build-Remove-INCLUDE_MEMORY-PR117737.patch \ + file://0030-build-Move-sstream-include-above-safe-ctype.h-PR1177.patch \ " SRC_URI[sha256sum] = "9c4ce6dbb040568fdc545588ac03c5cbc95a8dbf0c7aa490170843afb59ca8f5" diff --git a/meta/recipes-devtools/gcc/gcc/0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch b/meta/recipes-devtools/gcc/gcc/0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch new file mode 100644 index 00000000000..431facb0110 --- /dev/null +++ b/meta/recipes-devtools/gcc/gcc/0028-libcody-Make-it-buildable-by-C-11-to-C-26.patch @@ -0,0 +1,257 @@ +From 0ffe3c9af4e5d5468df742512b6e930fe7039230 Mon Sep 17 00:00:00 2001 +From: Jakub Jelinek +Date: Fri, 21 Nov 2025 16:25:58 +0100 +Subject: [PATCH] libcody: Make it buildable by C++11 to C++26 + +The following builds with -std=c++11 and c++14 and c++17 and c++20 and c++23 +and c++26. + +I see the u8 string literals are mixed e.g. with strerror, so in +-fexec-charset=IBM1047 there will still be garbage, so am not 100% sure if +the u8 literals everywhere are worth it either. + +2025-11-21 Jakub Jelinek + + * cody.hh (S2C): For __cpp_char8_t >= 201811 use char8_t instead of + char in argument type. + (MessageBuffer::Space): Revert 2025-11-15 change. + (MessageBuffer::Append): For __cpp_char8_t >= 201811 add overload + with char8_t const * type of first argument. + (Packet::Packet): Similarly for first argument. + * client.cc (CommunicationError, Client::ProcessResponse, + Client::Connect, ConnectResponse, PathnameResponse, OKResponse, + IncludeTranslateResponse): Cast u8 string literals to (const char *) + where needed. + * server.cc (Server::ProcessRequests, ConnectRequest): Likewise. + +Signed-off-by: Martin Jansa +Upstream-Status: Backport [07a767c7a50d1daae8ef7d4aba73fe53ad40c0b7] +--- + libcody/client.cc | 36 +++++++++++++++++++----------------- + libcody/cody.hh | 22 ++++++++++++++++++++++ + libcody/server.cc | 28 ++++++++++++++-------------- + 3 files changed, 55 insertions(+), 31 deletions(-) + +diff --git a/libcody/client.cc b/libcody/client.cc +index ae69d190cb77..147fecdbe500 100644 +--- a/libcody/client.cc ++++ b/libcody/client.cc +@@ -97,7 +97,7 @@ int Client::CommunicateWithServer () + + static Packet CommunicationError (int err) + { +- std::string e {u8"communication error:"}; ++ std::string e {(const char *) u8"communication error:"}; + e.append (strerror (err)); + + return Packet (Client::PC_ERROR, std::move (e)); +@@ -110,33 +110,34 @@ Packet Client::ProcessResponse (std::vector &words, + { + if (e == EINVAL) + { +- std::string msg (u8"malformed string '"); ++ std::string msg ((const char *) u8"malformed string '"); + msg.append (words[0]); +- msg.append (u8"'"); ++ msg.append ((const char *) u8"'"); + return Packet (Client::PC_ERROR, std::move (msg)); + } + else +- return Packet (Client::PC_ERROR, u8"missing response"); ++ return Packet (Client::PC_ERROR, (const char *) u8"missing response"); + } + + Assert (!words.empty ()); +- if (words[0] == u8"ERROR") ++ if (words[0] == (const char *) u8"ERROR") + return Packet (Client::PC_ERROR, +- words.size () == 2 ? words[1]: u8"malformed error response"); ++ words.size () == 2 ? words[1] ++ : (const char *) u8"malformed error response"); + + if (isLast && !read.IsAtEnd ()) + return Packet (Client::PC_ERROR, +- std::string (u8"unexpected extra response")); ++ std::string ((const char *) u8"unexpected extra response")); + + Assert (code < Detail::RC_HWM); + Packet result (responseTable[code] (words)); + result.SetRequest (code); + if (result.GetCode () == Client::PC_ERROR && result.GetString ().empty ()) + { +- std::string msg {u8"malformed response '"}; ++ std::string msg {(const char *) u8"malformed response '"}; + + read.LexedLine (msg); +- msg.append (u8"'"); ++ msg.append ((const char *) u8"'"); + result.GetString () = std::move (msg); + } + else if (result.GetCode () == Client::PC_CONNECT) +@@ -199,7 +200,7 @@ Packet Client::Connect (char const *agent, char const *ident, + size_t alen, size_t ilen) + { + write.BeginLine (); +- write.AppendWord (u8"HELLO"); ++ write.AppendWord ((const char *) u8"HELLO"); + write.AppendInteger (Version); + write.AppendWord (agent, true, alen); + write.AppendWord (ident, true, ilen); +@@ -211,7 +212,8 @@ Packet Client::Connect (char const *agent, char const *ident, + // HELLO $version $agent [$flags] + Packet ConnectResponse (std::vector &words) + { +- if (words[0] == u8"HELLO" && (words.size () == 3 || words.size () == 4)) ++ if (words[0] == (const char *) u8"HELLO" ++ && (words.size () == 3 || words.size () == 4)) + { + char *eptr; + unsigned long val = strtoul (words[1].c_str (), &eptr, 10); +@@ -247,7 +249,7 @@ Packet Client::ModuleRepo () + // PATHNAME $dir | ERROR + Packet PathnameResponse (std::vector &words) + { +- if (words[0] == u8"PATHNAME" && words.size () == 2) ++ if (words[0] == (const char *) u8"PATHNAME" && words.size () == 2) + return Packet (Client::PC_PATHNAME, std::move (words[1])); + + return Packet (Client::PC_ERROR, u8""); +@@ -256,7 +258,7 @@ Packet PathnameResponse (std::vector &words) + // OK or ERROR + Packet OKResponse (std::vector &words) + { +- if (words[0] == u8"OK") ++ if (words[0] == (const char *) u8"OK") + return Packet (Client::PC_OK); + else + return Packet (Client::PC_ERROR, +@@ -319,11 +321,11 @@ Packet Client::IncludeTranslate (char const *include, Flags flags, size_t ilen) + // PATHNAME $cmifile + Packet IncludeTranslateResponse (std::vector &words) + { +- if (words[0] == u8"BOOL" && words.size () == 2) ++ if (words[0] == (const char *) u8"BOOL" && words.size () == 2) + { +- if (words[1] == u8"FALSE") +- return Packet (Client::PC_BOOL, 0); +- else if (words[1] == u8"TRUE") ++ if (words[1] == (const char *) u8"FALSE") ++ return Packet (Client::PC_BOOL); ++ else if (words[1] == (const char *) u8"TRUE") + return Packet (Client::PC_BOOL, 1); + else + return Packet (Client::PC_ERROR, u8""); +diff --git a/libcody/cody.hh b/libcody/cody.hh +index 789ce9e70b75..93bce93aa94d 100644 +--- a/libcody/cody.hh ++++ b/libcody/cody.hh +@@ -47,12 +47,21 @@ namespace Detail { + + // C++11 doesn't have utf8 character literals :( + ++#if __cpp_char8_t >= 201811 ++template ++constexpr char S2C (char8_t const (&s)[I]) ++{ ++ static_assert (I == 2, "only single octet strings may be converted"); ++ return s[0]; ++} ++#else + template + constexpr char S2C (char const (&s)[I]) + { + static_assert (I == 2, "only single octet strings may be converted"); + return s[0]; + } ++#endif + + /// Internal buffering class. Used to concatenate outgoing messages + /// and Lex incoming ones. +@@ -123,6 +132,13 @@ public: + Space (); + Append (str, maybe_quote, len); + } ++#if __cpp_char8_t >= 201811 ++ void AppendWord (char8_t const *str, bool maybe_quote = false, ++ size_t len = ~size_t (0)) ++ { ++ AppendWord ((const char *) str, maybe_quote, len); ++ } ++#endif + /// Add a word as with AppendWord + /// @param str the string to append + /// @param maybe_quote string might need quoting, as for Append +@@ -264,6 +280,12 @@ public: + : string (s), cat (STRING), code (c) + { + } ++#if __cpp_char8_t >= 201811 ++ Packet (unsigned c, const char8_t *s) ++ : string ((const char *) s), cat (STRING), code (c) ++ { ++ } ++#endif + Packet (unsigned c, std::vector &&v) + : vector (std::move (v)), cat (VECTOR), code (c) + { +diff --git a/libcody/server.cc b/libcody/server.cc +index e2fa069bb933..c18469fae843 100644 +--- a/libcody/server.cc ++++ b/libcody/server.cc +@@ -36,12 +36,12 @@ static RequestPair + const requestTable[Detail::RC_HWM] = + { + // Same order as enum RequestCode +- RequestPair {u8"HELLO", nullptr}, +- RequestPair {u8"MODULE-REPO", ModuleRepoRequest}, +- RequestPair {u8"MODULE-EXPORT", ModuleExportRequest}, +- RequestPair {u8"MODULE-IMPORT", ModuleImportRequest}, +- RequestPair {u8"MODULE-COMPILED", ModuleCompiledRequest}, +- RequestPair {u8"INCLUDE-TRANSLATE", IncludeTranslateRequest}, ++ RequestPair {(const char *) u8"HELLO", nullptr}, ++ RequestPair {(const char *) u8"MODULE-REPO", ModuleRepoRequest}, ++ RequestPair {(const char *) u8"MODULE-EXPORT", ModuleExportRequest}, ++ RequestPair {(const char *) u8"MODULE-IMPORT", ModuleImportRequest}, ++ RequestPair {(const char *) u8"MODULE-COMPILED", ModuleCompiledRequest}, ++ RequestPair {(const char *) u8"INCLUDE-TRANSLATE", IncludeTranslateRequest}, + }; + } + +@@ -135,21 +135,21 @@ void Server::ProcessRequests (void) + std::string msg; + + if (err > 0) +- msg = u8"error processing '"; ++ msg = (const char *) u8"error processing '"; + else if (ix >= Detail::RC_HWM) +- msg = u8"unrecognized '"; ++ msg = (const char *) u8"unrecognized '"; + else if (IsConnected () && ix == Detail::RC_CONNECT) +- msg = u8"already connected '"; ++ msg = (const char *) u8"already connected '"; + else if (!IsConnected () && ix != Detail::RC_CONNECT) +- msg = u8"not connected '"; ++ msg = (const char *) u8"not connected '"; + else +- msg = u8"malformed '"; ++ msg = (const char *) u8"malformed '"; + + read.LexedLine (msg); +- msg.append (u8"'"); ++ msg.append ((const char *) u8"'"); + if (err > 0) + { +- msg.append (u8" "); ++ msg.append ((const char *) u8" "); + msg.append (strerror (err)); + } + resolver->ErrorResponse (this, std::move (msg)); +@@ -176,7 +176,7 @@ Resolver *ConnectRequest (Server *s, Resolver *r, + return nullptr; + + if (words.size () == 3) +- words.emplace_back (u8""); ++ words.emplace_back ((const char *) u8""); + unsigned version = ParseUnsigned (words[1]); + if (version == ~0u) + return nullptr; diff --git a/meta/recipes-devtools/gcc/gcc/0029-build-Remove-INCLUDE_MEMORY-PR117737.patch b/meta/recipes-devtools/gcc/gcc/0029-build-Remove-INCLUDE_MEMORY-PR117737.patch new file mode 100644 index 00000000000..d784edefd76 --- /dev/null +++ b/meta/recipes-devtools/gcc/gcc/0029-build-Remove-INCLUDE_MEMORY-PR117737.patch @@ -0,0 +1,46 @@ +From b3f1b9e2aa079f8ec73e3cb48143a16645c49566 Mon Sep 17 00:00:00 2001 +From: Andrew Pinski +Date: Fri, 22 Nov 2024 09:31:44 -0800 +Subject: [PATCH] build: Remove INCLUDE_MEMORY [PR117737] + +Since diagnostic.h is included in over half of the sources, requiring to `#define INCLUDE_MEMORY` +does not make sense. Instead lets unconditionally include memory in system.h. + +The majority of this patch is just removing `#define INCLUDE_MEMORY` from the sources which currently +have it. + +This should also fix the mingw build issue but I have not tried it. + +Signed-off-by: Andrew Pinski +Signed-off-by: Martin Jansa +Upstream-Status: Backport [gcc-15.1.0 b3f1b9e2aa07 partial, only the gcc/system.h change] +--- + gcc/system.h | 8 +------- + 1 file changed, 1 insertion(+), 7 deletions(-) + +diff --git a/gcc/system.h b/gcc/system.h +index c18c7c5ec58d..c209871df72d 100644 +--- a/gcc/system.h ++++ b/gcc/system.h +@@ -222,6 +222,7 @@ extern int fprintf_unlocked (FILE *, const char *, ...); + #ifdef INCLUDE_FUNCTIONAL + # include + #endif ++# include + # include + # include + # include +@@ -758,13 +759,6 @@ private: + #define LIKELY(x) (__builtin_expect ((x), 1)) + #define UNLIKELY(x) (__builtin_expect ((x), 0)) + +-/* Some of the headers included by can use "abort" within a +- namespace, e.g. "_VSTD::abort();", which fails after we use the +- preprocessor to redefine "abort" as "fancy_abort" below. */ +- +-#ifdef INCLUDE_MEMORY +-# include +-#endif + + #ifdef INCLUDE_MUTEX + # include diff --git a/meta/recipes-devtools/gcc/gcc/0030-build-Move-sstream-include-above-safe-ctype.h-PR1177.patch b/meta/recipes-devtools/gcc/gcc/0030-build-Move-sstream-include-above-safe-ctype.h-PR1177.patch new file mode 100644 index 00000000000..270c91c345b --- /dev/null +++ b/meta/recipes-devtools/gcc/gcc/0030-build-Move-sstream-include-above-safe-ctype.h-PR1177.patch @@ -0,0 +1,54 @@ +From ac90b5c413c1565fb37cf79b92f6859b3852254a Mon Sep 17 00:00:00 2001 +From: Andrew Pinski +Date: Mon, 25 Nov 2024 14:03:27 -0800 +Subject: [PATCH] build: Move sstream include above safe-ctype.h {PR117771] + +sstream in some versions of libstdc++ include locale which might not have been +included yet. safe-ctype.h defines the toupper, tolower, etc. as macros so the +c++ header files needed to be included before hand as comment in system.h says: +/* Include C++ standard headers before "safe-ctype.h" to avoid GCC + poisoning the ctype macros through safe-ctype.h */ + +I don't understand how it was working before when memory was included after +safe-ctype.h rather than before. But this makes sstream consistent with the +other C++ headers. + +Pushed as obvious after a build for riscv64-elf. + +gcc/ChangeLog: + + PR target/117771 + * system.h: Move the include of sstream above safe-ctype.h. + +Signed-off-by: Andrew Pinski +Signed-off-by: Martin Jansa +Upstream-Status: Backport [gcc-15.1.0 f6e00226a4ca63e76e3e0b3a09a4ce6223980981] +--- + gcc/system.h | 7 +++---- + 1 file changed, 3 insertions(+), 4 deletions(-) + +diff --git a/gcc/system.h b/gcc/system.h +index 33245e76a986..ff983986153c 100644 +--- a/gcc/system.h ++++ b/gcc/system.h +@@ -222,6 +222,9 @@ extern int fprintf_unlocked (FILE *, const char *, ...); + #ifdef INCLUDE_FUNCTIONAL + # include + #endif ++#ifdef INCLUDE_SSTREAM ++# include ++#endif + # include + # include + # include +@@ -742,10 +745,6 @@ extern int vsnprintf (char *, size_t, const char *, va_list); + # include + #endif + +-#ifdef INCLUDE_SSTREAM +-# include +-#endif +- + #ifdef INCLUDE_MALLOC_H + #if defined(HAVE_MALLINFO) || defined(HAVE_MALLINFO2) + #include From patchwork Fri Apr 24 20:55:31 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86880 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id F15A6FF884E for ; Fri, 24 Apr 2026 20:57:02 +0000 (UTC) Received: from mail-wm1-f52.google.com (mail-wm1-f52.google.com [209.85.128.52]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31980.1777064216738576750 for ; Fri, 24 Apr 2026 13:56:57 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=J+A9gB78; spf=pass (domain: smile.fr, ip: 209.85.128.52, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f52.google.com with SMTP id 5b1f17b1804b1-488a8ca4aadso113586215e9.3 for ; Fri, 24 Apr 2026 13:56:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064215; x=1777669015; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=n/VSUXTnwVv1RDHlKtSJqqkV42KRG/KgX4jMHmprskY=; b=J+A9gB78LD1cQ4i2UQazmDrn5n/6Ys3WyZ0h/7S2sGOLSSFcxhwoeh5OzAUljVBsms DMqozoIzfUYHxmAfoMqPr+Q5MneWHIU96rwcfhvCCtewmQ8IF4USDY058EPyP/VhWTtJ GsTLAOidi/cRNR9R6u3cq77Z3PE10jfanUARg= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064215; x=1777669015; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=n/VSUXTnwVv1RDHlKtSJqqkV42KRG/KgX4jMHmprskY=; b=pmzfijncZwRzyylI/hcPTtfYt4O9cCyGKZDa/09ROPpjDkTrT2zWZbBqvTh3uOkWcQ Bww0p0iZYNorJHFjRb2Q8MoCo3mDI57VV/p4DPCRXXXczsX+IV7mCMr5ZEg64+HDlScD s2hMhioz2/PTRg5FR68lrIrdOGBgvltyxGGPOZoV8ZSIx3ayhX718bVnFCTvYle9bh90 6q5mc1MUxeb3Xg7RLSxHK+8OH60GXWsG965cpD5ij8h4x0XzEHj/zvgFmmuGAcczzWaZ 94ey8ZQJ0IP797SIhBr5lXysfD6ndoz+x7dzXEblyuCA4DwN3mmfY4vU3QJSoQ1kawek fZ1g== X-Gm-Message-State: AOJu0YwJS3RcdAgDPK9hHAKDcGaWnlAdoMSCTf5WefCSRuYByBOm5CtZ z0uNJGFS8eijzE2rOvFHKGvSCJR527WbUuU02uTn3GFYav3nvfOHXks4a/aJDK+eNDs3WlTxAuI DAtdtMwRaAA== X-Gm-Gg: AeBDiesx8xQUyIgDA+Y01i/p+0onIFrBsi7i0H5vdG0TVtQ9V9jLemXO6hk5g1RT5Vh gIjooxui7SLP6a+yB47rV3zPzmRo9kUyyQX2esW24Xxd8DKwwlNkYZhmxE72fl6IIpfMwmrz3Ti kiFn5gVcgqbBGjECWjzhWOchCDAoBjzSnJaz4DLeL/B33PZgYazLFLJFPSZhIY30GTnfnyCdhGN /oYFYMaejJb79xFKBrbnMIi+hE4TzfM8hJJOZKW7WGKDP21dcwfjJRPTGBlaTsU4Nvm8UIek59S QfmReoIrSV8aigZ0QwXgvzo6yMTO1W/Ml6g8P6Bw71KmiDdQ/TbMj4+E82V1NovYUWyIM+bfCOW 61yqjgNFvtWOIWonoXd2jsRg7LBA3yNE8Dny8GCP8Qf0ky8gnsjW3Ib4jHe2pePnKMsbJOS3MiJ zj0h2G3vNB/d8bgKec2UqbsbzOFRsMcakfkfqHdsa2d2QqyTamUNcHzUkJPJ0QJV1Npnbcz3/wW 0/xnEuoXwdroqas/PGbMicZ6H3seV1P5hHatm96D2fDJq5S X-Received: by 2002:a05:600c:4fc7:b0:488:dbcb:ca08 with SMTP id 5b1f17b1804b1-488fb787a62mr462368815e9.30.1777064214979; Fri, 24 Apr 2026 13:56:54 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.54 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:54 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 32/66] libxcrypt: avoid discarded-qualifiers build failure with glibc 2.43 Date: Fri, 24 Apr 2026 22:55:31 +0200 Message-ID: <5538c6c4dd64e1360428a98e4a45beab826eec3c.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235905 From: Hemanth Kumar M D With the glibc 2.43 upgrade, building nativesdk-libxcrypt triggers a -Wdiscarded-qualifiers warning in crypt-gost-yescrypt.c and crypt-sm3-yescrypt.c which becomes a build failure due to -Werror. Signed-off-by: Hemanth Kumar M D Signed-off-by: Richard Purdie (cherry picked from commit 8340d4be03646f0b4b599f768ddc88f502f93615) Signed-off-by: Yoann Congal --- meta/recipes-core/libxcrypt/libxcrypt.inc | 1 + 1 file changed, 1 insertion(+) diff --git a/meta/recipes-core/libxcrypt/libxcrypt.inc b/meta/recipes-core/libxcrypt/libxcrypt.inc index ee6875aa05d..11ec87c14e8 100644 --- a/meta/recipes-core/libxcrypt/libxcrypt.inc +++ b/meta/recipes-core/libxcrypt/libxcrypt.inc @@ -23,6 +23,7 @@ S = "${WORKDIR}/git" BUILD_CPPFLAGS = "-I${STAGING_INCDIR_NATIVE}" TARGET_CPPFLAGS = "-I${STAGING_DIR_TARGET}${includedir} -Wno-error" CPPFLAGS:append:class-nativesdk = " -Wno-error" +CFLAGS:append:class-nativesdk = " -Wno-error=discarded-qualifiers" API = "--disable-obsolete-api" EXTRA_OECONF += "${API}" From patchwork Fri Apr 24 20:55:32 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86879 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2B06DFF8846 for ; Fri, 24 Apr 2026 20:57:02 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31981.1777064217538320876 for ; Fri, 24 Apr 2026 13:56:57 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=a/Gp+hCC; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-48a3e9862f0so42145705e9.1 for ; Fri, 24 Apr 2026 13:56:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064216; x=1777669016; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=CnVwDhdt97HIlDMFlBREBoGIjAdn1DyMOVI4olZ4HgI=; b=a/Gp+hCC14QsiQGP99ULNUI9ZIstCXkx99aRsPlG2pPbyDDWPODeQWKdh5H+ZJwi0Z CBRCitdyMmauu5iS6Qb1X9A++wVzpnQVhRwihtBbAvp3wCFD5BhyW8mngFiY+q/aMPh6 nOP3usUON3MTQrnTwKfue4IYuztqobI1Bz+Go= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064216; x=1777669016; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=CnVwDhdt97HIlDMFlBREBoGIjAdn1DyMOVI4olZ4HgI=; b=E2OiXX/FYCy/3wiNW/qaliIjZ8CSae4SpoJ7gege7JSdDw6RTxWQy2UbMLn803u9B7 jMO6/A04gucfJxEz7wTBqg4NSTIQqsPenSVtRnD/BW7ji0/9gw6s33u8v14RDD4tuugh 3hPACcHP4n+psIXELZJw+JovQ+D4uTZeLw7AWZhlbxlm4L1+R5dSBWOVeu8YGKzh35AE 3ZpcqZQL+OSyqn3LnC//uaPs7LgTxJpWuWQLadBoiwBfjm1tjgY38zIQtBAsvDFwDhC+ qtARqrJFQamSlkszFd2SEZoZnx7SJptUWfzTXTKn1ZdFP24vqbYYYDH+1qlhxQZFVnRY a8ew== X-Gm-Message-State: AOJu0YxBvvPAtvuqERzScJP9Xrts0+5IooE7qzDc2SnvqblAYZ0YIXet nmiC0VGqRC8gfYAimTx3yDbreOqQdtch9t4VQQk1oEvYOHmvzqX0Bd77jgIk0fWWo72J5aVa1pF Rt7WjpgJmM1fj X-Gm-Gg: AeBDietpuXjpxPNGcZ7rj1K8eNK2WoPun4v8Rz9c3HM8meDNJg7ET1LQ/DuFo9Jcr9q m3pXpoaM5/bKTspj67kWDs1hx2Tt/xHcIQJOmIt5W1PbDT0//KZZFWyrsSqmx8JpOseoUMBfzCz JLgdWHslqdfIOIsTUnuEWYAdSTWVftn2PbuSN5H+eazAyBEcXxSckQ8p3+LpBl1gQ8of7XBTYD0 9RakYUvgNL5SKMoubMdkDwO8yqOg8VgEIfEbnuhqtlNTGesxgIIdWTsgJ+q5Wb+4xtwt6H+r198 wWhJDnKTKPu/HeiGdr/Ch9psJ/OB6y+d5LD2kdyQZSuhIYzII/HhgKpBzSluLvGgZOMIEGCNXtc MNA5SyAAAc+haTus9kcvMEbs26v5VL/q1vsOwSXxw0mfJDPhfwXsKVqzRzixnZbkg9felREzTsM Ign+pjiieoAaZsWNWik/2kBO4/DuTNyZ6rs8era0i00ug1yGEQpW0hnKF68ixBU/JnvlkWNe3L+ iww9GjcSNC8EC3RDKdOYV5D3aCeXOJ4SylAFQ== X-Received: by 2002:a05:600c:19d3:b0:48a:55ec:c007 with SMTP id 5b1f17b1804b1-48a55ecc113mr232091785e9.15.1777064215737; Fri, 24 Apr 2026 13:56:55 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.55 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:55 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 33/66] libxcrypt: Fix build wrt C23 support Date: Fri, 24 Apr 2026 22:55:32 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235906 From: Khem Raj latest glibc has better C23 support and exposes this problem Fixes following errors seen in nativesdk-libxcrypt | ../sources/libxcrypt-4.5.2/lib/crypt-sm3-yescrypt.c:139:9: error: initializing 'char *' with an expression of type 'const char *' discards qualifiers [-Werror,-Wincompatible-pointer-types-discards-qualifiers] | 139 | char *hptr = strchr ((const char *) intbuf->retval + 3, '$'); | | ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 6 errors generated. Compared to wrynose remove lib/crypt-sm3-yescrypt.c change, because the file doesn't exist in the version used in scarthgap, it was failing only in lib/crypt-gost-yescrypt.c Signed-off-by: Khem Raj Signed-off-by: Richard Purdie (cherry picked from commit a666b8e71ecda97db58c90d5af137671f9823f38) [YC: fixed patch format] Signed-off-by: Yoann Congal --- ...24d6e87aeae631bc0a7bb1ba983cf8def4de.patch | 29 +++++++++++++++++++ meta/recipes-core/libxcrypt/libxcrypt.inc | 4 ++- 2 files changed, 32 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-core/libxcrypt/files/174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch diff --git a/meta/recipes-core/libxcrypt/files/174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch b/meta/recipes-core/libxcrypt/files/174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch new file mode 100644 index 00000000000..75749c054a2 --- /dev/null +++ b/meta/recipes-core/libxcrypt/files/174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch @@ -0,0 +1,29 @@ +From 174c24d6e87aeae631bc0a7bb1ba983cf8def4de Mon Sep 17 00:00:00 2001 +From: Stanislav Zidek +Date: Wed, 10 Dec 2025 14:03:54 +0100 +Subject: [PATCH] fix -Werror=discarded-qualifiers + +On Fedora rawhide (to be Fedora 44), gcc became more strict +wrt. const-ness. + +Upstream-Status: Backport [https://github.com/besser82/libxcrypt/pull/220 without lib/crypt-sm3-yescrypt.c] +Signed-off-by: Khem Raj + +--- + lib/crypt-gost-yescrypt.c | 2 +- + lib/crypt-sm3-yescrypt.c | 2 +- + 2 files changed, 2 insertions(+), 2 deletions(-) + +diff --git a/lib/crypt-gost-yescrypt.c b/lib/crypt-gost-yescrypt.c +index 190ae94b..e9dc7e80 100644 +--- a/lib/crypt-gost-yescrypt.c ++++ b/lib/crypt-gost-yescrypt.c +@@ -131,7 +131,7 @@ crypt_gost_yescrypt_rn (const char *phrase, size_t phr_size, + intbuf->outbuf[1] = 'g'; + + /* extract yescrypt output from "$y$param$salt$output" */ +- char *hptr = strchr ((const char *) intbuf->retval + 3, '$'); ++ char *hptr = strchr ((char *) intbuf->retval + 3, '$'); + if (!hptr) + { + errno = EINVAL; diff --git a/meta/recipes-core/libxcrypt/libxcrypt.inc b/meta/recipes-core/libxcrypt/libxcrypt.inc index 11ec87c14e8..4e240f4d145 100644 --- a/meta/recipes-core/libxcrypt/libxcrypt.inc +++ b/meta/recipes-core/libxcrypt/libxcrypt.inc @@ -9,7 +9,9 @@ LIC_FILES_CHKSUM = "file://LICENSING;md5=c0a30e2b1502c55a7f37e412cd6c6a4b \ inherit autotools pkgconfig -SRC_URI = "git://github.com/besser82/libxcrypt.git;branch=${SRCBRANCH};protocol=https" +SRC_URI = "git://github.com/besser82/libxcrypt.git;branch=${SRCBRANCH};protocol=https \ + file://174c24d6e87aeae631bc0a7bb1ba983cf8def4de.patch \ +" SRCREV = "f531a36aa916a22ef2ce7d270ba381e264250cbf" SRCBRANCH ?= "master" From patchwork Fri Apr 24 20:55:33 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86881 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1DACFFF884F for ; Fri, 24 Apr 2026 20:57:03 +0000 (UTC) Received: from mail-wm1-f53.google.com (mail-wm1-f53.google.com [209.85.128.53]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32588.1777064218043137694 for ; Fri, 24 Apr 2026 13:56:58 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=JPZNyJve; spf=pass (domain: smile.fr, ip: 209.85.128.53, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f53.google.com with SMTP id 5b1f17b1804b1-4891cd41959so64026515e9.3 for ; Fri, 24 Apr 2026 13:56:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064216; x=1777669016; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Z70MwCvaGBDJ5jUnCYCJCJ73/Idy0ChYJTwhXXd7X3w=; b=JPZNyJveRPGoTinViZ+obdulAIsxi7t1eFvt2GyKBg/I54gu2lccNiOxpF5FqdlJyb HM7qePRC1MomJZVlOjEn7ktdOvcfKilpxRbkFtZfHNqIo30ydVklvdcAB/ama91aKWDG HTuo/TCfB+LP/4wwu+IG7gR6Rq8o9RLYabX2g= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064216; x=1777669016; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=Z70MwCvaGBDJ5jUnCYCJCJ73/Idy0ChYJTwhXXd7X3w=; b=AsvJjkuLS6tiC0IsS/uCLZ5Jfzwm1yzYvPWwYRUIOGt5CN8QmqNI7TK1hCimVGkJ+6 Hj5XA9FTAF9PUjxTk4aMqRzE4u+HHX4V+4I50d0wq9guXLnMQ2fYGNHZyb0uuA1i4MiB urR778z5PNvlQRk6R3EakJnNv7ajijKgHUoCjeqeIkPjTAVwXKGQBb14Tcrw3/NUNOvP YKTrj3fN1wW7dOi9Di6Grzn6sSfmpF6wpVyU6/tRTVgAKFk8CnpCUCSJik1NJ8VMG4/6 qhIeETDi+dS+Tgk/zyTisKCHZuNLc3v7aZybl7I+2Cl3zUECDNvfiBrbqcXS8wU2KVBH t+lg== X-Gm-Message-State: AOJu0YzCRaly1qQHoVRezKZLmUIg8KZUCST9bOirFjXYOFuvb2wCFoFS y5Jv5EqtYfBNICfFM0FjS6rh/qEex7kinckRiqe0kOtmfkcB6ruBXoVzIS/PNw3k6zDVmfm1InK dC4EhYkcq+A== X-Gm-Gg: AeBDieuDHISKcSYaNEsXI3Ha8xouWrJJEDK0Q7Najka/w5jJ/q6gWeOMZwOJ/oykztX X2ywe42a+NM9Kx62XZ8YstZcF58LD6O8QQGCklke5M2bDIELg90gncqA03lIBQHm+j/CsXU5C20 ur2xNUutaABCWAnyD/sLb9uBxDiEsLGzMGRtfxykFhnzZfWSEUAYgkWIkMcV47Mg3KxIXeC5lrw B3r3AspU3sQ4ofk/PVZUcQMw6SvvDTfBFB9p5l5/DR9ZAZVkGQJeGwJqEEL6MqDqgcg91gw/fpI Y8CO9tYrnuN0DJ/1jfWRyiU7UNOQkdCxtfXF7sryR2N8KVtp2xS5NfQ3Io1Z+R5pyvvgDa5QpQa vJAHDFhdz9KGqMVNcRaYsN6we1t2oDUJdM/yqQ5++O8zGIA9BfAiMxJ7Th3F3adeqyllD8L3aFy YaNVPbi19qj8fFLabtVWm9W/RNy2doWqvhXa1GWGspnIcVwLNRWbqqj7yrbzRhvMw8Gs2A2WtLl G85HQApincin9QipeiZ9lkLXMw4VIEIIK2jZXO6vvbLsndf X-Received: by 2002:a05:600d:b:b0:48a:563c:c8e2 with SMTP id 5b1f17b1804b1-48a563cd137mr202090315e9.3.1777064216186; Fri, 24 Apr 2026 13:56:56 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.55 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:55 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 34/66] libxcrypt: Use configure knob to disable warnings as errors Date: Fri, 24 Apr 2026 22:55:33 +0200 Message-ID: <2151e4824bb45200173e95e2a08eab9057cea29d.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:03 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235907 From: Khem Raj Passing Wno-error via environment flags for target and nativesdk is intended but is not effective due to command line ordering and as a result some patches have been added to disable particular kind of warning as error. Given the scenario, warnings as errors should be disabled for all builds, this makes it portable across hosts and across compilers ( gcc, clang ) and glibc versions. Signed-off-by: Khem Raj Signed-off-by: Richard Purdie (cherry picked from commit 25f26861ddc8d71af5381d1acc883ad948bddace) Signed-off-by: Yoann Congal --- meta/recipes-core/libxcrypt/libxcrypt.inc | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/meta/recipes-core/libxcrypt/libxcrypt.inc b/meta/recipes-core/libxcrypt/libxcrypt.inc index 4e240f4d145..25c4fde813b 100644 --- a/meta/recipes-core/libxcrypt/libxcrypt.inc +++ b/meta/recipes-core/libxcrypt/libxcrypt.inc @@ -23,9 +23,9 @@ PROVIDES = "virtual/crypt" S = "${WORKDIR}/git" BUILD_CPPFLAGS = "-I${STAGING_INCDIR_NATIVE}" -TARGET_CPPFLAGS = "-I${STAGING_DIR_TARGET}${includedir} -Wno-error" -CPPFLAGS:append:class-nativesdk = " -Wno-error" -CFLAGS:append:class-nativesdk = " -Wno-error=discarded-qualifiers" +TARGET_CPPFLAGS = "-I${STAGING_DIR_TARGET}${includedir}" + +EXTRA_OECONF += "--disable-werror" API = "--disable-obsolete-api" EXTRA_OECONF += "${API}" From patchwork Fri Apr 24 20:55:34 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86883 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 74830FF8848 for ; Fri, 24 Apr 2026 20:57:02 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32589.1777064218459784528 for ; Fri, 24 Apr 2026 13:56:58 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=bTewcylc; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-4890098abbaso62801735e9.0 for ; Fri, 24 Apr 2026 13:56:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064217; x=1777669017; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=cJ+2O2k7R+WGg5SQTfm3fxamEWye8YXTPKuIKYGBXBI=; b=bTewcylcp7XkvcEbJ/EYOp3sM87MzQlJL3R4ZSRCVUaYXIbexTPdaeyqJjQDUWMtJ6 D5UoqZ+xumCMvVWo/jLsfcXovVzdZO2wz7Yjm9h6p/7BO/qPetOWfC9Au8YllPrZEI7u KUIFBulEQM7u9MLqqRzazZM+da46Col9vshEE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064217; x=1777669017; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=cJ+2O2k7R+WGg5SQTfm3fxamEWye8YXTPKuIKYGBXBI=; b=PQcZUfJJzzJPG8bLzPCMGpPs/mIElaA5GNIoFS/JhFDhkGzWNyvuK18023kZmCepUZ GR9p1cTimUpsNoFuLooQic0zlnKxsowg/o8eooL701YDRGSVnpvhB0E210RyyVhFYiQL UTpYHTkatMbq9R2hQR63TQjLONa0EkSNAWN8Ekv3x6cZjpIWwqeMZP4g+sVYOumrUjUs zFmezmUf2c5hIjSQqXC+M9xyQNCCIbxtPi62eERTxVWMfxzJDOM1f129AVMaUCTpPG0t GdXQaY7GHwM1uSJJDprdMctgp+hZPhhhcooYBVVClngkPfVXvbGOYkKA6eH2LAPWZfr9 mnag== X-Gm-Message-State: AOJu0YyxG9M5YzhK/4qCzFR4dTbzwE++0kHhQ8PyRODMM+NraF5dWOFE NRvJK9sfmkLIrJMqV5BFyYdK3DmOsZYQTbenGvJfp1BTwaOzSLNOsK4H/Pnof5wFoWtQ43zmBSi e+ZKsYzf2Ugl7 X-Gm-Gg: AeBDievvZLsYtNjDGP6+hIxBCS1uwAOa9L2D3Hs6OwgV7jCUiKXMSBU4iL1GPJHhZ1T yq7qSzQF46YKK/Y8BUw/t2CyXqVLvkMDHoRfyN7SqHiTr3nu5XFq0+Q5mu8fB+Y3jVSN+sfkHyF aAhSzIwYGcUjjoq3ahRF2yOdtvZkI9B12xWFmw9QC1mkVm/PlZlEjRqotRP9eGCYWClGxaoc7Wp zZmy5NOzS9+m1psQzFCyPq1j4S6Vd0DnEYtrG+d3RLO0E8JCT/N4drxlanXhCpsJaIp0FYGltaP ++4X71HwFBZQuBk0P1yRnUngwYVl7F8LLuT74AJDuOjSvGfaMV1uDlU4dZRomPlFppeDaV992Mt 2U4T/NqD6gJ/f6+5hxV7p9i0rgb/mDpobNsiGJ78tttImRYKwgBXGUb44bZhKB7LT5+80+FPP3h dxPt0y0UCgLQb3FLpLvMSH1Kk4ewnYbXYdZNjfZ766Z+dtt57XFJb9GDgRvb83EvKqd54qpkdU7 kuakQM4qHx1qm/49sfXYKbK+ZltEJMBafZ/Dg== X-Received: by 2002:a05:600c:4fd1:b0:488:78f2:6b0 with SMTP id 5b1f17b1804b1-488fb78ede0mr477784435e9.29.1777064216584; Fri, 24 Apr 2026 13:56:56 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.56 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:56 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 35/66] spirv-tools: backport a fix for building with gcc-16 Date: Fri, 24 Apr 2026 22:55:34 +0200 Message-ID: <7df9bc5569cf5942bca56e86db5fa92b41a32a1b.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235908 From: Martin Jansa Fixes: https://errors.yoctoproject.org/Errors/Details/905195/ when building on host with gcc-16 Signed-off-by: Martin Jansa Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit b4801e63d1284f3fa5006f0e24f560130c2a0a4c) Signed-off-by: Yoann Congal --- ...sue-with-gcc-16-replaeces-PR-6542-65.patch | 50 +++++++++++++++++++ .../spir/spirv-tools_1.3.275.0.bb | 4 +- 2 files changed, 53 insertions(+), 1 deletion(-) create mode 100644 meta/recipes-graphics/spir/spirv-tools/0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch diff --git a/meta/recipes-graphics/spir/spirv-tools/0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch b/meta/recipes-graphics/spir/spirv-tools/0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch new file mode 100644 index 00000000000..ce58b6b8c0f --- /dev/null +++ b/meta/recipes-graphics/spir/spirv-tools/0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch @@ -0,0 +1,50 @@ +From aab5c96b7eb237b8bcd15e28f8aff068842db4b7 Mon Sep 17 00:00:00 2001 +From: David Neto +Date: Tue, 3 Mar 2026 12:11:47 -0500 +Subject: [PATCH] opt: Fix build issue with gcc 16 (replaeces PR #6542) + (#6567) +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +Compiling with gcc 16 throws this error: + +FAILED: [code=1] +source/opt/CMakeFiles/SPIRV-Tools-opt.dir/decoration_manager.cpp.o + source/opt/decoration_manager.cpp: In member function +‘spvtools::opt::analysis::DecorationManager::CloneDecorations(unsigned +int, unsigned int)’: + source/opt/decoration_manager.cpp:546:27: error: +‘MEM[(unsigned int &)&op + 24]’ may be used uninitialized +[-Werror=maybe-uninitialized] + +546 | if (op.words[0] == from) { // add new pair of operands: (to, +literal) + source/opt/decoration_manager.cpp:545:19: note: ‘op’ declared here + 545 | Operand op = inst->GetOperand(i); + | ^~ + cc1plus: all warnings being treated as errors + +Make sure that the vector is not empty before using it. + +Co-authored-by: José Expósito +Signed-off-by: Martin Jansa +Upstream-Status: Backport [c28f5937bce369dde1d645299a8c9873da43dc72] +--- + source/opt/decoration_manager.cpp | 3 ++- + 1 file changed, 2 insertions(+), 1 deletion(-) + +diff --git a/source/opt/decoration_manager.cpp b/source/opt/decoration_manager.cpp +index 3e95dbc35..bee7d9482 100644 +--- a/source/opt/decoration_manager.cpp ++++ b/source/opt/decoration_manager.cpp +@@ -543,7 +543,8 @@ void DecorationManager::CloneDecorations(uint32_t from, uint32_t to) { + const uint32_t num_operands = inst->NumOperands(); + for (uint32_t i = 1; i < num_operands; i += 2) { + Operand op = inst->GetOperand(i); +- if (op.words[0] == from) { // add new pair of operands: (to, literal) ++ if (!op.words.empty() && ++ op.words[0] == from) { // add new pair of operands: (to, literal) + inst->AddOperand( + Operand(spv_operand_type_t::SPV_OPERAND_TYPE_ID, {to})); + op = inst->GetOperand(i + 1); diff --git a/meta/recipes-graphics/spir/spirv-tools_1.3.275.0.bb b/meta/recipes-graphics/spir/spirv-tools_1.3.275.0.bb index 05c6de1b500..027fa4f9c99 100644 --- a/meta/recipes-graphics/spir/spirv-tools_1.3.275.0.bb +++ b/meta/recipes-graphics/spir/spirv-tools_1.3.275.0.bb @@ -8,7 +8,9 @@ LICENSE = "Apache-2.0" LIC_FILES_CHKSUM = "file://LICENSE;md5=3b83ef96387f14655fc854ddc3c6bd57" SRCREV = "f0cc85efdbbe3a46eae90e0f915dc1509836d0fc" -SRC_URI = "git://github.com/KhronosGroup/SPIRV-Tools.git;branch=main;protocol=https" +SRC_URI = "git://github.com/KhronosGroup/SPIRV-Tools.git;branch=main;protocol=https \ + file://0001-opt-Fix-build-issue-with-gcc-16-replaeces-PR-6542-65.patch \ +" PE = "1" # These recipes need to be updated in lockstep with each other: # glslang, vulkan-headers, vulkan-loader, vulkan-tools, spirv-headers, spirv-tools From patchwork Fri Apr 24 20:55:35 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86876 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1E155FF8845 for ; Fri, 24 Apr 2026 20:57:02 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31982.1777064219030100877 for ; Fri, 24 Apr 2026 13:56:59 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=ULe6zXkA; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488b0e1b870so135467625e9.2 for ; Fri, 24 Apr 2026 13:56:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064217; x=1777669017; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=8/K38mJJ09qxqUWvl7pztekP2LbYzB6UvwwUe8d6IKI=; b=ULe6zXkADZTCuNfx+zEVa+4xGUIYTwOEvE7yO+XusEJZbOy2bsAHgXVA5g9Q17ao6k bERzVIebtcF3EXVATwbz6oAqRU+qu+pekOB3/iJbPHAX/NYROPbyenmjPQ6x4Wc5a+ar VOle2li/s/FboSTk0IqqdjZVUlRYnqHPUL8ec= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064217; x=1777669017; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=8/K38mJJ09qxqUWvl7pztekP2LbYzB6UvwwUe8d6IKI=; b=OAt9e6awW8DeU/kB0AMxtvQA2npaWwh/+I7DSRWF3PYiudkt6RUYf/QituyxAYVX5U x35oIAIqI20sxJL74QuDDciQhZWDPKdIWswrQRE7xasAgRYGvIgIHH6d26HtQU+W6MKP W7I9BihCZUb7gOQEvkxQ3rwF2u8k5F6RhXVwfLpFkk7y6e0dsiXEYfnRMo6rQxHjQz4c 0O+pvk95BaSNuUODmma1EMsyo3PhQAD/icRWaSIHmkMtnmGvXW1qfo3ZdQO4g0Em7fRg L/umFJsq6/PFHd5uuI8SiyNCo+emOsZMFYFr7tsP9TquLv+Bs9z6uEJY8zpmkDlsxFCM PQPQ== X-Gm-Message-State: AOJu0Yz1D/+zKaxyXgJiTUtgDqJf+LnDj0g2u+s25SIjG4+gUv5a9Trj 4mzg4QWLaSVkARt+R97G2HCxGhH10udgb87xpBRXp7Zxkwe2xqcK1b1pMeYqOPQCrYdZhlzBYzO kbsU440oEtXg0 X-Gm-Gg: AeBDiesR1YYlXz1IKlB90SZp4B7+JMZGL7wtDFd+lxw2+SpOxHBYLBYu7L8eCLN2B61 M50hjWuBw+lyhPoioEyJC59glBsSCltA6EyEsHAWtJ8iPyeBCwnGnAeXCXhWcRUr5xk4cq5sde1 UHexE/ybDFf8eAwYAvVQgaCTCZiqYpd16pg7H8YaTwQ5ZdxrUq32abh/Ga3739bZZf4AqzNJ2EM Xb+KXmXky5w+Zeyl8F1rmwKuhustmWawIo+usq6TTClApSJWpZ9b6ck1CNppZHXWXUdR4Q+T7Q4 7lpH6Fivf6dwAxahyO1iOzv3pULjuGwnNG18FqnzSO2F36nXNaIQugzUztmBr9EJFFxob2BiLUs kOh1XwHPApKUt+yo1FEJdvne/W4SnLTDkk6yA/W9Cpiai3gRuAAlFjDIKDCgu4xEstTeNgCHCAz cEApY6MLPzvWInPJy+wKej2J5NClAGa5bfG7dclXobijlxr4Fj2bUfLqbMmNt1d3kUawrD8oQT0 Q0r9yN90d1V/c1CSeC7aMKCseP2F7bErsJJSg== X-Received: by 2002:a05:600c:4f13:b0:489:1a65:dd6e with SMTP id 5b1f17b1804b1-4891a65de3emr377538145e9.8.1777064217095; Fri, 24 Apr 2026 13:56:57 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.56 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:56 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 36/66] ca-certificates: upgrade 20250419 -> 20260223 Date: Fri, 24 Apr 2026 22:55:35 +0200 Message-ID: <219ca927c9cd31a200b2ab4bed17937af4e5afc8.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235909 From: Andrej Kozemcak Changelog: * Update Mozilla certificate authority bundle to version 2.82 The following certificate authorities were added (+): + TrustAsia TLS ECC Root CA + TrustAsia TLS RSA Root CA + SwissSign RSA TLS Root CA 2022 - 1 + OISTE Server Root ECC G1 + OISTE Server Root RSA G1 The following certificate authorities were removed (-): - GlobalSign Root CA - Entrust.net Premium 2048 Secure Server CA - Baltimore CyberTrust Root (closes: #1121936) - Comodo AAA Services root - XRamp Global CA Root - Go Daddy Class 2 CA - Starfield Class 2 CA - CommScope Public Trust ECC Root-01 - CommScope Public Trust ECC Root-02 - CommScope Public Trust RSA Root-01 - CommScope Public Trust RSA Root-02 * Use dh_usrlocal to create /usr/local/share/ca-certificates Signed-off-by: Andrej Kozemcak Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 738e08718e31de19c1c8db5e162a4a00e2b0c0e6) Signed-off-by: Ankur Tyagi Signed-off-by: Yoann Congal --- ...{ca-certificates_20250419.bb => ca-certificates_20260223.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-support/ca-certificates/{ca-certificates_20250419.bb => ca-certificates_20260223.bb} (97%) diff --git a/meta/recipes-support/ca-certificates/ca-certificates_20250419.bb b/meta/recipes-support/ca-certificates/ca-certificates_20260223.bb similarity index 97% rename from meta/recipes-support/ca-certificates/ca-certificates_20250419.bb rename to meta/recipes-support/ca-certificates/ca-certificates_20260223.bb index 01f594095e9..9cf6d5afc7d 100644 --- a/meta/recipes-support/ca-certificates/ca-certificates_20250419.bb +++ b/meta/recipes-support/ca-certificates/ca-certificates_20260223.bb @@ -14,7 +14,7 @@ DEPENDS:class-nativesdk = "openssl-native" # Need rehash from openssl and run-parts from debianutils PACKAGE_WRITE_DEPS += "openssl-native debianutils-native" -SRC_URI[sha256sum] = "33b44ef78653ecd3f0f2f13e5bba6be466be2e7da72182f737912b81798ba5d2" +SRC_URI[sha256sum] = "2fa2b00d4360f0d14ec51640ae8aea9e563956b95ea786e3c3c01c4eead42b56" SRC_URI = "${DEBIAN_MIRROR}/main/c/ca-certificates/${BPN}_${PV}.tar.xz \ file://0001-update-ca-certificates-don-t-use-Debianisms-in-run-p.patch \ file://0003-update-ca-certificates-use-relative-symlinks-from-ET.patch \ From patchwork Fri Apr 24 20:55:36 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86888 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0E4AAFF8850 for ; Fri, 24 Apr 2026 20:57:03 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32590.1777064219575183755 for ; Fri, 24 Apr 2026 13:56:59 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=cDKnEmDT; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-488b8bc6bc9so59586125e9.3 for ; Fri, 24 Apr 2026 13:56:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064218; x=1777669018; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Tc5pVo+pxEvrXXfEMaiRA8o7zTGivZF1bcp7kV4hzqw=; b=cDKnEmDT/djdFfYr7t/HmgjerHB8SN6xQyxIXhXcAsXK/WSzgNigUiwFhXYvLwykim axW4cg9c4cXcoX1Ck6jWXvMjMrRYjYloCkkIflq0BMexIoJtSURqqGw4M1jr71uuFNIg RQ8vih7OykX6D+jtmt1Cu83aRPUHsvX3NhcsI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064218; x=1777669018; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=Tc5pVo+pxEvrXXfEMaiRA8o7zTGivZF1bcp7kV4hzqw=; b=s4fztLVE/+39exuBWDQdMOqa/jkHhRIvgZIPCnSJfUlNOpqMvRCoBHdXnH1l/5Y+8u OV1Wy52VP67WktACwEpxm6TVL+fiKqS7Uuzx03aYS80bAAbMJRJ7HlFTpXTgKTcEzVy7 VSFonJPsYmBikhQ4HONXdCM+csN2L4Mkv1lYc00Wt9E6fqfw1g0R8xI3NzRRpbVT8DHT JpPZSWPxDRbkAQ+rFJpkhJstG3Uunc2Fy+dDvSFSHbpQGHvfu5JAQpHUsw3hY8i6ooae 9h6UaVERR1w+IcaZOBNsesWJ/uoexltCHjU3UN40kbev72YwhaFsq6CazhnlXKSyPVGv r2cA== X-Gm-Message-State: AOJu0Ywj/qKwToy43fw6jPjr/arKjUfLeOBDsvtdTO7HG3ERDkO81Ybr FgO5IOce33SVGoESd+iEgYAeoGu+FQrzSx8EiuU6c0Z9euRQgETd6GLyaQUnipkAbCH3DjhKj06 acrLUA4Eu7uug X-Gm-Gg: AeBDieu855EhqQw8OA3emElG6EAFG1DPjMuCHUWtYonrs6dm1u0hgsF+9GsqsYkUAZK HngkWe+WG6iVgKNGg3v2PatIGuRe2JAQ7t+wYckSrgF2zJ8wD7Q0LUjH+02lGq+J6K48SgQfHiW +LR6b+TI3/4bG/iCDOk9KXKuFMo8i/5+po7uqAaNABd/teMhUu06V5HBEc8Pz9jUh4tiOWlxQmn zyYeoOlYUKF3SAWx/QKkgu6BIAG3zbjyJfPagcnj/OU+8TG/ZZ0UEeeWce/SBFkEihyFJf9SI31 jZjdusz1d8mOLF+V1qpeXz5FPzeQPxKQaIMWLrwfjAJB8k/HKWmENODW4MiBYfrJxGzMX2A9ma+ PJ1ddNYSQo/S2xdET0oqZFpR2gLT1gtboVGjbz/QvUPyU2a0RhqCjihtx8s6r6GQfBRoVycAYQO TcCmtmW+SSqXNJqmJ5lGO0ip80eWW/N3KoHBrM99kyAcqlJmOIzJ6FJKF0fTCLGCSuAWHR/glfw v+OvGG19uYe+b0SOWSEyzmwvwp9iiWL43+fUg== X-Received: by 2002:a05:600c:a103:b0:48a:58e1:6d17 with SMTP id 5b1f17b1804b1-48a58e16ee0mr176496695e9.20.1777064217673; Fri, 24 Apr 2026 13:56:57 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.57 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:57 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 37/66] ovmf: backport a fix for build with gcc-16 Date: Fri, 24 Apr 2026 22:55:36 +0200 Message-ID: <7de54889b3547a94bc7c6015731ec1c099e4d629.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:03 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235910 From: Martin Jansa Fixes build on host with gcc-16: StringFuncs.c: In function ‘SplitStringByWhitespace’: StringFuncs.c:113:15: error: variable ‘Item’ set but not used [-Werror=unused-but-set-variable=] 113 | UINTN Item; | ^~~~ and EfiRom.c: In function ‘main’: EfiRom.c:78:17: error: assignment discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers] 78 | if ((Ptr0 = strstr ((CONST CHAR8 *) mOptions.FileList->FileName, DEFAULT_OUTPUT_EXTENSION)) != NULL) { | ^ and one more for older version used in scarthgap main.c: In function ‘ProcessArgs’: main.c:163:42: error: too many arguments to function ‘p->process’; expected 0, have 2 163 | (*p->process)( *argv, *(argv+1) ); | ~^~~~~~~~~~~~ ~~~~~ main.c:120:34: note: declared here 120 | WildFunc process; | ^~~~~~~ main.c:168:42: error: too many arguments to function ‘p->process’; expected 0, have 1 168 | (*p->process)( *argv ); | ~^~~~~~~~~~~~ ~~~~~ main.c:120:34: note: declared here 120 | WildFunc process; | ^~~~~~~ Signed-off-by: Martin Jansa [YC: upstream commit a1db482ecd2824a4ae67a3c2a8e607b607ab4a43] Signed-off-by: Yoann Congal --- ...Tools-StringFuncs-fix-gcc-16-warning.patch | 42 ++++++++++++++++++ ...aseTools-EfiRom-fix-compiler-warning.patch | 44 +++++++++++++++++++ .../0008-BaseTools-Pccts-set-C-standard.patch | 44 +++++++++++++++++++ meta/recipes-core/ovmf/ovmf_git.bb | 3 ++ 4 files changed, 133 insertions(+) create mode 100644 meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch create mode 100644 meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch create mode 100644 meta/recipes-core/ovmf/ovmf/0008-BaseTools-Pccts-set-C-standard.patch diff --git a/meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch b/meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch new file mode 100644 index 00000000000..a465dede9c3 --- /dev/null +++ b/meta/recipes-core/ovmf/ovmf/0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch @@ -0,0 +1,42 @@ +From 015c26aea52a54e96319887ea542870b4804fb91 Mon Sep 17 00:00:00 2001 +From: Gerd Hoffmann +Date: Thu, 29 Jan 2026 09:23:32 +0100 +Subject: [PATCH] BaseTools/StringFuncs: fix gcc 16 warning +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +StringFuncs.c: In function ‘SplitStringByWhitespace’: +StringFuncs.c:113:15: error: variable ‘Item’ set but not used [-Werror=unused-but-set-variable=] + 113 | UINTN Item; + | ^~~~ + +Signed-off-by: Gerd Hoffmann + +Upstream-Status: Backport [edk2-stable202602 https://github.com/tianocore/edk2/commit/3597306191297b504683b83fe7750e49c6a2e836] +Signed-off-by: Martin Jansa +--- + BaseTools/Source/C/Common/StringFuncs.c | 3 +-- + 1 file changed, 1 insertion(+), 2 deletions(-) + +diff --git a/BaseTools/Source/C/Common/StringFuncs.c b/BaseTools/Source/C/Common/StringFuncs.c +index 53e44365e9..df02d9c808 100644 +--- a/BaseTools/Source/C/Common/StringFuncs.c ++++ b/BaseTools/Source/C/Common/StringFuncs.c +@@ -110,7 +110,6 @@ SplitStringByWhitespace ( + CHAR8 *EndOfSubString; + CHAR8 *EndOfString; + STRING_LIST *Output; +- UINTN Item; + + String = CloneString (String); + if (String == NULL) { +@@ -120,7 +119,7 @@ SplitStringByWhitespace ( + + Output = NewStringList (); + +- for (Pos = String, Item = 0; Pos < EndOfString; Item++) { ++ for (Pos = String; Pos < EndOfString;) { + while (isspace ((int)*Pos)) { + Pos++; + } diff --git a/meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch b/meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch new file mode 100644 index 00000000000..7aaafe6efbf --- /dev/null +++ b/meta/recipes-core/ovmf/ovmf/0007-BaseTools-EfiRom-fix-compiler-warning.patch @@ -0,0 +1,44 @@ +From 4d2bdadcd6d45f6708b1b4827b0dc9b6e4b8edd2 Mon Sep 17 00:00:00 2001 +From: Gerd Hoffmann +Date: Mon, 8 Dec 2025 10:28:50 +0100 +Subject: [PATCH] BaseTools/EfiRom: fix compiler warning +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +New warning after updating gcc: + +EfiRom.c: In function ‘main’: +EfiRom.c:78:17: error: assignment discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers] + +The assigned value is not used, so fix the warning by just removing it. + +Signed-off-by: Gerd Hoffmann + +Upstream-Status: Backport [edk2-stable202602 https://github.com/tianocore/edk2/commit/9af06ef3cbb052b142f9660c2c01e7aeb401300c] +Signed-off-by: Martin Jansa +--- + BaseTools/Source/C/EfiRom/EfiRom.c | 3 +-- + 1 file changed, 1 insertion(+), 2 deletions(-) + +diff --git a/BaseTools/Source/C/EfiRom/EfiRom.c b/BaseTools/Source/C/EfiRom/EfiRom.c +index fa7bf0e62e..6e903b3504 100644 +--- a/BaseTools/Source/C/EfiRom/EfiRom.c ++++ b/BaseTools/Source/C/EfiRom/EfiRom.c +@@ -44,7 +44,6 @@ Returns: + FILE_LIST *FList; + UINT32 TotalSize; + UINT32 Size; +- CHAR8 *Ptr0; + + SetUtilityName(UTILITY_NAME); + +@@ -75,7 +74,7 @@ Returns: + // + if (mOptions.DumpOption == 1) { + if (mOptions.FileList != NULL) { +- if ((Ptr0 = strstr ((CONST CHAR8 *) mOptions.FileList->FileName, DEFAULT_OUTPUT_EXTENSION)) != NULL) { ++ if (strstr ((CONST CHAR8 *) mOptions.FileList->FileName, DEFAULT_OUTPUT_EXTENSION) != NULL) { + DumpImage (mOptions.FileList); + goto BailOut; + } else { diff --git a/meta/recipes-core/ovmf/ovmf/0008-BaseTools-Pccts-set-C-standard.patch b/meta/recipes-core/ovmf/ovmf/0008-BaseTools-Pccts-set-C-standard.patch new file mode 100644 index 00000000000..de4ccb8a47d --- /dev/null +++ b/meta/recipes-core/ovmf/ovmf/0008-BaseTools-Pccts-set-C-standard.patch @@ -0,0 +1,44 @@ +From 74bc6545e72707a47dd9dae42ce33b8877b10000 Mon Sep 17 00:00:00 2001 +From: Gerd Hoffmann +Date: Mon, 20 Jan 2025 09:40:31 +0100 +Subject: [PATCH] BaseTools/Pccts: set C standard + +The prehistoric code base doesn't build with ISO C23. Set the C +standard to C11 (for both clang and gcc) so it continues to build with +gcc 15 (which uses C23 by default). + +Signed-off-by: Gerd Hoffmann + +Upstream-Status: Backport [edk2-stable202502 https://github.com/tianocore/edk2/commit/e063f8b8a53861043b9872cc35b08a3dc03b0942] +Signed-off-by: Martin Jansa +--- + BaseTools/Source/C/VfrCompile/Pccts/antlr/makefile | 2 +- + BaseTools/Source/C/VfrCompile/Pccts/dlg/makefile | 2 +- + 2 files changed, 2 insertions(+), 2 deletions(-) + +diff --git a/BaseTools/Source/C/VfrCompile/Pccts/antlr/makefile b/BaseTools/Source/C/VfrCompile/Pccts/antlr/makefile +index 746d58b5e2..b47c8a37af 100644 +--- a/BaseTools/Source/C/VfrCompile/Pccts/antlr/makefile ++++ b/BaseTools/Source/C/VfrCompile/Pccts/antlr/makefile +@@ -169,7 +169,7 @@ ANTLR=${BIN_DIR}/antlr + DLG=${BIN_DIR}/dlg + OBJ_EXT=o + OUT_OBJ = -o +-CFLAGS= $(COPT) -I. -I$(SET) -I$(PCCTS_H) -DUSER_ZZSYN $(COTHER) -DZZLEXBUFSIZE=65536 ++CFLAGS= $(COPT) -I. -I$(SET) -I$(PCCTS_H) -DUSER_ZZSYN $(COTHER) -DZZLEXBUFSIZE=65536 -std=gnu11 + CPPFLAGS= + # + # SGI Users, use this CFLAGS +diff --git a/BaseTools/Source/C/VfrCompile/Pccts/dlg/makefile b/BaseTools/Source/C/VfrCompile/Pccts/dlg/makefile +index e45ac98e04..d72bee3d70 100644 +--- a/BaseTools/Source/C/VfrCompile/Pccts/dlg/makefile ++++ b/BaseTools/Source/C/VfrCompile/Pccts/dlg/makefile +@@ -123,7 +123,7 @@ endif + COPT=-O + ANTLR=${BIN_DIR}/antlr + DLG=${BIN_DIR}/dlg +-CFLAGS= $(COPT) -I. -I$(SET) -I$(PCCTS_H) -DUSER_ZZSYN -DZZLEXBUFSIZE=65536 ++CFLAGS= $(COPT) -I. -I$(SET) -I$(PCCTS_H) -DUSER_ZZSYN -DZZLEXBUFSIZE=65536 -std=gnu11 + CPPFLAGS= + OBJ_EXT=o + OUT_OBJ = -o diff --git a/meta/recipes-core/ovmf/ovmf_git.bb b/meta/recipes-core/ovmf/ovmf_git.bb index 319f03a8d2a..badde30d97e 100644 --- a/meta/recipes-core/ovmf/ovmf_git.bb +++ b/meta/recipes-core/ovmf/ovmf_git.bb @@ -26,6 +26,9 @@ SRC_URI = "gitsm://github.com/tianocore/edk2.git;branch=master;protocol=https \ file://0004-reproducible.patch \ file://0001-MdePkg-Fix-overflow-issue-in-BasePeCoffLib.patch \ file://0001-MdeModulePkg-Potential-UINT32-overflow-in-S3-ResumeC.patch \ + file://0006-BaseTools-StringFuncs-fix-gcc-16-warning.patch \ + file://0007-BaseTools-EfiRom-fix-compiler-warning.patch \ + file://0008-BaseTools-Pccts-set-C-standard.patch \ " PV = "edk2-stable202402" From patchwork Fri Apr 24 20:55:37 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86889 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2C7BDFF8844 for ; Fri, 24 Apr 2026 20:57:02 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32591.1777064220068845443 for ; Fri, 24 Apr 2026 13:57:00 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=DPV2CJhS; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-4891e86fabeso82270215e9.1 for ; Fri, 24 Apr 2026 13:56:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064218; x=1777669018; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=WAUvwJIi4XVr6s/3tpJnxmEUgf6tU4r/wcS4txJ3vak=; b=DPV2CJhSU+UrIeZyLm0th55tUyuu+vg+kKV3kj2wWYg5XnspDQWvHln0t19TO3H8mN CsQFS8eg5g3UnPZInNXMdSZg144TEzLLN1CxSP8oVXQPxxUNbS/mA3XyVoTFIAEINWhO 0T/F/c6QOkOiu3qu76IO7YaMlEX6KmusPxX0g= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064218; x=1777669018; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=WAUvwJIi4XVr6s/3tpJnxmEUgf6tU4r/wcS4txJ3vak=; b=N22gSRNnvYs47m3Ef8lKBbsO95AF3208/qYEyM5ysJB1zxKvTapMzvdarp+PUpJHy4 FUOGLBMW+OiwbvaZj8T9UpwMQyZOjYQVAHbUqwPaW1asGNZiNkFr4sNAiHsFRCa1gLWP Hfbj9VjyPt9zjrPslD8FJmwhurefniAGqdjBHM0tCjkhNjdFfAKOos0GB3SJ+yI8d4h4 UUZopHFt6xNnSjHENZ70uIA0Xal3Xlt5gvOwHKKheln2wcrRdD1/jk5wxAbXcyVDz3zm WfK5cIv/b5+tKn+d5YPA2wIZDIcN4gms3enwplluHHh5oBwgVU7KH/XHr3yKQfJ7D8Oe vHdw== X-Gm-Message-State: AOJu0YzdB9EvDQBEXRFan2L62XyEkqLIS6d6r3i+URgimH7zIOMK+IzJ JimrYIprWcUPugO9sapBUox/HQsBrUZE7SwQY1FZoIAe8iobA0D3ib88j7roDLgscXJsZ9DBgxj hYOxOZKEMiLGV X-Gm-Gg: AeBDiev4zj578nojcgRcDFJ/q9hvV6jeYv9qMgsyQfmrVK9Vk0+br0z5kqRI4bRLnEE AtAd8FymH4tsQYPSK/Fzl5t414xKQS6BoXlMYZVXGCh5ryT7XXtIzfR+PETgqM3l+Xib3bYNQhh OqeXkWVzK3NLDX2BiGJFusPqSrjyKE98uWTXGVJOHt7/CSs6s3DBL6stYwXE4fSaNfG2/v87g4l pe2Cw44rnP/TZFDIg1NUxlqdgC6WfTdmgzvl8ntnH7yIOHJNBCiEqwHsM47o/R2M009O+Vf+LPJ TqqdmWZUOzGZhk/SOXGL9jIugIdYsgjlzIC9kGYORETyMgLpsjH/JWDjNx9YzhYtwX4nJHiCSTi L/0NoRqFEKi4pqyVNiED/ZAMItCBDKgBPmNHbQKjc8CrAcX4OeQcmfmquhzP3bDxtK0X5BIMYg/ cR8s2dJn/b3zhi7HoSkUc453l3RA8Rnq40UxntHx4AEGxWfnwvIzfa42bRg3HT8d9qVLwWFLD0w T8kHQtAeYDJJIYh8z4jefnI0G9tQ7x416bGbw== X-Received: by 2002:a05:600c:1993:b0:489:e696:836f with SMTP id 5b1f17b1804b1-489e69686a7mr307350265e9.10.1777064218195; Fri, 24 Apr 2026 13:56:58 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.57 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:57 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 38/66] ltp: fix epoll_ctl04 failed Date: Fri, 24 Apr 2026 22:55:37 +0200 Message-ID: <02ee34a255573789d1baf7ec080bf30e6e34b2ba.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235911 From: Li Wang backport from ltp upstream commit: https://github.com/linux-test-project/ltp/commit/e84f0689cf7a8a77478a0e70aa62560f66c3bceb the related kernel patch was already merged into yocto linux: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2e467a48287c868818085aa35389a224d226732 Signed-off-by: Li Wang Signed-off-by: Yoann Congal --- ...l_ctl04-add-ELOOP-to-expected-errnos.patch | 49 +++++++++++++++++++ meta/recipes-extended/ltp/ltp_20240129.bb | 1 + 2 files changed, 50 insertions(+) create mode 100644 meta/recipes-extended/ltp/ltp/0001-syscalls-epoll_ctl04-add-ELOOP-to-expected-errnos.patch diff --git a/meta/recipes-extended/ltp/ltp/0001-syscalls-epoll_ctl04-add-ELOOP-to-expected-errnos.patch b/meta/recipes-extended/ltp/ltp/0001-syscalls-epoll_ctl04-add-ELOOP-to-expected-errnos.patch new file mode 100644 index 00000000000..203836a5f66 --- /dev/null +++ b/meta/recipes-extended/ltp/ltp/0001-syscalls-epoll_ctl04-add-ELOOP-to-expected-errnos.patch @@ -0,0 +1,49 @@ +From e84f0689cf7a8a77478a0e70aa62560f66c3bceb Mon Sep 17 00:00:00 2001 +From: Jan Stancek +Date: Tue, 5 Aug 2025 11:27:23 +0200 +Subject: [PATCH] syscalls/epoll_ctl04: add ELOOP to expected errnos + +Kernel commit f2e467a48287 ("eventpoll: Fix semi-unbounded recursion") +added an extra checks for determining the maximum depth of an upwards walk, +which starting with 6.17-rc kernels now hits ELOOP before EINVAL. + +Add ELOOP to list of expected errnos. + +Upstream-Status: Backport from +[https://github.com/linux-test-project/ltp/commit/e84f0689] + +Link: https://lore.kernel.org/ltp/39ee7abdee12e22074b40d46775d69d37725b932.1754386027.git.jstancek@redhat.com/ +Reviewed-by: Andrea Cervesato +Reviewed-by: Petr Vorel +Reviewed-by: Avinesh Kumar +Tested-by: Avinesh Kumar +Signed-off-by: Jan Stancek +[ modify TST_EXP_FAIL2_ARR function parameters ] +Signed-off-by: Li Wang +--- + testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c | 7 +++++-- + 1 file changed, 5 insertions(+), 2 deletions(-) + +diff --git a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c +index 955959b6b26..feb49623b15 100644 +--- a/testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c ++++ b/testcases/kernel/syscalls/epoll_ctl/epoll_ctl04.c +@@ -51,13 +51,16 @@ static void cleanup(void) + + static void verify_epoll_ctl(void) + { ++ const int exp_errnos[] = {EINVAL, ELOOP}; ++ + new_epfd = epoll_create(1); + if (new_epfd == -1) + tst_brk(TBROK | TERRNO, "fail to create epoll instance"); + + events.data.fd = epfd; +- TST_EXP_FAIL(epoll_ctl(new_epfd, EPOLL_CTL_ADD, epfd, &events), EINVAL, +- "epoll_ctl(..., EPOLL_CTL_ADD, ...) with number of nesting is 5"); ++ TST_EXP_FAIL2_ARR(epoll_ctl(new_epfd, EPOLL_CTL_ADD, epfd, &events), ++ exp_errnos, ++ "epoll_ctl(..., EPOLL_CTL_ADD, ...) with number of nesting is 5"); + SAFE_CLOSE(new_epfd); + } + diff --git a/meta/recipes-extended/ltp/ltp_20240129.bb b/meta/recipes-extended/ltp/ltp_20240129.bb index 18c64392839..ec31c985445 100644 --- a/meta/recipes-extended/ltp/ltp_20240129.bb +++ b/meta/recipes-extended/ltp/ltp_20240129.bb @@ -31,6 +31,7 @@ SRC_URI = "git://github.com/linux-test-project/ltp.git;branch=master;protocol=ht file://0001-scenario_groups-default-remove-connectors.patch \ file://0001-sched_stress-Use-time_t-instead-of-long-for-type.patch \ file://0001-cve-2015-3290-Disable-AVX-for-x86_64.patch \ + file://0001-syscalls-epoll_ctl04-add-ELOOP-to-expected-errnos.patch \ " S = "${WORKDIR}/git" From patchwork Fri Apr 24 20:55:38 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86878 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6417FFF8847 for ; Fri, 24 Apr 2026 20:57:02 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31983.1777064220651363430 for ; Fri, 24 Apr 2026 13:57:00 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=ipI705n2; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-4891c0620bcso53509605e9.1 for ; Fri, 24 Apr 2026 13:57:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064219; x=1777669019; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=iN0v5r5aMfbgSdYY0oJJjAaJ4tYZ8O+c09fBcIeD8xs=; b=ipI705n2kXn4QdYeAfkYNp+670twMYL1SepShx9H2CNTCaUyKvvlIibYVZNnc0xHIC C2Htv88qkQWszd+37O+egDwHeuYnL9NCvuVUOuJXcIZ2QtIUvD+puJVvIsATo27l73AW MSrDhH7WCqcT80bF7G7jC2xdHiEyJrgutX4QA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064219; x=1777669019; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=iN0v5r5aMfbgSdYY0oJJjAaJ4tYZ8O+c09fBcIeD8xs=; b=RIBh+Ho9KgRPq/p7csEj1J1zVVN/QGtXfijh332FkDiMDrRm1UWqK1Ejr2FNRbGfCe UEJnhj5+rT+fQgWkZ98TwZuAtUb1KLDN3F++3/LyjOWHdXaeEuylpPA663kZJb7dJYji r+SLkw8ZwalcpUnpaZ+OWZnzBJKL+BZZ7Mx411XhNdDd7gi1tJPsqrTcr+Tl+4pq08lV 6rQ3Cwnuin3WfPXLv9iGS07uDLSYYyZ1/XstVs//dCuT6BzXr0z7fmThkoM7bn4TfMyA 7oxBx4QEfSVQ56AWoO3C1NyuG36GBARN3FIphHjMEu5HnyNEHfbFq6lw/6uKBWaSdcIx AKpA== X-Gm-Message-State: AOJu0Yypag8vt7uTshQx37BErG6PPwMXbcK4yErC1Qk/odTmHtBgEYP6 SBWIydj5w4OM1265ShdEREBd6aNccCMs7FHNTerQB5s+xJ2cgtUTcSOFMeS+6Xa8WSMDgMRWTP5 UgExk+5qouo4O X-Gm-Gg: AeBDies+e/zhHbxoK2zJtcs1VIxdko/dPRdQA3EvTKuXy+qfGUYhlaRSLwF7nfinWXQ fNTi3mef3+1EJSLY4nhuA5B7rAihukmgyIwPz/TL9UIcscCNK+Cjwr86Kl2qh7GJnNxSJxlXl8c jbnp+6Afp+HsIeQT4KVt6MAin5A/ASPsoJFocUXM9GY5P8ACHOZeYB8WOA566Liprz9Ofl5x6q/ 2H/+yk2e+gXDRmjz5YL2nx9iSF58VpeoTJ5cB1ZMQyCVSa+/6Tf7ImpyHZEcr4k4woTMASQoLIL Ghm3lfOtvA8z5GI92QukRNEMyoNHM6coMp1BDTjShLqPgAnzEp7X7yFM1CiTSxylKWdqtRKUfQg QBlPjNGAnswv3hpWTVGX1ColmTC4oqjZPuWv8wR9p62A4ZqDNmB6O4EZdd8ma5dcW3UD0cb7Rfz 8z5pW1wyLcWkN75E5PboAmnSM1j97QyfCh6LC4hMEvBz0hmE/Un0nSpiDFuyYpgd0RLvTvO1nqq EcdwSo+FXcx+J2XwfCeTgicSXzlKOmX/Mv0Xg== X-Received: by 2002:a05:600c:a404:b0:47e:e2eb:bc22 with SMTP id 5b1f17b1804b1-488fb73b2a3mr396409625e9.5.1777064218746; Fri, 24 Apr 2026 13:56:58 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.58 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:58 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 39/66] kernel-devsrc: make tools/Build optional Date: Fri, 24 Apr 2026 22:55:38 +0200 Message-ID: <005b57b805228f2793265d6d1d1a2f52342935b3.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:02 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235912 From: Bruce Ashfield kernel-devsrc fails to copy files for v6.12+ as the following upstream commit has removed the file tools/build/Build: commit ea974028a049f2cea4bb6be963ee3e3844a03f6d Author: Brian Norris Date: Mon Jul 15 13:32:43 2024 -0700 tools build: Avoid circular .fixdep-in.o.cmd issues We make the failed copy of this file non-fatal to support all kernel versions. Signed-off-by: Bruce Ashfield Signed-off-by: Richard Purdie (cherry picked from commit 13e16e5be25f379211c7329fa1462464174c0f2d) Suggested-by: Calvin Owens Signed-off-by: Yoann Congal --- meta/recipes-kernel/linux/kernel-devsrc.bb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/recipes-kernel/linux/kernel-devsrc.bb b/meta/recipes-kernel/linux/kernel-devsrc.bb index 77249671513..1500aff2e25 100644 --- a/meta/recipes-kernel/linux/kernel-devsrc.bb +++ b/meta/recipes-kernel/linux/kernel-devsrc.bb @@ -156,7 +156,7 @@ do_install() { # these are a few files associated with objtool, since we'll need to # rebuild it cp -a --parents tools/build/Build.include $kerneldir/build/ - cp -a --parents tools/build/Build $kerneldir/build/ + cp -a --parents tools/build/Build $kerneldir/build/ 2>/dev/null || : cp -a --parents tools/build/fixdep.c $kerneldir/build/ cp -a --parents tools/scripts/utilities.mak $kerneldir/build/ From patchwork Fri Apr 24 20:55:39 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86874 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 97D23FF8842 for ; Fri, 24 Apr 2026 20:57:01 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31985.1777064221111642803 for ; Fri, 24 Apr 2026 13:57:01 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=gPXLIoZY; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488b3f8fa2bso82759575e9.1 for ; Fri, 24 Apr 2026 13:57:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064219; x=1777669019; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=8KEGucQrC+D+Ec2u9MEHdXh5qJyAQ2btdwMUY0kh59w=; b=gPXLIoZYlpZ/BoLHXZqAaawGqXT2906dshEEq7kyHSpmZ6AmyDJcvFuBWY1zC9txtr ggZYGLtHmZvXpMsO9XYFNleqmLj6H6tEN8DOXq/PDlyc/ZBXHGRRODfSwo8v2d8bwW2s 347Yf3HPL4kZSSqtcIfNbfPfpe8b7QVq26urY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064219; x=1777669019; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=8KEGucQrC+D+Ec2u9MEHdXh5qJyAQ2btdwMUY0kh59w=; b=RpCo13zrGeJhV52aqGJQH8Lr1ph5yyQvgpAaqi/0ABsXXOeCyp/yHEOMmb+UubCLMq rGQf2mfbxNHHZaFoh22itBZiPxjqmDCki+6ayyruRJNlurPsv25OS5IolJG/LGLD8+VG r6NcD3py2ruouhTzrk0XjoHlReT26Xi+vtbCMOYJFIu2wHH+h0cT9MyirDe7+3gWhsEQ QG+rB/DhZY83/viY2auu+Ozm2CRmy9/zyXOLa1cx4pYmPIY1JpMMsL1z8QP/ikbRQsXn T3VAVeghvk+8ZQtEcat9FUuVkPRjvje6maTRPsjN0D/RnMkFr2kFVS1P8rXb/ZL72762 l+qw== X-Gm-Message-State: AOJu0YyqEbtxDaxZZrabgEsbkcXe6vtLjGhWmOzYoauaEeyHcJEUX0Er HJEsUVGgOulgPpWXBtQy/ZqvHY6x63Vj1nLxRiw4af8ioU9JaTttIhz4TxGcI8KyWqqX4YoTLi7 p4qI3KzbNVga4 X-Gm-Gg: AeBDietKUVqwBHQBGdUU9z0Bk5w70GonfEUeGxCfATpXGloNnh/GDEBWyKDFSZhLa+G +TkqNZRoyK0mBWFa+DsmUsvO1EJlz8NtAUrY9sbT4Q1XDE23B+w38LEbcrpCTWBF0uLLbPvzkEA e0PVriXAzQcfcjqTR11JnczJDssPP44lf+RjmiEGpAqpwiTIJz+Z3oQ+A7gcHg/Y1eplr45GG9j DaMGrJNxWowVAXe1UokFpMqIZAu4Svjs2/6F1OQCKEF8ot805Lp2wtw/r9cVzFm9BWpcTxtoNAY wxDfvQSqY6WcFJfE8pVkHeB/a0C5oGKLAd28lXELW2Tfqa7t5Eyektrol5ejS3Ph2+nsdKauQ7L W4wu7dYaEvnpe5NM9zLyh99FhSom6O2jenKQDKbLgHRFJlBCi9QHn5gKB+/9dUsfqBqzz6YcOJ7 7Xb9HPVWRiRKuTkT49lqKXSaajG6oiYhFmbZuR+qXBXYFv6V32jg5gzdqUv2C9dTPwk1iZbLaS6 RC4f3BjmcljEQWaghU2Nva+bNTqdKVttygEjQ== X-Received: by 2002:a05:600c:4e0c:b0:489:1d7a:4537 with SMTP id 5b1f17b1804b1-4891d7a463emr322520575e9.3.1777064219254; Fri, 24 Apr 2026 13:56:59 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.58 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:58 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 40/66] dbus: use ${PN} in pkg_postinst instead of 'dbus' Date: Fri, 24 Apr 2026 22:55:39 +0200 Message-ID: <41a581f420eb69e86e30bbb7dfd1d1ec39d55334.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:01 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235913 From: Martin Jansa All pkg_postinst in oe-core where the package name matches the recipe name use ${PN} already. We have a bbclass used by some recipes which does: pkg_postinst:${PN}:append() which works reasonably well for most of the recipes, except for dbus where it causes: WARNING: meta/recipes-core/dbus/dbus_1.16.2.bb: Variable key pkg_postinst:${PN} (...) replaces original key pkg_postinst:dbus (...) Signed-off-by: Martin Jansa (cherry picked from commit efec0447c8e8a6003f00642b33a71ed94fc4ec82) Signed-off-by: Yoann Congal --- meta/recipes-core/dbus/dbus_1.14.10.bb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/recipes-core/dbus/dbus_1.14.10.bb b/meta/recipes-core/dbus/dbus_1.14.10.bb index 4fe7af7512b..ffbf0780ed1 100644 --- a/meta/recipes-core/dbus/dbus_1.14.10.bb +++ b/meta/recipes-core/dbus/dbus_1.14.10.bb @@ -109,7 +109,7 @@ FILES:${PN}-dev += "${libdir}/dbus-1.0/include ${bindir}/dbus-test-tool ${datadi RDEPENDS:${PN}-ptest += "bash make dbus" PACKAGE_WRITE_DEPS += "${@bb.utils.contains('DISTRO_FEATURES','systemd sysvinit','systemd-systemctl-native','',d)}" -pkg_postinst:dbus() { +pkg_postinst:${PN}() { # If both systemd and sysvinit are enabled, mask the dbus-1 init script if ${@bb.utils.contains('DISTRO_FEATURES','systemd sysvinit','true','false',d)}; then if [ -n "$D" ]; then From patchwork Fri Apr 24 20:55:40 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86932 Return-Path: Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 63AA4FF884C for ; Fri, 24 Apr 2026 20:57:14 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32598.1777064223762012675 for ; Fri, 24 Apr 2026 13:57:04 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=I8Mi3gj7; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-48374014a77so107558885e9.3 for ; Fri, 24 Apr 2026 13:57:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064222; x=1777669022; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=CkwG0FugjOagtYaX5NCZV+5uga0hOB0U79t5SpzzUgA=; b=I8Mi3gj7Kf8MPl+v4dkNyDsmykUeIe8om+Kq6JK2PJ6/hCw5lroaupGboAtOzhx4Xf xwmG2J+cm9Xv3pDSwZ+D8JWMwasFufZX4ivK8mA4p/VSPS4I8y31wA6ajEZvWkkg05x3 p6yfzcuduPiVBh1bwaosF8Jzdb0kSCmmXUWys= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064222; x=1777669022; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=CkwG0FugjOagtYaX5NCZV+5uga0hOB0U79t5SpzzUgA=; b=PpQfk+McLCqXadP+0HvV3skmd+QnJ3HK/fkA1Jv6zLn1zT4Xv/qKBAdB7KughMX25i CbN1eQuhEVyyWeUpOrazSvm6NDuOTqEQc67vSy8DVK9rfqDkdgwnsnWiOP+hF7NNqkMY q+mRTK0UYKYaN2rnoOW088FlE6i9ewd6ZqWxCO1547X/h9tLJcpUc308sJRPV1O6rkJ9 Y63RAwPj5aDIF0jNXy6ahFbFTI1sgUoLRmhIOCOkHxu6USSMItwlgwUq7WMK5LPT3ET/ uIyR/AdJWdPLEy1JCPiIoCI5cqOSrh/HnPVwWF0CD5qXbN0dGKI2Gbo8koFk3MARwX+V idwg== X-Gm-Message-State: AOJu0YwcmJlX+ynQ5R/ErAfPnJjHUD6cB30c6h3Mnbw7nJnhOBwX9RMv X8FCqQf3TNyw53c8OFV6PYu8toYSvB6GuV4Ve2Ztk7LW8ciZD/0wD8VjrhIM3YHgq69U4ji867s zBNiVajgqihXa X-Gm-Gg: AeBDieuv2Id8//nHaJwCFujsowSdTF/EXo6zHMfoFnZugknkredpOcfONcuO4TmGpS8 PwSytCkFj/rm5vRrScEDM58Zsw/CVFP0wzOnSM5n9jq9mZRE5egEZ3e2WdYk1GtzxlAQGrLbGOW FI3CQFqh7pHgWo9/tGpeOFVPy1bv/meMEyUxV1jIZN5dk6ALg0wOla/h3Fmr3P4DyJ8CVuM72OB BZoqvqM0n7i3fzLnuFVMkXjb6irQC7H8BDa1OFHbPidMA13JReEttLbytcAPHyFKppB90Pn9UAh Kbr+Ts9hurGovuF1QcSVBmJKYP9ViIVqJi4GKJhWxDu1Oc1o2yvEsqiSPFsxt5dMaQD4scBsCi4 tagClUkhqqhzY37V5iRqu56wMw2p7CoRJjbIrhpQK3cD9NCnll4phhN0W4Rlxpq7SgpmTpKOc5c ZSND0JwPvX9l4JYafDqQjvVL1N0y6qXMyMm8WRfocdZeOY0j0euFtfUfoyUsqpFnbrznlAtOngK GnYgQJ1hlQqb22n8jMGnuPxvDHOo4Hcfps84Q== X-Received: by 2002:a05:600c:a305:b0:48a:53cb:85f4 with SMTP id 5b1f17b1804b1-48a53cb8734mr221255655e9.24.1777064221093; Fri, 24 Apr 2026 13:57:01 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.56.59 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:56:59 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 41/66] linux-yocto/6.6: update CVE exclusions (6.6.123) Date: Fri, 24 Apr 2026 22:55:40 +0200 Message-ID: <4bdf5345c32c9e294a64d61af49ce2adabdaf1db.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:14 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235916 From: João Marcos Costa (Schneider Electric) This new version of cve-exclusion_6.6.inc was generated with oe-core's latest version of the generate-cve-exclusions.py. Regarding the database used and how this file was generated: Generated at 2026-04-03 09:30:32.247568+00:00 for kernel version 6.6.123 From cvelistV5 cve_2026-04-03_0700Z The backporting of the generate-cve-exclusions.py script from master to Scarthgap is handled in a different patch. Signed-off-by: João Marcos Costa (Schneider Electric) Signed-off-by: Yoann Congal --- .../linux/cve-exclusion_6.6.inc | 21144 +++++++++++++--- 1 file changed, 17901 insertions(+), 3243 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc index 32a0701edfa..99f4ebcdd9f 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc @@ -1,5728 +1,5820 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2024-06-06 20:41:33.044442+00:00 for version 6.6.32 +# Generated at 2026-04-03 09:30:32.247568+00:00 for kernel version 6.6.123 +# From cvelistV5 cve_2026-04-03_0700Z -#python check_kernel_cve_status_version() { -# this_version = "6.6.29" -# kernel_version = d.getVar("LINUX_VERSION") -# if kernel_version != this_version: -# bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) -#} -#do_cve_check[prefuncs] += "check_kernel_cve_status_version" -CVE_STATUS[CVE-2003-1604] = "fixed-version: Fixed from version 2.6.12rc2" +python check_kernel_cve_status_version() { + this_version = "6.6.123" + kernel_version = d.getVar("LINUX_VERSION") + if kernel_version != this_version: + bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) +} +do_cve_check[prefuncs] += "check_kernel_cve_status_version" -CVE_STATUS[CVE-2004-0230] = "fixed-version: Fixed from version 3.6rc1" +CVE_STATUS[CVE-2019-25160] = "fixed-version: Fixed from version 5.0" -# CVE-2005-3660 has no known resolution +CVE_STATUS[CVE-2019-25162] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2006-3635] = "fixed-version: Fixed from version 2.6.26rc5" +# CVE-2019-3459 has no known resolution -CVE_STATUS[CVE-2006-5331] = "fixed-version: Fixed from version 2.6.19rc3" +# CVE-2019-3460 has no known resolution -CVE_STATUS[CVE-2006-6128] = "fixed-version: Fixed from version 2.6.19rc2" +CVE_STATUS[CVE-2020-36775] = "fixed-version: Fixed from version 5.7" -# CVE-2007-3719 has no known resolution +CVE_STATUS[CVE-2020-36776] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2007-4774] = "fixed-version: Fixed from version 2.6.12rc2" +CVE_STATUS[CVE-2020-36777] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2007-6761] = "fixed-version: Fixed from version 2.6.24rc6" +CVE_STATUS[CVE-2020-36778] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2007-6762] = "fixed-version: Fixed from version 2.6.20rc5" +CVE_STATUS[CVE-2020-36779] = "fixed-version: Fixed from version 5.13" -# CVE-2008-2544 has no known resolution +CVE_STATUS[CVE-2020-36780] = "fixed-version: Fixed from version 5.13" -# CVE-2008-4609 has no known resolution +CVE_STATUS[CVE-2020-36781] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2008-7316] = "fixed-version: Fixed from version 2.6.25rc1" +CVE_STATUS[CVE-2020-36782] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2009-2692] = "fixed-version: Fixed from version 2.6.31rc6" +CVE_STATUS[CVE-2020-36783] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2010-0008] = "fixed-version: Fixed from version 2.6.23rc9" +CVE_STATUS[CVE-2020-36784] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2010-3432] = "fixed-version: Fixed from version 2.6.36rc5" +CVE_STATUS[CVE-2020-36785] = "fixed-version: Fixed from version 5.13" -# CVE-2010-4563 has no known resolution +CVE_STATUS[CVE-2020-36786] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2010-4648] = "fixed-version: Fixed from version 2.6.37rc6" +CVE_STATUS[CVE-2020-36787] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2010-5313] = "fixed-version: Fixed from version 2.6.38rc1" +CVE_STATUS[CVE-2020-36788] = "fixed-version: Fixed from version 5.15" -# CVE-2010-5321 has no known resolution +CVE_STATUS[CVE-2020-36789] = "fixed-version: Fixed from version 5.10" -CVE_STATUS[CVE-2010-5328] = "fixed-version: Fixed from version 2.6.35rc1" +CVE_STATUS[CVE-2020-36790] = "fixed-version: Fixed from version 5.9" -CVE_STATUS[CVE-2010-5329] = "fixed-version: Fixed from version 2.6.39rc1" +CVE_STATUS[CVE-2020-36791] = "fixed-version: Fixed from version 5.5.14" -CVE_STATUS[CVE-2010-5331] = "fixed-version: Fixed from version 2.6.34rc7" +# CVE-2021-28688 has no known resolution -CVE_STATUS[CVE-2010-5332] = "fixed-version: Fixed from version 2.6.37rc1" +# CVE-2021-28691 has no known resolution -CVE_STATUS[CVE-2011-4098] = "fixed-version: Fixed from version 3.2rc1" +# CVE-2021-28711 has no known resolution -CVE_STATUS[CVE-2011-4131] = "fixed-version: Fixed from version 3.3rc1" +# CVE-2021-28712 has no known resolution -CVE_STATUS[CVE-2011-4915] = "fixed-version: Fixed from version 3.2rc1" +# CVE-2021-28713 has no known resolution -# CVE-2011-4916 has no known resolution +# CVE-2021-28714 has no known resolution -# CVE-2011-4917 has no known resolution +# CVE-2021-28715 has no known resolution -CVE_STATUS[CVE-2011-5321] = "fixed-version: Fixed from version 3.2rc1" +CVE_STATUS[CVE-2021-46904] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2011-5327] = "fixed-version: Fixed from version 3.1rc1" +CVE_STATUS[CVE-2021-46905] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-0957] = "fixed-version: Fixed from version 3.7rc2" +CVE_STATUS[CVE-2021-46906] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-2119] = "fixed-version: Fixed from version 3.5rc1" +CVE_STATUS[CVE-2021-46908] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2012-2136] = "fixed-version: Fixed from version 3.5rc1" +CVE_STATUS[CVE-2021-46909] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2012-2137] = "fixed-version: Fixed from version 3.5rc2" +CVE_STATUS[CVE-2021-46910] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2012-2313] = "fixed-version: Fixed from version 3.4rc6" +CVE_STATUS[CVE-2021-46911] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2012-2319] = "fixed-version: Fixed from version 3.4rc6" +CVE_STATUS[CVE-2021-46912] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2012-2372] = "fixed-version: Fixed from version 3.13rc4" +CVE_STATUS[CVE-2021-46913] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2012-2375] = "fixed-version: Fixed from version 3.4rc1" +CVE_STATUS[CVE-2021-46914] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2012-2390] = "fixed-version: Fixed from version 3.5rc1" +CVE_STATUS[CVE-2021-46915] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2012-2669] = "fixed-version: Fixed from version 3.5rc4" +CVE_STATUS[CVE-2021-46916] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2012-2744] = "fixed-version: Fixed from version 2.6.34rc1" +CVE_STATUS[CVE-2021-46917] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2012-2745] = "fixed-version: Fixed from version 3.4rc3" +CVE_STATUS[CVE-2021-46918] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2012-3364] = "fixed-version: Fixed from version 3.5rc6" +CVE_STATUS[CVE-2021-46919] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2012-3375] = "fixed-version: Fixed from version 3.4rc5" +CVE_STATUS[CVE-2021-46920] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2012-3400] = "fixed-version: Fixed from version 3.5rc5" +CVE_STATUS[CVE-2021-46921] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2012-3412] = "fixed-version: Fixed from version 3.6rc2" +CVE_STATUS[CVE-2021-46922] = "fixed-version: Fixed from version 5.11.17" -CVE_STATUS[CVE-2012-3430] = "fixed-version: Fixed from version 3.6rc1" +CVE_STATUS[CVE-2021-46923] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2012-3510] = "fixed-version: Fixed from version 2.6.19rc4" +CVE_STATUS[CVE-2021-46924] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2012-3511] = "fixed-version: Fixed from version 3.5rc6" +CVE_STATUS[CVE-2021-46925] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2012-3520] = "fixed-version: Fixed from version 3.6rc3" +CVE_STATUS[CVE-2021-46926] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2012-3552] = "fixed-version: Fixed from version 3.0rc1" +CVE_STATUS[CVE-2021-46927] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2012-4220, no affected_versions +CVE_STATUS[CVE-2021-46928] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2012-4221, no affected_versions +CVE_STATUS[CVE-2021-46929] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2012-4222, no affected_versions +CVE_STATUS[CVE-2021-46930] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2012-4398] = "fixed-version: Fixed from version 3.4rc1" +CVE_STATUS[CVE-2021-46931] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2012-4444] = "fixed-version: Fixed from version 2.6.36rc4" +CVE_STATUS[CVE-2021-46932] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2012-4461] = "fixed-version: Fixed from version 3.7rc6" +CVE_STATUS[CVE-2021-46933] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2012-4467] = "fixed-version: Fixed from version 3.6rc5" +CVE_STATUS[CVE-2021-46934] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2012-4508] = "fixed-version: Fixed from version 3.7rc3" +CVE_STATUS[CVE-2021-46935] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2012-4530] = "fixed-version: Fixed from version 3.8rc1" +CVE_STATUS[CVE-2021-46936] = "fixed-version: Fixed from version 5.16" -# CVE-2012-4542 has no known resolution +CVE_STATUS[CVE-2021-46937] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2012-4565] = "fixed-version: Fixed from version 3.7rc4" +CVE_STATUS[CVE-2021-46938] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-5374] = "fixed-version: Fixed from version 3.8rc1" +CVE_STATUS[CVE-2021-46939] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-5375] = "fixed-version: Fixed from version 3.8rc1" +CVE_STATUS[CVE-2021-46940] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-5517] = "fixed-version: Fixed from version 3.6rc1" +CVE_STATUS[CVE-2021-46941] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6536] = "fixed-version: Fixed from version 3.6rc7" +CVE_STATUS[CVE-2021-46942] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6537] = "fixed-version: Fixed from version 3.6rc7" +CVE_STATUS[CVE-2021-46943] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6538] = "fixed-version: Fixed from version 3.6rc7" +CVE_STATUS[CVE-2021-46944] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6539] = "fixed-version: Fixed from version 3.6rc3" +CVE_STATUS[CVE-2021-46945] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6540] = "fixed-version: Fixed from version 3.6rc3" +CVE_STATUS[CVE-2021-46947] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6541] = "fixed-version: Fixed from version 3.6rc3" +CVE_STATUS[CVE-2021-46948] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6542] = "fixed-version: Fixed from version 3.6rc3" +CVE_STATUS[CVE-2021-46949] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6543] = "fixed-version: Fixed from version 3.6rc3" +CVE_STATUS[CVE-2021-46950] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6544] = "fixed-version: Fixed from version 3.6rc3" +CVE_STATUS[CVE-2021-46951] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6545] = "fixed-version: Fixed from version 3.6rc3" +CVE_STATUS[CVE-2021-46952] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6546] = "fixed-version: Fixed from version 3.6rc3" +CVE_STATUS[CVE-2021-46953] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6547] = "fixed-version: Fixed from version 3.6rc1" +CVE_STATUS[CVE-2021-46954] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6548] = "fixed-version: Fixed from version 3.6rc1" +CVE_STATUS[CVE-2021-46955] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6549] = "fixed-version: Fixed from version 3.6rc1" +CVE_STATUS[CVE-2021-46956] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6638] = "fixed-version: Fixed from version 3.3rc1" +CVE_STATUS[CVE-2021-46957] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6647] = "fixed-version: Fixed from version 3.6rc2" +CVE_STATUS[CVE-2021-46958] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6657] = "fixed-version: Fixed from version 3.6" +CVE_STATUS[CVE-2021-46959] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6689] = "fixed-version: Fixed from version 3.6rc5" +CVE_STATUS[CVE-2021-46960] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6701] = "fixed-version: Fixed from version 3.5rc1" +CVE_STATUS[CVE-2021-46961] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6703] = "fixed-version: Fixed from version 3.7rc1" +CVE_STATUS[CVE-2021-46962] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6704] = "fixed-version: Fixed from version 3.5rc1" +CVE_STATUS[CVE-2021-46963] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2012-6712] = "fixed-version: Fixed from version 3.4rc1" +CVE_STATUS[CVE-2021-46964] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-0160] = "fixed-version: Fixed from version 3.9rc1" +CVE_STATUS[CVE-2021-46965] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-0190] = "fixed-version: Fixed from version 3.8rc5" +CVE_STATUS[CVE-2021-46966] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-0216] = "fixed-version: Fixed from version 3.8rc7" +CVE_STATUS[CVE-2021-46967] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-0217] = "fixed-version: Fixed from version 3.8rc7" +CVE_STATUS[CVE-2021-46968] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-0228] = "fixed-version: Fixed from version 3.8" +CVE_STATUS[CVE-2021-46969] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-0231] = "fixed-version: Fixed from version 3.8rc7" +CVE_STATUS[CVE-2021-46970] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-0268] = "fixed-version: Fixed from version 3.8rc6" +CVE_STATUS[CVE-2021-46971] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-0290] = "fixed-version: Fixed from version 3.8" +CVE_STATUS[CVE-2021-46972] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-0309] = "fixed-version: Fixed from version 3.7rc1" +CVE_STATUS[CVE-2021-46973] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-0310] = "fixed-version: Fixed from version 3.5" +CVE_STATUS[CVE-2021-46974] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-0311] = "fixed-version: Fixed from version 3.7rc8" +CVE_STATUS[CVE-2021-46976] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-0313] = "fixed-version: Fixed from version 3.8rc5" +CVE_STATUS[CVE-2021-46977] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-0343] = "fixed-version: Fixed from version 3.11rc7" +CVE_STATUS[CVE-2021-46978] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-0349] = "fixed-version: Fixed from version 3.8rc6" +CVE_STATUS[CVE-2021-46979] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-0871] = "fixed-version: Fixed from version 3.8rc5" +CVE_STATUS[CVE-2021-46980] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-0913] = "fixed-version: Fixed from version 3.9rc4" +CVE_STATUS[CVE-2021-46981] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-0914] = "fixed-version: Fixed from version 3.9rc3" +CVE_STATUS[CVE-2021-46982] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1059] = "fixed-version: Fixed from version 3.11rc1" +CVE_STATUS[CVE-2021-46983] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1763] = "fixed-version: Fixed from version 3.9rc1" +CVE_STATUS[CVE-2021-46984] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1767] = "fixed-version: Fixed from version 3.9rc1" +CVE_STATUS[CVE-2021-46985] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1772] = "fixed-version: Fixed from version 3.5rc1" +CVE_STATUS[CVE-2021-46986] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1773] = "fixed-version: Fixed from version 3.3rc1" +CVE_STATUS[CVE-2021-46987] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1774] = "fixed-version: Fixed from version 3.8rc5" +CVE_STATUS[CVE-2021-46988] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1792] = "fixed-version: Fixed from version 3.9rc3" +CVE_STATUS[CVE-2021-46989] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1796] = "fixed-version: Fixed from version 3.9rc4" +CVE_STATUS[CVE-2021-46990] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1797] = "fixed-version: Fixed from version 3.9rc4" +CVE_STATUS[CVE-2021-46991] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1798] = "fixed-version: Fixed from version 3.9rc4" +CVE_STATUS[CVE-2021-46992] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1819] = "fixed-version: Fixed from version 3.8rc6" +CVE_STATUS[CVE-2021-46993] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1826] = "fixed-version: Fixed from version 3.6rc7" +CVE_STATUS[CVE-2021-46994] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1827] = "fixed-version: Fixed from version 3.6rc3" +CVE_STATUS[CVE-2021-46995] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1828] = "fixed-version: Fixed from version 3.9rc2" +CVE_STATUS[CVE-2021-46996] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1848] = "fixed-version: Fixed from version 3.9rc3" +CVE_STATUS[CVE-2021-46997] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1858] = "fixed-version: Fixed from version 3.9rc3" +CVE_STATUS[CVE-2021-46998] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1860] = "fixed-version: Fixed from version 3.9rc3" +CVE_STATUS[CVE-2021-46999] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1928] = "fixed-version: Fixed from version 3.7rc3" +CVE_STATUS[CVE-2021-47000] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1929] = "fixed-version: Fixed from version 3.9rc6" +CVE_STATUS[CVE-2021-47001] = "fixed-version: Fixed from version 5.13" -# Skipping CVE-2013-1935, no affected_versions +CVE_STATUS[CVE-2021-47002] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1943] = "fixed-version: Fixed from version 3.0rc1" +CVE_STATUS[CVE-2021-47003] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1956] = "fixed-version: Fixed from version 3.9rc5" +CVE_STATUS[CVE-2021-47004] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1957] = "fixed-version: Fixed from version 3.9rc5" +CVE_STATUS[CVE-2021-47005] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1958] = "fixed-version: Fixed from version 3.9rc5" +CVE_STATUS[CVE-2021-47006] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1959] = "fixed-version: Fixed from version 3.9rc7" +CVE_STATUS[CVE-2021-47007] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-1979] = "fixed-version: Fixed from version 3.9rc8" +CVE_STATUS[CVE-2021-47008] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2015] = "fixed-version: Fixed from version 3.8rc2" +CVE_STATUS[CVE-2021-47009] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2017] = "fixed-version: Fixed from version 2.6.34" +CVE_STATUS[CVE-2021-47010] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2058] = "fixed-version: Fixed from version 3.8rc4" +CVE_STATUS[CVE-2021-47011] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2094] = "fixed-version: Fixed from version 3.9rc8" +CVE_STATUS[CVE-2021-47012] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2128] = "fixed-version: Fixed from version 2.6.34rc4" +CVE_STATUS[CVE-2021-47013] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2140] = "fixed-version: Fixed from version 3.11rc3" +CVE_STATUS[CVE-2021-47014] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2141] = "fixed-version: Fixed from version 3.9rc8" +CVE_STATUS[CVE-2021-47015] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2146] = "fixed-version: Fixed from version 3.9rc8" +CVE_STATUS[CVE-2021-47016] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2147] = "fixed-version: Fixed from version 3.12rc3" +CVE_STATUS[CVE-2021-47017] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2148] = "fixed-version: Fixed from version 3.11rc1" +CVE_STATUS[CVE-2021-47018] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2164] = "fixed-version: Fixed from version 3.11rc1" +CVE_STATUS[CVE-2021-47019] = "fixed-version: Fixed from version 5.13" -# Skipping CVE-2013-2188, no affected_versions +CVE_STATUS[CVE-2021-47020] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2206] = "fixed-version: Fixed from version 3.9rc4" +CVE_STATUS[CVE-2021-47021] = "fixed-version: Fixed from version 5.13" -# Skipping CVE-2013-2224, no affected_versions +CVE_STATUS[CVE-2021-47022] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2232] = "fixed-version: Fixed from version 3.10" +CVE_STATUS[CVE-2021-47023] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2234] = "fixed-version: Fixed from version 3.10" +CVE_STATUS[CVE-2021-47024] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2237] = "fixed-version: Fixed from version 3.9rc6" +CVE_STATUS[CVE-2021-47025] = "fixed-version: Fixed from version 5.13" -# Skipping CVE-2013-2239, no affected_versions +CVE_STATUS[CVE-2021-47026] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2546] = "fixed-version: Fixed from version 3.9rc1" +CVE_STATUS[CVE-2021-47027] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2547] = "fixed-version: Fixed from version 3.9rc1" +CVE_STATUS[CVE-2021-47028] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2548] = "fixed-version: Fixed from version 3.9rc1" +CVE_STATUS[CVE-2021-47029] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2596] = "fixed-version: Fixed from version 3.9rc8" +CVE_STATUS[CVE-2021-47030] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2634] = "fixed-version: Fixed from version 3.9rc3" +CVE_STATUS[CVE-2021-47031] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2635] = "fixed-version: Fixed from version 3.9rc3" +CVE_STATUS[CVE-2021-47032] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2636] = "fixed-version: Fixed from version 3.9rc3" +CVE_STATUS[CVE-2021-47033] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2850] = "fixed-version: Fixed from version 3.10rc4" +CVE_STATUS[CVE-2021-47034] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2851] = "fixed-version: Fixed from version 3.11rc1" +CVE_STATUS[CVE-2021-47035] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2852] = "fixed-version: Fixed from version 3.10rc6" +CVE_STATUS[CVE-2021-47036] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2888] = "fixed-version: Fixed from version 3.12rc1" +CVE_STATUS[CVE-2021-47037] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2889] = "fixed-version: Fixed from version 3.12rc2" +CVE_STATUS[CVE-2021-47038] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2890] = "fixed-version: Fixed from version 3.12rc2" +CVE_STATUS[CVE-2021-47039] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2891] = "fixed-version: Fixed from version 3.12rc2" +CVE_STATUS[CVE-2021-47040] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2892] = "fixed-version: Fixed from version 3.12rc1" +CVE_STATUS[CVE-2021-47041] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2893] = "fixed-version: Fixed from version 3.12rc2" +CVE_STATUS[CVE-2021-47042] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2894] = "fixed-version: Fixed from version 3.12rc2" +CVE_STATUS[CVE-2021-47043] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2895] = "fixed-version: Fixed from version 3.12rc2" +CVE_STATUS[CVE-2021-47044] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2896] = "fixed-version: Fixed from version 3.12rc1" +CVE_STATUS[CVE-2021-47045] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2897] = "fixed-version: Fixed from version 3.12rc2" +CVE_STATUS[CVE-2021-47046] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2898] = "fixed-version: Fixed from version 3.12rc1" +CVE_STATUS[CVE-2021-47047] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2899] = "fixed-version: Fixed from version 3.12rc1" +CVE_STATUS[CVE-2021-47048] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2929] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47049] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-2930] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47050] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3076] = "fixed-version: Fixed from version 3.9" +CVE_STATUS[CVE-2021-47051] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3222] = "fixed-version: Fixed from version 3.9rc7" +CVE_STATUS[CVE-2021-47052] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3223] = "fixed-version: Fixed from version 3.9rc7" +CVE_STATUS[CVE-2021-47053] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3224] = "fixed-version: Fixed from version 3.9rc7" +CVE_STATUS[CVE-2021-47054] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3225] = "fixed-version: Fixed from version 3.9rc7" +CVE_STATUS[CVE-2021-47055] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3226] = "fixed-version: Fixed from version 3.9rc7" +CVE_STATUS[CVE-2021-47056] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3227] = "fixed-version: Fixed from version 3.9rc7" +CVE_STATUS[CVE-2021-47057] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3228] = "fixed-version: Fixed from version 3.9rc7" +CVE_STATUS[CVE-2021-47058] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3229] = "fixed-version: Fixed from version 3.9rc7" +CVE_STATUS[CVE-2021-47059] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3230] = "fixed-version: Fixed from version 3.9rc7" +CVE_STATUS[CVE-2021-47060] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3231] = "fixed-version: Fixed from version 3.9rc7" +CVE_STATUS[CVE-2021-47061] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3232] = "fixed-version: Fixed from version 3.9rc7" +CVE_STATUS[CVE-2021-47062] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3233] = "fixed-version: Fixed from version 3.9rc7" +CVE_STATUS[CVE-2021-47063] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3234] = "fixed-version: Fixed from version 3.9rc7" +CVE_STATUS[CVE-2021-47064] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3235] = "fixed-version: Fixed from version 3.9rc7" +CVE_STATUS[CVE-2021-47065] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3236] = "fixed-version: Fixed from version 3.9rc7" +CVE_STATUS[CVE-2021-47066] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3237] = "fixed-version: Fixed from version 3.9rc7" +CVE_STATUS[CVE-2021-47067] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3301] = "fixed-version: Fixed from version 3.9rc7" +CVE_STATUS[CVE-2021-47068] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-3302] = "fixed-version: Fixed from version 3.8rc3" +CVE_STATUS[CVE-2021-47069] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-4125] = "fixed-version: Fixed from version 3.11rc1" +CVE_STATUS[CVE-2021-47070] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-4127] = "fixed-version: Fixed from version 3.11rc1" +CVE_STATUS[CVE-2021-47071] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-4129] = "fixed-version: Fixed from version 3.11rc1" +CVE_STATUS[CVE-2021-47072] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-4162] = "fixed-version: Fixed from version 3.11rc1" +CVE_STATUS[CVE-2021-47073] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-4163] = "fixed-version: Fixed from version 3.11rc1" +CVE_STATUS[CVE-2021-47074] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-4205] = "fixed-version: Fixed from version 3.11rc5" +CVE_STATUS[CVE-2021-47075] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-4220] = "fixed-version: Fixed from version 3.10rc4" +CVE_STATUS[CVE-2021-47076] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-4247] = "fixed-version: Fixed from version 3.10rc5" +CVE_STATUS[CVE-2021-47077] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-4254] = "fixed-version: Fixed from version 3.11rc6" +CVE_STATUS[CVE-2021-47078] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-4270] = "fixed-version: Fixed from version 3.12rc4" +CVE_STATUS[CVE-2021-47079] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-4299] = "fixed-version: Fixed from version 3.12rc6" +CVE_STATUS[CVE-2021-47080] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-4300] = "fixed-version: Fixed from version 3.11" +CVE_STATUS[CVE-2021-47081] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-4312] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47082] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4343] = "fixed-version: Fixed from version 3.12rc2" +CVE_STATUS[CVE-2021-47083] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4345] = "fixed-version: Fixed from version 3.13rc2" +CVE_STATUS[CVE-2021-47086] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4348] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47087] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4350] = "fixed-version: Fixed from version 3.12rc2" +CVE_STATUS[CVE-2021-47088] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4387] = "fixed-version: Fixed from version 3.12rc4" +CVE_STATUS[CVE-2021-47089] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4470] = "fixed-version: Fixed from version 3.12rc7" +CVE_STATUS[CVE-2021-47090] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4483] = "fixed-version: Fixed from version 3.10rc1" +CVE_STATUS[CVE-2021-47091] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4511] = "fixed-version: Fixed from version 3.12" +CVE_STATUS[CVE-2021-47092] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4512] = "fixed-version: Fixed from version 3.12" +CVE_STATUS[CVE-2021-47093] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4513] = "fixed-version: Fixed from version 3.12" +CVE_STATUS[CVE-2021-47094] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4514] = "fixed-version: Fixed from version 3.12" +CVE_STATUS[CVE-2021-47095] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4515] = "fixed-version: Fixed from version 3.12" +CVE_STATUS[CVE-2021-47096] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4516] = "fixed-version: Fixed from version 3.12" +CVE_STATUS[CVE-2021-47097] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4563] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47098] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4579] = "fixed-version: Fixed from version 3.13rc7" +CVE_STATUS[CVE-2021-47099] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4587] = "fixed-version: Fixed from version 3.13rc4" +CVE_STATUS[CVE-2021-47100] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4588] = "fixed-version: Fixed from version 2.6.33rc4" +CVE_STATUS[CVE-2021-47101] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4591] = "fixed-version: Fixed from version 3.8rc1" +CVE_STATUS[CVE-2021-47102] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-4592] = "fixed-version: Fixed from version 3.7rc1" +CVE_STATUS[CVE-2021-47103] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2013-4737, no affected_versions +CVE_STATUS[CVE-2021-47104] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2013-4738, no affected_versions +CVE_STATUS[CVE-2021-47105] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2013-4739, no affected_versions +CVE_STATUS[CVE-2021-47106] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-5634] = "fixed-version: Fixed from version 3.10rc5" +CVE_STATUS[CVE-2021-47107] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-6282] = "fixed-version: Fixed from version 3.6rc6" +CVE_STATUS[CVE-2021-47108] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2013-6367] = "fixed-version: Fixed from version 3.13rc4" +CVE_STATUS[CVE-2021-47109] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-6368] = "fixed-version: Fixed from version 3.13rc4" +CVE_STATUS[CVE-2021-47110] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-6376] = "fixed-version: Fixed from version 3.13rc4" +CVE_STATUS[CVE-2021-47111] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-6378] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47112] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-6380] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47113] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-6381] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47114] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-6382] = "fixed-version: Fixed from version 3.13rc4" +CVE_STATUS[CVE-2021-47116] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-6383] = "fixed-version: Fixed from version 3.12" +CVE_STATUS[CVE-2021-47117] = "fixed-version: Fixed from version 5.13" -# Skipping CVE-2013-6392, no affected_versions +CVE_STATUS[CVE-2021-47118] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-6431] = "fixed-version: Fixed from version 3.12rc1" +CVE_STATUS[CVE-2021-47119] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-6432] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47120] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-6885] = "fixed-version: Fixed from version 3.14rc1" +CVE_STATUS[CVE-2021-47121] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-7026] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47122] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-7027] = "fixed-version: Fixed from version 3.12rc7" +CVE_STATUS[CVE-2021-47123] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-7263] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47124] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-7264] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47125] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-7265] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47126] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-7266] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47127] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-7267] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47128] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-7268] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47129] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-7269] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47130] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-7270] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47131] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-7271] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47132] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-7281] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47133] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-7339] = "fixed-version: Fixed from version 3.13rc7" +CVE_STATUS[CVE-2021-47134] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-7348] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47135] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-7421] = "fixed-version: Fixed from version 3.19rc1" +CVE_STATUS[CVE-2021-47136] = "fixed-version: Fixed from version 5.13" -# CVE-2013-7445 has no known resolution +CVE_STATUS[CVE-2021-47137] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-7446] = "fixed-version: Fixed from version 4.4rc4" +CVE_STATUS[CVE-2021-47138] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2013-7470] = "fixed-version: Fixed from version 3.12rc7" +CVE_STATUS[CVE-2021-47139] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-0038] = "fixed-version: Fixed from version 3.14rc1" +CVE_STATUS[CVE-2021-47140] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-0049] = "fixed-version: Fixed from version 3.14rc5" +CVE_STATUS[CVE-2021-47141] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-0055] = "fixed-version: Fixed from version 3.14" +CVE_STATUS[CVE-2021-47142] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-0069] = "fixed-version: Fixed from version 3.14rc4" +CVE_STATUS[CVE-2021-47143] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-0077] = "fixed-version: Fixed from version 3.14" +CVE_STATUS[CVE-2021-47145] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-0100] = "fixed-version: Fixed from version 3.14rc7" +CVE_STATUS[CVE-2021-47146] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-0101] = "fixed-version: Fixed from version 3.14rc6" +CVE_STATUS[CVE-2021-47147] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-0102] = "fixed-version: Fixed from version 3.14rc6" +CVE_STATUS[CVE-2021-47148] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-0131] = "fixed-version: Fixed from version 3.14rc7" +CVE_STATUS[CVE-2021-47149] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-0155] = "fixed-version: Fixed from version 3.15rc2" +CVE_STATUS[CVE-2021-47150] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-0181] = "fixed-version: Fixed from version 3.15rc5" +CVE_STATUS[CVE-2021-47151] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-0196] = "fixed-version: Fixed from version 3.15rc5" +CVE_STATUS[CVE-2021-47152] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-0203] = "fixed-version: Fixed from version 2.6.33rc5" +CVE_STATUS[CVE-2021-47153] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-0205] = "fixed-version: Fixed from version 2.6.37rc1" +CVE_STATUS[CVE-2021-47158] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-0206] = "fixed-version: Fixed from version 3.16rc3" +CVE_STATUS[CVE-2021-47159] = "fixed-version: Fixed from version 5.13" -# Skipping CVE-2014-0972, no affected_versions +CVE_STATUS[CVE-2021-47160] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-1438] = "fixed-version: Fixed from version 3.13" +CVE_STATUS[CVE-2021-47161] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-1444] = "fixed-version: Fixed from version 3.12rc7" +CVE_STATUS[CVE-2021-47162] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-1445] = "fixed-version: Fixed from version 3.12rc7" +CVE_STATUS[CVE-2021-47163] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-1446] = "fixed-version: Fixed from version 3.13rc7" +CVE_STATUS[CVE-2021-47164] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-1690] = "fixed-version: Fixed from version 3.13rc8" +CVE_STATUS[CVE-2021-47165] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-1737] = "fixed-version: Fixed from version 3.15rc5" +CVE_STATUS[CVE-2021-47166] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-1738] = "fixed-version: Fixed from version 3.15rc5" +CVE_STATUS[CVE-2021-47167] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-1739] = "fixed-version: Fixed from version 3.15rc6" +CVE_STATUS[CVE-2021-47168] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-1874] = "fixed-version: Fixed from version 3.14rc2" +CVE_STATUS[CVE-2021-47169] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-2038] = "fixed-version: Fixed from version 3.14rc1" +CVE_STATUS[CVE-2021-47170] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-2039] = "fixed-version: Fixed from version 3.14rc3" +CVE_STATUS[CVE-2021-47171] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-2309] = "fixed-version: Fixed from version 3.14rc7" +CVE_STATUS[CVE-2021-47172] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-2523] = "fixed-version: Fixed from version 3.14rc1" +CVE_STATUS[CVE-2021-47173] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-2568] = "fixed-version: Fixed from version 3.14" +CVE_STATUS[CVE-2021-47174] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-2580] = "fixed-version: Fixed from version 3.15rc1" +CVE_STATUS[CVE-2021-47175] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-2672] = "fixed-version: Fixed from version 3.14rc6" +CVE_STATUS[CVE-2021-47176] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-2673] = "fixed-version: Fixed from version 3.14rc6" +CVE_STATUS[CVE-2021-47177] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-2678] = "fixed-version: Fixed from version 3.15rc1" +CVE_STATUS[CVE-2021-47178] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-2706] = "fixed-version: Fixed from version 3.14rc6" +CVE_STATUS[CVE-2021-47179] = "fixed-version: Fixed from version 5.12.9" -CVE_STATUS[CVE-2014-2739] = "fixed-version: Fixed from version 3.15rc1" +CVE_STATUS[CVE-2021-47180] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-2851] = "fixed-version: Fixed from version 3.15rc2" +CVE_STATUS[CVE-2021-47181] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-2889] = "fixed-version: Fixed from version 3.2rc7" +CVE_STATUS[CVE-2021-47182] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3122] = "fixed-version: Fixed from version 3.15rc1" +CVE_STATUS[CVE-2021-47183] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3144] = "fixed-version: Fixed from version 3.15rc2" +CVE_STATUS[CVE-2021-47184] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3145] = "fixed-version: Fixed from version 3.15rc2" +CVE_STATUS[CVE-2021-47185] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3153] = "fixed-version: Fixed from version 3.15" +CVE_STATUS[CVE-2021-47186] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3180] = "fixed-version: Fixed from version 3.17rc4" +CVE_STATUS[CVE-2021-47187] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3181] = "fixed-version: Fixed from version 3.17rc3" +CVE_STATUS[CVE-2021-47188] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3182] = "fixed-version: Fixed from version 3.17rc2" +CVE_STATUS[CVE-2021-47189] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3183] = "fixed-version: Fixed from version 3.17rc2" +CVE_STATUS[CVE-2021-47190] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3184] = "fixed-version: Fixed from version 3.17rc2" +CVE_STATUS[CVE-2021-47191] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3185] = "fixed-version: Fixed from version 3.17rc3" +CVE_STATUS[CVE-2021-47192] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3186] = "fixed-version: Fixed from version 3.17rc3" +CVE_STATUS[CVE-2021-47193] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2014-3519, no affected_versions +CVE_STATUS[CVE-2021-47194] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3534] = "fixed-version: Fixed from version 3.16rc7" +CVE_STATUS[CVE-2021-47195] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3535] = "fixed-version: Fixed from version 2.6.36rc1" +CVE_STATUS[CVE-2021-47196] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3601] = "fixed-version: Fixed from version 3.17rc2" +CVE_STATUS[CVE-2021-47197] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3610] = "fixed-version: Fixed from version 3.18rc2" +CVE_STATUS[CVE-2021-47198] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3611] = "fixed-version: Fixed from version 3.18rc2" +CVE_STATUS[CVE-2021-47199] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3631] = "fixed-version: Fixed from version 3.17rc5" +CVE_STATUS[CVE-2021-47200] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3645] = "fixed-version: Fixed from version 3.12rc1" +CVE_STATUS[CVE-2021-47201] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3646] = "fixed-version: Fixed from version 3.18rc2" +CVE_STATUS[CVE-2021-47202] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3647] = "fixed-version: Fixed from version 3.18rc2" +CVE_STATUS[CVE-2021-47203] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3673] = "fixed-version: Fixed from version 3.18rc1" +CVE_STATUS[CVE-2021-47204] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3687] = "fixed-version: Fixed from version 3.18rc1" +CVE_STATUS[CVE-2021-47205] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3688] = "fixed-version: Fixed from version 3.18rc1" +CVE_STATUS[CVE-2021-47206] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3690] = "fixed-version: Fixed from version 3.18rc1" +CVE_STATUS[CVE-2021-47207] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3917] = "fixed-version: Fixed from version 3.16rc1" +CVE_STATUS[CVE-2021-47209] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-3940] = "fixed-version: Fixed from version 3.15" +CVE_STATUS[CVE-2021-47210] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-4014] = "fixed-version: Fixed from version 3.16rc1" +CVE_STATUS[CVE-2021-47211] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-4027] = "fixed-version: Fixed from version 3.14rc1" +CVE_STATUS[CVE-2021-47212] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-4157] = "fixed-version: Fixed from version 3.15rc1" +CVE_STATUS[CVE-2021-47214] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-4171] = "fixed-version: Fixed from version 3.16rc3" +CVE_STATUS[CVE-2021-47215] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2014-4322, no affected_versions +CVE_STATUS[CVE-2021-47216] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2014-4323, no affected_versions +CVE_STATUS[CVE-2021-47217] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-4508] = "fixed-version: Fixed from version 3.16rc3" +CVE_STATUS[CVE-2021-47218] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-4608] = "fixed-version: Fixed from version 3.18rc1" +CVE_STATUS[CVE-2021-47219] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2014-4611] = "fixed-version: Fixed from version 3.16rc3" +CVE_STATUS[CVE-2021-47221] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-4652] = "fixed-version: Fixed from version 3.16rc2" +CVE_STATUS[CVE-2021-47222] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-4653] = "fixed-version: Fixed from version 3.16rc2" +CVE_STATUS[CVE-2021-47223] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-4654] = "fixed-version: Fixed from version 3.16rc2" +CVE_STATUS[CVE-2021-47224] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-4655] = "fixed-version: Fixed from version 3.16rc2" +CVE_STATUS[CVE-2021-47225] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-4656] = "fixed-version: Fixed from version 3.16rc2" +CVE_STATUS[CVE-2021-47226] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-4667] = "fixed-version: Fixed from version 3.16rc1" +CVE_STATUS[CVE-2021-47227] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-4699] = "fixed-version: Fixed from version 3.16rc4" +CVE_STATUS[CVE-2021-47228] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-4943] = "fixed-version: Fixed from version 3.16rc6" +CVE_STATUS[CVE-2021-47229] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-5045] = "fixed-version: Fixed from version 3.16rc7" +CVE_STATUS[CVE-2021-47230] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-5077] = "fixed-version: Fixed from version 3.16" +CVE_STATUS[CVE-2021-47231] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-5206] = "fixed-version: Fixed from version 3.17rc1" +CVE_STATUS[CVE-2021-47232] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-5207] = "fixed-version: Fixed from version 3.17rc1" +CVE_STATUS[CVE-2021-47233] = "fixed-version: Fixed from version 5.13" -# Skipping CVE-2014-5332, no affected_versions +CVE_STATUS[CVE-2021-47234] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-5471] = "fixed-version: Fixed from version 3.17rc2" +CVE_STATUS[CVE-2021-47235] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-5472] = "fixed-version: Fixed from version 3.17rc2" +CVE_STATUS[CVE-2021-47236] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-6410] = "fixed-version: Fixed from version 3.17rc5" +CVE_STATUS[CVE-2021-47237] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-6416] = "fixed-version: Fixed from version 3.17rc5" +CVE_STATUS[CVE-2021-47238] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-6417] = "fixed-version: Fixed from version 3.17rc5" +CVE_STATUS[CVE-2021-47239] = "fixed-version: Fixed from version 5.12.13" -CVE_STATUS[CVE-2014-6418] = "fixed-version: Fixed from version 3.17rc5" +CVE_STATUS[CVE-2021-47240] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-7145] = "fixed-version: Fixed from version 3.17rc2" +CVE_STATUS[CVE-2021-47241] = "fixed-version: Fixed from version 5.13" -# Skipping CVE-2014-7207, no affected_versions +CVE_STATUS[CVE-2021-47242] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-7283] = "fixed-version: Fixed from version 3.15rc1" +CVE_STATUS[CVE-2021-47243] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-7284] = "fixed-version: Fixed from version 3.15rc7" +CVE_STATUS[CVE-2021-47244] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-7822] = "fixed-version: Fixed from version 3.16rc1" +CVE_STATUS[CVE-2021-47245] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-7825] = "fixed-version: Fixed from version 3.18rc3" +CVE_STATUS[CVE-2021-47246] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-7826] = "fixed-version: Fixed from version 3.18rc3" +CVE_STATUS[CVE-2021-47247] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-7841] = "fixed-version: Fixed from version 3.18rc5" +CVE_STATUS[CVE-2021-47248] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-7842] = "fixed-version: Fixed from version 3.18rc1" +CVE_STATUS[CVE-2021-47249] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-7843] = "fixed-version: Fixed from version 3.18rc5" +CVE_STATUS[CVE-2021-47250] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-7970] = "fixed-version: Fixed from version 3.18rc1" +CVE_STATUS[CVE-2021-47251] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-7975] = "fixed-version: Fixed from version 3.18rc1" +CVE_STATUS[CVE-2021-47252] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-8086] = "fixed-version: Fixed from version 3.18rc3" +CVE_STATUS[CVE-2021-47253] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-8133] = "fixed-version: Fixed from version 3.19rc1" +CVE_STATUS[CVE-2021-47254] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-8134] = "fixed-version: Fixed from version 3.19rc1" +CVE_STATUS[CVE-2021-47255] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-8159] = "fixed-version: Fixed from version 4.0rc7" +CVE_STATUS[CVE-2021-47256] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-8160] = "fixed-version: Fixed from version 3.18rc1" +CVE_STATUS[CVE-2021-47257] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-8171] = "fixed-version: Fixed from version 3.12rc1" +CVE_STATUS[CVE-2021-47258] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-8172] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47259] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-8173] = "fixed-version: Fixed from version 3.13rc5" +CVE_STATUS[CVE-2021-47260] = "fixed-version: Fixed from version 5.13" -# Skipping CVE-2014-8181, no affected_versions +CVE_STATUS[CVE-2021-47261] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-8369] = "fixed-version: Fixed from version 3.18rc2" +CVE_STATUS[CVE-2021-47262] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-8480] = "fixed-version: Fixed from version 3.18rc2" +CVE_STATUS[CVE-2021-47263] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-8481] = "fixed-version: Fixed from version 3.18rc2" +CVE_STATUS[CVE-2021-47264] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-8559] = "fixed-version: Fixed from version 3.19rc1" +CVE_STATUS[CVE-2021-47265] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-8709] = "fixed-version: Fixed from version 3.14rc3" +CVE_STATUS[CVE-2021-47266] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-8884] = "fixed-version: Fixed from version 3.18rc1" +CVE_STATUS[CVE-2021-47267] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-8989] = "fixed-version: Fixed from version 3.19rc1" +CVE_STATUS[CVE-2021-47268] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-9090] = "fixed-version: Fixed from version 3.18rc6" +CVE_STATUS[CVE-2021-47269] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-9322] = "fixed-version: Fixed from version 3.18rc6" +CVE_STATUS[CVE-2021-47270] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-9419] = "fixed-version: Fixed from version 3.19rc1" +CVE_STATUS[CVE-2021-47271] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-9420] = "fixed-version: Fixed from version 3.19rc1" +CVE_STATUS[CVE-2021-47272] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-9428] = "fixed-version: Fixed from version 3.19rc3" +CVE_STATUS[CVE-2021-47273] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-9529] = "fixed-version: Fixed from version 3.19rc4" +CVE_STATUS[CVE-2021-47274] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-9584] = "fixed-version: Fixed from version 3.19rc3" +CVE_STATUS[CVE-2021-47275] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-9585] = "fixed-version: Fixed from version 3.19rc4" +CVE_STATUS[CVE-2021-47276] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-9644] = "fixed-version: Fixed from version 3.19rc1" +CVE_STATUS[CVE-2021-47277] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-9683] = "fixed-version: Fixed from version 3.19rc1" +CVE_STATUS[CVE-2021-47278] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-9710] = "fixed-version: Fixed from version 3.19rc1" +CVE_STATUS[CVE-2021-47279] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-9715] = "fixed-version: Fixed from version 3.15rc1" +CVE_STATUS[CVE-2021-47280] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-9717] = "fixed-version: Fixed from version 4.1rc1" +CVE_STATUS[CVE-2021-47281] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-9728] = "fixed-version: Fixed from version 3.19rc3" +CVE_STATUS[CVE-2021-47282] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-9729] = "fixed-version: Fixed from version 3.19rc3" +CVE_STATUS[CVE-2021-47283] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-9730] = "fixed-version: Fixed from version 3.19rc3" +CVE_STATUS[CVE-2021-47284] = "fixed-version: Fixed from version 5.13" -CVE_STATUS[CVE-2014-9731] = "fixed-version: Fixed from version 3.19rc3" +CVE_STATUS[CVE-2021-47286] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9777, no affected_versions +CVE_STATUS[CVE-2021-47287] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9778, no affected_versions +CVE_STATUS[CVE-2021-47288] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9779, no affected_versions +CVE_STATUS[CVE-2021-47289] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9780, no affected_versions +CVE_STATUS[CVE-2021-47290] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9781, no affected_versions +CVE_STATUS[CVE-2021-47291] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9782, no affected_versions +CVE_STATUS[CVE-2021-47292] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9783, no affected_versions +CVE_STATUS[CVE-2021-47293] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9784, no affected_versions +CVE_STATUS[CVE-2021-47294] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9785, no affected_versions +CVE_STATUS[CVE-2021-47295] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9786, no affected_versions +CVE_STATUS[CVE-2021-47296] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9787, no affected_versions +CVE_STATUS[CVE-2021-47297] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9788, no affected_versions +CVE_STATUS[CVE-2021-47298] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9789, no affected_versions +CVE_STATUS[CVE-2021-47299] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2014-9803] = "fixed-version: Fixed from version 3.16rc1" +CVE_STATUS[CVE-2021-47300] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9863, no affected_versions +CVE_STATUS[CVE-2021-47301] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9864, no affected_versions +CVE_STATUS[CVE-2021-47302] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9865, no affected_versions +CVE_STATUS[CVE-2021-47303] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9866, no affected_versions +CVE_STATUS[CVE-2021-47304] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9867, no affected_versions +CVE_STATUS[CVE-2021-47305] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9868, no affected_versions +CVE_STATUS[CVE-2021-47306] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9869, no affected_versions +CVE_STATUS[CVE-2021-47307] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2014-9870] = "fixed-version: Fixed from version 3.11rc1" +CVE_STATUS[CVE-2021-47308] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9871, no affected_versions +CVE_STATUS[CVE-2021-47309] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9872, no affected_versions +CVE_STATUS[CVE-2021-47310] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9873, no affected_versions +CVE_STATUS[CVE-2021-47311] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9874, no affected_versions +CVE_STATUS[CVE-2021-47312] = "fixed-version: Fixed from version 5.13.5" -# Skipping CVE-2014-9875, no affected_versions +CVE_STATUS[CVE-2021-47313] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9876, no affected_versions +CVE_STATUS[CVE-2021-47314] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9877, no affected_versions +CVE_STATUS[CVE-2021-47315] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9878, no affected_versions +CVE_STATUS[CVE-2021-47316] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9879, no affected_versions +CVE_STATUS[CVE-2021-47317] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9880, no affected_versions +CVE_STATUS[CVE-2021-47318] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9881, no affected_versions +CVE_STATUS[CVE-2021-47319] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9882, no affected_versions +CVE_STATUS[CVE-2021-47320] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9883, no affected_versions +CVE_STATUS[CVE-2021-47321] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9884, no affected_versions +CVE_STATUS[CVE-2021-47322] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9885, no affected_versions +CVE_STATUS[CVE-2021-47323] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9886, no affected_versions +CVE_STATUS[CVE-2021-47324] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9887, no affected_versions +CVE_STATUS[CVE-2021-47325] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2014-9888] = "fixed-version: Fixed from version 3.13rc1" +CVE_STATUS[CVE-2021-47327] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9889, no affected_versions +CVE_STATUS[CVE-2021-47328] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9890, no affected_versions +CVE_STATUS[CVE-2021-47329] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9891, no affected_versions +CVE_STATUS[CVE-2021-47330] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9892, no affected_versions +CVE_STATUS[CVE-2021-47331] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9893, no affected_versions +CVE_STATUS[CVE-2021-47332] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9894, no affected_versions +CVE_STATUS[CVE-2021-47333] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2014-9895] = "fixed-version: Fixed from version 3.11rc1" +CVE_STATUS[CVE-2021-47334] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9896, no affected_versions +CVE_STATUS[CVE-2021-47335] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9897, no affected_versions +CVE_STATUS[CVE-2021-47336] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9898, no affected_versions +CVE_STATUS[CVE-2021-47337] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9899, no affected_versions +CVE_STATUS[CVE-2021-47338] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2014-9900, no affected_versions +CVE_STATUS[CVE-2021-47339] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2014-9903] = "fixed-version: Fixed from version 3.14rc4" +CVE_STATUS[CVE-2021-47340] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2014-9904] = "fixed-version: Fixed from version 3.17rc1" +CVE_STATUS[CVE-2021-47341] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2014-9914] = "fixed-version: Fixed from version 3.16rc1" +CVE_STATUS[CVE-2021-47342] = "fixed-version: Fixed from version 5.10.77" -CVE_STATUS[CVE-2014-9922] = "fixed-version: Fixed from version 3.18rc2" +CVE_STATUS[CVE-2021-47343] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2014-9940] = "fixed-version: Fixed from version 3.19rc1" +CVE_STATUS[CVE-2021-47344] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2015-0239] = "fixed-version: Fixed from version 3.19rc6" +CVE_STATUS[CVE-2021-47345] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2015-0274] = "fixed-version: Fixed from version 3.15rc5" +CVE_STATUS[CVE-2021-47346] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2015-0275] = "fixed-version: Fixed from version 4.1rc1" +CVE_STATUS[CVE-2021-47347] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2015-0777, no affected_versions +CVE_STATUS[CVE-2021-47348] = "fixed-version: Fixed from version 5.14" -# Skipping CVE-2015-1328, no affected_versions +CVE_STATUS[CVE-2021-47349] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2015-1333] = "fixed-version: Fixed from version 4.2rc5" +CVE_STATUS[CVE-2021-47350] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2015-1339] = "fixed-version: Fixed from version 4.4rc5" +CVE_STATUS[CVE-2021-47351] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2015-1350] = "fixed-version: Fixed from version 4.9rc1" +CVE_STATUS[CVE-2021-47352] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2015-1420] = "fixed-version: Fixed from version 4.1rc7" +CVE_STATUS[CVE-2021-47353] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2015-1421] = "fixed-version: Fixed from version 3.19rc7" +CVE_STATUS[CVE-2021-47354] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2015-1465] = "fixed-version: Fixed from version 3.19rc7" +CVE_STATUS[CVE-2021-47355] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2015-1573] = "fixed-version: Fixed from version 3.19rc5" +CVE_STATUS[CVE-2021-47356] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2015-1593] = "fixed-version: Fixed from version 4.0rc1" +CVE_STATUS[CVE-2021-47357] = "fixed-version: Fixed from version 5.14" -CVE_STATUS[CVE-2015-1805] = "fixed-version: Fixed from version 3.16rc1" +CVE_STATUS[CVE-2021-47358] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-2041] = "fixed-version: Fixed from version 3.19rc7" +CVE_STATUS[CVE-2021-47359] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-2042] = "fixed-version: Fixed from version 3.19" +CVE_STATUS[CVE-2021-47360] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-2150] = "fixed-version: Fixed from version 4.0rc4" +CVE_STATUS[CVE-2021-47361] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-2666] = "fixed-version: Fixed from version 4.0rc1" +CVE_STATUS[CVE-2021-47362] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-2672] = "fixed-version: Fixed from version 4.0rc3" +CVE_STATUS[CVE-2021-47363] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-2686] = "fixed-version: Fixed from version 4.0rc6" +CVE_STATUS[CVE-2021-47364] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-2830] = "fixed-version: Fixed from version 4.0rc3" +CVE_STATUS[CVE-2021-47365] = "fixed-version: Fixed from version 5.15" -# CVE-2015-2877 has no known resolution +CVE_STATUS[CVE-2021-47366] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-2922] = "fixed-version: Fixed from version 4.0rc7" +CVE_STATUS[CVE-2021-47367] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-2925] = "fixed-version: Fixed from version 4.3rc1" +CVE_STATUS[CVE-2021-47368] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-3212] = "fixed-version: Fixed from version 4.2rc1" +CVE_STATUS[CVE-2021-47369] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-3214] = "fixed-version: Fixed from version 2.6.33rc8" +CVE_STATUS[CVE-2021-47370] = "fixed-version: Fixed from version 5.14.9" -CVE_STATUS[CVE-2015-3288] = "fixed-version: Fixed from version 4.2rc2" +CVE_STATUS[CVE-2021-47371] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-3290] = "fixed-version: Fixed from version 4.2rc3" +CVE_STATUS[CVE-2021-47372] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-3291] = "fixed-version: Fixed from version 4.2rc3" +CVE_STATUS[CVE-2021-47373] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-3331] = "fixed-version: Fixed from version 4.0rc5" +CVE_STATUS[CVE-2021-47374] = "fixed-version: Fixed from version 5.15" -# Skipping CVE-2015-3332, no affected_versions +CVE_STATUS[CVE-2021-47375] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-3339] = "fixed-version: Fixed from version 4.1rc1" +CVE_STATUS[CVE-2021-47376] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-3636] = "fixed-version: Fixed from version 4.1rc2" +CVE_STATUS[CVE-2021-47378] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-4001] = "fixed-version: Fixed from version 4.1rc7" +CVE_STATUS[CVE-2021-47379] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-4002] = "fixed-version: Fixed from version 4.1rc7" +CVE_STATUS[CVE-2021-47380] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-4003] = "fixed-version: Fixed from version 4.1rc7" +CVE_STATUS[CVE-2021-47381] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-4004] = "fixed-version: Fixed from version 4.3rc1" +CVE_STATUS[CVE-2021-47382] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-4036] = "fixed-version: Fixed from version 4.0rc1" +CVE_STATUS[CVE-2021-47383] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-4167] = "fixed-version: Fixed from version 4.0rc1" +CVE_STATUS[CVE-2021-47384] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-4170] = "fixed-version: Fixed from version 3.13rc5" +CVE_STATUS[CVE-2021-47385] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-4176] = "fixed-version: Fixed from version 4.1rc1" +CVE_STATUS[CVE-2021-47386] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-4177] = "fixed-version: Fixed from version 4.1rc1" +CVE_STATUS[CVE-2021-47387] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-4178] = "fixed-version: Fixed from version 4.1rc1" +CVE_STATUS[CVE-2021-47388] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-4692] = "fixed-version: Fixed from version 4.2rc1" +CVE_STATUS[CVE-2021-47389] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-4700] = "fixed-version: Fixed from version 4.1rc6" +CVE_STATUS[CVE-2021-47390] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-5156] = "fixed-version: Fixed from version 4.2rc7" +CVE_STATUS[CVE-2021-47391] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-5157] = "fixed-version: Fixed from version 4.2rc3" +CVE_STATUS[CVE-2021-47392] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-5257] = "fixed-version: Fixed from version 4.3rc3" +CVE_STATUS[CVE-2021-47393] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-5283] = "fixed-version: Fixed from version 4.3rc3" +CVE_STATUS[CVE-2021-47394] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-5307] = "fixed-version: Fixed from version 4.4rc1" +CVE_STATUS[CVE-2021-47395] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-5327] = "fixed-version: Fixed from version 4.4rc1" +CVE_STATUS[CVE-2021-47396] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-5364] = "fixed-version: Fixed from version 4.1rc7" +CVE_STATUS[CVE-2021-47397] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-5366] = "fixed-version: Fixed from version 4.1rc7" +CVE_STATUS[CVE-2021-47398] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-5697] = "fixed-version: Fixed from version 4.2rc6" +CVE_STATUS[CVE-2021-47399] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-5706] = "fixed-version: Fixed from version 4.1rc3" +CVE_STATUS[CVE-2021-47400] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-5707] = "fixed-version: Fixed from version 4.1rc1" +CVE_STATUS[CVE-2021-47401] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-6252] = "fixed-version: Fixed from version 4.2rc5" +CVE_STATUS[CVE-2021-47402] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-6526] = "fixed-version: Fixed from version 4.1rc1" +CVE_STATUS[CVE-2021-47403] = "fixed-version: Fixed from version 5.15" -# CVE-2015-6619 has no known resolution +CVE_STATUS[CVE-2021-47404] = "fixed-version: Fixed from version 5.15" -# CVE-2015-6646 has no known resolution +CVE_STATUS[CVE-2021-47405] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-6937] = "fixed-version: Fixed from version 4.3rc1" +CVE_STATUS[CVE-2021-47406] = "fixed-version: Fixed from version 5.15" -# Skipping CVE-2015-7312, no affected_versions +CVE_STATUS[CVE-2021-47407] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-7509] = "fixed-version: Fixed from version 3.7rc1" +CVE_STATUS[CVE-2021-47408] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-7513] = "fixed-version: Fixed from version 4.4rc7" +CVE_STATUS[CVE-2021-47409] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-7515] = "fixed-version: Fixed from version 4.4rc6" +CVE_STATUS[CVE-2021-47410] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-7550] = "fixed-version: Fixed from version 4.4rc8" +CVE_STATUS[CVE-2021-47412] = "fixed-version: Fixed from version 5.15" -# Skipping CVE-2015-7553, no affected_versions +CVE_STATUS[CVE-2021-47413] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-7566] = "fixed-version: Fixed from version 4.5rc2" +CVE_STATUS[CVE-2021-47414] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-7613] = "fixed-version: Fixed from version 4.3rc4" +CVE_STATUS[CVE-2021-47415] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-7799] = "fixed-version: Fixed from version 4.4rc1" +CVE_STATUS[CVE-2021-47416] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-7833] = "fixed-version: Fixed from version 4.6rc6" +CVE_STATUS[CVE-2021-47417] = "fixed-version: Fixed from version 5.15" -# Skipping CVE-2015-7837, no affected_versions +CVE_STATUS[CVE-2021-47418] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-7872] = "fixed-version: Fixed from version 4.3rc7" +CVE_STATUS[CVE-2021-47419] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-7884] = "fixed-version: Fixed from version 4.4rc1" +CVE_STATUS[CVE-2021-47420] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-7885] = "fixed-version: Fixed from version 4.4rc1" +CVE_STATUS[CVE-2021-47421] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-7990] = "fixed-version: Fixed from version 4.4rc4" +CVE_STATUS[CVE-2021-47422] = "fixed-version: Fixed from version 5.15" -# Skipping CVE-2015-8019, no affected_versions +CVE_STATUS[CVE-2021-47423] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8104] = "fixed-version: Fixed from version 4.4rc1" +CVE_STATUS[CVE-2021-47424] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8215] = "fixed-version: Fixed from version 4.0rc3" +CVE_STATUS[CVE-2021-47425] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8324] = "fixed-version: Fixed from version 2.6.34rc1" +CVE_STATUS[CVE-2021-47426] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8374] = "fixed-version: Fixed from version 4.4rc1" +CVE_STATUS[CVE-2021-47427] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8539] = "fixed-version: Fixed from version 4.4rc3" +CVE_STATUS[CVE-2021-47428] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8543] = "fixed-version: Fixed from version 4.4rc6" +CVE_STATUS[CVE-2021-47429] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8550] = "fixed-version: Fixed from version 4.4rc6" +CVE_STATUS[CVE-2021-47430] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8551] = "fixed-version: Fixed from version 4.4rc6" +CVE_STATUS[CVE-2021-47431] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8552] = "fixed-version: Fixed from version 4.4rc6" +CVE_STATUS[CVE-2021-47432] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2015-8553] = "fixed-version: Fixed from version 