From patchwork Fri Sep 29 20:04:45 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 31399 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 67CBAE728E6 for ; Fri, 29 Sep 2023 20:05:05 +0000 (UTC) Received: from mail-vs1-f49.google.com (mail-vs1-f49.google.com [209.85.217.49]) by mx.groups.io with SMTP id smtpd.web11.27702.1696017899112251574 for ; Fri, 29 Sep 2023 13:04:59 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=KQpyvV7f; spf=pass (domain: gmail.com, ip: 209.85.217.49, mailfrom: bruce.ashfield@gmail.com) Received: by mail-vs1-f49.google.com with SMTP id ada2fe7eead31-4526a936dcaso6511320137.2 for ; Fri, 29 Sep 2023 13:04:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1696017898; x=1696622698; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=JrH2UWVU+TRPTxFwlw1m+LzdO844SXp/q/8j9PTMyL8=; b=KQpyvV7fmH6rYW2FCCYhfJLen8uzcHUo7w8TW59R8jmV9DK5JHx5eb6ZINY4WkHOQn KFn/flTbparaCFhGQtfmCXnMVeoUi+OtABJdWb/nHCi6jAMEVT1JISQ7WA9sKpIJI4kh AfgGzL+jpXa2nl3CDeaJiBxesRfdM2HTHSC109zy2xr8SZAZDSpzSfvXKv3tzVwhfoij S0jH6q+//WUzSBsKXG83oD4T6/qD3Bwemza6lg91Ds9QUE7xrdjWfBmbufE0NmaGc+Ak H3w10aeTQRcAA7z8IQXnzGeHX6IWiZf15LkxugoiNSSixuYB5EfSeYWQJgdTj8Ok7Sgv Uruw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696017898; x=1696622698; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=JrH2UWVU+TRPTxFwlw1m+LzdO844SXp/q/8j9PTMyL8=; b=xCT1ciCQYQ0tcRGOb1p8laDbBjWsrOz9K2c6XrRF3d2yF0D87p/0crbns9vJZzSVj3 OY5b7vehsfGIN1omtLBS8rCgKZUAKBbS6MYvgp9fXrSf1TED4LaSKcDnObQbcQme+mCd sqROTa2s5kBKp7v4uydjTG0YIMdkoHCyR0pSITi4h/MdbzeSTMI89A6qDstvndhX6Nre ZKHWw3/SqQINyoUrKnLoeTiYgLe2GWJnqmY2H3DlFEJ5dCVb1p+AANc4Zk99I+NJNXbA +vO8wUZLAWt4gk1VtFyqfvRxaPPRtBUu6cj6Wtb49P9vOqazaI7bf8W2FqSvEOBrWFqg lnFQ== X-Gm-Message-State: AOJu0YypB3S6Uid9x5DegP+7jgKGDSiqDCjklNKOHhkv05V+ADNSW+Nq 01tgZGxZqYYtUvYl2venkEoCHn009qy6qg== X-Google-Smtp-Source: AGHT+IG0jm1AU3AY47Tsa/c7NCkwhW6zDVbRItDqFKghMrJf8hIjHpdVTCR1w4R51ft8GDHziYHEFA== X-Received: by 2002:a67:f50a:0:b0:454:6faf:204d with SMTP id u10-20020a67f50a000000b004546faf204dmr6092138vsn.2.1696017897819; Fri, 29 Sep 2023 13:04:57 -0700 (PDT) Received: from build.lan ([174.112.183.231]) by smtp.gmail.com with ESMTPSA id t28-20020a0cb39c000000b0065cffe12ae9sm2115848qve.36.2023.09.29.13.04.56 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Sep 2023 13:04:56 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 01/10] linux-yocto/6.4: update to v6.4.15 Date: Fri, 29 Sep 2023 16:04:45 -0400 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 29 Sep 2023 20:05:05 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188420 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: f60d5fd5e950 Linux 6.4.15 12ac1448ab77 pinctrl: amd: Don't show `Invalid config param` errors 120e477de917 usb: typec: tcpci: clear the fault status bit 46c11be2dca2 nilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse d53a0a737639 dt-bindings: sc16is7xx: Add property to change GPIO function f75a9a53327b tcpm: Avoid soft reset when partner does not support get_status c95605d5ed23 fsi: master-ast-cf: Add MODULE_FIRMWARE macro 4c0dc67881c6 firmware: stratix10-svc: Fix an NULL vs IS_ERR() bug in probe 43b5cedc3564 serial: sc16is7xx: fix bug when first setting GPIO direction e534d3e986fc serial: sc16is7xx: fix broken port 0 uart init e02214399ef4 serial: qcom-geni: fix opp vote on shutdown 2f2b1f63a760 wifi: ath11k: Cleanup mac80211 references on failure during tx_complete f6909803263c wifi: ath11k: Don't drop tx_status when peer cannot be found c32e118debe9 wifi: rtw88: usb: kill and free rx urbs on probe failure e74778e91fed wifi: mt76: mt7921: fix skb leak by txs missing in AMSDU 046378bdf9de wifi: mt76: mt7921: do not support one stream on secondary antenna only 18a9d16f2fbe staging: rtl8712: fix race condition 5db7c0f7fb51 HID: wacom: remove the battery when the EKR is off ae3f94d539a3 usb: chipidea: imx: improve logic if samsung,picophy-* parameter is 0 ce06713e64e3 usb: dwc3: meson-g12a: do post init to fix broken usb after resumption 596b16ee3f9a ALSA: usb-audio: Fix init call orders for UAC1 c72b4c1c2407 USB: serial: option: add FOXCONN T99W368/T99W373 product 7114ed5e53b0 USB: serial: option: add Quectel EM05G variant (0x030e) 784a1fd76b74 modules: only allow symbol_get of EXPORT_SYMBOL_GPL modules f2114d34d6bb rtc: ds1685: use EXPORT_SYMBOL_GPL for ds1685_rtc_poweroff 68a2c15de311 net: enetc: use EXPORT_SYMBOL_GPL for enetc_phc_index 95dca60f39a6 mmc: au1xmmc: force non-modular build and remove symbol_get usage 245bc3e5329e ARM: pxa: remove use of symbol_get() 1c660940f525 ksmbd: reduce descriptor size if remaining bytes is less than request size 1a13ecb96230 ksmbd: replace one-element array with flex-array member in struct smb2_ea_info 7f1d6cb0eb6a ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob() a43bf41344d0 ksmbd: fix wrong DataOffset validation of create context 9535cd211933 erofs: ensure that the post-EOF tails are all zeroed Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.4.inc | 4 +-- .../linux/linux-yocto-rt_6.4.bb | 6 ++-- .../linux/linux-yocto-tiny_6.4.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.4.bb | 28 +++++++++---------- 4 files changed, 22 insertions(+), 22 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.4.inc b/meta/recipes-kernel/linux/cve-exclusion_6.4.inc index 5a5eb9a755..fa3a4aed44 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.4.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.4.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2023-09-07 15:30:03.897686+00:00 for version 6.4.14 +# Generated at 2023-09-08 09:02:15.787032 for version 6.4.15 python check_kernel_cve_status_version() { - this_version = "6.4.14" + this_version = "6.4.15" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.4.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.4.bb index aacbea40c0..07e852d584 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.4.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.4.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "06b99074bdc85095a2b3411dcade4a64a8e8f7c0" -SRCREV_meta ?= "f12230a4c8a427af642be8196828a23f4562bc86" +SRCREV_machine ?= "40f6eb23017e1bb31c63e980b6d11bc8e917824b" +SRCREV_meta ?= "b1e8a40393e0ac784e05a45ee90b6680e3b53263" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.4;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.4.14" +LINUX_VERSION ?= "6.4.15" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.4.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.4.bb index c3a7a16342..74b830afb4 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.4.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.4.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.4.inc -LINUX_VERSION ?= "6.4.14" +LINUX_VERSION ?= "6.4.15" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "800df81fa2a8bacd6487a19115b3f89f34620249" -SRCREV_meta ?= "f12230a4c8a427af642be8196828a23f4562bc86" +SRCREV_machine ?= "3f60b22a4257993a1e389d46d1204a0f580fc99e" +SRCREV_meta ?= "b1e8a40393e0ac784e05a45ee90b6680e3b53263" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.4.bb b/meta/recipes-kernel/linux/linux-yocto_6.4.bb index e959b2a88f..d17f05eba4 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.4.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.4.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.4/standard/base" KBRANCH:qemuloongarch64 ?= "v6.4/standard/base" KBRANCH:qemumips64 ?= "v6.4/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "0194f88dc4ac51536f9bb2bf751d256bc5fe5d69" -SRCREV_machine:qemuarm64 ?= "800df81fa2a8bacd6487a19115b3f89f34620249" -SRCREV_machine:qemuloongarch64 ?= "800df81fa2a8bacd6487a19115b3f89f34620249" -SRCREV_machine:qemumips ?= "179200623f949dde2afeca75943700a2cd0684ab" -SRCREV_machine:qemuppc ?= "800df81fa2a8bacd6487a19115b3f89f34620249" -SRCREV_machine:qemuriscv64 ?= "800df81fa2a8bacd6487a19115b3f89f34620249" -SRCREV_machine:qemuriscv32 ?= "800df81fa2a8bacd6487a19115b3f89f34620249" -SRCREV_machine:qemux86 ?= "800df81fa2a8bacd6487a19115b3f89f34620249" -SRCREV_machine:qemux86-64 ?= "800df81fa2a8bacd6487a19115b3f89f34620249" -SRCREV_machine:qemumips64 ?= "4ce1ab0a4fce437802b0f7305289b036ffb4ccae" -SRCREV_machine ?= "800df81fa2a8bacd6487a19115b3f89f34620249" -SRCREV_meta ?= "f12230a4c8a427af642be8196828a23f4562bc86" +SRCREV_machine:qemuarm ?= "47cff83414374714b911719ba588aa6e2816956b" +SRCREV_machine:qemuarm64 ?= "3f60b22a4257993a1e389d46d1204a0f580fc99e" +SRCREV_machine:qemuloongarch64 ?= "3f60b22a4257993a1e389d46d1204a0f580fc99e" +SRCREV_machine:qemumips ?= "d3a6c87612629a4c1f722b7d93e9a04aec7b22a4" +SRCREV_machine:qemuppc ?= "3f60b22a4257993a1e389d46d1204a0f580fc99e" +SRCREV_machine:qemuriscv64 ?= "3f60b22a4257993a1e389d46d1204a0f580fc99e" +SRCREV_machine:qemuriscv32 ?= "3f60b22a4257993a1e389d46d1204a0f580fc99e" +SRCREV_machine:qemux86 ?= "3f60b22a4257993a1e389d46d1204a0f580fc99e" +SRCREV_machine:qemux86-64 ?= "3f60b22a4257993a1e389d46d1204a0f580fc99e" +SRCREV_machine:qemumips64 ?= "da59fe1c279b1be0b6b51dc503fe6500fdf84671" +SRCREV_machine ?= "3f60b22a4257993a1e389d46d1204a0f580fc99e" +SRCREV_meta ?= "b1e8a40393e0ac784e05a45ee90b6680e3b53263" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "babc8be398c3a0701e52582f93bfba946e9e5f8e" +SRCREV_machine:class-devupstream ?= "f60d5fd5e950c89a38578ae6f25877de511bb031" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.4/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.4;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.4.14" +LINUX_VERSION ?= "6.4.15" PV = "${LINUX_VERSION}+git" From patchwork Fri Sep 29 20:04:46 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 31398 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6A329E728DE for ; Fri, 29 Sep 2023 20:05:05 +0000 (UTC) Received: from mail-qv1-f54.google.com (mail-qv1-f54.google.com [209.85.219.54]) by mx.groups.io with SMTP id smtpd.web11.27703.1696017899885664893 for ; Fri, 29 Sep 2023 13:05:00 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=m+7+vn18; spf=pass (domain: gmail.com, ip: 209.85.219.54, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f54.google.com with SMTP id 6a1803df08f44-65af75a0209so61966676d6.3 for ; Fri, 29 Sep 2023 13:04:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1696017899; x=1696622699; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=AyZCmujrGrl9x9tYCDYXqOM+edpnCtyzofDE+IqCLIg=; b=m+7+vn18G1N4KSwia4rv8SinzgNgiWeOrlbCvjnUgagXgI+njyj/t1/q+4xWXC4DPx ChVgLeMO2dsssHVevCyXeqMyqJTEFgZSBgBnIh/TO9bVrOYfPhhmKygzXXPKCMf2Ew9z ty9PpeYhEGn2gZtItiA2s701TWH4yKyyYZcvn5goFbYb3PJwrBsn6kDkrpeIY9s2YM17 tcQlstL1Zh4d6O/qrDWtTYoOpDXHyyEaeWXI+rXvCXOsLQ4Dsxt/yPYocXUBg7FKve6U cxaawkFniB13tgBx5kaukxSDI0pcJgO0D+PH6ole3MhngvmYBm7907RPfVOfshkj9NjY KD+A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696017899; x=1696622699; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=AyZCmujrGrl9x9tYCDYXqOM+edpnCtyzofDE+IqCLIg=; b=FvKhTuSPuvb/GBQ5LNrSrOSb6aSRrFVNmuUoSyLJWqB+/zECTS9YZY/SWualR0mP9C Svz4n9GIug/0yskVbtfu1yLtVnQSFO3IequADxXdQeM1wmac/Hil9t8McPkfTI7sPx70 Jin2vOO+p1Hcm8alK4ei33obz4pKkHPxySZTeTo2LvFeLOkL4aCjeMjSctiqz21HnMUi t71RHjJaIxr+SXRS4PFDzad+i84fDS2iiJGMtXpZ5Cr6VWDqpqwreZxqc9x6KksV2m/p ab8cdydoG2JtdzjbtJNe6ftXBe+x60Dg4gJWvYUUf+HHtq7WHJpYsGTMQZ220pHURHLQ IU7g== X-Gm-Message-State: AOJu0YxjX6Drl2byvtxTC4HOJubU7/DXnrSQ8LNBp5G6mJsUdyqWbuME V2mbSzS7bWlskNBKLL9Q9FGtamjt2R/HIg== X-Google-Smtp-Source: AGHT+IEiE8ShPXAp0R/BMDUUkRgBHhWF5EzD2SmQlS8qs11ygoJxtOjPLIltKuxzIiwNhRqK4pVidA== X-Received: by 2002:a05:6214:310e:b0:65b:9514:ba8 with SMTP id ks14-20020a056214310e00b0065b95140ba8mr4940901qvb.11.1696017898657; Fri, 29 Sep 2023 13:04:58 -0700 (PDT) Received: from build.lan ([174.112.183.231]) by smtp.gmail.com with ESMTPSA id t28-20020a0cb39c000000b0065cffe12ae9sm2115848qve.36.2023.09.29.13.04.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Sep 2023 13:04:58 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 02/10] linux-yocto/6.1: update to v6.1.52 Date: Fri, 29 Sep 2023 16:04:46 -0400 Message-Id: <7826d6b6dbc5e262e6dac69a3b1f1a6a293fc04e.1696017123.git.bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 29 Sep 2023 20:05:05 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188421 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: 59b13c2b647e Linux 6.1.52 4a6284a2fc63 pinctrl: amd: Don't show `Invalid config param` errors 7bec12fa9813 usb: typec: tcpci: clear the fault status bit 4da07e958bfd nilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse fdbfc54d5399 nilfs2: fix general protection fault in nilfs_lookup_dirty_data_buffers() 689561db6869 dt-bindings: sc16is7xx: Add property to change GPIO function dca7c9965141 tcpm: Avoid soft reset when partner does not support get_status a1fc0096921c fsi: master-ast-cf: Add MODULE_FIRMWARE macro b5c7bc370e03 firmware: stratix10-svc: Fix an NULL vs IS_ERR() bug in probe b7366429626e serial: sc16is7xx: fix bug when first setting GPIO direction 682f9b944374 serial: sc16is7xx: fix broken port 0 uart init 4b3de7d2f869 serial: qcom-geni: fix opp vote on shutdown 1cd102aaedb2 wifi: mt76: mt7921: fix skb leak by txs missing in AMSDU 74ceef6e6925 wifi: mt76: mt7921: do not support one stream on secondary antenna only 179c65828593 Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition 86b818e2495d staging: rtl8712: fix race condition bd69537c1a2c HID: wacom: remove the battery when the EKR is off 48729a1d2a7a usb: chipidea: imx: improve logic if samsung,picophy-* parameter is 0 c564d4f91a0c usb: dwc3: meson-g12a: do post init to fix broken usb after resumption bfc4ccc0bcae ALSA: usb-audio: Fix init call orders for UAC1 69d9330f2eff USB: serial: option: add FOXCONN T99W368/T99W373 product 34f396f7abd0 USB: serial: option: add Quectel EM05G variant (0x030e) 5d0fe30be4e2 modules: only allow symbol_get of EXPORT_SYMBOL_GPL modules 36231e2c4ebd rtc: ds1685: use EXPORT_SYMBOL_GPL for ds1685_rtc_poweroff 915219699da1 net: enetc: use EXPORT_SYMBOL_GPL for enetc_phc_index 4dab89cccd8c mmc: au1xmmc: force non-modular build and remove symbol_get usage ac6fa0e04be0 ARM: pxa: remove use of symbol_get() cf859267e639 ksmbd: reduce descriptor size if remaining bytes is less than request size d070c4dd2a5b ksmbd: replace one-element array with flex-array member in struct smb2_ea_info 30fd6521b2fb ksmbd: fix slub overflow in ksmbd_decode_ntlmssp_auth_blob() 7d8855fd849d ksmbd: fix wrong DataOffset validation of create context 1ce9ebc96eda erofs: ensure that the post-EOF tails are all zeroed Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.1.inc | 4 +-- .../linux/linux-yocto-rt_6.1.bb | 6 ++-- .../linux/linux-yocto-tiny_6.1.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.1.bb | 28 +++++++++---------- 4 files changed, 22 insertions(+), 22 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc index 41ee8bcad5..52523c6709 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2023-09-07 15:29:54.983415+00:00 for version 6.1.51 +# Generated at 2023-09-08 09:54:36.039631 for version 6.1.52 python check_kernel_cve_status_version() { - this_version = "6.1.51" + this_version = "6.1.52" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb index 5a42da2019..05e0b69331 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "ad7c05a03b8d70ee30ecce783a861cb96ea258cf" -SRCREV_meta ?= "f845a7f37d7114230d6609e2bd630070f2f6cd9b" +SRCREV_machine ?= "7327e7ab3b5508182380405a51f2657f5bf669b4" +SRCREV_meta ?= "9e389e7f44a22bc637328f15e106f6d60631780e" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.1.51" +LINUX_VERSION ?= "6.1.52" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb index 3fd9a0e2a9..942aa48c02 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.1.inc -LINUX_VERSION ?= "6.1.51" +LINUX_VERSION ?= "6.1.52" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "526b5bf2f74f881356bce8b44840dc86785fb7bf" -SRCREV_meta ?= "f845a7f37d7114230d6609e2bd630070f2f6cd9b" +SRCREV_machine ?= "b3879adf00e338e66e92431a434fa2549ac88b83" +SRCREV_meta ?= "9e389e7f44a22bc637328f15e106f6d60631780e" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.1.bb b/meta/recipes-kernel/linux/linux-yocto_6.1.bb index 3798ae3db9..000317379f 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.1.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.1/standard/base" KBRANCH:qemuloongarch64 ?= "v6.1/standard/base" KBRANCH:qemumips64 ?= "v6.1/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "8c81de99a4b9f69345873b06077f9d4e1321298e" -SRCREV_machine:qemuarm64 ?= "526b5bf2f74f881356bce8b44840dc86785fb7bf" -SRCREV_machine:qemuloongarch64 ?= "526b5bf2f74f881356bce8b44840dc86785fb7bf" -SRCREV_machine:qemumips ?= "733cb5842aeac106f5606df4da7c64a180f0c500" -SRCREV_machine:qemuppc ?= "526b5bf2f74f881356bce8b44840dc86785fb7bf" -SRCREV_machine:qemuriscv64 ?= "526b5bf2f74f881356bce8b44840dc86785fb7bf" -SRCREV_machine:qemuriscv32 ?= "526b5bf2f74f881356bce8b44840dc86785fb7bf" -SRCREV_machine:qemux86 ?= "526b5bf2f74f881356bce8b44840dc86785fb7bf" -SRCREV_machine:qemux86-64 ?= "526b5bf2f74f881356bce8b44840dc86785fb7bf" -SRCREV_machine:qemumips64 ?= "1c11fe963667e9380725bef0650aeaea8544ea8b" -SRCREV_machine ?= "526b5bf2f74f881356bce8b44840dc86785fb7bf" -SRCREV_meta ?= "f845a7f37d7114230d6609e2bd630070f2f6cd9b" +SRCREV_machine:qemuarm ?= "3028542fe5ece9dd32c8e3b9b14b2c9f4c9cafac" +SRCREV_machine:qemuarm64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" +SRCREV_machine:qemuloongarch64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" +SRCREV_machine:qemumips ?= "33c0b5a0c1af6abb4dee11ffa5ece66ffd01d3c8" +SRCREV_machine:qemuppc ?= "b3879adf00e338e66e92431a434fa2549ac88b83" +SRCREV_machine:qemuriscv64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" +SRCREV_machine:qemuriscv32 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" +SRCREV_machine:qemux86 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" +SRCREV_machine:qemux86-64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" +SRCREV_machine:qemumips64 ?= "ee418f38dbc9794b7976ad11fd74f5a3490c7c5e" +SRCREV_machine ?= "b3879adf00e338e66e92431a434fa2549ac88b83" +SRCREV_meta ?= "9e389e7f44a22bc637328f15e106f6d60631780e" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "c2cbfe5f51227dfe6ef7be013f0d56a32c040faa" +SRCREV_machine:class-devupstream ?= "59b13c2b647e464dd85622c89d7f16c15d681e96" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.1/base" @@ -45,7 +45,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA SRC_URI += "file://0001-perf-cpumap-Make-counter-as-unsigned-ints.patch" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.1.51" +LINUX_VERSION ?= "6.1.52" PV = "${LINUX_VERSION}+git" From patchwork Fri Sep 29 20:04:47 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 31404 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 89023E728EB for ; Fri, 29 Sep 2023 20:05:05 +0000 (UTC) Received: from mail-oa1-f50.google.com (mail-oa1-f50.google.com [209.85.160.50]) by mx.groups.io with SMTP id smtpd.web11.27706.1696017901762943310 for ; Fri, 29 Sep 2023 13:05:01 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=U9bAwJjU; spf=pass (domain: gmail.com, ip: 209.85.160.50, mailfrom: bruce.ashfield@gmail.com) Received: by mail-oa1-f50.google.com with SMTP id 586e51a60fabf-1bba7717d3bso7411789fac.1 for ; Fri, 29 Sep 2023 13:05:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1696017901; x=1696622701; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=DyyqEQ5kjV2gu/Q88R1kaQxXZTujB8tOC/0vecyegdk=; b=U9bAwJjUMdPnp6aMrdeiUg6Prca6Fp4HKNfHTbp647+GPtHsaO57bCMCg23OWPkrJd EWZiU12qZtBj3Et1XTheuE6UclHThvU4BZ6dGdd9kIvGaHsAqZXSbVzz8gGzjO8XXyZC rEkFajnYtVX/tMY31V/4KF23hdc9UY8lkZbGU452HmH1PfdAgZop8YpOyJmyfL2zcEsJ v1tx9w2xGjzRoeDXxVXpBVno9gPB46aYf6uDF7hovH5uexnd/uG200eBU6hIVuUfW8Ib a8zsT68G9Ndd8uiMxsXw945TyCgHV/dXwCeFSbnN+BGVSEx+P0OTtOoKBrojHkijU8YT 9kNA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696017901; x=1696622701; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=DyyqEQ5kjV2gu/Q88R1kaQxXZTujB8tOC/0vecyegdk=; b=mJ4rSUAsknRDN50L0msIK11gljnfoIU/mA8rq/w+vO8sCokpDkb2r5lT6oIo2fB/Po vnTqRNn7Dq6ulHy1+gzYfRdBpDrz6k65343X25Qr5yqlzwbdKlw8Gehh1/99tfXb5/ZN ioRrfAnDM3UU7zcqgWkGl0zen6q86H0wArbSR/sSWzX40SZHWqcTSN7n4zRC1N/DEEMe vD40qptFILYBHpINtiJ/4vqHoa3OffHOFqJy2sktAYCpRz4oc5aCAUdlTblbMEtn+JRE tbpGM2pKFZ+sxwKFDOO8C26jpGd4ZvIJzVSE+oV8UnPB3fRzwB8Zx4f8N7bu6KM+Xlw3 eyiw== X-Gm-Message-State: AOJu0YwUp4cmjTNf24uJZ2O9Cc920qvdG0umfOapjGkmr46YXmxA9BUg w2tpPkYE4IJxH065oJ77sk+ZK0MWKxPghw== X-Google-Smtp-Source: AGHT+IGR7XHaUjwFTMZZ2U3v34SLNtmXhH8ausscQj4i0xMP7GhidCY/ITCRbCtkMHojWmhJWKBdBg== X-Received: by 2002:a05:6870:2186:b0:1e1:aae:7867 with SMTP id l6-20020a056870218600b001e10aae7867mr6227464oae.54.1696017900327; Fri, 29 Sep 2023 13:05:00 -0700 (PDT) Received: from build.lan ([174.112.183.231]) by smtp.gmail.com with ESMTPSA id t28-20020a0cb39c000000b0065cffe12ae9sm2115848qve.36.2023.09.29.13.04.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Sep 2023 13:04:59 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 03/10] linux-yocto/6.4: update to v6.4.16 Date: Fri, 29 Sep 2023 16:04:47 -0400 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 29 Sep 2023 20:05:05 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188422 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: ae4e4fc35b42 Linux 6.4.16 e769d7975a93 Revert "drm/amd/display: Do not set drr on pipe commit" e447d28a9313 tracing: Zero the pipe cpumask on alloc to avoid spurious -EBUSY 69018a9b08a5 revert "memfd: improve userspace warnings for missing exec-related flags". 62845d4f901d memfd: improve userspace warnings for missing exec-related flags 6c7e8705677c memfd: do not -EACCES old memfd_create() users with vm.memfd_noexec=2 c7b4118308f9 selftests/memfd: sysctl: fix MEMFD_NOEXEC_SCOPE_NOEXEC_ENFORCED c144c6030b13 mm/memfd: sysctl: fix MEMFD_NOEXEC_SCOPE_NOEXEC_ENFORCED 7e3ca33752bd serial: sc16is7xx: fix regression with GPIO configuration ccae7cf2d6ff serial: sc16is7xx: remove obsolete out_thread label cb3acdc203d6 Bluetooth: HCI: Introduce HCI_QUIRK_BROKEN_LE_CODED f9965f7f38c9 Bluetooth: msft: Extended monitor tracking by address filter 95c5d3fbd3c4 LoongArch: Ensure FP/SIMD registers in the core dump file is up to date ccdfcb911967 media: ipu3-cio2: allow ipu_bridge to be a module again f51d194b1954 perf/x86/uncore: Correct the number of CHAs on EMR 604b1b6ee09c x86/build: Fix linker fill bytes quirk/incompatibility for ld.lld 7447ac0485a5 x86/sgx: Break up long non-preemptible delays in sgx_vepc_release() 8cded8d95372 USB: core: Fix oversight in SuperSpeed initialization b4a074b1fb22 USB: core: Fix race by not overwriting udev->descriptor in hub_port_init() 256b02f63cc1 USB: core: Change usb_get_device_descriptor() API 64687c13eb88 USB: core: Unite old scheme and new scheme descriptor reads d49547950bf7 usb: typec: bus: verify partner exists in typec_altmode_attention 2897b36d2482 usb: typec: tcpm: set initial svdm version based on pd revision 98347c9b1744 of: property: fw_devlink: Add a devlink for panel followers 2c671c7cb211 cpufreq: brcmstb-avs-cpufreq: Fix -Warray-bounds bug 5aa493719d8f crypto: stm32 - fix MDMAT condition 3b8c7cc94e29 crypto: stm32 - fix loop iterating through scatterlist for DMA afe98365be95 HID: logitech-hidpp: rework one more time the retries attempts 90819a4a919f s390/dasd: fix string length handling 812736446cf5 s390/ipl: add missing secure/has_secure file to ipl type 'unknown' b7ad75c77349 s390/dcssblk: fix kernel crash with list_add corruption b15d3cbd2941 iov_iter: Fix iov_iter_extract_pages() with zero-sized entries 5db357b14d40 regulator: dt-bindings: qcom,rpm: fix pattern for children 84d16de27327 arm64: sdei: abort running SDEI handlers during crash f77990358628 pstore/ram: Check start of empty przs during init 07239ca76dd6 mmc: renesas_sdhi: register irqs before registering controller 39c23c941153 platform/chrome: chromeos_acpi: print hex string for ACPI_TYPE_BUFFER 01474630c566 crypto: af_alg - Decrement struct key.usage in alg_set_by_key_serial() 6eac39659014 x86/MCE: Always save CS register on AMD Zen IF Poison errors bffa781398cd fsverity: skip PKCS#7 parser when keyring is empty 56d2f71c85a4 net: handle ARPHRD_PPP in dev_is_mac_header_xmit() cd5d0d13a036 X.509: if signature is unsupported skip validation 83f19f32125b r8169: fix ASPM-related issues on a number of systems with NIC version from RTL8168h 6615212d8e13 x86/sev: Make enc_dec_hypercall() accept a size instead of npages d8171411a661 dccp: Fix out of bounds access in DCCP error handler 5c7403f95225 dlm: fix plock lookup when using multiple lockspaces 5927f0172d28 bpf: Fix issue in verifying allow_ptr_leaks 247ee56a7865 drm/amd/display: Add smu write msg id fail retry process a641e116f929 misc: fastrpc: Pass proper scm arguments for static process init 3d45037fbc20 parisc: Fix /proc/cpuinfo output for lscpu bda2ed2b954e procfs: block chmod on /proc/thread-self/comm 4e3fc835816d block: don't add or resize partition on the disk with GENHD_FL_NO_PART 93cb3211912e Revert "PCI: Mark NVIDIA T4 GPUs to avoid bus reset" 223649a6ac7f ntb: Fix calculation ntb_transport_tx_free_entry() 08c64e0c2f43 ntb: Clean up tx tail index on link down c2cd5d993f57 ntb: Drop packets when qp link is down b05d301ad46d PCI/PM: Only read PCI_PM_CTRL register when available d0687755407b PCI: hv: Fix a crash in hv_pci_restore_msi_msg() during hibernation a076e73dd6e6 PCI: Free released resource after coalescing 512db7829b4a scsi: mpt3sas: Perform additional retries if doorbell read returns 0 bcd9febc0c72 Revert "scsi: qla2xxx: Fix buffer overrun" f36a3430e559 media: nxp: Fix wrong return pointer check in mxc_isi_crossbar_init() fa039796edbf media: venus: hfi_venus: Write to VIDC_CTRL_INIT after unmasking interrupts 74b005d99b3e media: dvb: symbol fixup for dvb_attach() a025494d0090 ALSA: hda/cirrus: Fix broken audio on hardware with two CS42L42 codecs. a5ad2f87d8e7 arm64: csum: Fix OoB access in IP checksum code for negative lengths 67c16c941521 io_uring: Don't set affinity on a dying sqpoll thread 61885936897c i3c: master: svc: fix probe failure when no i3c device exist 9b445804b15a powerpc/ftrace: Fix dropping weak symbols with older toolchains 593ad636bac4 LoongArch: mm: Add p?d_leaf() definitions 86a6b5515e8e xtensa: PMU: fix base address for the newer hardware 17c6bced492c drm/amd/display: register edp_backlight_control() for DCN301 cc727eae2a46 backlight/lv5207lp: Compare against struct fb_info.device 1a5fc6abeef0 backlight/bd6107: Compare against struct fb_info.device 164a795d91f3 backlight/gpio_backlight: Compare against struct fb_info.device dec70164ba78 io_uring: break out of iowq iopoll on teardown 63059d272c4c io_uring/sqpoll: fix io-wq affinity when IORING_SETUP_SQPOLL is used e64db62650d4 io_uring: break iopolling on signal 7c3be1e33101 io_uring: fix false positive KASAN warnings ec5cf2977cff XArray: Do not return sibling entries from xa_load() b69c7129a295 riscv: Mark KASAN tmp* page tables variables as static d1f8b6832c97 riscv: Move create_tmp_mapping() to init sections dd4652a92dad ARM: OMAP2+: Fix -Warray-bounds warning in _pwrdm_state_switch() 1bfcfea0fae0 ipmi_si: fix a memleak in try_smi_init() 20d1e215c945 PCI: rockchip: Use 64-bit mask on MSI 64-bit PCI address f9bfc1a3858c media: i2c: Add a camera sensor top level menu 636f4076188c media: i2c: ccs: Check rules is non-NULL 9734e4c0c470 cpu/hotplug: Prevent self deadlock on CPU hot-unplug 1f55e7667a6a mm/vmalloc: add a safer version of find_vm_area() for debug d41edcef2c92 scsi: core: Fix the scsi_set_resid() documentation 4329b63ce53f printk: ringbuffer: Fix truncating buffer size min_t cast dddca4c46ec9 rcu: dump vmalloc memory info safely e39e870e1e68 virtio_pmem: add the missing REQ_OP_WRITE for flush bio 4f973bc0db7c ALSA: pcm: Fix missing fixup call in compat hw_refine ioctl 21a67da7f22b Multi-gen LRU: fix per-zone reclaim 1640e9c72173 PM / devfreq: Fix leak in devfreq_dev_release() 6a9abbccaac4 igb: set max size RX buffer when store bad packet is enabled f99006e840a4 skbuff: skb_segment, Call zero copy functions before using skbuff frags b63b4e114593 netfilter: xt_sctp: validate the flag_info count 83b995321eaa netfilter: xt_u32: validate user space input 93450ea57eec netfilter: nft_exthdr: Fix non-linear header modification d59b6fc40554 netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c 87f07ec534e3 igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU e4ffc47a1c3e net: deal with integer overflows in kmalloc_reserve() bf11b89b0a2a virtio_ring: fix avail_wrap_counter in virtqueue_add_packed 5f2592243ccd virtio_vdpa: build affinity masks conditionally 7d85dfdf8bd5 cpufreq: Fix the race condition while updating the transition_task of policy bb31371c1dcd um: virt-pci: fix missing declaration warning 9fc162c59edc Drivers: hv: vmbus: Don't dereference ACPI root object handle bfcf280533ad dmaengine: idxd: Fix issues with PRS disable sysfs knob df212ed77384 dmaengine: idxd: Allow ATS disable update only for configurable devices e5d80eb3764c dmaengine: idxd: Expose ATS disable knob only when WQ ATS is supported 8f5137564c7a dmaengine: idxd: Simplify WQ attribute visibility checks fa2e3c484af6 dmaengine: ste_dma40: Add missing IRQ check in d40_probe eaa8d097a529 um: Fix hostaudio build errors 9a61f2c08f30 mtd: rawnand: fsmc: handle clk prepare error in fsmc_nand_resume() c4b5d3659473 mtd: spi-nor: Check bus width while setting QE bit 0301718d3ab4 leds: trigger: tty: Do not use LED_ON/OFF constants, use led_blink_set_oneshot instead e2a579c5a997 leds: Fix BUG_ON check for LED_COLOR_ID_MULTI that is always false 92e1279daf07 leds: multicolor: Use rounded division when calculating color components e3aa6884fae9 thermal/drivers/imx8mm: Suppress log message on probe deferral db478bcb3161 thermal/drivers/mediatek/lvts_thermal: Manage threshold between sensors 8e382e9470c0 thermal/drivers/mediatek/lvts_thermal: Don't leave threshold zeroed 71b7ccc49a98 thermal/drivers/mediatek/lvts_thermal: Disable undesired interrupts 30a642a6b666 thermal/drivers/mediatek/lvts_thermal: Use offset threshold for IRQ ba01e46105df thermal/drivers/mediatek/lvts_thermal: Honor sensors in immediate mode 436b4b33e048 thermal/drivers/mediatek/lvts_thermal: Handle IRQ on all controllers bab77f962ce3 leds: pwm: Fix error code in led_pwm_create_fwnode() 174cf8853857 rpmsg: glink: Add check for kstrdup 59a069a42682 phy/rockchip: inno-hdmi: do not power on rk3328 post pll on reg write e9876c8873fc phy/rockchip: inno-hdmi: round fractal pixclock in rk3328 recalc_rate 7a35fe6478f7 phy/rockchip: inno-hdmi: use correct vco_div_5 macro on rk3328 c1c4cb6103ae dmaengine: idxd: Modify the dependence of attribute pasid_enabled 92273c3435bb mtd: rawnand: brcmnand: Fix mtd oobsize 89c89da92a60 tracing: Fix race issue between cpu buffer write and swap e0c6a3679e3b tracing: Remove extra space at the end of hwlat_detector/mode 5ed4c90a6b56 x86/speculation: Mark all Skylake CPUs as vulnerable to GDS d0a267f4e5de tick/rcu: Fix false positive "softirq work is pending" messages 617326853221 platform/x86/amd/pmf: Fix a missing cleanup path 1d7833db9fd1 HID: multitouch: Correct devm device reference for hidinput input_dev name 4c2707dfee58 HID: uclogic: Correct devm device reference for hidinput input_dev name e7952f4d621e nvmem: core: Return NULL when no nvmem layout is found 144becd79c19 HID: logitech-dj: Fix error handling in logi_dj_recv_switch_to_dj_mode() e79db2f51a56 RDMA/efa: Fix wrong resources deallocation order a1ceb3079efb RDMA/siw: Correct wrong debug message ef1378f78df2 RDMA/siw: Balance the reference of cep->kref in the error path 4082b59705ee Revert "IB/isert: Fix incorrect release of isert connection" 206fadb7278c amba: bus: fix refcount leak 7a9af64f7b03 serial: tegra: handle clk prepare error in tegra_uart_hw_init() 86017523b852 interconnect: qcom: bcm-voter: Use enable_maks for keepalive voting ccedcb364897 interconnect: qcom: bcm-voter: Improve enable_mask handling 1d164939335d interconnect: qcom: sm8450: Enable sync_state 694ddc5bf35a scsi: fcoe: Fix potential deadlock on &fip->ctlr_lock eaf18b15a811 scsi: core: Use 32-bit hostnum in scsi_host_lookup() ceba966f1d63 RDMA/irdma: Prevent zero-length STAG registration 9406ad6d6c84 coresight: trbe: Fix TRBE potential sleep in atomic context e309f455801f f2fs: fix to account cp stats correctly 0e2577074b45 f2fs: fix to drop all dirty meta/node pages during umount() 1c5fb9c7956c f2fs: fix to account gc stats correctly 53ac32aae7a6 f2fs: refactor struct f2fs_attr macro ea35767edc78 Revert "f2fs: fix to do sanity check on extent cache correctly" 46fc3c4b81bf f2fs: Only lfs mode is allowed with zoned block device feature db35eb17bf6d f2fs: fix to avoid mmap vs set_compress_option case 0625d012793d f2fs: fix spelling in ABI documentation d82e45857418 media: i2c: rdacm21: Fix uninitialized value 49bd577e5897 media: ov2680: Fix regulators being left enabled on ov2680_power_on() errors 38b0ebc048eb media: ov2680: Fix ov2680_set_fmt() which == V4L2_SUBDEV_FORMAT_TRY not working b8bc7bc64819 media: ov2680: Add ov2680_fill_format() helper function 279a562c4af2 media: ov2680: Don't take the lock for try_fmt calls 039e14a17a1b media: ov2680: Remove VIDEO_V4L2_SUBDEV_API ifdef-s 42ac1c0d7fa3 media: ov2680: Fix vflip / hflip set functions f3ac838162d3 media: ov2680: Fix ov2680_bayer_order() afccb9524a6a media: ov2680: Remove auto-gain and auto-exposure controls 39a54d5dc777 media: Documentation: Fix [GS]_ROUTING documentation 47b4081e35c2 media: ov5640: Fix initial RESETB state and annotate timings b57b9f888f22 media: ov5640: Enable MIPI interface in ov5640_set_power_mipi() 9990c80ec1ce HID: input: Support devices sending Eraser without Invert 3bcc4c2a096e drivers: base: Free devm resources when unregistering a device 9c4ab0088b33 USB: gadget: f_mass_storage: Fix unused variable warning e33c789963db USB: gadget: core: Add missing kerneldoc for vbus_work f2e92730bfef docs: ABI: fix spelling/grammar in SBEFIFO timeout interface 4b02eacc0b66 media: ipu-bridge: Do not use on stack memory for software_node.name field 5bce956b22ad media: ipu3-cio2: rename cio2 bridge to ipu bridge and move out of ipu3 3de35e29cfdd media: ipu-bridge: Fix null pointer deref on SSDB/PLD parsing warnings 91d790ac27eb arm64: defconfig: Drop CONFIG_VIDEO_IMX_MEDIA 1e4ea9bf3783 media: venus: hfi_venus: Only consider sys_idle_indicator on V1 c2e304c9564e media: go7007: Remove redundant if statement 9fa26c6ac168 media: cec: core: add adap_unconfigured() callback 258e4784b8b5 media: cec: core: add adap_nb_transmit_canceled() callback c5402011992b platform/x86: dell-sysman: Fix reference leak a793bbfd1a17 iommu/vt-d: Fix to flush cache of PASID directory table a3013b402d76 tty: serial: qcom-geni-serial: Poll primary sequencer irq status after cancel_tx b3fdfdb5d851 iommu/qcom: Disable and reset context bank before programming 58c928d4ae4b fsi: aspeed: Reset master errors after CFAM reset d95b6f3ba733 IB/uverbs: Fix an potential error pointer dereference f23228b2a798 RDMA/hns: Fix CQ and QP cache affinity debfbb2c7db0 RDMA/hns: Fix inaccurate error label name in init instance bf6f879fde49 RDMA/hns: Fix incorrect post-send with direct wqe of wr-list ca0d8f408a45 RDMA/hns: Fix port active speed 192740d0b9c5 RDMA/bnxt_re: Remove a redundant flag 37b78dd932f6 iommu: Remove kernel-doc warnings a57d054f9785 iommu/sprd: Add missing force_aperture fe8258b698e6 iommu/mediatek: Fix two IOMMU share pagetable issue 0c5b72339bb1 extcon: cht_wc: add POWER_SUPPLY dependency d89c70f59e80 kernfs: add stub helper for kernfs_generic_poll() d7dd75c5f2b1 driver core: Call dma_cleanup() on the test_remove path 6c064c764856 driver core: test_async: fix an error code 3f7e2c325862 dma-buf/sync_file: Fix docs syntax 7348bea2e865 interconnect: qcom: qcm2290: Enable sync state 6d0be342a4b8 coresight: tmc: Explicit type conversions to prevent integer overflow 3489c741f1d7 RDMA/irdma: Replace one-element array with flexible-array member 6aac7f0d1b86 scsi: qedf: Do not touch __user pointer in qedf_dbg_fp_int_cmd_read() directly 8f92dd19a154 scsi: qedf: Do not touch __user pointer in qedf_dbg_debug_cmd_read() directly 8a892c1bc4dd scsi: qedf: Do not touch __user pointer in qedf_dbg_stop_io_on_error_cmd_read() directly 2f2a6422287f RDMA/rxe: Fix incomplete state save in rxe_requester d7dbce161d60 RDMA/rxe: Fix rxe_modify_srq da572f6313ae RDMA/rxe: Fix unsafe drain work queue code ecd4ff7e934b RDMA/rxe: Move work queue code to subroutines b3110e66ad04 x86/APM: drop the duplicate APM_MINOR_DEV macro 0237f913694d serial: sprd: Fix DMA buffer leak issue e8ab4ea0cef5 serial: sprd: Assign sprd_port after initialized to avoid wrong access 8fafcc478dee iio: accel: adxl313: Fix adxl313_i2c_id[] table 4ed219753112 scsi: qla4xxx: Add length check when parsing nlattrs da4c861ef51e scsi: be2iscsi: Add length check when parsing nlattrs 3466c1b52457 scsi: iscsi: Add strlen() check in iscsi_if_set{_host}_param() 714bfe448909 scsi: iscsi: Add length check for nlattr payload d431b85179b2 scsi: ufs: Fix residual handling d3380a5a9996 scsi: RDMA/srp: Fix residual handling a2ecc4a909d4 usb: phy: mxs: fix getting wrong state with mxs_phy_is_otg_host() b7dbc27301f5 media: mediatek: vcodec: fix resource leaks in vdec_msg_queue_init() 4fe1f032a22d media: mediatek: vcodec: fix potential double free c2b2dcccb629 media: mediatek: vcodec: Return NULL if no vdec_fb is found 3b5ce3c5e68f media: amphion: ensure the bitops don't cross boundaries 451a2d7a3587 media: amphion: fix UNUSED_VALUE issue reported by coverity 7509d455e188 media: amphion: fix UNINIT issues reported by coverity e59d0cd8f414 media: amphion: fix REVERSE_INULL issues reported by coverity 344909ea0ea0 media: amphion: fix CHECKED_RETURN issues reported by coverity b436ab2b8c3e media: rkvdec: increase max supported height for H.264 683ac024116f media: amphion: decoder support display delay for all formats 8977d9924843 media: mtk-jpeg: Fix use after free bug due to uncanceled work bf32ec66ec6e media: verisilicon: Fix TRY_FMT on encoder OUTPUT 80776261bab0 media: amphion: add helper function to get id name f77cbf3c0ccc media: amphion: reinit vpu if reqbufs output 0 8a1a546c1870 dt-bindings: extcon: maxim,max77843: restrict connector properties b27db41b6102 scsi: hisi_sas: Fix normally completed I/O analysed as failed fa23b54214cd scsi: hisi_sas: Fix warnings detected by sparse beabdccf8b27 RDMA/siw: Fabricate a GID on tun and loopback devices e6ebe18eae96 media: cx24120: Add retval check for cx24120_message_send() 4feed3dfca72 media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer() 2d73f3e7f84a media: dib7000p: Fix potential division by zero 77e2dc9a18dc drivers: usb: smsusb: fix error handling code in smsusb_init_device 9ac8d316f6c9 iommu: rockchip: Fix directory table address encoding 9ccc51be3126 iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind ed1696f7f92e media: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link() 774eb431db60 media: i2c: tvp5150: check return value of devm_kasprintf() fd44bb897f4b media: ad5820: Drop unsupported ad5823 from i2c_ and of_device_id tables c611001cdc58 media: i2c: imx290: drop format param from imx290_ctrl_update 0c6b9bd287f5 media: ov5640: fix low resolution image abnormal issue dcc031701f44 RDMA/qedr: Remove a duplicate assignment in irdma_query_ah() fb4f7c110473 cgroup/cpuset: Inherit parent's load balance state in v2 05fed99eb117 pNFS: Fix assignment of xprtdata.cred 118d91d46ba8 NFSv4.2: fix handling of COPY ERR_OFFLOAD_NO_REQ c8aff5b43951 NFS: Guard against READDIR loop when entry names exceed MAXNAMELEN efcae97fa425 NFSD: da_addr_body field missing in some GETDEVICEINFO replies 3dc93111c318 fs: lockd: avoid possible wrong NULL parameter ac8a5bd24ca9 jfs: validate max amount of blocks before allocation. 