From patchwork Fri May 3 02:40:29 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43192 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 71A1EC04FFE for ; Fri, 3 May 2024 02:40:54 +0000 (UTC) Received: from mail-yb1-f178.google.com (mail-yb1-f178.google.com [209.85.219.178]) by mx.groups.io with SMTP id smtpd.web11.3999.1714704045466445194 for ; Thu, 02 May 2024 19:40:45 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=Q+/Z0MBq; spf=pass (domain: gmail.com, ip: 209.85.219.178, mailfrom: bruce.ashfield@gmail.com) Received: by mail-yb1-f178.google.com with SMTP id 3f1490d57ef6-de45dba157cso8080079276.3 for ; Thu, 02 May 2024 19:40:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714704044; x=1715308844; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=tZTwG/ntok8beJA87fxO7/IxaMJdFaHbo4gTFhku/hU=; b=Q+/Z0MBq8l497kDwdMiGcafiBYpxFmd6lTywzgUxxmESbbrvB6bBeuxNuGnonHdmwQ gPz1fqLz19ZjNvQC2kU1lEchXzcxUm4vhD9eSRTbBfi/5rfpH7aXOfgi3vODR3tj5l3w NOp6PJbLYB3kmA7D8V38OotcRtjTQGDPUraQML6t82rQMs6T7lBa8Z9ynfp26BEvKxAc 4EhQCn3mfzOVZTSdanTPSPxfFKVGzl1cqA/kCEpj+NQHmmc8DCvOxvHXZqrjhT/jKM95 okpdPQ+hnoxq8+wFJeZyN3mVgCATaaopchFVvKYyBdhOJYZyYLC9fwijGGK/tUi8NnoZ /n7w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714704044; x=1715308844; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=tZTwG/ntok8beJA87fxO7/IxaMJdFaHbo4gTFhku/hU=; b=S3VIJ871Si8dU42R1DlGif7F4Vm+eaOrPa/vibN2BdU16cNbCr5ADGHeMEy+ZzEHTR Q9UjE9TeuYMRb+YKuLwm3d+aOLGP6ijFpsPG8ZvQt/6Pli59cnRtfBhL0y/jmBxO70Lf LfK00zDL9tpjgeMoupiMCbFa103bQDce8GpCm9hi2bEeq/N9e+ZvZpmsVi2NojYed6An PN6rVxkDtm6u7k1XIJcQgMKRZ1sHX7YudL97oDQUl3f3SnWnR4wV1ojEnqLQaK3nZGbu weedEaKKodZ0FImRWtfDyk42YgbBEBm/cZn+pZWkhQzwYjL67YWwfENN11ZQCTEV4dM6 Z7Mg== X-Gm-Message-State: AOJu0YyY32URHatpfHdrzS0luy38Nzw9PcByC3E0VC4dLVueq+msQ2ge 6MLVcrpd9GqMfzQ583TJmoJXurH42L4pWh25NOVmkpsNJfOWQt7GyQFACg== X-Google-Smtp-Source: AGHT+IGRbBIsCdeGPBj7tn8NFalaebhxSv6CJBNPV1vQhY8dbQ/LbTXtrngPWRnOL0ky7IcSHcDJxA== X-Received: by 2002:a25:80cd:0:b0:dcf:411f:e78 with SMTP id c13-20020a2580cd000000b00dcf411f0e78mr1719394ybm.25.1714704044041; Thu, 02 May 2024 19:40:44 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id bm34-20020a05620a19a200b0078ec3aa9cc7sm856163qkb.25.2024.05.02.19.40.42 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 19:40:42 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 01/12] linux-yocto/6.6: update to v6.6.24 Date: Thu, 2 May 2024 22:40:29 -0400 Message-Id: <4099f83b6ae501d60ce67b60ab2fecd91593de36.1714703667.git.bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 02:40:54 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198932 From: Bruce Ashfield Updating linux-yocto/6.6 to the latest korg -stable release that comprises the following commits: 9467d7a12f97 Linux 6.6.24 e87e08c94c95 drm/amdgpu: fix use-after-free bug 3a9569441b47 tools/resolve_btfids: fix build with musl libc 4338e40da808 x86/sev: Skip ROM range scans and validation for SEV-SNP guests 2048ff503f43 scsi: libsas: Fix disk not being scanned in after being removed f23db7579283 scsi: libsas: Add a helper sas_get_sas_addr_and_dev_type() 76edb986c44b scsi: lpfc: Correct size for wqe for memset() ac5b18f52858 scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() ff3cdff7c897 usb: dwc3: pci: Drop duplicate ID 70977e7d5e5f Revert "x86/bugs: Use fixed addressing for VERW operand" 367b4ce0d74d x86/bugs: Use fixed addressing for VERW operand a492d6dad9af scsi: qla2xxx: Delay I/O Abort on PCI error 29520a334f3e scsi: qla2xxx: Change debug message during driver unload f85af9f1aa5e scsi: qla2xxx: Fix double free of fcport f14cee7a882c scsi: qla2xxx: Fix double free of the ha->vp_map pointer 8de1584ec4fe scsi: qla2xxx: Fix command flush on cable pull adc9702642a0 scsi: qla2xxx: NVME|FCP prefer flag not being honored b31a120b81ac scsi: qla2xxx: Update manufacturer detail be895682c507 scsi: qla2xxx: Split FCE|EFT trace control 8ec0d55020f6 scsi: qla2xxx: Fix N2N stuck connection ef23850940d9 scsi: qla2xxx: Prevent command send on chip reset db4aaf281a5b usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset 1f510af8dbc3 usb: typec: ucsi_acpi: Refactor and fix DELL quirk 5857494b5056 usb: typec: ucsi: Ack unsupported commands 68f57d013827 usb: typec: ucsi: Clear EVENT_PENDING under PPM lock c708b704c26d usb: typec: Return size of buffer if pd_set operation succeeds 99731076722e usb: udc: remove warning when queue disabled ep 3e417f31b06a usb: dwc2: gadget: LPM flow fix f047361fee44 usb: dwc2: gadget: Fix exiting from clock gating 8d310e5d702c usb: dwc2: host: Fix ISOC flow in DDMA mode 96dff759ef7d usb: dwc2: host: Fix hibernation flow ba2951ec82e8 usb: dwc2: host: Fix remote wakeup from hibernation f51849833705 USB: core: Fix deadlock in port "disable" sysfs attribute 8dbc001bba86 USB: core: Add hub_get() and hub_put() routines 122a06f1068b USB: core: Fix deadlock in usb_deauthorize_interface() fd2304f4c0ae usb: dwc3: Properly set system wakeup d12af9a1c59e staging: vc04_services: fix information leak in create_component() 98592a49956c staging: vc04_services: changen strncpy() to strscpy_pad() d4c34782b6d7 scsi: core: Fix unremoved procfs host directory regression a1f506af7ffe scsi: sd: Fix TCG OPAL unlock on system resume 61d4787692c1 ALSA: sh: aica: reorder cleanup operations to avoid UAF bugs 66aa5d95ea8c vfio/pds: Make sure migration file isn't accessed after reset 2ceddecdd0ef drm/amd/display: Clear OPTC mem select on disable 6a1cb68b9810 drm/amd/display: Disconnect phantom pipe OPP from OPTC being disabled ae62f1dde66a drm/amd/display: Fix hang/underflow when transitioning to ODM4:1 ce748df0d570 USB: UAS: return ENODEV when submit urbs fail with device not attached da3b75931bb7 usb: cdc-wdm: close race between read and workqueue 56c5145baef5 Revert "usb: phy: generic: Get the vbus supply" 9c74507e6c43 mtd: spinand: Add support for 5-byte IDs 9ae3954dd36b Bluetooth: hci_sync: Fix not checking error on hci_cmd_sync_cancel_sync 3b031e4fcb27 drm/i915/gt: Reset queue_priority_hint on parking 07c011e3351d drm/i915: Do not match JSL in ehl_combo_pll_div_frac_wa_needed() 69fa0e23a6a3 drm/i915/dsi: Go back to the previous INIT_OTP/DISPLAY_ON order, mostly a891add409e3 drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() 510c5f5e4837 drm/i915/hwmon: Fix locking inversion in sysfs getter 197f6d6987c5 drm/amdgpu: fix deadlock while reading mqd from debugfs 2684393685f7 drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 042ef0afc40f drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed 476eed5f1c22 net: ll_temac: platform_get_resource replaced by wrong function 2a84744a037b nouveau/dmem: handle kcalloc() allocation failure be4f3af178cb thermal: devfreq_cooling: Fix perf state when calculate dfc res_util cc80b5d7fbef block: Do not force full zone append completion in req_bio_endio() 152799126327 sdhci-of-dwcmshc: disable PM runtime in dwcmshc_remove() 4466677dcabe mmc: core: Avoid negative index with array access 35ee8529eee7 mmc: core: Initialize mmc_blk_ioc_data 6810ebeb0975 mmc: sdhci-omap: re-tuning is needed after a pm transition to support emmc HS200 mode 07cf57eba52f selftests/mm: fix ARM related issue with fork after pthread_create fe295de2d564 selftests/mm: sigbus-wp test requires UFFD_FEATURE_WP_HUGETLBFS_SHMEM b79f9e1ff27c mm: cachestat: fix two shmem bugs 2e2f7a576b13 hexagon: vmlinux.lds.S: handle attributes section c3639d87286a exec: Fix NOMMU linux_binprm::exec in transfer_args_to_stack() 78516979792d Revert "drm/amd/display: Fix sending VSC (+ colorimetry) packets for DP/eDP displays without PSR" 566e540b404f wifi: iwlwifi: fw: don't always use FW dump trig 3d7ac0250714 wifi: iwlwifi: mvm: disable MLO for the time being 6956ba7da71b wifi: cfg80211: add a flag to disable wireless extensions 6b948b54c8bd wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes 8ca8aac42bf7 btrfs: zoned: use zone aware sb location for scrub 7b5029e3f1b6 btrfs: zoned: don't skip block groups with 100% zone unusable 0427c8ef8bbb btrfs: fix race in read_extent_buffer_pages() c7077f43f30d tmpfs: fix race on handling dquot rbtree 907efa8839cd ARM: prctl: reject PR_SET_MDWE on pre-ARMv6 a0071e3b0c24 prctl: generalize PR_SET_MDWE support check to be per-arch 5110da79d7d6 x86/efistub: Reinstate soft limit for initrd loading 90048007daea efi/libstub: Cast away type warning in use of max() 01666eece40e x86/efistub: Add missing boot_params for mixed mode compat entry 32e4750262e0 init: open /initrd.image with O_LARGEFILE 3f59182bcb4d ALSA: hda/tas2781: add locks to kcontrols b999e77ecf3a ALSA: hda/tas2781: remove digital gain kcontrol 11b4dc6494b5 perf top: Use evsel's cpus to replace user_requested_cpus 78142322a1c3 selftests/mm: Fix build with _FORTIFY_SOURCE ccf2d9d2ae95 selftests/mm: gup_test: conform test to TAP format output 674545b4852c pwm: img: fix pwm clock lookup 9114ba998750 efi: fix panic in kdump kernel 1acbca933313 x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD bebb5af001dc x86/mpparse: Register APIC address only once 31a6a791b046 efi/libstub: fix efi_random_alloc() to allocate memory at alloc_min or higher address f13edd1871d4 kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address 455b94f95e49 irqchip/renesas-rzg2l: Prevent spurious interrupts when setting trigger type e9b18e99938b irqchip/renesas-rzg2l: Rename rzg2l_irq_eoi() ddec478fb711 irqchip/renesas-rzg2l: Rename rzg2l_tint_eoi() ec5482d22c67 irqchip/renesas-rzg2l: Add macro to retrieve TITSR register offset based on register's index 9913a07850e0 irqchip/renesas-rzg2l: Flush posted write in irq_eoi() c15a37e3f162 irqchip/renesas-rzg2l: Implement restriction when writing ISCR register ea4c338cfefa printk: Update @console_may_schedule in console_trylock_spinning() e07a16e6f5b1 iommu/dma: Force swiotlb_max_mapping_size on an untrusted device c803069d4845 swiotlb: Fix alignment checks when both allocation and DMA masks are present ae2f8dbe921e swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() 3e7acd6e25ba swiotlb: Fix double-allocation of slots due to broken alignment handling 4da463081026 entry: Respect changes to system call number by trace_sys_enter() 0c027c2bad7f ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses 66689127f1a7 ARM: 9352/1: iwmmxt: Remove support for PJ4/PJ4B cores df13f43686f3 clocksource/drivers/arm_global_timer: Fix maximum prescaler value 0982fd6bf0b8 x86/sev: Fix position dependent variable references in startup code ecd16da39d44 x86/Kconfig: Remove CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT ee0bd4ad780d vfio/fsl-mc: Block calling interrupt handler without trigger 62d4e43a569b vfio/platform: Create persistent IRQ handlers 69276a555c74 vfio/pci: Create persistent INTx handler 2ee432d74043 vfio: Introduce interface to flush virqfd inject workqueue ded566b4637f btrfs: fix deadlock with fiemap and extent locking ea01221f95f3 xfs: remove conditional building of rt geometry validator functions 9efd84260f47 xfs: reset XFS_ATTR_INCOMPLETE filter on node removal 69252ab1d566 xfs: update dir3 leaf block metadata after swap 264e3509590c xfs: ensure logflagsp is initialized in xfs_bmap_del_extent_real 8a4566795552 xfs: fix perag leak when growfs fails 59b115a7e802 xfs: add lock protection when remove perag from radix tree c4848932911b xfs: short circuit xfs_growfs_data_private() if delta is zero 47604cf2b803 xfs: initialise di_crc in xfs_log_dinode b9358db0a811 xfs: add missing nrext64 inode flag check to scrub 1a48327c9e5a xfs: force all buffers to be written during btree bulk load 7bc086bbc977 xfs: fix an off-by-one error in xreap_agextent_binval 84cd4f79b4ce xfs: recompute growfsrtfree transaction reservation while growing rt volume d6b65ed1cc5f xfs: remove unused fields from struct xbtree_ifakeroot fb6e584e7471 xfs: make xchk_iget safer in the presence of corrupt inode btrees 3f6308034432 xfs: don't allow overly small or large realtime volumes 89e511a745be xfs: fix 32-bit truncation in xfs_compute_rextslog 0a31f1e8d8c6 xfs: make rextslog computation consistent with mkfs 680776e555f3 xfs: transfer recovered intent item ownership in ->iop_recover 87db24c8edd3 xfs: pass the xfs_defer_pending object to iop_recover cd3c2cf35f7c xfs: use xfs_defer_pending objects to recover intent items c0231292d059 xfs: don't leak recovered attri intent items 08bac45e02c6 xfs: consider minlen sized extents in xfs_rtallocate_extent_block 57a20b6150d3 xfs: convert rt bitmap extent lengths to xfs_rtbxlen_t 1a6d63f2418c xfs: move the xfs_rtbitmap.c declarations to xfs_rtbitmap.h 648b41f28181 wifi: rtw88: 8821cu: Fix connection failure 9fe75ad3c7e8 wifi: iwlwifi: pcie: fix RB status reading 3d0a7b23d688 ASoC: amd: yc: Revert "Fix non-functional mic on Lenovo 21J2" 930775060ca3 x86/efistub: Call mixed mode boot services on the firmware's stack 23b99c7bf6ec drm/amd/display: handle range offsets in VRR ranges e21fee1035b9 drm/i915: Don't explode when the dig port we don't have an AUX CH 60b9d1887a35 iio: imu: inv_mpu6050: fix FIFO parsing when empty 3df5e345d6b4 iio: imu: inv_mpu6050: fix frequency setting when chip is off d017ec50fac9 i2c: i801: Avoid potential double call to gpiod_remove_lookup_table 21e985684216 iio: accel: adxl367: fix I2C FIFO data register 73d42ed41182 iio: accel: adxl367: fix DEVID read after reset d97be07a0027 arm64: dts: qcom: sc8280xp-x13s: limit pcie4 link speed 27cd25e3b3bc mm, vmscan: prevent infinite loop for costly GFP_NOIO | __GFP_RETRY_MAYFAIL allocations b1c10caf752c ARM: imx_v6_v7_defconfig: Restore CONFIG_BACKLIGHT_CLASS_DEVICE 520f79c110ff tee: optee: Fix kernel panic caused by incorrect error handling bccaba16db96 ALSA: hda/realtek: fix mute/micmute LEDs for HP EliteBook 6971e0592314 ALSA: hda/realtek - Add Headset Mic supported Acer NB platform c01ed748847f fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion ed56f3cfbe6f Revert "tty: serial: simplify qcom_geni_serial_send_chunk_fifo()" 7529cbd8b5f6 vt: fix unicode buffer corruption when deleting characters 68b988933885 mei: me: add arrow lake point H DID e86a87a4bea8 mei: me: add arrow lake point S DID 434beb66368d serial: port: Don't suspend if the port is still busy a62a30ccf721 misc: fastrpc: Pass proper arguments to scm call 997ca4153846 misc: lis3lv02d_i2c: Fix regulators getting en-/dis-abled twice on suspend/resume 16eac1126d6a tty: serial: fsl_lpuart: avoid idle preamble pending if CTS is enabled cc31dba9afa6 xhci: Fix failure to detect ring expansion need. a4eff9198449 usb: port: Don't try to peer unused USB ports based on location a0f77b5d6067 usb: gadget: ncm: Fix handling of zero block length packets 4a22aeac24d0 usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group 871fd7b10b56 USB: usb-storage: Prevent divide-by-0 error in isd200_ata_command a125ee2c06b0 ALSA: hda/realtek - Fix headset Mic no show at resume back for Lenovo ALC897 platform a30c36bc0cfc drm/i915: Check before removing mm notifier 24b5eff43ec2 tty: serial: imx: Fix broken RS485 6f3c1dabe8d0 drm/amdgpu/pm: Fix the error of pwm1_enable setting 274f0b1a6b97 tracing: Use .flush() call to wake up readers 4577036353fa SEV: disable SEV-ES DebugSwap by default 12f8e32a5a38 KVM: SVM: Flush pages under kvm->lock to fix UAF in svm_register_enc_region() 9d1b22e573a3 KVM: x86: Mark target gfn of emulated atomic instruction as dirty 43c70cbc2502 firewire: ohci: prevent leak of left-over IRQ on unbind a5b60c8b9a9e init/Kconfig: lower GCC version check for -Warray-bounds 4c9f70c73ddb Input: xpad - add additional HyperX Controller Identifiers d9f400dc3e89 cgroup/cpuset: Fix retval in update_cpumask() 0f952b1bb048 usb: typec: tpcm: Fix PORT_RESET behavior for self powered devices bae5b98dcf63 selftests: mptcp: diag: return KSFT_FAIL not test_cnt b93494329656 mm, mmap: fix vma_merge() case 7 with vma_ops->close b475226733f1 xfrm: Avoid clang fortify warning in copy_to_user_tmpl() dc60b25540c8 crypto: sun8i-ce - Fix use after free in unprepare 48dd260fdb72 crypto: rk3288 - Fix use after free in unprepare c288a61a48dd drm/nouveau: fix stale locked mutex in nouveau_gem_ioctl_pushbuf 6887314f5356 nouveau: lock the client object tree. ba29cffccfea Drivers: hv: vmbus: Calculate ring buffer size for more efficient use of memory 7332d7389b5e netfilter: nf_tables: reject constant set with timeout c0c2176d1814 netfilter: nf_tables: disallow anonymous set with timeout flag b2d6f9a5b1cf netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout 56712f74b704 net: fix IPSTATS_MIB_OUTPKGS increment in OutForwDatagrams. 95232806972a drm/amd/display: Use freesync when `DRM_EDID_FEATURE_CONTINUOUS_FREQ` found 8b934390272d workqueue: Shorten events_freezable_power_efficient name 47ccb849a023 drm/bridge: lt8912b: do not return negative values from .get_modes() d5a81e981769 drm/bridge: lt8912b: clear the EDID property on failures a7d980a9f70e drm/bridge: lt8912b: use drm_bridge_edid_read() 2b6aaf7b193b drm/bridge: add ->edid_read hook and drm_bridge_edid_read() de125efb3bae drm/ttm: Make sure the mapped tt pages are decrypted when needed 0436d691d216 wifi: brcmfmac: Demote vendor-specific attach/detach messages to info 8d59a64cbec8 wifi: brcmfmac: cfg80211: Use WSEC to set SAE password 47b563297a48 wifi: brcmfmac: add per-vendor feature detection callback 73520eeea49d x86/pm: Work around false positive kmemleak report in msr_build_context() e50f83061ac2 dm snapshot: fix lockup in dm_exception_table_exit 066bbc430644 drm/amd/display: Fix noise issue on HDMI AV mute c7c855fd3d5a drm/amd/display: Return the correct HDCP error code 6fcd12cb9088 drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag 4992f44a3b05 ahci: asm1064: asm1166: don't limit reported ports 836af9a25b2d ahci: asm1064: correct count of reported ports 49391e9f1e14 wireguard: selftests: set RISCV_ISA_FALLBACK on riscv{32,64} c991567e6c63 wireguard: netlink: access device through ctx instead of peer 13d107794304 wireguard: netlink: check for dangling peer via is_dead instead of empty list 7f1005dd39d2 LoongArch/crypto: Clean up useless assignment operations d7d7c6cdea87 LoongArch: Define the __io_aw() hook as mmiowb() f3f5d7a5049d LoongArch: Change __my_cpu_offset definition to avoid mis-optimization 3d26a2d80181 virtio: reenable config if freezing device failed 8a2e2336b8cf cxl/trace: Properly initialize cxl_poison region name a66885b840d6 net: hns3: tracing: fix hclgevf trace event strings 9aa7a53c4733 drm/i915: Add missing ; to __assign_str() macros in tracepoint code 6244036a07ae NFSD: Fix nfsd_clid_class use of __string_len() macro 8291b4eac429 net: esp: fix bad handling of pages from page_pool d0caabe6fe76 x86/CPU/AMD: Update the Zenbleed microcode revisions f8a2a55a0b82 cpufreq: dt: always allocate zeroed cpumask 037414669414 mtd: rawnand: Constrain even more when continuous reads are enabled 26a4eee38f8c mtd: rawnand: Fix and simplify again the continuous read derivations da2911798f25 cifs: open_cached_dir(): add FILE_READ_EA to desired access 997b0c26d3fa cifs: reduce warning log level for server not advertising interfaces 0845cb6bbf15 cifs: make cifs_chan_update_iface() a void function 4501f9cd36c1 cifs: delete unnecessary NULL checks in cifs_chan_update_iface() db3a3e6fa33e cifs: do not let cifs_chan_update_iface deallocate channels 66c2940c9614 cifs: make sure server interfaces are requested only for SMB3+ 407ced4e770e cifs: add xid to query server interface call 0c8aa4cfda4e nilfs2: prevent kernel bug at submit_bh_wbc() f69e81396aea nilfs2: fix failure to detect DAT corruption in btree and direct mappings 6966586c2f77 f2fs: truncate page cache before clearing flags when aborting atomic write 99d1fd81d341 f2fs: mark inode dirty for FI_ATOMIC_COMMITTED flag 9a31f4b61448 Revert "block/mq-deadline: use correct way to throttling write requests" f1d93b2a010c memtest: use {READ,WRITE}_ONCE in memory scanning b483eff0bd19 drm/vc4: hdmi: do not return negative values from .get_modes() fd79a093bb23 drm/imx/ipuv3: do not return negative values from .get_modes() b71ae5fb2dd3 drm/exynos: do not return negative values from .get_modes() a686732df6ce drm/panel: do not return negative error codes from drm_panel_get_modes() 12bbe2c25cdb drm/probe-helper: warn about negative .get_modes() a64ab862e84e s390/zcrypt: fix reference counting on zcrypt card objects 54d26adf64c0 soc: fsl: qbman: Use raw spinlock for cgr_lock 0e6521b0f93f soc: fsl: qbman: Always disable interrupts when taking cgr_lock 700ed41bf63e dlm: fix user space lkb refcounting b31301a1fa61 ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() 7bcd58e8096a ring-buffer: Fix full_waiters_pending in poll b87a7e108e6d ring-buffer: Fix resetting of shortest_full 73dae1a5d489 ring-buffer: Do not set shortest_full when full target is hit b82dbe74ee31 ring-buffer: Fix waking up ring buffer readers 1241052e158d io_uring: clean rings on NO_MMAP alloc fail e8fc78a1c70f platform/x86/intel/tpmi: Change vsec offset to u64 ed3fb2e2fe87 ksmbd: retrieve number of blocks using vfs_getattr in set_file_allocation_info c8f7ad2df083 ksmbd: replace generic_fillattr with vfs_getattr ef309589f01c server: convert to new timestamp accessors 1d7317d5b636 tpm,tpm_tis: Avoid warning splat at shutdown 74c564b7f008 vfio/platform: Disable virqfds on cleanup 04a4a017b9ff vfio/pci: Lock external INTx masking ops 2a4a666c4510 vfio/pci: Disable auto-enable of exclusive INTx IRQ fe750e274442 thermal/drivers/mediatek: Fix control buffer enablement on MT7896 7e8cffa4f85e cifs: allow changing password during remount 9179aa27039a cifs: prevent updating file size from server if we have a read/write lease b9e741ac2b7c smb: client: stop revalidating reparse points unnecessarily db5f1f1fb8c1 PCI: hv: Fix ring buffer size calculation cebb4baed803 PCI: dwc: endpoint: Fix advertised resizable BAR size 7aeca6f44cb6 PCI: qcom: Enable BDF to SID translation properly 52f86f3e091c kbuild: Move -Wenum-{compare-conditional,enum-conversion} into W=1 71739da67085 NFS: Read unlock folio on nfs_page_create_from_folio() error e25447c35f87 nfs: fix UAF in direct writes 7293dd0bd34a sparc32: Fix parport build with sparc32 0f314c3be7d9 io_uring: fix mshot io-wq checks f55ecbd9a78c io_uring/net: correctly handle multishot recvmsg retry setup 1a6efd4c286c PCI/AER: Block runtime suspend when handling errors cc3519b818c1 speakup: Fix 8bit characters from direct synth a973ef25f144 usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic 3dd6e0faa75d phy: tegra: xusb: Add API to retrieve the port number of phy 0ef9d78ba7e7 slimbus: core: Remove usage of the deprecated ida_simple_xx() API 63c7a5cf228e nvmem: meson-efuse: fix function pointer type mismatch 37b6a3ba793b ext4: fix corruption during on-line resize 27715371c162 hwmon: (amc6821) add of_match table 100d83b0da07 landlock: Warn once if a Landlock action is requested while disabled bc8e5fda787b drm/etnaviv: Restore some id values 10f2af1af8ab leds: trigger: netdev: Fix kernel panic on interface rename trig notify d4e2365b07f1 Bluetooth: btnxpuart: Fix btnxpuart_close 985edff78e80 mmc: core: Fix switch on gp3 partition 0f98f6d2fb5f mm: swap: fix race between free_swap_and_cache() and swapoff() 20d3e1c8a184 mac802154: fix llsec key resources release in mac802154_llsec_key_del 7d3765550374 block: Fix page refcounts for unaligned buffers in __bio_release_pages() 653d51504f41 powerpc: xor_vmx: Add '-mhard-float' to CFLAGS dc9702acfb4f dm-raid: fix lockdep waring in "pers->hot_add_disk" 31ead1845c37 PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports d86ad8c3e152 PCI/PM: Drain runtime-idle callbacks before driver removal 0bfe6b29d6ac wifi: rtw88: Add missing VID/PIDs for 8811CU and 8821CU 51dad05f1835 btrfs: fix off-by-one chunk length calculation at contains_pending_extent() 40a24160cf3c btrfs: qgroup: always free reserved space for extent records 4cc3e2ed6759 serial: Lock console when calling into driver before registration 6f12c54fa09d serial: core: only stop transmit when HW fifo is empty 1846bd4fc1bb usb: dwc3-am62: Disable wakeup at remove 7dfed9855397 usb: dwc3-am62: fix module unload/reload behavior 4a1f0678d15e usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros 8b86779ade3a fuse: don't unhash root 777ba18929b5 fuse: fix root lookup with nonzero generation 3d304dd6b29d fuse: replace remaining make_bad_inode() with fuse_make_bad() bd169abd394e mmc: tmio: avoid concurrent runs of mmc_request_done() 677aa47e3e43 PM: sleep: wakeirq: fix wake irq warning in system suspend 3c3df979e9b7 USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M 28f719670f00 KVM: x86/xen: inject vCPU upcall vector when local APIC is enabled 5cf342a13d49 USB: serial: option: add MeiG Smart SLM320 product 07a8b301818f USB: serial: cp210x: add ID for MGP Instruments PDS100 515159ca62a8 USB: serial: add device ID for VeriFone adapter 58bb229d9714 USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB 816ae3cf3dcb powerpc/fsl: Fix mfpmr build errors with newer binutils 620b6cf2f1a2 usb: xhci: Add error handling in xhci_map_urb_for_dma 7e9926fef71e clk: qcom: mmcc-msm8974: fix terminating of frequency table arrays 9b4c4546dd61 clk: qcom: mmcc-apq8084: fix terminating of frequency table arrays 0204247cf366 clk: qcom: gcc-ipq9574: fix terminating of frequency table arrays b6b31b4c67ea clk: qcom: gcc-ipq8074: fix terminating of frequency table arrays 421b135aceac clk: qcom: gcc-ipq6018: fix terminating of frequency table arrays b0cf3d200e8a clk: qcom: gcc-ipq5018: fix terminating of frequency table arrays 245c318cdad0 vfio/pds: Always clear the save/restore FDs on reset 35c1cdd504a3 PM: suspend: Set mem_sleep_current during kernel command line setup ed87a423756a cpufreq: Limit resolving a frequency to policy min/max 66e2c41b0c80 docs: Restore "smart quotes" for quotes f77c8c1603bb iio: adc: rockchip_saradc: use mask for write_enable bitfield 7ed675cfaf51 iio: adc: rockchip_saradc: fix bitmask for channels on SARADCv2 8ec4a68a25a2 md/raid5: fix atomicity violation in raid5_cache_count 644604e6f014 parisc: Strip upper 32 bit of sum in csum_ipv6_magic for 64-bit builds d4b71ff9c918 parisc: Fix csum_ipv6_magic on 64-bit systems cabe3343acce parisc: Fix csum_ipv6_magic on 32-bit systems d31c8d0ca8bf parisc: Fix ip_fast_csum 6bd42452713e parisc: Avoid clobbering the C/B bits in the PSW with tophys and tovirt macros 51408b47f8af parisc/unaligned: Rewrite 64-bit inline assembly of emulate_ldd() f9f67e87e4b7 x86/nmi: Fix the inverse "in NMI handler" check 736ad6c577a3 md/md-bitmap: fix incorrect usage for sb_index d8ea3e788b5a mtd: rawnand: meson: fix scrambling mode value in command macro 1a3487cdf8dc ubi: correct the calculation of fastmap size d1b505c988b7 ubi: Check for too small LEB size in VTBL code fc99f4e2d2f1 ubifs: Set page uptodate in the correct place ab8f9df10694 fuse: fix VM_MAYSHARE and direct_io_allow_mmap 03a7e3f2ba3c fat: fix uninitialized field in nostale filehandles b46c822f8b55 bounds: support non-power-of-two CONFIG_NR_CPUS d6e646b86085 kasan/test: avoid gcc warning for intentional overflow fe86d01ce7db block: Clear zone limits for a non-zoned stacked queue ba191200a1ae ext4: correct best extent lstart adjustment logic 9a06d17abc16 selftests/mqueue: Set timeout to 180 seconds 8a5a7611ccc7 crypto: qat - resolve race condition during AER recovery e8ac80031809 sparc: vDSO: fix return value of __setup handler 61798d3cb53a sparc64: NMI watchdog: fix return value of __setup handler a0b9f4f8e22b powerpc/smp: Increase nr_cpu_ids to include the boot CPU 68a9c41f0167 powerpc/smp: Adjust nr_cpu_ids to cover all threads of a core 7f6282665dd7 powercap: intel_rapl_tpmi: Fix System Domain probing b5cbb42fb658 powercap: intel_rapl_tpmi: Fix a register bug d6c83ee705a1 powercap: intel_rapl: Fix locking in TPMI RAPL c4c2f7e672e7 sched: Simplify tg_set_cfs_bandwidth() 0641908b906a powercap: intel_rapl: Fix a NULL pointer dereference 9df6a7a3c951 thermal/intel: Fix intel_tcc_get_temp() to support negative CPU temperature 868e3264f236 cpufreq: amd-pstate: Fix min_perf assignment in amd_pstate_adjust_perf() e056484f189b arm64: dts: qcom: sm8550-mtp: correct WCD9385 TX port mapping 6eacb2ec2e79 arm64: dts: qcom: sm8550-qrd: correct WCD9385 TX port mapping a75afe480d43 KVM: Always flush async #PF workqueue when vCPU is being destroyed 88efc3095b6d media: nxp: imx8-isi: Mark all crossbar sink pads as MUST_CONNECT d0e3440dab0d media: mc: Expand MUST_CONNECT flag to always require an enabled link 3b6ccc91dcc4 media: mc: Rename pad variable to clarify intent ebb6fb7f6265 media: mc: Add num_links flag to media_pad c95318607fbe media: nxp: imx8-isi: Check whether crossbar pad is non-NULL before access 0a7690224714 media: mc: Fix flags handling when creating pad links cc088ebf8b4a media: mc: Add local pad to pipeline regardless of the link state dc5e4f240473 media: xc4000: Fix atomicity violation in xc4000_get_frequency b5d40f02e722 pci_iounmap(): Fix MMIO mapping leak 86cb706a40b7 drm/vmwgfx: Fix the lifetime of the bo cursor memory 2160ad6861c4 serial: max310x: fix NULL pointer dereference in I2C instantiation ff41e0d4f3fa drm/vmwgfx: Fix possible null pointer derefence with invalid contexts 01fad74090a0 arm: dts: marvell: Fix maxium->maxim typo in brownstone dts 3677d01c55bc smack: Handle SMACK64TRANSMUTE in smack_inode_setsecurity() c6fc44595491 smack: Set SMACK64TRANSMUTE only for dirs in smack_inode_setxattr() a1a8d40182e2 clk: qcom: gcc-sdm845: Add soft dependency on rpmhpd 2c26984759bb remoteproc: virtio: Fix wdg cannot recovery remote processor 779af170f1db arm64: dts: qcom: sc7280: Add additional MSI interrupts 1992f2af6444 media: staging: ipu3-imgu: Set fields before media_entity_pads_init() e76f6b9618e8 wifi: brcmfmac: avoid invalid list operation when vendor attach fails 190794848e2b wifi: brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach 0a23f95af7f2 drm/vmwgfx: Unmap the surface before resetting it on a plane state 51138f1f3564 KVM: x86: Use a switch statement and macros in __feature_translate() 688313fb139e KVM: x86: Advertise CPUID.(EAX=7,ECX=2):EDX[5:0] to userspace 06644f0d7193 drm/tilcdc: Set preferred depth ff7ae7b32324 crypto: jitter - add RCT/APT support for different OSRs 50cd24ddb6f0 arm64: defconfig: remove CONFIG_IPQ_APSS_5018 58e5c91d6701 x86/alternatives: Disable interrupts and sync when optimizing NOPs in place c878fd2d4c79 x86/alternatives: Sync core before enabling interrupts c2d64b9f52b6 qemux86: add configuration symbol to select values 630c33229e6d sched/isolation: really align nohz_full with rcu_nocbs 0e5e0f68e2e6 clear_warn_once: add a clear_warn_once= boot parameter 46934791b902 clear_warn_once: bind a timer to written reset value cdee9e38ff32 clear_warn_once: expand debugfs to include read support 82b562b81841 tools: Remove some options from CLANG_CROSS_FLAGS 36dc380b776b libbpf: Fix build warning on ref_ctr_off 9e3e1fe20982 perf: perf can not parser the backtrace of app in the 32bit system and 64bit kernel. e497a4a5da65 perf: x86-32: explicitly include 7b57ddd89565 perf: mips64: Convert __u64 to unsigned long long 1cfc19423dc7 perf: fix bench numa compilation 98bc2815fade perf: add SLANG_INC for slang.h 17209a70b9b3 perf: add sgidefs.h to for mips builds 9cd4258d910a perf: change --root to --prefix for python install 8110a4f26628 perf: add 'libperl not found' warning bc89d5e08f77 perf: force include of 4f6c760cc876 fat: Replace prandom_u32() with get_random_u32() bc53117b12b2 fat: don't use obsolete random32 call in namei_vfat 30b2236ab378 FAT: Added FAT_NO_83NAME cef98d22b4ed FAT: Add CONFIG_VFAT_NO_CREATE_WITH_LONGNAMES option 0bbd7daba9e1 FAT: Add CONFIG_VFAT_FS_NO_DUALNAMES option 5883fc340084 aufs6: adapt to v6.6 i_op->ctime changes c4342d979bf2 aufs6: fix magic.mk include path 35266bc2dc81 aufs6: adapt to v6.6 8edede4e98be aufs6: core 712248233ebe aufs6: standalone 3b71a8a848d8 aufs6: mmap 3e2924871f37 aufs6: base 7f4907a93101 aufs6: kbuild d2f7b03e4aa7 yaffs2: update VFS ctime operations to 6.6+ bcd6cfcd1aa0 yaffs2: v6.5 fixups cc615704b5f5 yaffs2: Fix miscalculation of devname buffer length 8ef2e22dcf91 yaffs2: convert user_namespace to mnt_idmap c9c749f9f7d3 yaffs2: replace bdevname call with sprintf 395b01cdc39d yaffs2: convert read_page -> readfolio d98b07e43ba6 yaffs: replace IS_ERR with IS_ERR_OR_NULL to check both ERR and NULL 613c6d50fdbe yaffs: fix -Wstringop-overread compile warning in yaffs_fix_null_name 622c4648936f yaffs2: v5.12+ build fixups (not runtime tested) 7562133d4090 yaffs: include blkdev.h dbd44252cd59 yaffs: fix misplaced variable declaration c223a10b1ac0 yaffs2: v5.6 build fixups 90f6007cfbf4 yaffs2: fix memory leak when /proc/yaffs is read 37ee169c5ea1 yaffs: add strict check when call yaffs_internal_read_super b6e007b8abb6 yaffs: repair yaffs_get_mtd_device fb98f65a466a yaffs: Fix build failure by handling inode i_version with proper atomic API 51e0aac75ea2 yaffs2: fix memory leak in mount/umount 2b74a0cae7b0 yaffs: Avoid setting any ACL releated xattr ff4130a9c376 Yaffs:check oob size before auto selecting Yaffs1 ba95b409c67c fs: yaffs2: replace CURRENT_TIME by other appropriate apis 8fa35eba9056 yaffs2: adjust to proper location of MS_RDONLY 1eb5deaad8c4 yaffs2: import git revision b4ce1bb (jan, 2020) 4dce67c1e8c8 initramfs: allow an optional wrapper script around initramfs generation 2f603d83fcc4 pnmtologo: use relocatable file name 664a6a0a484b tools: use basename to identify file in gen-mach-types 9de64bc0c185 lib/build_OID_registry: fix reproducibility issues ae9b80797295 vt/conmakehash: improve reproducibility a972323151bd iwlwifi: select MAC80211_LEDS conditionally 15d2adcc0198 net/dccp: make it depend on CONFIG_BROKEN (CVE-2020-16119) 5556a6c04b19 arm64/perf: Fix wrong cast that may cause wrong truncation 5552dc768ffc defconfigs: drop obselete options 00fe4152df31 arm64/perf: fix backtrace for AAPCS with FP enabled 3888d0652edf linux-yocto: Handle /bin/awk issues 3d55d299f23a uvesafb: provide option to specify timeout for task completion 23c068c080be uvesafb: print error message when task timeout occurs edbfc939266e compiler.h: Undef before redefining __attribute_const__ c99ae7e2a19a vmware: include jiffies.h 572d84d928c8 Resolve jiffies wrapping about arp fdcd47cac843 nfs: Allow default io size to be configured. 927d48801098 check console device file on fs when booting 57cc27f821dd mount_root: clarify error messages for when no rootfs found 1b53d82a8152 mconf: fix output of cflags and libraries 1811da09f42c menuconfig,mconf-cfg: Allow specification of ncurses location 83c2e0c6eb1f modpost: mask trivial warnings 6de673039484 kbuild: exclude meta directory from distclean processing 6decd32815f5 powerpc: serialize image targets f6b683b38318 arm: serialize build targets e798b09ebf57 mtd_blkdevs: add mtd_table_mutex lock back to blktrans_{open, release} to avoid race condition dc8a1e5a88f8 x86_64_defconfig: Fix warnings 68491e5f72b6 powerpc/ptrace: Disable array-bounds warning with gcc8 d71ebfce3004 powerpc: Disable attribute-alias warnings from gcc8 62f50884b8b1 powerpc: kexec fix for powerpc64 da6871c62c37 powerpc: Add unwind information for SPE registers of E500 core f161c880c11d mips: make current_cpu_data preempt safe 5e94a8247ce7 mips: vdso: fix 'jalr $t9' crash in vdso code 19e36714b1c7 mips: Kconfig: add QEMUMIPS64 option e2e537db3cbd 4kc cache tlb hazard: tlbp cache coherency aee9870611e5 malta uhci quirks: make allowance for slow 4k(e)c 881948cd1517 drm/fb-helper: move zeroing code to drm_fb_helper_fill_var 98ec1963fcb7 arm64: defconfig: cleanup config options f1727c537ba8 vexpress: Pass LOADADDR to Makefile 4474c32dc24a arm: ARM EABI socketcall 75e31a2b70fd ARM: LPAE: Invalidate the TLB for module addresses during translation fault Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.6.bb | 6 ++-- .../linux/linux-yocto-tiny_6.6.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index a44a08451a..2f788667f0 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "19813826de57a6425518c7b3daf8dd6a04d2321f" -SRCREV_meta ?= "f7f00b22efcfcae6489e9ec7db7002685fbc078b" +SRCREV_machine ?= "7290738691e931c361f5391a47189e40477cc2a2" +SRCREV_meta ?= "03ec143a0ca70ff92968bc4ea919e936ab9e8572" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.6.23" +LINUX_VERSION ?= "6.6.24" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index db9e252572..4f9474efae 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.6.inc -LINUX_VERSION ?= "6.6.23" +LINUX_VERSION ?= "6.6.24" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "2d01bc1d4eeade12518371139dd24a21438f523c" -SRCREV_meta ?= "f7f00b22efcfcae6489e9ec7db7002685fbc078b" +SRCREV_machine ?= "2f64879b557ec6baccf27afdd4d02a46051b65bc" +SRCREV_meta ?