4.4rc6" +CVE_STATUS[CVE-2021-47433] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8569] = "fixed-version: Fixed from version 4.4rc6" +CVE_STATUS[CVE-2021-47434] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8575] = "fixed-version: Fixed from version 4.4rc6" +CVE_STATUS[CVE-2021-47435] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8660] = "fixed-version: Fixed from version 4.4rc4" +CVE_STATUS[CVE-2021-47436] = "fixed-version: Fixed from version 5.14.14" -CVE_STATUS[CVE-2015-8709] = "fixed-version: Fixed from version 4.10rc1" +CVE_STATUS[CVE-2021-47437] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8746] = "fixed-version: Fixed from version 4.3rc1" +CVE_STATUS[CVE-2021-47438] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8767] = "fixed-version: Fixed from version 4.3rc4" +CVE_STATUS[CVE-2021-47439] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8785] = "fixed-version: Fixed from version 4.4rc5" +CVE_STATUS[CVE-2021-47440] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8787] = "fixed-version: Fixed from version 4.4rc1" +CVE_STATUS[CVE-2021-47441] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8812] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47442] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8816] = "fixed-version: Fixed from version 4.4rc6" +CVE_STATUS[CVE-2021-47443] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8830] = "fixed-version: Fixed from version 4.1rc1" +CVE_STATUS[CVE-2021-47444] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8839] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47445] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8844] = "fixed-version: Fixed from version 4.4rc3" +CVE_STATUS[CVE-2021-47446] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8845] = "fixed-version: Fixed from version 4.4rc3" +CVE_STATUS[CVE-2021-47447] = "fixed-version: Fixed from version 5.15" -# Skipping CVE-2015-8937, no affected_versions +CVE_STATUS[CVE-2021-47448] = "fixed-version: Fixed from version 5.15" -# Skipping CVE-2015-8938, no affected_versions +CVE_STATUS[CVE-2021-47449] = "fixed-version: Fixed from version 5.14.14" -# Skipping CVE-2015-8939, no affected_versions +CVE_STATUS[CVE-2021-47450] = "fixed-version: Fixed from version 5.15" -# Skipping CVE-2015-8940, no affected_versions +CVE_STATUS[CVE-2021-47451] = "fixed-version: Fixed from version 5.15" -# Skipping CVE-2015-8941, no affected_versions +CVE_STATUS[CVE-2021-47452] = "fixed-version: Fixed from version 5.15" -# Skipping CVE-2015-8942, no affected_versions +CVE_STATUS[CVE-2021-47453] = "fixed-version: Fixed from version 5.15" -# Skipping CVE-2015-8943, no affected_versions +CVE_STATUS[CVE-2021-47454] = "fixed-version: Fixed from version 5.15" -# Skipping CVE-2015-8944, no affected_versions +CVE_STATUS[CVE-2021-47455] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8950] = "fixed-version: Fixed from version 4.1rc2" +CVE_STATUS[CVE-2021-47456] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8952] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47457] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8953] = "fixed-version: Fixed from version 4.3" +CVE_STATUS[CVE-2021-47458] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8955] = "fixed-version: Fixed from version 4.1rc1" +CVE_STATUS[CVE-2021-47459] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8956] = "fixed-version: Fixed from version 4.2rc1" +CVE_STATUS[CVE-2021-47460] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8961] = "fixed-version: Fixed from version 4.4rc1" +CVE_STATUS[CVE-2021-47461] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8962] = "fixed-version: Fixed from version 4.4rc1" +CVE_STATUS[CVE-2021-47462] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8963] = "fixed-version: Fixed from version 4.4" +CVE_STATUS[CVE-2021-47463] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8964] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47464] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8966] = "fixed-version: Fixed from version 4.4rc8" +CVE_STATUS[CVE-2021-47465] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8967] = "fixed-version: Fixed from version 4.0rc1" +CVE_STATUS[CVE-2021-47466] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-8970] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47467] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-9004] = "fixed-version: Fixed from version 3.19rc7" +CVE_STATUS[CVE-2021-47468] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-9016] = "fixed-version: Fixed from version 4.3rc1" +CVE_STATUS[CVE-2021-47470] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2015-9289] = "fixed-version: Fixed from version 4.2rc1" +CVE_STATUS[CVE-2021-47471] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-0617] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47473] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-0723] = "fixed-version: Fixed from version 4.5rc2" +CVE_STATUS[CVE-2021-47474] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-0728] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47475] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-0758] = "fixed-version: Fixed from version 4.6" +CVE_STATUS[CVE-2021-47476] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2016-0774, no affected_versions +CVE_STATUS[CVE-2021-47477] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-0821] = "fixed-version: Fixed from version 4.3rc1" +CVE_STATUS[CVE-2021-47478] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-0823] = "fixed-version: Fixed from version 4.0rc5" +CVE_STATUS[CVE-2021-47479] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-10044] = "fixed-version: Fixed from version 4.8rc7" +CVE_STATUS[CVE-2021-47480] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-10088] = "fixed-version: Fixed from version 4.10rc1" +CVE_STATUS[CVE-2021-47481] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-10147] = "fixed-version: Fixed from version 4.9" +CVE_STATUS[CVE-2021-47482] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-10150] = "fixed-version: Fixed from version 4.9rc8" +CVE_STATUS[CVE-2021-47483] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-10153] = "fixed-version: Fixed from version 4.10rc1" +CVE_STATUS[CVE-2021-47484] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-10154] = "fixed-version: Fixed from version 4.10rc1" +CVE_STATUS[CVE-2021-47485] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-10200] = "fixed-version: Fixed from version 4.9rc7" +CVE_STATUS[CVE-2021-47486] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-10208] = "fixed-version: Fixed from version 4.10rc1" +CVE_STATUS[CVE-2021-47489] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-10229] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47490] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-10318] = "fixed-version: Fixed from version 4.8rc6" +CVE_STATUS[CVE-2021-47491] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-10723] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2021-47492] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-10741] = "fixed-version: Fixed from version 4.10rc1" +CVE_STATUS[CVE-2021-47493] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-10764] = "fixed-version: Fixed from version 4.10rc1" +CVE_STATUS[CVE-2021-47494] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-10905] = "fixed-version: Fixed from version 4.8rc1" +CVE_STATUS[CVE-2021-47495] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-10906] = "fixed-version: Fixed from version 4.5rc6" +CVE_STATUS[CVE-2021-47496] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-10907] = "fixed-version: Fixed from version 4.9rc1" +CVE_STATUS[CVE-2021-47497] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-1237] = "fixed-version: Fixed from version 4.7rc5" +CVE_STATUS[CVE-2021-47498] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-1575] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47499] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-1576] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47500] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-1583] = "fixed-version: Fixed from version 4.7rc3" +CVE_STATUS[CVE-2021-47501] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2053] = "fixed-version: Fixed from version 4.3rc1" +CVE_STATUS[CVE-2021-47502] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2069] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47503] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2070] = "fixed-version: Fixed from version 4.4" +CVE_STATUS[CVE-2021-47504] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2085] = "fixed-version: Fixed from version 4.5rc4" +CVE_STATUS[CVE-2021-47505] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2117] = "fixed-version: Fixed from version 4.6rc5" +CVE_STATUS[CVE-2021-47506] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2143] = "fixed-version: Fixed from version 4.5" +CVE_STATUS[CVE-2021-47507] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2184] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47508] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2185] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47509] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2186] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47510] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2187] = "fixed-version: Fixed from version 4.6rc5" +CVE_STATUS[CVE-2021-47511] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2188] = "fixed-version: Fixed from version 4.11rc2" +CVE_STATUS[CVE-2021-47512] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2383] = "fixed-version: Fixed from version 4.5rc4" +CVE_STATUS[CVE-2021-47513] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2384] = "fixed-version: Fixed from version 4.5rc4" +CVE_STATUS[CVE-2021-47514] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2543] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47515] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2544] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47516] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2545] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47517] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2546] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47518] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2547] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47519] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2548] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47520] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2549] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47521] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2550] = "fixed-version: Fixed from version 4.5rc4" +CVE_STATUS[CVE-2021-47522] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2782] = "fixed-version: Fixed from version 4.5rc2" +CVE_STATUS[CVE-2021-47523] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-2847] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2021-47524] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2016-2853, no affected_versions +CVE_STATUS[CVE-2021-47525] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2016-2854, no affected_versions +CVE_STATUS[CVE-2021-47526] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3044] = "fixed-version: Fixed from version 4.5" +CVE_STATUS[CVE-2021-47527] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3070] = "fixed-version: Fixed from version 4.4rc1" +CVE_STATUS[CVE-2021-47528] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3134] = "fixed-version: Fixed from version 4.6rc2" +CVE_STATUS[CVE-2021-47529] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3135] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47530] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3136] = "fixed-version: Fixed from version 4.6rc3" +CVE_STATUS[CVE-2021-47531] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3137] = "fixed-version: Fixed from version 4.6rc3" +CVE_STATUS[CVE-2021-47532] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3138] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47533] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3139] = "fixed-version: Fixed from version 3.17rc1" +CVE_STATUS[CVE-2021-47534] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3140] = "fixed-version: Fixed from version 4.6rc3" +CVE_STATUS[CVE-2021-47535] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3156] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47536] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3157] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47537] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3672] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47538] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3689] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47539] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2016-3695, no affected_versions +CVE_STATUS[CVE-2021-47540] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2016-3699, no affected_versions +CVE_STATUS[CVE-2021-47541] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2016-3707, no affected_versions +CVE_STATUS[CVE-2021-47542] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3713] = "fixed-version: Fixed from version 4.7rc1" +CVE_STATUS[CVE-2021-47544] = "fixed-version: Fixed from version 5.16" -# CVE-2016-3775 has no known resolution +CVE_STATUS[CVE-2021-47546] = "fixed-version: Fixed from version 5.16" -# CVE-2016-3802 has no known resolution +CVE_STATUS[CVE-2021-47547] = "fixed-version: Fixed from version 5.16" -# CVE-2016-3803 has no known resolution +CVE_STATUS[CVE-2021-47548] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3841] = "fixed-version: Fixed from version 4.4rc4" +CVE_STATUS[CVE-2021-47549] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3857] = "fixed-version: Fixed from version 4.8rc2" +CVE_STATUS[CVE-2021-47550] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3951] = "fixed-version: Fixed from version 4.5" +CVE_STATUS[CVE-2021-47551] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3955] = "fixed-version: Fixed from version 4.6rc3" +CVE_STATUS[CVE-2021-47552] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-3961] = "fixed-version: Fixed from version 4.6rc5" +CVE_STATUS[CVE-2021-47553] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-4440] = "fixed-version: Fixed from version 4.7rc1" +CVE_STATUS[CVE-2021-47554] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-4470] = "fixed-version: Fixed from version 4.7rc4" +CVE_STATUS[CVE-2021-47555] = "fixed-version: Fixed from version 5.15.6" -CVE_STATUS[CVE-2016-4482] = "fixed-version: Fixed from version 4.7rc1" +CVE_STATUS[CVE-2021-47556] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-4485] = "fixed-version: Fixed from version 4.6" +CVE_STATUS[CVE-2021-47557] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-4486] = "fixed-version: Fixed from version 4.6" +CVE_STATUS[CVE-2021-47558] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-4557] = "fixed-version: Fixed from version 4.6rc6" +CVE_STATUS[CVE-2021-47559] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-4558] = "fixed-version: Fixed from version 4.6rc7" +CVE_STATUS[CVE-2021-47560] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-4565] = "fixed-version: Fixed from version 4.6rc6" +CVE_STATUS[CVE-2021-47561] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-4568] = "fixed-version: Fixed from version 4.6rc6" +CVE_STATUS[CVE-2021-47562] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-4569] = "fixed-version: Fixed from version 4.7rc1" +CVE_STATUS[CVE-2021-47563] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-4578] = "fixed-version: Fixed from version 4.7rc1" +CVE_STATUS[CVE-2021-47564] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-4580] = "fixed-version: Fixed from version 4.6" +CVE_STATUS[CVE-2021-47565] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-4581] = "fixed-version: Fixed from version 4.6rc7" +CVE_STATUS[CVE-2021-47566] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-4794] = "fixed-version: Fixed from version 4.7rc4" +CVE_STATUS[CVE-2021-47567] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-4805] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47568] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-4913] = "fixed-version: Fixed from version 4.6" +CVE_STATUS[CVE-2021-47569] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-4951] = "fixed-version: Fixed from version 4.7rc1" +CVE_STATUS[CVE-2021-47570] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-4997] = "fixed-version: Fixed from version 4.7rc1" +CVE_STATUS[CVE-2021-47571] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-4998] = "fixed-version: Fixed from version 4.7rc1" +CVE_STATUS[CVE-2021-47572] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-5195] = "fixed-version: Fixed from version 4.9rc2" +CVE_STATUS[CVE-2021-47576] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-5243] = "fixed-version: Fixed from version 4.7rc3" +CVE_STATUS[CVE-2021-47577] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-5244] = "fixed-version: Fixed from version 4.7rc3" +CVE_STATUS[CVE-2021-47578] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2016-5340, no affected_versions +CVE_STATUS[CVE-2021-47579] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2016-5342, no affected_versions +CVE_STATUS[CVE-2021-47580] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2016-5343, no affected_versions +CVE_STATUS[CVE-2021-47582] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2016-5344, no affected_versions +CVE_STATUS[CVE-2021-47583] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-5400] = "fixed-version: Fixed from version 4.7" +CVE_STATUS[CVE-2021-47584] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-5412] = "fixed-version: Fixed from version 4.8rc1" +CVE_STATUS[CVE-2021-47585] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-5696] = "fixed-version: Fixed from version 4.7" +CVE_STATUS[CVE-2021-47586] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-5728] = "fixed-version: Fixed from version 4.7rc1" +CVE_STATUS[CVE-2021-47587] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-5828] = "fixed-version: Fixed from version 4.7rc6" +CVE_STATUS[CVE-2021-47588] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-5829] = "fixed-version: Fixed from version 4.7rc5" +CVE_STATUS[CVE-2021-47589] = "fixed-version: Fixed from version 5.16" -# CVE-2016-5870 has no known resolution +CVE_STATUS[CVE-2021-47590] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-6130] = "fixed-version: Fixed from version 4.6rc6" +CVE_STATUS[CVE-2021-47591] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-6136] = "fixed-version: Fixed from version 4.8rc1" +CVE_STATUS[CVE-2021-47592] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-6156] = "fixed-version: Fixed from version 4.7rc7" +CVE_STATUS[CVE-2021-47593] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-6162] = "fixed-version: Fixed from version 4.7" +CVE_STATUS[CVE-2021-47594] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-6187] = "fixed-version: Fixed from version 4.7rc7" +CVE_STATUS[CVE-2021-47595] = "fixed-version: Fixed from version 5.15.11" -CVE_STATUS[CVE-2016-6197] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47596] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-6198] = "fixed-version: Fixed from version 4.6" +CVE_STATUS[CVE-2021-47597] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-6213] = "fixed-version: Fixed from version 4.9rc1" +CVE_STATUS[CVE-2021-47598] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-6327] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47599] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-6480] = "fixed-version: Fixed from version 4.8rc3" +CVE_STATUS[CVE-2021-47600] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-6516] = "fixed-version: Fixed from version 4.8rc1" +CVE_STATUS[CVE-2021-47601] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2016-6753, no affected_versions +CVE_STATUS[CVE-2021-47602] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-6786] = "fixed-version: Fixed from version 4.0rc1" +CVE_STATUS[CVE-2021-47603] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-6787] = "fixed-version: Fixed from version 4.0rc1" +CVE_STATUS[CVE-2021-47604] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-6828] = "fixed-version: Fixed from version 4.8rc5" +CVE_STATUS[CVE-2021-47605] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-7039] = "fixed-version: Fixed from version 4.9rc4" +CVE_STATUS[CVE-2021-47606] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-7042] = "fixed-version: Fixed from version 4.9rc3" +CVE_STATUS[CVE-2021-47607] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-7097] = "fixed-version: Fixed from version 4.9rc1" +CVE_STATUS[CVE-2021-47608] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-7117] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47609] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2016-7118, no affected_versions +CVE_STATUS[CVE-2021-47610] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-7425] = "fixed-version: Fixed from version 4.9rc1" +CVE_STATUS[CVE-2021-47611] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-7910] = "fixed-version: Fixed from version 4.8rc1" +CVE_STATUS[CVE-2021-47612] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-7911] = "fixed-version: Fixed from version 4.7rc7" +CVE_STATUS[CVE-2021-47613] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-7912] = "fixed-version: Fixed from version 4.6rc5" +CVE_STATUS[CVE-2021-47614] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-7913] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47616] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-7914] = "fixed-version: Fixed from version 4.6rc4" +CVE_STATUS[CVE-2021-47617] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2016-7915] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47618] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2016-7916] = "fixed-version: Fixed from version 4.6rc7" +CVE_STATUS[CVE-2021-47619] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2016-7917] = "fixed-version: Fixed from version 4.5rc6" +CVE_STATUS[CVE-2021-47620] = "fixed-version: Fixed from version 5.16.5" -CVE_STATUS[CVE-2016-8399] = "fixed-version: Fixed from version 4.9" +CVE_STATUS[CVE-2021-47622] = "fixed-version: Fixed from version 5.17" -# Skipping CVE-2016-8401, no affected_versions +CVE_STATUS[CVE-2021-47623] = "fixed-version: Fixed from version 5.17" -# Skipping CVE-2016-8402, no affected_versions +CVE_STATUS[CVE-2021-47624] = "fixed-version: Fixed from version 5.17" -# Skipping CVE-2016-8403, no affected_versions +CVE_STATUS[CVE-2021-47631] = "fixed-version: Fixed from version 5.18" -# Skipping CVE-2016-8404, no affected_versions +CVE_STATUS[CVE-2021-47632] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-8405] = "fixed-version: Fixed from version 4.10rc6" +CVE_STATUS[CVE-2021-47633] = "fixed-version: Fixed from version 5.18" -# Skipping CVE-2016-8406, no affected_versions +CVE_STATUS[CVE-2021-47634] = "fixed-version: Fixed from version 5.18" -# Skipping CVE-2016-8407, no affected_versions +CVE_STATUS[CVE-2021-47635] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-8630] = "fixed-version: Fixed from version 4.9rc4" +CVE_STATUS[CVE-2021-47636] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-8632] = "fixed-version: Fixed from version 4.9rc8" +CVE_STATUS[CVE-2021-47637] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-8633] = "fixed-version: Fixed from version 4.9rc4" +CVE_STATUS[CVE-2021-47638] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-8636] = "fixed-version: Fixed from version 4.10rc8" +CVE_STATUS[CVE-2021-47639] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-8645] = "fixed-version: Fixed from version 4.9rc6" +CVE_STATUS[CVE-2021-47640] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-8646] = "fixed-version: Fixed from version 4.4rc1" +CVE_STATUS[CVE-2021-47641] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-8650] = "fixed-version: Fixed from version 4.9rc7" +CVE_STATUS[CVE-2021-47642] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-8655] = "fixed-version: Fixed from version 4.9rc8" +CVE_STATUS[CVE-2021-47643] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-8658] = "fixed-version: Fixed from version 4.8rc7" +CVE_STATUS[CVE-2021-47644] = "fixed-version: Fixed from version 5.18" -# CVE-2016-8660 has no known resolution +CVE_STATUS[CVE-2021-47645] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-8666] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47646] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-9083] = "fixed-version: Fixed from version 4.9rc4" +CVE_STATUS[CVE-2021-47647] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-9084] = "fixed-version: Fixed from version 4.9rc4" +CVE_STATUS[CVE-2021-47648] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-9120] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47649] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-9178] = "fixed-version: Fixed from version 4.8rc7" +CVE_STATUS[CVE-2021-47650] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-9191] = "fixed-version: Fixed from version 4.10rc4" +CVE_STATUS[CVE-2021-47651] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-9313] = "fixed-version: Fixed from version 4.9rc3" +CVE_STATUS[CVE-2021-47652] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-9555] = "fixed-version: Fixed from version 4.9rc4" +CVE_STATUS[CVE-2021-47653] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-9576] = "fixed-version: Fixed from version 4.9" +CVE_STATUS[CVE-2021-47654] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-9588] = "fixed-version: Fixed from version 4.10rc1" +CVE_STATUS[CVE-2021-47655] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-9604] = "fixed-version: Fixed from version 4.11rc8" +CVE_STATUS[CVE-2021-47656] = "fixed-version: Fixed from version 5.18" -# Skipping CVE-2016-9644, no affected_versions +CVE_STATUS[CVE-2021-47657] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2016-9685] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2021-47658] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2016-9754] = "fixed-version: Fixed from version 4.7rc1" +CVE_STATUS[CVE-2021-47659] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2016-9755] = "fixed-version: Fixed from version 4.9rc8" +CVE_STATUS[CVE-2021-47660] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2016-9756] = "fixed-version: Fixed from version 4.9rc7" +CVE_STATUS[CVE-2021-47668] = "fixed-version: Fixed from version 5.11" -CVE_STATUS[CVE-2016-9777] = "fixed-version: Fixed from version 4.9rc7" +CVE_STATUS[CVE-2021-47669] = "fixed-version: Fixed from version 5.11" -CVE_STATUS[CVE-2016-9793] = "fixed-version: Fixed from version 4.9rc8" +CVE_STATUS[CVE-2021-47670] = "fixed-version: Fixed from version 5.11" -CVE_STATUS[CVE-2016-9794] = "fixed-version: Fixed from version 4.7rc1" +CVE_STATUS[CVE-2021-47671] = "fixed-version: Fixed from version 5.16" -CVE_STATUS[CVE-2016-9806] = "fixed-version: Fixed from version 4.7rc1" +CVE_STATUS[CVE-2021-4439] = "fixed-version: Fixed from version 5.15" -CVE_STATUS[CVE-2016-9919] = "fixed-version: Fixed from version 4.9rc8" +CVE_STATUS[CVE-2021-4440] = "fixed-version: Fixed from version 5.10.218" -# Skipping CVE-2017-0403, no affected_versions +CVE_STATUS[CVE-2021-4441] = "fixed-version: Fixed from version 5.17" -# Skipping CVE-2017-0404, no affected_versions +CVE_STATUS[CVE-2021-4442] = "fixed-version: Fixed from version 5.12" -# Skipping CVE-2017-0426, no affected_versions +CVE_STATUS[CVE-2021-4453] = "fixed-version: Fixed from version 5.16" -# Skipping CVE-2017-0427, no affected_versions +CVE_STATUS[CVE-2021-4454] = "fixed-version: Fixed from version 6.2" -# CVE-2017-0507 has no known resolution +CVE_STATUS[CVE-2021-4460] = "fixed-version: Fixed from version 5.13" -# CVE-2017-0508 has no known resolution +CVE_STATUS[CVE-2022-21546] = "fixed-version: Fixed from version 5.19" -# Skipping CVE-2017-0510, no affected_versions +# CVE-2022-26365 has no known resolution -# Skipping CVE-2017-0528, no affected_versions +# CVE-2022-33740 has no known resolution -# Skipping CVE-2017-0537, no affected_versions +# CVE-2022-33741 has no known resolution -# CVE-2017-0564 has no known resolution +# CVE-2022-33742 has no known resolution -CVE_STATUS[CVE-2017-0605] = "fixed-version: Fixed from version 4.12rc1" +# CVE-2022-33743 has no known resolution -CVE_STATUS[CVE-2017-0627] = "fixed-version: Fixed from version 4.14rc1" +# CVE-2022-33744 has no known resolution -# CVE-2017-0630 has no known resolution +# CVE-2022-3643 has no known resolution -# CVE-2017-0749 has no known resolution +# CVE-2022-42328 has no known resolution -CVE_STATUS[CVE-2017-0750] = "fixed-version: Fixed from version 4.5rc1" +# CVE-2022-42329 has no known resolution -CVE_STATUS[CVE-2017-0786] = "fixed-version: Fixed from version 4.14rc4" +CVE_STATUS[CVE-2022-48626] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-0861] = "fixed-version: Fixed from version 4.15rc3" +CVE_STATUS[CVE-2022-48627] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2017-1000] = "fixed-version: Fixed from version 4.13rc5" +CVE_STATUS[CVE-2022-48628] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2017-1000111] = "fixed-version: Fixed from version 4.13rc5" +CVE_STATUS[CVE-2022-48629] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-1000112] = "fixed-version: Fixed from version 4.13rc5" +CVE_STATUS[CVE-2022-48630] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2017-1000251] = "fixed-version: Fixed from version 4.14rc1" +CVE_STATUS[CVE-2022-48631] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-1000252] = "fixed-version: Fixed from version 4.14rc1" +CVE_STATUS[CVE-2022-48632] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-1000253] = "fixed-version: Fixed from version 4.1rc1" +CVE_STATUS[CVE-2022-48633] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-1000255] = "fixed-version: Fixed from version 4.14rc5" +CVE_STATUS[CVE-2022-48634] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-1000363] = "fixed-version: Fixed from version 4.12rc2" +CVE_STATUS[CVE-2022-48635] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-1000364] = "fixed-version: Fixed from version 4.12rc6" +CVE_STATUS[CVE-2022-48636] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-1000365] = "fixed-version: Fixed from version 4.12rc7" +CVE_STATUS[CVE-2022-48637] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-1000370] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48638] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-1000371] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48639] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-1000379] = "fixed-version: Fixed from version 4.12rc6" +CVE_STATUS[CVE-2022-48640] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-1000380] = "fixed-version: Fixed from version 4.12rc5" +CVE_STATUS[CVE-2022-48641] = "fixed-version: Fixed from version 5.19.12" -CVE_STATUS[CVE-2017-1000405] = "fixed-version: Fixed from version 4.15rc2" +CVE_STATUS[CVE-2022-48642] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-1000407] = "fixed-version: Fixed from version 4.15rc3" +CVE_STATUS[CVE-2022-48643] = "fixed-version: Fixed from version 5.19.12" -CVE_STATUS[CVE-2017-1000410] = "fixed-version: Fixed from version 4.15rc8" +CVE_STATUS[CVE-2022-48644] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-10661] = "fixed-version: Fixed from version 4.11rc1" +CVE_STATUS[CVE-2022-48645] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-10662] = "fixed-version: Fixed from version 4.12rc1" +CVE_STATUS[CVE-2022-48646] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-10663] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48647] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-10810] = "fixed-version: Fixed from version 4.12rc1" +CVE_STATUS[CVE-2022-48648] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-10911] = "fixed-version: Fixed from version 4.12rc7" +CVE_STATUS[CVE-2022-48649] = "fixed-version: Fixed from version 5.19.12" -CVE_STATUS[CVE-2017-11089] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48650] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-11176] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48651] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-11472] = "fixed-version: Fixed from version 4.12rc1" +CVE_STATUS[CVE-2022-48652] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-11473] = "fixed-version: Fixed from version 4.13rc2" +CVE_STATUS[CVE-2022-48653] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-11600] = "fixed-version: Fixed from version 4.13" +CVE_STATUS[CVE-2022-48654] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-12134] = "fixed-version: Fixed from version 4.13rc6" +CVE_STATUS[CVE-2022-48655] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-12146] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48656] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-12153] = "fixed-version: Fixed from version 4.14rc2" +CVE_STATUS[CVE-2022-48657] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-12154] = "fixed-version: Fixed from version 4.14rc1" +CVE_STATUS[CVE-2022-48658] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-12168] = "fixed-version: Fixed from version 4.9rc6" +CVE_STATUS[CVE-2022-48659] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-12188] = "fixed-version: Fixed from version 4.14rc5" +CVE_STATUS[CVE-2022-48660] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-12190] = "fixed-version: Fixed from version 4.14rc5" +CVE_STATUS[CVE-2022-48661] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-12192] = "fixed-version: Fixed from version 4.14rc3" +CVE_STATUS[CVE-2022-48662] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-12193] = "fixed-version: Fixed from version 4.14rc7" +CVE_STATUS[CVE-2022-48663] = "fixed-version: Fixed from version 5.19.12" -CVE_STATUS[CVE-2017-12762] = "fixed-version: Fixed from version 4.13rc4" +CVE_STATUS[CVE-2022-48664] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-13080] = "fixed-version: Fixed from version 4.14rc6" +CVE_STATUS[CVE-2022-48665] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-13166] = "fixed-version: Fixed from version 4.16rc1" +CVE_STATUS[CVE-2022-48666] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-13167] = "fixed-version: Fixed from version 4.5rc4" +CVE_STATUS[CVE-2022-48667] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-13168] = "fixed-version: Fixed from version 4.18rc4" +CVE_STATUS[CVE-2022-48668] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-13215] = "fixed-version: Fixed from version 4.5rc1" +CVE_STATUS[CVE-2022-48669] = "cpe-stable-backport: Backported in 6.6.23" -CVE_STATUS[CVE-2017-13216] = "fixed-version: Fixed from version 4.15rc8" +CVE_STATUS[CVE-2022-48670] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-13220] = "fixed-version: Fixed from version 3.19rc3" +CVE_STATUS[CVE-2022-48671] = "fixed-version: Fixed from version 5.19.11" -# CVE-2017-13221 has no known resolution +CVE_STATUS[CVE-2022-48672] = "fixed-version: Fixed from version 6.0" -# CVE-2017-13222 has no known resolution +CVE_STATUS[CVE-2022-48673] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-13305] = "fixed-version: Fixed from version 4.12rc5" +CVE_STATUS[CVE-2022-48674] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-13686] = "fixed-version: Fixed from version 4.13rc7" +CVE_STATUS[CVE-2022-48675] = "fixed-version: Fixed from version 6.0" -# CVE-2017-13693 has no known resolution +CVE_STATUS[CVE-2022-48686] = "fixed-version: Fixed from version 6.0" -# CVE-2017-13694 has no known resolution +CVE_STATUS[CVE-2022-48687] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-13695] = "fixed-version: Fixed from version 4.17rc1" +CVE_STATUS[CVE-2022-48688] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-13715] = "fixed-version: Fixed from version 4.3rc1" +CVE_STATUS[CVE-2022-48689] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-14051] = "fixed-version: Fixed from version 4.14rc1" +CVE_STATUS[CVE-2022-48690] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-14106] = "fixed-version: Fixed from version 4.12rc3" +CVE_STATUS[CVE-2022-48691] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-14140] = "fixed-version: Fixed from version 4.13rc6" +CVE_STATUS[CVE-2022-48692] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-14156] = "fixed-version: Fixed from version 4.14rc1" +CVE_STATUS[CVE-2022-48693] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-14340] = "fixed-version: Fixed from version 4.14rc1" +CVE_STATUS[CVE-2022-48694] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-14489] = "fixed-version: Fixed from version 4.14rc3" +CVE_STATUS[CVE-2022-48695] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-14497] = "fixed-version: Fixed from version 4.13" +CVE_STATUS[CVE-2022-48696] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-14954] = "fixed-version: Fixed from version 4.14rc3" +CVE_STATUS[CVE-2022-48697] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-14991] = "fixed-version: Fixed from version 4.14rc2" +CVE_STATUS[CVE-2022-48698] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-15102] = "fixed-version: Fixed from version 4.9rc1" +CVE_STATUS[CVE-2022-48699] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-15115] = "fixed-version: Fixed from version 4.14rc6" +CVE_STATUS[CVE-2022-48701] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-15116] = "fixed-version: Fixed from version 4.2rc1" +CVE_STATUS[CVE-2022-48702] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-15121] = "fixed-version: Fixed from version 3.11rc1" +CVE_STATUS[CVE-2022-48703] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-15126] = "fixed-version: Fixed from version 4.14rc4" +CVE_STATUS[CVE-2022-48704] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-15127] = "fixed-version: Fixed from version 4.13rc5" +CVE_STATUS[CVE-2022-48705] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2017-15128] = "fixed-version: Fixed from version 4.14rc8" +CVE_STATUS[CVE-2022-48706] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-15129] = "fixed-version: Fixed from version 4.15rc5" +CVE_STATUS[CVE-2022-48707] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-15265] = "fixed-version: Fixed from version 4.14rc5" +CVE_STATUS[CVE-2022-48708] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-15274] = "fixed-version: Fixed from version 4.12rc5" +CVE_STATUS[CVE-2022-48709] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-15299] = "fixed-version: Fixed from version 4.14rc6" +CVE_STATUS[CVE-2022-48710] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2017-15306] = "fixed-version: Fixed from version 4.14rc7" +CVE_STATUS[CVE-2022-48711] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-15537] = "fixed-version: Fixed from version 4.14rc3" +CVE_STATUS[CVE-2022-48712] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-15649] = "fixed-version: Fixed from version 4.14rc4" +CVE_STATUS[CVE-2022-48713] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-15868] = "fixed-version: Fixed from version 3.19rc3" +CVE_STATUS[CVE-2022-48714] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-15951] = "fixed-version: Fixed from version 4.14rc6" +CVE_STATUS[CVE-2022-48715] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16525] = "fixed-version: Fixed from version 4.14rc5" +CVE_STATUS[CVE-2022-48716] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16526] = "fixed-version: Fixed from version 4.14rc4" +CVE_STATUS[CVE-2022-48717] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16527] = "fixed-version: Fixed from version 4.14rc5" +CVE_STATUS[CVE-2022-48718] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16528] = "fixed-version: Fixed from version 4.14rc1" +CVE_STATUS[CVE-2022-48719] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16529] = "fixed-version: Fixed from version 4.14rc4" +CVE_STATUS[CVE-2022-48720] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16530] = "fixed-version: Fixed from version 4.14rc4" +CVE_STATUS[CVE-2022-48721] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16531] = "fixed-version: Fixed from version 4.14rc4" +CVE_STATUS[CVE-2022-48722] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16532] = "fixed-version: Fixed from version 4.14rc5" +CVE_STATUS[CVE-2022-48723] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16533] = "fixed-version: Fixed from version 4.14rc5" +CVE_STATUS[CVE-2022-48724] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16534] = "fixed-version: Fixed from version 4.14rc4" +CVE_STATUS[CVE-2022-48725] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16535] = "fixed-version: Fixed from version 4.14rc6" +CVE_STATUS[CVE-2022-48726] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16536] = "fixed-version: Fixed from version 4.15rc1" +CVE_STATUS[CVE-2022-48727] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16537] = "fixed-version: Fixed from version 4.15rc1" +CVE_STATUS[CVE-2022-48728] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16538] = "fixed-version: Fixed from version 4.16rc1" +CVE_STATUS[CVE-2022-48729] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16643] = "fixed-version: Fixed from version 4.14rc7" +CVE_STATUS[CVE-2022-48730] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16644] = "fixed-version: Fixed from version 4.16rc1" +CVE_STATUS[CVE-2022-48731] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16645] = "fixed-version: Fixed from version 4.14rc6" +CVE_STATUS[CVE-2022-48732] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16646] = "fixed-version: Fixed from version 4.15rc1" +CVE_STATUS[CVE-2022-48733] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16647] = "fixed-version: Fixed from version 4.14" +CVE_STATUS[CVE-2022-48734] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16648] = "fixed-version: Fixed from version 4.15rc1" +CVE_STATUS[CVE-2022-48735] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16649] = "fixed-version: Fixed from version 4.14" +CVE_STATUS[CVE-2022-48738] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16650] = "fixed-version: Fixed from version 4.14" +CVE_STATUS[CVE-2022-48739] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16911] = "fixed-version: Fixed from version 4.15rc4" +CVE_STATUS[CVE-2022-48740] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16912] = "fixed-version: Fixed from version 4.15rc4" +CVE_STATUS[CVE-2022-48741] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16913] = "fixed-version: Fixed from version 4.15rc4" +CVE_STATUS[CVE-2022-48742] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16914] = "fixed-version: Fixed from version 4.15rc4" +CVE_STATUS[CVE-2022-48743] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16939] = "fixed-version: Fixed from version 4.14rc7" +CVE_STATUS[CVE-2022-48744] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16994] = "fixed-version: Fixed from version 4.15rc1" +CVE_STATUS[CVE-2022-48745] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16995] = "fixed-version: Fixed from version 4.15rc5" +CVE_STATUS[CVE-2022-48746] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-16996] = "fixed-version: Fixed from version 4.15rc5" +CVE_STATUS[CVE-2022-48747] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17052] = "fixed-version: Fixed from version 4.13rc7" +CVE_STATUS[CVE-2022-48748] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17053] = "fixed-version: Fixed from version 4.13rc7" +CVE_STATUS[CVE-2022-48749] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17448] = "fixed-version: Fixed from version 4.15rc4" +CVE_STATUS[CVE-2022-48750] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17449] = "fixed-version: Fixed from version 4.15rc4" +CVE_STATUS[CVE-2022-48751] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17450] = "fixed-version: Fixed from version 4.15rc4" +CVE_STATUS[CVE-2022-48752] = "fixed-version: Fixed from version 5.16.5" -CVE_STATUS[CVE-2017-17558] = "fixed-version: Fixed from version 4.15rc4" +CVE_STATUS[CVE-2022-48753] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17712] = "fixed-version: Fixed from version 4.15rc4" +CVE_STATUS[CVE-2022-48754] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17741] = "fixed-version: Fixed from version 4.15rc5" +CVE_STATUS[CVE-2022-48755] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17805] = "fixed-version: Fixed from version 4.15rc4" +CVE_STATUS[CVE-2022-48756] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17806] = "fixed-version: Fixed from version 4.15rc4" +CVE_STATUS[CVE-2022-48757] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17807] = "fixed-version: Fixed from version 4.15rc3" +CVE_STATUS[CVE-2022-48758] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17852] = "fixed-version: Fixed from version 4.15rc5" +CVE_STATUS[CVE-2022-48759] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17853] = "fixed-version: Fixed from version 4.15rc5" +CVE_STATUS[CVE-2022-48760] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17854] = "fixed-version: Fixed from version 4.15rc5" +CVE_STATUS[CVE-2022-48761] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17855] = "fixed-version: Fixed from version 4.15rc5" +CVE_STATUS[CVE-2022-48762] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17856] = "fixed-version: Fixed from version 4.15rc5" +CVE_STATUS[CVE-2022-48763] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17857] = "fixed-version: Fixed from version 4.15rc5" +CVE_STATUS[CVE-2022-48764] = "fixed-version: Fixed from version 5.16.5" -CVE_STATUS[CVE-2017-17862] = "fixed-version: Fixed from version 4.15rc1" +CVE_STATUS[CVE-2022-48765] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17863] = "fixed-version: Fixed from version 4.15rc5" +CVE_STATUS[CVE-2022-48766] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17864] = "fixed-version: Fixed from version 4.15rc5" +CVE_STATUS[CVE-2022-48767] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-17975] = "fixed-version: Fixed from version 4.17rc1" +CVE_STATUS[CVE-2022-48768] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18017] = "fixed-version: Fixed from version 4.11rc7" +CVE_STATUS[CVE-2022-48769] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18075] = "fixed-version: Fixed from version 4.15rc7" +CVE_STATUS[CVE-2022-48770] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18079] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48771] = "fixed-version: Fixed from version 5.17" -# CVE-2017-18169 has no known resolution +CVE_STATUS[CVE-2022-48772] = "cpe-stable-backport: Backported in 6.6.34" -CVE_STATUS[CVE-2017-18174] = "fixed-version: Fixed from version 4.7rc1" +CVE_STATUS[CVE-2022-48773] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18193] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48774] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18200] = "fixed-version: Fixed from version 4.14rc5" +CVE_STATUS[CVE-2022-48775] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18202] = "fixed-version: Fixed from version 4.15rc2" +CVE_STATUS[CVE-2022-48776] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18203] = "fixed-version: Fixed from version 4.15rc1" +CVE_STATUS[CVE-2022-48777] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18204] = "fixed-version: Fixed from version 4.15rc1" +CVE_STATUS[CVE-2022-48778] = "fixed-version: Fixed from version 5.16.11" -CVE_STATUS[CVE-2017-18208] = "fixed-version: Fixed from version 4.15rc2" +CVE_STATUS[CVE-2022-48779] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18216] = "fixed-version: Fixed from version 4.15rc1" +CVE_STATUS[CVE-2022-48780] = "fixed-version: Fixed from version 5.16.11" -CVE_STATUS[CVE-2017-18218] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48781] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18221] = "fixed-version: Fixed from version 4.12rc4" +CVE_STATUS[CVE-2022-48782] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18222] = "fixed-version: Fixed from version 4.12rc1" +CVE_STATUS[CVE-2022-48783] = "fixed-version: Fixed from version 5.16.11" -CVE_STATUS[CVE-2017-18224] = "fixed-version: Fixed from version 4.15rc1" +CVE_STATUS[CVE-2022-48784] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18232] = "fixed-version: Fixed from version 4.16rc1" +CVE_STATUS[CVE-2022-48785] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18241] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48786] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18249] = "fixed-version: Fixed from version 4.12rc1" +CVE_STATUS[CVE-2022-48787] = "fixed-version: Fixed from version 5.16.11" -CVE_STATUS[CVE-2017-18255] = "fixed-version: Fixed from version 4.11rc1" +CVE_STATUS[CVE-2022-48788] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18257] = "fixed-version: Fixed from version 4.11rc1" +CVE_STATUS[CVE-2022-48789] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18261] = "fixed-version: Fixed from version 4.13rc6" +CVE_STATUS[CVE-2022-48790] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18270] = "fixed-version: Fixed from version 4.14rc3" +CVE_STATUS[CVE-2022-48791] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18344] = "fixed-version: Fixed from version 4.15rc4" +CVE_STATUS[CVE-2022-48792] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18360] = "fixed-version: Fixed from version 4.12rc2" +CVE_STATUS[CVE-2022-48793] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18379] = "fixed-version: Fixed from version 4.14rc3" +CVE_STATUS[CVE-2022-48794] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18509] = "fixed-version: Fixed from version 4.11rc1" +CVE_STATUS[CVE-2022-48795] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18549] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48796] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18550] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48797] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18551] = "fixed-version: Fixed from version 4.15rc9" +CVE_STATUS[CVE-2022-48798] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18552] = "fixed-version: Fixed from version 4.11rc1" +CVE_STATUS[CVE-2022-48799] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-18595] = "fixed-version: Fixed from version 4.15rc6" +CVE_STATUS[CVE-2022-48800] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-2583] = "fixed-version: Fixed from version 4.10rc4" +CVE_STATUS[CVE-2022-48801] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-2584] = "fixed-version: Fixed from version 4.10rc4" +CVE_STATUS[CVE-2022-48802] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-2596] = "fixed-version: Fixed from version 4.11rc1" +CVE_STATUS[CVE-2022-48803] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-2618] = "fixed-version: Fixed from version 4.10rc8" +CVE_STATUS[CVE-2022-48804] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-2634] = "fixed-version: Fixed from version 2.6.25rc1" +CVE_STATUS[CVE-2022-48805] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-2636] = "fixed-version: Fixed from version 4.11rc2" +CVE_STATUS[CVE-2022-48806] = "fixed-version: Fixed from version 5.16.10" -CVE_STATUS[CVE-2017-2647] = "fixed-version: Fixed from version 3.18rc1" +CVE_STATUS[CVE-2022-48807] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-2671] = "fixed-version: Fixed from version 4.11rc6" +CVE_STATUS[CVE-2022-48808] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-5123] = "fixed-version: Fixed from version 4.14rc5" +CVE_STATUS[CVE-2022-48809] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-5546] = "fixed-version: Fixed from version 4.10rc4" +CVE_STATUS[CVE-2022-48810] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-5547] = "fixed-version: Fixed from version 4.10rc5" +CVE_STATUS[CVE-2022-48811] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-5548] = "fixed-version: Fixed from version 4.10rc5" +CVE_STATUS[CVE-2022-48812] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-5549] = "fixed-version: Fixed from version 4.10rc4" +CVE_STATUS[CVE-2022-48813] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-5550] = "fixed-version: Fixed from version 4.10rc4" +CVE_STATUS[CVE-2022-48814] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-5551] = "fixed-version: Fixed from version 4.10rc4" +CVE_STATUS[CVE-2022-48815] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-5576] = "fixed-version: Fixed from version 4.10rc6" +CVE_STATUS[CVE-2022-48816] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-5577] = "fixed-version: Fixed from version 4.10rc6" +CVE_STATUS[CVE-2022-48817] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-5669] = "fixed-version: Fixed from version 4.11rc1" +CVE_STATUS[CVE-2022-48818] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-5715] = "fixed-version: Fixed from version 4.15rc8" +CVE_STATUS[CVE-2022-48819] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-5753] = "fixed-version: Fixed from version 4.15rc8" +CVE_STATUS[CVE-2022-48820] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-5754] = "fixed-version: Fixed from version 4.16rc1" +CVE_STATUS[CVE-2022-48821] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-5897] = "fixed-version: Fixed from version 4.10rc8" +CVE_STATUS[CVE-2022-48822] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-5967] = "fixed-version: Fixed from version 4.11rc1" +CVE_STATUS[CVE-2022-48823] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-5970] = "fixed-version: Fixed from version 4.10rc8" +CVE_STATUS[CVE-2022-48824] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-5972] = "fixed-version: Fixed from version 4.4rc1" +CVE_STATUS[CVE-2022-48825] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-5986] = "fixed-version: Fixed from version 4.10rc8" +CVE_STATUS[CVE-2022-48826] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-6001] = "fixed-version: Fixed from version 4.10rc4" +CVE_STATUS[CVE-2022-48827] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-6074] = "fixed-version: Fixed from version 4.10" +CVE_STATUS[CVE-2022-48828] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-6214] = "fixed-version: Fixed from version 4.10rc8" +CVE_STATUS[CVE-2022-48829] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-6345] = "fixed-version: Fixed from version 4.10" +CVE_STATUS[CVE-2022-48830] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-6346] = "fixed-version: Fixed from version 4.10" +CVE_STATUS[CVE-2022-48831] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-6347] = "fixed-version: Fixed from version 4.11rc1" +CVE_STATUS[CVE-2022-48832] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-6348] = "fixed-version: Fixed from version 4.10" +CVE_STATUS[CVE-2022-48833] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-6353] = "fixed-version: Fixed from version 4.11rc1" +CVE_STATUS[CVE-2022-48834] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-6874] = "fixed-version: Fixed from version 4.11rc2" +CVE_STATUS[CVE-2022-48835] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-6951] = "fixed-version: Fixed from version 3.18rc1" +CVE_STATUS[CVE-2022-48836] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7184] = "fixed-version: Fixed from version 4.11rc5" +CVE_STATUS[CVE-2022-48837] = "fixed-version: Fixed from version 5.16.17" -CVE_STATUS[CVE-2017-7187] = "fixed-version: Fixed from version 4.11rc5" +CVE_STATUS[CVE-2022-48838] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7261] = "fixed-version: Fixed from version 4.11rc6" +CVE_STATUS[CVE-2022-48839] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7273] = "fixed-version: Fixed from version 4.10rc4" +CVE_STATUS[CVE-2022-48840] = "fixed-version: Fixed from version 5.16.17" -CVE_STATUS[CVE-2017-7277] = "fixed-version: Fixed from version 4.11rc4" +CVE_STATUS[CVE-2022-48841] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7294] = "fixed-version: Fixed from version 4.11rc6" +CVE_STATUS[CVE-2022-48842] = "fixed-version: Fixed from version 5.16.16" -CVE_STATUS[CVE-2017-7308] = "fixed-version: Fixed from version 4.11rc6" +CVE_STATUS[CVE-2022-48844] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7346] = "fixed-version: Fixed from version 4.12rc5" +CVE_STATUS[CVE-2022-48845] = "fixed-version: Fixed from version 5.17" -# CVE-2017-7369 has no known resolution +CVE_STATUS[CVE-2022-48846] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7374] = "fixed-version: Fixed from version 4.11rc4" +CVE_STATUS[CVE-2022-48847] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7472] = "fixed-version: Fixed from version 4.11rc8" +CVE_STATUS[CVE-2022-48848] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7477] = "fixed-version: Fixed from version 4.11" +CVE_STATUS[CVE-2022-48849] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7482] = "fixed-version: Fixed from version 4.12rc7" +CVE_STATUS[CVE-2022-48850] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7487] = "fixed-version: Fixed from version 4.12rc1" +CVE_STATUS[CVE-2022-48851] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7495] = "fixed-version: Fixed from version 4.7rc1" +CVE_STATUS[CVE-2022-48852] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7518] = "fixed-version: Fixed from version 4.12rc7" +CVE_STATUS[CVE-2022-48853] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2017-7533] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48854] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7541] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48855] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7542] = "fixed-version: Fixed from version 4.13rc2" +CVE_STATUS[CVE-2022-48856] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7558] = "fixed-version: Fixed from version 4.13" +CVE_STATUS[CVE-2022-48857] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7616] = "fixed-version: Fixed from version 4.11rc6" +CVE_STATUS[CVE-2022-48858] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7618] = "fixed-version: Fixed from version 4.11rc8" +CVE_STATUS[CVE-2022-48859] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7645] = "fixed-version: Fixed from version 4.11" +CVE_STATUS[CVE-2022-48860] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7889] = "fixed-version: Fixed from version 4.11rc7" +CVE_STATUS[CVE-2022-48861] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7895] = "fixed-version: Fixed from version 4.11" +CVE_STATUS[CVE-2022-48862] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-7979] = "fixed-version: Fixed from version 4.11rc8" +CVE_STATUS[CVE-2022-48863] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-8061] = "fixed-version: Fixed from version 4.11rc4" +CVE_STATUS[CVE-2022-48864] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-8062] = "fixed-version: Fixed from version 4.11rc2" +CVE_STATUS[CVE-2022-48865] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-8063] = "fixed-version: Fixed from version 4.11rc1" +CVE_STATUS[CVE-2022-48866] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2017-8064] = "fixed-version: Fixed from version 4.11rc1" +CVE_STATUS[CVE-2022-48867] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-8065] = "fixed-version: Fixed from version 4.11rc1" +CVE_STATUS[CVE-2022-48868] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-8066] = "fixed-version: Fixed from version 4.11rc1" +CVE_STATUS[CVE-2022-48869] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-8067] = "fixed-version: Fixed from version 4.11rc1" +CVE_STATUS[CVE-2022-48870] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-8068] = "fixed-version: Fixed from version 4.10rc8" +CVE_STATUS[CVE-2022-48871] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-8069] = "fixed-version: Fixed from version 4.10rc8" +CVE_STATUS[CVE-2022-48872] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-8070] = "fixed-version: Fixed from version 4.10rc8" +CVE_STATUS[CVE-2022-48873] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-8071] = "fixed-version: Fixed from version 4.10rc7" +CVE_STATUS[CVE-2022-48874] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-8072] = "fixed-version: Fixed from version 4.10rc7" +CVE_STATUS[CVE-2022-48875] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-8106] = "fixed-version: Fixed from version 3.16rc1" +CVE_STATUS[CVE-2022-48876] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-8240] = "fixed-version: Fixed from version 3.19rc6" +CVE_STATUS[CVE-2022-48877] = "fixed-version: Fixed from version 6.2" -# CVE-2017-8242 has no known resolution +CVE_STATUS[CVE-2022-48878] = "fixed-version: Fixed from version 6.2" -# CVE-2017-8244 has no known resolution +CVE_STATUS[CVE-2022-48879] = "fixed-version: Fixed from version 6.2" -# CVE-2017-8245 has no known resolution +CVE_STATUS[CVE-2022-48880] = "fixed-version: Fixed from version 6.2" -# CVE-2017-8246 has no known resolution +CVE_STATUS[CVE-2022-48881] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-8797] = "fixed-version: Fixed from version 4.12rc1" +CVE_STATUS[CVE-2022-48882] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-8824] = "fixed-version: Fixed from version 4.15rc3" +CVE_STATUS[CVE-2022-48883] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-8831] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48884] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-8890] = "fixed-version: Fixed from version 4.12rc1" +CVE_STATUS[CVE-2022-48885] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-8924] = "fixed-version: Fixed from version 4.11rc2" +CVE_STATUS[CVE-2022-48886] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-8925] = "fixed-version: Fixed from version 4.11rc2" +CVE_STATUS[CVE-2022-48887] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-9059] = "fixed-version: Fixed from version 4.12rc1" +CVE_STATUS[CVE-2022-48888] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-9074] = "fixed-version: Fixed from version 4.12rc2" +CVE_STATUS[CVE-2022-48889] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-9075] = "fixed-version: Fixed from version 4.12rc2" +CVE_STATUS[CVE-2022-48890] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-9076] = "fixed-version: Fixed from version 4.12rc2" +CVE_STATUS[CVE-2022-48891] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-9077] = "fixed-version: Fixed from version 4.12rc2" +CVE_STATUS[CVE-2022-48892] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-9150] = "fixed-version: Fixed from version 4.12rc1" +CVE_STATUS[CVE-2022-48893] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-9211] = "fixed-version: Fixed from version 4.12rc3" +CVE_STATUS[CVE-2022-48894] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-9242] = "fixed-version: Fixed from version 4.12rc3" +CVE_STATUS[CVE-2022-48895] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-9605] = "fixed-version: Fixed from version 4.12rc5" +CVE_STATUS[CVE-2022-48896] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-9725] = "fixed-version: Fixed from version 4.3rc7" +CVE_STATUS[CVE-2022-48897] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-9984] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48898] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-9985] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48899] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2017-9986] = "fixed-version: Fixed from version 4.15rc1" +CVE_STATUS[CVE-2022-48901] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-1000004] = "fixed-version: Fixed from version 4.15rc9" +CVE_STATUS[CVE-2022-48902] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-1000026] = "fixed-version: Fixed from version 4.16rc1" +CVE_STATUS[CVE-2022-48903] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-1000028] = "fixed-version: Fixed from version 4.15" +CVE_STATUS[CVE-2022-48904] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-1000199] = "fixed-version: Fixed from version 4.16" +CVE_STATUS[CVE-2022-48905] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-1000200] = "fixed-version: Fixed from version 4.17rc5" +CVE_STATUS[CVE-2022-48906] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-1000204] = "fixed-version: Fixed from version 4.17rc7" +CVE_STATUS[CVE-2022-48907] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10021] = "fixed-version: Fixed from version 4.16rc7" +CVE_STATUS[CVE-2022-48908] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10074] = "fixed-version: Fixed from version 4.16rc7" +CVE_STATUS[CVE-2022-48909] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10087] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48910] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10124] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48911] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10322] = "fixed-version: Fixed from version 4.17rc4" +CVE_STATUS[CVE-2022-48912] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10323] = "fixed-version: Fixed from version 4.17rc4" +CVE_STATUS[CVE-2022-48913] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-1065] = "fixed-version: Fixed from version 4.16rc3" +CVE_STATUS[CVE-2022-48914] = "fixed-version: Fixed from version 5.16.13" -CVE_STATUS[CVE-2018-1066] = "fixed-version: Fixed from version 4.11rc1" +CVE_STATUS[CVE-2022-48915] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10675] = "fixed-version: Fixed from version 4.13rc6" +CVE_STATUS[CVE-2022-48916] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-1068] = "fixed-version: Fixed from version 4.16rc5" +CVE_STATUS[CVE-2022-48918] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10840] = "fixed-version: Fixed from version 4.18rc1" +CVE_STATUS[CVE-2022-48919] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10853] = "fixed-version: Fixed from version 4.18rc1" +CVE_STATUS[CVE-2022-48920] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-1087] = "fixed-version: Fixed from version 4.16rc7" +CVE_STATUS[CVE-2022-48921] = "fixed-version: Fixed from version 5.17" -# CVE-2018-10872 has no known resolution +CVE_STATUS[CVE-2022-48922] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10876] = "fixed-version: Fixed from version 4.18rc4" +CVE_STATUS[CVE-2022-48923] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10877] = "fixed-version: Fixed from version 4.18rc4" +CVE_STATUS[CVE-2022-48924] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10878] = "fixed-version: Fixed from version 4.18rc4" +CVE_STATUS[CVE-2022-48925] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10879] = "fixed-version: Fixed from version 4.18rc4" +CVE_STATUS[CVE-2022-48926] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10880] = "fixed-version: Fixed from version 4.18rc4" +CVE_STATUS[CVE-2022-48927] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10881] = "fixed-version: Fixed from version 4.18rc4" +CVE_STATUS[CVE-2022-48928] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10882] = "fixed-version: Fixed from version 4.18rc4" +CVE_STATUS[CVE-2022-48929] = "fixed-version: Fixed from version 5.16.12" -CVE_STATUS[CVE-2018-10883] = "fixed-version: Fixed from version 4.18rc4" +CVE_STATUS[CVE-2022-48930] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10901] = "fixed-version: Fixed from version 2.6.36rc1" +CVE_STATUS[CVE-2022-48931] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10902] = "fixed-version: Fixed from version 4.18rc6" +CVE_STATUS[CVE-2022-48932] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-1091] = "fixed-version: Fixed from version 4.14rc2" +CVE_STATUS[CVE-2022-48933] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-1092] = "fixed-version: Fixed from version 4.17rc1" +CVE_STATUS[CVE-2022-48934] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-1093] = "fixed-version: Fixed from version 4.17rc1" +CVE_STATUS[CVE-2022-48935] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10938] = "fixed-version: Fixed from version 4.13rc5" +CVE_STATUS[CVE-2022-48937] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-1094] = "fixed-version: Fixed from version 4.17rc1" +CVE_STATUS[CVE-2022-48938] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-10940] = "fixed-version: Fixed from version 4.17rc3" +CVE_STATUS[CVE-2022-48939] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-1095] = "fixed-version: Fixed from version 4.17rc1" +CVE_STATUS[CVE-2022-48940] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-1108] = "fixed-version: Fixed from version 4.17rc2" +CVE_STATUS[CVE-2022-48941] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-1118] = "fixed-version: Fixed from version 4.18rc1" +CVE_STATUS[CVE-2022-48942] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-1120] = "fixed-version: Fixed from version 4.17rc6" +CVE_STATUS[CVE-2022-48943] = "fixed-version: Fixed from version 5.17" -# CVE-2018-1121 has no known resolution +CVE_STATUS[CVE-2022-48944] = "fixed-version: Fixed from version 5.17" -CVE_STATUS[CVE-2018-11232] = "fixed-version: Fixed from version 4.11rc1" +CVE_STATUS[CVE-2022-48945] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2018-1128] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48946] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2018-1129] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48947] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-1130] = "fixed-version: Fixed from version 4.16rc7" +CVE_STATUS[CVE-2022-48948] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2018-11412] = "fixed-version: Fixed from version 4.18rc1" +CVE_STATUS[CVE-2022-48949] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2018-11506] = "fixed-version: Fixed from version 4.17rc7" +CVE_STATUS[CVE-2022-48950] = "fixed-version: Fixed from version 6.0.14" -CVE_STATUS[CVE-2018-11508] = "fixed-version: Fixed from version 4.17rc5" +CVE_STATUS[CVE-2022-48951] = "fixed-version: Fixed from version 6.1" -# CVE-2018-11987 has no known resolution +CVE_STATUS[CVE-2022-48952] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2018-12126] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-48953] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-12127] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-48954] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-12130] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-48955] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-12207] = "fixed-version: Fixed from version 5.4rc2" +CVE_STATUS[CVE-2022-48956] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-12232] = "fixed-version: Fixed from version 4.18rc1" +CVE_STATUS[CVE-2022-48957] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-12233] = "fixed-version: Fixed from version 4.18rc2" +CVE_STATUS[CVE-2022-48958] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-12633] = "fixed-version: Fixed from version 4.18rc1" +CVE_STATUS[CVE-2022-48959] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-12714] = "fixed-version: Fixed from version 4.18rc2" +CVE_STATUS[CVE-2022-48960] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-12896] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48961] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-12904] = "fixed-version: Fixed from version 4.18rc1" +CVE_STATUS[CVE-2022-48962] = "fixed-version: Fixed from version 6.1" -# CVE-2018-12928 has no known resolution +CVE_STATUS[CVE-2022-48963] = "fixed-version: Fixed from version 6.1" -# CVE-2018-12929 has no known resolution +CVE_STATUS[CVE-2022-48964] = "fixed-version: Fixed from version 6.1" -# CVE-2018-12930 has no known resolution +CVE_STATUS[CVE-2022-48965] = "fixed-version: Fixed from version 6.1" -# CVE-2018-12931 has no known resolution +CVE_STATUS[CVE-2022-48966] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-13053] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48967] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-13093] = "fixed-version: Fixed from version 4.18rc1" +CVE_STATUS[CVE-2022-48968] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-13094] = "fixed-version: Fixed from version 4.18rc1" +CVE_STATUS[CVE-2022-48969] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-13095] = "fixed-version: Fixed from version 4.18rc3" +CVE_STATUS[CVE-2022-48970] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-13096] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48971] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-13097] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48972] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-13098] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48973] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-13099] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48974] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-13100] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48975] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-13405] = "fixed-version: Fixed from version 4.18rc4" +CVE_STATUS[CVE-2022-48976] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-13406] = "fixed-version: Fixed from version 4.18rc1" +CVE_STATUS[CVE-2022-48977] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-14609] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48978] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-14610] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48979] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-14611] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48980] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-14612] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48981] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-14613] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48982] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-14614] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48983] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-14615] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48984] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-14616] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48985] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-14617] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48986] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-14619] = "fixed-version: Fixed from version 4.15rc4" +CVE_STATUS[CVE-2022-48987] = "fixed-version: Fixed from version 6.0.13" -CVE_STATUS[CVE-2018-14625] = "fixed-version: Fixed from version 4.20rc6" +CVE_STATUS[CVE-2022-48988] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-14633] = "fixed-version: Fixed from version 4.19rc6" +CVE_STATUS[CVE-2022-48989] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-14634] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-48990] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-14641] = "fixed-version: Fixed from version 4.19rc4" +CVE_STATUS[CVE-2022-48991] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-14646] = "fixed-version: Fixed from version 4.15rc8" +CVE_STATUS[CVE-2022-48992] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-14656] = "fixed-version: Fixed from version 4.19rc2" +CVE_STATUS[CVE-2022-48994] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-14678] = "fixed-version: Fixed from version 4.18rc8" +CVE_STATUS[CVE-2022-48995] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-14734] = "fixed-version: Fixed from version 4.18rc1" +CVE_STATUS[CVE-2022-48996] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-15471] = "fixed-version: Fixed from version 4.19rc7" +CVE_STATUS[CVE-2022-48997] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-15572] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48998] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-15594] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-48999] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-16276] = "fixed-version: Fixed from version 4.18rc5" +CVE_STATUS[CVE-2022-49000] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-16597] = "fixed-version: Fixed from version 4.8rc1" +CVE_STATUS[CVE-2022-49001] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-16658] = "fixed-version: Fixed from version 4.19rc2" +CVE_STATUS[CVE-2022-49002] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-16862] = "fixed-version: Fixed from version 4.20rc5" +CVE_STATUS[CVE-2022-49003] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-16871] = "fixed-version: Fixed from version 4.20rc3" +CVE_STATUS[CVE-2022-49004] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-16880] = "fixed-version: Fixed from version 5.0rc5" +CVE_STATUS[CVE-2022-49005] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-16882] = "fixed-version: Fixed from version 4.20" +CVE_STATUS[CVE-2022-49006] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-16884] = "fixed-version: Fixed from version 5.0rc1" +CVE_STATUS[CVE-2022-49007] = "fixed-version: Fixed from version 6.1" -# CVE-2018-16885 has no known resolution +CVE_STATUS[CVE-2022-49008] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-17182] = "fixed-version: Fixed from version 4.19rc4" +CVE_STATUS[CVE-2022-49009] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-17972] = "fixed-version: Fixed from version 4.19rc7" +CVE_STATUS[CVE-2022-49010] = "fixed-version: Fixed from version 6.1" -# CVE-2018-17977 has no known resolution +CVE_STATUS[CVE-2022-49011] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-18021] = "fixed-version: Fixed from version 4.19rc7" +CVE_STATUS[CVE-2022-49012] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-18281] = "fixed-version: Fixed from version 4.19" +CVE_STATUS[CVE-2022-49013] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-18386] = "fixed-version: Fixed from version 4.15rc6" +CVE_STATUS[CVE-2022-49014] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-18397] = "fixed-version: Fixed from version 4.20rc5" +CVE_STATUS[CVE-2022-49015] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-18445] = "fixed-version: Fixed from version 4.19rc7" +CVE_STATUS[CVE-2022-49016] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-18559] = "fixed-version: Fixed from version 4.15rc2" +CVE_STATUS[CVE-2022-49017] = "fixed-version: Fixed from version 6.1" -# CVE-2018-18653 has no known resolution +CVE_STATUS[CVE-2022-49018] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-18690] = "fixed-version: Fixed from version 4.17rc4" +CVE_STATUS[CVE-2022-49019] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-18710] = "fixed-version: Fixed from version 4.20rc1" +CVE_STATUS[CVE-2022-49020] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-18955] = "fixed-version: Fixed from version 4.20rc2" +CVE_STATUS[CVE-2022-49021] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-19406] = "fixed-version: Fixed from version 4.20rc5" +CVE_STATUS[CVE-2022-49022] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-19407] = "fixed-version: Fixed from version 4.20rc5" +CVE_STATUS[CVE-2022-49023] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-19824] = "fixed-version: Fixed from version 4.20rc6" +CVE_STATUS[CVE-2022-49024] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-19854] = "fixed-version: Fixed from version 4.20rc3" +CVE_STATUS[CVE-2022-49025] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-19985] = "fixed-version: Fixed from version 4.20" +CVE_STATUS[CVE-2022-49026] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-20169] = "fixed-version: Fixed from version 4.20rc6" +CVE_STATUS[CVE-2022-49027] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-20449] = "fixed-version: Fixed from version 4.15rc2" +CVE_STATUS[CVE-2022-49028] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-20509] = "fixed-version: Fixed from version 4.14rc1" +CVE_STATUS[CVE-2022-49029] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-20510] = "fixed-version: Fixed from version 4.16rc3" +CVE_STATUS[CVE-2022-49030] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-20511] = "fixed-version: Fixed from version 4.19rc5" +CVE_STATUS[CVE-2022-49031] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-20669] = "fixed-version: Fixed from version 5.0rc1" +CVE_STATUS[CVE-2022-49032] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-20784] = "fixed-version: Fixed from version 5.0rc1" +CVE_STATUS[CVE-2022-49033] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-20836] = "fixed-version: Fixed from version 4.20rc1" +CVE_STATUS[CVE-2022-49034] = "cpe-stable-backport: Backported in 6.6.64" -CVE_STATUS[CVE-2018-20854] = "fixed-version: Fixed from version 4.20rc1" +CVE_STATUS[CVE-2022-49035] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2018-20855] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-49044] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-20856] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-49046] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-20961] = "fixed-version: Fixed from version 4.17rc1" +CVE_STATUS[CVE-2022-49047] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-20976] = "fixed-version: Fixed from version 4.18rc1" +CVE_STATUS[CVE-2022-49048] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-21008] = "fixed-version: Fixed from version 4.18rc1" +CVE_STATUS[CVE-2022-49049] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-25015] = "fixed-version: Fixed from version 4.15rc9" +CVE_STATUS[CVE-2022-49050] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-25020] = "fixed-version: Fixed from version 4.17rc7" +CVE_STATUS[CVE-2022-49051] = "fixed-version: Fixed from version 5.18" -# CVE-2018-3574 has no known resolution +CVE_STATUS[CVE-2022-49052] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-3620] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-49053] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-3639] = "fixed-version: Fixed from version 4.17rc7" +CVE_STATUS[CVE-2022-49054] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-3646] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-49055] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-3665] = "fixed-version: Fixed from version 3.7rc1" +CVE_STATUS[CVE-2022-49057] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-3693] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-49058] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-5332] = "fixed-version: Fixed from version 4.15rc8" +CVE_STATUS[CVE-2022-49059] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-5333] = "fixed-version: Fixed from version 4.15rc8" +CVE_STATUS[CVE-2022-49060] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-5344] = "fixed-version: Fixed from version 4.15rc8" +CVE_STATUS[CVE-2022-49061] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-5390] = "fixed-version: Fixed from version 4.18rc7" +CVE_STATUS[CVE-2022-49062] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-5391] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-49063] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-5703] = "fixed-version: Fixed from version 4.16rc5" +CVE_STATUS[CVE-2022-49064] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-5750] = "fixed-version: Fixed from version 4.16rc1" +CVE_STATUS[CVE-2022-49065] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-5803] = "fixed-version: Fixed from version 4.16rc1" +CVE_STATUS[CVE-2022-49066] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-5814] = "fixed-version: Fixed from version 4.17rc6" +CVE_STATUS[CVE-2022-49067] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-5848] = "fixed-version: Fixed from version 4.16rc1" +CVE_STATUS[CVE-2022-49068] = "fixed-version: Fixed from version 5.18" -# Skipping CVE-2018-5856, no affected_versions +CVE_STATUS[CVE-2022-49069] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-5873] = "fixed-version: Fixed from version 4.11rc8" +CVE_STATUS[CVE-2022-49070] = "fixed-version: Fixed from version 5.17.3" -CVE_STATUS[CVE-2018-5953] = "fixed-version: Fixed from version 4.15rc2" +CVE_STATUS[CVE-2022-49071] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-5995] = "fixed-version: Fixed from version 4.15rc2" +CVE_STATUS[CVE-2022-49072] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-6412] = "fixed-version: Fixed from version 4.16rc5" +CVE_STATUS[CVE-2022-49073] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-6554] = "fixed-version: Fixed from version 4.17rc1" +CVE_STATUS[CVE-2022-49074] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-6555] = "fixed-version: Fixed from version 4.17rc1" +CVE_STATUS[CVE-2022-49075] = "fixed-version: Fixed from version 5.18" -# CVE-2018-6559 has no known resolution +CVE_STATUS[CVE-2022-49076] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-6927] = "fixed-version: Fixed from version 4.15rc9" +CVE_STATUS[CVE-2022-49077] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-7191] = "fixed-version: Fixed from version 4.14rc6" +CVE_STATUS[CVE-2022-49078] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-7273] = "fixed-version: Fixed from version 4.15rc2" +CVE_STATUS[CVE-2022-49079] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-7480] = "fixed-version: Fixed from version 4.11rc1" +CVE_STATUS[CVE-2022-49080] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-7492] = "fixed-version: Fixed from version 4.15rc3" +CVE_STATUS[CVE-2022-49081] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-7566] = "fixed-version: Fixed from version 4.16rc2" +CVE_STATUS[CVE-2022-49082] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-7740] = "fixed-version: Fixed from version 4.16rc7" +CVE_STATUS[CVE-2022-49083] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-7754] = "fixed-version: Fixed from version 4.15rc2" +CVE_STATUS[CVE-2022-49084] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-7755] = "fixed-version: Fixed from version 4.19rc5" +CVE_STATUS[CVE-2022-49085] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-7757] = "fixed-version: Fixed from version 4.16rc1" +CVE_STATUS[CVE-2022-49086] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-7995] = "fixed-version: Fixed from version 4.16rc5" +CVE_STATUS[CVE-2022-49087] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-8043] = "fixed-version: Fixed from version 4.16rc1" +CVE_STATUS[CVE-2022-49088] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-8087] = "fixed-version: Fixed from version 4.16rc1" +CVE_STATUS[CVE-2022-49089] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-8781] = "fixed-version: Fixed from version 4.16rc7" +CVE_STATUS[CVE-2022-49090] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-8822] = "fixed-version: Fixed from version 4.16rc7" +CVE_STATUS[CVE-2022-49091] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-8897] = "fixed-version: Fixed from version 4.16rc7" +CVE_STATUS[CVE-2022-49092] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-9363] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-49093] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-9385] = "fixed-version: Fixed from version 4.17rc3" +CVE_STATUS[CVE-2022-49094] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-9415] = "fixed-version: Fixed from version 4.17rc3" +CVE_STATUS[CVE-2022-49095] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-9422] = "fixed-version: Fixed from version 4.6rc1" +CVE_STATUS[CVE-2022-49096] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-9465] = "fixed-version: Fixed from version 4.15rc6" +CVE_STATUS[CVE-2022-49097] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-9516] = "fixed-version: Fixed from version 4.18rc5" +CVE_STATUS[CVE-2022-49098] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-9517] = "fixed-version: Fixed from version 4.14rc1" +CVE_STATUS[CVE-2022-49099] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-9518] = "fixed-version: Fixed from version 4.16rc3" +CVE_STATUS[CVE-2022-49100] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2018-9568] = "fixed-version: Fixed from version 4.14rc4" +CVE_STATUS[CVE-2022-49102] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-0136] = "fixed-version: Fixed from version 5.2rc6" +CVE_STATUS[CVE-2022-49103] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-0145] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49104] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-0146] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49105] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-0147] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49106] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-0148] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49107] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-0149] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49108] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-0154] = "fixed-version: Fixed from version 5.4rc8" +CVE_STATUS[CVE-2022-49109] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-0155] = "fixed-version: Fixed from version 5.4rc8" +CVE_STATUS[CVE-2022-49110] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-10124] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49111] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-10125] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49112] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-10126] = "fixed-version: Fixed from version 5.2rc6" +CVE_STATUS[CVE-2022-49113] = "fixed-version: Fixed from version 5.18" -# CVE-2019-10140 has no known resolution +CVE_STATUS[CVE-2022-49114] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-10142] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49115] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-10207] = "fixed-version: Fixed from version 5.3rc3" +CVE_STATUS[CVE-2022-49116] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-10220] = "fixed-version: Fixed from version 5.4rc2" +CVE_STATUS[CVE-2022-49117] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-10638] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49118] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-10639] = "fixed-version: Fixed from version 5.1rc4" +CVE_STATUS[CVE-2022-49119] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-11085] = "fixed-version: Fixed from version 5.0rc3" +CVE_STATUS[CVE-2022-49120] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-11091] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49121] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-11135] = "fixed-version: Fixed from version 5.4rc8" +CVE_STATUS[CVE-2022-49122] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-11190] = "fixed-version: Fixed from version 4.8rc5" +CVE_STATUS[CVE-2022-49123] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-11191] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49124] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-1125] = "fixed-version: Fixed from version 5.3rc4" +CVE_STATUS[CVE-2022-49125] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-11477] = "fixed-version: Fixed from version 5.2rc6" +CVE_STATUS[CVE-2022-49126] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-11478] = "fixed-version: Fixed from version 5.2rc6" +CVE_STATUS[CVE-2022-49127] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-11479] = "fixed-version: Fixed from version 5.2rc6" +CVE_STATUS[CVE-2022-49128] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-11486] = "fixed-version: Fixed from version 5.1rc4" +CVE_STATUS[CVE-2022-49129] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-11487] = "fixed-version: Fixed from version 5.1rc5" +CVE_STATUS[CVE-2022-49130] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-11599] = "fixed-version: Fixed from version 5.1rc6" +CVE_STATUS[CVE-2022-49131] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-11683] = "fixed-version: Fixed from version 5.1" +CVE_STATUS[CVE-2022-49132] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-11810] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49133] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-11811] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49134] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-11815] = "fixed-version: Fixed from version 5.1rc4" +CVE_STATUS[CVE-2022-49135] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-11833] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49136] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-11884] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49137] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-12378] = "fixed-version: Fixed from version 5.2rc3" +CVE_STATUS[CVE-2022-49138] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-12379] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49139] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-12380] = "fixed-version: Fixed from version 5.2rc3" +CVE_STATUS[CVE-2022-49141] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-12381] = "fixed-version: Fixed from version 5.2rc3" +CVE_STATUS[CVE-2022-49142] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-12382] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49144] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-12454] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49145] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-12455] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49146] = "fixed-version: Fixed from version 5.18" -# CVE-2019-12456 has no known resolution +CVE_STATUS[CVE-2022-49147] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-12614] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49148] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-12615] = "fixed-version: Fixed from version 5.2rc4" +CVE_STATUS[CVE-2022-49149] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-12817] = "fixed-version: Fixed from version 5.2rc7" +CVE_STATUS[CVE-2022-49150] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-12818] = "fixed-version: Fixed from version 5.0" +CVE_STATUS[CVE-2022-49151] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-12819] = "fixed-version: Fixed from version 5.0rc8" +CVE_STATUS[CVE-2022-49152] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-12881] = "fixed-version: Fixed from version 4.18rc1" +CVE_STATUS[CVE-2022-49153] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-12984] = "fixed-version: Fixed from version 5.2rc6" +CVE_STATUS[CVE-2022-49154] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-13233] = "fixed-version: Fixed from version 5.2rc4" +CVE_STATUS[CVE-2022-49155] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-13272] = "fixed-version: Fixed from version 5.2" +CVE_STATUS[CVE-2022-49156] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-13631] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49157] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-13648] = "fixed-version: Fixed from version 5.3rc2" +CVE_STATUS[CVE-2022-49158] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-14283] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49159] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-14284] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49160] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-14615] = "fixed-version: Fixed from version 5.5rc7" +CVE_STATUS[CVE-2022-49161] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-14763] = "fixed-version: Fixed from version 4.17rc1" +CVE_STATUS[CVE-2022-49162] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-14814] = "fixed-version: Fixed from version 5.3" +CVE_STATUS[CVE-2022-49163] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-14815] = "fixed-version: Fixed from version 5.3" +CVE_STATUS[CVE-2022-49164] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-14816] = "fixed-version: Fixed from version 5.3" +CVE_STATUS[CVE-2022-49165] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-14821] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49166] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-14835] = "fixed-version: Fixed from version 5.3" +CVE_STATUS[CVE-2022-49167] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-14895] = "fixed-version: Fixed from version 5.5rc3" +CVE_STATUS[CVE-2022-49168] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-14896] = "fixed-version: Fixed from version 5.5" +CVE_STATUS[CVE-2022-49169] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-14897] = "fixed-version: Fixed from version 5.5" +CVE_STATUS[CVE-2022-49170] = "fixed-version: Fixed from version 5.18" -# CVE-2019-14898 has no known resolution +CVE_STATUS[CVE-2022-49171] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-14901] = "fixed-version: Fixed from version 5.5rc3" +CVE_STATUS[CVE-2022-49172] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15030] = "fixed-version: Fixed from version 5.3rc8" +CVE_STATUS[CVE-2022-49173] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15031] = "fixed-version: Fixed from version 5.3rc8" +CVE_STATUS[CVE-2022-49174] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15090] = "fixed-version: Fixed from version 5.2rc2" +CVE_STATUS[CVE-2022-49175] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15098] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49176] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15099] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49177] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15117] = "fixed-version: Fixed from version 5.3rc5" +CVE_STATUS[CVE-2022-49178] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15118] = "fixed-version: Fixed from version 5.3rc5" +CVE_STATUS[CVE-2022-49179] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15211] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49180] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15212] = "fixed-version: Fixed from version 5.2rc3" +CVE_STATUS[CVE-2022-49182] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15213] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49183] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15214] = "fixed-version: Fixed from version 5.1rc6" +CVE_STATUS[CVE-2022-49184] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15215] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49185] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15216] = "fixed-version: Fixed from version 5.1" +CVE_STATUS[CVE-2022-49186] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15217] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49187] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15218] = "fixed-version: Fixed from version 5.2rc3" +CVE_STATUS[CVE-2022-49188] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15219] = "fixed-version: Fixed from version 5.2rc3" +CVE_STATUS[CVE-2022-49189] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15220] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49190] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15221] = "fixed-version: Fixed from version 5.2" +CVE_STATUS[CVE-2022-49191] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15222] = "fixed-version: Fixed from version 5.3rc3" +CVE_STATUS[CVE-2022-49192] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15223] = "fixed-version: Fixed from version 5.2rc3" +CVE_STATUS[CVE-2022-49193] = "fixed-version: Fixed from version 5.18" -# CVE-2019-15239 has no known resolution +CVE_STATUS[CVE-2022-49194] = "fixed-version: Fixed from version 5.18" -# CVE-2019-15290 has no known resolution +CVE_STATUS[CVE-2022-49195] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15291] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49196] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15292] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49197] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15504] = "fixed-version: Fixed from version 5.3" +CVE_STATUS[CVE-2022-49198] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15505] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49199] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15538] = "fixed-version: Fixed from version 5.3rc6" +CVE_STATUS[CVE-2022-49200] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15666] = "fixed-version: Fixed from version 5.1" +CVE_STATUS[CVE-2022-49201] = "fixed-version: Fixed from version 5.18" -# CVE-2019-15791 has no known resolution +CVE_STATUS[CVE-2022-49202] = "fixed-version: Fixed from version 5.18" -# CVE-2019-15792 has no known resolution +CVE_STATUS[CVE-2022-49203] = "fixed-version: Fixed from version 5.18" -# CVE-2019-15793 has no known resolution +CVE_STATUS[CVE-2022-49204] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15794] = "fixed-version: Fixed from version 5.12" +CVE_STATUS[CVE-2022-49205] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15807] = "fixed-version: Fixed from version 5.2rc3" +CVE_STATUS[CVE-2022-49206] = "fixed-version: Fixed from version 5.18" -# CVE-2019-15902 has no known resolution +CVE_STATUS[CVE-2022-49207] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15916] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49208] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15917] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49209] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15918] = "fixed-version: Fixed from version 5.1rc6" +CVE_STATUS[CVE-2022-49210] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15919] = "fixed-version: Fixed from version 5.1rc6" +CVE_STATUS[CVE-2022-49211] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15920] = "fixed-version: Fixed from version 5.1rc6" +CVE_STATUS[CVE-2022-49212] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15921] = "fixed-version: Fixed from version 5.1rc3" +CVE_STATUS[CVE-2022-49213] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15922] = "fixed-version: Fixed from version 5.1rc4" +CVE_STATUS[CVE-2022-49214] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15923] = "fixed-version: Fixed from version 5.1rc4" +CVE_STATUS[CVE-2022-49215] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15924] = "fixed-version: Fixed from version 5.1rc4" +CVE_STATUS[CVE-2022-49216] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15925] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49217] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15926] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49218] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-15927] = "fixed-version: Fixed from version 5.0rc2" +CVE_STATUS[CVE-2022-49219] = "fixed-version: Fixed from version 5.18" -# CVE-2019-16089 has no known resolution +CVE_STATUS[CVE-2022-49220] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-16229] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49221] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-16230] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49222] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-16231] = "fixed-version: Fixed from version 5.4rc6" +CVE_STATUS[CVE-2022-49223] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-16232] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49224] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-16233] = "fixed-version: Fixed from version 5.4rc5" +CVE_STATUS[CVE-2022-49225] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-16234] = "fixed-version: Fixed from version 5.4rc4" +CVE_STATUS[CVE-2022-49226] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-16413] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49227] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-16714] = "fixed-version: Fixed from version 5.3rc7" +CVE_STATUS[CVE-2022-49228] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-16746] = "fixed-version: Fixed from version 5.4rc2" +CVE_STATUS[CVE-2022-49229] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-16921] = "fixed-version: Fixed from version 4.17rc1" +CVE_STATUS[CVE-2022-49230] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-16994] = "fixed-version: Fixed from version 5.0" +CVE_STATUS[CVE-2022-49231] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-16995] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49232] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-17052] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49233] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-17053] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49234] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-17054] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49235] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-17055] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49236] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-17056] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49237] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-17075] = "fixed-version: Fixed from version 5.4rc3" +CVE_STATUS[CVE-2022-49238] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-17133] = "fixed-version: Fixed from version 5.4rc4" +CVE_STATUS[CVE-2022-49239] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-17351] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49240] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-17666] = "fixed-version: Fixed from version 5.4rc6" +CVE_STATUS[CVE-2022-49241] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-18198] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49242] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-18282] = "fixed-version: Fixed from version 5.4rc6" +CVE_STATUS[CVE-2022-49243] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-18660] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49244] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-18675] = "fixed-version: Fixed from version 4.17rc5" +CVE_STATUS[CVE-2022-49245] = "fixed-version: Fixed from version 5.18" -# CVE-2019-18680 has no known resolution +CVE_STATUS[CVE-2022-49246] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-18683] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49247] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-18786] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49248] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-18805] = "fixed-version: Fixed from version 5.1rc7" +CVE_STATUS[CVE-2022-49249] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-18806] = "fixed-version: Fixed from version 5.4rc2" +CVE_STATUS[CVE-2022-49250] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-18807] = "fixed-version: Fixed from version 5.4rc2" +CVE_STATUS[CVE-2022-49251] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-18808] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49252] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-18809] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49253] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-18810] = "fixed-version: Fixed from version 5.4rc2" +CVE_STATUS[CVE-2022-49254] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-18811] = "fixed-version: Fixed from version 5.4rc7" +CVE_STATUS[CVE-2022-49255] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-18812] = "fixed-version: Fixed from version 5.4rc7" +CVE_STATUS[CVE-2022-49256] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-18813] = "fixed-version: Fixed from version 5.4rc6" +CVE_STATUS[CVE-2022-49257] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-18814] = "fixed-version: Fixed from version 5.7rc7" +CVE_STATUS[CVE-2022-49258] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-18885] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49259] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19036] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49260] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19037] = "fixed-version: Fixed from version 5.5rc3" +CVE_STATUS[CVE-2022-49261] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19039] = "fixed-version: Fixed from version 5.7rc1" +CVE_STATUS[CVE-2022-49262] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19043] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49263] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19044] = "fixed-version: Fixed from version 5.4rc6" +CVE_STATUS[CVE-2022-49264] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19045] = "fixed-version: Fixed from version 5.4rc6" +CVE_STATUS[CVE-2022-49265] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19046] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49266] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19047] = "fixed-version: Fixed from version 5.4rc6" +CVE_STATUS[CVE-2022-49268] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19048] = "fixed-version: Fixed from version 5.4rc3" +CVE_STATUS[CVE-2022-49269] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19049] = "fixed-version: Fixed from version 5.4rc5" +CVE_STATUS[CVE-2022-49270] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19050] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49271] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19051] = "fixed-version: Fixed from version 5.4rc6" +CVE_STATUS[CVE-2022-49272] = "fixed-version: Fixed from version 5.17.2" -CVE_STATUS[CVE-2019-19052] = "fixed-version: Fixed from version 5.4rc7" +CVE_STATUS[CVE-2022-49273] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19053] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49274] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19054] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49275] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19055] = "fixed-version: Fixed from version 5.4rc4" +CVE_STATUS[CVE-2022-49276] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19056] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49277] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19057] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49278] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19058] = "fixed-version: Fixed from version 5.4rc4" +CVE_STATUS[CVE-2022-49279] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19059] = "fixed-version: Fixed from version 5.4rc4" +CVE_STATUS[CVE-2022-49280] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19060] = "fixed-version: Fixed from version 5.4rc3" +CVE_STATUS[CVE-2022-49281] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19061] = "fixed-version: Fixed from version 5.4rc3" +CVE_STATUS[CVE-2022-49282] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19062] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49283] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19063] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49284] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19064] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49285] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19065] = "fixed-version: Fixed from version 5.4rc3" +CVE_STATUS[CVE-2022-49286] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19066] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49287] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19067] = "fixed-version: Fixed from version 5.4rc2" +CVE_STATUS[CVE-2022-49288] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19068] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49289] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19069] = "fixed-version: Fixed from version 5.4rc3" +CVE_STATUS[CVE-2022-49290] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19070] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49291] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19071] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49292] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19072] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49293] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2019-19073] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49294] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19074] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49295] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19075] = "fixed-version: Fixed from version 5.4rc2" +CVE_STATUS[CVE-2022-49296] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19076] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49297] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19077] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49298] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19078] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49300] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19079] = "fixed-version: Fixed from version 5.3" +CVE_STATUS[CVE-2022-49301] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19080] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49302] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19081] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49303] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19082] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49304] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19083] = "fixed-version: Fixed from version 5.4rc2" +CVE_STATUS[CVE-2022-49305] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19227] = "fixed-version: Fixed from version 5.1rc3" +CVE_STATUS[CVE-2022-49306] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19241] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49307] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19252] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49308] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19318] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49309] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19319] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49310] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19332] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49311] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19338] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49312] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19377] = "fixed-version: Fixed from version 5.7rc1" +CVE_STATUS[CVE-2022-49313] = "fixed-version: Fixed from version 5.19" -# CVE-2019-19378 has no known resolution +CVE_STATUS[CVE-2022-49314] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19447] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49315] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19448] = "fixed-version: Fixed from version 5.9rc1" +CVE_STATUS[CVE-2022-49316] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19449] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2022-49317] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19462] = "fixed-version: Fixed from version 5.8rc1" +CVE_STATUS[CVE-2022-49318] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19523] = "fixed-version: Fixed from version 5.4rc3" +CVE_STATUS[CVE-2022-49319] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19524] = "fixed-version: Fixed from version 5.4rc8" +CVE_STATUS[CVE-2022-49320] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19525] = "fixed-version: Fixed from version 5.4rc2" +CVE_STATUS[CVE-2022-49321] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19526] = "fixed-version: Fixed from version 5.4rc4" +CVE_STATUS[CVE-2022-49322] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19527] = "fixed-version: Fixed from version 5.3rc4" +CVE_STATUS[CVE-2022-49323] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19528] = "fixed-version: Fixed from version 5.4rc3" +CVE_STATUS[CVE-2022-49324] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19529] = "fixed-version: Fixed from version 5.4rc7" +CVE_STATUS[CVE-2022-49325] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19530] = "fixed-version: Fixed from version 5.3rc5" +CVE_STATUS[CVE-2022-49326] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19531] = "fixed-version: Fixed from version 5.3rc4" +CVE_STATUS[CVE-2022-49327] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19532] = "fixed-version: Fixed from version 5.4rc6" +CVE_STATUS[CVE-2022-49328] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19533] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49329] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19534] = "fixed-version: Fixed from version 5.4rc7" +CVE_STATUS[CVE-2022-49330] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19535] = "fixed-version: Fixed from version 5.3rc4" +CVE_STATUS[CVE-2022-49331] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19536] = "fixed-version: Fixed from version 5.3rc4" +CVE_STATUS[CVE-2022-49332] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19537] = "fixed-version: Fixed from version 5.3rc5" +CVE_STATUS[CVE-2022-49333] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19543] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49334] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19602] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49335] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19767] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49336] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19768] = "fixed-version: Fixed from version 5.6rc4" +CVE_STATUS[CVE-2022-49337] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19769] = "fixed-version: Fixed from version 5.6rc5" +CVE_STATUS[CVE-2022-49338] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19770] = "fixed-version: Fixed from version 5.9rc1" +CVE_STATUS[CVE-2022-49339] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19807] = "fixed-version: Fixed from version 5.4rc7" +CVE_STATUS[CVE-2022-49340] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19813] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49341] = "fixed-version: Fixed from version 5.19" -# CVE-2019-19814 has no known resolution +CVE_STATUS[CVE-2022-49342] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19815] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49343] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19816] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49344] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19922] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49345] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19927] = "fixed-version: Fixed from version 5.1rc6" +CVE_STATUS[CVE-2022-49346] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19947] = "fixed-version: Fixed from version 5.5rc3" +CVE_STATUS[CVE-2022-49347] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19965] = "fixed-version: Fixed from version 5.5rc2" +CVE_STATUS[CVE-2022-49348] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-19966] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49349] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-1999] = "fixed-version: Fixed from version 5.1rc3" +CVE_STATUS[CVE-2022-49350] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-20054] = "fixed-version: Fixed from version 5.1rc3" +CVE_STATUS[CVE-2022-49351] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-20095] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49352] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-20096] = "fixed-version: Fixed from version 5.1rc4" +CVE_STATUS[CVE-2022-49353] = "fixed-version: Fixed from version 5.18.4" -CVE_STATUS[CVE-2019-2024] = "fixed-version: Fixed from version 4.16rc1" +CVE_STATUS[CVE-2022-49354] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-2025] = "fixed-version: Fixed from version 4.20rc5" +CVE_STATUS[CVE-2022-49356] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-20422] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49357] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-2054] = "fixed-version: Fixed from version 4.8rc1" +CVE_STATUS[CVE-2022-49358] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-20636] = "fixed-version: Fixed from version 5.5rc6" +CVE_STATUS[CVE-2022-49359] = "fixed-version: Fixed from version 5.19" -# CVE-2019-20794 has no known resolution +CVE_STATUS[CVE-2022-49360] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-20806] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49361] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-20810] = "fixed-version: Fixed from version 5.6rc1" +CVE_STATUS[CVE-2022-49362] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-20811] = "fixed-version: Fixed from version 5.1rc3" +CVE_STATUS[CVE-2022-49363] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-20812] = "fixed-version: Fixed from version 5.5rc3" +CVE_STATUS[CVE-2022-49364] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-20908] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49365] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-20934] = "fixed-version: Fixed from version 5.3rc2" +CVE_STATUS[CVE-2022-49366] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-2101] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49367] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-2181] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49368] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-2182] = "fixed-version: Fixed from version 4.16rc3" +CVE_STATUS[CVE-2022-49369] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-2213] = "fixed-version: Fixed from version 5.2rc6" +CVE_STATUS[CVE-2022-49370] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-2214] = "fixed-version: Fixed from version 5.3rc2" +CVE_STATUS[CVE-2022-49371] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-2215] = "fixed-version: Fixed from version 4.16rc1" +CVE_STATUS[CVE-2022-49372] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-25044] = "fixed-version: Fixed from version 5.2rc4" +CVE_STATUS[CVE-2022-49373] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-25045] = "fixed-version: Fixed from version 5.1" +CVE_STATUS[CVE-2022-49374] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-25160] = "fixed-version: Fixed from version 5.0" +CVE_STATUS[CVE-2022-49375] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-25162] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-49376] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-3016] = "fixed-version: Fixed from version 5.6rc1" +CVE_STATUS[CVE-2022-49377] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-3459] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49378] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-3460] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49379] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-3701] = "fixed-version: Fixed from version 5.0rc3" +CVE_STATUS[CVE-2022-49380] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-3819] = "fixed-version: Fixed from version 5.0rc6" +CVE_STATUS[CVE-2022-49381] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-3837] = "fixed-version: Fixed from version 3.18rc1" +CVE_STATUS[CVE-2022-49382] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-3846] = "fixed-version: Fixed from version 5.2rc6" +CVE_STATUS[CVE-2022-49383] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-3874] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49384] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-3882] = "fixed-version: Fixed from version 5.1rc4" +CVE_STATUS[CVE-2022-49385] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-3887] = "fixed-version: Fixed from version 5.1rc4" +CVE_STATUS[CVE-2022-49386] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-3892] = "fixed-version: Fixed from version 5.1rc6" +CVE_STATUS[CVE-2022-49387] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-3896] = "fixed-version: Fixed from version 2.6.35rc1" +CVE_STATUS[CVE-2022-49388] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-3900] = "fixed-version: Fixed from version 5.2rc4" +CVE_STATUS[CVE-2022-49389] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-3901] = "fixed-version: Fixed from version 4.6rc6" +CVE_STATUS[CVE-2022-49390] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-5108] = "fixed-version: Fixed from version 5.3" +CVE_STATUS[CVE-2022-49391] = "fixed-version: Fixed from version 5.19" -# Skipping CVE-2019-5489, no affected_versions +CVE_STATUS[CVE-2022-49392] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-6133] = "fixed-version: Fixed from version 5.0rc2" +CVE_STATUS[CVE-2022-49393] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-6974] = "fixed-version: Fixed from version 5.0rc6" +CVE_STATUS[CVE-2022-49394] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-7221] = "fixed-version: Fixed from version 5.0rc6" +CVE_STATUS[CVE-2022-49395] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-7222] = "fixed-version: Fixed from version 5.0rc6" +CVE_STATUS[CVE-2022-49396] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-7308] = "fixed-version: Fixed from version 5.0rc3" +CVE_STATUS[CVE-2022-49397] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-8912] = "fixed-version: Fixed from version 5.0rc8" +CVE_STATUS[CVE-2022-49398] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-8956] = "fixed-version: Fixed from version 5.0rc6" +CVE_STATUS[CVE-2022-49399] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-8980] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49400] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-9003] = "fixed-version: Fixed from version 5.0rc4" +CVE_STATUS[CVE-2022-49401] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-9162] = "fixed-version: Fixed from version 5.0rc7" +CVE_STATUS[CVE-2022-49402] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-9213] = "fixed-version: Fixed from version 5.0" +CVE_STATUS[CVE-2022-49403] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-9245] = "fixed-version: Fixed from version 5.0rc1" +CVE_STATUS[CVE-2022-49404] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-9444] = "fixed-version: Fixed from version 4.15rc2" +CVE_STATUS[CVE-2022-49405] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-9445] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49406] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-9453] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49407] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-9454] = "fixed-version: Fixed from version 4.15rc9" +CVE_STATUS[CVE-2022-49408] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-9455] = "fixed-version: Fixed from version 5.0rc1" +CVE_STATUS[CVE-2022-49409] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-9456] = "fixed-version: Fixed from version 4.16rc6" +CVE_STATUS[CVE-2022-49410] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-9457] = "fixed-version: Fixed from version 4.13rc1" +CVE_STATUS[CVE-2022-49411] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-9458] = "fixed-version: Fixed from version 4.19rc7" +CVE_STATUS[CVE-2022-49412] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-9466] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49413] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-9500] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49414] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-9503] = "fixed-version: Fixed from version 5.1rc1" +CVE_STATUS[CVE-2022-49415] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-9506] = "fixed-version: Fixed from version 5.2" +CVE_STATUS[CVE-2022-49416] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2019-9857] = "fixed-version: Fixed from version 5.1rc2" +CVE_STATUS[CVE-2022-49417] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0009] = "fixed-version: Fixed from version 5.6rc3" +CVE_STATUS[CVE-2022-49418] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0030] = "fixed-version: Fixed from version 4.16rc3" +CVE_STATUS[CVE-2022-49419] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0041] = "fixed-version: Fixed from version 5.5rc2" +CVE_STATUS[CVE-2022-49420] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0066] = "fixed-version: Fixed from version 4.3rc7" +CVE_STATUS[CVE-2022-49421] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0067] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49422] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0110] = "fixed-version: Fixed from version 5.6rc2" +CVE_STATUS[CVE-2022-49423] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0255] = "fixed-version: Fixed from version 5.7rc4" +CVE_STATUS[CVE-2022-49424] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0305] = "fixed-version: Fixed from version 5.5rc6" +CVE_STATUS[CVE-2022-49425] = "fixed-version: Fixed from version 5.19" -# CVE-2020-0347 has no known resolution +CVE_STATUS[CVE-2022-49426] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0404] = "fixed-version: Fixed from version 5.6rc1" +CVE_STATUS[CVE-2022-49427] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0423] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2022-49428] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0427] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49429] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0429] = "fixed-version: Fixed from version 4.14rc4" +CVE_STATUS[CVE-2022-49430] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0430] = "fixed-version: Fixed from version 4.18rc1" +CVE_STATUS[CVE-2022-49431] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0431] = "fixed-version: Fixed from version 5.5rc6" +CVE_STATUS[CVE-2022-49432] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0432] = "fixed-version: Fixed from version 5.6rc1" +CVE_STATUS[CVE-2022-49433] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0433] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-49434] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0435] = "fixed-version: Fixed from version 4.19rc1" +CVE_STATUS[CVE-2022-49435] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0444] = "fixed-version: Fixed from version 5.6rc4" +CVE_STATUS[CVE-2022-49436] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0465] = "fixed-version: Fixed from version 5.9rc4" +CVE_STATUS[CVE-2022-49437] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0466] = "fixed-version: Fixed from version 5.9rc2" +CVE_STATUS[CVE-2022-49438] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-0543] = "fixed-version: Fixed from version 5.8rc1" +CVE_STATUS[CVE-2022-49439] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-10135] = "fixed-version: Fixed from version 5.8rc1" +CVE_STATUS[CVE-2022-49440] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-10690] = "fixed-version: Fixed from version 5.5rc5" +CVE_STATUS[CVE-2022-49441] = "fixed-version: Fixed from version 5.19" -# CVE-2020-10708 has no known resolution +CVE_STATUS[CVE-2022-49442] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-10711] = "fixed-version: Fixed from version 5.7rc6" +CVE_STATUS[CVE-2022-49443] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-10720] = "fixed-version: Fixed from version 5.2rc3" +CVE_STATUS[CVE-2022-49444] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-10732] = "fixed-version: Fixed from version 5.7" +CVE_STATUS[CVE-2022-49445] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-10742] = "fixed-version: Fixed from version 3.16rc1" +CVE_STATUS[CVE-2022-49446] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-10751] = "fixed-version: Fixed from version 5.7rc4" +CVE_STATUS[CVE-2022-49447] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-10757] = "fixed-version: Fixed from version 5.8rc1" +CVE_STATUS[CVE-2022-49448] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-10766] = "fixed-version: Fixed from version 5.8rc1" +CVE_STATUS[CVE-2022-49449] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-10767] = "fixed-version: Fixed from version 5.8rc1" +CVE_STATUS[CVE-2022-49450] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-10768] = "fixed-version: Fixed from version 5.8rc1" +CVE_STATUS[CVE-2022-49451] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-10769] = "fixed-version: Fixed from version 5.0rc3" +CVE_STATUS[CVE-2022-49452] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-10773] = "fixed-version: Fixed from version 5.4rc6" +CVE_STATUS[CVE-2022-49453] = "fixed-version: Fixed from version 5.19" -# CVE-2020-10774 has no known resolution +CVE_STATUS[CVE-2022-49454] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-10781] = "fixed-version: Fixed from version 5.8rc6" +CVE_STATUS[CVE-2022-49455] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-10942] = "fixed-version: Fixed from version 5.6rc4" +CVE_STATUS[CVE-2022-49456] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-11494] = "fixed-version: Fixed from version 5.7rc1" +CVE_STATUS[CVE-2022-49457] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-11565] = "fixed-version: Fixed from version 5.7rc1" +CVE_STATUS[CVE-2022-49458] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-11608] = "fixed-version: Fixed from version 5.7rc1" +CVE_STATUS[CVE-2022-49459] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-11609] = "fixed-version: Fixed from version 5.7rc1" +CVE_STATUS[CVE-2022-49460] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-11668] = "fixed-version: Fixed from version 5.7rc1" +CVE_STATUS[CVE-2022-49461] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-11669] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49462] = "fixed-version: Fixed from version 5.19" -# CVE-2020-11725 has no known resolution +CVE_STATUS[CVE-2022-49463] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-11884] = "fixed-version: Fixed from version 5.7rc4" +CVE_STATUS[CVE-2022-49464] = "fixed-version: Fixed from version 5.19" -# CVE-2020-11935 has no known resolution +CVE_STATUS[CVE-2022-49465] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12114] = "fixed-version: Fixed from version 5.3rc1" +CVE_STATUS[CVE-2022-49466] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12351] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2022-49467] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12352] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2022-49468] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12362] = "fixed-version: Fixed from version 5.11rc1" +CVE_STATUS[CVE-2022-49469] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12363] = "fixed-version: Fixed from version 5.11rc1" +CVE_STATUS[CVE-2022-49470] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12364] = "fixed-version: Fixed from version 5.11rc1" +CVE_STATUS[CVE-2022-49471] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12464] = "fixed-version: Fixed from version 5.7rc3" +CVE_STATUS[CVE-2022-49472] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12465] = "fixed-version: Fixed from version 5.6rc6" +CVE_STATUS[CVE-2022-49473] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12652] = "fixed-version: Fixed from version 5.5rc7" +CVE_STATUS[CVE-2022-49474] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12653] = "fixed-version: Fixed from version 5.6rc1" +CVE_STATUS[CVE-2022-49475] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12654] = "fixed-version: Fixed from version 5.6rc1" +CVE_STATUS[CVE-2022-49476] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12655] = "fixed-version: Fixed from version 5.7rc1" +CVE_STATUS[CVE-2022-49477] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12656] = "fixed-version: Fixed from version 5.8rc1" +CVE_STATUS[CVE-2022-49478] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12657] = "fixed-version: Fixed from version 5.7rc1" +CVE_STATUS[CVE-2022-49479] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12659] = "fixed-version: Fixed from version 5.7rc2" +CVE_STATUS[CVE-2022-49480] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12768] = "fixed-version: Fixed from version 5.6rc4" +CVE_STATUS[CVE-2022-49481] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12769] = "fixed-version: Fixed from version 5.5rc6" +CVE_STATUS[CVE-2022-49482] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12770] = "fixed-version: Fixed from version 5.7rc3" +CVE_STATUS[CVE-2022-49483] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12771] = "fixed-version: Fixed from version 5.8rc2" +CVE_STATUS[CVE-2022-49484] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12826] = "fixed-version: Fixed from version 5.7rc1" +CVE_STATUS[CVE-2022-49485] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12888] = "fixed-version: Fixed from version 5.8rc1" +CVE_STATUS[CVE-2022-49486] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-12912] = "fixed-version: Fixed from version 5.10rc4" +CVE_STATUS[CVE-2022-49487] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-13143] = "fixed-version: Fixed from version 5.7rc6" +CVE_STATUS[CVE-2022-49488] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-13974] = "fixed-version: Fixed from version 5.8rc1" +CVE_STATUS[CVE-2022-49489] = "fixed-version: Fixed from version 5.19" -# CVE-2020-14304 has no known resolution +CVE_STATUS[CVE-2022-49490] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-14305] = "fixed-version: Fixed from version 4.12rc1" +CVE_STATUS[CVE-2022-49491] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-14314] = "fixed-version: Fixed from version 