105f7fd386f6 ext4: fix unttached inode after power cut with orphan file feature enabled c46af5858825 powerpc/iommu: Fix notifiers being shared by PCI and VIO buses 766394d26437 powerpc/mpc5xxx: Add missing fwnode_handle_put() 5287fa4a0cee powerpc/pseries: Fix hcall tracepoints with JUMP_LABEL=n ad4293e42b21 nfs/blocklayout: Use the passed in gfp flags 3c5e8e666794 powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT 445b76b5491a powerpc: Don't include lppaca.h in paca.h a2f4cb206bd9 NFSv4.2: Rework scratch handling for READ_PLUS (again) 770eaf4c3548 NFSv4.2: Fix READ_PLUS size calculations 039e896302e5 NFSv4.2: Fix READ_PLUS smatch warnings 847ee94d82e8 wifi: ath10k: Use RMW accessors for changing LNKCTL f8dca9806d70 wifi: ath12k: Use RMW accessors for changing LNKCTL 9697dfa899e8 wifi: ath11k: Use RMW accessors for changing LNKCTL 6eb6602de213 net/mlx5: Use RMW accessors for changing LNKCTL 380b0d6305c0 drm/radeon: Use RMW accessors for changing LNKCTL 0313eb9035aa drm/amdgpu: Use RMW accessors for changing LNKCTL cf730b02a776 pinctrl: mediatek: assign functions to configure pin bias on MT7986 2dccd33ad2a3 pinctrl: mediatek: fix pull_type data for MT7981 11cc6b7414e6 powerpc/perf: Convert fsl_emb notifier to state machine callbacks afcee5bda342 powerpc/fadump: reset dump area size if fadump memory reserve fails 82824a634672 nvdimm: Fix dereference after free in register_nvdimm_pmu() 4999f2ec5fde nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu() cbac29a1caa4 vfio/type1: fix cap_migration information leak cb40dc25bdd7 powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE 76c86b61b2cb clk: imx: composite-8m: fix clock pauses when set_rate would be a no-op d5e329876737 clk: imx8mp: fix sai4 clock 4c67637f9ca4 clk: imx: imx8ulp: update SPLL2 type 0310de64b34d clk: imx: pllv4: Fix SPLL2 MULT range 40fe937de63e clk: qcom: gcc-qdu1000: Register gcc_gpll1_out_even clock 88c80af75cd1 dt-bindings: clock: Update GCC clocks for QDU1000 and QRU1000 SoCs ee6966bb2490 clk: qcom: gcc-qdu1000: Fix clkref clocks handling 84fbbb177dae clk: qcom: gcc-qdu1000: Fix gcc_pcie_0_pipe_clk_src clock handling cbfd73886eb3 clk: qcom: gcc-sm8450: Use floor ops for SDCC RCGs 49a9ac827052 PCI/ASPM: Use RMW accessors for changing LNKCTL 9d31c101cc3e PCI: pciehp: Use RMW accessors for changing LNKCTL df666f21768b PCI: Add locking to RMW PCI Express Capability Register accessors 754bccefd64e pinctrl: mcp23s08: check return value of devm_kasprintf() 7da44f84c4fa PCI: Mark NVIDIA T4 GPUs to avoid bus reset 5183cbfbddcf PCI: microchip: Correct the DED and SEC interrupt bit offsets ab600f5aabca clk: qcom: gcc-sm6350: Fix gcc_sdcc2_apps_clk_src f9917b02df08 clk: qcom: reset: Use the correct type of sleep/delay based on length 1e54beadc550 kvm/vfio: ensure kvg instance stays around in kvm_vfio_group_add() 7af1006a6d4a kvm/vfio: Prepare for accepting vfio device fd 1cb17fd8ef56 clk: qcom: gcc-sm8250: Fix gcc_sdcc2_apps_clk_src f168ffe4679e ext4: avoid potential data overflow in next_linear_group 83a9d5f5ec7e ext4: correct grp validation in ext4_mb_good_group cfc5b2ad57fc EDAC/igen6: Fix the issue of no error events 5c3836959104 clk: qcom: gcc-sc7180: Fix up gcc_sdcc2_apps_clk_src c2362ea892f1 clk: sunxi-ng: Modify mismatched function name f3ad747e9dc1 clk: qcom: dispcc-sc8280xp: Use ret registers on GDSCs c4f9c0a3a6df PCI/DOE: Fix destroy_work_on_stack() race 727a2c140217 iommufd: Fix locking around hwpt allocation 68389f0c4af4 EDAC/i10nm: Skip the absent memory controllers f35e506eda63 drivers: clk: keystone: Fix parameter judgment in _of_pll_clk_init() ef2757b1ea8e PCI: qcom-ep: Switch MHI bus master clock off during L1SS b1b0ddd5bf39 PCI: apple: Initialize pcie->nvecs before use b0783c17ff0d clk: rockchip: rk3568: Fix PLL rate setting for 78.75MHz e00980fb2f10 clk: qcom: gcc-sm7150: Add CLK_OPS_PARENT_ENABLE to sdcc2 rcg 5f487953feed clk: qcom: gcc-sc8280xp: Add missing GDSCs ea4eceef1659 dt-bindings: clock: qcom,gcc-sc8280xp: Add missing GDSCs e065dc315563 clk: qcom: gcc-sc8280xp: Add missing GDSC flags 3764722d974a clk: qcom: gpucc-sm6350: Fix clock source names fc242b27ab34 clk: qcom: gpucc-sm6350: Introduce index-based clk lookup 7db16d2e791b ipmi:ssif: Fix a memory leak when scanning for an adapter 2959a03cb7e7 ipmi:ssif: Add check for kstrdup 3639535d3d9a ALSA: ac97: Fix possible error value of *rac97 7287ad123658 of: unittest: Fix overlay type in apply/revert check be86241bf5d1 of: overlay: Call of_changeset_init() early 70bd7f65d33d ASoC: SOF: amd: clear dsp to host interrupt status 293c2dd9ed49 md: raid0: account for split bio in iostat accounting f34142ab4e04 md/raid0: Fix performance regression for large sequential writes af006dbb3802 md/raid0: Factor out helper for mapping and submitting a bio e39ef7880d10 blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init dc98c6c08692 firmware: cs_dsp: Fix new control name check 7a8b6d93991b md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid() 71cf23271f01 md/raid5-cache: fix a deadlock in r5l_exit_log() 4dc84316458d bus: ti-sysc: Fix cast to enum warning cd80ed6096ba arm64: dts: qcom: sc8280xp-x13s: Unreserve NC pins 13c1e578cbf6 arm64: dts: qcom: msm8996: Fix dsi1 interrupts fa556a230f3a ARM: dts: qcom: sdx65-mtp: Update the pmic used in sdx65 5d177cf1261b arm64: dts: qcom: msm8998: Add missing power domain to MMSS SMMU cd689615b5fb arm64: dts: qcom: msm8998: Drop bus clock reference from MMSS SMMU f74605f26166 arm64: dts: qcom: apq8016-sbc: Rename ov5640 enable-gpios to powerdown-gpios afcb5d05e6a0 arm64: dts: qcom: msm8916: Rename &msmgpio -> &tlmm da20170162a2 arm64: dts: qcom: msm8916: Define regulator constraints next to usage f46343a82419 arm64: dts: qcom: msm8916: Disable audio codecs by default 8d62b20ab713 arm64: dts: qcom: msm8916: Fix regulator constraints d80270a083e8 arm64: dts: qcom: msm8916-longcheer-l8910: Add front flash LED aeae9dbc2bee arm64: dts: qcom: apq8016-sbc: Fix ov5640 regulator supply names 7b359a6c6c67 drm/mediatek: Fix void-pointer-to-enum-cast warning 368de6870850 drm/mediatek: Fix potential memory leak if vmap() fail 7715cf353850 arm64: dts: ti: k3-am62x-sk-common: Update main-i2c1 frequency dea34bb4b463 ARM: dts: qcom: ipq4019: correct SDHCI XO clock fdd0090d504b arm64: dts: imx8mp-debix: remove unused fec pinctrl node e43150707496 drm/mediatek: Add cnt checking for coverity issue c5fd246eabe6 drm/mediatek: Remove freeing not dynamic allocated memory 901eebd45f89 bus: ti-sysc: Fix build warning for 64-bit build 899a9e6a4520 arm64: dts: ti: k3-j784s4: Fix interrupt ranges for wkup & main gpio 10a1ed0f2bd9 drm/mediatek: dp: Add missing error checks in mtk_dp_parse_capabilities ec2273b61a79 io_uring: fix drain stalls by invalid SQE 39215fc86d3c block/mq-deadline: use correct way to throttling write requests 8a40b4913729 audit: fix possible soft lockup in __audit_inode_child() f3147cba702e drm/mediatek: Fix uninitialized symbol 1520151abb5d ASoC: SOF: Intel: fix u16/32 confusion in LSDIID d4aa235496a2 ASoC: SOF: Intel: hda-mlink: fix off-by-one error 9064662f15f4 drm/msm/a6xx: Fix GMU lockdep splat f0f805279d52 drm/msm/a2xx: Call adreno_gpu_init() earlier e71f68e22e58 drm/amd/pm: fix variable dereferenced issue in amdgpu_device_attr_create() c325854ad86e smackfs: Prevent underflow in smk_set_cipso() 82e1d82a223e drm/msm/dpu: fix the irq index in dpu_encoder_phys_wb_wait_for_commit_done 68f3209546b5 firmware: meson_sm: fix to avoid potential NULL pointer dereference 5b0dd3a102f6 drm/msm/mdp5: Don't leak some plane state 1d9b8b32533f soc: qcom: smem: Fix incompatible types in comparison 602f4e4fc83d arm64: dts: qcom: sm8550-mtp: Add missing supply for L1B regulator ce06e7158308 drm/msm/dpu: increase memtype count to 16 for sm8550 c975defd2904 drm/msm/dpu: drop the regdma configuration 4121d95da181 drm: xlnx: zynqmp_dpsub: Add missing check for dma_set_mask daf77a87b4d0 ima: Remove deprecated IMA_TRUSTED_KEYRING Kconfig 8bf2f878f7e8 drm/panel: simple: Add missing connector type and pixel format for AUO T215HVN01 34e4e5af4af6 drm/repaper: Reduce temporary buffer size in repaper_fb_dirty() 971154071555 drm/armada: Fix off-by-one error in armada_overlay_get_property() d7b3918b5c58 ARM: dts: BCM53573: Fix Tenda AC9 switch CPU port 09688ee4aa69 drm/ast: report connection status on Display Port. 206efac19e9e arm64: dts: qcom: sm8150: Fix the I2C7 interrupt c74ae8124f96 of: unittest: fix null pointer dereferencing in of_unittest_find_node_by_name() 39f5dc484ea2 drm/tegra: dpaux: Fix incorrect return value of platform_get_irq 560462e45bba drm/msm: Update dev core dump to not print backwards 0a1db96de334 md/md-bitmap: hold 'reconfig_mutex' in backlog_store() 7d9b926c4c05 md/md-bitmap: remove unnecessary local variable in backlog_store() 4574db58e3d4 md/raid10: use dereference_rdev_and_rrdev() to get devices e26b8812a79a md/raid10: factor out dereference_rdev_and_rrdev() a5dc1f8342fa md: restore 'noio_flag' for the last mddev_resume() 8267f8119091 ASoC: fsl: fsl_qmc_audio: Fix snd_pcm_format_t values handling 946c6cbacedb arm64: dts: rockchip: Enable SATA on Radxa E25 cd3e27ab9811 arm64: dts: rockchip: Fix PCIe regulators on Radxa E25 72da8b87ee48 drm/amdgpu: Update min() to min_t() in 'amdgpu_info_ioctl' 952c04c10287 arm64: dts: qcom: msm8996-gemini: fix touchscreen VIO supply 113780e10171 arm64: dts: qcom: sdm845: Fix the min frequency of "ice_core_clk" 00581f3c0ddb arm64: dts: qcom: sdm845: Add missing RPMh power domain to GCC 792e06163a3d ARM: dts: BCM53573: Fix Ethernet info for Luxul devices ea675751f804 drm: adv7511: Fix low refresh rate register for ADV7533/5 8db9177e9afc ARM: dts: samsung: s5pv210-smdkv210: correct ethernet reg addresses (split) a91cf971e2ec ARM: dts: s5pv210: add dummy 5V regulator for backlight on SMDKv210 9279edc4c4e8 ARM: dts: samsung: s3c6410-mini6410: correct ethernet reg addresses (split) 4da92f5706f6 drm/bridge: anx7625: Use common macros for HDCP capabilities 04e2a662b551 drm/bridge: anx7625: Use common macros for DP power sequencing commands b3498d004191 x86/mm: Fix PAT bit missing from page protection modify mask 4355a1c3a58c block: don't allow enabling a cache on devices that don't support it db22fcbad57c block: cleanup queue_wc_store 03382577996c drm/etnaviv: fix dumping of active MMU context 5255cd757321 arm64: tegra: Fix HSUART for Smaug ff44df02ae68 arm64: dts: qcom: pmi8994: Add missing OVP interrupt 8ec1d751e750 arm64: dts: qcom: pmi8950: Add missing OVP interrupt d618209fff54 arm64: dts: qcom: pm660l: Add missing short interrupt 4dce1ca61fe5 arm64: dts: qcom: pm6150l: Add missing short interrupt 314dd409b863 arm64: dts: qcom: sm8250-sony-xperia: correct GPIO keys wakeup again b47970aec2b2 arm64: tegra: Fix HSUART for Jetson AGX Orin 37c085a977e4 ARM: dts: BCM53573: Use updated "spi-gpio" binding properties 38d5220f93ec ARM: dts: BCM53573: Add cells sizes to PCIe node 381cd6c60f4c ARM: dts: BCM53573: Drop nonexistent #usb-cells 7319280e7e8e ARM: dts: BCM53573: Drop nonexistent "default-off" LED trigger 8c6ac7470c46 drm/amdgpu: avoid integer overflow warning in amdgpu_device_resize_fb_bar() b99f5bf32fee firmware: ti_sci: Use system_state to determine polling c3180fd9cf9e ARM: dts: stm32: Add missing detach mailbox for DHCOR SoM 9ec5b2ec2233 ARM: dts: stm32: Add missing detach mailbox for DHCOM SoM 0e0240967ed1 ARM: dts: stm32: Update to generic ADC channel binding on DHSOM systems cc0158d90283 ARM: dts: stm32: Add missing detach mailbox for Odyssey SoM 002cfdf64f0e ARM: dts: stm32: Add missing detach mailbox for emtrion emSBC-Argon eaa18625a721 ARM: dts: stm32: adopt generic iio bindings for adc channels on emstamp-argon ce5716af92de arm64: dts: qcom: sm8250: Mark PCIe hosts as DMA coherent 6bdc6c98e008 arm64: dts: qcom: sm8450-hdk: remove pmr735b PMIC inclusion 316b1db0faf9 arm64: dts: qcom: pmk8350: fix ADC-TM compatible string e9b6e5f9d89b arm64: dts: qcom: pmr735b: fix thermal zone name 31578f4a1038 arm64: dts: qcom: pm8350b: fix thermal zone name d532b99da1e7 arm64: dts: qcom: pm8350: fix thermal zone name 7374fbf8099f arm64: dts: qcom: sm8350: Use proper CPU compatibles 2aec1a1bd316 arm64: dts: qcom: sm8350: Add missing LMH interrupts to cpufreq 4627ff061385 arm64: dts: qcom: sm8350: Fix CPU idle state residency times db0bb434bd62 arm64: dts: qcom: sdm845-tama: Set serial indices and stdout-path 94d0f87853c7 arm64: dts: qcom: msm8996: Add missing interrupt to the USB2 controller 4aad17e6971d arm64: dts: qcom: sc8280xp: Add missing SCM interconnect c806d12c2a03 arm64: dts: qcom: sc8280xp-crd: Correct vreg_misc_3p3 GPIO 1bd91f7558cc arm64: dts: qcom: sm8250-edo: Rectify gpio-keys ad256c8f3659 arm64: dts: qcom: sm8250-edo: Add GPIO line names for PMIC GPIOs b8b24ca8ff62 arm64: dts: qcom: sm8250-edo: Add gpio line names for TLMM 142d0c2b087d arm64: dts: qcom: msm8916-l8150: correct light sensor VDDIO supply 62bcbe864e8f arm64: dts: qcom: sm8250: correct dynamic power coefficients c9cbf312beca arm64: dts: qcom: sm6350: Fix ZAP region 49d9276e4e65 arm64: dts: qcom: sm8150: use proper DSI PHY compatible a5397aa6c459 arm64: defconfig: enable Qualcomm MSM8996 Global Clock Controller as built-in 735f8ad47c41 soc: qcom: ocmem: Fix NUM_PORTS & NUM_MACROS macros 9971747dee9a soc: qcom: ocmem: Add OCMEM hardware version print 97c55d575318 ASoC: stac9766: fix build errors with REGMAP_AC97 19e1dfcd0094 drm/hyperv: Fix a compilation issue because of not including screen_info.h 75b1c7be6ec5 drm/amd/display: Do not set drr on pipe commit 903fc5d8cb48 quota: fix dqput() to follow the guarantees dquot_srcu should provide d6dd76dbd98c quota: add new helper dquot_active() ec2b2bcbed47 quota: rename dquot_active() to inode_quota_active() c389a4c481ae quota: factor out dquot_write_dquot() 98d233259a4d drm: bridge: dw-mipi-dsi: Fix enable/disable of DSI controller a24f97271af9 ASoC: cs43130: Fix numerator/denominator mixup 65306c9e8588 ASoC: soc-compress: Fix deadlock in soc_compr_open_fe 7a1044ea63d3 drm/bridge: tc358764: Fix debug print parameter order 4204992fec4a netrom: Deny concurrent connect(). 1f35fe7674cc pds_core: pass opcode to devcmd_wait b272690b335c pds_core: check for work queue before use 4b5207803a13 pds_core: no reset command for VF 6368086ad037 pds_core: no health reporter in VF 42da13e048a1 pds_core: protect devlink callbacks from fw_down state 5293f466d41d net/sched: sch_hfsc: Ensure inner classes have fsc curve 283b627b0f2f sfc: Check firmware supports Ethernet PTP filter bf412083ad97 cteonxt2-pf: Fix backpressure config for multiple PFC priorities to work simultaneously 19ab2ffa3a86 octeontx2-af: CN10KB: fix PFC configuration 7682e8bcf255 octeontx2-pf: Fix PFC TX scheduler free eb13a9694e07 octeontx2-pf: Refactor schedular queue alloc/free calls 45a8c9e443b1 hwmon: (tmp513) Fix the channel number in tmp51x_is_visible() 0a01f59e3316 mlxsw: core_hwmon: Adjust module label names based on MTCAP sensor counter 634309d070ab mlxsw: i2c: Limit single transaction buffer size b97bbe83461b mlxsw: i2c: Fix chunk size setting in output mailbox buffer c3971ad85ab2 net: arcnet: Do not call kfree_skb() under local_irq_disable() df2307c78147 ice: avoid executing commands on other ports when driving sync 5dbb17ce201e wifi: ath9k: use IS_ERR() with debugfs_create_dir() 2dba15a00998 net/mlx5: Dynamic cyclecounter shift calculation for PTP free running clock 38d98af561d5 arm64: mm: use ptep_clear() instead of pte_clear() in clear_flush() 53457af71d20 Bluetooth: btusb: Do not call kfree_skb() under spin_lock_irqsave() 397d58007532 Bluetooth: hci_conn: fail SCO/ISO via hci_conn_failed if ACL gone early a30c074f0b5b Bluetooth: hci_sync: Fix UAF in hci_disconnect_all_sync 4d3ca4a9aaf0 Bluetooth: hci_sync: Fix UAF on hci_abort_conn_sync 970aaee1d264 Bluetooth: ISO: Notify user space about failed bis connections e4511a67fcdb Bluetooth: hci_conn: Consolidate code for aborting connections 0c57f9ad2c3e wifi: mwifiex: avoid possible NULL skb pointer dereference 1f4e3e9ba286 bpf: Fix check_func_arg_reg_off bug for graph root/node 2e0c6551e7f8 mac80211: make ieee80211_tx_info padding explicit 788b1537d987 wifi: nl80211/cfg80211: add forgotten nla_policy for BSS color attribute 0bb707be973f wifi: mac80211: fix puncturing bitmap handling in CSA af3d2e0f3a54 bpf: Fix a bpf_kptr_xchg() issue with local kptr 64f72193ec17 wifi: ath9k: protect WMI command response buffer replacement with a lock 0a4bccf0dcce wifi: ath9k: fix races between ath9k_wmi_cmd and ath9k_wmi_ctrl_rx 5062a0af2bfa samples/bpf: fix broken map lookup probe 1c22f35ed878 samples/bpf: fix bio latency check with tracepoint 2abcf2482821 ARM: dts: Add .dts files missing from the build 1db16ec15d83 selftests: memfd: error out test process when child test fails 96c1d7a7d54b wifi: rtw89: 8852b: rfk: fine tune IQK parameters to improve performance on 2GHz band ebbac3a52b11 wifi: mwifiex: Fix missed return in oob checks failed path 5d66b32a6ecf wifi: mwifiex: fix memory leak in mwifiex_histogram_read() acf3314a318e net: annotate data-races around sk->sk_lingertime 5580cb5ae400 net: lan966x: Fix return value check for vcap_get_rule() 794611ad1e6b fs: ocfs2: namei: check return value of ocfs2_add_entry() b49c9a2d85eb scripts/gdb: fix 'lx-lsmod' show the wrong size 84f40e85bdc1 lwt: Check LWTUNNEL_XMIT_CONTINUE strictly d68c17402442 lwt: Fix return values of BPF xmit ops d62da65a525e hwrng: iproc-rng200 - Implement suspend and resume calls b1c7b72a1b55 crypto: caam - fix unchecked return value error cb5311436757 ice: ice_aq_check_events: fix off-by-one check when filling buffer 45bd8c6729a0 net-memcg: Fix scope of sockmem pressure indicators 1b6cefd71356 net: hns3: fix wrong rpu tln reg issue 1d3751be00c3 net: hns3: Support tlv in regs data for HNS3 PF driver df34972a33d2 net: hns3: move dump regs function to a separate file 27d510d038fb selftests/bpf: Clean up fmod_ret in bench_rename test script 3c228b80d610 selftests/bpf: Fix repeat option when kfunc_call verification fails 9bb4becae5cf net: tcp: fix unexcepted socket die when snd_wnd is 0 d9163d5281fb Bluetooth: hci_event: drop only unbound CIS if Set CIG Parameters fails 736827d56be6 Bluetooth: hci_conn: Always allocate unique handles aafda69d4807 Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() 5282da3305bd Bluetooth: hci_sync: Don't double print name in add/remove adv_monitor da19f35868df Bluetooth: Fix potential use-after-free when clear keys 3a273cd0f47d Bluetooth: hci_conn: Fix hci_le_set_cig_params f550c6973e4b Bluetooth: hci_conn: Use kmemdup() to replace kzalloc + memcpy 25675624455e Bluetooth: hci_conn: Fix not allowing valid CIS ID 7b1b32172771 Bluetooth: ISO: Fix not checking for valid CIG/CIS IDs 9c1d36fef5ea Bluetooth: nokia: fix value check in nokia_bluetooth_serdev_probe() 2bc71294d36d Bluetooth: ISO: do not emit new LE Create CIS if previous is pending b475c1109251 Bluetooth: ISO: Add support for connecting multiple BISes 3e740c8876d0 Bluetooth: hci_event: Fix parsing of CIS Established Event 867a14669096 crypto: api - Use work queue in crypto_destroy_instance 66ee37d0da84 crypto: stm32 - Properly handle pm_runtime_get failing 148eaae09226 kbuild: rust_is_available: fix confusion when a version appears in the path a329671bf103 kbuild: rust_is_available: add check for `bindgen` invocation 7bbcdae9f862 kbuild: rust_is_available: fix version check when CC has multiple arguments f1b4d5f64e22 kbuild: rust_is_available: remove -v option dc958014fa23 bpf: fix bpf_dynptr_slice() to stop return an ERR_PTR. da2f98973b70 spi: mpc5xxx-psc: Fix unsigned expression compared with zero 713f9c030837 selftests/bpf: fix static assert compilation issue for test_cls_*.c f12a425a7c74 wifi: ath12k: fix memcpy array overflow in ath12k_peer_assoc_h_he() 7a031c9eaa3b wifi: ath11k: fix band selection for ppdu received in channel 177 of 5 GHz fdfaabfd200b wifi: mwifiex: fix error recovery in PCIE buffer descriptor management a7300e3800e9 wifi: mwifiex: Fix OOB and integer underflow when rx packets 4b447dd2b472 wifi: rtw89: Fix loading of compressed firmware 5824565c64a3 wifi: mt76: mt7915: fix power-limits while chan_switch 90e40fee4cca wifi: mt76: mt7915: fix tlv length of mt7915_mcu_get_chan_mib_info 863893293550 can: tcan4x5x: Remove reserved register 0x814 from writable table d273f36ef6be can: gs_usb: gs_usb_receive_bulk_callback(): count RX overflow errors also in case of OOM 33ac54d56928 spi: tegra20-sflash: fix to check return value of platform_get_irq() in tegra_sflash_probe() ca517ee965df wifi: mt76: testmode: add nla_policy for MT76_TM_ATTR_TX_LENGTH 300e08ebf838 wifi: mt76: mt7915: remove VHT160 capability on MT7915 01b34b9dc2fc wifi: mt76: mt7915: fix capabilities in non-AP mode 4f3375f81df7 wifi: mt76: mt7915: fix command timeout in AP stop period 8aa43cfbb68b bpf: reject unhashed sockets in bpf_sk_assign 9df141014c65 udp: re-score reuseport groups when connected sockets are present 8eed5585f76c wifi: mt76: mt7996: fix WA event ring size ce5f013e73a6 wifi: mt76: mt7996: use correct phy for background radar event 9bb9c3dc5eae wifi: mt76: mt7996: fix bss wlan_idx when sending bss_info command 4c65f54ef70f wifi: mt76: mt7921: fix non-PSC channel scan fail 814d59814a00 wifi: mt76: mt7915: rework tx bytes counting when WED is active 1d2e15bca38e wifi: mt76: mt7915: rework tx packets counting when WED is active 42633efe6bbc wifi: mt76: mt7915: fix background radar event being blocked 69c3dbb2dcef wifi: mt76: mt7996: fix header translation logic f7f6d5d5490b wifi: rtw89: debug: Fix error handling in rtw89_debug_priv_btc_manual_set() 6e2e442ff054 regmap: rbtree: Use alloc_flags for memory allocations 50205a72102d regmap: maple: Use alloc_flags for memory allocations b60dbf791b0b regmap: Load register defaults in blocks rather than register by register 88e9c27e1291 hwrng: pic32 - use devm_clk_get_enabled 76a71852edad hwrng: nomadik - keep clock enabled while hwrng is registered b5058b34918a tcp: tcp_enter_quickack_mode() should be static b46ef4835b0c crypto: qat - change value of default idle filter 6d167bf5ac56 bpf: Fix an error in verifying a field in a union a61317005384 bpf: Fix an error around PTR_UNTRUSTED 62c4571f2752 bpf: Clear the probe_addr for uprobe 179a2a8a7b9a libbpf: Fix realloc API handling in zero-sized edge cases 9cdf9b27b704 bpftool: Use a local bpf_perf_event_value to fix accessing its fields d61c787a8977 bpftool: Use a local copy of BPF_LINK_TYPE_PERF_EVENT in pid_iter.bpf.c 29b0abab69e0 bpftool: Define a local bpf_perf_link to fix accessing its fields 564560f3bac6 bpftool: use a local copy of perf_event to fix accessing :: Bpf_cookie ff843490981a libbpf: only reset sec_def handler when necessary a3e6c8c383cf selftests/bpf: Fix bpf_nf failure upon test rerun 5ce42c9441f1 cpufreq: tegra194: remove opp table in exit hook 6e76e74f3438 cpufreq: tegra194: add online/offline hooks fdcfcf4ff6d4 cpufreq: powernow-k8: Use related_cpus instead of cpus in driver.exit() 41b18168d309 x86/efistub: Fix PCI ROM preservation in mixed mode 84857640c674 cpufreq: amd-pstate-ut: Fix kernel panic when loading the driver 231bb989098d cpufreq: amd-pstate-ut: Remove module parameter access 9f8b364827bf thermal/of: Fix potential uninitialized value access 040ca14f9185 ACPI: x86: s2idle: Fix a logic error parsing AMD constraints table be6daa0d449a ACPI: x86: s2idle: Post-increment variables when getting constraints 04f7ab313c71 irqchip/loongson-eiointc: Fix return value checking of eiointc_index 4d1566cbc93c s390/paes: fix PKEY_TYPE_EP11_AES handling for secure keyblobs a62ba32502b0 s390/pkey: fix PKEY_TYPE_EP11_AES handling for sysfs attributes d2b64e45afbb s390/pkey: fix PKEY_TYPE_EP11_AES handling in PKEY_GENSECK2 IOCTL db98bf87deea s390/pkey: fix/harmonize internal keyblob headers f7595dd677f4 selftests/futex: Order calls to futex_lock_pi 5b068b48590c perf/imx_ddr: don't enable counter0 if none of 4 counters are used ca4b6a5126d2 sched/rt: Fix sysctl_sched_rr_timeslice intial value f6f9fd819d0d arm64/fpsimd: Only provide the length to cpufeature for xCR registers b8d56aaa23e9 x86/decompressor: Don't rely on upper 32 bits of GPRs being preserved d577f577d87a cpuidle: teo: Update idle duration estimate when choosing shallower state 219ed9a08e96 sched/psi: Select KERNFS as needed bbce5b478c0a arm64/ptrace: Clean up error handling path in sve_set_common() 0bf16f0dff46 selftests/resctrl: Close perf value read fd on errors 84ddb2c8d5d3 selftests/resctrl: Unmount resctrl FS if child fails to run benchmark 755fb5181f49 selftests/resctrl: Don't leak buffer in fill_cache() aabca80d93a5 selftests/resctrl: Add resctrl.h into build deps 2813cafbb86d OPP: Fix passing 0 to PTR_ERR in _opp_attach_genpd() b427c23cebc5 powercap: arm_scmi: Remove recursion while parsing zones de1dbbefac85 clocksource: Handle negative skews in "skew is too large" messages e5de968a9032 refscale: Fix uninitalized use of wait_queue_head_t 28fabbbd5ac6 locking/arch: Avoid variable shadowing in local_try_cmpxchg() c0e71cb3ae9d ARM: ptrace: Restore syscall skipping for tracers 9d75837cedb9 ARM: ptrace: Restore syscall restart tracing 71512d0d79c8 vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing cdb1369c0c5b selftests/harness: Actually report SKIP for signal tests 8a404e5b89b5 tmpfs: verify {g,u}id mount options correctly b7b6c1d3c50a iomap: Remove large folio handling in iomap_invalidate_folio() c8ca04de0f8a fs: Fix error checking for d_hash_and_lookup() 5c0dd959b635 eventfd: prevent underflow for eventfd semaphores 8c079dd85f33 splice: fsnotify_access(in), fsnotify_modify(out) on success in tee 1b46bd39bd5f splice: fsnotify_access(fd)/fsnotify_modify(fd) in vmsplice 83ab4d61a6db splice: always fsnotify_access(in), fsnotify_modify(out) on success 55ce683205ee reiserfs: Check the return value from __getblk() f294216e8817 Revert "net: macsec: preserve ingress frame ordering" 44191fb06d7c Revert "PCI: tegra194: Enable support for 256 Byte payload" e46e084eef71 Revert "fuse: in fuse_flush only wait if someone wants the return code" f6eb08ff998a Input: i8042 - add quirk for TUXEDO Gemini 17 Gen1/Clevo PD70PN 926c77b695ba drm/amd/display: ensure async flips are only accepted for fast updates e6945cbcb633 Bluetooth: btrtl: Load FW v2 otherwise FW v1 for RTL8852C 9ccd5bc888f1 net: Avoid address overwrite in kernel_connect 240a4bbb5c18 KVM: x86/mmu: Add "never" option to allow sticky disabling of nx_huge_pages ce5b4e174235 tpm: Enable hwrng only for Pluton on AMD CPUs a591c40c8639 cpufreq: intel_pstate: set stale CPU frequency to minimum a71a791575b5 sbitmap: fix batching wakeup 0b9e229d2c3b platform/mellanox: Fix mlxbf-tmfifo not handling all virtio CONSOLE notifications afdd9839e8b7 tracing: Introduce pipe_cpumask to avoid race on trace_pipes 6a3e1d42a283 net: sfp: handle 100G/25G active optical cables in sfp_parse_support 3e7b0cacdcc2 ASoC: cs35l56: Add an ACPI match table 3f8fb078f850 drm/amd/pm: Fix temperature unit of SMU v13.0.6 87d743fcfed1 gpiolib: fix reference leaks when removing GPIO chips still in use 2e3f9bfe44f2 broadcom: b44: Use b44_writephy() return value 7d9f2277f12b fbdev: goldfishfb: Do not check 0 for platform_get_irq() d1e1bdd30ae0 i2c: imx-lpi2c: return -EINVAL when i2c peripheral clk doesn't work e1417c7dc3ad ASoC: rt1308-sdw: fix random louder sound fd54a813f45b ARM: dts: integrator: fix PCI bus dtc warnings 81d0b388c10d ALSA: hda/cs8409: Support new Dell Dolphin Variants 069ee9f4e2fd virtio-mem: check if the config changed before fake offlining memory 206fa20b9ed1 virtio-mem: keep retrying on offline_and_remove_memory() errors in Sub Block Mode (SBM) c6ba4b3706c4 virtio-mem: convert most offline_and_remove_memory() errors to -EBUSY 5ce0a78d0305 virtio-mem: remove unsafe unplug in Big Block Mode (BBM) 0c13e9af66cf vdpa/mlx5: Correct default number of queues when MQ is on 0993d26ddd8e vhost-scsi: Fix alignment handling with windows 15b41e759d23 arm64: dts: rockchip: correct wifi interrupt flag in Box Demo d2c404193844 arm64: dts: rockchip: correct wifi interrupt flag in Rock Pi 4B 5a7527e882e3 arm64: dts: rockchip: correct wifi interrupt flag in eaidk-610 f4ecae3e2200 drm/amdgpu: Match against exact bootloader status 1428c8e82b17 wifi: ath12k: Fix buffer overflow when scanning with extraie c21156d79dcd net: hns3: restore user pause configure when disable autoneg a27f317c7cdb scsi: qedi: Fix potential deadlock on &qedi_percpu->p_work_lock 04c50fb24fd2 scsi: lpfc: Remove reftag check in DIF paths 1185de708ec8 platform/x86/amd/pmf: Fix unsigned comparison with less than zero d2007c8a7429 idmaengine: make FSL_EDMA and INTEL_IDMA64 depends on HAS_IOMEM 6e2e2bf0ea55 x86/hyperv: add noop functions to x86_init mpparse functions ee66ee99eea6 powerpc/powermac: Use early_* IO variants in via_calibrate_decr() ab3c602d1562 wifi: brcmfmac: Fix field-spanning write in brcmf_scan_params_v2_to_v1() 4cf614ac4c4b net: usb: qmi_wwan: add Quectel EM05GV2 7ed7c1602c8b net: annotate data-races around sk->sk_{rcv|snd}timeo 85576b3c2de3 net: dsa: microchip: KSZ9477 register regmap alignment to 32 bit boundaries 713ce33ed395 Revert "wifi: ath6k: silence false positive -Wno-dangling-pointer warning on GCC 12" e70a88462a9f vmbus_testing: fix wrong python syntax for integer value comparison 15ebed8cb794 clk: fixed-mmio: make COMMON_CLK_FIXED_MMIO depend on HAS_IOMEM fc18cbdad4cb kprobes: Prohibit probing on CFI preamble symbol b702cac249ed security: keys: perform capable check only on privileged operations a76d9eebc05e LoongArch: Fix CMDLINE_EXTEND and CMDLINE_BOOTLOADER handling df80567bfd6a LoongArch: Only fiddle with CHECKFLAGS if `need-compiler' 3c57e6ef55b8 staging: fbtft: ili9341: use macro FBTFT_REGISTER_SPI_DRIVER 23db7577c53f ALSA: usb-audio: Update for native DSD support quirks 73adcfe192d3 ata: pata_arasan_cf: Use dev_err_probe() instead dev_err() in data_xfer() 20c80f8cfbc5 ovl: Always reevaluate the file signature for IMA 6d5912a386b6 drm/amd/display: Exit idle optimizations before attempt to access PHY 43a973efd6ae drm/amd/display: Guard DCN31 PHYD32CLK logic against chip family 4c155ffd3662 drm/amd/smu: use AverageGfxclkFrequency* to replace previous GFX Curr Clock dc02b0843040 platform/x86: huawei-wmi: Silence ambient light sensor 9d1d1b51b04a platform/x86: asus-wmi: Fix setting RGB mode on some TUF laptops 8135100ab935 platform/x86: think-lmi: Use kfree_sensitive instead of kfree 19e0e540f0ab platform/x86/intel/hid: Add HP Dragonfly G2 to VGBS DMI quirks 467af1faf4d3 platform/x86: intel: hid: Always call BTNL ACPI method d7e80cf43c1a ALSA: usb-audio: Add quirk for Microsoft Modern Wireless Headset c6f45378c5e0 ASoC: atmel: Fix the 8K sample parameter in I2SC master ff4f04493403 ASoC: rt711-sdca: fix for JD event handling in ClockStop Mode0 731f7f17a835 ASoC: rt711: fix for JD event handling in ClockStop Mode0 57f727c53464 ASoC: rt712-sdca: fix for JD event handling in ClockStop Mode0 06577fbf5338 ASoc: codecs: ES8316: Fix DMIC config 76f9c89b61ae ASoC: rt5682-sdw: fix for JD event handling in ClockStop Mode0 23b0014df6d1 cifs: fix charset issue in reconnection e26c5d7d7e7b fs/nls: make load_nls() take a const parameter 10860d01819f s390/dasd: fix hanging device after request requeue 0db529ff48aa s390/dasd: use correct number of retries for ERP requests 2f8cd099c13a m68k: Fix invalid .section syntax 570cfb82ed1a ethernet: atheros: fix return value check in atl1c_tso_csum() ec2e3eb1449c net: hns3: add tm flush when setting tm ba98d42dd3d3 thermal: core: constify params in thermal_zone_device_register 95992abd2b7e ASoC: nau8821: Add DMI quirk mechanism for active-high jack-detect b306ec1c8997 ASoC: da7219: Check for failure reading AAD IRQ events d87d275ee583 ASoC: da7219: Flush pending AAD IRQ when suspending aa669ef229ae ksmbd: fix out of bounds in init_smb2_rsp_hdr() fc571afdbf28 ksmbd: no response from compound read 4c2b350b2e26 ksmbd: validate session id and tree id in compound request af4ea4a6842e ksmbd: fix out of bounds in smb3_decrypt_req() 18a75e28c4e4 9p: virtio: make sure 'offs' is initialized in zc_request 00d31fe4bf05 9p: virtio: fix unlikely null pointer deref in handle_rerror 15559ac9d19f media: pci: cx23885: fix error handling for cx23885 ATSC boards c42d815cc909 media: pulse8-cec: handle possible ping error 2c4f2254aa1e media: imx-jpeg: Support to assign slot for encoder/decoder 7b6ac5ffc0d2 media: amphion: use dev_err_probe 549ced0c2da6 phy: qcom-snps-femto-v2: use qcom_snps_hsphy_suspend/resume error code acc8bd59e3f0 ksmbd: Fix unsigned expression compared with zero 3eec4e2ef2f0 Partially revert "drm/amd/display: Fix possible underflow for displays with large vblank" e94f8f9e82eb Revert "bridge: Add extack warning when enabling STP in netns." Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.4.inc | 36 +++++++++++++++---- .../linux/linux-yocto-rt_6.4.bb | 6 ++-- .../linux/linux-yocto-tiny_6.4.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.4.bb | 28 +++++++-------- 4 files changed, 49 insertions(+), 27 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.4.inc b/meta/recipes-kernel/linux/cve-exclusion_6.4.inc index fa3a4aed44..8e5609436f 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.4.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.4.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2023-09-08 09:02:15.787032 for version 6.4.15 +# Generated at 2023-09-14 13:53:23.744347+00:00 for version 6.4.16 python check_kernel_cve_status_version() { - this_version = "6.4.15" + this_version = "6.4.16" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -4518,9 +4518,9 @@ CVE_STATUS[CVE-2022-4382] = "fixed-version: Fixed from version 6.2rc5" CVE_STATUS[CVE-2022-43945] = "fixed-version: Fixed from version 6.1rc1" -# CVE-2022-44032 has no known resolution +CVE_STATUS[CVE-2022-44032] = "fixed-version: Fixed from version 6.4rc1" -# CVE-2022-44033 has no known resolution +CVE_STATUS[CVE-2022-44033] = "fixed-version: Fixed from version 6.4rc1" # CVE-2022-44034 has no known resolution @@ -4532,13 +4532,13 @@ CVE_STATUS[CVE-2022-45869] = "fixed-version: Fixed from version 6.1rc7" # CVE-2022-45885 has no known resolution -# CVE-2022-45886 has no known resolution +CVE_STATUS[CVE-2022-45886] = "fixed-version: Fixed from version 6.4rc3" -# CVE-2022-45887 has no known resolution +CVE_STATUS[CVE-2022-45887] = "fixed-version: Fixed from version 6.4rc3" CVE_STATUS[CVE-2022-45888] = "fixed-version: Fixed from version 6.2rc1" -# CVE-2022-45919 has no known resolution +CVE_STATUS[CVE-2022-45919] = "fixed-version: Fixed from version 6.4rc3" CVE_STATUS[CVE-2022-45934] = "fixed-version: Fixed from version 6.1" @@ -4794,6 +4794,8 @@ CVE_STATUS[CVE-2023-25012] = "fixed-version: Fixed from version 6.3rc1" CVE_STATUS[CVE-2023-2513] = "fixed-version: Fixed from version 6.0rc1" +# CVE-2023-25775 has no known resolution + CVE_STATUS[CVE-2023-2598] = "fixed-version: Fixed from version 6.4rc1" # CVE-2023-26242 has no known resolution @@ -4972,6 +4974,8 @@ CVE_STATUS[CVE-2023-3773] = "cpe-stable-backport: Backported in 6.4.12" CVE_STATUS[CVE-2023-3776] = "cpe-stable-backport: Backported in 6.4.5" +CVE_STATUS[CVE-2023-3777] = "cpe-stable-backport: Backported in 6.4.7" + CVE_STATUS[CVE-2023-3812] = "fixed-version: Fixed from version 6.1rc4" CVE_STATUS[CVE-2023-38409] = "fixed-version: Fixed from version 6.3rc7" @@ -4996,6 +5000,8 @@ CVE_STATUS[CVE-2023-4004] = "cpe-stable-backport: Backported in 6.4.7" # CVE-2023-4010 has no known resolution +CVE_STATUS[CVE-2023-4015] = "cpe-stable-backport: Backported in 6.4.8" + CVE_STATUS[CVE-2023-40283] = "cpe-stable-backport: Backported in 6.4.10" CVE_STATUS[CVE-2023-4128] = "cpe-stable-backport: Backported in 6.4.10" @@ -5012,6 +5018,12 @@ CVE_STATUS[CVE-2023-4155] = "cpe-stable-backport: Backported in 6.4.11" CVE_STATUS[CVE-2023-4194] = "cpe-stable-backport: Backported in 6.4.10" +CVE_STATUS[CVE-2023-4206] = "cpe-stable-backport: Backported in 6.4.10" + +CVE_STATUS[CVE-2023-4207] = "cpe-stable-backport: Backported in 6.4.10" + +CVE_STATUS[CVE-2023-4208] = "cpe-stable-backport: Backported in 6.4.10" + CVE_STATUS[CVE-2023-4273] = "cpe-stable-backport: Backported in 6.4.10" CVE_STATUS[CVE-2023-4385] = "fixed-version: Fixed from version 5.19rc1" @@ -5024,3 +5036,13 @@ CVE_STATUS[CVE-2023-4394] = "fixed-version: Fixed from version 6.0rc3" CVE_STATUS[CVE-2023-4459] = "fixed-version: Fixed from version 5.18" +CVE_STATUS[CVE-2023-4563] = "cpe-stable-backport: Backported in 6.4.11" + +CVE_STATUS[CVE-2023-4569] = "cpe-stable-backport: Backported in 6.4.12" + +CVE_STATUS[CVE-2023-4611] = "cpe-stable-backport: Backported in 6.4.8" + +# CVE-2023-4622 needs backporting (fixed from 6.5rc1) + +# CVE-2023-4623 has no known resolution + diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.4.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.4.bb index 07e852d584..deb2eea73f 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.4.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.4.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "40f6eb23017e1bb31c63e980b6d11bc8e917824b" -SRCREV_meta ?= "b1e8a40393e0ac784e05a45ee90b6680e3b53263" +SRCREV_machine ?= "61c6d869af5ffb90ac64095eafdf8ba513eb21a6" +SRCREV_meta ?= "13efe44fe9dd2626eaf6552288ea31770ec71cf1" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.4;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.4.15" +LINUX_VERSION ?= "6.4.16" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.4.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.4.bb index 74b830afb4..c81f230139 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.4.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.4.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.4.inc -LINUX_VERSION ?= "6.4.15" +LINUX_VERSION ?= "6.4.16" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "3f60b22a4257993a1e389d46d1204a0f580fc99e" -SRCREV_meta ?= "b1e8a40393e0ac784e05a45ee90b6680e3b53263" +SRCREV_machine ?= "ef91ff6a4be36037808af1ca786fdd557f265a1d" +SRCREV_meta ?= "13efe44fe9dd2626eaf6552288ea31770ec71cf1" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.4.bb b/meta/recipes-kernel/linux/linux-yocto_6.4.bb index d17f05eba4..5afd7b1ba7 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.4.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.4.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.4/standard/base" KBRANCH:qemuloongarch64 ?= "v6.4/standard/base" KBRANCH:qemumips64 ?= "v6.4/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "47cff83414374714b911719ba588aa6e2816956b" -SRCREV_machine:qemuarm64 ?= "3f60b22a4257993a1e389d46d1204a0f580fc99e" -SRCREV_machine:qemuloongarch64 ?= "3f60b22a4257993a1e389d46d1204a0f580fc99e" -SRCREV_machine:qemumips ?= "d3a6c87612629a4c1f722b7d93e9a04aec7b22a4" -SRCREV_machine:qemuppc ?= "3f60b22a4257993a1e389d46d1204a0f580fc99e" -SRCREV_machine:qemuriscv64 ?= "3f60b22a4257993a1e389d46d1204a0f580fc99e" -SRCREV_machine:qemuriscv32 ?= "3f60b22a4257993a1e389d46d1204a0f580fc99e" -SRCREV_machine:qemux86 ?= "3f60b22a4257993a1e389d46d1204a0f580fc99e" -SRCREV_machine:qemux86-64 ?= "3f60b22a4257993a1e389d46d1204a0f580fc99e" -SRCREV_machine:qemumips64 ?= "da59fe1c279b1be0b6b51dc503fe6500fdf84671" -SRCREV_machine ?= "3f60b22a4257993a1e389d46d1204a0f580fc99e" -SRCREV_meta ?= "b1e8a40393e0ac784e05a45ee90b6680e3b53263" +SRCREV_machine:qemuarm ?= "871a4762a8f85550898b8992b29d5e1dbf60a459" +SRCREV_machine:qemuarm64 ?= "ef91ff6a4be36037808af1ca786fdd557f265a1d" +SRCREV_machine:qemuloongarch64 ?= "ef91ff6a4be36037808af1ca786fdd557f265a1d" +SRCREV_machine:qemumips ?= "18bb71cbb388dd093c46d1777f607cfbf0d4c03b" +SRCREV_machine:qemuppc ?= "ef91ff6a4be36037808af1ca786fdd557f265a1d" +SRCREV_machine:qemuriscv64 ?= "ef91ff6a4be36037808af1ca786fdd557f265a1d" +SRCREV_machine:qemuriscv32 ?= "ef91ff6a4be36037808af1ca786fdd557f265a1d" +SRCREV_machine:qemux86 ?= "ef91ff6a4be36037808af1ca786fdd557f265a1d" +SRCREV_machine:qemux86-64 ?= "ef91ff6a4be36037808af1ca786fdd557f265a1d" +SRCREV_machine:qemumips64 ?= "5b9def2ea1065e44847b920c3a4185d0e5c22d58" +SRCREV_machine ?= "ef91ff6a4be36037808af1ca786fdd557f265a1d" +SRCREV_meta ?= "13efe44fe9dd2626eaf6552288ea31770ec71cf1" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "f60d5fd5e950c89a38578ae6f25877de511bb031" +SRCREV_machine:class-devupstream ?= "ae4e4fc35b4258626644c162a702e2bce2b79190" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.4/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.4;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.4.15" +LINUX_VERSION ?= "6.4.16" PV = "${LINUX_VERSION}+git" From patchwork Fri Sep 29 20:04:48 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 31403 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 87E94E728EA for ; Fri, 29 Sep 2023 20:05:05 +0000 (UTC) Received: from mail-vs1-f51.google.com (mail-vs1-f51.google.com [209.85.217.51]) by mx.groups.io with SMTP id smtpd.web11.27709.1696017902682974398 for ; Fri, 29 Sep 2023 13:05:02 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=JjN02yjl; spf=pass (domain: gmail.com, ip: 209.85.217.51, mailfrom: bruce.ashfield@gmail.com) Received: by mail-vs1-f51.google.com with SMTP id ada2fe7eead31-452951b27d0so6937551137.2 for ; Fri, 29 Sep 2023 13:05:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1696017902; x=1696622702; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=7WZlNaVF4RjQob4FzyqxPYRQ6u8jlYdgjvWSA0XBTns=; b=JjN02yjl99ToQOYt0XHlLbdoLWBVNWduyR7uwUCG/pxls07aPcQDYfnIXoX/o4bL9q ks0ANyR/OPjduasxIhO0P4yf040jq2j20ASIBD4n+EBV0INdgJNzu2jo/k7/oIf8u1Ph xarX/xIdNP4fmTbGIOQ/4q44/XEXu0PquGkPZPEJniRmWhVSrNsjKyLGRqxt7IdQ2+dj eL/rb40LI2lJHRaWLJhTxEyZ6p3ll7auMskiKYSAhuIBCdicL90y5I5v/lxRAwF2aW6L z6NbDeayqHgjza1gWAyvA8Ngh3F/Dh8DmaTvxF4xAPWVejjKiQdMF7jqVTF6SUKqPOAg +rzg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696017902; x=1696622702; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=7WZlNaVF4RjQob4FzyqxPYRQ6u8jlYdgjvWSA0XBTns=; b=sAncD7R0EDLlBfdzS+7Fzf8ddHC0bRwvd9m7Z8M3rbiGnR4AeyW1Qa7iodBp21JNHY l1oYnmTDFDSwpoD0TPb0sxAMFVdRh53fE4oG8C3VgG2Nc01WFQopNNyEPDLXzCpVxUOY enarh62yYGhtxkEcydhxiHxIRda8zokWS/NdY8AkTLCvBftMX6ok8odfhTcEgCtV4Fvs mPI8tJBGs2j0BWlgW+qz/X82hDTauPBUG1xVSf2imU260a2+pKHkdWr4YWRWdHbyavU5 obIA0YiNlupVXoiCuPma9Rknff3XhdC73PmVVBbdeuIO10zXyz2boKNSBK2C6p/XhvY7 3jgQ== X-Gm-Message-State: AOJu0Yx2t4wgR1GzXzLHr4k+7Xa5FO/YL0tVD1v/5uAWSvhi3bTHTyaM 5Jf57vSkMrleI2q6nuJW7b8uKKtEPMCI9A== X-Google-Smtp-Source: AGHT+IHoq7lWKKU9BbTFXck3IUWkU5/5ydAB4SaVJzxuWWQWKHVmCfvXb9lx3aA8Y4QUMmo6H1xxow== X-Received: by 2002:a05:6102:8f:b0:452:c783:4738 with SMTP id t15-20020a056102008f00b00452c7834738mr4883165vsp.28.1696017901302; Fri, 29 Sep 2023 13:05:01 -0700 (PDT) Received: from build.lan ([174.112.183.231]) by smtp.gmail.com with ESMTPSA id t28-20020a0cb39c000000b0065cffe12ae9sm2115848qve.36.2023.09.29.13.05.00 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Sep 2023 13:05:00 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 04/10] linux-yocto/6.1: update to v6.1.53 Date: Fri, 29 Sep 2023 16:04:48 -0400 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 29 Sep 2023 20:05:05 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188423 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: 09045dae0d90 Linux 6.1.53 41cb5369cb80 udf: initialize newblock to 0 c74b1cd93f26 clk: Avoid invalid function names in CLK_OF_DECLARE() 59e0dd5bef6c treewide: Fix probing of devices in DT overlays abb597c85acb clk: Mark a fwnode as initialized when using CLK_OF_DECLARE() macro b372816ad610 md: fix regression for null-ptr-deference in __md_stop() adac9f0ddd2b NFSv4.2: Rework scratch handling for READ_PLUS (again) 779563475162 NFSv4.2: Fix a potential double free with READ_PLUS d9ece8c0269f md: Free resources in __md_stop ba6a70adb557 Revert "drm/amd/display: Do not set drr on pipe commit" 1dd387668d5b tracing: Zero the pipe cpumask on alloc to avoid spurious -EBUSY e43a7ae58d00 serial: sc16is7xx: fix regression with GPIO configuration 8aaef0a3eb1b serial: sc16is7xx: remove obsolete out_thread label cc8a853c2d5f perf/x86/uncore: Correct the number of CHAs on EMR e1eb0419126f x86/sgx: Break up long non-preemptible delays in sgx_vepc_release() f705617bab47 USB: core: Fix oversight in SuperSpeed initialization 8186596a6635 USB: core: Fix race by not overwriting udev->descriptor in hub_port_init() d309fa69c2e3 USB: core: Change usb_get_device_descriptor() API 90b01f8df568 USB: core: Unite old scheme and new scheme descriptor reads 0d3b5fe47938 usb: typec: bus: verify partner exists in typec_altmode_attention 9b7cd3fe01f0 usb: typec: tcpm: set initial svdm version based on pd revision 33a31064211c of: property: fw_devlink: Add a devlink for panel followers 7f3d84cfaec7 cpufreq: brcmstb-avs-cpufreq: Fix -Warray-bounds bug 08c86156361c crypto: stm32 - fix loop iterating through scatterlist for DMA 73e64c5eeddf s390/dasd: fix string length handling f9a3d6f037c9 s390/ipl: add missing secure/has_secure file to ipl type 'unknown' 6489ec010786 s390/dcssblk: fix kernel crash with list_add corruption 8bf567b63c2a arm64: sdei: abort running SDEI handlers during crash e95d7a8a6edd pstore/ram: Check start of empty przs during init 351705a44621 mmc: renesas_sdhi: register irqs before registering controller a3f6c1447db8 platform/chrome: chromeos_acpi: print hex string for ACPI_TYPE_BUFFER e6e6a5f50f58 x86/MCE: Always save CS register on AMD Zen IF Poison errors d08b39bb3dff fsverity: skip PKCS#7 parser when keyring is empty 40a1ef4bb092 net: handle ARPHRD_PPP in dev_is_mac_header_xmit() 342d130205f1 X.509: if signature is unsupported skip validation 3d5fed8c79d9 r8169: fix ASPM-related issues on a number of systems with NIC version from RTL8168h ba50e7773a99 x86/sev: Make enc_dec_hypercall() accept a size instead of npages f8a7f10a1dcc dccp: Fix out of bounds access in DCCP error handler 9667854e69a7 dlm: fix plock lookup when using multiple lockspaces c96c67991aac bpf: Fix issue in verifying allow_ptr_leaks b23c96589ff7 drm/amd/display: Add smu write msg id fail retry process 5ad3e534605e parisc: Fix /proc/cpuinfo output for lscpu 316a4a329a4d procfs: block chmod on /proc/thread-self/comm 5e4e9900e6fa block: don't add or resize partition on the disk with GENHD_FL_NO_PART 1654635bed83 Revert "PCI: Mark NVIDIA T4 GPUs to avoid bus reset" 5a3e327dc3fd ntb: Fix calculation ntb_transport_tx_free_entry() 88c7931f81d8 ntb: Clean up tx tail index on link down 4f4af6b8b7a2 ntb: Drop packets when qp link is down e95e31a8607d PCI/PM: Only read PCI_PM_CTRL register when available 223fc5352054 PCI: hv: Fix a crash in hv_pci_restore_msi_msg() during hibernation 4443f3695d58 PCI: Free released resource after coalescing 316f3984298a scsi: mpt3sas: Perform additional retries if doorbell read returns 0 6c4f87e52331 Revert "scsi: qla2xxx: Fix buffer overrun" ab8c52977fe0 media: venus: hfi_venus: Write to VIDC_CTRL_INIT after unmasking interrupts 25934d8f6eb2 media: dvb: symbol fixup for dvb_attach() fd4d61f85e76 ALSA: hda/cirrus: Fix broken audio on hardware with two CS42L42 codecs. ba0b46166b8e arm64: csum: Fix OoB access in IP checksum code for negative lengths ad661951a98f i3c: master: svc: fix probe failure when no i3c device exist cc9bf2d62f19 LoongArch: mm: Add p?d_leaf() definitions 5a8b2c1665ca xtensa: PMU: fix base address for the newer hardware 9a9b8596c3dc drm/amd/display: register edp_backlight_control() for DCN301 47636d32a0ee backlight/lv5207lp: Compare against struct fb_info.device 83166d03a5b7 backlight/bd6107: Compare against struct fb_info.device b4ab337aad09 backlight/gpio_backlight: Compare against struct fb_info.device 8fa9cb58445d io_uring: break iopolling on signal 4a3e0d51c3e1 XArray: Do not return sibling entries from xa_load() 7a7f11283392 ARM: OMAP2+: Fix -Warray-bounds warning in _pwrdm_state_switch() 09cb2a71b2e9 ipmi_si: fix a memleak in try_smi_init() dafe7acfedfb PCI: rockchip: Use 64-bit mask on MSI 64-bit PCI address 823f52daef12 media: i2c: Add a camera sensor top level menu ceedc62a3bc8 media: i2c: ccs: Check rules is non-NULL fea9dd8653ff cpu/hotplug: Prevent self deadlock on CPU hot-unplug 4245ca8f4051 mm/vmalloc: add a safer version of find_vm_area() for debug 157c46360cf3 scsi: core: Fix the scsi_set_resid() documentation 2344b1397651 printk: ringbuffer: Fix truncating buffer size min_t cast 3f7a4e88e40e rcu: dump vmalloc memory info safely 8ad2e7efb2ce ALSA: pcm: Fix missing fixup call in compat hw_refine ioctl 8918025feb2f PM / devfreq: Fix leak in devfreq_dev_release() d2e906c72597 igb: set max size RX buffer when store bad packet is enabled 04c3eee4e13f skbuff: skb_segment, Call zero copy functions before using skbuff frags 4921f9349b66 netfilter: xt_sctp: validate the flag_info count 1c164c1e9e93 netfilter: xt_u32: validate user space input bcdb4a5c42b0 netfilter: nft_exthdr: Fix non-linear header modification 7ca0706c68ad netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c 6678912b4df1 igmp: limit igmpv3_newpack() packet size to IP_MAX_MTU ad8900dd8a56 virtio_ring: fix avail_wrap_counter in virtqueue_add_packed 4927edc23edc cpufreq: Fix the race condition while updating the transition_task of policy 96db43aced39 Drivers: hv: vmbus: Don't dereference ACPI root object handle e351933e4a14 dmaengine: ste_dma40: Add missing IRQ check in d40_probe 43a57ca7dd90 um: Fix hostaudio build errors 222b85e748eb mtd: rawnand: fsmc: handle clk prepare error in fsmc_nand_resume() eaf4c78982ae mtd: spi-nor: Check bus width while setting QE bit 3e313b6c470d leds: trigger: tty: Do not use LED_ON/OFF constants, use led_blink_set_oneshot instead f741121a2251 leds: Fix BUG_ON check for LED_COLOR_ID_MULTI that is always false a253c416e67d leds: multicolor: Use rounded division when calculating color components 2804cc350804 leds: pwm: Fix error code in led_pwm_create_fwnode() cae0787e408c rpmsg: glink: Add check for kstrdup f309ac8a4db9 phy/rockchip: inno-hdmi: do not power on rk3328 post pll on reg write 8f0f5452cb1b phy/rockchip: inno-hdmi: round fractal pixclock in rk3328 recalc_rate 0d86292e3fbb phy/rockchip: inno-hdmi: use correct vco_div_5 macro on rk3328 50fa01243dd5 dmaengine: idxd: Modify the dependence of attribute pasid_enabled 6453a2fbc804 mtd: rawnand: brcmnand: Fix mtd oobsize 74c85396bd73 tracing: Fix race issue between cpu buffer write and swap fb34716c9ee6 tracing: Remove extra space at the end of hwlat_detector/mode ca5e8427e20d x86/speculation: Mark all Skylake CPUs as vulnerable to GDS 55a448e8d863 tick/rcu: Fix false positive "softirq work is pending" messages 69b8d7bf834c platform/x86/amd/pmf: Fix a missing cleanup path 2763732ec1e6 HID: multitouch: Correct devm device reference for hidinput input_dev name f283805d9843 HID: uclogic: Correct devm device reference for hidinput input_dev name 6e5960954151 HID: logitech-dj: Fix error handling in logi_dj_recv_switch_to_dj_mode() cf38960386f3 RDMA/efa: Fix wrong resources deallocation order 9d9a40530383 RDMA/siw: Correct wrong debug message bbd1b1b5082c RDMA/siw: Balance the reference of cep->kref in the error path 3f39698e7e84 Revert "IB/isert: Fix incorrect release of isert connection" 81ff633a88be amba: bus: fix refcount leak db18d5e3eee4 serial: tegra: handle clk prepare error in tegra_uart_hw_init() 93e908545361 interconnect: qcom: bcm-voter: Use enable_maks for keepalive voting e9ef8b5099d5 interconnect: qcom: bcm-voter: Improve enable_mask handling 1d085c6a25fa interconnect: qcom: sm8450: Enable sync_state 5a5fb3b1754f scsi: fcoe: Fix potential deadlock on &fip->ctlr_lock f06c7d823ab5 scsi: core: Use 32-bit hostnum in scsi_host_lookup() f01cfec8d345 RDMA/irdma: Prevent zero-length STAG registration 5fa1552877ce coresight: trbe: Fix TRBE potential sleep in atomic context 848cd6f24aa7 cgroup:namespace: Remove unused cgroup_namespaces_init() 0d545a8e77cb Revert "f2fs: fix to do sanity check on extent cache correctly" 3f60a36ed6e3 f2fs: Only lfs mode is allowed with zoned block device feature 33d4c00725b0 f2fs: judge whether discard_unit is section only when have CONFIG_BLK_DEV_ZONED 4d7e804f49a0 f2fs: fix to avoid mmap vs set_compress_option case 3a2cf76cfb8f media: i2c: rdacm21: Fix uninitialized value 86a41ad0128a media: ov2680: Fix regulators being left enabled on ov2680_power_on() errors 85fb0b963f2b media: ov2680: Fix ov2680_set_fmt() which == V4L2_SUBDEV_FORMAT_TRY not working 0790c0914059 media: ov2680: Add ov2680_fill_format() helper function 90fbf01c8080 media: ov2680: Don't take the lock for try_fmt calls e0b6edf4a346 media: ov2680: Remove VIDEO_V4L2_SUBDEV_API ifdef-s 6d51cdf66b9f media: ov2680: Fix vflip / hflip set functions 7263c39fd711 media: ov2680: Fix ov2680_bayer_order() ef9055e9a768 media: ov2680: Remove auto-gain and auto-exposure controls 9e6e509c08f6 media: i2c: ov2680: Set V4L2_CTRL_FLAG_MODIFY_LAYOUT on flips 2b9d0a65d133 media: ov5640: Fix initial RESETB state and annotate timings 5074c70795d4 media: ov5640: Enable MIPI interface in ov5640_set_power_mipi() a4cd2c3eff18 HID: input: Support devices sending Eraser without Invert 297992e5c635 drivers: base: Free devm resources when unregistering a device 66eb45e7d5fc USB: gadget: f_mass_storage: Fix unused variable warning 324da2f3ee73 USB: gadget: core: Add missing kerneldoc for vbus_work 365ce3f86bb1 docs: ABI: fix spelling/grammar in SBEFIFO timeout interface c90182cffbff media: venus: hfi_venus: Only consider sys_idle_indicator on V1 d52509fdb29c media: go7007: Remove redundant if statement 0294e2475092 media: cec: core: add adap_unconfigured() callback d6610151ae22 media: cec: core: add adap_nb_transmit_canceled() callback 6ced15ff1746 platform/x86: dell-sysman: Fix reference leak 45e3181d7995 iommu/vt-d: Fix to flush cache of PASID directory table d9c47d2bf307 iommu/qcom: Disable and reset context bank before programming a30f26dc3ad9 fsi: aspeed: Reset master errors after CFAM reset d020963638f2 IB/uverbs: Fix an potential error pointer dereference 4dca13c30b9e RDMA/hns: Fix CQ and QP cache affinity 2368ce8cd5ad RDMA/hns: Fix inaccurate error label name in init instance 93c986805f4e RDMA/hns: Fix incorrect post-send with direct wqe of wr-list c48b0b30ac92 RDMA/hns: Fix port active speed 117a1b903baf iommu/sprd: Add missing force_aperture fadc62aa82d2 iommu/mediatek: Fix two IOMMU share pagetable issue f81325a709dd iommu/mediatek: Remove unused "mapping" member from mtk_iommu_data 343ccde5ade7 extcon: cht_wc: add POWER_SUPPLY dependency d3e075a3f099 kernfs: add stub helper for kernfs_generic_poll() 91a05d4c12ce driver core: Call dma_cleanup() on the test_remove path 58a3b87be681 driver core: test_async: fix an error code 636f5b8a6601 dma-buf/sync_file: Fix docs syntax ae867cab6bc9 interconnect: qcom: qcm2290: Enable sync state 7e1476f27751 coresight: tmc: Explicit type conversions to prevent integer overflow ee8f58b40e4a RDMA/irdma: Replace one-element array with flexible-array member af6fd0b3bccf scsi: qedf: Do not touch __user pointer in qedf_dbg_fp_int_cmd_read() directly dd8ce1c9ff49 scsi: qedf: Do not touch __user pointer in qedf_dbg_debug_cmd_read() directly 472f2497a4c8 scsi: qedf: Do not touch __user pointer in qedf_dbg_stop_io_on_error_cmd_read() directly 70518f3aaf5a RDMA/rxe: Fix incomplete state save in rxe_requester 59a4f61feccf RDMA/rxe: Split rxe_run_task() into two subroutines 0ad56bf59dc3 x86/APM: drop the duplicate APM_MINOR_DEV macro 6d209ed70f9c serial: sprd: Fix DMA buffer leak issue 70f7513342f4 serial: sprd: Assign sprd_port after initialized to avoid wrong access 21608d2ba565 iio: accel: adxl313: Fix adxl313_i2c_id[] table 25feffb3fbd5 scsi: qla4xxx: Add length check when parsing nlattrs 1806edae979f scsi: be2iscsi: Add length check when parsing nlattrs 85b8c282d185 scsi: iscsi: Add strlen() check in iscsi_if_set{_host}_param() bb8d101b835a scsi: iscsi: Add length check for nlattr payload 2737d82760ae scsi: iscsi: Rename iscsi_set_param() to iscsi_if_set_param() bdc4f8f68171 scsi: RDMA/srp: Fix residual handling 67b02818e209 usb: phy: mxs: fix getting wrong state with mxs_phy_is_otg_host() 858322c409e0 media: mediatek: vcodec: fix resource leaks in vdec_msg_queue_init() bdc00039fd1b media: mediatek: vcodec: fix potential double free a356b60031d1 media: mediatek: vcodec: Return NULL if no vdec_fb is found b4ee61e5a110 media: amphion: ensure the bitops don't cross boundaries 932d84a8a808 media: amphion: fix UNUSED_VALUE issue reported by coverity 60f6392bdede media: amphion: fix UNINIT issues reported by coverity bddd678fd286 media: amphion: fix REVERSE_INULL issues reported by coverity 3930d62f5d7c media: amphion: fix CHECKED_RETURN issues reported by coverity 9ada33ee83dd media: rkvdec: increase max supported height for H.264 715c0200b480 media: mtk-jpeg: Fix use after free bug due to uncanceled work 62ea218a7e7f media: amphion: add helper function to get id name 745f40a96c7f media: amphion: reinit vpu if reqbufs output 0 6f0d0f5613d7 dt-bindings: extcon: maxim,max77843: restrict connector properties dd0dadb93844 scsi: hisi_sas: Fix normally completed I/O analysed as failed ab0719d7b6e4 scsi: hisi_sas: Fix warnings detected by sparse 79a1a8f83869 RDMA/siw: Fabricate a GID on tun and loopback devices a96892a40fce media: cx24120: Add retval check for cx24120_message_send() 2b6e20ef0585 media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer() 323ee5fc980b media: dib7000p: Fix potential division by zero 90e0ea8e9b26 drivers: usb: smsusb: fix error handling code in smsusb_init_device 92e2dcf9412f iommu: rockchip: Fix directory table address encoding 13ed255248df iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind 25afb3e03bf8 media: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link() aeb79a1778cb media: i2c: tvp5150: check return value of devm_kasprintf() d7d47edf78c9 media: ad5820: Drop unsupported ad5823 from i2c_ and of_device_id tables 79e2cc5c4c10 media: ov5640: fix low resolution image abnormal issue 5643c936d1b8 RDMA/qedr: Remove a duplicate assignment in irdma_query_ah() 8199a46af2ea cgroup/cpuset: Inherit parent's load balance state in v2 590b45e5cd12 pNFS: Fix assignment of xprtdata.cred 4030ace74d8b NFSv4.2: fix handling of COPY ERR_OFFLOAD_NO_REQ fdbc9637bf82 NFS: Guard against READDIR loop when entry names exceed MAXNAMELEN 6d08bd22fa29 NFSD: da_addr_body field missing in some GETDEVICEINFO replies 02a29a2455b0 fs: lockd: avoid possible wrong NULL parameter f27f759f4cd4 jfs: validate max amount of blocks before allocation. b648f5717581 ext4: fix unttached inode after power cut with orphan file feature enabled f17d5efaafba powerpc/iommu: Fix notifiers being shared by PCI and VIO buses e83f5e21089b powerpc/mpc5xxx: Add missing fwnode_handle_put() 4515f1676d8d powerpc/pseries: Fix hcall tracepoints with JUMP_LABEL=n ebbfe48dd15f nfs/blocklayout: Use the passed in gfp flags 4c8568cf4c45 powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT a5b6b008e358 powerpc: Don't include lppaca.h in paca.h 18d51547fe2f NFSv4.2: Fix READ_PLUS size calculations fccdafa51de0 NFSv4.2: Fix up READ_PLUS alignment 5c47974263e8 NFSv4.2: Fix READ_PLUS smatch warnings 886959f425b6 NFSv4.2: Rework scratch handling for READ_PLUS e12e13952b0c wifi: ath10k: Use RMW accessors for changing LNKCTL 811ec8bc68f3 wifi: ath11k: Use RMW accessors for changing LNKCTL 7f4c9c44d1b9 net/mlx5: Use RMW accessors for changing LNKCTL 433330fb1296 drm/radeon: Use RMW accessors for changing LNKCTL a0f0daf60bc1 drm/amdgpu: Use RMW accessors for changing LNKCTL ed6483fac428 powerpc/perf: Convert fsl_emb notifier to state machine callbacks 1d58a9246989 powerpc/fadump: reset dump area size if fadump memory reserve fails ab8094db59e1 nvdimm: Fix dereference after free in register_nvdimm_pmu() 500a6ff9c2a8 nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu() f6f300ecc196 vfio/type1: fix cap_migration information leak aae5a866d397 powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE dd9241fc4b19 clk: imx: composite-8m: fix clock pauses when set_rate would be a no-op cc7e04d7ff92 clk: imx8mp: fix sai4 clock fcaf148b20f0 clk: imx: imx8ulp: update SPLL2 type e1139dea2c02 clk: imx: pllv4: Fix SPLL2 MULT range 402e73f64597 clk: qcom: gcc-sm8450: Use floor ops for SDCC RCGs 6c88c9d9c630 PCI/ASPM: Use RMW accessors for changing LNKCTL 952da7c6e199 PCI: pciehp: Use RMW accessors for changing LNKCTL f2d7da8fafed PCI: Add locking to RMW PCI Express Capability Register accessors 3108f7c78884 PCI: Allow drivers to request exclusive config regions 8a5e87f9e93c pinctrl: mcp23s08: check return value of devm_kasprintf() 8562df72cff2 PCI: Mark NVIDIA T4 GPUs to avoid bus reset f3229c9cb634 PCI: microchip: Correct the DED and SEC interrupt bit offsets 9daefd22756e clk: qcom: gcc-sm6350: Fix gcc_sdcc2_apps_clk_src a1801d14a891 clk: qcom: reset: Use the correct type of sleep/delay based on length a4ff4b54f388 kvm/vfio: ensure kvg instance stays around in kvm_vfio_group_add() fef33ca5e28c kvm/vfio: Prepare for accepting vfio device fd cc16a50d5088 clk: qcom: gcc-sm8250: Fix gcc_sdcc2_apps_clk_src e0f5698757ab ext4: avoid potential data overflow in next_linear_group 772ca4bc1d0d ext4: correct grp validation in ext4_mb_good_group d5fc7d681320 EDAC/igen6: Fix the issue of no error events 8f43c4000cdf clk: qcom: gcc-sc7180: Fix up gcc_sdcc2_apps_clk_src d1a5f22abab4 clk: sunxi-ng: Modify mismatched function name d96799ee3b78 PCI/DOE: Fix destroy_work_on_stack() race 4a43285900cd drivers: clk: keystone: Fix parameter judgment in _of_pll_clk_init() d96da888dcd7 PCI: qcom-ep: Switch MHI bus master clock off during L1SS c53d53006d7f PCI: apple: Initialize pcie->nvecs before use 7618133eda26 clk: rockchip: rk3568: Fix PLL rate setting for 78.75MHz eb613f81d034 clk: qcom: gcc-sc8280xp: Add missing GDSCs 57fc62c50690 dt-bindings: clock: qcom,gcc-sc8280xp: Add missing GDSCs 06d3a7e03c61 clk: qcom: gcc-sc8280xp: Add missing GDSC flags 747848b4afea clk: qcom: gcc-sc8280xp: Add EMAC GDSCs 9cba16beca66 clk: qcom: gpucc-sm6350: Fix clock source names 6ace98cb617b clk: qcom: gpucc-sm6350: Introduce index-based clk lookup 74a1194cce60 ipmi:ssif: Fix a memory leak when scanning for an adapter 2e7d90a81b9c ipmi:ssif: Add check for kstrdup abbd28d04c36 ALSA: ac97: Fix possible error value of *rac97 53996463f8c3 of: unittest: Fix overlay type in apply/revert check 3fb210cd521c of: overlay: Call of_changeset_init() early b13b0c84a4af ASoC: SOF: amd: clear dsp to host interrupt status c4b06324fc44 md: raid0: account for split bio in iostat accounting cc54fa43de67 md/raid0: Fix performance regression for large sequential writes cd1dd83888d7 md/raid0: Factor out helper for mapping and submitting a bio c227aa141660 md: add error_handlers for raid0 and linear bc82cd1e7ff2 firmware: cs_dsp: Fix new control name check 711fb9260620 md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid() ac9e103f282a md/raid5-cache: fix a deadlock in r5l_exit_log() 26bf790b8e99 bus: ti-sysc: Fix cast to enum warning 5abfee5e4076 arm64: dts: qcom: sc8280xp-x13s: Unreserve NC pins b386c3e16956 arm64: dts: qcom: msm8996: Fix dsi1 interrupts c6035ee015b9 arm64: dts: qcom: msm8998: Add missing power domain to MMSS SMMU cab4cdb2a4bd arm64: dts: qcom: msm8998: Drop bus clock reference from MMSS SMMU 67b4726cb87e arm64: dts: qcom: apq8016-sbc: Fix ov5640 regulator supply names 867aa88c9efa drm/mediatek: Fix potential memory leak if vmap() fail 1e47d1ac20e3 ARM: dts: qcom: ipq4019: correct SDHCI XO clock 4d6a25792fc1 drm/mediatek: Remove freeing not dynamic allocated memory 635051576f0e bus: ti-sysc: Fix build warning for 64-bit build b625a6eaf2bf drm/mediatek: dp: Add missing error checks in mtk_dp_parse_capabilities 0c323430e470 io_uring: fix drain stalls by invalid SQE 9183c4fe9141 block/mq-deadline: use correct way to throttling write requests 9ca08adb75fb audit: fix possible soft lockup in __audit_inode_child() 607eda339b60 drm/msm/a2xx: Call adreno_gpu_init() earlier f27dff881f0b drm/amd/pm: fix variable dereferenced issue in amdgpu_device_attr_create() d41ceafe3d24 smackfs: Prevent underflow in smk_set_cipso() d1994bb5947c drm/msm/dpu: fix the irq index in dpu_encoder_phys_wb_wait_for_commit_done bd3a6b6d5dd8 firmware: meson_sm: fix to avoid potential NULL pointer dereference 2965015006ef drm/msm/mdp5: Don't leak some plane state 0cd481c27b03 soc: qcom: smem: Fix incompatible types in comparison 3b1f1999a300 drm: xlnx: zynqmp_dpsub: Add missing check for dma_set_mask 9b372d2fdc44 ima: Remove deprecated IMA_TRUSTED_KEYRING Kconfig 92eaa1840301 drm/panel: simple: Add missing connector type and pixel format for AUO T215HVN01 4174f889c4c1 drm/repaper: Reduce temporary buffer size in repaper_fb_dirty() d544c89bb1cd drm/armada: Fix off-by-one error in armada_overlay_get_property() 0ef736fec614 ARM: dts: BCM53573: Fix Tenda AC9 switch CPU port 976eca4cbd37 arm64: dts: qcom: sm8150: Fix the I2C7 interrupt 43cc228099c5 of: unittest: fix null pointer dereferencing in of_unittest_find_node_by_name() 4ab834ff9fbf drm/tegra: dpaux: Fix incorrect return value of platform_get_irq 508383dc278c drm/msm: Update dev core dump to not print backwards f9b9c6b0d451 md/md-bitmap: hold 'reconfig_mutex' in backlog_store() e970bc3828b7 md/md-bitmap: remove unnecessary local variable in backlog_store() 3829cb3caeda md/raid10: use dereference_rdev_and_rrdev() to get devices 27acd8c13183 md/raid10: factor out dereference_rdev_and_rrdev() 097f30f0cef8 md: restore 'noio_flag' for the last mddev_resume() 835cbfebc1c5 md: Change active_io to percpu 3db392257008 md: Factor out is_md_suspended helper 8dcc23191a6d drm/amdgpu: Update min() to min_t() in 'amdgpu_info_ioctl' 13f5c43e0921 arm64: dts: qcom: msm8996-gemini: fix touchscreen VIO supply 5ccd294df265 arm64: dts: qcom: sdm845: Fix the min frequency of "ice_core_clk" 4aaced381c69 arm64: dts: qcom: sdm845: Add missing RPMh power domain to GCC a80621bb23dc ARM: dts: BCM53573: Fix Ethernet info for Luxul devices b9fa4e10b5cf drm: adv7511: Fix low refresh rate register for ADV7533/5 1a7314734743 ARM: dts: samsung: s5pv210-smdkv210: correct ethernet reg addresses (split) 9a91a5466ab1 ARM: dts: s5pv210: add dummy 5V regulator for backlight on SMDKv210 4e184a73203c ARM: dts: samsung: s3c6410-mini6410: correct ethernet reg addresses (split) 075ee661ba67 drm/bridge: anx7625: Use common macros for HDCP capabilities ba1ca2cf4d00 drm/bridge: anx7625: Use common macros for DP power sequencing commands d309b170ea70 x86/mm: Fix PAT bit missing from page protection modify mask 00c0b2825bb5 block: don't allow enabling a cache on devices that don't support it e5e0ec8ff160 block: cleanup queue_wc_store 7db90dd1c5a4 drm/etnaviv: fix dumping of active MMU context 800bf8a2226e arm64: tegra: Fix HSUART for Smaug ee5e1d6480ef arm64: dts: qcom: pmi8994: Add missing OVP interrupt 31fe89ccf5a0 arm64: dts: qcom: pm660l: Add missing short interrupt cd1ba241d21e arm64: dts: qcom: pm6150l: Add missing short interrupt 6fd913f0f63f arm64: dts: qcom: sm8250-sony-xperia: correct GPIO keys wakeup again 0f0e6963705a arm64: tegra: Fix HSUART for Jetson AGX Orin f5ff6897094f ARM: dts: BCM53573: Use updated "spi-gpio" binding properties ab5154ae26c4 ARM: dts: BCM53573: Add cells sizes to PCIe node ee1d740374aa ARM: dts: BCM53573: Drop nonexistent #usb-cells fd28ce30b525 drm/amdgpu: avoid integer overflow warning in amdgpu_device_resize_fb_bar() 1f3b03863ef5 firmware: ti_sci: Use system_state to determine polling 0765a80c160d ARM: dts: stm32: Add missing detach mailbox for DHCOM SoM e3c7b7ce7cd6 ARM: dts: stm32: Update to generic ADC channel binding on DHSOM systems 9d77a7fc5d04 ARM: dts: stm32: Add missing detach mailbox for Odyssey SoM c0929f2bbd68 ARM: dts: stm32: YAML validation fails for Odyssey Boards aa72079a1952 ARM: dts: stm32: Add missing detach mailbox for emtrion emSBC-Argon 0746cab4768d ARM: dts: stm32: adopt generic iio bindings for adc channels on emstamp-argon a5274a79ef3a ARM: dts: stm32: YAML validation fails for Argon Boards e62c091b6dfa ARM: dts: stm32: Rename mdio0 to mdio e8d6e54daf1a arm64: dts: qcom: sm8250: Mark PCIe hosts as DMA coherent c755b194d793 arm64: dts: qcom: pmk8350: fix ADC-TM compatible string 5aa1969ce7c4 arm64: dts: qcom: pmr735b: fix thermal zone name de4688dcc0f6 arm64: dts: qcom: pm8350b: fix thermal zone name 0f52060fa1db arm64: dts: qcom: pm8350: fix thermal zone name 8fd3533f4bce arm64: dts: qcom: sm8350: Use proper CPU compatibles db336dcb0127 arm64: dts: qcom: sm8350: Add missing LMH interrupts to cpufreq 0c32fba73549 arm64: dts: qcom: sm8350: Fix CPU idle state residency times c97633eaf571 arm64: dts: qcom: sdm845-tama: Set serial indices and stdout-path 8622340505dc arm64: dts: qcom: msm8996: Add missing interrupt to the USB2 controller 82c3d3490b6b arm64: dts: qcom: sc8280xp: Add missing SCM interconnect e5bf98ceac1e arm64: dts: qcom: sc8280xp-crd: Correct vreg_misc_3p3 GPIO 4c7477d0daaa arm64: dts: qcom: sm8250-edo: Rectify gpio-keys 7852d207882c arm64: dts: qcom: sm8250-edo: Add GPIO line names for PMIC GPIOs 4a36d16cdf3c arm64: dts: qcom: sm8250-edo: Add gpio line names for TLMM 537346ff2a60 arm64: dts: qcom: msm8916-l8150: correct light sensor VDDIO supply d244c92988ab arm64: dts: qcom: sm8250: correct dynamic power coefficients e2040c110138 arm64: dts: qcom: sm6350: Fix ZAP region ba7ff6085b80 soc: qcom: ocmem: Fix NUM_PORTS & NUM_MACROS macros fb4a774a6627 soc: qcom: ocmem: Add OCMEM hardware version print 7bdeb7679f4c ASoC: stac9766: fix build errors with REGMAP_AC97 c2c6dfc04237 drm/hyperv: Fix a compilation issue because of not including screen_info.h a9fa161b8356 drm/amd/display: Do not set drr on pipe commit 3027e200dd58 quota: fix dqput() to follow the guarantees dquot_srcu should provide d57af071cf40 quota: add new helper dquot_active() fdcc50d506f3 quota: rename dquot_active() to inode_quota_active() 622789ebe197 quota: factor out dquot_write_dquot() 25193037e083 ASoC: cs43130: Fix numerator/denominator mixup aa449fa41e10 drm/bridge: tc358764: Fix debug print parameter order 45107f9ca863 netrom: Deny concurrent connect(). a1e820fc7808 net/sched: sch_hfsc: Ensure inner classes have fsc curve 85da5ec0681e sfc: Check firmware supports Ethernet PTP filter ea701e0eba7e cteonxt2-pf: Fix backpressure config for multiple PFC priorities to work simultaneously 1b7f266e0219 octeontx2-pf: Fix PFC TX scheduler free 80de42d9af97 octeontx2-pf: Refactor schedular queue alloc/free calls 23a7b872898b hwmon: (tmp513) Fix the channel number in tmp51x_is_visible() 8b2fb4b671b3 mlxsw: core_hwmon: Adjust module label names based on MTCAP sensor counter 6406a95c4a5e mlxsw: i2c: Limit single transaction buffer size 2fc240094031 mlxsw: i2c: Fix chunk size setting in output mailbox buffer ec9538da6ce4 net: arcnet: Do not call kfree_skb() under local_irq_disable() cb09afe905cb ice: avoid executing commands on other ports when driving sync 90e7778660c9 wifi: ath9k: use IS_ERR() with debugfs_create_dir() 4a8fadcf3748 arm64: mm: use ptep_clear() instead of pte_clear() in clear_flush() a33ae132eec2 Bluetooth: btusb: Do not call kfree_skb() under spin_lock_irqsave() 7e7197e4d6a1 wifi: mwifiex: avoid possible NULL skb pointer dereference 7930fa4ca871 mac80211: make ieee80211_tx_info padding explicit 4381d6083254 wifi: nl80211/cfg80211: add forgotten nla_policy for BSS color attribute 4c340bfddce6 wifi: ath9k: protect WMI command response buffer replacement with a lock 8ba31f946a6d wifi: ath9k: fix races between ath9k_wmi_cmd and ath9k_wmi_ctrl_rx 7984c381bbc1 samples/bpf: fix broken map lookup probe c813db76bc15 samples/bpf: fix bio latency check with tracepoint ef67f3a959a7 ARM: dts: Add .dts files missing from the build cde525d61178 wifi: mwifiex: Fix missed return in oob checks failed path 84081b4baafb wifi: mwifiex: fix memory leak in mwifiex_histogram_read() 9257a1d6f272 net: annotate data-races around sk->sk_lingertime 844d60cc5efc fs: ocfs2: namei: check return value of ocfs2_add_entry() a485a4bd8238 lwt: Check LWTUNNEL_XMIT_CONTINUE strictly 065d5f17096e lwt: Fix return values of BPF xmit ops 0159a21b9d8e hwrng: iproc-rng200 - Implement suspend and resume calls 92651ce45ba1 crypto: caam - fix unchecked return value error 841d2fffd09f ice: ice_aq_check_events: fix off-by-one check when filling buffer 0f50641222f5 net-memcg: Fix scope of sockmem pressure indicators 8d61adfb5918 selftests/bpf: Clean up fmod_ret in bench_rename test script eafa3465c8d9 selftests/bpf: Fix repeat option when kfunc_call verification fails d6702008fc9c net: tcp: fix unexcepted socket die when snd_wnd is 0 81d8e9f59df6 Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() bd39b5524047 Bluetooth: hci_sync: Don't double print name in add/remove adv_monitor 94617b736c25 Bluetooth: Fix potential use-after-free when clear keys 9246d9310cd6 Bluetooth: nokia: fix value check in nokia_bluetooth_serdev_probe() c4cb61c5f976 crypto: api - Use work queue in crypto_destroy_instance 501f77cfce8a crypto: stm32 - Properly handle pm_runtime_get failing 6fc09c8d765e kbuild: rust_is_available: fix confusion when a version appears in the path 4f8c55ae5d58 kbuild: rust_is_available: add check for `bindgen` invocation bb15fb4e497e kbuild: rust_is_available: fix version check when CC has multiple arguments 6c7182b9c87e kbuild: rust_is_available: remove -v option 90978b2ff422 selftests/bpf: fix static assert compilation issue for test_cls_*.c c015029dfc89 wifi: mwifiex: fix error recovery in PCIE buffer descriptor management 3975e21d4d01 wifi: mwifiex: Fix OOB and integer underflow when rx packets 49b6db89ab28 wifi: mt76: mt7915: fix power-limits while chan_switch 2dd5c7f4200a can: gs_usb: gs_usb_receive_bulk_callback(): count RX overflow errors also in case of OOM ce60bfc24c88 spi: tegra20-sflash: fix to check return value of platform_get_irq() in tegra_sflash_probe() f5f7aa2b6b8f wifi: mt76: testmode: add nla_policy for MT76_TM_ATTR_TX_LENGTH c0ce0fb76610 bpf: reject unhashed sockets in bpf_sk_assign 99331d7c6ee2 udp: re-score reuseport groups when connected sockets are present 328b85e7b14f wifi: mt76: mt7921: fix non-PSC channel scan fail 6bf4ccafb356 wifi: rtw89: debug: Fix error handling in rtw89_debug_priv_btc_manual_set() 39a6b4bbc573 regmap: rbtree: Use alloc_flags for memory allocations 684431894e06 hwrng: pic32 - use devm_clk_get_enabled 79a8ea5bf421 hwrng: nomadik - keep clock enabled while hwrng is registered 73d97508ab11 tcp: tcp_enter_quickack_mode() should be static 01964c630824 crypto: qat - change value of default idle filter 912310dd841b bpf: Fix an error in verifying a field in a union 780f072f4fad bpf: Clear the probe_addr for uprobe 0cfbadb15351 libbpf: Fix realloc API handling in zero-sized edge cases fc7ed36a31b1 bpftool: Use a local bpf_perf_event_value to fix accessing its fields 0b20dc1edd88 bpftool: Use a local copy of BPF_LINK_TYPE_PERF_EVENT in pid_iter.bpf.c 840c64d96e39 bpftool: Define a local bpf_perf_link to fix accessing its fields 4d5f00b2fa2c bpftool: use a local copy of perf_event to fix accessing :: Bpf_cookie 010c6a02e6e1 selftests/bpf: Fix bpf_nf failure upon test rerun 6f2b84248bab cpufreq: powernow-k8: Use related_cpus instead of cpus in driver.exit() 91f76271ec43 x86/efistub: Fix PCI ROM preservation in mixed mode fcf78a17bbb9 cpufreq: amd-pstate-ut: Fix kernel panic when loading the driver 14920fb907f0 cpufreq: amd-pstate-ut: Remove module parameter access 7da6250d2967 thermal/of: Fix potential uninitialized value access 7c7093256806 ACPI: x86: s2idle: Fix a logic error parsing AMD constraints table a99f32b81ca1 ACPI: x86: s2idle: Post-increment variables when getting constraints 8ee6d04ef24b irqchip/loongson-eiointc: Fix return value checking of eiointc_index 14e37e08b4e1 s390/paes: fix PKEY_TYPE_EP11_AES handling for secure keyblobs f326e37a210e s390/pkey: fix PKEY_TYPE_EP11_AES handling for sysfs attributes f98ea9abc1f7 s390/pkey: fix PKEY_TYPE_EP11_AES handling in PKEY_GENSECK2 IOCTL 87d452a076d1 s390/pkey: fix/harmonize internal keyblob headers 7d31730c5d81 selftests/futex: Order calls to futex_lock_pi 048d1a8b9da8 perf/imx_ddr: don't enable counter0 if none of 4 counters are used 5fce29ab20cb sched/rt: Fix sysctl_sched_rr_timeslice intial value dfadde169774 arm64/fpsimd: Only provide the length to cpufeature for xCR registers 8efd0420290e arm64/sme: Don't use streaming mode to probe the maximum SME VL 1d9a735d4e45 x86/decompressor: Don't rely on upper 32 bits of GPRs being preserved be361e5ec4b2 sched/psi: Select KERNFS as needed 287aeeb731e9 arm64/ptrace: Clean up error handling path in sve_set_common() 9d8f66d6de83 selftests/resctrl: Close perf value read fd on errors f046a88cbadd selftests/resctrl: Unmount resctrl FS if child fails to run benchmark d4b1f43944c5 selftests/resctrl: Don't leak buffer in fill_cache() 1051a1c5dd26 selftests/resctrl: Add resctrl.h into build deps 5d343b49078d OPP: Fix passing 0 to PTR_ERR in _opp_attach_genpd() e0322a255a22 refscale: Fix uninitalized use of wait_queue_head_t 085fe4323841 ARM: ptrace: Restore syscall skipping for tracers 916ca8192201 ARM: ptrace: Restore syscall restart tracing ed134f284b4e vfs, security: Fix automount superblock LSM init problem, preventing NFS sb sharing 1cdf51b4e5ef selftests/harness: Actually report SKIP for signal tests c13e6edbad1a tmpfs: verify {g,u}id mount options correctly 254c396da3a2 iomap: Remove large folio handling in iomap_invalidate_folio() b553ac4894e7 fs: Fix error checking for d_hash_and_lookup() e12214c7ad13 eventfd: prevent underflow for eventfd semaphores 9720f894286e reiserfs: Check the return value from __getblk() 0c7e6ff75e6c tools/resolve_btfids: Fix setting HOSTCFLAGS 1ad863e91af8 tools/resolve_btfids: Pass HOSTCFLAGS as EXTRA_CFLAGS to prepare targets a2a9f5bcccab tools/resolve_btfids: Tidy HOST_OVERRIDES b3f1d78c672e tools/resolve_btfids: Compile resolve_btfids as host program 833a654b510b tools/resolve_btfids: Alter how HOSTCC is forced 2457021a4f07 tools/resolve_btfids: Install subcmd headers d35187340a8a tools/resolve_btfids: Use pkg-config to locate libelf 05026e944bd2 tools lib subcmd: Add dependency test to install_headers 424fd5693246 tools lib subcmd: Make install_headers clearer a07388d1a773 tools lib subcmd: Add install target b9c54fd37668 Revert "net: macsec: preserve ingress frame ordering" 786e09ae59f0 Revert "PCI: tegra194: Enable support for 256 Byte payload" f725ae7f0e2b Input: i8042 - add quirk for TUXEDO Gemini 17 Gen1/Clevo PD70PN b990ac56447c udf: Handle error when adding extent to a file 6ac8f2c8362a udf: Check consistency of Space Bitmap Descriptor 7ac1467f9472 drm/amd/display: ensure async flips are only accepted for fast updates 8f965b5b525d net: Avoid address overwrite in kernel_connect 8c737d950c2b KVM: x86/mmu: Add "never" option to allow sticky disabling of nx_huge_pages 45e3dfbf0e0c KVM: x86/mmu: Use kstrtobool() instead of strtobool() 181831df9de8 tpm: Enable hwrng only for Pluton on AMD CPUs 9c8dab18f830 crypto: rsa-pkcs1pad - Use helper to set reqsize 63f1117db590 cpufreq: intel_pstate: set stale CPU frequency to minimum c50fdd533448 of: property: Simplify of_link_to_phandle() 8f647ac91a22 platform/mellanox: Fix mlxbf-tmfifo not handling all virtio CONSOLE notifications 10f358cd4b0e tracing: Introduce pipe_cpumask to avoid race on trace_pipes 41103f7f688a net: sfp: handle 100G/25G active optical cables in sfp_parse_support f24681b8162b ALSA: seq: oss: Fix racy open/close of MIDI devices ab5c5c10d066 LoongArch: Fix the write_fcsr() macro 9920a52362a0 LoongArch: Let pmd_present() return true when splitting pmd 790587097c01 scsi: lpfc: Fix incorrect big endian type assignment in bsg loopback path 1a7f80f33a59 scsi: storvsc: Always set no_report_opcodes 7d1ac3c2eb70 scsi: aacraid: Reply queue mapping to CPUs based on IRQ affinity dcfd75bca8cf sctp: handle invalid error codes without calling BUG() fbd3ae6997fb cifs: fix max_credits implementation 8a424afa08c5 cifs: fix sockaddr comparison in iface_cmp ea13eff14ef2 bnx2x: fix page fault following EEH recovery 179b9b062fe8 netlabel: fix shift wrapping bug in netlbl_catmap_setlong() 78ef22febd68 wifi: mac80211: Use active_links instead of valid_links in Tx 41b446e4904a wifi: cfg80211: remove links only on AP 5251c835324b drm/amdgpu: Match against exact bootloader status f20bee49dc2a net: hns3: restore user pause configure when disable autoneg c61d10461279 scsi: qedi: Fix potential deadlock on &qedi_percpu->p_work_lock 24d9cc933597 scsi: lpfc: Remove reftag check in DIF paths c70b9758eebe platform/x86/amd/pmf: Fix unsigned comparison with less than zero acf4ec3b4244 idmaengine: make FSL_EDMA and INTEL_IDMA64 depends on HAS_IOMEM 59c4b9a2caf4 powerpc/powermac: Use early_* IO variants in via_calibrate_decr() 54d3fba7d8c5 wifi: brcmfmac: Fix field-spanning write in brcmf_scan_params_v2_to_v1() 71f5a7f1745c net: usb: qmi_wwan: add Quectel EM05GV2 a2b5a9654a1d net: annotate data-races around sk->sk_{rcv|snd}timeo 94515e9aa84c net: dsa: microchip: KSZ9477 register regmap alignment to 32 bit boundaries 848477e08391 Revert "wifi: ath6k: silence false positive -Wno-dangling-pointer warning on GCC 12" 51edd7383b1e vmbus_testing: fix wrong python syntax for integer value comparison 98f933716a52 clk: fixed-mmio: make COMMON_CLK_FIXED_MMIO depend on HAS_IOMEM 473a55cfc131 kprobes: Prohibit probing on CFI preamble symbol 896e9e57784c security: keys: perform capable check only on privileged operations 0ffed24af577 staging: fbtft: ili9341: use macro FBTFT_REGISTER_SPI_DRIVER 55954eea708f ALSA: usb-audio: Update for native DSD support quirks d676d02be8e2 ata: pata_arasan_cf: Use dev_err_probe() instead dev_err() in data_xfer() fbf4048d8fba ovl: Always reevaluate the file signature for IMA ae1cb9656ef4 drm/amd/display: Exit idle optimizations before attempt to access PHY faa77cf5f28f drm/amd/display: Guard DCN31 PHYD32CLK logic against chip family d7b1aa3e2098 drm/amd/smu: use AverageGfxclkFrequency* to replace previous GFX Curr Clock 7c2d13fb9bab platform/x86: huawei-wmi: Silence ambient light sensor 5c5628287bac platform/x86: asus-wmi: Fix setting RGB mode on some TUF laptops aeee50c15291 platform/x86: think-lmi: Use kfree_sensitive instead of kfree dea41980d793 platform/x86/intel/hid: Add HP Dragonfly G2 to VGBS DMI quirks 7d0f7924ef61 platform/x86: intel: hid: Always call BTNL ACPI method eb54ad1ed620 ALSA: usb-audio: Add quirk for Microsoft Modern Wireless Headset 9c1263320163 ASoC: atmel: Fix the 8K sample parameter in I2SC master 2e780a9f4ac1 ASoC: rt711-sdca: fix for JD event handling in ClockStop Mode0 a1fbf45a24d3 ASoC: rt711: fix for JD event handling in ClockStop Mode0 82e17577b66f ASoc: codecs: ES8316: Fix DMIC config 10999df817cb ASoC: rt5682-sdw: fix for JD event handling in ClockStop Mode0 952af5cfd5b4 fs/nls: make load_nls() take a const parameter d28f76be7952 s390/dasd: fix hanging device after request requeue d563f679a268 s390/dasd: use correct number of retries for ERP requests a41f2f6aff5e m68k: Fix invalid .section syntax 328fcde050ff ethernet: atheros: fix return value check in atl1c_tso_csum() 0f7b43a5776b ASoC: nau8821: Add DMI quirk mechanism for active-high jack-detect eb746c4750a8 ASoC: da7219: Check for failure reading AAD IRQ events 3c59ad8d6e8e ASoC: da7219: Flush pending AAD IRQ when suspending 330d900620df ksmbd: fix out of bounds in init_smb2_rsp_hdr() 99a2426b135e ksmbd: no response from compound read becb5191d1d5 ksmbd: validate session id and tree id in compound request 9776024ee06b ksmbd: fix out of bounds in smb3_decrypt_req() 513eac8b8530 9p: virtio: make sure 'offs' is initialized in zc_request 05d88512e833 9p: virtio: fix unlikely null pointer deref in handle_rerror 72c90ebb2dc5 media: pci: cx23885: fix error handling for cx23885 ATSC boards eb3c2b3519bf media: pulse8-cec: handle possible ping error 0b6e7170ccdf media: amphion: use dev_err_probe 026e918b3670 phy: qcom-snps-femto-v2: use qcom_snps_hsphy_suspend/resume error code 2981ff271d52 Revert "MIPS: unhide PATA_PLATFORM" b60802573357 media: uapi: HEVC: Add num_delta_pocs_of_ref_rps_idx field 36148a9b144c powerpc/boot: Disable power10 features after BOOTAFLAGS assignment 4e005f5dd5b0 ALSA: hda/realtek: Enable 4 amplifiers instead of 2 on a HP platform f4bd9a43152e ARM: dts: imx: Set default tuning step for imx7d usdhc 7f483ce4699a Revert "Revert drm/amd/display: Enable Freesync Video Mode by default" 6ab081571f6a scsi: ufs: Try harder to change the power mode 9fc3adc6d0fe Partially revert "drm/amd/display: Fix possible underflow for displays with large vblank" 918639847212 Revert "bridge: Add extack warning when enabling STP in netns." Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.1.inc | 38 +++++++++++++++---- .../linux/linux-yocto-rt_6.1.bb | 6 +-- .../linux/linux-yocto-tiny_6.1.bb | 6 +-- meta/recipes-kernel/linux/linux-yocto_6.1.bb | 28 +++++++------- 4 files changed, 50 insertions(+), 28 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc index 52523c6709..94a312b311 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2023-09-08 09:54:36.039631 for version 6.1.52 +# Generated at 2023-09-15 17:26:47.557521+00:00 for version 6.1.53 python check_kernel_cve_status_version() { - this_version = "6.1.52" + this_version = "6.1.53" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -4518,9 +4518,9 @@ CVE_STATUS[CVE-2022-4382] = "cpe-stable-backport: Backported in 6.1.8" CVE_STATUS[CVE-2022-43945] = "fixed-version: Fixed from version 6.1rc1" -# CVE-2022-44032 has no known resolution +# CVE-2022-44032 needs backporting (fixed from 6.4rc1) -# CVE-2022-44033 has no known resolution +# CVE-2022-44033 needs backporting (fixed from 6.4rc1) # CVE-2022-44034 has no known resolution @@ -4532,13 +4532,13 @@ CVE_STATUS[CVE-2022-45869] = "fixed-version: Fixed from version 6.1rc7" # CVE-2022-45885 has no known resolution -# CVE-2022-45886 has no known resolution +CVE_STATUS[CVE-2022-45886] = "cpe-stable-backport: Backported in 6.1.33" -# CVE-2022-45887 has no known resolution +CVE_STATUS[CVE-2022-45887] = "cpe-stable-backport: Backported in 6.1.33" # CVE-2022-45888 needs backporting (fixed from 6.2rc1) -# CVE-2022-45919 has no known resolution +CVE_STATUS[CVE-2022-45919] = "cpe-stable-backport: Backported in 6.1.33" CVE_STATUS[CVE-2022-45934] = "fixed-version: Fixed from version 6.1" @@ -4786,7 +4786,7 @@ CVE_STATUS[CVE-2023-23559] = "cpe-stable-backport: Backported in 6.1.9" CVE_STATUS[CVE-2023-23586] = "fixed-version: Fixed from version 5.12rc1" -# CVE-2023-2430 needs backporting (fixed from 6.2rc5) +CVE_STATUS[CVE-2023-2430] = "cpe-stable-backport: Backported in 6.1.50" CVE_STATUS[CVE-2023-2483] = "cpe-stable-backport: Backported in 6.1.22" @@ -4794,6 +4794,8 @@ CVE_STATUS[CVE-2023-25012] = "cpe-stable-backport: Backported in 6.1.16" CVE_STATUS[CVE-2023-2513] = "fixed-version: Fixed from version 6.0rc1" +# CVE-2023-25775 has no known resolution + CVE_STATUS[CVE-2023-2598] = "fixed-version: only affects 6.3rc1 onwards" # CVE-2023-26242 has no known resolution @@ -4972,6 +4974,8 @@ CVE_STATUS[CVE-2023-3773] = "cpe-stable-backport: Backported in 6.1.47" CVE_STATUS[CVE-2023-3776] = "cpe-stable-backport: Backported in 6.1.40" +CVE_STATUS[CVE-2023-3777] = "cpe-stable-backport: Backported in 6.1.42" + CVE_STATUS[CVE-2023-3812] = "fixed-version: Fixed from version 6.1rc4" CVE_STATUS[CVE-2023-38409] = "cpe-stable-backport: Backported in 6.1.25" @@ -4996,6 +5000,8 @@ CVE_STATUS[CVE-2023-4004] = "cpe-stable-backport: Backported in 6.1.42" # CVE-2023-4010 has no known resolution +CVE_STATUS[CVE-2023-4015] = "cpe-stable-backport: Backported in 6.1.43" + CVE_STATUS[CVE-2023-40283] = "cpe-stable-backport: Backported in 6.1.45" CVE_STATUS[CVE-2023-4128] = "cpe-stable-backport: Backported in 6.1.45" @@ -5012,6 +5018,12 @@ CVE_STATUS[CVE-2023-4155] = "cpe-stable-backport: Backported in 6.1.46" CVE_STATUS[CVE-2023-4194] = "fixed-version: only affects 6.3rc1 onwards" +CVE_STATUS[CVE-2023-4206] = "cpe-stable-backport: Backported in 6.1.45" + +CVE_STATUS[CVE-2023-4207] = "cpe-stable-backport: Backported in 6.1.45" + +CVE_STATUS[CVE-2023-4208] = "cpe-stable-backport: Backported in 6.1.45" + CVE_STATUS[CVE-2023-4273] = "cpe-stable-backport: Backported in 6.1.45" CVE_STATUS[CVE-2023-4385] = "fixed-version: Fixed from version 5.19rc1" @@ -5024,3 +5036,13 @@ CVE_STATUS[CVE-2023-4394] = "fixed-version: Fixed from version 6.0rc3" CVE_STATUS[CVE-2023-4459] = "fixed-version: Fixed from version 5.18" +# CVE-2023-4563 needs backporting (fixed from 6.5rc6) + +CVE_STATUS[CVE-2023-4569] = "cpe-stable-backport: Backported in 6.1.47" + +CVE_STATUS[CVE-2023-4611] = "fixed-version: only affects 6.4rc1 onwards" + +# CVE-2023-4622 needs backporting (fixed from 6.5rc1) + +# CVE-2023-4623 has no known resolution + diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb index 05e0b69331..4168a936bb 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "7327e7ab3b5508182380405a51f2657f5bf669b4" -SRCREV_meta ?= "9e389e7f44a22bc637328f15e106f6d60631780e" +SRCREV_machine ?= "af2faa46d440ee11170ba8233eec0f818988f256" +SRCREV_meta ?= "59e0fce122a66f7dcaf7a2a8294d81c4b78197dc" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.1.52" +LINUX_VERSION ?= "6.1.53" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb index 942aa48c02..80a3f06eee 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.1.inc -LINUX_VERSION ?= "6.1.52" +LINUX_VERSION ?= "6.1.53" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "b3879adf00e338e66e92431a434fa2549ac88b83" -SRCREV_meta ?= "9e389e7f44a22bc637328f15e106f6d60631780e" +SRCREV_machine ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" +SRCREV_meta ?= "59e0fce122a66f7dcaf7a2a8294d81c4b78197dc" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.1.bb b/meta/recipes-kernel/linux/linux-yocto_6.1.bb index 000317379f..61f3e532fb 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.1.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.1/standard/base" KBRANCH:qemuloongarch64 ?= "v6.1/standard/base" KBRANCH:qemumips64 ?= "v6.1/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "3028542fe5ece9dd32c8e3b9b14b2c9f4c9cafac" -SRCREV_machine:qemuarm64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" -SRCREV_machine:qemuloongarch64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" -SRCREV_machine:qemumips ?= "33c0b5a0c1af6abb4dee11ffa5ece66ffd01d3c8" -SRCREV_machine:qemuppc ?= "b3879adf00e338e66e92431a434fa2549ac88b83" -SRCREV_machine:qemuriscv64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" -SRCREV_machine:qemuriscv32 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" -SRCREV_machine:qemux86 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" -SRCREV_machine:qemux86-64 ?= "b3879adf00e338e66e92431a434fa2549ac88b83" -SRCREV_machine:qemumips64 ?= "ee418f38dbc9794b7976ad11fd74f5a3490c7c5e" -SRCREV_machine ?= "b3879adf00e338e66e92431a434fa2549ac88b83" -SRCREV_meta ?= "9e389e7f44a22bc637328f15e106f6d60631780e" +SRCREV_machine:qemuarm ?= "b11af7d1c8b4337347747977173c878e7672eb15" +SRCREV_machine:qemuarm64 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" +SRCREV_machine:qemuloongarch64 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" +SRCREV_machine:qemumips ?= "81af09853cc4318fad59e780c830c9cc8ccdc898" +SRCREV_machine:qemuppc ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" +SRCREV_machine:qemuriscv64 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" +SRCREV_machine:qemuriscv32 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" +SRCREV_machine:qemux86 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" +SRCREV_machine:qemux86-64 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" +SRCREV_machine:qemumips64 ?= "6ec5ef2f6fa90a5823e131805845738453bc553a" +SRCREV_machine ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" +SRCREV_meta ?= "59e0fce122a66f7dcaf7a2a8294d81c4b78197dc" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "59b13c2b647e464dd85622c89d7f16c15d681e96" +SRCREV_machine:class-devupstream ?= "09045dae0d902f9f78901a26c7ff1714976a38f9" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.1/base" @@ -45,7 +45,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA SRC_URI += "file://0001-perf-cpumap-Make-counter-as-unsigned-ints.patch" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.1.52" +LINUX_VERSION ?= "6.1.53" PV = "${LINUX_VERSION}+git" From patchwork Fri Sep 29 20:04:49 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 31402 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A1775E728EE for ; Fri, 29 Sep 2023 20:05:05 +0000 (UTC) Received: from mail-qk1-f171.google.com (mail-qk1-f171.google.com [209.85.222.171]) by mx.groups.io with SMTP id smtpd.web10.27817.1696017903635221080 for ; Fri, 29 Sep 2023 13:05:03 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=Nm2LQUWD; spf=pass (domain: gmail.com, ip: 209.85.222.171, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f171.google.com with SMTP id af79cd13be357-77063481352so45755585a.1 for ; Fri, 29 Sep 2023 13:05:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1696017902; x=1696622702; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=Ioyi9nuIo0Rt/z5SqAlgJK1pY8qmVfrKJS8i+6E7vFc=; b=Nm2LQUWDHfaesHKCKeFPVaQPF2pBE9/JzK4Ds1xWpwJnHU5pfCQ9rz+8ytW9gQcFFV 5F3hCQGQEutpoUPLmk3ZAcY0b+gugOwqPE0rOxVCrr+28Ztv8OLSXXH629mYlS8i2fKP bbHspFefbmK6yxm2LGub43qoSB3ZijsnFxA4YBQX5Aw++4stHO2L+7Uv8gJcoI57ZzrI OY1Joat47c8xxiowYNOfJimLLc8pLwQ2L3RR57tJYpTxTx9KlR+2xmbkNnu8Xn5aZpfB Gji1HXAoow9ZpTpTyWPQlkvUiMpeTEiwdqvMFF5NNZbgTTbPY6gw9jXmgE+ON5ac7KXi qEYg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696017902; x=1696622702; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Ioyi9nuIo0Rt/z5SqAlgJK1pY8qmVfrKJS8i+6E7vFc=; b=UfjHHpcrFEM323iUswxYhkvvjItnTZK3XzB7u9DvEvCKeUiNdjs4Ez4HTmjW1bFBFR WMo/VWreBEGT6E7VNpQkJ+4+BdaiQ4FoIxbJ0Yx0UnA2UQh9N00k7UtCeDt7Hta88UAK Mauh8I2tKFNgmd5wYGYt5Nj4H6MD47l+hn+1zi1ldFi2HhpOicdwaS25aqVXMScQNltU G+IAArcCnJLP9WgL/1FH+VnvyumhWhDogzRjT/o8nJo2YSSRTm88VPoaQbPDeFRHY+ur 3l1eGtBS3HNEyDlXWGteOTnbQwrTkInXvhca5PV8T3FFRJnk+YIzCWcHm6SRa6cw70dm XO2g== X-Gm-Message-State: AOJu0YzUxrN+7Xi83MjbDfu74yIhdPYZRNuUSoSzZofvEVhghSBEhF7V RKVNh514Aig8StXfAdxbm1s6nv6XKLaCqw== X-Google-Smtp-Source: AGHT+IGW+sZjnHOh+N7Nzo90Jb9tBXA0zwh8Iki89exSuXZYDhDVdj4uiVtKvBWd88o6u0jt2SSnxA== X-Received: by 2002:a0c:e308:0:b0:656:33c7:dfff with SMTP id s8-20020a0ce308000000b0065633c7dfffmr6615070qvl.10.1696017902292; Fri, 29 Sep 2023 13:05:02 -0700 (PDT) Received: from build.lan ([174.112.183.231]) by smtp.gmail.com with ESMTPSA id t28-20020a0cb39c000000b0065cffe12ae9sm2115848qve.36.2023.09.29.13.05.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Sep 2023 13:05:01 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 05/10] linux-yocto/6.1: update to v6.1.55 Date: Fri, 29 Sep 2023 16:04:49 -0400 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 29 Sep 2023 20:05:05 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188424 From: Bruce Ashfield Updating to the latest korg -stable release that comprises the following commits: d23900f974e0 Linux 6.1.55 0db211ec0f1d interconnect: Teach lockdep about icc_bw_lock order b93aeb6352b0 net/sched: Retire rsvp classifier 4c6bb9158179 drm/amdgpu: fix amdgpu_cs_p1_user_fence 45ea58f9dbf8 Revert "memcg: drop kmem.limit_in_bytes" 4422080e777e drm/amd/display: fix the white screen issue when >= 64GB DRAM 97d4186c3503 ext4: fix rec_len verify error 89365b624af5 scsi: pm8001: Setup IRQs on resume c2cb422dca0b scsi: megaraid_sas: Fix deadlock on firmware crashdump 890e1e5dd8ba ata: libahci: clear pending interrupt status a3517ee1d4e6 ata: libata: disallow dev-initiated LPM transitions to unsupported states 30057f4add41 i2c: aspeed: Reset the i2c controller when timeout occurs 8b0f7d55b22e tracefs: Add missing lockdown check to tracefs_create_dir() dcf3caeee432 nfsd: fix change_info in NFSv4 RENAME replies 978b86fbdb2a selinux: fix handling of empty opts in selinux_fs_context_submount() 2617afde0c3d tracing: Have option files inc the trace array ref count 6dc57c3a1d13 tracing: Have current_trace inc the trace array ref count a46bf337a20f tracing: Increase trace array ref count on enable and filter files 0c2982b01501 tracing: Have event inject files inc the trace array ref count d65553fe5281 tracing: Have tracing_max_latency inc the trace array ref count 1f89e6daf2b0 btrfs: check for BTRFS_FS_ERROR in pending ordered assert 50e385d98b2a btrfs: release path before inode lookup during the ino lookup ioctl 52932bbc6d4b btrfs: fix a compilation error if DEBUG is defined in btree_dirty_folio 32247b9526bf btrfs: fix lockdep splat and potential deadlock after failure running delayed items d7b2abd87d1f dm: don't attempt to queue IO under RCU protection 216eae7d7dea Revert "drm/amd: Disable S/G for APUs when 64GB or more host memory" 98ea94f1627b md: Put the right device in md_seq_next f07c0bc27b0e nvme: avoid bogus CRTO values 6a1d1365fafe io_uring/net: fix iter retargeting for selected buf e7dcf8339a0f ovl: fix incorrect fdput() on aio completion 17854d92fa4a ovl: fix failed copyup of fileattr on a symlink 6a84939cc7dd attr: block mode changes of symlinks 3494a0066d8a Revert "SUNRPC: Fail faster on bad verifier" ba4f28a1d362 md/raid1: fix error: ISO C90 forbids mixed declarations 2076b4b677c3 samples/hw_breakpoint: fix building without module unloading 0dea06849924 x86/purgatory: Remove LTO flags 2074cb608cb5 x86/boot/compressed: Reserve more memory for page tables 038249ee7264 panic: Reenable preemption in WARN slowpath 6069b9d8056d scsi: lpfc: Fix the NULL vs IS_ERR() bug for debugfs_create_file() 1cd41d1669bc scsi: target: core: Fix target_cmd_counter leak dd8fce4e2da5 riscv: kexec: Align the kexeced kernel entry e9b8e266105a x86/ibt: Suppress spurious ENDBR 03425393f41c selftests: tracing: Fix to unmount tracefs for recovering environment bc912eed8a1a scsi: qla2xxx: Fix NULL vs IS_ERR() bug for debugfs_create_dir() cbf226355ee3 drm: gm12u320: Fix the timeout usage for usb_bulk_msg() 64561352c0f2 nvmet-tcp: pass iov_len instead of sg->length to bvec_set_page() 5ee5c928dbb6 nvmet: use bvec_set_page to initialize bvecs 00cf1dc13c1f block: factor out a bvec_set_page helper 2174731a17b0 btrfs: compare the correct fsid/metadata_uuid in btrfs_validate_super 31242daa108b btrfs: add a helper to read the superblock metadata_uuid 44751b057c24 MIPS: Use "grep -E" instead of "egrep" 8332311cd02a misc: fastrpc: Fix incorrect DMA mapping unmap request 5a5641755ca8 misc: fastrpc: Prepare to dynamic dma-buf locking specification b4539ff7a48d dma-buf: Add unlocked variant of attachment-mapping functions 6ca28642dd9a printk: Consolidate console deferred printing 13ebf3ff08b0 printk: Keep non-panic-CPUs out of console lock ee42bfc791aa interconnect: Fix locking for runpm vs reclaim 48aebbe801e7 kobject: Add sanity check for kset->kobj.ktype in kset_register() 240571c49f76 media: pci: ipu3-cio2: Initialise timing struct to avoid a compiler warning 91f400233edc usb: chipidea: add workaround for chipidea PEC bug 8e3556f2f497 usb: ehci: add workaround for chipidea PORTSC.PEC bug 48c135c30ad2 misc: open-dice: make OPEN_DICE depend on HAS_IOMEM a3c9315a8c78 serial: cpm_uart: Avoid suspicious locking 4738bf8b2d36 scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() 6c440fec96af tools: iio: iio_generic_buffer: Fix some integer type and calculation 826e9c91a203 usb: gadget: fsl_qe_udc: validate endpoint index for ch9 udc bbc9c3652708 usb: cdns3: Put the cdns set active part outside the spin lock 96a0bf5827e7 media: pci: cx23885: replace BUG with error return 257092cb544c media: tuners: qt1010: replace BUG_ON with a regular error b2a019ec8b33 scsi: lpfc: Abort outstanding ELS cmds when mailbox timeout error is detected dfcd3c010209 media: dvb-usb-v2: gl861: Fix null-ptr-deref in gl861_i2c_master_xfer 6ab7ea4e17d6 media: az6007: Fix null-ptr-deref in az6007_i2c_xfer() 14b94154a723 media: anysee: fix null-ptr-deref in anysee_master_xfer abb6fd93e05e media: af9005: Fix null-ptr-deref in af9005_i2c_xfer 08dfcbd03b2b media: dw2102: Fix null-ptr-deref in dw2102_i2c_transfer() 0143f282b15f media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer 8ba9d91c8f21 media: mdp3: Fix resource leaks in of_find_device_by_node b78796126f80 PCI: fu740: Set the number of MSI vectors 9318c3ae155b PCI: vmd: Disable bridge window for domain reset 96f27ff73220 powerpc/pseries: fix possible memory leak in ibmebus_bus_init() ee378f45a70d ARM: 9317/1: kexec: Make smp stop calls asynchronous 09066c19d945 PCI: dwc: Provide deinit callback for i.MX 4de3a603010e jfs: fix invalid free of JFS_IP(ipimap)->i_imap in diUnmount 2f7a36448f51 fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount() 035bc86fbf2b ext2: fix datatype of block number in ext2_xattr_set2() 4f7d853b4590 md: raid1: fix potential OOB in raid1_remove_disk() 4e547968a6e4 bus: ti-sysc: Configure uart quirks for k3 SoC 4c743c1dd2ee drm/mediatek: dp: Change logging to dev for mtk_dp_aux_transfer() edddbdb8122e drm/exynos: fix a possible null-pointer dereference due to data race in exynos_drm_crtc_atomic_disable() a101b1bdd24a drm/amd/display: Blocking invalid 420 modes on HDMI TMDS for DCN314 2c0f5b6972eb drm/amd/display: Blocking invalid 420 modes on HDMI TMDS for DCN31 506d2ee72af2 drm/amd/display: Use DTBCLK as refclk instead of DPREFCLK 2d027da82a96 ALSA: hda: intel-dsp-cfg: add LunarLake support cc4553c14fbb ASoC: Intel: sof_sdw: Update BT offload config for soundwire config d843bcc7adc9 ASoC: SOF: topology: simplify code to prevent static analysis warnings 2ec715bf8816 drm/amd/display: Fix underflow issue on 175hz timing 4630c27c5529 samples/hw_breakpoint: Fix kernel BUG 'invalid opcode: 0000' 306c7903de14 arm64: dts: qcom: sm8250-edo: correct ramoops pmsg-size 41ff904a7c46 arm64: dts: qcom: sm8150-kumano: correct ramoops pmsg-size 23f9d0c67199 arm64: dts: qcom: sm6350: correct ramoops pmsg-size 03499a685773 arm64: dts: qcom: sm6125-pdx201: correct ramoops pmsg-size 766cc11e854e drm/edid: Add quirk for OSVR HDK 2.0 8178dac6ee2c drm/bridge: tc358762: Instruct DSI host to generate HSE packets d5feaef143b6 libbpf: Free btf_vmlinux when closing bpf_object b9a175e3b250 wifi: mac80211_hwsim: drop short frames 7e1cda5cf07f wifi: mac80211: check for station first in client probe d7b0fe3487d2 wifi: cfg80211: ocb: don't leave if not joined 676a42341013 wifi: cfg80211: reject auth/assoc to AP with our address 28b07e30bc14 netfilter: ebtables: fix fortify warnings in size_entry_mwt() 7ae7a1378a11 wifi: mac80211: check S1G action frame size 1c27b73ffa90 alx: fix OOB-read compiler warning a13c1f6c324a mmc: sdhci-esdhc-imx: improve ESDHC_FLAG_ERR010450 b62e8838e988 tpm_tis: Resend command to recover from data transfer errors c2b226f223fb netlink: convert nlk->flags to atomic flags 06e2b5ad72b6 Bluetooth: Fix hci_suspend_sync crash d3ad023a39f1 crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() e5d94c98a72f net/ipv4: return the real errno instead of -EINVAL d5372a1f0cdf net: Use sockaddr_storage for getsockopt(SO_PEERNAME). ab0ae0af0a2d can: sun4i_can: Add support for the Allwinner D1 4eb79abf910a can: sun4i_can: Add acceptance register quirk f04b40cb70a5 wifi: wil6210: fix fortify warnings 5c8bbb79c7cb mt76: mt7921: don't assume adequate headroom for SDIO headers 4f621fe1acac wifi: mwifiex: fix fortify warning 2640a8e54f84 wifi: ath9k: fix printk specifier 1800a27a3dba wifi: ath9k: fix fortify warnings 5760a72b3060 ice: Don't tx before switchdev is fully configured ad58d7ebbf93 crypto: lrw,xts - Replace strlcpy with strscpy ac70101e5b94 devlink: remove reload failed checks in params get/set callbacks a0300edca5df selftests/nolibc: fix up kernel parameters support 1ea7e4780727 ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects dc1d81ee9312 hw_breakpoint: fix single-stepping when using bpf_overflow_handler d42d342d3132 perf/imx_ddr: speed up overflow frequency of cycle 9d9b5cbc12f4 perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 4cb0612cf260 ACPI: video: Add backlight=native DMI quirk for Lenovo Ideapad Z470 9f10b4eb1b21 scftorture: Forgive memory-allocation failure if KASAN 83ed0cdb6ae0 rcuscale: Move rcu_scale_writer() schedule_timeout_uninterruptible() to _idle() 3b1107abdc2c kernel/fork: beware of __put_task_struct() calling context e1f686930ee4 ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer 34bff6d85001 locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock 28062cd6eda0 btrfs: output extra debug info if we failed to find an inline backref 726deae613bc autofs: fix memory leak of waitqueues in autofs_catatonic_mode a356197db198 Linux 6.1.54 77b49370a261 drm/amd/display: Fix a bug when searching for insert_above_mpcc 3ce9925584c6 MIPS: Only fiddle with CHECKFLAGS if `need-compiler' e5b28ce127a6 kcm: Fix error handling for SOCK_DGRAM in kcm_sendmsg(). a47db2caae27 ixgbe: fix timestamp configuration code 6f0d85d501ab tcp: Fix bind() regression for v4-mapped-v6 non-wildcard address. 63830afece93 tcp: Fix bind() regression for v4-mapped-v6 wildcard address. 489ced24c7ca tcp: Factorise sk_family-independent comparison in inet_bind2_bucket_match(_addr_any). 