= "03ec143a0ca70ff92968bc4ea919e936ab9e8572" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index 43696db59b..65a3e9a97d 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.6/standard/base" KBRANCH:qemuloongarch64 ?= "v6.6/standard/base" KBRANCH:qemumips64 ?= "v6.6/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "ceb94a85299b59d8840ed7ed392b1d3e4c727678" -SRCREV_machine:qemuarm64 ?= "2d01bc1d4eeade12518371139dd24a21438f523c" -SRCREV_machine:qemuloongarch64 ?= "2d01bc1d4eeade12518371139dd24a21438f523c" -SRCREV_machine:qemumips ?= "c79ffc89f8909f60de52005ef258db9752634eda" -SRCREV_machine:qemuppc ?= "2d01bc1d4eeade12518371139dd24a21438f523c" -SRCREV_machine:qemuriscv64 ?= "2d01bc1d4eeade12518371139dd24a21438f523c" -SRCREV_machine:qemuriscv32 ?= "2d01bc1d4eeade12518371139dd24a21438f523c" -SRCREV_machine:qemux86 ?= "2d01bc1d4eeade12518371139dd24a21438f523c" -SRCREV_machine:qemux86-64 ?= "2d01bc1d4eeade12518371139dd24a21438f523c" -SRCREV_machine:qemumips64 ?= "b0a73fa83073c8d7d7bc917bcbeac88d296ebe38" -SRCREV_machine ?= "2d01bc1d4eeade12518371139dd24a21438f523c" -SRCREV_meta ?= "f7f00b22efcfcae6489e9ec7db7002685fbc078b" +SRCREV_machine:qemuarm ?= "47c23d5ba2db28b76e62e152bf4601f30ffbb1a6" +SRCREV_machine:qemuarm64 ?= "2f64879b557ec6baccf27afdd4d02a46051b65bc" +SRCREV_machine:qemuloongarch64 ?= "2f64879b557ec6baccf27afdd4d02a46051b65bc" +SRCREV_machine:qemumips ?= "d433ef0d8830772213f0d667478d675e778cfbc1" +SRCREV_machine:qemuppc ?= "2f64879b557ec6baccf27afdd4d02a46051b65bc" +SRCREV_machine:qemuriscv64 ?= "2f64879b557ec6baccf27afdd4d02a46051b65bc" +SRCREV_machine:qemuriscv32 ?= "2f64879b557ec6baccf27afdd4d02a46051b65bc" +SRCREV_machine:qemux86 ?= "2f64879b557ec6baccf27afdd4d02a46051b65bc" +SRCREV_machine:qemux86-64 ?= "2f64879b557ec6baccf27afdd4d02a46051b65bc" +SRCREV_machine:qemumips64 ?= "480ddad109153a5cadd6c625d93044d7d93ce8bd" +SRCREV_machine ?= "2f64879b557ec6baccf27afdd4d02a46051b65bc" +SRCREV_meta ?= "03ec143a0ca70ff92968bc4ea919e936ab9e8572" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "5c7587f69194bc9fc714953ab4c7203e6e68885b" +SRCREV_machine:class-devupstream ?= "9467d7a12f970e7f12adcba143b0c9b9d1a9e72d" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.6/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.6.23" +LINUX_VERSION ?= "6.6.24" PV = "${LINUX_VERSION}+git" From patchwork Fri May 3 02:40:30 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43189 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 923CEC25B5C for ; Fri, 3 May 2024 02:40:54 +0000 (UTC) Received: from mail-qk1-f170.google.com (mail-qk1-f170.google.com [209.85.222.170]) by mx.groups.io with SMTP id smtpd.web10.3820.1714704046227221796 for ; Thu, 02 May 2024 19:40:46 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=ZaI9lmks; spf=pass (domain: gmail.com, ip: 209.85.222.170, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f170.google.com with SMTP id af79cd13be357-790605809cbso740849585a.3 for ; Thu, 02 May 2024 19:40:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714704045; x=1715308845; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=saUGhuJMwASM9zdUn7b4AcN1Ku1AhDsHplTyAwjqzY0=; b=ZaI9lmksf/4SlWTGeOICHvm4BJQNiMi9bY+y6x53ugCO9GxPCPnG/ncDU/lb6LDXFK yDe0K2ojCnWq7WH7mVvy9OMC6lMNh89MgQejsQJ0g9cKjMrV6bgkLh56WOo+l+jvIFKz ydYI9bA+ZGdjRP9zN8PmEK0St5ZdT1wEW5K271dNn9ErJkDwI8ChQfUVLdfaRsMTtpjG XEYtKhjVgDZ14C4iWdO3xy2h6Dl8qMY3r7MRXlFD99sxfZOS/PD3tnxJMdaPJrH4HX5z Nm2zN5irfNfIJDNWviJN+6QDjI/bRczWhJKDmWwbqbXDBrvxcqPP9Zsr1OTN5Gk0Fm2X rQTw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714704045; x=1715308845; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=saUGhuJMwASM9zdUn7b4AcN1Ku1AhDsHplTyAwjqzY0=; b=H4lzcDNNus5wTtN8g5zhw1ReFXpjQR2JvHNm9CDrM7XgMsLohO6KgkMd16upJaw/Dy gUaKJu/p36bFW8KisxhqmIpN/4Cxz4SBhiSsTlnMZlKu1yEqqliRBNMy04HIs2VFDev9 cb1rlop6RG0F/+Hv1mYzt7Ani51TSDCChvH1DQ/iqylS4v02KHRzJcGfUrrCOW9NJ4qH 2N+nqPJmsDwW+fjVP2bN7Cz4YgNJD+qFN6ntLB87seX1mllghcx85Py3rke3Hb27cXsm NuEC7mfqIPmsxRdbPwwl7QeAehaIVWrvlzzgBCxVDkCgaLoeYMJ2CqGkuccnK9m/BNIE 8YXA== X-Gm-Message-State: AOJu0YyMnyqpcm7fNlDnYG4UqXNFWwltZcY9r4LlMj8vLFGc0IFv9vuT ZqFdD38ioKtuqgF9KmCrSCe9BSCcf/EkQcI0nHGNvDmzzgVUEBPKYOYjOA== X-Google-Smtp-Source: AGHT+IFWuglI0HoisEkTHD5wY0I54KQ68fzhhXsQgEBpTq4LZN5FH2ZhS8gPRz+gZgQgM3nDjAF0hQ== X-Received: by 2002:a05:620a:6228:b0:790:b426:7812 with SMTP id ou40-20020a05620a622800b00790b4267812mr1497363qkn.11.1714704045068; Thu, 02 May 2024 19:40:45 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id bm34-20020a05620a19a200b0078ec3aa9cc7sm856163qkb.25.2024.05.02.19.40.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 19:40:44 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 02/12] linux-yocto/6.6: update CVE exclusions (6.6.24) Date: Thu, 2 May 2024 22:40:30 -0400 Message-Id: X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 02:40:54 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198933 From: Bruce Ashfield Data pulled from: https://github.com/nluedtke/linux_kernel_cves 1/1 [ Author: Nicholas Luedtke Email: nicholas.luedtke@uwalumni.com Subject: Update 25Feb24 Date: Sun, 25 Feb 2024 07:03:08 -0500 ] Signed-off-by: Bruce Ashfield --- meta/recipes-kernel/linux/cve-exclusion_6.6.inc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc index bb9ba49c48..133cab88a3 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2024-03-28 16:40:04.102652+00:00 for version 6.6.23 +# Generated at 2024-04-04 03:23:25.421265+00:00 for version 6.6.24 python check_kernel_cve_status_version() { - this_version = "6.6.23" + this_version = "6.6.24" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) From patchwork Fri May 3 02:40:31 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43193 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A819FC25B76 for ; Fri, 3 May 2024 02:40:54 +0000 (UTC) Received: from mail-qk1-f177.google.com (mail-qk1-f177.google.com [209.85.222.177]) by mx.groups.io with SMTP id smtpd.web10.3821.1714704048122694732 for ; Thu, 02 May 2024 19:40:48 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=TjXw+Pyf; spf=pass (domain: gmail.com, ip: 209.85.222.177, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f177.google.com with SMTP id af79cd13be357-78efd533a00so609173985a.0 for ; Thu, 02 May 2024 19:40:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714704047; x=1715308847; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=a1j5P4YMhqFxKKwEg5IxPgmCjKoBNDsuaroyWOaoaLk=; b=TjXw+Pyfr6RtTt7Geyvf639zAIPuxgEsnoZ1V9ghmZS6rVFtBOvmTtYNeFMICmBBcQ RT9wEo1B1yTcna6Q1D2bjBwt0GRTzaJGCkfmaLlcrNthxuzSv4LRDrj2vsfZxsvKTIQc 7FWy91guFQ7uioDI5eWojecpzMwhEGDKN/sipkBAJlDZZIi0rDEqPqVWGZhA9hoCEHcc QPu98WAaLsbbp+0lltBWMbbSAkzsMse4rDx/5ry8JuTymJ9iU89LTHWtD76lZTYwsDHT n6ZaWpIn31gwoT/aUnZ6o8FQRg0BNGbWhILJy2q4OfaZU7k28IzzWlhKfgAW/zTNzB/J MO1g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714704047; x=1715308847; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=a1j5P4YMhqFxKKwEg5IxPgmCjKoBNDsuaroyWOaoaLk=; b=AVz+k8eIRm996RFapdLceSJxarhWjUDcM+SE5DHHXNS+Uszk+GOPFgQWB79OteLu6r nKGFpWSb9gXPXvj/QJQCA+Yn6sG1tKB37Lay/aEs/fmUArPd6/oRi/ztdbx6yIO9NznR uMhYqKUj7r/ms7PORpHaWUEpzFci14ltn7l2KA9KBiD/acowbfiVtYvD9Lp7VA1Trz1F CCbu5x6LZ35i+UUGPjLrNa4TQqxcFsVfD+ypso/zz9MJzPBSvsB2PZnh5jV238hgmQE0 uPfatJcnGbhOKLe5iShhSAgO6Hxin5jlZZEyID3E4hY5UkoYEvpUz8T8QRHgSHbbYd2w RVnw== X-Gm-Message-State: AOJu0YyOn4VQRZCYuQjJncb194fGUohsfzd0VmDylchof/OXy/HzqVfe 4PCOIKWRRwY0PDVKjczmgfKWJuNOl+G9UEOrNyLa28h0upwrmUZt X-Google-Smtp-Source: AGHT+IE3sQCRDG/DOgfuxo1J+jwWdc8+l9fUZlRgydS8Mx8dWs1FwHUQ0L1PLoUID003yOP1T/z6yA== X-Received: by 2002:a05:620a:36e3:b0:792:7f71:ec27 with SMTP id cz35-20020a05620a36e300b007927f71ec27mr334144qkb.75.1714704046747; Thu, 02 May 2024 19:40:46 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id bm34-20020a05620a19a200b0078ec3aa9cc7sm856163qkb.25.2024.05.02.19.40.45 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 19:40:45 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 03/12] linux-yocto/6.6: update to v6.6.25 Date: Thu, 2 May 2024 22:40:31 -0400 Message-Id: X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 02:40:54 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198934 From: Bruce Ashfield Updating linux-yocto/6.6 to the latest korg -stable release that comprises the following commits: e475741af1eb Linux 6.6.25 a99d7274a2b1 Revert "workqueue.c: Increase workqueue name length" d8354f268d92 Revert "workqueue: Move pwq->max_active to wq->max_active" 35bf38dd162b Revert "workqueue: Factor out pwq_is_empty()" 957578ec33d4 Revert "workqueue: Replace pwq_activate_inactive_work() with [__]pwq_activate_work()" 5debbff9539c Revert "workqueue: Move nr_active handling into helpers" e3ee73b57a2e Revert "workqueue: Make wq_adjust_max_active() round-robin pwqs while activating" f3c11cb27a8b Revert "workqueue: RCU protect wq->dfl_pwq and implement accessors for it" bfb429f37052 Revert "workqueue: Introduce struct wq_node_nr_active" 6741dd3fd38e Revert "workqueue: Implement system-wide nr_active enforcement for unbound workqueues" a75ac2693d73 Revert "workqueue: Don't call cpumask_test_cpu() with -1 CPU in wq_update_node_max_active()" 7bff1820bcfa Revert "workqueue: Shorten events_freezable_power_efficient name" 06644f0d7193 drm/tilcdc: Set preferred depth ff7ae7b32324 crypto: jitter - add RCT/APT support for different OSRs 50cd24ddb6f0 arm64: defconfig: remove CONFIG_IPQ_APSS_5018 58e5c91d6701 x86/alternatives: Disable interrupts and sync when optimizing NOPs in place c878fd2d4c79 x86/alternatives: Sync core before enabling interrupts c2d64b9f52b6 qemux86: add configuration symbol to select values 630c33229e6d sched/isolation: really align nohz_full with rcu_nocbs 0e5e0f68e2e6 clear_warn_once: add a clear_warn_once= boot parameter 46934791b902 clear_warn_once: bind a timer to written reset value cdee9e38ff32 clear_warn_once: expand debugfs to include read support 82b562b81841 tools: Remove some options from CLANG_CROSS_FLAGS 36dc380b776b libbpf: Fix build warning on ref_ctr_off 9e3e1fe20982 perf: perf can not parser the backtrace of app in the 32bit system and 64bit kernel. e497a4a5da65 perf: x86-32: explicitly include 7b57ddd89565 perf: mips64: Convert __u64 to unsigned long long 1cfc19423dc7 perf: fix bench numa compilation 98bc2815fade perf: add SLANG_INC for slang.h 17209a70b9b3 perf: add sgidefs.h to for mips builds 9cd4258d910a perf: change --root to --prefix for python install 8110a4f26628 perf: add 'libperl not found' warning bc89d5e08f77 perf: force include of 4f6c760cc876 fat: Replace prandom_u32() with get_random_u32() bc53117b12b2 fat: don't use obsolete random32 call in namei_vfat 30b2236ab378 FAT: Added FAT_NO_83NAME cef98d22b4ed FAT: Add CONFIG_VFAT_NO_CREATE_WITH_LONGNAMES option 0bbd7daba9e1 FAT: Add CONFIG_VFAT_FS_NO_DUALNAMES option 5883fc340084 aufs6: adapt to v6.6 i_op->ctime changes c4342d979bf2 aufs6: fix magic.mk include path 35266bc2dc81 aufs6: adapt to v6.6 8edede4e98be aufs6: core 712248233ebe aufs6: standalone 3b71a8a848d8 aufs6: mmap 3e2924871f37 aufs6: base 7f4907a93101 aufs6: kbuild d2f7b03e4aa7 yaffs2: update VFS ctime operations to 6.6+ bcd6cfcd1aa0 yaffs2: v6.5 fixups cc615704b5f5 yaffs2: Fix miscalculation of devname buffer length 8ef2e22dcf91 yaffs2: convert user_namespace to mnt_idmap c9c749f9f7d3 yaffs2: replace bdevname call with sprintf 395b01cdc39d yaffs2: convert read_page -> readfolio d98b07e43ba6 yaffs: replace IS_ERR with IS_ERR_OR_NULL to check both ERR and NULL 613c6d50fdbe yaffs: fix -Wstringop-overread compile warning in yaffs_fix_null_name 622c4648936f yaffs2: v5.12+ build fixups (not runtime tested) 7562133d4090 yaffs: include blkdev.h dbd44252cd59 yaffs: fix misplaced variable declaration c223a10b1ac0 yaffs2: v5.6 build fixups 90f6007cfbf4 yaffs2: fix memory leak when /proc/yaffs is read 37ee169c5ea1 yaffs: add strict check when call yaffs_internal_read_super b6e007b8abb6 yaffs: repair yaffs_get_mtd_device fb98f65a466a yaffs: Fix build failure by handling inode i_version with proper atomic API 51e0aac75ea2 yaffs2: fix memory leak in mount/umount 2b74a0cae7b0 yaffs: Avoid setting any ACL releated xattr ff4130a9c376 Yaffs:check oob size before auto selecting Yaffs1 ba95b409c67c fs: yaffs2: replace CURRENT_TIME by other appropriate apis 8fa35eba9056 yaffs2: adjust to proper location of MS_RDONLY 1eb5deaad8c4 yaffs2: import git revision b4ce1bb (jan, 2020) 4dce67c1e8c8 initramfs: allow an optional wrapper script around initramfs generation 2f603d83fcc4 pnmtologo: use relocatable file name 664a6a0a484b tools: use basename to identify file in gen-mach-types 9de64bc0c185 lib/build_OID_registry: fix reproducibility issues ae9b80797295 vt/conmakehash: improve reproducibility a972323151bd iwlwifi: select MAC80211_LEDS conditionally 15d2adcc0198 net/dccp: make it depend on CONFIG_BROKEN (CVE-2020-16119) 5556a6c04b19 arm64/perf: Fix wrong cast that may cause wrong truncation 5552dc768ffc defconfigs: drop obselete options 00fe4152df31 arm64/perf: fix backtrace for AAPCS with FP enabled 3888d0652edf linux-yocto: Handle /bin/awk issues 3d55d299f23a uvesafb: provide option to specify timeout for task completion 23c068c080be uvesafb: print error message when task timeout occurs edbfc939266e compiler.h: Undef before redefining __attribute_const__ c99ae7e2a19a vmware: include jiffies.h 572d84d928c8 Resolve jiffies wrapping about arp fdcd47cac843 nfs: Allow default io size to be configured. 927d48801098 check console device file on fs when booting 57cc27f821dd mount_root: clarify error messages for when no rootfs found 1b53d82a8152 mconf: fix output of cflags and libraries 1811da09f42c menuconfig,mconf-cfg: Allow specification of ncurses location 83c2e0c6eb1f modpost: mask trivial warnings 6de673039484 kbuild: exclude meta directory from distclean processing 6decd32815f5 powerpc: serialize image targets f6b683b38318 arm: serialize build targets e798b09ebf57 mtd_blkdevs: add mtd_table_mutex lock back to blktrans_{open, release} to avoid race condition dc8a1e5a88f8 x86_64_defconfig: Fix warnings 68491e5f72b6 powerpc/ptrace: Disable array-bounds warning with gcc8 d71ebfce3004 powerpc: Disable attribute-alias warnings from gcc8 62f50884b8b1 powerpc: kexec fix for powerpc64 da6871c62c37 powerpc: Add unwind information for SPE registers of E500 core f161c880c11d mips: make current_cpu_data preempt safe 5e94a8247ce7 mips: vdso: fix 'jalr $t9' crash in vdso code 19e36714b1c7 mips: Kconfig: add QEMUMIPS64 option e2e537db3cbd 4kc cache tlb hazard: tlbp cache coherency aee9870611e5 malta uhci quirks: make allowance for slow 4k(e)c 881948cd1517 drm/fb-helper: move zeroing code to drm_fb_helper_fill_var 98ec1963fcb7 arm64: defconfig: cleanup config options f1727c537ba8 vexpress: Pass LOADADDR to Makefile 4474c32dc24a arm: ARM EABI socketcall 75e31a2b70fd ARM: LPAE: Invalidate the TLB for module addresses during translation fault Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.6.bb | 6 ++-- .../linux/linux-yocto-tiny_6.6.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index 2f788667f0..5071550640 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "7290738691e931c361f5391a47189e40477cc2a2" -SRCREV_meta ?= "03ec143a0ca70ff92968bc4ea919e936ab9e8572" +SRCREV_machine ?= "9f39c8adfc6025293e5ff131f7bb4f728edd0c99" +SRCREV_meta ?= "f057956f86fc59540ed6cf4cb1599050fd3121a8" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.6.24" +LINUX_VERSION ?= "6.6.25" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index 4f9474efae..a4af8c8a16 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.6.inc -LINUX_VERSION ?= "6.6.24" +LINUX_VERSION ?= "6.6.25" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "2f64879b557ec6baccf27afdd4d02a46051b65bc" -SRCREV_meta ?= "03ec143a0ca70ff92968bc4ea919e936ab9e8572" +SRCREV_machine ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" +SRCREV_meta ?= "f057956f86fc59540ed6cf4cb1599050fd3121a8" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index 65a3e9a97d..583dade097 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.6/standard/base" KBRANCH:qemuloongarch64 ?= "v6.6/standard/base" KBRANCH:qemumips64 ?= "v6.6/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "47c23d5ba2db28b76e62e152bf4601f30ffbb1a6" -SRCREV_machine:qemuarm64 ?= "2f64879b557ec6baccf27afdd4d02a46051b65bc" -SRCREV_machine:qemuloongarch64 ?= "2f64879b557ec6baccf27afdd4d02a46051b65bc" -SRCREV_machine:qemumips ?= "d433ef0d8830772213f0d667478d675e778cfbc1" -SRCREV_machine:qemuppc ?= "2f64879b557ec6baccf27afdd4d02a46051b65bc" -SRCREV_machine:qemuriscv64 ?= "2f64879b557ec6baccf27afdd4d02a46051b65bc" -SRCREV_machine:qemuriscv32 ?= "2f64879b557ec6baccf27afdd4d02a46051b65bc" -SRCREV_machine:qemux86 ?= "2f64879b557ec6baccf27afdd4d02a46051b65bc" -SRCREV_machine:qemux86-64 ?= "2f64879b557ec6baccf27afdd4d02a46051b65bc" -SRCREV_machine:qemumips64 ?= "480ddad109153a5cadd6c625d93044d7d93ce8bd" -SRCREV_machine ?= "2f64879b557ec6baccf27afdd4d02a46051b65bc" -SRCREV_meta ?= "03ec143a0ca70ff92968bc4ea919e936ab9e8572" +SRCREV_machine:qemuarm ?= "e76632ff3899f47234405672a658156bb0079d52" +SRCREV_machine:qemuarm64 ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" +SRCREV_machine:qemuloongarch64 ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" +SRCREV_machine:qemumips ?= "744b6e2f70062732f48de0918ca8c56f5de408dd" +SRCREV_machine:qemuppc ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" +SRCREV_machine:qemuriscv64 ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" +SRCREV_machine:qemuriscv32 ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" +SRCREV_machine:qemux86 ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" +SRCREV_machine:qemux86-64 ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" +SRCREV_machine:qemumips64 ?= "936a9ceb126dfb2cc4b38229cab68636263ecfab" +SRCREV_machine ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" +SRCREV_meta ?= "f057956f86fc59540ed6cf4cb1599050fd3121a8" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "9467d7a12f970e7f12adcba143b0c9b9d1a9e72d" +SRCREV_machine:class-devupstream ?= "e475741af1ebe2c92ee4a3f49e55749a84770a12" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.6/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.6.24" +LINUX_VERSION ?= "6.6.25" PV = "${LINUX_VERSION}+git" From patchwork Fri May 3 02:40:32 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43194 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id AFE45C25B75 for ; Fri, 3 May 2024 02:40:54 +0000 (UTC) Received: from mail-vk1-f179.google.com (mail-vk1-f179.google.com [209.85.221.179]) by mx.groups.io with SMTP id smtpd.web10.3822.1714704048896559541 for ; Thu, 02 May 2024 19:40:49 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=QWfe8XbP; spf=pass (domain: gmail.com, ip: 209.85.221.179, mailfrom: bruce.ashfield@gmail.com) Received: by mail-vk1-f179.google.com with SMTP id 71dfb90a1353d-4dabbf19e1eso2886171e0c.0 for ; Thu, 02 May 2024 19:40:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714704048; x=1715308848; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=Bd1tyxpYsZOGhh+yLZt5bnlydEejUZe4wVX8AxzBwuQ=; b=QWfe8XbPa/GVfogZQR14HrqtOoWxCb34rq+slsMQrQSzLee5+VRBOW/+8rjskIHkFX 783dm3xag8F4gAkLAHBSIx8PXmOdI1oLmN3mkxplZTq3F6WAHycpoMgQD5tXahAXcriu VGoFvilcp5A0FX/K7G97ecygkBth+tVI8E0KsOquzUd6GlR5CjsKH0XZTY6Mh8dHA6jr ZDX7R5i9WR15CcxeZr/U9jrQsrLXcXuFpXS75dVNq1B61C1Z6Dc8KlzAWF12O2vXMc4t piwe2ZLQmpf09fujeaYgV1THMb0WpRaa1Bc8yYLlPxOZApnXaKVncEfl43vwypAoAroQ Rpew== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714704048; x=1715308848; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Bd1tyxpYsZOGhh+yLZt5bnlydEejUZe4wVX8AxzBwuQ=; b=CcqbmFRkWvEp0jMClUVocna1/EIAh8+iO6P/1DaHfoeYaW9gnl/r20zXlEH3ZslJgx 8qsL5X6ii9/pZt3QVeNtDkjkO/NYzrZs74L9YnCQqxLDaVZtME/D4yJtwKrW0xLPeOIF JJPP9U+9zzBvGrwlRkNu5TlGHlA4FAT0Kwx1uI0FGUkpS5op8maP1fnLKVAXk/Y9Bss3 vym/o9uNLtls4gIJK4JmClfC/8llwR7Tr/GulKquS5WT2/5EQXuvtxm+XT/nyfhQde/o qkkAtmTJsM97azqvJ+hVKJor4iiQOPMhmT0mQ3vNAMucJcEwEDGkylX3v5pC1W4WaICJ RumQ== X-Gm-Message-State: AOJu0YxVgcTyBLPtquCT1Wdfgyn1jZ2ZtN++DEkz2yBiZoed1i77Xs5d 0k6ebNUZrMyDMCf7Fe/fguaQUCuQY312wM4GpBE89DBg2mzLk8M0dIcKuw== X-Google-Smtp-Source: AGHT+IEzSDd3z7qJlBqh5LWktFpMwhwMExKm6zEFQxvkpjqKPy02zMcuqG6QxduxcJs6nWyN09wWsQ== X-Received: by 2002:a05:6122:3114:b0:4d4:1ec7:76e5 with SMTP id cg20-20020a056122311400b004d41ec776e5mr1478329vkb.16.1714704047741; Thu, 02 May 2024 19:40:47 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id bm34-20020a05620a19a200b0078ec3aa9cc7sm856163qkb.25.2024.05.02.19.40.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 19:40:47 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 04/12] linux-yocto/6.6: update CVE exclusions (6.6.25) Date: Thu, 2 May 2024 22:40:32 -0400 Message-Id: X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 02:40:54 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198935 From: Bruce Ashfield Data pulled from: https://github.com/nluedtke/linux_kernel_cves 1/1 [ Author: Nicholas Luedtke Email: nicholas.luedtke@uwalumni.com Subject: Update 25Feb24 Date: Sun, 25 Feb 2024 07:03:08 -0500 ] Signed-off-by: Bruce Ashfield --- meta/recipes-kernel/linux/cve-exclusion_6.6.inc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc index 133cab88a3..4a7086a84b 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2024-04-04 03:23:25.421265+00:00 for version 6.6.24 +# Generated at 2024-04-09 14:35:54.393486+00:00 for version 6.6.25 python check_kernel_cve_status_version() { - this_version = "6.6.24" + this_version = "6.6.25" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) From patchwork Fri May 3 02:40:33 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43191 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A09D3C25B74 for ; Fri, 3 May 2024 02:40:54 +0000 (UTC) Received: from mail-qk1-f169.google.com (mail-qk1-f169.google.com [209.85.222.169]) by mx.groups.io with SMTP id smtpd.web10.3823.1714704050039910826 for ; Thu, 02 May 2024 19:40:50 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=R+6zwbcc; spf=pass (domain: gmail.com, ip: 209.85.222.169, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f169.google.com with SMTP id af79cd13be357-78f05341128so582326985a.0 for ; Thu, 02 May 2024 19:40:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714704049; x=1715308849; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=v9cDz5ZM3e1ArFiT6fGLdyJGS/SRMIbhKJwwLycF6Ag=; b=R+6zwbccB6HwZt9fU28jdegmpN8aDUb8NYKebpfWYykofoxK73HE1gS/JMxqX3DAvP SwbIRM5CkTmS5w8AyI4moueqx0MrtXye4dE0U/hbP8AZwVAJfPOb2ZNWZFmDC4pzDFUh RBOy+5HtgtGAuyqxj29R510949hFobGDHY0dUc+UIV/BNom31wXvzeoTfc3nkKKud+hN IpQjs0OUHHrjasdEPlGY6omZe+uSHpbCIGigTNxb4NOCgyBsqUwfhID/usaraQDNnZKW g6H1oJu2UBFKLgs9dwtslbd4x4ZHMKKA5cxxqNL4RlpC/+/STI+WDVgfaNl8HMBQBXdZ OUNw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714704049; x=1715308849; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=v9cDz5ZM3e1ArFiT6fGLdyJGS/SRMIbhKJwwLycF6Ag=; b=bndDHqilWAeaLawhmAJ7K7uPznjXIsipguaD12ZIs/BEV9mnI7RcPzvKrhEPgheoJU jnBrEXJqDd2Wlkjh5MTxNBRLC3JxLyIlCXCjzc4Cb2gRpZckCCYeqoGwNpwlLxTtuROZ MTuZreIkpppYlMOxot5uYWzD6kA+yCA10XKfCkHA/JlJyEFpA7e2jNWvJvVEGba/kPVm om1AvzwHO0fhlQAN004cxn7nZspjNfUVXmeE6ai4+mA2FAgrAduwB3DCWA98iZ8i/eKZ +Kt/Dy2mIhAVZIrCbvDsoXyvD/67Q40+nW8z4EuDiWgKrgWFprVq5KTtEhO4dG6dSlEY rqUw== X-Gm-Message-State: AOJu0YwCIzrEE1vT6hlDx+eI/4WPqJsYCf2Vrz3SUg689+dKUQpyw9pX rGZxjQpgmSNfPkHsPR10X021PZezoPufBx5Ob1obwE2m+leqhN/NHHiQjA== X-Google-Smtp-Source: AGHT+IF/Usfe2dZwXBrHm+b/NAO+HJOTkTROCeT7fcmaP6aXDNYT5uBlG/kBzB7D3Wcn9YM2xOirjg== X-Received: by 2002:a05:620a:cc4:b0:790:f905:3c4b with SMTP id b4-20020a05620a0cc400b00790f9053c4bmr1232024qkj.57.1714704049024; Thu, 02 May 2024 19:40:49 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id bm34-20020a05620a19a200b0078ec3aa9cc7sm856163qkb.25.2024.05.02.19.40.47 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 19:40:48 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 05/12] linux-yocto/6.6: nft: enable veth Date: Thu, 2 May 2024 22:40:33 -0400 Message-Id: X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 02:40:54 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198936 From: Bruce Ashfield Integrating the following commit(s) to linux-yocto/.: 1/1 [ Author: Khem Raj Email: raj.khem@gmail.com Subject: nft_test.cfg: Enable CONFIG_VETH Date: Wed, 10 Apr 2024 16:11:47 -0700 nftable ptests do create interfaces of veth type and this feature would be needed to enable those tests e.g. from tests/shell/testcases/packetpath/vlan_8021ad_tag ip link add veth0 netns $ns1 type veth peer name veth0 netns $ns2 Signed-off-by: Khem Raj Signed-off-by: Bruce Ashfield ] Signed-off-by: Bruce Ashfield --- meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb | 2 +- meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb | 2 +- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index 5071550640..be60bbee78 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -15,7 +15,7 @@ python () { } SRCREV_machine ?= "9f39c8adfc6025293e5ff131f7bb4f728edd0c99" -SRCREV_meta ?= "f057956f86fc59540ed6cf4cb1599050fd3121a8" +SRCREV_meta ?= "00aab388b73211bf49b352e7475595aa2e5fbc44" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index a4af8c8a16..559ca3563a 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -18,7 +18,7 @@ KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" SRCREV_machine ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" -SRCREV_meta ?= "f057956f86fc59540ed6cf4cb1599050fd3121a8" +SRCREV_meta ?= "00aab388b73211bf49b352e7475595aa2e5fbc44" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index 583dade097..b0674348e8 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -29,7 +29,7 @@ SRCREV_machine:qemux86 ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" SRCREV_machine:qemux86-64 ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" SRCREV_machine:qemumips64 ?= "936a9ceb126dfb2cc4b38229cab68636263ecfab" SRCREV_machine ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" -SRCREV_meta ?= "f057956f86fc59540ed6cf4cb1599050fd3121a8" +SRCREV_meta ?= "00aab388b73211bf49b352e7475595aa2e5fbc44" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same From patchwork Fri May 3 02:40:34 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43195 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C3F04C25B77 for ; Fri, 3 May 2024 02:40:54 +0000 (UTC) Received: from mail-qk1-f176.google.com (mail-qk1-f176.google.com [209.85.222.176]) by mx.groups.io with SMTP id smtpd.web11.4000.1714704052024359895 for ; Thu, 02 May 2024 19:40:52 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=mLT0hEBy; spf=pass (domain: gmail.com, ip: 209.85.222.176, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f176.google.com with SMTP id af79cd13be357-78edc3ad5fdso204546485a.0 for ; Thu, 02 May 2024 19:40:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714704051; x=1715308851; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=DwpVvTjDuSKGZfaSXWUlqlJ/ImK0pdV04iXw/Rm0mOw=; b=mLT0hEByE7gJ+QMTLkx4aabf28X4k54bpRW6Zf73zsszgmq42KucHfRb5q3VgPYdx1 Z4gxCG8oensDix3/0j/TXJ/TH9JZK6toT3evZkwwjrO3toFk8KFwNQPjcP9C9pfRZ5F2 1FHzxQVyulEe69rkcO333K8Y7D+o3WsafKHFBLNvGicR2smytOvAJCO1ocCZm55iqwy4 HPLjfFkkkoc7J2HfRj0sj5lNCCaB4gUPAnKy1fSOwF1L350ZaH57Gt0ENdRoAQd0Fx9Y +RaIvSY+ako1mybwLkDi3gQbsLMmvvBE/o80mPxQqAPo4JKZb/G5cBGo9T2dqL5fAjRR M1uQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714704051; x=1715308851; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=DwpVvTjDuSKGZfaSXWUlqlJ/ImK0pdV04iXw/Rm0mOw=; b=PU7T8NARP8s+/p7y6alAOW8nON4By4ue1dQKny9kEzhuXB9zyVG5JM8GVxzot4pNjW tD4ZxLtsGP6qVGokXmxDTabxxKearXH73T+H/t1v5u9pb0LvfpdKlbD/n3Umw+Iv0fzK CzaiZbZUYQVG+qku+4ni/lmcOEsaRiGtTG4HPARxUf8H6tX9CqbWDVpw9qax95Il0c1+ wIFqn+HUjByTgy+2ZRr3x3Fw69leQNZHDYH3bfnxmOY4+SzJO3+i6C6E+QcncoDjKsrA O7Di3IYB1/R6ozq9jhdUbbN5TboBMT7baGDsWixn5mcR4eWh8NY1j7ZwiWZD6P4ITW+r YfNQ== X-Gm-Message-State: AOJu0YyQ5I52j3jpY2+svRSixBUAa0qLa776TPQT9/cpRj9+pAqOQ9Ib cgFor+XDiXSZ18TOH3g9X8QRE8v3dpxr10FzHlod0sabMgNPXhLR X-Google-Smtp-Source: AGHT+IEFPHrKWLllfcIqJQsZt7TDa2zKH9oIRI0pFOf/BRPtBLbLDQ1aFBwisTuREYUpOu3E64v9wQ== X-Received: by 2002:a05:620a:24c8:b0:790:a960:28f4 with SMTP id m8-20020a05620a24c800b00790a96028f4mr8189679qkn.25.1714704050637; Thu, 02 May 2024 19:40:50 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id bm34-20020a05620a19a200b0078ec3aa9cc7sm856163qkb.25.2024.05.02.19.40.49 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 19:40:49 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 06/12] linux-yocto/6.6: update to v6.6.27 Date: Thu, 2 May 2024 22:40:34 -0400 Message-Id: <10b6e46281bacfb106a1a387b2815db74548bdca.1714703667.git.bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 02:40:54 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198937 From: Bruce Ashfield Updating linux-yocto/6.6 to the latest korg -stable release that comprises the following commits: 5e828009c8b3 Linux 6.6.27 5c1dc516f52a drm: Check polling initialized before enabling in drm_helper_probe_single_connector_modes 14ac934db851 Revert "drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init()" 91fb03cea0d5 VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() b456cb98cbad net: mpls: error out if inner headers are not set 83890a450378 Bluetooth: btintel: Fixe build regression ce64c26ba842 platform/x86: intel-vbtn: Update tablet mode switch at end of probe 300a2b9c2b28 randomize_kstack: Improve entropy diffusion 41671f0c0182 media: mediatek: vcodec: adding lock to protect encoder context list 0a2dc707aa42 media: mediatek: vcodec: adding lock to protect decoder context list ec25fc3c2c1e media: mediatek: vcodec: Fix oops when HEVC init fails a445eb1f630f selftests: mptcp: display simult in extra_msg 9dff96b8b3a4 gcc-plugins/stackleak: Avoid .head.text section 7365444cbd8f ALSA: hda/realtek: Add quirks for some Clevo laptops 3d4b909704bf fbmon: prevent division by zero in fb_videomode_from_videomode() 5e11bacff08b drivers/nvme: Add quirks for device 126f:2262 19e525ebbb88 modpost: fix null pointer dereference 21162ad2de74 io_uring: clear opcode specific data for an early failure 89f0cf6ac620 fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 4cd44fd34545 x86/xen: attempt to inflate the memory balloon on PVH 9afc9fde538b ASoC: soc-core.c: Skip dummy codec when adding platforms d009236a37ae thermal/of: Assume polling-delay(-passive) 0 when absent 6712b758698b ASoC: amd: yc: Fix non-functional mic on ASUS M7600RE fa5c8f2c88a9 usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined 55b724b8f7ee usb: typec: tcpci: add generic tcpci fallback compatible d8518f05ee82 thunderbolt: Keep the domain powered when USB4 port is in redrive mode 266f403ec475 usb: typec: ucsi: Limit read size on v1.2 0d52e1853bc1 usb: gadget: uvc: mark incomplete frames with UVC_STREAM_ERR 4b1f991bad56 kernfs: RCU protect kernfs_nodes and avoid kernfs_idr_lock in kernfs_find_and_get_node_by_id() ac191bcb0fe0 bus: mhi: host: Add MHI_PM_SYS_ERR_FAIL state bb72eb818d07 tools: iio: replace seekdir() in iio_generic_buffer fb8579acacd0 ring-buffer: use READ_ONCE() to read cpu_buffer->commit_page in concurrent environment 80f175d0f352 Input: xpad - add support for Snakebyte GAMEPADs fd067c8b3f86 ktest: force $buildonly = 1 for 'make_warnings_file' test type 60668872cca8 ALSA: hda/realtek: Add quirk for Lenovo Yoga 9 14IMH9 08aba129f542 perf/x86/amd/lbr: Discard erroneous branch entries a9852cf5d7a1 platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet ed2f8b713a45 Input: allocate keycode for Display refresh rate toggle dddc9f40ac8e Input: imagis - use FIELD_GET where applicable 2e90774fbbe0 RDMA/cm: add timeout to cm_destroy_id wait 5f7fd6aa4c48 block: prevent division by zero in blk_rq_stat_sum() 0662deae8bb8 drivers/perf: hisi: Enable HiSilicon Erratum 162700402 quirk for HIP09 44723bd493cd input/touchscreen: imagis: Correct the maximum touch area value d0e2f7ae04bb libperf evlist: Avoid out-of-bounds access a822f30afada Revert "ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default" 846611299931 PCI: Disable D3cold on Asus B1400 PCI-NVMe bridge 73bdf8d41cb5 SUNRPC: increase size of rpc_wait_queue.qlen from unsigned short to unsigned int 3d1b47e3a935 drm: Check output polling initialized before disabling 09d4600b9e99 drm/amd/amdgpu: Fix potential ioremap() memory leaks in amdgpu_device_init() 0f09e89e667e HID: input: avoid polling stylus battery on Chromebook Pompom 30930f0f4674 i2c: designware: Fix RX FIFO depth define on Wangxun 10Gb NIC cd0a1835bf84 accel/habanalabs: increase HL_MAX_STR to 64 bytes to avoid warnings 953fee8160f1 drm/amd/display: Fix nanosec stat overflow a5e76867714b ext4: forbid commit inconsistent quota data when errors=remount-ro 58546b2aa263 ext4: add a hint for block bitmap corrupt state in mb_groups bd6b1c418bd6 ASoC: Intel: avs: Populate board selection with new I2S entries f4a345e0aaf4 ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter cb9420142e50 media: sta2x11: fix irq handler cast 214a6c4a28c1 Julia Lawall reported this null pointer dereference, this should fix it. 24e5e1eff8ba rcu-tasks: Repair RCU Tasks Trace quiescence check 4d58c9fb45c7 rcu/nocb: Fix WARN_ON_ONCE() in the rcu_nocb_bypass_lock() f4b6caeb3cfe ASoC: Intel: common: DMI remap for rebranded Intel NUC M15 (LAPRC710) laptops d43a90294afe isofs: handle CDs with bad root inode but good Joliet root directory 07a2aa674fca scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() 89e8524135a3 sysv: don't call sb_bread() with pointers_lock held 56f5e36dace6 pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs 852ad6a4f55c drm/ttm: return ENOSPC from ttm_bo_mem_space v3 02a3b0d58217 ASoC: SOF: amd: Optimize quirk for Valve Galileo f19ad40352a8 drm: panel-orientation-quirks: Add quirk for GPD Win Mini eafaec40d00f Input: synaptics-rmi4 - fail probing if memory allocation for "phys" fails d6b2fe2db1d0 drm/vc4: don't check if plane->state->fb == state->fb 8677a14a8821 Bluetooth: Add new quirk for broken read key length on ATS2851 6d0950cf4313 Bluetooth: btmtk: Add MODULE_FIRMWARE() for MT7922 ffdca0a62aba Bluetooth: btintel: Fix null ptr deref in btintel_read_version a2e6bffc0388 net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() c926393dc344 ice: use relative VSI index for VFs instead of PF VSI number c1363ed8867b btrfs: send: handle path ref underflow in header iterate_inode_ref() 30237d6764fe btrfs: export: handle invalid inode or root reference in btrfs_get_parent() 0d23b34c68c4 btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() 5d7a8585fbb3 wifi: cfg80211: check A-MSDU format more carefully 95eec168c288 wifi: iwlwifi: Add missing MODULE_FIRMWARE() for *.pnvm 2618ab102c80 overflow: Allow non-type arg to type_max() and type_min() 3ba4aceb68f0 cpufreq: Don't unregister cpufreq cooling on CPU hotplug 138fdeac75fb wifi: ath11k: decrease MHI channel buffer length to 8KB 4031b72ca747 dma-direct: Leak pages on dma_set_decrypted() failure 9470114dfaf4 net: pcs: xpcs: Return EINVAL in the internal methods cf21eb6a9fc2 tools/power x86_energy_perf_policy: Fix file leak in get_pkg_num() ec7256887d07 pstore/zone: Add a null pointer check to the psz_kmsg_read a217b6135dab ACPI: x86: Move acpi_quirk_skip_serdev_enumeration() out of CONFIG_X86_ANDROID_TABLETS 1feb6fcfbac3 wifi: mt76: mt7996: add locking for accessing mapped registers 1152c2cd38e4 wifi: mt76: mt7996: disable AMSDU for non-data frames 891fd07da87b wifi: mt76: mt7915: add locking for accessing mapped registers c39e75fae05c wifi: brcmfmac: Add DMI nvram filename quirk for ACEPC W5 Pro 5dc5f8c705c3 firmware: tegra: bpmp: Return directly after a failed kzalloc() in get_filename() 1b2b26595bb0 net: skbuff: add overflow debug check to pull/push helpers b8dccb25c5dc ionic: set adminq irq affinity 9d3f959b4266 pmdomain: imx8mp-blk-ctrl: imx8mp_blk: Add fdcc clock to hdmimix domain ce666cecc09c pmdomain: ti: Add a null pointer check to the omap_prm_domain_init a7b862abe484 net: add netdev_lockdep_set_classes() to virtual drivers fc1d1ca46d01 arm64: dts: rockchip: fix rk3399 hdmi ports node 5c014f039544 arm64: dts: rockchip: fix rk3328 hdmi ports node bb8ca341f889 ARM: dts: rockchip: fix rk322x hdmi ports node c795042eea78 ARM: dts: rockchip: fix rk3288 hdmi ports node 3f0a74728170 cpuidle: Avoid potential overflow in integer multiplication 750d44684a95 panic: Flush kernel log buffer at the end a2e14cc2da40 printk: For @suppress_panic_printk check for other CPU in panic dbd3c05d71e1 wifi: iwlwifi: pcie: Add the PCI device id for new hardware dae70a575656 VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host() 0a6def05767c wifi: rtw89: pci: enlarge RX DMA buffer to consider size of RX descriptor 7a71f61ebf95 net: phy: phy_device: Prevent nullptr exceptions on ISR 2485beea14b3 net: stmmac: dwmac-starfive: Add support for JH7100 SoC 3dac6ab4d977 bnx2x: Fix firmware version string character counts b34d64e9aa55 wifi: rtw89: fix null pointer access when abort scan 15df1981f0ed wifi: ath9k: fix LNA selection in ath_ant_try_scan() 315eb3c2df7e amdkfd: use calloc instead of kzalloc to avoid integer overflow 0ccfb8e07e79 Linux 6.6.26 6d9ef0c36980 x86: set SPECTRE_BHI_ON as default cb238e95ee72 KVM: x86: Add BHI_NO 1c42ff893a8f x86/bhi: Mitigate KVM by default d414b401f953 x86/bhi: Add BHI mitigation knob 118794d0a572 x86/bhi: Enumerate Branch History Injection (BHI) bug c6e3d590d051 x86/bhi: Define SPEC_CTRL_BHI_DIS_S eb36b0dce213 x86/bhi: Add support for clearing branch history at syscall entry eb0f175b3428 x86/syscall: Don't force use of indirect calls for system calls 108feca9e47d x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file 046545314c79 x86/boot: Move mem_encrypt= parsing to the decompressor ccde70aa54c4 x86/efistub: Remap kernel text read-only before dropping NX attribute 56408ed92903 x86/sev: Move early startup code into .head.text section af90ced75242 x86/sme: Move early SME kernel encryption handling into .head.text dc4cbf9e2df4 efi/libstub: Add generic support for parsing mem_encrypt= 5447cb97e9b2 x86/head/64: Move the __head definition to 876941f533e7 bpf: support deferring bpf_link dealloc to after RCU grace period 771690b7c31d bpf: put uprobe link's path and task in release callback 43eca11b7c73 mptcp: don't account accept() of non-MPC client as fallback to TCP 12f353fac65d mptcp: don't overwrite sock_ops in mptcp_is_tcpsk() 5b5ff82491a1 selftests: mptcp: connect: fix shellcheck warnings e4a449368a2c of: module: prevent NULL pointer dereference in vsnprintf() 37b81aed6468 Revert "x86/mpparse: Register APIC address only once" a7ff84a6fe5a drm/i915/gt: Enable only one CCS for compute workload 726ff623869d drm/i915/gt: Do not generate the command streamer for all the CCS c1f7ce2a11a9 drm/i915/gt: Disable HW load balancing for CCS 2cfff2173213 smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() aa582b33f944 smb: client: fix potential UAF in smb2_is_network_name_deleted() 0a15ba88a32f smb: client: fix potential UAF in is_valid_oplock_break() f92739fdd452 smb: client: fix potential UAF in smb2_is_valid_lease_break() 21fed37d2bdc smb: client: fix potential UAF in smb2_is_valid_oplock_break() 10e17ca4000e smb: client: fix potential UAF in cifs_dump_full_key() c3cf8b74c579 smb: client: fix potential UAF in cifs_stats_proc_show() cf03020c56d3 smb: client: fix potential UAF in cifs_stats_proc_write() a65f2b56334b smb: client: fix potential UAF in cifs_debug_files_proc_show() 6f17163b9339 smb3: retrying on failed server close ba55f8a995f6 smb: client: serialise cifs_construct_tcon() with cifs_mount_mutex 9b2ee27e8de5 smb: client: handle DFS tcons in cifs_construct_tcon() 00effef72c98 riscv: process: Fix kernel gp leakage 7a82963245eb riscv: Fix spurious errors from __get/put_kernel_nofault 3dcb2223b973 s390/entry: align system call table on 8 bytes 782baf52e7cb selftests/mm: include strings.h for ffsl 43fad1d0284d mm/secretmem: fix GUP-fast succeeding on secretmem folios 8a44119ca445 arm64/ptrace: Use saved floating point state type to determine SVE layout 92f32f108693 perf/x86/intel/ds: Don't clear ->pebs_data_cfg for the last PEBS event 453b5f2dec27 x86/coco: Require seeding RNG with RDRAND on CoCo systems 5a02df3e9247 x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() 51b7841f3fe8 x86/mm/pat: fix VM_PAT handling in COW mappings 801c8b8ec5bf of: dynamic: Synchronize of_changeset_destroy() with the devlink removals dfa655727688 driver core: Introduce device_link_wait_removal() 65938e81df21 io_uring/kbuf: hold io_buffer_list reference over mmap 6b9d49bcd97b io_uring: use private workqueue for exit work b392402d29ab io_uring/kbuf: protect io_buffer_list teardown with a reference 4c0a5da0e70e io_uring/kbuf: get rid of bl->is_ready d6e03f6d8bcc io_uring/kbuf: get rid of lower BGID lists 781477d729be ALSA: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with microphone 04d78aa05ae4 ALSA: hda/realtek - Fix inactive headset mic jack 67c477f3201c ksmbd: do not set SMB2_GLOBAL_CAP_ENCRYPTION for SMB 3.1.1 a637fabac554 ksmbd: validate payload size in ipc response a06562fd4ce2 ksmbd: don't send oplock break if rename fails 2f0262ac3a8c gpio: cdev: fix missed label sanitizing in debounce_setup() d9f0804ab0b8 gpio: cdev: check for NULL labels when sanitizing them for irqs 63bd08629aee x86/retpoline: Add NOENDBR annotation to the SRSO dummy return thunk ac522af8db5c ice: fix typo in assignment 9d60e8ec996f nfsd: hold a lighter-weight client reference over CB_RECALL_ANY 6e307a6d9eb4 riscv: Disable preemption when using patch_map() 1ba1291172f9 SUNRPC: Fix a slow server-side memory leak with RPC-over-TCP e12149dd9ba2 ASoC: SOF: amd: fix for false dsp interrupts cbd080c30834 ata: sata_mv: Fix PCI device ID table declaration compilation warning 4b31a226097c spi: mchp-pci1xxx: Fix a possible null pointer dereference in pci1xxx_spi_probe 0fdada1ef5b1 cifs: Fix caching to try to do open O_WRONLY as rdwr on server 0f28afed9f9d Revert "ALSA: emu10k1: fix synthesizer sample playback position and caching" f3e692c8c24a scsi: sd: Unregister device if device_add_disk() failed in sd_probe() 56de23eac65f scsi: mylex: Fix sysfs buffer lengths 4cad40d93665 ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit fce7a547b9c8 regmap: maple: Fix uninitialized symbol 'ret' warnings 04b52388c46d ASoC: amd: acp: fix for acp_init function error handling 3d3e148c7576 spi: s3c64xx: Use DMA mode from fifo size 5448a99c8096 spi: s3c64xx: determine the fifo depth only once f8a6edd44903 spi: s3c64xx: allow full FIFO masks 6f9d907bee2a spi: s3c64xx: define a magic value 3fa0085f1052 spi: s3c64xx: remove else after return 56aeaed8c822 spi: s3c64xx: explicitly include 0df4616ef533 spi: s3c64xx: sort headers alphabetically bb3ee5fddac1 spi: s3c64xx: Extract FIFO depth calculation to a dedicated macro 80ca762f1bdd ASoC: ops: Fix wraparound for mask in snd_soc_get_volsw 229c761b198e ASoC: rt722-sdca-sdw: fix locking sequence 1064108334bb ASoC: rt712-sdca-sdw: fix locking sequence 3bfbc530a658 ASoC: rt711-sdw: fix locking sequence 53c8045621c1 ASoC: rt711-sdca: fix locking sequence 8eea5ae23bab ASoC: rt5682-sdw: fix locking sequence cc4d9f0597ee drm/prime: Unbreak virtgpu dma-buf export 692a51bebf45 nouveau/uvmm: fix addr/range calcs for remap operations 9e3941c90e46 drm/panfrost: fix power transition timeout warnings 4930d7a414c1 ALSA: hda: cs35l56: Add ACPI device match tables 3af6c5ac72dc regmap: maple: Fix cache corruption in regcache_maple_drop() 4e73748d5954 RISC-V: Update AT_VECTOR_SIZE_ARCH for new AT_MINSIGSTKSZ b2ddeb7fb322 drivers/perf: riscv: Disable PERF_SAMPLE_BRANCH_* while not supported 3e1a29fb81c2 ASoC: wm_adsp: Fix missing mutex_lock in wm_adsp_write_ctl() 40613ea1d5ea 9p: Fix read/write debug statements to report server reply f4a192cd7b25 fs/pipe: Fix lockdep false-positive in watchqueue pipe_write() ab7a6fe9c1b5 KVM: SVM: Add support for allowing zero SEV ASIDs 79b79ea2b3bf KVM: SVM: Use unsigned integers when dealing with ASIDs 0a583b7ebb6f net: ravb: Always update error counters 1dd9204143d1 net: ravb: Always process TX descriptor ring a9fb2f7463cd net: ravb: Let IP-specific receive function to interrogate descriptors 199a1314ef78 e1000e: move force SMBUS from enable ulp function to avoid PHY loss issue eb96a5c02553 e1000e: Minor flow correction in e1000_shutdown function 1d16cd91cd31 e1000e: Workaround for sporadic MDI error on Meteor Lake systems d5752c7bb1b2 intel: legacy: field get conversion e383353b7992 intel: add bit macro includes where needed e77220eec3ee i40e: Remove circular header dependencies and fix headers 59a9de1a9430 i40e: Split i40e_osdep.h 2ee5326d32c5 i40e: Move memory allocation structures to i40e_alloc.h 0ed115020ac4 i40e: Simplify memory allocation functions 0c52a50aec50 virtchnl: Add header dependencies 45116a7c2138 i40e: Refactor I40E_MDIO_CLAUSE* macros f629cf15dcde i40e: Remove back pointer from i40e_hw structure 66ca011a5df5 i40e: Enforce software interrupt during busy-poll exit e6d25dbd9243 i40e: Remove _t suffix from enum type names 3da10e91ecd2 drm/amd: Flush GFXOFF requests in prepare stage da67a1139f05 drm/amd: Add concept of running prepare_suspend() sequence for IP blocks 8b5f720486ca drm/amd: Evict resources during PM ops prepare() callback 4356a2c3f296 drm/amd/display: Prevent crash when disable stream 8dc9a27589a9 drm/amd/display: Fix DPSTREAM CLK on and off sequence 113b12e16488 usb: typec: ucsi: Fix race between typec_switch and role_switch 0dcf573f9977 i40e: fix vf may be used uninitialized in this function warning 89e29416cf6b i40e: fix i40e_count_filters() to count only active/new filters 76c39cf84cd2 octeontx2-af: Add array index check 43b69da260af octeontx2-pf: check negative error code in otx2_open() b08b0c7a66c9 octeontx2-af: Fix issue with loading coalesced KPU profiles 03b6f3692bae udp: prevent local UDP tunnel packets from being GROed 2a1b61d0cb9b udp: do not transition UDP GRO fraglist partial checksums to unnecessary 3001e7aa43d6 udp: do not accept non-tunnel GSO skbs landing in a tunnel a5eae74f39c0 r8169: skip DASH fw status checks when DASH is disabled 36a1cb0371aa mlxbf_gige: stop interface during shutdown f2dd75e57285 ipv6: Fix infinite recursion in fib6_dump_done(). 74204bf9050f ax25: fix use-after-free bugs caused by ax25_ds_del_timer 8b88752d2b12 tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non-wildcard addresses. 690e877ca2b6 selftests: reuseaddr_conflict: add missing new line at the end of the output 4e3fdeecec57 erspan: make sure erspan_base_hdr is present in skb->head a03e138da771 i40e: Fix VF MAC filter removal b9bd1498cdce ice: fix enabling RX VLAN filtering fc126c1d51e9 gro: fix ownership transfer 39864092cff3 selftests: net: gro fwd: update vxlan GRO test expectations 23e1c6866e22 net: dsa: mv88e6xxx: fix usable ports on 88e6020 95c1016a2d92 net: phy: micrel: Fix potential null pointer dereference f996e5ecf07f net: fec: Set mac_managed_pm during probe 22a44eeef781 net: txgbe: fix i2c dev name cannot match clkdev 1e304328d9c3 net: phy: micrel: lan8814: Fix when enabling/disabling 1-step timestamping 784a65669720 net: stmmac: fix rx queue priority assignment c040b99461a5 net/sched: fix lockdep splat in qdisc_tree_reduce_backlog() f4d1fa512b2a net: dsa: sja1105: Fix parameters order in sja1110_pcs_mdio_write_c45() 729ad2ac2a2c net/sched: act_skbmod: prevent kernel-infoleak 3dcaf25993a2 KVM: arm64: Ensure target address is granule-aligned for range TLBI 3ec21104c881 x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO 668b3074aa14 bpf, sockmap: Prevent lock inversion deadlock in map delete elem 55fabde8d9f4 vboxsf: Avoid an spurious warning if load_nls_xxx() fails 81d51b9b7c95 netfilter: validate user input for expected length 9627fd0c6ea1 netfilter: nf_tables: discard table flag update with pending basechain deletion 8b891153b2e4 netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() 333b5085522c netfilter: nf_tables: flush pending destroy work before exit_net release 420132bee3d0 netfilter: nf_tables: reject new basechain after table flag update e40f32f17642 x86/bugs: Fix the SRSO mitigation on Zen3/4 93eae88e34f6 x86/nospec: Refactor UNTRAIN_RET[_*] 820a3626f3d7 x86/srso: Disentangle rethunk-dependent options 6b10edf91640 x86/srso: Improve i-cache locality for alias mitigation 065012bb7777 vsock/virtio: fix packet delivery to tap device ca58927b0038 net: mana: Fix Rx DMA datasize and skb_over_panic 426366d577e9 net: usb: ax88179_178a: avoid the interface always configured as random address 92309bed3c5f net/rds: fix possible cp null dereference 27aa3e4b3088 xen-netfront: Add missing skb_mark_for_recycle 117eed2997bc selftests: mptcp: join: fix dev in check_endpoint 8038ee3c3e5b netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path b0b36dcbe0f2 netfilter: nf_tables: release batch on table validation from abort path d75632d0db3c Bluetooth: Fix TOCTOU in HCI debugfs implementation 4a32840119d0 Bluetooth: hci_event: set the conn encrypted before conn establishes 57e089d33b96 Bluetooth: add quirk for broken address properties 1622e563b819 Bluetooth: qca: fix device-address endianness b99d0617b698 arm64: dts: qcom: sc7180-trogdor: mark bluetooth address as broken 417c6cc9ef8c Revert "Bluetooth: hci_qca: Set BDA quirk bit if fwnode exists in DT" 3f9d57c77165 x86/bpf: Fix IP after emitting call depth accounting 4d47169ab691 x86/cpufeatures: Add CPUID_LNX_5 to track recently added Linux-defined word b9906101f894 r8169: fix issue caused by buggy BIOS on certain boards with RTL8168d 477ed6789eb9 selinux: avoid dereference of garbage after mount failure 9e2af26c29c6 KVM: arm64: Fix host-programmed guest events in nVHE 651bf5b1d070 RISC-V: KVM: Fix APLIC in_clrip[x] read emulation 200cc2c71841 RISC-V: KVM: Fix APLIC setipnum_le/be write emulation 21bc9b158983 gpio: cdev: sanitize the label before requesting the interrupt a2671601fa02 modpost: do not make find_tosym() return NULL 2bc92c61c541 modpost: Optimize symbol search from linear to binary search 55ed6c477872 perf/x86/amd/lbr: Use freeze based on availability 56e7373f9a67 x86/cpufeatures: Add new word for scattered features 69fe5f177ad3 perf/x86/amd/core: Update and fix stalled-cycles-* events for Zen 2 and later d2be2f872fe7 x86/CPU/AMD: Add X86_FEATURE_ZEN1 54273025be0c x86/CPU/AMD: Get rid of amd_erratum_1054[] 824549816609 x86/CPU/AMD: Move the DIV0 bug detection to the Zen1 init function 702a65272da6 x86/CPU/AMD: Move Zenbleed check to the Zen2 init function 2577e2a7cae0 x86/CPU/AMD: Move erratum 1076 fix into the Zen1 init function eae590201d4a x86/CPU/AMD: Carve out the erratum 1386 fix 936e59cb56ea x86/CPU/AMD: Add ZenX generations flags 49d640d2946c btrfs: fix race when detecting delalloc ranges during fiemap 8cc484e85e0c btrfs: ensure fiemap doesn't race with writes when FIEMAP_FLAG_SYNC is given fbc0a833c055 Revert "x86/mm/ident_map: Use gbpages only where full GB page should be mapped." 907835e6dee6 mm/treewide: replace pud_large() with pud_leaf() 7cd73d90856d dm integrity: fix out-of-range warning 2564623ee0da drm/i915/mtl: Update workaround 14018575942 798781b43194 drm/i915/xelpg: Extend some workarounds/tuning to gfx version 12.74 338db8193cb2 drm/i915/mtl: Update workaround 14016712196 ec84b2a44b05 drm/i915: Replace several IS_METEORLAKE with proper IP version checks b3749611a5e5 drm/i915: Eliminate IS_MTL_GRAPHICS_STEP 18e77951e14a drm/i915/xelpg: Call Xe_LPG workaround functions based on IP version 67f7fba8a086 drm/i915: Consolidate condition for Wa_22011802037 6b25099eea4b drm/i915: Tidy workaround definitions 0a9901fdb7bb drm/i915/dg2: Drop pre-production GT workarounds f4877225313d inet: inet_defrag: prevent sk release while still in use 54720f68c4ad Octeontx2-af: fix pause frame configuration in GMP mode 74a78a00db8f net: lan743x: Add set RFE read fifo threshold for PCI1x1x chips 4bb7ad116be7 net: bcmasp: Bring up unimac after PHY link up cf893953633d netfilter: nf_tables: skip netdev hook unregistration if table is dormant 2d0d1abe119a netfilter: nf_tables: reject table flag and netdev basechain updates cddd0480a682 netfilter: nf_tables: reject destroy command to remove basechain hooks 614bc8c71ed5 cifs: Fix duplicate fscache cookie warnings 3f0784b2f1eb bpf: Protect against int overflow for stack access size 867a2f598af6 mlxbf_gige: call request_irq() after NAPI initialized f1b7f14130d7 tls: get psock ref after taking rxlock to avoid leak f19e995b4813 tls: adjust recv return with async crypto and failed copy to userspace dc4bce20fa9e tls: recv: process_rx_list shouldn't use an offset with kvec 872f574f8860 net: hns3: mark unexcuted loopback test result as UNEXECUTED 1b550dae5590 net: hns3: fix kernel crash when devlink reload during pf initialization b033da1461c1 net: hns3: fix index limit to support all queue stats 77ffc72b497e ACPICA: debugger: check status of acpi_evaluate_object() in acpi_db_walk_for_fields() 7fb8b3de7f22 selftests: vxlan_mdb: Fix failures with old libnet 2e22c9cb6187 net: wwan: t7xx: Split 64bit accesses to fix alignment issues c1ae4d1e76ea tcp: properly terminate timers for kernel sockets 984c3d962c9e net: hsr: hsr_slave: Fix the promiscuous mode in offload mode 21dea1475fd4 s390/qeth: handle deferred cc1 1b1c0f6ce790 igc: Remove stale comment about Tx timestamping 4465b15ae5c5 ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() e40a02f06ceb ice: fix memory corruption bug with suspend and rebuild feddf6c09c44 ice: realloc VSI stats arrays 493b29930f66 ice: Refactor FW data type and fix bitmap casting issue 0172edc572b0 ALSA: hda: cs35l56: Set the init_done flag before component_add() dc1ec9c5efec wifi: iwlwifi: mvm: include link ID when releasing frames 13fd96c97596 wifi: iwlwifi: disable multi rx queue for 9000 c0a40f2f8eba wifi: iwlwifi: mvm: rfi: fix potential response leaks 84d30c56786a mlxbf_gige: stop PHY during open() error paths 5c05bdd95f0e tools: ynl: fix setting presence bits in simple nests a946ebee45b0 nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet 087dc50d8baf arm64: bpf: fix 32bit unconditional bswap 156c226cbbdc dma-buf: Fix NULL pointer dereference in sanitycheck() aeecb678ec36 bpf, arm64: fix bug in BPF_LDX_MEMSX c3062bdb859b s390/bpf: Fix bpf_plt pointer arithmetic 54d38a5ca0f7 scripts/bpf_doc: Use silent mode when exec make cmd cc696ce93089 drm/i915: Pre-populate the cursor physical dma address 2c07e2437a3e drm/i915/display: Use i915_gem_object_get_dma_address to get dma address 06644f0d7193 drm/tilcdc: Set preferred depth ff7ae7b32324 crypto: jitter - add RCT/APT support for different OSRs 50cd24ddb6f0 arm64: defconfig: remove CONFIG_IPQ_APSS_5018 58e5c91d6701 x86/alternatives: Disable interrupts and sync when optimizing NOPs in place c878fd2d4c79 x86/alternatives: Sync core before enabling interrupts c2d64b9f52b6 qemux86: add configuration symbol to select values 630c33229e6d sched/isolation: really align nohz_full with rcu_nocbs 0e5e0f68e2e6 clear_warn_once: add a clear_warn_once= boot parameter 46934791b902 clear_warn_once: bind a timer to written reset value cdee9e38ff32 clear_warn_once: expand debugfs to include read support 82b562b81841 tools: Remove some options from CLANG_CROSS_FLAGS 36dc380b776b libbpf: Fix build warning on ref_ctr_off 9e3e1fe20982 perf: perf can not parser the backtrace of app in the 32bit system and 64bit kernel. e497a4a5da65 perf: x86-32: explicitly include 7b57ddd89565 perf: mips64: Convert __u64 to unsigned long long 1cfc19423dc7 perf: fix bench numa compilation 98bc2815fade perf: add SLANG_INC for slang.h 17209a70b9b3 perf: add sgidefs.h to for mips builds 9cd4258d910a perf: change --root to --prefix for python install 8110a4f26628 perf: add 'libperl not found' warning bc89d5e08f77 perf: force include of 4f6c760cc876 fat: Replace prandom_u32() with get_random_u32() bc53117b12b2 fat: don't use obsolete random32 call in namei_vfat 30b2236ab378 FAT: Added FAT_NO_83NAME cef98d22b4ed FAT: Add CONFIG_VFAT_NO_CREATE_WITH_LONGNAMES option 0bbd7daba9e1 FAT: Add CONFIG_VFAT_FS_NO_DUALNAMES option 5883fc340084 aufs6: adapt to v6.6 i_op->ctime changes c4342d979bf2 aufs6: fix magic.mk include path 35266bc2dc81 aufs6: adapt to v6.6 8edede4e98be aufs6: core 712248233ebe aufs6: standalone 3b71a8a848d8 aufs6: mmap 3e2924871f37 aufs6: base 7f4907a93101 aufs6: kbuild d2f7b03e4aa7 yaffs2: update VFS ctime operations to 6.6+ bcd6cfcd1aa0 yaffs2: v6.5 fixups cc615704b5f5 yaffs2: Fix miscalculation of devname buffer length 8ef2e22dcf91 yaffs2: convert user_namespace to mnt_idmap c9c749f9f7d3 yaffs2: replace bdevname call with sprintf 395b01cdc39d yaffs2: convert read_page -> readfolio d98b07e43ba6 yaffs: replace IS_ERR with IS_ERR_OR_NULL to check both ERR and NULL 613c6d50fdbe yaffs: fix -Wstringop-overread compile warning in yaffs_fix_null_name 622c4648936f yaffs2: v5.12+ build fixups (not runtime tested) 7562133d4090 yaffs: include blkdev.h dbd44252cd59 yaffs: fix misplaced variable declaration c223a10b1ac0 yaffs2: v5.6 build fixups 90f6007cfbf4 yaffs2: fix memory leak when /proc/yaffs is read 37ee169c5ea1 yaffs: add strict check when call yaffs_internal_read_super b6e007b8abb6 yaffs: repair yaffs_get_mtd_device fb98f65a466a yaffs: Fix build failure by handling inode i_version with proper atomic API 51e0aac75ea2 yaffs2: fix memory leak in mount/umount 2b74a0cae7b0 yaffs: Avoid setting any ACL releated xattr ff4130a9c376 Yaffs:check oob size before auto selecting Yaffs1 ba95b409c67c fs: yaffs2: replace CURRENT_TIME by other appropriate apis 8fa35eba9056 yaffs2: adjust to proper location of MS_RDONLY 1eb5deaad8c4 yaffs2: import git revision b4ce1bb (jan, 2020) 4dce67c1e8c8 initramfs: allow an optional wrapper script around initramfs generation 2f603d83fcc4 pnmtologo: use relocatable file name 664a6a0a484b tools: use basename to identify file in gen-mach-types 9de64bc0c185 lib/build_OID_registry: fix reproducibility issues ae9b80797295 vt/conmakehash: improve reproducibility a972323151bd iwlwifi: select MAC80211_LEDS conditionally 15d2adcc0198 net/dccp: make it depend on CONFIG_BROKEN (CVE-2020-16119) 5556a6c04b19 arm64/perf: Fix wrong cast that may cause wrong truncation 5552dc768ffc defconfigs: drop obselete options 00fe4152df31 arm64/perf: fix backtrace for AAPCS with FP enabled 3888d0652edf linux-yocto: Handle /bin/awk issues 3d55d299f23a uvesafb: provide option to specify timeout for task completion 23c068c080be uvesafb: print error message when task timeout occurs edbfc939266e compiler.h: Undef before redefining __attribute_const__ c99ae7e2a19a vmware: include jiffies.h 572d84d928c8 Resolve jiffies wrapping about arp fdcd47cac843 nfs: Allow default io size to be configured. 927d48801098 check console device file on fs when booting 57cc27f821dd mount_root: clarify error messages for when no rootfs found 1b53d82a8152 mconf: fix output of cflags and libraries 1811da09f42c menuconfig,mconf-cfg: Allow specification of ncurses location 83c2e0c6eb1f modpost: mask trivial warnings 6de673039484 kbuild: exclude meta directory from distclean processing 6decd32815f5 powerpc: serialize image targets f6b683b38318 arm: serialize build targets e798b09ebf57 mtd_blkdevs: add mtd_table_mutex lock back to blktrans_{open, release} to avoid race condition dc8a1e5a88f8 x86_64_defconfig: Fix warnings 68491e5f72b6 powerpc/ptrace: Disable array-bounds warning with gcc8 d71ebfce3004 powerpc: Disable attribute-alias warnings from gcc8 62f50884b8b1 powerpc: kexec fix for powerpc64 da6871c62c37 powerpc: Add unwind information for SPE registers of E500 core f161c880c11d mips: make current_cpu_data preempt safe 5e94a8247ce7 mips: vdso: fix 'jalr $t9' crash in vdso code 19e36714b1c7 mips: Kconfig: add QEMUMIPS64 option e2e537db3cbd 4kc cache tlb hazard: tlbp cache coherency aee9870611e5 malta uhci quirks: make allowance for slow 4k(e)c 881948cd1517 drm/fb-helper: move zeroing code to drm_fb_helper_fill_var 98ec1963fcb7 arm64: defconfig: cleanup config options f1727c537ba8 vexpress: Pass LOADADDR to Makefile 4474c32dc24a arm: ARM EABI socketcall 75e31a2b70fd ARM: LPAE: Invalidate the TLB for module addresses during translation fault Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.6.bb | 6 ++-- .../linux/linux-yocto-tiny_6.6.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index be60bbee78..91dbbf55ca 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "9f39c8adfc6025293e5ff131f7bb4f728edd0c99" -SRCREV_meta ?= "00aab388b73211bf49b352e7475595aa2e5fbc44" +SRCREV_machine ?= "5272561b019836f2ee2f175b23029649431d6fca" +SRCREV_meta ?= "3bf5e5e5a7323795af0955da818c6e93215fd119" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.6.25" +LINUX_VERSION ?= "6.6.27" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index 559ca3563a..fba19c97df 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.6.inc -LINUX_VERSION ?= "6.6.25" +LINUX_VERSION ?= "6.6.27" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" -SRCREV_meta ?= "00aab388b73211bf49b352e7475595aa2e5fbc44" +SRCREV_machine ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" +SRCREV_meta ?= "3bf5e5e5a7323795af0955da818c6e93215fd119" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index b0674348e8..f887e293b7 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.6/standard/base" KBRANCH:qemuloongarch64 ?= "v6.6/standard/base" KBRANCH:qemumips64 ?= "v6.6/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "e76632ff3899f47234405672a658156bb0079d52" -SRCREV_machine:qemuarm64 ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" -SRCREV_machine:qemuloongarch64 ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" -SRCREV_machine:qemumips ?= "744b6e2f70062732f48de0918ca8c56f5de408dd" -SRCREV_machine:qemuppc ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" -SRCREV_machine:qemuriscv64 ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" -SRCREV_machine:qemuriscv32 ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" -SRCREV_machine:qemux86 ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" -SRCREV_machine:qemux86-64 ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" -SRCREV_machine:qemumips64 ?= "936a9ceb126dfb2cc4b38229cab68636263ecfab" -SRCREV_machine ?= "5ac0c93287792fba862b1f78e513dbaf10696a09" -SRCREV_meta ?= "00aab388b73211bf49b352e7475595aa2e5fbc44" +SRCREV_machine:qemuarm ?= "51c07ec56f85fbbfa9ea6944a4b14eee7e715566" +SRCREV_machine:qemuarm64 ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" +SRCREV_machine:qemuloongarch64 ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" +SRCREV_machine:qemumips ?= "4bf661a8afc7323030a6af73fc5640ef4dabe01f" +SRCREV_machine:qemuppc ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" +SRCREV_machine:qemuriscv64 ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" +SRCREV_machine:qemuriscv32 ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" +SRCREV_machine:qemux86 ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" +SRCREV_machine:qemux86-64 ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" +SRCREV_machine:qemumips64 ?= "d3abfe3c736d5869cb26f24c653b7e6eeafac715" +SRCREV_machine ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" +SRCREV_meta ?= "3bf5e5e5a7323795af0955da818c6e93215fd119" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "e475741af1ebe2c92ee4a3f49e55749a84770a12" +SRCREV_machine:class-devupstream ?= "5e828009c8b380739e13da92be847f10461c38b1" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.6/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.6.25" +LINUX_VERSION ?= "6.6.27" PV = "${LINUX_VERSION}+git" From patchwork Fri May 3 02:40:35 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43196 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7C701C25B10 for ; Fri, 3 May 2024 02:40:54 +0000 (UTC) Received: from mail-ua1-f48.google.com (mail-ua1-f48.google.com [209.85.222.48]) by mx.groups.io with SMTP id smtpd.web10.3825.1714704053797780366 for ; Thu, 02 May 2024 19:40:54 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=WBbbJNjR; spf=pass (domain: gmail.com, ip: 209.85.222.48, mailfrom: bruce.ashfield@gmail.com) Received: by mail-ua1-f48.google.com with SMTP id a1e0cc1a2514c-7f3c389c04aso496161241.2 for ; Thu, 02 May 2024 19:40:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714704053; x=1715308853; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=dQ6tGDejCaDtBNnaKI9ozV6VxwdydfvbKoivflZg6C4=; b=WBbbJNjRsGfBMVQLk8A9bOAR00xJ7HRLCzYRYSsaCMUrxlRZLcBv/+qQK+y85HdfiG eb8VI3iDaFV+5Ual4bcU7WWT25Bd3tDpqwKS9KwUVhYyHUvG8F+6HtekkHYAJZGCGCIT RRbZVi5GnQIToemyKmgJ55Q6A4rOg+9lvzUVxekra/xRiUUMuy+knXfPPkdFjPvD54wX E81w4r/SWv+cX4xKdB12Tchq9i6RmSye/LpdKl4NstoWDRYDAmqSiv0wcFSdNYU4RJnv pO110Zg5xSPz/RKDl4mzSIFzDTp4nyti58OLc2lVcVmEMo/C+gOKZbTBTlEBJdUvZjq8 Sauw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714704053; x=1715308853; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=dQ6tGDejCaDtBNnaKI9ozV6VxwdydfvbKoivflZg6C4=; b=pmEmSbL8bP7W1XAUaykPnM+fwYsvUVQJgg6Xev3gT672UR1tSdvy7RDmEdppdK8n9a lNqcQ1oqWYstgdtPC9mRKqPS2cPvgA2gD5+2UlhewXlOs3B61vU8AOQmcN9zqc+EWT1t JACVGlSGOA5wtK2wZA5Z7mS7VzbJltNOIK9aALaFAuXmDgel89huKzKAbXkOJZGLAej/ osaPI0EqgVLyNPZsaGi8ASOdBjX9yGAFaBJ68A75Xz6cLu95s66cRC9x6dmGL9rVWcKZ qkvdlLA9R1lyM/bvf9NhJ2v0xTRGPr+rWSkk1OpYIAK56VUwB+L+t8FIgwBYAS6Ffjhn 0jgA== X-Gm-Message-State: AOJu0YzufuHebI3whkwqzMe7KyGnO3Fxgx8vnb5ucVH8HI1ibi3G1+LG GrOzQE8VjJOGlbaIP+a6O+V6DoInIbj4ADwNbFV/pRWD+MWQf/SvZHFADQ== X-Google-Smtp-Source: AGHT+IHhe7aVlmdCoO/Oz5/toZKQcbFx8WwOvKxiv2BDmkd10XnDyQ9dJUa+OqJlvCzmpu1KN9XhMA== X-Received: by 2002:a05:6102:1801:b0:47e:ee4d:8431 with SMTP id jg1-20020a056102180100b0047eee4d8431mr1585888vsb.3.1714704051831; Thu, 02 May 2024 19:40:51 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id bm34-20020a05620a19a200b0078ec3aa9cc7sm856163qkb.25.2024.05.02.19.40.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 19:40:51 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 07/12] linux-yocto/6.6: update CVE exclusions (6.6.27) Date: Thu, 2 May 2024 22:40:35 -0400 Message-Id: X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 02:40:54 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198939 From: Bruce Ashfield Data pulled from: https://github.com/nluedtke/linux_kernel_cves 1/1 [ Author: Nicholas Luedtke Email: nicholas.luedtke@uwalumni.com Subject: Update 8Apr24 Date: Tue, 9 Apr 2024 18:19:11 -0400 ] Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.6.inc | 2720 ++++++++++++----- 1 file changed, 1998 insertions(+), 722 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc index 4a7086a84b..9e5be066a5 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2024-04-09 14:35:54.393486+00:00 for version 6.6.25 +# Generated at 2024-04-15 16:05:11.813475+00:00 for version 6.6.27 python check_kernel_cve_status_version() { - this_version = "6.6.25" + this_version = "6.6.27" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -2980,6 +2980,10 @@ CVE_STATUS[CVE-2019-25044] = "fixed-version: Fixed from version 5.2rc4" CVE_STATUS[CVE-2019-25045] = "fixed-version: Fixed from version 5.1" +CVE_STATUS[CVE-2019-25160] = "fixed-version: Fixed from version 5.0" + +CVE_STATUS[CVE-2019-25162] = "fixed-version: Fixed from version 6.0rc1" + CVE_STATUS[CVE-2019-3016] = "fixed-version: Fixed from version 5.6rc1" CVE_STATUS[CVE-2019-3459] = "fixed-version: Fixed from version 5.1rc1" @@ -3452,6 +3456,32 @@ CVE_STATUS[CVE-2020-36694] = "fixed-version: Fixed from version 5.10" CVE_STATUS[CVE-2020-36766] = "fixed-version: Fixed from version 5.9rc1" +CVE_STATUS[CVE-2020-36775] = "fixed-version: Fixed from version 5.7rc1" + +CVE_STATUS[CVE-2020-36776] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36777] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36778] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36779] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36780] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36781] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36782] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36783] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36784] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36785] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36786] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-36787] = "fixed-version: Fixed from version 5.13rc1" + CVE_STATUS[CVE-2020-3702] = "fixed-version: Fixed from version 5.12rc1" CVE_STATUS[CVE-2020-4788] = "fixed-version: Fixed from version 5.10rc5" @@ -3940,1445 +3970,2691 @@ CVE_STATUS[CVE-2021-45868] = "fixed-version: Fixed from version 5.16rc1" CVE_STATUS[CVE-2021-46283] = "fixed-version: Fixed from version 5.13rc7" -CVE_STATUS[CVE-2022-0001] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-46904] = "fixed-version: Fixed from version 5.12rc7" -CVE_STATUS[CVE-2022-0002] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-46905] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-0168] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46906] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-0171] = "fixed-version: Fixed from version 5.18rc4" +CVE_STATUS[CVE-2021-46908] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0185] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2021-46909] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0264] = "fixed-version: Fixed from version 5.16rc6" +CVE_STATUS[CVE-2021-46910] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0286] = "fixed-version: Fixed from version 5.14rc2" +CVE_STATUS[CVE-2021-46911] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0322] = "fixed-version: Fixed from version 5.15rc6" +CVE_STATUS[CVE-2021-46912] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0330] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2021-46913] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0382] = "fixed-version: Fixed from version 5.16" +CVE_STATUS[CVE-2021-46914] = "fixed-version: Fixed from version 5.12rc8" -# CVE-2022-0400 has no known resolution +CVE_STATUS[CVE-2021-46915] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0433] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2021-46916] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0435] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2021-46917] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0480] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2021-46918] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0487] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2021-46919] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0492] = "fixed-version: Fixed from version 5.17rc3" +CVE_STATUS[CVE-2021-46920] = "fixed-version: Fixed from version 5.12rc8" -CVE_STATUS[CVE-2022-0494] = "fixed-version: Fixed from version 5.17rc5" +CVE_STATUS[CVE-2021-46921] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2022-0500] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2021-46922] = "fixed-version: Fixed from version 5.12" -CVE_STATUS[CVE-2022-0516] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2021-46923] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-0617] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2021-46924] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-0644] = "fixed-version: Fixed from version 5.15rc7" +CVE_STATUS[CVE-2021-46925] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-0646] = "fixed-version: Fixed from version 5.17rc5" +CVE_STATUS[CVE-2021-46926] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-0742] = "fixed-version: Fixed from version 5.17rc7" +CVE_STATUS[CVE-2021-46927] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-0812] = "fixed-version: Fixed from version 5.8rc6" +CVE_STATUS[CVE-2021-46928] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-0847] = "fixed-version: Fixed from version 5.17rc6" +CVE_STATUS[CVE-2021-46929] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-0850] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2021-46930] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-0854] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-46931] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-0995] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-46932] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-0998] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2021-46933] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-1011] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-46934] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-1012] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2021-46935] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-1015] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46936] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-1016] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46937] = "fixed-version: Fixed from version 5.16rc8" -CVE_STATUS[CVE-2022-1043] = "fixed-version: Fixed from version 5.14rc7" +CVE_STATUS[CVE-2021-46938] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1048] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46939] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1055] = "fixed-version: Fixed from version 5.17rc3" +CVE_STATUS[CVE-2021-46940] = "fixed-version: Fixed from version 5.13rc1" -# CVE-2022-1116 has no known resolution +CVE_STATUS[CVE-2021-46941] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1158] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46942] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1184] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-46943] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1195] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2021-46944] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1198] = "fixed-version: Fixed from version 5.17rc6" +CVE_STATUS[CVE-2021-46945] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1199] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-46947] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1204] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46948] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1205] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46949] = "fixed-version: Fixed from version 5.13rc1" -# CVE-2022-1247 has no known resolution +CVE_STATUS[CVE-2021-46950] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1263] = "fixed-version: Fixed from version 5.18rc3" +CVE_STATUS[CVE-2021-46951] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1280] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2021-46952] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1353] = "fixed-version: Fixed from version 5.17" +CVE_STATUS[CVE-2021-46953] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1419] = "fixed-version: Fixed from version 5.6rc2" +CVE_STATUS[CVE-2021-46954] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1462] = "fixed-version: Fixed from version 5.19rc7" +CVE_STATUS[CVE-2021-46955] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1508] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2021-46956] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1516] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46957] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1651] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46958] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1652] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2021-46959] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1671] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46960] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1678] = "fixed-version: Fixed from version 4.20rc1" +CVE_STATUS[CVE-2021-46961] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1679] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-46962] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1729] = "fixed-version: Fixed from version 5.18" +CVE_STATUS[CVE-2021-46963] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1734] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2021-46964] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1786] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2021-46965] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1789] = "fixed-version: Fixed from version 5.18" +CVE_STATUS[CVE-2021-46966] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1836] = "fixed-version: Fixed from version 5.18rc5" +CVE_STATUS[CVE-2021-46967] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1852] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-46968] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1882] = "fixed-version: Fixed from version 5.19rc8" +CVE_STATUS[CVE-2021-46969] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1943] = "fixed-version: Fixed from version 5.18rc7" +CVE_STATUS[CVE-2021-46970] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1966] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-46971] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1972] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-46972] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1973] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-46973] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1974] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2021-46974] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-1975] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2021-46976] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-1976] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-46977] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-1998] = "fixed-version: Fixed from version 5.17rc3" +CVE_STATUS[CVE-2021-46978] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20008] = "fixed-version: Fixed from version 5.17rc5" +CVE_STATUS[CVE-2021-46979] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20132] = "fixed-version: Fixed from version 5.16rc5" +CVE_STATUS[CVE-2021-46980] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20141] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2021-46981] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20148] = "fixed-version: Fixed from version 5.16rc1" +CVE_STATUS[CVE-2021-46982] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20153] = "fixed-version: Fixed from version 5.13rc1" +CVE_STATUS[CVE-2021-46983] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20154] = "fixed-version: Fixed from version 5.16rc8" +CVE_STATUS[CVE-2021-46984] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20158] = "fixed-version: Fixed from version 5.17" +CVE_STATUS[CVE-2021-46985] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20166] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2021-46986] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20368] = "fixed-version: Fixed from version 5.17" +CVE_STATUS[CVE-2021-46987] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20369] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-46988] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20409] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2021-46989] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20421] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2021-46990] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-20422] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-46991] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-20423] = "fixed-version: Fixed from version 5.17" +CVE_STATUS[CVE-2021-46992] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-20424] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2021-46993] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-20565] = "fixed-version: Fixed from version 5.9rc4" +CVE_STATUS[CVE-2021-46994] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-20566] = "fixed-version: Fixed from version 5.19" +CVE_STATUS[CVE-2021-46995] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-20567] = "fixed-version: Fixed from version 4.16rc5" +CVE_STATUS[CVE-2021-46996] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-20568] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2021-46997] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-20572] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-46998] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2078] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-46999] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-21123] = "fixed-version: Fixed from version 5.19rc3" +CVE_STATUS[CVE-2021-47000] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-21125] = "fixed-version: Fixed from version 5.19rc3" +CVE_STATUS[CVE-2021-47001] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-21166] = "fixed-version: Fixed from version 5.19rc3" +CVE_STATUS[CVE-2021-47002] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-21385] = "fixed-version: Fixed from version 4.20" +CVE_STATUS[CVE-2021-47003] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-21499] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47004] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-21505] = "fixed-version: Fixed from version 5.19rc8" +CVE_STATUS[CVE-2021-47005] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2153] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47006] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2196] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2021-47007] = "fixed-version: Fixed from version 5.13rc1" -# CVE-2022-2209 has no known resolution +CVE_STATUS[CVE-2021-47008] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-22942] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2021-47009] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-23036] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-47010] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-23037] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-47011] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-23038] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-47012] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-23039] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-47013] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-23040] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-47014] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-23041] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-47015] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-23042] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-47016] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2308] = "fixed-version: Fixed from version 6.0" +CVE_STATUS[CVE-2021-47017] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2318] = "fixed-version: Fixed from version 5.19rc5" +CVE_STATUS[CVE-2021-47018] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-23222] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2021-47019] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2327] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2021-47020] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2380] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47021] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-23816] = "fixed-version: Fixed from version 5.19rc7" +CVE_STATUS[CVE-2021-47022] = "fixed-version: Fixed from version 5.13rc1" -# CVE-2022-23825 has no known resolution +CVE_STATUS[CVE-2021-47023] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-23960] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-47024] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-24122] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2021-47025] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-24448] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2021-47026] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-24958] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2021-47027] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-24959] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2021-47028] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2503] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47029] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-25258] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2021-47030] = "fixed-version: Fixed from version 5.13rc1" -# CVE-2022-25265 has no known resolution +CVE_STATUS[CVE-2021-47031] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-25375] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2021-47032] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-25636] = "fixed-version: Fixed from version 5.17rc6" +CVE_STATUS[CVE-2021-47033] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2585] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47034] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2586] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47035] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2588] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47036] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2590] = "fixed-version: Fixed from version 6.0rc3" +CVE_STATUS[CVE-2021-47037] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2602] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47038] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-26365] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2021-47039] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-26373] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47040] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2639] = "fixed-version: Fixed from version 5.18rc4" +CVE_STATUS[CVE-2021-47041] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-26490] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2021-47042] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2663] = "fixed-version: Fixed from version 6.0rc5" +CVE_STATUS[CVE-2021-47043] = "fixed-version: Fixed from version 5.13rc1" -# CVE-2022-26878 has no known resolution +CVE_STATUS[CVE-2021-47044] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-26966] = "fixed-version: Fixed from version 5.17rc6" +CVE_STATUS[CVE-2021-47045] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-27223] = "fixed-version: Fixed from version 5.17rc6" +CVE_STATUS[CVE-2021-47046] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-27666] = "fixed-version: Fixed from version 5.17rc8" +CVE_STATUS[CVE-2021-47047] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-27672] = "fixed-version: Fixed from version 6.2" +CVE_STATUS[CVE-2021-47048] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2785] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47049] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-27950] = "fixed-version: Fixed from version 5.17rc5" +CVE_STATUS[CVE-2021-47050] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-28356] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47051] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-28388] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47052] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-28389] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47053] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-28390] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47054] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2873] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47055] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-28796] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47056] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-28893] = "fixed-version: Fixed from version 5.18rc2" +CVE_STATUS[CVE-2021-47057] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2905] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2021-47058] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-29156] = "fixed-version: Fixed from version 5.17rc6" +CVE_STATUS[CVE-2021-47059] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2938] = "fixed-version: Fixed from version 5.17rc2" +CVE_STATUS[CVE-2021-47060] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-29581] = "fixed-version: Fixed from version 5.18rc4" +CVE_STATUS[CVE-2021-47061] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-29582] = "fixed-version: Fixed from version 5.18rc2" +CVE_STATUS[CVE-2021-47062] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2959] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47063] = "fixed-version: Fixed from version 5.13rc1" -# CVE-2022-2961 has no known resolution +CVE_STATUS[CVE-2021-47064] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2964] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2021-47065] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2977] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47066] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-2978] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47067] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-29900] = "fixed-version: Fixed from version 5.19rc7" +CVE_STATUS[CVE-2021-47068] = "fixed-version: Fixed from version 5.13rc1" -CVE_STATUS[CVE-2022-29901] = "fixed-version: Fixed from version 5.19rc7" +CVE_STATUS[CVE-2021-47069] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-2991] = "fixed-version: Fixed from version 5.15rc1" +CVE_STATUS[CVE-2021-47070] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-29968] = "fixed-version: Fixed from version 5.18rc5" +CVE_STATUS[CVE-2021-47071] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3028] = "fixed-version: Fixed from version 6.0rc3" +CVE_STATUS[CVE-2021-47072] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-30594] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47073] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3061] = "fixed-version: Fixed from version 5.18rc5" +CVE_STATUS[CVE-2021-47074] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3077] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47075] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3078] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47076] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3103] = "fixed-version: Fixed from version 6.0rc3" +CVE_STATUS[CVE-2021-47077] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3104] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47078] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3105] = "fixed-version: Fixed from version 5.16" +CVE_STATUS[CVE-2021-47079] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3106] = "fixed-version: Fixed from version 5.16rc6" +CVE_STATUS[CVE-2021-47080] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3107] = "fixed-version: Fixed from version 5.17" +CVE_STATUS[CVE-2021-47081] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3108] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2021-47082] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3110] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47083] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3111] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47086] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3112] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47087] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3113] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47088] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3114] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47089] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3115] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47090] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3169] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47091] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3170] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2021-47092] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3176] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2021-47093] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3202] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47094] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-32250] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47095] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-32296] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2021-47096] = "fixed-version: Fixed from version 5.16rc7" -# CVE-2022-3238 has no known resolution +CVE_STATUS[CVE-2021-47097] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3239] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2021-47098] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-32981] = "fixed-version: Fixed from version 5.19rc2" +CVE_STATUS[CVE-2021-47099] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3303] = "fixed-version: Fixed from version 6.0rc5" +CVE_STATUS[CVE-2021-47100] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3344] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2021-47101] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-33740] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2021-47102] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-33741] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2021-47103] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-33742] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2021-47104] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-33743] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2021-47105] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-33744] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2021-47106] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-33981] = "fixed-version: Fixed from version 5.18rc5" +CVE_STATUS[CVE-2021-47107] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3424] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2021-47108] = "fixed-version: Fixed from version 5.16rc7" -CVE_STATUS[CVE-2022-3435] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47109] = "fixed-version: Fixed from version 5.13rc7" -CVE_STATUS[CVE-2022-34494] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47110] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-34495] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47111] = "fixed-version: Fixed from version 5.13rc6" -CVE_STATUS[CVE-2022-34918] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2021-47112] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-3521] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47113] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3522] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47114] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3523] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47116] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3524] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47117] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3526] = "fixed-version: Fixed from version 5.18rc3" +CVE_STATUS[CVE-2021-47118] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3531] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2021-47119] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3532] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2021-47120] = "fixed-version: Fixed from version 5.13rc5" -# CVE-2022-3533 has no known resolution +CVE_STATUS[CVE-2021-47121] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3534] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2021-47122] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3535] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47123] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-3541] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47124] = "fixed-version: Fixed from version 5.13rc2" -CVE_STATUS[CVE-2022-3542] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47125] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3543] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47126] = "fixed-version: Fixed from version 5.13rc5" -# CVE-2022-3544 has no known resolution +CVE_STATUS[CVE-2021-47127] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3545] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47128] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3564] = "fixed-version: Fixed from version 6.1rc4" +CVE_STATUS[CVE-2021-47129] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3565] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47130] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3566] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47131] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3567] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47132] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3577] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47133] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3586] = "fixed-version: Fixed from version 6.0rc5" +CVE_STATUS[CVE-2021-47134] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3594] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47135] = "fixed-version: Fixed from version 5.13rc5" -CVE_STATUS[CVE-2022-3595] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47136] = "fixed-version: Fixed from version 5.13rc4" -# CVE-2022-3606 has no known resolution +CVE_STATUS[CVE-2021-47137] = "fixed-version: Fixed from version 5.13rc4" -CVE_STATUS[CVE-2022-36123] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2021-47138] = "fixed-version: Fixed from version 5.13rc4" -CVE_STATUS[CVE-2022-3619] = "fixed-version: Fixed from version 6.1rc4" +CVE_STATUS[CVE-2021-47139] = "fixed-version: Fixed from version 5.13rc4" -CVE_STATUS[CVE-2022-3621] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47140] = "fixed-version: Fixed from version 5.13rc4" -CVE_STATUS[CVE-2022-3623] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2021-47141] = "fixed-version: Fixed from version 5.13rc4" -CVE_STATUS[CVE-2022-3624] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47142] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3625] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47143] = "fixed-version: Fixed from version 5.13rc4" -CVE_STATUS[CVE-2022-3628] = "fixed-version: Fixed from version 6.1rc5" +CVE_STATUS[CVE-2021-47144] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-36280] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2021-47145] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3629] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47146] = "fixed-version: Fixed from version 5.13rc4" -CVE_STATUS[CVE-2022-3630] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47147] = "fixed-version: Fixed from version 5.13rc4" -CVE_STATUS[CVE-2022-3633] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47148] = "fixed-version: Fixed from version 5.13rc4" -CVE_STATUS[CVE-2022-3635] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2021-47149] = "fixed-version: Fixed from version 5.13rc3" -CVE_STATUS[CVE-2022-3636] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2021-47150] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47151] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47152] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47153] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47158] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47159] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47160] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47161] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47162] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47163] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47164] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47165] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47166] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47167] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47168] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47169] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47170] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47171] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47172] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47173] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47174] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47175] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47176] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47177] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47178] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47179] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-47180] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2022-0001] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-0002] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-0168] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-0171] = "fixed-version: Fixed from version 5.18rc4" + +CVE_STATUS[CVE-2022-0185] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-0264] = "fixed-version: Fixed from version 5.16rc6" + +CVE_STATUS[CVE-2022-0286] = "fixed-version: Fixed from version 5.14rc2" + +CVE_STATUS[CVE-2022-0322] = "fixed-version: Fixed from version 5.15rc6" + +CVE_STATUS[CVE-2022-0330] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-0382] = "fixed-version: Fixed from version 5.16" + +# CVE-2022-0400 has no known resolution + +CVE_STATUS[CVE-2022-0433] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-0435] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2022-0480] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2022-0487] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2022-0492] = "fixed-version: Fixed from version 5.17rc3" + +CVE_STATUS[CVE-2022-0494] = "fixed-version: Fixed from version 5.17rc5" + +CVE_STATUS[CVE-2022-0500] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-0516] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2022-0617] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-0644] = "fixed-version: Fixed from version 5.15rc7" + +CVE_STATUS[CVE-2022-0646] = "fixed-version: Fixed from version 5.17rc5" + +CVE_STATUS[CVE-2022-0742] = "fixed-version: Fixed from version 5.17rc7" + +CVE_STATUS[CVE-2022-0812] = "fixed-version: Fixed from version 5.8rc6" + +CVE_STATUS[CVE-2022-0847] = "fixed-version: Fixed from version 5.17rc6" + +CVE_STATUS[CVE-2022-0850] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2022-0854] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-0995] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-0998] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-1011] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-1012] = "fixed-version: Fixed from version 5.18rc6" + +CVE_STATUS[CVE-2022-1015] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1016] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1043] = "fixed-version: Fixed from version 5.14rc7" + +CVE_STATUS[CVE-2022-1048] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1055] = "fixed-version: Fixed from version 5.17rc3" + +# CVE-2022-1116 has no known resolution + +CVE_STATUS[CVE-2022-1158] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1184] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-1195] = "fixed-version: Fixed from version 5.16rc7" + +CVE_STATUS[CVE-2022-1198] = "fixed-version: Fixed from version 5.17rc6" + +CVE_STATUS[CVE-2022-1199] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-1204] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1205] = "fixed-version: Fixed from version 5.18rc1" + +# CVE-2022-1247 has no known resolution + +CVE_STATUS[CVE-2022-1263] = "fixed-version: Fixed from version 5.18rc3" + +CVE_STATUS[CVE-2022-1280] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2022-1353] = "fixed-version: Fixed from version 5.17" + +CVE_STATUS[CVE-2022-1419] = "fixed-version: Fixed from version 5.6rc2" + +CVE_STATUS[CVE-2022-1462] = "fixed-version: Fixed from version 5.19rc7" + +CVE_STATUS[CVE-2022-1508] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2022-1516] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1651] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1652] = "fixed-version: Fixed from version 5.18rc6" + +CVE_STATUS[CVE-2022-1671] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1678] = "fixed-version: Fixed from version 4.20rc1" + +CVE_STATUS[CVE-2022-1679] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-1729] = "fixed-version: Fixed from version 5.18" + +CVE_STATUS[CVE-2022-1734] = "fixed-version: Fixed from version 5.18rc6" + +CVE_STATUS[CVE-2022-1786] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2022-1789] = "fixed-version: Fixed from version 5.18" + +CVE_STATUS[CVE-2022-1836] = "fixed-version: Fixed from version 5.18rc5" + +CVE_STATUS[CVE-2022-1852] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-1882] = "fixed-version: Fixed from version 5.19rc8" + +CVE_STATUS[CVE-2022-1943] = "fixed-version: Fixed from version 5.18rc7" + +CVE_STATUS[CVE-2022-1966] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-1972] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-1973] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-1974] = "fixed-version: Fixed from version 5.18rc6" + +CVE_STATUS[CVE-2022-1975] = "fixed-version: Fixed from version 5.18rc6" + +CVE_STATUS[CVE-2022-1976] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-1998] = "fixed-version: Fixed from version 5.17rc3" + +CVE_STATUS[CVE-2022-20008] = "fixed-version: Fixed from version 5.17rc5" + +CVE_STATUS[CVE-2022-20132] = "fixed-version: Fixed from version 5.16rc5" + +CVE_STATUS[CVE-2022-20141] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2022-20148] = "fixed-version: Fixed from version 5.16rc1" + +CVE_STATUS[CVE-2022-20153] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2022-20154] = "fixed-version: Fixed from version 5.16rc8" + +CVE_STATUS[CVE-2022-20158] = "fixed-version: Fixed from version 5.17" + +CVE_STATUS[CVE-2022-20166] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2022-20368] = "fixed-version: Fixed from version 5.17" + +CVE_STATUS[CVE-2022-20369] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-20409] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2022-20421] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2022-20422] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-20423] = "fixed-version: Fixed from version 5.17" + +CVE_STATUS[CVE-2022-20424] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2022-20565] = "fixed-version: Fixed from version 5.9rc4" + +CVE_STATUS[CVE-2022-20566] = "fixed-version: Fixed from version 5.19" + +CVE_STATUS[CVE-2022-20567] = "fixed-version: Fixed from version 4.16rc5" + +CVE_STATUS[CVE-2022-20568] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2022-20572] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-2078] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-21123] = "fixed-version: Fixed from version 5.19rc3" + +CVE_STATUS[CVE-2022-21125] = "fixed-version: Fixed from version 5.19rc3" + +CVE_STATUS[CVE-2022-21166] = "fixed-version: Fixed from version 5.19rc3" + +CVE_STATUS[CVE-2022-21385] = "fixed-version: Fixed from version 4.20" + +CVE_STATUS[CVE-2022-21499] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-21505] = "fixed-version: Fixed from version 5.19rc8" + +CVE_STATUS[CVE-2022-2153] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-2196] = "fixed-version: Fixed from version 6.2rc1" + +# CVE-2022-2209 has no known resolution + +CVE_STATUS[CVE-2022-22942] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-23036] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-23037] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-23038] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-23039] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-23040] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-23041] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-23042] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-2308] = "fixed-version: Fixed from version 6.0" + +CVE_STATUS[CVE-2022-2318] = "fixed-version: Fixed from version 5.19rc5" + +CVE_STATUS[CVE-2022-23222] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-2327] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2022-2380] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-23816] = "fixed-version: Fixed from version 5.19rc7" + +# CVE-2022-23825 has no known resolution + +CVE_STATUS[CVE-2022-23960] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-24122] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-24448] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-24958] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-24959] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-2503] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-25258] = "fixed-version: Fixed from version 5.17rc4" + +# CVE-2022-25265 has no known resolution + +CVE_STATUS[CVE-2022-25375] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2022-25636] = "fixed-version: Fixed from version 5.17rc6" + +CVE_STATUS[CVE-2022-2585] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-2586] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-2588] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-2590] = "fixed-version: Fixed from version 6.0rc3" + +CVE_STATUS[CVE-2022-2602] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-26365] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-26373] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-2639] = "fixed-version: Fixed from version 5.18rc4" + +CVE_STATUS[CVE-2022-26490] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-2663] = "fixed-version: Fixed from version 6.0rc5" + +# CVE-2022-26878 has no known resolution + +CVE_STATUS[CVE-2022-26966] = "fixed-version: Fixed from version 5.17rc6" + +CVE_STATUS[CVE-2022-27223] = "fixed-version: Fixed from version 5.17rc6" + +CVE_STATUS[CVE-2022-27666] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-27672] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-2785] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-27950] = "fixed-version: Fixed from version 5.17rc5" + +CVE_STATUS[CVE-2022-28356] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-28388] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-28389] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-28390] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-2873] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-28796] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-28893] = "fixed-version: Fixed from version 5.18rc2" + +CVE_STATUS[CVE-2022-2905] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2022-29156] = "fixed-version: Fixed from version 5.17rc6" + +CVE_STATUS[CVE-2022-2938] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-29581] = "fixed-version: Fixed from version 5.18rc4" + +CVE_STATUS[CVE-2022-29582] = "fixed-version: Fixed from version 5.18rc2" + +CVE_STATUS[CVE-2022-2959] = "fixed-version: Fixed from version 5.19rc1" + +# CVE-2022-2961 has no known resolution + +CVE_STATUS[CVE-2022-2964] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2022-2977] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-2978] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-29900] = "fixed-version: Fixed from version 5.19rc7" + +CVE_STATUS[CVE-2022-29901] = "fixed-version: Fixed from version 5.19rc7" + +CVE_STATUS[CVE-2022-2991] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2022-29968] = "fixed-version: Fixed from version 5.18rc5" + +CVE_STATUS[CVE-2022-3028] = "fixed-version: Fixed from version 6.0rc3" + +CVE_STATUS[CVE-2022-30594] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-3061] = "fixed-version: Fixed from version 5.18rc5" + +CVE_STATUS[CVE-2022-3077] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3078] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-3103] = "fixed-version: Fixed from version 6.0rc3" + +CVE_STATUS[CVE-2022-3104] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3105] = "fixed-version: Fixed from version 5.16" + +CVE_STATUS[CVE-2022-3106] = "fixed-version: Fixed from version 5.16rc6" + +CVE_STATUS[CVE-2022-3107] = "fixed-version: Fixed from version 5.17" + +CVE_STATUS[CVE-2022-3108] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-3110] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3111] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-3112] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-3113] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-3114] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3115] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3169] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3170] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2022-3176] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-3202] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-32250] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-32296] = "fixed-version: Fixed from version 5.18rc6" + +# CVE-2022-3238 has no known resolution + +CVE_STATUS[CVE-2022-3239] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-32981] = "fixed-version: Fixed from version 5.19rc2" + +CVE_STATUS[CVE-2022-3303] = "fixed-version: Fixed from version 6.0rc5" + +CVE_STATUS[CVE-2022-3344] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2022-33740] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-33741] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-33742] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-33743] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-33744] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-33981] = "fixed-version: Fixed from version 5.18rc5" + +CVE_STATUS[CVE-2022-3424] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-3435] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-34494] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-34495] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-34918] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-3521] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3522] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3523] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3524] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3526] = "fixed-version: Fixed from version 5.18rc3" + +CVE_STATUS[CVE-2022-3531] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-3532] = "fixed-version: Fixed from version 6.2rc1" + +# CVE-2022-3533 has no known resolution + +CVE_STATUS[CVE-2022-3534] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-3535] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3541] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3542] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3543] = "fixed-version: Fixed from version 6.1rc1" + +# CVE-2022-3544 has no known resolution + +CVE_STATUS[CVE-2022-3545] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3564] = "fixed-version: Fixed from version 6.1rc4" + +CVE_STATUS[CVE-2022-3565] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3566] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3567] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3577] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3586] = "fixed-version: Fixed from version 6.0rc5" + +CVE_STATUS[CVE-2022-3594] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3595] = "fixed-version: Fixed from version 6.1rc1" + +# CVE-2022-3606 has no known resolution + +CVE_STATUS[CVE-2022-36123] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-3619] = "fixed-version: Fixed from version 6.1rc4" + +CVE_STATUS[CVE-2022-3621] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3623] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3624] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3625] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3628] = "fixed-version: Fixed from version 6.1rc5" + +CVE_STATUS[CVE-2022-36280] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-3629] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3630] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3633] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3635] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3636] = "fixed-version: Fixed from version 5.19rc1" CVE_STATUS[CVE-2022-3640] = "fixed-version: Fixed from version 6.1rc4" -CVE_STATUS[CVE-2022-36402] = "fixed-version: Fixed from version 6.5" +CVE_STATUS[CVE-2022-36402] = "fixed-version: Fixed from version 6.5" + +# CVE-2022-3642 has no known resolution + +CVE_STATUS[CVE-2022-3643] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-3646] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3649] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-36879] = "fixed-version: Fixed from version 5.19rc8" + +CVE_STATUS[CVE-2022-36946] = "fixed-version: Fixed from version 5.19" + +CVE_STATUS[CVE-2022-3707] = "fixed-version: Fixed from version 6.2rc3" + +# CVE-2022-38096 has no known resolution + +CVE_STATUS[CVE-2022-38457] = "fixed-version: Fixed from version 6.2rc4" + +CVE_STATUS[CVE-2022-3903] = "fixed-version: Fixed from version 6.1rc2" + +CVE_STATUS[CVE-2022-3910] = "fixed-version: Fixed from version 6.0rc6" + +CVE_STATUS[CVE-2022-39188] = "fixed-version: Fixed from version 5.19rc8" + +CVE_STATUS[CVE-2022-39189] = "fixed-version: Fixed from version 5.19rc2" + +CVE_STATUS[CVE-2022-39190] = "fixed-version: Fixed from version 6.0rc3" + +CVE_STATUS[CVE-2022-3977] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-39842] = "fixed-version: Fixed from version 5.19rc4" + +CVE_STATUS[CVE-2022-40133] = "fixed-version: Fixed from version 6.2rc4" + +CVE_STATUS[CVE-2022-40307] = "fixed-version: Fixed from version 6.0rc5" + +CVE_STATUS[CVE-2022-40476] = "fixed-version: Fixed from version 5.19rc4" + +CVE_STATUS[CVE-2022-40768] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-4095] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2022-40982] = "fixed-version: Fixed from version 6.5rc6" + +CVE_STATUS[CVE-2022-41218] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-41222] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2022-4127] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-4128] = "fixed-version: Fixed from version 5.19rc7" + +CVE_STATUS[CVE-2022-4129] = "fixed-version: Fixed from version 6.1rc6" + +CVE_STATUS[CVE-2022-4139] = "fixed-version: Fixed from version 6.1rc8" + +CVE_STATUS[CVE-2022-41674] = "fixed-version: Fixed from version 6.1rc1" + +# CVE-2022-41848 has no known resolution + +CVE_STATUS[CVE-2022-41849] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-41850] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-41858] = "fixed-version: Fixed from version 5.18rc2" + +CVE_STATUS[CVE-2022-42328] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-42329] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-42432] = "fixed-version: Fixed from version 6.0rc7" + +CVE_STATUS[CVE-2022-4269] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2022-42703] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2022-42719] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-42720] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-42721] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-42722] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-42895] = "fixed-version: Fixed from version 6.1rc4" + +CVE_STATUS[CVE-2022-42896] = "fixed-version: Fixed from version 6.1rc4" + +CVE_STATUS[CVE-2022-43750] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-4378] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-4379] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-4382] = "fixed-version: Fixed from version 6.2rc5" + +CVE_STATUS[CVE-2022-43945] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-44032] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2022-44033] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2022-44034] = "fixed-version: Fixed from version 6.4rc1" + +# CVE-2022-4543 has no known resolution + +CVE_STATUS[CVE-2022-45869] = "fixed-version: Fixed from version 6.1rc7" + +# CVE-2022-45884 has no known resolution + +# CVE-2022-45885 has no known resolution + +CVE_STATUS[CVE-2022-45886] = "fixed-version: Fixed from version 6.4rc3" + +CVE_STATUS[CVE-2022-45887] = "fixed-version: Fixed from version 6.4rc3" + +CVE_STATUS[CVE-2022-45888] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-45919] = "fixed-version: Fixed from version 6.4rc3" + +CVE_STATUS[CVE-2022-45934] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-4662] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2022-4696] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2022-4744] = "fixed-version: Fixed from version 5.16rc7" + +CVE_STATUS[CVE-2022-47518] = "fixed-version: Fixed from version 6.1rc8" + +CVE_STATUS[CVE-2022-47519] = "fixed-version: Fixed from version 6.1rc8" + +CVE_STATUS[CVE-2022-47520] = "fixed-version: Fixed from version 6.1rc8" + +CVE_STATUS[CVE-2022-47521] = "fixed-version: Fixed from version 6.1rc8" + +CVE_STATUS[CVE-2022-47929] = "fixed-version: Fixed from version 6.2rc4" + +CVE_STATUS[CVE-2022-47938] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-47939] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-47940] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-47941] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-47942] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-47943] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-47946] = "fixed-version: Fixed from version 5.12rc2" + +CVE_STATUS[CVE-2022-4842] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-48423] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-48424] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-48425] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2022-48502] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-48619] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-48626] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2022-48627] = "fixed-version: Fixed from version 5.19rc7" + +CVE_STATUS[CVE-2022-48628] = "fixed-version: Fixed from version 6.6rc1" + +CVE_STATUS[CVE-2022-48629] = "fixed-version: Fixed from version 5.17" + +CVE_STATUS[CVE-2022-48630] = "fixed-version: Fixed from version 5.18" + +CVE_STATUS[CVE-2023-0030] = "fixed-version: Fixed from version 5.0rc1" + +CVE_STATUS[CVE-2023-0045] = "fixed-version: Fixed from version 6.2rc3" + +CVE_STATUS[CVE-2023-0047] = "fixed-version: Fixed from version 5.16rc1" + +CVE_STATUS[CVE-2023-0122] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2023-0160] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-0179] = "fixed-version: Fixed from version 6.2rc5" + +CVE_STATUS[CVE-2023-0210] = "fixed-version: Fixed from version 6.2rc4" + +CVE_STATUS[CVE-2023-0240] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2023-0266] = "fixed-version: Fixed from version 6.2rc4" + +CVE_STATUS[CVE-2023-0386] = "fixed-version: Fixed from version 6.2rc6" + +CVE_STATUS[CVE-2023-0394] = "fixed-version: Fixed from version 6.2rc4" + +CVE_STATUS[CVE-2023-0458] = "fixed-version: Fixed from version 6.2rc5" + +CVE_STATUS[CVE-2023-0459] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-0461] = "fixed-version: Fixed from version 6.2rc3" + +CVE_STATUS[CVE-2023-0468] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2023-0469] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2023-0590] = "fixed-version: Fixed from version 6.1rc2" + +CVE_STATUS[CVE-2023-0597] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2023-0615] = "fixed-version: Fixed from version 6.1rc3" + +CVE_STATUS[CVE-2023-1032] = "fixed-version: Fixed from version 6.3rc2" + +CVE_STATUS[CVE-2023-1073] = "fixed-version: Fixed from version 6.2rc5" + +CVE_STATUS[CVE-2023-1074] = "fixed-version: Fixed from version 6.2rc6" + +CVE_STATUS[CVE-2023-1075] = "fixed-version: Fixed from version 6.2rc7" + +CVE_STATUS[CVE-2023-1076] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-1077] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-1078] = "fixed-version: Fixed from version 6.2rc8" + +CVE_STATUS[CVE-2023-1079] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-1095] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2023-1118] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-1192] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-1193] = "fixed-version: Fixed from version 6.3rc6" + +CVE_STATUS[CVE-2023-1194] = "fixed-version: Fixed from version 6.4rc6" + +CVE_STATUS[CVE-2023-1195] = "fixed-version: Fixed from version 6.1rc3" + +CVE_STATUS[CVE-2023-1206] = "fixed-version: Fixed from version 6.5rc4" + +CVE_STATUS[CVE-2023-1249] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2023-1252] = "fixed-version: Fixed from version 5.16rc1" + +CVE_STATUS[CVE-2023-1281] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-1295] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2023-1380] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-1382] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2023-1390] = "fixed-version: Fixed from version 5.11rc4" + +# CVE-2023-1476 has no known resolution + +CVE_STATUS[CVE-2023-1513] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-1582] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2023-1583] = "fixed-version: Fixed from version 6.3rc4" + +CVE_STATUS[CVE-2023-1611] = "fixed-version: Fixed from version 6.3rc5" + +CVE_STATUS[CVE-2023-1637] = "fixed-version: Fixed from version 5.18rc2" + +CVE_STATUS[CVE-2023-1652] = "fixed-version: Fixed from version 6.2rc5" + +CVE_STATUS[CVE-2023-1670] = "fixed-version: Fixed from version 6.3rc4" + +CVE_STATUS[CVE-2023-1829] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-1838] = "fixed-version: Fixed from version 5.18" + +CVE_STATUS[CVE-2023-1855] = "fixed-version: Fixed from version 6.3rc3" + +CVE_STATUS[CVE-2023-1859] = "fixed-version: Fixed from version 6.3rc7" + +CVE_STATUS[CVE-2023-1872] = "fixed-version: Fixed from version 5.18rc2" + +CVE_STATUS[CVE-2023-1989] = "fixed-version: Fixed from version 6.3rc4" + +CVE_STATUS[CVE-2023-1990] = "fixed-version: Fixed from version 6.3rc3" + +CVE_STATUS[CVE-2023-1998] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-2002] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-2006] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2023-2007] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2023-2008] = "fixed-version: Fixed from version 5.19rc4" + +CVE_STATUS[CVE-2023-2019] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2023-20569] = "fixed-version: Fixed from version 6.5rc6" + +CVE_STATUS[CVE-2023-20588] = "fixed-version: Fixed from version 6.5rc6" + +CVE_STATUS[CVE-2023-20593] = "fixed-version: Fixed from version 6.5rc4" + +CVE_STATUS[CVE-2023-20928] = "fixed-version: Fixed from version 6.0rc1" + +# CVE-2023-20937 has no known resolution + +CVE_STATUS[CVE-2023-20938] = "fixed-version: Fixed from version 5.18rc5" + +# CVE-2023-20941 has no known resolution + +CVE_STATUS[CVE-2023-21102] = "fixed-version: Fixed from version 6.2rc4" + +CVE_STATUS[CVE-2023-21106] = "fixed-version: Fixed from version 6.2rc5" + +CVE_STATUS[CVE-2023-2124] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-21255] = "fixed-version: Fixed from version 6.4rc4" + +CVE_STATUS[CVE-2023-21264] = "fixed-version: Fixed from version 6.4rc5" + +# CVE-2023-21400 has no known resolution + +CVE_STATUS[CVE-2023-2156] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-2162] = "fixed-version: Fixed from version 6.2rc6" + +CVE_STATUS[CVE-2023-2163] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-2166] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2023-2176] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-2177] = "fixed-version: Fixed from version 5.19" + +CVE_STATUS[CVE-2023-2194] = "fixed-version: Fixed from version 6.3rc4" + +CVE_STATUS[CVE-2023-2235] = "fixed-version: Fixed from version 6.3rc3" + +CVE_STATUS[CVE-2023-2236] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2023-2248] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-2269] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-22995] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2023-22996] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2023-22997] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2023-22998] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2023-22999] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2023-23000] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2023-23001] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2023-23002] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2023-23003] = "fixed-version: Fixed from version 5.16rc6" + +CVE_STATUS[CVE-2023-23004] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2023-23005] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2023-23006] = "fixed-version: Fixed from version 5.16rc8" + +# CVE-2023-23039 has no known resolution + +CVE_STATUS[CVE-2023-23454] = "fixed-version: Fixed from version 6.2rc3" + +CVE_STATUS[CVE-2023-23455] = "fixed-version: Fixed from version 6.2rc3" + +CVE_STATUS[CVE-2023-23559] = "fixed-version: Fixed from version 6.2rc5" + +CVE_STATUS[CVE-2023-23586] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2023-2430] = "fixed-version: Fixed from version 6.2rc5" + +CVE_STATUS[CVE-2023-2483] = "fixed-version: Fixed from version 6.3rc4" + +CVE_STATUS[CVE-2023-25012] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-2513] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2023-25775] = "fixed-version: Fixed from version 6.6rc1" + +CVE_STATUS[CVE-2023-2598] = "fixed-version: Fixed from version 6.4rc1" + +# CVE-2023-26242 has no known resolution + +# CVE-2023-2640 has no known resolution + +CVE_STATUS[CVE-2023-26544] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2023-26545] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-26605] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2023-26606] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2023-26607] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2023-28327] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2023-28328] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2023-28410] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2023-28464] = "fixed-version: Fixed from version 6.3rc7" + +CVE_STATUS[CVE-2023-28466] = "fixed-version: Fixed from version 6.3rc2" + +CVE_STATUS[CVE-2023-2860] = "fixed-version: Fixed from version 6.0rc5" + +CVE_STATUS[CVE-2023-28746] = "cpe-stable-backport: Backported in 6.6.22" + +CVE_STATUS[CVE-2023-28772] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2023-28866] = "fixed-version: Fixed from version 6.3rc4" + +CVE_STATUS[CVE-2023-2898] = "fixed-version: Fixed from version 6.5rc1" + +CVE_STATUS[CVE-2023-2985] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-3006] = "fixed-version: Fixed from version 6.1rc1" + +# Skipping CVE-2023-3022, no affected_versions + +CVE_STATUS[CVE-2023-30456] = "fixed-version: Fixed from version 6.3rc3" + +CVE_STATUS[CVE-2023-30772] = "fixed-version: Fixed from version 6.3rc4" + +CVE_STATUS[CVE-2023-3090] = "fixed-version: Fixed from version 6.4rc2" + +CVE_STATUS[CVE-2023-3106] = "fixed-version: Fixed from version 4.8rc7" + +# Skipping CVE-2023-3108, no affected_versions + +# CVE-2023-31081 has no known resolution + +# CVE-2023-31082 has no known resolution + +CVE_STATUS[CVE-2023-31083] = "fixed-version: Fixed from version 6.6rc1" + +CVE_STATUS[CVE-2023-31084] = "fixed-version: Fixed from version 6.4rc3" + +CVE_STATUS[CVE-2023-31085] = "fixed-version: Fixed from version 6.6rc5" + +CVE_STATUS[CVE-2023-3111] = "fixed-version: Fixed from version 6.0rc2" + +CVE_STATUS[CVE-2023-3117] = "fixed-version: Fixed from version 6.4rc7" + +CVE_STATUS[CVE-2023-31248] = "fixed-version: Fixed from version 6.5rc2" + +CVE_STATUS[CVE-2023-3141] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-31436] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-3159] = "fixed-version: Fixed from version 5.18rc6" + +CVE_STATUS[CVE-2023-3161] = "fixed-version: Fixed from version 6.2rc7" + +CVE_STATUS[CVE-2023-3212] = "fixed-version: Fixed from version 6.4rc2" + +CVE_STATUS[CVE-2023-3220] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-32233] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-32247] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-32248] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-32250] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-32252] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-32254] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-32257] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-32258] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-32269] = "fixed-version: Fixed from version 6.2rc7" + +# CVE-2023-32629 has no known resolution + +CVE_STATUS[CVE-2023-3268] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-3269] = "fixed-version: Fixed from version 6.5rc1" + +CVE_STATUS[CVE-2023-3312] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-3317] = "fixed-version: Fixed from version 6.3rc6" + +CVE_STATUS[CVE-2023-33203] = "fixed-version: Fixed from version 6.3rc4" + +CVE_STATUS[CVE-2023-33250] = "fixed-version: Fixed from version 6.5rc1" + +CVE_STATUS[CVE-2023-33288] = "fixed-version: Fixed from version 6.3rc4" + +CVE_STATUS[CVE-2023-3338] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2023-3355] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-3357] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2023-3358] = "fixed-version: Fixed from version 6.2rc5" + +CVE_STATUS[CVE-2023-3359] = "fixed-version: Fixed from version 6.2rc7" + +CVE_STATUS[CVE-2023-3389] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2023-3390] = "fixed-version: Fixed from version 6.4rc7" + +CVE_STATUS[CVE-2023-33951] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-33952] = "fixed-version: Fixed from version 6.4rc1" + +# CVE-2023-3397 has no known resolution + +CVE_STATUS[CVE-2023-34255] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-34256] = "fixed-version: Fixed from version 6.4rc2" + +CVE_STATUS[CVE-2023-34319] = "fixed-version: Fixed from version 6.5rc6" + +CVE_STATUS[CVE-2023-34324] = "fixed-version: Fixed from version 6.6rc6" -# CVE-2022-3642 has no known resolution +CVE_STATUS[CVE-2023-3439] = "fixed-version: Fixed from version 5.18rc5" -CVE_STATUS[CVE-2022-3643] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2023-35001] = "fixed-version: Fixed from version 6.5rc2" -CVE_STATUS[CVE-2022-3646] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-3567] = "fixed-version: Fixed from version 6.2rc7" -CVE_STATUS[CVE-2022-3649] = "fixed-version: Fixed from version 6.1rc1" +# CVE-2023-35693 has no known resolution -CVE_STATUS[CVE-2022-36879] = "fixed-version: Fixed from version 5.19rc8" +CVE_STATUS[CVE-2023-35788] = "fixed-version: Fixed from version 6.4rc5" -CVE_STATUS[CVE-2022-36946] = "fixed-version: Fixed from version 5.19" +CVE_STATUS[CVE-2023-35823] = "fixed-version: Fixed from version 6.4rc1" -CVE_STATUS[CVE-2022-3707] = "fixed-version: Fixed from version 6.2rc3" +CVE_STATUS[CVE-2023-35824] = "fixed-version: Fixed from version 6.4rc1" -# CVE-2022-38096 has no known resolution +CVE_STATUS[CVE-2023-35826] = "fixed-version: Fixed from version 6.4rc1" -CVE_STATUS[CVE-2022-38457] = "fixed-version: Fixed from version 6.2rc4" +CVE_STATUS[CVE-2023-35827] = "fixed-version: Fixed from version 6.6rc6" -CVE_STATUS[CVE-2022-3903] = "fixed-version: Fixed from version 6.1rc2" +CVE_STATUS[CVE-2023-35828] = "fixed-version: Fixed from version 6.4rc1" -CVE_STATUS[CVE-2022-3910] = "fixed-version: Fixed from version 6.0rc6" +CVE_STATUS[CVE-2023-35829] = "fixed-version: Fixed from version 6.4rc1" -CVE_STATUS[CVE-2022-39188] = "fixed-version: Fixed from version 5.19rc8" +CVE_STATUS[CVE-2023-3609] = "fixed-version: Fixed from version 6.4rc7" -CVE_STATUS[CVE-2022-39189] = "fixed-version: Fixed from version 5.19rc2" +CVE_STATUS[CVE-2023-3610] = "fixed-version: Fixed from version 6.4" -CVE_STATUS[CVE-2022-39190] = "fixed-version: Fixed from version 6.0rc3" +CVE_STATUS[CVE-2023-3611] = "fixed-version: Fixed from version 6.5rc2" -CVE_STATUS[CVE-2022-3977] = "fixed-version: Fixed from version 6.1rc1" +# CVE-2023-3640 has no known resolution -CVE_STATUS[CVE-2022-39842] = "fixed-version: Fixed from version 5.19rc4" +CVE_STATUS[CVE-2023-37453] = "fixed-version: Fixed from version 6.6rc1" -CVE_STATUS[CVE-2022-40133] = "fixed-version: Fixed from version 6.2rc4" +# CVE-2023-37454 has no known resolution -CVE_STATUS[CVE-2022-40307] = "fixed-version: Fixed from version 6.0rc5" +CVE_STATUS[CVE-2023-3772] = "fixed-version: Fixed from version 6.5rc7" -CVE_STATUS[CVE-2022-40476] = "fixed-version: Fixed from version 5.19rc4" +CVE_STATUS[CVE-2023-3773] = "fixed-version: Fixed from version 6.5rc7" -CVE_STATUS[CVE-2022-40768] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-3776] = "fixed-version: Fixed from version 6.5rc2" -CVE_STATUS[CVE-2022-4095] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2023-3777] = "fixed-version: Fixed from version 6.5rc3" -CVE_STATUS[CVE-2022-40982] = "fixed-version: Fixed from version 6.5rc6" +CVE_STATUS[CVE-2023-3812] = "fixed-version: Fixed from version 6.1rc4" -CVE_STATUS[CVE-2022-41218] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2023-38409] = "fixed-version: Fixed from version 6.3rc7" -CVE_STATUS[CVE-2022-41222] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2023-38426] = "fixed-version: Fixed from version 6.4rc3" -CVE_STATUS[CVE-2022-4127] = "fixed-version: Fixed from version 5.19rc6" +CVE_STATUS[CVE-2023-38427] = "fixed-version: Fixed from version 6.4rc6" -CVE_STATUS[CVE-2022-4128] = "fixed-version: Fixed from version 5.19rc7" +CVE_STATUS[CVE-2023-38428] = "fixed-version: Fixed from version 6.4rc3" -CVE_STATUS[CVE-2022-4129] = "fixed-version: Fixed from version 6.1rc6" +CVE_STATUS[CVE-2023-38429] = "fixed-version: Fixed from version 6.4rc3" -CVE_STATUS[CVE-2022-4139] = "fixed-version: Fixed from version 6.1rc8" +CVE_STATUS[CVE-2023-38430] = "fixed-version: Fixed from version 6.4rc6" -CVE_STATUS[CVE-2022-41674] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-38431] = "fixed-version: Fixed from version 6.4rc6" -# CVE-2022-41848 has no known resolution +CVE_STATUS[CVE-2023-38432] = "fixed-version: Fixed from version 6.4" -CVE_STATUS[CVE-2022-41849] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-3863] = "fixed-version: Fixed from version 6.5rc1" -CVE_STATUS[CVE-2022-41850] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-3865] = "fixed-version: Fixed from version 6.4" -CVE_STATUS[CVE-2022-41858] = "fixed-version: Fixed from version 5.18rc2" +CVE_STATUS[CVE-2023-3866] = "fixed-version: Fixed from version 6.4" -CVE_STATUS[CVE-2022-42328] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2023-3867] = "fixed-version: Fixed from version 6.5rc1" -CVE_STATUS[CVE-2022-42329] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2023-39189] = "fixed-version: Fixed from version 6.6rc1" -CVE_STATUS[CVE-2022-42432] = "fixed-version: Fixed from version 6.0rc7" +CVE_STATUS[CVE-2023-39191] = "fixed-version: Fixed from version 6.3rc1" -CVE_STATUS[CVE-2022-4269] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2023-39192] = "fixed-version: Fixed from version 6.6rc1" -CVE_STATUS[CVE-2022-42703] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2023-39193] = "fixed-version: Fixed from version 6.6rc1" + +CVE_STATUS[CVE-2023-39194] = "fixed-version: Fixed from version 6.5rc7" + +CVE_STATUS[CVE-2023-39197] = "fixed-version: Fixed from version 6.5rc1" + +CVE_STATUS[CVE-2023-39198] = "fixed-version: Fixed from version 6.5rc7" + +CVE_STATUS[CVE-2023-4004] = "fixed-version: Fixed from version 6.5rc3" + +# CVE-2023-4010 has no known resolution + +CVE_STATUS[CVE-2023-4015] = "fixed-version: Fixed from version 6.5rc4" + +CVE_STATUS[CVE-2023-40283] = "fixed-version: Fixed from version 6.5rc1" + +CVE_STATUS[CVE-2023-40791] = "fixed-version: Fixed from version 6.5rc6" + +CVE_STATUS[CVE-2023-4128] = "fixed-version: Fixed from version 6.5rc5" + +CVE_STATUS[CVE-2023-4132] = "fixed-version: Fixed from version 6.5rc1" + +CVE_STATUS[CVE-2023-4133] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-4134] = "fixed-version: Fixed from version 6.5rc1" + +CVE_STATUS[CVE-2023-4147] = "fixed-version: Fixed from version 6.5rc4" + +CVE_STATUS[CVE-2023-4155] = "fixed-version: Fixed from version 6.5rc6" + +CVE_STATUS[CVE-2023-4194] = "fixed-version: Fixed from version 6.5rc5" + +CVE_STATUS[CVE-2023-4206] = "fixed-version: Fixed from version 6.5rc5" + +CVE_STATUS[CVE-2023-4207] = "fixed-version: Fixed from version 6.5rc5" + +CVE_STATUS[CVE-2023-4208] = "fixed-version: Fixed from version 6.5rc5" + +CVE_STATUS[CVE-2023-4244] = "fixed-version: Fixed from version 6.5rc7" + +CVE_STATUS[CVE-2023-4273] = "fixed-version: Fixed from version 6.5rc5" + +CVE_STATUS[CVE-2023-42752] = "fixed-version: Fixed from version 6.6rc1" + +CVE_STATUS[CVE-2023-42753] = "fixed-version: Fixed from version 6.6rc1" + +CVE_STATUS[CVE-2023-42754] = "fixed-version: Fixed from version 6.6rc3" + +CVE_STATUS[CVE-2023-42755] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-42756] = "fixed-version: Fixed from version 6.6rc3" + +CVE_STATUS[CVE-2023-4385] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2023-4387] = "fixed-version: Fixed from version 5.18" + +CVE_STATUS[CVE-2023-4389] = "fixed-version: Fixed from version 5.18rc3" + +CVE_STATUS[CVE-2023-4394] = "fixed-version: Fixed from version 6.0rc3" + +CVE_STATUS[CVE-2023-44466] = "fixed-version: Fixed from version 6.5rc2" + +CVE_STATUS[CVE-2023-4459] = "fixed-version: Fixed from version 5.18" + +CVE_STATUS[CVE-2023-4563] = "fixed-version: Fixed from version 6.5rc6" + +CVE_STATUS[CVE-2023-4569] = "fixed-version: Fixed from version 6.5rc7" + +CVE_STATUS[CVE-2023-45862] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-45863] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-45871] = "fixed-version: Fixed from version 6.6rc1" + +CVE_STATUS[CVE-2023-45898] = "fixed-version: Fixed from version 6.6rc1" + +CVE_STATUS[CVE-2023-4610] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-4611] = "fixed-version: Fixed from version 6.5rc4" + +CVE_STATUS[CVE-2023-4622] = "fixed-version: Fixed from version 6.5rc1" + +CVE_STATUS[CVE-2023-4623] = "fixed-version: Fixed from version 6.6rc1" + +CVE_STATUS[CVE-2023-46343] = "fixed-version: Fixed from version 6.6rc7" + +CVE_STATUS[CVE-2023-46813] = "fixed-version: Fixed from version 6.6rc7" + +CVE_STATUS[CVE-2023-46838] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-46862] = "fixed-version: Fixed from version 6.6" + +CVE_STATUS[CVE-2023-47233] = "cpe-stable-backport: Backported in 6.6.24" + +CVE_STATUS[CVE-2023-4732] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2023-4881] = "fixed-version: Fixed from version 6.6rc1" + +CVE_STATUS[CVE-2023-4921] = "fixed-version: Fixed from version 6.6rc1" + +CVE_STATUS[CVE-2023-50431] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-5090] = "fixed-version: Fixed from version 6.6rc7" + +CVE_STATUS[CVE-2023-51042] = "fixed-version: Fixed from version 6.5rc1" + +CVE_STATUS[CVE-2023-51043] = "fixed-version: Fixed from version 6.5rc3" + +CVE_STATUS[CVE-2023-5158] = "fixed-version: Fixed from version 6.6rc5" + +CVE_STATUS[CVE-2023-51779] = "cpe-stable-backport: Backported in 6.6.9" + +CVE_STATUS[CVE-2023-5178] = "fixed-version: Fixed from version 6.6rc7" + +CVE_STATUS[CVE-2023-51780] = "cpe-stable-backport: Backported in 6.6.8" + +CVE_STATUS[CVE-2023-51781] = "cpe-stable-backport: Backported in 6.6.8" + +CVE_STATUS[CVE-2023-51782] = "cpe-stable-backport: Backported in 6.6.8" + +CVE_STATUS[CVE-2023-5197] = "fixed-version: Fixed from version 6.6rc3" + +CVE_STATUS[CVE-2023-52340] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-52429] = "cpe-stable-backport: Backported in 6.6.18" + +CVE_STATUS[CVE-2023-52433] = "fixed-version: Fixed from version 6.6rc1" + +CVE_STATUS[CVE-2023-52434] = "cpe-stable-backport: Backported in 6.6.8" + +CVE_STATUS[CVE-2023-52435] = "cpe-stable-backport: Backported in 6.6.11" + +CVE_STATUS[CVE-2023-52436] = "cpe-stable-backport: Backported in 6.6.13" + +CVE_STATUS[CVE-2023-52438] = "cpe-stable-backport: Backported in 6.6.13" + +CVE_STATUS[CVE-2023-52439] = "cpe-stable-backport: Backported in 6.6.13" + +CVE_STATUS[CVE-2023-52440] = "fixed-version: Fixed from version 6.6rc1" + +CVE_STATUS[CVE-2023-52441] = "fixed-version: Fixed from version 6.5rc4" + +CVE_STATUS[CVE-2023-52442] = "fixed-version: Fixed from version 6.5rc4" + +CVE_STATUS[CVE-2023-52443] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-52444] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-52445] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-52446] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-52447] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-52448] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-52449] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-52450] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-52451] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-52452] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-52453] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-52454] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-52455] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-52456] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-52457] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-52458] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-52459] = "cpe-stable-backport: Backported in 6.6.14" + +CVE_STATUS[CVE-2023-52460] = "fixed-version: only affects 6.7rc1 onwards" + +CVE_STATUS[CVE-2023-52461] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2022-42719] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-52462] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2022-42720] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-52463] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2022-42721] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-52464] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2022-42722] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-52465] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2022-42895] = "fixed-version: Fixed from version 6.1rc4" +CVE_STATUS[CVE-2023-52467] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2022-42896] = "fixed-version: Fixed from version 6.1rc4" +CVE_STATUS[CVE-2023-52468] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2022-43750] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-52469] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2022-4378] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2023-52470] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2022-4379] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2023-52471] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2022-4382] = "fixed-version: Fixed from version 6.2rc5" +CVE_STATUS[CVE-2023-52472] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2022-43945] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-52473] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2022-44032] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2023-52474] = "fixed-version: Fixed from version 6.4rc1" -CVE_STATUS[CVE-2022-44033] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2023-52475] = "fixed-version: Fixed from version 