5.9rc2" +CVE_STATUS[CVE-2022-49492] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-14331] = "fixed-version: Fixed from version 5.9rc1" +CVE_STATUS[CVE-2022-49493] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-14351] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2022-49494] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-14353] = "fixed-version: Fixed from version 4.14rc3" +CVE_STATUS[CVE-2022-49495] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-14356] = "fixed-version: Fixed from version 5.8rc5" +CVE_STATUS[CVE-2022-49496] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-14381] = "fixed-version: Fixed from version 5.6rc6" +CVE_STATUS[CVE-2022-49497] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-14385] = "fixed-version: Fixed from version 5.9rc4" +CVE_STATUS[CVE-2022-49498] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-14386] = "fixed-version: Fixed from version 5.9rc4" +CVE_STATUS[CVE-2022-49499] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-14390] = "fixed-version: Fixed from version 5.9rc6" +CVE_STATUS[CVE-2022-49500] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-14416] = "fixed-version: Fixed from version 5.5" +CVE_STATUS[CVE-2022-49501] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-15393] = "fixed-version: Fixed from version 5.8rc3" +CVE_STATUS[CVE-2022-49502] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-15436] = "fixed-version: Fixed from version 5.8rc2" +CVE_STATUS[CVE-2022-49503] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-15437] = "fixed-version: Fixed from version 5.8rc7" +CVE_STATUS[CVE-2022-49504] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-15780] = "fixed-version: Fixed from version 5.8rc3" +CVE_STATUS[CVE-2022-49505] = "fixed-version: Fixed from version 5.19" -# CVE-2020-15802 has no known resolution +CVE_STATUS[CVE-2022-49506] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-15852] = "fixed-version: Fixed from version 5.8rc6" +CVE_STATUS[CVE-2022-49507] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-16119] = "fixed-version: Fixed from version 5.15rc2" +CVE_STATUS[CVE-2022-49508] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-16120] = "fixed-version: Fixed from version 5.8rc1" +CVE_STATUS[CVE-2022-49509] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-16166] = "fixed-version: Fixed from version 5.8" +CVE_STATUS[CVE-2022-49510] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-1749] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49511] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-24394] = "fixed-version: Fixed from version 5.8rc4" +CVE_STATUS[CVE-2022-49512] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-24490] = "fixed-version: Fixed from version 5.8" +CVE_STATUS[CVE-2022-49513] = "fixed-version: Fixed from version 5.19" -# CVE-2020-24502 has no known resolution +CVE_STATUS[CVE-2022-49514] = "fixed-version: Fixed from version 5.19" -# CVE-2020-24503 has no known resolution +CVE_STATUS[CVE-2022-49515] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-24504] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-49516] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-24586] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-49517] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-24587] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-49518] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-24588] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-49519] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-25211] = "fixed-version: Fixed from version 5.9rc7" +CVE_STATUS[CVE-2022-49520] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-25212] = "fixed-version: Fixed from version 5.9rc1" +CVE_STATUS[CVE-2022-49521] = "fixed-version: Fixed from version 5.19" -# CVE-2020-25220 has no known resolution +CVE_STATUS[CVE-2022-49522] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-25221] = "fixed-version: Fixed from version 5.9rc4" +CVE_STATUS[CVE-2022-49523] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-25284] = "fixed-version: Fixed from version 5.9rc5" +CVE_STATUS[CVE-2022-49524] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-25285] = "fixed-version: Fixed from version 5.9rc4" +CVE_STATUS[CVE-2022-49525] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-25639] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-49526] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-25641] = "fixed-version: Fixed from version 5.9rc4" +CVE_STATUS[CVE-2022-49527] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-25643] = "fixed-version: Fixed from version 5.9rc7" +CVE_STATUS[CVE-2022-49528] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-25645] = "fixed-version: Fixed from version 5.9rc7" +CVE_STATUS[CVE-2022-49529] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-25656] = "fixed-version: Fixed from version 5.10rc2" +CVE_STATUS[CVE-2022-49530] = "fixed-version: Fixed from version 5.19" -# CVE-2020-25661 has no known resolution +CVE_STATUS[CVE-2022-49531] = "fixed-version: Fixed from version 5.19" -# CVE-2020-25662 has no known resolution +CVE_STATUS[CVE-2022-49532] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-25668] = "fixed-version: Fixed from version 5.10rc3" +CVE_STATUS[CVE-2022-49533] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-25669] = "fixed-version: Fixed from version 5.10rc5" +CVE_STATUS[CVE-2022-49534] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-25670] = "fixed-version: Fixed from version 5.12rc7" +CVE_STATUS[CVE-2022-49535] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-25671] = "fixed-version: Fixed from version 5.12rc7" +CVE_STATUS[CVE-2022-49536] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-25672] = "fixed-version: Fixed from version 5.12rc7" +CVE_STATUS[CVE-2022-49537] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-25673] = "fixed-version: Fixed from version 5.12rc7" +CVE_STATUS[CVE-2022-49538] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-25704] = "fixed-version: Fixed from version 5.10rc3" +CVE_STATUS[CVE-2022-49539] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-25705] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2022-49540] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-26088] = "fixed-version: Fixed from version 5.9rc1" +CVE_STATUS[CVE-2022-49541] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-26139] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-49542] = "fixed-version: Fixed from version 5.19" -# CVE-2020-26140 has no known resolution +CVE_STATUS[CVE-2022-49543] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-26141] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-49544] = "fixed-version: Fixed from version 5.19" -# CVE-2020-26142 has no known resolution +CVE_STATUS[CVE-2022-49545] = "fixed-version: Fixed from version 5.19" -# CVE-2020-26143 has no known resolution +CVE_STATUS[CVE-2022-49546] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-26145] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-49547] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-26147] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-49548] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-26541] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49549] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-26555] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49550] = "fixed-version: Fixed from version 5.19" -# CVE-2020-26556 has no known resolution +CVE_STATUS[CVE-2022-49551] = "fixed-version: Fixed from version 5.19" -# CVE-2020-26557 has no known resolution +CVE_STATUS[CVE-2022-49552] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-26558] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49553] = "fixed-version: Fixed from version 5.19" -# CVE-2020-26559 has no known resolution +CVE_STATUS[CVE-2022-49554] = "fixed-version: Fixed from version 5.19" -# CVE-2020-26560 has no known resolution +CVE_STATUS[CVE-2022-49555] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-27066] = "fixed-version: Fixed from version 5.6" +CVE_STATUS[CVE-2022-49556] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-27067] = "fixed-version: Fixed from version 4.14rc4" +CVE_STATUS[CVE-2022-49557] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-27068] = "fixed-version: Fixed from version 5.6rc2" +CVE_STATUS[CVE-2022-49558] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-27152] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2022-49559] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-27170] = "fixed-version: Fixed from version 5.12rc5" +CVE_STATUS[CVE-2022-49560] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-27171] = "fixed-version: Fixed from version 5.12rc5" +CVE_STATUS[CVE-2022-49561] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-27194] = "fixed-version: Fixed from version 5.9" +CVE_STATUS[CVE-2022-49562] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-2732] = "fixed-version: Fixed from version 5.6rc4" +CVE_STATUS[CVE-2022-49563] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-27418] = "fixed-version: Fixed from version 5.6rc5" +CVE_STATUS[CVE-2022-49564] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-27673] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2022-49565] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-27675] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2022-49566] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-27777] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2022-49567] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-27784] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2022-49568] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-27786] = "fixed-version: Fixed from version 5.7rc6" +CVE_STATUS[CVE-2022-49569] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-27815] = "fixed-version: Fixed from version 5.11rc1" +CVE_STATUS[CVE-2022-49570] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-27820] = "fixed-version: Fixed from version 5.16rc1" +CVE_STATUS[CVE-2022-49571] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-27825] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2022-49572] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-27830] = "fixed-version: Fixed from version 5.10rc7" +CVE_STATUS[CVE-2022-49573] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-27835] = "fixed-version: Fixed from version 5.10rc6" +CVE_STATUS[CVE-2022-49574] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-28097] = "fixed-version: Fixed from version 5.9rc6" +CVE_STATUS[CVE-2022-49575] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-28374] = "fixed-version: Fixed from version 5.11rc4" +CVE_STATUS[CVE-2022-49576] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-28588] = "fixed-version: Fixed from version 5.10rc7" +CVE_STATUS[CVE-2022-49577] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-28915] = "fixed-version: Fixed from version 5.9" +CVE_STATUS[CVE-2022-49578] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-28941] = "fixed-version: Fixed from version 5.10rc5" +CVE_STATUS[CVE-2022-49579] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-28974] = "fixed-version: Fixed from version 5.10rc3" +CVE_STATUS[CVE-2022-49580] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-29368] = "fixed-version: Fixed from version 5.8rc1" +CVE_STATUS[CVE-2022-49581] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-29369] = "fixed-version: Fixed from version 5.8rc7" +CVE_STATUS[CVE-2022-49582] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-29370] = "fixed-version: Fixed from version 5.6rc7" +CVE_STATUS[CVE-2022-49583] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-29371] = "fixed-version: Fixed from version 5.9rc2" +CVE_STATUS[CVE-2022-49584] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-29372] = "fixed-version: Fixed from version 5.7rc3" +CVE_STATUS[CVE-2022-49585] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-29373] = "fixed-version: Fixed from version 5.6rc2" +CVE_STATUS[CVE-2022-49586] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-29374] = "fixed-version: Fixed from version 5.8rc1" +CVE_STATUS[CVE-2022-49587] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-29534] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2022-49588] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-29568] = "fixed-version: Fixed from version 5.11rc1" +CVE_STATUS[CVE-2022-49589] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-29569] = "fixed-version: Fixed from version 5.11rc1" +CVE_STATUS[CVE-2022-49590] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-29660] = "fixed-version: Fixed from version 5.10rc7" +CVE_STATUS[CVE-2022-49591] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-29661] = "fixed-version: Fixed from version 5.10rc7" +CVE_STATUS[CVE-2022-49592] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-35499] = "fixed-version: Fixed from version 5.11rc1" +CVE_STATUS[CVE-2022-49593] = "fixed-version: Fixed from version 5.19" -# CVE-2020-35501 has no known resolution +CVE_STATUS[CVE-2022-49594] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-35508] = "fixed-version: Fixed from version 5.10rc3" +CVE_STATUS[CVE-2022-49595] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-35513] = "fixed-version: Fixed from version 4.17rc1" +CVE_STATUS[CVE-2022-49596] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-35519] = "fixed-version: Fixed from version 5.10rc7" +CVE_STATUS[CVE-2022-49597] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36158] = "fixed-version: Fixed from version 5.11rc1" +CVE_STATUS[CVE-2022-49598] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36310] = "fixed-version: Fixed from version 5.8rc1" +CVE_STATUS[CVE-2022-49599] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36311] = "fixed-version: Fixed from version 5.9rc5" +CVE_STATUS[CVE-2022-49600] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36312] = "fixed-version: Fixed from version 5.9rc5" +CVE_STATUS[CVE-2022-49601] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36313] = "fixed-version: Fixed from version 5.7rc1" +CVE_STATUS[CVE-2022-49602] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36322] = "fixed-version: Fixed from version 5.11rc1" +CVE_STATUS[CVE-2022-49603] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36385] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2022-49604] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36386] = "fixed-version: Fixed from version 5.9rc1" +CVE_STATUS[CVE-2022-49605] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36387] = "fixed-version: Fixed from version 5.9rc1" +CVE_STATUS[CVE-2022-49606] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36516] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2022-49607] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36557] = "fixed-version: Fixed from version 5.7rc1" +CVE_STATUS[CVE-2022-49608] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36558] = "fixed-version: Fixed from version 5.6rc3" +CVE_STATUS[CVE-2022-49609] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36691] = "fixed-version: Fixed from version 5.8rc1" +CVE_STATUS[CVE-2022-49610] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36694] = "fixed-version: Fixed from version 5.10" +CVE_STATUS[CVE-2022-49611] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36766] = "fixed-version: Fixed from version 5.9rc1" +CVE_STATUS[CVE-2022-49612] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36775] = "fixed-version: Fixed from version 5.7rc1" +CVE_STATUS[CVE-2022-49613] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36776] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49615] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36777] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49616] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36778] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49617] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36779] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49618] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36780] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49619] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36781] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49620] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36782] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49621] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36783] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49622] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36784] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49623] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36785] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49624] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36786] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49625] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-36787] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49626] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-3702] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-49627] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-4788] = "fixed-version: Fixed from version 5.10rc5" +CVE_STATUS[CVE-2022-49628] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-7053] = "fixed-version: Fixed from version 5.2rc1" +CVE_STATUS[CVE-2022-49629] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-8428] = "fixed-version: Fixed from version 5.5" +CVE_STATUS[CVE-2022-49630] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-8647] = "fixed-version: Fixed from version 5.6rc5" +CVE_STATUS[CVE-2022-49631] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-8648] = "fixed-version: Fixed from version 5.6rc3" +CVE_STATUS[CVE-2022-49632] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-8649] = "fixed-version: Fixed from version 5.6rc5" +CVE_STATUS[CVE-2022-49633] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-8694] = "fixed-version: Fixed from version 5.10rc4" +CVE_STATUS[CVE-2022-49634] = "fixed-version: Fixed from version 5.19" -# CVE-2020-8832 has no known resolution +CVE_STATUS[CVE-2022-49635] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-8834] = "fixed-version: Fixed from version 4.18rc1" +CVE_STATUS[CVE-2022-49636] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-8835] = "fixed-version: Fixed from version 5.7rc1" +CVE_STATUS[CVE-2022-49637] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-8992] = "fixed-version: Fixed from version 5.6rc2" +CVE_STATUS[CVE-2022-49638] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-9383] = "fixed-version: Fixed from version 5.6rc4" +CVE_STATUS[CVE-2022-49639] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2020-9391] = "fixed-version: Fixed from version 5.6rc3" +CVE_STATUS[CVE-2022-49640] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-0129] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49641] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-0342] = "fixed-version: Fixed from version 5.8rc1" +CVE_STATUS[CVE-2022-49642] = "fixed-version: Fixed from version 5.19" -# CVE-2021-0399 has no known resolution +CVE_STATUS[CVE-2022-49643] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-0447] = "fixed-version: Fixed from version 4.15rc1" +CVE_STATUS[CVE-2022-49644] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-0448] = "fixed-version: Fixed from version 5.9rc7" +CVE_STATUS[CVE-2022-49645] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-0512] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-49646] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-0605] = "fixed-version: Fixed from version 5.8" +CVE_STATUS[CVE-2022-49647] = "fixed-version: Fixed from version 5.19" -# CVE-2021-0606 has no known resolution +CVE_STATUS[CVE-2022-49648] = "fixed-version: Fixed from version 5.19" -# CVE-2021-0695 has no known resolution +CVE_STATUS[CVE-2022-49649] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-0707] = "fixed-version: Fixed from version 5.11rc3" +CVE_STATUS[CVE-2022-49650] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-0920] = "fixed-version: Fixed from version 5.14rc4" +CVE_STATUS[CVE-2022-49651] = "fixed-version: Fixed from version 5.19" -# CVE-2021-0924 has no known resolution +CVE_STATUS[CVE-2022-49652] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-0929] = "fixed-version: Fixed from version 5.6rc1" +CVE_STATUS[CVE-2022-49653] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-0935] = "fixed-version: Fixed from version 4.16rc7" +CVE_STATUS[CVE-2022-49654] = "fixed-version: Fixed from version 5.19" -# CVE-2021-0936 has no known resolution +CVE_STATUS[CVE-2022-49655] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-0937] = "fixed-version: Fixed from version 5.12rc8" +CVE_STATUS[CVE-2022-49656] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-0938] = "fixed-version: Fixed from version 5.10rc4" +CVE_STATUS[CVE-2022-49657] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-0941] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-49658] = "fixed-version: Fixed from version 5.19" -# CVE-2021-0961 has no known resolution +CVE_STATUS[CVE-2022-49659] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-1048] = "fixed-version: Fixed from version 5.9rc4" +CVE_STATUS[CVE-2022-49661] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-20177] = "fixed-version: Fixed from version 5.5rc1" +CVE_STATUS[CVE-2022-49662] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-20194] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2022-49663] = "fixed-version: Fixed from version 5.19" -# CVE-2021-20219 has no known resolution +CVE_STATUS[CVE-2022-49664] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-20226] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2022-49665] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-20239] = "fixed-version: Fixed from version 5.9rc1" +CVE_STATUS[CVE-2022-49666] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-20261] = "fixed-version: Fixed from version 4.5rc5" +CVE_STATUS[CVE-2022-49667] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-20265] = "fixed-version: Fixed from version 4.5rc3" +CVE_STATUS[CVE-2022-49668] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-20268] = "fixed-version: Fixed from version 5.11rc5" +CVE_STATUS[CVE-2022-49669] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-20292] = "fixed-version: Fixed from version 5.9rc1" +CVE_STATUS[CVE-2022-49670] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-20317] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49671] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-20320] = "fixed-version: Fixed from version 5.15rc3" +CVE_STATUS[CVE-2022-49672] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-20321] = "fixed-version: Fixed from version 5.15rc5" +CVE_STATUS[CVE-2022-49673] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-20322] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2022-49674] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-21781] = "fixed-version: Fixed from version 5.11rc7" +CVE_STATUS[CVE-2022-49675] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-22543] = "fixed-version: Fixed from version 5.13" +CVE_STATUS[CVE-2022-49676] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-22555] = "fixed-version: Fixed from version 5.12rc8" +CVE_STATUS[CVE-2022-49677] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-22600] = "fixed-version: Fixed from version 5.16rc6" +CVE_STATUS[CVE-2022-49678] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-23133] = "fixed-version: Fixed from version 5.12rc8" +CVE_STATUS[CVE-2022-49679] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-23134] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49680] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-26401] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2022-49681] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-26708] = "fixed-version: Fixed from version 5.11rc7" +CVE_STATUS[CVE-2022-49682] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-26930] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-49683] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-26931] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-49684] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-26932] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-49685] = "fixed-version: Fixed from version 5.19" -# CVE-2021-26934 has no known resolution +CVE_STATUS[CVE-2022-49686] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-27363] = "fixed-version: Fixed from version 5.12rc2" +CVE_STATUS[CVE-2022-49687] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-27364] = "fixed-version: Fixed from version 5.12rc2" +CVE_STATUS[CVE-2022-49688] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-27365] = "fixed-version: Fixed from version 5.12rc2" +CVE_STATUS[CVE-2022-49691] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-28038] = "fixed-version: Fixed from version 5.12rc2" +CVE_STATUS[CVE-2022-49692] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-28039] = "fixed-version: Fixed from version 5.12rc2" +CVE_STATUS[CVE-2022-49693] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-28375] = "fixed-version: Fixed from version 5.12rc3" +CVE_STATUS[CVE-2022-49694] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-28660] = "fixed-version: Fixed from version 5.12rc3" +CVE_STATUS[CVE-2022-49695] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-28688] = "fixed-version: Fixed from version 5.12rc6" +CVE_STATUS[CVE-2022-49696] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-28691] = "fixed-version: Fixed from version 5.13rc6" +CVE_STATUS[CVE-2022-49697] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-28711] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-49698] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-28712] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-49699] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-28713] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-49700] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-28714] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-49701] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-28715] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-49702] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-28950] = "fixed-version: Fixed from version 5.12rc4" +CVE_STATUS[CVE-2022-49703] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-28951] = "fixed-version: Fixed from version 5.12rc2" +CVE_STATUS[CVE-2022-49704] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-28952] = "fixed-version: Fixed from version 5.12rc4" +CVE_STATUS[CVE-2022-49705] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-28964] = "fixed-version: Fixed from version 5.12rc4" +CVE_STATUS[CVE-2022-49706] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-28971] = "fixed-version: Fixed from version 5.12rc4" +CVE_STATUS[CVE-2022-49707] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-28972] = "fixed-version: Fixed from version 5.12rc4" +CVE_STATUS[CVE-2022-49708] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-29154] = "fixed-version: Fixed from version 5.12rc7" +CVE_STATUS[CVE-2022-49709] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-29155] = "fixed-version: Fixed from version 5.12rc8" +CVE_STATUS[CVE-2022-49710] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-29264] = "fixed-version: Fixed from version 5.12rc3" +CVE_STATUS[CVE-2022-49711] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-29265] = "fixed-version: Fixed from version 5.12rc3" +CVE_STATUS[CVE-2022-49712] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-29266] = "fixed-version: Fixed from version 5.12rc4" +CVE_STATUS[CVE-2022-49713] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-29646] = "fixed-version: Fixed from version 5.12rc5" +CVE_STATUS[CVE-2022-49714] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-29647] = "fixed-version: Fixed from version 5.12rc5" +CVE_STATUS[CVE-2022-49715] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-29648] = "fixed-version: Fixed from version 5.12rc5" +CVE_STATUS[CVE-2022-49716] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-29649] = "fixed-version: Fixed from version 5.12rc5" +CVE_STATUS[CVE-2022-49717] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-29650] = "fixed-version: Fixed from version 5.12rc5" +CVE_STATUS[CVE-2022-49718] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-29657] = "fixed-version: Fixed from version 5.12rc6" +CVE_STATUS[CVE-2022-49719] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-30002] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-49720] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-30178] = "fixed-version: Fixed from version 5.12rc2" +CVE_STATUS[CVE-2022-49721] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-31440] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49722] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-3178] = "fixed-version: Fixed from version 5.11rc5" +CVE_STATUS[CVE-2022-49723] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-31829] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49724] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-31916] = "fixed-version: Fixed from version 5.12rc5" +CVE_STATUS[CVE-2022-49725] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-32078] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49726] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-32399] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49727] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-32606] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-49728] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-33033] = "fixed-version: Fixed from version 5.12rc3" +CVE_STATUS[CVE-2022-49729] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-33034] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49731] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-33061] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-49732] = "fixed-version: Fixed from version 5.19" -CVE_STATUS[CVE-2021-33098] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-49733] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-33135] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2022-49738] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-33200] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-49739] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-3347] = "fixed-version: Fixed from version 5.11rc6" +CVE_STATUS[CVE-2022-49740] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-3348] = "fixed-version: Fixed from version 5.11rc6" +CVE_STATUS[CVE-2022-49741] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-33624] = "fixed-version: Fixed from version 5.13rc7" +CVE_STATUS[CVE-2022-49742] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-33630] = "fixed-version: Fixed from version 5.4rc1" +CVE_STATUS[CVE-2022-49743] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-33631] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-49744] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-33655] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2022-49745] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-33656] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-49746] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-33909] = "fixed-version: Fixed from version 5.14rc3" +CVE_STATUS[CVE-2022-49747] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-3411] = "fixed-version: Fixed from version 5.10" +CVE_STATUS[CVE-2022-49748] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-3428] = "fixed-version: Fixed from version 5.9rc2" +CVE_STATUS[CVE-2022-49749] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-3444] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-49750] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-34556] = "fixed-version: Fixed from version 5.14rc4" +CVE_STATUS[CVE-2022-49751] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-34693] = "fixed-version: Fixed from version 5.13rc7" +CVE_STATUS[CVE-2022-49752] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-3483] = "fixed-version: Fixed from version 5.12rc6" +CVE_STATUS[CVE-2022-49753] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-34866] = "fixed-version: Fixed from version 5.14" +CVE_STATUS[CVE-2022-49754] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-3489] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-49755] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-3490] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-49756] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-3491] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49757] = "fixed-version: Fixed from version 6.2" -# CVE-2021-3492 has no known resolution +CVE_STATUS[CVE-2022-49758] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-3493] = "fixed-version: Fixed from version 5.11rc1" +CVE_STATUS[CVE-2022-49759] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-34981] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2022-49760] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-3501] = "fixed-version: Fixed from version 5.12rc8" +CVE_STATUS[CVE-2022-49761] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2021-35039] = "fixed-version: Fixed from version 5.13" +CVE_STATUS[CVE-2022-49762] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3506] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49763] = "fixed-version: Fixed from version 6.1" -# CVE-2021-3542 has no known resolution +CVE_STATUS[CVE-2022-49764] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3543] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49765] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-35477] = "fixed-version: Fixed from version 5.14rc4" +CVE_STATUS[CVE-2022-49766] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3564] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-49767] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3573] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-49768] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3587] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-49769] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3600] = "fixed-version: Fixed from version 5.11" +CVE_STATUS[CVE-2022-49770] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3609] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2022-49771] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3612] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-49772] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3635] = "fixed-version: Fixed from version 5.5rc7" +CVE_STATUS[CVE-2022-49773] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3640] = "fixed-version: Fixed from version 5.16rc1" +CVE_STATUS[CVE-2022-49774] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3653] = "fixed-version: Fixed from version 5.14rc7" +CVE_STATUS[CVE-2022-49775] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3655] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2022-49776] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3656] = "fixed-version: Fixed from version 5.14rc7" +CVE_STATUS[CVE-2022-49777] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3659] = "fixed-version: Fixed from version 5.12rc7" +CVE_STATUS[CVE-2022-49778] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3669] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2022-49779] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3679] = "fixed-version: Fixed from version 5.14rc3" +CVE_STATUS[CVE-2022-49780] = "fixed-version: Fixed from version 6.1" -# CVE-2021-3714 has no known resolution +CVE_STATUS[CVE-2022-49781] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3715] = "fixed-version: Fixed from version 5.6" +CVE_STATUS[CVE-2022-49782] = "fixed-version: Fixed from version 6.0.10" -CVE_STATUS[CVE-2021-37159] = "fixed-version: Fixed from version 5.14rc3" +CVE_STATUS[CVE-2022-49783] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3732] = "fixed-version: Fixed from version 5.14rc6" +CVE_STATUS[CVE-2022-49784] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3736] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2022-49785] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3739] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2022-49786] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3743] = "fixed-version: Fixed from version 5.13rc7" +CVE_STATUS[CVE-2022-49787] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3744] = "fixed-version: Fixed from version 5.15rc4" +CVE_STATUS[CVE-2022-49788] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3752] = "fixed-version: Fixed from version 5.16rc1" +CVE_STATUS[CVE-2022-49789] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3753] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2022-49790] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-37576] = "fixed-version: Fixed from version 5.14rc3" +CVE_STATUS[CVE-2022-49791] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3759] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2022-49792] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3760] = "fixed-version: Fixed from version 5.15rc6" +CVE_STATUS[CVE-2022-49793] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3764] = "fixed-version: Fixed from version 5.15rc4" +CVE_STATUS[CVE-2022-49794] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3772] = "fixed-version: Fixed from version 5.15" +CVE_STATUS[CVE-2022-49795] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-38160] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2022-49796] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-38166] = "fixed-version: Fixed from version 5.14rc6" +CVE_STATUS[CVE-2022-49797] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-38198] = "fixed-version: Fixed from version 5.13rc6" +CVE_STATUS[CVE-2022-49798] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-38199] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2022-49799] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-38200] = "fixed-version: Fixed from version 5.13rc7" +CVE_STATUS[CVE-2022-49800] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-38201] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2022-49801] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-38202] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2022-49802] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-38203] = "fixed-version: Fixed from version 5.14rc2" +CVE_STATUS[CVE-2022-49803] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-38204] = "fixed-version: Fixed from version 5.14rc3" +CVE_STATUS[CVE-2022-49804] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-38205] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2022-49805] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-38206] = "fixed-version: Fixed from version 5.13rc7" +CVE_STATUS[CVE-2022-49806] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-38207] = "fixed-version: Fixed from version 5.13rc7" +CVE_STATUS[CVE-2022-49807] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-38208] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-49808] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-38209] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49809] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-38300] = "fixed-version: Fixed from version 5.15rc4" +CVE_STATUS[CVE-2022-49810] = "fixed-version: Fixed from version 6.1" -# CVE-2021-3847 has no known resolution +CVE_STATUS[CVE-2022-49811] = "fixed-version: Fixed from version 6.1" -# CVE-2021-3864 has no known resolution +CVE_STATUS[CVE-2022-49812] = "fixed-version: Fixed from version 6.1" -# CVE-2021-3892 has no known resolution +CVE_STATUS[CVE-2022-49813] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3894] = "fixed-version: Fixed from version 5.15rc6" +CVE_STATUS[CVE-2022-49814] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3896] = "fixed-version: Fixed from version 5.15rc6" +CVE_STATUS[CVE-2022-49815] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-3923] = "fixed-version: Fixed from version 5.16" +CVE_STATUS[CVE-2022-49817] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-39633] = "fixed-version: Fixed from version 5.14" +CVE_STATUS[CVE-2022-49818] = "fixed-version: Fixed from version 6.0.10" -CVE_STATUS[CVE-2021-39634] = "fixed-version: Fixed from version 5.9rc8" +CVE_STATUS[CVE-2022-49819] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-39636] = "fixed-version: Fixed from version 4.16rc1" +CVE_STATUS[CVE-2022-49820] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-39648] = "fixed-version: Fixed from version 5.11rc3" +CVE_STATUS[CVE-2022-49821] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-39656] = "fixed-version: Fixed from version 5.12rc3" +CVE_STATUS[CVE-2022-49822] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-39657] = "fixed-version: Fixed from version 5.11rc4" +CVE_STATUS[CVE-2022-49823] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-39685] = "fixed-version: Fixed from version 5.16rc5" +CVE_STATUS[CVE-2022-49824] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-39686] = "fixed-version: Fixed from version 5.16rc1" +CVE_STATUS[CVE-2022-49825] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-39698] = "fixed-version: Fixed from version 5.16rc5" +CVE_STATUS[CVE-2022-49826] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-39711] = "fixed-version: Fixed from version 4.18rc6" +CVE_STATUS[CVE-2022-49827] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-39713] = "fixed-version: Fixed from version 4.20rc1" +CVE_STATUS[CVE-2022-49828] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-39714] = "fixed-version: Fixed from version 4.12rc1" +CVE_STATUS[CVE-2022-49829] = "fixed-version: Fixed from version 6.1" -# CVE-2021-39800 has no known resolution +CVE_STATUS[CVE-2022-49830] = "fixed-version: Fixed from version 6.1" -# CVE-2021-39801 has no known resolution +CVE_STATUS[CVE-2022-49831] = "fixed-version: Fixed from version 6.1" -# CVE-2021-39802 has no known resolution +CVE_STATUS[CVE-2022-49832] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4001] = "fixed-version: Fixed from version 5.16rc2" +CVE_STATUS[CVE-2022-49833] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4002] = "fixed-version: Fixed from version 5.16rc3" +CVE_STATUS[CVE-2022-49834] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4023] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2022-49835] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4028] = "fixed-version: Fixed from version 5.15rc4" +CVE_STATUS[CVE-2022-49836] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4032] = "fixed-version: Fixed from version 5.15rc7" +CVE_STATUS[CVE-2022-49837] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4037] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-49838] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-40490] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2022-49839] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4083] = "fixed-version: Fixed from version 5.16rc4" +CVE_STATUS[CVE-2022-49840] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4090] = "fixed-version: Fixed from version 5.16rc2" +CVE_STATUS[CVE-2022-49841] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4093] = "fixed-version: Fixed from version 5.15rc7" +CVE_STATUS[CVE-2022-49842] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4095] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-49844] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-41073] = "fixed-version: Fixed from version 5.15rc2" +CVE_STATUS[CVE-2022-49845] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4135] = "fixed-version: Fixed from version 5.16rc6" +CVE_STATUS[CVE-2022-49846] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4148] = "fixed-version: Fixed from version 5.15" +CVE_STATUS[CVE-2022-49847] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4149] = "fixed-version: Fixed from version 5.15rc6" +CVE_STATUS[CVE-2022-49848] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4150] = "fixed-version: Fixed from version 5.15rc7" +CVE_STATUS[CVE-2022-49849] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4154] = "fixed-version: Fixed from version 5.14rc2" +CVE_STATUS[CVE-2022-49850] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4155] = "fixed-version: Fixed from version 5.16" +CVE_STATUS[CVE-2022-49851] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4157] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49852] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4159] = "fixed-version: Fixed from version 5.7rc1" +CVE_STATUS[CVE-2022-49853] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-41864] = "fixed-version: Fixed from version 5.15rc5" +CVE_STATUS[CVE-2022-49854] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4197] = "fixed-version: Fixed from version 5.16" +CVE_STATUS[CVE-2022-49855] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-42008] = "fixed-version: Fixed from version 5.14rc7" +CVE_STATUS[CVE-2022-49857] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4202] = "fixed-version: Fixed from version 5.16rc2" +CVE_STATUS[CVE-2022-49858] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4203] = "fixed-version: Fixed from version 5.15rc4" +CVE_STATUS[CVE-2022-49859] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4204] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-49860] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-4218] = "fixed-version: Fixed from version 5.8rc1" +CVE_STATUS[CVE-2022-49861] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-42252] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2022-49862] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-42327] = "fixed-version: Fixed from version 5.15" +CVE_STATUS[CVE-2022-49863] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-42739] = "fixed-version: Fixed from version 5.16rc1" +CVE_STATUS[CVE-2022-49864] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-43056] = "fixed-version: Fixed from version 5.15rc6" +CVE_STATUS[CVE-2022-49865] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-43057] = "fixed-version: Fixed from version 5.15rc3" +CVE_STATUS[CVE-2022-49866] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-43267] = "fixed-version: Fixed from version 5.15" +CVE_STATUS[CVE-2022-49867] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-43389] = "fixed-version: Fixed from version 5.15rc6" +CVE_STATUS[CVE-2022-49868] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-43975] = "fixed-version: Fixed from version 5.16rc2" +CVE_STATUS[CVE-2022-49869] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-43976] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-49870] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-44733] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-49871] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-44879] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-49872] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-45095] = "fixed-version: Fixed from version 5.16rc6" +CVE_STATUS[CVE-2022-49873] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-45100] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-49874] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-45402] = "fixed-version: Fixed from version 5.16rc6" +CVE_STATUS[CVE-2022-49875] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-45469] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-49876] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-45480] = "fixed-version: Fixed from version 5.16rc6" +CVE_STATUS[CVE-2022-49877] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-45485] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2022-49878] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-45486] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49879] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-45868] = "fixed-version: Fixed from version 5.16rc1" +CVE_STATUS[CVE-2022-49880] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46283] = "fixed-version: Fixed from version 5.13rc7" +CVE_STATUS[CVE-2022-49881] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46904] = "fixed-version: Fixed from version 5.12rc7" +CVE_STATUS[CVE-2022-49882] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46905] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49883] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46906] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-49884] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46908] = "fixed-version: Fixed from version 5.12rc8" +CVE_STATUS[CVE-2022-49885] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46909] = "fixed-version: Fixed from version 5.12rc8" +CVE_STATUS[CVE-2022-49886] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46910] = "fixed-version: Fixed from version 5.12rc8" +CVE_STATUS[CVE-2022-49887] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46911] = "fixed-version: Fixed from version 5.12rc8" +CVE_STATUS[CVE-2022-49888] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46912] = "fixed-version: Fixed from version 5.12rc8" +CVE_STATUS[CVE-2022-49889] = "fixed-version: Fixed from version 6.0.8" -CVE_STATUS[CVE-2021-46913] = "fixed-version: Fixed from version 5.12rc8" +CVE_STATUS[CVE-2022-49890] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46914] = "fixed-version: Fixed from version 5.12rc8" +CVE_STATUS[CVE-2022-49891] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46915] = "fixed-version: Fixed from version 5.12rc8" +CVE_STATUS[CVE-2022-49892] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46916] = "fixed-version: Fixed from version 5.12rc8" +CVE_STATUS[CVE-2022-49893] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46917] = "fixed-version: Fixed from version 5.12rc8" +CVE_STATUS[CVE-2022-49894] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46918] = "fixed-version: Fixed from version 5.12rc8" +CVE_STATUS[CVE-2022-49895] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46919] = "fixed-version: Fixed from version 5.12rc8" +CVE_STATUS[CVE-2022-49896] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46920] = "fixed-version: Fixed from version 5.12rc8" +CVE_STATUS[CVE-2022-49898] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46921] = "fixed-version: Fixed from version 5.12" +CVE_STATUS[CVE-2022-49899] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46922] = "fixed-version: Fixed from version 5.12" +CVE_STATUS[CVE-2022-49900] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46923] = "fixed-version: Fixed from version 5.16rc8" +CVE_STATUS[CVE-2022-49901] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46924] = "fixed-version: Fixed from version 5.16rc8" +CVE_STATUS[CVE-2022-49902] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46925] = "fixed-version: Fixed from version 5.16rc8" +CVE_STATUS[CVE-2022-49903] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46926] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-49904] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46927] = "fixed-version: Fixed from version 5.16rc8" +CVE_STATUS[CVE-2022-49905] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46928] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-49906] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46929] = "fixed-version: Fixed from version 5.16rc8" +CVE_STATUS[CVE-2022-49907] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46930] = "fixed-version: Fixed from version 5.16rc8" +CVE_STATUS[CVE-2022-49908] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46931] = "fixed-version: Fixed from version 5.16rc8" +CVE_STATUS[CVE-2022-49910] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46932] = "fixed-version: Fixed from version 5.16rc8" +CVE_STATUS[CVE-2022-49911] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46933] = "fixed-version: Fixed from version 5.16rc8" +CVE_STATUS[CVE-2022-49912] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46934] = "fixed-version: Fixed from version 5.16rc8" +CVE_STATUS[CVE-2022-49913] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46935] = "fixed-version: Fixed from version 5.16rc8" +CVE_STATUS[CVE-2022-49914] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46936] = "fixed-version: Fixed from version 5.16rc8" +CVE_STATUS[CVE-2022-49915] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46937] = "fixed-version: Fixed from version 5.16rc8" +CVE_STATUS[CVE-2022-49916] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46938] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49917] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46939] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49918] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46940] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49919] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46941] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49920] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46942] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49921] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46943] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49922] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46944] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49923] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46945] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49924] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46947] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49925] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46948] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49926] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46949] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49927] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46950] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49928] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46951] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49929] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46952] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49930] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46953] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49931] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2021-46954] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49932] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2021-46955] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49934] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46956] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49935] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46957] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49936] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46958] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49937] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46959] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49938] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46960] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49939] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46961] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49940] = "fixed-version: Fixed from version 5.19.8" -CVE_STATUS[CVE-2021-46962] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49942] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46963] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49943] = "fixed-version: Fixed from version 5.19.8" -CVE_STATUS[CVE-2021-46964] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49944] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46965] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49945] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46966] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49946] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46967] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49947] = "fixed-version: Fixed from version 5.19.8" -CVE_STATUS[CVE-2021-46968] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49948] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46969] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49949] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46970] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49950] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46971] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49951] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46972] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49952] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46973] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49953] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46974] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49954] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46976] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-49955] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46977] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-49956] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46978] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-49957] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46979] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-49958] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46980] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-49959] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46981] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-49960] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46982] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-49961] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46983] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-49962] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46984] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-49963] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46985] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-49964] = "fixed-version: Fixed from version 5.19.7" -CVE_STATUS[CVE-2021-46986] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-49965] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46987] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-49966] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46988] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-49967] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46989] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-49968] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46990] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-49969] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46991] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49970] = "fixed-version: Fixed from version 5.19.8" -CVE_STATUS[CVE-2021-46992] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49971] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46993] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49972] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46994] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49973] = "fixed-version: Fixed from version 5.19.8" -CVE_STATUS[CVE-2021-46995] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49974] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46996] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49975] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46997] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49976] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46998] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49977] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-46999] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49978] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47000] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49979] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47001] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49980] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47002] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49981] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47003] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49982] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47004] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49983] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47005] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49984] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47006] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49985] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47007] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49986] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47008] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49987] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47009] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-49989] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47010] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49990] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47011] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49991] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47012] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49992] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47013] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49993] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47014] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49994] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47015] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49995] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47016] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49996] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47017] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49997] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47018] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49998] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47019] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-49999] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47020] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50000] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47021] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50001] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47022] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50002] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47023] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50003] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47024] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50004] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47025] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50005] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47026] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50006] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47027] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50007] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47028] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50008] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47029] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50009] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47030] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50010] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47031] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50011] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47032] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50012] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47033] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50013] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47034] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50014] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47035] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50015] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47036] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50016] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47037] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50017] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47038] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50019] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47039] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50020] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47040] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50021] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47041] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50022] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47042] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50023] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47043] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50024] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47044] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50025] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47045] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50026] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47046] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50027] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47047] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50028] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47048] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50029] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47049] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50030] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47050] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50032] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47051] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50033] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47052] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50034] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47053] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50035] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47054] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50036] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47055] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50037] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47056] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50038] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47057] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50039] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47058] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50040] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47059] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50041] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47060] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50042] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47061] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50043] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47062] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50044] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47063] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50045] = "fixed-version: Fixed from version 5.19.4" -CVE_STATUS[CVE-2021-47064] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50046] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47065] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50047] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47066] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50048] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47067] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50049] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47068] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50050] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47069] = "fixed-version: Fixed from version 5.13rc3" +CVE_STATUS[CVE-2022-50051] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47070] = "fixed-version: Fixed from version 5.13rc3" +CVE_STATUS[CVE-2022-50052] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47071] = "fixed-version: Fixed from version 5.13rc3" +CVE_STATUS[CVE-2022-50053] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47072] = "fixed-version: Fixed from version 5.13rc3" +CVE_STATUS[CVE-2022-50054] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47073] = "fixed-version: Fixed from version 5.13rc3" +CVE_STATUS[CVE-2022-50055] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47074] = "fixed-version: Fixed from version 5.13rc3" +CVE_STATUS[CVE-2022-50056] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47075] = "fixed-version: Fixed from version 5.13rc3" +CVE_STATUS[CVE-2022-50057] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47076] = "fixed-version: Fixed from version 5.13rc3" +CVE_STATUS[CVE-2022-50058] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47077] = "fixed-version: Fixed from version 5.13rc3" +CVE_STATUS[CVE-2022-50059] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47078] = "fixed-version: Fixed from version 5.13rc3" +CVE_STATUS[CVE-2022-50060] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47079] = "fixed-version: Fixed from version 5.13rc3" +CVE_STATUS[CVE-2022-50061] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47080] = "fixed-version: Fixed from version 5.13rc3" +CVE_STATUS[CVE-2022-50062] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47081] = "fixed-version: Fixed from version 5.13rc3" +CVE_STATUS[CVE-2022-50063] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47082] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50064] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47083] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50065] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47086] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50066] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47087] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50067] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47088] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50068] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47089] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50069] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47090] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50070] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47091] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50071] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47092] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50072] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47093] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50073] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47094] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50074] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47095] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50075] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47096] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50076] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47097] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50077] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47098] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50078] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47099] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50079] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47100] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50080] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47101] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50082] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47102] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50084] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47103] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50085] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47104] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50086] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47105] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50087] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47106] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50088] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47107] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50089] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47108] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50090] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47109] = "fixed-version: Fixed from version 5.13rc7" +CVE_STATUS[CVE-2022-50091] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47110] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-50092] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47111] = "fixed-version: Fixed from version 5.13rc6" +CVE_STATUS[CVE-2022-50093] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47112] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-50094] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47113] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50095] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47114] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50096] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47116] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50097] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47117] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50098] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47118] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50099] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47119] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50100] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47120] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50101] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47121] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50102] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47122] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50103] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47123] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-50104] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47124] = "fixed-version: Fixed from version 5.13rc2" +CVE_STATUS[CVE-2022-50105] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47125] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50106] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47126] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50107] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47127] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50108] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47128] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50109] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47129] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50110] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47130] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50111] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47131] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50112] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47132] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50113] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47133] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50114] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47134] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50115] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47135] = "fixed-version: Fixed from version 5.13rc5" +CVE_STATUS[CVE-2022-50116] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47136] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50117] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47137] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50118] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47138] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50119] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47139] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50120] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47140] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50121] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47141] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50122] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47142] = "fixed-version: Fixed from version 5.13rc3" +CVE_STATUS[CVE-2022-50123] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47143] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50124] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47144] = "fixed-version: Fixed from version 5.13rc3" +CVE_STATUS[CVE-2022-50125] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47145] = "fixed-version: Fixed from version 5.13rc3" +CVE_STATUS[CVE-2022-50126] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47146] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50127] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47147] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50129] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47148] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50130] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47149] = "fixed-version: Fixed from version 5.13rc3" +CVE_STATUS[CVE-2022-50131] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47150] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50132] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47151] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50133] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47152] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50134] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47153] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50135] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47158] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50136] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47159] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50137] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47160] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50138] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47161] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50139] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47162] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50140] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47163] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50141] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47164] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50142] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47165] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50143] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47166] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50144] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47167] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50145] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47168] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50146] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47169] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50147] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47170] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50148] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47171] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50149] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47172] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50151] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47173] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50152] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47174] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50153] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47175] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50154] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47176] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50155] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47177] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50156] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47178] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50157] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47179] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50158] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2021-47180] = "fixed-version: Fixed from version 5.13rc4" +CVE_STATUS[CVE-2022-50159] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0001] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2022-50160] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0002] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2022-50161] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0168] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50162] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0171] = "fixed-version: Fixed from version 5.18rc4" +CVE_STATUS[CVE-2022-50163] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0185] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-50164] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0264] = "fixed-version: Fixed from version 5.16rc6" +CVE_STATUS[CVE-2022-50165] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0286] = "fixed-version: Fixed from version 5.14rc2" +CVE_STATUS[CVE-2022-50166] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0322] = "fixed-version: Fixed from version 5.15rc6" +CVE_STATUS[CVE-2022-50167] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0330] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2022-50168] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0382] = "fixed-version: Fixed from version 5.16" +CVE_STATUS[CVE-2022-50169] = "fixed-version: Fixed from version 6.0" -# CVE-2022-0400 has no known resolution +CVE_STATUS[CVE-2022-50170] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0433] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-50171] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0435] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2022-50172] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0480] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2022-50173] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0487] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2022-50174] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0492] = "fixed-version: Fixed from version 5.17rc3" +CVE_STATUS[CVE-2022-50175] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0494] = "fixed-version: Fixed from version 5.17rc5" +CVE_STATUS[CVE-2022-50176] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0500] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-50177] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0516] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2022-50178] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0617] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2022-50179] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0644] = "fixed-version: Fixed from version 5.15rc7" +CVE_STATUS[CVE-2022-50181] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0646] = "fixed-version: Fixed from version 5.17rc5" +CVE_STATUS[CVE-2022-50182] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0742] = "fixed-version: Fixed from version 5.17rc7" +CVE_STATUS[CVE-2022-50183] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0812] = "fixed-version: Fixed from version 5.8rc6" +CVE_STATUS[CVE-2022-50184] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0847] = "fixed-version: Fixed from version 5.17rc6" +CVE_STATUS[CVE-2022-50185] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0850] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2022-50186] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0854] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2022-50187] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0995] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2022-50188] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-0998] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-50189] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1011] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2022-50190] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1012] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2022-50191] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1015] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50192] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1016] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50193] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1043] = "fixed-version: Fixed from version 5.14rc7" +CVE_STATUS[CVE-2022-50194] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1048] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50195] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1055] = "fixed-version: Fixed from version 5.17rc3" +CVE_STATUS[CVE-2022-50196] = "fixed-version: Fixed from version 6.0" -# CVE-2022-1116 has no known resolution +CVE_STATUS[CVE-2022-50197] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1158] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50198] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1184] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50199] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1195] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50200] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1198] = "fixed-version: Fixed from version 5.17rc6" +CVE_STATUS[CVE-2022-50201] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1199] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2022-50202] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1204] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50203] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1205] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50204] = "fixed-version: Fixed from version 6.0" -# CVE-2022-1247 has no known resolution +CVE_STATUS[CVE-2022-50205] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1263] = "fixed-version: Fixed from version 5.18rc3" +CVE_STATUS[CVE-2022-50206] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1280] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2022-50207] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1353] = "fixed-version: Fixed from version 5.17" +CVE_STATUS[CVE-2022-50208] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1419] = "fixed-version: Fixed from version 5.6rc2" +CVE_STATUS[CVE-2022-50209] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1462] = "fixed-version: Fixed from version 5.19rc7" +CVE_STATUS[CVE-2022-50210] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1508] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2022-50211] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1516] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50212] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1651] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50213] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1652] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2022-50214] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1671] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50215] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1678] = "fixed-version: Fixed from version 4.20rc1" +CVE_STATUS[CVE-2022-50217] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1679] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50218] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1729] = "fixed-version: Fixed from version 5.18" +CVE_STATUS[CVE-2022-50219] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1734] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2022-50220] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1786] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-50221] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1789] = "fixed-version: Fixed from version 5.18" +CVE_STATUS[CVE-2022-50222] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1836] = "fixed-version: Fixed from version 5.18rc5" +CVE_STATUS[CVE-2022-50223] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1852] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50224] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1882] = "fixed-version: Fixed from version 5.19rc8" +CVE_STATUS[CVE-2022-50225] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1943] = "fixed-version: Fixed from version 5.18rc7" +CVE_STATUS[CVE-2022-50226] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1966] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50227] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1972] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50228] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1973] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50229] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1974] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2022-50230] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1975] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2022-50231] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1976] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50232] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-1998] = "fixed-version: Fixed from version 5.17rc3" +CVE_STATUS[CVE-2022-50233] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-20008] = "fixed-version: Fixed from version 5.17rc5" +CVE_STATUS[CVE-2022-50234] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-20132] = "fixed-version: Fixed from version 5.16rc5" +CVE_STATUS[CVE-2022-50235] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-20141] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2022-50236] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-20148] = "fixed-version: Fixed from version 5.16rc1" +CVE_STATUS[CVE-2022-50239] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-20153] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2022-50240] = "fixed-version: Fixed from version 6.0" -CVE_STATUS[CVE-2022-20154] = "fixed-version: Fixed from version 5.16rc8" +CVE_STATUS[CVE-2022-50241] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-20158] = "fixed-version: Fixed from version 5.17" +CVE_STATUS[CVE-2022-50242] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-20166] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2022-50243] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-20368] = "fixed-version: Fixed from version 5.17" +CVE_STATUS[CVE-2022-50244] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-20369] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50245] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-20409] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-50246] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-20421] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2022-50247] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-20422] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50248] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-20423] = "fixed-version: Fixed from version 5.17" +CVE_STATUS[CVE-2022-50249] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-20424] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-50250] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-20565] = "fixed-version: Fixed from version 5.9rc4" +CVE_STATUS[CVE-2022-50251] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-20566] = "fixed-version: Fixed from version 5.19" +CVE_STATUS[CVE-2022-50252] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-20567] = "fixed-version: Fixed from version 4.16rc5" +CVE_STATUS[CVE-2022-50253] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-20568] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-50254] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-20572] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50255] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-2078] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50256] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-21123] = "fixed-version: Fixed from version 5.19rc3" +CVE_STATUS[CVE-2022-50257] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-21125] = "fixed-version: Fixed from version 5.19rc3" +CVE_STATUS[CVE-2022-50258] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2022-21166] = "fixed-version: Fixed from version 5.19rc3" +CVE_STATUS[CVE-2022-50259] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-21385] = "fixed-version: Fixed from version 4.20" +CVE_STATUS[CVE-2022-50260] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-21499] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50261] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-21505] = "fixed-version: Fixed from version 5.19rc8" +CVE_STATUS[CVE-2022-50262] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-2153] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50263] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-2196] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50264] = "fixed-version: Fixed from version 6.2" -# CVE-2022-2209 has no known resolution +CVE_STATUS[CVE-2022-50265] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-22942] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2022-50266] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-23036] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2022-50267] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-23037] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2022-50268] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-23038] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2022-50269] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2022-23039] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2022-50270] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-23040] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2022-50271] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-23041] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2022-50272] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-23042] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2022-50273] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-2308] = "fixed-version: Fixed from version 6.0" +CVE_STATUS[CVE-2022-50274] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-2318] = "fixed-version: Fixed from version 5.19rc5" +CVE_STATUS[CVE-2022-50275] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-23222] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-50276] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-2327] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-50277] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-2380] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50278] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-23816] = "fixed-version: Fixed from version 5.19rc7" +CVE_STATUS[CVE-2022-50279] = "fixed-version: Fixed from version 6.3" -# CVE-2022-23825 has no known resolution +CVE_STATUS[CVE-2022-50280] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-23960] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2022-50281] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-24122] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2022-50282] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-24448] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2022-50283] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-24958] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-50284] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-24959] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2022-50285] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-2503] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50286] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-25258] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2022-50287] = "fixed-version: Fixed from version 6.2" -# CVE-2022-25265 has no known resolution +CVE_STATUS[CVE-2022-50288] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-25375] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2022-50289] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-25636] = "fixed-version: Fixed from version 5.17rc6" +CVE_STATUS[CVE-2022-50291] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-2585] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50292] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-2586] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50293] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-2588] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50294] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2022-2590] = "fixed-version: Fixed from version 6.0rc3" +CVE_STATUS[CVE-2022-50295] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-2602] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50296] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-26365] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2022-50297] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-26373] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50298] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-2639] = "fixed-version: Fixed from version 5.18rc4" +CVE_STATUS[CVE-2022-50299] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-26490] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-50300] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-2663] = "fixed-version: Fixed from version 6.0rc5" +CVE_STATUS[CVE-2022-50301] = "fixed-version: Fixed from version 6.1" -# CVE-2022-26878 has no known resolution +CVE_STATUS[CVE-2022-50302] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-26966] = "fixed-version: Fixed from version 5.17rc6" +CVE_STATUS[CVE-2022-50303] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-27223] = "fixed-version: Fixed from version 5.17rc6" +CVE_STATUS[CVE-2022-50304] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-27666] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2022-50305] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-27672] = "fixed-version: Fixed from version 6.2" +CVE_STATUS[CVE-2022-50306] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-2785] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50307] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-27950] = "fixed-version: Fixed from version 5.17rc5" +CVE_STATUS[CVE-2022-50308] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-28356] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50309] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-28388] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50310] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-28389] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50311] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-28390] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50312] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-2873] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50313] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-28796] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50314] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-28893] = "fixed-version: Fixed from version 5.18rc2" +CVE_STATUS[CVE-2022-50315] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-2905] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2022-50316] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-29156] = "fixed-version: Fixed from version 5.17rc6" +CVE_STATUS[CVE-2022-50317] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-2938] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2022-50318] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-29581] = "fixed-version: Fixed from version 5.18rc4" +CVE_STATUS[CVE-2022-50319] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-29582] = "fixed-version: Fixed from version 5.18rc2" +CVE_STATUS[CVE-2022-50320] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-2959] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50321] = "fixed-version: Fixed from version 6.3" -# CVE-2022-2961 has no known resolution +CVE_STATUS[CVE-2022-50322] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-2964] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2022-50323] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-2977] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50324] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-2978] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50325] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-29900] = "fixed-version: Fixed from version 5.19rc7" +CVE_STATUS[CVE-2022-50326] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-29901] = "fixed-version: Fixed from version 5.19rc7" +CVE_STATUS[CVE-2022-50327] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-2991] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2022-50328] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-29968] = "fixed-version: Fixed from version 5.18rc5" +CVE_STATUS[CVE-2022-50329] = "fixed-version: Fixed from version 6.1.3" -CVE_STATUS[CVE-2022-3028] = "fixed-version: Fixed from version 6.0rc3" +CVE_STATUS[CVE-2022-50330] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-30594] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50331] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3061] = "fixed-version: Fixed from version 5.18rc5" +CVE_STATUS[CVE-2022-50332] = "fixed-version: Fixed from version 6.0.6" -CVE_STATUS[CVE-2022-3077] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50333] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3078] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50334] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3103] = "fixed-version: Fixed from version 6.0rc3" +CVE_STATUS[CVE-2022-50335] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3104] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50336] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3105] = "fixed-version: Fixed from version 5.16" +CVE_STATUS[CVE-2022-50337] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3106] = "fixed-version: Fixed from version 5.16rc6" +CVE_STATUS[CVE-2022-50339] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3107] = "fixed-version: Fixed from version 5.17" +CVE_STATUS[CVE-2022-50340] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3108] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-50341] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3110] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50342] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3111] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50343] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3112] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50344] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3113] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50346] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3114] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50347] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3115] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50348] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3169] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50349] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3170] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2022-50350] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3176] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-50351] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3202] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50352] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-32250] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50353] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-32296] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2022-50354] = "fixed-version: Fixed from version 6.2" -# CVE-2022-3238 has no known resolution +CVE_STATUS[CVE-2022-50355] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3239] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50356] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-32981] = "fixed-version: Fixed from version 5.19rc2" +CVE_STATUS[CVE-2022-50357] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3303] = "fixed-version: Fixed from version 6.0rc5" +CVE_STATUS[CVE-2022-50358] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3344] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2022-50359] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-33740] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2022-50360] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-33741] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2022-50361] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2022-33742] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2022-50362] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-33743] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2022-50363] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-33744] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2022-50364] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-33981] = "fixed-version: Fixed from version 5.18rc5" +CVE_STATUS[CVE-2022-50365] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3424] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50366] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3435] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50367] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-34494] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50368] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-34495] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50369] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2022-34918] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2022-50370] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3521] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50371] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3522] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50372] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3523] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50373] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3524] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50374] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3526] = "fixed-version: Fixed from version 5.18rc3" +CVE_STATUS[CVE-2022-50375] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3531] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50376] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3532] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50378] = "fixed-version: Fixed from version 6.1" -# CVE-2022-3533 has no known resolution +CVE_STATUS[CVE-2022-50379] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3534] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50380] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3535] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50381] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3541] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50382] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3542] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50383] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3543] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50384] = "fixed-version: Fixed from version 6.2" -# CVE-2022-3544 has no known resolution +CVE_STATUS[CVE-2022-50385] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3545] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50386] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3564] = "fixed-version: Fixed from version 6.1rc4" +CVE_STATUS[CVE-2022-50387] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3565] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50388] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3566] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50389] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3567] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50390] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3577] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50391] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3586] = "fixed-version: Fixed from version 6.0rc5" +CVE_STATUS[CVE-2022-50392] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3594] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50393] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3595] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50394] = "fixed-version: Fixed from version 6.2" -# CVE-2022-3606 has no known resolution +CVE_STATUS[CVE-2022-50395] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-36123] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2022-50396] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3619] = "fixed-version: Fixed from version 6.1rc4" +CVE_STATUS[CVE-2022-50398] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3621] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50399] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3623] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50400] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3624] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50401] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3625] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50402] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3628] = "fixed-version: Fixed from version 6.1rc5" +CVE_STATUS[CVE-2022-50404] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-36280] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50405] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3629] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50406] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3630] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50407] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3633] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50408] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3635] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50409] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3636] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50410] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3640] = "fixed-version: Fixed from version 6.1rc4" +CVE_STATUS[CVE-2022-50411] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-36402] = "fixed-version: Fixed from version 6.5" +CVE_STATUS[CVE-2022-50412] = "fixed-version: Fixed from version 6.1" -# CVE-2022-3642 has no known resolution +CVE_STATUS[CVE-2022-50413] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3643] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2022-50414] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3646] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50415] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3649] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50416] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-36879] = "fixed-version: Fixed from version 5.19rc8" +CVE_STATUS[CVE-2022-50417] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-36946] = "fixed-version: Fixed from version 5.19" +CVE_STATUS[CVE-2022-50418] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3707] = "fixed-version: Fixed from version 6.2rc3" +CVE_STATUS[CVE-2022-50419] = "fixed-version: Fixed from version 6.1" -# CVE-2022-38096 has no known resolution +CVE_STATUS[CVE-2022-50420] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-38457] = "fixed-version: Fixed from version 6.2rc4" +CVE_STATUS[CVE-2022-50421] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3903] = "fixed-version: Fixed from version 6.1rc2" +CVE_STATUS[CVE-2022-50422] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-3910] = "fixed-version: Fixed from version 6.0rc6" +CVE_STATUS[CVE-2022-50423] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-39188] = "fixed-version: Fixed from version 5.19rc8" +CVE_STATUS[CVE-2022-50424] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2022-39189] = "fixed-version: Fixed from version 5.19rc2" +CVE_STATUS[CVE-2022-50425] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-39190] = "fixed-version: Fixed from version 6.0rc3" +CVE_STATUS[CVE-2022-50426] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-3977] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50427] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-39842] = "fixed-version: Fixed from version 5.19rc4" +CVE_STATUS[CVE-2022-50428] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-40133] = "fixed-version: Fixed from version 6.2rc4" +CVE_STATUS[CVE-2022-50429] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-40307] = "fixed-version: Fixed from version 6.0rc5" +CVE_STATUS[CVE-2022-50430] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-40476] = "fixed-version: Fixed from version 5.19rc4" +CVE_STATUS[CVE-2022-50431] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-40768] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50432] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-4095] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2022-50433] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-40982] = "fixed-version: Fixed from version 6.5rc6" +CVE_STATUS[CVE-2022-50434] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-41218] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50435] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-41222] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2022-50436] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-4127] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2022-50437] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-4128] = "fixed-version: Fixed from version 5.19rc7" +CVE_STATUS[CVE-2022-50438] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-4129] = "fixed-version: Fixed from version 6.1rc6" +CVE_STATUS[CVE-2022-50439] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-4139] = "fixed-version: Fixed from version 6.1rc8" +CVE_STATUS[CVE-2022-50440] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-41674] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50441] = "fixed-version: Fixed from version 6.2" -# CVE-2022-41848 has no known resolution +CVE_STATUS[CVE-2022-50442] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-41849] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50443] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-41850] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50444] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-41858] = "fixed-version: Fixed from version 5.18rc2" +CVE_STATUS[CVE-2022-50445] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-42328] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2022-50446] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-42329] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2022-50447] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-42432] = "fixed-version: Fixed from version 6.0rc7" +CVE_STATUS[CVE-2022-50448] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-4269] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2022-50449] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-42703] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2022-50451] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-42719] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50452] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-42720] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50453] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-42721] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50454] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-42722] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50456] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-42895] = "fixed-version: Fixed from version 6.1rc4" +CVE_STATUS[CVE-2022-50457] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-42896] = "fixed-version: Fixed from version 6.1rc4" +CVE_STATUS[CVE-2022-50458] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-43750] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50459] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-4378] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2022-50460] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-4379] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50461] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-4382] = "fixed-version: Fixed from version 6.2rc5" +CVE_STATUS[CVE-2022-50462] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-43945] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50463] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-44032] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50464] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-44033] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50465] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-44034] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50466] = "fixed-version: Fixed from version 6.1" -# CVE-2022-4543 has no known resolution +CVE_STATUS[CVE-2022-50467] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-45869] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2022-50468] = "fixed-version: Fixed from version 6.2" -# CVE-2022-45884 has no known resolution +CVE_STATUS[CVE-2022-50469] = "fixed-version: Fixed from version 6.1" -# CVE-2022-45885 has no known resolution +CVE_STATUS[CVE-2022-50470] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-45886] = "fixed-version: Fixed from version 6.4rc3" +CVE_STATUS[CVE-2022-50471] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-45887] = "fixed-version: Fixed from version 6.4rc3" +CVE_STATUS[CVE-2022-50472] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-45888] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50473] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-45919] = "fixed-version: Fixed from version 6.4rc3" +CVE_STATUS[CVE-2022-50474] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-45934] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2022-50475] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-4662] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2022-50476] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-4696] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-50477] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-4744] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2022-50478] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-47518] = "fixed-version: Fixed from version 6.1rc8" +CVE_STATUS[CVE-2022-50479] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-47519] = "fixed-version: Fixed from version 6.1rc8" +CVE_STATUS[CVE-2022-50480] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-47520] = "fixed-version: Fixed from version 6.1rc8" +CVE_STATUS[CVE-2022-50481] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-47521] = "fixed-version: Fixed from version 6.1rc8" +CVE_STATUS[CVE-2022-50482] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-47929] = "fixed-version: Fixed from version 6.2rc4" +CVE_STATUS[CVE-2022-50483] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-47938] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50484] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-47939] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50485] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-47940] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50486] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-47941] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50488] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-47942] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50489] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-47943] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50490] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-47946] = "fixed-version: Fixed from version 5.12rc2" +CVE_STATUS[CVE-2022-50491] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-4842] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50492] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-48423] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50493] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-48424] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50494] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-48425] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50496] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-48502] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50497] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-48619] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50498] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-48626] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2022-50499] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-48627] = "fixed-version: Fixed from version 5.19rc7" +CVE_STATUS[CVE-2022-50500] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2022-48628] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2022-50501] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-48629] = "fixed-version: Fixed from version 5.17" +CVE_STATUS[CVE-2022-50503] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2022-48630] = "fixed-version: Fixed from version 5.18" +CVE_STATUS[CVE-2022-50504] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-0030] = "fixed-version: Fixed from version 5.0rc1" +CVE_STATUS[CVE-2022-50505] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-0045] = "fixed-version: Fixed from version 6.2rc3" +CVE_STATUS[CVE-2022-50506] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-0047] = "fixed-version: Fixed from version 5.16rc1" +CVE_STATUS[CVE-2022-50507] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-0122] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2022-50508] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2023-0160] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50509] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-0179] = "fixed-version: Fixed from version 6.2rc5" +CVE_STATUS[CVE-2022-50510] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-0210] = "fixed-version: Fixed from version 6.2rc4" +CVE_STATUS[CVE-2022-50511] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-0240] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2022-50512] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-0266] = "fixed-version: Fixed from version 6.2rc4" +CVE_STATUS[CVE-2022-50513] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-0386] = "fixed-version: Fixed from version 6.2rc6" +CVE_STATUS[CVE-2022-50514] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-0394] = "fixed-version: Fixed from version 6.2rc4" +CVE_STATUS[CVE-2022-50515] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-0458] = "fixed-version: Fixed from version 6.2rc5" +CVE_STATUS[CVE-2022-50516] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-0459] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2022-50517] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-0461] = "fixed-version: Fixed from version 6.2rc3" +CVE_STATUS[CVE-2022-50518] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-0468] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2022-50519] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-0469] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2022-50520] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-0590] = "fixed-version: Fixed from version 6.1rc2" +CVE_STATUS[CVE-2022-50521] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-0597] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50522] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-0615] = "fixed-version: Fixed from version 6.1rc3" +CVE_STATUS[CVE-2022-50523] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1032] = "fixed-version: Fixed from version 6.3rc2" +CVE_STATUS[CVE-2022-50524] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1073] = "fixed-version: Fixed from version 6.2rc5" +CVE_STATUS[CVE-2022-50525] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1074] = "fixed-version: Fixed from version 6.2rc6" +CVE_STATUS[CVE-2022-50526] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-1075] = "fixed-version: Fixed from version 6.2rc7" +CVE_STATUS[CVE-2022-50527] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1076] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2022-50528] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1077] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2022-50529] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1078] = "fixed-version: Fixed from version 6.2rc8" +CVE_STATUS[CVE-2022-50530] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-1079] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2022-50531] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-1095] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50532] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1118] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2022-50533] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1192] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50534] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1193] = "fixed-version: Fixed from version 6.3rc6" +CVE_STATUS[CVE-2022-50535] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2023-1194] = "fixed-version: Fixed from version 6.4rc6" +CVE_STATUS[CVE-2022-50536] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1195] = "fixed-version: Fixed from version 6.1rc3" +CVE_STATUS[CVE-2022-50537] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1206] = "fixed-version: Fixed from version 6.5rc4" +CVE_STATUS[CVE-2022-50538] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1249] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50539] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2023-1252] = "fixed-version: Fixed from version 5.16rc1" +CVE_STATUS[CVE-2022-50540] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-1281] = "fixed-version: Fixed from version 6.2" +CVE_STATUS[CVE-2022-50541] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-1295] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-50542] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1380] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50543] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1382] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2022-50544] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-1390] = "fixed-version: Fixed from version 5.11rc4" +CVE_STATUS[CVE-2022-50545] = "fixed-version: Fixed from version 6.2" -# CVE-2023-1476 has no known resolution +CVE_STATUS[CVE-2022-50546] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1513] = "fixed-version: Fixed from version 6.2" +CVE_STATUS[CVE-2022-50547] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1582] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2022-50548] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1583] = "fixed-version: Fixed from version 6.3rc4" +CVE_STATUS[CVE-2022-50549] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1611] = "fixed-version: Fixed from version 6.3rc5" +CVE_STATUS[CVE-2022-50550] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1637] = "fixed-version: Fixed from version 5.18rc2" +CVE_STATUS[CVE-2022-50551] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1652] = "fixed-version: Fixed from version 6.2rc5" +CVE_STATUS[CVE-2022-50552] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-1670] = "fixed-version: Fixed from version 6.3rc4" +CVE_STATUS[CVE-2022-50553] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1829] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2022-50554] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1838] = "fixed-version: Fixed from version 5.18" +CVE_STATUS[CVE-2022-50555] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-1855] = "fixed-version: Fixed from version 6.3rc3" +CVE_STATUS[CVE-2022-50556] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2023-1859] = "fixed-version: Fixed from version 6.3rc7" +CVE_STATUS[CVE-2022-50557] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1872] = "fixed-version: Fixed from version 5.18rc2" +CVE_STATUS[CVE-2022-50558] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-1989] = "fixed-version: Fixed from version 6.3rc4" +CVE_STATUS[CVE-2022-50559] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-1990] = "fixed-version: Fixed from version 6.3rc3" +CVE_STATUS[CVE-2022-50560] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-1998] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2022-50561] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-2002] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50562] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-2006] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2022-50563] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-2007] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50564] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-2008] = "fixed-version: Fixed from version 5.19rc4" +CVE_STATUS[CVE-2022-50565] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-2019] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50566] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-20569] = "fixed-version: Fixed from version 6.5rc6" +CVE_STATUS[CVE-2022-50567] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-20588] = "fixed-version: Fixed from version 6.5rc6" +CVE_STATUS[CVE-2022-50568] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-20593] = "fixed-version: Fixed from version 6.5rc4" +CVE_STATUS[CVE-2022-50569] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-20928] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50570] = "fixed-version: Fixed from version 6.1" -# CVE-2023-20937 has no known resolution +CVE_STATUS[CVE-2022-50571] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-20938] = "fixed-version: Fixed from version 5.18rc5" +CVE_STATUS[CVE-2022-50572] = "fixed-version: Fixed from version 6.2" -# CVE-2023-20941 has no known resolution +CVE_STATUS[CVE-2022-50573] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2023-21102] = "fixed-version: Fixed from version 6.2rc4" +CVE_STATUS[CVE-2022-50574] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-21106] = "fixed-version: Fixed from version 6.2rc5" +CVE_STATUS[CVE-2022-50575] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-2124] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50576] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-21255] = "fixed-version: Fixed from version 6.4rc4" +CVE_STATUS[CVE-2022-50577] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-21264] = "fixed-version: Fixed from version 6.4rc5" +CVE_STATUS[CVE-2022-50578] = "fixed-version: Fixed from version 6.2" -# CVE-2023-21400 has no known resolution +CVE_STATUS[CVE-2022-50579] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-2156] = "fixed-version: Fixed from version 6.3" +CVE_STATUS[CVE-2022-50580] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-2162] = "fixed-version: Fixed from version 6.2rc6" +CVE_STATUS[CVE-2022-50581] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-2163] = "fixed-version: Fixed from version 6.3" +CVE_STATUS[CVE-2022-50582] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-2166] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2022-50583] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-2176] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2022-50614] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-2177] = "fixed-version: Fixed from version 5.19" +CVE_STATUS[CVE-2022-50615] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-2194] = "fixed-version: Fixed from version 6.3rc4" +CVE_STATUS[CVE-2022-50616] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-2235] = "fixed-version: Fixed from version 6.3rc3" +CVE_STATUS[CVE-2022-50617] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-2236] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2022-50618] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-2248] = "fixed-version: Fixed from version 6.3" +CVE_STATUS[CVE-2022-50619] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-2269] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50620] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-22995] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-50621] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-22996] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2022-50622] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-22997] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50623] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-22998] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50624] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-22999] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-50625] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-23000] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-50626] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-23001] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-50627] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2023-23002] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2022-50628] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2023-23003] = "fixed-version: Fixed from version 5.16rc6" +CVE_STATUS[CVE-2022-50629] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2023-23004] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50630] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-23005] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50631] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-23006] = "fixed-version: Fixed from version 5.16rc8" +CVE_STATUS[CVE-2022-50632] = "fixed-version: Fixed from version 6.2" -# CVE-2023-23039 has no known resolution +CVE_STATUS[CVE-2022-50633] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-23454] = "fixed-version: Fixed from version 6.2rc3" +CVE_STATUS[CVE-2022-50634] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-23455] = "fixed-version: Fixed from version 6.2rc3" +CVE_STATUS[CVE-2022-50635] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-23559] = "fixed-version: Fixed from version 6.2rc5" +CVE_STATUS[CVE-2022-50636] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-23586] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2022-50637] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-2430] = "fixed-version: Fixed from version 6.2rc5" +CVE_STATUS[CVE-2022-50638] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-2483] = "fixed-version: Fixed from version 6.3rc4" +CVE_STATUS[CVE-2022-50639] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-25012] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2022-50640] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-2513] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50641] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-25775] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2022-50642] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-2598] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50643] = "fixed-version: Fixed from version 6.1" -# CVE-2023-26242 has no known resolution +CVE_STATUS[CVE-2022-50644] = "fixed-version: Fixed from version 6.1" -# CVE-2023-2640 has no known resolution +CVE_STATUS[CVE-2022-50645] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-26544] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50646] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-26545] = "fixed-version: Fixed from version 6.2" +CVE_STATUS[CVE-2022-50647] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-26605] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2022-50648] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-26606] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50649] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-26607] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50650] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-28327] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2022-50651] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-28328] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50652] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-28410] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50653] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-28464] = "fixed-version: Fixed from version 6.3rc7" +CVE_STATUS[CVE-2022-50654] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-28466] = "fixed-version: Fixed from version 