82f9af464e01 ipv6: Remove in6addr_any alternatives. 8b6556c4c4e3 ipv6: fix ip6_sock_set_addr_preferences() typo d5d315cf7687 net: macb: fix sleep inside spinlock 7aa720c350c7 net: macb: Enable PTP unicast 7f4116c6f984 net/tls: do not free tls_rec on async operation in bpf_exec_tx_verdict() f72497c521c9 platform/mellanox: NVSW_SN2201 should depend on ACPI 9d392695f323 platform/mellanox: mlxbf-pmc: Fix reading of unprogrammed events 3f16330a4869 platform/mellanox: mlxbf-pmc: Fix potential buffer overflows 3a45dcfb4d3c platform/mellanox: mlxbf-tmfifo: Drop jumbo frames 30c8bbe1edba platform/mellanox: mlxbf-tmfifo: Drop the Rx packet if no more descriptors 16989de75497 kcm: Fix memory leak in error path of kcm_sendmsg() 2323397e5877 r8152: check budget for r8152_poll() 44c8ffd482cc net: dsa: sja1105: block FDB accesses that are concurrent with a switch reset e74bd1b229cb net: dsa: sja1105: serialize sja1105_port_mcast_flood() with other FDB accesses d766cf9ddb97 net: dsa: sja1105: fix multicast forwarding working only for last added mdb entry 538e7fe66c46 net: dsa: sja1105: propagate exact error code from sja1105_dynamic_config_poll_valid() 9a3e7eca2b5b net: dsa: sja1105: hide all multicast addresses from "bridge fdb show" 66e79c2f3a93 net:ethernet:adi:adin1110: Fix forwarding offload c281948cebcc net: ethernet: adi: adin1110: use eth_broadcast_addr() to assign broadcast address 61866f7d814e hsr: Fix uninit-value access in fill_frame_info() ff5faed5f548 net: ethernet: mtk_eth_soc: fix possible NULL pointer dereference in mtk_hwlro_get_fdir_all() 349638f7e5d3 net: ethernet: mvpp2_main: fix possible OOB write in mvpp2_ethtool_get_rxnfc() 9dbbc87d5b61 net: stmmac: fix handling of zero coalescing tx-usecs 70c8d17007dc net/smc: use smc_lgr_list.lock to protect smc_lgr_list.list iterate in smcr_port_add ef5d546b9d4f selftests: Keep symlinks, when possible cdd61a27fb0a kselftest/runner.sh: Propagate SIGTERM to runner child 980f84454798 net: ipv4: fix one memleak in __inet_del_ifa() 9acb294ebdfe kunit: Fix wild-memory-access bug in kunit_free_suite_set() cb30ff2adb10 drm/amdgpu: register a dirty framebuffer callback for fbcon b53fee19ec5e drm/amd/display: Remove wait while locked 2d7a6fcb1f23 drm/amd/display: always switch off ODM before committing more streams c29bfda64b44 perf hists browser: Fix the number of entries for 'e' key f4618f131629 perf tools: Handle old data in PERF_RECORD_ATTR be69e8c8f5c2 perf test shell stat_bpf_counters: Fix test on Intel cb0940640d51 perf hists browser: Fix hierarchy mode header ec5409612255 MIPS: Fix CONFIG_CPU_DADDI_WORKAROUNDS `modules_install' regression 60b5ef4cf82c KVM: SVM: Skip VMSA init in sev_es_init_vmcb() if pointer is NULL 12645e623f28 KVM: SVM: Set target pCPU during IRTE update if target vCPU is running 5b2b0535fa7a KVM: nSVM: Load L1's TSC multiplier based on L1 state, not L2 state 6c1ecfea1daf KVM: nSVM: Check instead of asserting on nested TSC scaling support 5c18ace750e4 KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration ba82001e4118 KVM: SVM: Don't inject #UD if KVM attempts to skip SEV guest insn 3988692acc92 KVM: SVM: Take and hold ir_list_lock when updating vCPU's Physical ID entry ff536a96687c drm/amd/display: prevent potential division by zero errors e1769b1dfcae drm/amd/display: enable cursor degamma for DCN3+ DRM legacy gamma 3388ca3a38a5 mtd: rawnand: brcmnand: Fix ECC level field setting for v7.2 controller 31d42146fa6f mtd: rawnand: brcmnand: Fix potential false time out warning 7c6ba20a0b9a mtd: spi-nor: Correct flags for Winbond w25q128 45fe4ad7f439 mtd: rawnand: brcmnand: Fix potential out-of-bounds access in oob write a7e118fcc8b4 mtd: rawnand: brcmnand: Fix crash during the panic_write 8bf2d4ca521d drm/mxsfb: Disable overlay plane in mxsfb_plane_overlay_atomic_disable() 09974a1352d3 btrfs: use the correct superblock to compare fsid in btrfs_validate_super b692f7d1576b btrfs: zoned: re-enable metadata over-commit for zoned mode 08daa38ca212 btrfs: set page extent mapped after read_folio in relocate_one_page 91f6a538d625 btrfs: don't start transaction when joining with TRANS_JOIN_NOSTART f933a1c43b68 btrfs: free qgroup rsv on io failure cdc3ba292df8 btrfs: fix start transaction qgroup rsv double free 59c38f050d9b btrfs: zoned: do not zone finish data relocation block group ef819c2f8e8a fuse: nlookup missing decrement in fuse_direntplus_link 6694be119f63 ata: pata_ftide010: Add missing MODULE_DESCRIPTION ae73b94ad771 ata: sata_gemini: Add missing MODULE_DESCRIPTION 1605f2709017 ata: pata_falcon: fix IO base selection for Q40 cdd0d707357c ata: ahci: Add Elkhart Lake AHCI controller e93bc372dbc0 hwspinlock: qcom: add missing regmap config for SFPB MMIO implementation 0649dc0af93a lib: test_scanf: Add explicit type cast to result initialization in test_number_prefix() 980b592c6087 f2fs: avoid false alarm of circular locking 1c64dbe8fa35 f2fs: flush inode if atomic file is aborted 1fb3f1bbfdb5 ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} 03393857a95b ext4: add correct group descriptors and reserved GDT blocks to system zone 20108975ec51 jbd2: correct the end of the journal recovery scan range dbafe636db41 jbd2: check 'jh->b_transaction' before removing it from checkpoint c5f23305f8b1 jbd2: fix checkpoint cleanup performance regression 6ea18981bb8a dmaengine: sh: rz-dmac: Fix destination and source data size setting de43bc17987d clocksource/drivers/arm_arch_timer: Disable timer before programming CVAL f2953184bf19 ARC: atomics: Add compiler barrier to atomic operations... 8eea0afbcc9d net/mlx5: Free IRQ rmap and notifier on kernel shutdown 017a05805368 Multi-gen LRU: avoid race in inc_min_seq() 69561478400c sh: boards: Fix CEU buffer size passed to dma_declare_coherent_memory() 9cd5cf0bfeaf net: hns3: remove GSO partial feature bit 136806771864 net: hns3: fix the port information display when sfp is absent 9bd9afd55c52 net: hns3: fix invalid mutex between tc qdisc and dcb ets command issue d76436e26943 net: hns3: fix debugfs concurrency issue between kfree buffer and read b5087697130a net: hns3: fix byte order conversion issue in hclge_dbg_fd_tcam_read() 5c28780f4232 net: hns3: fix tx timeout issue 7bb8d52b4271 netfilter: nfnetlink_osf: avoid OOB read d9ebfc0f2137 netfilter: nftables: exthdr: fix 4-byte stack OOB write 6cf0d1d5a50b bpf: Assign bpf_tramp_run_ctx::saved_run_ctx before recursion check. 04f92e67b35d bpf: Invoke __bpf_prog_exit_sleepable_recur() on recursion in kern_sys_bpf(). a12f15d1f863 bpf: Remove prog->active check for bpf_lsm and bpf_iter 5f09b79e99ad net: dsa: sja1105: complete tc-cbs offload support on SJA1110 ec9f203ad7f3 net: dsa: sja1105: fix -ENOSPC when replacing the same tc-cbs too many times 483f0e3975df net: dsa: sja1105: fix bandwidth discrepancy between tc-cbs software and offload 54b59bc18d19 ip_tunnels: use DEV_STATS_INC() 175f290dc937 idr: fix param name in idr_alloc_cyclic() doc 147d8da33a2c s390/zcrypt: don't leak memory if dev_set_name() fails ccb048dae8ff igb: Change IGB_MIN to allow set rx/tx value between 64 and 80 74b98c61c9c6 igbvf: Change IGBVF_MIN to allow set rx/tx value between 64 and 80 30acc4f954a0 igc: Change IGC_MIN to allow set rx/tx value between 64 and 80 e2e2c839d827 octeontx2-af: Fix truncation of smq in CN10K NIX AQ enqueue mbox handler e30388b80d23 kcm: Destroy mutex in kcm_exit_net() a18349dc8d91 net: sched: sch_qfq: Fix UAF in qfq_dequeue() 2100bbf55e56 af_unix: Fix data race around sk->sk_err. ce3aa88ceccd af_unix: Fix data-races around sk->sk_shutdown. 2d8933ca863e af_unix: Fix data-race around unix_tot_inflight. b9cdbb38e030 af_unix: Fix data-races around user->unix_inflight. 923877254f00 bpf, sockmap: Fix skb refcnt race after locking changes 71fb38b222cf net: phy: micrel: Correct bit assignments for phy_device flags aa8fd3a63691 net: ipv6/addrconf: avoid integer underflow in ipv6_create_tempaddr e752860bbc3c veth: Fixing transmit return status for dropped packets a47ad6d226dc gve: fix frag_list chaining 24b1e835db34 igb: disable virtualization features on 82580 7ddfe350e255 ipv6: ignore dst hint for multipath routes 0b2ee66411fe ipv4: ignore dst hint for multipath routes b7d25ac3627a mptcp: annotate data-races around msk->rmem_fwd_alloc 787c5829681b net: annotate data-races around sk->sk_forward_alloc f1175881ddd9 net: use sk_forward_alloc_get() in sk_get_meminfo() bd9bd085c681 drm/i915/gvt: Drop unused helper intel_vgpu_reset_gtt() 2b7510bb92c1 drm/i915/gvt: Put the page reference obtained by KVM's gfn_to_pfn() f5738399ed96 drm/i915/gvt: Verify pfn is "valid" before dereferencing "struct page" 6436973164ea xsk: Fix xsk_diag use-after-free error during socket cleanup d92c34348b37 net: fib: avoid warn splat in flow dissector 9036b6342fcd net: read sk->sk_family once in sk_mc_loop() 5aaa7ee23203 ipv4: annotate data-races around fi->fib_dead 471f534971d9 sctp: annotate data-races around sk->sk_wmem_queued f39b49077abe net/sched: fq_pie: avoid stalls in fq_pie_timer() 47f72ee50226 smb: propagate error code of extract_sharename() 60e3318e3e90 cifs: use fs_context for automounts 84d577923450 blk-throttle: consider 'carryover_ios/bytes' in throtl_trim_slice() fd2420905c8e blk-throttle: use calculate_io/bytes_allowed() for throtl_trim_slice() 8017a27cec32 drm/i915: mark requests for GuC virtual engines to avoid use-after-free 0686336f7383 perf test stat_bpf_counters_cgrp: Enhance perf stat cgroup BPF counter test 66b23e7b0822 perf test stat_bpf_counters_cgrp: Fix shellcheck issue about logical operators 523f6268e865 pwm: lpc32xx: Remove handling of PWM channels fa5392873639 watchdog: intel-mid_wdt: add MODULE_ALIAS() to allow auto-load 032cd8ce89a4 perf top: Don't pass an ERR_PTR() directly to perf_session__delete() adeb9f392d07 perf vendor events: Drop STORES_PER_INST metric event for power10 platform 6ade9094b477 perf vendor events: Drop some of the JSON/events for power10 platform b7cbcafb6d04 perf vendor events: Update the JSON/events descriptions for power10 platform 6a43e0d62311 x86/virt: Drop unnecessary check on extended CPUID level in cpu_has_svm() 6522397e7502 perf annotate bpf: Don't enclose non-debug code with an assert() e62e740009cc Input: tca6416-keypad - fix interrupt enable disbalance a7345501a3bd Input: tca6416-keypad - always expect proper IRQ number in i2c client d7add2001991 backlight: gpio_backlight: Drop output GPIO direction check for initial power state 9de7eb95bbe8 pwm: atmel-tcb: Fix resource freeing in error path and remove c42256a283d6 pwm: atmel-tcb: Harmonize resource allocation order b9734e8505bd pwm: atmel-tcb: Convert to platform remove callback returning void 62dd514c34be perf trace: Really free the evsel->priv area e5dee8222d7c perf trace: Use zfree() to reduce chances of use after free eb17c3d0055b Input: iqs7222 - configure power mode before triggering ATI 8ab594223950 kconfig: fix possible buffer overflow 39c29d075352 mailbox: qcom-ipcc: fix incorrect num_chans counting 36201d559b47 gfs2: low-memory forced flush fixes 694e43f22c5b gfs2: Switch to wait_event in gfs2_logd c4807163e2d4 tpm_crb: Fix an error handling path in crb_acpi_add() 46d3bc902b03 kbuild: do not run depmod for 'make modules_sign' 390275d7a863 kbuild: rpm-pkg: define _arch conditionally 31cf7853a940 net: deal with integer overflows in kmalloc_reserve() 2b39866f0a38 net: factorize code in kmalloc_reserve() 36974c3a5438 net: remove osize variable in __alloc_skb() 5f7676fdaf42 net: add SKB_HEAD_ALIGN() helper 8b4d0f3890c8 bus: mhi: host: Skip MHI reset if device is in RDDM fd9a8ad2cfa7 NFSv4/pnfs: minor fix for cleanup path in nfs4_get_device_info dac14a1dbe20 NFS: Fix a potential data corruption 1bb9546c7aed clk: qcom: mss-sc7180: fix missing resume during probe 017e60a215d8 clk: qcom: q6sstop-qcs404: fix missing resume during probe eab2ece5e4b5 clk: qcom: lpasscc-sc7280: fix missing resume during probe 5310f712157a clk: qcom: dispcc-sm8450: fix runtime PM imbalance on probe errors f6250ecb7fbb soc: qcom: qmi_encdec: Restrict string length in decode c4e1204bd714 clk: qcom: gcc-mdm9615: use proper parent for pll0_vote clock 5b3b0f7f7363 clk: imx: pll14xx: align pdiv with reference manual 871244f8efe8 clk: imx: pll14xx: dynamically configure PLL for 393216000/361267200Hz 311db21d4a1f dt-bindings: clock: xlnx,versal-clk: drop select:false 54e5ff4af78b pinctrl: cherryview: fix address_space_handler() argument 9c8fc05bd4d0 cifs: update desired access while requesting for directory lease db5d5673ab7e parisc: led: Reduce CPU overhead for disk & lan LED computation ff2c44f0118d parisc: led: Fix LAN receive and transmit LEDs 421855d0d24d lib/test_meminit: allocate pages up to order MAX_ORDER 84a212a72c84 mm: hugetlb_vmemmap: fix a race between vmemmap pmd split 21ef9e11205f memcg: drop kmem.limit_in_bytes 0f7339056893 send channel sequence number in SMB3 requests after reconnects 22ec50d7b524 arm64: dts: renesas: rzg2l: Fix txdv-skew-psec typos df2d596e7e9c clk: qcom: turingcc-qcs404: fix missing resume during probe b83ae66d8265 ASoC: tegra: Fix SFC conversion for few rates 3c9881fd220a drm/ast: Fix DRAM init on AST2200 c0341bddd6cc clk: qcom: camcc-sc7180: fix async resume during probe f83c1b13f815 fbdev/ep93xx-fb: Do not assign to struct fb_info.dev a0b4a0666bea null_blk: fix poll request timeout handling f55797084931 scsi: qla2xxx: Fix firmware resource tracking 3a9d4db2d2e0 scsi: qla2xxx: Error code did not return to upper layer c7355cbb9c1b scsi: qla2xxx: Fix smatch warn for qla_init_iocb_limit() 974887e1d689 scsi: qla2xxx: Flush mailbox commands on chip reset 98643561d853 scsi: qla2xxx: Remove unsupported ql2xenabledif option 1f0e3814adc7 scsi: qla2xxx: Fix TMF leak through e6aabf0654cc scsi: qla2xxx: Fix session hang in gnl addaa136f10b scsi: qla2xxx: Turn off noisy message log 01e3440ce021 scsi: qla2xxx: Fix erroneous link up failure ddb8fa05981c scsi: qla2xxx: Fix command flush during TMF 6e44a7e2a0bc scsi: qla2xxx: fix inconsistent TMF timeout cd06c45b326e scsi: qla2xxx: Fix deletion race condition 820010cfe5f8 scsi: qla2xxx: Limit TMF to 8 per function faf7e224b4fa scsi: qla2xxx: Adjust IOCB resource on qpair create 98d3e7c5f757 drm/virtio: Conditionally allocate virtio_gpu_fence 3e8b9b06de9d io_uring: Don't set affinity on a dying sqpoll thread 9704cfcf1fa9 io_uring/sqpoll: fix io-wq affinity when IORING_SETUP_SQPOLL is used 605d055452e7 io_uring: break out of iowq iopoll on teardown b04f22b68643 io_uring/net: don't overflow multishot accept 5afbf7fdb730 io_uring: revert "io_uring fix multishot accept ordering" fd459200ff81 io_uring: always lock in io_apoll_task_func f36791596176 Multi-gen LRU: fix per-zone reclaim a73d04c46052 mm: multi-gen LRU: rename lrugen->lists[] to lrugen->folios[] 7164d74aae1c net/ipv6: SKB symmetric hash should incorporate transport ports Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.1.inc | 24 ++++++++++++---- .../linux/linux-yocto-rt_6.1.bb | 6 ++-- .../linux/linux-yocto-tiny_6.1.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.1.bb | 28 +++++++++---------- 4 files changed, 38 insertions(+), 26 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc index 94a312b311..898d8aa720 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.1.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.1.inc @@ -1,9 +1,9 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2023-09-15 17:26:47.557521+00:00 for version 6.1.53 +# Generated at 2023-09-26 03:36:35.968438+00:00 for version 6.1.55 python check_kernel_cve_status_version() { - this_version = "6.1.53" + this_version = "6.1.55" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -4794,7 +4794,7 @@ CVE_STATUS[CVE-2023-25012] = "cpe-stable-backport: Backported in 6.1.16" CVE_STATUS[CVE-2023-2513] = "fixed-version: Fixed from version 6.0rc1" -# CVE-2023-25775 has no known resolution +CVE_STATUS[CVE-2023-25775] = "cpe-stable-backport: Backported in 6.1.53" CVE_STATUS[CVE-2023-2598] = "fixed-version: only affects 6.3rc1 onwards" @@ -4850,7 +4850,7 @@ CVE_STATUS[CVE-2023-3106] = "fixed-version: Fixed from version 4.8rc7" # CVE-2023-31082 has no known resolution -# CVE-2023-31083 has no known resolution +# CVE-2023-31083 needs backporting (fixed from 6.6rc1) # CVE-2023-31084 needs backporting (fixed from 6.4rc3) @@ -4964,7 +4964,7 @@ CVE_STATUS[CVE-2023-3611] = "cpe-stable-backport: Backported in 6.1.40" # CVE-2023-3640 has no known resolution -# CVE-2023-37453 has no known resolution +CVE_STATUS[CVE-2023-37453] = "fixed-version: only affects 6.3rc1 onwards" # CVE-2023-37454 has no known resolution @@ -4996,6 +4996,12 @@ CVE_STATUS[CVE-2023-38432] = "cpe-stable-backport: Backported in 6.1.36" CVE_STATUS[CVE-2023-3863] = "cpe-stable-backport: Backported in 6.1.39" +CVE_STATUS[CVE-2023-3865] = "cpe-stable-backport: Backported in 6.1.36" + +CVE_STATUS[CVE-2023-3866] = "cpe-stable-backport: Backported in 6.1.36" + +CVE_STATUS[CVE-2023-3867] = "cpe-stable-backport: Backported in 6.1.40" + CVE_STATUS[CVE-2023-4004] = "cpe-stable-backport: Backported in 6.1.42" # CVE-2023-4010 has no known resolution @@ -5024,6 +5030,8 @@ CVE_STATUS[CVE-2023-4207] = "cpe-stable-backport: Backported in 6.1.45" CVE_STATUS[CVE-2023-4208] = "cpe-stable-backport: Backported in 6.1.45" +# CVE-2023-4244 needs backporting (fixed from 6.5rc7) + CVE_STATUS[CVE-2023-4273] = "cpe-stable-backport: Backported in 6.1.45" CVE_STATUS[CVE-2023-4385] = "fixed-version: Fixed from version 5.19rc1" @@ -5044,5 +5052,9 @@ CVE_STATUS[CVE-2023-4611] = "fixed-version: only affects 6.4rc1 onwards" # CVE-2023-4622 needs backporting (fixed from 6.5rc1) -# CVE-2023-4623 has no known resolution +CVE_STATUS[CVE-2023-4623] = "cpe-stable-backport: Backported in 6.1.53" + +# CVE-2023-4881 needs backporting (fixed from 6.6rc1) + +# CVE-2023-4921 needs backporting (fixed from 6.6rc1) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb index 4168a936bb..fd04c4c17a 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.1.bb @@ -14,13 +14,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "af2faa46d440ee11170ba8233eec0f818988f256" -SRCREV_meta ?= "59e0fce122a66f7dcaf7a2a8294d81c4b78197dc" +SRCREV_machine ?= "4b3040c1dc13aaac356ad4ef45a8926118c732d0" +SRCREV_meta ?= "943c6fe5dac329c7e1c30d602788f409e692b3a8" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.1;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.1.53" +LINUX_VERSION ?= "6.1.55" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb index 80a3f06eee..818c650368 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.1.bb @@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc # CVE exclusions include recipes-kernel/linux/cve-exclusion_6.1.inc -LINUX_VERSION ?= "6.1.53" +LINUX_VERSION ?= "6.1.55" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" -SRCREV_meta ?= "59e0fce122a66f7dcaf7a2a8294d81c4b78197dc" +SRCREV_machine ?= "644e73fa089ade30c0db7bd54be960be92546ba2" +SRCREV_meta ?= "943c6fe5dac329c7e1c30d602788f409e692b3a8" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.1.bb b/meta/recipes-kernel/linux/linux-yocto_6.1.bb index 61f3e532fb..a942d0c540 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.1.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.1.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86-64 ?= "v6.1/standard/base" KBRANCH:qemuloongarch64 ?= "v6.1/standard/base" KBRANCH:qemumips64 ?= "v6.1/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "b11af7d1c8b4337347747977173c878e7672eb15" -SRCREV_machine:qemuarm64 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" -SRCREV_machine:qemuloongarch64 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" -SRCREV_machine:qemumips ?= "81af09853cc4318fad59e780c830c9cc8ccdc898" -SRCREV_machine:qemuppc ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" -SRCREV_machine:qemuriscv64 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" -SRCREV_machine:qemuriscv32 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" -SRCREV_machine:qemux86 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" -SRCREV_machine:qemux86-64 ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" -SRCREV_machine:qemumips64 ?= "6ec5ef2f6fa90a5823e131805845738453bc553a" -SRCREV_machine ?= "51f0e0b74445fb47b6544b26667f9d58b2017695" -SRCREV_meta ?= "59e0fce122a66f7dcaf7a2a8294d81c4b78197dc" +SRCREV_machine:qemuarm ?= "cf771f6d6bc0344e048bdbf7d23d3aacbe3556d0" +SRCREV_machine:qemuarm64 ?= "644e73fa089ade30c0db7bd54be960be92546ba2" +SRCREV_machine:qemuloongarch64 ?= "644e73fa089ade30c0db7bd54be960be92546ba2" +SRCREV_machine:qemumips ?= "4be1dcc270e6ddeea513af01d91ea3b48ec82470" +SRCREV_machine:qemuppc ?= "644e73fa089ade30c0db7bd54be960be92546ba2" +SRCREV_machine:qemuriscv64 ?= "644e73fa089ade30c0db7bd54be960be92546ba2" +SRCREV_machine:qemuriscv32 ?= "644e73fa089ade30c0db7bd54be960be92546ba2" +SRCREV_machine:qemux86 ?= "644e73fa089ade30c0db7bd54be960be92546ba2" +SRCREV_machine:qemux86-64 ?= "644e73fa089ade30c0db7bd54be960be92546ba2" +SRCREV_machine:qemumips64 ?= "aa0e978c979b84d620ad21132cfdbbf857be3878" +SRCREV_machine ?= "644e73fa089ade30c0db7bd54be960be92546ba2" +SRCREV_meta ?= "943c6fe5dac329c7e1c30d602788f409e692b3a8" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the /base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "09045dae0d902f9f78901a26c7ff1714976a38f9" +SRCREV_machine:class-devupstream ?= "d23900f974e0fb995b36ef47283a5aa74ca25f51" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.1/base" @@ -45,7 +45,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA SRC_URI += "file://0001-perf-cpumap-Make-counter-as-unsigned-ints.patch" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.1.53" +LINUX_VERSION ?= "6.1.55" PV = "${LINUX_VERSION}+git" From patchwork Fri Sep 29 20:04:50 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 31401 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A1825E728EF for ; Fri, 29 Sep 2023 20:05:05 +0000 (UTC) Received: from mail-ua1-f43.google.com (mail-ua1-f43.google.com [209.85.222.43]) by mx.groups.io with SMTP id smtpd.web11.27710.1696017904805731003 for ; Fri, 29 Sep 2023 13:05:04 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=EDoAoU6y; spf=pass (domain: gmail.com, ip: 209.85.222.43, mailfrom: bruce.ashfield@gmail.com) Received: by mail-ua1-f43.google.com with SMTP id a1e0cc1a2514c-7ab68ef45e7so4479768241.3 for ; Fri, 29 Sep 2023 13:05:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1696017904; x=1696622704; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=nxY5qjPSux4sLM1ZEI/njKiHKLUuBc8iZtnE50Jwpuw=; b=EDoAoU6y0KdYgs6kCV5ISf5d/vH95xZHEXt3CZ0w/FklofAEUGXH8UYmv6ybwGOGhQ M5a35xRJPwJ4dXVrpCscKjQpwtYceTDow3D/J3l8jcm9CikFaEvGge5XB/mWxvKcREVY 7ID7ufieMlkJz8inwEu4yvqPDndwjIlXLdW06p++t8Cg7Vgz2rBEZc7BVb7K/d59MSli LECy+fj5ksu7f8dLcUmC6pRkt8SfZ0mU3S1wBwog6HY8xmug7o5XWzr2wVTnEk9f7PYf /xxpF00GBE/YMHOIZeMrx0KU8pKHczhvROADe8ah8ZBYm2eG6cmYCzRnYR0vFctksKzd quxQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696017904; x=1696622704; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=nxY5qjPSux4sLM1ZEI/njKiHKLUuBc8iZtnE50Jwpuw=; b=S6kKHKFbxOBd22UxFf/Kj8TWgOHr+aX7ni3ed5UvUDYp2nrWiNLyWdXVKURzw4NDVX pxIVC/T1oGzb0UGJDwTP+fLSMkGi4WmJ9Hp1U6ImtSioNEv+OdjPiHSJSVbM/rw4IKFN XjrwJVWg/vcd6Wd29IA5KCawr8vzUID2Dasts3DMeUUTq/JuO8xzM98qkyBxtE/XMVrQ AJDdgSUG93madHTlun84lGXtyEsYoXOx6Ig58UittJV5UBt2OazxQ61wOOybl7ywnkpN wodCG9P3lX6yc6/u7Ijq8gIYmbTlfe41980LWQkbU3TjesAVJYXN4MjqQTSNAUQB5Xbl R0qw== X-Gm-Message-State: AOJu0YwmpkZhcAlhFpMnrb5bhdA7OPqRGBsPzhWsYXdlIJCltASadbmH enaNqpVtz0IbZFtNDixe8ok= X-Google-Smtp-Source: AGHT+IGYsH4pUh/aAWFMZ+VnSkYMoYQeyUB9KVO3IpY1PKZu6eUxF1fs2wI2Zy8XMRrvur67cohG2A== X-Received: by 2002:a67:cd01:0:b0:44e:9afe:c5b9 with SMTP id u1-20020a67cd01000000b0044e9afec5b9mr4429728vsl.23.1696017903699; Fri, 29 Sep 2023 13:05:03 -0700 (PDT) Received: from build.lan ([174.112.183.231]) by smtp.gmail.com with ESMTPSA id t28-20020a0cb39c000000b0065cffe12ae9sm2115848qve.36.2023.09.29.13.05.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Sep 2023 13:05:02 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 06/10] linux-yocto-dev: update to v6.6-rcX Date: Fri, 29 Sep 2023 16:04:50 -0400 Message-Id: <3541ee443ff5b0c6d6bf16c0c287bd3c68e1f1eb.1696017123.git.bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 29 Sep 2023 20:05:05 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188425 From: Bruce Ashfield v6.5 will be the next reference kernel, so we update -dev to follow 6.6-rcX. Signed-off-by: Bruce Ashfield --- meta/recipes-kernel/linux/linux-yocto-dev.bb | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-dev.bb b/meta/recipes-kernel/linux/linux-yocto-dev.bb index 95e3592731..b59442781c 100644 --- a/meta/recipes-kernel/linux/linux-yocto-dev.bb +++ b/meta/recipes-kernel/linux/linux-yocto-dev.bb @@ -14,7 +14,7 @@ require recipes-kernel/linux/linux-yocto.inc # provide this .inc to set specific revisions include recipes-kernel/linux/linux-yocto-dev-revisions.inc -KBRANCH = "v6.5/standard/base" +KBRANCH = "v6.6/standard/base" KMETA = "kernel-meta" SRC_URI = "git://git.yoctoproject.org/linux-yocto-dev.git;branch=${KBRANCH};name=machine;protocol=https \ @@ -28,7 +28,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto-dev.git;branch=${KBRANCH};name SRCREV_machine ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}' SRCREV_meta ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}' -LINUX_VERSION ?= "6.5" +LINUX_VERSION ?= "6.6" LINUX_VERSION_EXTENSION ?= "-yoctodev-${LINUX_KERNEL_TYPE}" PV = "${LINUX_VERSION}+git" From patchwork Fri Sep 29 20:04:51 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 31408 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id BE3C4E728EF for ; Fri, 29 Sep 2023 20:05:15 +0000 (UTC) Received: from mail-ua1-f50.google.com (mail-ua1-f50.google.com [209.85.222.50]) by mx.groups.io with SMTP id smtpd.web10.27823.1696017907051866113 for ; Fri, 29 Sep 2023 13:05:07 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=gg2YjvSN; spf=pass (domain: gmail.com, ip: 209.85.222.50, mailfrom: bruce.ashfield@gmail.com) Received: by mail-ua1-f50.google.com with SMTP id a1e0cc1a2514c-7abda795363so4265244241.0 for ; Fri, 29 Sep 2023 13:05:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1696017906; x=1696622706; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=1+C6pSyWvckKS02XrgH8nVTUkLkhyzamidkfFgEC+dU=; b=gg2YjvSNBfEGM/+D2GPbMiwB0maoP8gnZ10t9D0iIE2ik8zUBq+TS9HeaL6l61YqHF O037rdy6Om4MYT8qxv7g4IroMHffYd5CuuyvEikpZ7nFHw0MjKrebkupgpsamCdAh/YE xP45g2VFJxH2Ee6Rr/vuW9U3YEwcyvm+PeCcABW56eAKZ34eCtdnIjp+WpYAFfpGZnVJ CrUM2UuNcdJuZRtLMD3AllKv9WA79buAW8BDi/AadW24PLYWVoI22jtcD4bUAPZ/O7R2 PtUdfNHGzSKO/Zj2nF5YZvJ+I/NGyMLWBVEigKjXDiW1Rlxx9ZahQ8m0p2Wu1KtfvGiP Vz4Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696017906; x=1696622706; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=1+C6pSyWvckKS02XrgH8nVTUkLkhyzamidkfFgEC+dU=; b=cll2sliKMOPHaQXtGsYCCfd32wlyp7egXntQbztNjUWCMKgPwfH9cu5/c0/lvm+L00 122KMmj0elECUmwjlei11b56PGOgGFxYWo2/AX98c3JJX5KTa0Xjwbil2Iud2Osp7ltz JYC8S8N5J2+qFiEPaEpXcZOzxsYub3B9sXX2Hg1YSrZ5OSdOEV3eJhDcntRdC9s8nJLL +i4Xj/qj0SKvOJ4/sjK5Rb4wCH43KKsDj1YQLpnpxuSzpX8WweI/n21FFLvZLuEK5/o4 HLDXn9RVn8uoqV4m3AABm6z59ibVtzsy88pkzmQj/9Rt/T8/tceGBbSRXwwa2T9MIJAx ylAg== X-Gm-Message-State: AOJu0YxRwSnf29/VpVzFTCLyyY84BdcvKS5gEfIZcakUA4bOTomUsto1 uRsqdKmNOFzIhdqbn3zsH8KqPbOJnAVi9A== X-Google-Smtp-Source: AGHT+IGJ+S6yFg4aEZwP83U4advV3Cn9Gn0Hi4//WIu5Rf0fdDI9kRJgzC8YE6uzf1EkHdUXLr48ZQ== X-Received: by 2002:a67:cf0a:0:b0:44d:5b62:bcd5 with SMTP id y10-20020a67cf0a000000b0044d5b62bcd5mr5597660vsl.23.1696017905087; Fri, 29 Sep 2023 13:05:05 -0700 (PDT) Received: from build.lan ([174.112.183.231]) by smtp.gmail.com with ESMTPSA id t28-20020a0cb39c000000b0065cffe12ae9sm2115848qve.36.2023.09.29.13.05.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Sep 2023 13:05:04 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 07/10] linux-yocto: introduce 6.5 reference kernel recipes Date: Fri, 29 Sep 2023 16:04:51 -0400 Message-Id: <8a473733c5c49b857d084bbacad5dd4244229530.1696017123.git.bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 29 Sep 2023 20:05:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188427 From: Bruce Ashfield The v6.4 kernel series has been EOLd upstream, so it isn't a suitable "latest" reference kernel for the release. The -dev kernel has previously tested 6.5, so we know that core sanity is acceptable. We introduce the 6.5 kernel recipes to go along with a -dev of 6.6 and LTS of v6.1 Testing against all arches and refernce BSPs has passed. Signed-off-by: Bruce Ashfield --- .../linux/cve-exclusion_6.5.inc | 5072 +++++++++++++++++ .../linux/linux-yocto-rt_6.5.bb | 48 + .../linux/linux-yocto-tiny_6.5.bb | 33 + meta/recipes-kernel/linux/linux-yocto_6.5.bb | 72 + 4 files changed, 5225 insertions(+) create mode 100644 meta/recipes-kernel/linux/cve-exclusion_6.5.inc create mode 100644 meta/recipes-kernel/linux/linux-yocto-rt_6.5.bb create mode 100644 meta/recipes-kernel/linux/linux-yocto-tiny_6.5.bb create mode 100644 meta/recipes-kernel/linux/linux-yocto_6.5.bb diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.5.inc b/meta/recipes-kernel/linux/cve-exclusion_6.5.inc new file mode 100644 index 0000000000..c88b6f7c59 --- /dev/null +++ b/meta/recipes-kernel/linux/cve-exclusion_6.5.inc @@ -0,0 +1,5072 @@ + +# Auto-generated CVE metadata, DO NOT EDIT BY HAND. +# Generated at 2023-09-29 00:20:42.494116+00:00 for version 6.5.5 + +python check_kernel_cve_status_version() { + this_version = "6.5.5" + kernel_version = d.getVar("LINUX_VERSION") + if kernel_version != this_version: + bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) +} +do_cve_check[prefuncs] += "check_kernel_cve_status_version" + +CVE_STATUS[CVE-2003-1604] = "fixed-version: Fixed from version 2.6.12rc2" + +CVE_STATUS[CVE-2004-0230] = "fixed-version: Fixed from version 3.6rc1" + +# CVE-2005-3660 has no known resolution + +CVE_STATUS[CVE-2006-3635] = "fixed-version: Fixed from version 2.6.26rc5" + +CVE_STATUS[CVE-2006-5331] = "fixed-version: Fixed from version 2.6.19rc3" + +CVE_STATUS[CVE-2006-6128] = "fixed-version: Fixed from version 2.6.19rc2" + +# CVE-2007-3719 has no known resolution + +CVE_STATUS[CVE-2007-4774] = "fixed-version: Fixed from version 2.6.12rc2" + +CVE_STATUS[CVE-2007-6761] = "fixed-version: Fixed from version 2.6.24rc6" + +CVE_STATUS[CVE-2007-6762] = "fixed-version: Fixed from version 2.6.20rc5" + +# CVE-2008-2544 has no known resolution + +# CVE-2008-4609 has no known resolution + +CVE_STATUS[CVE-2008-7316] = "fixed-version: Fixed from version 2.6.25rc1" + +CVE_STATUS[CVE-2009-2692] = "fixed-version: Fixed from version 2.6.31rc6" + +CVE_STATUS[CVE-2010-0008] = "fixed-version: Fixed from version 2.6.23rc9" + +CVE_STATUS[CVE-2010-3432] = "fixed-version: Fixed from version 2.6.36rc5" + +# CVE-2010-4563 has no known resolution + +CVE_STATUS[CVE-2010-4648] = "fixed-version: Fixed from version 2.6.37rc6" + +CVE_STATUS[CVE-2010-5313] = "fixed-version: Fixed from version 2.6.38rc1" + +# CVE-2010-5321 has no known resolution + +CVE_STATUS[CVE-2010-5328] = "fixed-version: Fixed from version 2.6.35rc1" + +CVE_STATUS[CVE-2010-5329] = "fixed-version: Fixed from version 2.6.39rc1" + +CVE_STATUS[CVE-2010-5331] = "fixed-version: Fixed from version 2.6.34rc7" + +CVE_STATUS[CVE-2010-5332] = "fixed-version: Fixed from version 2.6.37rc1" + +CVE_STATUS[CVE-2011-4098] = "fixed-version: Fixed from version 3.2rc1" + +CVE_STATUS[CVE-2011-4131] = "fixed-version: Fixed from version 3.3rc1" + +CVE_STATUS[CVE-2011-4915] = "fixed-version: Fixed from version 3.2rc1" + +# CVE-2011-4916 has no known resolution + +# CVE-2011-4917 has no known resolution + +CVE_STATUS[CVE-2011-5321] = "fixed-version: Fixed from version 3.2rc1" + +CVE_STATUS[CVE-2011-5327] = "fixed-version: Fixed from version 3.1rc1" + +CVE_STATUS[CVE-2012-0957] = "fixed-version: Fixed from version 3.7rc2" + +CVE_STATUS[CVE-2012-2119] = "fixed-version: Fixed from version 3.5rc1" + +CVE_STATUS[CVE-2012-2136] = "fixed-version: Fixed from version 3.5rc1" + +CVE_STATUS[CVE-2012-2137] = "fixed-version: Fixed from version 3.5rc2" + +CVE_STATUS[CVE-2012-2313] = "fixed-version: Fixed from version 3.4rc6" + +CVE_STATUS[CVE-2012-2319] = "fixed-version: Fixed from version 3.4rc6" + +CVE_STATUS[CVE-2012-2372] = "fixed-version: Fixed from version 3.13rc4" + +CVE_STATUS[CVE-2012-2375] = "fixed-version: Fixed from version 3.4rc1" + +CVE_STATUS[CVE-2012-2390] = "fixed-version: Fixed from version 3.5rc1" + +CVE_STATUS[CVE-2012-2669] = "fixed-version: Fixed from version 3.5rc4" + +CVE_STATUS[CVE-2012-2744] = "fixed-version: Fixed from version 2.6.34rc1" + +CVE_STATUS[CVE-2012-2745] = "fixed-version: Fixed from version 3.4rc3" + +CVE_STATUS[CVE-2012-3364] = "fixed-version: Fixed from version 3.5rc6" + +CVE_STATUS[CVE-2012-3375] = "fixed-version: Fixed from version 3.4rc5" + +CVE_STATUS[CVE-2012-3400] = "fixed-version: Fixed from version 3.5rc5" + +CVE_STATUS[CVE-2012-3412] = "fixed-version: Fixed from version 3.6rc2" + +CVE_STATUS[CVE-2012-3430] = "fixed-version: Fixed from version 3.6rc1" + +CVE_STATUS[CVE-2012-3510] = "fixed-version: Fixed from version 2.6.19rc4" + +CVE_STATUS[CVE-2012-3511] = "fixed-version: Fixed from version 3.5rc6" + +CVE_STATUS[CVE-2012-3520] = "fixed-version: Fixed from version 3.6rc3" + +CVE_STATUS[CVE-2012-3552] = "fixed-version: Fixed from version 3.0rc1" + +# Skipping CVE-2012-4220, no affected_versions + +# Skipping CVE-2012-4221, no affected_versions + +# Skipping CVE-2012-4222, no affected_versions + +CVE_STATUS[CVE-2012-4398] = "fixed-version: Fixed from version 3.4rc1" + +CVE_STATUS[CVE-2012-4444] = "fixed-version: Fixed from version 2.6.36rc4" + +CVE_STATUS[CVE-2012-4461] = "fixed-version: Fixed from version 3.7rc6" + +CVE_STATUS[CVE-2012-4467] = "fixed-version: Fixed from version 3.6rc5" + +CVE_STATUS[CVE-2012-4508] = "fixed-version: Fixed from version 3.7rc3" + +CVE_STATUS[CVE-2012-4530] = "fixed-version: Fixed from version 3.8rc1" + +# CVE-2012-4542 has no known resolution + +CVE_STATUS[CVE-2012-4565] = "fixed-version: Fixed from version 3.7rc4" + +CVE_STATUS[CVE-2012-5374] = "fixed-version: Fixed from version 3.8rc1" + +CVE_STATUS[CVE-2012-5375] = "fixed-version: Fixed from version 3.8rc1" + +CVE_STATUS[CVE-2012-5517] = "fixed-version: Fixed from version 3.6rc1" + +CVE_STATUS[CVE-2012-6536] = "fixed-version: Fixed from version 3.6rc7" + +CVE_STATUS[CVE-2012-6537] = "fixed-version: Fixed from version 3.6rc7" + +CVE_STATUS[CVE-2012-6538] = "fixed-version: Fixed from version 3.6rc7" + +CVE_STATUS[CVE-2012-6539] = "fixed-version: Fixed from version 3.6rc3" + +CVE_STATUS[CVE-2012-6540] = "fixed-version: Fixed from version 3.6rc3" + +CVE_STATUS[CVE-2012-6541] = "fixed-version: Fixed from version 3.6rc3" + +CVE_STATUS[CVE-2012-6542] = "fixed-version: Fixed from version 3.6rc3" + +CVE_STATUS[CVE-2012-6543] = "fixed-version: Fixed from version 3.6rc3" + +CVE_STATUS[CVE-2012-6544] = "fixed-version: Fixed from version 3.6rc3" + +CVE_STATUS[CVE-2012-6545] = "fixed-version: Fixed from version 3.6rc3" + +CVE_STATUS[CVE-2012-6546] = "fixed-version: Fixed from version 3.6rc3" + +CVE_STATUS[CVE-2012-6547] = "fixed-version: Fixed from version 3.6rc1" + +CVE_STATUS[CVE-2012-6548] = "fixed-version: Fixed from version 3.6rc1" + +CVE_STATUS[CVE-2012-6549] = "fixed-version: Fixed from version 3.6rc1" + +CVE_STATUS[CVE-2012-6638] = "fixed-version: Fixed from version 3.3rc1" + +CVE_STATUS[CVE-2012-6647] = "fixed-version: Fixed from version 3.6rc2" + +CVE_STATUS[CVE-2012-6657] = "fixed-version: Fixed from version 3.6" + +CVE_STATUS[CVE-2012-6689] = "fixed-version: Fixed from version 3.6rc5" + +CVE_STATUS[CVE-2012-6701] = "fixed-version: Fixed from version 3.5rc1" + +CVE_STATUS[CVE-2012-6703] = "fixed-version: Fixed from version 3.7rc1" + +CVE_STATUS[CVE-2012-6704] = "fixed-version: Fixed from version 3.5rc1" + +CVE_STATUS[CVE-2012-6712] = "fixed-version: Fixed from version 3.4rc1" + +CVE_STATUS[CVE-2013-0160] = "fixed-version: Fixed from version 3.9rc1" + +CVE_STATUS[CVE-2013-0190] = "fixed-version: Fixed from version 3.8rc5" + +CVE_STATUS[CVE-2013-0216] = "fixed-version: Fixed from version 3.8rc7" + +CVE_STATUS[CVE-2013-0217] = "fixed-version: Fixed from version 