6.6rc6" -CVE_STATUS[CVE-2022-44034] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2023-52476] = "fixed-version: Fixed from version 6.6rc6" -# CVE-2022-4543 has no known resolution +CVE_STATUS[CVE-2023-52477] = "fixed-version: Fixed from version 6.6rc6" -CVE_STATUS[CVE-2022-45869] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2023-52478] = "fixed-version: Fixed from version 6.6rc6" -# CVE-2022-45884 has no known resolution +CVE_STATUS[CVE-2023-52479] = "fixed-version: Fixed from version 6.6rc5" -# CVE-2022-45885 has no known resolution +CVE_STATUS[CVE-2023-52480] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2022-45886] = "fixed-version: Fixed from version 6.4rc3" +CVE_STATUS[CVE-2023-52481] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2022-45887] = "fixed-version: Fixed from version 6.4rc3" +CVE_STATUS[CVE-2023-52482] = "fixed-version: Fixed from version 6.6rc4" -CVE_STATUS[CVE-2022-45888] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2023-52483] = "fixed-version: Fixed from version 6.6rc6" -CVE_STATUS[CVE-2022-45919] = "fixed-version: Fixed from version 6.4rc3" +CVE_STATUS[CVE-2023-52484] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2022-45934] = "fixed-version: Fixed from version 6.1" +# CVE-2023-52485 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2022-4662] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2023-52486] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2022-4696] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2023-52487] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2022-4744] = "fixed-version: Fixed from version 5.16rc7" +CVE_STATUS[CVE-2023-52488] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2022-47518] = "fixed-version: Fixed from version 6.1rc8" +CVE_STATUS[CVE-2023-52489] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2022-47519] = "fixed-version: Fixed from version 6.1rc8" +CVE_STATUS[CVE-2023-52490] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2022-47520] = "fixed-version: Fixed from version 6.1rc8" +CVE_STATUS[CVE-2023-52491] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2022-47521] = "fixed-version: Fixed from version 6.1rc8" +CVE_STATUS[CVE-2023-52492] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2022-47929] = "fixed-version: Fixed from version 6.2rc4" +CVE_STATUS[CVE-2023-52493] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2022-47938] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52494] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2022-47939] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52495] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2022-47940] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2023-52497] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2022-47941] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52498] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2022-47942] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52499] = "fixed-version: Fixed from version 6.6rc6" -CVE_STATUS[CVE-2022-47943] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52500] = "fixed-version: Fixed from version 6.6rc2" -CVE_STATUS[CVE-2022-47946] = "fixed-version: Fixed from version 5.12rc2" +CVE_STATUS[CVE-2023-52501] = "fixed-version: Fixed from version 6.6rc2" -CVE_STATUS[CVE-2022-4842] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2023-52502] = "fixed-version: Fixed from version 6.6rc6" -CVE_STATUS[CVE-2022-48423] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2023-52503] = "fixed-version: Fixed from version 6.6rc6" -CVE_STATUS[CVE-2022-48424] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2023-52504] = "fixed-version: Fixed from version 6.6rc6" -CVE_STATUS[CVE-2022-48425] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2023-52505] = "fixed-version: Fixed from version 6.6rc6" -CVE_STATUS[CVE-2022-48502] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2023-52506] = "fixed-version: Fixed from version 6.6rc3" -CVE_STATUS[CVE-2022-48619] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2023-52507] = "fixed-version: Fixed from version 6.6rc6" -CVE_STATUS[CVE-2023-0030] = "fixed-version: Fixed from version 5.0rc1" +CVE_STATUS[CVE-2023-52508] = "fixed-version: Fixed from version 6.6rc2" -CVE_STATUS[CVE-2023-0045] = "fixed-version: Fixed from version 6.2rc3" +CVE_STATUS[CVE-2023-52509] = "fixed-version: Fixed from version 6.6rc6" -CVE_STATUS[CVE-2023-0047] = "fixed-version: Fixed from version 5.16rc1" +CVE_STATUS[CVE-2023-52510] = "fixed-version: Fixed from version 6.6rc6" -CVE_STATUS[CVE-2023-0122] = "fixed-version: Fixed from version 6.0rc4" +CVE_STATUS[CVE-2023-52511] = "fixed-version: Fixed from version 6.6rc1" -CVE_STATUS[CVE-2023-0160] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2023-52512] = "fixed-version: Fixed from version 6.6rc6" -CVE_STATUS[CVE-2023-0179] = "fixed-version: Fixed from version 6.2rc5" +CVE_STATUS[CVE-2023-52513] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2023-0210] = "fixed-version: Fixed from version 6.2rc4" +CVE_STATUS[CVE-2023-52515] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2023-0240] = "fixed-version: Fixed from version 5.10rc1" +CVE_STATUS[CVE-2023-52516] = "fixed-version: Fixed from version 6.6rc1" -CVE_STATUS[CVE-2023-0266] = "fixed-version: Fixed from version 6.2rc4" +CVE_STATUS[CVE-2023-52517] = "fixed-version: Fixed from version 6.6rc1" -CVE_STATUS[CVE-2023-0386] = "fixed-version: Fixed from version 6.2rc6" +CVE_STATUS[CVE-2023-52518] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2023-0394] = "fixed-version: Fixed from version 6.2rc4" +CVE_STATUS[CVE-2023-52519] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2023-0458] = "fixed-version: Fixed from version 6.2rc5" +CVE_STATUS[CVE-2023-52520] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2023-0459] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2023-52522] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2023-0461] = "fixed-version: Fixed from version 6.2rc3" +CVE_STATUS[CVE-2023-52523] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2023-0468] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2023-52524] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2023-0469] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2023-52525] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2023-0590] = "fixed-version: Fixed from version 6.1rc2" +CVE_STATUS[CVE-2023-52526] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2023-0597] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2023-52527] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2023-0615] = "fixed-version: Fixed from version 6.1rc3" +CVE_STATUS[CVE-2023-52528] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2023-1032] = "fixed-version: Fixed from version 6.3rc2" +CVE_STATUS[CVE-2023-52529] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2023-1073] = "fixed-version: Fixed from version 6.2rc5" +CVE_STATUS[CVE-2023-52530] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2023-1074] = "fixed-version: Fixed from version 6.2rc6" +CVE_STATUS[CVE-2023-52531] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2023-1075] = "fixed-version: Fixed from version 6.2rc7" +CVE_STATUS[CVE-2023-52532] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2023-1076] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2023-52559] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2023-1077] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2023-52560] = "fixed-version: Fixed from version 6.6rc4" -CVE_STATUS[CVE-2023-1078] = "fixed-version: Fixed from version 6.2rc8" +CVE_STATUS[CVE-2023-52561] = "fixed-version: Fixed from version 6.6rc1" -CVE_STATUS[CVE-2023-1079] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2023-52562] = "fixed-version: Fixed from version 6.6rc4" -CVE_STATUS[CVE-2023-1095] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52563] = "fixed-version: Fixed from version 6.6rc3" -CVE_STATUS[CVE-2023-1118] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2023-52564] = "fixed-version: Fixed from version 6.6rc4" -CVE_STATUS[CVE-2023-1192] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2023-52565] = "fixed-version: Fixed from version 6.6rc3" -CVE_STATUS[CVE-2023-1193] = "fixed-version: Fixed from version 6.3rc6" +CVE_STATUS[CVE-2023-52566] = "fixed-version: Fixed from version 6.6rc4" -CVE_STATUS[CVE-2023-1194] = "fixed-version: Fixed from version 6.4rc6" +CVE_STATUS[CVE-2023-52567] = "fixed-version: Fixed from version 6.6rc4" -CVE_STATUS[CVE-2023-1195] = "fixed-version: Fixed from version 6.1rc3" +CVE_STATUS[CVE-2023-52568] = "fixed-version: Fixed from version 6.6rc4" -CVE_STATUS[CVE-2023-1206] = "fixed-version: Fixed from version 6.5rc4" +CVE_STATUS[CVE-2023-52569] = "fixed-version: Fixed from version 6.6rc2" -CVE_STATUS[CVE-2023-1249] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2023-52570] = "fixed-version: Fixed from version 6.6rc4" -CVE_STATUS[CVE-2023-1252] = "fixed-version: Fixed from version 5.16rc1" +CVE_STATUS[CVE-2023-52571] = "fixed-version: Fixed from version 6.6rc4" -CVE_STATUS[CVE-2023-1281] = "fixed-version: Fixed from version 6.2" +CVE_STATUS[CVE-2023-52572] = "fixed-version: Fixed from version 6.6rc3" -CVE_STATUS[CVE-2023-1295] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2023-52573] = "fixed-version: Fixed from version 6.6rc3" -CVE_STATUS[CVE-2023-1380] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2023-52574] = "fixed-version: Fixed from version 6.6rc3" -CVE_STATUS[CVE-2023-1382] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2023-52575] = "fixed-version: Fixed from version 6.6rc3" -CVE_STATUS[CVE-2023-1390] = "fixed-version: Fixed from version 5.11rc4" +CVE_STATUS[CVE-2023-52576] = "fixed-version: Fixed from version 6.6rc3" -# CVE-2023-1476 has no known resolution +CVE_STATUS[CVE-2023-52577] = "fixed-version: Fixed from version 6.6rc3" -CVE_STATUS[CVE-2023-1513] = "fixed-version: Fixed from version 6.2" +CVE_STATUS[CVE-2023-52578] = "fixed-version: Fixed from version 6.6rc3" -CVE_STATUS[CVE-2023-1582] = "fixed-version: Fixed from version 5.17rc4" +CVE_STATUS[CVE-2023-52580] = "fixed-version: Fixed from version 6.6rc3" -CVE_STATUS[CVE-2023-1583] = "fixed-version: Fixed from version 6.3rc4" +CVE_STATUS[CVE-2023-52581] = "fixed-version: Fixed from version 6.6rc3" -CVE_STATUS[CVE-2023-1611] = "fixed-version: Fixed from version 6.3rc5" +CVE_STATUS[CVE-2023-52582] = "fixed-version: Fixed from version 6.6rc3" -CVE_STATUS[CVE-2023-1637] = "fixed-version: Fixed from version 5.18rc2" +CVE_STATUS[CVE-2023-52583] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-1652] = "fixed-version: Fixed from version 6.2rc5" +CVE_STATUS[CVE-2023-52584] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-1670] = "fixed-version: Fixed from version 6.3rc4" +# CVE-2023-52585 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-1829] = "fixed-version: Fixed from version 6.3rc1" +# CVE-2023-52586 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-1838] = "fixed-version: Fixed from version 5.18" +CVE_STATUS[CVE-2023-52587] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-1855] = "fixed-version: Fixed from version 6.3rc3" +CVE_STATUS[CVE-2023-52588] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-1859] = "fixed-version: Fixed from version 6.3rc7" +CVE_STATUS[CVE-2023-52589] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-1872] = "fixed-version: Fixed from version 5.18rc2" +# CVE-2023-52590 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-1989] = "fixed-version: Fixed from version 6.3rc4" +CVE_STATUS[CVE-2023-52591] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-1990] = "fixed-version: Fixed from version 6.3rc3" +CVE_STATUS[CVE-2023-52593] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-1998] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2023-52594] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-2002] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2023-52595] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-2006] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2023-52596] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-2007] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52597] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-2008] = "fixed-version: Fixed from version 5.19rc4" +CVE_STATUS[CVE-2023-52598] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-2019] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52599] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-20569] = "fixed-version: Fixed from version 6.5rc6" +CVE_STATUS[CVE-2023-52600] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-20588] = "fixed-version: Fixed from version 6.5rc6" +CVE_STATUS[CVE-2023-52601] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-20593] = "fixed-version: Fixed from version 6.5rc4" +CVE_STATUS[CVE-2023-52602] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-20928] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52603] = "cpe-stable-backport: Backported in 6.6.16" -# CVE-2023-20937 has no known resolution +CVE_STATUS[CVE-2023-52604] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-20938] = "fixed-version: Fixed from version 5.18rc5" +CVE_STATUS[CVE-2023-52606] = "cpe-stable-backport: Backported in 6.6.16" -# CVE-2023-20941 has no known resolution +CVE_STATUS[CVE-2023-52607] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-21102] = "fixed-version: Fixed from version 6.2rc4" +CVE_STATUS[CVE-2023-52608] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-21106] = "fixed-version: Fixed from version 6.2rc5" +CVE_STATUS[CVE-2023-52609] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-2124] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2023-52610] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-21255] = "fixed-version: Fixed from version 6.4rc4" +CVE_STATUS[CVE-2023-52611] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-21264] = "fixed-version: Fixed from version 6.4rc5" +CVE_STATUS[CVE-2023-52612] = "cpe-stable-backport: Backported in 6.6.14" -# CVE-2023-21400 has no known resolution +CVE_STATUS[CVE-2023-52613] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-2156] = "fixed-version: Fixed from version 6.3" +CVE_STATUS[CVE-2023-52614] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-2162] = "fixed-version: Fixed from version 6.2rc6" +CVE_STATUS[CVE-2023-52615] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-2163] = "fixed-version: Fixed from version 6.3" +CVE_STATUS[CVE-2023-52616] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-2166] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2023-52617] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-2176] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2023-52618] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-2177] = "fixed-version: Fixed from version 5.19" +CVE_STATUS[CVE-2023-52619] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-2194] = "fixed-version: Fixed from version 6.3rc4" +CVE_STATUS[CVE-2023-52620] = "fixed-version: Fixed from version 6.4" -CVE_STATUS[CVE-2023-2235] = "fixed-version: Fixed from version 6.3rc3" +CVE_STATUS[CVE-2023-52621] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-2236] = "fixed-version: Fixed from version 6.1rc7" +CVE_STATUS[CVE-2023-52622] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-2248] = "fixed-version: Fixed from version 6.3" +CVE_STATUS[CVE-2023-52623] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-2269] = "fixed-version: Fixed from version 6.4rc1" +# CVE-2023-52624 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-22995] = "fixed-version: Fixed from version 5.17rc1" +# CVE-2023-52625 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-22996] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2023-52626] = "fixed-version: only affects 6.7rc2 onwards" -CVE_STATUS[CVE-2023-22997] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2023-52627] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-22998] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-52628] = "fixed-version: Fixed from version 6.6rc1" -CVE_STATUS[CVE-2023-22999] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2023-52629] = "fixed-version: Fixed from version 6.6rc1" -CVE_STATUS[CVE-2023-23000] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2023-52630] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-23001] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2023-52631] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-23002] = "fixed-version: Fixed from version 5.17rc1" +CVE_STATUS[CVE-2023-52632] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-23003] = "fixed-version: Fixed from version 5.16rc6" +CVE_STATUS[CVE-2023-52633] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-23004] = "fixed-version: Fixed from version 5.19rc1" +# CVE-2023-52634 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-23005] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2023-52635] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-23006] = "fixed-version: Fixed from version 5.16rc8" +CVE_STATUS[CVE-2023-52636] = "cpe-stable-backport: Backported in 6.6.17" -# CVE-2023-23039 has no known resolution +CVE_STATUS[CVE-2023-52637] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-23454] = "fixed-version: Fixed from version 6.2rc3" +CVE_STATUS[CVE-2023-52638] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-23455] = "fixed-version: Fixed from version 6.2rc3" +CVE_STATUS[CVE-2023-52639] = "cpe-stable-backport: Backported in 6.6.22" -CVE_STATUS[CVE-2023-23559] = "fixed-version: Fixed from version 6.2rc5" +CVE_STATUS[CVE-2023-52640] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2023-23586] = "fixed-version: Fixed from version 5.12rc1" +CVE_STATUS[CVE-2023-52641] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2023-2430] = "fixed-version: Fixed from version 6.2rc5" +CVE_STATUS[CVE-2023-5345] = "fixed-version: Fixed from version 6.6rc4" -CVE_STATUS[CVE-2023-2483] = "fixed-version: Fixed from version 6.3rc4" +CVE_STATUS[CVE-2023-5633] = "fixed-version: Fixed from version 6.6rc6" -CVE_STATUS[CVE-2023-25012] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2023-5717] = "fixed-version: Fixed from version 6.6rc7" -CVE_STATUS[CVE-2023-2513] = "fixed-version: Fixed from version 6.0rc1" +CVE_STATUS[CVE-2023-5972] = "fixed-version: Fixed from version 6.6rc7" -CVE_STATUS[CVE-2023-25775] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2023-6039] = "fixed-version: Fixed from version 6.5rc5" -CVE_STATUS[CVE-2023-2598] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2023-6040] = "fixed-version: Fixed from version 5.18rc1" -# CVE-2023-26242 has no known resolution +CVE_STATUS[CVE-2023-6111] = "cpe-stable-backport: Backported in 6.6.3" -# CVE-2023-2640 has no known resolution +CVE_STATUS[CVE-2023-6121] = "cpe-stable-backport: Backported in 6.6.4" -CVE_STATUS[CVE-2023-26544] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2023-6176] = "fixed-version: Fixed from version 6.6rc2" -CVE_STATUS[CVE-2023-26545] = "fixed-version: Fixed from version 6.2" +CVE_STATUS[CVE-2023-6200] = "cpe-stable-backport: Backported in 6.6.9" -CVE_STATUS[CVE-2023-26605] = "fixed-version: Fixed from version 6.1rc7" +# CVE-2023-6238 has no known resolution -CVE_STATUS[CVE-2023-26606] = "fixed-version: Fixed from version 6.2rc1" +# CVE-2023-6240 has no known resolution -CVE_STATUS[CVE-2023-26607] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-6270] = "cpe-stable-backport: Backported in 6.6.23" -CVE_STATUS[CVE-2023-28327] = "fixed-version: Fixed from version 6.1" +CVE_STATUS[CVE-2023-6356] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-28328] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2023-6531] = "cpe-stable-backport: Backported in 6.6.7" -CVE_STATUS[CVE-2023-28410] = "fixed-version: Fixed from version 5.19rc1" +# CVE-2023-6535 has no known resolution -CVE_STATUS[CVE-2023-28464] = "fixed-version: Fixed from version 6.3rc7" +CVE_STATUS[CVE-2023-6536] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-28466] = "fixed-version: Fixed from version 6.3rc2" +CVE_STATUS[CVE-2023-6546] = "fixed-version: Fixed from version 6.5rc7" -CVE_STATUS[CVE-2023-2860] = "fixed-version: Fixed from version 6.0rc5" +CVE_STATUS[CVE-2023-6560] = "cpe-stable-backport: Backported in 6.6.5" -CVE_STATUS[CVE-2023-28772] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2023-6606] = "cpe-stable-backport: Backported in 6.6.9" -CVE_STATUS[CVE-2023-28866] = "fixed-version: Fixed from version 6.3rc4" +CVE_STATUS[CVE-2023-6610] = "cpe-stable-backport: Backported in 6.6.13" -CVE_STATUS[CVE-2023-2898] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2023-6622] = "cpe-stable-backport: Backported in 6.6.7" -CVE_STATUS[CVE-2023-2985] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2023-6679] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-3006] = "fixed-version: Fixed from version 6.1rc1" +CVE_STATUS[CVE-2023-6817] = "cpe-stable-backport: Backported in 6.6.7" -# Skipping CVE-2023-3022, no affected_versions +CVE_STATUS[CVE-2023-6915] = "cpe-stable-backport: Backported in 6.6.13" -CVE_STATUS[CVE-2023-30456] = "fixed-version: Fixed from version 6.3rc3" +CVE_STATUS[CVE-2023-6931] = "cpe-stable-backport: Backported in 6.6.7" -CVE_STATUS[CVE-2023-30772] = "fixed-version: Fixed from version 6.3rc4" +CVE_STATUS[CVE-2023-6932] = "cpe-stable-backport: Backported in 6.6.5" -CVE_STATUS[CVE-2023-3090] = "fixed-version: Fixed from version 6.4rc2" +CVE_STATUS[CVE-2023-7042] = "cpe-stable-backport: Backported in 6.6.23" -CVE_STATUS[CVE-2023-3106] = "fixed-version: Fixed from version 4.8rc7" +CVE_STATUS[CVE-2023-7192] = "fixed-version: Fixed from version 6.3rc1" -# Skipping CVE-2023-3108, no affected_versions +CVE_STATUS[CVE-2024-0193] = "cpe-stable-backport: Backported in 6.6.10" -# CVE-2023-31081 has no known resolution +CVE_STATUS[CVE-2024-0340] = "fixed-version: Fixed from version 6.4rc6" -# CVE-2023-31082 has no known resolution +CVE_STATUS[CVE-2024-0443] = "fixed-version: Fixed from version 6.4rc7" -CVE_STATUS[CVE-2023-31083] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2024-0562] = "fixed-version: Fixed from version 6.0rc3" -CVE_STATUS[CVE-2023-31084] = "fixed-version: Fixed from version 6.4rc3" +# CVE-2024-0564 has no known resolution -CVE_STATUS[CVE-2023-31085] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2024-0565] = "cpe-stable-backport: Backported in 6.6.8" -CVE_STATUS[CVE-2023-3111] = "fixed-version: Fixed from version 6.0rc2" +CVE_STATUS[CVE-2024-0582] = "cpe-stable-backport: Backported in 6.6.5" -CVE_STATUS[CVE-2023-3117] = "fixed-version: Fixed from version 6.4rc7" +CVE_STATUS[CVE-2024-0584] = "cpe-stable-backport: Backported in 6.6.5" -CVE_STATUS[CVE-2023-31248] = "fixed-version: Fixed from version 6.5rc2" +CVE_STATUS[CVE-2024-0607] = "cpe-stable-backport: Backported in 6.6.3" -CVE_STATUS[CVE-2023-3141] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2024-0639] = "fixed-version: Fixed from version 6.5rc1" -CVE_STATUS[CVE-2023-31436] = "fixed-version: Fixed from version 6.3" +CVE_STATUS[CVE-2024-0641] = "fixed-version: Fixed from version 6.6rc5" -CVE_STATUS[CVE-2023-3159] = "fixed-version: Fixed from version 5.18rc6" +CVE_STATUS[CVE-2024-0646] = "cpe-stable-backport: Backported in 6.6.7" -CVE_STATUS[CVE-2023-3161] = "fixed-version: Fixed from version 6.2rc7" +CVE_STATUS[CVE-2024-0775] = "fixed-version: Fixed from version 6.4rc2" -CVE_STATUS[CVE-2023-3212] = "fixed-version: Fixed from version 6.4rc2" +CVE_STATUS[CVE-2024-0841] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-3220] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2024-1085] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-32233] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2024-1086] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-32247] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2024-1151] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-32248] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2024-1312] = "fixed-version: Fixed from version 6.5rc4" -CVE_STATUS[CVE-2023-32250] = "fixed-version: Fixed from version 6.4rc1" +# CVE-2024-21803 has no known resolution -CVE_STATUS[CVE-2023-32252] = "fixed-version: Fixed from version 6.4rc1" +# CVE-2024-2193 has no known resolution -CVE_STATUS[CVE-2023-32254] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2024-22099] = "cpe-stable-backport: Backported in 6.6.23" -CVE_STATUS[CVE-2023-32257] = "fixed-version: Fixed from version 6.4rc1" +# CVE-2024-22386 has no known resolution -CVE_STATUS[CVE-2023-32258] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2024-22705] = "cpe-stable-backport: Backported in 6.6.10" -CVE_STATUS[CVE-2023-32269] = "fixed-version: Fixed from version 6.2rc7" +CVE_STATUS[CVE-2024-23196] = "fixed-version: Fixed from version 6.5rc1" -# CVE-2023-32629 has no known resolution +CVE_STATUS[CVE-2024-23307] = "cpe-stable-backport: Backported in 6.6.24" -CVE_STATUS[CVE-2023-3268] = "fixed-version: Fixed from version 6.4rc1" +# CVE-2024-23848 has no known resolution -CVE_STATUS[CVE-2023-3269] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2024-23849] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-3312] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2024-23850] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-3317] = "fixed-version: Fixed from version 6.3rc6" +CVE_STATUS[CVE-2024-23851] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-33203] = "fixed-version: Fixed from version 6.3rc4" +CVE_STATUS[CVE-2024-24855] = "fixed-version: Fixed from version 6.5rc2" -CVE_STATUS[CVE-2023-33250] = "fixed-version: Fixed from version 6.5rc1" +# CVE-2024-24857 has no known resolution -CVE_STATUS[CVE-2023-33288] = "fixed-version: Fixed from version 6.3rc4" +# CVE-2024-24858 has no known resolution -CVE_STATUS[CVE-2023-3338] = "fixed-version: Fixed from version 6.1rc1" +# CVE-2024-24859 has no known resolution -CVE_STATUS[CVE-2023-3355] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2024-24860] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-3357] = "fixed-version: Fixed from version 6.2rc1" +CVE_STATUS[CVE-2024-24861] = "cpe-stable-backport: Backported in 6.6.24" -CVE_STATUS[CVE-2023-3358] = "fixed-version: Fixed from version 6.2rc5" +# CVE-2024-24864 has no known resolution -CVE_STATUS[CVE-2023-3359] = "fixed-version: Fixed from version 6.2rc7" +# CVE-2024-25739 has no known resolution -CVE_STATUS[CVE-2023-3389] = "fixed-version: Fixed from version 6.0rc1" +# CVE-2024-25740 has no known resolution -CVE_STATUS[CVE-2023-3390] = "fixed-version: Fixed from version 6.4rc7" +# CVE-2024-25741 has no known resolution -CVE_STATUS[CVE-2023-33951] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2024-25744] = "cpe-stable-backport: Backported in 6.6.7" -CVE_STATUS[CVE-2023-33952] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2024-26581] = "cpe-stable-backport: Backported in 6.6.17" -# CVE-2023-3397 has no known resolution +CVE_STATUS[CVE-2024-26582] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-34255] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2024-26583] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-34256] = "fixed-version: Fixed from version 6.4rc2" +CVE_STATUS[CVE-2024-26584] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-34319] = "fixed-version: Fixed from version 6.5rc6" +CVE_STATUS[CVE-2024-26585] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-34324] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2024-26586] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-3439] = "fixed-version: Fixed from version 5.18rc5" +CVE_STATUS[CVE-2024-26587] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-35001] = "fixed-version: Fixed from version 6.5rc2" +CVE_STATUS[CVE-2024-26588] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-3567] = "fixed-version: Fixed from version 6.2rc7" +CVE_STATUS[CVE-2024-26589] = "cpe-stable-backport: Backported in 6.6.14" -# CVE-2023-35693 has no known resolution +CVE_STATUS[CVE-2024-26590] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-35788] = "fixed-version: Fixed from version 6.4rc5" +CVE_STATUS[CVE-2024-26591] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-35823] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2024-26592] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-35824] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2024-26593] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-35826] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2024-26594] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-35827] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2024-26595] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-35828] = "fixed-version: Fixed from version 6.4rc1" +# CVE-2024-26596 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-35829] = "fixed-version: Fixed from version 6.4rc1" +CVE_STATUS[CVE-2024-26597] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-3609] = "fixed-version: Fixed from version 6.4rc7" +CVE_STATUS[CVE-2024-26598] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-3610] = "fixed-version: Fixed from version 6.4" +CVE_STATUS[CVE-2024-26599] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-3611] = "fixed-version: Fixed from version 6.5rc2" +CVE_STATUS[CVE-2024-26600] = "cpe-stable-backport: Backported in 6.6.17" -# CVE-2023-3640 has no known resolution +CVE_STATUS[CVE-2024-26601] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-37453] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2024-26602] = "cpe-stable-backport: Backported in 6.6.18" -# CVE-2023-37454 has no known resolution +CVE_STATUS[CVE-2024-26603] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-3772] = "fixed-version: Fixed from version 6.5rc7" +CVE_STATUS[CVE-2024-26604] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-3773] = "fixed-version: Fixed from version 6.5rc7" +CVE_STATUS[CVE-2024-26605] = "fixed-version: only affects 6.7 onwards" -CVE_STATUS[CVE-2023-3776] = "fixed-version: Fixed from version 6.5rc2" +CVE_STATUS[CVE-2024-26606] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-3777] = "fixed-version: Fixed from version 6.5rc3" +CVE_STATUS[CVE-2024-26607] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-3812] = "fixed-version: Fixed from version 6.1rc4" +CVE_STATUS[CVE-2024-26608] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-38409] = "fixed-version: Fixed from version 6.3rc7" +CVE_STATUS[CVE-2024-26610] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-38426] = "fixed-version: Fixed from version 6.4rc3" +CVE_STATUS[CVE-2024-26611] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-38427] = "fixed-version: Fixed from version 6.4rc6" +CVE_STATUS[CVE-2024-26612] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-38428] = "fixed-version: Fixed from version 6.4rc3" +CVE_STATUS[CVE-2024-26614] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-38429] = "fixed-version: Fixed from version 6.4rc3" +CVE_STATUS[CVE-2024-26615] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-38430] = "fixed-version: Fixed from version 6.4rc6" +CVE_STATUS[CVE-2024-26616] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-38431] = "fixed-version: Fixed from version 6.4rc6" +CVE_STATUS[CVE-2024-26617] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-38432] = "fixed-version: Fixed from version 6.4" +CVE_STATUS[CVE-2024-26618] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-3863] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2024-26619] = "fixed-version: only affects 6.7rc5 onwards" -CVE_STATUS[CVE-2023-3865] = "fixed-version: Fixed from version 6.4" +CVE_STATUS[CVE-2024-26620] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-3866] = "fixed-version: Fixed from version 6.4" +CVE_STATUS[CVE-2024-26621] = "fixed-version: only affects 6.7 onwards" -CVE_STATUS[CVE-2023-3867] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2024-26622] = "cpe-stable-backport: Backported in 6.6.21" -CVE_STATUS[CVE-2023-39189] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2024-26623] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-39191] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2024-26625] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-39192] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2024-26626] = "fixed-version: only affects 6.8rc1 onwards" -CVE_STATUS[CVE-2023-39193] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2024-26627] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-39194] = "fixed-version: Fixed from version 6.5rc7" +CVE_STATUS[CVE-2024-26629] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-39197] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2024-26630] = "cpe-stable-backport: Backported in 6.6.21" -CVE_STATUS[CVE-2023-39198] = "fixed-version: Fixed from version 6.5rc7" +CVE_STATUS[CVE-2024-26631] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-4004] = "fixed-version: Fixed from version 6.5rc3" +CVE_STATUS[CVE-2024-26632] = "cpe-stable-backport: Backported in 6.6.14" -# CVE-2023-4010 has no known resolution +CVE_STATUS[CVE-2024-26633] = "cpe-stable-backport: Backported in 6.6.14" -CVE_STATUS[CVE-2023-4015] = "fixed-version: Fixed from version 6.5rc4" +CVE_STATUS[CVE-2024-26634] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-40283] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2024-26635] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-40791] = "fixed-version: Fixed from version 6.5rc6" +CVE_STATUS[CVE-2024-26636] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-4128] = "fixed-version: Fixed from version 6.5rc5" +CVE_STATUS[CVE-2024-26637] = "fixed-version: only affects 6.7 onwards" -CVE_STATUS[CVE-2023-4132] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2024-26638] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-4133] = "fixed-version: Fixed from version 6.3" +CVE_STATUS[CVE-2024-26639] = "fixed-version: only affects 6.8rc1 onwards" -CVE_STATUS[CVE-2023-4134] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2024-26640] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-4147] = "fixed-version: Fixed from version 6.5rc4" +CVE_STATUS[CVE-2024-26641] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-4155] = "fixed-version: Fixed from version 6.5rc6" +CVE_STATUS[CVE-2024-26642] = "cpe-stable-backport: Backported in 6.6.24" -CVE_STATUS[CVE-2023-4194] = "fixed-version: Fixed from version 6.5rc5" +CVE_STATUS[CVE-2024-26643] = "cpe-stable-backport: Backported in 6.6.24" -CVE_STATUS[CVE-2023-4206] = "fixed-version: Fixed from version 6.5rc5" +CVE_STATUS[CVE-2024-26644] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-4207] = "fixed-version: Fixed from version 6.5rc5" +CVE_STATUS[CVE-2024-26645] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-4208] = "fixed-version: Fixed from version 6.5rc5" +CVE_STATUS[CVE-2024-26646] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-4244] = "fixed-version: Fixed from version 6.5rc7" +CVE_STATUS[CVE-2024-26647] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-4273] = "fixed-version: Fixed from version 6.5rc5" +CVE_STATUS[CVE-2024-26648] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-42752] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2024-26649] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-42753] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2024-26650] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-42754] = "fixed-version: Fixed from version 6.6rc3" +CVE_STATUS[CVE-2024-26651] = "cpe-stable-backport: Backported in 6.6.23" -CVE_STATUS[CVE-2023-42755] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2024-26652] = "cpe-stable-backport: Backported in 6.6.22" -CVE_STATUS[CVE-2023-42756] = "fixed-version: Fixed from version 6.6rc3" +CVE_STATUS[CVE-2024-26653] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-4385] = "fixed-version: Fixed from version 5.19rc1" +CVE_STATUS[CVE-2024-26654] = "cpe-stable-backport: Backported in 6.6.24" -CVE_STATUS[CVE-2023-4387] = "fixed-version: Fixed from version 5.18" +# CVE-2024-26655 needs backporting (fixed from 6.9rc2) -CVE_STATUS[CVE-2023-4389] = "fixed-version: Fixed from version 5.18rc3" +CVE_STATUS[CVE-2024-26656] = "cpe-stable-backport: Backported in 6.6.24" -CVE_STATUS[CVE-2023-4394] = "fixed-version: Fixed from version 6.0rc3" +CVE_STATUS[CVE-2024-26657] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-44466] = "fixed-version: Fixed from version 6.5rc2" +# CVE-2024-26658 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-4459] = "fixed-version: Fixed from version 5.18" +CVE_STATUS[CVE-2024-26659] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-4563] = "fixed-version: Fixed from version 