6.3rc2" +CVE_STATUS[CVE-2022-50655] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-2860] = "fixed-version: Fixed from version 6.0rc5" +CVE_STATUS[CVE-2022-50656] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-28746] = "cpe-stable-backport: Backported in 6.6.22" +CVE_STATUS[CVE-2022-50657] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-28772] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2022-50658] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-28866] = "fixed-version: Fixed from version 6.3rc4" +CVE_STATUS[CVE-2022-50659] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-2898] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2022-50660] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2023-2985] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2022-50661] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-3006] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50662] = "fixed-version: Fixed from version 6.2" -# Skipping CVE-2023-3022, no affected_versions +CVE_STATUS[CVE-2022-50663] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-30456] = "fixed-version: Fixed from version 6.3rc3" +CVE_STATUS[CVE-2022-50664] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-30772] = "fixed-version: Fixed from version 6.3rc4" +CVE_STATUS[CVE-2022-50665] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-3090] = "fixed-version: Fixed from version 6.4rc2" +CVE_STATUS[CVE-2022-50666] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-3106] = "fixed-version: Fixed from version 4.8rc7" +CVE_STATUS[CVE-2022-50667] = "fixed-version: Fixed from version 6.1" -# Skipping CVE-2023-3108, no affected_versions +CVE_STATUS[CVE-2022-50668] = "fixed-version: Fixed from version 6.2" -# CVE-2023-31081 has no known resolution +CVE_STATUS[CVE-2022-50669] = "fixed-version: Fixed from version 6.2" -# CVE-2023-31082 has no known resolution +CVE_STATUS[CVE-2022-50670] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-31083] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2022-50671] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-31084] = "fixed-version: Fixed from version 6.4rc3" +CVE_STATUS[CVE-2022-50672] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-31085] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2022-50673] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-3111] = "fixed-version: Fixed from version 6.0rc2" +CVE_STATUS[CVE-2022-50674] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-3117] = "fixed-version: Fixed from version 6.4rc7" +CVE_STATUS[CVE-2022-50675] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-31248] = "fixed-version: Fixed from version 6.5rc2" +CVE_STATUS[CVE-2022-50676] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-3141] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50677] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-31436] = "fixed-version: Fixed from version 6.3" +CVE_STATUS[CVE-2022-50678] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-3159] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2022-50679] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-3161] = "fixed-version: Fixed from version 6.2rc7" +CVE_STATUS[CVE-2022-50697] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-3212] = "fixed-version: Fixed from version 6.4rc2" +CVE_STATUS[CVE-2022-50698] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-3220] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2022-50699] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-32233] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50700] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-32247] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50701] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2023-32248] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50702] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-32250] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50703] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-32252] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50704] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-32254] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50705] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-32257] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50706] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-32258] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50707] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-32269] = "fixed-version: Fixed from version 6.2rc7" +CVE_STATUS[CVE-2022-50708] = "fixed-version: Fixed from version 6.1" -# CVE-2023-32629 has no known resolution +CVE_STATUS[CVE-2022-50709] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-3268] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50710] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-3269] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2022-50711] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-3312] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50712] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-3317] = "fixed-version: Fixed from version 6.3rc6" +CVE_STATUS[CVE-2022-50713] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-33203] = "fixed-version: Fixed from version 6.3rc4" +CVE_STATUS[CVE-2022-50714] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-33250] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2022-50715] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-33288] = "fixed-version: Fixed from version 6.3rc4" +CVE_STATUS[CVE-2022-50716] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-3338] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2022-50717] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-3355] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2022-50718] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-3357] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2022-50719] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-3358] = "fixed-version: Fixed from version 6.2rc5" +CVE_STATUS[CVE-2022-50720] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-3359] = "fixed-version: Fixed from version 6.2rc7" +CVE_STATUS[CVE-2022-50721] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-3389] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2022-50722] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-3390] = "fixed-version: Fixed from version 6.4rc7" +CVE_STATUS[CVE-2022-50723] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-33951] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50724] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-33952] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50725] = "fixed-version: Fixed from version 6.2" -# CVE-2023-3397 has no known resolution +CVE_STATUS[CVE-2022-50726] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-34255] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50727] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-34256] = "fixed-version: Fixed from version 6.4rc2" +CVE_STATUS[CVE-2022-50728] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-34319] = "fixed-version: Fixed from version 6.5rc6" +CVE_STATUS[CVE-2022-50729] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-34324] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2022-50730] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-3439] = "fixed-version: Fixed from version 5.18rc5" +CVE_STATUS[CVE-2022-50731] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-35001] = "fixed-version: Fixed from version 6.5rc2" +CVE_STATUS[CVE-2022-50732] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-3567] = "fixed-version: Fixed from version 6.2rc7" +CVE_STATUS[CVE-2022-50733] = "fixed-version: Fixed from version 6.1" -# CVE-2023-35693 has no known resolution +CVE_STATUS[CVE-2022-50734] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-35788] = "fixed-version: Fixed from version 6.4rc5" +CVE_STATUS[CVE-2022-50735] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-35823] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50736] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-35824] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50737] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-35826] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50738] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-35827] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2022-50739] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-35828] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50740] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-35829] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2022-50741] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-3609] = "fixed-version: Fixed from version 6.4rc7" +CVE_STATUS[CVE-2022-50742] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-3610] = "fixed-version: Fixed from version 6.4" +CVE_STATUS[CVE-2022-50743] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-3611] = "fixed-version: Fixed from version 6.5rc2" +CVE_STATUS[CVE-2022-50744] = "fixed-version: Fixed from version 6.2" -# CVE-2023-3640 has no known resolution +CVE_STATUS[CVE-2022-50745] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-37453] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2022-50746] = "fixed-version: Fixed from version 6.2" -# CVE-2023-37454 has no known resolution +CVE_STATUS[CVE-2022-50747] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-3772] = "fixed-version: Fixed from version 6.5rc7" +CVE_STATUS[CVE-2022-50748] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-3773] = "fixed-version: Fixed from version 6.5rc7" +CVE_STATUS[CVE-2022-50749] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-3776] = "fixed-version: Fixed from version 6.5rc2" +CVE_STATUS[CVE-2022-50750] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-3777] = "fixed-version: Fixed from version 6.5rc3" +CVE_STATUS[CVE-2022-50751] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-3812] = "fixed-version: Fixed from version 6.1rc4" +CVE_STATUS[CVE-2022-50752] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-38409] = "fixed-version: Fixed from version 6.3rc7" +CVE_STATUS[CVE-2022-50753] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-38426] = "fixed-version: Fixed from version 6.4rc3" +CVE_STATUS[CVE-2022-50754] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-38427] = "fixed-version: Fixed from version 6.4rc6" +CVE_STATUS[CVE-2022-50755] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-38428] = "fixed-version: Fixed from version 6.4rc3" +CVE_STATUS[CVE-2022-50756] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-38429] = "fixed-version: Fixed from version 6.4rc3" +CVE_STATUS[CVE-2022-50757] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-38430] = "fixed-version: Fixed from version 6.4rc6" +CVE_STATUS[CVE-2022-50758] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-38431] = "fixed-version: Fixed from version 6.4rc6" +CVE_STATUS[CVE-2022-50759] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-38432] = "fixed-version: Fixed from version 6.4" +CVE_STATUS[CVE-2022-50760] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-3863] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2022-50761] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-3865] = "fixed-version: Fixed from version 6.4" +CVE_STATUS[CVE-2022-50762] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-3866] = "fixed-version: Fixed from version 6.4" +CVE_STATUS[CVE-2022-50763] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-50764] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50765] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50766] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-50767] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-50768] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50769] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50770] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50771] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50772] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-50773] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50774] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-50775] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2022-50776] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50777] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50778] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-50779] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50780] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-50781] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50782] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50783] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50784] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50785] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-3867] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2022-50786] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-39189] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2022-50809] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-39191] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2022-50810] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-39192] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2022-50811] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-39193] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2022-50812] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-39194] = "fixed-version: Fixed from version 6.5rc7" +CVE_STATUS[CVE-2022-50813] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-39197] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2022-50814] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-39198] = "fixed-version: Fixed from version 6.5rc7" +CVE_STATUS[CVE-2022-50815] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-4004] = "fixed-version: Fixed from version 6.5rc3" +CVE_STATUS[CVE-2022-50816] = "fixed-version: Fixed from version 6.1" -# CVE-2023-4010 has no known resolution +CVE_STATUS[CVE-2022-50817] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-4015] = "fixed-version: Fixed from version 6.5rc4" +CVE_STATUS[CVE-2022-50818] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-40283] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2022-50819] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-40791] = "fixed-version: Fixed from version 6.5rc6" +CVE_STATUS[CVE-2022-50820] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-4128] = "fixed-version: Fixed from version 6.5rc5" +CVE_STATUS[CVE-2022-50821] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-4132] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2022-50822] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-4133] = "fixed-version: Fixed from version 6.3" +CVE_STATUS[CVE-2022-50823] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-4134] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2022-50824] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-4147] = "fixed-version: Fixed from version 6.5rc4" +CVE_STATUS[CVE-2022-50825] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-4155] = "fixed-version: Fixed from version 6.5rc6" +CVE_STATUS[CVE-2022-50826] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-4194] = "fixed-version: Fixed from version 6.5rc5" +CVE_STATUS[CVE-2022-50827] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-4206] = "fixed-version: Fixed from version 6.5rc5" +CVE_STATUS[CVE-2022-50828] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-4207] = "fixed-version: Fixed from version 6.5rc5" +CVE_STATUS[CVE-2022-50829] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-4208] = "fixed-version: Fixed from version 6.5rc5" +CVE_STATUS[CVE-2022-50830] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2023-4244] = "fixed-version: Fixed from version 6.5rc7" +CVE_STATUS[CVE-2022-50832] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2023-4273] = "fixed-version: Fixed from version 6.5rc5" +CVE_STATUS[CVE-2022-50833] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-42752] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2022-50834] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-42753] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2022-50835] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-42754] = "fixed-version: Fixed from version 6.6rc3" +CVE_STATUS[CVE-2022-50836] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-42755] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2022-50837] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-42756] = "fixed-version: Fixed from version 6.6rc3" +CVE_STATUS[CVE-2022-50838] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-4385] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2022-50839] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-4387] = "fixed-version: Fixed from version 5.18" +CVE_STATUS[CVE-2022-50840] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-4389] = "fixed-version: Fixed from version 5.18rc3" +CVE_STATUS[CVE-2022-50841] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-4394] = "fixed-version: Fixed from version 6.0rc3" +CVE_STATUS[CVE-2022-50842] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-44466] = "fixed-version: Fixed from version 6.5rc2" +CVE_STATUS[CVE-2022-50843] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-4459] = "fixed-version: Fixed from version 5.18" +CVE_STATUS[CVE-2022-50844] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-4563] = "fixed-version: Fixed from version 6.5rc6" +CVE_STATUS[CVE-2022-50845] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-4569] = "fixed-version: Fixed from version 6.5rc7" +CVE_STATUS[CVE-2022-50846] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-45862] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2022-50847] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-45863] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2022-50848] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-45871] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2022-50849] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-45898] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2022-50850] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-4610] = "fixed-version: Fixed from version 6.4" +CVE_STATUS[CVE-2022-50851] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-4611] = "fixed-version: Fixed from version 6.5rc4" +CVE_STATUS[CVE-2022-50852] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-4622] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2022-50853] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-4623] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2022-50854] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-46343] = "fixed-version: Fixed from version 6.6rc7" +CVE_STATUS[CVE-2022-50855] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-46813] = "fixed-version: Fixed from version 6.6rc7" +CVE_STATUS[CVE-2022-50856] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-46838] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2022-50857] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-46862] = "fixed-version: Fixed from version 6.6" +CVE_STATUS[CVE-2022-50858] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-47233] = "cpe-stable-backport: Backported in 6.6.24" +CVE_STATUS[CVE-2022-50859] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-4732] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2022-50860] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-4881] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2022-50861] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-4921] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2022-50862] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-50431] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2022-50863] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-5090] = "fixed-version: Fixed from version 6.6rc7" +CVE_STATUS[CVE-2022-50864] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-51042] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2022-50865] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-51043] = "fixed-version: Fixed from version 6.5rc3" +CVE_STATUS[CVE-2022-50866] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-5158] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2022-50867] = "fixed-version: Fixed from version 6.1" -CVE_STATUS[CVE-2023-51779] = "cpe-stable-backport: Backported in 6.6.9" +CVE_STATUS[CVE-2022-50868] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-5178] = "fixed-version: Fixed from version 6.6rc7" +CVE_STATUS[CVE-2022-50869] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-51780] = "cpe-stable-backport: Backported in 6.6.8" +CVE_STATUS[CVE-2022-50870] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-51781] = "cpe-stable-backport: Backported in 6.6.8" +CVE_STATUS[CVE-2022-50871] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-51782] = "cpe-stable-backport: Backported in 6.6.8" +CVE_STATUS[CVE-2022-50872] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2023-5197] = "fixed-version: Fixed from version 6.6rc3" +CVE_STATUS[CVE-2022-50873] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-52340] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2022-50874] = "fixed-version: Fixed from version 6.3" -CVE_STATUS[CVE-2023-52429] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2022-50875] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-52433] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2022-50876] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-50877] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-50878] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-50879] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50880] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-50881] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2022-50882] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-50883] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50884] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-50885] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50886] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50887] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50888] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-50889] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-32246] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-32249] = "fixed-version: Fixed from version 6.4" + +# CVE-2023-34319 has no known resolution + +# CVE-2023-34324 has no known resolution + +CVE_STATUS[CVE-2023-3865] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-3866] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-3867] = "fixed-version: Fixed from version 6.5" + +# CVE-2023-46838 has no known resolution + +CVE_STATUS[CVE-2023-4130] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-4515] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-52433] = "fixed-version: Fixed from version 6.6" CVE_STATUS[CVE-2023-52434] = "cpe-stable-backport: Backported in 6.6.8" @@ -5734,11 +5826,11 @@ CVE_STATUS[CVE-2023-52438] = "cpe-stable-backport: Backported in 6.6.13" CVE_STATUS[CVE-2023-52439] = "cpe-stable-backport: Backported in 6.6.13" -CVE_STATUS[CVE-2023-52440] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2023-52440] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52441] = "fixed-version: Fixed from version 6.5rc4" +CVE_STATUS[CVE-2023-52441] = "fixed-version: Fixed from version 6.5" -CVE_STATUS[CVE-2023-52442] = "fixed-version: Fixed from version 6.5rc4" +CVE_STATUS[CVE-2023-52442] = "fixed-version: Fixed from version 6.5" CVE_STATUS[CVE-2023-52443] = "cpe-stable-backport: Backported in 6.6.14" @@ -5774,9 +5866,9 @@ CVE_STATUS[CVE-2023-52458] = "cpe-stable-backport: Backported in 6.6.14" CVE_STATUS[CVE-2023-52459] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-52460] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52460] = "fixed-version: only affects 6.7 onwards" -CVE_STATUS[CVE-2023-52461] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52461] = "fixed-version: only affects 6.7 onwards" CVE_STATUS[CVE-2023-52462] = "cpe-stable-backport: Backported in 6.6.14" @@ -5794,35 +5886,35 @@ CVE_STATUS[CVE-2023-52469] = "cpe-stable-backport: Backported in 6.6.14" CVE_STATUS[CVE-2023-52470] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-52471] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52471] = "fixed-version: only affects 6.7 onwards" CVE_STATUS[CVE-2023-52472] = "cpe-stable-backport: Backported in 6.6.14" CVE_STATUS[CVE-2023-52473] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-52474] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2023-52474] = "fixed-version: Fixed from version 6.4" -CVE_STATUS[CVE-2023-52475] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2023-52475] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52476] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2023-52476] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52477] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2023-52477] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52478] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2023-52478] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52479] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52479] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52480] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52480] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52481] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52481] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52482] = "fixed-version: Fixed from version 6.6rc4" +CVE_STATUS[CVE-2023-52482] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52483] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2023-52483] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52484] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52484] = "fixed-version: Fixed from version 6.6" -# CVE-2023-52485 needs backporting (fixed from 6.8rc1) +# CVE-2023-52485 needs backporting (fixed from 6.8) CVE_STATUS[CVE-2023-52486] = "cpe-stable-backport: Backported in 6.6.15" @@ -5848,123 +5940,121 @@ CVE_STATUS[CVE-2023-52497] = "cpe-stable-backport: Backported in 6.6.15" CVE_STATUS[CVE-2023-52498] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-52499] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2023-52499] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52500] = "fixed-version: Fixed from version 6.6rc2" +CVE_STATUS[CVE-2023-52500] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52501] = "fixed-version: Fixed from version 6.6rc2" +CVE_STATUS[CVE-2023-52501] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52502] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2023-52502] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52503] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2023-52503] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52504] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2023-52504] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52505] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2023-52505] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52506] = "fixed-version: Fixed from version 6.6rc3" +CVE_STATUS[CVE-2023-52506] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52507] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2023-52507] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52508] = "fixed-version: Fixed from version 6.6rc2" +CVE_STATUS[CVE-2023-52508] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52509] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2023-52509] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52510] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2023-52510] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52511] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2023-52511] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52512] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2023-52512] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52513] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52513] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52515] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52515] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52516] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2023-52516] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52517] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2023-52517] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52518] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52518] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52519] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52519] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52520] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52520] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52522] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52522] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52523] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52523] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52524] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52524] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52525] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52525] = "fixed-version: Fixed from version 6.5.7" -CVE_STATUS[CVE-2023-52526] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52526] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52527] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52527] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52528] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52528] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52529] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52529] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52530] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52530] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52531] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52531] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52532] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52532] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52559] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52559] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52560] = "fixed-version: Fixed from version 6.6rc4" +CVE_STATUS[CVE-2023-52560] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52561] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2023-52561] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52562] = "fixed-version: Fixed from version 6.6rc4" +CVE_STATUS[CVE-2023-52562] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52563] = "fixed-version: Fixed from version 6.6rc3" +CVE_STATUS[CVE-2023-52563] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52564] = "fixed-version: Fixed from version 6.6rc4" +CVE_STATUS[CVE-2023-52564] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52565] = "fixed-version: Fixed from version 6.6rc3" +CVE_STATUS[CVE-2023-52565] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52566] = "fixed-version: Fixed from version 6.6rc4" +CVE_STATUS[CVE-2023-52566] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52567] = "fixed-version: Fixed from version 6.6rc4" +CVE_STATUS[CVE-2023-52567] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52568] = "fixed-version: Fixed from version 6.6rc4" +CVE_STATUS[CVE-2023-52568] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52569] = "fixed-version: Fixed from version 6.6rc2" +CVE_STATUS[CVE-2023-52569] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52570] = "fixed-version: Fixed from version 6.6rc4" +CVE_STATUS[CVE-2023-52570] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52571] = "fixed-version: Fixed from version 6.6rc4" +CVE_STATUS[CVE-2023-52571] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52572] = "fixed-version: Fixed from version 6.6rc3" +CVE_STATUS[CVE-2023-52572] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52573] = "fixed-version: Fixed from version 6.6rc3" +CVE_STATUS[CVE-2023-52573] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52574] = "fixed-version: Fixed from version 6.6rc3" +CVE_STATUS[CVE-2023-52574] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52575] = "fixed-version: Fixed from version 6.6rc3" +CVE_STATUS[CVE-2023-52576] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52576] = "fixed-version: Fixed from version 6.6rc3" +CVE_STATUS[CVE-2023-52577] = "fixed-version: Fixed from version 6.5.6" -CVE_STATUS[CVE-2023-52577] = "fixed-version: Fixed from version 6.6rc3" +CVE_STATUS[CVE-2023-52578] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52578] = "fixed-version: Fixed from version 6.6rc3" +CVE_STATUS[CVE-2023-52580] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52580] = "fixed-version: Fixed from version 6.6rc3" +CVE_STATUS[CVE-2023-52581] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52581] = "fixed-version: Fixed from version 6.6rc3" - -CVE_STATUS[CVE-2023-52582] = "fixed-version: Fixed from version 6.6rc3" +CVE_STATUS[CVE-2023-52582] = "fixed-version: Fixed from version 6.6" CVE_STATUS[CVE-2023-52583] = "cpe-stable-backport: Backported in 6.6.16" CVE_STATUS[CVE-2023-52584] = "cpe-stable-backport: Backported in 6.6.16" -# CVE-2023-52585 needs backporting (fixed from 6.8rc1) +CVE_STATUS[CVE-2023-52585] = "cpe-stable-backport: Backported in 6.6.32" -# CVE-2023-52586 needs backporting (fixed from 6.8rc1) +# CVE-2023-52586 needs backporting (fixed from 6.8) CVE_STATUS[CVE-2023-52587] = "cpe-stable-backport: Backported in 6.6.16" @@ -5972,7 +6062,7 @@ CVE_STATUS[CVE-2023-52588] = "cpe-stable-backport: Backported in 6.6.16" CVE_STATUS[CVE-2023-52589] = "cpe-stable-backport: Backported in 6.6.16" -# CVE-2023-52590 needs backporting (fixed from 6.8rc1) +# CVE-2023-52590 needs backporting (fixed from 6.8) CVE_STATUS[CVE-2023-52591] = "cpe-stable-backport: Backported in 6.6.16" @@ -6036,19 +6126,17 @@ CVE_STATUS[CVE-2023-52622] = "cpe-stable-backport: Backported in 6.6.16" CVE_STATUS[CVE-2023-52623] = "cpe-stable-backport: Backported in 6.6.16" -# CVE-2023-52624 needs backporting (fixed from 6.8rc1) +# CVE-2023-52624 needs backporting (fixed from 6.8) -# CVE-2023-52625 needs backporting (fixed from 6.8rc1) +# CVE-2023-52625 needs backporting (fixed from 6.8) -CVE_STATUS[CVE-2023-52626] = "fixed-version: only affects 6.7rc2 onwards" +CVE_STATUS[CVE-2023-52626] = "cpe-stable-backport: Backported in 6.6.15" CVE_STATUS[CVE-2023-52627] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-52628] = "fixed-version: Fixed from version 6.6rc1" - -CVE_STATUS[CVE-2023-52629] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2023-52628] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2023-52630] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52629] = "fixed-version: Fixed from version 6.6" CVE_STATUS[CVE-2023-52631] = "cpe-stable-backport: Backported in 6.6.17" @@ -6056,7 +6144,7 @@ CVE_STATUS[CVE-2023-52632] = "cpe-stable-backport: Backported in 6.6.16" CVE_STATUS[CVE-2023-52633] = "cpe-stable-backport: Backported in 6.6.16" -# CVE-2023-52634 needs backporting (fixed from 6.8rc1) +CVE_STATUS[CVE-2023-52634] = "fixed-version: only affects 6.7 onwards" CVE_STATUS[CVE-2023-52635] = "cpe-stable-backport: Backported in 6.6.16" @@ -6072,589 +6160,15159 @@ CVE_STATUS[CVE-2023-52640] = "cpe-stable-backport: Backported in 6.6.19" CVE_STATUS[CVE-2023-52641] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2023-5345] = "fixed-version: Fixed from version 6.6rc4" +CVE_STATUS[CVE-2023-52642] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-5633] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2023-52643] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-5717] = "fixed-version: Fixed from version 6.6rc7" +CVE_STATUS[CVE-2023-52644] = "cpe-stable-backport: Backported in 6.6.23" -CVE_STATUS[CVE-2023-5972] = "fixed-version: Fixed from version 6.6rc7" +CVE_STATUS[CVE-2023-52645] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-6039] = "fixed-version: Fixed from version 6.5rc5" +CVE_STATUS[CVE-2023-52646] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2023-6040] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2023-52647] = "cpe-stable-backport: Backported in 6.6.24" -CVE_STATUS[CVE-2023-6111] = "cpe-stable-backport: Backported in 6.6.3" +CVE_STATUS[CVE-2023-52648] = "cpe-stable-backport: Backported in 6.6.24" -CVE_STATUS[CVE-2023-6121] = "cpe-stable-backport: Backported in 6.6.4" +CVE_STATUS[CVE-2023-52649] = "cpe-stable-backport: Backported in 6.6.23" -CVE_STATUS[CVE-2023-6176] = "fixed-version: Fixed from version 6.6rc2" +CVE_STATUS[CVE-2023-52650] = "cpe-stable-backport: Backported in 6.6.23" -CVE_STATUS[CVE-2023-6200] = "cpe-stable-backport: Backported in 6.6.9" +CVE_STATUS[CVE-2023-52652] = "cpe-stable-backport: Backported in 6.6.23" -# CVE-2023-6238 has no known resolution +CVE_STATUS[CVE-2023-52653] = "cpe-stable-backport: Backported in 6.6.23" -# CVE-2023-6240 has no known resolution +CVE_STATUS[CVE-2023-52654] = "cpe-stable-backport: Backported in 6.6.7" -CVE_STATUS[CVE-2023-6270] = "cpe-stable-backport: Backported in 6.6.23" +CVE_STATUS[CVE-2023-52655] = "cpe-stable-backport: Backported in 6.6.8" -CVE_STATUS[CVE-2023-6356] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52656] = "cpe-stable-backport: Backported in 6.6.23" -CVE_STATUS[CVE-2023-6531] = "cpe-stable-backport: Backported in 6.6.7" +CVE_STATUS[CVE-2023-52657] = "cpe-stable-backport: Backported in 6.6.21" -# CVE-2023-6535 has no known resolution +CVE_STATUS[CVE-2023-52658] = "cpe-stable-backport: Backported in 6.6.22" -CVE_STATUS[CVE-2023-6536] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52659] = "cpe-stable-backport: Backported in 6.6.23" -CVE_STATUS[CVE-2023-6546] = "fixed-version: Fixed from version 6.5rc7" +CVE_STATUS[CVE-2023-52660] = "cpe-stable-backport: Backported in 6.6.23" -CVE_STATUS[CVE-2023-6560] = "cpe-stable-backport: Backported in 6.6.5" +CVE_STATUS[CVE-2023-52661] = "cpe-stable-backport: Backported in 6.6.23" -CVE_STATUS[CVE-2023-6606] = "cpe-stable-backport: Backported in 6.6.9" +CVE_STATUS[CVE-2023-52662] = "cpe-stable-backport: Backported in 6.6.23" -CVE_STATUS[CVE-2023-6610] = "cpe-stable-backport: Backported in 6.6.13" +CVE_STATUS[CVE-2023-52663] = "cpe-stable-backport: Backported in 6.6.23" -CVE_STATUS[CVE-2023-6622] = "cpe-stable-backport: Backported in 6.6.7" +CVE_STATUS[CVE-2023-52664] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-6679] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52667] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-6817] = "cpe-stable-backport: Backported in 6.6.7" +CVE_STATUS[CVE-2023-52668] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-6915] = "cpe-stable-backport: Backported in 6.6.13" +CVE_STATUS[CVE-2023-52669] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-6931] = "cpe-stable-backport: Backported in 6.6.7" +CVE_STATUS[CVE-2023-52670] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-6932] = "cpe-stable-backport: Backported in 6.6.5" +CVE_STATUS[CVE-2023-52671] = "cpe-stable-backport: Backported in 6.6.24" -CVE_STATUS[CVE-2023-7042] = "cpe-stable-backport: Backported in 6.6.23" +CVE_STATUS[CVE-2023-52672] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-7192] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2023-52673] = "fixed-version: only affects 6.7 onwards" -CVE_STATUS[CVE-2024-0193] = "cpe-stable-backport: Backported in 6.6.10" +CVE_STATUS[CVE-2023-52674] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2024-0340] = "fixed-version: Fixed from version 6.4rc6" +CVE_STATUS[CVE-2023-52675] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2024-0443] = "fixed-version: Fixed from version 6.4rc7" +CVE_STATUS[CVE-2023-52676] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2024-0562] = "fixed-version: Fixed from version 6.0rc3" +CVE_STATUS[CVE-2023-52677] = "cpe-stable-backport: Backported in 6.6.14" -# CVE-2024-0564 has no known resolution +CVE_STATUS[CVE-2023-52678] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2024-0565] = "cpe-stable-backport: Backported in 6.6.8" +CVE_STATUS[CVE-2023-52679] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2024-0582] = "cpe-stable-backport: Backported in 6.6.5" +CVE_STATUS[CVE-2023-52680] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2024-0584] = "cpe-stable-backport: Backported in 6.6.5" +CVE_STATUS[CVE-2023-52681] = "fixed-version: only affects 6.7 onwards" -CVE_STATUS[CVE-2024-0607] = "cpe-stable-backport: Backported in 6.6.3" +CVE_STATUS[CVE-2023-52682] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2024-0639] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2023-52683] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2024-0641] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2023-52684] = "fixed-version: only affects 6.7 onwards" -CVE_STATUS[CVE-2024-0646] = "cpe-stable-backport: Backported in 6.6.7" +CVE_STATUS[CVE-2023-52686] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2024-0775] = "fixed-version: Fixed from version 6.4rc2" +CVE_STATUS[CVE-2023-52687] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2024-0841] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52688] = "fixed-version: only affects 6.7 onwards" -CVE_STATUS[CVE-2024-1085] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52689] = "fixed-version: only affects 6.7 onwards" -CVE_STATUS[CVE-2024-1086] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52690] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2024-1151] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52691] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2024-1312] = "fixed-version: Fixed from version 6.5rc4" +CVE_STATUS[CVE-2023-52692] = "cpe-stable-backport: Backported in 6.6.14" -# CVE-2024-21803 has no known resolution +CVE_STATUS[CVE-2023-52693] = "cpe-stable-backport: Backported in 6.6.14" -# CVE-2024-2193 has no known resolution +CVE_STATUS[CVE-2023-52694] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2024-22099] = "cpe-stable-backport: Backported in 6.6.23" +CVE_STATUS[CVE-2023-52695] = "fixed-version: only affects 6.7 onwards" -# CVE-2024-22386 has no known resolution +CVE_STATUS[CVE-2023-52696] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2024-22705] = "cpe-stable-backport: Backported in 6.6.10" +CVE_STATUS[CVE-2023-52697] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2024-23196] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2023-52698] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2024-23307] = "cpe-stable-backport: Backported in 6.6.24" +CVE_STATUS[CVE-2023-52699] = "cpe-stable-backport: Backported in 6.6.27" -# CVE-2024-23848 has no known resolution +CVE_STATUS[CVE-2023-52700] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-23849] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52701] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-23850] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52702] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-23851] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52703] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-24855] = "fixed-version: Fixed from version 6.5rc2" +CVE_STATUS[CVE-2023-52704] = "fixed-version: Fixed from version 6.2" -# CVE-2024-24857 has no known resolution +CVE_STATUS[CVE-2023-52705] = "fixed-version: Fixed from version 6.2" -# CVE-2024-24858 has no known resolution +CVE_STATUS[CVE-2023-52706] = "fixed-version: Fixed from version 6.2" -# CVE-2024-24859 has no known resolution +CVE_STATUS[CVE-2023-52707] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-24860] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52708] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-24861] = "cpe-stable-backport: Backported in 6.6.24" +CVE_STATUS[CVE-2023-52730] = "fixed-version: Fixed from version 6.2" -# CVE-2024-24864 has no known resolution +CVE_STATUS[CVE-2023-52731] = "fixed-version: Fixed from version 6.2" -# CVE-2024-25739 has no known resolution +CVE_STATUS[CVE-2023-52732] = "fixed-version: Fixed from version 6.2" -# CVE-2024-25740 has no known resolution +CVE_STATUS[CVE-2023-52735] = "fixed-version: Fixed from version 6.2" -# CVE-2024-25741 has no known resolution +CVE_STATUS[CVE-2023-52736] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-25744] = "cpe-stable-backport: Backported in 6.6.7" +CVE_STATUS[CVE-2023-52737] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26581] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52738] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26582] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52739] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26583] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52740] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26584] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52741] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26585] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52742] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26586] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52743] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26587] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52744] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26588] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52745] = "fixed-version: Fixed from version 6.1.12" -CVE_STATUS[CVE-2024-26589] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52746] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26590] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52747] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26591] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52748] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26592] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52749] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26593] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52750] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26594] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52751] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26595] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52752] = "cpe-stable-backport: Backported in 6.6.3" -# CVE-2024-26596 needs backporting (fixed from 6.8rc1) +CVE_STATUS[CVE-2023-52753] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26597] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52754] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26598] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52755] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26599] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52757] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26600] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52760] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26601] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52761] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26602] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52762] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26603] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52763] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26604] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52764] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26605] = "fixed-version: only affects 6.7 onwards" +CVE_STATUS[CVE-2023-52765] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26606] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52766] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26607] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52767] = "cpe-stable-backport: Backported in 6.6.4" -CVE_STATUS[CVE-2024-26608] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52768] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26610] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52769] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26611] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52770] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26612] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52771] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26614] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52772] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26615] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52773] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26616] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52774] = "cpe-stable-backport: Backported in 6.6.4" -CVE_STATUS[CVE-2024-26617] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52775] = "cpe-stable-backport: Backported in 6.6.4" -CVE_STATUS[CVE-2024-26618] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52776] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26619] = "fixed-version: only affects 6.7rc5 onwards" +CVE_STATUS[CVE-2023-52777] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26620] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52778] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26621] = "fixed-version: only affects 6.7 onwards" +CVE_STATUS[CVE-2023-52779] = "cpe-stable-backport: Backported in 6.6.4" -CVE_STATUS[CVE-2024-26622] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-52780] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26623] = "cpe-stable-backport: Backported in 6.6.16" +CVE_STATUS[CVE-2023-52781] = "cpe-stable-backport: Backported in 6.6.4" -CVE_STATUS[CVE-2024-26625] = "cpe-stable-backport: Backported in 6.6.16" +CVE_STATUS[CVE-2023-52782] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26626] = "fixed-version: only affects 6.8rc1 onwards" +CVE_STATUS[CVE-2023-52783] = "cpe-stable-backport: Backported in 6.6.4" -CVE_STATUS[CVE-2024-26627] = "cpe-stable-backport: Backported in 6.6.16" +CVE_STATUS[CVE-2023-52784] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26629] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52785] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26630] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-52786] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26631] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52787] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26632] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52788] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26633] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2023-52789] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26634] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52790] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26635] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52791] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26636] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52792] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26637] = "fixed-version: only affects 6.7 onwards" +CVE_STATUS[CVE-2023-52794] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26638] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52795] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26639] = "fixed-version: only affects 6.8rc1 onwards" +CVE_STATUS[CVE-2023-52796] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26640] = "cpe-stable-backport: Backported in 6.6.16" +CVE_STATUS[CVE-2023-52797] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26641] = "cpe-stable-backport: Backported in 6.6.16" +CVE_STATUS[CVE-2023-52798] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26642] = "cpe-stable-backport: Backported in 6.6.24" +CVE_STATUS[CVE-2023-52799] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26643] = "cpe-stable-backport: Backported in 6.6.24" +CVE_STATUS[CVE-2023-52800] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26644] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52801] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26645] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52803] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26646] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52804] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26647] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52805] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26648] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52806] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26649] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52807] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26650] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52808] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26651] = "cpe-stable-backport: Backported in 6.6.23" +CVE_STATUS[CVE-2023-52809] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26652] = "cpe-stable-backport: Backported in 6.6.22" +CVE_STATUS[CVE-2023-52810] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26653] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52811] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26654] = "cpe-stable-backport: Backported in 6.6.24" +CVE_STATUS[CVE-2023-52812] = "cpe-stable-backport: Backported in 6.6.3" -# CVE-2024-26655 needs backporting (fixed from 6.9rc2) +CVE_STATUS[CVE-2023-52813] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26656] = "cpe-stable-backport: Backported in 6.6.24" +CVE_STATUS[CVE-2023-52814] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26657] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52815] = "cpe-stable-backport: Backported in 6.6.3" -# CVE-2024-26658 needs backporting (fixed from 6.8rc1) +CVE_STATUS[CVE-2023-52816] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26659] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52817] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26660] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52818] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26661] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52819] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26662] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52821] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26663] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52825] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26664] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52826] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26665] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52827] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26666] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52828] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26667] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52829] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26668] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52831] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26669] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52832] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26670] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-52833] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26671] = "cpe-stable-backport: Backported in 6.6.16" +CVE_STATUS[CVE-2023-52834] = "cpe-stable-backport: Backported in 6.6.3" -# CVE-2024-26672 needs backporting (fixed from 6.8rc1) +CVE_STATUS[CVE-2023-52835] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26673] = "cpe-stable-backport: Backported in 6.6.16" +CVE_STATUS[CVE-2023-52836] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2024-26674] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52837] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26675] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52838] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26676] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52839] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26677] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52840] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26678] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52841] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26679] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52842] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26680] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52843] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26681] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52844] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26682] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52845] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26683] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52846] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26684] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2023-52847] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26685] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52848] = "cpe-stable-backport: Backported in 6.6.2" -# CVE-2024-26686 needs backporting (fixed from 6.8rc4) +CVE_STATUS[CVE-2023-52849] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26687] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52850] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26688] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52851] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26689] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52852] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26690] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52853] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26691] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52854] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26692] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52855] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26693] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52856] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26694] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52857] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26695] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52858] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26696] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52859] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26697] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52860] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26698] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52861] = "cpe-stable-backport: Backported in 6.6.2" -# CVE-2024-26699 needs backporting (fixed from 6.8rc5) +CVE_STATUS[CVE-2023-52862] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26700] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52863] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26702] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52864] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26703] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52865] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26704] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52866] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26705] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52867] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26706] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52868] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26707] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52869] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26708] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52870] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26709] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52871] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26710] = "fixed-version: only affects 6.8rc1 onwards" +CVE_STATUS[CVE-2023-52872] = "cpe-stable-backport: Backported in 6.6.1" -CVE_STATUS[CVE-2024-26711] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52873] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26712] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52874] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26713] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52875] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26714] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52876] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26715] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52877] = "cpe-stable-backport: Backported in 6.6.1" -CVE_STATUS[CVE-2024-26716] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52878] = "cpe-stable-backport: Backported in 6.6.2" -CVE_STATUS[CVE-2024-26717] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52879] = "cpe-stable-backport: Backported in 6.6.1" -CVE_STATUS[CVE-2024-26718] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52880] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2024-26719] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52881] = "cpe-stable-backport: Backported in 6.6.7" -CVE_STATUS[CVE-2024-26720] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52882] = "cpe-stable-backport: Backported in 6.6.31" -CVE_STATUS[CVE-2024-26721] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52883] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2024-26722] = "fixed-version: only affects 6.7rc5 onwards" +CVE_STATUS[CVE-2023-52884] = "cpe-stable-backport: Backported in 6.6.33" -CVE_STATUS[CVE-2024-26723] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52885] = "fixed-version: Fixed from version 6.5" -CVE_STATUS[CVE-2024-26724] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52886] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2024-26725] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52887] = "cpe-stable-backport: Backported in 6.6.37" -CVE_STATUS[CVE-2024-26726] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52888] = "cpe-stable-backport: Backported in 6.6.39" -CVE_STATUS[CVE-2024-26727] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2023-52889] = "cpe-stable-backport: Backported in 6.6.44" -CVE_STATUS[CVE-2024-26728] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52893] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26729] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52894] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26730] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52895] = "fixed-version: Fixed from version 6.1.8" -CVE_STATUS[CVE-2024-26731] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52896] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26732] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52897] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26733] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52898] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26734] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52899] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26735] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52900] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26736] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52901] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26737] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52902] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26738] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52903] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26739] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52904] = "fixed-version: Fixed from version 5.15.168" -CVE_STATUS[CVE-2024-26740] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52905] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26741] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52906] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26742] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52907] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26743] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52908] = "fixed-version: Fixed from version 6.1.7" -CVE_STATUS[CVE-2024-26744] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52909] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26745] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-52910] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26746] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-52911] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26747] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52912] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26748] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52913] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26749] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52914] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26750] = "fixed-version: only affects 6.8rc5 onwards" +CVE_STATUS[CVE-2023-52915] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2024-26751] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52916] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2024-26752] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52918] = "cpe-stable-backport: Backported in 6.6.48" -CVE_STATUS[CVE-2024-26753] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52919] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2024-26754] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52920] = "cpe-stable-backport: Backported in 6.6.70" -CVE_STATUS[CVE-2024-26755] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52921] = "fixed-version: Fixed from version 6.5" -# CVE-2024-26756 needs backporting (fixed from 6.8rc6) +CVE_STATUS[CVE-2023-52922] = "fixed-version: Fixed from version 6.5" -# CVE-2024-26757 needs backporting (fixed from 6.8rc6) +CVE_STATUS[CVE-2023-52923] = "fixed-version: Fixed from version 6.5" -# CVE-2024-26758 needs backporting (fixed from 6.8rc6) +CVE_STATUS[CVE-2023-52924] = "fixed-version: Fixed from version 6.5" -CVE_STATUS[CVE-2024-26759] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52925] = "fixed-version: Fixed from version 6.4.12" -CVE_STATUS[CVE-2024-26760] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52926] = "cpe-stable-backport: Backported in 6.6.68" -CVE_STATUS[CVE-2024-26761] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52927] = "fixed-version: Fixed from version 6.6" -CVE_STATUS[CVE-2024-26762] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2023-52928] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26763] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52929] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26764] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52930] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26765] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52931] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26766] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52932] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26767] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52933] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26768] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52934] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26769] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52935] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26770] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52936] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26771] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52937] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26772] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52938] = "fixed-version: Fixed from version 6.1.11" -CVE_STATUS[CVE-2024-26773] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52939] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26774] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52940] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26775] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52941] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26776] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52942] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26777] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52973] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26778] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52974] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26779] = "cpe-stable-backport: Backported in 6.6.19" +CVE_STATUS[CVE-2023-52975] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26780] = "fixed-version: only affects 6.8rc4 onwards" +CVE_STATUS[CVE-2023-52976] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26781] = "fixed-version: only affects 6.8rc6 onwards" +CVE_STATUS[CVE-2023-52977] = "fixed-version: Fixed from version 6.1.11" -CVE_STATUS[CVE-2024-26782] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-52978] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26783] = "cpe-stable-backport: Backported in 6.6.22" +CVE_STATUS[CVE-2023-52980] = "fixed-version: Fixed from version 6.2" -# CVE-2024-26784 needs backporting (fixed from 6.8rc7) +CVE_STATUS[CVE-2023-52981] = "fixed-version: Fixed from version 6.2" -# CVE-2024-26785 needs backporting (fixed from 6.8rc7) +CVE_STATUS[CVE-2023-52982] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26786] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-52983] = "fixed-version: Fixed from version 6.1.11" -CVE_STATUS[CVE-2024-26787] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-52984] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26788] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-52985] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26789] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-52986] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26790] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-52987] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26791] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-52988] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26792] = "fixed-version: only affects 6.8rc4 onwards" +CVE_STATUS[CVE-2023-52989] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26793] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-52991] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26794] = "fixed-version: only affects 6.8rc6 onwards" +CVE_STATUS[CVE-2023-52992] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26795] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-52993] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26796] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-52994] = "fixed-version: Fixed from version 6.1.9" -# CVE-2024-26797 needs backporting (fixed from 6.8rc7) +CVE_STATUS[CVE-2023-52995] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26798] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-52996] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26799] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-52997] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26800] = "fixed-version: only affects 6.8rc5 onwards" +CVE_STATUS[CVE-2023-52998] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26801] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-52999] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26802] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-53000] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26803] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-53002] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26804] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-53003] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26805] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-53004] = "fixed-version: Fixed from version 6.2" -# CVE-2024-26806 needs backporting (fixed from 6.8rc7) +CVE_STATUS[CVE-2023-53005] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26807] = "cpe-stable-backport: Backported in 6.6.21" +CVE_STATUS[CVE-2023-53006] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26808] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2023-53007] = "fixed-version: Fixed from version 6.2" -CVE_STATUS[CVE-2024-26809] = "cpe-stable-backport: Backported in 6.6.23" +CVE_STATUS[CVE-2023-53008] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53009] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53010] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53011] = "fixed-version: Fixed from version 6.2" + +# CVE-2023-53012 has no known resolution + +CVE_STATUS[CVE-2023-53013] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53014] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53015] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53016] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53017] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53018] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53019] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53020] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53021] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53022] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53023] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53024] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53026] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53028] = "fixed-version: Fixed from version 6.1.8" + +CVE_STATUS[CVE-2023-53029] = "fixed-version: Fixed from version 6.1.8" + +CVE_STATUS[CVE-2023-53030] = "fixed-version: Fixed from version 6.1.8" + +CVE_STATUS[CVE-2023-53031] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53032] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53033] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53034] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2023-53035] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53036] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53037] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53038] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53039] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53040] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53041] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53042] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53043] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53044] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53045] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53046] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53047] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53048] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53049] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53050] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53051] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53052] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53053] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53054] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53055] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53056] = "fixed-version: Fixed from version 6.2.9" + +CVE_STATUS[CVE-2023-53057] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53058] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53059] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53060] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53061] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53062] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53064] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53065] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53066] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53067] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53068] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53069] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53070] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53071] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53072] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53073] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53074] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53075] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53077] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53078] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53079] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53080] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53081] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53082] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53083] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53084] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53085] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53086] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53087] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53088] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53089] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53090] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53091] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53092] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53093] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53094] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53095] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53096] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53097] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53098] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53099] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53100] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53101] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53102] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53103] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53105] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53106] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53107] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53108] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53109] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53110] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53111] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53112] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53113] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53114] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53115] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53116] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53117] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53118] = "fixed-version: Fixed from version 6.2.8" + +CVE_STATUS[CVE-2023-53119] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53120] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53121] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53123] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53124] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53125] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53126] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53127] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53128] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53131] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53132] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53133] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53134] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53135] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53136] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53138] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53139] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53140] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53141] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53142] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53143] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53144] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53145] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53146] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53147] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53148] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53149] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53150] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53151] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53152] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53153] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53163] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53164] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53165] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53166] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53167] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53168] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53169] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53170] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53171] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53172] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53173] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53174] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53175] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53176] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53177] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53178] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53179] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53180] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53181] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53182] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53184] = "fixed-version: Fixed from version 6.4.8" + +CVE_STATUS[CVE-2023-53185] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53186] = "fixed-version: Fixed from version 6.3" + +# CVE-2023-53187 has no known resolution + +CVE_STATUS[CVE-2023-53188] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53189] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53190] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53191] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53192] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53193] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53194] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53195] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53196] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53197] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53198] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53199] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53200] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53201] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53202] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53203] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53204] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53205] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53206] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53207] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53208] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53209] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53210] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53211] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53213] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53214] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53215] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53216] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53217] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53218] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53219] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53220] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53221] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53222] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53223] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53224] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53225] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53226] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53228] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53229] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53230] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53231] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53232] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53233] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53234] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53235] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53236] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53237] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53238] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53239] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53240] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53241] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53242] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53243] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53244] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53245] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53246] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53247] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53248] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53249] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53250] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53251] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53252] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53253] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53254] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53255] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53256] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53257] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53258] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53259] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53260] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53261] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53262] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53263] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53264] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53265] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53266] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53267] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53268] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53269] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53270] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53271] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53272] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53273] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53274] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53275] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53276] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53277] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53278] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53279] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53280] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53281] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53282] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53284] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53285] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53286] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53287] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53288] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53289] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53290] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53291] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53292] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53294] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53295] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53296] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53297] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53298] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53299] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53300] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53301] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53302] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53303] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53304] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53305] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53306] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53307] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53308] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53309] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53310] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53311] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53312] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53313] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53314] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53315] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53316] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53317] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53318] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53319] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53320] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53321] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53322] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53323] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53324] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53325] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53326] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53327] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53328] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53329] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53330] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53331] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53332] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53333] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53334] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53335] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53336] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53337] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53338] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53339] = "fixed-version: Fixed from version 6.4.12" + +CVE_STATUS[CVE-2023-53340] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53341] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53342] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53343] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53344] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53345] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53346] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53347] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53348] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53349] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53350] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53351] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53352] = "fixed-version: Fixed from version 6.4.10" + +CVE_STATUS[CVE-2023-53353] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53354] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53355] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53356] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53357] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53358] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53359] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53360] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53361] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53362] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53363] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53364] = "fixed-version: Fixed from version 6.4.12" + +CVE_STATUS[CVE-2023-53365] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53366] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53367] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53368] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53369] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53370] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53371] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53372] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53373] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53374] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53375] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53376] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53377] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53378] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53379] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53380] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53381] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53382] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53383] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53384] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53385] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53386] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53387] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53388] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53389] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53390] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53391] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53392] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53393] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53394] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53395] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53396] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53397] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53398] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53399] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53400] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53401] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53402] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53403] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53404] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53405] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53406] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53407] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53408] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53409] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53410] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53411] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53412] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53413] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53414] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53415] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53416] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53417] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53418] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53419] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53420] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53421] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53422] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53423] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53424] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53425] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53426] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53427] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53428] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53429] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53430] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53431] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53432] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53433] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53434] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53435] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53436] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53437] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53438] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53439] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53440] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53441] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53442] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53443] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53444] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53445] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53446] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53447] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53448] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53449] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53450] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53451] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53452] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53453] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53454] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53455] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53456] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53457] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53458] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53459] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53460] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53461] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53462] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53463] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53464] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53465] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53466] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53467] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53468] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53470] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53471] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53472] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53473] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53474] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53475] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53476] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53477] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53478] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53479] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53480] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53481] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53482] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53483] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53484] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53485] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53486] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53487] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53488] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53489] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53490] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53491] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53492] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53493] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53494] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53495] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53496] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53497] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53498] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53499] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53500] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53501] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53503] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53504] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53505] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53506] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53507] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53508] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53509] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53510] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53511] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53512] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53513] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53514] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53515] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53516] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53517] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53518] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53519] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53520] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53521] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53522] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53523] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53524] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53525] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53526] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53527] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53528] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53529] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53530] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53531] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53532] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53533] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53534] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53535] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53536] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53537] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53538] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53539] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53540] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53541] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53542] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53543] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53544] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53545] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53546] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53547] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53548] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53549] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53550] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53551] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53552] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53553] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53554] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53555] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53556] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53557] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53558] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53559] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53560] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53561] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53562] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53563] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53564] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53565] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53566] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53567] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53568] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53569] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53570] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53571] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53572] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53573] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53574] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53575] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53576] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53577] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53578] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53579] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53580] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53581] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53582] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53583] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53584] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53585] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53586] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53587] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53588] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53589] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53590] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53591] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53592] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53593] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53594] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53595] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53596] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53597] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53598] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53599] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53600] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53601] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53602] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53603] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53604] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53605] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53606] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53607] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53608] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53609] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53610] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53611] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53612] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53613] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53614] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53615] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53616] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53617] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53618] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53619] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53620] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53621] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53622] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53623] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53624] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53625] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-53626] = "fixed-version: Fixed from version 6.2.8" + +CVE_STATUS[CVE-2023-53627] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53628] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53629] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53630] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53631] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53632] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53633] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53634] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53635] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53636] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53637] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53638] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53639] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53640] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53641] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53642] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53643] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53644] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53645] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53646] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53647] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53648] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53649] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53650] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53651] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53652] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53653] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53654] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53655] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53656] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53657] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53658] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53659] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53660] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53661] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53662] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53663] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53664] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53665] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53666] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53667] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53668] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53669] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53670] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53671] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53672] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53673] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53674] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53675] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53676] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53677] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53678] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53679] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53680] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53681] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53682] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53683] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53684] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53685] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53686] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53687] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53692] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53693] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53694] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53695] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53696] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53697] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53698] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53699] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53700] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53702] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53703] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53704] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53705] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53706] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53707] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53708] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53709] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53710] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53711] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53712] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53713] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53714] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53715] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53716] = "fixed-version: Fixed from version 6.3.5" + +CVE_STATUS[CVE-2023-53717] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53718] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53719] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53720] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53721] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53722] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53723] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53724] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53725] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53726] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53727] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53728] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53729] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53730] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53731] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53732] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53733] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53742] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53743] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53744] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53745] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53746] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53747] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53748] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53750] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53751] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53752] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53753] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53754] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53755] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53756] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53757] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53758] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53759] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53760] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53761] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53762] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53763] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53764] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53765] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53766] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53767] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53768] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53769] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53777] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53778] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53780] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53781] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53782] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53783] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53784] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53785] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53786] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53787] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53788] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53789] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53790] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53791] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53792] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53793] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53794] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53795] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53796] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53797] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53798] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53799] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53800] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53801] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53802] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53803] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53804] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53806] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53807] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53808] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53809] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53810] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53811] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53812] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53813] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53814] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53815] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53816] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53817] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53818] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53819] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53820] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53821] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53822] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53823] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53824] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53825] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53826] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53827] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53828] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53829] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53830] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53831] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53832] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53833] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53834] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53836] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53837] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53838] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53839] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53840] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53841] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53842] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53843] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53844] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53845] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53846] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53847] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53848] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53849] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53850] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53851] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53852] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53853] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53854] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53855] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53856] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53857] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53858] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53859] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53860] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53861] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53862] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53863] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53864] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53865] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53866] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53867] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53986] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53987] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53988] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53989] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53990] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-53991] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53992] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53993] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-53994] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53995] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53996] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-53997] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53998] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-53999] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54000] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54001] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54002] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54003] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54004] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54005] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54006] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54007] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54008] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54009] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54010] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54011] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54012] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54013] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54014] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54015] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54016] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54017] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54018] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54019] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54020] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54021] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54022] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54023] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54024] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54025] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54026] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54027] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54028] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54030] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54031] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54032] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54033] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54034] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54035] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54036] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54037] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54038] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54039] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54040] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54041] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54042] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54043] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54044] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54045] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54046] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54047] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54048] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54049] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54050] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54051] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54052] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54053] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54055] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54056] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54057] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54058] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54059] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54060] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54062] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54063] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54064] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54065] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54066] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54067] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54068] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54069] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54070] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54071] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54072] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54073] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54074] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54075] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54076] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54077] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54078] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54079] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54080] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54081] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54083] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54084] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54085] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54086] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54087] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54088] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54089] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54090] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54091] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54092] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54093] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54094] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54095] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54096] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54097] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54098] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-54099] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54100] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54101] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54102] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54104] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54105] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54106] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54107] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54108] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54109] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54110] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-54111] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54112] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54113] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54114] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54115] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54116] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54117] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54118] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54119] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54120] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54121] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54122] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54123] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54124] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54125] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54126] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54127] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54128] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54129] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54130] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-54131] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54132] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54133] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54134] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54135] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54136] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54137] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54138] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54139] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54140] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54141] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54142] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54143] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54144] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-54145] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54146] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-54147] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54148] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54149] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54150] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54151] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54152] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54153] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54154] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54155] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54156] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54157] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54158] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54159] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54160] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54162] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54164] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54165] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54166] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54167] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54168] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54169] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54170] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54171] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54172] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54173] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54174] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54175] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54176] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54177] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54178] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54179] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54180] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-54181] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54182] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54183] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54184] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54185] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54186] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54187] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54188] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54189] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54190] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54191] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54192] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54193] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54194] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54195] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54196] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54197] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54198] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54199] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54200] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54201] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54202] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54203] = "fixed-version: Fixed from version 6.2.11" + +CVE_STATUS[CVE-2023-54204] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54205] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54206] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54207] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54208] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54209] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54210] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54211] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54213] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54214] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54215] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54216] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54217] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54218] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54219] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54220] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54221] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54222] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54223] = "fixed-version: Fixed from version 6.4.10" + +CVE_STATUS[CVE-2023-54224] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54225] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54226] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54227] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54228] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54229] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54230] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54231] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54232] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54233] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54234] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54235] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54236] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54237] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54238] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54239] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54240] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54241] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54242] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54243] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54244] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54245] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54246] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54247] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54248] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54249] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54250] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54251] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54252] = "fixed-version: Fixed from version 6.2.11" + +CVE_STATUS[CVE-2023-54253] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54254] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54255] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54257] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54258] = "fixed-version: Fixed from version 