3.8rc7" + +CVE_STATUS[CVE-2013-0228] = "fixed-version: Fixed from version 3.8" + +CVE_STATUS[CVE-2013-0231] = "fixed-version: Fixed from version 3.8rc7" + +CVE_STATUS[CVE-2013-0268] = "fixed-version: Fixed from version 3.8rc6" + +CVE_STATUS[CVE-2013-0290] = "fixed-version: Fixed from version 3.8" + +CVE_STATUS[CVE-2013-0309] = "fixed-version: Fixed from version 3.7rc1" + +CVE_STATUS[CVE-2013-0310] = "fixed-version: Fixed from version 3.5" + +CVE_STATUS[CVE-2013-0311] = "fixed-version: Fixed from version 3.7rc8" + +CVE_STATUS[CVE-2013-0313] = "fixed-version: Fixed from version 3.8rc5" + +CVE_STATUS[CVE-2013-0343] = "fixed-version: Fixed from version 3.11rc7" + +CVE_STATUS[CVE-2013-0349] = "fixed-version: Fixed from version 3.8rc6" + +CVE_STATUS[CVE-2013-0871] = "fixed-version: Fixed from version 3.8rc5" + +CVE_STATUS[CVE-2013-0913] = "fixed-version: Fixed from version 3.9rc4" + +CVE_STATUS[CVE-2013-0914] = "fixed-version: Fixed from version 3.9rc3" + +CVE_STATUS[CVE-2013-1059] = "fixed-version: Fixed from version 3.11rc1" + +CVE_STATUS[CVE-2013-1763] = "fixed-version: Fixed from version 3.9rc1" + +CVE_STATUS[CVE-2013-1767] = "fixed-version: Fixed from version 3.9rc1" + +CVE_STATUS[CVE-2013-1772] = "fixed-version: Fixed from version 3.5rc1" + +CVE_STATUS[CVE-2013-1773] = "fixed-version: Fixed from version 3.3rc1" + +CVE_STATUS[CVE-2013-1774] = "fixed-version: Fixed from version 3.8rc5" + +CVE_STATUS[CVE-2013-1792] = "fixed-version: Fixed from version 3.9rc3" + +CVE_STATUS[CVE-2013-1796] = "fixed-version: Fixed from version 3.9rc4" + +CVE_STATUS[CVE-2013-1797] = "fixed-version: Fixed from version 3.9rc4" + +CVE_STATUS[CVE-2013-1798] = "fixed-version: Fixed from version 3.9rc4" + +CVE_STATUS[CVE-2013-1819] = "fixed-version: Fixed from version 3.8rc6" + +CVE_STATUS[CVE-2013-1826] = "fixed-version: Fixed from version 3.6rc7" + +CVE_STATUS[CVE-2013-1827] = "fixed-version: Fixed from version 3.6rc3" + +CVE_STATUS[CVE-2013-1828] = "fixed-version: Fixed from version 3.9rc2" + +CVE_STATUS[CVE-2013-1848] = "fixed-version: Fixed from version 3.9rc3" + +CVE_STATUS[CVE-2013-1858] = "fixed-version: Fixed from version 3.9rc3" + +CVE_STATUS[CVE-2013-1860] = "fixed-version: Fixed from version 3.9rc3" + +CVE_STATUS[CVE-2013-1928] = "fixed-version: Fixed from version 3.7rc3" + +CVE_STATUS[CVE-2013-1929] = "fixed-version: Fixed from version 3.9rc6" + +# Skipping CVE-2013-1935, no affected_versions + +CVE_STATUS[CVE-2013-1943] = "fixed-version: Fixed from version 3.0rc1" + +CVE_STATUS[CVE-2013-1956] = "fixed-version: Fixed from version 3.9rc5" + +CVE_STATUS[CVE-2013-1957] = "fixed-version: Fixed from version 3.9rc5" + +CVE_STATUS[CVE-2013-1958] = "fixed-version: Fixed from version 3.9rc5" + +CVE_STATUS[CVE-2013-1959] = "fixed-version: Fixed from version 3.9rc7" + +CVE_STATUS[CVE-2013-1979] = "fixed-version: Fixed from version 3.9rc8" + +CVE_STATUS[CVE-2013-2015] = "fixed-version: Fixed from version 3.8rc2" + +CVE_STATUS[CVE-2013-2017] = "fixed-version: Fixed from version 2.6.34" + +CVE_STATUS[CVE-2013-2058] = "fixed-version: Fixed from version 3.8rc4" + +CVE_STATUS[CVE-2013-2094] = "fixed-version: Fixed from version 3.9rc8" + +CVE_STATUS[CVE-2013-2128] = "fixed-version: Fixed from version 2.6.34rc4" + +CVE_STATUS[CVE-2013-2140] = "fixed-version: Fixed from version 3.11rc3" + +CVE_STATUS[CVE-2013-2141] = "fixed-version: Fixed from version 3.9rc8" + +CVE_STATUS[CVE-2013-2146] = "fixed-version: Fixed from version 3.9rc8" + +CVE_STATUS[CVE-2013-2147] = "fixed-version: Fixed from version 3.12rc3" + +CVE_STATUS[CVE-2013-2148] = "fixed-version: Fixed from version 3.11rc1" + +CVE_STATUS[CVE-2013-2164] = "fixed-version: Fixed from version 3.11rc1" + +# Skipping CVE-2013-2188, no affected_versions + +CVE_STATUS[CVE-2013-2206] = "fixed-version: Fixed from version 3.9rc4" + +# Skipping CVE-2013-2224, no affected_versions + +CVE_STATUS[CVE-2013-2232] = "fixed-version: Fixed from version 3.10" + +CVE_STATUS[CVE-2013-2234] = "fixed-version: Fixed from version 3.10" + +CVE_STATUS[CVE-2013-2237] = "fixed-version: Fixed from version 3.9rc6" + +# Skipping CVE-2013-2239, no affected_versions + +CVE_STATUS[CVE-2013-2546] = "fixed-version: Fixed from version 3.9rc1" + +CVE_STATUS[CVE-2013-2547] = "fixed-version: Fixed from version 3.9rc1" + +CVE_STATUS[CVE-2013-2548] = "fixed-version: Fixed from version 3.9rc1" + +CVE_STATUS[CVE-2013-2596] = "fixed-version: Fixed from version 3.9rc8" + +CVE_STATUS[CVE-2013-2634] = "fixed-version: Fixed from version 3.9rc3" + +CVE_STATUS[CVE-2013-2635] = "fixed-version: Fixed from version 3.9rc3" + +CVE_STATUS[CVE-2013-2636] = "fixed-version: Fixed from version 3.9rc3" + +CVE_STATUS[CVE-2013-2850] = "fixed-version: Fixed from version 3.10rc4" + +CVE_STATUS[CVE-2013-2851] = "fixed-version: Fixed from version 3.11rc1" + +CVE_STATUS[CVE-2013-2852] = "fixed-version: Fixed from version 3.10rc6" + +CVE_STATUS[CVE-2013-2888] = "fixed-version: Fixed from version 3.12rc1" + +CVE_STATUS[CVE-2013-2889] = "fixed-version: Fixed from version 3.12rc2" + +CVE_STATUS[CVE-2013-2890] = "fixed-version: Fixed from version 3.12rc2" + +CVE_STATUS[CVE-2013-2891] = "fixed-version: Fixed from version 3.12rc2" + +CVE_STATUS[CVE-2013-2892] = "fixed-version: Fixed from version 3.12rc1" + +CVE_STATUS[CVE-2013-2893] = "fixed-version: Fixed from version 3.12rc2" + +CVE_STATUS[CVE-2013-2894] = "fixed-version: Fixed from version 3.12rc2" + +CVE_STATUS[CVE-2013-2895] = "fixed-version: Fixed from version 3.12rc2" + +CVE_STATUS[CVE-2013-2896] = "fixed-version: Fixed from version 3.12rc1" + +CVE_STATUS[CVE-2013-2897] = "fixed-version: Fixed from version 3.12rc2" + +CVE_STATUS[CVE-2013-2898] = "fixed-version: Fixed from version 3.12rc1" + +CVE_STATUS[CVE-2013-2899] = "fixed-version: Fixed from version 3.12rc1" + +CVE_STATUS[CVE-2013-2929] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-2930] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-3076] = "fixed-version: Fixed from version 3.9" + +CVE_STATUS[CVE-2013-3222] = "fixed-version: Fixed from version 3.9rc7" + +CVE_STATUS[CVE-2013-3223] = "fixed-version: Fixed from version 3.9rc7" + +CVE_STATUS[CVE-2013-3224] = "fixed-version: Fixed from version 3.9rc7" + +CVE_STATUS[CVE-2013-3225] = "fixed-version: Fixed from version 3.9rc7" + +CVE_STATUS[CVE-2013-3226] = "fixed-version: Fixed from version 3.9rc7" + +CVE_STATUS[CVE-2013-3227] = "fixed-version: Fixed from version 3.9rc7" + +CVE_STATUS[CVE-2013-3228] = "fixed-version: Fixed from version 3.9rc7" + +CVE_STATUS[CVE-2013-3229] = "fixed-version: Fixed from version 3.9rc7" + +CVE_STATUS[CVE-2013-3230] = "fixed-version: Fixed from version 3.9rc7" + +CVE_STATUS[CVE-2013-3231] = "fixed-version: Fixed from version 3.9rc7" + +CVE_STATUS[CVE-2013-3232] = "fixed-version: Fixed from version 3.9rc7" + +CVE_STATUS[CVE-2013-3233] = "fixed-version: Fixed from version 3.9rc7" + +CVE_STATUS[CVE-2013-3234] = "fixed-version: Fixed from version 3.9rc7" + +CVE_STATUS[CVE-2013-3235] = "fixed-version: Fixed from version 3.9rc7" + +CVE_STATUS[CVE-2013-3236] = "fixed-version: Fixed from version 3.9rc7" + +CVE_STATUS[CVE-2013-3237] = "fixed-version: Fixed from version 3.9rc7" + +CVE_STATUS[CVE-2013-3301] = "fixed-version: Fixed from version 3.9rc7" + +CVE_STATUS[CVE-2013-3302] = "fixed-version: Fixed from version 3.8rc3" + +CVE_STATUS[CVE-2013-4125] = "fixed-version: Fixed from version 3.11rc1" + +CVE_STATUS[CVE-2013-4127] = "fixed-version: Fixed from version 3.11rc1" + +CVE_STATUS[CVE-2013-4129] = "fixed-version: Fixed from version 3.11rc1" + +CVE_STATUS[CVE-2013-4162] = "fixed-version: Fixed from version 3.11rc1" + +CVE_STATUS[CVE-2013-4163] = "fixed-version: Fixed from version 3.11rc1" + +CVE_STATUS[CVE-2013-4205] = "fixed-version: Fixed from version 3.11rc5" + +CVE_STATUS[CVE-2013-4220] = "fixed-version: Fixed from version 3.10rc4" + +CVE_STATUS[CVE-2013-4247] = "fixed-version: Fixed from version 3.10rc5" + +CVE_STATUS[CVE-2013-4254] = "fixed-version: Fixed from version 3.11rc6" + +CVE_STATUS[CVE-2013-4270] = "fixed-version: Fixed from version 3.12rc4" + +CVE_STATUS[CVE-2013-4299] = "fixed-version: Fixed from version 3.12rc6" + +CVE_STATUS[CVE-2013-4300] = "fixed-version: Fixed from version 3.11" + +CVE_STATUS[CVE-2013-4312] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2013-4343] = "fixed-version: Fixed from version 3.12rc2" + +CVE_STATUS[CVE-2013-4345] = "fixed-version: Fixed from version 3.13rc2" + +CVE_STATUS[CVE-2013-4348] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-4350] = "fixed-version: Fixed from version 3.12rc2" + +CVE_STATUS[CVE-2013-4387] = "fixed-version: Fixed from version 3.12rc4" + +CVE_STATUS[CVE-2013-4470] = "fixed-version: Fixed from version 3.12rc7" + +CVE_STATUS[CVE-2013-4483] = "fixed-version: Fixed from version 3.10rc1" + +CVE_STATUS[CVE-2013-4511] = "fixed-version: Fixed from version 3.12" + +CVE_STATUS[CVE-2013-4512] = "fixed-version: Fixed from version 3.12" + +CVE_STATUS[CVE-2013-4513] = "fixed-version: Fixed from version 3.12" + +CVE_STATUS[CVE-2013-4514] = "fixed-version: Fixed from version 3.12" + +CVE_STATUS[CVE-2013-4515] = "fixed-version: Fixed from version 3.12" + +CVE_STATUS[CVE-2013-4516] = "fixed-version: Fixed from version 3.12" + +CVE_STATUS[CVE-2013-4563] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-4579] = "fixed-version: Fixed from version 3.13rc7" + +CVE_STATUS[CVE-2013-4587] = "fixed-version: Fixed from version 3.13rc4" + +CVE_STATUS[CVE-2013-4588] = "fixed-version: Fixed from version 2.6.33rc4" + +CVE_STATUS[CVE-2013-4591] = "fixed-version: Fixed from version 3.8rc1" + +CVE_STATUS[CVE-2013-4592] = "fixed-version: Fixed from version 3.7rc1" + +# Skipping CVE-2013-4737, no affected_versions + +# Skipping CVE-2013-4738, no affected_versions + +# Skipping CVE-2013-4739, no affected_versions + +CVE_STATUS[CVE-2013-5634] = "fixed-version: Fixed from version 3.10rc5" + +CVE_STATUS[CVE-2013-6282] = "fixed-version: Fixed from version 3.6rc6" + +CVE_STATUS[CVE-2013-6367] = "fixed-version: Fixed from version 3.13rc4" + +CVE_STATUS[CVE-2013-6368] = "fixed-version: Fixed from version 3.13rc4" + +CVE_STATUS[CVE-2013-6376] = "fixed-version: Fixed from version 3.13rc4" + +CVE_STATUS[CVE-2013-6378] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-6380] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-6381] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-6382] = "fixed-version: Fixed from version 3.13rc4" + +CVE_STATUS[CVE-2013-6383] = "fixed-version: Fixed from version 3.12" + +# Skipping CVE-2013-6392, no affected_versions + +CVE_STATUS[CVE-2013-6431] = "fixed-version: Fixed from version 3.12rc1" + +CVE_STATUS[CVE-2013-6432] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-6885] = "fixed-version: Fixed from version 3.14rc1" + +CVE_STATUS[CVE-2013-7026] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-7027] = "fixed-version: Fixed from version 3.12rc7" + +CVE_STATUS[CVE-2013-7263] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-7264] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-7265] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-7266] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-7267] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-7268] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-7269] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-7270] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-7271] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-7281] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-7339] = "fixed-version: Fixed from version 3.13rc7" + +CVE_STATUS[CVE-2013-7348] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2013-7421] = "fixed-version: Fixed from version 3.19rc1" + +# CVE-2013-7445 has no known resolution + +CVE_STATUS[CVE-2013-7446] = "fixed-version: Fixed from version 4.4rc4" + +CVE_STATUS[CVE-2013-7470] = "fixed-version: Fixed from version 3.12rc7" + +CVE_STATUS[CVE-2014-0038] = "fixed-version: Fixed from version 3.14rc1" + +CVE_STATUS[CVE-2014-0049] = "fixed-version: Fixed from version 3.14rc5" + +CVE_STATUS[CVE-2014-0055] = "fixed-version: Fixed from version 3.14" + +CVE_STATUS[CVE-2014-0069] = "fixed-version: Fixed from version 3.14rc4" + +CVE_STATUS[CVE-2014-0077] = "fixed-version: Fixed from version 3.14" + +CVE_STATUS[CVE-2014-0100] = "fixed-version: Fixed from version 3.14rc7" + +CVE_STATUS[CVE-2014-0101] = "fixed-version: Fixed from version 3.14rc6" + +CVE_STATUS[CVE-2014-0102] = "fixed-version: Fixed from version 3.14rc6" + +CVE_STATUS[CVE-2014-0131] = "fixed-version: Fixed from version 3.14rc7" + +CVE_STATUS[CVE-2014-0155] = "fixed-version: Fixed from version 3.15rc2" + +CVE_STATUS[CVE-2014-0181] = "fixed-version: Fixed from version 3.15rc5" + +CVE_STATUS[CVE-2014-0196] = "fixed-version: Fixed from version 3.15rc5" + +CVE_STATUS[CVE-2014-0203] = "fixed-version: Fixed from version 2.6.33rc5" + +CVE_STATUS[CVE-2014-0205] = "fixed-version: Fixed from version 2.6.37rc1" + +CVE_STATUS[CVE-2014-0206] = "fixed-version: Fixed from version 3.16rc3" + +# Skipping CVE-2014-0972, no affected_versions + +CVE_STATUS[CVE-2014-1438] = "fixed-version: Fixed from version 3.13" + +CVE_STATUS[CVE-2014-1444] = "fixed-version: Fixed from version 3.12rc7" + +CVE_STATUS[CVE-2014-1445] = "fixed-version: Fixed from version 3.12rc7" + +CVE_STATUS[CVE-2014-1446] = "fixed-version: Fixed from version 3.13rc7" + +CVE_STATUS[CVE-2014-1690] = "fixed-version: Fixed from version 3.13rc8" + +CVE_STATUS[CVE-2014-1737] = "fixed-version: Fixed from version 3.15rc5" + +CVE_STATUS[CVE-2014-1738] = "fixed-version: Fixed from version 3.15rc5" + +CVE_STATUS[CVE-2014-1739] = "fixed-version: Fixed from version 3.15rc6" + +CVE_STATUS[CVE-2014-1874] = "fixed-version: Fixed from version 3.14rc2" + +CVE_STATUS[CVE-2014-2038] = "fixed-version: Fixed from version 3.14rc1" + +CVE_STATUS[CVE-2014-2039] = "fixed-version: Fixed from version 3.14rc3" + +CVE_STATUS[CVE-2014-2309] = "fixed-version: Fixed from version 3.14rc7" + +CVE_STATUS[CVE-2014-2523] = "fixed-version: Fixed from version 3.14rc1" + +CVE_STATUS[CVE-2014-2568] = "fixed-version: Fixed from version 3.14" + +CVE_STATUS[CVE-2014-2580] = "fixed-version: Fixed from version 3.15rc1" + +CVE_STATUS[CVE-2014-2672] = "fixed-version: Fixed from version 3.14rc6" + +CVE_STATUS[CVE-2014-2673] = "fixed-version: Fixed from version 3.14rc6" + +CVE_STATUS[CVE-2014-2678] = "fixed-version: Fixed from version 3.15rc1" + +CVE_STATUS[CVE-2014-2706] = "fixed-version: Fixed from version 3.14rc6" + +CVE_STATUS[CVE-2014-2739] = "fixed-version: Fixed from version 3.15rc1" + +CVE_STATUS[CVE-2014-2851] = "fixed-version: Fixed from version 3.15rc2" + +CVE_STATUS[CVE-2014-2889] = "fixed-version: Fixed from version 3.2rc7" + +CVE_STATUS[CVE-2014-3122] = "fixed-version: Fixed from version 3.15rc1" + +CVE_STATUS[CVE-2014-3144] = "fixed-version: Fixed from version 3.15rc2" + +CVE_STATUS[CVE-2014-3145] = "fixed-version: Fixed from version 3.15rc2" + +CVE_STATUS[CVE-2014-3153] = "fixed-version: Fixed from version 3.15" + +CVE_STATUS[CVE-2014-3180] = "fixed-version: Fixed from version 3.17rc4" + +CVE_STATUS[CVE-2014-3181] = "fixed-version: Fixed from version 3.17rc3" + +CVE_STATUS[CVE-2014-3182] = "fixed-version: Fixed from version 3.17rc2" + +CVE_STATUS[CVE-2014-3183] = "fixed-version: Fixed from version 3.17rc2" + +CVE_STATUS[CVE-2014-3184] = "fixed-version: Fixed from version 3.17rc2" + +CVE_STATUS[CVE-2014-3185] = "fixed-version: Fixed from version 3.17rc3" + +CVE_STATUS[CVE-2014-3186] = "fixed-version: Fixed from version 3.17rc3" + +# Skipping CVE-2014-3519, no affected_versions + +CVE_STATUS[CVE-2014-3534] = "fixed-version: Fixed from version 3.16rc7" + +CVE_STATUS[CVE-2014-3535] = "fixed-version: Fixed from version 2.6.36rc1" + +CVE_STATUS[CVE-2014-3601] = "fixed-version: Fixed from version 3.17rc2" + +CVE_STATUS[CVE-2014-3610] = "fixed-version: Fixed from version 3.18rc2" + +CVE_STATUS[CVE-2014-3611] = "fixed-version: Fixed from version 3.18rc2" + +CVE_STATUS[CVE-2014-3631] = "fixed-version: Fixed from version 3.17rc5" + +CVE_STATUS[CVE-2014-3645] = "fixed-version: Fixed from version 3.12rc1" + +CVE_STATUS[CVE-2014-3646] = "fixed-version: Fixed from version 3.18rc2" + +CVE_STATUS[CVE-2014-3647] = "fixed-version: Fixed from version 3.18rc2" + +CVE_STATUS[CVE-2014-3673] = "fixed-version: Fixed from version 3.18rc1" + +CVE_STATUS[CVE-2014-3687] = "fixed-version: Fixed from version 3.18rc1" + +CVE_STATUS[CVE-2014-3688] = "fixed-version: Fixed from version 3.18rc1" + +CVE_STATUS[CVE-2014-3690] = "fixed-version: Fixed from version 3.18rc1" + +CVE_STATUS[CVE-2014-3917] = "fixed-version: Fixed from version 3.16rc1" + +CVE_STATUS[CVE-2014-3940] = "fixed-version: Fixed from version 3.15" + +CVE_STATUS[CVE-2014-4014] = "fixed-version: Fixed from version 3.16rc1" + +CVE_STATUS[CVE-2014-4027] = "fixed-version: Fixed from version 3.14rc1" + +CVE_STATUS[CVE-2014-4157] = "fixed-version: Fixed from version 3.15rc1" + +CVE_STATUS[CVE-2014-4171] = "fixed-version: Fixed from version 3.16rc3" + +# Skipping CVE-2014-4322, no affected_versions + +# Skipping CVE-2014-4323, no affected_versions + +CVE_STATUS[CVE-2014-4508] = "fixed-version: Fixed from version 3.16rc3" + +CVE_STATUS[CVE-2014-4608] = "fixed-version: Fixed from version 3.18rc1" + +CVE_STATUS[CVE-2014-4611] = "fixed-version: Fixed from version 3.16rc3" + +CVE_STATUS[CVE-2014-4652] = "fixed-version: Fixed from version 3.16rc2" + +CVE_STATUS[CVE-2014-4653] = "fixed-version: Fixed from version 3.16rc2" + +CVE_STATUS[CVE-2014-4654] = "fixed-version: Fixed from version 3.16rc2" + +CVE_STATUS[CVE-2014-4655] = "fixed-version: Fixed from version 3.16rc2" + +CVE_STATUS[CVE-2014-4656] = "fixed-version: Fixed from version 3.16rc2" + +CVE_STATUS[CVE-2014-4667] = "fixed-version: Fixed from version 3.16rc1" + +CVE_STATUS[CVE-2014-4699] = "fixed-version: Fixed from version 3.16rc4" + +CVE_STATUS[CVE-2014-4943] = "fixed-version: Fixed from version 3.16rc6" + +CVE_STATUS[CVE-2014-5045] = "fixed-version: Fixed from version 3.16rc7" + +CVE_STATUS[CVE-2014-5077] = "fixed-version: Fixed from version 3.16" + +CVE_STATUS[CVE-2014-5206] = "fixed-version: Fixed from version 3.17rc1" + +CVE_STATUS[CVE-2014-5207] = "fixed-version: Fixed from version 3.17rc1" + +# Skipping CVE-2014-5332, no affected_versions + +CVE_STATUS[CVE-2014-5471] = "fixed-version: Fixed from version 3.17rc2" + +CVE_STATUS[CVE-2014-5472] = "fixed-version: Fixed from version 3.17rc2" + +CVE_STATUS[CVE-2014-6410] = "fixed-version: Fixed from version 3.17rc5" + +CVE_STATUS[CVE-2014-6416] = "fixed-version: Fixed from version 3.17rc5" + +CVE_STATUS[CVE-2014-6417] = "fixed-version: Fixed from version 3.17rc5" + +CVE_STATUS[CVE-2014-6418] = "fixed-version: Fixed from version 3.17rc5" + +CVE_STATUS[CVE-2014-7145] = "fixed-version: Fixed from version 3.17rc2" + +# Skipping CVE-2014-7207, no affected_versions + +CVE_STATUS[CVE-2014-7283] = "fixed-version: Fixed from version 3.15rc1" + +CVE_STATUS[CVE-2014-7284] = "fixed-version: Fixed from version 3.15rc7" + +CVE_STATUS[CVE-2014-7822] = "fixed-version: Fixed from version 3.16rc1" + +CVE_STATUS[CVE-2014-7825] = "fixed-version: Fixed from version 3.18rc3" + +CVE_STATUS[CVE-2014-7826] = "fixed-version: Fixed from version 3.18rc3" + +CVE_STATUS[CVE-2014-7841] = "fixed-version: Fixed from version 3.18rc5" + +CVE_STATUS[CVE-2014-7842] = "fixed-version: Fixed from version 3.18rc1" + +CVE_STATUS[CVE-2014-7843] = "fixed-version: Fixed from version 3.18rc5" + +CVE_STATUS[CVE-2014-7970] = "fixed-version: Fixed from version 3.18rc1" + +CVE_STATUS[CVE-2014-7975] = "fixed-version: Fixed from version 3.18rc1" + +CVE_STATUS[CVE-2014-8086] = "fixed-version: Fixed from version 3.18rc3" + +CVE_STATUS[CVE-2014-8133] = "fixed-version: Fixed from version 3.19rc1" + +CVE_STATUS[CVE-2014-8134] = "fixed-version: Fixed from version 3.19rc1" + +CVE_STATUS[CVE-2014-8159] = "fixed-version: Fixed from version 4.0rc7" + +CVE_STATUS[CVE-2014-8160] = "fixed-version: Fixed from version 3.18rc1" + +CVE_STATUS[CVE-2014-8171] = "fixed-version: Fixed from version 3.12rc1" + +CVE_STATUS[CVE-2014-8172] = "fixed-version: Fixed from version 3.13rc1" + +CVE_STATUS[CVE-2014-8173] = "fixed-version: Fixed from version 3.13rc5" + +# Skipping CVE-2014-8181, no affected_versions + +CVE_STATUS[CVE-2014-8369] = "fixed-version: Fixed from version 3.18rc2" + +CVE_STATUS[CVE-2014-8480] = "fixed-version: Fixed from version 3.18rc2" + +CVE_STATUS[CVE-2014-8481] = "fixed-version: Fixed from version 3.18rc2" + +CVE_STATUS[CVE-2014-8559] = "fixed-version: Fixed from version 3.19rc1" + +CVE_STATUS[CVE-2014-8709] = "fixed-version: Fixed from version 3.14rc3" + +CVE_STATUS[CVE-2014-8884] = "fixed-version: Fixed from version 3.18rc1" + +CVE_STATUS[CVE-2014-8989] = "fixed-version: Fixed from version 3.19rc1" + +CVE_STATUS[CVE-2014-9090] = "fixed-version: Fixed from version 3.18rc6" + +CVE_STATUS[CVE-2014-9322] = "fixed-version: Fixed from version 3.18rc6" + +CVE_STATUS[CVE-2014-9419] = "fixed-version: Fixed from version 3.19rc1" + +CVE_STATUS[CVE-2014-9420] = "fixed-version: Fixed from version 3.19rc1" + +CVE_STATUS[CVE-2014-9428] = "fixed-version: Fixed from version 3.19rc3" + +CVE_STATUS[CVE-2014-9529] = "fixed-version: Fixed from version 3.19rc4" + +CVE_STATUS[CVE-2014-9584] = "fixed-version: Fixed from version 3.19rc3" + +CVE_STATUS[CVE-2014-9585] = "fixed-version: Fixed from version 3.19rc4" + +CVE_STATUS[CVE-2014-9644] = "fixed-version: Fixed from version 3.19rc1" + +CVE_STATUS[CVE-2014-9683] = "fixed-version: Fixed from version 3.19rc1" + +CVE_STATUS[CVE-2014-9710] = "fixed-version: Fixed from version 3.19rc1" + +CVE_STATUS[CVE-2014-9715] = "fixed-version: Fixed from version 3.15rc1" + +CVE_STATUS[CVE-2014-9717] = "fixed-version: Fixed from version 4.1rc1" + +CVE_STATUS[CVE-2014-9728] = "fixed-version: Fixed from version 3.19rc3" + +CVE_STATUS[CVE-2014-9729] = "fixed-version: Fixed from version 3.19rc3" + +CVE_STATUS[CVE-2014-9730] = "fixed-version: Fixed from version 3.19rc3" + +CVE_STATUS[CVE-2014-9731] = "fixed-version: Fixed from version 3.19rc3" + +# Skipping CVE-2014-9777, no affected_versions + +# Skipping CVE-2014-9778, no affected_versions + +# Skipping CVE-2014-9779, no affected_versions + +# Skipping CVE-2014-9780, no affected_versions + +# Skipping CVE-2014-9781, no affected_versions + +# Skipping CVE-2014-9782, no affected_versions + +# Skipping CVE-2014-9783, no affected_versions + +# Skipping CVE-2014-9784, no affected_versions + +# Skipping CVE-2014-9785, no affected_versions + +# Skipping CVE-2014-9786, no affected_versions + +# Skipping CVE-2014-9787, no affected_versions + +# Skipping CVE-2014-9788, no affected_versions + +# Skipping CVE-2014-9789, no affected_versions + +CVE_STATUS[CVE-2014-9803] = "fixed-version: Fixed from version 3.16rc1" + +# Skipping CVE-2014-9863, no affected_versions + +# Skipping CVE-2014-9864, no affected_versions + +# Skipping CVE-2014-9865, no affected_versions + +# Skipping CVE-2014-9866, no affected_versions + +# Skipping CVE-2014-9867, no affected_versions + +# Skipping CVE-2014-9868, no affected_versions + +# Skipping CVE-2014-9869, no affected_versions + +CVE_STATUS[CVE-2014-9870] = "fixed-version: Fixed from version 3.11rc1" + +# Skipping CVE-2014-9871, no affected_versions + +# Skipping CVE-2014-9872, no affected_versions + +# Skipping CVE-2014-9873, no affected_versions + +# Skipping CVE-2014-9874, no affected_versions + +# Skipping CVE-2014-9875, no affected_versions + +# Skipping CVE-2014-9876, no affected_versions + +# Skipping CVE-2014-9877, no affected_versions + +# Skipping CVE-2014-9878, no affected_versions + +# Skipping CVE-2014-9879, no affected_versions + +# Skipping CVE-2014-9880, no affected_versions + +# Skipping CVE-2014-9881, no affected_versions + +# Skipping CVE-2014-9882, no affected_versions + +# Skipping CVE-2014-9883, no affected_versions + +# Skipping CVE-2014-9884, no affected_versions + +# Skipping CVE-2014-9885, no affected_versions + +# Skipping CVE-2014-9886, no affected_versions + +# Skipping CVE-2014-9887, no affected_versions + +CVE_STATUS[CVE-2014-9888] = "fixed-version: Fixed from version 3.13rc1" + +# Skipping CVE-2014-9889, no affected_versions + +# Skipping CVE-2014-9890, no affected_versions + +# Skipping CVE-2014-9891, no affected_versions + +# Skipping CVE-2014-9892, no affected_versions + +# Skipping CVE-2014-9893, no affected_versions + +# Skipping CVE-2014-9894, no affected_versions + +CVE_STATUS[CVE-2014-9895] = "fixed-version: Fixed from version 3.11rc1" + +# Skipping CVE-2014-9896, no affected_versions + +# Skipping CVE-2014-9897, no affected_versions + +# Skipping CVE-2014-9898, no affected_versions + +# Skipping CVE-2014-9899, no affected_versions + +# Skipping CVE-2014-9900, no affected_versions + +CVE_STATUS[CVE-2014-9903] = "fixed-version: Fixed from version 3.14rc4" + +CVE_STATUS[CVE-2014-9904] = "fixed-version: Fixed from version 3.17rc1" + +CVE_STATUS[CVE-2014-9914] = "fixed-version: Fixed from version 3.16rc1" + +CVE_STATUS[CVE-2014-9922] = "fixed-version: Fixed from version 3.18rc2" + +CVE_STATUS[CVE-2014-9940] = "fixed-version: Fixed from version 3.19rc1" + +CVE_STATUS[CVE-2015-0239] = "fixed-version: Fixed from version 3.19rc6" + +CVE_STATUS[CVE-2015-0274] = "fixed-version: Fixed from version 3.15rc5" + +CVE_STATUS[CVE-2015-0275] = "fixed-version: Fixed from version 4.1rc1" + +# Skipping CVE-2015-0777, no affected_versions + +# Skipping CVE-2015-1328, no affected_versions + +CVE_STATUS[CVE-2015-1333] = "fixed-version: Fixed from version 4.2rc5" + +CVE_STATUS[CVE-2015-1339] = "fixed-version: Fixed from version 4.4rc5" + +CVE_STATUS[CVE-2015-1350] = "fixed-version: Fixed from version 4.9rc1" + +CVE_STATUS[CVE-2015-1420] = "fixed-version: Fixed from version 4.1rc7" + +CVE_STATUS[CVE-2015-1421] = "fixed-version: Fixed from version 3.19rc7" + +CVE_STATUS[CVE-2015-1465] = "fixed-version: Fixed from version 3.19rc7" + +CVE_STATUS[CVE-2015-1573] = "fixed-version: Fixed from version 3.19rc5" + +CVE_STATUS[CVE-2015-1593] = "fixed-version: Fixed from version 4.0rc1" + +CVE_STATUS[CVE-2015-1805] = "fixed-version: Fixed from version 3.16rc1" + +CVE_STATUS[CVE-2015-2041] = "fixed-version: Fixed from version 3.19rc7" + +CVE_STATUS[CVE-2015-2042] = "fixed-version: Fixed from version 3.19" + +CVE_STATUS[CVE-2015-2150] = "fixed-version: Fixed from version 4.0rc4" + +CVE_STATUS[CVE-2015-2666] = "fixed-version: Fixed from version 4.0rc1" + +CVE_STATUS[CVE-2015-2672] = "fixed-version: Fixed from version 4.0rc3" + +CVE_STATUS[CVE-2015-2686] = "fixed-version: Fixed from version 4.0rc6" + +CVE_STATUS[CVE-2015-2830] = "fixed-version: Fixed from version 4.0rc3" + +# CVE-2015-2877 has no known resolution + +CVE_STATUS[CVE-2015-2922] = "fixed-version: Fixed from version 4.0rc7" + +CVE_STATUS[CVE-2015-2925] = "fixed-version: Fixed from version 4.3rc1" + +CVE_STATUS[CVE-2015-3212] = "fixed-version: Fixed from version 4.2rc1" + +CVE_STATUS[CVE-2015-3214] = "fixed-version: Fixed from version 2.6.33rc8" + +CVE_STATUS[CVE-2015-3288] = "fixed-version: Fixed from version 4.2rc2" + +CVE_STATUS[CVE-2015-3290] = "fixed-version: Fixed from version 4.2rc3" + +CVE_STATUS[CVE-2015-3291] = "fixed-version: Fixed from version 4.2rc3" + +CVE_STATUS[CVE-2015-3331] = "fixed-version: Fixed from version 4.0rc5" + +# Skipping CVE-2015-3332, no affected_versions + +CVE_STATUS[CVE-2015-3339] = "fixed-version: Fixed from version 4.1rc1" + +CVE_STATUS[CVE-2015-3636] = "fixed-version: Fixed from version 4.1rc2" + +CVE_STATUS[CVE-2015-4001] = "fixed-version: Fixed from version 4.1rc7" + +CVE_STATUS[CVE-2015-4002] = "fixed-version: Fixed from version 4.1rc7" + +CVE_STATUS[CVE-2015-4003] = "fixed-version: Fixed from version 4.1rc7" + +CVE_STATUS[CVE-2015-4004] = "fixed-version: Fixed from version 4.3rc1" + +CVE_STATUS[CVE-2015-4036] = "fixed-version: Fixed from version 4.0rc1" + +CVE_STATUS[CVE-2015-4167] = "fixed-version: Fixed from version 4.0rc1" + +CVE_STATUS[CVE-2015-4170] = "fixed-version: Fixed from version 3.13rc5" + +CVE_STATUS[CVE-2015-4176] = "fixed-version: Fixed from version 4.1rc1" + +CVE_STATUS[CVE-2015-4177] = "fixed-version: Fixed from version 4.1rc1" + +CVE_STATUS[CVE-2015-4178] = "fixed-version: Fixed from version 4.1rc1" + +CVE_STATUS[CVE-2015-4692] = "fixed-version: Fixed from version 4.2rc1" + +CVE_STATUS[CVE-2015-4700] = "fixed-version: Fixed from version 4.1rc6" + +CVE_STATUS[CVE-2015-5156] = "fixed-version: Fixed from version 4.2rc7" + +CVE_STATUS[CVE-2015-5157] = "fixed-version: Fixed from version 4.2rc3" + +CVE_STATUS[CVE-2015-5257] = "fixed-version: Fixed from version 4.3rc3" + +CVE_STATUS[CVE-2015-5283] = "fixed-version: Fixed from version 4.3rc3" + +CVE_STATUS[CVE-2015-5307] = "fixed-version: Fixed from version 4.4rc1" + +CVE_STATUS[CVE-2015-5327] = "fixed-version: Fixed from version 4.4rc1" + +CVE_STATUS[CVE-2015-5364] = "fixed-version: Fixed from version 4.1rc7" + +CVE_STATUS[CVE-2015-5366] = "fixed-version: Fixed from version 4.1rc7" + +CVE_STATUS[CVE-2015-5697] = "fixed-version: Fixed from version 4.2rc6" + +CVE_STATUS[CVE-2015-5706] = "fixed-version: Fixed from version 4.1rc3" + +CVE_STATUS[CVE-2015-5707] = "fixed-version: Fixed from version 4.1rc1" + +CVE_STATUS[CVE-2015-6252] = "fixed-version: Fixed from version 4.2rc5" + +CVE_STATUS[CVE-2015-6526] = "fixed-version: Fixed from version 4.1rc1" + +# CVE-2015-6619 has no known resolution + +# CVE-2015-6646 has no known resolution + +CVE_STATUS[CVE-2015-6937] = "fixed-version: Fixed from version 4.3rc1" + +# Skipping CVE-2015-7312, no affected_versions + +CVE_STATUS[CVE-2015-7509] = "fixed-version: Fixed from version 3.7rc1" + +CVE_STATUS[CVE-2015-7513] = "fixed-version: Fixed from version 4.4rc7" + +CVE_STATUS[CVE-2015-7515] = "fixed-version: Fixed from version 4.4rc6" + +CVE_STATUS[CVE-2015-7550] = "fixed-version: Fixed from version 4.4rc8" + +# Skipping CVE-2015-7553, no affected_versions + +CVE_STATUS[CVE-2015-7566] = "fixed-version: Fixed from version 4.5rc2" + +CVE_STATUS[CVE-2015-7613] = "fixed-version: Fixed from version 4.3rc4" + +CVE_STATUS[CVE-2015-7799] = "fixed-version: Fixed from version 4.4rc1" + +CVE_STATUS[CVE-2015-7833] = "fixed-version: Fixed from version 4.6rc6" + +# Skipping CVE-2015-7837, no affected_versions + +CVE_STATUS[CVE-2015-7872] = "fixed-version: Fixed from version 4.3rc7" + +CVE_STATUS[CVE-2015-7884] = "fixed-version: Fixed from version 4.4rc1" + +CVE_STATUS[CVE-2015-7885] = "fixed-version: Fixed from version 4.4rc1" + +CVE_STATUS[CVE-2015-7990] = "fixed-version: Fixed from version 4.4rc4" + +# Skipping CVE-2015-8019, no affected_versions + +CVE_STATUS[CVE-2015-8104] = "fixed-version: Fixed from version 4.4rc1" + +CVE_STATUS[CVE-2015-8215] = "fixed-version: Fixed from version 4.0rc3" + +CVE_STATUS[CVE-2015-8324] = "fixed-version: Fixed from version 2.6.34rc1" + +CVE_STATUS[CVE-2015-8374] = "fixed-version: Fixed from version 4.4rc1" + +CVE_STATUS[CVE-2015-8539] = "fixed-version: Fixed from version 4.4rc3" + +CVE_STATUS[CVE-2015-8543] = "fixed-version: Fixed from version 4.4rc6" + +CVE_STATUS[CVE-2015-8550] = "fixed-version: Fixed from version 4.4rc6" + +CVE_STATUS[CVE-2015-8551] = "fixed-version: Fixed from version 4.4rc6" + +CVE_STATUS[CVE-2015-8552] = "fixed-version: Fixed from version 4.4rc6" + +CVE_STATUS[CVE-2015-8553] = "fixed-version: Fixed from version 4.4rc6" + +CVE_STATUS[CVE-2015-8569] = "fixed-version: Fixed from version 4.4rc6" + +CVE_STATUS[CVE-2015-8575] = "fixed-version: Fixed from version 4.4rc6" + +CVE_STATUS[CVE-2015-8660] = "fixed-version: Fixed from version 4.4rc4" + +CVE_STATUS[CVE-2015-8709] = "fixed-version: Fixed from version 4.10rc1" + +CVE_STATUS[CVE-2015-8746] = "fixed-version: Fixed from version 4.3rc1" + +CVE_STATUS[CVE-2015-8767] = "fixed-version: Fixed from version 4.3rc4" + +CVE_STATUS[CVE-2015-8785] = "fixed-version: Fixed from version 4.4rc5" + +CVE_STATUS[CVE-2015-8787] = "fixed-version: Fixed from version 4.4rc1" + +CVE_STATUS[CVE-2015-8812] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2015-8816] = "fixed-version: Fixed from version 4.4rc6" + +CVE_STATUS[CVE-2015-8830] = "fixed-version: Fixed from version 4.1rc1" + +CVE_STATUS[CVE-2015-8839] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2015-8844] = "fixed-version: Fixed from version 4.4rc3" + +CVE_STATUS[CVE-2015-8845] = "fixed-version: Fixed from version 4.4rc3" + +# Skipping CVE-2015-8937, no affected_versions + +# Skipping CVE-2015-8938, no affected_versions + +# Skipping CVE-2015-8939, no affected_versions + +# Skipping CVE-2015-8940, no affected_versions + +# Skipping CVE-2015-8941, no affected_versions + +# Skipping CVE-2015-8942, no affected_versions + +# Skipping CVE-2015-8943, no affected_versions + +# Skipping CVE-2015-8944, no affected_versions + +CVE_STATUS[CVE-2015-8950] = "fixed-version: Fixed from version 4.1rc2" + +CVE_STATUS[CVE-2015-8952] = "fixed-version: Fixed from version 4.6rc1" + +CVE_STATUS[CVE-2015-8953] = "fixed-version: Fixed from version 4.3" + +CVE_STATUS[CVE-2015-8955] = "fixed-version: Fixed from version 4.1rc1" + +CVE_STATUS[CVE-2015-8956] = "fixed-version: Fixed from version 4.2rc1" + +CVE_STATUS[CVE-2015-8961] = "fixed-version: Fixed from version 4.4rc1" + +CVE_STATUS[CVE-2015-8962] = "fixed-version: Fixed from version 4.4rc1" + +CVE_STATUS[CVE-2015-8963] = "fixed-version: Fixed from version 4.4" + +CVE_STATUS[CVE-2015-8964] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2015-8966] = "fixed-version: Fixed from version 4.4rc8" + +CVE_STATUS[CVE-2015-8967] = "fixed-version: Fixed from version 4.0rc1" + +CVE_STATUS[CVE-2015-8970] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2015-9004] = "fixed-version: Fixed from version 3.19rc7" + +CVE_STATUS[CVE-2015-9016] = "fixed-version: Fixed from version 4.3rc1" + +CVE_STATUS[CVE-2015-9289] = "fixed-version: Fixed from version 4.2rc1" + +CVE_STATUS[CVE-2016-0617] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2016-0723] = "fixed-version: Fixed from version 4.5rc2" + +CVE_STATUS[CVE-2016-0728] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2016-0758] = "fixed-version: Fixed from version 4.6" + +# Skipping CVE-2016-0774, no affected_versions + +CVE_STATUS[CVE-2016-0821] = "fixed-version: Fixed from version 4.3rc1" + +CVE_STATUS[CVE-2016-0823] = "fixed-version: Fixed from version 4.0rc5" + +CVE_STATUS[CVE-2016-10044] = "fixed-version: Fixed from version 4.8rc7" + +CVE_STATUS[CVE-2016-10088] = "fixed-version: Fixed from version 4.10rc1" + +CVE_STATUS[CVE-2016-10147] = "fixed-version: Fixed from version 4.9" + +CVE_STATUS[CVE-2016-10150] = "fixed-version: Fixed from version 4.9rc8" + +CVE_STATUS[CVE-2016-10153] = "fixed-version: Fixed from version 4.10rc1" + +CVE_STATUS[CVE-2016-10154] = "fixed-version: Fixed from version 4.10rc1" + +CVE_STATUS[CVE-2016-10200] = "fixed-version: Fixed from version 4.9rc7" + +CVE_STATUS[CVE-2016-10208] = "fixed-version: Fixed from version 4.10rc1" + +CVE_STATUS[CVE-2016-10229] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2016-10318] = "fixed-version: Fixed from version 4.8rc6" + +CVE_STATUS[CVE-2016-10723] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2016-10741] = "fixed-version: Fixed from version 4.10rc1" + +CVE_STATUS[CVE-2016-10764] = "fixed-version: Fixed from version 4.10rc1" + +CVE_STATUS[CVE-2016-10905] = "fixed-version: Fixed from version 4.8rc1" + +CVE_STATUS[CVE-2016-10906] = "fixed-version: Fixed from version 4.5rc6" + +CVE_STATUS[CVE-2016-10907] = "fixed-version: Fixed from version 4.9rc1" + +CVE_STATUS[CVE-2016-1237] = "fixed-version: Fixed from version 4.7rc5" + +CVE_STATUS[CVE-2016-1575] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2016-1576] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2016-1583] = "fixed-version: Fixed from version 4.7rc3" + +CVE_STATUS[CVE-2016-2053] = "fixed-version: Fixed from version 4.3rc1" + +CVE_STATUS[CVE-2016-2069] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2016-2070] = "fixed-version: Fixed from version 4.4" + +CVE_STATUS[CVE-2016-2085] = "fixed-version: Fixed from version 4.5rc4" + +CVE_STATUS[CVE-2016-2117] = "fixed-version: Fixed from version 4.6rc5" + +CVE_STATUS[CVE-2016-2143] = "fixed-version: Fixed from version 4.5" + +CVE_STATUS[CVE-2016-2184] = "fixed-version: Fixed from version 4.6rc1" + +CVE_STATUS[CVE-2016-2185] = "fixed-version: Fixed from version 4.6rc1" + +CVE_STATUS[CVE-2016-2186] = "fixed-version: Fixed from version 4.6rc1" + +CVE_STATUS[CVE-2016-2187] = "fixed-version: Fixed from version 4.6rc5" + +CVE_STATUS[CVE-2016-2188] = "fixed-version: Fixed from version 4.11rc2" + +CVE_STATUS[CVE-2016-2383] = "fixed-version: Fixed from version 4.5rc4" + +CVE_STATUS[CVE-2016-2384] = "fixed-version: Fixed from version 4.5rc4" + +CVE_STATUS[CVE-2016-2543] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2016-2544] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2016-2545] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2016-2546] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2016-2547] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2016-2548] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2016-2549] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2016-2550] = "fixed-version: Fixed from version 4.5rc4" + +CVE_STATUS[CVE-2016-2782] = "fixed-version: Fixed from version 4.5rc2" + +CVE_STATUS[CVE-2016-2847] = "fixed-version: Fixed from version 4.5rc1" + +# Skipping CVE-2016-2853, no affected_versions + +# Skipping CVE-2016-2854, no affected_versions + +CVE_STATUS[CVE-2016-3044] = "fixed-version: Fixed from version 4.5" + +CVE_STATUS[CVE-2016-3070] = "fixed-version: Fixed from version 4.4rc1" + +CVE_STATUS[CVE-2016-3134] = "fixed-version: Fixed from version 4.6rc2" + +CVE_STATUS[CVE-2016-3135] = "fixed-version: Fixed from version 4.6rc1" + +CVE_STATUS[CVE-2016-3136] = "fixed-version: Fixed from version 4.6rc3" + +CVE_STATUS[CVE-2016-3137] = "fixed-version: Fixed from version 4.6rc3" + +CVE_STATUS[CVE-2016-3138] = "fixed-version: Fixed from version 4.6rc1" + +CVE_STATUS[CVE-2016-3139] = "fixed-version: Fixed from version 3.17rc1" + +CVE_STATUS[CVE-2016-3140] = "fixed-version: Fixed from version 4.6rc3" + +CVE_STATUS[CVE-2016-3156] = "fixed-version: Fixed from version 4.6rc1" + +CVE_STATUS[CVE-2016-3157] = "fixed-version: Fixed from version 4.6rc1" + +CVE_STATUS[CVE-2016-3672] = "fixed-version: Fixed from version 4.6rc1" + +CVE_STATUS[CVE-2016-3689] = "fixed-version: Fixed from version 4.6rc1" + +# Skipping CVE-2016-3695, no affected_versions + +# Skipping CVE-2016-3699, no affected_versions + +# Skipping CVE-2016-3707, no affected_versions + +CVE_STATUS[CVE-2016-3713] = "fixed-version: Fixed from version 4.7rc1" + +# CVE-2016-3775 has no known resolution + +# CVE-2016-3802 has no known resolution + +# CVE-2016-3803 has no known resolution + +CVE_STATUS[CVE-2016-3841] = "fixed-version: Fixed from version 4.4rc4" + +CVE_STATUS[CVE-2016-3857] = "fixed-version: Fixed from version 4.8rc2" + +CVE_STATUS[CVE-2016-3951] = "fixed-version: Fixed from version 4.5" + +CVE_STATUS[CVE-2016-3955] = "fixed-version: Fixed from version 4.6rc3" + +CVE_STATUS[CVE-2016-3961] = "fixed-version: Fixed from version 4.6rc5" + +CVE_STATUS[CVE-2016-4440] = "fixed-version: Fixed from version 4.7rc1" + +CVE_STATUS[CVE-2016-4470] = "fixed-version: Fixed from version 4.7rc4" + +CVE_STATUS[CVE-2016-4482] = "fixed-version: Fixed from version 4.7rc1" + +CVE_STATUS[CVE-2016-4485] = "fixed-version: Fixed from version 4.6" + +CVE_STATUS[CVE-2016-4486] = "fixed-version: Fixed from version 4.6" + +CVE_STATUS[CVE-2016-4557] = "fixed-version: Fixed from version 4.6rc6" + +CVE_STATUS[CVE-2016-4558] = "fixed-version: Fixed from version 4.6rc7" + +CVE_STATUS[CVE-2016-4565] = "fixed-version: Fixed from version 4.6rc6" + +CVE_STATUS[CVE-2016-4568] = "fixed-version: Fixed from version 4.6rc6" + +CVE_STATUS[CVE-2016-4569] = "fixed-version: Fixed from version 4.7rc1" + +CVE_STATUS[CVE-2016-4578] = "fixed-version: Fixed from version 4.7rc1" + +CVE_STATUS[CVE-2016-4580] = "fixed-version: Fixed from version 4.6" + +CVE_STATUS[CVE-2016-4581] = "fixed-version: Fixed from version 4.6rc7" + +CVE_STATUS[CVE-2016-4794] = "fixed-version: Fixed from version 4.7rc4" + +CVE_STATUS[CVE-2016-4805] = "fixed-version: Fixed from version 4.6rc1" + +CVE_STATUS[CVE-2016-4913] = "fixed-version: Fixed from version 4.6" + +CVE_STATUS[CVE-2016-4951] = "fixed-version: Fixed from version 4.7rc1" + +CVE_STATUS[CVE-2016-4997] = "fixed-version: Fixed from version 4.7rc1" + +CVE_STATUS[CVE-2016-4998] = "fixed-version: Fixed from version 4.7rc1" + +CVE_STATUS[CVE-2016-5195] = "fixed-version: Fixed from version 4.9rc2" + +CVE_STATUS[CVE-2016-5243] = "fixed-version: Fixed from version 4.7rc3" + +CVE_STATUS[CVE-2016-5244] = "fixed-version: Fixed from version 4.7rc3" + +# Skipping CVE-2016-5340, no affected_versions + +# Skipping CVE-2016-5342, no affected_versions + +# Skipping CVE-2016-5343, no affected_versions + +# Skipping CVE-2016-5344, no affected_versions + +CVE_STATUS[CVE-2016-5400] = "fixed-version: Fixed from version 4.7" + +CVE_STATUS[CVE-2016-5412] = "fixed-version: Fixed from version 4.8rc1" + +CVE_STATUS[CVE-2016-5696] = "fixed-version: Fixed from version 4.7" + +CVE_STATUS[CVE-2016-5728] = "fixed-version: Fixed from version 4.7rc1" + +CVE_STATUS[CVE-2016-5828] = "fixed-version: Fixed from version 4.7rc6" + +CVE_STATUS[CVE-2016-5829] = "fixed-version: Fixed from version 4.7rc5" + +# CVE-2016-5870 has no known resolution + +CVE_STATUS[CVE-2016-6130] = "fixed-version: Fixed from version 4.6rc6" + +CVE_STATUS[CVE-2016-6136] = "fixed-version: Fixed from version 4.8rc1" + +CVE_STATUS[CVE-2016-6156] = "fixed-version: Fixed from version 4.7rc7" + +CVE_STATUS[CVE-2016-6162] = "fixed-version: Fixed from version 4.7" + +CVE_STATUS[CVE-2016-6187] = "fixed-version: Fixed from version 4.7rc7" + +CVE_STATUS[CVE-2016-6197] = "fixed-version: Fixed from version 4.6rc1" + +CVE_STATUS[CVE-2016-6198] = "fixed-version: Fixed from version 4.6" + +CVE_STATUS[CVE-2016-6213] = "fixed-version: Fixed from version 4.9rc1" + +CVE_STATUS[CVE-2016-6327] = "fixed-version: Fixed from version 4.6rc1" + +CVE_STATUS[CVE-2016-6480] = "fixed-version: Fixed from version 4.8rc3" + +CVE_STATUS[CVE-2016-6516] = "fixed-version: Fixed from version 4.8rc1" + +# Skipping CVE-2016-6753, no affected_versions + +CVE_STATUS[CVE-2016-6786] = "fixed-version: Fixed from version 4.0rc1" + +CVE_STATUS[CVE-2016-6787] = "fixed-version: Fixed from version 4.0rc1" + +CVE_STATUS[CVE-2016-6828] = "fixed-version: Fixed from version 4.8rc5" + +CVE_STATUS[CVE-2016-7039] = "fixed-version: Fixed from version 4.9rc4" + +CVE_STATUS[CVE-2016-7042] = "fixed-version: Fixed from version 4.9rc3" + +CVE_STATUS[CVE-2016-7097] = "fixed-version: Fixed from version 4.9rc1" + +CVE_STATUS[CVE-2016-7117] = "fixed-version: Fixed from version 4.6rc1" + +# Skipping CVE-2016-7118, no affected_versions + +CVE_STATUS[CVE-2016-7425] = "fixed-version: Fixed from version 4.9rc1" + +CVE_STATUS[CVE-2016-7910] = "fixed-version: Fixed from version 4.8rc1" + +CVE_STATUS[CVE-2016-7911] = "fixed-version: Fixed from version 4.7rc7" + +CVE_STATUS[CVE-2016-7912] = "fixed-version: Fixed from version 4.6rc5" + +CVE_STATUS[CVE-2016-7913] = "fixed-version: Fixed from version 4.6rc1" + +CVE_STATUS[CVE-2016-7914] = "fixed-version: Fixed from version 4.6rc4" + +CVE_STATUS[CVE-2016-7915] = "fixed-version: Fixed from version 4.6rc1" + +CVE_STATUS[CVE-2016-7916] = "fixed-version: Fixed from version 4.6rc7" + +CVE_STATUS[CVE-2016-7917] = "fixed-version: Fixed from version 4.5rc6" + +CVE_STATUS[CVE-2016-8399] = "fixed-version: Fixed from version 4.9" + +# Skipping CVE-2016-8401, no affected_versions + +# Skipping CVE-2016-8402, no affected_versions + +# Skipping CVE-2016-8403, no affected_versions + +# Skipping CVE-2016-8404, no affected_versions + +CVE_STATUS[CVE-2016-8405] = "fixed-version: Fixed from version 4.10rc6" + +# Skipping CVE-2016-8406, no affected_versions + +# Skipping CVE-2016-8407, no affected_versions + +CVE_STATUS[CVE-2016-8630] = "fixed-version: Fixed from version 4.9rc4" + +CVE_STATUS[CVE-2016-8632] = "fixed-version: Fixed from version 4.9rc8" + +CVE_STATUS[CVE-2016-8633] = "fixed-version: Fixed from version 4.9rc4" + +CVE_STATUS[CVE-2016-8636] = "fixed-version: Fixed from version 4.10rc8" + +CVE_STATUS[CVE-2016-8645] = "fixed-version: Fixed from version 4.9rc6" + +CVE_STATUS[CVE-2016-8646] = "fixed-version: Fixed from version 4.4rc1" + +CVE_STATUS[CVE-2016-8650] = "fixed-version: Fixed from version 4.9rc7" + +CVE_STATUS[CVE-2016-8655] = "fixed-version: Fixed from version 4.9rc8" + +CVE_STATUS[CVE-2016-8658] = "fixed-version: Fixed from version 4.8rc7" + +# CVE-2016-8660 has no known resolution + +CVE_STATUS[CVE-2016-8666] = "fixed-version: Fixed from version 4.6rc1" + +CVE_STATUS[CVE-2016-9083] = "fixed-version: Fixed from version 4.9rc4" + +CVE_STATUS[CVE-2016-9084] = "fixed-version: Fixed from version 4.9rc4" + +CVE_STATUS[CVE-2016-9120] = "fixed-version: Fixed from version 4.6rc1" + +CVE_STATUS[CVE-2016-9178] = "fixed-version: Fixed from version 4.8rc7" + +CVE_STATUS[CVE-2016-9191] = "fixed-version: Fixed from version 4.10rc4" + +CVE_STATUS[CVE-2016-9313] = "fixed-version: Fixed from version 4.9rc3" + +CVE_STATUS[CVE-2016-9555] = "fixed-version: Fixed from version 4.9rc4" + +CVE_STATUS[CVE-2016-9576] = "fixed-version: Fixed from version 4.9" + +CVE_STATUS[CVE-2016-9588] = "fixed-version: Fixed from version 4.10rc1" + +CVE_STATUS[CVE-2016-9604] = "fixed-version: Fixed from version 4.11rc8" + +# Skipping CVE-2016-9644, no affected_versions + +CVE_STATUS[CVE-2016-9685] = "fixed-version: Fixed from version 4.6rc1" + +CVE_STATUS[CVE-2016-9754] = "fixed-version: Fixed from version 4.7rc1" + +CVE_STATUS[CVE-2016-9755] = "fixed-version: Fixed from version 4.9rc8" + +CVE_STATUS[CVE-2016-9756] = "fixed-version: Fixed from version 4.9rc7" + +CVE_STATUS[CVE-2016-9777] = "fixed-version: Fixed from version 4.9rc7" + +CVE_STATUS[CVE-2016-9793] = "fixed-version: Fixed from version 4.9rc8" + +CVE_STATUS[CVE-2016-9794] = "fixed-version: Fixed from version 4.7rc1" + +CVE_STATUS[CVE-2016-9806] = "fixed-version: Fixed from version 4.7rc1" + +CVE_STATUS[CVE-2016-9919] = "fixed-version: Fixed from version 4.9rc8" + +# Skipping CVE-2017-0403, no affected_versions + +# Skipping CVE-2017-0404, no affected_versions + +# Skipping CVE-2017-0426, no affected_versions + +# Skipping CVE-2017-0427, no affected_versions + +# CVE-2017-0507 has no known resolution + +# CVE-2017-0508 has no known resolution + +# Skipping CVE-2017-0510, no affected_versions + +# Skipping CVE-2017-0528, no affected_versions + +# Skipping CVE-2017-0537, no affected_versions + +# CVE-2017-0564 has no known resolution + +CVE_STATUS[CVE-2017-0605] = "fixed-version: Fixed from version 4.12rc1" + +CVE_STATUS[CVE-2017-0627] = "fixed-version: Fixed from version 4.14rc1" + +# CVE-2017-0630 has no known resolution + +# CVE-2017-0749 has no known resolution + +CVE_STATUS[CVE-2017-0750] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2017-0786] = "fixed-version: Fixed from version 4.14rc4" + +CVE_STATUS[CVE-2017-0861] = "fixed-version: Fixed from version 4.15rc3" + +CVE_STATUS[CVE-2017-1000] = "fixed-version: Fixed from version 4.13rc5" + +CVE_STATUS[CVE-2017-1000111] = "fixed-version: Fixed from version 4.13rc5" + +CVE_STATUS[CVE-2017-1000112] = "fixed-version: Fixed from version 4.13rc5" + +CVE_STATUS[CVE-2017-1000251] = "fixed-version: Fixed from version 4.14rc1" + +CVE_STATUS[CVE-2017-1000252] = "fixed-version: Fixed from version 4.14rc1" + +CVE_STATUS[CVE-2017-1000253] = "fixed-version: Fixed from version 4.1rc1" + +CVE_STATUS[CVE-2017-1000255] = "fixed-version: Fixed from version 4.14rc5" + +CVE_STATUS[CVE-2017-1000363] = "fixed-version: Fixed from version 4.12rc2" + +CVE_STATUS[CVE-2017-1000364] = "fixed-version: Fixed from version 4.12rc6" + +CVE_STATUS[CVE-2017-1000365] = "fixed-version: Fixed from version 4.12rc7" + +CVE_STATUS[CVE-2017-1000370] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2017-1000371] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2017-1000379] = "fixed-version: Fixed from version 4.12rc6" + +CVE_STATUS[CVE-2017-1000380] = "fixed-version: Fixed from version 4.12rc5" + +CVE_STATUS[CVE-2017-1000405] = "fixed-version: Fixed from version 4.15rc2" + +CVE_STATUS[CVE-2017-1000407] = "fixed-version: Fixed from version 4.15rc3" + +CVE_STATUS[CVE-2017-1000410] = "fixed-version: Fixed from version 4.15rc8" + +CVE_STATUS[CVE-2017-10661] = "fixed-version: Fixed from version 4.11rc1" + +CVE_STATUS[CVE-2017-10662] = "fixed-version: Fixed from version 4.12rc1" + +CVE_STATUS[CVE-2017-10663] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2017-10810] = "fixed-version: Fixed from version 4.12rc1" + +CVE_STATUS[CVE-2017-10911] = "fixed-version: Fixed from version 4.12rc7" + +CVE_STATUS[CVE-2017-11089] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2017-11176] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2017-11472] = "fixed-version: Fixed from version 4.12rc1" + +CVE_STATUS[CVE-2017-11473] = "fixed-version: Fixed from version 4.13rc2" + +CVE_STATUS[CVE-2017-11600] = "fixed-version: Fixed from version 4.13" + +CVE_STATUS[CVE-2017-12134] = "fixed-version: Fixed from version 4.13rc6" + +CVE_STATUS[CVE-2017-12146] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2017-12153] = "fixed-version: Fixed from version 4.14rc2" + +CVE_STATUS[CVE-2017-12154] = "fixed-version: Fixed from version 4.14rc1" + +CVE_STATUS[CVE-2017-12168] = "fixed-version: Fixed from version 4.9rc6" + +CVE_STATUS[CVE-2017-12188] = "fixed-version: Fixed from version 4.14rc5" + +CVE_STATUS[CVE-2017-12190] = "fixed-version: Fixed from version 4.14rc5" + +CVE_STATUS[CVE-2017-12192] = "fixed-version: Fixed from version 4.14rc3" + +CVE_STATUS[CVE-2017-12193] = "fixed-version: Fixed from version 4.14rc7" + +CVE_STATUS[CVE-2017-12762] = "fixed-version: Fixed from version 4.13rc4" + +CVE_STATUS[CVE-2017-13080] = "fixed-version: Fixed from version 4.14rc6" + +CVE_STATUS[CVE-2017-13166] = "fixed-version: Fixed from version 4.16rc1" + +CVE_STATUS[CVE-2017-13167] = "fixed-version: Fixed from version 4.5rc4" + +CVE_STATUS[CVE-2017-13168] = "fixed-version: Fixed from version 4.18rc4" + +CVE_STATUS[CVE-2017-13215] = "fixed-version: Fixed from version 4.5rc1" + +CVE_STATUS[CVE-2017-13216] = "fixed-version: Fixed from version 4.15rc8" + +CVE_STATUS[CVE-2017-13220] = "fixed-version: Fixed from version 3.19rc3" + +# CVE-2017-13221 has no known resolution + +# CVE-2017-13222 has no known resolution + +CVE_STATUS[CVE-2017-13305] = "fixed-version: Fixed from version 4.12rc5" + +CVE_STATUS[CVE-2017-13686] = "fixed-version: Fixed from version 4.13rc7" + +# CVE-2017-13693 has no known resolution + +# CVE-2017-13694 has no known resolution + +CVE_STATUS[CVE-2017-13695] = "fixed-version: Fixed from version 4.17rc1" + +CVE_STATUS[CVE-2017-13715] = "fixed-version: Fixed from version 4.3rc1" + +CVE_STATUS[CVE-2017-14051] = "fixed-version: Fixed from version 4.14rc1" + +CVE_STATUS[CVE-2017-14106] = "fixed-version: Fixed from version 4.12rc3" + +CVE_STATUS[CVE-2017-14140] = "fixed-version: Fixed from version 4.13rc6" + +CVE_STATUS[CVE-2017-14156] = "fixed-version: Fixed from version 4.14rc1" + +CVE_STATUS[CVE-2017-14340] = "fixed-version: Fixed from version 4.14rc1" + +CVE_STATUS[CVE-2017-14489] = "fixed-version: Fixed from version 4.14rc3" + +CVE_STATUS[CVE-2017-14497] = "fixed-version: Fixed from version 4.13" + +CVE_STATUS[CVE-2017-14954] = "fixed-version: Fixed from version 4.14rc3" + +CVE_STATUS[CVE-2017-14991] = "fixed-version: Fixed from version 4.14rc2" + +CVE_STATUS[CVE-2017-15102] = "fixed-version: Fixed from version 4.9rc1" + +CVE_STATUS[CVE-2017-15115] = "fixed-version: Fixed from version 4.14rc6" + +CVE_STATUS[CVE-2017-15116] = "fixed-version: Fixed from version 4.2rc1" + +CVE_STATUS[CVE-2017-15121] = "fixed-version: Fixed from version 3.11rc1" + +CVE_STATUS[CVE-2017-15126] = "fixed-version: Fixed from version 4.14rc4" + +CVE_STATUS[CVE-2017-15127] = "fixed-version: Fixed from version 4.13rc5" + +CVE_STATUS[CVE-2017-15128] = "fixed-version: Fixed from version 4.14rc8" + +CVE_STATUS[CVE-2017-15129] = "fixed-version: Fixed from version 4.15rc5" + +CVE_STATUS[CVE-2017-15265] = "fixed-version: Fixed from version 4.14rc5" + +CVE_STATUS[CVE-2017-15274] = "fixed-version: Fixed from version 4.12rc5" + +CVE_STATUS[CVE-2017-15299] = "fixed-version: Fixed from version 4.14rc6" + +CVE_STATUS[CVE-2017-15306] = "fixed-version: Fixed from version 4.14rc7" + +CVE_STATUS[CVE-2017-15537] = "fixed-version: Fixed from version 4.14rc3" + +CVE_STATUS[CVE-2017-15649] = "fixed-version: Fixed from version 4.14rc4" + +CVE_STATUS[CVE-2017-15868] = "fixed-version: Fixed from version 3.19rc3" + +CVE_STATUS[CVE-2017-15951] = "fixed-version: Fixed from version 4.14rc6" + +CVE_STATUS[CVE-2017-16525] = "fixed-version: Fixed from version 4.14rc5" + +CVE_STATUS[CVE-2017-16526] = "fixed-version: Fixed from version 4.14rc4" + +CVE_STATUS[CVE-2017-16527] = "fixed-version: Fixed from version 4.14rc5" + +CVE_STATUS[CVE-2017-16528] = "fixed-version: Fixed from version 4.14rc1" + +CVE_STATUS[CVE-2017-16529] = "fixed-version: Fixed from version 4.14rc4" + +CVE_STATUS[CVE-2017-16530] = "fixed-version: Fixed from version 4.14rc4" + +CVE_STATUS[CVE-2017-16531] = "fixed-version: Fixed from version 4.14rc4" + +CVE_STATUS[CVE-2017-16532] = "fixed-version: Fixed from version 4.14rc5" + +CVE_STATUS[CVE-2017-16533] = "fixed-version: Fixed from version 4.14rc5" + +CVE_STATUS[CVE-2017-16534] = "fixed-version: Fixed from version 4.14rc4" + +CVE_STATUS[CVE-2017-16535] = "fixed-version: Fixed from version 4.14rc6" + +CVE_STATUS[CVE-2017-16536] = "fixed-version: Fixed from version 4.15rc1" + +CVE_STATUS[CVE-2017-16537] = "fixed-version: Fixed from version 4.15rc1" + +CVE_STATUS[CVE-2017-16538] = "fixed-version: Fixed from version 4.16rc1" + +CVE_STATUS[CVE-2017-16643] = "fixed-version: Fixed from version 4.14rc7" + +CVE_STATUS[CVE-2017-16644] = "fixed-version: Fixed from version 4.16rc1" + +CVE_STATUS[CVE-2017-16645] = "fixed-version: Fixed from version 4.14rc6" + +CVE_STATUS[CVE-2017-16646] = "fixed-version: Fixed from version 4.15rc1" + +CVE_STATUS[CVE-2017-16647] = "fixed-version: Fixed from version 4.14" + +CVE_STATUS[CVE-2017-16648] = "fixed-version: Fixed from version 4.15rc1" + +CVE_STATUS[CVE-2017-16649] = "fixed-version: Fixed from version 4.14" + +CVE_STATUS[CVE-2017-16650] = "fixed-version: Fixed from version 4.14" + +CVE_STATUS[CVE-2017-16911] = "fixed-version: Fixed from version 4.15rc4" + +CVE_STATUS[CVE-2017-16912] = "fixed-version: Fixed from version 4.15rc4" + +CVE_STATUS[CVE-2017-16913] = "fixed-version: Fixed from version 4.15rc4" + +CVE_STATUS[CVE-2017-16914] = "fixed-version: Fixed from version 4.15rc4" + +CVE_STATUS[CVE-2017-16939] = "fixed-version: Fixed from version 4.14rc7" + +CVE_STATUS[CVE-2017-16994] = "fixed-version: Fixed from version 4.15rc1" + +CVE_STATUS[CVE-2017-16995] = "fixed-version: Fixed from version 4.15rc5" + +CVE_STATUS[CVE-2017-16996] = "fixed-version: Fixed from version 4.15rc5" + +CVE_STATUS[CVE-2017-17052] = "fixed-version: Fixed from version 4.13rc7" + +CVE_STATUS[CVE-2017-17053] = "fixed-version: Fixed from version 4.13rc7" + +CVE_STATUS[CVE-2017-17448] = "fixed-version: Fixed from version 4.15rc4" + +CVE_STATUS[CVE-2017-17449] = "fixed-version: Fixed from version 4.15rc4" + +CVE_STATUS[CVE-2017-17450] = "fixed-version: Fixed from version 4.15rc4" + +CVE_STATUS[CVE-2017-17558] = "fixed-version: Fixed from version 4.15rc4" + +CVE_STATUS[CVE-2017-17712] = "fixed-version: Fixed from version 4.15rc4" + +CVE_STATUS[CVE-2017-17741] = "fixed-version: Fixed from version 4.15rc5" + +CVE_STATUS[CVE-2017-17805] = "fixed-version: Fixed from version 4.15rc4" + +CVE_STATUS[CVE-2017-17806] = "fixed-version: Fixed from version 4.15rc4" + +CVE_STATUS[CVE-2017-17807] = "fixed-version: Fixed from version 4.15rc3" + +CVE_STATUS[CVE-2017-17852] = "fixed-version: Fixed from version 4.15rc5" + +CVE_STATUS[CVE-2017-17853] = "fixed-version: Fixed from version 4.15rc5" + +CVE_STATUS[CVE-2017-17854] = "fixed-version: Fixed from version 4.15rc5" + +CVE_STATUS[CVE-2017-17855] = "fixed-version: Fixed from version 4.15rc5" + +CVE_STATUS[CVE-2017-17856] = "fixed-version: Fixed from version 4.15rc5" + +CVE_STATUS[CVE-2017-17857] = "fixed-version: Fixed from version 4.15rc5" + +CVE_STATUS[CVE-2017-17862] = "fixed-version: Fixed from version 4.15rc1" + +CVE_STATUS[CVE-2017-17863] = "fixed-version: Fixed from version 4.15rc5" + +CVE_STATUS[CVE-2017-17864] = "fixed-version: Fixed from version 4.15rc5" + +CVE_STATUS[CVE-2017-17975] = "fixed-version: Fixed from version 4.17rc1" + +CVE_STATUS[CVE-2017-18017] = "fixed-version: Fixed from version 4.11rc7" + +CVE_STATUS[CVE-2017-18075] = "fixed-version: Fixed from version 4.15rc7" + +CVE_STATUS[CVE-2017-18079] = "fixed-version: Fixed from version 4.13rc1" + +# CVE-2017-18169 has no known resolution + +CVE_STATUS[CVE-2017-18174] = "fixed-version: Fixed from version 4.7rc1" + +CVE_STATUS[CVE-2017-18193] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2017-18200] = "fixed-version: Fixed from version 4.14rc5" + +CVE_STATUS[CVE-2017-18202] = "fixed-version: Fixed from version 4.15rc2" + +CVE_STATUS[CVE-2017-18203] = "fixed-version: Fixed from version 4.15rc1" + +CVE_STATUS[CVE-2017-18204] = "fixed-version: Fixed from version 4.15rc1" + +CVE_STATUS[CVE-2017-18208] = "fixed-version: Fixed from version 4.15rc2" + +CVE_STATUS[CVE-2017-18216] = "fixed-version: Fixed from version 4.15rc1" + +CVE_STATUS[CVE-2017-18218] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2017-18221] = "fixed-version: Fixed from version 4.12rc4" + +CVE_STATUS[CVE-2017-18222] = "fixed-version: Fixed from version 4.12rc1" + +CVE_STATUS[CVE-2017-18224] = "fixed-version: Fixed from version 4.15rc1" + +CVE_STATUS[CVE-2017-18232] = "fixed-version: Fixed from version 4.16rc1" + +CVE_STATUS[CVE-2017-18241] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2017-18249] = "fixed-version: Fixed from version 4.12rc1" + +CVE_STATUS[CVE-2017-18255] = "fixed-version: Fixed from version 4.11rc1" + +CVE_STATUS[CVE-2017-18257] = "fixed-version: Fixed from version 4.11rc1" + +CVE_STATUS[CVE-2017-18261] = "fixed-version: Fixed from version 4.13rc6" + +CVE_STATUS[CVE-2017-18270] = "fixed-version: Fixed from version 4.14rc3" + +CVE_STATUS[CVE-2017-18344] = "fixed-version: Fixed from version 4.15rc4" + +CVE_STATUS[CVE-2017-18360] = "fixed-version: Fixed from version 4.12rc2" + +CVE_STATUS[CVE-2017-18379] = "fixed-version: Fixed from version 4.14rc3" + +CVE_STATUS[CVE-2017-18509] = "fixed-version: Fixed from version 4.11rc1" + +CVE_STATUS[CVE-2017-18549] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2017-18550] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2017-18551] = "fixed-version: Fixed from version 4.15rc9" + +CVE_STATUS[CVE-2017-18552] = "fixed-version: Fixed from version 4.11rc1" + +CVE_STATUS[CVE-2017-18595] = "fixed-version: Fixed from version 4.15rc6" + +CVE_STATUS[CVE-2017-2583] = "fixed-version: Fixed from version 4.10rc4" + +CVE_STATUS[CVE-2017-2584] = "fixed-version: Fixed from version 4.10rc4" + +CVE_STATUS[CVE-2017-2596] = "fixed-version: Fixed from version 4.11rc1" + +CVE_STATUS[CVE-2017-2618] = "fixed-version: Fixed from version 4.10rc8" + +CVE_STATUS[CVE-2017-2634] = "fixed-version: Fixed from version 2.6.25rc1" + +CVE_STATUS[CVE-2017-2636] = "fixed-version: Fixed from version 4.11rc2" + +CVE_STATUS[CVE-2017-2647] = "fixed-version: Fixed from version 3.18rc1" + +CVE_STATUS[CVE-2017-2671] = "fixed-version: Fixed from version 4.11rc6" + +CVE_STATUS[CVE-2017-5123] = "fixed-version: Fixed from version 4.14rc5" + +CVE_STATUS[CVE-2017-5546] = "fixed-version: Fixed from version 4.10rc4" + +CVE_STATUS[CVE-2017-5547] = "fixed-version: Fixed from version 4.10rc5" + +CVE_STATUS[CVE-2017-5548] = "fixed-version: Fixed from version 4.10rc5" + +CVE_STATUS[CVE-2017-5549] = "fixed-version: Fixed from version 4.10rc4" + +CVE_STATUS[CVE-2017-5550] = "fixed-version: Fixed from version 4.10rc4" + +CVE_STATUS[CVE-2017-5551] = "fixed-version: Fixed from version 4.10rc4" + +CVE_STATUS[CVE-2017-5576] = "fixed-version: Fixed from version 4.10rc6" + +CVE_STATUS[CVE-2017-5577] = "fixed-version: Fixed from version 4.10rc6" + +CVE_STATUS[CVE-2017-5669] = "fixed-version: Fixed from version 4.11rc1" + +CVE_STATUS[CVE-2017-5715] = "fixed-version: Fixed from version 4.15rc8" + +CVE_STATUS[CVE-2017-5753] = "fixed-version: Fixed from version 4.15rc8" + +CVE_STATUS[CVE-2017-5754] = "fixed-version: Fixed from version 4.16rc1" + +CVE_STATUS[CVE-2017-5897] = "fixed-version: Fixed from version 4.10rc8" + +CVE_STATUS[CVE-2017-5967] = "fixed-version: Fixed from version 4.11rc1" + +CVE_STATUS[CVE-2017-5970] = "fixed-version: Fixed from version 4.10rc8" + +CVE_STATUS[CVE-2017-5972] = "fixed-version: Fixed from version 4.4rc1" + +CVE_STATUS[CVE-2017-5986] = "fixed-version: Fixed from version 4.10rc8" + +CVE_STATUS[CVE-2017-6001] = "fixed-version: Fixed from version 4.10rc4" + +CVE_STATUS[CVE-2017-6074] = "fixed-version: Fixed from version 4.10" + +CVE_STATUS[CVE-2017-6214] = "fixed-version: Fixed from version 4.10rc8" + +CVE_STATUS[CVE-2017-6345] = "fixed-version: Fixed from version 4.10" + +CVE_STATUS[CVE-2017-6346] = "fixed-version: Fixed from version 4.10" + +CVE_STATUS[CVE-2017-6347] = "fixed-version: Fixed from version 4.11rc1" + +CVE_STATUS[CVE-2017-6348] = "fixed-version: Fixed from version 4.10" + +CVE_STATUS[CVE-2017-6353] = "fixed-version: Fixed from version 4.11rc1" + +CVE_STATUS[CVE-2017-6874] = "fixed-version: Fixed from version 4.11rc2" + +CVE_STATUS[CVE-2017-6951] = "fixed-version: Fixed from version 3.18rc1" + +CVE_STATUS[CVE-2017-7184] = "fixed-version: Fixed from version 4.11rc5" + +CVE_STATUS[CVE-2017-7187] = "fixed-version: Fixed from version 4.11rc5" + +CVE_STATUS[CVE-2017-7261] = "fixed-version: Fixed from version 4.11rc6" + +CVE_STATUS[CVE-2017-7273] = "fixed-version: Fixed from version 4.10rc4" + +CVE_STATUS[CVE-2017-7277] = "fixed-version: Fixed from version 4.11rc4" + +CVE_STATUS[CVE-2017-7294] = "fixed-version: Fixed from version 4.11rc6" + +CVE_STATUS[CVE-2017-7308] = "fixed-version: Fixed from version 4.11rc6" + +CVE_STATUS[CVE-2017-7346] = "fixed-version: Fixed from version 4.12rc5" + +# CVE-2017-7369 has no known resolution + +CVE_STATUS[CVE-2017-7374] = "fixed-version: Fixed from version 4.11rc4" + +CVE_STATUS[CVE-2017-7472] = "fixed-version: Fixed from version 4.11rc8" + +CVE_STATUS[CVE-2017-7477] = "fixed-version: Fixed from version 4.11" + +CVE_STATUS[CVE-2017-7482] = "fixed-version: Fixed from version 4.12rc7" + +CVE_STATUS[CVE-2017-7487] = "fixed-version: Fixed from version 4.12rc1" + +CVE_STATUS[CVE-2017-7495] = "fixed-version: Fixed from version 4.7rc1" + +CVE_STATUS[CVE-2017-7518] = "fixed-version: Fixed from version 4.12rc7" + +CVE_STATUS[CVE-2017-7533] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2017-7541] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2017-7542] = "fixed-version: Fixed from version 4.13rc2" + +CVE_STATUS[CVE-2017-7558] = "fixed-version: Fixed from version 4.13" + +CVE_STATUS[CVE-2017-7616] = "fixed-version: Fixed from version 4.11rc6" + +CVE_STATUS[CVE-2017-7618] = "fixed-version: Fixed from version 4.11rc8" + +CVE_STATUS[CVE-2017-7645] = "fixed-version: Fixed from version 4.11" + +CVE_STATUS[CVE-2017-7889] = "fixed-version: Fixed from version 4.11rc7" + +CVE_STATUS[CVE-2017-7895] = "fixed-version: Fixed from version 4.11" + +CVE_STATUS[CVE-2017-7979] = "fixed-version: Fixed from version 4.11rc8" + +CVE_STATUS[CVE-2017-8061] = "fixed-version: Fixed from version 4.11rc4" + +CVE_STATUS[CVE-2017-8062] = "fixed-version: Fixed from version 4.11rc2" + +CVE_STATUS[CVE-2017-8063] = "fixed-version: Fixed from version 4.11rc1" + +CVE_STATUS[CVE-2017-8064] = "fixed-version: Fixed from version 4.11rc1" + +CVE_STATUS[CVE-2017-8065] = "fixed-version: Fixed from version 4.11rc1" + +CVE_STATUS[CVE-2017-8066] = "fixed-version: Fixed from version 4.11rc1" + +CVE_STATUS[CVE-2017-8067] = "fixed-version: Fixed from version 4.11rc1" + +CVE_STATUS[CVE-2017-8068] = "fixed-version: Fixed from version 4.10rc8" + +CVE_STATUS[CVE-2017-8069] = "fixed-version: Fixed from version 4.10rc8" + +CVE_STATUS[CVE-2017-8070] = "fixed-version: Fixed from version 4.10rc8" + +CVE_STATUS[CVE-2017-8071] = "fixed-version: Fixed from version 4.10rc7" + +CVE_STATUS[CVE-2017-8072] = "fixed-version: Fixed from version 4.10rc7" + +CVE_STATUS[CVE-2017-8106] = "fixed-version: Fixed from version 3.16rc1" + +CVE_STATUS[CVE-2017-8240] = "fixed-version: Fixed from version 3.19rc6" + +# CVE-2017-8242 has no known resolution + +# CVE-2017-8244 has no known resolution + +# CVE-2017-8245 has no known resolution + +# CVE-2017-8246 has no known resolution + +CVE_STATUS[CVE-2017-8797] = "fixed-version: Fixed from version 4.12rc1" + +CVE_STATUS[CVE-2017-8824] = "fixed-version: Fixed from version 4.15rc3" + +CVE_STATUS[CVE-2017-8831] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2017-8890] = "fixed-version: Fixed from version 4.12rc1" + +CVE_STATUS[CVE-2017-8924] = "fixed-version: Fixed from version 4.11rc2" + +CVE_STATUS[CVE-2017-8925] = "fixed-version: Fixed from version 4.11rc2" + +CVE_STATUS[CVE-2017-9059] = "fixed-version: Fixed from version 4.12rc1" + +CVE_STATUS[CVE-2017-9074] = "fixed-version: Fixed from version 4.12rc2" + +CVE_STATUS[CVE-2017-9075] = "fixed-version: Fixed from version 4.12rc2" + +CVE_STATUS[CVE-2017-9076] = "fixed-version: Fixed from version 4.12rc2" + +CVE_STATUS[CVE-2017-9077] = "fixed-version: Fixed from version 4.12rc2" + +CVE_STATUS[CVE-2017-9150] = "fixed-version: Fixed from version 4.12rc1" + +CVE_STATUS[CVE-2017-9211] = "fixed-version: Fixed from version 4.12rc3" + +CVE_STATUS[CVE-2017-9242] = "fixed-version: Fixed from version 4.12rc3" + +CVE_STATUS[CVE-2017-9605] = "fixed-version: Fixed from version 4.12rc5" + +CVE_STATUS[CVE-2017-9725] = "fixed-version: Fixed from version 4.3rc7" + +CVE_STATUS[CVE-2017-9984] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2017-9985] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2017-9986] = "fixed-version: Fixed from version 4.15rc1" + +CVE_STATUS[CVE-2018-1000004] = "fixed-version: Fixed from version 4.15rc9" + +CVE_STATUS[CVE-2018-1000026] = "fixed-version: Fixed from version 4.16rc1" + +CVE_STATUS[CVE-2018-1000028] = "fixed-version: Fixed from version 4.15" + +CVE_STATUS[CVE-2018-1000199] = "fixed-version: Fixed from version 4.16" + +CVE_STATUS[CVE-2018-1000200] = "fixed-version: Fixed from version 4.17rc5" + +CVE_STATUS[CVE-2018-1000204] = "fixed-version: Fixed from version 4.17rc7" + +CVE_STATUS[CVE-2018-10021] = "fixed-version: Fixed from version 4.16rc7" + +CVE_STATUS[CVE-2018-10074] = "fixed-version: Fixed from version 4.16rc7" + +CVE_STATUS[CVE-2018-10087] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2018-10124] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2018-10322] = "fixed-version: Fixed from version 4.17rc4" + +CVE_STATUS[CVE-2018-10323] = "fixed-version: Fixed from version 4.17rc4" + +CVE_STATUS[CVE-2018-1065] = "fixed-version: Fixed from version 4.16rc3" + +CVE_STATUS[CVE-2018-1066] = "fixed-version: Fixed from version 4.11rc1" + +CVE_STATUS[CVE-2018-10675] = "fixed-version: Fixed from version 4.13rc6" + +CVE_STATUS[CVE-2018-1068] = "fixed-version: Fixed from version 4.16rc5" + +CVE_STATUS[CVE-2018-10840] = "fixed-version: Fixed from version 4.18rc1" + +CVE_STATUS[CVE-2018-10853] = "fixed-version: Fixed from version 4.18rc1" + +CVE_STATUS[CVE-2018-1087] = "fixed-version: Fixed from version 4.16rc7" + +# CVE-2018-10872 has no known resolution + +CVE_STATUS[CVE-2018-10876] = "fixed-version: Fixed from version 4.18rc4" + +CVE_STATUS[CVE-2018-10877] = "fixed-version: Fixed from version 4.18rc4" + +CVE_STATUS[CVE-2018-10878] = "fixed-version: Fixed from version 4.18rc4" + +CVE_STATUS[CVE-2018-10879] = "fixed-version: Fixed from version 4.18rc4" + +CVE_STATUS[CVE-2018-10880] = "fixed-version: Fixed from version 4.18rc4" + +CVE_STATUS[CVE-2018-10881] = "fixed-version: Fixed from version 4.18rc4" + +CVE_STATUS[CVE-2018-10882] = "fixed-version: Fixed from version 4.18rc4" + +CVE_STATUS[CVE-2018-10883] = "fixed-version: Fixed from version 4.18rc4" + +CVE_STATUS[CVE-2018-10901] = "fixed-version: Fixed from version 2.6.36rc1" + +CVE_STATUS[CVE-2018-10902] = "fixed-version: Fixed from version 4.18rc6" + +CVE_STATUS[CVE-2018-1091] = "fixed-version: Fixed from version 4.14rc2" + +CVE_STATUS[CVE-2018-1092] = "fixed-version: Fixed from version 4.17rc1" + +CVE_STATUS[CVE-2018-1093] = "fixed-version: Fixed from version 4.17rc1" + +CVE_STATUS[CVE-2018-10938] = "fixed-version: Fixed from version 4.13rc5" + +CVE_STATUS[CVE-2018-1094] = "fixed-version: Fixed from version 4.17rc1" + +CVE_STATUS[CVE-2018-10940] = "fixed-version: Fixed from version 4.17rc3" + +CVE_STATUS[CVE-2018-1095] = "fixed-version: Fixed from version 4.17rc1" + +CVE_STATUS[CVE-2018-1108] = "fixed-version: Fixed from version 4.17rc2" + +CVE_STATUS[CVE-2018-1118] = "fixed-version: Fixed from version 4.18rc1" + +CVE_STATUS[CVE-2018-1120] = "fixed-version: Fixed from version 4.17rc6" + +# CVE-2018-1121 has no known resolution + +CVE_STATUS[CVE-2018-11232] = "fixed-version: Fixed from version 4.11rc1" + +CVE_STATUS[CVE-2018-1128] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-1129] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-1130] = "fixed-version: Fixed from version 4.16rc7" + +CVE_STATUS[CVE-2018-11412] = "fixed-version: Fixed from version 4.18rc1" + +CVE_STATUS[CVE-2018-11506] = "fixed-version: Fixed from version 4.17rc7" + +CVE_STATUS[CVE-2018-11508] = "fixed-version: Fixed from version 4.17rc5" + +# CVE-2018-11987 has no known resolution + +CVE_STATUS[CVE-2018-12126] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2018-12127] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2018-12130] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2018-12207] = "fixed-version: Fixed from version 5.4rc2" + +CVE_STATUS[CVE-2018-12232] = "fixed-version: Fixed from version 4.18rc1" + +CVE_STATUS[CVE-2018-12233] = "fixed-version: Fixed from version 4.18rc2" + +CVE_STATUS[CVE-2018-12633] = "fixed-version: Fixed from version 4.18rc1" + +CVE_STATUS[CVE-2018-12714] = "fixed-version: Fixed from version 4.18rc2" + +CVE_STATUS[CVE-2018-12896] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-12904] = "fixed-version: Fixed from version 4.18rc1" + +# CVE-2018-12928 has no known resolution + +# CVE-2018-12929 has no known resolution + +# CVE-2018-12930 has no known resolution + +# CVE-2018-12931 has no known resolution + +CVE_STATUS[CVE-2018-13053] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-13093] = "fixed-version: Fixed from version 4.18rc1" + +CVE_STATUS[CVE-2018-13094] = "fixed-version: Fixed from version 4.18rc1" + +CVE_STATUS[CVE-2018-13095] = "fixed-version: Fixed from version 4.18rc3" + +CVE_STATUS[CVE-2018-13096] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-13097] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-13098] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-13099] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-13100] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-13405] = "fixed-version: Fixed from version 4.18rc4" + +CVE_STATUS[CVE-2018-13406] = "fixed-version: Fixed from version 4.18rc1" + +CVE_STATUS[CVE-2018-14609] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-14610] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-14611] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-14612] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-14613] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-14614] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-14615] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-14616] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-14617] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-14619] = "fixed-version: Fixed from version 4.15rc4" + +CVE_STATUS[CVE-2018-14625] = "fixed-version: Fixed from version 4.20rc6" + +CVE_STATUS[CVE-2018-14633] = "fixed-version: Fixed from version 4.19rc6" + +CVE_STATUS[CVE-2018-14634] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2018-14641] = "fixed-version: Fixed from version 4.19rc4" + +CVE_STATUS[CVE-2018-14646] = "fixed-version: Fixed from