6.5rc6" +CVE_STATUS[CVE-2024-26660] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-4569] = "fixed-version: Fixed from version 6.5rc7" +CVE_STATUS[CVE-2024-26661] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-45862] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2024-26662] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-45863] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2024-26663] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-45871] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2024-26664] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-45898] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2024-26665] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-4610] = "fixed-version: Fixed from version 6.4" +CVE_STATUS[CVE-2024-26666] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-4611] = "fixed-version: Fixed from version 6.5rc4" +CVE_STATUS[CVE-2024-26667] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-4622] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2024-26668] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-4623] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2024-26669] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-46343] = "fixed-version: Fixed from version 6.6rc7" +CVE_STATUS[CVE-2024-26670] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2023-46813] = "fixed-version: Fixed from version 6.6rc7" +CVE_STATUS[CVE-2024-26671] = "cpe-stable-backport: Backported in 6.6.16" -CVE_STATUS[CVE-2023-46838] = "cpe-stable-backport: Backported in 6.6.14" +# CVE-2024-26672 needs backporting (fixed from 6.8rc1) -CVE_STATUS[CVE-2023-46862] = "fixed-version: Fixed from version 6.6" +CVE_STATUS[CVE-2024-26673] = "cpe-stable-backport: Backported in 6.6.16" -# CVE-2023-47233 has no known resolution +CVE_STATUS[CVE-2024-26674] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-4732] = "fixed-version: Fixed from version 5.14rc1" +CVE_STATUS[CVE-2024-26675] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-4881] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2024-26676] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-4921] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2024-26677] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-50431] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26678] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-5090] = "fixed-version: Fixed from version 6.6rc7" +CVE_STATUS[CVE-2024-26679] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-51042] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2024-26680] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-51043] = "fixed-version: Fixed from version 6.5rc3" +CVE_STATUS[CVE-2024-26681] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-5158] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2024-26682] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-51779] = "cpe-stable-backport: Backported in 6.6.9" +CVE_STATUS[CVE-2024-26683] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-5178] = "fixed-version: Fixed from version 6.6rc7" +CVE_STATUS[CVE-2024-26684] = "cpe-stable-backport: Backported in 6.6.17" -CVE_STATUS[CVE-2023-51780] = "cpe-stable-backport: Backported in 6.6.8" +CVE_STATUS[CVE-2024-26685] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-51781] = "cpe-stable-backport: Backported in 6.6.8" +# CVE-2024-26686 needs backporting (fixed from 6.8rc4) -CVE_STATUS[CVE-2023-51782] = "cpe-stable-backport: Backported in 6.6.8" +CVE_STATUS[CVE-2024-26687] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2023-5197] = "fixed-version: Fixed from version 6.6rc3" +CVE_STATUS[CVE-2024-26688] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52340] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2024-26689] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52429] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2024-26690] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52433] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2024-26691] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52434] = "cpe-stable-backport: Backported in 6.6.8" +CVE_STATUS[CVE-2024-26692] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52435] = "cpe-stable-backport: Backported in 6.6.11" +CVE_STATUS[CVE-2024-26693] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52436] = "cpe-stable-backport: Backported in 6.6.13" +CVE_STATUS[CVE-2024-26694] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52438] = "cpe-stable-backport: Backported in 6.6.13" +CVE_STATUS[CVE-2024-26695] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52439] = "cpe-stable-backport: Backported in 6.6.13" +CVE_STATUS[CVE-2024-26696] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52440] = "fixed-version: Fixed from version 6.6rc1" +CVE_STATUS[CVE-2024-26697] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52441] = "fixed-version: Fixed from version 6.5rc4" +CVE_STATUS[CVE-2024-26698] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52442] = "fixed-version: Fixed from version 6.5rc4" +# CVE-2024-26699 needs backporting (fixed from 6.8rc5) -CVE_STATUS[CVE-2023-52443] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26700] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52444] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26702] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52445] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26703] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52446] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26704] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52447] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26705] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52448] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26706] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52449] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26707] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52450] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26708] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52451] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26709] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-52452] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26710] = "fixed-version: only affects 6.8rc1 onwards" -CVE_STATUS[CVE-2023-52453] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26711] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52454] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26712] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52455] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26713] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52456] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26714] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52457] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26715] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52458] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26716] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52459] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26717] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52460] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2024-26718] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52461] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2024-26719] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52462] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26720] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-52463] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26721] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-52464] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26722] = "fixed-version: only affects 6.7rc5 onwards" -CVE_STATUS[CVE-2023-5345] = "fixed-version: Fixed from version 6.6rc4" +CVE_STATUS[CVE-2024-26723] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-5633] = "fixed-version: Fixed from version 6.6rc6" +CVE_STATUS[CVE-2024-26724] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-5717] = "fixed-version: Fixed from version 6.6rc7" +CVE_STATUS[CVE-2024-26725] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-5972] = "fixed-version: Fixed from version 6.6rc7" +CVE_STATUS[CVE-2024-26726] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-6039] = "fixed-version: Fixed from version 6.5rc5" +CVE_STATUS[CVE-2024-26727] = "cpe-stable-backport: Backported in 6.6.18" -CVE_STATUS[CVE-2023-6040] = "fixed-version: Fixed from version 5.18rc1" +CVE_STATUS[CVE-2024-26728] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-6111] = "cpe-stable-backport: Backported in 6.6.3" +CVE_STATUS[CVE-2024-26729] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2023-6121] = "cpe-stable-backport: Backported in 6.6.4" +CVE_STATUS[CVE-2024-26730] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2023-6176] = "fixed-version: Fixed from version 6.6rc2" +CVE_STATUS[CVE-2024-26731] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2023-6200] = "cpe-stable-backport: Backported in 6.6.9" +CVE_STATUS[CVE-2024-26732] = "fixed-version: only affects 6.7rc1 onwards" -# CVE-2023-6238 has no known resolution +CVE_STATUS[CVE-2024-26733] = "cpe-stable-backport: Backported in 6.6.19" -# CVE-2023-6240 has no known resolution +CVE_STATUS[CVE-2024-26734] = "cpe-stable-backport: Backported in 6.6.19" -# CVE-2023-6270 has no known resolution +CVE_STATUS[CVE-2024-26735] = "cpe-stable-backport: Backported in 6.6.19" -# CVE-2023-6356 has no known resolution +CVE_STATUS[CVE-2024-26736] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2023-6531] = "cpe-stable-backport: Backported in 6.6.7" +CVE_STATUS[CVE-2024-26737] = "cpe-stable-backport: Backported in 6.6.19" -# CVE-2023-6535 has no known resolution +CVE_STATUS[CVE-2024-26738] = "cpe-stable-backport: Backported in 6.6.19" -# CVE-2023-6536 has no known resolution +CVE_STATUS[CVE-2024-26739] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2023-6546] = "fixed-version: Fixed from version 6.5rc7" +CVE_STATUS[CVE-2024-26740] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2023-6560] = "cpe-stable-backport: Backported in 6.6.5" +CVE_STATUS[CVE-2024-26741] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2023-6606] = "cpe-stable-backport: Backported in 6.6.9" +CVE_STATUS[CVE-2024-26742] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2023-6610] = "cpe-stable-backport: Backported in 6.6.13" +CVE_STATUS[CVE-2024-26743] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2023-6622] = "cpe-stable-backport: Backported in 6.6.7" +CVE_STATUS[CVE-2024-26744] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2023-6679] = "fixed-version: only affects 6.7rc1 onwards" +CVE_STATUS[CVE-2024-26745] = "cpe-stable-backport: Backported in 6.6.21" -CVE_STATUS[CVE-2023-6817] = "cpe-stable-backport: Backported in 6.6.7" +CVE_STATUS[CVE-2024-26746] = "cpe-stable-backport: Backported in 6.6.21" -CVE_STATUS[CVE-2023-6915] = "cpe-stable-backport: Backported in 6.6.13" +CVE_STATUS[CVE-2024-26747] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2023-6931] = "cpe-stable-backport: Backported in 6.6.7" +CVE_STATUS[CVE-2024-26748] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2023-6932] = "cpe-stable-backport: Backported in 6.6.5" +CVE_STATUS[CVE-2024-26749] = "cpe-stable-backport: Backported in 6.6.19" -# CVE-2023-7042 has no known resolution +CVE_STATUS[CVE-2024-26750] = "fixed-version: only affects 6.8rc5 onwards" -CVE_STATUS[CVE-2023-7192] = "fixed-version: Fixed from version 6.3rc1" +CVE_STATUS[CVE-2024-26751] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2024-0193] = "cpe-stable-backport: Backported in 6.6.10" +CVE_STATUS[CVE-2024-26752] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2024-0340] = "fixed-version: Fixed from version 6.4rc6" +CVE_STATUS[CVE-2024-26753] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2024-0443] = "fixed-version: Fixed from version 6.4rc7" +CVE_STATUS[CVE-2024-26754] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2024-0562] = "fixed-version: Fixed from version 6.0rc3" +CVE_STATUS[CVE-2024-26755] = "fixed-version: only affects 6.7rc1 onwards" -# CVE-2024-0564 has no known resolution +# CVE-2024-26756 needs backporting (fixed from 6.8rc6) -CVE_STATUS[CVE-2024-0565] = "cpe-stable-backport: Backported in 6.6.8" +# CVE-2024-26757 needs backporting (fixed from 6.8rc6) -CVE_STATUS[CVE-2024-0582] = "cpe-stable-backport: Backported in 6.6.5" +# CVE-2024-26758 needs backporting (fixed from 6.8rc6) -CVE_STATUS[CVE-2024-0584] = "cpe-stable-backport: Backported in 6.6.5" +CVE_STATUS[CVE-2024-26759] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2024-0607] = "cpe-stable-backport: Backported in 6.6.3" +CVE_STATUS[CVE-2024-26760] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2024-0639] = "fixed-version: Fixed from version 6.5rc1" +CVE_STATUS[CVE-2024-26761] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2024-0641] = "fixed-version: Fixed from version 6.6rc5" +CVE_STATUS[CVE-2024-26762] = "fixed-version: only affects 6.7rc1 onwards" -CVE_STATUS[CVE-2024-0646] = "cpe-stable-backport: Backported in 6.6.7" +CVE_STATUS[CVE-2024-26763] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2024-0775] = "fixed-version: Fixed from version 6.4rc2" +CVE_STATUS[CVE-2024-26764] = "cpe-stable-backport: Backported in 6.6.19" -# CVE-2024-0841 has no known resolution +CVE_STATUS[CVE-2024-26765] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2024-1085] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26766] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2024-1086] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2024-26767] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2024-1151] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2024-26768] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2024-1312] = "fixed-version: Fixed from version 6.5rc4" +CVE_STATUS[CVE-2024-26769] = "cpe-stable-backport: Backported in 6.6.19" -# CVE-2024-21803 has no known resolution +CVE_STATUS[CVE-2024-26770] = "cpe-stable-backport: Backported in 6.6.19" -# CVE-2024-22099 has no known resolution +CVE_STATUS[CVE-2024-26771] = "cpe-stable-backport: Backported in 6.6.19" -# CVE-2024-22386 has no known resolution +CVE_STATUS[CVE-2024-26772] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2024-22705] = "cpe-stable-backport: Backported in 6.6.10" +CVE_STATUS[CVE-2024-26773] = "cpe-stable-backport: Backported in 6.6.19" -# CVE-2024-23196 has no known resolution +CVE_STATUS[CVE-2024-26774] = "cpe-stable-backport: Backported in 6.6.19" -# CVE-2024-23307 has no known resolution +CVE_STATUS[CVE-2024-26775] = "cpe-stable-backport: Backported in 6.6.19" -# CVE-2024-23848 has no known resolution +CVE_STATUS[CVE-2024-26776] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2024-23849] = "cpe-stable-backport: Backported in 6.6.15" +CVE_STATUS[CVE-2024-26777] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2024-23850] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2024-26778] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2024-23851] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2024-26779] = "cpe-stable-backport: Backported in 6.6.19" -CVE_STATUS[CVE-2024-24855] = "fixed-version: Fixed from version 6.5rc2" +CVE_STATUS[CVE-2024-26780] = "fixed-version: only affects 6.8rc4 onwards" -# CVE-2024-24857 has no known resolution +CVE_STATUS[CVE-2024-26781] = "fixed-version: only affects 6.8rc6 onwards" -# CVE-2024-24858 has no known resolution +CVE_STATUS[CVE-2024-26782] = "cpe-stable-backport: Backported in 6.6.21" -# CVE-2024-24859 has no known resolution +CVE_STATUS[CVE-2024-26783] = "cpe-stable-backport: Backported in 6.6.22" -CVE_STATUS[CVE-2024-24860] = "cpe-stable-backport: Backported in 6.6.14" +# CVE-2024-26784 needs backporting (fixed from 6.8rc7) -# CVE-2024-24861 has no known resolution +# CVE-2024-26785 needs backporting (fixed from 6.8rc7) -# CVE-2024-24864 has no known resolution +CVE_STATUS[CVE-2024-26786] = "cpe-stable-backport: Backported in 6.6.21" -# CVE-2024-25739 has no known resolution +CVE_STATUS[CVE-2024-26787] = "cpe-stable-backport: Backported in 6.6.21" -# CVE-2024-25740 has no known resolution +CVE_STATUS[CVE-2024-26788] = "cpe-stable-backport: Backported in 6.6.21" -# CVE-2024-25741 has no known resolution +CVE_STATUS[CVE-2024-26789] = "cpe-stable-backport: Backported in 6.6.21" -CVE_STATUS[CVE-2024-25744] = "cpe-stable-backport: Backported in 6.6.7" +CVE_STATUS[CVE-2024-26790] = "cpe-stable-backport: Backported in 6.6.21" -CVE_STATUS[CVE-2024-26581] = "cpe-stable-backport: Backported in 6.6.17" +CVE_STATUS[CVE-2024-26791] = "cpe-stable-backport: Backported in 6.6.21" -CVE_STATUS[CVE-2024-26582] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2024-26792] = "fixed-version: only affects 6.8rc4 onwards" -CVE_STATUS[CVE-2024-26583] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2024-26793] = "cpe-stable-backport: Backported in 6.6.21" -CVE_STATUS[CVE-2024-26584] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2024-26794] = "fixed-version: only affects 6.8rc6 onwards" -CVE_STATUS[CVE-2024-26585] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2024-26795] = "cpe-stable-backport: Backported in 6.6.21" -CVE_STATUS[CVE-2024-26586] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26796] = "cpe-stable-backport: Backported in 6.6.21" -CVE_STATUS[CVE-2024-26587] = "cpe-stable-backport: Backported in 6.6.14" +# CVE-2024-26797 needs backporting (fixed from 6.8rc7) -CVE_STATUS[CVE-2024-26588] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26798] = "cpe-stable-backport: Backported in 6.6.21" -CVE_STATUS[CVE-2024-26589] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26799] = "cpe-stable-backport: Backported in 6.6.21" -CVE_STATUS[CVE-2024-26590] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26800] = "fixed-version: only affects 6.8rc5 onwards" -CVE_STATUS[CVE-2024-26591] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26801] = "cpe-stable-backport: Backported in 6.6.21" -CVE_STATUS[CVE-2024-26592] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26802] = "cpe-stable-backport: Backported in 6.6.21" -CVE_STATUS[CVE-2024-26593] = "cpe-stable-backport: Backported in 6.6.18" +CVE_STATUS[CVE-2024-26803] = "cpe-stable-backport: Backported in 6.6.21" -CVE_STATUS[CVE-2024-26594] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26804] = "cpe-stable-backport: Backported in 6.6.21" -CVE_STATUS[CVE-2024-26595] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26805] = "cpe-stable-backport: Backported in 6.6.21" -# CVE-2024-26596 needs backporting (fixed from 6.8rc1) +# CVE-2024-26806 needs backporting (fixed from 6.8rc7) -CVE_STATUS[CVE-2024-26597] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26807] = "cpe-stable-backport: Backported in 6.6.21" -CVE_STATUS[CVE-2024-26598] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26808] = "cpe-stable-backport: Backported in 6.6.15" -CVE_STATUS[CVE-2024-26599] = "cpe-stable-backport: Backported in 6.6.14" +CVE_STATUS[CVE-2024-26809] = "cpe-stable-backport: Backported in 6.6.23" From patchwork Fri May 3 02:40:36 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43190 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7F380C41513 for ; Fri, 3 May 2024 02:40:54 +0000 (UTC) Received: from mail-qk1-f177.google.com (mail-qk1-f177.google.com [209.85.222.177]) by mx.groups.io with SMTP id smtpd.web11.4002.1714704053828368713 for ; Thu, 02 May 2024 19:40:53 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=LZyxALKI; spf=pass (domain: gmail.com, ip: 209.85.222.177, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f177.google.com with SMTP id af79cd13be357-790f4650f93so479417785a.2 for ; Thu, 02 May 2024 19:40:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714704053; x=1715308853; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=YtTLQsmVQAUeMyy53LHYQWXi6+M+hNR+oreNQ2nFKos=; b=LZyxALKIw3Wuq37DEPmr3FhB/26E9v2zUHufqYkQgxvuw6Ux8e7vGPmns0BnGlSirj qtnI+LXioILNiNMfp84nS5ziy8PBxzUAj+27xO5zcUXK1fQF5HOkeY6sziIfZufVBl2Z 2OHwkphnMnlg6oTDbeoivM7GxunkxWgbTwR3TLdcFbJ/i+4kNGj+UoS6NN3lIt/Z7qvL 4WKk/6cJU0Y/inFhVqog2Uu3jEsFYL4CZgEuj2ur3I9hPTGIVZiBueHCA2WXDYtX+fo4 XjdJbp46wJv0pNF4TM3G1p8ZzKjz/FVw03x0eSnOp95e34zu5zEYHlzrAhyiDFjjhfda SeuQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714704053; x=1715308853; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=YtTLQsmVQAUeMyy53LHYQWXi6+M+hNR+oreNQ2nFKos=; b=APkiP5fnCE0yXkMNVPEiMlb5DfrqvmM0OtO8hfH65IW/fnkV9HVAKtLd8GianqExUj L0Q0YFw7IZ7mtqPamqL1YetTx5iLN75G94zJdHoj209YTWNdDOSCGsc5qZLP6joQNetk ZUprjXZQVzZWagKobnrMZPuNwPijlzsX4VVYLsS9DDzjASwZAes/CzXS0r23sWmy1FTH kSgkh4QCV+bLjMeUAQVzsp3i4FAzFj+DGbbkPFGGVJgPGQljSCC5jfiWFCzhJ4OjAiR/ TRzGJjK/FWqCOvVh0mR2pUSPdFHPYlW926974MzExeE8bJzQ8hcrQgbtXlEGAVDMmqt4 oQhg== X-Gm-Message-State: AOJu0YwEA5MO3P1toHIUbKjGXaEeVcc3o2ncwDi/qFvLqfZXLSK0OE/L nQYw4KqEtYoKb9DV/dJcoBCb8QaOFSqCatF5OrLd9LX1LS6DfmQ9 X-Google-Smtp-Source: AGHT+IFHEkXIimDarBdrjIPGX1WnIWaqv9XkOSnp+jZEoJlWsqsnLI1QQlnAvGwOry96cWOMGiBGdA== X-Received: by 2002:a05:620a:578c:b0:78e:d962:5171 with SMTP id wk12-20020a05620a578c00b0078ed9625171mr1704357qkn.28.1714704052683; Thu, 02 May 2024 19:40:52 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id bm34-20020a05620a19a200b0078ec3aa9cc7sm856163qkb.25.2024.05.02.19.40.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 19:40:52 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 08/12] linux-yocto/6.6: cfg: drop obselete options Date: Thu, 2 May 2024 22:40:36 -0400 Message-Id: <7b4f3b1d8db004d4e098dd6aa38e3ef83eb7f5f6.1714703667.git.bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 02:40:54 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198938 From: Bruce Ashfield Integrating the following commit(s) to linux-yocto/.: 1/2 [ Author: Paul Gortmaker Email: paulg@kernel.org Subject: cgl: drop SELINUX_DISABLE option Date: Tue, 16 Apr 2024 12:28:43 -0400 It was removed from mainline in v6.4 in commit f22f9aaf6c3d ("selinux: remove the runtime disable functionality"). Signed-off-by: Paul Gortmaker Signed-off-by: Bruce Ashfield ] 2/2 [ Author: Paul Gortmaker Email: paulg@kernel.org Subject: full_nohz: remove RCU_FAST_NO_HZ gone from upstream Date: Tue, 16 Apr 2024 14:56:42 -0400 In commit e2c73a6860bd ("rcu: Remove the RCU_FAST_NO_HZ Kconfig option") the so named option was removed from the v5.17 kernel. We should get it out of our active branches to prevent a warning. Signed-off-by: Paul Gortmaker Signed-off-by: Bruce Ashfield ] Signed-off-by: Bruce Ashfield --- meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb | 2 +- meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb | 2 +- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index 91dbbf55ca..0972d4edde 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -15,7 +15,7 @@ python () { } SRCREV_machine ?= "5272561b019836f2ee2f175b23029649431d6fca" -SRCREV_meta ?= "3bf5e5e5a7323795af0955da818c6e93215fd119" +SRCREV_meta ?= "c3d1322fb6ff68cdcf4d7a3c1140d81bfdc1320a" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index fba19c97df..3b3e277c38 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -18,7 +18,7 @@ KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" SRCREV_machine ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" -SRCREV_meta ?= "3bf5e5e5a7323795af0955da818c6e93215fd119" +SRCREV_meta ?= "c3d1322fb6ff68cdcf4d7a3c1140d81bfdc1320a" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index f887e293b7..a02452feda 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -29,7 +29,7 @@ SRCREV_machine:qemux86 ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" SRCREV_machine:qemux86-64 ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" SRCREV_machine:qemumips64 ?= "d3abfe3c736d5869cb26f24c653b7e6eeafac715" SRCREV_machine ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" -SRCREV_meta ?= "3bf5e5e5a7323795af0955da818c6e93215fd119" +SRCREV_meta ?= "c3d1322fb6ff68cdcf4d7a3c1140d81bfdc1320a" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same From patchwork Fri May 3 02:40:37 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43200 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C61A6C25B5C for ; Fri, 3 May 2024 02:41:04 +0000 (UTC) Received: from mail-qk1-f172.google.com (mail-qk1-f172.google.com [209.85.222.172]) by mx.groups.io with SMTP id smtpd.web10.3826.1714704055760001112 for ; Thu, 02 May 2024 19:40:55 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=N2++DXM1; spf=pass (domain: gmail.com, ip: 209.85.222.172, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f172.google.com with SMTP id af79cd13be357-78ecd752a7cso593641885a.0 for ; Thu, 02 May 2024 19:40:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714704055; x=1715308855; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=s5cvB7GTIjENpZMJUVWUX/7SJdURyfCEn+9x+m5+AfA=; b=N2++DXM160G1gkwWRMnXYgYueoZMVXBF7jcvXA13bNiG0dhHaDTV96eYrJnpjV7lKn XMuMOCogSEpruQf3eZuhzWcKLvpy0G5nf/H+KwhK2IT5bKpcYe3ZR7Ng1TCeGhLKEKVo Aw+J5//DgwZTzxU90zEMNj1qiQH/rl5nOSXG9XbBAtmL+5fqyNFumPipZoyq8dFfI4XZ pdeuMQux3wn2tuPe8DWdHwNRQQCSt0miqN5zPtt0wwixYuKC3DuVPWa3jyJQnDc/WCth 1lxqnIH/UEC9kS5TnKP3SrbL7NuPQMeyfgEl2i/yD3+32OBf/4e6FcN/nM/+dbPH1cqg 909g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714704055; x=1715308855; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=s5cvB7GTIjENpZMJUVWUX/7SJdURyfCEn+9x+m5+AfA=; b=SuG2cyx3fBvPI1y6ZOt/QHU82uAU5cPn+c4bW6+qNMACsPwGhGT5hwe7YqwGxTqTP+ y8mgDutTe+vJJtnZeazaQ6T+BYZccAmFS6EUd4Y9jjjQC0c6NJv108BhaZxDa591ayDU +CqvUOz+FoT5aOxw6usNVV2OMbSXEWcRM+5r45sPuAitHWC00w5ojcJbrxoDmqo0goVh mnhM7cLF7VsRm2mp081Pl7+F3U3+bRfr0a9IpxFtbnmTAL8GLWx0yCEfz5Mgj/A5MBvd TH/U1n5hTATMWS2dD3OmCvIfw/PD7DFJZc+spmfVCN2hy5pNGPd1cmgLShSUTK36VpaK FwJA== X-Gm-Message-State: AOJu0Yy+4EeDcLvllWppSWlmr7K6SfOg9sIpnCLOoHO/vOuLARVtfNF7 uSIO5/PzNXXRy7n+ip9lZo+/7Y3toLG0tYw2/7lNcKsriZGhN5wJjlq7jA== X-Google-Smtp-Source: AGHT+IGy0fmrwIUB4BCeITkNHWXcer6GV/o9V8tIZZx88DG+SuSaYG33yyaatffyLFuzzze1jp+lVg== X-Received: by 2002:a05:620a:470e:b0:790:72c4:d5ea with SMTP id bs14-20020a05620a470e00b0079072c4d5eamr1906857qkb.25.1714704054646; Thu, 02 May 2024 19:40:54 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id bm34-20020a05620a19a200b0078ec3aa9cc7sm856163qkb.25.2024.05.02.19.40.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 19:40:53 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 09/12] linux-yocto/6.6: update to v6.6.28 Date: Thu, 2 May 2024 22:40:37 -0400 Message-Id: <79e349fa7793fc23b5897ca5b72fe60ee439be31.1714703667.git.bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 02:41:04 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198940 From: Bruce Ashfield Updating linux-yocto/6.6 to the latest korg -stable release that comprises the following commits: ba151416051a Linux 6.6.28 50971570ba79 drm/amd/display: fix disable otg wa logic in DCN316 5ca6cbd8adbe drm/amd/display: Set VSC SDP Colorimetry same way for MST and SST b12c3cfd8265 drm/amd/display: Program VSC SDP colorimetry for all DP sinks >= 1.4 bd3105a71d1c drm/amdgpu: fix incorrect number of active RBs for gfx11 fa2df4aa3e3a drm/amdgpu: always force full reset for SOC21 1520bf605d2f drm/amdgpu: Reset dGPU if suspend got aborted 2708354ffb70 drm/i915: Disable port sync when bigjoiner is used d1742f77bdf2 drm/i915/cdclk: Fix CDCLK programming order when pipes are active 09e6cbe98c10 x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI a823da65dce8 x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto 9c9cd014d048 x86/bugs: Clarify that syscall hardening isn't a BHI mitigation 7497589a96bc x86/bugs: Fix BHI handling of RRSBA c83e35f47595 x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' bdbbe95b536c x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES 39053a34963a x86/bugs: Fix BHI documentation 2d003904b934 x86/bugs: Fix return type of spectre_bhi_state() 548af6102c8e irqflags: Explicitly ignore lockdep_hrtimer_exit() argument 052d73ca9435 x86/apic: Force native_apic_mem_read() to use the MOV instruction 5c5fb5057933 selftests: timers: Fix abs() warning in posix_timers test 2978ee7c973c x86/cpu: Actually turn off mitigations by default for SPECULATION_MITIGATIONS=n d4a2a965d630 perf/x86: Fix out of range data d619651ae6e3 vhost: Add smp_rmb() in vhost_enable_notify() 8a05b6630be0 vhost: Add smp_rmb() in vhost_vq_avail_empty() a156f37b8e3c arm64: dts: imx8-ss-dma: fix spi lpcg indices e9e44fc88aba arm64: dts: imx8-ss-lsio: fix pwm lpcg indices 16c2dd96e479 arm64: dts: imx8-ss-conn: fix usb lpcg indices 7c4285471c03 arm64: dts: imx8-ss-dma: fix adc lpcg indices 19a8492473b0 arm64: dts: imx8-ss-dma: fix can lpcg indices 20ceb2b50fd5 arm64: dts: imx8qm-ss-dma: fix can lpcg indices 04e018bd913d drm/client: Fully protect modes[] with dev->mode_config.mutex 31806711e8a4 drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() a81b2acd43e2 drm/ast: Fix soft lockup 4d87f08eb755 drm/amdkfd: Reset GPU on queue preemption failure f9b31dfdc0b5 drm/i915/vrr: Disable VRR when using bigjoiner 88685c3e7d24 drm/vmwgfx: Enable DMA mappings with SEV d43e11d9c7fc accel/ivpu: Fix deadlock in context_xa 2704f4833550 scsi: sg: Avoid race in error handling & drop bogus warn 46af9047523e scsi: sg: Avoid sg device teardown race d15023fb4073 kprobes: Fix possible use-after-free issue on kprobe registration 96b7b0934a34 io_uring/net: restore msg_control on sendzc retry 585c5732caaa btrfs: qgroup: convert PREALLOC to PERTRANS after record_root_in_trans 363be24c010a btrfs: record delayed inode root in transaction 14431815a4ae btrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations 03cca8fe300f btrfs: qgroup: correctly model root qgroup rsv in convert 732752bac3bd selftests: mptcp: use += operator to append strings 4c6d2f453970 iommu/vt-d: Allocate local memory for page request queue f3ccbb6b6d52 iommu/vt-d: Fix wrong use of pasid config e3e1e80b692c tracing: hide unused ftrace_event_id_fops 2fc4d53ff055 net: ena: Set tx_info->xdpf value to NULL 354627f92679 net: ena: Use tx_ring instead of xdp_ring for XDP channel TX bc0ad6857c86 net: ena: Pass ena_adapter instead of net_device to ena_xmit_common() c891d7678f44 net: ena: Move XDP code to its new files 5c7f2240d983 net: ena: Fix incorrect descriptor free behavior dc1d1e35c8fd net: ena: Wrong missing IO completions check order 4d142dda057a net: ena: Fix potential sign extension issue 507cc232ffe5 af_unix: Fix garbage collector racing against connect() 301fdbaa0bba af_unix: Do not use atomic ops for unix_sk(sk)->inflight. 8b6c4b625826 net: dsa: mt7530: trap link-local frames regardless of ST Port State 785510c91be3 Revert "s390/ism: fix receive message buffer allocation" 54541e18ca9d net: sparx5: fix wrong config being used when reconfiguring PCS 292a76473334 net/mlx5e: Do not produce metadata freelist entries in Tx port ts WQE xmit 8777d6ad7b8a net/mlx5e: HTB, Fix inconsistencies with QoS SQs number f9ac93b6f3de net/mlx5e: Fix mlx5e_priv_init() cleanup flow 690e3d91c5b1 net/mlx5: Correctly compare pkt reformat ids 5cf5337ef701 net/mlx5: Properly link new fs rules into the tree cbe5852d3d8d net/mlx5: offset comp irq index in name by one 8c91c6085847 net/mlx5: Register devlink first under devlink lock 7a836736b653 net/mlx5: SF, Stop waiting for FW as teardown was called 89242d9584c3 netfilter: complete validation of user input e2c680fce985 Bluetooth: l2cap: Don't double set the HCI_CONN_MGMT_CONNECTED bit 72473db90900 Bluetooth: SCO: Fix not validating setsockopt user input cc950d584610 Bluetooth: hci_sync: Fix using the same interval and window for Coded PHY de3c85d321bf Bluetooth: hci_sync: Use QoS to determine which PHY to scan a39cc8d08270 Bluetooth: ISO: Don't reject BT_ISO_QOS if parameters are unset c832164549f8 Bluetooth: ISO: Align broadcast sync_timeout with connection timeout 01b11a056667 ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr 5fd0b8b48696 ipv4/route: avoid unused-but-set-variable warning 8a18d2f0c214 ipv6: fib: hide unused 'pn' variable cc10d3eadb58 octeontx2-af: Fix NIX SQ mode and BP config 601a89ea24d0 af_unix: Clear stale u->oob_skb. cba376eb036c net: ks8851: Handle softirqs at the end of IRQ thread to fix hang e454abe5cc17 net: ks8851: Inline ks8851_rx_skb() 499c993ca7cc bnxt_en: Reset PTP tx_avail after possible firmware reset 4cbcf8cffa01 bnxt_en: Fix error recovery for RoCE ulp client c60ed825530b bnxt_en: Fix possible memory leak in bnxt_rdma_aux_device_init() 1e91775286f2 s390/ism: fix receive message buffer allocation 190d9efa5773 geneve: fix header validation in geneve[6]_xmit_skb 740ffad95ca8 block: fix q->blkg_list corruption during disk rebind 7af5582ea672 octeontx2-pf: Fix transmit scheduler resource leak b143e19dc28c xsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING 80fa4fb27303 u64_stats: fix u64_stats_init() for lockdep when used repeatedly in one file bdce65f2a95e net: openvswitch: fix unwanted error log on timeout policy probing 60b87b5ecbe0 scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() 8a1821645708 scsi: hisi_sas: Modify the deadline for ata_wait_after_reset() aebbe59bd6a7 nouveau: fix function cast warning 42cbe04a5c77 Revert "drm/qxl: simplify qxl_fence_wait" 9bd1891cac32 cxl/core: Fix initialization of mbox_cmd.size_out in get event ea16e637e868 arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order f7ef9a437950 drm/msm/dpu: don't allow overriding data from catalog eb0ef4118693 cxl/core/regs: Fix usage of map->reg_type in cxl_decode_regblock() before assigned 645cef136e47 cxl/mem: Fix for the index of Clear Event Record Handle c0781d6898dc firmware: arm_scmi: Make raw debugfs entries non-seekable 6f9a8a54bb8e ARM: OMAP2+: fix USB regression on Nokia N8x0 ff75f9f74975 mmc: omap: restore original power up/down steps f6c34c9bb3d1 mmc: omap: fix deferred probe 267bcd2213ac mmc: omap: fix broken slot switch lookup 086426dc64e0 ARM: OMAP2+: fix N810 MMC gpiod table d73e7fb9d7c8 ARM: OMAP2+: fix bogus MMC GPIO labels on Nokia N8x0 7611722dc5dd media: cec: core: remove length check of Timer Status 9fdfeef4c541 PM: s2idle: Make sure CPUs will wakeup directly on resume 3860152c104f ACPI: scan: Do not increase dep_unmet for already met dependencies cfd758041d8b platform/chrome: cros_ec_uart: properly fix race condition 1e3b8874d55c drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 9ab5e44b9bac Bluetooth: Fix memory leak in hci_req_sync_complete() a9cd92bc051f ring-buffer: Only update pages_touched when a new page is touched 3f28d49a328f raid1: fix use-after-free for original bio in raid1_write_request() 1808b991c790 ARM: dts: imx7s-warp: Pass OV2680 link-frequencies 4ca2a5fb54ea batman-adv: Avoid infinite loop trying to resize local TT 341b5e1016cf ata: libata-scsi: Fix ata_scsi_dev_rescan() error path 99618f8a7216 ata: libata-core: Allow command duration limits detection for ACS-4 drives 05eedb5abc07 smb3: fix Open files on server counter going negative 06644f0d7193 drm/tilcdc: Set preferred depth ff7ae7b32324 crypto: jitter - add RCT/APT support for different OSRs 50cd24ddb6f0 arm64: defconfig: remove CONFIG_IPQ_APSS_5018 58e5c91d6701 x86/alternatives: Disable interrupts and sync when optimizing NOPs in place c878fd2d4c79 x86/alternatives: Sync core before enabling interrupts c2d64b9f52b6 qemux86: add configuration symbol to select values 630c33229e6d sched/isolation: really align nohz_full with rcu_nocbs 0e5e0f68e2e6 clear_warn_once: add a clear_warn_once= boot parameter 46934791b902 clear_warn_once: bind a timer to written reset value cdee9e38ff32 clear_warn_once: expand debugfs to include read support 82b562b81841 tools: Remove some options from CLANG_CROSS_FLAGS 36dc380b776b libbpf: Fix build warning on ref_ctr_off 9e3e1fe20982 perf: perf can not parser the backtrace of app in the 32bit system and 64bit kernel. e497a4a5da65 perf: x86-32: explicitly include 7b57ddd89565 perf: mips64: Convert __u64 to unsigned long long 1cfc19423dc7 perf: fix bench numa compilation 98bc2815fade perf: add SLANG_INC for slang.h 17209a70b9b3 perf: add sgidefs.h to for mips builds 9cd4258d910a perf: change --root to --prefix for python install 8110a4f26628 perf: add 'libperl not found' warning bc89d5e08f77 perf: force include of 4f6c760cc876 fat: Replace prandom_u32() with get_random_u32() bc53117b12b2 fat: don't use obsolete random32 call in namei_vfat 30b2236ab378 FAT: Added FAT_NO_83NAME cef98d22b4ed FAT: Add CONFIG_VFAT_NO_CREATE_WITH_LONGNAMES option 0bbd7daba9e1 FAT: Add CONFIG_VFAT_FS_NO_DUALNAMES option 5883fc340084 aufs6: adapt to v6.6 i_op->ctime changes c4342d979bf2 aufs6: fix magic.mk include path 35266bc2dc81 aufs6: adapt to v6.6 8edede4e98be aufs6: core 712248233ebe aufs6: standalone 3b71a8a848d8 aufs6: mmap 3e2924871f37 aufs6: base 7f4907a93101 aufs6: kbuild d2f7b03e4aa7 yaffs2: update VFS ctime operations to 6.6+ bcd6cfcd1aa0 yaffs2: v6.5 fixups cc615704b5f5 yaffs2: Fix miscalculation of devname buffer length 8ef2e22dcf91 yaffs2: convert user_namespace to mnt_idmap c9c749f9f7d3 yaffs2: replace bdevname call with sprintf 395b01cdc39d yaffs2: convert read_page -> readfolio d98b07e43ba6 yaffs: replace IS_ERR with IS_ERR_OR_NULL to check both ERR and NULL 613c6d50fdbe yaffs: fix -Wstringop-overread compile warning in yaffs_fix_null_name 622c4648936f yaffs2: v5.12+ build fixups (not runtime tested) 7562133d4090 yaffs: include blkdev.h dbd44252cd59 yaffs: fix misplaced variable declaration c223a10b1ac0 yaffs2: v5.6 build fixups 90f6007cfbf4 yaffs2: fix memory leak when /proc/yaffs is read 37ee169c5ea1 yaffs: add strict check when call yaffs_internal_read_super b6e007b8abb6 yaffs: repair yaffs_get_mtd_device fb98f65a466a yaffs: Fix build failure by handling inode i_version with proper atomic API 51e0aac75ea2 yaffs2: fix memory leak in mount/umount 2b74a0cae7b0 yaffs: Avoid setting any ACL releated xattr ff4130a9c376 Yaffs:check oob size before auto selecting Yaffs1 ba95b409c67c fs: yaffs2: replace CURRENT_TIME by other appropriate apis 8fa35eba9056 yaffs2: adjust to proper location of MS_RDONLY 1eb5deaad8c4 yaffs2: import git revision b4ce1bb (jan, 2020) 4dce67c1e8c8 initramfs: allow an optional wrapper script around initramfs generation 2f603d83fcc4 pnmtologo: use relocatable file name 664a6a0a484b tools: use basename to identify file in gen-mach-types 9de64bc0c185 lib/build_OID_registry: fix reproducibility issues ae9b80797295 vt/conmakehash: improve reproducibility a972323151bd iwlwifi: select MAC80211_LEDS conditionally 15d2adcc0198 net/dccp: make it depend on CONFIG_BROKEN (CVE-2020-16119) 5556a6c04b19 arm64/perf: Fix wrong cast that may cause wrong truncation 5552dc768ffc defconfigs: drop obselete options 00fe4152df31 arm64/perf: fix backtrace for AAPCS with FP enabled 3888d0652edf linux-yocto: Handle /bin/awk issues 3d55d299f23a uvesafb: provide option to specify timeout for task completion 23c068c080be uvesafb: print error message when task timeout occurs edbfc939266e compiler.h: Undef before redefining __attribute_const__ c99ae7e2a19a vmware: include jiffies.h 572d84d928c8 Resolve jiffies wrapping about arp fdcd47cac843 nfs: Allow default io size to be configured. 