6.4.12" + +CVE_STATUS[CVE-2023-54259] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54260] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54261] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54262] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54263] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54264] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54265] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54266] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54267] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54268] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54269] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54270] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54271] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54272] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54273] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54274] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54275] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54276] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54277] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54278] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54279] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54280] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54281] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54282] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54283] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54284] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54285] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54286] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54287] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54288] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54289] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54291] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54292] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54293] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54294] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54295] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54296] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54297] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54298] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54299] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54300] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54301] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54302] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54303] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54304] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54305] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54306] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54307] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54308] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54309] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54310] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54311] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54312] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54313] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54314] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54315] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54316] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54317] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54318] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54319] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54320] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-54321] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54322] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-54323] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54324] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-54325] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-54326] = "fixed-version: Fixed from version 6.5" + +CVE_STATUS[CVE-2023-7324] = "fixed-version: Fixed from version 6.3" + +# CVE-2024-14027 may need backporting (fixed from 6.6.131) + +CVE_STATUS[CVE-2024-26581] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26582] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26583] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26584] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26585] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26586] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2024-26587] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2024-26588] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2024-26589] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2024-26590] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2024-26591] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2024-26592] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2024-26593] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26594] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2024-26595] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2024-26596] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-26597] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2024-26598] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2024-26599] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2024-26600] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26601] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26602] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26603] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26604] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26605] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26606] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26607] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26608] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26610] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26611] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26612] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26614] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26615] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26616] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26617] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26618] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26619] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26620] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26621] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-26622] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26623] = "cpe-stable-backport: Backported in 6.6.16" + +CVE_STATUS[CVE-2024-26625] = "cpe-stable-backport: Backported in 6.6.16" + +CVE_STATUS[CVE-2024-26626] = "cpe-stable-backport: Backported in 6.6.16" + +CVE_STATUS[CVE-2024-26627] = "cpe-stable-backport: Backported in 6.6.16" + +CVE_STATUS[CVE-2024-26629] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26630] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26631] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2024-26632] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2024-26633] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2024-26634] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26635] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26636] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26637] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26638] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26640] = "cpe-stable-backport: Backported in 6.6.16" + +CVE_STATUS[CVE-2024-26641] = "cpe-stable-backport: Backported in 6.6.16" + +CVE_STATUS[CVE-2024-26642] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26643] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26644] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26645] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26646] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26647] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26648] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26649] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26651] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26652] = "cpe-stable-backport: Backported in 6.6.22" + +CVE_STATUS[CVE-2024-26653] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26654] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26655] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26656] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26657] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26658] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26659] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26660] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26661] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26662] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26663] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26664] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26665] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26666] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26667] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26668] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26669] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26670] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26671] = "cpe-stable-backport: Backported in 6.6.16" + +# CVE-2024-26672 needs backporting (fixed from 6.8) + +CVE_STATUS[CVE-2024-26673] = "cpe-stable-backport: Backported in 6.6.16" + +CVE_STATUS[CVE-2024-26674] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26675] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26676] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26677] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26678] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26679] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26680] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26681] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26682] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26683] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26684] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-26685] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26686] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-26687] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26688] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26689] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26690] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26691] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26692] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26693] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26694] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26695] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26696] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26697] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26698] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26699] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26700] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26702] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26703] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26704] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26705] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26706] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26707] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26708] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26709] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26710] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26711] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26712] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26714] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26715] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26716] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26717] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26718] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26719] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26721] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26722] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26723] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26724] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26725] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26726] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26727] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26728] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26729] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26730] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26731] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26732] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26733] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26734] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26735] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26736] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26737] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26738] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26739] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26740] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26741] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26742] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26743] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26744] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26745] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26746] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26747] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26748] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26749] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26750] = "fixed-version: Fixed from version 5.15.151" + +CVE_STATUS[CVE-2024-26751] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26752] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26753] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26754] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26755] = "fixed-version: only affects 6.7 onwards" + +# CVE-2024-26756 needs backporting (fixed from 6.8) + +# CVE-2024-26757 needs backporting (fixed from 6.8) + +# CVE-2024-26758 needs backporting (fixed from 6.8) + +CVE_STATUS[CVE-2024-26759] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26760] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26761] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26762] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26763] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26764] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26765] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26766] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26767] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26768] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26769] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26770] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26771] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26772] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26773] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26774] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26775] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26776] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26777] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26778] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26779] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26780] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26781] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26782] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26783] = "cpe-stable-backport: Backported in 6.6.22" + +CVE_STATUS[CVE-2024-26784] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26785] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-26786] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26787] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26788] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26789] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26790] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26791] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26792] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26793] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26795] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26796] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26797] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26798] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26799] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26800] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26801] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26802] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26803] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26804] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26805] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26806] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26807] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26808] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-26809] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26810] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26811] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-26812] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26813] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26814] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26815] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26816] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26817] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-26818] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26820] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26822] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26823] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26824] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26825] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26826] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26828] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26829] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26830] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26831] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26832] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26833] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26834] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26835] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26836] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-26837] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26838] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26839] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26840] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26841] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26842] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26843] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26844] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26845] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26846] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-26847] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26849] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26850] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-26851] = "cpe-stable-backport: Backported in 6.6.22" + +CVE_STATUS[CVE-2024-26852] = "cpe-stable-backport: Backported in 6.6.22" + +CVE_STATUS[CVE-2024-26853] = "cpe-stable-backport: Backported in 6.6.22" + +CVE_STATUS[CVE-2024-26854] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26855] = "cpe-stable-backport: Backported in 6.6.22" + +CVE_STATUS[CVE-2024-26856] = "cpe-stable-backport: Backported in 6.6.22" + +CVE_STATUS[CVE-2024-26857] = "cpe-stable-backport: Backported in 6.6.22" + +CVE_STATUS[CVE-2024-26858] = "cpe-stable-backport: Backported in 6.6.22" + +CVE_STATUS[CVE-2024-26859] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26860] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26861] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26862] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26863] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26864] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26865] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26866] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26867] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26868] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26869] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26870] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26871] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26872] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26873] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26874] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26875] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26876] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-26877] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26878] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26879] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26880] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26881] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26882] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26883] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26884] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26885] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26886] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26887] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26888] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26889] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26890] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26891] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26892] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26893] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26894] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26895] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26896] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26897] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26898] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26899] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26900] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-26901] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26902] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26903] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26906] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26907] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26909] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26910] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26911] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26912] = "fixed-version: only affects 6.7 onwards" + +# CVE-2024-26913 needs backporting (fixed from 6.8) + +# CVE-2024-26914 needs backporting (fixed from 6.8) + +CVE_STATUS[CVE-2024-26915] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26916] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26917] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26918] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26919] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26920] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2024-26921] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-26922] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26923] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-26924] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26925] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-26926] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26927] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-26928] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-26930] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26931] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26932] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-26933] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26934] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26935] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26936] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26937] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26938] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26939] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26940] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26941] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-26942] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-26943] = "cpe-stable-backport: Backported in 6.6.24" + +# CVE-2024-26944 needs backporting (fixed from 6.9) + +CVE_STATUS[CVE-2024-26945] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-26946] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26947] = "cpe-stable-backport: Backported in 6.6.24" + +# CVE-2024-26948 needs backporting (fixed from 6.9) + +CVE_STATUS[CVE-2024-26949] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26950] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26951] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26952] = "cpe-stable-backport: Backported in 6.6.32" + +CVE_STATUS[CVE-2024-26953] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26954] = "cpe-stable-backport: Backported in 6.6.32" + +CVE_STATUS[CVE-2024-26955] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26956] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26957] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26958] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26959] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26960] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26961] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26962] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-26963] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26964] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26965] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26966] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26967] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-26968] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26969] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26970] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26971] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26973] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26974] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26975] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26976] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26977] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26978] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-26980] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26981] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26982] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-26983] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26984] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26985] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-26986] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26987] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26988] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26989] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26990] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26991] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-26992] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26993] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26994] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26995] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-26996] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26997] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26998] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-26999] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-27000] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-27001] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-27002] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-27003] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-27004] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-27005] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-27006] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-27007] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-27008] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-27009] = "cpe-stable-backport: Backported in 6.6.29" + +# CVE-2024-27010 needs backporting (fixed from 6.9) + +CVE_STATUS[CVE-2024-27011] = "cpe-stable-backport: Backported in 6.6.55" + +# CVE-2024-27012 needs backporting (fixed from 6.9) + +CVE_STATUS[CVE-2024-27013] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-27014] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-27015] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-27016] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-27017] = "cpe-stable-backport: Backported in 6.6.53" + +CVE_STATUS[CVE-2024-27018] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-27019] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-27020] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-27021] = "fixed-version: only affects 6.8 onwards" + +# CVE-2024-27022 needs backporting (fixed from 6.9) + +CVE_STATUS[CVE-2024-27023] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-27024] = "cpe-stable-backport: Backported in 6.6.22" + +CVE_STATUS[CVE-2024-27025] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27026] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27027] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-27028] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27029] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-27030] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27031] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27032] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27033] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27034] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27035] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27036] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27037] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27038] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27039] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27040] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27041] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27043] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27044] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27045] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27046] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27047] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27048] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27049] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-27050] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27051] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27052] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27053] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27054] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27056] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2024-27057] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27058] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-27059] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-27060] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-27061] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-27062] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-27063] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-27064] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27065] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27066] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27067] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27068] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27069] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-27070] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-27071] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-27072] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-27073] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27074] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27075] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27076] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27077] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27078] = "cpe-stable-backport: Backported in 6.6.23" + +# CVE-2024-27079 needs backporting (fixed from 6.9) + +CVE_STATUS[CVE-2024-27080] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-27388] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27389] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27390] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27391] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27392] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-27393] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-27394] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-27395] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-27396] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-27397] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2024-27398] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-27399] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-27400] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-27401] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-27402] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-27403] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-27404] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-27405] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-27406] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-27407] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-27408] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-27409] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-27410] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-27411] = "fixed-version: only affects 6.7.6 onwards" + +CVE_STATUS[CVE-2024-27412] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-27413] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-27414] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-27415] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-27416] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-27417] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-27418] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-27419] = "cpe-stable-backport: Backported in 6.6.22" + +CVE_STATUS[CVE-2024-27431] = "cpe-stable-backport: Backported in 6.6.22" + +CVE_STATUS[CVE-2024-27432] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27433] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27434] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27435] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27436] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-27437] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-31076] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-32936] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-33619] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-33621] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-33847] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-34027] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-34030] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-34777] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-35247] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-35784] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35785] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35786] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35787] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35789] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35790] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35791] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35792] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35793] = "fixed-version: only affects 6.7 onwards" + +# CVE-2024-35794 needs backporting (fixed from 6.9) + +CVE_STATUS[CVE-2024-35795] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35796] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35797] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35798] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35799] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35800] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35801] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35803] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35804] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35805] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35806] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35807] = "cpe-stable-backport: Backported in 6.6.24" + +# CVE-2024-35808 needs backporting (fixed from 6.9) + +CVE_STATUS[CVE-2024-35809] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35810] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35811] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35813] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35814] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35815] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35816] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35817] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35818] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35819] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35821] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35822] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35823] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35824] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35825] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35826] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2024-35827] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-35828] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-35829] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-35830] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-35831] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-35832] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-35833] = "cpe-stable-backport: Backported in 6.6.17" + +CVE_STATUS[CVE-2024-35834] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-35835] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-35836] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-35837] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-35838] = "cpe-stable-backport: Backported in 6.6.15" + +CVE_STATUS[CVE-2024-35839] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2024-35840] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2024-35841] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2024-35842] = "cpe-stable-backport: Backported in 6.6.14" + +# CVE-2024-35843 needs backporting (fixed from 6.9) + +CVE_STATUS[CVE-2024-35844] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-35845] = "cpe-stable-backport: Backported in 6.6.23" + +CVE_STATUS[CVE-2024-35846] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-35847] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35848] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-35849] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35850] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35851] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35852] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35853] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35854] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35855] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35856] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35857] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35858] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35859] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-35860] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35861] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35862] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35863] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35864] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35865] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35866] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35867] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35868] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35869] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-35870] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-35871] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35872] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35873] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-35874] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-35875] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35877] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35878] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35879] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35880] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35882] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35883] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35884] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35885] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35886] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35887] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35888] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35889] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-35890] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35891] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35892] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35893] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35894] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-35895] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35896] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35897] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35898] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35899] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35900] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35901] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35902] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35903] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35904] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35905] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35907] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35908] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35909] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35910] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35911] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35912] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35913] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-35914] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-35915] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35916] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35917] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-35919] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35920] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35921] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35922] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35924] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35925] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35926] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-35927] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35929] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35930] = "cpe-stable-backport: Backported in 6.6.27" + +# CVE-2024-35931 needs backporting (fixed from 6.9) + +CVE_STATUS[CVE-2024-35932] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35933] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35934] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35935] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35936] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35937] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35938] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35939] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35940] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35942] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35943] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35944] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35945] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35946] = "cpe-stable-backport: Backported in 6.6.27" + +CVE_STATUS[CVE-2024-35947] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-35948] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-35949] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2024-35950] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35951] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35952] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35953] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35954] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35955] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35956] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35957] = "fixed-version: only affects 6.8.2 onwards" + +CVE_STATUS[CVE-2024-35958] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35959] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35960] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35961] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35962] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35963] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-35964] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-35965] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-35966] = "cpe-stable-backport: Backported in 6.6.47" + +CVE_STATUS[CVE-2024-35967] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35968] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-35969] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35970] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35971] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35972] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35973] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35974] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35975] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35976] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35977] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35978] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35979] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35980] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-35981] = "cpe-stable-backport: Backported in 6.6.29" + +CVE_STATUS[CVE-2024-35982] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-35983] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35984] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35985] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35986] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35987] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35988] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35989] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35990] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35991] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35992] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35993] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35994] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-35995] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35996] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35997] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35998] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-35999] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-36000] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-36001] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-36002] = "fixed-version: only affects 6.8.2 onwards" + +CVE_STATUS[CVE-2024-36003] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-36004] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-36005] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-36006] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-36007] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-36008] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-36009] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-36010] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-36011] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36012] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36013] = "cpe-stable-backport: Backported in 6.6.32" + +CVE_STATUS[CVE-2024-36014] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-36015] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-36016] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-36017] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36018] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-36019] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-36020] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-36021] = "cpe-stable-backport: Backported in 6.6.26" + +CVE_STATUS[CVE-2024-36023] = "cpe-stable-backport: Backported in 6.6.27" + +# CVE-2024-36024 needs backporting (fixed from 6.9) + +CVE_STATUS[CVE-2024-36025] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-36026] = "cpe-stable-backport: Backported in 6.6.28" + +CVE_STATUS[CVE-2024-36027] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-36028] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36029] = "cpe-stable-backport: Backported in 6.6.30" + +CVE_STATUS[CVE-2024-36030] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-36031] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36032] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36033] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-36244] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-36270] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-36281] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-36286] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-36288] = "fixed-version: only affects 6.9.3 onwards" + +CVE_STATUS[CVE-2024-36476] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-36477] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-36478] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-36479] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-36481] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-36484] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-36489] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-36880] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36881] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36882] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36883] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36884] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-36886] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36887] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36888] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36889] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36890] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36891] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36892] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-36893] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36894] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36895] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36896] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36897] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36898] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36899] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36900] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36901] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36902] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36903] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36904] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36905] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36906] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36908] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36909] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36910] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36911] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36912] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36913] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36914] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36915] = "cpe-stable-backport: Backported in 6.6.47" + +CVE_STATUS[CVE-2024-36916] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36917] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36918] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36919] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36920] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36921] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36922] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36924] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36925] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36926] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36927] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36928] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36929] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36930] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36931] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36932] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-36933] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36934] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36935] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-36936] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-36937] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36938] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36939] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36940] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36941] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36943] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-36944] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36945] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36946] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36947] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36948] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-36949] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36950] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36951] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36952] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36953] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36954] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36955] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36956] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-36957] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36958] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-36959] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36960] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36961] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-36962] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36963] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36964] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-36965] = "cpe-stable-backport: Backported in 6.6.32" + +CVE_STATUS[CVE-2024-36966] = "cpe-stable-backport: Backported in 6.6.32" + +CVE_STATUS[CVE-2024-36967] = "cpe-stable-backport: Backported in 6.6.32" + +CVE_STATUS[CVE-2024-36968] = "cpe-stable-backport: Backported in 6.6.32" + +CVE_STATUS[CVE-2024-36969] = "cpe-stable-backport: Backported in 6.6.32" + +CVE_STATUS[CVE-2024-36970] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-36971] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-36972] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-36973] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-36974] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-36975] = "cpe-stable-backport: Backported in 6.6.32" + +CVE_STATUS[CVE-2024-36976] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-36977] = "cpe-stable-backport: Backported in 6.6.32" + +CVE_STATUS[CVE-2024-36978] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-36979] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-37021] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-37026] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-37078] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-37354] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-37356] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38306] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-38381] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38384] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38385] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-38388] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38390] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38538] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38539] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38540] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38541] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38542] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-38543] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38544] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38545] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38546] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38547] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38548] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38549] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38550] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38551] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38552] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38553] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38554] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38555] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38556] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38557] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38558] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38559] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38560] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38561] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38562] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38563] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-38564] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38565] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38566] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38567] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38568] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38569] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38570] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38571] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38572] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38573] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38574] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-38575] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38576] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38577] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38578] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38579] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38580] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38581] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38582] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38583] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38584] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38585] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38586] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38587] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38588] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38589] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38590] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38591] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38592] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-38593] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38594] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-38595] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-38596] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38597] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38598] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38599] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38600] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38601] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38602] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38603] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38604] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38605] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38606] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-38607] = "cpe-stable-backport: Backported in 6.6.33" + +# CVE-2024-38608 needs backporting (fixed from 6.10) + +CVE_STATUS[CVE-2024-38609] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-38610] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38611] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38612] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38613] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38614] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38615] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38616] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38617] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38618] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38619] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-38620] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38621] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38622] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38623] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38624] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38625] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38626] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-38627] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38628] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38629] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38630] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38631] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-38632] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38633] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38634] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38635] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38636] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38637] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38659] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38661] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-38662] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38663] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38664] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38667] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-38780] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-39276] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39277] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-39282] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-39291] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-39292] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-39293] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-39296] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39298] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-39301] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39371] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-39461] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39462] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39463] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39464] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39465] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-39466] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39467] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39468] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39469] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-39470] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39471] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39472] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-39473] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39474] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39475] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39476] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39477] = "fixed-version: only affects 6.9 onwards" + +# CVE-2024-39478 needs backporting (fixed from 6.10) + +CVE_STATUS[CVE-2024-39479] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39480] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39481] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39482] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39483] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39484] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39485] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39486] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-39487] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-39488] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-39489] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-39490] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-39491] = "cpe-stable-backport: Backported in 6.6.33" + +CVE_STATUS[CVE-2024-39492] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-39493] = "cpe-stable-backport: Backported in 6.6.34" + +CVE_STATUS[CVE-2024-39494] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-39495] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-39496] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-39497] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-39498] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-39499] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-39500] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-39502] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-39503] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-39504] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-39505] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-39506] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-39507] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-39508] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-39509] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-39510] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-40899] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-40900] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40901] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40902] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40903] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40904] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40905] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40906] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40907] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-40908] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40909] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40910] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40911] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40912] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40913] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40914] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40915] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40916] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40917] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-40918] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40919] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40920] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40921] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40922] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40923] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40924] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40925] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40926] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-40927] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40928] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40929] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40930] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-40931] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40932] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40933] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-40934] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40935] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40936] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40937] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40938] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40939] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40940] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40941] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40942] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40943] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40944] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40945] = "cpe-stable-backport: Backported in 6.6.35" + +CVE_STATUS[CVE-2024-40947] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-40948] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40949] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-40950] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-40951] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40952] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40953] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40954] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40955] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40956] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40957] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40958] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40959] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40960] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40961] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40962] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40963] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40964] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40965] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-40966] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40967] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40968] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40969] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40970] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40971] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40972] = "cpe-stable-backport: Backported in 6.6.47" + +CVE_STATUS[CVE-2024-40973] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40974] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40975] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-40976] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40977] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40978] = "cpe-stable-backport: Backported in 6.6.36" + +# CVE-2024-40979 needs backporting (fixed from 6.10) + +CVE_STATUS[CVE-2024-40980] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40981] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40983] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40984] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40985] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-40986] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-40987] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40988] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40989] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40990] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40991] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-40992] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40993] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40994] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40995] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40996] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40997] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-40998] = "cpe-stable-backport: Backported in 6.6.36" + +# CVE-2024-40999 needs backporting (fixed from 6.10) + +CVE_STATUS[CVE-2024-41000] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-41001] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-41002] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-41003] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-41004] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-41005] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-41006] = "cpe-stable-backport: Backported in 6.6.36" + +CVE_STATUS[CVE-2024-41007] = "cpe-stable-backport: Backported in 6.6.41" + +# CVE-2024-41008 needs backporting (fixed from 6.9) + +CVE_STATUS[CVE-2024-41009] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-41010] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41011] = "cpe-stable-backport: Backported in 6.6.31" + +CVE_STATUS[CVE-2024-41012] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41013] = "cpe-stable-backport: Backported in 6.6.68" + +CVE_STATUS[CVE-2024-41014] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-41015] = "cpe-stable-backport: Backported in 6.6.43" + +CVE_STATUS[CVE-2024-41016] = "cpe-stable-backport: Backported in 6.6.53" + +CVE_STATUS[CVE-2024-41017] = "cpe-stable-backport: Backported in 6.6.43" + +CVE_STATUS[CVE-2024-41018] = "cpe-stable-backport: Backported in 6.6.43" + +CVE_STATUS[CVE-2024-41019] = "cpe-stable-backport: Backported in 6.6.43" + +CVE_STATUS[CVE-2024-41020] = "cpe-stable-backport: Backported in 6.6.43" + +CVE_STATUS[CVE-2024-41021] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-41022] = "cpe-stable-backport: Backported in 6.6.43" + +# CVE-2024-41023 needs backporting (fixed from 6.10) + +CVE_STATUS[CVE-2024-41025] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41026] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-41027] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41028] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41029] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-41030] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41031] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41032] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41033] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-41034] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41035] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41036] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41037] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41038] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41039] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41040] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41041] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41042] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-41043] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-41044] = "cpe-stable-backport: Backported in 6.6.41" + +# CVE-2024-41045 needs backporting (fixed from 6.10) + +CVE_STATUS[CVE-2024-41046] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41047] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41048] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41049] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41050] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41051] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41052] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41053] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41054] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41055] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41056] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-41057] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41058] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41059] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41060] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41061] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-41062] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41063] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41064] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41065] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41066] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41067] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-41068] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41069] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41070] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41072] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41073] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41074] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41075] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41076] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41077] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41078] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41079] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-41080] = "cpe-stable-backport: Backported in 6.6.62" + +CVE_STATUS[CVE-2024-41081] = "cpe-stable-backport: Backported in 6.6.42" + +# CVE-2024-41082 needs backporting (fixed from 6.10) + +CVE_STATUS[CVE-2024-41083] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-41084] = "cpe-stable-backport: Backported in 6.6.37" + +# CVE-2024-41085 needs backporting (fixed from 6.10) + +CVE_STATUS[CVE-2024-41086] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-41087] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-41088] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-41089] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-41090] = "cpe-stable-backport: Backported in 6.6.43" + +CVE_STATUS[CVE-2024-41091] = "cpe-stable-backport: Backported in 6.6.43" + +CVE_STATUS[CVE-2024-41092] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-41093] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-41094] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-41095] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-41096] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-41097] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-41098] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-41149] = "fixed-version: only affects 6.12.6 onwards" + +# CVE-2024-41932 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2024-41935] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-42063] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42064] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-42065] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-42066] = "fixed-version: only affects 6.8 onwards" + +# CVE-2024-42067 needs backporting (fixed from 6.10) + +# CVE-2024-42068 needs backporting (fixed from 6.10) + +CVE_STATUS[CVE-2024-42069] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42070] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42071] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-42072] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-42073] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42074] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42075] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-42076] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42077] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42078] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-42079] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42080] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42081] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-42082] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42083] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-42084] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42085] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42086] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42087] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42088] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-42089] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42090] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42091] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-42092] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42093] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42094] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42095] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42096] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42097] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42098] = "cpe-stable-backport: Backported in 6.6.37" + +CVE_STATUS[CVE-2024-42099] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-42100] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42101] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42102] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42103] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42104] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42105] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42106] = "cpe-stable-backport: Backported in 6.6.39" + +# CVE-2024-42107 needs backporting (fixed from 6.10) + +CVE_STATUS[CVE-2024-42108] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-42109] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42110] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42111] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-42112] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-42113] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42114] = "cpe-stable-backport: Backported in 6.6.47" + +CVE_STATUS[CVE-2024-42115] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42117] = "fixed-version: only affects 6.7 onwards" + +# CVE-2024-42118 needs backporting (fixed from 6.10) + +CVE_STATUS[CVE-2024-42119] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42120] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42121] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42122] = "cpe-stable-backport: Backported in 6.6.64" + +# CVE-2024-42123 needs backporting (fixed from 6.10) + +CVE_STATUS[CVE-2024-42124] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42125] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-42126] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42127] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42128] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42129] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-42131] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42132] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42133] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42134] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-42135] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42136] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42137] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42138] = "cpe-stable-backport: Backported in 6.6.39" + +# CVE-2024-42139 needs backporting (fixed from 6.10) + +CVE_STATUS[CVE-2024-42140] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42141] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42142] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42144] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42145] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42146] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-42147] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42148] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42149] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-42150] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-42151] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-42152] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42153] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42154] = "cpe-stable-backport: Backported in 6.6.39" + +# CVE-2024-42155 needs backporting (fixed from 6.10) + +CVE_STATUS[CVE-2024-42156] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-42157] = "cpe-stable-backport: Backported in 6.6.39" + +# CVE-2024-42158 needs backporting (fixed from 6.10) + +CVE_STATUS[CVE-2024-42159] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42160] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42161] = "cpe-stable-backport: Backported in 6.6.39" + +# CVE-2024-42162 needs backporting (fixed from 6.10) + +CVE_STATUS[CVE-2024-42223] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42224] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42225] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42227] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-42228] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42229] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42230] = "cpe-stable-backport: Backported in 6.6.39" + +CVE_STATUS[CVE-2024-42231] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-42232] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-42233] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-42234] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-42235] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-42236] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-42237] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-42238] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-42239] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-42240] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-42241] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-42242] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-42243] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-42244] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-42245] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-42246] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-42247] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-42248] = "cpe-stable-backport: Backported in 6.6.41" + +CVE_STATUS[CVE-2024-42249] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-42250] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-42251] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-42252] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-42253] = "cpe-stable-backport: Backported in 6.6.42" + +CVE_STATUS[CVE-2024-42254] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-42255] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-42256] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-42257] = "fixed-version: only affects 6.10 onwards" + +# CVE-2024-42258 needs backporting (fixed from 6.11) + +CVE_STATUS[CVE-2024-42259] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-42260] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-42261] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-42262] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-42263] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-42264] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-42265] = "cpe-stable-backport: Backported in 6.6.45" + +CVE_STATUS[CVE-2024-42266] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-42267] = "cpe-stable-backport: Backported in 6.6.45" + +CVE_STATUS[CVE-2024-42268] = "cpe-stable-backport: Backported in 6.6.45" + +CVE_STATUS[CVE-2024-42269] = "cpe-stable-backport: Backported in 6.6.45" + +CVE_STATUS[CVE-2024-42270] = "cpe-stable-backport: Backported in 6.6.45" + +CVE_STATUS[CVE-2024-42271] = "cpe-stable-backport: Backported in 6.6.45" + +CVE_STATUS[CVE-2024-42272] = "cpe-stable-backport: Backported in 6.6.45" + +CVE_STATUS[CVE-2024-42273] = "cpe-stable-backport: Backported in 6.6.45" + +CVE_STATUS[CVE-2024-42274] = "cpe-stable-backport: Backported in 6.6.45" + +CVE_STATUS[CVE-2024-42275] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-42276] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42277] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42278] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42279] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42280] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42281] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42282] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-42283] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42284] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42285] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42286] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42287] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42288] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42289] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42290] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42291] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42292] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42293] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-42294] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42295] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42296] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42297] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42298] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42299] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42300] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-42301] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42302] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42303] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42304] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42305] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42306] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42307] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42309] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42310] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42311] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42312] = "cpe-stable-backport: Backported in 6.6.45" + +CVE_STATUS[CVE-2024-42313] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42314] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42315] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42316] = "cpe-stable-backport: Backported in 6.6.44" + +# CVE-2024-42317 needs backporting (fixed from 6.11) + +CVE_STATUS[CVE-2024-42318] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42319] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-42320] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42321] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-42322] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43098] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-43815] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-43816] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-43817] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43818] = "cpe-stable-backport: Backported in 6.6.44" + +# CVE-2024-43819 needs backporting (fixed from 6.11) + +CVE_STATUS[CVE-2024-43820] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-43821] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43822] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-43823] = "cpe-stable-backport: Backported in 6.6.44" + +# CVE-2024-43824 needs backporting (fixed from 6.11) + +CVE_STATUS[CVE-2024-43825] = "cpe-stable-backport: Backported in 6.6.44" + +# CVE-2024-43826 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2024-43827] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-43828] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43829] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43830] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43831] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43832] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43833] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43834] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43835] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-43836] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-43837] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43838] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-43839] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43840] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2024-43841] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43842] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43843] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-43844] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-43845] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43846] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43847] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43848] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-43849] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43850] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43851] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43852] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-43853] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43854] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43855] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43856] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43857] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-43858] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43859] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43860] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43861] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-43862] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-43863] = "cpe-stable-backport: Backported in 6.6.45" + +CVE_STATUS[CVE-2024-43864] = "cpe-stable-backport: Backported in 6.6.45" + +CVE_STATUS[CVE-2024-43865] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-43866] = "cpe-stable-backport: Backported in 6.6.45" + +CVE_STATUS[CVE-2024-43867] = "cpe-stable-backport: Backported in 6.6.45" + +CVE_STATUS[CVE-2024-43868] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-43869] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43870] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43871] = "cpe-stable-backport: Backported in 6.6.44" + +# CVE-2024-43872 needs backporting (fixed from 6.11) + +CVE_STATUS[CVE-2024-43873] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43874] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-43875] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43876] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43877] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43878] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-43879] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43880] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43881] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-43882] = "cpe-stable-backport: Backported in 6.6.47" + +CVE_STATUS[CVE-2024-43883] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-43884] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-43886] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-43887] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-43888] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-43889] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-43890] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-43891] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-43892] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-43893] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-43894] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-43896] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-43897] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-43899] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2024-43900] = "cpe-stable-backport: Backported in 6.6.46" + +# CVE-2024-43901 needs backporting (fixed from 6.11) + +CVE_STATUS[CVE-2024-43902] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-43904] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-43905] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-43906] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-43907] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-43908] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-43909] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-43910] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-43911] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-43912] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-43913] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-43914] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44931] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44932] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-44933] = "fixed-version: only affects 6.10.4 onwards" + +CVE_STATUS[CVE-2024-44934] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44935] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44936] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-44937] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-44938] = "cpe-stable-backport: Backported in 6.6.47" + +CVE_STATUS[CVE-2024-44939] = "cpe-stable-backport: Backported in 6.6.47" + +CVE_STATUS[CVE-2024-44940] = "cpe-stable-backport: Backported in 6.6.47" + +CVE_STATUS[CVE-2024-44941] = "cpe-stable-backport: Backported in 6.6.47" + +CVE_STATUS[CVE-2024-44942] = "cpe-stable-backport: Backported in 6.6.47" + +CVE_STATUS[CVE-2024-44943] = "cpe-stable-backport: Backported in 6.6.47" + +CVE_STATUS[CVE-2024-44944] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-44945] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-44946] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-44947] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-44948] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44949] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44950] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-44951] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-44953] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-44954] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44956] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-44957] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44958] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44959] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44960] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44961] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44962] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44963] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-44964] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-44965] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44966] = "cpe-stable-backport: Backported in 6.6.47" + +CVE_STATUS[CVE-2024-44967] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44968] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44969] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44970] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44971] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-44973] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-44974] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-44975] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-44976] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-44977] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-44978] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-44979] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-44980] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-44981] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-44982] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-44983] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-44984] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-44985] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-44986] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-44987] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-44988] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-44989] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-44990] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-44991] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-44992] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-44993] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-44994] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-44995] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-44996] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-44997] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-44998] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-44999] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45000] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45001] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45002] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45003] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45004] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-45005] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45006] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45007] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45008] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45009] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45010] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45011] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45012] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45013] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-45014] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-45015] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45016] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45017] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-45018] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45019] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45020] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45021] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45022] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45023] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-45024] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-45025] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45026] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45027] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-45028] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45029] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45030] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-45828] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-46672] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-46673] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-46674] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-46675] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-46676] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-46677] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-46678] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-46679] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-46680] = "cpe-stable-backport: Backported in 6.6.49" + +# CVE-2024-46681 needs backporting (fixed from 6.11) + +CVE_STATUS[CVE-2024-46682] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-46683] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-46684] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-46685] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-46686] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-46687] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-46688] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-46689] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-46690] = "fixed-version: only affects 6.9 onwards" + +# CVE-2024-46691 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2024-46692] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-46693] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-46694] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-46695] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-46696] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-46697] = "fixed-version: only affects 6.7 onwards" + +# CVE-2024-46698 needs backporting (fixed from 6.11) + +CVE_STATUS[CVE-2024-46699] = "fixed-version: only affects 6.10 onwards" + +# CVE-2024-46701 needs backporting (fixed from 6.11) + +CVE_STATUS[CVE-2024-46702] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-46703] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-46704] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-46705] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-46706] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-46707] = "cpe-stable-backport: Backported in 6.6.48" + +CVE_STATUS[CVE-2024-46708] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-46709] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-46710] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-46711] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-46712] = "fixed-version: only affects 6.10.4 onwards" + +CVE_STATUS[CVE-2024-46713] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46714] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46715] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46716] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46717] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46718] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-46719] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46720] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46721] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46722] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46723] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46724] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46725] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46726] = "cpe-stable-backport: Backported in 6.6.50" + +# CVE-2024-46727 needs backporting (fixed from 6.11) + +CVE_STATUS[CVE-2024-46728] = "cpe-stable-backport: Backported in 6.6.50" + +# CVE-2024-46729 needs backporting (fixed from 6.11) + +# CVE-2024-46730 needs backporting (fixed from 6.11) + +CVE_STATUS[CVE-2024-46731] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46732] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46733] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2024-46734] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46735] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46736] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46737] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46738] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46739] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46740] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46741] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46742] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46743] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46744] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46745] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46746] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46747] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46748] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-46749] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46750] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46751] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2024-46752] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46753] = "cpe-stable-backport: Backported in 6.6.87" + +# CVE-2024-46754 needs backporting (fixed from 6.11) + +CVE_STATUS[CVE-2024-46755] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46759] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46760] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46761] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46762] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46763] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46764] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-46765] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46766] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-46767] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46768] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46769] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-46770] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46771] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46772] = "cpe-stable-backport: Backported in 6.6.86" + +CVE_STATUS[CVE-2024-46773] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46774] = "cpe-stable-backport: Backported in 6.6.88" + +# CVE-2024-46775 needs backporting (fixed from 6.11) + +CVE_STATUS[CVE-2024-46776] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46777] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46778] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-46779] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-46780] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46781] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46782] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46783] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46784] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46785] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46786] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46787] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46788] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46789] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-46790] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-46791] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46792] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-46793] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-46794] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46795] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46796] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46797] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46798] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46799] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-46800] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46801] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-46802] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46803] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46804] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46805] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46806] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46807] = "cpe-stable-backport: Backported in 6.6.50" + +# CVE-2024-46808 needs backporting (fixed from 6.11) + +CVE_STATUS[CVE-2024-46809] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46810] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46811] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46812] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46813] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2024-46814] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46815] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46816] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2024-46817] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46818] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46819] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46820] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-46821] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46822] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46823] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-46824] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-46825] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46826] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46827] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46828] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46829] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46830] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46831] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46832] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46833] = "fixed-version: only affects 6.10 onwards" + +# CVE-2024-46834 needs backporting (fixed from 6.11) + +CVE_STATUS[CVE-2024-46835] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46836] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46837] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-46838] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46840] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46841] = "cpe-stable-backport: Backported in 6.6.64" + +# CVE-2024-46842 needs backporting (fixed from 6.11) + +CVE_STATUS[CVE-2024-46843] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46844] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46845] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46846] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46847] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46848] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-46849] = "cpe-stable-backport: Backported in 6.6.52" + +CVE_STATUS[CVE-2024-46850] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-46851] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-46852] = "cpe-stable-backport: Backported in 6.6.52" + +CVE_STATUS[CVE-2024-46853] = "cpe-stable-backport: Backported in 6.6.52" + +CVE_STATUS[CVE-2024-46854] = "cpe-stable-backport: Backported in 6.6.52" + +CVE_STATUS[CVE-2024-46855] = "cpe-stable-backport: Backported in 6.6.52" + +CVE_STATUS[CVE-2024-46856] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-46857] = "cpe-stable-backport: Backported in 6.6.52" + +CVE_STATUS[CVE-2024-46858] = "cpe-stable-backport: Backported in 6.6.52" + +CVE_STATUS[CVE-2024-46859] = "cpe-stable-backport: Backported in 6.6.52" + +CVE_STATUS[CVE-2024-46860] = "cpe-stable-backport: Backported in 6.6.52" + +CVE_STATUS[CVE-2024-46861] = "cpe-stable-backport: Backported in 6.6.52" + +CVE_STATUS[CVE-2024-46862] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-46863] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-46864] = "cpe-stable-backport: Backported in 6.6.52" + +CVE_STATUS[CVE-2024-46865] = "cpe-stable-backport: Backported in 6.6.52" + +CVE_STATUS[CVE-2024-46866] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-46867] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-46868] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-46869] = "fixed-version: only affects 6.10 onwards" + +# CVE-2024-46870 needs backporting (fixed from 6.11) + +CVE_STATUS[CVE-2024-46871] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-46896] = "cpe-stable-backport: Backported in 6.6.68" + +CVE_STATUS[CVE-2024-47141] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-47143] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-47408] = "cpe-stable-backport: Backported in 6.6.68" + +CVE_STATUS[CVE-2024-47658] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-47659] = "cpe-stable-backport: Backported in 6.6.50" + +CVE_STATUS[CVE-2024-47660] = "cpe-stable-backport: Backported in 6.6.50" + +# CVE-2024-47661 needs backporting (fixed from 6.11) + +# CVE-2024-47662 needs backporting (fixed from 6.11) + +CVE_STATUS[CVE-2024-47663] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-47664] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-47665] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-47666] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-47667] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-47668] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-47669] = "cpe-stable-backport: Backported in 6.6.51" + +CVE_STATUS[CVE-2024-47670] = "cpe-stable-backport: Backported in 6.6.53" + +CVE_STATUS[CVE-2024-47671] = "cpe-stable-backport: Backported in 6.6.53" + +CVE_STATUS[CVE-2024-47673] = "cpe-stable-backport: Backported in 6.6.53" + +CVE_STATUS[CVE-2024-47674] = "cpe-stable-backport: Backported in 6.6.52" + +CVE_STATUS[CVE-2024-47675] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47676] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-47677] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-47678] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47679] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47680] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-47681] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47682] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47683] = "cpe-stable-backport: Backported in 6.6.46" + +CVE_STATUS[CVE-2024-47684] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47685] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47686] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47687] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-47688] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47689] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47690] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47691] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47692] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47693] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47694] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-47695] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47696] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47697] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47698] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47699] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47700] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47701] = "cpe-stable-backport: Backported in 6.6.54" + +# CVE-2024-47702 needs backporting (fixed from 6.12) + +# CVE-2024-47703 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-47704] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-47705] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47706] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47707] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47708] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-47709] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47710] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47711] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-47712] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47713] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47714] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47715] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47716] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47717] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-47718] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47719] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47720] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47721] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-47723] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47724] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-47726] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-47727] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47728] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47729] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-47730] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47731] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47732] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-47733] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-47734] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47735] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47736] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-47737] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47738] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47739] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47740] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47741] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47742] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47743] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47744] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47745] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47746] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-47747] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47748] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47749] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47750] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47751] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47752] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47753] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47754] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47756] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-47757] = "cpe-stable-backport: Backported in 6.6.54" + +# CVE-2024-47794 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2024-47809] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-48873] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-48875] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-48876] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-48881] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-49568] = "cpe-stable-backport: Backported in 6.6.68" + +CVE_STATUS[CVE-2024-49569] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2024-49570] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-49571] = "cpe-stable-backport: Backported in 6.6.68" + +CVE_STATUS[CVE-2024-49573] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-49850] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-49851] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-49852] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-49853] = "cpe-stable-backport: Backported in 6.6.54" + +# CVE-2024-49854 has no known resolution + +CVE_STATUS[CVE-2024-49855] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-49856] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-49857] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-49858] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-49859] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-49860] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-49861] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-49862] = "cpe-stable-backport: Backported in 6.6.54" + +CVE_STATUS[CVE-2024-49863] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49864] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49865] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-49866] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49867] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49868] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49869] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-49870] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49871] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49872] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-49873] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-49874] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49875] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49876] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-49877] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49878] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49879] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49880] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-49881] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49882] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49883] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49884] = "cpe-stable-backport: Backported in 6.6.55" + +# CVE-2024-49885 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-49886] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49887] = "fixed-version: only affects 6.9 onwards" + +# CVE-2024-49888 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-49889] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49890] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49891] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-49892] = "cpe-stable-backport: Backported in 6.6.55" + +# CVE-2024-49893 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-49894] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49895] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49896] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49897] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-49898] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-49899] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-49900] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49901] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49902] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49903] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49904] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-49905] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49906] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-49907] = "cpe-stable-backport: Backported in 6.6.55" + +# CVE-2024-49908 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-49909] = "cpe-stable-backport: Backported in 6.6.64" + +# CVE-2024-49910 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-49911] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-49912] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49913] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49914] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-49915] = "cpe-stable-backport: Backported in 6.6.64" + +# CVE-2024-49916 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-49917] = "cpe-stable-backport: Backported in 6.6.64" + +# CVE-2024-49918 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-49919] = "cpe-stable-backport: Backported in 6.6.79" + +# CVE-2024-49920 needs backporting (fixed from 6.12) + +# CVE-2024-49921 needs backporting (fixed from 6.12) + +# CVE-2024-49922 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-49923] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2024-49924] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49925] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49926] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-49927] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49928] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-49929] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49930] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49931] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49932] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-49933] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49934] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-49935] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49936] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49937] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49938] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49939] = "cpe-stable-backport: Backported in 6.6.55" + +# CVE-2024-49940 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-49941] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-49942] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-49943] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-49944] = "cpe-stable-backport: Backported in 6.6.55" + +# CVE-2024-49945 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-49946] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49947] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49948] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49949] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49950] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49951] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49952] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49953] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49954] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49955] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49956] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-49957] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49958] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49959] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49960] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49961] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49962] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49963] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49964] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-49965] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49966] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49968] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2024-49969] = "cpe-stable-backport: Backported in 6.6.55" + +# CVE-2024-49970 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-49971] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-49972] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-49973] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49974] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-49975] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49976] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49977] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49978] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49979] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-49980] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49981] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49982] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49983] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49984] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-49985] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49986] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49987] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49988] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49989] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49990] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-49991] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49992] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49994] = "cpe-stable-backport: Backported in 6.6.75" + +CVE_STATUS[CVE-2024-49996] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49997] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-49998] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2024-49999] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-50000] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-50001] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-50002] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-50003] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-50004] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-50005] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-50006] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-50007] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-50008] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-50009] = "cpe-stable-backport: Backported in 6.6.75" + +CVE_STATUS[CVE-2024-50010] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50011] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50012] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-50013] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-50014] = "cpe-stable-backport: Backported in 6.6.75" + +CVE_STATUS[CVE-2024-50015] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-50017] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2024-50019] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50020] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-50021] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-50022] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50023] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50024] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50025] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-50026] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50027] = "cpe-stable-backport: Backported in 6.6.60" + +# CVE-2024-50028 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-50029] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50030] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-50031] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50033] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50034] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50035] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50036] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50037] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50038] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50039] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50040] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50041] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50042] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-50043] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-50044] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50045] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50046] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50047] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50048] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50049] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50051] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-50055] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50056] = "cpe-stable-backport: Backported in 6.6.86" + +CVE_STATUS[CVE-2024-50057] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50058] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50059] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50060] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50061] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50062] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50063] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50064] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50065] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50066] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50067] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50068] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-50069] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50070] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50071] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50072] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50073] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50074] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50075] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50076] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50077] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50078] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50079] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-50080] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50081] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-50082] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50083] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50084] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50085] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50086] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50087] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50088] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50090] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-50091] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-50092] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-50093] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50094] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50095] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50096] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50097] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50098] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50099] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50100] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-50101] = "cpe-stable-backport: Backported in 6.6.58" + +# CVE-2024-50102 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-50103] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50104] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-50105] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-50106] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-50107] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-50108] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50109] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-50110] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50111] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50112] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50113] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50114] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50115] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50116] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50117] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50118] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-50119] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-50120] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50121] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50122] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50123] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-50124] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50125] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50126] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50127] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50128] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50129] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-50130] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50131] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50132] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-50133] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50134] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50135] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50136] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50137] = "cpe-stable-backport: Backported in 6.6.86" + +CVE_STATUS[CVE-2024-50138] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2024-50139] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50140] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50141] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50142] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50143] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50144] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50145] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50146] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2024-50147] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50148] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50149] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-50150] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50151] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50152] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50153] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50154] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50155] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50156] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50157] = "cpe-stable-backport: Backported in 6.6.75" + +CVE_STATUS[CVE-2024-50158] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50159] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50160] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50161] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50162] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50163] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50164] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50165] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-50166] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50167] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50168] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50169] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50170] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50171] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50172] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50173] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-50174] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-50175] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-50176] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-50177] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50178] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50179] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-50180] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50182] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50183] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50184] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50185] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50186] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50187] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50188] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50189] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50190] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-50191] = "cpe-stable-backport: Backported in 6.6.57" + +CVE_STATUS[CVE-2024-50192] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50193] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50194] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50195] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50196] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50197] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-50198] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50199] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50200] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50201] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50202] = "cpe-stable-backport: Backported in 6.6.58" + +CVE_STATUS[CVE-2024-50203] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50204] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50205] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50206] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-50207] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-50208] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50209] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50210] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50211] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-50212] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-50213] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50214] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50215] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50216] = "cpe-stable-backport: Backported in 6.6.60" + +# CVE-2024-50217 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-50218] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50220] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-50221] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-50222] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50223] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50224] = "cpe-stable-backport: Backported in 6.6.60" + +# CVE-2024-50225 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-50226] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50227] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50229] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50230] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50231] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50232] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50233] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50234] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50235] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50236] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50237] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50238] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-50239] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50240] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50241] = "fixed-version: only affects 6.11.3 onwards" + +CVE_STATUS[CVE-2024-50242] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50243] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50244] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50245] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50246] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50247] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50248] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50249] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50250] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50251] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50252] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50253] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50254] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50255] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50256] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50257] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50258] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50259] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50260] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-50261] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50262] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-50263] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-50264] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50265] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50266] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50267] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50268] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50269] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50270] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-50271] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50272] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50273] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50274] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-50275] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50276] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50277] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-50278] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50279] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50280] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50281] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50282] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50283] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50284] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50285] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50286] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50287] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50288] = "fixed-version: only affects 6.8 onwards" + +# CVE-2024-50289 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-50290] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50291] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-50292] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50293] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-50294] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50295] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50296] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50297] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-50298] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50299] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50300] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50301] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50302] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-50303] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-50304] = "cpe-stable-backport: Backported in 6.6.75" + +CVE_STATUS[CVE-2024-51729] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-52319] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-52332] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-52557] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2024-52559] = "cpe-stable-backport: Backported in 6.6.80" + +# CVE-2024-52560 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2024-53042] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-53043] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-53044] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-53045] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-53046] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-53047] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-53048] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-53049] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-53050] = "fixed-version: only affects 6.7 onwards" + +# CVE-2024-53051 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-53052] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-53053] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-53055] = "cpe-stable-backport: Backported in 6.6.60" + +# CVE-2024-53056 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-53057] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-53058] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-53059] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-53060] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-53061] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-53062] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-53063] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-53064] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-53065] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-53066] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-53067] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-53068] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-53069] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-53070] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-53071] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-53072] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-53073] = "fixed-version: only affects 6.11.3 onwards" + +CVE_STATUS[CVE-2024-53074] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-53075] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-53076] = "cpe-stable-backport: Backported in 6.6.60" + +CVE_STATUS[CVE-2024-53077] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-53078] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-53079] = "cpe-stable-backport: Backported in 6.6.62" + +CVE_STATUS[CVE-2024-53080] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-53081] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-53082] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-53083] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-53084] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-53085] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53086] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-53087] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-53088] = "cpe-stable-backport: Backported in 6.6.61" + +# CVE-2024-53089 needs backporting (fixed from 6.12) + +# CVE-2024-53090 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-53091] = "cpe-stable-backport: Backported in 6.6.62" + +CVE_STATUS[CVE-2024-53092] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-53093] = "cpe-stable-backport: Backported in 6.6.62" + +CVE_STATUS[CVE-2024-53094] = "cpe-stable-backport: Backported in 6.6.62" + +CVE_STATUS[CVE-2024-53095] = "cpe-stable-backport: Backported in 6.6.62" + +CVE_STATUS[CVE-2024-53096] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53097] = "cpe-stable-backport: Backported in 6.6.62" + +CVE_STATUS[CVE-2024-53098] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-53099] = "cpe-stable-backport: Backported in 6.6.62" + +CVE_STATUS[CVE-2024-53100] = "cpe-stable-backport: Backported in 6.6.62" + +CVE_STATUS[CVE-2024-53101] = "cpe-stable-backport: Backported in 6.6.62" + +CVE_STATUS[CVE-2024-53103] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-53104] = "cpe-stable-backport: Backported in 6.6.61" + +CVE_STATUS[CVE-2024-53105] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-53106] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53107] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-53108] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53109] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53110] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53111] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-53112] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53113] = "cpe-stable-backport: Backported in 6.6.63" + +# CVE-2024-53114 needs backporting (fixed from 6.12) + +CVE_STATUS[CVE-2024-53115] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-53116] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-53117] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-53118] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-53119] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53120] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53121] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53122] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53123] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53124] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2024-53125] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-53126] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53127] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53128] = "cpe-stable-backport: Backported in 6.6.69" + +CVE_STATUS[CVE-2024-53129] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53130] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53131] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53132] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-53133] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-53134] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53135] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53136] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53137] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-53138] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53139] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53140] = "cpe-stable-backport: Backported in 6.6.63" + +CVE_STATUS[CVE-2024-53141] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53142] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53143] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-53144] = "cpe-stable-backport: Backported in 6.6.55" + +CVE_STATUS[CVE-2024-53145] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53146] = "cpe-stable-backport: Backported in 6.6.64" + +# CVE-2024-53147 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2024-53148] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53149] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-53150] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53151] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53152] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-53153] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-53154] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53155] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53156] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53157] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53158] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53160] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53161] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53162] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53163] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-53164] = "cpe-stable-backport: Backported in 6.6.68" + +CVE_STATUS[CVE-2024-53165] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53166] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53167] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-53168] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53169] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-53170] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2024-53171] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53172] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53173] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53174] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53175] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53176] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53177] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53178] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53179] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-53180] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53181] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53182] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-53183] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53184] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53185] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53186] = "cpe-stable-backport: Backported in 6.6.64" + +# CVE-2024-53187 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2024-53188] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53189] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-53190] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53191] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53192] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-53193] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-53194] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53195] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53196] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-53197] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53198] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53199] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-53200] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53201] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-53202] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53203] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2024-53204] = "cpe-stable-backport: Backported in 6.6.4" + +CVE_STATUS[CVE-2024-53205] = "cpe-stable-backport: Backported in 6.6.4" + +CVE_STATUS[CVE-2024-53206] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53207] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53208] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53209] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2024-53210] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53211] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-53212] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-53213] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53214] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53215] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53216] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53217] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53218] = "cpe-stable-backport: Backported in 6.6.64" + +# CVE-2024-53219 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2024-53220] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53221] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-53222] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2024-53223] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53224] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53225] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-53226] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53227] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53228] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-53229] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53230] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53231] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53232] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-53233] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53234] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53235] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-53236] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-53237] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53238] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-53239] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-53240] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-53241] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-53680] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-53681] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-53682] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-53685] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-53687] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-53690] = "cpe-stable-backport: Backported in 6.6.68" + +CVE_STATUS[CVE-2024-54031] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-54191] = "fixed-version: only affects 6.12.2 onwards" + +CVE_STATUS[CVE-2024-54193] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-54455] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-54456] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2024-54458] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2024-54460] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-54683] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-55639] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-55641] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-55642] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-55881] = "cpe-stable-backport: Backported in 6.6.68" + +CVE_STATUS[CVE-2024-55916] = "cpe-stable-backport: Backported in 6.6.68" + +CVE_STATUS[CVE-2024-56368] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-56369] = "cpe-stable-backport: Backported in 6.6.68" + +CVE_STATUS[CVE-2024-56372] = "cpe-stable-backport: Backported in 6.6.68" + +CVE_STATUS[CVE-2024-56531] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56532] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56533] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56534] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-56535] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-56536] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-56537] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-56538] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56539] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56540] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-56541] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-56542] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-56543] = "cpe-stable-backport: Backported in 6.6.64" + +# CVE-2024-56544 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2024-56545] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56546] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56547] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-56548] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56549] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2024-56550] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-56551] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56552] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-56553] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-56554] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-56555] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-56556] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-56557] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56558] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56559] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-56560] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-56561] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-56562] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56563] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-56564] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-56565] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56566] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56567] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56568] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56569] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56570] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56572] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56573] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56574] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56575] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56576] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56577] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56578] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56579] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56580] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-56581] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56582] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-56583] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56584] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56585] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56586] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56587] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56588] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-56589] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56590] = "cpe-stable-backport: Backported in 6.6.66" + +# CVE-2024-56591 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2024-56592] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56593] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56594] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56595] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56596] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56597] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56598] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56599] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-56600] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56601] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56602] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56603] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56604] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56605] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56606] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56607] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-56608] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2024-56609] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-56610] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56611] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56612] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-56613] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56614] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56615] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56616] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56617] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56618] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-56619] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56620] = "cpe-stable-backport: Backported in 6.6.86" + +CVE_STATUS[CVE-2024-56621] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-56622] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56623] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56624] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-56625] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56626] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56627] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56628] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56629] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56630] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56631] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56632] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-56633] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56634] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56635] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56636] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56637] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56638] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56639] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-56640] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56641] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56642] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56643] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56644] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56645] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56646] = "fixed-version: only affects 6.9 onwards" + +# CVE-2024-56647 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2024-56648] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56649] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56650] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56651] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56652] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-56653] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-56654] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-56655] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-56656] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-56657] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-56658] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-56659] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-56660] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-56661] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-56662] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-56663] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-56664] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-56665] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-56666] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-56667] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-56668] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-56669] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-56670] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-56671] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-56672] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-56673] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-56674] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-56675] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-56676] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-56677] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56678] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56679] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56680] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-56681] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56682] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-56683] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56684] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-56685] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-56687] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56688] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56689] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56690] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56691] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56692] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56693] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56694] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56695] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-56696] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-56697] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-56698] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56699] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-56700] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56701] = "cpe-stable-backport: Backported in 6.6.64" + +# CVE-2024-56702 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2024-56703] = "cpe-stable-backport: Backported in 6.6.75" + +CVE_STATUS[CVE-2024-56704] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56705] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56706] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-56707] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56708] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56709] = "cpe-stable-backport: Backported in 6.6.68" + +CVE_STATUS[CVE-2024-56710] = "cpe-stable-backport: Backported in 6.6.69" + +CVE_STATUS[CVE-2024-56711] = "fixed-version: only affects 6.11 onwards" + +# CVE-2024-56712 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2024-56713] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-56714] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-56715] = "cpe-stable-backport: Backported in 6.6.68" + +CVE_STATUS[CVE-2024-56716] = "cpe-stable-backport: Backported in 6.6.68" + +CVE_STATUS[CVE-2024-56717] = "cpe-stable-backport: Backported in 6.6.68" + +CVE_STATUS[CVE-2024-56718] = "cpe-stable-backport: Backported in 6.6.68" + +CVE_STATUS[CVE-2024-56719] = "cpe-stable-backport: Backported in 6.6.68" + +CVE_STATUS[CVE-2024-56720] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56721] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-56722] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56723] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56724] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56725] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56726] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56727] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56728] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56729] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56730] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-56739] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56740] = "fixed-version: only affects 6.12 onwards" + +# CVE-2024-56742 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2024-56743] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-56744] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56745] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56746] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56747] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56748] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56749] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-56750] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-56751] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56752] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56753] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-56754] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56755] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56756] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56757] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-56758] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2024-56759] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-56760] = "cpe-stable-backport: Backported in 6.6.69" + +CVE_STATUS[CVE-2024-56761] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-56763] = "cpe-stable-backport: Backported in 6.6.69" + +CVE_STATUS[CVE-2024-56764] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-56765] = "cpe-stable-backport: Backported in 6.6.69" + +CVE_STATUS[CVE-2024-56766] = "cpe-stable-backport: Backported in 6.6.69" + +CVE_STATUS[CVE-2024-56767] = "cpe-stable-backport: Backported in 6.6.69" + +CVE_STATUS[CVE-2024-56768] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-56769] = "cpe-stable-backport: Backported in 6.6.69" + +CVE_STATUS[CVE-2024-56770] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-56771] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-56772] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-56773] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-56774] = "cpe-stable-backport: Backported in 6.6.64" + +# CVE-2024-56775 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2024-56776] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56777] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56778] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56779] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56780] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-56782] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-56783] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56784] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-56785] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56787] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-56788] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-57791] = "cpe-stable-backport: Backported in 6.6.68" + +CVE_STATUS[CVE-2024-57792] = "cpe-stable-backport: Backported in 6.6.69" + +CVE_STATUS[CVE-2024-57793] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-57795] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2024-57798] = "cpe-stable-backport: Backported in 6.6.69" + +CVE_STATUS[CVE-2024-57799] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-57800] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-57801] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57802] = "cpe-stable-backport: Backported in 6.6.70" + +# CVE-2024-57804 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2024-57805] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-57806] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-57807] = "cpe-stable-backport: Backported in 6.6.69" + +# CVE-2024-57809 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2024-57834] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2024-57838] = "cpe-stable-backport: Backported in 6.6.64" + +CVE_STATUS[CVE-2024-57839] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-57841] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57843] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-57844] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-57849] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-57850] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-57852] = "fixed-version: only affects 6.12 onwards" + +# CVE-2024-57857 needs backporting (fixed from 6.13) + +# CVE-2024-57872 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2024-57874] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-57875] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-57876] = "cpe-stable-backport: Backported in 6.6.66" + +CVE_STATUS[CVE-2024-57877] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-57878] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-57879] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-57880] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-57881] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-57882] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57883] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57884] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57885] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57886] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-57887] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57888] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57889] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57890] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57891] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-57892] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57893] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57895] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57896] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57897] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57898] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-57899] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57900] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57901] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57902] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57903] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57904] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57905] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-57906] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57907] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57908] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57909] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-57910] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57911] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57912] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57913] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57914] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-57916] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57917] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57918] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-57919] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-57921] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-57922] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57923] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-57924] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2024-57925] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57926] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57927] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-57928] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-57929] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57930] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57931] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57932] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57933] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57934] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-57935] = "fixed-version: only affects 6.12.2 onwards" + +CVE_STATUS[CVE-2024-57936] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-57938] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2024-57939] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57940] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57941] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-57942] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-57943] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-57944] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-57945] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2024-57946] = "cpe-stable-backport: Backported in 6.6.69" + +CVE_STATUS[CVE-2024-57947] = "cpe-stable-backport: Backported in 6.6.44" + +CVE_STATUS[CVE-2024-57948] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2024-57949] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2024-57950] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-57951] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2024-57952] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-57953] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2024-57973] = "cpe-stable-backport: Backported in 6.6.76" + +# CVE-2024-57974 needs backporting (fixed from 6.14) + +# CVE-2024-57975 needs backporting (fixed from 6.14) + +# CVE-2024-57976 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2024-57977] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2024-57978] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-57979] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-57980] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-57981] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-57982] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2024-57983] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2024-57984] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-57985] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-57986] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-57987] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-57988] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-57989] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-57990] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-57991] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2024-57992] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2024-57993] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-57994] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2024-57995] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-57996] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-57997] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-57998] = "cpe-stable-backport: Backported in 6.6.76" + +# CVE-2024-57999 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2024-58000] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2024-58001] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2024-58002] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2024-58003] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2024-58004] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-58005] = "cpe-stable-backport: Backported in 6.6.78" + +# CVE-2024-58006 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2024-58007] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2024-58008] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-58009] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2024-58010] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2024-58011] = "cpe-stable-backport: Backported in 6.6.78" + +# CVE-2024-58012 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2024-58013] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2024-58014] = "cpe-stable-backport: Backported in 6.6.78" + +# CVE-2024-58015 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2024-58016] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2024-58017] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2024-58018] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-58019] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-58020] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2024-58021] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-58022] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2024-58034] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-58042] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-58051] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-58052] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-58053] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-58054] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-58055] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-58056] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-58057] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-58058] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-58059] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2024-58060] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-58061] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-58062] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-58063] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-58064] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2024-58065] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2024-58066] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2024-58067] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2024-58068] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-58069] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-58070] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-58071] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-58072] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2024-58073] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2024-58074] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-58075] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2024-58076] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2024-58077] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2024-58078] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2024-58079] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2024-58080] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2024-58081] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2024-58082] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2024-58083] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2024-58084] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-58085] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2024-58086] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2024-58087] = "cpe-stable-backport: Backported in 6.6.67" + +CVE_STATUS[CVE-2024-58088] = "cpe-stable-backport: Backported in 6.6.80" + +# CVE-2024-58089 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2024-58090] = "cpe-stable-backport: Backported in 6.6.81" + +CVE_STATUS[CVE-2024-58091] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2024-58092] = "fixed-version: only affects 6.8 onwards" + +# CVE-2024-58093 needs backporting (fixed from 6.15) + +# CVE-2024-58094 needs backporting (fixed from 6.15) + +# CVE-2024-58095 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2024-58096] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2024-58097] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2024-58098] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2024-58099] = "cpe-stable-backport: Backported in 6.6.59" + +CVE_STATUS[CVE-2024-58100] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2024-58237] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2024-58238] = "cpe-stable-backport: Backported in 6.6.49" + +CVE_STATUS[CVE-2024-58239] = "cpe-stable-backport: Backported in 6.6.19" + +CVE_STATUS[CVE-2024-58240] = "cpe-stable-backport: Backported in 6.6.21" + +CVE_STATUS[CVE-2024-58241] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-21629] = "cpe-stable-backport: Backported in 6.6.70" + +CVE_STATUS[CVE-2025-21631] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21632] = "cpe-stable-backport: Backported in 6.6.72" + +# CVE-2025-21634 needs backporting (fixed from 6.13) + +# CVE-2025-21635 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2025-21636] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21637] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21638] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21639] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21640] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21641] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21642] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21643] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-21644] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-21645] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21646] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21647] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21648] = "cpe-stable-backport: Backported in 6.6.72" + +# CVE-2025-21649 needs backporting (fixed from 6.13) + +# CVE-2025-21650 needs backporting (fixed from 6.13) + +# CVE-2025-21651 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2025-21652] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21653] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21654] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2025-21655] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21656] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21657] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21658] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21659] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-21660] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21661] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-21662] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21663] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21664] = "cpe-stable-backport: Backported in 6.6.72" + +CVE_STATUS[CVE-2025-21665] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2025-21666] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2025-21667] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2025-21668] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2025-21669] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2025-21670] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2025-21671] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2025-21672] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-21673] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2025-21674] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2025-21675] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2025-21676] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2025-21677] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-21678] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2025-21679] = "fixed-version: only affects 6.12.5 onwards" + +CVE_STATUS[CVE-2025-21680] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2025-21681] = "cpe-stable-backport: Backported in 6.6.74" + +# CVE-2025-21682 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2025-21683] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2025-21684] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2025-21685] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-21687] = "cpe-stable-backport: Backported in 6.6.75" + +CVE_STATUS[CVE-2025-21688] = "cpe-stable-backport: Backported in 6.6.75" + +CVE_STATUS[CVE-2025-21689] = "cpe-stable-backport: Backported in 6.6.75" + +CVE_STATUS[CVE-2025-21690] = "cpe-stable-backport: Backported in 6.6.75" + +CVE_STATUS[CVE-2025-21691] = "cpe-stable-backport: Backported in 6.6.75" + +CVE_STATUS[CVE-2025-21692] = "cpe-stable-backport: Backported in 6.6.75" + +# CVE-2025-21693 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2025-21694] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2025-21695] = "fixed-version: only affects 6.10 onwards" + +# CVE-2025-21696 needs backporting (fixed from 6.13) + +CVE_STATUS[CVE-2025-21697] = "cpe-stable-backport: Backported in 6.6.74" + +CVE_STATUS[CVE-2025-21699] = "cpe-stable-backport: Backported in 6.6.75" + +CVE_STATUS[CVE-2025-21700] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21701] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21702] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21703] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21704] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21705] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21706] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21707] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21708] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21709] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-21710] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21711] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21712] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21713] = "fixed-version: only affects 6.11 onwards" + +# CVE-2025-21714 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21715] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21716] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21717] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-21718] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21719] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21720] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21721] = "cpe-stable-backport: Backported in 6.6.80" + +# CVE-2025-21722 needs backporting (fixed from 6.14) + +# CVE-2025-21723 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21724] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21725] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21726] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21727] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21728] = "cpe-stable-backport: Backported in 6.6.76" + +# CVE-2025-21729 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21730] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-21731] = "cpe-stable-backport: Backported in 6.6.76" + +# CVE-2025-21732 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21733] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21734] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21735] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21736] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21737] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-21738] = "cpe-stable-backport: Backported in 6.6.78" + +# CVE-2025-21739 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21741] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21742] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21743] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21744] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21745] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21746] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21747] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-21748] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21749] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21750] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21751] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21752] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-21753] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21754] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21756] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21758] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21759] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21760] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21761] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21762] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21763] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21764] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21765] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21766] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21767] = "cpe-stable-backport: Backported in 6.6.79" + +# CVE-2025-21768 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21769] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-21770] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-21771] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21772] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21773] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21774] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21775] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21776] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21777] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21778] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21779] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21780] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21781] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21782] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21783] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21784] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21785] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21786] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-21787] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21788] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-21789] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21790] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21791] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21792] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21793] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21794] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21795] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21796] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21797] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-21798] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-21799] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21800] = "fixed-version: only affects 6.12 onwards" + +# CVE-2025-21801 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21802] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21803] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21804] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21805] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21806] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21807] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-21808] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21809] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-21810] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21811] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21812] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21813] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21814] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21815] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-21816] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-21817] = "fixed-version: only affects 6.13.2 onwards" + +CVE_STATUS[CVE-2025-21819] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21820] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21821] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21822] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-21823] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21824] = "fixed-version: only affects 6.12 onwards" + +# CVE-2025-21825 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21826] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21827] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-21828] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21829] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21830] = "cpe-stable-backport: Backported in 6.6.76" + +CVE_STATUS[CVE-2025-21831] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21832] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-21833] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-21834] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-21835] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21836] = "cpe-stable-backport: Backported in 6.6.79" + +CVE_STATUS[CVE-2025-21838] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21839] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-21840] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-21841] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21842] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21843] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-21844] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21845] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21846] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21847] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21848] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21849] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-21850] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-21851] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-21852] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-21853] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21854] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21855] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21856] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21857] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21858] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21859] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21860] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-21861] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-21862] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21863] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21864] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21865] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21866] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21867] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21868] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-21869] = "fixed-version: only affects 6.7 onwards" + +# CVE-2025-21870 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21871] = "cpe-stable-backport: Backported in 6.6.80" + +CVE_STATUS[CVE-2025-21872] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21873] = "cpe-stable-backport: Backported in 6.6.81" + +CVE_STATUS[CVE-2025-21874] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-21875] = "cpe-stable-backport: Backported in 6.6.81" + +CVE_STATUS[CVE-2025-21876] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-21877] = "cpe-stable-backport: Backported in 6.6.81" + +CVE_STATUS[CVE-2025-21878] = "cpe-stable-backport: Backported in 6.6.81" + +CVE_STATUS[CVE-2025-21879] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-21880] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-21881] = "cpe-stable-backport: Backported in 6.6.81" + +CVE_STATUS[CVE-2025-21882] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-21883] = "cpe-stable-backport: Backported in 6.6.81" + +CVE_STATUS[CVE-2025-21884] = "cpe-stable-backport: Backported in 6.6.103" + +# CVE-2025-21885 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21886] = "fixed-version: only affects 6.12.13 onwards" + +CVE_STATUS[CVE-2025-21887] = "cpe-stable-backport: Backported in 6.6.81" + +# CVE-2025-21888 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21889] = "cpe-stable-backport: Backported in 6.6.81" + +CVE_STATUS[CVE-2025-21890] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-21891] = "cpe-stable-backport: Backported in 6.6.81" + +# CVE-2025-21892 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21893] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-21894] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21895] = "cpe-stable-backport: Backported in 6.6.81" + +CVE_STATUS[CVE-2025-21896] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-21897] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21898] = "cpe-stable-backport: Backported in 6.6.81" + +CVE_STATUS[CVE-2025-21899] = "cpe-stable-backport: Backported in 6.6.81" + +CVE_STATUS[CVE-2025-21900] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-21901] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21902] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21903] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-21904] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21905] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21906] = "fixed-version: only affects 6.9 onwards" + +# CVE-2025-21907 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21908] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21909] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21910] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21911] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-21912] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21913] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21914] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21915] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21916] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21917] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21918] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21919] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21920] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21921] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21922] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21923] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21924] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21925] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21926] = "cpe-stable-backport: Backported in 6.6.83" + +# CVE-2025-21927 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21928] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21929] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-21930] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-21931] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-21932] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21933] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-21934] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21935] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21936] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21937] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21938] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21939] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-21940] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21941] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21942] = "fixed-version: only affects 6.13.2 onwards" + +CVE_STATUS[CVE-2025-21943] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21944] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21945] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21946] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21947] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21948] = "cpe-stable-backport: Backported in 6.6.83" + +# CVE-2025-21949 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21950] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21951] = "cpe-stable-backport: Backported in 6.6.83" + +CVE_STATUS[CVE-2025-21952] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-21953] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-21954] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21955] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21956] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21957] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21958] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21959] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21960] = "cpe-stable-backport: Backported in 6.6.84" + +# CVE-2025-21961 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21962] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21963] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21964] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21965] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21966] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21967] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21968] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21969] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21970] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21971] = "cpe-stable-backport: Backported in 6.6.84" + +# CVE-2025-21972 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21973] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-21974] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-21975] = "cpe-stable-backport: Backported in 6.6.84" + +# CVE-2025-21976 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21977] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-21978] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21979] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21980] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21981] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21982] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-21983] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21984] = "fixed-version: only affects 6.8 onwards" + +# CVE-2025-21985 needs backporting (fixed from 6.14) + +CVE_STATUS[CVE-2025-21986] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21987] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-21988] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-21989] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-21990] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-21991] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21992] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21993] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-21994] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2025-21995] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2025-21996] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2025-21997] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2025-21998] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-21999] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2025-22000] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-22001] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2025-22002] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-22003] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2025-22004] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2025-22005] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2025-22006] = "fixed-version: only affects 6.12.14 onwards" + +CVE_STATUS[CVE-2025-22007] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2025-22008] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2025-22009] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2025-22010] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2025-22011] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-22012] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-22013] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2025-22014] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2025-22015] = "cpe-stable-backport: Backported in 6.6.85" + +CVE_STATUS[CVE-2025-22016] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-22017] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-22018] = "cpe-stable-backport: Backported in 6.6.86" + +CVE_STATUS[CVE-2025-22019] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-22020] = "cpe-stable-backport: Backported in 6.6.86" + +CVE_STATUS[CVE-2025-22021] = "cpe-stable-backport: Backported in 6.6.86" + +CVE_STATUS[CVE-2025-22022] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-22023] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-22024] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-22025] = "cpe-stable-backport: Backported in 6.6.87" + +# CVE-2025-22026 may need backporting (fixed from 6.6.125) + +CVE_STATUS[CVE-2025-22027] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22028] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-22030] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-22031] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-22032] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-22033] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22034] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-22035] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22036] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-22037] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-22038] = "cpe-stable-backport: Backported in 6.6.87" + +# CVE-2025-22039 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-22040] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22041] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22042] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22043] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22044] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22045] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22046] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-22047] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22048] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22049] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22050] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22051] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-22052] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-22053] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22054] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22055] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22056] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22057] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22058] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22059] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-22060] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22061] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-22062] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-22063] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22064] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22065] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-22066] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22067] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-22068] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-22069] = "fixed-version: only affects 6.14 onwards" + +# CVE-2025-22070 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-22071] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22072] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22073] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22074] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22075] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22076] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-22077] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-22078] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-22079] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22080] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22081] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22082] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-22083] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22084] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-22085] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-22086] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22087] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-22088] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22089] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22090] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22091] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-22092] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-22093] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22094] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-22095] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22096] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-22097] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-22098] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-22099] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-22100] = "fixed-version: only affects 6.13 onwards" + +# CVE-2025-22101 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-22102] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-22103] = "cpe-stable-backport: Backported in 6.6.117" + +# CVE-2025-22104 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-22105] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-22106] = "cpe-stable-backport: Backported in 6.6.108" + +CVE_STATUS[CVE-2025-22107] = "cpe-stable-backport: Backported in 6.6.120" + +# CVE-2025-22108 needs backporting (fixed from 6.15) + +# CVE-2025-22109 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-22110] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-22111] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-22112] = "fixed-version: only affects 6.12 onwards" + +# CVE-2025-22113 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-22114] = "fixed-version: only affects 6.14 onwards" + +# CVE-2025-22115 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-22116] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-22117] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-22118] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-22119] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-22120] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-22121] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-22122] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-22123] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-22124] = "fixed-version: only affects 6.11 onwards" + +# CVE-2025-22125 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-22126] = "cpe-stable-backport: Backported in 6.6.88" + +# CVE-2025-22127 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-22128] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-23129] = "fixed-version: only affects 6.7 onwards" + +# CVE-2025-23130 needs backporting (fixed from 6.15) + +# CVE-2025-23131 needs backporting (fixed from 6.15) + +# CVE-2025-23132 needs backporting (fixed from 6.15) + +# CVE-2025-23133 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-23134] = "fixed-version: only affects 6.9 onwards" + +# CVE-2025-23135 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-23136] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-23137] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-23138] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-23140] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-23141] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-23142] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-23143] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-23144] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-23145] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-23146] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-23147] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-23148] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-23149] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-23150] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-23151] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-23152] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-23153] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-23154] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-23155] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-23156] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-23157] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-23158] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-23159] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-23160] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-23161] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-23162] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-23163] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37738] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37739] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37740] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37741] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37742] = "cpe-stable-backport: Backported in 6.6.88" + +# CVE-2025-37743 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-37744] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-37745] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-37746] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-37747] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-37748] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37749] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37750] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-37751] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-37752] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37754] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37755] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37756] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37757] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37758] = "cpe-stable-backport: Backported in 6.6.88" + +# CVE-2025-37759 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-37760] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-37761] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-37762] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-37763] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-37764] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-37765] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37766] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37767] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37768] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37769] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37770] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37771] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37772] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37773] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37774] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-37775] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37776] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37777] = "cpe-stable-backport: Backported in 6.6.101" + +CVE_STATUS[CVE-2025-37778] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37779] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-37780] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37781] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37783] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-37784] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37785] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-37786] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37787] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37788] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37789] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37790] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37791] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-37792] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37793] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37794] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37796] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37797] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37798] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37799] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37800] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37801] = "cpe-stable-backport: Backported in 6.6.89" + +# CVE-2025-37802 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-37803] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37805] = "cpe-stable-backport: Backported in 6.6.89" + +# CVE-2025-37806 needs backporting (fixed from 6.15) + +# CVE-2025-37807 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-37808] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37809] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-37810] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37811] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37812] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37813] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37814] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-37815] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37816] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-37817] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37818] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37819] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37820] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37821] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-37822] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2025-37823] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37824] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37825] = "fixed-version: only affects 6.14 onwards" + +# CVE-2025-37826 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-37827] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-37828] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37829] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37830] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37831] = "cpe-stable-backport: Backported in 6.6.89" + +# CVE-2025-37833 needs backporting (fixed from 6.15) + +# CVE-2025-37834 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-37836] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37837] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-37838] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37839] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37840] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37841] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37842] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-37843] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-37844] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37845] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-37846] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-37847] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-37848] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-37849] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37850] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37851] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37852] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37853] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37854] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37855] = "fixed-version: only affects 6.14 onwards" + +# CVE-2025-37856 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-37857] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37858] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37859] = "cpe-stable-backport: Backported in 6.6.88" + +# CVE-2025-37860 needs backporting (fixed from 6.15) + +# CVE-2025-37861 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-37862] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37863] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37864] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37865] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37866] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-37867] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37868] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-37869] = "fixed-version: only affects 6.8 onwards" + +# CVE-2025-37870 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-37871] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37872] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-37873] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-37874] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37875] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37876] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-37877] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-37878] = "fixed-version: only affects 6.12.24 onwards" + +CVE_STATUS[CVE-2025-37879] = "cpe-stable-backport: Backported in 6.6.89" + +# CVE-2025-37880 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-37881] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37882] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-37883] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37884] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-37885] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37886] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37887] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37888] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-37889] = "cpe-stable-backport: Backported in 6.6.84" + +CVE_STATUS[CVE-2025-37890] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37891] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37892] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37893] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-37894] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-37895] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-37896] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-37897] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37898] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-37899] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-37900] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-37901] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37903] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37904] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-37905] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37906] = "fixed-version: only affects 6.7 onwards" + +# CVE-2025-37907 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-37908] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-37909] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37910] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-37911] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37912] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37913] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37914] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37915] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37916] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37917] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37918] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37919] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-37920] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2025-37921] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37922] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37923] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37924] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37925] = "cpe-stable-backport: Backported in 6.6.101" + +CVE_STATUS[CVE-2025-37926] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-37927] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37928] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37929] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37930] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37931] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-37932] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37933] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37934] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-37935] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37936] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37937] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-37938] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37939] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-37940] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37941] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-37943] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37944] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37945] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-37946] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-37947] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37948] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37949] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37950] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-37951] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37952] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37953] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37954] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37955] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-37956] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37957] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-37958] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-37959] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37960] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-37961] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37962] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37963] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37964] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37965] = "fixed-version: only affects 6.12.25 onwards" + +CVE_STATUS[CVE-2025-37966] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-37967] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-37968] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-37969] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37970] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37971] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-37972] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37973] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37974] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-37975] = "fixed-version: only affects 6.8 onwards" + +# CVE-2025-37977 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-37978] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-37979] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37980] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37981] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-37982] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-37983] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37984] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-37985] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37986] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-37987] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-37988] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37989] = "cpe-stable-backport: Backported in 6.6.89" + +CVE_STATUS[CVE-2025-37990] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37991] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-37992] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-37993] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-37994] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37995] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37996] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-37997] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37998] = "cpe-stable-backport: Backported in 6.6.91" + +CVE_STATUS[CVE-2025-37999] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38000] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38001] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38002] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38003] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38004] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38005] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-38006] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-38007] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-38008] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-38009] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-38010] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-38011] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-38012] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38013] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-38014] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-38015] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-38016] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38017] = "fixed-version: only affects 6.14.4 onwards" + +CVE_STATUS[CVE-2025-38018] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-38019] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-38020] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-38021] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38022] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-38023] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-38024] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-38025] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38027] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-38028] = "fixed-version: only affects 6.14 onwards" + +# CVE-2025-38029 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-38031] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38032] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38033] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38034] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38035] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38036] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-38037] = "cpe-stable-backport: Backported in 6.6.93" + +# CVE-2025-38038 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-38039] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38040] = "cpe-stable-backport: Backported in 6.6.93" + +# CVE-2025-38041 needs backporting (fixed from 6.15) + +# CVE-2025-38042 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-38043] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38044] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38045] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38047] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-38048] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38049] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-38050] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38051] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38052] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38053] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-38054] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-38055] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38056] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38057] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-38058] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38059] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38060] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-38061] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38062] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38063] = "cpe-stable-backport: Backported in 6.6.93" + +# CVE-2025-38064 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-38065] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38066] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38067] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38068] = "cpe-stable-backport: Backported in 6.6.93" + +# CVE-2025-38069 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-38070] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38071] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38072] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38074] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38075] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38076] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38077] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38078] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38079] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38080] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38081] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38082] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38083] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38084] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38085] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38086] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38087] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38088] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38089] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38090] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38091] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38092] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38093] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38094] = "cpe-stable-backport: Backported in 6.6.92" + +CVE_STATUS[CVE-2025-38095] = "cpe-stable-backport: Backported in 6.6.92" + +# CVE-2025-38096 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-38097] = "cpe-stable-backport: Backported in 6.6.93" + +CVE_STATUS[CVE-2025-38098] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-38099] = "fixed-version: only affects 6.12.24 onwards" + +CVE_STATUS[CVE-2025-38100] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38101] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-38102] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38103] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38104] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2025-38105] = "cpe-stable-backport: Backported in 6.6.111" + +CVE_STATUS[CVE-2025-38106] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-38107] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38108] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38109] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38110] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38111] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38112] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38113] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38114] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38115] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38116] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38117] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38118] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38119] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38120] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38121] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38122] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38123] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38124] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38125] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-38126] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38127] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38128] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38129] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-38130] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38131] = "cpe-stable-backport: Backported in 6.6.94" + +# CVE-2025-38132 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38133] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38134] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38135] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38136] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38137] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38138] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38139] = "fixed-version: only affects 6.12 onwards" + +# CVE-2025-38140 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38141] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-38142] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38143] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38144] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38145] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38146] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38147] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38148] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38149] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38150] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38151] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38152] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-38153] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38154] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38155] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38156] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-38157] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38158] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38159] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38160] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38161] = "cpe-stable-backport: Backported in 6.6.94" + +# CVE-2025-38162 may need backporting (fixed from 6.6.125) + +CVE_STATUS[CVE-2025-38163] = "cpe-stable-backport: Backported in 6.6.94" + +# CVE-2025-38164 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2025-38165] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38166] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38167] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38168] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38169] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-38170] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38171] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38172] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38173] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38174] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38175] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38176] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38177] = "cpe-stable-backport: Backported in 6.6.90" + +CVE_STATUS[CVE-2025-38179] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38180] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38181] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38182] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38183] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38184] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38185] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38186] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-38187] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-38188] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-38189] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-38190] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38191] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38192] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38193] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38194] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38195] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38196] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38197] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38198] = "cpe-stable-backport: Backported in 6.6.95" + +# CVE-2025-38199 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38200] = "cpe-stable-backport: Backported in 6.6.95" + +# CVE-2025-38201 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2025-38202] = "cpe-stable-backport: Backported in 6.6.95" + +# CVE-2025-38203 needs backporting (fixed from 6.16) + +# CVE-2025-38204 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38205] = "fixed-version: only affects 6.7 onwards" + +# CVE-2025-38206 needs backporting (fixed from 6.16) + +# CVE-2025-38207 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38208] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38209] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38210] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-38211] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38212] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38214] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38215] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38216] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38217] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38218] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38219] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38220] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38221] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38222] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38223] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38224] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38225] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38226] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38227] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38228] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38229] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38230] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-38231] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38232] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-38233] = "fixed-version: only affects 6.13 onwards" + +# CVE-2025-38234 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2025-38235] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38236] = "cpe-stable-backport: Backported in 6.6.96" + +# CVE-2025-38237 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38238] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38239] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-38240] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-38241] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38242] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-38243] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38244] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-38245] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-38246] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38247] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38248] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-38249] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-38250] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38251] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-38252] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38253] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-38254] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38255] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-38256] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38257] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-38258] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-38259] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-38260] = "cpe-stable-backport: Backported in 6.6.96" + +# CVE-2025-38261 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38262] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-38263] = "cpe-stable-backport: Backported in 6.6.96" + +# CVE-2025-38264 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38265] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38266] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38267] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-38268] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-38269] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-38270] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-38271] = "fixed-version: only affects 6.15 onwards" + +# CVE-2025-38272 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38273] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38274] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38275] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38276] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38277] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38278] = "cpe-stable-backport: Backported in 6.6.94" + +# CVE-2025-38279 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38280] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38281] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38282] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38283] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38284] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38285] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38286] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38287] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38288] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38289] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38290] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38291] = "fixed-version: only affects 6.13 onwards" + +# CVE-2025-38292 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38293] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38294] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38295] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38296] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38297] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-38298] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38299] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-38300] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38301] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-38302] = "fixed-version: only affects 6.10 onwards" + +# CVE-2025-38303 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38304] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38305] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38306] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38307] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38308] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38309] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38310] = "cpe-stable-backport: Backported in 6.6.94" + +# CVE-2025-38311 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38312] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38313] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38314] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38315] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38316] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38317] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38318] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38319] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38320] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38321] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38322] = "cpe-stable-backport: Backported in 6.6.101" + +CVE_STATUS[CVE-2025-38323] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38324] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38325] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38326] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38327] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38328] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38329] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38330] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38331] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38332] = "cpe-stable-backport: Backported in 6.6.95" + +# CVE-2025-38333 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38334] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38335] = "cpe-stable-backport: Backported in 6.6.101" + +CVE_STATUS[CVE-2025-38336] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38337] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38338] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38339] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38340] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38341] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38342] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38343] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38344] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38345] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38346] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38347] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38348] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38349] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38350] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38351] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38352] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38353] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-38354] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-38355] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38356] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38357] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38358] = "fixed-version: only affects 6.15 onwards" + +# CVE-2025-38359 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38360] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-38361] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-38362] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-38363] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-38364] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38365] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-38366] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38367] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38368] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-38369] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-38370] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38371] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38372] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38373] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38374] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-38375] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38376] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38377] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38378] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38379] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38381] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38382] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38383] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-38384] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38385] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38386] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38387] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38388] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-38389] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38390] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-38391] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38392] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-38393] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38394] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38395] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38396] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38397] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38398] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38399] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38400] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38401] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38402] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-38403] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38404] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38405] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38406] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38407] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-38408] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-38409] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38410] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38411] = "fixed-version: only affects 6.15.3 onwards" + +CVE_STATUS[CVE-2025-38412] = "cpe-stable-backport: Backported in 6.6.97" + +CVE_STATUS[CVE-2025-38413] = "fixed-version: only affects 6.11 onwards" + +# CVE-2025-38414 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38415] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38416] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38417] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38418] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38419] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38420] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38421] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38422] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38423] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38424] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38425] = "cpe-stable-backport: Backported in 6.6.95" + +# CVE-2025-38426 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2025-38427] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38428] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38429] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38430] = "cpe-stable-backport: Backported in 6.6.95" + +CVE_STATUS[CVE-2025-38431] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38432] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38433] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38434] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-38435] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38436] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-38437] = "cpe-stable-backport: Backported in 6.6.99" + +# CVE-2025-38438 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38439] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38440] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-38441] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38442] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38443] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38444] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38445] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38446] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-38447] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38448] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38449] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38450] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38451] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38452] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38453] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38454] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38455] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38456] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38457] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38458] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38459] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38460] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38461] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38462] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38463] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38464] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38465] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38466] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38467] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38468] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38469] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38470] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38471] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38472] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38473] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38474] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38475] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38476] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38477] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38478] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38479] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38480] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38481] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38482] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38483] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38484] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38485] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38486] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38487] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38488] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38489] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38490] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38491] = "cpe-stable-backport: Backported in 6.6.101" + +CVE_STATUS[CVE-2025-38492] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38493] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38494] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38495] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38496] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38497] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38498] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-38499] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38500] = "cpe-stable-backport: Backported in 6.6.101" + +CVE_STATUS[CVE-2025-38501] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38502] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-38503] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38504] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38505] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38506] = "fixed-version: only affects 6.8 onwards" + +# CVE-2025-38507 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38508] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38509] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38510] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38511] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-38512] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38513] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38514] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38515] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38516] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38517] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-38518] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38519] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38520] = "cpe-stable-backport: Backported in 6.6.101" + +CVE_STATUS[CVE-2025-38521] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-38522] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38523] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38524] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38525] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38526] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38527] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38528] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38529] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38530] = "cpe-stable-backport: Backported in 6.6.100" + +# CVE-2025-38531 needs backporting (fixed from 6.16) + +CVE_STATUS[CVE-2025-38532] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38533] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38534] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38535] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38536] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38537] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38538] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38539] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38540] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38541] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-38542] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38543] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38544] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38545] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-38546] = "cpe-stable-backport: Backported in 6.6.99" + +CVE_STATUS[CVE-2025-38547] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38548] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38549] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-38550] = "cpe-stable-backport: Backported in 6.6.100" + +CVE_STATUS[CVE-2025-38551] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38552] = "cpe-stable-backport: Backported in 6.6.101" + +CVE_STATUS[CVE-2025-38553] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38554] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38555] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38556] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-38557] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38558] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38559] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38560] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38561] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38562] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38563] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38564] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38565] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38566] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38567] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38568] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38569] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38570] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38571] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38572] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38573] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38574] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-38576] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38577] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38578] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38579] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38580] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38581] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38582] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38583] = "cpe-stable-backport: Backported in 6.6.102" + +# CVE-2025-38584 needs backporting (fixed from 6.17) + +# CVE-2025-38585 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-38586] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38587] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38588] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38589] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38590] = "cpe-stable-backport: Backported in 6.6.102" + +# CVE-2025-38591 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-38592] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38593] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-38594] = "fixed-version: only affects 6.16 onwards" + +# CVE-2025-38595 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-38596] = "fixed-version: only affects 6.16 onwards" + +# CVE-2025-38597 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-38598] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-38599] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38600] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-38601] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38602] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38604] = "cpe-stable-backport: Backported in 6.6.102" + +# CVE-2025-38605 