927d48801098 check console device file on fs when booting 57cc27f821dd mount_root: clarify error messages for when no rootfs found 1b53d82a8152 mconf: fix output of cflags and libraries 1811da09f42c menuconfig,mconf-cfg: Allow specification of ncurses location 83c2e0c6eb1f modpost: mask trivial warnings 6de673039484 kbuild: exclude meta directory from distclean processing 6decd32815f5 powerpc: serialize image targets f6b683b38318 arm: serialize build targets e798b09ebf57 mtd_blkdevs: add mtd_table_mutex lock back to blktrans_{open, release} to avoid race condition dc8a1e5a88f8 x86_64_defconfig: Fix warnings 68491e5f72b6 powerpc/ptrace: Disable array-bounds warning with gcc8 d71ebfce3004 powerpc: Disable attribute-alias warnings from gcc8 62f50884b8b1 powerpc: kexec fix for powerpc64 da6871c62c37 powerpc: Add unwind information for SPE registers of E500 core f161c880c11d mips: make current_cpu_data preempt safe 5e94a8247ce7 mips: vdso: fix 'jalr $t9' crash in vdso code 19e36714b1c7 mips: Kconfig: add QEMUMIPS64 option e2e537db3cbd 4kc cache tlb hazard: tlbp cache coherency aee9870611e5 malta uhci quirks: make allowance for slow 4k(e)c 881948cd1517 drm/fb-helper: move zeroing code to drm_fb_helper_fill_var 98ec1963fcb7 arm64: defconfig: cleanup config options f1727c537ba8 vexpress: Pass LOADADDR to Makefile 4474c32dc24a arm: ARM EABI socketcall 75e31a2b70fd ARM: LPAE: Invalidate the TLB for module addresses during translation fault Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.6.bb | 6 ++-- .../linux/linux-yocto-tiny_6.6.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index 0972d4edde..2f3008140d 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "5272561b019836f2ee2f175b23029649431d6fca" -SRCREV_meta ?= "c3d1322fb6ff68cdcf4d7a3c1140d81bfdc1320a" +SRCREV_machine ?= "471a0c8db3216975eaf56a8fe3a19550a6210e27" +SRCREV_meta ?= "1cd08f1fb2b33510783fa31c11150038a1ff8c42" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.6.27" +LINUX_VERSION ?= "6.6.28" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index 3b3e277c38..05ce4c5713 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.6.inc -LINUX_VERSION ?= "6.6.27" +LINUX_VERSION ?= "6.6.28" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" -SRCREV_meta ?= "c3d1322fb6ff68cdcf4d7a3c1140d81bfdc1320a" +SRCREV_machine ?= "c59995318b24c6b5a9969d43c0ca0179612aac2d" +SRCREV_meta ?= "1cd08f1fb2b33510783fa31c11150038a1ff8c42" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index a02452feda..2930343090 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.6/standard/base" KBRANCH:qemuloongarch64 ?= "v6.6/standard/base" KBRANCH:qemumips64 ?= "v6.6/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "51c07ec56f85fbbfa9ea6944a4b14eee7e715566" -SRCREV_machine:qemuarm64 ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" -SRCREV_machine:qemuloongarch64 ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" -SRCREV_machine:qemumips ?= "4bf661a8afc7323030a6af73fc5640ef4dabe01f" -SRCREV_machine:qemuppc ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" -SRCREV_machine:qemuriscv64 ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" -SRCREV_machine:qemuriscv32 ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" -SRCREV_machine:qemux86 ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" -SRCREV_machine:qemux86-64 ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" -SRCREV_machine:qemumips64 ?= "d3abfe3c736d5869cb26f24c653b7e6eeafac715" -SRCREV_machine ?= "4f3a41583a21c529bc7fc3a6c4a33bdffb16fa24" -SRCREV_meta ?= "c3d1322fb6ff68cdcf4d7a3c1140d81bfdc1320a" +SRCREV_machine:qemuarm ?= "c57230148694fc5902bdf9d157232c6ebb88dc1a" +SRCREV_machine:qemuarm64 ?= "c59995318b24c6b5a9969d43c0ca0179612aac2d" +SRCREV_machine:qemuloongarch64 ?= "c59995318b24c6b5a9969d43c0ca0179612aac2d" +SRCREV_machine:qemumips ?= "997005f111bca244db370a8ecaa3bcb37302d800" +SRCREV_machine:qemuppc ?= "c59995318b24c6b5a9969d43c0ca0179612aac2d" +SRCREV_machine:qemuriscv64 ?= "c59995318b24c6b5a9969d43c0ca0179612aac2d" +SRCREV_machine:qemuriscv32 ?= "c59995318b24c6b5a9969d43c0ca0179612aac2d" +SRCREV_machine:qemux86 ?= "c59995318b24c6b5a9969d43c0ca0179612aac2d" +SRCREV_machine:qemux86-64 ?= "c59995318b24c6b5a9969d43c0ca0179612aac2d" +SRCREV_machine:qemumips64 ?= "262154440336f42524f03266bb0cc6e7ed62f9d6" +SRCREV_machine ?= "c59995318b24c6b5a9969d43c0ca0179612aac2d" +SRCREV_meta ?= "1cd08f1fb2b33510783fa31c11150038a1ff8c42" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "5e828009c8b380739e13da92be847f10461c38b1" +SRCREV_machine:class-devupstream ?= "ba151416051a45ffca565f708584b9cd5c971481" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.6/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.6.27" +LINUX_VERSION ?= "6.6.28" PV = "${LINUX_VERSION}+git" From patchwork Fri May 3 02:40:38 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43197 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id C08D8C4345F for ; Fri, 3 May 2024 02:41:04 +0000 (UTC) Received: from mail-qk1-f172.google.com (mail-qk1-f172.google.com [209.85.222.172]) by mx.groups.io with SMTP id smtpd.web10.3828.1714704057394855392 for ; Thu, 02 May 2024 19:40:57 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=kaAXuLrl; spf=pass (domain: gmail.com, ip: 209.85.222.172, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f172.google.com with SMTP id af79cd13be357-790eedf44faso410606485a.3 for ; Thu, 02 May 2024 19:40:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714704056; x=1715308856; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=as259wPBSvBWPDJBMpa3ab6XvtUiGlrKUzooSRjSXHo=; b=kaAXuLrlcY1ZnowZwOO3iUmJHMke1t9q7Ef9jl21r7X7PwQ7+5j72hr8opUiqwCLRj J54oV5OnpXIhW5UPLxbIXXMGSylNqR1NQmdRaALgPo0bep+KmvI5hP1JWfM83WYY2SRh IEbzumXYcoe6v0xuOaotJOLU9a433/ntAcBmmfR67sMZF0+U4G4M+iQkyXdqUqUXstyf 9ltOpZ8kfgJzHrKeL16RxDEt6Lu/x3dtiP01WUX4mhD5oom2kT+d6uJH9YcS3siYX6z2 7FsenWv74ProckKgCi5kN38qhQxPDS8bElaFQak184dgfjGureVdE3S+Tmu45BpdBmok 7XiQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714704056; x=1715308856; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=as259wPBSvBWPDJBMpa3ab6XvtUiGlrKUzooSRjSXHo=; b=d5mntRxE5//N/uUDyxx45D/et9iJQkeDvzZXXqVCcET5nmHcj1zBqRbSsV+qwqtFYy PKctzLnVUsr1o8ayRsoSHIhmkSuLF4GUE7bub9m9oqc4JeW/kl14TwCMEU6HYPxYL2xD +3GRo0364ihrGsPqIDwCdWmUVxrOfLWa/lq9WezE5sNvRFEhxIq2QHnbK8TiWKrSiPhv N4l9VHQRlPU/Gq5vBuI7BBfxGPdxDxdoVM7U+W+KJ2BH8MLwTMqoTvb3QUvaPyAd85ju /IMQQdaoZbmtHVkaVEAjqcxh4qP/03Yyc6ZFlzdIz+l9x6HB8U+bJz1Af+kzhj/VIju7 K3Ew== X-Gm-Message-State: AOJu0Yzy9SRrzZ6g/HUjhGBzdu1zpUlX+Ycj5sQFCvz3qdMPrymtelpi Vk7nKZ6rO2ZV1GD51+ChZ3tInfqJ2c6IcTnVolet1ZMduapyI2YE X-Google-Smtp-Source: AGHT+IE9LVidaJfjIs/+DBTmzqP3Soe/wLRvo3yc7HQXoQg1X8k1b5bBXvJ7+j/rn9JsnEG22VAeoQ== X-Received: by 2002:a05:620a:294a:b0:792:7d61:1dd9 with SMTP id n10-20020a05620a294a00b007927d611dd9mr924929qkp.73.1714704056364; Thu, 02 May 2024 19:40:56 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id bm34-20020a05620a19a200b0078ec3aa9cc7sm856163qkb.25.2024.05.02.19.40.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 19:40:55 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 10/12] linux-yocto/6.6: update CVE exclusions (6.6.28) Date: Thu, 2 May 2024 22:40:38 -0400 Message-Id: X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 02:41:04 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198941 From: Bruce Ashfield Data pulled from: https://github.com/nluedtke/linux_kernel_cves 1/1 [ Author: Nicholas Luedtke Email: nicholas.luedtke@uwalumni.com Subject: Update 8Apr24 Date: Tue, 9 Apr 2024 18:19:11 -0400 ] Signed-off-by: Bruce Ashfield --- meta/recipes-kernel/linux/cve-exclusion_6.6.inc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc index 9e5be066a5..df09c1fd1d 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2024-04-15 16:05:11.813475+00:00 for version 6.6.27 +# Generated at 2024-04-25 18:59:44.140399+00:00 for version 6.6.28 python check_kernel_cve_status_version() { - this_version = "6.6.27" + this_version = "6.6.28" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) From patchwork Fri May 3 02:40:39 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43199 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id CED2EC25B75 for ; Fri, 3 May 2024 02:41:04 +0000 (UTC) Received: from mail-qk1-f171.google.com (mail-qk1-f171.google.com [209.85.222.171]) by mx.groups.io with SMTP id smtpd.web11.4005.1714704059377009048 for ; Thu, 02 May 2024 19:40:59 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=hFEU5cGv; spf=pass (domain: gmail.com, ip: 209.85.222.171, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f171.google.com with SMTP id af79cd13be357-790c7785ddbso433379085a.1 for ; Thu, 02 May 2024 19:40:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714704058; x=1715308858; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=QbF3LUuwAx0JF7sZn1gxmMh1ZakZBC091DeBIv7pXqM=; b=hFEU5cGvnpTLd/ElkA630jwS/QrBmQwgFkLHve4LlFgGn7yJqrVxOYjUL1ADt2wQzy ZQIRokUKBX7lTLyRo83HihWH8iQ1V+MDYvZEDKmGax7/Bv4cdd1HffwFTKobSlJazPbn B/YMtxdCdNk8gNOiQGMRFeQxqdqf9ufgoDDuZDmk7TrvFVwYoySsS8kiWaLjtbrFgngZ 2Otb62sTFIpzCA3yAAKKeD2P0fX/N6C+9HS5lwfo8s5jUcF88vgYc8pMkhl2fJc0a0AS n3Le7OYpbJm+RZapmPKYiNoLQsv6tVYXRb59uOH/v8o3y/KkthavH7hjTg1r9TMhUz98 80gw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714704058; x=1715308858; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=QbF3LUuwAx0JF7sZn1gxmMh1ZakZBC091DeBIv7pXqM=; b=KdOJ0zqYBfR6kNQpL5fLCDAlh1xt35vHRcN3tyO4nS8ue1DoRME68tfJWoquUv/Qhb 6lrp0pWMUZQfT29HEXpxZNdj6Ze1ugJFETn6gqi3+/K3Dm/Xz3F+/GKyMk47kgFuzhKl VIw9QDk8O/pFdbFZr5Rto54MNQtIUqrdPEjyHQgQbw6Uby5XdRwwRn4nf+0yCzjZpjM+ 1Qzrw0SgQd1FaQKN+cvRXIOm8w44yX/u450ancyYqN29tJI6bY7hYIB1EIv15CuFxAvH kzt4uuB42fKll3WfntcOujTprq6TuZGZWMs+MzBMddp9S5XfOMhXGkzBU/jYREhBBPi1 aVvQ== X-Gm-Message-State: AOJu0YxgaZJ78JpWizvWpw0AfEifc7yhIGoy72UExRIQZBku/X7sENaJ 1tCKHKmfS7ohB8tfzwy9c6vx08+7nht+DNyPxFJjdGbunfRbUtUnr97JBA== X-Google-Smtp-Source: AGHT+IFSPody/1K05+6CrUd/qAhhuXsfpE0rTEGIck/ROxtoRFYR5bx7QxHojPEGz1xi3Gr7h1KOXw== X-Received: by 2002:a05:620a:2953:b0:790:98cd:647e with SMTP id n19-20020a05620a295300b0079098cd647emr1996919qkp.11.1714704058236; Thu, 02 May 2024 19:40:58 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id bm34-20020a05620a19a200b0078ec3aa9cc7sm856163qkb.25.2024.05.02.19.40.56 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 19:40:57 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 11/12] linux-yocto/6.6: update to v6.6.29 Date: Thu, 2 May 2024 22:40:39 -0400 Message-Id: <29bbb045219d1b56eb794932c164923bbcaa8464.1714703667.git.bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 02:41:04 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198942 From: Bruce Ashfield Updating linux-yocto/6.6 to the latest korg -stable release that comprises the following commits: a3463f081046 Linux 6.6.29 63cc4f14bb03 selftests: kselftest: Fix build failure with NOLIBC c67f926ec870 thunderbolt: Reset only non-USB4 host routers in resume b0f4478838be PCI/ASPM: Fix deadlock when enabling ASPM 3b629239773b ksmbd: common: use struct_group_attr instead of struct_group for network_open_info 4cbb88351b55 ksmbd: clear RENAME_NOREPLACE before calling vfs_rename 5c20b242d4fe ksmbd: validate request buffer size in smb2_allocate_rsp_buf() 3160d9734453 ksmbd: fix slab-out-of-bounds in smb2_allocate_rsp_buf 6355b468e2a7 powerpc/ftrace: Ignore ftrace locations in exit text sections 43a71c1b4b3a virtio_net: Do not send RSS key if it is not supported bd41ee1efd47 net: dsa: mt7530: fix enabling EEE on MT7531 switch on all boards 21b9d89d9342 net: dsa: mt7530: fix improper frames on all 25MHz and 40MHz XTAL MT7530 2382eae66b19 nilfs2: fix OOB in nilfs_set_de_type e46d3be714ad bootconfig: use memblock_free_late to free xbc memory to buddy a019b44b1bc6 nouveau: fix instmem race condition around ptr stores 5d2f587aef37 drm/vmwgfx: Fix crtc's atomic check conditional f1769cb2c912 drm/vmwgfx: Sort primary plane formats by order of preference 65674218b43f drm/vmwgfx: Fix prime import/export db74904a93a3 drm/amdgpu: remove invalid resource->start check v2 aa02d43367a9 drm/amdkfd: Fix memory leak in create_process failure ef13eeca7c79 drm/amdgpu: validate the parameters of bo mapping operations more clearly 885d4c31a432 fuse: fix leaked ENOSYS error on first statx call cc10db003033 mm/shmem: inline shmem_is_huge() for disabled transparent hugepages 882e1180c83f mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled c85106fb08f4 mm,swapops: update check in is_pfn_swap_entry for hwpoison entries db01bfbdddd8 mm/userfaultfd: allow hugetlb change protection upon poison entry 81cf85ae4f2d init/main.c: Fix potential static_command_line memory overflow 31f815cb4360 arm64: hibernate: Fix level3 translation fault in swsusp_save() e972b6a70126 arm64/head: Disable MMU at EL2 before clearing HCR_EL2.E2H cdf811a93747 KVM: x86/mmu: Write-protect L2 SPTEs in TDP MMU when clearing dirty status 947d518e0daf KVM: x86/pmu: Do not mask LVTPC when handling a PMI on AMD platforms 037e48ceccf1 KVM: x86/pmu: Disable support for adaptive PEBS bdda0c17fe90 KVM: x86: Snapshot if a vCPU's vendor model is AMD vs. Intel compatible 7fce9f0f4810 sched: Add missing memory barrier in switch_mm_cid ac107356aabc fs: sysfs: Fix reference leak in sysfs_break_active_protection() 8defb1d22ba0 speakup: Avoid crash on very long word 2a19c2a5caf0 mei: me: disable RPL-S on SPS and IGN firmwares f356fd0cbd9c usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error aa61f87fd18b usb: Disable USB3 LPM at shutdown 8a139fa44870 usb: dwc2: host: Fix dereference issue in DDMA completion flow. 2ff436b63998 Revert "usb: cdc-wdm: close race between read and workqueue" d841a93b5a24 USB: serial: option: add Telit FN920C04 rmnet compositions 0772a60994ee USB: serial: option: add Rolling RW101-GL and RW135-GL support b39ecc8c97ab USB: serial: option: support Quectel EM060K sub-models aeb7de0a3840 USB: serial: option: add Lonsung U8300/U9300 product f91606d71fab USB: serial: option: add support for Fibocom FM650/FG650 590d0e130757 USB: serial: option: add Fibocom FM135-GL variants 83290f9f0719 serial: core: Fix missing shutdown and startup for serial base port 7ae7104d5434 serial: core: Clearing the circular buffer before NULLifying it 12e9459ddaea serial: stm32: Reset .throttled state in .startup() 9f9be0ec3130 serial: stm32: Return IRQ_NONE in the ISR if no handling happend 52aaf1ff1462 serial/pmac_zilog: Remove flawed mitigation for rx irq flood 5f40fd6ca2cf serial: mxs-auart: add spinlock around changing cts state 59f33af97961 comedi: vmk80xx: fix incomplete endpoint checking 9954c514424f thunderbolt: Fix wake configurations after device unplug 3238b23e661e thunderbolt: Avoid notify PM core about runtime PM resume 1d7f1049035b binder: check offset alignment in binder_get_object() ce2ec45c7817 ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC 90782cf17e9c ALSA: hda/realtek: Add quirks for Huawei Matebook D14 NBLB-WAX9N 05e6bfd31b06 ALSA: hda/tas2781: Add new vendor_id and subsystem_id to support ThinkPad ICE-1 1da8f46f1332 ALSA: hda/tas2781: correct the register for pow calibrated data 02d32d5acb13 ALSA: seq: ump: Fix conversion from MIDI2 to MIDI1 UMP messages 388a7302beda net/mlx5: E-switch, store eswitch pointer before registering devlink_param 00cf046afe34 x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ 5facc0428bd2 x86/bugs: Fix BHI retpoline check c0dcd5c072e2 clk: mediatek: Do a runtime PM get on controllers during probe 2c077fdfd09d clk: Get runtime PM before walking tree for clk_summary 888a44f261ae clk: Show active consumers of clocks in debugfs 60ff482c4205 clk: Get runtime PM before walking tree during disable_unused 731ffd8dea1c clk: Initialize struct clk_core kref earlier 02a516cbda04 clk: Remove prepare_lock hold assertion in __clk_release() d0d04efa2e36 interconnect: Don't access req_list while it's being manipulated d7cc1d721564 platform/x86/amd/pmc: Extend Framework 13 quirk to more BIOSes 3adcbec4dc62 usb: new quirk to reduce the SET_ADDRESS request timeout 26cc5cb00310 usb: xhci: Add timeout argument in address_device USB HCD callback ac1ddbed5b2e drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go 771ad4dfbdbb ALSA: scarlett2: Rename scarlett_gen2 to scarlett2 4afc65cf78bd PCI: Simplify pcie_capability_clear_and_set_word() to ..._clear_word() d9a28916ff35 PCI/DPC: Use FIELD_GET() 4ef929059230 ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support 92088c488e20 ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support 2c57a5c68f49 ALSA: scarlett2: Add correct product series name to messages 9c48e24cb71b ALSA: scarlett2: Default mixer driver to enabled 3c1d704d9266 thunderbolt: Reset topology created by the boot firmware 90cdb98254ef thunderbolt: Make tb_switch_reset() support Thunderbolt 2, 3 and USB4 routers dc32d754d7cc thunderbolt: Introduce tb_path_deactivate_hop() 6c24584aface thunderbolt: Introduce tb_port_reset() ac630fb8dbb5 ASoC: ti: Convert Pandora ASoC to GPIO descriptors a95f279ecd33 ALSA: scarlett2: Add support for Clarett 8Pre USB a299e0bf4d2d ALSA: scarlett2: Move USB IDs out from device_info struct 259486b5bdc6 drm/radeon: make -fstrict-flex-arrays=3 happy 158010bf1a84 drm/panel: visionox-rm69299: don't unregister DSI device 6690cc2732e2 drm: nv04: Fix out of bounds access 2df56f4ea769 s390/cio: fix race condition during online processing e43c12451a7d s390/qdio: handle deferred cc1 c418d7a675d8 perf lock contention: Add a missing NULL check 910be4f9f805 RDMA/mlx5: Fix port number for counter query in multi-port configuration b42852826323 RDMA/cm: Print the old state when cm_destroy_id gets timeout 99a7ccc4e038 RDMA/rxe: Fix the problem "mutex_destroy missing" 75170320459a drm/i915/mst: Limit MST+DSC to TGL+ 7ba7f7074006 net: ethernet: ti: am65-cpsw-nuss: cleanup DMA Channels before using them 6855f724f196 net: ethernet: mtk_eth_soc: fix WED + wifi reset cd81184797a0 gpiolib: swnode: Remove wrong header inclusion 121fb75414ab s390/ism: Properly fix receive message buffer allocation f8de1b6208bf net: dsa: mt7530: fix port mirroring for MT7988 SoC switch d1be39605392 net: dsa: mt7530: fix mirroring frames received on local port 40f4ced305c6 tun: limit printing rate when illegal packet received by tun dev 0ada9981cdfe ice: Fix checking for unsupported keys on non-tunnel device 8d2e34e4e20e ice: tc: allow zero flags in parsing tc flower 91efeadfa20e ice: tc: check src_vsi in case of traffic from VF 93d565ebe41f net: stmmac: Fix IP-cores specific MAC capabilities 178856bf1f50 net: stmmac: Fix max-speed being ignored on queue re-init 0580dcc53a7f net: stmmac: Apply half-duplex-less constraint for DW QoS Eth only 447e00fb04f7 octeontx2-pf: fix FLOW_DIS_IS_FRAGMENT implementation 622479d10047 net: change maximum number of UDP segments to 128 48c4bb81df19 net/mlx5e: Prevent deadlock while disabling aRFS c7fbc7bb48fc net/mlx5: Lag, restore buckets number to default after hash LAG deactivation ff928d7bb1d8 net: sparx5: flower: fix fragment flags handling 022d81a709cd af_unix: Don't peek OOB data without MSG_OOB. aea3cb8cfb30 af_unix: Call manage_oob() for every skb in unix_stream_read_generic(). 4ed82dd368ad netfilter: flowtable: incorrect pppoe tuple a2471d271042 netfilter: flowtable: validate pppoe header ebf7c9746f07 netfilter: nft_set_pipapo: do not free live element 3f59ac29dea0 netfilter: br_netfilter: skip conntrack input hook for promisc packets ad333578f736 netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() a9ebf340d123 netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() 5562a51c6e4e scsi: ufs: qcom: Add missing interconnect bandwidth values for Gear 5 ac4ad513de4f arm64: tlb: Fix TLBI RANGE operand 663f72cf95ed arm64/mm: Modify range-based tlbi to decrement scale bc835b838999 net: usb: ax88179_178a: avoid writing the mac address before first reading 37e14dbe8c8f scsi: core: Fix handling of SCMD_FAIL_IF_RECOVERING 998f52a86055 random: handle creditable entropy from atomic process context 9f39e9e367b3 selftests/ftrace: Limit length in subsystem-enable tests 5b84dab87cdb SUNRPC: Fix rpcgss_context trace event acceptor field 5e3eb862df9f drm/i915/vma: Fix UAF on destroy against retire race 63fb4af8a069 io_uring: Fix io_cqring_wait() not restoring sigmask on get_timespec64() failure 390a71e361f4 media: videobuf2: request more buffers for vb2_read bef71390ac37 drm/msm/dpu: populate SSPP scaler block version fe09b8d26e1a selftests: timers: Fix posix_timers ksft_print_msg() warning dbfb5232bd83 ceph: redirty page before returning AOP_WRITEPAGE_ACTIVATE 985b9ee8a2cf ceph: rename _to_client() to _to_fs_client() 2e2023e9a4c2 ceph: pass the mdsc to several helpers a17236f99f49 drm/amd/display: Do not recursively call manual trigger programming c626db7151bf selftests/timers/posix_timers: Reimplement check_timer_distribution() b04cae49a5e7 selftests: timers: Convert posix_timers test to generate KTAP output 9d106175b7a0 drm/i915: Disable live M/N updates when using bigjoiner ccb0934aeb3f drm/i915: Adjust seamless_m_n flag behaviour deaeb5b64c5b drm/i915: Enable VRR later during fastsets 7e50ac4203d6 drm/i915: Extract intel_crtc_vblank_evade_scanlines() e19dc8c49e97 drm/i915: Change intel_pipe_update_{start,end}() calling convention 51cc733fb48e drm/i915/cdclk: Fix voltage_level programming edge case 6711b0817a38 drm/i915/mst: Reject FEC+MST on ICL 6b625d2743b4 drm/i915: Fix FEC pipe A vs. DDI A mixup 488d4cbc6f28 smb: client: refresh referral without acquiring refpath_lock 645f332c6b63 smb: client: guarantee refcounted children from parent session 441786be0c19 smb3: show beginning time for per share stats 6202996a1c18 smb: client: fix UAF in smb2_reconnect_server() fe1bad73d35f smb: client: remove extra @chan_count check in __cifs_put_smb_ses() 06644f0d7193 drm/tilcdc: Set preferred depth ff7ae7b32324 crypto: jitter - add RCT/APT support for different OSRs 50cd24ddb6f0 arm64: defconfig: remove CONFIG_IPQ_APSS_5018 58e5c91d6701 x86/alternatives: Disable interrupts and sync when optimizing NOPs in place c878fd2d4c79 x86/alternatives: Sync core before enabling interrupts c2d64b9f52b6 qemux86: add configuration symbol to select values 630c33229e6d sched/isolation: really align nohz_full with rcu_nocbs 0e5e0f68e2e6 clear_warn_once: add a clear_warn_once= boot parameter 46934791b902 clear_warn_once: bind a timer to written reset value cdee9e38ff32 clear_warn_once: expand debugfs to include read support 82b562b81841 tools: Remove some options from CLANG_CROSS_FLAGS 36dc380b776b libbpf: Fix build warning on ref_ctr_off 9e3e1fe20982 perf: perf can not parser the backtrace of app in the 32bit system and 64bit kernel. e497a4a5da65 perf: x86-32: explicitly include 7b57ddd89565 perf: mips64: Convert __u64 to unsigned long long 1cfc19423dc7 perf: fix bench numa compilation 98bc2815fade perf: add SLANG_INC for slang.h 17209a70b9b3 perf: add sgidefs.h to for mips builds 9cd4258d910a perf: change --root to --prefix for python install 8110a4f26628 perf: add 'libperl not found' warning bc89d5e08f77 perf: force include of 4f6c760cc876 fat: Replace prandom_u32() with get_random_u32() bc53117b12b2 fat: don't use obsolete random32 call in namei_vfat 30b2236ab378 FAT: Added FAT_NO_83NAME cef98d22b4ed FAT: Add CONFIG_VFAT_NO_CREATE_WITH_LONGNAMES option 0bbd7daba9e1 FAT: Add CONFIG_VFAT_FS_NO_DUALNAMES option 5883fc340084 aufs6: adapt to v6.6 i_op->ctime changes c4342d979bf2 aufs6: fix magic.mk include path 35266bc2dc81 aufs6: adapt to v6.6 8edede4e98be aufs6: core 712248233ebe aufs6: standalone 3b71a8a848d8 aufs6: mmap 3e2924871f37 aufs6: base 7f4907a93101 aufs6: kbuild d2f7b03e4aa7 yaffs2: update VFS ctime operations to 6.6+ bcd6cfcd1aa0 yaffs2: v6.5 fixups cc615704b5f5 yaffs2: Fix miscalculation of devname buffer length 8ef2e22dcf91 yaffs2: convert user_namespace to mnt_idmap c9c749f9f7d3 yaffs2: replace bdevname call with sprintf 395b01cdc39d yaffs2: convert read_page -> readfolio d98b07e43ba6 yaffs: replace IS_ERR with IS_ERR_OR_NULL to check both ERR and NULL 613c6d50fdbe yaffs: fix -Wstringop-overread compile warning in yaffs_fix_null_name 622c4648936f yaffs2: v5.12+ build fixups (not runtime tested) 7562133d4090 yaffs: include blkdev.h dbd44252cd59 yaffs: fix misplaced variable declaration c223a10b1ac0 yaffs2: v5.6 build fixups 90f6007cfbf4 yaffs2: fix memory leak when /proc/yaffs is read 37ee169c5ea1 yaffs: add strict check when call yaffs_internal_read_super b6e007b8abb6 yaffs: repair yaffs_get_mtd_device fb98f65a466a yaffs: Fix build failure by handling inode i_version with proper atomic API 51e0aac75ea2 yaffs2: fix memory leak in mount/umount 2b74a0cae7b0 yaffs: Avoid setting any ACL releated xattr ff4130a9c376 Yaffs:check oob size before auto selecting Yaffs1 ba95b409c67c fs: yaffs2: replace CURRENT_TIME by other appropriate apis 8fa35eba9056 yaffs2: adjust to proper location of MS_RDONLY 1eb5deaad8c4 yaffs2: import git revision b4ce1bb (jan, 2020) 4dce67c1e8c8 initramfs: allow an optional wrapper script around initramfs generation 2f603d83fcc4 pnmtologo: use relocatable file name 664a6a0a484b tools: use basename to identify file in gen-mach-types 9de64bc0c185 lib/build_OID_registry: fix reproducibility issues ae9b80797295 vt/conmakehash: improve reproducibility a972323151bd iwlwifi: select MAC80211_LEDS conditionally 15d2adcc0198 net/dccp: make it depend on CONFIG_BROKEN (CVE-2020-16119) 5556a6c04b19 arm64/perf: Fix wrong cast that may cause wrong truncation 5552dc768ffc defconfigs: drop obselete options 00fe4152df31 arm64/perf: fix backtrace for AAPCS with FP enabled 3888d0652edf linux-yocto: Handle /bin/awk issues 3d55d299f23a uvesafb: provide option to specify timeout for task completion 23c068c080be uvesafb: print error message when task timeout occurs edbfc939266e compiler.h: Undef before redefining __attribute_const__ c99ae7e2a19a vmware: include jiffies.h 572d84d928c8 Resolve jiffies wrapping about arp fdcd47cac843 nfs: Allow default io size to be configured. 927d48801098 check console device file on fs when booting 57cc27f821dd mount_root: clarify error messages for when no rootfs found 1b53d82a8152 mconf: fix output of cflags and libraries 1811da09f42c menuconfig,mconf-cfg: Allow specification of ncurses location 83c2e0c6eb1f modpost: mask trivial warnings 6de673039484 kbuild: exclude meta directory from distclean processing 6decd32815f5 powerpc: serialize image targets f6b683b38318 arm: serialize build targets e798b09ebf57 mtd_blkdevs: add mtd_table_mutex lock back to blktrans_{open, release} to avoid race condition dc8a1e5a88f8 x86_64_defconfig: Fix warnings 68491e5f72b6 powerpc/ptrace: Disable array-bounds warning with gcc8 d71ebfce3004 powerpc: Disable attribute-alias warnings from gcc8 62f50884b8b1 powerpc: kexec fix for powerpc64 da6871c62c37 powerpc: Add unwind information for SPE registers of E500 core f161c880c11d mips: make current_cpu_data preempt safe 5e94a8247ce7 mips: vdso: fix 'jalr $t9' crash in vdso code 19e36714b1c7 mips: Kconfig: add QEMUMIPS64 option e2e537db3cbd 4kc cache tlb hazard: tlbp cache coherency aee9870611e5 malta uhci quirks: make allowance for slow 4k(e)c 881948cd1517 drm/fb-helper: move zeroing code to drm_fb_helper_fill_var 98ec1963fcb7 arm64: defconfig: cleanup config options f1727c537ba8 vexpress: Pass LOADADDR to Makefile 4474c32dc24a arm: ARM EABI socketcall 75e31a2b70fd ARM: LPAE: Invalidate the TLB for module addresses during translation fault Signed-off-by: Bruce Ashfield --- .../linux/linux-yocto-rt_6.6.bb | 6 ++-- .../linux/linux-yocto-tiny_6.6.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.6.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb index 2f3008140d..ea429692d8 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "471a0c8db3216975eaf56a8fe3a19550a6210e27" -SRCREV_meta ?= "1cd08f1fb2b33510783fa31c11150038a1ff8c42" +SRCREV_machine ?= "99d3632c1cf7688066e57aea89f9adfe8d1a5ca5" +SRCREV_meta ?= "a78c74a3510067017dda1926f88bd914f0a053b3" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.6.28" +LINUX_VERSION ?= "6.6.29" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb index 05ce4c5713..bdad73bbbc 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.6.inc -LINUX_VERSION ?= "6.6.28" +LINUX_VERSION ?= "6.6.29" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "c59995318b24c6b5a9969d43c0ca0179612aac2d" -SRCREV_meta ?= "1cd08f1fb2b33510783fa31c11150038a1ff8c42" +SRCREV_machine ?= "6655dc03f5de7bb734da3ec8eb97f9be281dfbdb" +SRCREV_meta ?= "a78c74a3510067017dda1926f88bd914f0a053b3" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb index 2930343090..12197ba414 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.6.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.6/standard/base" KBRANCH:qemuloongarch64 ?= "v6.6/standard/base" KBRANCH:qemumips64 ?= "v6.6/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "c57230148694fc5902bdf9d157232c6ebb88dc1a" -SRCREV_machine:qemuarm64 ?= "c59995318b24c6b5a9969d43c0ca0179612aac2d" -SRCREV_machine:qemuloongarch64 ?= "c59995318b24c6b5a9969d43c0ca0179612aac2d" -SRCREV_machine:qemumips ?= "997005f111bca244db370a8ecaa3bcb37302d800" -SRCREV_machine:qemuppc ?= "c59995318b24c6b5a9969d43c0ca0179612aac2d" -SRCREV_machine:qemuriscv64 ?= "c59995318b24c6b5a9969d43c0ca0179612aac2d" -SRCREV_machine:qemuriscv32 ?= "c59995318b24c6b5a9969d43c0ca0179612aac2d" -SRCREV_machine:qemux86 ?= "c59995318b24c6b5a9969d43c0ca0179612aac2d" -SRCREV_machine:qemux86-64 ?= "c59995318b24c6b5a9969d43c0ca0179612aac2d" -SRCREV_machine:qemumips64 ?= "262154440336f42524f03266bb0cc6e7ed62f9d6" -SRCREV_machine ?= "c59995318b24c6b5a9969d43c0ca0179612aac2d" -SRCREV_meta ?= "1cd08f1fb2b33510783fa31c11150038a1ff8c42" +SRCREV_machine:qemuarm ?= "45982c347ee123883a88f220d1d9a740e2c2b959" +SRCREV_machine:qemuarm64 ?= "6655dc03f5de7bb734da3ec8eb97f9be281dfbdb" +SRCREV_machine:qemuloongarch64 ?= "6655dc03f5de7bb734da3ec8eb97f9be281dfbdb" +SRCREV_machine:qemumips ?= "738f344ef6da38ebf6fcca87b701281c930b16e4" +SRCREV_machine:qemuppc ?= "6655dc03f5de7bb734da3ec8eb97f9be281dfbdb" +SRCREV_machine:qemuriscv64 ?= "6655dc03f5de7bb734da3ec8eb97f9be281dfbdb" +SRCREV_machine:qemuriscv32 ?= "6655dc03f5de7bb734da3ec8eb97f9be281dfbdb" +SRCREV_machine:qemux86 ?= "6655dc03f5de7bb734da3ec8eb97f9be281dfbdb" +SRCREV_machine:qemux86-64 ?= "6655dc03f5de7bb734da3ec8eb97f9be281dfbdb" +SRCREV_machine:qemumips64 ?= "7f4b889b7acb9fe36e290bf40c2e9b6cec523f6d" +SRCREV_machine ?= "6655dc03f5de7bb734da3ec8eb97f9be281dfbdb" +SRCREV_meta ?= "a78c74a3510067017dda1926f88bd914f0a053b3" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "ba151416051a45ffca565f708584b9cd5c971481" +SRCREV_machine:class-devupstream ?= "a3463f08104612fc979c41fa54733e925205d3d7" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.6/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.6.28" +LINUX_VERSION ?= "6.6.29" PV = "${LINUX_VERSION}+git" From patchwork Fri May 3 02:40:40 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 43198 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id DC166C41513 for ; Fri, 3 May 2024 02:41:04 +0000 (UTC) Received: from mail-qk1-f170.google.com (mail-qk1-f170.google.com [209.85.222.170]) by mx.groups.io with SMTP id smtpd.web11.4006.1714704060828975644 for ; Thu, 02 May 2024 19:41:00 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=gzOVNKvA; spf=pass (domain: gmail.com, ip: 209.85.222.170, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f170.google.com with SMTP id af79cd13be357-78edc3e7cd9so622117585a.1 for ; Thu, 02 May 2024 19:41:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1714704060; x=1715308860; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=PyQpyHBnJeBQPvtq0kbuH2KUjZ3JqT+XrJuj8RXAE7A=; b=gzOVNKvA6KTddYHUTa1CgWDolbdRyow1jZ4XszihCrgIzA4/mBZsP/bR+soVRiWwej z1s58EBXkKTLyxRBXJqX4So64qADytu+u6ClyRdCeZ1kUjCLMfhFwkWSJuZinoyDPVBJ HWEP0PqqYm1C3LFYxc8TIMk8fAseboboqquOVrqFNNIZXlHdI9ecKLh+9jhAbkk/o6i7 H0Hfnc9s1SETKiIULSEurgDrxwoT7b+9EotlOGscts83nDo8gxyvQCMruIGZrb2Qng1M xE4ISjL3c2KuCbYrnyCZftmIQkEnWbWH2zSQJX5WxjgUVSYkB3mIH86sSFB+RDxJrl+l QPIA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1714704060; x=1715308860; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=PyQpyHBnJeBQPvtq0kbuH2KUjZ3JqT+XrJuj8RXAE7A=; b=DtTnOh+ZSMgNTIuMnFPcCM+MHeB1CqGTMs82ex+YMWX218JCWBI6DXyYuX7isVbX6r 05EREX7Xwkggzio7Kn65oRfkRywOdQcPLskKyphxlsiDzfpg8+OyJbnyTDoNvnmmNrpi 2Tz1gNQM4SQrkWYm+9rK/quOr41KitX80+1LA6vtEV2fNvpjsPSvR1K1EM6402gXg93y +vNUbO791IxnGvy6lXZ0q7TPAYmqzvfc+AaT6A/SCH/qYUCXkebxSFzu35/Mqh0fN3cX Fem3+5LU5SF/8QO6uc8T3i3tO1fhH2nf2lRtTSq1JjiRh3PnFaKZkW6+eutOyDaGMDmM QUjA== X-Gm-Message-State: AOJu0Yw7dbnGCSYttEOdzuM0ZSSmb7oZcjAUCbzkGvKD+u0jVG68fOa1 gPUwfer+JxzyDciG6yjD6jlC8NXdrr9Kgjjx7VDKyxn2lOxnNNnw X-Google-Smtp-Source: AGHT+IFIyjVlv+j+xh1d4SR1Hr7EgC2mKOU7M9CARhW4DYRcJpbGSW9DOEffXn7yOPmibQp5RtFdww== X-Received: by 2002:a05:620a:84d:b0:790:9edf:5f10 with SMTP id u13-20020a05620a084d00b007909edf5f10mr1441451qku.27.1714704059749; Thu, 02 May 2024 19:40:59 -0700 (PDT) Received: from bruce-XPS-8940.localdomain (pool-174-112-62-108.cpe.net.cable.rogers.com. [174.112.62.108]) by smtp.gmail.com with ESMTPSA id bm34-20020a05620a19a200b0078ec3aa9cc7sm856163qkb.25.2024.05.02.19.40.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 May 2024 19:40:58 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 12/12] linux-yocto/6.6: update CVE exclusions (6.6.29) Date: Thu, 2 May 2024 22:40:40 -0400 Message-Id: <0af5f4f2f3c50c916050b41185c556d7eb2c4317.1714703667.git.bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 03 May 2024 02:41:04 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/198943 From: Bruce Ashfield Data pulled from: https://github.com/nluedtke/linux_kernel_cves 1/1 [ Author: Nicholas Luedtke Email: nicholas.luedtke@uwalumni.com Subject: Update 8Apr24 Date: Tue, 9 Apr 2024 18:19:11 -0400 ] Signed-off-by: Bruce Ashfield --- meta/recipes-kernel/linux/cve-exclusion_6.6.inc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc index df09c1fd1d..9f1f03ac53 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2024-04-25 18:59:44.140399+00:00 for version 6.6.28 +# Generated at 2024-05-02 12:41:43.351358+00:00 for version 6.6.29 python check_kernel_cve_status_version() { - this_version = "6.6.28" + this_version = "6.6.29" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))