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-38606] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38607] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38608] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38609] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38610] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38612] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38613] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38614] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38615] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38616] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38617] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38618] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38619] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-38620] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-38621] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-38622] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38623] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38624] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38625] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38626] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38627] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-38628] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38629] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38630] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38631] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-38632] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38633] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-38634] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38635] = "cpe-stable-backport: Backported in 6.6.102" + +# CVE-2025-38636 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-38637] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-38638] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-38639] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38640] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38641] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-38642] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38643] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-38644] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38645] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38646] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38647] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-38648] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38649] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38650] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38651] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38652] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38653] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-38654] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38655] = "fixed-version: only affects 6.13 onwards" + +# CVE-2025-38656 has no known resolution + +CVE_STATUS[CVE-2025-38657] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-38658] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38659] = "cpe-stable-backport: Backported in 6.6.102" + +# CVE-2025-38660 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-38661] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38662] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38663] = "cpe-stable-backport: Backported in 6.6.101" + +CVE_STATUS[CVE-2025-38664] = "cpe-stable-backport: Backported in 6.6.101" + +CVE_STATUS[CVE-2025-38665] = "cpe-stable-backport: Backported in 6.6.101" + +CVE_STATUS[CVE-2025-38666] = "cpe-stable-backport: Backported in 6.6.101" + +CVE_STATUS[CVE-2025-38667] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38668] = "cpe-stable-backport: Backported in 6.6.101" + +CVE_STATUS[CVE-2025-38669] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38670] = "cpe-stable-backport: Backported in 6.6.101" + +CVE_STATUS[CVE-2025-38671] = "cpe-stable-backport: Backported in 6.6.101" + +CVE_STATUS[CVE-2025-38672] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38673] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38674] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38675] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38676] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38677] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38678] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-38679] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38680] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38681] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38682] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-38683] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38684] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38685] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38686] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-38687] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38688] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38689] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-38690] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-38691] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38692] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38693] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38694] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38695] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38696] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38697] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38698] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38699] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38700] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38701] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38702] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38703] = "fixed-version: only affects 6.8 onwards" + +# CVE-2025-38704 may need backporting (fixed from 6.6.130) + +# CVE-2025-38705 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-38706] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38707] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38708] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38709] = "cpe-stable-backport: Backported in 6.6.109" + +# CVE-2025-38710 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-38711] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38712] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38713] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38714] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38715] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38716] = "cpe-stable-backport: Backported in 6.6.103" + +# CVE-2025-38717 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-38718] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38719] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-38720] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-38721] = "cpe-stable-backport: Backported in 6.6.103" + +# CVE-2025-38722 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-38723] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38724] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38725] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38726] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-38727] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38728] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38729] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38730] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38731] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-38732] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38733] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-38734] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38735] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-38736] = "fixed-version: only affects 6.12.43 onwards" + +CVE_STATUS[CVE-2025-38737] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-39673] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39674] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39675] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39676] = "cpe-stable-backport: Backported in 6.6.103" + +# CVE-2025-39677 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39678] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-39679] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39680] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-39681] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39682] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39683] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39684] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39685] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39686] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39687] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39688] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-39689] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39690] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39691] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39692] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39693] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39694] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39695] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-39696] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39697] = "cpe-stable-backport: Backported in 6.6.104" + +CVE_STATUS[CVE-2025-39698] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-39699] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-39700] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-39701] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39702] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39703] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39704] = "fixed-version: only affects 6.13 onwards" + +# CVE-2025-39705 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39706] = "cpe-stable-backport: Backported in 6.6.103" + +# CVE-2025-39707 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39708] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39709] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39710] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39711] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39712] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-39713] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39714] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39715] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39716] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39717] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39718] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39719] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39720] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39721] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39722] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-39723] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-39724] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39725] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-39726] = "cpe-stable-backport: Backported in 6.6.101" + +CVE_STATUS[CVE-2025-39727] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-39728] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-39729] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39730] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-39731] = "cpe-stable-backport: Backported in 6.6.102" + +# CVE-2025-39732 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39733] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39734] = "cpe-stable-backport: Backported in 6.6.102" + +CVE_STATUS[CVE-2025-39735] = "cpe-stable-backport: Backported in 6.6.87" + +CVE_STATUS[CVE-2025-39736] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39737] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39738] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39739] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39740] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39741] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39742] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39743] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39744] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39745] = "fixed-version: only affects 6.14 onwards" + +# CVE-2025-39746 needs backporting (fixed from 6.17) + +# CVE-2025-39747 needs backporting (fixed from 6.17) + +# CVE-2025-39748 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2025-39749] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39750] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39752] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39753] = "fixed-version: only affects 6.12 onwards" + +# CVE-2025-39754 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39755] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-39756] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39757] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39758] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39759] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39760] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39761] = "cpe-stable-backport: Backported in 6.6.103" + +# CVE-2025-39762 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39763] = "cpe-stable-backport: Backported in 6.6.103" + +# CVE-2025-39764 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2025-39765] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-39766] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39767] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39768] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39769] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39770] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39771] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39772] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39773] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39774] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-39775] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-39776] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39777] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39778] = "fixed-version: only affects 6.11 onwards" + +# CVE-2025-39779 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39780] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-39781] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39782] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39783] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39784] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-39785] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39786] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-39787] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39788] = "cpe-stable-backport: Backported in 6.6.103" + +# CVE-2025-39789 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39790] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39791] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-39792] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-39793] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-39794] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39795] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39796] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39797] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39798] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39800] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39801] = "cpe-stable-backport: Backported in 6.6.103" + +CVE_STATUS[CVE-2025-39802] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39803] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-39804] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39805] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-39806] = "cpe-stable-backport: Backported in 6.6.104" + +CVE_STATUS[CVE-2025-39807] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-39808] = "cpe-stable-backport: Backported in 6.6.104" + +CVE_STATUS[CVE-2025-39809] = "fixed-version: only affects 6.14 onwards" + +# CVE-2025-39810 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39811] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-39812] = "cpe-stable-backport: Backported in 6.6.104" + +CVE_STATUS[CVE-2025-39813] = "cpe-stable-backport: Backported in 6.6.104" + +CVE_STATUS[CVE-2025-39814] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39815] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-39816] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-39817] = "cpe-stable-backport: Backported in 6.6.104" + +CVE_STATUS[CVE-2025-39818] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-39819] = "cpe-stable-backport: Backported in 6.6.104" + +CVE_STATUS[CVE-2025-39820] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39821] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39822] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39823] = "cpe-stable-backport: Backported in 6.6.104" + +CVE_STATUS[CVE-2025-39824] = "cpe-stable-backport: Backported in 6.6.104" + +CVE_STATUS[CVE-2025-39825] = "cpe-stable-backport: Backported in 6.6.104" + +CVE_STATUS[CVE-2025-39826] = "cpe-stable-backport: Backported in 6.6.104" + +CVE_STATUS[CVE-2025-39827] = "cpe-stable-backport: Backported in 6.6.104" + +CVE_STATUS[CVE-2025-39828] = "cpe-stable-backport: Backported in 6.6.104" + +# CVE-2025-39829 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39830] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-39831] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-39832] = "cpe-stable-backport: Backported in 6.6.104" + +# CVE-2025-39833 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39834] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-39835] = "cpe-stable-backport: Backported in 6.6.104" + +CVE_STATUS[CVE-2025-39836] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-39837] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39838] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-39839] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39840] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-39841] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39842] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39843] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39844] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39845] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39846] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39847] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39848] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39849] = "cpe-stable-backport: Backported in 6.6.105" + +# CVE-2025-39850 needs backporting (fixed from 6.17) + +# CVE-2025-39851 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39852] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-39853] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39854] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-39855] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39856] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39857] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39858] = "fixed-version: only affects 6.15 onwards" + +# CVE-2025-39859 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39860] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39861] = "cpe-stable-backport: Backported in 6.6.105" + +# CVE-2025-39862 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39863] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39864] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39865] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39866] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39868] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39869] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-39870] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-39871] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-39872] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-39873] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-39874] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39875] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-39876] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-39877] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-39878] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39879] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39880] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-39881] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-39882] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-39883] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-39884] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-39885] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-39886] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-39887] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39888] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39889] = "cpe-stable-backport: Backported in 6.6.88" + +CVE_STATUS[CVE-2025-39890] = "cpe-stable-backport: Backported in 6.6.94" + +CVE_STATUS[CVE-2025-39891] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39892] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39893] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39894] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39895] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39896] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-39897] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-39899] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-39900] = "fixed-version: only affects 6.12 onwards" + +# CVE-2025-39901 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39902] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39903] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-39904] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39905] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-39906] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39907] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-39908] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39909] = "cpe-stable-backport: Backported in 6.6.107" + +# CVE-2025-39910 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39911] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-39912] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-39913] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-39914] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-39915] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-39916] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-39917] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-39918] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-39919] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39920] = "cpe-stable-backport: Backported in 6.6.105" + +CVE_STATUS[CVE-2025-39921] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-39922] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-39923] = "cpe-stable-backport: Backported in 6.6.107" + +CVE_STATUS[CVE-2025-39924] = "fixed-version: only affects 6.15 onwards" + +# CVE-2025-39925 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39926] = "fixed-version: only affects 6.9 onwards" + +# CVE-2025-39927 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39928] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-39929] = "cpe-stable-backport: Backported in 6.6.108" + +CVE_STATUS[CVE-2025-39930] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-39931] = "cpe-stable-backport: Backported in 6.6.108" + +# CVE-2025-39932 needs backporting (fixed from 6.17) + +# CVE-2025-39933 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39934] = "cpe-stable-backport: Backported in 6.6.108" + +CVE_STATUS[CVE-2025-39935] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-39936] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39937] = "cpe-stable-backport: Backported in 6.6.108" + +CVE_STATUS[CVE-2025-39938] = "cpe-stable-backport: Backported in 6.6.108" + +CVE_STATUS[CVE-2025-39939] = "fixed-version: only affects 6.15 onwards" + +# CVE-2025-39940 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39941] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-39942] = "cpe-stable-backport: Backported in 6.6.108" + +CVE_STATUS[CVE-2025-39943] = "cpe-stable-backport: Backported in 6.6.108" + +CVE_STATUS[CVE-2025-39944] = "cpe-stable-backport: Backported in 6.6.108" + +CVE_STATUS[CVE-2025-39945] = "cpe-stable-backport: Backported in 6.6.108" + +CVE_STATUS[CVE-2025-39946] = "cpe-stable-backport: Backported in 6.6.108" + +CVE_STATUS[CVE-2025-39947] = "cpe-stable-backport: Backported in 6.6.108" + +CVE_STATUS[CVE-2025-39948] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-39949] = "cpe-stable-backport: Backported in 6.6.108" + +CVE_STATUS[CVE-2025-39950] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-39951] = "cpe-stable-backport: Backported in 6.6.108" + +CVE_STATUS[CVE-2025-39952] = "cpe-stable-backport: Backported in 6.6.108" + +CVE_STATUS[CVE-2025-39953] = "cpe-stable-backport: Backported in 6.6.108" + +CVE_STATUS[CVE-2025-39954] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39955] = "cpe-stable-backport: Backported in 6.6.108" + +CVE_STATUS[CVE-2025-39956] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-39957] = "cpe-stable-backport: Backported in 6.6.108" + +# CVE-2025-39958 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39959] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39960] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39961] = "cpe-stable-backport: Backported in 6.6.108" + +CVE_STATUS[CVE-2025-39962] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39963] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-39964] = "cpe-stable-backport: Backported in 6.6.108" + +CVE_STATUS[CVE-2025-39965] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-39966] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-39967] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-39968] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-39969] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-39970] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-39971] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-39972] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-39973] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-39974] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39975] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-39976] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39977] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-39978] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-39979] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-39980] = "cpe-stable-backport: Backported in 6.6.109" + +# CVE-2025-39981 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39982] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-39983] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-39984] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-39985] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-39986] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-39987] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-39988] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-39989] = "cpe-stable-backport: Backported in 6.6.89" + +# CVE-2025-39990 needs backporting (fixed from 6.17) + +CVE_STATUS[CVE-2025-39991] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-39992] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-39993] = "cpe-stable-backport: Backported in 6.6.110" + +CVE_STATUS[CVE-2025-39994] = "cpe-stable-backport: Backported in 6.6.111" + +CVE_STATUS[CVE-2025-39995] = "cpe-stable-backport: Backported in 6.6.111" + +CVE_STATUS[CVE-2025-39996] = "cpe-stable-backport: Backported in 6.6.110" + +CVE_STATUS[CVE-2025-39997] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-39998] = "cpe-stable-backport: Backported in 6.6.110" + +CVE_STATUS[CVE-2025-39999] = "fixed-version: only affects 6.16 onwards" + +# CVE-2025-40000 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40001] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40002] = "fixed-version: only affects 6.14 onwards" + +# CVE-2025-40003 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40004] = "fixed-version: only affects 6.12 onwards" + +# CVE-2025-40005 may need backporting (fixed from 6.6.125) + +CVE_STATUS[CVE-2025-40006] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-40007] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-40008] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-40009] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-40010] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-40011] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-40012] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-40013] = "cpe-stable-backport: Backported in 6.6.110" + +CVE_STATUS[CVE-2025-40014] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-40015] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-40016] = "cpe-stable-backport: Backported in 6.6.110" + +CVE_STATUS[CVE-2025-40017] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-40018] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40019] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40020] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-40021] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-40022] = "cpe-stable-backport: Backported in 6.6.109" + +CVE_STATUS[CVE-2025-40023] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-40024] = "cpe-stable-backport: Backported in 6.6.109" + +# CVE-2025-40025 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40026] = "cpe-stable-backport: Backported in 6.6.111" + +CVE_STATUS[CVE-2025-40027] = "cpe-stable-backport: Backported in 6.6.111" + +CVE_STATUS[CVE-2025-40028] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-40029] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40030] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40031] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-40032] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40033] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40034] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-40035] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40036] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40037] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-40038] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40039] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2025-40040] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40041] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40042] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40043] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40044] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40045] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-40046] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-40047] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-40048] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40049] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40050] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40051] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40052] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40053] = "cpe-stable-backport: Backported in 6.6.112" + +# CVE-2025-40054 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40055] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40056] = "cpe-stable-backport: Backported in 6.6.112" + +# CVE-2025-40057 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40058] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-40059] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-40060] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40061] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40062] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40063] = "fixed-version: only affects 6.16 onwards" + +# CVE-2025-40064 needs backporting (fixed from 6.18) + +# CVE-2025-40065 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40066] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-40067] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40068] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40069] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40070] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40071] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40072] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-40073] = "fixed-version: only affects 6.16 onwards" + +# CVE-2025-40074 needs backporting (fixed from 6.18) + +# CVE-2025-40075 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40076] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40077] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40078] = "cpe-stable-backport: Backported in 6.6.112" + +# CVE-2025-40079 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40080] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40081] = "cpe-stable-backport: Backported in 6.6.112" + +# CVE-2025-40082 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2025-40083] = "cpe-stable-backport: Backported in 6.6.116" + +CVE_STATUS[CVE-2025-40084] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-40085] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40086] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-40087] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40088] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40089] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-40090] = "fixed-version: only affects 6.12.53 onwards" + +CVE_STATUS[CVE-2025-40091] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-40092] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40093] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40094] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40095] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40096] = "cpe-stable-backport: Backported in 6.6.114" + +# CVE-2025-40097 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40098] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-40099] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40100] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40101] = "fixed-version: only affects 6.8 onwards" + +# CVE-2025-40102 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40103] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40104] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40105] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40106] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-40107] = "cpe-stable-backport: Backported in 6.6.111" + +CVE_STATUS[CVE-2025-40108] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40109] = "cpe-stable-backport: Backported in 6.6.111" + +CVE_STATUS[CVE-2025-40110] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40111] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40112] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40113] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-40114] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-40115] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40116] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40117] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40118] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40119] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40120] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40121] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40122] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-40123] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40124] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40125] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40126] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40127] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40129] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40130] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-40131] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-40132] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-40133] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-40134] = "cpe-stable-backport: Backported in 6.6.112" + +# CVE-2025-40135 may need backporting (fixed from 6.6.130) + +# CVE-2025-40136 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40137] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40138] = "fixed-version: only affects 6.17 onwards" + +# CVE-2025-40139 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40140] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40141] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40142] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-40143] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40145] = "fixed-version: only affects 6.15 onwards" + +# CVE-2025-40146 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40147] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-40148] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-40149] = "cpe-stable-backport: Backported in 6.6.121" + +# CVE-2025-40150 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2025-40151] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40152] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40153] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40154] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40155] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-40156] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40157] = "cpe-stable-backport: Backported in 6.6.112" + +# CVE-2025-40158 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40159] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-40160] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40161] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-40162] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-40163] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40164] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-40165] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40166] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-40167] = "cpe-stable-backport: Backported in 6.6.114" + +# CVE-2025-40168 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40169] = "cpe-stable-backport: Backported in 6.6.112" + +# CVE-2025-40170 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40171] = "cpe-stable-backport: Backported in 6.6.112" + +CVE_STATUS[CVE-2025-40172] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40173] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40174] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-40175] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-40176] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40177] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-40178] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40179] = "cpe-stable-backport: Backported in 6.6.113" + +# CVE-2025-40180 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40181] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-40182] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-40183] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40184] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-40185] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-40186] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40187] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40188] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40189] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-40190] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40191] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-40192] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40193] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40194] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40195] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-40196] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40197] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40198] = "cpe-stable-backport: Backported in 6.6.114" + +CVE_STATUS[CVE-2025-40199] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-40200] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40201] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40202] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40203] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-40204] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40205] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40206] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40207] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40208] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-40209] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-40210] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40211] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40212] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-40213] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40214] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40215] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-40216] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-40217] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-40218] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40219] = "cpe-stable-backport: Backported in 6.6.113" + +CVE_STATUS[CVE-2025-40220] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-40221] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-40222] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40223] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-40224] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-40225] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-40226] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-40227] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-40228] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-40229] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-40230] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-40231] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-40232] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40233] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-40234] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-40235] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-40236] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40237] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-40238] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-40239] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-40240] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-40241] = "fixed-version: only affects 6.15 onwards" + +# CVE-2025-40242 may need backporting (fixed from 6.6.131) + +CVE_STATUS[CVE-2025-40243] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-40244] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-40245] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-40246] = "fixed-version: only affects 6.10 onwards" + +# CVE-2025-40247 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40248] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-40249] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-40250] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-40251] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-40252] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-40253] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-40254] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-40255] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-40256] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-40257] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-40258] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-40259] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-40260] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-40261] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-40262] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-40263] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-40264] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-40265] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-40266] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-40267] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-40268] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40269] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40270] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-40271] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40272] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40273] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40274] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-40275] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40276] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-40277] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40278] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40279] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40280] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40281] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40282] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40283] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40284] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40285] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40286] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40287] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-40288] = "cpe-stable-backport: Backported in 6.6.117" + +# CVE-2025-40289 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40290] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40291] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-40292] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40293] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40294] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40295] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-40296] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-40297] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40298] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40299] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40300] = "cpe-stable-backport: Backported in 6.6.106" + +CVE_STATUS[CVE-2025-40301] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40302] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-40303] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40304] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40305] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-40306] = "cpe-stable-backport: Backported in 6.6.117" + +# CVE-2025-40307 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40308] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40309] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-40310] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40311] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40312] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40313] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40314] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40315] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40316] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40317] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40318] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40319] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40320] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40321] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40322] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40323] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40324] = "cpe-stable-backport: Backported in 6.6.117" + +# CVE-2025-40325 needs backporting (fixed from 6.15) + +CVE_STATUS[CVE-2025-40326] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-40327] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-40328] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40329] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40330] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-40331] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40332] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-40333] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40334] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-40335] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-40336] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-40337] = "cpe-stable-backport: Backported in 6.6.117" + +# CVE-2025-40338 needs backporting (fixed from 6.18) + +# CVE-2025-40339 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40340] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-40341] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40342] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40343] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40344] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-40345] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-40346] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-40347] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-40348] = "fixed-version: only affects 6.12.54 onwards" + +CVE_STATUS[CVE-2025-40349] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-40350] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-40351] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-40352] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-40353] = "fixed-version: only affects 6.11 onwards" + +# CVE-2025-40354 needs backporting (fixed from 6.18) + +# CVE-2025-40355 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-40356] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-40357] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-40358] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40359] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-40360] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40362] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-40363] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-40364] = "cpe-stable-backport: Backported in 6.6.78" + +CVE_STATUS[CVE-2025-68167] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-68168] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68169] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-68170] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-68171] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68172] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68173] = "cpe-stable-backport: Backported in 6.6.117" + +# CVE-2025-68174 needs backporting (fixed from 6.18) + +# CVE-2025-68175 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-68176] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68177] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68178] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68179] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68180] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-68181] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-68182] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-68183] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68184] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68185] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68186] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-68187] = "fixed-version: only affects 6.17 onwards" + +# CVE-2025-68188 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-68189] = "fixed-version: only affects 6.17 onwards" + +# CVE-2025-68190 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-68191] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68192] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68193] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-68194] = "cpe-stable-backport: Backported in 6.6.117" + +# CVE-2025-68195 has no known resolution + +CVE_STATUS[CVE-2025-68196] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-68197] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-68198] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-68199] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-68200] = "cpe-stable-backport: Backported in 6.6.117" + +# CVE-2025-68201 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-68202] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-68204] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-68205] = "fixed-version: only affects 6.17 onwards" + +# CVE-2025-68206 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2025-68207] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-68208] = "cpe-stable-backport: Backported in 6.6.117" + +# CVE-2025-68209 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-68210] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-68211] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2025-68212] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-68213] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-68214] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-68215] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-68216] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-68217] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-68218] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-68219] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-68220] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-68221] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-68222] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-68223] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2025-68225] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-68226] = "fixed-version: only affects 6.17.8 onwards" + +CVE_STATUS[CVE-2025-68227] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-68228] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-68229] = "cpe-stable-backport: Backported in 6.6.118" + +# CVE-2025-68230 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-68231] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-68232] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-68233] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-68234] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-68235] = "cpe-stable-backport: Backported in 6.6.118" + +# CVE-2025-68236 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-68237] = "cpe-stable-backport: Backported in 6.6.118" + +CVE_STATUS[CVE-2025-68238] = "cpe-stable-backport: Backported in 6.6.118" + +# CVE-2025-68239 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2025-68240] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-68241] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68242] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-68243] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-68244] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68245] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68246] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68247] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-68248] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-68249] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-68250] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-68251] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-68252] = "cpe-stable-backport: Backported in 6.6.115" + +CVE_STATUS[CVE-2025-68253] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-68254] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68255] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68256] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68257] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68258] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68259] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68260] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-68261] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68262] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-68263] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68264] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68265] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68266] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68281] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-68282] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68283] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68284] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68285] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68286] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68287] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68288] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68289] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68290] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68291] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68292] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-68293] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-68294] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-68295] = "cpe-stable-backport: Backported in 6.6.119" + +# CVE-2025-68296 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-68297] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68298] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-68299] = "fixed-version: only affects 6.17.9 onwards" + +CVE_STATUS[CVE-2025-68300] = "fixed-version: only affects 6.12.59 onwards" + +CVE_STATUS[CVE-2025-68301] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68302] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68303] = "cpe-stable-backport: Backported in 6.6.119" + +# CVE-2025-68304 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-68305] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68306] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-68307] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68308] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68309] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-68310] = "cpe-stable-backport: Backported in 6.6.117" + +# CVE-2025-68311 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-68312] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68313] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-68314] = "fixed-version: only affects 6.17 onwards" + +# CVE-2025-68315 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-68316] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-68317] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-68318] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-68319] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-68320] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68321] = "cpe-stable-backport: Backported in 6.6.117" + +# CVE-2025-68322 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-68323] = "fixed-version: only affects 6.16 onwards" + +# CVE-2025-68324 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2025-68325] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68326] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-68327] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68328] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68329] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-68330] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68331] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68332] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68333] = "fixed-version: only affects 6.12 onwards" + +# CVE-2025-68334 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2025-68335] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68336] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68337] = "cpe-stable-backport: Backported in 6.6.120" + +# CVE-2025-68338 needs backporting (fixed from 6.18) + +CVE_STATUS[CVE-2025-68339] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68340] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2025-68341] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-68342] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68343] = "cpe-stable-backport: Backported in 6.6.119" + +CVE_STATUS[CVE-2025-68344] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68345] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68346] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68347] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68348] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-68349] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68350] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-68351] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-68352] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-68353] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2025-68354] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68355] = "fixed-version: only affects 6.18 onwards" + +# CVE-2025-68356 needs backporting (fixed from 6.19) + +# CVE-2025-68357 may need backporting (fixed from 6.6.130) + +# CVE-2025-68358 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2025-68359] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-68360] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-68361] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-68362] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68363] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68364] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68365] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-68366] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68367] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68368] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-68369] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68370] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-68371] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68372] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68373] = "fixed-version: only affects 6.17 onwards" + +# CVE-2025-68374 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2025-68375] = "fixed-version: only affects 6.16 onwards" + +# CVE-2025-68376 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2025-68377] = "fixed-version: only affects 6.18 onwards" + +# CVE-2025-68378 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2025-68379] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68380] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68724] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68725] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-68726] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-68727] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68728] = "cpe-stable-backport: Backported in 6.6.120" + +# CVE-2025-68729 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2025-68730] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-68731] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-68732] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68733] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68734] = "cpe-stable-backport: Backported in 6.6.117" + +CVE_STATUS[CVE-2025-68735] = "fixed-version: only affects 6.10 onwards" + +# CVE-2025-68736 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2025-68737] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-68738] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-68739] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-68740] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68741] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68742] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68743] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-68744] = "cpe-stable-backport: Backported in 6.6.120" + +# CVE-2025-68745 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2025-68746] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68747] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-68748] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-68749] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-68750] = "cpe-stable-backport: Backported in 6.6.96" + +CVE_STATUS[CVE-2025-68751] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-68752] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-68753] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68754] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-68755] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68756] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68757] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68758] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68759] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68760] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-68761] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-68762] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-68763] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68764] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68765] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68766] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68767] = "cpe-stable-backport: Backported in 6.6.120" + +# CVE-2025-68768 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2025-68769] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68770] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-68771] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68772] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68773] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68774] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68775] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68776] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68777] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68778] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68779] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-68780] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68781] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68782] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68783] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68784] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-68785] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68786] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68787] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68788] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68790] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-68791] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-68792] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-68793] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-68794] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68795] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68796] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68797] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68798] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68799] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68800] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68801] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68802] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-68803] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2025-68804] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68805] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2025-68806] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68807] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-68808] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68809] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68810] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-68811] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2025-68812] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-68813] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68814] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68815] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68816] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68817] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68818] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68819] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68820] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-68821] = "cpe-stable-backport: Backported in 6.6.120" + +# CVE-2025-68822 needs backporting (fixed from 6.19) + +# CVE-2025-68823 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2025-71064] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71065] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71066] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71067] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71068] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71069] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71070] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-71071] = "cpe-stable-backport: Backported in 6.6.120" + +# CVE-2025-71072 needs backporting (fixed from 6.19) + +# CVE-2025-71073 needs backporting (fixed from 6.19) + +# CVE-2025-71074 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2025-71075] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71076] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-71077] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71078] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71079] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71080] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-71081] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71082] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71083] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71084] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71085] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71086] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71087] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71088] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71089] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71090] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-71091] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71092] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-71093] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71094] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71095] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71096] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71097] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71098] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71099] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-71100] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-71101] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71102] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71103] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-71104] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71105] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71106] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-71107] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71108] = "cpe-stable-backport: Backported in 6.6.120" + +# CVE-2025-71109 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2025-71110] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-71111] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71112] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71113] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71114] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71115] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-71116] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71117] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-71118] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71119] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71120] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71121] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71122] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71123] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71124] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-71125] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71126] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71127] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71128] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-71129] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71130] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71131] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71132] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71133] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71134] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2025-71135] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2025-71136] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71137] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71138] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71139] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2025-71140] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71141] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71142] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2025-71143] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71144] = "cpe-stable-backport: Backported in 6.6.120" + +# CVE-2025-71145 has no known resolution + +CVE_STATUS[CVE-2025-71146] = "fixed-version: only affects 6.12.63 onwards" + +CVE_STATUS[CVE-2025-71147] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71148] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71149] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71150] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71151] = "cpe-stable-backport: Backported in 6.6.120" + +# CVE-2025-71152 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2025-71153] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71154] = "cpe-stable-backport: Backported in 6.6.120" + +CVE_STATUS[CVE-2025-71155] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-71156] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2025-71157] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2025-71158] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-71159] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-71160] = "cpe-stable-backport: Backported in 6.6.121" + +# CVE-2025-71161 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2025-71162] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-71163] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-71180] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2025-71181] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2025-71182] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2025-71183] = "cpe-stable-backport: Backported in 6.6.121" + +# CVE-2025-71184 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2025-71185] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-71186] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-71187] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2025-71188] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-71189] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-71190] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-71191] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-71192] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2025-71193] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-71194] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-71195] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-71196] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-71197] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-71198] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-71199] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-71200] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2025-71201] = "fixed-version: only affects 6.14 onwards" + +# CVE-2025-71202 needs backporting (fixed from 6.19) + +# CVE-2025-71203 may need backporting (fixed from 6.6.130) + +# CVE-2025-71204 may need backporting (fixed from 6.6.124) + +# CVE-2025-71220 may need backporting (fixed from 6.6.124) + +# CVE-2025-71221 may need backporting (fixed from 6.6.130) + +# CVE-2025-71222 may need backporting (fixed from 6.6.124) + +# CVE-2025-71223 may need backporting (fixed from 6.6.124) + +# CVE-2025-71224 may need backporting (fixed from 6.6.124) + +# CVE-2025-71225 needs backporting (fixed from 6.19) + +# CVE-2025-71227 needs backporting (fixed from 6.19) + +# CVE-2025-71229 may need backporting (fixed from 6.6.125) + +CVE_STATUS[CVE-2025-71230] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2025-71231] = "fixed-version: only affects 6.8 onwards" + +# CVE-2025-71232 may need backporting (fixed from 6.6.125) + +# CVE-2025-71233 may need backporting (fixed from 6.6.127) + +CVE_STATUS[CVE-2025-71234] = "fixed-version: only affects 6.9 onwards" + +# CVE-2025-71235 may need backporting (fixed from 6.6.125) + +# CVE-2025-71236 may need backporting (fixed from 6.6.125) + +# CVE-2025-71237 may need backporting (fixed from 6.6.125) + +# CVE-2025-71238 may need backporting (fixed from 6.6.127) + +# CVE-2025-71239 may need backporting (fixed from 6.6.128) + +# CVE-2025-71265 may need backporting (fixed from 6.6.128) + +# CVE-2025-71266 may need backporting (fixed from 6.6.128) + +# CVE-2025-71267 may need backporting (fixed from 6.6.128) + +# CVE-2025-71268 may need backporting (fixed from 6.6.124) + +# CVE-2025-71269 needs backporting (fixed from 6.19) + +# CVE-2025-71270 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2026-22978] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2026-22979] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2026-22980] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2026-22981] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2026-22982] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2026-22983] = "fixed-version: only affects 6.18.4 onwards" + +CVE_STATUS[CVE-2026-22984] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2026-22985] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2026-22986] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2026-22987] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-22988] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2026-22989] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2026-22990] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2026-22991] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2026-22992] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2026-22993] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2026-22994] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2026-22995] = "fixed-version: only affects 6.18.4 onwards" + +# CVE-2026-22996 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-22997] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-22998] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-22999] = "cpe-stable-backport: Backported in 6.6.122" + +# CVE-2026-23000 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23001] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23002] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2026-23003] = "cpe-stable-backport: Backported in 6.6.122" + +# CVE-2026-23004 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23005] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23006] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23007] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2026-23008] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23009] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23010] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23011] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23012] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23013] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2026-23014] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23015] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23016] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23017] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2026-23018] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23019] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2026-23020] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2026-23021] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2026-23022] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23023] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2026-23024] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23025] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23026] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23027] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23028] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23029] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23030] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23031] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23032] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23033] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23034] = "fixed-version: only affects 6.16 onwards" + +# CVE-2026-23035 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23036] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23037] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23038] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23039] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23040] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23041] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23042] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23043] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23044] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23045] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23046] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23047] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2026-23048] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23049] = "cpe-stable-backport: Backported in 6.6.122" + +# CVE-2026-23050 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23051] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23052] = "fixed-version: only affects 6.15 onwards" + +# CVE-2026-23053 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23054] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23055] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2026-23056] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23057] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2026-23058] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23059] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23060] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23061] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23062] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23063] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23064] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23065] = "fixed-version: only affects 6.8 onwards" + +# CVE-2026-23066 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23067] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23068] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23069] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23070] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2026-23071] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23072] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2026-23073] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23074] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23075] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23076] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23077] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23078] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23079] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23080] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23081] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23082] = "fixed-version: only affects 6.12.67 onwards" + +CVE_STATUS[CVE-2026-23083] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23084] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23085] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23086] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23087] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23088] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23089] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23090] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23091] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23092] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23093] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2026-23094] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23095] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23096] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23097] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23098] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23099] = "cpe-stable-backport: Backported in 6.6.122" + +# CVE-2026-23100 may need backporting (fixed from 6.6.127) + +CVE_STATUS[CVE-2026-23101] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23102] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2026-23103] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23104] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2026-23105] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23106] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23107] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23108] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23109] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23110] = "cpe-stable-backport: Backported in 6.6.122" + +# CVE-2026-23111 may need backporting (fixed from 6.6.124) + +# CVE-2026-23112 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2026-23113] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23114] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23115] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23116] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23117] = "fixed-version: only affects 6.18.2 onwards" + +# CVE-2026-23118 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23119] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23120] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23121] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23122] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23123] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23124] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23125] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23126] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23127] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23128] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23129] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2026-23130] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23131] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23132] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23133] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23134] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23135] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23136] = "cpe-stable-backport: Backported in 6.6.121" + +# CVE-2026-23137 needs backporting (fixed from 6.19) + +# CVE-2026-23138 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23139] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2026-23140] = "cpe-stable-backport: Backported in 6.6.121" + +CVE_STATUS[CVE-2026-23141] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23142] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23143] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23144] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23145] = "cpe-stable-backport: Backported in 6.6.122" + +CVE_STATUS[CVE-2026-23146] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2026-23147] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23148] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2026-23149] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23150] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2026-23151] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2026-23152] = "fixed-version: only affects 6.7 onwards" + +CVE_STATUS[CVE-2026-23153] = "fixed-version: only affects 6.18 onwards" + +# CVE-2026-23154 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23155] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2026-23156] = "cpe-stable-backport: Backported in 6.6.123" + +# CVE-2026-23157 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23158] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2026-23159] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2026-23160] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2026-23161] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2026-23162] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23163] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2026-23164] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2026-23165] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23166] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2026-23167] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2026-23168] = "cpe-stable-backport: Backported in 6.6.123" + +# CVE-2026-23169 may need backporting (fixed from 6.6.125) + +CVE_STATUS[CVE-2026-23170] = "cpe-stable-backport: Backported in 6.6.123" + +# CVE-2026-23171 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23172] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2026-23173] = "cpe-stable-backport: Backported in 6.6.123" + +CVE_STATUS[CVE-2026-23174] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23175] = "fixed-version: only affects 6.17 onwards" + +# CVE-2026-23176 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2026-23177] = "fixed-version: only affects 6.12 onwards" + +# CVE-2026-23178 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2026-23179] = "fixed-version: only affects 6.7 onwards" + +# CVE-2026-23180 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2026-23181] = "fixed-version: only affects 6.15 onwards" + +# CVE-2026-23182 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2026-23183] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23184] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23185] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23186] = "fixed-version: only affects 6.15 onwards" + +# CVE-2026-23187 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2026-23188] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2026-23189] = "fixed-version: only affects 6.12 onwards" + +# CVE-2026-23190 may need backporting (fixed from 6.6.124) + +# CVE-2026-23191 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23192] = "fixed-version: only affects 6.15 onwards" + +# CVE-2026-23193 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2026-23194] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23195] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23196] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23197] = "fixed-version: only affects 6.13 onwards" + +# CVE-2026-23198 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2026-23199] = "fixed-version: only affects 6.11 onwards" + +# CVE-2026-23200 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2026-23201] = "fixed-version: only affects 6.12 onwards" + +# CVE-2026-23202 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2026-23203] = "fixed-version: only affects 6.17 onwards" + +# CVE-2026-23204 may need backporting (fixed from 6.6.124) + +# CVE-2026-23205 may need backporting (fixed from 6.6.124) + +# CVE-2026-23206 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2026-23207] = "fixed-version: only affects 6.12.63 onwards" + +# CVE-2026-23208 needs backporting (fixed from 6.19) + +# CVE-2026-23209 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2026-23210] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2026-23211] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23212] = "cpe-stable-backport: Backported in 6.6.123" + +# CVE-2026-23213 needs backporting (fixed from 6.19) + +# CVE-2026-23214 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23215] = "fixed-version: only affects 6.11 onwards" + +# CVE-2026-23216 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2026-23217] = "fixed-version: only affects 6.11 onwards" + +CVE_STATUS[CVE-2026-23218] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23219] = "fixed-version: only affects 6.10 onwards" + +# CVE-2026-23220 may need backporting (fixed from 6.6.125) + +# CVE-2026-23221 may need backporting (fixed from 6.6.127) + +# CVE-2026-23222 may need backporting (fixed from 6.6.125) + +CVE_STATUS[CVE-2026-23223] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2026-23224] = "fixed-version: only affects 6.12 onwards" + +CVE_STATUS[CVE-2026-23225] = "fixed-version: only affects 6.19 onwards" + +# CVE-2026-23226 needs backporting (fixed from 7.0rc1) + +# CVE-2026-23227 may need backporting (fixed from 6.6.130) + +# CVE-2026-23228 may need backporting (fixed from 6.6.125) + +# CVE-2026-23229 may need backporting (fixed from 6.6.125) + +# CVE-2026-23230 may need backporting (fixed from 6.6.125) + +# CVE-2026-23231 may need backporting (fixed from 6.6.128) + +CVE_STATUS[CVE-2026-23232] = "fixed-version: only affects 6.19 onwards" + +# CVE-2026-23233 may need backporting (fixed from 6.6.127) + +# CVE-2026-23234 may need backporting (fixed from 6.6.127) + +# CVE-2026-23235 may need backporting (fixed from 6.6.127) + +# CVE-2026-23236 may need backporting (fixed from 6.6.127) + +# CVE-2026-23237 may need backporting (fixed from 6.6.127) + +# CVE-2026-23238 may need backporting (fixed from 6.6.127) + +# CVE-2026-23239 needs backporting (fixed from 7.0rc2) + +# CVE-2026-23240 needs backporting (fixed from 7.0rc2) + +CVE_STATUS[CVE-2026-23241] = "fixed-version: only affects 6.13 onwards" + +# CVE-2026-23242 may need backporting (fixed from 6.6.128) + +# CVE-2026-23243 may need backporting (fixed from 6.6.128) + +# CVE-2026-23244 may need backporting (fixed from 6.6.130) + +# CVE-2026-23245 may need backporting (fixed from 6.6.130) + +# CVE-2026-23246 may need backporting (fixed from 6.6.130) + +# CVE-2026-23247 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23248] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23249] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2026-23250] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2026-23251] = "fixed-version: only affects 6.10 onwards" + +CVE_STATUS[CVE-2026-23252] = "fixed-version: only affects 6.10 onwards" + +# CVE-2026-23253 may need backporting (fixed from 6.6.130) + +# CVE-2026-23254 may need backporting (fixed from 6.6.124) + +# CVE-2026-23255 needs backporting (fixed from 6.19) + +# CVE-2026-23256 may need backporting (fixed from 6.6.124) + +# CVE-2026-23257 may need backporting (fixed from 6.6.124) + +# CVE-2026-23258 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2026-23259] = "fixed-version: only affects 6.10 onwards" + +# CVE-2026-23260 may need backporting (fixed from 6.6.124) + +# CVE-2026-23261 may need backporting (fixed from 6.6.124) + +# CVE-2026-23262 may need backporting (fixed from 6.6.124) + +CVE_STATUS[CVE-2026-23263] = "fixed-version: only affects 6.17 onwards" + +# CVE-2026-23264 may need backporting (fixed from 6.6.124) + +# CVE-2026-23265 needs backporting (fixed from 7.0rc1) + +# CVE-2026-23266 may need backporting (fixed from 6.6.127) + +# CVE-2026-23267 may need backporting (fixed from 6.6.127) + +# CVE-2026-23268 may need backporting (fixed from 6.6.130) + +# CVE-2026-23269 may need backporting (fixed from 6.6.130) + +# CVE-2026-23270 may need backporting (fixed from 6.6.130) + +# CVE-2026-23271 may need backporting (fixed from 6.6.130) + +# CVE-2026-23272 needs backporting (fixed from 7.0rc3) + +# CVE-2026-23273 may need backporting (fixed from 6.6.128) + +# CVE-2026-23274 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23275] = "fixed-version: only affects 6.13 onwards" + +# CVE-2026-23276 needs backporting (fixed from 7.0rc4) + +# CVE-2026-23277 may need backporting (fixed from 6.6.130) + +# CVE-2026-23278 needs backporting (fixed from 7.0rc4) + +# CVE-2026-23279 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23280] = "fixed-version: only affects 6.18 onwards" + +# CVE-2026-23281 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23282] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23283] = "fixed-version: only affects 6.19 onwards" + +# CVE-2026-23284 may need backporting (fixed from 6.6.130) + +# CVE-2026-23285 may need backporting (fixed from 6.6.130) + +# CVE-2026-23286 may need backporting (fixed from 6.6.130) + +# CVE-2026-23287 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23288] = "fixed-version: only affects 6.19 onwards" + +# CVE-2026-23289 may need backporting (fixed from 6.6.130) + +# CVE-2026-23290 may need backporting (fixed from 6.6.130) + +# CVE-2026-23291 may need backporting (fixed from 6.6.130) + +# CVE-2026-23292 may need backporting (fixed from 6.6.130) + +# CVE-2026-23293 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23294] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23295] = "fixed-version: only affects 6.19 onwards" + +# CVE-2026-23296 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23297] = "fixed-version: only affects 6.10 onwards" + +# CVE-2026-23298 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23299] = "fixed-version: only affects 6.15 onwards" + +# CVE-2026-23300 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23301] = "fixed-version: only affects 6.19 onwards" + +# CVE-2026-23302 needs backporting (fixed from 7.0rc3) + +# CVE-2026-23303 may need backporting (fixed from 6.6.130) + +# CVE-2026-23304 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23305] = "fixed-version: only affects 6.18 onwards" + +# CVE-2026-23306 may need backporting (fixed from 6.6.130) + +# CVE-2026-23307 may need backporting (fixed from 6.6.130) + +# CVE-2026-23308 may need backporting (fixed from 6.6.130) + +# CVE-2026-23309 may need backporting (fixed from 6.6.130) + +# CVE-2026-23310 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23311] = "fixed-version: only affects 6.15 onwards" + +# CVE-2026-23312 may need backporting (fixed from 6.6.130) + +# CVE-2026-23313 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23314] = "fixed-version: only affects 6.18 onwards" + +# CVE-2026-23315 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23316] = "fixed-version: only affects 6.11 onwards" + +# CVE-2026-23317 may need backporting (fixed from 6.6.130) + +# CVE-2026-23318 may need backporting (fixed from 6.6.130) + +# CVE-2026-23319 may need backporting (fixed from 6.6.130) + +# CVE-2026-23320 needs backporting (fixed from 7.0rc1) + +# CVE-2026-23321 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23322] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23323] = "fixed-version: only affects 6.19 onwards" + +# CVE-2026-23324 may need backporting (fixed from 6.6.130) + +# CVE-2026-23325 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23326] = "fixed-version: only affects 6.13 onwards" + +# CVE-2026-23327 needs backporting (fixed from 7.0rc2) + +CVE_STATUS[CVE-2026-23328] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23329] = "fixed-version: only affects 6.18 onwards" + +# CVE-2026-23330 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23331] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23332] = "fixed-version: only affects 6.16 onwards" + +# CVE-2026-23333 has no known resolution + +# CVE-2026-23334 may need backporting (fixed from 6.6.130) + +# CVE-2026-23335 may need backporting (fixed from 6.6.130) + +# CVE-2026-23336 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23337] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23338] = "fixed-version: only affects 6.16 onwards" + +# CVE-2026-23339 may need backporting (fixed from 6.6.130) + +# CVE-2026-23340 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23341] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23342] = "fixed-version: only affects 6.18 onwards" + +# CVE-2026-23343 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23344] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23345] = "fixed-version: only affects 6.13 onwards" + +# CVE-2026-23346 needs backporting (fixed from 7.0rc2) + +# CVE-2026-23347 may need backporting (fixed from 6.6.130) + +# CVE-2026-23348 needs backporting (fixed from 7.0rc2) + +CVE_STATUS[CVE-2026-23349] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23350] = "fixed-version: only affects 6.19 onwards" + +# CVE-2026-23351 may need backporting (fixed from 6.6.130) + +# CVE-2026-23352 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23353] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23354] = "fixed-version: only affects 6.9 onwards" + +CVE_STATUS[CVE-2026-23355] = "fixed-version: only affects 6.18 onwards" + +# CVE-2026-23356 may need backporting (fixed from 6.6.130) + +# CVE-2026-23357 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23358] = "fixed-version: only affects 6.16 onwards" + +# CVE-2026-23359 may need backporting (fixed from 6.6.130) + +# CVE-2026-23360 may need backporting (fixed from 6.6.131) + +# CVE-2026-23361 needs backporting (fixed from 7.0rc2) + +# CVE-2026-23362 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23363] = "fixed-version: only affects 6.7 onwards" + +# CVE-2026-23364 may need backporting (fixed from 6.6.130) + +# CVE-2026-23365 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23366] = "fixed-version: only affects 6.16 onwards" + +# CVE-2026-23367 may need backporting (fixed from 6.6.130) + +# CVE-2026-23368 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23369] = "fixed-version: only affects 6.7 onwards" + +# CVE-2026-23370 may need backporting (fixed from 6.6.130) + +# CVE-2026-23371 needs backporting (fixed from 7.0rc3) + +# CVE-2026-23372 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23373] = "fixed-version: only affects 6.9 onwards" + +# CVE-2026-23374 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23375] = "fixed-version: only affects 6.8 onwards" + +CVE_STATUS[CVE-2026-23376] = "fixed-version: only affects 6.18 onwards" + +# CVE-2026-23377 needs backporting (fixed from 7.0rc3) + +# CVE-2026-23378 may need backporting (fixed from 6.6.130) + +# CVE-2026-23379 may need backporting (fixed from 6.6.130) + +CVE_STATUS[CVE-2026-23380] = "fixed-version: only affects 6.10 onwards" + +# CVE-2026-23381 may need backporting (fixed from 6.6.130) + +# CVE-2026-23382 may need backporting (fixed from 6.6.130) + +# CVE-2026-23383 needs backporting (fixed from 7.0rc2) + +CVE_STATUS[CVE-2026-23384] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23385] = "fixed-version: only affects 6.10 onwards" + +# CVE-2026-23386 may need backporting (fixed from 6.6.130) + +# CVE-2026-23387 may need backporting (fixed from 6.6.130) + +# CVE-2026-23388 may need backporting (fixed from 6.6.130) + +# CVE-2026-23389 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23390] = "fixed-version: only affects 6.12 onwards" + +# CVE-2026-23391 may need backporting (fixed from 6.6.130) + +# CVE-2026-23392 may need backporting (fixed from 6.6.130) + +# CVE-2026-23393 needs backporting (fixed from 7.0rc5) + +CVE_STATUS[CVE-2026-23394] = "fixed-version: only affects 6.10 onwards" + +# CVE-2026-23395 may need backporting (fixed from 6.6.130) + +# CVE-2026-23396 may need backporting (fixed from 6.6.130) + +# CVE-2026-23397 may need backporting (fixed from 6.6.130) + +# CVE-2026-23398 may need backporting (fixed from 6.6.130) + +# CVE-2026-23399 needs backporting (fixed from 7.0rc5) + +CVE_STATUS[CVE-2026-23400] = "fixed-version: only affects 6.18 onwards" + +# CVE-2026-23401 may need backporting (fixed from 6.6.131) + +CVE_STATUS[CVE-2026-23402] = "fixed-version: only affects 6.16 onwards" + +# CVE-2026-23403 may need backporting (fixed from 6.6.130) + +# CVE-2026-23404 may need backporting (fixed from 6.6.130) + +# CVE-2026-23405 may need backporting (fixed from 6.6.130) + +# CVE-2026-23406 may need backporting (fixed from 6.6.130) + +# CVE-2026-23407 may need backporting (fixed from 6.6.130) + +# CVE-2026-23408 may need backporting (fixed from 6.6.130) + +# CVE-2026-23409 may need backporting (fixed from 6.6.130) + +# CVE-2026-23410 may need backporting (fixed from 6.6.130) + +# CVE-2026-23411 may need backporting (fixed from 6.6.130) + +# CVE-2026-23412 may need backporting (fixed from 6.6.130) + +# CVE-2026-23413 may need backporting (fixed from 6.6.130) + +# CVE-2026-23414 may need backporting (fixed from 6.6.131) + +CVE_STATUS[CVE-2026-23415] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23416] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23417] = "fixed-version: only affects 6.9 onwards" + +# CVE-2026-31788 may need backporting (fixed from 6.6.130) From patchwork Fri Apr 24 20:55:41 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86909 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id BC44AFF8858 for ; Fri, 24 Apr 2026 20:57:14 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32596.1777064223564254753 for ; Fri, 24 Apr 2026 13:57:03 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=Jpg6Mp39; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-488af9fdaa7so49528705e9.1 for ; Fri, 24 Apr 2026 13:57:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064222; x=1777669022; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=yEsIz4X2ymYrlB8LwQW309giaifP7vZaXJxgf+BYxFE=; b=Jpg6Mp39Y1+5zLqXAuxosvLTJwONgfNQhH4Nww7f2LEiko+8on9YHTSATGf6l4JSK8 rvXDvJUNj0W+1WcSps5V1YIUCDSD99s3z4lajyh+257A/LH6v1HQB7og/jSfMX4NakQ2 QHLija7uGyipW1hq1hwHP34Z8E9bbbQ6uZCrU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064222; x=1777669022; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=yEsIz4X2ymYrlB8LwQW309giaifP7vZaXJxgf+BYxFE=; b=X/IdfX7xjhQDZhk0dYx3NzB4iD085DFOqwYCyCny7A26/0ccUPCWICdVSYrjsP6nm1 lw1QAKxd5qP47oSivNalI04677tbWGZ/ftXi3O/vIOVb/dsV6SMQxu1t4owoPGRrUaFa uxkbZViveAnXIUyHHF/QI9DDivWBFz0uqa47xamQLq2qqGmAN7xkU2Tq4aiSiIEwUF+h ZCC2XuGPz40TaoL5/uAkkgyaHAa49BgDkxN5uuDW5n4hV3i9w1+n9i0Dhwr2AFin8NGD wS1Dlt+xCNC6/1ty11LPX191IdoZ/EIUxvtLDYW/PJ5yY19jwEy3tuDsPYX72D5Zz1j2 Fg/A== X-Gm-Message-State: AOJu0Yy30hyThO6tB5p0d87PCINI6Rk4hTdFS2YDE4OboE96fLjUWc8a M9zeNljmwL6kRY0w5w3I7pdQdMSTv+tMyr7vTFJw/SsotVcI+or5Ro2dXxjhCVamhEVqQeolhZR I4+0SUaM5pkns X-Gm-Gg: AeBDiet1SdM1yqQ5xz0r5OFVNCapjmw6aFoM378rQz+dyMdVEF3xNfJYsGd/6hJcnrr 84cOv+O8UX+Wj6EaVGM0hJJGDBarEJM+JtMx0qtjvWssNJfcULg78bxm3nTfMXbLbqA5u9lu5q1 rSzxjmQXTy2DQgM3h7VxheSdGHZIHW8m3SQThXiS3REtSkRx7LFuyM1uNCRiDSsGtWc22J/lnyG hwxtcXtlkrOpbV5VdXed7k7WCNEvKBZQFkHl1o++N3TynPQeG3Yj7YS68ux0dFExMM9FLi6ZPFW bxS26+zo41ZaNcYVRt95yucrLJ1TVyVAEvuQYqyNFcUQuTt22nYQDL7R1mnKqELqHzTC6q8wrhv AKxEZ1QGnQgHM/bPsxvP0vHDoYuak1dITmL21f8k386QyvlN8iqwActVNmfewlG3l3fhvdPY6ny iKvhTgMu4rwGwdx/NlwsXuyWFnhPPjGwon+DNVXJN0LpTnUBbXTjwVwDL19lhPq593jf2F3qBEb mpslua/utA5zbB7x3/KiiN9JDMAIHUsiejfGw== X-Received: by 2002:a05:600c:5297:b0:485:9a50:3370 with SMTP id 5b1f17b1804b1-488fb74a431mr527618275e9.8.1777064221674; Fri, 24 Apr 2026 13:57:01 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.01 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:01 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 42/66] build-appliance-image: switch SRC_URI to https protocol Date: Fri, 24 Apr 2026 22:55:41 +0200 Message-ID: <6cfdf7fc1a63a3c2ee8093462fedc80d6358c54c.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:14 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235914 From: Yoann Congal Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"), > The recommendation from server maintainers is that the https protocol > is both faster and more reliable than the dedicated git protocol at this point. > Switch to it where possible. (cherry picked from commit 9bab238d26a3317a6212dc711427f4917eaac50e) Signed-off-by: Yoann Congal --- meta/recipes-core/images/build-appliance-image_15.0.0.bb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/recipes-core/images/build-appliance-image_15.0.0.bb b/meta/recipes-core/images/build-appliance-image_15.0.0.bb index 85521b6026a..3f6fcbcb3e3 100644 --- a/meta/recipes-core/images/build-appliance-image_15.0.0.bb +++ b/meta/recipes-core/images/build-appliance-image_15.0.0.bb @@ -27,7 +27,7 @@ inherit core-image setuptools3 features_check REQUIRED_DISTRO_FEATURES += "xattr" SRCREV ?= "f4877d8e682ed22e339fe6c07f3ffa28e50c7b98" -SRC_URI = "git://git.yoctoproject.org/poky;branch=scarthgap \ +SRC_URI = "git://git.yoctoproject.org/poky;branch=scarthgap;protocol=https \ file://Yocto_Build_Appliance.vmx \ file://Yocto_Build_Appliance.vmxf \ file://README_VirtualBox_Guest_Additions.txt \ From patchwork Fri Apr 24 20:55:42 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86894 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 628E6FF8841 for ; Fri, 24 Apr 2026 20:57:13 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32599.1777064223947734487 for ; Fri, 24 Apr 2026 13:57:04 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=z6i/RhRq; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-488b150559bso65819985e9.1 for ; Fri, 24 Apr 2026 13:57:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064222; x=1777669022; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=m+LEaC04R+J5uv8Bat0Fcy3xS9C1eOdCCef0eXV8Ygg=; b=z6i/RhRqU/Ot1alJicN3nNuINx0rvWoKkJIR/GSga99o0odRof6DY8GlBhJrcXvcrc hm/cIiLUaJeqm94N46Jili0iYnR91djBA7VAbot4V94gClNoC7oG8mHRAfB5cWS8drDL iBWw3UQanr5QaOpEhxHaD/0dVkeiJluMLm9JA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064222; x=1777669022; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=m+LEaC04R+J5uv8Bat0Fcy3xS9C1eOdCCef0eXV8Ygg=; b=b0TFZuF+enJXnntgHic7mfucHFy66k9Y1SxMEbOcyL0jbqz5rAq/LrFxF/JtXMGJmM Yek3yyywSe3NJCtmTORfRFUVoLHU6ckUfXei610VUHtyocjWZwbhQKco8ilpLvn093K2 gjTpoPYTmMYcrJ0f9sLABr/I4yD5CaAF2gZAN6hhQpCYqQ0dLURU5jS3b5r9fJAgJQly E4+F1UqT2pE5O7/rtgyk4k1zrIdFxTEeOu9FZiJsO1mCcMaT8k96kplKRdVZoM+vKerJ 9xbxSuvOtLW6SA/+YKUWYKJUbTkwqvfZeEB31lcSjeGpoUQBOnsjoUtG/irDyH/iyobq GFZA== X-Gm-Message-State: AOJu0YzYeCWMcQGmwEdr/fA+IwfZCHstCc32EVsffdMMbzXKHF7yeLpD ExlNHc8Ook48zI2slQ21nNUs6H++iJaT7OlnkQfKbyzxHWiQ/wc/sV1AbVHzBAAYDiIcL9YLzP8 BXiEa6YciV+go X-Gm-Gg: AeBDievHniJ5XAKAIceM6Lik6chCcbAnu4X0N9bKjKp+BgVS/bn9JEahXTSzWrvppQQ Dlv6Yv7oVd21HNgXJc6jTZoi/5aFX6DpdMgNiBxhTzB7JqhNN68Z5Iz1RRVLX/WousVdvxIo11e +otfcy1+Jd4Jegwo1l7vrxKsifmhSeCRpfl+HfZtnLiY7QO2iIh2khiqA3mIqLCgoNh1o61kJi5 XR1blPF7lsCs0e6kQQgO08qs2yFdzBBRzYGTTIlIvtwmyWX3POp1ZKJxa55p0KM13ptAOTgPZtu +MG1WMojES5D/MUMHG5IytyGHgMTOPJawR2Kl9tfE2CFX89ZyUW4cGSSSUqRNP8rGxN6QuTV+0k F4csX0aPXFTUcx+Xf4fERuhk+BSndd3DkXGmisnw8GjS8+Ba4SXlAJbCkOchLECT9tx5Vn2mJn+ 4Ng6hbc0HUijUT/1+RdO9PYebvmj6HOrraYXVJ2WfC9fdwAPRy6UOURd0UaG2j75EfyXk/87U40 4EVDpUxT7uJUB9B1F2Rlh32cFfwuSBwWxOSqQ== X-Received: by 2002:a05:600c:8b28:b0:48a:5c23:cab with SMTP id 5b1f17b1804b1-48a5c230e78mr181789775e9.19.1777064222081; Fri, 24 Apr 2026 13:57:02 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.01 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:01 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 43/66] scripts: Default to https git protocol for YP/OE repos Date: Fri, 24 Apr 2026 22:55:42 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235915 From: Yoann Congal Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"), > The recommendation from server maintainers is that the https protocol > is both faster and more reliable than the dedicated git protocol at this point. > Switch to it where possible. Signed-off-by: Yoann Congal Signed-off-by: Richard Purdie (cherry picked from commit 74dd04549624b1d3ba6d4febe51fa9ba1c86944c) --- scripts/combo-layer.conf.example | 4 ++-- scripts/contrib/patchtest.sh | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/scripts/combo-layer.conf.example b/scripts/combo-layer.conf.example index 90e2b58723b..4ae3db45ab1 100644 --- a/scripts/combo-layer.conf.example +++ b/scripts/combo-layer.conf.example @@ -14,7 +14,7 @@ signoff = False # mandatory options # git upstream uri -src_uri = git://git.openembedded.org/bitbake +src_uri = https://git.openembedded.org/bitbake # the directory to clone the component repo local_repo_dir = /home/kyu3/src/test/bitbake @@ -76,7 +76,7 @@ last_revision = # that matches the original commit. [oe-core] -src_uri = git://git.openembedded.org/openembedded-core +src_uri = https://git.openembedded.org/openembedded-core local_repo_dir = /home/kyu3/src/test/oecore dest_dir = . last_revision = diff --git a/scripts/contrib/patchtest.sh b/scripts/contrib/patchtest.sh index b1e1ea334b9..550b6a88f3c 100755 --- a/scripts/contrib/patchtest.sh +++ b/scripts/contrib/patchtest.sh @@ -75,8 +75,8 @@ source $PTENV/bin/activate cd $PTENV # clone or pull -clone git://git.yoctoproject.org/patchtest $PT -clone git://git.yoctoproject.org/patchtest-oe $PTOE +clone https://git.yoctoproject.org/patchtest $PT +clone https://git.yoctoproject.org/patchtest-oe $PTOE # install requirements pip install -r $PT/requirements.txt --quiet From patchwork Fri Apr 24 20:55:43 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86908 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B0D04FF8856 for ; Fri, 24 Apr 2026 20:57:14 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32601.1777064224947350925 for ; Fri, 24 Apr 2026 13:57:05 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=3l2PlX+J; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-483487335c2so80858375e9.2 for ; Fri, 24 Apr 2026 13:57:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064223; x=1777669023; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=QnzTJjR/z9HpitiLNA2+tE8q63oivhD6zaeE1P/svVY=; b=3l2PlX+JbuwrpeZZx8aZyzezlcHRUNCNLDKS/zdO9n7M5ajWy4QOwtVF21bN4VwYnh VQY0cRAHWMnubet5ddIRaxkSFNS/6j2Lzrf4ViaEbAhGcg7avGMCeOglBT/vnoiV+6Fi 7tPD/5dx3wciXVxph9bJMzkQVcKJM9IRtsCks= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064223; x=1777669023; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=QnzTJjR/z9HpitiLNA2+tE8q63oivhD6zaeE1P/svVY=; b=Np9jT0Yk6ahIsg4bcy60T2lvvD5ca9KqNNc++jiuBOoY1Y0h7FdKtY6rKbZzWI3cIk IPDl+Etungn1QO2HPiPEKsuZ1rvbfc7KBNss8C53DRq+GH7ImOeieNGWckGFsI3URzmk vs2iA+8ksB+Cjr+61dhcn8DcgBwSlQIVeF6/Z4s+60j5UOffel4qyDuJISSzXNzjFG05 HNXrlQdm/lb86kxKJx3lWY4r5GsvBGcCK8M3SbdLnzDg7+O7HoOpIVOnoP4bGW+neb5R 98ytXeT5r0nFo/hS0JQXlNhdwGQ0AJ3Y5R2mxN4rgPwgCuV05MpkXqMuUyFD0x4ufdaf xGog== X-Gm-Message-State: AOJu0Yw38LJ5tofpG8iaMqw2DMlQUbYLLOYU9+1nk4OWwQO8m8l5zrI7 qg1oDitvdu3pdkEkXGS05uu+NUF5UcWFOymhK7vUmgrIu3UG+sJ7GLg/RWqk06MQU6eIMYtJfHk a72WCnjC9+pCR X-Gm-Gg: AeBDietLSJpCtO6ZN15QDlNF6yKa2+FM+02W5bNuIhn6pqncuDjmXfniV4bSijvjF/I XgXgni0b17ImdaKtZJcCZrlBQrP/pR02o3lQKEbRXRnUoOCZ5ozCVhOJcMKXGhek7wXiEwN6Rgy JXND3ADUvnNt7hxaZV69WeJxs1ZiZXTqo2hEwS1AMQDUOZwGR0TKW2eQnIhhmxDwBgGEUok0vKM UrP47SA0p9IPWKaXZzi3JPDYe63Y7Kt1Lfhkjj2qRjXjYFLjXk2U+IxuXZq4QFB5byg+mhajDNs +JtNtno4kUFMB1bvcEw4IejKJpot5Xh2HlTQEk3ZuB6eXUa1K5Jd38GCHqDg+SZzemPdLkkPoZQ xWKtI8KZQFL6YqbyOCJjxot1cJSBCXkOZAQpCkB8EVFJSZ0GoYX8fuvx381OuAbaghtG2+cjvbM RGtcY+GhGBbNSYMWP7H6r8+0GOSxj48mk+FSRAuePSxZq3VBgm71vwT5UrvaDYtwiZGOoXJyYU1 /XajZ/GwARcWQxXBqNdH1aIPNtLoAR4mdjH/Q== X-Received: by 2002:a05:600c:8b38:b0:485:39b2:a47c with SMTP id 5b1f17b1804b1-488fb796fa0mr461031435e9.25.1777064222969; Fri, 24 Apr 2026 13:57:02 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.02 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:02 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 44/66] oeqa/selftest/git-submodule-test: Default to https git protocol for YP/OE repos Date: Fri, 24 Apr 2026 22:55:43 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:14 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235917 From: Yoann Congal Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"), > The recommendation from server maintainers is that the https protocol > is both faster and more reliable than the dedicated git protocol at this point. > Switch to it where possible. Use ";protocol=https" for the parent git submodule and, also, update the SRCREV to point to a commit where submodules are reference through a https:// URL instead of a git:// one. Update the expected output of the archiver test. (cherry picked from commit 5c78db972f1b97ce67c8c461a2d389b9248793db) Signed-off-by: Yoann Congal --- .../recipes-test/git-submodule-test/git-submodule-test.bb | 4 ++-- meta/lib/oeqa/selftest/cases/archiver.py | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/meta-selftest/recipes-test/git-submodule-test/git-submodule-test.bb b/meta-selftest/recipes-test/git-submodule-test/git-submodule-test.bb index 90d9b66b2c8..16d042cb04e 100644 --- a/meta-selftest/recipes-test/git-submodule-test/git-submodule-test.bb +++ b/meta-selftest/recipes-test/git-submodule-test/git-submodule-test.bb @@ -7,8 +7,8 @@ INHIBIT_DEFAULT_DEPS = "1" UPSTREAM_VERSION_UNKNOWN = "1" -SRC_URI = "gitsm://git.yoctoproject.org/git-submodule-test;branch=master" -SRCREV = "a2885dd7d25380d23627e7544b7bbb55014b16ee" +SRC_URI = "gitsm://git.yoctoproject.org/git-submodule-test;branch=master;protocol=https" +SRCREV = "f280847494763cdcf71197557a81ba7d8a6bce42" S = "${WORKDIR}/git" diff --git a/meta/lib/oeqa/selftest/cases/archiver.py b/meta/lib/oeqa/selftest/cases/archiver.py index 3cb888c5067..4fc1bf4b303 100644 --- a/meta/lib/oeqa/selftest/cases/archiver.py +++ b/meta/lib/oeqa/selftest/cases/archiver.py @@ -335,8 +335,8 @@ class Archiver(OESelftestTestCase): bb_vars = get_bb_vars(['DEPLOY_DIR_SRC']) for target_file_name in [ - 'gitsmshallow_git.yoctoproject.org.git-submodule-test_a2885dd-1_master.tar.gz', - 'gitsmshallow_git.yoctoproject.org.bitbake-gitsm-test1_bare_120f4c7-1.tar.gz', + 'gitsmshallow_git.yoctoproject.org.git-submodule-test_f280847-1_master.tar.gz', + 'gitsmshallow_git.yoctoproject.org.bitbake-gitsm-test1_bare_79a0efa-1.tar.gz', 'gitsmshallow_git.yoctoproject.org.bitbake-gitsm-test2_bare_f66699e-1.tar.gz', 'gitsmshallow_git.openembedded.org.bitbake_bare_52a144a-1.tar.gz', 'gitsmshallow_git.openembedded.org.bitbake_bare_c39b997-1.tar.gz' From patchwork Fri Apr 24 20:55:44 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86907 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C6501FF885A for ; Fri, 24 Apr 2026 20:57:14 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31989.1777064225473169322 for ; Fri, 24 Apr 2026 13:57:05 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=zXxgfnhc; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488b150559bso65820095e9.1 for ; Fri, 24 Apr 2026 13:57:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064223; x=1777669023; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=pY1s+zHT08SEX6gQ0CxslLgmCaGI1+kmymp2pZCgTSI=; b=zXxgfnhcXNWYkMIlyzBWCJQAjMzOeSRZr4CgkHduv0qPfoInwjOUc1z5wUu/2Dnx5P KluMVRAMePumJBFe9MD/jTecYjinMAP8JRgOmhV6HHYoJhUA06YtNCZiZwHqZUOdngGK brizZcWiIxH0HIMVawJRgzjk/RZ/HVuQkf+GA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064223; x=1777669023; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=pY1s+zHT08SEX6gQ0CxslLgmCaGI1+kmymp2pZCgTSI=; b=BsTTqAgM//7hGjvxEuHlnAG0F8qGRPmhzKxjj2f9eCv+14meryJdncBwmorUEjNtYJ AJP+oSa7cuHfxBsa3mD9FzJruXyzIp1Xjcg4xyL5RLA4OnoZqZAII6VB3uExM88qihkN bk8yoX33ekexiPJLfBR5i3mgg/E0gQ9utR14vx87hm/ffVNIfdjaaL1B0NQ3F9ILvLaX pB+DyGgGuJEUHD6fBpPIIVFr51HXZFZNg+ln5yyRnMhfyn0P7ARiPU8XAm0+z5q/bSTG FnpeLdMtTC5l2hXxVqoVxmi+0Xxb4ja5J7gJp+s48zmZBsoq9RbE/D4ttQWQ8IBgSR5l FRhA== X-Gm-Message-State: AOJu0Yz+qmL2dkkdjnZ2VsdtIyDEHbmwknk0s9N9q41SKwpkCWLPrBdX YvCfiP044eQ4cioPQ7gGLJ2mIPTvBuxIpK+eVgdknO0OYO1iQVyJGntBVTTJrdJPu4tIyOqMUTW ZLy5Q7MCX8Vec X-Gm-Gg: AeBDieuqnslf/uM/EE7tktIkL+PsP6Wj2kC8kK9fwrRduChJQmuVV/FpIJ0A6H4OkkF spmAzVz/K3N3XhuZpsOnlJbJ2k1U+OdCd0dCbW5uWZQUo4BT2fmbYnVX99oAHyxx3uwO0R7A7UV 4qv1etQblUSwq6REmvlQ5+uuNcBDVw2L85g0AlBhWyZpvu3WUm1mjq3xc+c70xLSeFeUijXZtWx LnOictaFz9418wn435cga2wnfCs09qAdsIUVmgZ5aZiH7VoJoXP57mVGN3SpJ21pqydiz0w1mDo tMxnBCE6oSnbn6G9Y6Cv4W5mNUP1WwlUI0w1Ox03puVDdLgU7vFQBWbG89/YBkuJl/6QKZeXtZ3 vyr7DSZijELAAmhbxESjHU0E1k245zdUeoTxs0z6fDDcT13MMtUt+CyBRfBh/xIrRQAu6KPAbhH rBA27f1/Up/yh/ye0kYGsqSAz8llKdI6OxzCky/JT4vlaUu4JzD/QbWj1U4fEken/KtXtHFqH/d 6u8Gqh9FFyRbUPBK1rohGqgss9tjyNgfIZtjA== X-Received: by 2002:a05:600c:348b:b0:489:5022:39a4 with SMTP id 5b1f17b1804b1-4895040c025mr330976955e9.9.1777064223583; Fri, 24 Apr 2026 13:57:03 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.03 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:03 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 45/66] meta/files/layers.example.json: switch to https clone URIs Date: Fri, 24 Apr 2026 22:55:44 +0200 Message-ID: <1ee811091a4e82c9c79872a86e4e573a45229245.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:14 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235918 From: Yoann Congal Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"), > The recommendation from server maintainers is that the https protocol > is both faster and more reliable than the dedicated git protocol at this point. > Switch to it where possible. (cherry picked from commit d1fb36b3ddcb033ef472042cffb0dfa68714ba96) Signed-off-by: Yoann Congal --- meta/files/layers.example.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/files/layers.example.json b/meta/files/layers.example.json index 0a6a6a7b489..91b32736c15 100644 --- a/meta/files/layers.example.json +++ b/meta/files/layers.example.json @@ -20,7 +20,7 @@ "describe": "15.0-hardknott-3.3-310-g0a96edae", "remotes": { "origin": { - "uri": "git://git.yoctoproject.org/meta-intel" + "uri": "https://git.yoctoproject.org/meta-intel" } }, "rev": "0a96edae609a3f48befac36af82cf1eed6786b4a" @@ -33,7 +33,7 @@ "describe": "4.1_M1-374-g9dda719b2a", "remotes": { "origin": { - "uri": "git://git.yoctoproject.org/poky" + "uri": "https://git.yoctoproject.org/poky" }, "poky-contrib": { "uri": "ssh://git@push.yoctoproject.org/poky-contrib" From patchwork Fri Apr 24 20:55:45 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86906 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 80B9DFF8850 for ; Fri, 24 Apr 2026 20:57:14 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32603.1777064225957558888 for ; Fri, 24 Apr 2026 13:57:06 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=eGGnbJS6; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-4891c0620bcso53510215e9.1 for ; Fri, 24 Apr 2026 13:57:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064224; x=1777669024; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=NzJtNoexvhkIkcet+RXT40OaVxXOZO0Ior6BVKAsNGg=; b=eGGnbJS6oLqg/A4wulXB38elNf1U0YfY5k0U4EQrd+hn/pQ0ZsJMH3vGcTw43jmvl6 QV59W5hf8VmvoltOTRI9x+ow+2dmh4EqOZcU8hatvWjHp3wgEQ0D/kI8Rx/epwnYIYd1 YNUwvf6PB7Hir1QDHuq5KqX2REoQozvzsWKtI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064224; x=1777669024; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=NzJtNoexvhkIkcet+RXT40OaVxXOZO0Ior6BVKAsNGg=; b=SlE4cOdmC3h6C6n1pwHoPHuBTiPuSwA9PaIY1TERd5oQy4C6SaHSQNCE6jAwHdPjVR Ft3VVbLjsviZql1MVdpldw/xuUel1jA7RgRgZdjlVGFOeEBL+kx8g0WqtrjBo9Is98V9 CplHb8OYVCyzwd07ZggHZeGS/ilphwvRVDFe6MuHIhhU7N7YNKAFhMdQGRi0iemx/oBu /Lkv4nNF5+FXsn52hCXryrxR4IYj12YpKc26kKNz9/VYE/iwHI+JKS29zd2dv5TEMEpK ZeTf/fSH3y3hWjYPEUK3AGERyDxDLoUhuWBsiKa2Oq7aioQX6jGzn+mUG+iue1GrZwja 2hVg== X-Gm-Message-State: AOJu0Yw+17ekwkxCf7c5V0AmDywZxvU1Q1KRuWgWvcH9zySb3IWwWggU RmuuvVrJ1n3b6jDkbXOg7BFNMW6N6w7FNIH3WlrZJwwTELbS4swdaQY4zmM1CN65doy1WcT/t8o LGI1OU9A2VY5F X-Gm-Gg: AeBDieu3XFccsRDnfJ/ltG5GVHq41t51k9cod3zUiM+Z9Ukv/rHaeswkKyyPK9bdTBm dJCQzDKqheYsa3Dq86zJQ2pfyztXsVg5cxNsuFNsMkpu17d+qvPtjr3xwqfkSWX67N3o9L1Yo+l 8FBp/BZ3a5UE3AOvaFJ9IgFPwbuRbgO8Eao4wweJ2QWrcPb0bPk6ghV2ohN4e6tGUP9j9WPdIKr v9Zgd9ggeAaTmd+IisKu5t80pjxjfaOVwCcu6ufl+u7XtWtNniKIC+Ki+kTNI6hp+YZCg8RrTI8 yOckTOm4fs/f9CG92BMdyeMlXMyGdhxtRTKKsDUFXAGkZyz03HZm6SIm4w17o4EF9sUktX3o841 586ZVyr+l/7VZF+VPHBJytPjfzoQNacL+oA6pAWtIor7qLHU387XBvUJn9A/sH9EfC/qsDK3xTo XG32KHezFv9UKim8vln5FY5eJMzu9w6H2GNekThvo/K5BVlKrSn0Utsm0KHTfr72q2BHZNAbEf9 YuugNbb7xvz8/WV/cAviaKGi8fy5O3O9iWZ6A== X-Received: by 2002:a05:600c:8b8c:b0:489:1d74:56d with SMTP id 5b1f17b1804b1-4891d7406famr363468525e9.29.1777064224119; Fri, 24 Apr 2026 13:57:04 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.03 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:03 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 46/66] oeqa/sdk: Default to https git protocol for YP/OE repos Date: Fri, 24 Apr 2026 22:55:45 +0200 Message-ID: <296798981c9b8a1185a31146bb660eb0fa016ab2.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:14 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235919 From: Yoann Congal Following up on commit 139102a73d41 ("recipes: Default to https git protocol where possible"), > The recommendation from server maintainers is that the https protocol > is both faster and more reliable than the dedicated git protocol at this point. > Switch to it where possible. (cherry picked from commit 037f83803905fdbdf77ed325466abaa8a501d7ff) Signed-off-by: Yoann Congal --- meta/lib/oeqa/sdk/buildtools-docs-cases/build.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/lib/oeqa/sdk/buildtools-docs-cases/build.py b/meta/lib/oeqa/sdk/buildtools-docs-cases/build.py index 6e3ee94292b..9f963f18f8d 100644 --- a/meta/lib/oeqa/sdk/buildtools-docs-cases/build.py +++ b/meta/lib/oeqa/sdk/buildtools-docs-cases/build.py @@ -15,5 +15,5 @@ class BuildTests(OESDKTestCase): """ def test_docs_build(self): with tempfile.TemporaryDirectory(prefix='docs-tarball-build-', dir=self.tc.sdk_dir) as testdir: - self._run('git clone git://git.yoctoproject.org/yocto-docs %s' % testdir) + self._run('git clone https://git.yoctoproject.org/yocto-docs %s' % testdir) self._run('cd %s/documentation && make html' % testdir) From patchwork Fri Apr 24 20:55:46 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86895 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6CFF5FF8840 for ; Fri, 24 Apr 2026 20:57:13 +0000 (UTC) Received: from mail-wr1-f65.google.com (mail-wr1-f65.google.com [209.85.221.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31990.1777064226534276089 for ; Fri, 24 Apr 2026 13:57:06 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=DBwah6Zb; spf=pass (domain: smile.fr, ip: 209.85.221.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wr1-f65.google.com with SMTP id ffacd0b85a97d-43d70c30767so5360909f8f.0 for ; Fri, 24 Apr 2026 13:57:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064225; x=1777669025; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=ziQJdy99awmPSoVob75/YcYe1zrcf8vp31dZXDYpVz0=; b=DBwah6ZbIL0VRrDjVWvU7VS+sbDCXwqnrrKotvjMakZ3bOx5a4oLZ/LVX/49MXBU6h wONgLpTTm+KMTn3luXaGqCoUjR4lIjybapXiDloGZAuisvOUcguXKZrod2dlBL2Q3DTL hMiWm+LM6/5lejBgEI1JiSOShePSFk62nyFsM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064225; x=1777669025; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=ziQJdy99awmPSoVob75/YcYe1zrcf8vp31dZXDYpVz0=; b=g9q8xD1PnuZMVuh2eQ74eS41eGzq7D17x98kAVdM4Ci6l3S9M4mfgopMW3qEAbNRCb d9dH36NUTOX7LoFUGLh8Sie8p9GDibGvENbInja9n781JPEQatJye12uc2TD6VlmHxX/ Wah+k5lng6KhbGJZbv5YPUZcYrZqCx0BxxdkICuEHIUOxLWPvCrk+7agVdPnYs+1P509 nVAYJLDF1iQbVtILeJ4nQdBBRHG+cgYSxdEK68+S2q+TCXz9h0FN605tUGAM2uGEteME cwpjl1ogT2ZtiMfqoI5xSJ49G6Rma7VbUU6UJAqBrkNM35h1VEQt9edv4EIBZcxQl59v OBNA== X-Gm-Message-State: AOJu0YxRrGSUo3XZbMZSkQuHdPX+mIwKZQzY4C1d+w3zsO5/a4rC1h6S CwAES0dWtPdxws86cZG70glXBrThvC5NLnG0gUbp8BINc4Zya5jWFltRJTlUKzFgqjEcDqPcFtd Kw27yvJwp/7eh X-Gm-Gg: AeBDiesJ/Al5xi/JD388ab4gdeuYpPbZ58wkxIbn0+miX+7+dtg1kUYBOJWys0s9Iu3 Yvc1My4DOXxZJsLTVn/oe9efQkbsMb6pM3JqPAQHG5edzsSst6OwbYTcnhryBGSjY02NFZsuAVC WCkld1ZyBGm4PRQIfoTvmcefy4iYs9HJ7/89AJ+bwzsyyIN2k9WQi6OWQQA6TAsmCasNXI6dP7a HlmLSzTT4murgUcnF5CuqBrh9wUBHA6gLr98NxsPr7bXIx90HP217jwsQkBRWDyNN79KEVXtyL8 VHtTUV5TUqdBWTv4YMbEsHcuspR31nY5PNcy36wF2Yhvpi2vqDpqb4buOebXIxLxyu4bh/BvhfL AAtldHoBFdjhZnz64TqwpfaSZwIaAMYGdqZOzTslYGGYhitV6B9qSPVcd/Ex0Fhz5mWWkPW13Tt JbEJgvJSc6jPEWwrDELqbUH4RUACLj4ulkaQTGhUOjSrkosoLEhtzNPs7WD1LxF1RpBmmoh06dW iWOFvr+O44g20UZa32Pb+gbpCEiHz3SI37ro4B15BTfA67Z X-Received: by 2002:a05:600c:a410:b0:48a:5821:6006 with SMTP id 5b1f17b1804b1-48a5821692dmr203162795e9.4.1777064224612; Fri, 24 Apr 2026 13:57:04 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:04 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 47/66] selftest/scripts: Update old git protocol references Date: Fri, 24 Apr 2026 22:55:46 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235920 From: Richard Purdie git protocol accesses to our infrastructure are currently struggling and this has highlighted a number of places we're making those obsolete access forms. Update them to use https instead of the git protocol since it is preferred and more reliable. The devtool test needed quoting to handle the ';' in the url. The -f option to devtool also shows a deprecation warning so remove that. There were internal references to git protocol urls inside the nested git submodules test report, which means those repos need updating to use new git revisions. Signed-off-by: Richard Purdie (cherry picked from commit 1ceba42623c5187d2f5a100d6a523abcdc75d34e) Signed-off-by: Yoann Congal --- .../recipes-test/devtool/devtool-upgrade-test2_git.bb | 2 +- .../devtool/devtool-upgrade-test2_git.bb.upgraded | 2 +- meta/lib/oeqa/selftest/cases/devtool.py | 4 ++-- meta/lib/oeqa/selftest/cases/externalsrc.py | 2 +- meta/lib/oeqa/selftest/cases/gitarchivetests.py | 2 +- meta/lib/oeqa/selftest/cases/sstatetests.py | 2 +- meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py | 2 +- scripts/yocto_testresults_query.py | 2 +- 8 files changed, 9 insertions(+), 9 deletions(-) diff --git a/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb b/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb index 2558a22ce57..deb3dfb82e3 100644 --- a/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb +++ b/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb @@ -11,7 +11,7 @@ SRCREV = "1a3e1343761b30750bed70e0fd688f6d3c7b3717" PV = "0.1+git" PR = "r2" -SRC_URI = "git://git.yoctoproject.org/dbus-wait;branch=master" +SRC_URI = "git://git.yoctoproject.org/dbus-wait;branch=master;protocol=https" UPSTREAM_CHECK_COMMITS = "1" RECIPE_NO_UPDATE_REASON = "This recipe is used to test devtool upgrade feature" diff --git a/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb.upgraded b/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb.upgraded index eaa8bd898da..5e3d510f29b 100644 --- a/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb.upgraded +++ b/meta-selftest/recipes-test/devtool/devtool-upgrade-test2_git.bb.upgraded @@ -10,7 +10,7 @@ DEPENDS = "dbus" SRCREV = "6cc6077a36fe2648a5f993fe7c16c9632f946517" PV = "0.1+git" -SRC_URI = "git://git.yoctoproject.org/dbus-wait;branch=master" +SRC_URI = "git://git.yoctoproject.org/dbus-wait;branch=master;protocol=https" UPSTREAM_CHECK_COMMITS = "1" RECIPE_NO_UPDATE_REASON = "This recipe is used to test devtool upgrade feature" diff --git a/meta/lib/oeqa/selftest/cases/devtool.py b/meta/lib/oeqa/selftest/cases/devtool.py index 55048830bfe..d56696c10dd 100644 --- a/meta/lib/oeqa/selftest/cases/devtool.py +++ b/meta/lib/oeqa/selftest/cases/devtool.py @@ -585,7 +585,7 @@ class DevtoolAddTests(DevtoolBase): def test_devtool_add_fetch_git(self): tempdir = tempfile.mkdtemp(prefix='devtoolqa') self.track_for_cleanup(tempdir) - url = 'gitsm://git.yoctoproject.org/mraa' + url = 'gitsm://git.yoctoproject.org/mraa;protocol=https' url_branch = '%s;branch=master' % url checkrev = 'ae127b19a50aa54255e4330ccfdd9a5d058e581d' testrecipe = 'mraa' @@ -594,7 +594,7 @@ class DevtoolAddTests(DevtoolBase): self.track_for_cleanup(self.workspacedir) self.add_command_to_tearDown('bitbake -c cleansstate %s' % testrecipe) self.add_command_to_tearDown('bitbake-layers remove-layer */workspace') - result = runCmd('devtool add %s %s -a -f %s' % (testrecipe, srcdir, url)) + result = runCmd('devtool add %s %s -a "%s"' % (testrecipe, srcdir, url)) self.assertExists(os.path.join(self.workspacedir, 'conf', 'layer.conf'), 'Workspace directory not created: %s' % result.output) self.assertTrue(os.path.isfile(os.path.join(srcdir, 'imraa', 'imraa.c')), 'Unable to find imraa/imraa.c in source directory') # Test devtool status diff --git a/meta/lib/oeqa/selftest/cases/externalsrc.py b/meta/lib/oeqa/selftest/cases/externalsrc.py index 1d800dc82ca..c127d254e36 100644 --- a/meta/lib/oeqa/selftest/cases/externalsrc.py +++ b/meta/lib/oeqa/selftest/cases/externalsrc.py @@ -17,7 +17,7 @@ class ExternalSrc(OESelftestTestCase): # so we check only that a recipe with externalsrc can be parsed def test_externalsrc_srctree_hash_files(self): test_recipe = "git-submodule-test" - git_url = "git://git.yoctoproject.org/git-submodule-test" + git_url = "https://git.yoctoproject.org/git-submodule-test" externalsrc_dir = tempfile.TemporaryDirectory(prefix="externalsrc").name self.write_config( diff --git a/meta/lib/oeqa/selftest/cases/gitarchivetests.py b/meta/lib/oeqa/selftest/cases/gitarchivetests.py index 71382089c12..c40adf25818 100644 --- a/meta/lib/oeqa/selftest/cases/gitarchivetests.py +++ b/meta/lib/oeqa/selftest/cases/gitarchivetests.py @@ -105,7 +105,7 @@ class GitArchiveTests(OESelftestTestCase): delete_fake_repository(path) def test_get_tags_without_valid_remote(self): - url = 'git://git.yoctoproject.org/poky' + url = 'https://git.yoctoproject.org/poky' path, git_obj = create_fake_repository(False, None, False) tags = ga.get_tags(git_obj, self.log, pattern="yocto-*", url=url) diff --git a/meta/lib/oeqa/selftest/cases/sstatetests.py b/meta/lib/oeqa/selftest/cases/sstatetests.py index 4a2c425ac8d..42a481500a4 100644 --- a/meta/lib/oeqa/selftest/cases/sstatetests.py +++ b/meta/lib/oeqa/selftest/cases/sstatetests.py @@ -228,7 +228,7 @@ class SStateTests(SStateBase): # Use dbus-wait as a local git repo we can add a commit between two builds in pn = 'dbus-wait' srcrev = '6cc6077a36fe2648a5f993fe7c16c9632f946517' - url = 'git://git.yoctoproject.org/dbus-wait' + url = 'https://git.yoctoproject.org/dbus-wait' result = runCmd('git clone %s noname' % url, cwd=tempdir) srcdir = os.path.join(tempdir, 'noname') result = runCmd('git reset --hard %s' % srcrev, cwd=srcdir) diff --git a/meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py b/meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py index 312edb64319..05a7f99809e 100644 --- a/meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py +++ b/meta/lib/oeqa/selftest/cases/yoctotestresultsquerytests.py @@ -36,4 +36,4 @@ class TestResultsQueryTests(OESelftestTestCase): shutil.rmtree(workdir, ignore_errors=True) self.fail(f"Can not execute git commands in {workdir}") shutil.rmtree(workdir) - self.assertEqual(url, "git://git.yoctoproject.org/yocto-testresults") + self.assertEqual(url, "https://git.yoctoproject.org/yocto-testresults") diff --git a/scripts/yocto_testresults_query.py b/scripts/yocto_testresults_query.py index 521ead8473a..08bd8cbff17 100755 --- a/scripts/yocto_testresults_query.py +++ b/scripts/yocto_testresults_query.py @@ -21,7 +21,7 @@ script_path = os.path.dirname(os.path.realpath(__file__)) poky_path = os.path.abspath(os.path.join(script_path, "..")) resulttool = os.path.abspath(os.path.join(script_path, "resulttool")) logger = scriptutils.logger_create(sys.argv[0]) -testresults_default_url="git://git.yoctoproject.org/yocto-testresults" +testresults_default_url="https://git.yoctoproject.org/yocto-testresults" def create_workdir(): workdir = tempfile.mkdtemp(prefix='yocto-testresults-query.') From patchwork Fri Apr 24 20:55:47 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86903 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 045DEFF8847 for ; Fri, 24 Apr 2026 20:57:14 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32604.1777064227018594775 for ; Fri, 24 Apr 2026 13:57:07 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=CMOdoYD5; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-4891d7164ddso38756315e9.3 for ; Fri, 24 Apr 2026 13:57:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064225; x=1777669025; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=4oBgZxoFYGahSEFbzboDfXK7MkJ+E7dE/GQOB6AcGZA=; b=CMOdoYD5xYMMtCTe8iW+FUhXS6WH3LuP0c0WwrdhEo5mvuJwRLdcJUX9HYMRTwrqIS x4TYDPiySJPBB0A1u041uVYYOqjh8uAq4yr4RNDzLAt52N77sGsYOLil8CUwocwg2eWc 0rGnLemF6ZwdhPlXoPT/MkuGgr98UidM/XzlI= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064225; x=1777669025; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=4oBgZxoFYGahSEFbzboDfXK7MkJ+E7dE/GQOB6AcGZA=; b=TWqv0qmH8wVBHQ7088ncy5JZB8llJG4meQD3t8AocnpQD2GgH5/24zklX6+ZbdH2Ac to0Fh9h9AyfmcCobRqn4cN354Ju800JHnb3JRjgHLg3FctkwPcjrAgr6YYfzWKN4GDVH 7jaEy0b/FG0MfYyNLZjcIkW1sA6ssAKmkCLdGCSUDmDec4rKSk9+4o5cK1eakfjp98ZJ 1dlGOX0qQXAJ3uVKgnxgTDk1gQcADxK9Mqkzuaew6Lp+W+/KeGuCA6YFGlMxET9QOp5p SCKTxyrIdjs2LbxrJEh/Jyh6vG1NyEQNsSDZP0j1eDneYRAWEje/6HKpYlP8KyLT0K7/ 2P6Q== X-Gm-Message-State: AOJu0Yz1FfKW+ElxXhtmqZjgPGvv/Dquhj2QftsVhqoD5BnanASNkpdi VJqHblqAUn/L5iXjmsXYWjtUY77gmLBh2A1fTEL7P2VzIhPmZDJgrE5PRJ9llEXeGmwuihO3Pk7 3YUpDA5EuxqIM X-Gm-Gg: AeBDieuP6tkxWFW7/BzXJpi4W1zvoaP0n77ze74NBMNwMggDFLBqPm1gfqvesSVuz16 vr2xij13XGZBxtS10hXUC9y7K2QV/iUDELCgCFIWIBUXyPrwskAyCzM5yYkp01r3+h1X0cOi9qj oln3t7JK358Bv+CdcSMcX3meHtnTnPgQu9pRdkvLOvDLUGBCaYcJpmWJH3JOo6ZMgDv1xjoDfg2 5cSRBLOTM1hlbUgERTOOjDZ7U7SQgSpFgQ6c0MuCUl5TSTVtekwAYHPm4pS4kaDE/eCYGshMYWX eAJOUZqOIYM2iVAvQM024HteVzzBuz7aGVtuhOjPr1aBO/8YQIF19Wqow1daihMYmowo3PZdrJw Z+tpJQm5G/0aQS+F4IIepRrdjEpIPeWL/yR1y8sR1DtCgUSTfd7gtZvY61BE/JAghMakU1cxl5L ml0Qkq1zGrE/8RuJkfO6Ox0ACMvtTCVVsdN2UEr67RDJoa7XeU7Bo4S3KXDMn0KZy8JvDkpK0fV XxfORfxUtNxwulMA9jnIYxud+QiKK56c12rXA== X-Received: by 2002:a05:600c:3f10:b0:485:35d3:ce59 with SMTP id 5b1f17b1804b1-488fb753c9amr449406425e9.10.1777064225063; Fri, 24 Apr 2026 13:57:05 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:04 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 48/66] dtc: backport fix for build with glibc-2.43 Date: Fri, 24 Apr 2026 22:55:47 +0200 Message-ID: <7e9f4ab3d1839cef771675091e5ce49eccc39169.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:14 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235921 From: Martin Jansa glibc-2.43 isn't used in OE builds yet, but this fixes dtc-native: https://errors.yoctoproject.org/Errors/Details/903983/ ../sources/dtc-1.7.2/libfdt/fdt_overlay.c: In function ‘overlay_fixup_phandle’: ../sources/dtc-1.7.2/libfdt/fdt_overlay.c:424:21: error: assignment discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers] 424 | sep = memchr(fixup_str, ':', fixup_len); | ^ ../sources/dtc-1.7.2/libfdt/fdt_overlay.c:434:21: error: assignment discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers] 434 | sep = memchr(name, ':', fixup_len); | ^ cc1: all warnings being treated as errors Signed-off-by: Martin Jansa Signed-off-by: Mathieu Dubois-Briand Signed-off-by: Richard Purdie (cherry picked from commit 28552a7b6c94060c7ab3899619ab8afb74124d02) Signed-off-by: Yoann Congal --- .../0001-Fix-discarded-const-qualifiers.patch | 85 +++++++++++++++++++ meta/recipes-kernel/dtc/dtc_1.7.0.bb | 1 + 2 files changed, 86 insertions(+) create mode 100644 meta/recipes-kernel/dtc/dtc/0001-Fix-discarded-const-qualifiers.patch diff --git a/meta/recipes-kernel/dtc/dtc/0001-Fix-discarded-const-qualifiers.patch b/meta/recipes-kernel/dtc/dtc/0001-Fix-discarded-const-qualifiers.patch new file mode 100644 index 00000000000..c643410ae9b --- /dev/null +++ b/meta/recipes-kernel/dtc/dtc/0001-Fix-discarded-const-qualifiers.patch @@ -0,0 +1,85 @@ +From 861cb43eb53afff83e28ba0e0f88ffa464ebe8ca Mon Sep 17 00:00:00 2001 +From: Stephen Gallagher +Date: Tue, 6 Jan 2026 14:19:30 -0500 +Subject: [PATCH] Fix discarded const qualifiers + +It's unsafe to implicitly discard the const qualifier on a pointer. In +overlay_fixup_phandle(), this was probably just an oversight, and making +the "sep" variable a const char * is sufficient to fix it. + +In create_node(), however, the "p" variable is directly modifying the +buffer pointed to by "const char* node_name". To fix this, we need to +actually make a duplicate of the buffer and operate on that instead. + +This introduces a malloc()/free() and an unbounded strdup() into the +operation, but fdtput isn't a long-running service and the node_name +argument comes directly from argv, so this shouldn't introduce a +significant performance impact. + +Signed-off-by: Stephen Gallagher +Signed-off-by: David Gibson +Signed-off-by: Martin Jansa +Upstream-Status: Backport [https://git.kernel.org/pub/scm/utils/dtc/dtc.git/commit/libfdt/fdt_overlay.c?h=main&id=9a1c801a1a3c102bf95c5339c9e985b26b823a21] +--- + fdtput.c | 8 +++++--- + libfdt/fdt_overlay.c | 3 ++- + meson.build | 3 ++- + 3 files changed, 9 insertions(+), 5 deletions(-) + +diff --git a/fdtput.c b/fdtput.c +index c2fecf4..8deec7e 100644 +--- a/fdtput.c ++++ b/fdtput.c +@@ -230,19 +230,21 @@ static int create_paths(char **blob, const char *in_path) + static int create_node(char **blob, const char *node_name) + { + int node = 0; +- char *p; ++ const char *p; ++ char *path = NULL; + + p = strrchr(node_name, '/'); + if (!p) { + report_error(node_name, -1, -FDT_ERR_BADPATH); + return -1; + } +- *p = '\0'; + + *blob = realloc_node(*blob, p + 1); + + if (p > node_name) { +- node = fdt_path_offset(*blob, node_name); ++ path = xstrndup(node_name, (size_t)(p - node_name)); ++ node = fdt_path_offset(*blob, path); ++ free(path); + if (node < 0) { + report_error(node_name, -1, node); + return -1; +diff --git a/libfdt/fdt_overlay.c b/libfdt/fdt_overlay.c +index 5c0c398..75b0619 100644 +--- a/libfdt/fdt_overlay.c ++++ b/libfdt/fdt_overlay.c +@@ -431,7 +431,8 @@ static int overlay_fixup_phandle(void *fdt, void *fdto, int symbols_off, + const char *fixup_str = value; + uint32_t path_len, name_len; + uint32_t fixup_len; +- char *sep, *endptr; ++ const char *sep; ++ char *endptr; + int poffset, ret; + + fixup_end = memchr(value, '\0', len); +diff --git a/meson.build b/meson.build +index 8952e8a..ecb0ae0 100644 +--- a/meson.build ++++ b/meson.build +@@ -14,7 +14,8 @@ add_project_arguments( + '-Wstrict-prototypes', + '-Wmissing-prototypes', + '-Wredundant-decls', +- '-Wshadow' ++ '-Wshadow', ++ '-Wdiscarded-qualifiers' + ]), + language: 'c' + ) diff --git a/meta/recipes-kernel/dtc/dtc_1.7.0.bb b/meta/recipes-kernel/dtc/dtc_1.7.0.bb index 0702fc16dfa..a2f41197fda 100644 --- a/meta/recipes-kernel/dtc/dtc_1.7.0.bb +++ b/meta/recipes-kernel/dtc/dtc_1.7.0.bb @@ -12,6 +12,7 @@ SRC_URI = " \ git://git.kernel.org/pub/scm/utils/dtc/dtc.git;branch=main;protocol=https \ file://0001-meson.build-bump-version-to-1.7.0.patch \ file://0002-meson-allow-building-from-shallow-clones.patch \ + file://0001-Fix-discarded-const-qualifiers.patch \ " SRCREV = "039a99414e778332d8f9c04cbd3072e1dcc62798" From patchwork Fri Apr 24 20:55:48 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86902 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2986EFF884A for ; Fri, 24 Apr 2026 20:57:14 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31991.1777064227499277757 for ; Fri, 24 Apr 2026 13:57:07 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=EmvXgiOY; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-48a3e9862f0so42146295e9.1 for ; Fri, 24 Apr 2026 13:57:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064226; x=1777669026; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=r5pGbKtl4qnVIGrQ5r3MHb0Q+pMQTAAdpsDc2EgOY2I=; b=EmvXgiOYeK4V4Xzs7Td8n0tAE6B78w9gopeZzwQ9ir7uB5ejzht7EWF1oYzNmRaRXB /0tWHOH4ig8Vx9aFK8vhI56WZ8zIPepa32Fvtyh8IXOwxZA4OFluNeArtgzDr8eIrc/2 N1WejjWSxSJDPiknTbiYZGyin4F2n7xGPzOq4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064226; x=1777669026; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=r5pGbKtl4qnVIGrQ5r3MHb0Q+pMQTAAdpsDc2EgOY2I=; b=pefW0cwKAlYeIPsMZMfqzHrCnGed1DZwJDF0d/eY+fjMHqtFACwMds1FEOwrKGqJSr LVEowedYqBzFS7dkhsAh5RhwCoBecnefuismKpvIGgz3RqzvBb42zB3W9y7cFb1XLChY XRpaH3PwAUNiO20DWwApl2IzrSlJm3a0cvj0f+y6bl9zI96sUk6ZQ6CpzL5oW+z0PSJK Zr4qjYDvM9vicVvngO9sB0xG22qVYnBVpfpYuDfk3Wu9KLs4RM6bNWkFGOz183PjJghj +HL5zV3NcqpZ8Lo86ROK5LY+LHz5Q2riCZEoXcr4Z3xq4I5QQ94k+kJOra+QxFxaXnxf s/Ug== X-Gm-Message-State: AOJu0Ywsdv3kR8iqh9ac+ci0OHK9QxvvIsVd2vMknIj0XsnWcXbSdv6E 3GoF29CK9qkXfwi8wAA+L8jf5wtT6nCBWYkj/b9nh4ZeOimQ21v53yE7jGVrhmhnLjIY+RH5ZMw +2/abkKbdNtxm X-Gm-Gg: AeBDievkrRBZA/CiHzgrr6+sPSsvM5F75z/LV3aSxPcEAAz+Nf8MfPkLxM5nzb1/yU7 Hd2QkFUYnO5s6zklj5n7+HeyMDmmMIRJAQbmLKCM8TeRQ9Mrul7PTIwhTm5DOImCuyoBDBPe+IM jKmzXfPamXtQJV1i66WmDY+BOZT2tdmBRsxCQT4TuOa0c69YlOOPB3X7AzPWEUI+4Hwx3PjAftL yHG6DQsGgoQHUVlz+vugIEke8kB2kppiC8GHcViqsd4ziGOnC59hQQ+jRE5att3I/99GZk+2LG3 H3yaBwve3ePhSDDdKHlmUnG1mjwTjkiVTnlF0NKWioA6PnJPUb67/FLQ2+lMNK/XGnLKOC8kNfw r+GIrB9WkNX+xtN+/RBbwE1HJzNU6CS0LuXfl/H4fbnNOVqTovvYVQhztyeijgCwQ8aJqoHWx3W chapVG1QbiHI0JIF6LCflWWX4t/OdJ5xaxlP5OElFyNSyzhInSD3AJPRoHwBaxMPL6ke7VbRk81 hmVot6tbBD8/DEGP/qz7IUJsBpgxKBTzpDXGg== X-Received: by 2002:a05:600c:8b6b:b0:485:3c2e:60d5 with SMTP id 5b1f17b1804b1-488fb8859ddmr438786675e9.2.1777064225621; Fri, 24 Apr 2026 13:57:05 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.05 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:05 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 49/66] pseudo: Add fix for glibc 2.43 Date: Fri, 24 Apr 2026 22:55:48 +0200 Message-ID: <689bd1811c2300263a8a86ba3b46bbc6b1622323.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:14 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235922 From: Richard Purdie Update to add a fix for a function definition to work with glibc 2.43. Signed-off-by: Richard Purdie (cherry picked from commit 7d35b0e7929d666af783db835a3a809f8f6ce429) Signed-off-by: Yoann Congal --- meta/recipes-devtools/pseudo/pseudo_git.bb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/recipes-devtools/pseudo/pseudo_git.bb b/meta/recipes-devtools/pseudo/pseudo_git.bb index 0f063f18812..3ae560487bd 100644 --- a/meta/recipes-devtools/pseudo/pseudo_git.bb +++ b/meta/recipes-devtools/pseudo/pseudo_git.bb @@ -12,7 +12,7 @@ SRC_URI:append:class-nativesdk = " \ file://older-glibc-symbols.patch" SRC_URI[prebuilt.sha256sum] = "ed9f456856e9d86359f169f46a70ad7be4190d6040282b84c8d97b99072485aa" -SRCREV = "43cbd8fb4914328094ccdb4bb827d74b1bac2046" +SRCREV = "56e1f8df4761da60e41812fc32b1de797d1765e9" S = "${WORKDIR}/git" PV = "1.9.3+git" From patchwork Fri Apr 24 20:55:49 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86904 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 12511FF8849 for ; Fri, 24 Apr 2026 20:57:14 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31992.1777064228005852715 for ; Fri, 24 Apr 2026 13:57:08 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=UVSH2n67; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-4891c00e7aeso57644265e9.2 for ; Fri, 24 Apr 2026 13:57:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064226; x=1777669026; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=5i81bJDp2N43KbVtKv7D3sb6SA4rsgbzUhIXcqB57pY=; b=UVSH2n67uJADRFQUsz//+nTULzOhwv+1jVA0eFQSRA8j5hnSePRlr0QbWJKKgVAY1r ojEAd40ILzHxk0fwnDZlmp81B4O1RmbIySM9pPIdMJ2y/vlHpvDwV8YOSXjZisGAObZ3 5gZ/gbEXCsdnojJVVIH1gxcoacXhClN99L+XM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064226; x=1777669026; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=5i81bJDp2N43KbVtKv7D3sb6SA4rsgbzUhIXcqB57pY=; b=VZx2329+m8DvfkkluaaGK8SdsYHrFm/FqcED7HylOifw+uDhSnJQ6iebz4FTS+loWi +SJNuGTqQGoQY3WY8Bd4ZkVzT8MY3iedy7yKjtIZ3FIiF+c/JeWzYwQIWjJrGF8WUEP4 FCw1y7BheuwaQTVqWMjz6uN9Oug/be63sc387QiC/aTHh12G0cDovSL9YFxGTcBxBb9m wHRqmIVxJ3QvgRKf8p3ezKSrO8hKa1RuSJJ3InRfJQsunsrsikpIA4wjiw3ST3xZOosz G8oyepvSraT0yFO7IYHr/0Z2zVmaZ/hWF/Zoysy4SoiIMY/zX95pJ2ddBDHSSGYcTWLY 5yFQ== X-Gm-Message-State: AOJu0YzjPjV4ZpddE90/rJc0q+XcCC8hnisTGfzIw4vUCm+fKOly2L0R LtsWNSrlvOKlr28Aur/C5UDRh2vFd5feCxCP1yrRaMaYnNPOAKBV7dztBGiybRw9ha7nn4yDMWg 2MkEr5NuAQZZd X-Gm-Gg: AeBDiev6pmw0tYb1sSsuxEHgNma1mYtOfWABMloxMksoelNh5D6iUlXEzm/0b3MbJbk 8E1RlZ6PtWKy+7Dyic3JbT1xYCoAg8rxR4Ylj+Ww431mDkdBVZU6I195trGdxScvkt1ja9Azqcf VxDVxL455Y1n92Gimfk/pddyjyEBXJkMaCnucdIDRLekj7VM09QyLbn9lqsmtmGr135yRxgETvJ rZ56AkP/AvUn1j0Qc/28Uz4+BlOt3NioloK+WPcjaGzpmdivF1jaHbpnN4Jh1KUufVSEK3Zkhjb 9dS8mASZCnDtuWbp19bEBofuTgP3MXdb8sLugKD9zSWGfOlQ2weG8Lj/Jg8zX9xbcRBcoeahj3J jGOLcK7IrEHzv+8BLyRQgMdT3bkl2X9z+jEHSkMVu5ARrippU/53QPM3xfMcZ140LOOGEdStQoD stq6ZqJQYBv8ay7PHin1lFeQofFTYOY/8+dyou2VDEOc/wCcX0zysDyopyIo5E6fpe5+NJ+Xs1q tU55CVVt0EnLBRBGAaJQNPT9DQM2ncj2U/i5Q== X-Received: by 2002:a05:600d:14:b0:488:9e43:9690 with SMTP id 5b1f17b1804b1-488fb7451f1mr364676395e9.10.1777064226141; Fri, 24 Apr 2026 13:57:06 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.05 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:05 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 50/66] yocto-uninative: Update to 5.0 for needed patchelf updates Date: Fri, 24 Apr 2026 22:55:49 +0200 Message-ID: <756f29ce4dcd0dad05e3f5bfccbcfe1ca3a0b112.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:14 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235923 From: Michael Halstead Solves some segfaults on relocated qemu-img binaries. [YOCTO #16003] Signed-off-by: Michael Halstead Signed-off-by: Richard Purdie [YC: removed extra line from commit message upstream commit b322bc5387f3 ("meta/conf/distro/include/yocto-uninative.inc")] Signed-off-by: Yoann Congal --- meta/conf/distro/include/yocto-uninative.inc | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/meta/conf/distro/include/yocto-uninative.inc b/meta/conf/distro/include/yocto-uninative.inc index 3ced03d4771..e9dc6c86408 100644 --- a/meta/conf/distro/include/yocto-uninative.inc +++ b/meta/conf/distro/include/yocto-uninative.inc @@ -7,9 +7,9 @@ # UNINATIVE_MAXGLIBCVERSION = "2.42" -UNINATIVE_VERSION = "4.9" +UNINATIVE_VERSION = "5.0" UNINATIVE_URL ?= "http://downloads.yoctoproject.org/releases/uninative/${UNINATIVE_VERSION}/" -UNINATIVE_CHECKSUM[aarch64] ?= "812045d826b7fda88944055e8526b95a5a9440bfef608d5b53fd52faab49bf85" -UNINATIVE_CHECKSUM[i686] ?= "5cc28efd0c15a75de4bcb147c6cce65f1c1c9d442173a220f08427f40a3ffa09" -UNINATIVE_CHECKSUM[x86_64] ?= "4c03d1ed2b7b4e823aca4a1a23d8f2e322f1770fc10e859adcede5777aff4f3a" +UNINATIVE_CHECKSUM[aarch64] ?= "a25f2174d0cefcb22af005e9bc72ac01ae83b011c5b6d6d5bf00dac979877f76" +UNINATIVE_CHECKSUM[i686] ?= "959cc2539b692f9b9862825c7324a0fe4d061fca742f6c259f67f581c59af956" +UNINATIVE_CHECKSUM[x86_64] ?= "96045e8b1e242c8a849426a8506c7043f354b39f2bc0035192780e8205e23e9d" From patchwork Fri Apr 24 20:55:50 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86905 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B0CCEFF8855 for ; Fri, 24 Apr 2026 20:57:14 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32606.1777064228470973095 for ; Fri, 24 Apr 2026 13:57:08 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=yKp9nYJ6; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-488ff90d6c7so68179295e9.2 for ; Fri, 24 Apr 2026 13:57:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064227; x=1777669027; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=MV6ULFDYbvbGwrNtaGcHJ2UyeTW77SfuMN/2MFcZcxY=; b=yKp9nYJ6pwl3w6tCZM1kUhkmI3TCzKbgUhGeSIUiSSYDcRy2mXulapJx3KDOIR007v hmqmiC6IncVZ5pAlgyLzpCcj/xpJBiQ+n+Tk8ZAv6wRO/P/3LqYVsVvjz9LqSEyYWh5p oU12KOnaMJqAl01BruulAqeBTsnW0VQeplDrs= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064227; x=1777669027; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=MV6ULFDYbvbGwrNtaGcHJ2UyeTW77SfuMN/2MFcZcxY=; b=RZ3lEVg9Zz4QLQOy2hdqZQvHAcKSmt5BzRySRQXTupU758r7TGhAFzIYxQ7/i3gvEi +9QOL+0sAncNhGKxnQSp70/CNW8tQdULljNaGCQxBYNmgRQy7yOTpput5KpKvwo8+Cbs qGx42Qh4LUfUAX6orqRjXs9FiTIGXzzn5Gg21khsMrCAP+Iz2LigwieVfs/6uQq95yqH gADqBdO3ryhl7MSVBzXyyqejsGjIiASOSFaeFJUChWVXRq+BYdJhm5ga7EfTT3KpLw1k sJ/Iuz8E1PXDhMbTyAXOWZX6MH2YoZrd0Wag6YGdfXUDtVYt+evqvTL81BB2jsahkLzB CpEA== X-Gm-Message-State: AOJu0YyOoKivWD/WprHlG/VI/KgMn4KnlMXdJgOJ8Qt6C2GC/sUlVSUC Nopt4pA1/GmyM0RrryNmsacjx7NadvoICTRo8T4TfFhGVmzuzEkovTDK0WSvN6C6VCLAMDsRibO rJ3xE2BMVmPyq X-Gm-Gg: AeBDiesk3KATttwQSUnVj91LotF2ETN8R4I3Sv+KEKP8acRBGLWgQ5ip2YjApwMwGoT glX3Rsca4H/YVWgiRiDyirxC8ko5LLI1Hv3fOg8q0ABRXpnTDCHB5K2cVjLEBYN4jcjLPkWYYUv UiBM6p7pVVjGHD1nnK7DoSFI8rTQbYjYiNVT8rKiwzOPzrFb7IxJh9akFIwZkXi0Y6kRzuUvwMo 0IPU4PXIC9WWhJtSt2Wqi0sfKaUeM/lqPJknaWh98PQ1dyzYiYjTEbruvv1cfn0+3MT8KbHt7Nn VWXqjRT0HzMz9/B7G9GSYvQ48/Ng+5bIwhNRJ8MKtcbNTJpJTM2CU1eSufgf/e2zQwNUhX7jxEx irzhceuHDJcG+MPdRi3zLPUNxmnUJy/MRrUqcQp+TUE5FkC1FJfr9nufFjyzD2UvVgDZCP71gDl ScCqd8xF5KIozMVL2cvz/b8hfX1uTof1a8HcT1pE2uex9AnToXw3W0Ia8BHvwDV/o6VqbOyGssS LxB3KTV0vQMy7BW5RxrXUQrW0dWj2Gw3P4dIw== X-Received: by 2002:a05:600c:8587:b0:485:3f30:6250 with SMTP id 5b1f17b1804b1-488fb7856b9mr363199905e9.20.1777064226657; Fri, 24 Apr 2026 13:57:06 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.06 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:06 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 51/66] yocto-uninative: Update to 5.1 for glibc 2.43 Date: Fri, 24 Apr 2026 22:55:50 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:14 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235924 From: Michael Halstead Signed-off-by: Michael Halstead Signed-off-by: Richard Purdie (cherry picked from commit c1fb515f2a88fa0a0e95529afc07a99db001af0e) [YC: Remove duplicated line in commit message] Signed-off-by: Yoann Congal --- meta/conf/distro/include/yocto-uninative.inc | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/meta/conf/distro/include/yocto-uninative.inc b/meta/conf/distro/include/yocto-uninative.inc index e9dc6c86408..d97c96f631f 100644 --- a/meta/conf/distro/include/yocto-uninative.inc +++ b/meta/conf/distro/include/yocto-uninative.inc @@ -6,10 +6,10 @@ # to the distro running on the build machine. # -UNINATIVE_MAXGLIBCVERSION = "2.42" -UNINATIVE_VERSION = "5.0" +UNINATIVE_MAXGLIBCVERSION = "2.43" +UNINATIVE_VERSION = "5.1" UNINATIVE_URL ?= "http://downloads.yoctoproject.org/releases/uninative/${UNINATIVE_VERSION}/" -UNINATIVE_CHECKSUM[aarch64] ?= "a25f2174d0cefcb22af005e9bc72ac01ae83b011c5b6d6d5bf00dac979877f76" -UNINATIVE_CHECKSUM[i686] ?= "959cc2539b692f9b9862825c7324a0fe4d061fca742f6c259f67f581c59af956" -UNINATIVE_CHECKSUM[x86_64] ?= "96045e8b1e242c8a849426a8506c7043f354b39f2bc0035192780e8205e23e9d" +UNINATIVE_CHECKSUM[aarch64] ?= "4166237a9dabd222dcb9627a9435dffd756764fabf76ed7ef2e93dc2964567ad" +UNINATIVE_CHECKSUM[i686] ?= "761502cc9aef4d54d0c6fe9418beb9fdd2c6220da6f2b04128c89f47902ab9ae" +UNINATIVE_CHECKSUM[x86_64] ?= "2b63a078c26535e0786e87f81ae69509df30f4dce40693004c527bd5e4ab2b85" From patchwork Fri Apr 24 20:55:51 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86901 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id ECA24FF8848 for ; Fri, 24 Apr 2026 20:57:13 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31993.1777064228935825359 for ; Fri, 24 Apr 2026 13:57:09 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=P2FazADx; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-4838c15e3cbso77502035e9.3 for ; Fri, 24 Apr 2026 13:57:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064227; x=1777669027; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=a8Dd+FrHpCNy79P3B933WiRSDFENewdEom0cBtxoJ3g=; b=P2FazADxGmYTkn/mPH8IEjNftUCVGvYydmpETmT5Cvfdg7xPFE9NOMqbeqDYqDspwV PxJkCdePQ9RDbGHvZxJOYQXWf26i/5dobHW5eG757rxi6fIcd/AEh9K6DXU3j8GWOIr2 TCTs1ABoGIFejqSr8sIVcc0e0yubG2pEbCr3U= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064227; x=1777669027; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=a8Dd+FrHpCNy79P3B933WiRSDFENewdEom0cBtxoJ3g=; b=cNr5Kt6uS4ZKfTEUYCPt5aosrBCGMMkLK7MBmj+jBuSBcu250RGjcC0HwnYyvG08KR fICz3KtJiL4tyLCgB5NDQ86tRArghRlEXFcjwr+l9b4owyT0fXNtmQvCmzA3h3pkAKvv hOvDGOOzxG5QivDppCxSxJWmJSDJZG2sEYN6Qcpebu8yDFueoOMnmwYdAIWECR4C2tZO R9/y9OrzxQXP1kmdLVKyjD5AN7F1K6TiO1nfAQ3i2nB5WfSX3tAOOUk47H8EQKBRVcVk XJg+8BjzJ6lUXHbHFri4VGv1FxQuKYZPCNj4CDiHQRboUxrnUM2O5dFdz9sqFBnZptsM 6Bog== X-Gm-Message-State: AOJu0YybgJQulIA9Qz293s8mzxBl71MKm6p0NO54z3817ZkK/lLfqCfY ARy/YZ/aLLFkoB95jtopPqr7RGyaKuKbwzLnO670cx92A263r8AqFBbHzu1h5H6SYUysX75wwe7 iZax1eJCnU8o1 X-Gm-Gg: AeBDiesBjI9hgXtp5Qwujo9sd8cD+ZhPnAoAbtsOMf2eoy/RRbfVd749VKllYHXZ3wL uIPG2hM16cx6xKqUerWtKjiWzPgjQmMTeJ33Yxk0vNGHE8zc0W9Z23puEP6p5PGk8zGEBrAfmkN EYHZ5pfsyPZcWJu2if1yB0ktUilWqQPRFuw2w8ZdPavudyDBndLLL0QFcEwC+AaQYiuG2ctvait QtBYx31s6H7EwcSNv4ZXq7/wvb7x3d3MpbXAU+HeTdV4gsyAhHB+o2lJ3iCXaikbss6eQFXwDY6 W5eaecTtsjcIINwik5Gvy++KPts40N63woJDVu9NNIKFiC5LYoGd53uCGF9dO6UwUGzEaQM6zpN nDl49/yLBc21qlCr7h8S4XXQ7d7x30FwP6vUW79jRtChDPYfGEKrMchMecWi6QPKahSgkxIMYFO YsKrHRUSvzcM3sW2PORjKgQV3m7O4bSmcX6Pv45TLUG1tZMeBzTqn7rFvWkBu2VOFjPmbI6/f/+ jyLOjFUxfJfQNJpZd9ZJoSpzO9/5tKsypPVgA== X-Received: by 2002:a05:600c:a30b:b0:485:17a7:b9c7 with SMTP id 5b1f17b1804b1-488fb750a2bmr330943205e9.10.1777064227085; Fri, 24 Apr 2026 13:57:07 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.06 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:06 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 52/66] elfutils: don't add -Werror to avoid discarded-qualifiers Date: Fri, 24 Apr 2026 22:55:51 +0200 Message-ID: <7d9d9bcb64094da7121c6d6ce89cf07640537182.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235925 From: Martin Jansa With glibc-2.43 on host elfutils-native fails with: elfutils-0.191/libcpu/riscv_disasm.c:1259:46: error: initialization discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers] elfutils-0.194 in master doesn't have this issue thanks to this patch avoiding -Werror from: https://git.openembedded.org/openembedded-core/commit/?id=1d6ac3c811798732e6addc798656bbe104661d77 Signed-off-by: Martin Jansa Signed-off-by: Yoann Congal --- .../elfutils/elfutils_0.191.bb | 1 + ...001-config-eu.am-do-not-force-Werror.patch | 34 +++++++++++++++++++ 2 files changed, 35 insertions(+) create mode 100644 meta/recipes-devtools/elfutils/files/0001-config-eu.am-do-not-force-Werror.patch diff --git a/meta/recipes-devtools/elfutils/elfutils_0.191.bb b/meta/recipes-devtools/elfutils/elfutils_0.191.bb index 0fd6d31af19..5156e5c9f6d 100644 --- a/meta/recipes-devtools/elfutils/elfutils_0.191.bb +++ b/meta/recipes-devtools/elfutils/elfutils_0.191.bb @@ -23,6 +23,7 @@ SRC_URI = "https://sourceware.org/elfutils/ftp/${PV}/${BP}.tar.bz2 \ file://0001-tests-Makefile.am-compile-test_nlist-with-standard-C.patch \ file://0001-debuginfod-Remove-unused-variable.patch \ file://0001-srcfiles-fix-unused-variable-BUFFER_SIZE.patch \ + file://0001-config-eu.am-do-not-force-Werror.patch \ file://CVE-2025-1352.patch \ file://CVE-2025-1365.patch \ file://CVE-2025-1372.patch \ diff --git a/meta/recipes-devtools/elfutils/files/0001-config-eu.am-do-not-force-Werror.patch b/meta/recipes-devtools/elfutils/files/0001-config-eu.am-do-not-force-Werror.patch new file mode 100644 index 00000000000..d4e141927f1 --- /dev/null +++ b/meta/recipes-devtools/elfutils/files/0001-config-eu.am-do-not-force-Werror.patch @@ -0,0 +1,34 @@ +From e169c3fc734be1783b3e1a4768dbec05fb64cb4f Mon Sep 17 00:00:00 2001 +From: Alexander Kanavin +Date: Fri, 22 Nov 2024 12:50:48 +0100 +Subject: [PATCH] config/eu.am: do not force -Werror + +This is undesirable when compiler versions may not be the same +as what upstream is using for their own testing. + +Upstream-Status: Inappropriate [oe-core specific] +Signed-off-by: Alexander Kanavin +--- + config/eu.am | 2 -- + 1 file changed, 2 deletions(-) + +diff --git a/config/eu.am b/config/eu.am +index 0b7dab5..5e7a03f 100644 +--- a/config/eu.am ++++ b/config/eu.am +@@ -99,7 +99,6 @@ AM_CFLAGS = -std=gnu99 -Wall -Wshadow -Wformat=2 \ + $(LOGICAL_OP_WARNING) $(DUPLICATED_COND_WARNING) \ + $(NULL_DEREFERENCE_WARNING) $(IMPLICIT_FALLTHROUGH_WARNING) \ + $(USE_AFTER_FREE3_WARNING) \ +- $(if $($(*F)_no_Werror),,-Werror) \ + $(if $($(*F)_no_Wunused),,-Wunused -Wextra) \ + $(if $($(*F)_no_Wstack_usage),,$(STACK_USAGE_WARNING)) \ + $(if $($(*F)_no_Wpacked_not_aligned),$(NO_PACKED_NOT_ALIGNED_WARNING),) \ +@@ -109,7 +108,6 @@ AM_CXXFLAGS = -std=c++11 -Wall -Wshadow \ + $(TRAMPOLINES_WARNING) \ + $(LOGICAL_OP_WARNING) $(DUPLICATED_COND_WARNING) \ + $(NULL_DEREFERENCE_WARNING) $(IMPLICIT_FALLTHROUGH_WARNING) \ +- $(if $($(*F)_no_Werror),,-Werror) \ + $(if $($(*F)_no_Wunused),,-Wunused -Wextra) \ + $(if $($(*F)_no_Wstack_usage),,$(STACK_USAGE_WARNING)) \ + $(if $($(*F)_no_Wpacked_not_aligned),$(NO_PACKED_NOT_ALIGNED_WARNING),) \ From patchwork Fri Apr 24 20:55:52 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86910 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 98F40FF8851 for ; Fri, 24 Apr 2026 20:57:14 +0000 (UTC) Received: from mail-wm1-f41.google.com (mail-wm1-f41.google.com [209.85.128.41]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31995.1777064229446914251 for ; Fri, 24 Apr 2026 13:57:09 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=uo8JuzGl; spf=pass (domain: smile.fr, ip: 209.85.128.41, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f41.google.com with SMTP id 5b1f17b1804b1-488a8ca4aadso113588835e9.3 for ; Fri, 24 Apr 2026 13:57:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064228; x=1777669028; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=/sk+KyOSUpry0foy4yc4J13HLhPnVzfT1QPR38uM++A=; b=uo8JuzGlSS4I+2KTNgOaNsCzIWX+pjxJLfgQCjRC4KfCHvgMViL/QvYu1KecEB4EtC RBvU/6ch/IgHqh71eOphYNFwmxVSOcAY0I90/fXW5bS0aXiF+axZ+r6Ss2pE0BXvsDva abTnO0HFwTU487r6dW6YtGYVkqM4YAGEsM1Aw= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064228; x=1777669028; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=/sk+KyOSUpry0foy4yc4J13HLhPnVzfT1QPR38uM++A=; b=Ue/JZ4nzV3D9MIl9iGxLpEmjdi6Dvq30YtomuSs1QUDqcNLkJ76cqAdrP8T0GgvMWv GHIAu7aK13G+Fzd2UBuBv664kSTQ5Rl2k9ioZQvTRFaQipOT0cXQmbaXdQ4Cy+sOB3U5 d7djxZiTBf2s7AQQTksU1brsxudbqO2lIrZZJOPTwy+7zKgj88ogzKSVavOd2tlMFklS SrfO3E6G4y2eOMDKMIolRPkO1cdXafZNk943lH5WZmBENuBchLrMZ2UEoBmPirZNhqFm PhLBeuv2MSWStt7Xus1Y3W9PWi0hECjUsOoaHG2M3qw7P8E27nymcqxateb4aIww7GgW 30kw== X-Gm-Message-State: AOJu0YwxihkvC9dh6hEAACfsv73xJTcYXGbdwarI1UxkZTeaFt9DgRO4 y4p8927BwN6QC5x/Q4BgDd4/QjJIkQP2lIBqxVeg0pLUKwy4JF59zomj89vWlZdWIJnRXTewzY/ olFyeN88E+w== X-Gm-Gg: AeBDieuZyCWtberjiBWpt1MhcTG7YM7+DLGXyVNWqyALDAWDTzFW9AuxJvTLYop5Q3z aJoDZzs1GfRznVmWPlZ6CYQe+PDXkCvTehTdpmSUNbDug/XnsA9B6L6fM8wuo4Et41hP73P28dR 6ECneQ4txW8mnarOpjN4U2dhR9ZY8CaGVyKA4WjxF+lpofTSOtwuLigXQl6HE0YCt59RsKGlSS3 WPvJD/Xg/G6mwRQN/zKTU47cFUBqy1FbN7Xvz+sR6hZ1XCh5oJ36+FkVvRRgc9vwkYV+WHSuqcr gpL/tSnr1Vh+vxbqIRz+M0JmmI/cfxMeSIMXreoSZwXxqE2CI+pFhGrPeECAAAcK3qOzF3BwdGr JXPsDpKi+tsLpZxiRCG87AXglXIEhWFd8j5Rk0dBXAsj3eWL4ddptelRr3WKDAiVxl+xThR9FmO G6N8/efl/DvTh8wq5a7cf1qgJcbFW0i7l7YrHhdJHVzSitfKVyUHMiDDhyT1bJtvwNjmL546dOg XCNvLqGcWdJNh3OKCXLnO1pF89y1WhAaa7nvw== X-Received: by 2002:a05:600c:8183:b0:488:ab26:8fe0 with SMTP id 5b1f17b1804b1-488fb765b1dmr397942135e9.15.1777064227550; Fri, 24 Apr 2026 13:57:07 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.07 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:07 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 53/66] binutils: backport patch to fix build with glibc-2.43 on host Date: Fri, 24 Apr 2026 22:55:52 +0200 Message-ID: <6421f085fbb75df1cd122f1c327352b9434f8307.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:14 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235926 From: Martin Jansa Fixes: ../../../gprofng/libcollector/linetrace.c: In function ‘__collector_ext_line_install’: ../../../gprofng/libcollector/linetrace.c:219:45: error: expected identifier before ‘_Generic’ 219 | if (java_follow_env != NULL && CALL_UTIL (strstr)(java_follow_env, COLLECTOR_JVMTI_OPTION)) | ^~~~~~ ../../../gprofng/libcollector/linetrace.c:219:34: note: in expansion of macro ‘CALL_UTIL’ 219 | if (java_follow_env != NULL && CALL_UTIL (strstr)(java_follow_env, COLLECTOR_JVMTI_OPTION)) | ^~~~~~~~~ Signed-off-by: Martin Jansa Signed-off-by: Yoann Congal --- .../binutils/binutils-2.42.inc | 1 + ...tect-against-standard-library-macros.patch | 31 +++++++++++++++++++ 2 files changed, 32 insertions(+) create mode 100644 meta/recipes-devtools/binutils/binutils/0022-gprofng-protect-against-standard-library-macros.patch diff --git a/meta/recipes-devtools/binutils/binutils-2.42.inc b/meta/recipes-devtools/binutils/binutils-2.42.inc index e27502af72e..096ccf42c2a 100644 --- a/meta/recipes-devtools/binutils/binutils-2.42.inc +++ b/meta/recipes-devtools/binutils/binutils-2.42.inc @@ -45,6 +45,7 @@ SRC_URI = "\ file://0019-Fix-32097-Warnings-when-building-gprofng-with-Clang.patch \ file://0020-gprofng-fix-std-gnu23-compatibility-wrt-unprototyped.patch \ file://0021-gprofng-fix-build-with-std-gnu23.patch \ + file://0022-gprofng-protect-against-standard-library-macros.patch \ file://0018-CVE-2025-0840.patch \ file://CVE-2025-1176.patch \ file://CVE-2025-1178.patch \ diff --git a/meta/recipes-devtools/binutils/binutils/0022-gprofng-protect-against-standard-library-macros.patch b/meta/recipes-devtools/binutils/binutils/0022-gprofng-protect-against-standard-library-macros.patch new file mode 100644 index 00000000000..0fa0a939918 --- /dev/null +++ b/meta/recipes-devtools/binutils/binutils/0022-gprofng-protect-against-standard-library-macros.patch @@ -0,0 +1,31 @@ +From 5f66aee7f4bec7a2d8378034116f5e5c3dc50f41 Mon Sep 17 00:00:00 2001 +From: Andreas Schwab +Date: Sat, 22 Nov 2025 11:29:43 +0100 +Subject: [PATCH] gprofng: protect against standard library macros + +The CALL_UTIL macro can expand to an unparsable expression of the argument +is a macro, like with the new const-preserving standard library macros in +C23. + + * gprofng/src/collector_module.h (CALL_UTIL): Add parens to not + expand its argument if it is a function-like macro. + +Upstream-Status: Backport [2.46 5f66aee7f4bec7a2d8378034116f5e5c3dc50f41] +Signed-off-by: Martin Jansa +--- + gprofng/src/collector_module.h | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/gprofng/src/collector_module.h b/gprofng/src/collector_module.h +index b64d69c45ab..859a6dd1f7d 100644 +--- a/gprofng/src/collector_module.h ++++ b/gprofng/src/collector_module.h +@@ -119,7 +119,7 @@ typedef struct CollectorUtilFuncs + extern CollectorUtilFuncs __collector_util_funcs; + extern int __collector_dlsym_guard; + +-#define CALL_UTIL(x) __collector_util_funcs.x ++#define CALL_UTIL(x) (__collector_util_funcs.x) + + /* The following constants define the meaning of the "void *arg" + * argument of getFrameInfo(). From patchwork Fri Apr 24 20:55:53 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86900 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id BF366FF8845 for ; Fri, 24 Apr 2026 20:57:13 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32611.1777064230206687266 for ; Fri, 24 Apr 2026 13:57:10 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=EwVnZCxJ; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488ba840146so74042075e9.1 for ; Fri, 24 Apr 2026 13:57:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064228; x=1777669028; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=UJMU8WLKktppuZaGXmmEnjVwOd7SXV91NW1SwgfV/ho=; b=EwVnZCxJvyoNv+YRyEm68XWPxOj/IDxWj2tf+sXkKTUhS5l6r666xKgDsyxNQwoBYu IMA0QfPN5E9Z4dHcKZY0c+eHjQRSsxTTUry2FwwJ4qb0LOKc7MXYxBrie55StjiF+Lu3 p4G98/mtNGKw36g5wsTi8pKdTHyDfMbg+8WTk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064228; x=1777669028; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=UJMU8WLKktppuZaGXmmEnjVwOd7SXV91NW1SwgfV/ho=; b=EMa72XOLX/RzT2GvPrG5C1hxh3qARQ5eo2H3I49LSx9eEt4jlBRYoncALpPU9X9ihh ovYnF7TQ7sR18HAQVaOP8ZYYcvHvrXC9ET8r8cD5HnWS9JgnVTKx2CxIq9yOSmR2gO/6 15xHrAKg04vPBgl5hgOzxwpyLFK3gfWfNCSr5bgMZc+agLwUxk0pS6TWrM3QS1y1E4bM 7DsFoq/iOUSWK9Sh/ryNkpbufFJJsufBn6xI3I1NvdBp1VKhqEUxKSgwm8797RxiniQV gXx9ua6lPNECMSzEZSs/XU9Q0wqBBYCorwEG1eNk8FEsGpNOdNB7cbNqSns1Qlt2xw7c W1dg== X-Gm-Message-State: AOJu0YwyXRWllRAZycQJlMqh7Z8hRohfKGEgmrWb1KxzzdFj7B2B0X0+ 1v2GS+b7danOI0QXFZuwTEDi/vVN3nOoCJgeEybNn5Qm39+dh/adRutng01Dz36zTV5TnsMSrKN 9kbKhX6OrTkV7 X-Gm-Gg: AeBDievIcUZYTXMc/rIEqavmljJxxFJwzsaHPFgn9MGfh4SWVk368naEIML990lY8js 6IvDhve5GUqByiS6SVAvBTorYgxq2r9v8TkzJ6QiXBeyQv4MNqmlvram3dZH7ap53J2lo6Ufm9+ EUaD/Y19Dzz2OVGRx/9Sxq/5ybZaKZtXpC7zz1rmRdPDeCpikQMe5MzO7BActXbI9X9euYAp27H zxwIUXODVQo4fB3UquKYZTZvBcWmj49BF4BJAdQ2ptHqrht+16NM/QMzeOs7alfAZjQpraccxBk gH7aU2Mj2BXh46Z2m5GZjHB4K4PGVh24tQwssi3g23E47Bqi6xTDUas8MWU8sKcKyIpODnrjEHB Gy2Bz+JCuWDI1qxHH7IGbSh2jj2/8PpMwBteUwKbGDwjzCimZZpISeJSzxF6zolbs0dgg9qY+uc tiOo4sH9E/OlXUVNWkimx650oStug64e+WgZ8/+VENKElg8XoVVv32zDxS6GkajTPagsoXbTNib GANhzNYjNK3/fX+N73n8FdDWSWpbTZyDu+4pQ== X-Received: by 2002:a05:600c:348d:b0:48a:674d:e756 with SMTP id 5b1f17b1804b1-48a677401c7mr38503545e9.20.1777064228091; Fri, 24 Apr 2026 13:57:08 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.07 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:07 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 54/66] texinfo: Backport patches for hosts with newer GCC Date: Fri, 24 Apr 2026 22:55:53 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235927 From: Yoann Congal On Ubuntu 26.04 (Gcc 15.2), texinfo-native fails to build. Note: it is usually ASSUME_PROVIDED via bitbake.conf. Backport patches (all included in texinfo-7.3, OE-Core's version) to fix these errors: | ../../texinfo-7.0.3/system.h:69:14: error: conflicting types for ‘strerror’; have ‘char *(void)’ | 69 | extern char *strerror (); | | ^~~~~~~~ | In file included from ../gnulib/lib/string.h:41, | from ../../texinfo-7.0.3/system.h:34: | /usr/include/string.h:451:14: note: previous declaration of ‘strerror’ with type ‘char *(int)’ | 451 | extern char *strerror (int __errnum) __THROW; | | ^~~~~~~~ ======================================================== | ../../../../../../../workspace/sources/texinfo-native/info/echo-area.c:176:12: error: too many arguments to function ‘cmd’; expected 0, have 2 | 176 | (*cmd) (the_echo_area, count); | | ~^~~~~ ~~~~~~~~~~~~~ ======================================================== | ../../../../../../../workspace/sources/texinfo-native/info/m-x.c:140:8: error: too many arguments to function ‘command->func’; expected 0, have 3 | 140 | (*command->func) (active_window, count, 0); | | ~^~~~~~~~~~~~~~~ ~~~~~~~~~~~~~ ======================================================== Signed-off-by: Yoann Congal --- ...strerror-definition-the-prototype-lo.patch | 27 +++ ...tion-CFunction-Remove-unused-typedef.patch | 27 +++ ...prototype-for-Info-command-functions.patch | 194 ++++++++++++++++ .../texinfo/0004-Remove-VFunction.patch | 217 ++++++++++++++++++ .../recipes-extended/texinfo/texinfo_7.0.3.bb | 4 + 5 files changed, 469 insertions(+) create mode 100644 meta/recipes-extended/texinfo/texinfo/0001-system.h-remove-strerror-definition-the-prototype-lo.patch create mode 100644 meta/recipes-extended/texinfo/texinfo/0002-info-info.h-Function-CFunction-Remove-unused-typedef.patch create mode 100644 meta/recipes-extended/texinfo/texinfo/0003-Use-explicit-prototype-for-Info-command-functions.patch create mode 100644 meta/recipes-extended/texinfo/texinfo/0004-Remove-VFunction.patch diff --git a/meta/recipes-extended/texinfo/texinfo/0001-system.h-remove-strerror-definition-the-prototype-lo.patch b/meta/recipes-extended/texinfo/texinfo/0001-system.h-remove-strerror-definition-the-prototype-lo.patch new file mode 100644 index 00000000000..1a31b321486 --- /dev/null +++ b/meta/recipes-extended/texinfo/texinfo/0001-system.h-remove-strerror-definition-the-prototype-lo.patch @@ -0,0 +1,27 @@ +From 3d202924c8ddd96029129bb745772cb2918a5f10 Mon Sep 17 00:00:00 2001 +From: Patrice Dumas +Date: Sun, 16 Jun 2024 15:10:22 +0200 +Subject: * system.h: remove strerror definition, the prototype looks wrong and + the conditional is not set anywhere. + +Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/texinfo.git/commit/?id=3d202924c8ddd96029129bb745772cb2918a5f10] +Signed-off-by: Yoann Congal +--- + system.h | 4 ---- + 1 file changed, 4 deletions(-) + +diff --git a/system.h b/system.h +index e32937f16e..7694d85a45 100644 +--- a/system.h ++++ b/system.h +@@ -65,10 +65,6 @@ extern int errno; + #include + #endif + +-#ifndef HAVE_DECL_STRERROR +-extern char *strerror (); +-#endif +- + #include + + #ifndef PATH_MAX diff --git a/meta/recipes-extended/texinfo/texinfo/0002-info-info.h-Function-CFunction-Remove-unused-typedef.patch b/meta/recipes-extended/texinfo/texinfo/0002-info-info.h-Function-CFunction-Remove-unused-typedef.patch new file mode 100644 index 00000000000..9ed97b12ffe --- /dev/null +++ b/meta/recipes-extended/texinfo/texinfo/0002-info-info.h-Function-CFunction-Remove-unused-typedef.patch @@ -0,0 +1,27 @@ +From 5e06e9846c44cb5d7b1c937728ba701b4a9d9523 Mon Sep 17 00:00:00 2001 +From: Gavin Smith +Date: Sun, 28 Jan 2024 15:45:25 +0000 +Subject: * info/info.h (Function, CFunction): Remove unused typedefs. + +Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/texinfo.git/commit/?id=5e06e9846c44cb5d7b1c937728ba701b4a9d9523] +Signed-off-by: Yoann Congal +--- + info/info.h | 4 +--- + 1 file changed, 1 insertion(+), 3 deletions(-) + +diff --git a/info/info.h b/info/info.h +index 8082725146..b1274ef7a4 100644 +--- a/info/info.h ++++ b/info/info.h +@@ -23,10 +23,8 @@ + /* System dependencies. */ + #include "system.h" + +-/* Some of our other include files use these. */ +-typedef int Function (); ++/* Some of our other include files use this. */ + typedef void VFunction (); +-typedef char *CFunction (); + + #include "string.h" + #include "mbiter.h" diff --git a/meta/recipes-extended/texinfo/texinfo/0003-Use-explicit-prototype-for-Info-command-functions.patch b/meta/recipes-extended/texinfo/texinfo/0003-Use-explicit-prototype-for-Info-command-functions.patch new file mode 100644 index 00000000000..f955661d520 --- /dev/null +++ b/meta/recipes-extended/texinfo/texinfo/0003-Use-explicit-prototype-for-Info-command-functions.patch @@ -0,0 +1,194 @@ +From deb7fb40bcaeaa537b14e0690f0fa78081844481 Mon Sep 17 00:00:00 2001 +From: Patrice Dumas +Date: Mon, 17 Jun 2024 19:26:32 +0200 +Subject: [PATCH] Use explicit prototype for Info command functions + +* info/m-x.c (info_execute_command): call command function with two +arguments only, window and count. + +* info/doc.h (InfoCommand), info/echo-area.c +(read_and_dispatch_in_echo_area, ea_yank_pop) +(ea_possible_completions), info/info.h (COMMAND_FUNCTION), +info/makedoc.c (process_one_file), info/session.c +(info_read_and_dispatch, read_key_sequence), info/terminal.h +(VFunction): add a function type COMMAND_FUNCTION for pointers on info +commands function and replace the VFunction untyped generic function +type. Move VFunction definition to terminal.h. + +Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/texinfo.git/commit/?id=2e62ec97bad667f1dd91f1a396f5c0376aef1c03] +Signed-off-by: Yoann Congal +--- + info/doc.h | 2 +- + info/echo-area.c | 10 +++++----- + info/info.h | 4 ++-- + info/m-x.c | 2 +- + info/makedoc.c | 2 +- + info/session.c | 8 ++++---- + info/session.h | 4 ++-- + info/terminal.h | 2 +- + 8 files changed, 17 insertions(+), 17 deletions(-) + +diff --git a/info/doc.h b/info/doc.h +index 26ed41f80c..e9cc2ced0e 100644 +--- a/info/doc.h ++++ b/info/doc.h +@@ -44,7 +44,7 @@ typedef struct function_keyseq + /* Structure describing an Info command. */ + typedef struct + { +- VFunction *func; /* Pointer to function implementing command. */ ++ COMMAND_FUNCTION *func; /* Pointer to function implementing command. */ + char *func_name; /* Name of this command. */ + FUNCTION_KEYSEQ *keys; /* Key sequences that could invoke this command. */ + char *doc; /* Documentation string. */ +diff --git a/info/echo-area.c b/info/echo-area.c +index f485e43f76..375c66a560 100644 +--- a/info/echo-area.c ++++ b/info/echo-area.c +@@ -31,7 +31,7 @@ int info_aborted_echo_area = 0; + int echo_area_is_active = 0; + + /* The address of the last command executed in the echo area. */ +-static VFunction *ea_last_executed_command = NULL; ++static COMMAND_FUNCTION *ea_last_executed_command = NULL; + + /* Non-zero means that the last command executed while reading input + killed some text. */ +@@ -158,7 +158,7 @@ read_and_dispatch_in_echo_area (void) + while (1) + { + int count; +- VFunction *cmd; ++ COMMAND_FUNCTION *cmd; + int lk = 0; + + lk = echo_area_last_command_was_kill; +@@ -669,8 +669,8 @@ DECLARE_INFO_COMMAND (ea_yank_pop, _("Yank back a previous kill")) + { + register int len; + +- if (((ea_last_executed_command != (VFunction *) ea_yank) && +- (ea_last_executed_command != (VFunction *) ea_yank_pop)) || ++ if (((ea_last_executed_command != ea_yank) && ++ (ea_last_executed_command != ea_yank_pop)) || + (kill_ring_index == 0)) + return; + +@@ -1166,7 +1166,7 @@ DECLARE_INFO_COMMAND (ea_possible_completions, _("List possible completions")) + + DECLARE_INFO_COMMAND (ea_complete, _("Insert completion")) + { +- if (ea_last_executed_command == (VFunction *) ea_complete) ++ if (ea_last_executed_command == ea_complete) + { + ea_possible_completions (window, count); + return; +diff --git a/info/info.h b/info/info.h +index b1274ef7a4..401b0543d3 100644 +--- a/info/info.h ++++ b/info/info.h +@@ -23,8 +23,8 @@ + /* System dependencies. */ + #include "system.h" + +-/* Some of our other include files use this. */ +-typedef void VFunction (); ++struct window_struct; ++typedef void COMMAND_FUNCTION (struct window_struct *window, int count); + + #include "string.h" + #include "mbiter.h" +diff --git a/info/m-x.c b/info/m-x.c +index 669d999738..9a194a1e28 100644 +--- a/info/m-x.c ++++ b/info/m-x.c +@@ -137,7 +137,7 @@ DECLARE_INFO_COMMAND (info_execute_command, + free (line); + + if (command && command->func) +- (*command->func) (active_window, count, 0); ++ (*command->func) (active_window, count); + } + } + +diff --git a/info/makedoc.c b/info/makedoc.c +index e7d98d64f9..84ea419d4d 100644 +--- a/info/makedoc.c ++++ b/info/makedoc.c +@@ -436,7 +436,7 @@ process_one_file (char *filename, FILE *doc_stream, FILE *funs_stream) + doc[offset - point] = '\0'; + + fprintf (doc_stream, +- " { (VFunction *)%s, \"%s\", (FUNCTION_KEYSEQ *)0, %s },\n", ++ " { %s, \"%s\", (FUNCTION_KEYSEQ *)0, %s },\n", + func, func_name, doc); + + free (func_name); +diff --git a/info/session.c b/info/session.c +index 499857ef13..2cb4414326 100644 +--- a/info/session.c ++++ b/info/session.c +@@ -229,7 +229,7 @@ static int info_keyseq_displayed_p; + void + info_read_and_dispatch (void) + { +- VFunction *cmd; ++ COMMAND_FUNCTION *cmd; + int count; + + for (quit_info_immediately = 0; !quit_info_immediately; ) +@@ -5018,7 +5018,7 @@ incremental_search (WINDOW *window, int count) + + while (isearch_is_active) + { +- VFunction *func = NULL; ++ COMMAND_FUNCTION *func = NULL; + int quoted = 0; + + /* Show the search string in the echo area. */ +@@ -5546,7 +5546,7 @@ void info_add_digit_to_numeric_arg (WINDOW *, int count); + + If INSERT, call ea_insert if a printable character was input. + */ +-VFunction * ++COMMAND_FUNCTION * + read_key_sequence (Keymap map, int menu, int mouse, + int insert, int *count) + { +@@ -5554,7 +5554,7 @@ read_key_sequence (Keymap map, int menu, int mouse, + int reading_universal_argument = 0; + + int numeric_arg = 1, numeric_arg_sign = 1, *which_explicit_arg; +- VFunction *func; ++ COMMAND_FUNCTION *func; + + /* Process the right numeric argument. */ + if (!echo_area_is_active) +diff --git a/info/session.h b/info/session.h +index 4606d0a519..94b4935ef0 100644 +--- a/info/session.h ++++ b/info/session.h +@@ -58,8 +58,8 @@ extern int scroll_last_node; + int get_input_key (void); + int get_another_input_key (void); + +-VFunction *read_key_sequence (Keymap map, int menu, int mouse, +- int insert, int *count); ++COMMAND_FUNCTION *read_key_sequence (Keymap map, int menu, int mouse, ++ int insert, int *count); + unsigned char info_input_pending_p (void); + void info_set_node_of_window (WINDOW *window, NODE *node); + void info_set_node_of_window_fast (WINDOW *window, NODE *node); +diff --git a/info/terminal.h b/info/terminal.h +index 8108b6b6b5..ee881a8bb1 100644 +--- a/info/terminal.h ++++ b/info/terminal.h +@@ -20,7 +20,7 @@ + #if !defined (TERMINAL_H) + #define TERMINAL_H + +-#include "info.h" ++typedef void VFunction (); + + /* For almost every function externally visible from terminal.c, there is + a corresponding "hook" function which can be bound in order to replace diff --git a/meta/recipes-extended/texinfo/texinfo/0004-Remove-VFunction.patch b/meta/recipes-extended/texinfo/texinfo/0004-Remove-VFunction.patch new file mode 100644 index 00000000000..eb9957c3dcf --- /dev/null +++ b/meta/recipes-extended/texinfo/texinfo/0004-Remove-VFunction.patch @@ -0,0 +1,217 @@ +From 7e8d0093b411729c8c570b25280bef6b55415594 Mon Sep 17 00:00:00 2001 +From: Gavin Smith +Date: Fri, 9 Aug 2024 11:05:08 +0100 +Subject: [PATCH] Remove VFunction. + +* info/terminal.c, info/terminal.h +(terminal_begin_blink_hook, terminal_begin_bold_hook) +(terminal_begin_inverse_hook, terminal_begin_standout_hook) +(terminal_begin_underline_hook, terminal_clear_screen_hook) +(terminal_clear_to_eol_hook, terminal_default_colour_hook) +(terminal_down_line_hook, terminal_end_all_modes_hook) +(terminal_end_inverse_hook, terminal_end_standout_hook) +(terminal_end_underline_hook, terminal_get_screen_size_hook) +(terminal_goto_xy_hook, terminal_initialize_terminal_hook) +(terminal_new_terminal_hook, terminal_prep_terminal_hook) +(terminal_put_text_hook, terminal_ring_bell_hook) +(terminal_scroll_terminal_hook, terminal_set_bgcolour_hook,) +(terminal_set_colour_hook, terminal_unprep_terminal_hook,) +(terminal_up_line_hook, terminal_write_chars_hook): +Declare with explicit variable list. +(VFunction): Remove. + +C23 does not allow a variable list to be left undefined as (). +Report from Jeffrey Cliff . + +Upstream-Status: Backport [https://cgit.git.savannah.gnu.org/cgit/texinfo.git/commit/?id=7e8d0093b411729c8c570b25280bef6b55415594] +Signed-off-by: Yoann Congal +--- + info/terminal.c | 53 +++++++++++++++++++++++++------------------------ + info/terminal.h | 42 +++++++++++++++++++-------------------- + 2 files changed, 47 insertions(+), 48 deletions(-) + +diff --git a/info/terminal.c b/info/terminal.c +index 7a9793befc..b6f59ff5c5 100644 +--- a/info/terminal.c ++++ b/info/terminal.c +@@ -53,32 +53,33 @@ extern int tputs (); + function is called when appropriate instead of its namesake. Your + function is called with exactly the same arguments that were passed + to the namesake function. */ +-VFunction *terminal_begin_inverse_hook = NULL; +-VFunction *terminal_end_inverse_hook = NULL; +-VFunction *terminal_begin_standout_hook = NULL; +-VFunction *terminal_end_standout_hook = NULL; +-VFunction *terminal_begin_underline_hook = NULL; +-VFunction *terminal_end_underline_hook = NULL; +-VFunction *terminal_begin_bold_hook = NULL; +-VFunction *terminal_begin_blink_hook = NULL; +-VFunction *terminal_end_all_modes_hook = NULL; +-VFunction *terminal_default_colour_hook = NULL; +-VFunction *terminal_set_colour_hook = NULL; +-VFunction *terminal_set_bgcolour_hook = NULL; +-VFunction *terminal_prep_terminal_hook = NULL; +-VFunction *terminal_unprep_terminal_hook = NULL; +-VFunction *terminal_up_line_hook = NULL; +-VFunction *terminal_down_line_hook = NULL; +-VFunction *terminal_clear_screen_hook = NULL; +-VFunction *terminal_clear_to_eol_hook = NULL; +-VFunction *terminal_get_screen_size_hook = NULL; +-VFunction *terminal_goto_xy_hook = NULL; +-VFunction *terminal_initialize_terminal_hook = NULL; +-VFunction *terminal_new_terminal_hook = NULL; +-VFunction *terminal_put_text_hook = NULL; +-VFunction *terminal_ring_bell_hook = NULL; +-VFunction *terminal_write_chars_hook = NULL; +-VFunction *terminal_scroll_terminal_hook = NULL; ++ ++void (*terminal_initialize_terminal_hook) (char *terminal_name) = NULL; ++void (*terminal_get_screen_size_hook) (void) = NULL; ++int (*terminal_prep_terminal_hook) (void) = NULL; ++void (*terminal_unprep_terminal_hook) (void) = NULL; ++void (*terminal_new_terminal_hook) (char *terminal_name) = NULL; ++void (*terminal_goto_xy_hook) (int x, int y) = NULL; ++void (*terminal_put_text_hook) (char *string) = NULL; ++void (*terminal_write_chars_hook) (char *string, int nchars) = NULL; ++void (*terminal_clear_to_eol_hook) (void) = NULL; ++void (*terminal_clear_screen_hook) (void) = NULL; ++void (*terminal_up_line_hook) (void) = NULL; ++void (*terminal_down_line_hook) (void) = NULL; ++void (*terminal_begin_inverse_hook) (void) = NULL; ++void (*terminal_end_inverse_hook) (void) = NULL; ++void (*terminal_begin_standout_hook) (void) = NULL; ++void (*terminal_end_standout_hook) (void) = NULL; ++void (*terminal_begin_underline_hook) (void) = NULL; ++void (*terminal_end_underline_hook) (void) = NULL; ++void (*terminal_scroll_terminal_hook) (int start, int end, int amount) = NULL; ++void (*terminal_ring_bell_hook) (void) = NULL; ++void (*terminal_begin_bold_hook) (void) = NULL; ++void (*terminal_begin_blink_hook) (void) = NULL; ++void (*terminal_default_colour_hook) (void) = NULL; ++void (*terminal_set_colour_hook) (int) = NULL; ++void (*terminal_set_bgcolour_hook) (int) = NULL; ++void (*terminal_end_all_modes_hook) (void) = NULL; + + /* User variable 'mouse'. Values can be MP_* constants in terminal.h. */ + int mouse_protocol = MP_NONE; +diff --git a/info/terminal.h b/info/terminal.h +index ee881a8bb1..718d0844a6 100644 +--- a/info/terminal.h ++++ b/info/terminal.h +@@ -20,8 +20,6 @@ + #if !defined (TERMINAL_H) + #define TERMINAL_H + +-typedef void VFunction (); +- + /* For almost every function externally visible from terminal.c, there is + a corresponding "hook" function which can be bound in order to replace + the functionality of the one found in terminal.c. This is how we go +@@ -50,87 +48,87 @@ extern int terminal_can_scroll_region; + The variables SCREENHEIGHT and SCREENWIDTH are set to the dimensions that + this terminal actually has. */ + extern void terminal_initialize_terminal (char *terminal_name); +-extern VFunction *terminal_initialize_terminal_hook; ++extern void (*terminal_initialize_terminal_hook) (char *terminal_name); + + /* Return the current screen width and height in the variables + SCREENWIDTH and SCREENHEIGHT. */ + extern void terminal_get_screen_size (void); +-extern VFunction *terminal_get_screen_size_hook; ++extern void (*terminal_get_screen_size_hook) (void); + + /* Save and restore tty settings. */ + extern int terminal_prep_terminal (void); + extern void terminal_unprep_terminal (void); + +-extern VFunction *terminal_prep_terminal_hook; +-extern VFunction *terminal_unprep_terminal_hook; ++extern int (*terminal_prep_terminal_hook) (void); ++extern void (*terminal_unprep_terminal_hook) (void); + + /* Re-initialize the terminal to TERMINAL_NAME. */ + extern void terminal_new_terminal (char *terminal_name); +-extern VFunction *terminal_new_terminal_hook; ++extern void (*terminal_new_terminal_hook) (char *terminal_name); + + /* Move the cursor to the terminal location of X and Y. */ + extern void terminal_goto_xy (int x, int y); +-extern VFunction *terminal_goto_xy_hook; ++extern void (*terminal_goto_xy_hook) (int x, int y); + + /* Print STRING to the terminal at the current position. */ + extern void terminal_put_text (char *string); +-extern VFunction *terminal_put_text_hook; ++extern void (*terminal_put_text_hook) (char *string); + + /* Print NCHARS from STRING to the terminal at the current position. */ + extern void terminal_write_chars (char *string, int nchars); +-extern VFunction *terminal_write_chars_hook; ++extern void (*terminal_write_chars_hook) (char *string, int nchars); + + /* Clear from the current position of the cursor to the end of the line. */ + extern void terminal_clear_to_eol (void); +-extern VFunction *terminal_clear_to_eol_hook; ++extern void (*terminal_clear_to_eol_hook) (void); + + /* Clear the entire terminal screen. */ + extern void terminal_clear_screen (void); +-extern VFunction *terminal_clear_screen_hook; ++extern void (*terminal_clear_screen_hook) (void); + + /* Move the cursor up one line. */ + extern void terminal_up_line (void); +-extern VFunction *terminal_up_line_hook; ++extern void (*terminal_up_line_hook) (void); + + /* Move the cursor down one line. */ + extern void terminal_down_line (void); +-extern VFunction *terminal_down_line_hook; ++extern void (*terminal_down_line_hook) (void); + + /* Turn on reverse video if possible. */ + extern void terminal_begin_inverse (void); +-extern VFunction *terminal_begin_inverse_hook; ++extern void (*terminal_begin_inverse_hook) (void); + + /* Turn off reverse video if possible. */ + extern void terminal_end_inverse (void); +-extern VFunction *terminal_end_inverse_hook; ++extern void (*terminal_end_inverse_hook) (void); + + /* Turn on standout mode if possible. */ + extern void terminal_begin_standout (void); +-extern VFunction *terminal_begin_standout_hook; ++extern void (*terminal_begin_standout_hook) (void); + + /* Turn off standout mode if possible. */ + extern void terminal_end_standout (void); +-extern VFunction *terminal_end_standout_hook; ++extern void (*terminal_end_standout_hook) (void); + + /* Turn on and off underline mode if possible. */ + void terminal_begin_underline (void); +-extern VFunction *terminal_begin_underline_hook; ++extern void (*terminal_begin_underline_hook) (void); + void terminal_end_underline (void); +-extern VFunction *terminal_end_underline_hook; ++extern void (*terminal_end_underline_hook) (void); + + /* Scroll an area of the terminal, starting with the region from START + to END, AMOUNT lines. If AMOUNT is negative, the lines are scrolled + towards the top of the screen, else they are scrolled towards the + bottom of the screen. */ + extern void terminal_scroll_terminal (int start, int end, int amount); +-extern VFunction *terminal_scroll_terminal_hook; ++extern void (*terminal_scroll_terminal_hook) (int start, int end, int amount); + + extern void terminal_scroll_region (int start, int end, int amount); + + /* Ring the terminal bell. The bell is run visibly if it both has one and + terminal_use_visible_bell_p is non-zero. */ + extern void terminal_ring_bell (void); +-extern VFunction *terminal_ring_bell_hook; ++extern void (*terminal_ring_bell_hook) (void); + + /* The key sequences output by special keys, if this terminal has any. */ + extern char *term_ku, *term_kd, *term_kr, *term_kl; diff --git a/meta/recipes-extended/texinfo/texinfo_7.0.3.bb b/meta/recipes-extended/texinfo/texinfo_7.0.3.bb index b149177b72d..849dca433b9 100644 --- a/meta/recipes-extended/texinfo/texinfo_7.0.3.bb +++ b/meta/recipes-extended/texinfo/texinfo_7.0.3.bb @@ -33,6 +33,10 @@ SRC_URI = "${GNU_MIRROR}/texinfo/${BP}.tar.gz \ file://link-zip.patch \ file://dont-depend-on-help2man.patch \ ${TARGET_PATCH} \ + file://0001-system.h-remove-strerror-definition-the-prototype-lo.patch \ + file://0002-info-info.h-Function-CFunction-Remove-unused-typedef.patch \ + file://0003-Use-explicit-prototype-for-Info-command-functions.patch \ + file://0004-Remove-VFunction.patch \ " SRC_URI[sha256sum] = "3cc5706fb086b895e1dc2b407aade9f95a3a233ff856273e2b659b089f117683" From patchwork Fri Apr 24 20:55:54 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86911 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 80B67FF884F for ; Fri, 24 Apr 2026 20:57:14 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32612.1777064230631153218 for ; Fri, 24 Apr 2026 13:57:10 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=hCOFh9Sk; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-48909558b3aso78132465e9.0 for ; Fri, 24 Apr 2026 13:57:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064229; x=1777669029; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=ujpZ53CRhA+tBXaMR5DmftM0N1Ui0T3iRz1/mQ/YxiE=; b=hCOFh9SkKOUiLEFyFuhkjqwRXNhn/seGda0pE0mczbkZrs+7BA5gmOxKjVZTjaEOKr cEj3HwB1tmhvoLNEg+pSJXw73coR30LJoyhWGGDMiQ4rICvyULlp37qNfuTzUVAz6YS5 H39tNZGIkZvoAUp3vh8b+QD2B9ZvlK9ssKoYo= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064229; x=1777669029; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=ujpZ53CRhA+tBXaMR5DmftM0N1Ui0T3iRz1/mQ/YxiE=; b=FefCzK/HeTHHpbqpZXYJBExxOjmQC5X0IdHgoSfn9RLzhLWleF1ZDfngmggMFab/ZQ Su5exx2tMYE39h9OcEXGGMcmpTOm79AJr3JWAIwQwc/2ag0WiMcOWDEftkV+YbB2AUGV nhuzpsFSPKmLdUPj1E5CsB14rZ+UuI0rN/vKDDIQcc4enCbb9yXTkDAECu5JbyrOGcdm 6IR16NvMHRWjjihoVy8U0GX+X2swi3HsXLYPJv5TbLivm8+WWJY/8Cr9rrla63ObAoI3 iEiRlOWNSJEwJq+JgtLj+iRBEVyP//LruwGx7KgbC6TA0xAz2sk7WKIuTewX+TJBQCHL sPZQ== X-Gm-Message-State: AOJu0YxKnW9VgQrED5OaqArzX1t/w0MGboTAU5zWLxnb4bPdO1dPfhTA jW+3EnPg1WiCvSB6Wp8qtwwKiuZ3cNDYmNaGXNvMPBLXPqinbyAGZe6cm5BoOOnePRYvHKajtFR ppQ4gpoCCNZSJ X-Gm-Gg: AeBDieuJGkHquXtvBVWLotsCqZ/DYPV8eZeppQWLsgJAC0fuzC/bNyePMQKc8qBQoSD TobEUJJCd2tL/L3pK6NRax1tQ13NHPC6arxCpmVdqrr5MazmUhLVHuEzYbsumhD0mPGXZ5FilH7 3Y41cOunx/ihrxwOPouYBR96oNCl7cSc14fG+ryjCX0PWiCvLzu4qg+q3sQLK8KTHN6MRmlFLjR 9P8u52hYtIe6EDvitE54LU9WyIoc49Ka9VzDqvN07FXogwoaINdvdKZl/LNWxH0l07anVNT5knK LSfn4bJFmA2458yjlqSs317ZJjDYIwyQt9vvM6QizKkTjrG006rt/kGYUSYwOBHYl7r4MDuiwMp /bJe4gY6HleGVrrTEzcIl9Hf+Qmbn89gx7COb6t74K1BRZjVNqlNGHvk0gYUEWhR3XvfZkkavNE Q0RLRuCazxe6zeCqdOzVn8/nu6RDWJk0xN/BTbrGfwmNXuJ1/dPGEey1n13ypuw5oUk2JEIymtu VGpecD8ncku+EstqldqHbz7ZvTDSxnjm0JtXA== X-Received: by 2002:a05:600d:16:b0:489:19e9:b139 with SMTP id 5b1f17b1804b1-48919e9b29fmr261116695e9.1.1777064228623; Fri, 24 Apr 2026 13:57:08 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.08 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:08 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 55/66] qemu: backport patches to support python 3.14 Date: Fri, 24 Apr 2026 22:55:54 +0200 Message-ID: <28bab00b35af8bbe3455c8266e4c792fa2367c5d.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:14 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235928 From: Yoann Congal We use QEMU QMP python module to drive qemu in testimage. QMP uses asyncIO and the method to get the event loop changed. Backport the patches handling the depreciation to fix the error: ERROR: core-image-minimal-1.0-r0 do_testimage: Error executing a python function in exec_func_python() autogenerated: The stack trace of python calls that resulted in this exception/failure was: File: 'exec_func_python() autogenerated', lineno: 2, function: *** 0002:do_testimage(d) ... File: '.../openembedded-core/meta/lib/oeqa/utils/qemurunner.py', lineno: 332, function: launch 0331: from qmp.legacy import QEMUMonitorProtocol *** 0332: self.qmp = QEMUMonitorProtocol(os.path.basename(qmp_port)) File: '.../build-ubuntu2604/tmp-glibc/work/qemux86_64-oe-linux/core-image-minimal/1.0/recipe-sysroot-native/usr/lib/qemu-python/qmp/legacy.py', lineno: 89, function: __init__ *** 0089: self._aloop = asyncio.get_event_loop() File: '/usr/lib/python3.14/asyncio/events.py', lineno: 715, function: get_event_loop 0711: 0712: Returns an instance of EventLoop or raises an exception. 0713: """ 0714: if self._local._loop is None: *** 0715: raise RuntimeError('There is no current event loop in thread %r.' 0716: % threading.current_thread().name) 0717: 0718: return self._local._loop Exception: RuntimeError: There is no current event loop in thread 'MainThread'. Both patches are in Qemu 10.2 (OE Core master version) Signed-off-by: Yoann Congal --- meta/recipes-devtools/qemu/qemu.inc | 2 + ...Remove-deprecated-get_event_loop-cal.patch | 92 ++++++++ ...avoid-creating-additional-event-loop.patch | 199 ++++++++++++++++++ 3 files changed, 293 insertions(+) create mode 100644 meta/recipes-devtools/qemu/qemu/0001-python-backport-Remove-deprecated-get_event_loop-cal.patch create mode 100644 meta/recipes-devtools/qemu/qemu/0002-python-backport-avoid-creating-additional-event-loop.patch diff --git a/meta/recipes-devtools/qemu/qemu.inc b/meta/recipes-devtools/qemu/qemu.inc index 748a32215e0..54644dd9241 100644 --- a/meta/recipes-devtools/qemu/qemu.inc +++ b/meta/recipes-devtools/qemu/qemu.inc @@ -43,6 +43,8 @@ SRC_URI = "https://download.qemu.org/${BPN}-${PV}.tar.xz \ file://qemu-guest-agent.udev \ file://CVE-2024-8354.patch \ file://CVE-2025-12464.patch \ + file://0001-python-backport-Remove-deprecated-get_event_loop-cal.patch \ + file://0002-python-backport-avoid-creating-additional-event-loop.patch \ " UPSTREAM_CHECK_REGEX = "qemu-(?P\d+(\.\d+)+)\.tar" diff --git a/meta/recipes-devtools/qemu/qemu/0001-python-backport-Remove-deprecated-get_event_loop-cal.patch b/meta/recipes-devtools/qemu/qemu/0001-python-backport-Remove-deprecated-get_event_loop-cal.patch new file mode 100644 index 00000000000..7a564513c03 --- /dev/null +++ b/meta/recipes-devtools/qemu/qemu/0001-python-backport-Remove-deprecated-get_event_loop-cal.patch @@ -0,0 +1,92 @@ +From 120d060528d02e24b68ac06b44de34fb206b4319 Mon Sep 17 00:00:00 2001 +From: John Snow +Date: Tue, 13 Aug 2024 09:35:30 -0400 +Subject: [PATCH] python: backport 'Remove deprecated get_event_loop calls' +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +This method was deprecated in 3.12 because it ordinarily should not be +used from coroutines; if there is not a currently running event loop, +this automatically creates a new event loop - which is usually not what +you want from code that would ever run in the bottom half. + +In our case, we do want this behavior in two places: + +(1) The synchronous shim, for convenience: this allows fully sync +programs to use QEMUMonitorProtocol() without needing to set up an event +loop beforehand. This is intentional to fully box in the async +complexities into the legacy sync shim. + +(2) The qmp_tui shell; instead of relying on asyncio.run to create and +run an asyncio program, we need to be able to pass the current asyncio +loop to urwid setup functions. For convenience, again, we create one if +one is not present to simplify the creation of the TUI appliance. + +The remaining user of get_event_loop() was in fact one of the erroneous +users that should not have been using this function: if there's no +running event loop inside of a coroutine, you're in big trouble :) + +Signed-off-by: John Snow +cherry picked from commit python-qemu-qmp@aa1ff9907603a3033296027e1bd021133df86ef1 +Signed-off-by: John Snow +Reviewed-by: Daniel P. Berrangé +Upstream-Status: Backport [https://gitlab.com/qemu-project/qemu/-/commit/5d99044d09db0fa8c2b3294e301927118f9effc9] +Signed-off-by: Yoann Congal +--- + python/qemu/qmp/legacy.py | 9 ++++++++- + python/qemu/qmp/qmp_tui.py | 7 ++++++- + python/tests/protocol.py | 2 +- + 3 files changed, 15 insertions(+), 3 deletions(-) + +diff --git a/python/qemu/qmp/legacy.py b/python/qemu/qmp/legacy.py +index 22a2b5616ef..ea9b8032c3b 100644 +--- a/python/qemu/qmp/legacy.py ++++ b/python/qemu/qmp/legacy.py +@@ -86,7 +86,14 @@ def __init__(self, + "server argument should be False when passing a socket") + + self._qmp = QMPClient(nickname) +- self._aloop = asyncio.get_event_loop() ++ ++ try: ++ self._aloop = asyncio.get_running_loop() ++ except RuntimeError: ++ # No running loop; since this is a sync shim likely to be ++ # used in fully sync programs, create one if neccessary. ++ self._aloop = asyncio.get_event_loop_policy().get_event_loop() ++ + self._address = address + self._timeout: Optional[float] = None + +diff --git a/python/qemu/qmp/qmp_tui.py b/python/qemu/qmp/qmp_tui.py +index 2d9ebbd20bc..d11b9fc547b 100644 +--- a/python/qemu/qmp/qmp_tui.py ++++ b/python/qemu/qmp/qmp_tui.py +@@ -377,7 +377,12 @@ def run(self, debug: bool = False) -> None: + screen = urwid.raw_display.Screen() + screen.set_terminal_properties(256) + +- self.aloop = asyncio.get_event_loop() ++ try: ++ self.aloop = asyncio.get_running_loop() ++ except RuntimeError: ++ # No running asyncio event loop. Create one if necessary. ++ self.aloop = asyncio.get_event_loop_policy().get_event_loop() ++ + self.aloop.set_debug(debug) + + # Gracefully handle SIGTERM and SIGINT signals +diff --git a/python/tests/protocol.py b/python/tests/protocol.py +index 56c4d441f9c..8dcef573b6c 100644 +--- a/python/tests/protocol.py ++++ b/python/tests/protocol.py +@@ -228,7 +228,7 @@ def async_test(async_test_method): + Decorator; adds SetUp and TearDown to async tests. + """ + async def _wrapper(self, *args, **kwargs): +- loop = asyncio.get_event_loop() ++ loop = asyncio.get_running_loop() + loop.set_debug(True) + + await self._asyncSetUp() diff --git a/meta/recipes-devtools/qemu/qemu/0002-python-backport-avoid-creating-additional-event-loop.patch b/meta/recipes-devtools/qemu/qemu/0002-python-backport-avoid-creating-additional-event-loop.patch new file mode 100644 index 00000000000..d893c10c420 --- /dev/null +++ b/meta/recipes-devtools/qemu/qemu/0002-python-backport-avoid-creating-additional-event-loop.patch @@ -0,0 +1,199 @@ +From f25eb62190a6fa170db24584fe6225cd0dcd64ad Mon Sep 17 00:00:00 2001 +From: John Snow +Date: Wed, 3 Sep 2025 01:06:30 -0400 +Subject: [PATCH] python: backport 'avoid creating additional event loops per + thread' +MIME-Version: 1.0 +Content-Type: text/plain; charset=UTF-8 +Content-Transfer-Encoding: 8bit + +This commit is two backports squashed into one to avoid regressions. + +python: *really* remove get_event_loop + +A prior commit, aa1ff990, switched away from using get_event_loop *by +default*, but this is not good enough to avoid deprecation warnings as +`asyncio.get_event_loop_policy().get_event_loop()` is *also* +deprecated. Replace this mechanism with explicit calls to +asyncio.get_new_loop() and revise the cleanup mechanisms in __del__ to +match. + +python: avoid creating additional event loops per thread + +"Too hasty by far!", commit 21ce2ee4 attempted to avoid deprecated +behavior altogether by calling new_event_loop() directly if there was no +loop currently running, but this has the unfortunate side effect of +potentially creating multiple event loops per thread if tests +instantiate multiple QMP connections in a single thread. This behavior +is apparently not well-defined and causes problems in some, but not all, +combinations of Python interpreter version and platform environment. + +Partially revert to Daniel Berrange's original patch, which calls +get_event_loop and simply suppresses the deprecation warning in +Python<=3.13. This time, however, additionally register new loops +created with new_event_loop() so that future calls to get_event_loop() +will return the loop already created. + +Reported-by: Richard W.M. Jones +Reported-by: Daniel P. Berrangé +Signed-off-by: John Snow +cherry picked from commit python-qemu-qmp@21ce2ee4f2df87efe84a27b9c5112487f4670622 +cherry picked from commit python-qemu-qmp@c08fb82b38212956ccffc03fc6d015c3979f42fe +Signed-off-by: John Snow +Reviewed-by: Daniel P. Berrangé +Upstream-Status: Backport [https://gitlab.com/qemu-project/qemu/-/commit/85f223e5b031eb8ab63fbca314a4fb296a3a2632] +Signed-off-by: Yoann Congal +--- + python/qemu/qmp/legacy.py | 46 +++++++++++++++++++++++--------------- + python/qemu/qmp/qmp_tui.py | 10 ++------- + python/qemu/qmp/util.py | 27 ++++++++++++++++++++++ + 3 files changed, 57 insertions(+), 26 deletions(-) + +diff --git a/python/qemu/qmp/legacy.py b/python/qemu/qmp/legacy.py +index ea9b8032c3b..c732212c048 100644 +--- a/python/qemu/qmp/legacy.py ++++ b/python/qemu/qmp/legacy.py +@@ -38,6 +38,7 @@ + from .error import QMPError + from .protocol import Runstate, SocketAddrT + from .qmp_client import QMPClient ++from .util import get_or_create_event_loop + + + #: QMPMessage is an entire QMP message of any kind. +@@ -86,17 +87,13 @@ def __init__(self, + "server argument should be False when passing a socket") + + self._qmp = QMPClient(nickname) +- +- try: +- self._aloop = asyncio.get_running_loop() +- except RuntimeError: +- # No running loop; since this is a sync shim likely to be +- # used in fully sync programs, create one if neccessary. +- self._aloop = asyncio.get_event_loop_policy().get_event_loop() +- + self._address = address + self._timeout: Optional[float] = None + ++ # This is a sync shim intended for use in fully synchronous ++ # programs. Create and set an event loop if necessary. ++ self._aloop = get_or_create_event_loop() ++ + if server: + assert not isinstance(self._address, socket.socket) + self._sync(self._qmp.start_server(self._address)) +@@ -310,17 +307,30 @@ def send_fd_scm(self, fd: int) -> None: + self._qmp.send_fd_scm(fd) + + def __del__(self) -> None: +- if self._qmp.runstate == Runstate.IDLE: +- return ++ if self._qmp.runstate != Runstate.IDLE: ++ self._qmp.logger.warning( ++ "QEMUMonitorProtocol object garbage collected without a prior " ++ "call to close()" ++ ) + + if not self._aloop.is_running(): +- self.close() +- else: +- # Garbage collection ran while the event loop was running. +- # Nothing we can do about it now, but if we don't raise our +- # own error, the user will be treated to a lot of traceback +- # they might not understand. ++ if self._qmp.runstate != Runstate.IDLE: ++ # If the user neglected to close the QMP session and we ++ # are not currently running in an asyncio context, we ++ # have the opportunity to close the QMP session. If we ++ # do not do this, the error messages presented over ++ # dangling async resources may not make any sense to the ++ # user. ++ self.close() ++ ++ if self._qmp.runstate != Runstate.IDLE: ++ # If QMP is still not quiesced, it means that the garbage ++ # collector ran from a context within the event loop and we ++ # are simply too late to take any corrective action. Raise ++ # our own error to give meaningful feedback to the user in ++ # order to prevent pages of asyncio stacktrace jargon. + raise QMPError( +- "QEMUMonitorProtocol.close()" +- " was not called before object was garbage collected" ++ "QEMUMonitorProtocol.close() was not called before object was " ++ "garbage collected, and could not be closed due to GC running " ++ "in the event loop" + ) +diff --git a/python/qemu/qmp/qmp_tui.py b/python/qemu/qmp/qmp_tui.py +index d11b9fc547b..76e540931c7 100644 +--- a/python/qemu/qmp/qmp_tui.py ++++ b/python/qemu/qmp/qmp_tui.py +@@ -40,7 +40,7 @@ + from .message import DeserializationError, Message, UnexpectedTypeError + from .protocol import ConnectError, Runstate + from .qmp_client import ExecInterruptedError, QMPClient +-from .util import create_task, pretty_traceback ++from .util import get_or_create_event_loop, create_task, pretty_traceback + + + # The name of the signal that is used to update the history list +@@ -376,13 +376,7 @@ def run(self, debug: bool = False) -> None: + """ + screen = urwid.raw_display.Screen() + screen.set_terminal_properties(256) +- +- try: +- self.aloop = asyncio.get_running_loop() +- except RuntimeError: +- # No running asyncio event loop. Create one if necessary. +- self.aloop = asyncio.get_event_loop_policy().get_event_loop() +- ++ self.aloop = get_or_create_event_loop() + self.aloop.set_debug(debug) + + # Gracefully handle SIGTERM and SIGINT signals +diff --git a/python/qemu/qmp/util.py b/python/qemu/qmp/util.py +index ca6225e9cda..213f09c6528 100644 +--- a/python/qemu/qmp/util.py ++++ b/python/qemu/qmp/util.py +@@ -20,6 +20,7 @@ + TypeVar, + cast, + ) ++import warnings + + + T = TypeVar('T') +@@ -30,6 +31,32 @@ + # -------------------------- + + ++def get_or_create_event_loop() -> asyncio.AbstractEventLoop: ++ """ ++ Return this thread's current event loop, or create a new one. ++ ++ This function behaves similarly to asyncio.get_event_loop() in ++ Python<=3.13, where if there is no event loop currently associated ++ with the current context, it will create and register one. It should ++ generally not be used in any asyncio-native applications. ++ """ ++ try: ++ with warnings.catch_warnings(): ++ # Python <= 3.13 will trigger deprecation warnings if no ++ # event loop is set, but will create and set a new loop. ++ warnings.simplefilter("ignore") ++ loop = asyncio.get_event_loop() ++ except RuntimeError: ++ # Python 3.14+: No event loop set for this thread, ++ # create and set one. ++ loop = asyncio.new_event_loop() ++ # Set this loop as the current thread's loop, to be returned ++ # by calls to get_event_loop() in the future. ++ asyncio.set_event_loop(loop) ++ ++ return loop ++ ++ + async def flush(writer: asyncio.StreamWriter) -> None: + """ + Utility function to ensure a StreamWriter is *fully* drained. From patchwork Fri Apr 24 20:55:55 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86898 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 83F5FFF8844 for ; Fri, 24 Apr 2026 20:57:13 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32613.1777064231196487986 for ; Fri, 24 Apr 2026 13:57:11 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=ujtFaCxM; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-4891f625344so70031875e9.0 for ; Fri, 24 Apr 2026 13:57:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064229; x=1777669029; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=4/5uH84GzSNCTskm7w//9+OTClqBfMpIL+hWWoQQbBw=; b=ujtFaCxMaRVdUxFqTEeLHDcETspMSiiXiu3uewV1S6gjy2UVLR1MoWgoq4nqYqpO6s 9QkK5b353fDeodlz55aAxgftLvw79zandX4HlOvrg+b47O78oHu0x0qwWJs4T7zQ9pRy GQnBuIR8iHP/yVM02R5VbWeBr4Am47fGLZosc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064229; x=1777669029; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=4/5uH84GzSNCTskm7w//9+OTClqBfMpIL+hWWoQQbBw=; b=Ep4/9iUvxqZcS6yX2yT+c6ChIEhy7FQsVvqE/okEog51A7g7MT1SesxcQtWakZfYoN 6GsNVb3Z5t3DxErBiZ+KqiuxQ/lCdp7iFgp/8LUYERVRhPrQXRqwviZqZBAnh62uZRh9 GE6lt3WaiNhnlpKujgZSBS0qKYf9iSBGOnnCRIQz6tWJgwIY1dblTCmH0vQQFiyymboN KXEVx7deA4c4xvyHoRSsQ5fWwDRHk1RgU6Tu4d25/Ro0h+90mgJy/OvNT1To+NOReRnZ DzIrrL63grNX6YAo2FX4lp6EX8uVp57U6CbMbg/DhU3pP+Uo0dqhtSzedIVqWV6ijGbD xD5A== X-Gm-Message-State: AOJu0YzqlGgewm84xMhebwtzYyImHaeeUkKA64Eq5cVQaAHULdSUiORo 8csA4gRTSPgvdJjSgNcLFo3CC7muo4gWScQl5iKxYr3y4hKtidSySYACvu/AZcoMaDzGNO3OMuk B1+ET/CRxMNAj X-Gm-Gg: AeBDievUogWX2GwSc6Zr3TKrEDLBOoq/9Qta4SLZv8h/GDvWZmb9LbnVpXwNJqjR+in Vf7u8zFZke2s3rSZ05ejWbspqwrFvNSpiOeFq+VBr85wWSTeXMUaxUfWV87LP6ltePxf+rsapA8 uhw8QkLuciU+U7xl5wu4gLnB18ATXdB4cMxUbhn6+zyZCRKCq5wV3bx4dcc6Z87LVtPKTnTV1zO a4W7S3ohpFXMt2tZqD5EcHt3YRtPTF4FBc7yoEjqPoUyyeR7WvtZmdqh/Z1aA02e0Blnq5CMWfL SfJbfXw54aX9hjlnVrZmyf/2x090Lrx7io3m3h8QUpIO2gLrtc/+uphwS7Hx+AUuZSdVTbl6Sq5 CZyexvLjiUeW/1hGLCXGmjM4je7IhLG/hQIEa8zuGYlh3FHibbMRLZXXfJOXFpTvrmGr+5tsKIN y4KqK1VqRqhVwGzq3hlc415KdJRpgDHKa+hIUbs5M+m1kgVdmOmxfUjes4DB5uw2ul3s47yOZIU wAHw4RCZyEv0Qsk8lCS2UnTHSyhUWyTRCaHHg== X-Received: by 2002:a05:600c:c112:b0:486:fe83:861c with SMTP id 5b1f17b1804b1-488fb896910mr385436015e9.7.1777064229259; Fri, 24 Apr 2026 13:57:09 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.08 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:08 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 56/66] db: Pin to use C99 std Date: Fri, 24 Apr 2026 22:55:55 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235929 From: Khem Raj GCC-15 has switched to using C23 by default, we have been selectively disabling warnings as errors to get by, however with autoconf 2.72 adding -std=gnu23 it now gets enabled for every compiler and clang-22 is more obidient and has dropped support for K&R C completely. db5 code has a lot of K&R C prototypes and it starts to fail vigorously. We can not keep working around with out uplifting sources to be compliant with newer C standard like C23. Therefore pin the cflags to use C99 standard as this package expects. Drop the code to disable warnings as errors selectively instead add a fix for addressing implicit int warnings Signed-off-by: Khem Raj Signed-off-by: Mathieu Dubois-Briand (cherry picked from commit 8615b3388b97a56096b959dea4d7499e03187100) [YC: switched from CFLAGS += to CFLAGS:append] Signed-off-by: Yoann Congal --- .../db/0001-Fix-implicit-int-warnings.patch | 106 ++++++++++++++++++ meta/recipes-support/db/db_5.3.28.bb | 9 +- 2 files changed, 111 insertions(+), 4 deletions(-) create mode 100644 meta/recipes-support/db/db/0001-Fix-implicit-int-warnings.patch diff --git a/meta/recipes-support/db/db/0001-Fix-implicit-int-warnings.patch b/meta/recipes-support/db/db/0001-Fix-implicit-int-warnings.patch new file mode 100644 index 00000000000..5cca6dffa11 --- /dev/null +++ b/meta/recipes-support/db/db/0001-Fix-implicit-int-warnings.patch @@ -0,0 +1,106 @@ +From c744b20658641b46cf66429f573240b1b5737872 Mon Sep 17 00:00:00 2001 +From: Khem Raj +Date: Wed, 8 Apr 2026 08:52:55 -0700 +Subject: [PATCH] Fix implicit int warnings + +Newer compilers flag this warning which results in configure tests +failing especially seen on native builds where AC_TRY_RUN is +being used to detect mutex support. + +Also see +https://sources.debian.org/src/db5.3/5.3.28%2Bdfsg2-11/debian/patches/014-implicit-int.patch + +Upstream-Status: Inappropriate [Inactive Upstream] +Signed-off-by: Khem Raj +--- + dist/aclocal/mutex.m4 | 20 ++++++++++---------- + 1 file changed, 10 insertions(+), 10 deletions(-) + +diff --git a/dist/aclocal/mutex.m4 b/dist/aclocal/mutex.m4 +index 81f1ea8..8476f39 100644 +--- a/dist/aclocal/mutex.m4 ++++ b/dist/aclocal/mutex.m4 +@@ -5,7 +5,7 @@ AC_DEFUN(AM_PTHREADS_SHARED, [ + AC_TRY_RUN([ + #include + #include +-main() { ++int main() { + pthread_cond_t cond; + pthread_mutex_t mutex; + pthread_condattr_t condattr; +@@ -49,7 +49,7 @@ AC_DEFUN(AM_PTHREADS_PRIVATE, [ + AC_TRY_RUN([ + #include + #include +-main() { ++int main() { + pthread_cond_t cond; + pthread_mutex_t mutex; + pthread_condattr_t condattr; +@@ -89,13 +89,13 @@ AC_DEFUN(AM_PTHREADS_CONDVAR_DUPINITCHK, [ + AC_TRY_RUN([ + #include + #include +-main() { ++int main() { + pthread_cond_t cond; + pthread_condattr_t condattr; + exit(pthread_condattr_init(&condattr) || + pthread_cond_init(&cond, &condattr) || + pthread_cond_init(&cond, &condattr)); +-}], [db_cv_pthread_condinit_dupgood="yes"], ++}], [db_cv_pthread_condinit_dupgood="yes"], + [db_cv_pthread_condinit_dupgood="no"], + AC_TRY_LINK([ + #include +@@ -104,19 +104,19 @@ AC_TRY_LINK([ + pthread_condattr_t condattr; + exit(pthread_condattr_init(&condattr) || + pthread_cond_init(&cond, &condattr)); +-], [db_cv_pthread_condinit_dupgood="yes"], ++], [db_cv_pthread_condinit_dupgood="yes"], + [db_cv_pthread_condinit_dupgood="no"]))]) + AC_DEFUN(AM_PTHREADS_RWLOCKVAR_DUPINITCHK, [ + AC_TRY_RUN([ + #include + #include +-main() { ++int main() { + pthread_rwlock_t rwlock; + pthread_rwlockattr_t rwlockattr; + exit(pthread_rwlockattr_init(&rwlockattr) || + pthread_rwlock_init(&rwlock, &rwlockattr) || + pthread_rwlock_init(&rwlock, &rwlockattr)); +-}], [db_cv_pthread_rwlockinit_dupgood="yes"], ++}], [db_cv_pthread_rwlockinit_dupgood="yes"], + [db_cv_pthread_rwlockinit_dupgood="no"], + AC_TRY_LINK([ + #include +@@ -125,7 +125,7 @@ AC_TRY_LINK([ + pthread_rwlockattr_t rwlockattr; + exit(pthread_rwlockattr_init(&rwlockattr) || + pthread_rwlock_init(&rwlock, &rwlockattr)); +-], [db_cv_pthread_rwlockinit_dupgood="yes"], ++], [db_cv_pthread_rwlockinit_dupgood="yes"], + [db_cv_pthread_rwlockinit_dupgood="no"]))]) + + # Figure out mutexes for this compiler/architecture. +@@ -207,7 +207,7 @@ if test "$db_cv_mutex" = no; then + ;; + esac + # We probe for private pthreads only when the user has asked for posix +- # mutexes and we don't have a multiprocess pthreads library available. ++ # mutexes and we don't have a multiprocess pthreads library available. + if test "$db_cv_mutex" = posix_only; then + AM_PTHREADS_PRIVATE(POSIX/pthreads/private) + AM_PTHREADS_CONDVAR_DUPINITCHK +@@ -571,7 +571,7 @@ + + # UNIX fcntl system call mutexes. + # Note that fcntl mutexes are no longer supported as of 4.8. This code has been +-# left in place in case there is some system that we are not aware of that ++# left in place in case there is some system that we are not aware of that + # only uses fcntl mutexes. In that case, contact Oracle for support. + if test "$db_cv_mutex" = no; then + db_cv_mutex=UNIX/fcntl diff --git a/meta/recipes-support/db/db_5.3.28.bb b/meta/recipes-support/db/db_5.3.28.bb index a7d061e0da3..2f21d153c27 100644 --- a/meta/recipes-support/db/db_5.3.28.bb +++ b/meta/recipes-support/db/db_5.3.28.bb @@ -27,6 +27,7 @@ SRC_URI += "file://fix-parallel-build.patch \ file://sequence-type.patch \ file://0001-Fix-libc-compatibility-by-renaming-atomic_init-API.patch \ file://0001-clock-Do-not-define-own-timespec.patch \ + file://0001-Fix-implicit-int-warnings.patch \ " # We are not interested in official latest 6.x versions; # let's track what debian is using. @@ -72,7 +73,11 @@ AUTOTOOLS_SCRIPT_PATH = "${S}/dist" # configure. CONFIG_SITE = "" +CFLAGS:append = " -std=gnu99" + oe_runconf:prepend() { + export CFLAGS="${CFLAGS}" + . ${S}/dist/RELEASE # Edit version information we couldn't pre-compute. sed -i -e "s/__EDIT_DB_VERSION_FAMILY__/$DB_VERSION_FAMILY/g" \ @@ -116,7 +121,3 @@ INSANE_SKIP:${PN} = "dev-so" INSANE_SKIP:${PN}-cxx = "dev-so" BBCLASSEXTEND = "native nativesdk" - -# many configure tests are failing with gcc-14 -CFLAGS += "-Wno-error=implicit-int -Wno-error=implicit-function-declaration" -BUILD_CFLAGS += "-Wno-error=implicit-int -Wno-error=implicit-function-declaration" From patchwork Fri Apr 24 20:55:56 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86897 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 772BFFF8842 for ; Fri, 24 Apr 2026 20:57:13 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32614.1777064231687654209 for ; Fri, 24 Apr 2026 13:57:12 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=ElGGs3i3; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-4891e5b9c1fso64693435e9.2 for ; Fri, 24 Apr 2026 13:57:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064230; x=1777669030; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=UTLHSjDoqmlaX1MmDJug9ZbwOf+r0zpVPBbPmg4ujvU=; b=ElGGs3i3Xe+PHMNATVjCs4oVXfpJNz3FiKPQXyhFdhWdfKMwxQRhdxwwzI/bpXSFJU MZqxaCOHWXGcQwDcDlXRop+zgfJTXFP9K4yA4Prk3f2MXlVViNNnm9mwydik/lm9GQBD OD9u4i3mknLSVZ3Z8aT5EQN8HUEZbPdy49/Sw= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064230; x=1777669030; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=UTLHSjDoqmlaX1MmDJug9ZbwOf+r0zpVPBbPmg4ujvU=; b=LjrAHKP/8a1R8lUr7hP7bx5glDB+vLnO6XUaLFsHhEZ4Fc+UTQ5NoudwNGtrCojJr3 Gk4a3U+PTeJU0PXRbu8XbYGIu6iYiNcPsjfdvZRhTr7btTjeeGnF1U91R/QnlI8ecwPN lFcNV8g7InPN2Uu/tIaNj1DinQ0R/E0pl8BOgaSnLf8D+IPpl+xllOFcYsf/dfIW9E1w 57P9jNbB7/+S5uGc1ASujQjUvwd0gIIcydULm9Omo2PHTxHNsSUrSlexqRkJT5IKY2R9 KF2OGmtXWTTtIILIwqBfDGeT3G+OGDR3Il3TxSYO7oRgG/5Qeb2BHHSSUU+C2N8yEEnJ bxsg== X-Gm-Message-State: AOJu0Yx1BWsnzcZr1Q0yHCZZ08MbAwUm59dD3L7FULql5loGQ0XIrEPw GBR2OOez9gWIUg3CRiuLGYwdqtiI9ktdDiLfiWLPj6n1EKBRheKWX0rkhjo/jC6OIRxPpHGOSBY l77DO6HBEKTo4 X-Gm-Gg: AeBDievNt0F4kLNBNmJ52ZK8YTQ3+4JQ3BmiN7bgxR2YmeL6OZMb1eanh7j9d0x7BLL hKnavjonnZb7AUmpKlbpuzVM5Wap12RZxRunjn4kKySfDY/Hi6JYCjcGPjk14/gNekU21bvjgt/ QNoTjS8sUgv6XyWtX8jbrRZtriDL2+6fa+ywZFHc/b52TZGdPh+siJuaNuxLqo+/7caV9lYjj6g yavedmfZ3Eb/QAMP4fdzJY6ByI0tqR8s8v03YCqBAY/8+IeaUdK/KK1UXHNee3lVznfskSJur09 B/ntki/zuoWicY1GcpWnOO/WdOI4cirpNu9eANqVNBZ7nQww1ekWji7SiASpU/++z4oLQFEXqTV zXxKySZ07LhwuZo7QUFmfnxP3Vw2M5nvwNz2wXILR5cRKU0rQA73AjxBPkw1lJthJsy5tklyYy6 Cs00IxrAkam4zducccSzog+jBnHV2CFpc3ujBbIdGJXDDrjtnZFlhbeaubOW0EDIpxt7FOEGIXX kYmsVPYyDP+h67eHQn8H0zYx0g+1jDB67daMA== X-Received: by 2002:a05:600c:3e8f:b0:48a:65a5:751f with SMTP id 5b1f17b1804b1-48a65a57799mr61946225e9.31.1777064229822; Fri, 24 Apr 2026 13:57:09 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.09 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:09 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 57/66] apt: Fix build with GCC 15 Date: Fri, 24 Apr 2026 22:55:56 +0200 Message-ID: <3e565b8ea4b0694fd3ded7b3b0f9d93d1a7ccbab.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235930 From: Khem Raj Signed-off-by: Khem Raj Signed-off-by: Richard Purdie (cherry picked from commit ac53f79999bb8301380d7c58025f6fed75e40c9a) Signed-off-by: Yoann Congal --- ...l-Add-missing-include-cstdint-gcc-15.patch | 26 +++++++++++++++++++ meta/recipes-devtools/apt/apt_2.6.1.bb | 1 + 2 files changed, 27 insertions(+) create mode 100644 meta/recipes-devtools/apt/apt/0001-strutl-Add-missing-include-cstdint-gcc-15.patch diff --git a/meta/recipes-devtools/apt/apt/0001-strutl-Add-missing-include-cstdint-gcc-15.patch b/meta/recipes-devtools/apt/apt/0001-strutl-Add-missing-include-cstdint-gcc-15.patch new file mode 100644 index 00000000000..b86ed8bb92d --- /dev/null +++ b/meta/recipes-devtools/apt/apt/0001-strutl-Add-missing-include-cstdint-gcc-15.patch @@ -0,0 +1,26 @@ +From 9da1b0dbdcc90455bc9de49f73a96e7d18f83493 Mon Sep 17 00:00:00 2001 +From: Julian Andres Klode +Date: Tue, 18 Feb 2025 10:29:40 +0100 +Subject: [PATCH] strutl: Add missing #include [gcc 15] + +Closes: #1096322 + +Upstream-Status: Backport [https://salsa.debian.org/apt-team/apt/-/commit/f82dcd7e4ebb3f70d28e9feb3621676f8c0cc024] + +Signed-off-by: Khem Raj +--- + apt-pkg/contrib/strutl.cc | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/apt-pkg/contrib/strutl.cc b/apt-pkg/contrib/strutl.cc +index 67100f1..c0a1cbc 100644 +--- a/apt-pkg/contrib/strutl.cc ++++ b/apt-pkg/contrib/strutl.cc +@@ -26,6 +26,7 @@ + + #include + #include ++#include + #include + #include + #include diff --git a/meta/recipes-devtools/apt/apt_2.6.1.bb b/meta/recipes-devtools/apt/apt_2.6.1.bb index e688d30cae8..436e2e8cade 100644 --- a/meta/recipes-devtools/apt/apt_2.6.1.bb +++ b/meta/recipes-devtools/apt/apt_2.6.1.bb @@ -14,6 +14,7 @@ SRC_URI = "${DEBIAN_MIRROR}/main/a/apt/${BPN}_${PV}.tar.xz \ file://0001-Hide-fstatat64-and-prlimit64-defines-on-musl.patch \ file://0001-aptwebserver.cc-Include-array.patch \ file://0001-Remove-using-std-binary_function.patch \ + file://0001-strutl-Add-missing-include-cstdint-gcc-15.patch \ " SRC_URI:append:class-native = " \ From patchwork Fri Apr 24 20:55:57 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86896 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A3EEFFF8843 for ; Fri, 24 Apr 2026 20:57:13 +0000 (UTC) Received: from mail-wm1-f45.google.com (mail-wm1-f45.google.com [209.85.128.45]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31998.1777064232169065471 for ; Fri, 24 Apr 2026 13:57:12 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=rBZqywnS; spf=pass (domain: smile.fr, ip: 209.85.128.45, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f45.google.com with SMTP id 5b1f17b1804b1-48909558b3aso78132635e9.0 for ; Fri, 24 Apr 2026 13:57:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064230; x=1777669030; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=7kM49vNBlLs852kqobhvU8eNhW6T9rt3XCAloieSabc=; b=rBZqywnSVxIBs9nCMjhxnr4mc5Adp3/7YCpSqENO55Vjxd5XDnF60+hOJwqetSS0sB Um0JJUI6+WRSDkAdf0pDnRB4CCDaUg9ZPfC0vCoJLzEqJO4ywJS+vCjWc0DAzPh178jS meS0LOZ1Z3fekAOuvXzhwJu7eDtq3hHUpSs34= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064230; x=1777669030; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=7kM49vNBlLs852kqobhvU8eNhW6T9rt3XCAloieSabc=; b=l8ykI4ERmdpm5lybZlAnlB+v6FiE8UaQq3Fynjt2yNrYzOI1iTUOOKKn1JxI08sN0G toQY/hViZQZRX+3dTCZ/tGnCOfCo0vA8EiukKHPhLbfVM5SSy8McBvOFUPIjOplxIzFG jh9UagjqGZi/ljaD7exM7jrYidXyreXCQq/A9fUdiWvjXgDICWB/SiDxkx6zFPsWmsUm pwEyog0qPmYmFmQcV/RaFE7poIcLgZH24HND3Omt/owSksp814HhHCPQp2AooEHtm7sy JmY/zZeYa5+DfV9bScIvbN4KSP1G5pRRCG9Def/+V+KDfU+pfD0GGln8hIpc+zrVJwnh OLRw== X-Gm-Message-State: AOJu0YyFn9FBLObTVg2D0rm8isxIgKT5/qYd6TI+PfrI7v9/mp0PL3Wz W5g1L9QyoHSfysMnJRCS6UnsMCN8zcFODnx7DdylMcEc3H2EAraP7+xK2Nkjgyn7wbgwyanErXe 5KB7l2OnMOQ== X-Gm-Gg: AeBDievibOlwmTfljEn4e1+ZW+C3AplEBs7qgY+KN8W06y9uCahhuUbdKi93u3NPe6Y nV2Eb7fQXWObUX/jWKk/ApQIR/XIDWs2CYvgMBH1jK8aQyJ4ZuCwzpoGNQ5IgaUAlPwTrLeJhLT N0EVA4oLErOu5EgTmWXIoQoQbPbRPzTWKbxdPM51zheCbnAsZfzEHn2dAF9Z/WSJDXgI+9Qad99 czIghY85x5hnqtA0M0XcxfFD49euUd9QXEH/a8TVg+K1YbyqZpyoJJe8gZ6dpGif/A8C7H9rAST 3ZIi0FO9Vd/zZyPFFjmnL7oUOWVV536Q43SbzNMp7mvaYFN2culQuENz2tQW9Obyp1fT0oUzkJv MQU8M3os2vUmw7th2uzls3fWbdYoVQc3r/Nd2GMREHrI+gBjM24Ecs/RucbpJMAaArtj/mVwtXP JRtx0tUPoew0YIIf/Ci2KUcNJKWWTlRH/bX4YCzxt9x0s0fKwo/rO4YtvGXuFF80fhkom2nJb1V RtO9VAcOa2ilUVyvkURLuf0XHxDXydPMRClUA== X-Received: by 2002:a05:600d:8408:b0:488:be58:bb5b with SMTP id 5b1f17b1804b1-488fb773f0cmr359654005e9.24.1777064230315; Fri, 24 Apr 2026 13:57:10 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.09 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:10 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 58/66] lib/oeqa/utils/httpserver: use multiprocessing from bb Date: Fri, 24 Apr 2026 22:55:57 +0200 Message-ID: <2273e9ba2ffeea57620af576e3cd1e523e4d3fc3.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235931 From: Richard Purdie Fixes build with python-3.14 (and hence on Fedora 43) It was added to bitbake in 62be9113d98fccb347c6aa0a10d5c4ee2857f8b6 and oe-core now requires latest bitbake already, so we can use this. Signed-off-by: Richard Purdie (cherry picked from commit 3ed1cef082b8ef0fa05684f7a41f0842150811bd) [YC: bitbake commit was backported as 15d7448e04aa ("Use a "fork" multiprocessing context") in the 2.8(scarthgap) branch] Signed-off-by: Yoann Congal --- meta/lib/oeqa/utils/httpserver.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/lib/oeqa/utils/httpserver.py b/meta/lib/oeqa/utils/httpserver.py index 80752c13770..9e61cd89d5a 100644 --- a/meta/lib/oeqa/utils/httpserver.py +++ b/meta/lib/oeqa/utils/httpserver.py @@ -6,7 +6,7 @@ import http.server import logging -import multiprocessing +from bb import multiprocessing import os import signal from socketserver import ThreadingMixIn From patchwork Fri Apr 24 20:55:58 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86899 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E251BFF8846 for ; Fri, 24 Apr 2026 20:57:13 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.31999.1777064232725279087 for ; Fri, 24 Apr 2026 13:57:13 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=M0gbpHcC; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488ab2db91aso113203455e9.3 for ; Fri, 24 Apr 2026 13:57:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064231; x=1777669031; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=IUFuJz/S7pxARhMWtSCqWGIg8j1I0uFVCGaHVE6F5mc=; b=M0gbpHcCBP2tEN2ZPO8m4yC1l25/axit3xGYHu3tlI6tFowlU1G1CTzPXvZ55VqnPk jKzFaBMVdcfrJ/wcR57VfTVDwusXmoQH1MWK/k65hmX2g4X2SKYvPyqkd9s1Nz3F6GiY vI/7wmOgu7XbV3UtMDXyRuQQ1CGunvRI9j1zc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064231; x=1777669031; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=IUFuJz/S7pxARhMWtSCqWGIg8j1I0uFVCGaHVE6F5mc=; b=YSusK95a94UVExe3TtjeVBRaS/QYFHF3wA6WgMY5sEVInFLZb2rQuPUm0+ZDXLZ0OA KDmcufr0uvp7WbXSWU00qqxV50khOBGqQXmVcYIHtZihvDMBJJXCCAO4OhQssTdtxjvD rXYsvH5h0ESDT6BOZbVdsxUifJnK1zNHOzhECf285uEoGLFTGT65LQrFnUWvnWfn8P5e C/GN1lNRvSLOQie9Yg3g+dR8O2m4UT9sqOHZ3rQysARp6ZJ4Ue6sA15atpWboi8scO2T bDy5Lv6DMs/A3fhGLBftXhEczeWURs8S5rz16ezgzliFB7UtjLaA5sMwzZa+A3NL1yoA zoaQ== X-Gm-Message-State: AOJu0Yy60ccPEku1HlvMyvFL4xiYoVLmJyYfwV60wDB1Ni31UJvPPNa5 JzDt4GF6pWl50wFU0GxAfNnttgEzj1NliYKtDAhB1a73CwA3jECtLRz5CqFMZ251fWFv6OXqMfM hBh3oBfS8aWiX X-Gm-Gg: AeBDieutjMnMmort1aFzRwd6QqAuhdU9qdS+dhVMqKyPufdk7nuLS9z9Ik4OnhkurCl bnDSLJqshDI40Jx6racGk8clpop38q3PKwapP6H+4eKsmx3DazfkrR+De2qpdJ1orJrIRwydRye VM34Abb5MAPcJFxg2xLY91eVd8+OY1u3MTfPXAnG+h7sdc6IJT9Bh2SJDRRpF0d4GVST8rVCbgt J8ri4c4egobyHuLyYmkNuz1yn5k9NhQCisvYAk56jx14TKlKsRhoZvCL1LfZ4AASW2i8uybuw48 y5ZmI6Z2VKPp6pQ0OG8//NDNHDWcdEDlZSLvLAV1iTO6nGCwsKF1txsJxzhZEtppxro+vHwxoY5 1h2h0v1BtwE1xE+SstWzYL+ucr7jOYTIoxUr1UK+jtD+VxiYa25qPeix0Zps0NWJ9n0eLUodXqK DSjI0XRsd2w0W+4BXAVI5F/Y7Ao7TvLUKr06ErwtwNrpXH18ZBwDSIBdQULelzyLnkb+srh/awm AGTg2x6KOp4DbrDx58DAYSOZtbjZXBoHSytiw== X-Received: by 2002:a05:600c:3483:b0:486:fba7:b150 with SMTP id 5b1f17b1804b1-488fb7787d7mr457645825e9.15.1777064230821; Fri, 24 Apr 2026 13:57:10 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.10 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:10 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 59/66] archiver: Don't try to preserve all attributes when copying files Date: Fri, 24 Apr 2026 22:55:58 +0200 Message-ID: <6ffd2c303d23b51a0a11f56e2e89c5a19596d228.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:13 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235932 From: Richard Purdie Similar to https://git.openembedded.org/bitbake/commit/?id=2f35dac0c821ab231459922ed98e1b2cc599ca9a there is a problem in this code when copying from an NFS mount. We currently use cp -p, which is a shortcut for --preserve=mode,ownership,timestamps. We shouldn't need to preserve mode/ownership, only timestamps. Update the code in the same way the bitbake fetcher was fixed for consistency. This fixes build failures on OpenSUSE 16.0. Signed-off-by: Richard Purdie (cherry picked from commit 6e8313688fa994c82e4c846993ed8da0d1f4db0e) Signed-off-by: Yoann Congal --- meta/classes/archiver.bbclass | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/classes/archiver.bbclass b/meta/classes/archiver.bbclass index 9d286224d62..9f0a49a418c 100644 --- a/meta/classes/archiver.bbclass +++ b/meta/classes/archiver.bbclass @@ -397,7 +397,7 @@ python do_ar_mirror() { # We now have an appropriate localpath bb.note('Copying source mirror') - cmd = 'cp -fpPRH %s %s' % (localpath, destdir) + cmd = 'cp --force --preserve=timestamps --no-dereference --recursive -H %s %s' % (localpath, destdir) subprocess.check_call(cmd, shell=True) } From patchwork Fri Apr 24 20:55:59 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86914 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0BA1BFF8860 for ; Fri, 24 Apr 2026 20:57:15 +0000 (UTC) Received: from mail-wm1-f45.google.com (mail-wm1-f45.google.com [209.85.128.45]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.32000.1777064233267592194 for ; Fri, 24 Apr 2026 13:57:13 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=PzXD+fyC; spf=pass (domain: smile.fr, ip: 209.85.128.45, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f45.google.com with SMTP id 5b1f17b1804b1-4891f625344so70032455e9.0 for ; Fri, 24 Apr 2026 13:57:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064231; x=1777669031; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=4vdU4n1K7lWxQK9DmCumAjHGqVeV8OpGms6tBG6nQgg=; b=PzXD+fyCOiutUDTv8Ldu+7i2kOstFKptjymK+IqLTIdFo/8hXaLCJR0bMLkUzM4F8E wgMzU5N2ml2qEN2enK1MBNnBOVpCKObMBFyPGiu6g0n4Kv4pByzbDrxrOb7oBAxxlTDD vmoCccxQw6pbVpEfHBYdgQ5WDZhbxVfdCQnkg= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064231; x=1777669031; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=4vdU4n1K7lWxQK9DmCumAjHGqVeV8OpGms6tBG6nQgg=; b=o8YGWDVghseXRohr98BB0fAZx8/RFQ9sWoXN2kDskXyievn4sWU//X9cBtAe261pc7 OKCNABjTMgtszTIOY3fIMvv1qdH0JoH5NzGRM/oSyugdy48eyyNS1oEtDZS0Gi+ifSSZ kziLJ6gmA2quGg2TlwEcCO06P9Icqx6PmcOQ/IF+j+6Ir2brFgS/JAuGwK368c7TcrLx 4fdTUwNlDNu52SHyHwiZO1KtrLSQAVEU4VJ73OVBiH/EzmBG0NL9abtq21vv89qHM7UL 9hE8x1S8X0Yvwu37LO0cfOKv3TXaVaZDOB/beP+fnvhQf71uylx7WXY1kTsrcc7yTvYW E8Ew== X-Gm-Message-State: AOJu0YyOf5RoNr8DdpiyZfjPPRd/YOMIDvIGjL9x1DZJZBvXmOJ9EnQa G9bQYrE9uRTIR8Z/V30/BCBCEktFyiebrnztdFYD3JPyZLgbODfoelnSvo6HjpDOt9SzmVq2/f/ p5zHdf3Oe0A== X-Gm-Gg: AeBDiesqGTIVgP8yOaxmdSBYg7QPVkGw/na5/nNuk5ehsxZk7Ox0XrnsXkpMfDhPSbK 44aT7oo1mDgyeGB8wTOLrl8T75z+embrGyFRu9PdcYxkWeaUAe+pZgvZJOgiqJlMDGXP1qqhjDp 6JaNjtLGUjB9gyWbfChEjuvlqltoqmbF06+87NACk3/Ofa8qNbRQM1kf9SXG12Gv2OEzNtD0HxN 3QZEb2r9ltx+byaAq6rMEzgpZgr43gH60fhmUEI6S7wm1atWRsV1MWN/HGY9nzAC7IyJKQY0OKz /r4l/BGFLaM4H2uUIGHxoIfWry0LF8I0X0CV/o6q0AabtmdqAUc6vY+liJGRIVCGAVE4jEazGL6 gtg85i+DKAb5JqxvCuwpiZLuX0wPIHDw0k9Lq+0DqeoSuvrrkan1I0aUgPo5cFXcQlU4i7vox9c oQwROuoHTq0GsVXlpxrBfOvVficPJ2bY4cgwa3Qt1ouW71a3CKpCjfdcXLp33U2crM4K9JZ1jtZ ZXgsosbAMZX2yQOQVtusfpIvpVJsUtQIKPXMA== X-Received: by 2002:a05:600c:34ca:b0:48a:761:5816 with SMTP id 5b1f17b1804b1-48a07615b87mr276228945e9.8.1777064231380; Fri, 24 Apr 2026 13:57:11 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.10 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:11 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 60/66] selftest/minidebuginfo: extract files from tar archive using tarfile module Date: Fri, 24 Apr 2026 22:55:59 +0200 Message-ID: <799e2124cdcb27bd924598619da61cbd11730b56.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235933 From: Alexander Kanavin Python 3.14 added security checks around archive extraction, and by default will refuse to handle symlinks with absolute paths. It's possible to handle this using 'filter' argument, but it is not always available in older Python versions on various host distributions we need to support, so let's extract only the needed files directly using tarfile module. busybox is itself a symlink to busybox.nosuid, so both are extracted. [YOCTO #16195] Signed-off-by: Alexander Kanavin Signed-off-by: Richard Purdie (cherry picked from commit d52d00a3bb4a1ba93e88f1d24d8bb99d6aa321eb) Signed-off-by: Yoann Congal --- meta/lib/oeqa/selftest/cases/minidebuginfo.py | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/meta/lib/oeqa/selftest/cases/minidebuginfo.py b/meta/lib/oeqa/selftest/cases/minidebuginfo.py index 2919f079392..07577dce7cc 100644 --- a/meta/lib/oeqa/selftest/cases/minidebuginfo.py +++ b/meta/lib/oeqa/selftest/cases/minidebuginfo.py @@ -6,7 +6,7 @@ import os import subprocess import tempfile -import shutil +import tarfile from oeqa.selftest.case import OESelftestTestCase from oeqa.utils.commands import bitbake, get_bb_var, get_bb_vars, runCmd @@ -32,7 +32,10 @@ IMAGE_FSTYPES = "tar.bz2" # ".gnu_debugdata" which stores minidebuginfo. with tempfile.TemporaryDirectory(prefix = "unpackfs-") as unpackedfs: filename = os.path.join(bb_vars['DEPLOY_DIR_IMAGE'], "{}.tar.bz2".format(bb_vars['IMAGE_LINK_NAME'])) - shutil.unpack_archive(filename, unpackedfs) + with tarfile.open(filename) as tar: + tar.extract("./bin/busybox", path=unpackedfs) + tar.extract("./bin/busybox.nosuid", path=unpackedfs) + tar.extract("./lib/libc.so.6", path=unpackedfs) r = runCmd([bb_vars['READELF'], "-W", "-S", os.path.join(unpackedfs, "bin", "busybox")], native_sysroot = native_sysroot, target_sys = target_sys) From patchwork Fri Apr 24 20:56:00 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86912 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E3883FF885C for ; Fri, 24 Apr 2026 20:57:14 +0000 (UTC) Received: from mail-wm1-f68.google.com (mail-wm1-f68.google.com [209.85.128.68]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32615.1777064233890598995 for ; Fri, 24 Apr 2026 13:57:14 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=zDT45DbD; spf=pass (domain: smile.fr, ip: 209.85.128.68, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f68.google.com with SMTP id 5b1f17b1804b1-4891c00e7aeso57645255e9.2 for ; Fri, 24 Apr 2026 13:57:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064232; x=1777669032; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=CI2XY35qwMCtf13re4Y8RREPb6RV+dFgiSoKthXP7E4=; b=zDT45DbDNNBFhVJZnwQO2geccDyv9ZkUkjmBjZOD3hQBg8EfOepFQux6tqut+dXYjc WdvI7BIGkN4HqOg493Iyvf25DXtaE/1j4CFII0B4mLG/eb1DbTWOtg7HLsV3fu8ZJguw myGGJB01pAtI8ciKiEFNNhzO9rkL0jmmtG3XU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064232; x=1777669032; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=CI2XY35qwMCtf13re4Y8RREPb6RV+dFgiSoKthXP7E4=; b=GUZCfTxfhwiagsnDX/edBttyLo+dExGFZswo9/2GFPoETUfCievSPt3egS3I3AYkOK nqUmUN6kKr0HkRxYKzg4pdbXqrnl0kIucnqHmw2CSPRQX8qU98nR9uRSqNdimOj57v/2 o1lwC98tzSczYemukfCVudFISKSkqHNhArEcozMjHxkejc+9ZPAelG7dBeMs6DgdzGnU bIE8SpOumPfsLQK8lGhNqe9U48FaCGaJQ+MSFR2jPaXvEWn+k+2viQ6/rvug8h889rlf mZHk644x4UMkLzZZfSvs5b2LRYO0IA/E854mo/N2nQUZ1q52M6l/aHLAHUUwedkMa1mw JIyw== X-Gm-Message-State: AOJu0YwKLXXVsVk4uAkSQPjZV6hwDGFsnYovKZfX/oDuSTuarpe5RaSh ZNK3X1cKw5SerA/maHM8QrfscJxkU9fsVT8YQLkQ/1xDoCqc2O1HVyCozsySDDWJvqbADS+gECE A5KFPOIFBFmxU X-Gm-Gg: AeBDiesi9QjWSZ5bcaLnlchou7VQ8Vy3jXlxX2r0FUfpB6y2jbQZ6owvNCxB3/KQLel cRKH/2gfBPsan22078XVnRfo6IzU7RLevdRIZAHY58QrhQ2qnrfvT61/YnMzM35c+VrS03C4RDg Gk39WDMKzd3lFSnyFaSmB5BTigs8TcFz7PHf2yjpzLDAhtJUrlxsx3vTNyMbalbTOiN6O/LhVJF 4/o99P8Y1yQjpi3M6FsfEvoYRybvIU74wU5rXCdBw/GSef/cIjJQbCJJR1VSXHRrwa9Pp48dO14 HgGw7cV++TtG1CIimgMYNfuuTQc4DeP4BuQVYUjyuvX6KTx/KsJvOlsJ+mxCWfSKm2hNG4OqFQq 6lEcTgCEumSW/R2sEw6c8jmyoX7I57/BJLRe81n+/q34OYO20WmfgumkWjJS95gUbRndT/nP0Cs IFxj8HKE5pc3TKJW4CXxez7Vdu5igMhi/fVZ1+JPu3/Z6n8giYrCBohaoPESObxfVLtcWu1tb1r ivI3DW20UbmiVMRPgKVS1YA8yU6S1fE4Dxf4Q== X-Received: by 2002:a05:600c:4e14:b0:489:1f08:91b with SMTP id 5b1f17b1804b1-4891f080a7emr347107595e9.16.1777064231834; Fri, 24 Apr 2026 13:57:11 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.11 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:11 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 61/66] selftest/gdbserver: replace shutil.unpack_archive with tarfile extract Date: Fri, 24 Apr 2026 22:56:00 +0200 Message-ID: <948028ca3466fb7071ee49000e847d6e886e349c.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:14 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235934 From: Alexander Kanavin This is a followup to https://lists.openembedded.org/g/openembedded-core/message/233609 as the same issue happened in a different selftest. [YOCTO #16195] Signed-off-by: Alexander Kanavin Signed-off-by: Richard Purdie (cherry picked from commit c7468e70c238b056acbe06ef722b62b02626db8f) Signed-off-by: Yoann Congal --- meta/lib/oeqa/selftest/cases/gdbserver.py | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/meta/lib/oeqa/selftest/cases/gdbserver.py b/meta/lib/oeqa/selftest/cases/gdbserver.py index 9da97ae7803..9351feaa632 100644 --- a/meta/lib/oeqa/selftest/cases/gdbserver.py +++ b/meta/lib/oeqa/selftest/cases/gdbserver.py @@ -7,6 +7,7 @@ import os import time import tempfile import shutil +import tarfile import concurrent.futures from oeqa.selftest.case import OESelftestTestCase @@ -40,7 +41,8 @@ CORE_IMAGE_EXTRA_INSTALL = "gdbserver" filename = os.path.join(bb_vars['DEPLOY_DIR_IMAGE'], "%s-dbg.tar.bz2" % bb_vars['IMAGE_LINK_NAME']) shutil.unpack_archive(filename, debugfs) filename = os.path.join(bb_vars['DEPLOY_DIR_IMAGE'], "%s.tar.bz2" % bb_vars['IMAGE_LINK_NAME']) - shutil.unpack_archive(filename, debugfs) + with tarfile.open(filename) as tar: + tar.extract("./bin/kmod", path=debugfs) with runqemu("core-image-minimal", runqemuparams="nographic") as qemu: status, output = qemu.run_serial("kmod --help") From patchwork Fri Apr 24 20:56:01 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86913 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id F3EC0FF885E for ; Fri, 24 Apr 2026 20:57:14 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.32002.1777064234439314128 for ; Fri, 24 Apr 2026 13:57:14 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=PHhwTl75; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-4891b0786beso54232895e9.1 for ; Fri, 24 Apr 2026 13:57:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064232; x=1777669032; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=MYFTEJZe4DIV7YB1HGlxm7n6+5/dpCJAZhYQu3GUKHQ=; b=PHhwTl75m4YQfL6Lhyi5HBKJVJW6+O8wGEVmEYXac+hmulpousmduhwFHda6QcHo2k hV5VBLb/eNuYatd/wnn2EnAQ/Vly51B/7GdnffEief3yqJ3vM3A2QAioouRudl1BVKXL MawdwDMl3yoQYB7+QIt6q860xCMTNLwplqxNs= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064232; x=1777669032; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=MYFTEJZe4DIV7YB1HGlxm7n6+5/dpCJAZhYQu3GUKHQ=; b=RZnfR15u/XlCkdLwfm9nFTCyMg8cGrDjyyMLIXYYGRkopaxy/W9UJ8hHHOG3RIcRRi KhxKaI7waY9nxiit/bhJDPSrLGmtHux3JybKXa80ffWodp9zF7qiaPJwXHvLiqRn1yO/ sfeotrHeHJe3dVeGPjC/AoCs1v1P3IpPYlTh/s2SVNI85HOSmYg/jgPtMzUCGBRJ7xwJ bu479yrLLIa7Z2n3XNCAAZ4bPaYHwH1/NwbTOUy5ymJwUIQoAkVHCwsI6uDNDFd0bMmK M3+hrs2wDUCbnho3YuzWrQMD7+2I5W1eKSijjtzYVj8gFPmNfRW5lLqWj6clRbiiXMBG fB1w== X-Gm-Message-State: AOJu0YxlGHfmXTvCMiJGSs4rnbAxTzmoYjLtJKo3Irro/vpqmLJZui0n HsrUFs+DFpRifKBkkEtnW5ei+6v7ruZSRmDuonwNxiliBR6skPMSNDIwu/wRecH89eRBprJeUbD 91RjSEX9J69I8 X-Gm-Gg: AeBDieuCuYH58le8drC4iUvpuioIVwUuYfY58bOZ3o5R3RPOD38t2MRWpLf0kk9jAIX bYHzc5veA43pZsX4Q8HKJ2Sgux6vurYki7OKdwDWW7Si17F+F0XiCOjuDmIEHX0KAlOQD7KyuDg 6MV+Zpdf2AFZnznq29kmtLwX/nrAEjtHBY3vm4kd9sMm1r0MtdoaaWEDQzpS5zE4vSLinyQizHO 8eo7fdtG67SsOMQmArmJ8CjQHGBxIibL2m6VgtkDOw8tHig4YrplSf+FmuJUed0WAxErX48WOhS jIKqcTJzf0bDLN3jlXaZs4T4/V2ZEZ7MDWy3eFTQsyAkCMOMqkM4CL9fscY/2FLglKMOnvhwlvd VzylGJ40O5E8E/M6Udep1SEjpMOLsnXu1OPm81/5rHfU8f6Xx525vrv+eUuG9KlIfHuqhhi0xtG pmO5JbE4YOr48Gvs+4cslht7lWut9k4HrslzrvuIqZCQQmEN0YSnCYWIRXwQMFGKfYG8Udfgqto 5p02yyrx11RSjYM55e9o8nhcDIFnNsTsSW5rQ== X-Received: by 2002:a05:600c:620d:b0:489:1d23:4524 with SMTP id 5b1f17b1804b1-4891d23468bmr335430635e9.5.1777064232544; Fri, 24 Apr 2026 13:57:12 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.12 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:12 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 62/66] license.py: Drop visit_Str from SeenVisitor in selftest Date: Fri, 24 Apr 2026 22:56:01 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:14 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235935 From: Sunil Dora ast.Str was deprecated in Python 3.8 and removed in Python 3.14. In [1], visit_Str was already removed from the LicenseVisitor subclasses (FlattenVisitor, ListVisitor) in oe/license.py since bitbake now requires Python 3.8+. However, the test-only SeenVisitor class in the selftest was missed at that time and still uses visit_Str/node.s. On Python 3.14, ast.Str is fully removed so visit_Str is never called, causing test_single_licenses to return [] instead of the expected license list. Replace visit_Str/node.s with visit_Constant/node.value in SeenVisitor. [1] https://git.openembedded.org/openembedded-core/commit/meta/lib/oe/license.py?id=6d3da37adbcaf5a7a3dade08f9d052571b195249 Fixes [YOCTO #16220] Signed-off-by: Sunil Dora Signed-off-by: Richard Purdie (cherry picked from commit 8a5b019eec72676893507d018e7609745d2e3f49) Signed-off-by: Yoann Congal --- meta/lib/oeqa/selftest/cases/oelib/license.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/lib/oeqa/selftest/cases/oelib/license.py b/meta/lib/oeqa/selftest/cases/oelib/license.py index 5eea12e7619..49b28951f76 100644 --- a/meta/lib/oeqa/selftest/cases/oelib/license.py +++ b/meta/lib/oeqa/selftest/cases/oelib/license.py @@ -12,8 +12,8 @@ class SeenVisitor(oe.license.LicenseVisitor): self.seen = [] oe.license.LicenseVisitor.__init__(self) - def visit_Str(self, node): - self.seen.append(node.s) + def visit_Constant(self, node): + self.seen.append(node.value) class TestSingleLicense(TestCase): licenses = [ From patchwork Fri Apr 24 20:56:02 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86917 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 38FE3FF8846 for ; Fri, 24 Apr 2026 20:57:25 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32617.1777064235050255591 for ; Fri, 24 Apr 2026 13:57:15 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=tyTBhemk; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-488ff90d6c7so68180485e9.2 for ; Fri, 24 Apr 2026 13:57:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064233; x=1777669033; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=vDMA4Gn+wCmKzSGRQCK9y5XfaAOR/Kz0Q72NWXHRzz8=; b=tyTBhemkr0My+Z3Bmc7dsodzfiH5lu1haJNYBvsXeJPG5pGBWT/m6yhPPpdIU3DYeK o/fcd5znjq3dlUQ3lnDmxdpYTmivL2qXt9QQA+mlKlJI8jxZlpa7SPyS6qIQuH3iDKkp M0luqTxirfQg/t9b4fdq6lF0VXVbV1mFK9dNA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064233; x=1777669033; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=vDMA4Gn+wCmKzSGRQCK9y5XfaAOR/Kz0Q72NWXHRzz8=; b=LUFcG+zitt4qGJdH/BG/WrmsLDwEFzpuehdcm5FnaPp/4GcjEeer9cV/M8+XLqslow Tu0mvTTcnfEtvvtlURst8RTCBG5RcMc8ODuKImUr5BIjZHVKfDNOR0UVsJtwaIU9RKWB LCrYPTij9lrFdm+HC8UnF8SJwYNFUFS0PKZFu1ij/u+FaVcngehSBn/UjOarjswgDKLj YoZBspznQ5S+H5V6lGVWbIm/J57PqtzlX9wxOg/aLmeK/h4msdsn1ZT/R/BP1Z3TVTin to1l/fUD5g08H6L07tZcwA0X5Qa9/gyTYdy+o4dYz1Bt0LtZziBFkW/5saj16sdUBTkD CDng== X-Gm-Message-State: AOJu0YxtFug+xMHEYOLLekVP/tc1K6uIMO+mvDfeHv6EsS+NmNJIoLAN 5IDOeJZGDTW5JQR5Js5+ozdwd5e4NdotOOjKi1qdo8iw7YTe6jq7KnS+znMbSVZt6ewamyjserO o+K6JM2s7KYWI X-Gm-Gg: AeBDieuhRr5N3LrEZMGnLRH1g2mY+h2ETIMC3tY2EShsQ4BiogdYAYtEalvMh1aHg87 hn6s+vUQ4M1XbkP7d4A6QL8kpCaxkLfsMgyZsIQLG3oGgXp4rbkhXL/vyvuzTZkjb8ttcuIMMXe FdvaSkZdKSORpZiKOxVlHKaF5+OLCqdLJQ025WYIG1cRv/BZ7xIiymn/89mw1e0sUvT3cO+Y1MG x9fZcqXlXYcR8sisvd0gSbnZGjH4yhdI7L5+vcyX5tPqDmVdkM2fxMSt7rLZauWvUT3oniV9O/0 3dpUztSHs6gPL5O8otKs7kkQZPnsSyGbMRV0uEmTqUdrmaw7otyRSVMiN6woHbGCRam/t0DcZx3 5UKzv4sruqeKwIzdoob9Lj/7cyn4nH13SRU3XkR44Q0DvKy515b3kobnPZV8IzVHIDyVWa/aj5w P+JuxInx6nB0Z6bJ9U6XFQAjGk/1UCztaLb+6hDssvGx7i0PyUoA6l8faaD3lUx+Xlbuuk13ivT bkZk0i+o9UQMfzWo83PmftGlMG85tg2mpo50A== X-Received: by 2002:a05:600c:1da1:b0:488:d376:42cd with SMTP id 5b1f17b1804b1-488fb785901mr519006155e9.22.1777064233095; Fri, 24 Apr 2026 13:57:13 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.12 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:12 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 63/66] sudo: upgrade 1.9.17p1 -> 1.9.17p2 Date: Fri, 24 Apr 2026 22:56:02 +0200 Message-ID: <76b98657e3dc9da01a746deb7b9d08cb84ba44b6.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:25 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235936 From: Daniel Turull Changelog for sudo: 1.9.17p1 -> 1.9.17p2 ============================================================ Merge sudo 1.9.17p2 from branch 'main' into sudo-1.9 [d1b48c651] * configure, configure.ac: Fix check for which man page type to use with nroff Fixes a bug where configure would use *.man instead of *.mdoc on systems without mandoc. Bug #1077. [aa2498e46] * plugins/sudoers/log_client.c: client_msg_cb: make warning match the function that failed [f73162df3] 2025-07-23 Todd C. Miller * NEWS, configure, configure.ac: Sudo 1.9.17p2 [f0e1a5ca3] * plugins/sudoers/match_command.c, plugins/sudoers/match_digest.c: digest_matches: plug fd leak on snprinf() failure [26a1a7529] 2025-07-21 Todd C. Miller * etc/sudo-logsrvd.pp, etc/sudo-python.pp, etc/sudo.pp, scripts/mkpkg: Add a way to override pp_rpm_arch when building rpms This will be used to build x86_64_v2 packages for Alma Linux. [55d3c99c4] * configure, configure.ac: Fix check for which man page type to use with nroff Fixes a bug where configure would use *.man instead of *.mdoc on systems without mandoc. [2dc10cfbd] * plugins/sudoers/timestamp.c: ts_write: call lseek after fruncate on short write We need to make sure the file position is reset to the old EOF on error. [8e7e0e23f] 2025-07-20 Todd C. Miller * src/exec_ptrace.c: ptrace_readv_string: quiet sign-compare warning [fac2a49e7] * src/exec_ptrace.c: ptrace_readv_string: properly handle reads of more than one page When the intercept and intercept_verify options are enabled and either argv[] or envp[] contains a string larger than the page size (usually 4096), ptrace_readv_string() would fill the buffer with mutiple copies of the same string. Fixes GitHub issue #453. [2e93eabed] 2025-07-14 Todd C. Miller * src/exec_pty.c: revoke_pty: use killpg() not kill() to send HUP to the process group Also make sure we never call killpg(-1, SIGHUP), which would send SIGHUP to process 1 (init). It is possible for cmnd_pid to be -1 in certain error conditions where sudo killed the command itself. This may explain GitHub issue #458. [fb208d383] 2025-07-08 Todd C. Miller * etc/sudo-logsrvd.pp, etc/sudo-python.pp, etc/sudo.pp, scripts/pp: Don't assume RHEL major version is only a single digit Fixes handling of RHEL 10 and higher. [e5d953f33] * plugins/sudoers/visudo.c: visudo: create temporary file as mod 0600 not 0700 This was due to a typo in the mode field when the temporary file was created. Noticed by Bjorn Baron of the sudo-rs project. [1c254b330] 2025-06-30 Todd C. Miller * Makefile.in: We now build sudo releases from git, not mercurial [cb4e26734] 2025-06-28 Todd C. Miller * NEWS, configure, configure.ac: Signed-off-by: Daniel Turull (cherry picked from commit 12e9ba655153a9cb7c2b79cf52a2300e19634dcf) Signed-off-by: Yoann Congal --- .../files/0001-sudo.conf.in-fix-conflict-with-multilib.patch | 2 +- .../sudo/{sudo_1.9.17p1.bb => sudo_1.9.17p2.bb} | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) rename meta/recipes-extended/sudo/{sudo_1.9.17p1.bb => sudo_1.9.17p2.bb} (96%) diff --git a/meta/recipes-extended/sudo/files/0001-sudo.conf.in-fix-conflict-with-multilib.patch b/meta/recipes-extended/sudo/files/0001-sudo.conf.in-fix-conflict-with-multilib.patch index 1989c5abd7c..f96ab4b1f6d 100644 --- a/meta/recipes-extended/sudo/files/0001-sudo.conf.in-fix-conflict-with-multilib.patch +++ b/meta/recipes-extended/sudo/files/0001-sudo.conf.in-fix-conflict-with-multilib.patch @@ -1,4 +1,4 @@ -From 8c69192754ba73dd6e3273728a21aa73988f4bfb Mon Sep 17 00:00:00 2001 +From 3b9ed5e1ae1e217158af7d9128e35ef3463bc107 Mon Sep 17 00:00:00 2001 From: Kai Kang Date: Tue, 17 Nov 2020 11:13:40 +0800 Subject: [PATCH] sudo.conf.in: fix conflict with multilib diff --git a/meta/recipes-extended/sudo/sudo_1.9.17p1.bb b/meta/recipes-extended/sudo/sudo_1.9.17p2.bb similarity index 96% rename from meta/recipes-extended/sudo/sudo_1.9.17p1.bb rename to meta/recipes-extended/sudo/sudo_1.9.17p2.bb index 5b9d73b33b1..d715bc2075f 100644 --- a/meta/recipes-extended/sudo/sudo_1.9.17p1.bb +++ b/meta/recipes-extended/sudo/sudo_1.9.17p2.bb @@ -7,7 +7,7 @@ SRC_URI = "https://www.sudo.ws/dist/sudo-${PV}.tar.gz \ PAM_SRC_URI = "file://sudo.pam" -SRC_URI[sha256sum] = "ff607ea717072197738a78f778692cd6df9a7e3e404565f51de063ca27455d32" +SRC_URI[sha256sum] = "4a38a1ab3adb1199257edc2a7c4a2bd714665eb605b04368843b06dada2cfcfb" DEPENDS += " virtual/crypt ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" RDEPENDS:${PN} += " ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-limits pam-plugin-keyinit', '', d)}" From patchwork Fri Apr 24 20:56:03 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86918 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 43A6AFF8848 for ; Fri, 24 Apr 2026 20:57:25 +0000 (UTC) Received: from mail-wm1-f66.google.com (mail-wm1-f66.google.com [209.85.128.66]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.32005.1777064238487342681 for ; Fri, 24 Apr 2026 13:57:18 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=iQZFr/9x; spf=pass (domain: smile.fr, ip: 209.85.128.66, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f66.google.com with SMTP id 5b1f17b1804b1-4891e86fabeso82273955e9.1 for ; Fri, 24 Apr 2026 13:57:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064237; x=1777669037; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=LZt/gCKC0bM8ZKdePXlfhuBpQeVYHndU2BNr5j3B4W8=; b=iQZFr/9xH4G2yB6TfUVr8eqB1TK2d5KsDS553GZN4RLSK1S0KSbH5LFWQCBROdQ38x mTsU6iaqF2NT/QJtEWiEOVuUXWQE71s/2J+jfATET8DrSuWuddaNZAl1bZqrdKksuuaK 9Rb3SYI2A/DmKrcyMBTYckcyVQ3f3b2+1i7iA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064237; x=1777669037; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=LZt/gCKC0bM8ZKdePXlfhuBpQeVYHndU2BNr5j3B4W8=; b=tRr0ju1wAqx3WUmtLKIMBJY2kY2avrjZPJyT7L7OOFuWgJj0PrkOR3aKK5rP7xcDY5 ONckmPzelozxhjy83B4LyS4yHY2A/3REfa+CNQxm518PFekRADUtC8LgB4b8AHexWK8a a5eGrvImJkmqUa3uxKzELp/pbNEjNdesf6PSMwnWIjh6WqxmKYeIEbWTX7jw4E02HRD3 WuulLEHEZHdRNejLTH4YpIhB6CxCWS6T9nVOJ45kCeGc7Vpxqc0h6NevocxRQw8Fl7Cb vrnthZdxeTu0XticVMBRWWEl2ux/5rOfWdSHil/NF/4zzzIepSa7WrLjE6gQjdbcjaGv nAfQ== X-Gm-Message-State: AOJu0Yw9uRkf0LGgyem4Y3j7lkCLO5vJVx1lW91JeuOEqWkr29Ae2DsG 9schHCgpIv+x7pXh+4eYlY8p++UR5u2A8fjPj+CVz1XtZ3vYTZtS8IRSX4RX3KGpHYuPBaTY15V SWjRRrUocI9G6 X-Gm-Gg: AeBDietYN5zqHJ0EZ5U4iy/lt48KOswMQqE/rvhaPkr1ZVkxzK3VuUf3LQDYtw/fE+E gh5nO0la/4fFGcKuzg314f6H0ttcsh7iws4I402BltacQtcPLyECWu/Oj165WeEqYVpwZGeN3SJ s9kfd/k+HIRbZMna+eBFfrsI06DL8PQS/iVZWQidorPNRPsFGh82g4ec1YbGqu1mr9evCR/WsD/ ZcTFlYBKv7tZ4WdCeYqJGZUobBu3UzlQ9UnnPVi/BTMlCKOg8ZsxzBrDyworIqSOfDQZ9/HqtUF kdfTO9HZFkqfYEV0EvnNpfJ758eEtGe8Wqssg2sqDRkq2+LBiKEPQLLufeb+GmnQApzvM8Muh10 Lp/4djViFAqKFfH8X8BX6SEMEqemQJRwSKY4aGDLAyw1o2n2EJkfdIQEx59egx61a7hM9wxHkel Lv5EgQhx28PVf2eniVIsXFWolnBKcC8nuP8b6CzXAwB3rfVCuRJT3W4TYgaRsl4/UYcBX58tS/K ztPyouS0T75hqHtUPMVixNJuBn/R3Nn9rABow== X-Received: by 2002:a05:600c:1f83:b0:488:8840:e5ae with SMTP id 5b1f17b1804b1-488fb787afemr469139255e9.24.1777064233713; Fri, 24 Apr 2026 13:57:13 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.13 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:13 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 64/66] lttng-ust: upgrade 2.13.8 -> 2.13.10 Date: Fri, 24 Apr 2026 22:56:03 +0200 Message-ID: <90f529115ed175652d2ab8c538d1c213550056f8.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:25 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235939 From: Daniel Turull Changelog for lttng-ust: 2.13.8 -> 2.13.10 ============================================================ 2026-02-13 lttng-ust 2.13.10 * Fix: ustctl: sigbus handling: statement with no effect 2025-04-14 (National Gardening Day) lttng-ust 2.13.9 * Fix: Use UATOMIC_HAS_ATOMIC_{BYTE,SHORT} for counter atomics * Fix: lttng-ust-tp regex warnings * lttng-ust-java: Load lttng-ust-context-jni before other JNI libraries * doc/examples: set minimal CMake version to 3.5.0 * Fix: Update get_mempolicy check to handle EPERM * Fix: Correct numa_available return code checks * Fix: test_benchmark: do not match CPU(s) scaling MHz: * Tests: Fix abi conflict test when building with clang * Fix: Build examples when rpath is stripped from in-build-tree libs * ust-fd: Add close_range declaration * docs: Correct GitHub URLs in lttng-ust.3 * fix: handle EINTR correctly in get_cpu_mask_from_sysfs Signed-off-by: Daniel Turull Signed-off-by: Yoann Congal --- ...es-when-rpath-is-stripped-from-in-bu.patch | 161 ------------------ ...-common-link-with-liburcu-explicitly.patch | 3 +- ...Makefile.am-Add-install-lib-to-setup.patch | 3 +- ...tng-ust_2.13.8.bb => lttng-ust_2.13.10.bb} | 3 +- 4 files changed, 3 insertions(+), 167 deletions(-) delete mode 100644 meta/recipes-kernel/lttng/lttng-ust/0001-Fix-Build-examples-when-rpath-is-stripped-from-in-bu.patch rename meta/recipes-kernel/lttng/{lttng-ust_2.13.8.bb => lttng-ust_2.13.10.bb} (92%) diff --git a/meta/recipes-kernel/lttng/lttng-ust/0001-Fix-Build-examples-when-rpath-is-stripped-from-in-bu.patch b/meta/recipes-kernel/lttng/lttng-ust/0001-Fix-Build-examples-when-rpath-is-stripped-from-in-bu.patch deleted file mode 100644 index 6da675fa312..00000000000 --- a/meta/recipes-kernel/lttng/lttng-ust/0001-Fix-Build-examples-when-rpath-is-stripped-from-in-bu.patch +++ /dev/null @@ -1,161 +0,0 @@ -From 5d10459b6b5182fcbc98240d9dace026c87a5037 Mon Sep 17 00:00:00 2001 -From: Kienan Stewart -Date: Mon, 5 Aug 2024 15:41:34 -0400 -Subject: [PATCH] Fix: Build examples when rpath is stripped from in-build-tree - libs - -Observed issue -============== - -Certain tool chains[1, 2] emit warnings or errors when building the -example applications. - -``` -make[3]: Entering directory -'/home/xxx/src/efficios/lttng/master/src/lttng-ust/doc/examples/easy-ust' -CC sample.o -CC tp.o -CCLD sample - -/usr/bin/ld: warning: liblttng-ust-common.so.1, needed by ../../../src/lib/lttng-ust/.libs/liblttng-ust.so, not found (try using -rpath or -rpath-link) -/usr/bin/ld: warning: liblttng-ust-tracepoint.so.1, needed by ../../../src/lib/lttng-ust/.libs/liblttng-ust.so, not found (try using -rpath or -rpath-link) -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_add_fd_to_tracker' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_urcu_after_fork_child' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_common_ctor' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_tp_init' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_tp_probe_register_queue_release' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_cancelstate_disable_pop' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_urcu_synchronize_rcu' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_urcu_register_thread' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_tp_probe_prune_release_queue' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_cancelstate_disable_push' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_urcu_before_fork' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_lock_fd_tracker' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_trace_clock' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_urcu_has_sys_membarrier' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_unlock_fd_tracker' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_tp_exit' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_get_cpu_sym' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_common_alloc_tls' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_urcu_after_fork_parent' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_delete_fd_from_tracker' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_urcu_register' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_urcu_reader' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_urcu_gp' -/usr/bin/ld: ../../../src/lib/lttng-ust/.libs/liblttng-ust.so: undefined reference to `lttng_ust_tp_probe_unregister_queue_release' -collect2: error: ld returned 1 exit status -``` - -=== Reproducer === - -The easiest way to consistently reproduce this type of build failure -is to perform the following steps: - -``` -./configure -make -j$(nproc) -find . -iname '*.so' -exec chrpath -d {} \; -make -C doc/examples clean -make -j$(nproc) -``` - -As the examples are not built with libtool, finding the libraries to -link against depends on the shared objects having an rpath. - -E.g. - -``` -$ chrpath src/lib/lttng-ust/.libs/liblttng-ust.so.1.0.0 -src/lib/lttng-ust/.libs/liblttng-ust.so.1.0.0: RUNPATH=/home/xxx/src/efficios/lttng/master/src/lttng-ust/src/lib/lttng-ust-common/.libs:/home/xxx/src/efficios/lttng/master/src/lttng-ust/src/lib/lttng-ust-tracepoint/.libs:/home/xxx/src/efficios/lttng/master/usr/lib -``` - -The current examples build with `-Wl,-rpath` for `liblttng-ust`, but -not the dependencies of `liblttng-ust` (which would normally be found -via it's own rpath). If the `rpath` is stripped from -`liblttng-ust.so`, or if the tool chain ignores `rpath` explicitly, -then the build with fail. - -In the case of a yocto build environment as in GitHub#61[1], the -following commands reproduced the warnings and the errors seen in the -above test case. - -``` -git clone git://git.yoctoproject.org/poky && cd poky/ -. oe-init-build-env -echo "PACKAGECONFIG:pn-lttng-ust = 'examples'" >>conf/local.conf -bitbake lttng-ust -``` - -=== Solution === - -Explicitly add library search paths and set linker rpath-link are set -for both the standard and cmake examples. Similar changes were -proposed for each of those parts respectively in GitHub#61[1] and GitHub#63[2]. - -=== Known issues === - -While the `rpath-link` for the second order library dependencies will -allow the builds to complete, the examples will not work at -runtime even when using `rpath`. From `man ld.so`, the rpaths in an -executable or shared object are only considered for direct -dependencies. Therefore, without setting `LD_LIBRARY_PATH` or -installing the libraries test applications will fail as follows: - -``` -$ ./doc/examples/easy-ust/sample -./doc/examples/easy-ust/sample: error while loading shared libraries: liblttng-ust-common.so.1: cannot open shared object file: No such file or directory -``` - -References -========== - -[1]: https://github.com/lttng/lttng-ust/pull/61 -[2]: https://github.com/lttng/lttng-ust/pull/63 - -Change-Id: I273ccddd0d0b7a1b57b9e09ddf48d8b5b41e6f8e -Signed-off-by: Kienan Stewart -Signed-off-by: Mathieu Desnoyers - -Upstream-Status: Backport [https://github.com/lttng/lttng-ust/commit/5d10459b6b5182fcbc98240d9dace026c87a5037] -Signed-off-by: Bin Lan - ---- - doc/examples/Makefile.am | 13 ++++++++++--- - 1 file changed, 10 insertions(+), 3 deletions(-) - -diff --git a/doc/examples/Makefile.am b/doc/examples/Makefile.am -index aebf63bd..79766ec0 100644 ---- a/doc/examples/Makefile.am -+++ b/doc/examples/Makefile.am -@@ -169,7 +169,10 @@ all-local: - CFLAGS='$(CFLAGS)' \ - AM_CFLAGS='$(AM_CFLAGS)' \ - LDFLAGS="$(LDFLAGS)" \ -- AM_LDFLAGS='$(AM_LDFLAGS) -L../../../src/lib/lttng-ust/.libs -Wl,-rpath="$(PWD)/../../src/lib/lttng-ust/.libs/" -Wl,-rpath-link="$(PWD)/../../src/lib/lttng-ust/.libs/"' \ -+ AM_LDFLAGS='$(AM_LDFLAGS) -L../../../src/lib/lttng-ust/.libs -L../../../src/lib/lttng-ust-common/.libs -L../../../src/lib/lttng-ust-tracepoint/.libs \ -+ -Wl,-rpath="$(abs_top_builddir)/src/lib/lttng-ust/.libs/" \ -+ -Wl,-rpath-link="$(abs_top_builddir)/src/lib/lttng-ust-common/.libs/" \ -+ -Wl,-rpath-link="$(abs_top_builddir)/src/lib/lttng-ust-tracepoint/.libs/"' \ - LTTNG_GEN_TP_PATH="$$rel_src_subdir$(top_srcdir)/tools/" \ - AM_V_P="$(AM_V_P)" \ - AM_V_at="$(AM_V_at)" \ -@@ -222,10 +225,14 @@ all-local: - CXX="$(CXX)" \ - $(CMAKE) \ - -DCMAKE_INCLUDE_PATH="$(abs_top_srcdir)/include;$(abs_top_builddir)/include" \ -- -DCMAKE_LIBRARY_PATH="$(abs_top_builddir)/src/lib/lttng-ust/.libs" \ -+ -DCMAKE_LIBRARY_PATH="$(abs_top_builddir)/src/lib/lttng-ust/.libs;$(abs_top_builddir)/src/lib/lttng-ust-common/.libs;$(abs_top_builddir)/src/lib/lttng-ust-tracepoint/.libs" \ - -DCMAKE_C_FLAGS="$(AM_CFLAGS) $(CPPFLAGS) $(CFLAGS)" \ - -DCMAKE_CXX_FLAGS="$(AM_CXXFLAGS) $(CXXFLAGS) $(CPPFLAGS)" \ -- -DCMAKE_EXE_LINKER_FLAGS="$(AM_LDFLAGS) $(LDFLAGS)" \ -+ -DCMAKE_EXE_LINKER_FLAGS="$(AM_LDFLAGS) $(LDFLAGS) \ -+ -L../../../src/lib/lttng-ust/.libs -L../../../src/lib/lttng-ust-common/.libs -L../../../src/lib/lttng-ust-tracepoint/.libs \ -+ -Wl,-rpath=$(abs_top_builddir)/src/lib/lttng-ust/.libs/ \ -+ -Wl,-rpath-link=$(abs_top_builddir)/src/lib/lttng-ust-common/.libs/ \ -+ -Wl,-rpath-link=$(abs_top_builddir)/src/lib/lttng-ust-tracepoint/.libs/" \ - .. && \ - $(MAKE) \ - ) || exit 1; \ --- -2.43.0 - diff --git a/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch b/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch index e85dbdb4398..2d1c6135a58 100644 --- a/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch +++ b/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch @@ -1,4 +1,4 @@ -From 27402453f25fbdb5a9fb1a1b88d1c4d9852187d2 Mon Sep 17 00:00:00 2001 +From 0755d1c25e1fd1d8f7baa863ed6a9b931c2d0095 Mon Sep 17 00:00:00 2001 From: Alexander Kanavin Date: Sun, 5 Sep 2021 10:44:19 +0200 Subject: [PATCH] lttng-ust-common: link with liburcu explicitly @@ -7,7 +7,6 @@ Otherwise linking errors are seen on x86-32. Upstream-Status: Submitted [by email to lttng-dev, Francis, Jonathan] Signed-off-by: Alexander Kanavin - --- src/lib/lttng-ust-common/Makefile.am | 1 + 1 file changed, 1 insertion(+) diff --git a/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch b/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch index 7c49583e0dc..f9b1d198a12 100644 --- a/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch +++ b/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch @@ -1,4 +1,4 @@ -From f65efd963e52de51d35e2e03fb773f33dd64f565 Mon Sep 17 00:00:00 2001 +From 74bb718d64a120af79bf1068d1c6ad9e568fc58f Mon Sep 17 00:00:00 2001 From: Richard Purdie Date: Tue, 20 Feb 2024 12:19:06 +0000 Subject: [PATCH] python-lttngust/Makefile.am: Add --install-lib to setup.py @@ -9,7 +9,6 @@ building. Upstream-Status: Submitted [https://github.com/lttng/lttng-ust/pull/59] Signed-off-by: Robert Yang - --- src/python-lttngust/Makefile.am | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/recipes-kernel/lttng/lttng-ust_2.13.8.bb b/meta/recipes-kernel/lttng/lttng-ust_2.13.10.bb similarity index 92% rename from meta/recipes-kernel/lttng/lttng-ust_2.13.8.bb rename to meta/recipes-kernel/lttng/lttng-ust_2.13.10.bb index bf2524bdc0d..56f3d93724d 100644 --- a/meta/recipes-kernel/lttng/lttng-ust_2.13.8.bb +++ b/meta/recipes-kernel/lttng/lttng-ust_2.13.10.bb @@ -31,10 +31,9 @@ PE = "2" SRC_URI = "https://lttng.org/files/lttng-ust/lttng-ust-${PV}.tar.bz2 \ file://0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch \ file://0001-lttng-ust-common-link-with-liburcu-explicitly.patch \ - file://0001-Fix-Build-examples-when-rpath-is-stripped-from-in-bu.patch \ " -SRC_URI[sha256sum] = "d4ef98dab9a37ad4f524ccafdfd50af4f266039b528dd5afabce78e49024d937" +SRC_URI[sha256sum] = "c997d4efa02ed18b4976a0a280ff1c7fb2fc9d6ef2f86a0f5ccb44294a9d6045" CVE_PRODUCT = "ust" From patchwork Fri Apr 24 20:56:04 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86916 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 25879FF8842 for ; Fri, 24 Apr 2026 20:57:25 +0000 (UTC) Received: from mail-wm1-f65.google.com (mail-wm1-f65.google.com [209.85.128.65]) by mx.groups.io with SMTP id smtpd.msgproc02-g2.32618.1777064236068700375 for ; Fri, 24 Apr 2026 13:57:16 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=KNFI3k8K; spf=pass (domain: smile.fr, ip: 209.85.128.65, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f65.google.com with SMTP id 5b1f17b1804b1-488a14c31eeso66531545e9.0 for ; Fri, 24 Apr 2026 13:57:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064234; x=1777669034; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=WOWPIm5Nse9NJC0LtJS0zbS23M8F6fTXptumUXYdkaU=; b=KNFI3k8KHEf1mzeXP7t1NDHO+Yi/XOCeMCVoEvKDiRsZrO4j2H29RScYpH/a/Izxmc xuHJ9AC4MBTv0+GO57JEKa5+rLbEL4SS2mAJJ0xed+nyYmM9+blupbDoHJxdjY8cSZKS YGvswnrYeMaK5NJeHnHmqb+MsnL9GNmzqng1g= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064234; x=1777669034; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=WOWPIm5Nse9NJC0LtJS0zbS23M8F6fTXptumUXYdkaU=; b=QMAsosvJgj96hD5LEo7ceVq0l+dYMncyaI2BF2zXqtfT+bC8fenm2HBRsNZO2WcaMW xDXgMNs0mGHF+zMgp+9JvqYvNN4o07mBVLnHo95LH2xXHj0WLLYFUualhK1UgykD5MRC +tTBj0sMsyGn1Su8T2NGm+k5kfO1Vf4OZY2GSi7Okf0o92oUZZA7QmMLlIyQz/hs08U1 QfN4JKIIIRaGAeOHJgo0QAcodNeEhGrpQnOW15TBadTEzzvghtXYuJy1YQaVBRaAS4LQ K4mAFUpbB3v7+Zx0vZIAajOWyXXNzpq5NqQqQtKZs72zgrGhKdYGFF5Aqi5i51K+pBxy 8x3w== X-Gm-Message-State: AOJu0YyIDJ49SOaYtDizeqI+Oom0pyuQKBPDCgg5KIRVGf5PGlghDX55 TGLHrzAAH1uIkeF1eucIRf9LKzcCDW6UtVvozI1J4hJi55PpxQsivt2orq3wtZkRI2b94TLk5pe GYLL3hwDrP+yA X-Gm-Gg: AeBDieti5o7/D2UYLXjtxvG6mUkQa2cEi9+i6Y77GUUitxpAj13TclsoZSAWkAfTI6i VhzmoX6EYdO5OJIIN+j6U7JUXSxmB4cBjTxQ5R3U6WH/LP/XSFX+A5+ZY3deDXOMTv6OpabUKg8 b5fU9SZnpnHlL8NtYnq30zTn2QEVbV0QIMkzz/RC9lGGQQYpOzcIlmiekwdOGOWRAUMoR+22LIp E68V9DIhJ3AxCJ4YfDpHS+mpwJjoaDHL8jJxyDd1Mjv9Bdmx8XP0RG5PHAxkOIxLPP4tu8K4G5J iACC+6zt5a+JVg1uEA22ckJYOw3PxTiuWBlh41tN+McOOCMZdaZ0sf1m/aa7imrDx5LIidLNnZj iPQOBPcmT4Q4nthZRRou1afEaGLsjL4qIH2tLwasN+eqbgdOvaSFPvAdbhOb/HVbgvsKsSLe7Yi WGU5J/Uo2FFEoVH84ykPDxBFvRxj3m4bGCJyOZyYMiADreRECDYI/tb3BKfDytc0UgSaeswXU7+ slphBC6tudj5g7eTJaujSFBGTGwuUCsZW6MSA== X-Received: by 2002:a05:600d:8454:b0:48a:5970:2003 with SMTP id 5b1f17b1804b1-48a59702216mr148867305e9.3.1777064234201; Fri, 24 Apr 2026 13:57:14 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.13 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:13 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 65/66] libatomic-ops: upgrade 7.8.2 -> 7.8.4 Date: Fri, 24 Apr 2026 22:56:04 +0200 Message-ID: <189ecdff01a9c2c47b809d153b04ea6080f74e4f.1777064068.git.yoann.congal@smile.fr> X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:25 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235937 From: Daniel Turull Changelog for libatomic-ops: 7.8.2 -> 7.8.4 ============================================================ == [7.8.4] 2025-09-05 == * Document Win32-specific AO_NO_ASM_XADD macro in README * Eliminate 'atomic_thread_fence is unsupported with tsan' gcc-11 warning * Eliminate 'munmap argument 1 from incompatible pointer type' gcc warning * Eliminate 'uninitialized memory use' gcc-13 warning in test_atomic * Fix all broken URLs in comments * Fix atomic_ops_sysdeps.S compilation for SunPro compiler in CMake script * Update URLs after repository transfer to bdwgc organization * Update CMake minimum required version to 3.10 Signed-off-by: Daniel Turull (cherry picked from commit 02d66279071cbd043474dc44f44d348ec3228583) Signed-off-by: Yoann Congal --- .../{libatomic-ops_7.8.2.bb => libatomic-ops_7.8.4.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-support/libatomic-ops/{libatomic-ops_7.8.2.bb => libatomic-ops_7.8.4.bb} (89%) diff --git a/meta/recipes-support/libatomic-ops/libatomic-ops_7.8.2.bb b/meta/recipes-support/libatomic-ops/libatomic-ops_7.8.4.bb similarity index 89% rename from meta/recipes-support/libatomic-ops/libatomic-ops_7.8.2.bb rename to meta/recipes-support/libatomic-ops/libatomic-ops_7.8.4.bb index 62691334087..d0bb11eb5d7 100644 --- a/meta/recipes-support/libatomic-ops/libatomic-ops_7.8.2.bb +++ b/meta/recipes-support/libatomic-ops/libatomic-ops_7.8.4.bb @@ -11,7 +11,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ SRC_URI = "${GITHUB_BASE_URI}/download/v${PV}/libatomic_ops-${PV}.tar.gz" GITHUB_BASE_URI = "https://github.com/bdwgc/libatomic_ops/releases" -SRC_URI[sha256sum] = "d305207fe207f2b3fb5cb4c019da12b44ce3fcbc593dfd5080d867b1a2419b51" +SRC_URI[sha256sum] = "2356e002e80ef695875e971d6a4fd8c61ca5c6fa4fd1bf31cce54a269c8bfcd5" S = "${WORKDIR}/libatomic_ops-${PV}" From patchwork Fri Apr 24 20:56:05 2026 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yoann Congal X-Patchwork-Id: 86915 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2E9A9FF8844 for ; Fri, 24 Apr 2026 20:57:25 +0000 (UTC) Received: from mail-wm1-f67.google.com (mail-wm1-f67.google.com [209.85.128.67]) by mx.groups.io with SMTP id smtpd.msgproc01-g2.32004.1777064236594046486 for ; Fri, 24 Apr 2026 13:57:16 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@smile.fr header.s=google header.b=IJnUTzyF; spf=pass (domain: smile.fr, ip: 209.85.128.67, mailfrom: yoann.congal@smile.fr) Received: by mail-wm1-f67.google.com with SMTP id 5b1f17b1804b1-4852b81c73aso68160645e9.3 for ; Fri, 24 Apr 2026 13:57:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile.fr; s=google; t=1777064235; x=1777669035; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=UO0K0p/Yul7hDYiqXLYgopA3S2wKEZJQfL3Sid1hJy0=; b=IJnUTzyFoEiRTGV/FIap0BURzJXmydnFaUqrcKPcex8BbtJGgzWid9KHMJ5uWaRGs2 rD17W/oPRMFWTefXWyvA5Hijk+0PE3QBe2PYIfsDPbWXRZI8Dg1WLzNqxeOAm0+8rwd0 EfQFndEFeXCPQmrbUzaR2tec40+RH+NU+doGk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777064235; x=1777669035; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=UO0K0p/Yul7hDYiqXLYgopA3S2wKEZJQfL3Sid1hJy0=; b=l4DqLcwfzUj5IpA0wK0ty4tqxLFAa2eIX13J4QV1LHGGKXx2G6Ccv2mKFtNDnNtYdk JXCscECeUiwc8MyiQtHz/GErxw0A9Kt5BzXMpKwRmmdGjj+vxkXnBaO2udLPkFBsltig fwxok8l0gHXFr421fCe+l5LtF4W1yq3ZVGfbVtNkEdZVYXSr73yTNe40h+fZ925T6xo0 J4mjVGEu3cIm0cn6NL74yh/vOp+gQQnHOkFVbKine0fq+F2MP60NkcKKU0F3uU2U0HUQ dnUHaMis8al4jq64+hTDegV06dL2l4Q6XC69ic14MRbszJczPaiDuqPkbMqEVAGZtp0a mj7w== X-Gm-Message-State: AOJu0YxUSsEoIbLX6r5CpVdIJcj5op4YnH6j1lbT9FE4RlO4wrhcvxhc r1cT6DjjutqcH4lXb5uZ+YVMOFkz37K4CX97mlqPI8ulFcvvUbxbC2Uq9MUE31QBkwSgbr0oVdq B6TOVLjPJZWa/ X-Gm-Gg: AeBDiesm0OP8c6k/OtFYsKFVNr2Nxkv0k6bYevAxETBPYIMhtZh3ALfglEYIoIuXTa8 eyOhKnOnvhrNfXInZ/XlwGoCL7P5FcpOA7axNlJCf/GhepomnRxTd+8ODa5NMDHBIqAS+GK+r2/ tcGpBkVSfCquOqeTOEJTXADmTsn81H9Si5C0tOUREKBldEYqBr487inkotWZRstwSwohLjm2FNZ YVtduePGLv4UB+2IrjZZBMWEt0irgAt9CSl/ljcB6SQJXmUlnMI0ZcwmtyI+DcQUHnUIDbdMHmO jOCOSqoo/nVyTVbfNbTCyBEoMlkwqaW8CqmaDf7rRxVau6d9CuwVc0Z3YFrfK4wERJyQ9rcqzGm qk7WvLANBeR0C/VbG/1dp/HFBt0hzgGdlqiTPp9XaQavxXldKXsKkEfdhB46S7/x2CBYltpiGdH hAz6wfscBFZmmXp28T82SVAeAitrlBAg7Pe9ZQrXcrVDh5g/1PggsB30DKFzVQyorPbxor7pmwp 2+wZAgu66C48vJ4GSCKpbdWVg6jXIAlORme/Q== X-Received: by 2002:a05:600c:6289:b0:488:f941:aab2 with SMTP id 5b1f17b1804b1-488fb78a561mr463376325e9.30.1777064234735; Fri, 24 Apr 2026 13:57:14 -0700 (PDT) Received: from FRSMI25-LASER.home (2a01cb001331aa00a2e4fb7b0d887544.ipv6.abo.wanadoo.fr. [2a01:cb00:1331:aa00:a2e4:fb7b:d88:7544]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4891cca5743sm394841005e9.9.2026.04.24.13.57.14 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Apr 2026 13:57:14 -0700 (PDT) From: Yoann Congal To: openembedded-core@lists.openembedded.org Subject: [OE-core][scarthgap 66/66] liburcu: upgrade 0.14.0 -> 0.14.2 Date: Fri, 24 Apr 2026 22:56:05 +0200 Message-ID: X-Mailer: git-send-email 2.47.3 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from 45-33-107-173.ip.linodeusercontent.com [45.33.107.173] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 24 Apr 2026 20:57:25 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/235938 From: Daniel Turull Changelog for liburcu: 0.14.0 -> 0.14.2 ============================================================ 2026-01-26 Userspace RCU 0.14.2 * Fix: Only include linux/time_types.h when __NR_futex_time64 is defined * Use __NR_futex_time64 in futex syscall wrapper * Cleanup: Remove useless declarations from urcu-qsbr * src/urcu-bp.c: assert => urcu_posix_assert 2024-08-28 Userspace RCU 0.14.1 * Fix: missing typename in URCU_FORCE_CAST * Allow building with GCC >= 13.3 on RISC-V * pointer.h: Fix the rcu_cmpxchg_pointer documentation * Adjust shell script to allow Bash in other locations * fix: handle EINTR correctly in get_cpu_mask_from_sysfs * Relicense src/compat-smp.h to MIT * ppc.h: use mftb on ppc * Fix: allow clang to build liburcu on RISC-V * Fix -Walloc-size * urcu/uatomic/riscv: Mark RISC-V as broken * Fix: urcu-bp: misaligned reader accesses * LoongArch: Document that byte and short atomics are implemented with LL/SC * Add LoongArch support * tests/regression/rcutorture: Add wait state * urcu-wait: Initialize node in URCU_WAIT_NODE_INIT * Fix: urcu-wait: add missing futex.h include * Adjust shell scripts to allow Bash in other locations * Add support for OpenBSD * Revert compiler.h: Introduce caa_unqual_scalar_typeof * rculfhash: Use caa_container_of_check_null in cds_lfht_entry * compiler.h: Introduce caa_container_of_check_null * compiler.h: Introduce caa_unqual_scalar_typeof * Avoid calling caa_container_of on NULL pointer in cds_lfht macros * Fix: revise urcu_read_lock_update() comment * Fix: uatomic powerpc comment about lwsync * fix: aarch64: allow RHEL7 gcc 4.8.5-11 * fix: warning 'noreturn' function does return on ppc * Fix: use __noreturn__ for C11-compatibility Signed-off-by: Daniel Turull Signed-off-by: Yoann Congal --- .../liburcu/{liburcu_0.14.0.bb => liburcu_0.14.2.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-support/liburcu/{liburcu_0.14.0.bb => liburcu_0.14.2.bb} (91%) diff --git a/meta/recipes-support/liburcu/liburcu_0.14.0.bb b/meta/recipes-support/liburcu/liburcu_0.14.2.bb similarity index 91% rename from meta/recipes-support/liburcu/liburcu_0.14.0.bb rename to meta/recipes-support/liburcu/liburcu_0.14.2.bb index f03c9906326..12916dd0c3d 100644 --- a/meta/recipes-support/liburcu/liburcu_0.14.0.bb +++ b/meta/recipes-support/liburcu/liburcu_0.14.2.bb @@ -12,7 +12,7 @@ LIC_FILES_CHKSUM = "file://LICENSE;md5=e548d28737289d75a8f1e01ba2fd7825 \ SRC_URI = "http://lttng.org/files/urcu/userspace-rcu-${PV}.tar.bz2" -SRC_URI[sha256sum] = "ca43bf261d4d392cff20dfae440836603bf009fce24fdc9b2697d837a2239d4f" +SRC_URI[sha256sum] = "1337c49658367ca6df3c09a7c02303f752e2d964aa98518f4593f7781ad7aac2" S = "${WORKDIR}/userspace-rcu-${PV}" inherit autotools multilib_header