version 4.15rc8" + +CVE_STATUS[CVE-2018-14656] = "fixed-version: Fixed from version 4.19rc2" + +CVE_STATUS[CVE-2018-14678] = "fixed-version: Fixed from version 4.18rc8" + +CVE_STATUS[CVE-2018-14734] = "fixed-version: Fixed from version 4.18rc1" + +CVE_STATUS[CVE-2018-15471] = "fixed-version: Fixed from version 4.19rc7" + +CVE_STATUS[CVE-2018-15572] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-15594] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-16276] = "fixed-version: Fixed from version 4.18rc5" + +CVE_STATUS[CVE-2018-16597] = "fixed-version: Fixed from version 4.8rc1" + +CVE_STATUS[CVE-2018-16658] = "fixed-version: Fixed from version 4.19rc2" + +CVE_STATUS[CVE-2018-16862] = "fixed-version: Fixed from version 4.20rc5" + +CVE_STATUS[CVE-2018-16871] = "fixed-version: Fixed from version 4.20rc3" + +CVE_STATUS[CVE-2018-16880] = "fixed-version: Fixed from version 5.0rc5" + +CVE_STATUS[CVE-2018-16882] = "fixed-version: Fixed from version 4.20" + +CVE_STATUS[CVE-2018-16884] = "fixed-version: Fixed from version 5.0rc1" + +# CVE-2018-16885 has no known resolution + +CVE_STATUS[CVE-2018-17182] = "fixed-version: Fixed from version 4.19rc4" + +CVE_STATUS[CVE-2018-17972] = "fixed-version: Fixed from version 4.19rc7" + +# CVE-2018-17977 has no known resolution + +CVE_STATUS[CVE-2018-18021] = "fixed-version: Fixed from version 4.19rc7" + +CVE_STATUS[CVE-2018-18281] = "fixed-version: Fixed from version 4.19" + +CVE_STATUS[CVE-2018-18386] = "fixed-version: Fixed from version 4.15rc6" + +CVE_STATUS[CVE-2018-18397] = "fixed-version: Fixed from version 4.20rc5" + +CVE_STATUS[CVE-2018-18445] = "fixed-version: Fixed from version 4.19rc7" + +CVE_STATUS[CVE-2018-18559] = "fixed-version: Fixed from version 4.15rc2" + +# CVE-2018-18653 has no known resolution + +CVE_STATUS[CVE-2018-18690] = "fixed-version: Fixed from version 4.17rc4" + +CVE_STATUS[CVE-2018-18710] = "fixed-version: Fixed from version 4.20rc1" + +CVE_STATUS[CVE-2018-18955] = "fixed-version: Fixed from version 4.20rc2" + +CVE_STATUS[CVE-2018-19406] = "fixed-version: Fixed from version 4.20rc5" + +CVE_STATUS[CVE-2018-19407] = "fixed-version: Fixed from version 4.20rc5" + +CVE_STATUS[CVE-2018-19824] = "fixed-version: Fixed from version 4.20rc6" + +CVE_STATUS[CVE-2018-19854] = "fixed-version: Fixed from version 4.20rc3" + +CVE_STATUS[CVE-2018-19985] = "fixed-version: Fixed from version 4.20" + +CVE_STATUS[CVE-2018-20169] = "fixed-version: Fixed from version 4.20rc6" + +CVE_STATUS[CVE-2018-20449] = "fixed-version: Fixed from version 4.15rc2" + +CVE_STATUS[CVE-2018-20509] = "fixed-version: Fixed from version 4.14rc1" + +CVE_STATUS[CVE-2018-20510] = "fixed-version: Fixed from version 4.16rc3" + +CVE_STATUS[CVE-2018-20511] = "fixed-version: Fixed from version 4.19rc5" + +CVE_STATUS[CVE-2018-20669] = "fixed-version: Fixed from version 5.0rc1" + +CVE_STATUS[CVE-2018-20784] = "fixed-version: Fixed from version 5.0rc1" + +CVE_STATUS[CVE-2018-20836] = "fixed-version: Fixed from version 4.20rc1" + +CVE_STATUS[CVE-2018-20854] = "fixed-version: Fixed from version 4.20rc1" + +CVE_STATUS[CVE-2018-20855] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-20856] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-20961] = "fixed-version: Fixed from version 4.17rc1" + +CVE_STATUS[CVE-2018-20976] = "fixed-version: Fixed from version 4.18rc1" + +CVE_STATUS[CVE-2018-21008] = "fixed-version: Fixed from version 4.18rc1" + +CVE_STATUS[CVE-2018-25015] = "fixed-version: Fixed from version 4.15rc9" + +CVE_STATUS[CVE-2018-25020] = "fixed-version: Fixed from version 4.17rc7" + +# CVE-2018-3574 has no known resolution + +CVE_STATUS[CVE-2018-3620] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-3639] = "fixed-version: Fixed from version 4.17rc7" + +CVE_STATUS[CVE-2018-3646] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-3665] = "fixed-version: Fixed from version 3.7rc1" + +CVE_STATUS[CVE-2018-3693] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-5332] = "fixed-version: Fixed from version 4.15rc8" + +CVE_STATUS[CVE-2018-5333] = "fixed-version: Fixed from version 4.15rc8" + +CVE_STATUS[CVE-2018-5344] = "fixed-version: Fixed from version 4.15rc8" + +CVE_STATUS[CVE-2018-5390] = "fixed-version: Fixed from version 4.18rc7" + +CVE_STATUS[CVE-2018-5391] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-5703] = "fixed-version: Fixed from version 4.16rc5" + +CVE_STATUS[CVE-2018-5750] = "fixed-version: Fixed from version 4.16rc1" + +CVE_STATUS[CVE-2018-5803] = "fixed-version: Fixed from version 4.16rc1" + +CVE_STATUS[CVE-2018-5814] = "fixed-version: Fixed from version 4.17rc6" + +CVE_STATUS[CVE-2018-5848] = "fixed-version: Fixed from version 4.16rc1" + +# Skipping CVE-2018-5856, no affected_versions + +CVE_STATUS[CVE-2018-5873] = "fixed-version: Fixed from version 4.11rc8" + +CVE_STATUS[CVE-2018-5953] = "fixed-version: Fixed from version 4.15rc2" + +CVE_STATUS[CVE-2018-5995] = "fixed-version: Fixed from version 4.15rc2" + +CVE_STATUS[CVE-2018-6412] = "fixed-version: Fixed from version 4.16rc5" + +CVE_STATUS[CVE-2018-6554] = "fixed-version: Fixed from version 4.17rc1" + +CVE_STATUS[CVE-2018-6555] = "fixed-version: Fixed from version 4.17rc1" + +# CVE-2018-6559 has no known resolution + +CVE_STATUS[CVE-2018-6927] = "fixed-version: Fixed from version 4.15rc9" + +CVE_STATUS[CVE-2018-7191] = "fixed-version: Fixed from version 4.14rc6" + +CVE_STATUS[CVE-2018-7273] = "fixed-version: Fixed from version 4.15rc2" + +CVE_STATUS[CVE-2018-7480] = "fixed-version: Fixed from version 4.11rc1" + +CVE_STATUS[CVE-2018-7492] = "fixed-version: Fixed from version 4.15rc3" + +CVE_STATUS[CVE-2018-7566] = "fixed-version: Fixed from version 4.16rc2" + +CVE_STATUS[CVE-2018-7740] = "fixed-version: Fixed from version 4.16rc7" + +CVE_STATUS[CVE-2018-7754] = "fixed-version: Fixed from version 4.15rc2" + +CVE_STATUS[CVE-2018-7755] = "fixed-version: Fixed from version 4.19rc5" + +CVE_STATUS[CVE-2018-7757] = "fixed-version: Fixed from version 4.16rc1" + +CVE_STATUS[CVE-2018-7995] = "fixed-version: Fixed from version 4.16rc5" + +CVE_STATUS[CVE-2018-8043] = "fixed-version: Fixed from version 4.16rc1" + +CVE_STATUS[CVE-2018-8087] = "fixed-version: Fixed from version 4.16rc1" + +CVE_STATUS[CVE-2018-8781] = "fixed-version: Fixed from version 4.16rc7" + +CVE_STATUS[CVE-2018-8822] = "fixed-version: Fixed from version 4.16rc7" + +CVE_STATUS[CVE-2018-8897] = "fixed-version: Fixed from version 4.16rc7" + +CVE_STATUS[CVE-2018-9363] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2018-9385] = "fixed-version: Fixed from version 4.17rc3" + +CVE_STATUS[CVE-2018-9415] = "fixed-version: Fixed from version 4.17rc3" + +CVE_STATUS[CVE-2018-9422] = "fixed-version: Fixed from version 4.6rc1" + +CVE_STATUS[CVE-2018-9465] = "fixed-version: Fixed from version 4.15rc6" + +CVE_STATUS[CVE-2018-9516] = "fixed-version: Fixed from version 4.18rc5" + +CVE_STATUS[CVE-2018-9517] = "fixed-version: Fixed from version 4.14rc1" + +CVE_STATUS[CVE-2018-9518] = "fixed-version: Fixed from version 4.16rc3" + +CVE_STATUS[CVE-2018-9568] = "fixed-version: Fixed from version 4.14rc4" + +CVE_STATUS[CVE-2019-0136] = "fixed-version: Fixed from version 5.2rc6" + +CVE_STATUS[CVE-2019-0145] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2019-0146] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2019-0147] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2019-0148] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2019-0149] = "fixed-version: Fixed from version 5.3rc1" + +CVE_STATUS[CVE-2019-0154] = "fixed-version: Fixed from version 5.4rc8" + +CVE_STATUS[CVE-2019-0155] = "fixed-version: Fixed from version 5.4rc8" + +CVE_STATUS[CVE-2019-10124] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-10125] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-10126] = "fixed-version: Fixed from version 5.2rc6" + +# CVE-2019-10140 has no known resolution + +CVE_STATUS[CVE-2019-10142] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2019-10207] = "fixed-version: Fixed from version 5.3rc3" + +CVE_STATUS[CVE-2019-10220] = "fixed-version: Fixed from version 5.4rc2" + +CVE_STATUS[CVE-2019-10638] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2019-10639] = "fixed-version: Fixed from version 5.1rc4" + +CVE_STATUS[CVE-2019-11085] = "fixed-version: Fixed from version 5.0rc3" + +CVE_STATUS[CVE-2019-11091] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2019-11135] = "fixed-version: Fixed from version 5.4rc8" + +CVE_STATUS[CVE-2019-11190] = "fixed-version: Fixed from version 4.8rc5" + +CVE_STATUS[CVE-2019-11191] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-1125] = "fixed-version: Fixed from version 5.3rc4" + +CVE_STATUS[CVE-2019-11477] = "fixed-version: Fixed from version 5.2rc6" + +CVE_STATUS[CVE-2019-11478] = "fixed-version: Fixed from version 5.2rc6" + +CVE_STATUS[CVE-2019-11479] = "fixed-version: Fixed from version 5.2rc6" + +CVE_STATUS[CVE-2019-11486] = "fixed-version: Fixed from version 5.1rc4" + +CVE_STATUS[CVE-2019-11487] = "fixed-version: Fixed from version 5.1rc5" + +CVE_STATUS[CVE-2019-11599] = "fixed-version: Fixed from version 5.1rc6" + +CVE_STATUS[CVE-2019-11683] = "fixed-version: Fixed from version 5.1" + +CVE_STATUS[CVE-2019-11810] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-11811] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-11815] = "fixed-version: Fixed from version 5.1rc4" + +CVE_STATUS[CVE-2019-11833] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2019-11884] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2019-12378] = "fixed-version: Fixed from version 5.2rc3" + +CVE_STATUS[CVE-2019-12379] = "fixed-version: Fixed from version 5.3rc1" + +CVE_STATUS[CVE-2019-12380] = "fixed-version: Fixed from version 5.2rc3" + +CVE_STATUS[CVE-2019-12381] = "fixed-version: Fixed from version 5.2rc3" + +CVE_STATUS[CVE-2019-12382] = "fixed-version: Fixed from version 5.3rc1" + +CVE_STATUS[CVE-2019-12454] = "fixed-version: Fixed from version 5.3rc1" + +CVE_STATUS[CVE-2019-12455] = "fixed-version: Fixed from version 5.3rc1" + +# CVE-2019-12456 has no known resolution + +CVE_STATUS[CVE-2019-12614] = "fixed-version: Fixed from version 5.3rc1" + +CVE_STATUS[CVE-2019-12615] = "fixed-version: Fixed from version 5.2rc4" + +CVE_STATUS[CVE-2019-12817] = "fixed-version: Fixed from version 5.2rc7" + +CVE_STATUS[CVE-2019-12818] = "fixed-version: Fixed from version 5.0" + +CVE_STATUS[CVE-2019-12819] = "fixed-version: Fixed from version 5.0rc8" + +CVE_STATUS[CVE-2019-12881] = "fixed-version: Fixed from version 4.18rc1" + +CVE_STATUS[CVE-2019-12984] = "fixed-version: Fixed from version 5.2rc6" + +CVE_STATUS[CVE-2019-13233] = "fixed-version: Fixed from version 5.2rc4" + +CVE_STATUS[CVE-2019-13272] = "fixed-version: Fixed from version 5.2" + +CVE_STATUS[CVE-2019-13631] = "fixed-version: Fixed from version 5.3rc1" + +CVE_STATUS[CVE-2019-13648] = "fixed-version: Fixed from version 5.3rc2" + +CVE_STATUS[CVE-2019-14283] = "fixed-version: Fixed from version 5.3rc1" + +CVE_STATUS[CVE-2019-14284] = "fixed-version: Fixed from version 5.3rc1" + +CVE_STATUS[CVE-2019-14615] = "fixed-version: Fixed from version 5.5rc7" + +CVE_STATUS[CVE-2019-14763] = "fixed-version: Fixed from version 4.17rc1" + +CVE_STATUS[CVE-2019-14814] = "fixed-version: Fixed from version 5.3" + +CVE_STATUS[CVE-2019-14815] = "fixed-version: Fixed from version 5.3" + +CVE_STATUS[CVE-2019-14816] = "fixed-version: Fixed from version 5.3" + +CVE_STATUS[CVE-2019-14821] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-14835] = "fixed-version: Fixed from version 5.3" + +CVE_STATUS[CVE-2019-14895] = "fixed-version: Fixed from version 5.5rc3" + +CVE_STATUS[CVE-2019-14896] = "fixed-version: Fixed from version 5.5" + +CVE_STATUS[CVE-2019-14897] = "fixed-version: Fixed from version 5.5" + +# CVE-2019-14898 has no known resolution + +CVE_STATUS[CVE-2019-14901] = "fixed-version: Fixed from version 5.5rc3" + +CVE_STATUS[CVE-2019-15030] = "fixed-version: Fixed from version 5.3rc8" + +CVE_STATUS[CVE-2019-15031] = "fixed-version: Fixed from version 5.3rc8" + +CVE_STATUS[CVE-2019-15090] = "fixed-version: Fixed from version 5.2rc2" + +CVE_STATUS[CVE-2019-15098] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-15099] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-15117] = "fixed-version: Fixed from version 5.3rc5" + +CVE_STATUS[CVE-2019-15118] = "fixed-version: Fixed from version 5.3rc5" + +CVE_STATUS[CVE-2019-15211] = "fixed-version: Fixed from version 5.3rc1" + +CVE_STATUS[CVE-2019-15212] = "fixed-version: Fixed from version 5.2rc3" + +CVE_STATUS[CVE-2019-15213] = "fixed-version: Fixed from version 5.3rc1" + +CVE_STATUS[CVE-2019-15214] = "fixed-version: Fixed from version 5.1rc6" + +CVE_STATUS[CVE-2019-15215] = "fixed-version: Fixed from version 5.3rc1" + +CVE_STATUS[CVE-2019-15216] = "fixed-version: Fixed from version 5.1" + +CVE_STATUS[CVE-2019-15217] = "fixed-version: Fixed from version 5.3rc1" + +CVE_STATUS[CVE-2019-15218] = "fixed-version: Fixed from version 5.2rc3" + +CVE_STATUS[CVE-2019-15219] = "fixed-version: Fixed from version 5.2rc3" + +CVE_STATUS[CVE-2019-15220] = "fixed-version: Fixed from version 5.3rc1" + +CVE_STATUS[CVE-2019-15221] = "fixed-version: Fixed from version 5.2" + +CVE_STATUS[CVE-2019-15222] = "fixed-version: Fixed from version 5.3rc3" + +CVE_STATUS[CVE-2019-15223] = "fixed-version: Fixed from version 5.2rc3" + +# CVE-2019-15239 has no known resolution + +# CVE-2019-15290 has no known resolution + +CVE_STATUS[CVE-2019-15291] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-15292] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-15504] = "fixed-version: Fixed from version 5.3" + +CVE_STATUS[CVE-2019-15505] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-15538] = "fixed-version: Fixed from version 5.3rc6" + +CVE_STATUS[CVE-2019-15666] = "fixed-version: Fixed from version 5.1" + +# CVE-2019-15791 has no known resolution + +# CVE-2019-15792 has no known resolution + +# CVE-2019-15793 has no known resolution + +CVE_STATUS[CVE-2019-15794] = "fixed-version: Fixed from version 5.12" + +CVE_STATUS[CVE-2019-15807] = "fixed-version: Fixed from version 5.2rc3" + +# CVE-2019-15902 has no known resolution + +CVE_STATUS[CVE-2019-15916] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-15917] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-15918] = "fixed-version: Fixed from version 5.1rc6" + +CVE_STATUS[CVE-2019-15919] = "fixed-version: Fixed from version 5.1rc6" + +CVE_STATUS[CVE-2019-15920] = "fixed-version: Fixed from version 5.1rc6" + +CVE_STATUS[CVE-2019-15921] = "fixed-version: Fixed from version 5.1rc3" + +CVE_STATUS[CVE-2019-15922] = "fixed-version: Fixed from version 5.1rc4" + +CVE_STATUS[CVE-2019-15923] = "fixed-version: Fixed from version 5.1rc4" + +CVE_STATUS[CVE-2019-15924] = "fixed-version: Fixed from version 5.1rc4" + +CVE_STATUS[CVE-2019-15925] = "fixed-version: Fixed from version 5.3rc1" + +CVE_STATUS[CVE-2019-15926] = "fixed-version: Fixed from version 5.3rc1" + +CVE_STATUS[CVE-2019-15927] = "fixed-version: Fixed from version 5.0rc2" + +# CVE-2019-16089 has no known resolution + +CVE_STATUS[CVE-2019-16229] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-16230] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-16231] = "fixed-version: Fixed from version 5.4rc6" + +CVE_STATUS[CVE-2019-16232] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-16233] = "fixed-version: Fixed from version 5.4rc5" + +CVE_STATUS[CVE-2019-16234] = "fixed-version: Fixed from version 5.4rc4" + +CVE_STATUS[CVE-2019-16413] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-16714] = "fixed-version: Fixed from version 5.3rc7" + +CVE_STATUS[CVE-2019-16746] = "fixed-version: Fixed from version 5.4rc2" + +CVE_STATUS[CVE-2019-16921] = "fixed-version: Fixed from version 4.17rc1" + +CVE_STATUS[CVE-2019-16994] = "fixed-version: Fixed from version 5.0" + +CVE_STATUS[CVE-2019-16995] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-17052] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-17053] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-17054] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-17055] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-17056] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-17075] = "fixed-version: Fixed from version 5.4rc3" + +CVE_STATUS[CVE-2019-17133] = "fixed-version: Fixed from version 5.4rc4" + +CVE_STATUS[CVE-2019-17351] = "fixed-version: Fixed from version 5.3rc1" + +CVE_STATUS[CVE-2019-17666] = "fixed-version: Fixed from version 5.4rc6" + +CVE_STATUS[CVE-2019-18198] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-18282] = "fixed-version: Fixed from version 5.4rc6" + +CVE_STATUS[CVE-2019-18660] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-18675] = "fixed-version: Fixed from version 4.17rc5" + +# CVE-2019-18680 has no known resolution + +CVE_STATUS[CVE-2019-18683] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-18786] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-18805] = "fixed-version: Fixed from version 5.1rc7" + +CVE_STATUS[CVE-2019-18806] = "fixed-version: Fixed from version 5.4rc2" + +CVE_STATUS[CVE-2019-18807] = "fixed-version: Fixed from version 5.4rc2" + +CVE_STATUS[CVE-2019-18808] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-18809] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-18810] = "fixed-version: Fixed from version 5.4rc2" + +CVE_STATUS[CVE-2019-18811] = "fixed-version: Fixed from version 5.4rc7" + +CVE_STATUS[CVE-2019-18812] = "fixed-version: Fixed from version 5.4rc7" + +CVE_STATUS[CVE-2019-18813] = "fixed-version: Fixed from version 5.4rc6" + +CVE_STATUS[CVE-2019-18814] = "fixed-version: Fixed from version 5.7rc7" + +CVE_STATUS[CVE-2019-18885] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-19036] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-19037] = "fixed-version: Fixed from version 5.5rc3" + +CVE_STATUS[CVE-2019-19039] = "fixed-version: Fixed from version 5.7rc1" + +CVE_STATUS[CVE-2019-19043] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19044] = "fixed-version: Fixed from version 5.4rc6" + +CVE_STATUS[CVE-2019-19045] = "fixed-version: Fixed from version 5.4rc6" + +CVE_STATUS[CVE-2019-19046] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19047] = "fixed-version: Fixed from version 5.4rc6" + +CVE_STATUS[CVE-2019-19048] = "fixed-version: Fixed from version 5.4rc3" + +CVE_STATUS[CVE-2019-19049] = "fixed-version: Fixed from version 5.4rc5" + +CVE_STATUS[CVE-2019-19050] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19051] = "fixed-version: Fixed from version 5.4rc6" + +CVE_STATUS[CVE-2019-19052] = "fixed-version: Fixed from version 5.4rc7" + +CVE_STATUS[CVE-2019-19053] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19054] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19055] = "fixed-version: Fixed from version 5.4rc4" + +CVE_STATUS[CVE-2019-19056] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19057] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19058] = "fixed-version: Fixed from version 5.4rc4" + +CVE_STATUS[CVE-2019-19059] = "fixed-version: Fixed from version 5.4rc4" + +CVE_STATUS[CVE-2019-19060] = "fixed-version: Fixed from version 5.4rc3" + +CVE_STATUS[CVE-2019-19061] = "fixed-version: Fixed from version 5.4rc3" + +CVE_STATUS[CVE-2019-19062] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19063] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19064] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19065] = "fixed-version: Fixed from version 5.4rc3" + +CVE_STATUS[CVE-2019-19066] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19067] = "fixed-version: Fixed from version 5.4rc2" + +CVE_STATUS[CVE-2019-19068] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19069] = "fixed-version: Fixed from version 5.4rc3" + +CVE_STATUS[CVE-2019-19070] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19071] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19072] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-19073] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-19074] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-19075] = "fixed-version: Fixed from version 5.4rc2" + +CVE_STATUS[CVE-2019-19076] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-19077] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-19078] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19079] = "fixed-version: Fixed from version 5.3" + +CVE_STATUS[CVE-2019-19080] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-19081] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-19082] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-19083] = "fixed-version: Fixed from version 5.4rc2" + +CVE_STATUS[CVE-2019-19227] = "fixed-version: Fixed from version 5.1rc3" + +CVE_STATUS[CVE-2019-19241] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19252] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19318] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-19319] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2019-19332] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19338] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19377] = "fixed-version: Fixed from version 5.7rc1" + +# CVE-2019-19378 has no known resolution + +CVE_STATUS[CVE-2019-19447] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19448] = "fixed-version: Fixed from version 5.9rc1" + +CVE_STATUS[CVE-2019-19449] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2019-19462] = "fixed-version: Fixed from version 5.8rc1" + +CVE_STATUS[CVE-2019-19523] = "fixed-version: Fixed from version 5.4rc3" + +CVE_STATUS[CVE-2019-19524] = "fixed-version: Fixed from version 5.4rc8" + +CVE_STATUS[CVE-2019-19525] = "fixed-version: Fixed from version 5.4rc2" + +CVE_STATUS[CVE-2019-19526] = "fixed-version: Fixed from version 5.4rc4" + +CVE_STATUS[CVE-2019-19527] = "fixed-version: Fixed from version 5.3rc4" + +CVE_STATUS[CVE-2019-19528] = "fixed-version: Fixed from version 5.4rc3" + +CVE_STATUS[CVE-2019-19529] = "fixed-version: Fixed from version 5.4rc7" + +CVE_STATUS[CVE-2019-19530] = "fixed-version: Fixed from version 5.3rc5" + +CVE_STATUS[CVE-2019-19531] = "fixed-version: Fixed from version 5.3rc4" + +CVE_STATUS[CVE-2019-19532] = "fixed-version: Fixed from version 5.4rc6" + +CVE_STATUS[CVE-2019-19533] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-19534] = "fixed-version: Fixed from version 5.4rc7" + +CVE_STATUS[CVE-2019-19535] = "fixed-version: Fixed from version 5.3rc4" + +CVE_STATUS[CVE-2019-19536] = "fixed-version: Fixed from version 5.3rc4" + +CVE_STATUS[CVE-2019-19537] = "fixed-version: Fixed from version 5.3rc5" + +CVE_STATUS[CVE-2019-19543] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2019-19602] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19767] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2019-19768] = "fixed-version: Fixed from version 5.6rc4" + +CVE_STATUS[CVE-2019-19769] = "fixed-version: Fixed from version 5.6rc5" + +CVE_STATUS[CVE-2019-19770] = "fixed-version: Fixed from version 5.9rc1" + +CVE_STATUS[CVE-2019-19807] = "fixed-version: Fixed from version 5.4rc7" + +CVE_STATUS[CVE-2019-19813] = "fixed-version: Fixed from version 5.2rc1" + +# CVE-2019-19814 has no known resolution + +CVE_STATUS[CVE-2019-19815] = "fixed-version: Fixed from version 5.3rc1" + +CVE_STATUS[CVE-2019-19816] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2019-19922] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-19927] = "fixed-version: Fixed from version 5.1rc6" + +CVE_STATUS[CVE-2019-19947] = "fixed-version: Fixed from version 5.5rc3" + +CVE_STATUS[CVE-2019-19965] = "fixed-version: Fixed from version 5.5rc2" + +CVE_STATUS[CVE-2019-19966] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2019-1999] = "fixed-version: Fixed from version 5.1rc3" + +CVE_STATUS[CVE-2019-20054] = "fixed-version: Fixed from version 5.1rc3" + +CVE_STATUS[CVE-2019-20095] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2019-20096] = "fixed-version: Fixed from version 5.1rc4" + +CVE_STATUS[CVE-2019-2024] = "fixed-version: Fixed from version 4.16rc1" + +CVE_STATUS[CVE-2019-2025] = "fixed-version: Fixed from version 4.20rc5" + +CVE_STATUS[CVE-2019-20422] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-2054] = "fixed-version: Fixed from version 4.8rc1" + +CVE_STATUS[CVE-2019-20636] = "fixed-version: Fixed from version 5.5rc6" + +# CVE-2019-20794 has no known resolution + +CVE_STATUS[CVE-2019-20806] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2019-20810] = "fixed-version: Fixed from version 5.6rc1" + +CVE_STATUS[CVE-2019-20811] = "fixed-version: Fixed from version 5.1rc3" + +CVE_STATUS[CVE-2019-20812] = "fixed-version: Fixed from version 5.5rc3" + +CVE_STATUS[CVE-2019-20908] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2019-20934] = "fixed-version: Fixed from version 5.3rc2" + +CVE_STATUS[CVE-2019-2101] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-2181] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2019-2182] = "fixed-version: Fixed from version 4.16rc3" + +CVE_STATUS[CVE-2019-2213] = "fixed-version: Fixed from version 5.2rc6" + +CVE_STATUS[CVE-2019-2214] = "fixed-version: Fixed from version 5.3rc2" + +CVE_STATUS[CVE-2019-2215] = "fixed-version: Fixed from version 4.16rc1" + +CVE_STATUS[CVE-2019-25044] = "fixed-version: Fixed from version 5.2rc4" + +CVE_STATUS[CVE-2019-25045] = "fixed-version: Fixed from version 5.1" + +CVE_STATUS[CVE-2019-3016] = "fixed-version: Fixed from version 5.6rc1" + +CVE_STATUS[CVE-2019-3459] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-3460] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-3701] = "fixed-version: Fixed from version 5.0rc3" + +CVE_STATUS[CVE-2019-3819] = "fixed-version: Fixed from version 5.0rc6" + +CVE_STATUS[CVE-2019-3837] = "fixed-version: Fixed from version 3.18rc1" + +CVE_STATUS[CVE-2019-3846] = "fixed-version: Fixed from version 5.2rc6" + +CVE_STATUS[CVE-2019-3874] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2019-3882] = "fixed-version: Fixed from version 5.1rc4" + +CVE_STATUS[CVE-2019-3887] = "fixed-version: Fixed from version 5.1rc4" + +CVE_STATUS[CVE-2019-3892] = "fixed-version: Fixed from version 5.1rc6" + +CVE_STATUS[CVE-2019-3896] = "fixed-version: Fixed from version 2.6.35rc1" + +CVE_STATUS[CVE-2019-3900] = "fixed-version: Fixed from version 5.2rc4" + +CVE_STATUS[CVE-2019-3901] = "fixed-version: Fixed from version 4.6rc6" + +CVE_STATUS[CVE-2019-5108] = "fixed-version: Fixed from version 5.3" + +# Skipping CVE-2019-5489, no affected_versions + +CVE_STATUS[CVE-2019-6133] = "fixed-version: Fixed from version 5.0rc2" + +CVE_STATUS[CVE-2019-6974] = "fixed-version: Fixed from version 5.0rc6" + +CVE_STATUS[CVE-2019-7221] = "fixed-version: Fixed from version 5.0rc6" + +CVE_STATUS[CVE-2019-7222] = "fixed-version: Fixed from version 5.0rc6" + +CVE_STATUS[CVE-2019-7308] = "fixed-version: Fixed from version 5.0rc3" + +CVE_STATUS[CVE-2019-8912] = "fixed-version: Fixed from version 5.0rc8" + +CVE_STATUS[CVE-2019-8956] = "fixed-version: Fixed from version 5.0rc6" + +CVE_STATUS[CVE-2019-8980] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-9003] = "fixed-version: Fixed from version 5.0rc4" + +CVE_STATUS[CVE-2019-9162] = "fixed-version: Fixed from version 5.0rc7" + +CVE_STATUS[CVE-2019-9213] = "fixed-version: Fixed from version 5.0" + +CVE_STATUS[CVE-2019-9245] = "fixed-version: Fixed from version 5.0rc1" + +CVE_STATUS[CVE-2019-9444] = "fixed-version: Fixed from version 4.15rc2" + +CVE_STATUS[CVE-2019-9445] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-9453] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2019-9454] = "fixed-version: Fixed from version 4.15rc9" + +CVE_STATUS[CVE-2019-9455] = "fixed-version: Fixed from version 5.0rc1" + +CVE_STATUS[CVE-2019-9456] = "fixed-version: Fixed from version 4.16rc6" + +CVE_STATUS[CVE-2019-9457] = "fixed-version: Fixed from version 4.13rc1" + +CVE_STATUS[CVE-2019-9458] = "fixed-version: Fixed from version 4.19rc7" + +CVE_STATUS[CVE-2019-9466] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-9500] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-9503] = "fixed-version: Fixed from version 5.1rc1" + +CVE_STATUS[CVE-2019-9506] = "fixed-version: Fixed from version 5.2" + +CVE_STATUS[CVE-2019-9857] = "fixed-version: Fixed from version 5.1rc2" + +CVE_STATUS[CVE-2020-0009] = "fixed-version: Fixed from version 5.6rc3" + +CVE_STATUS[CVE-2020-0030] = "fixed-version: Fixed from version 4.16rc3" + +CVE_STATUS[CVE-2020-0041] = "fixed-version: Fixed from version 5.5rc2" + +CVE_STATUS[CVE-2020-0066] = "fixed-version: Fixed from version 4.3rc7" + +CVE_STATUS[CVE-2020-0067] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2020-0110] = "fixed-version: Fixed from version 5.6rc2" + +CVE_STATUS[CVE-2020-0255] = "fixed-version: Fixed from version 5.7rc4" + +CVE_STATUS[CVE-2020-0305] = "fixed-version: Fixed from version 5.5rc6" + +# CVE-2020-0347 has no known resolution + +CVE_STATUS[CVE-2020-0404] = "fixed-version: Fixed from version 5.6rc1" + +CVE_STATUS[CVE-2020-0423] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2020-0427] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2020-0429] = "fixed-version: Fixed from version 4.14rc4" + +CVE_STATUS[CVE-2020-0430] = "fixed-version: Fixed from version 4.18rc1" + +CVE_STATUS[CVE-2020-0431] = "fixed-version: Fixed from version 5.5rc6" + +CVE_STATUS[CVE-2020-0432] = "fixed-version: Fixed from version 5.6rc1" + +CVE_STATUS[CVE-2020-0433] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2020-0435] = "fixed-version: Fixed from version 4.19rc1" + +CVE_STATUS[CVE-2020-0444] = "fixed-version: Fixed from version 5.6rc4" + +CVE_STATUS[CVE-2020-0465] = "fixed-version: Fixed from version 5.9rc4" + +CVE_STATUS[CVE-2020-0466] = "fixed-version: Fixed from version 5.9rc2" + +CVE_STATUS[CVE-2020-0543] = "fixed-version: Fixed from version 5.8rc1" + +CVE_STATUS[CVE-2020-10135] = "fixed-version: Fixed from version 5.8rc1" + +CVE_STATUS[CVE-2020-10690] = "fixed-version: Fixed from version 5.5rc5" + +# CVE-2020-10708 has no known resolution + +CVE_STATUS[CVE-2020-10711] = "fixed-version: Fixed from version 5.7rc6" + +CVE_STATUS[CVE-2020-10720] = "fixed-version: Fixed from version 5.2rc3" + +CVE_STATUS[CVE-2020-10732] = "fixed-version: Fixed from version 5.7" + +CVE_STATUS[CVE-2020-10742] = "fixed-version: Fixed from version 3.16rc1" + +CVE_STATUS[CVE-2020-10751] = "fixed-version: Fixed from version 5.7rc4" + +CVE_STATUS[CVE-2020-10757] = "fixed-version: Fixed from version 5.8rc1" + +CVE_STATUS[CVE-2020-10766] = "fixed-version: Fixed from version 5.8rc1" + +CVE_STATUS[CVE-2020-10767] = "fixed-version: Fixed from version 5.8rc1" + +CVE_STATUS[CVE-2020-10768] = "fixed-version: Fixed from version 5.8rc1" + +CVE_STATUS[CVE-2020-10769] = "fixed-version: Fixed from version 5.0rc3" + +CVE_STATUS[CVE-2020-10773] = "fixed-version: Fixed from version 5.4rc6" + +# CVE-2020-10774 has no known resolution + +CVE_STATUS[CVE-2020-10781] = "fixed-version: Fixed from version 5.8rc6" + +CVE_STATUS[CVE-2020-10942] = "fixed-version: Fixed from version 5.6rc4" + +CVE_STATUS[CVE-2020-11494] = "fixed-version: Fixed from version 5.7rc1" + +CVE_STATUS[CVE-2020-11565] = "fixed-version: Fixed from version 5.7rc1" + +CVE_STATUS[CVE-2020-11608] = "fixed-version: Fixed from version 5.7rc1" + +CVE_STATUS[CVE-2020-11609] = "fixed-version: Fixed from version 5.7rc1" + +CVE_STATUS[CVE-2020-11668] = "fixed-version: Fixed from version 5.7rc1" + +CVE_STATUS[CVE-2020-11669] = "fixed-version: Fixed from version 5.2rc1" + +# CVE-2020-11725 has no known resolution + +CVE_STATUS[CVE-2020-11884] = "fixed-version: Fixed from version 5.7rc4" + +# CVE-2020-11935 has no known resolution + +CVE_STATUS[CVE-2020-12114] = "fixed-version: Fixed from version 5.3rc1" + +CVE_STATUS[CVE-2020-12351] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2020-12352] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2020-12362] = "fixed-version: Fixed from version 5.11rc1" + +CVE_STATUS[CVE-2020-12363] = "fixed-version: Fixed from version 5.11rc1" + +CVE_STATUS[CVE-2020-12364] = "fixed-version: Fixed from version 5.11rc1" + +CVE_STATUS[CVE-2020-12464] = "fixed-version: Fixed from version 5.7rc3" + +CVE_STATUS[CVE-2020-12465] = "fixed-version: Fixed from version 5.6rc6" + +CVE_STATUS[CVE-2020-12652] = "fixed-version: Fixed from version 5.5rc7" + +CVE_STATUS[CVE-2020-12653] = "fixed-version: Fixed from version 5.6rc1" + +CVE_STATUS[CVE-2020-12654] = "fixed-version: Fixed from version 5.6rc1" + +CVE_STATUS[CVE-2020-12655] = "fixed-version: Fixed from version 5.7rc1" + +CVE_STATUS[CVE-2020-12656] = "fixed-version: Fixed from version 5.8rc1" + +CVE_STATUS[CVE-2020-12657] = "fixed-version: Fixed from version 5.7rc1" + +CVE_STATUS[CVE-2020-12659] = "fixed-version: Fixed from version 5.7rc2" + +CVE_STATUS[CVE-2020-12768] = "fixed-version: Fixed from version 5.6rc4" + +CVE_STATUS[CVE-2020-12769] = "fixed-version: Fixed from version 5.5rc6" + +CVE_STATUS[CVE-2020-12770] = "fixed-version: Fixed from version 5.7rc3" + +CVE_STATUS[CVE-2020-12771] = "fixed-version: Fixed from version 5.8rc2" + +CVE_STATUS[CVE-2020-12826] = "fixed-version: Fixed from version 5.7rc1" + +CVE_STATUS[CVE-2020-12888] = "fixed-version: Fixed from version 5.8rc1" + +CVE_STATUS[CVE-2020-12912] = "fixed-version: Fixed from version 5.10rc4" + +CVE_STATUS[CVE-2020-13143] = "fixed-version: Fixed from version 5.7rc6" + +CVE_STATUS[CVE-2020-13974] = "fixed-version: Fixed from version 5.8rc1" + +# CVE-2020-14304 has no known resolution + +CVE_STATUS[CVE-2020-14305] = "fixed-version: Fixed from version 4.12rc1" + +CVE_STATUS[CVE-2020-14314] = "fixed-version: Fixed from version 5.9rc2" + +CVE_STATUS[CVE-2020-14331] = "fixed-version: Fixed from version 5.9rc1" + +CVE_STATUS[CVE-2020-14351] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2020-14353] = "fixed-version: Fixed from version 4.14rc3" + +CVE_STATUS[CVE-2020-14356] = "fixed-version: Fixed from version 5.8rc5" + +CVE_STATUS[CVE-2020-14381] = "fixed-version: Fixed from version 5.6rc6" + +CVE_STATUS[CVE-2020-14385] = "fixed-version: Fixed from version 5.9rc4" + +CVE_STATUS[CVE-2020-14386] = "fixed-version: Fixed from version 5.9rc4" + +CVE_STATUS[CVE-2020-14390] = "fixed-version: Fixed from version 5.9rc6" + +CVE_STATUS[CVE-2020-14416] = "fixed-version: Fixed from version 5.5" + +CVE_STATUS[CVE-2020-15393] = "fixed-version: Fixed from version 5.8rc3" + +CVE_STATUS[CVE-2020-15436] = "fixed-version: Fixed from version 5.8rc2" + +CVE_STATUS[CVE-2020-15437] = "fixed-version: Fixed from version 5.8rc7" + +CVE_STATUS[CVE-2020-15780] = "fixed-version: Fixed from version 5.8rc3" + +# CVE-2020-15802 has no known resolution + +CVE_STATUS[CVE-2020-15852] = "fixed-version: Fixed from version 5.8rc6" + +CVE_STATUS[CVE-2020-16119] = "fixed-version: Fixed from version 5.15rc2" + +CVE_STATUS[CVE-2020-16120] = "fixed-version: Fixed from version 5.8rc1" + +CVE_STATUS[CVE-2020-16166] = "fixed-version: Fixed from version 5.8" + +CVE_STATUS[CVE-2020-1749] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2020-24394] = "fixed-version: Fixed from version 5.8rc4" + +CVE_STATUS[CVE-2020-24490] = "fixed-version: Fixed from version 5.8" + +# CVE-2020-24502 has no known resolution + +# CVE-2020-24503 has no known resolution + +CVE_STATUS[CVE-2020-24504] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2020-24586] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2020-24587] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2020-24588] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2020-25211] = "fixed-version: Fixed from version 5.9rc7" + +CVE_STATUS[CVE-2020-25212] = "fixed-version: Fixed from version 5.9rc1" + +# CVE-2020-25220 has no known resolution + +CVE_STATUS[CVE-2020-25221] = "fixed-version: Fixed from version 5.9rc4" + +CVE_STATUS[CVE-2020-25284] = "fixed-version: Fixed from version 5.9rc5" + +CVE_STATUS[CVE-2020-25285] = "fixed-version: Fixed from version 5.9rc4" + +CVE_STATUS[CVE-2020-25639] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2020-25641] = "fixed-version: Fixed from version 5.9rc4" + +CVE_STATUS[CVE-2020-25643] = "fixed-version: Fixed from version 5.9rc7" + +CVE_STATUS[CVE-2020-25645] = "fixed-version: Fixed from version 5.9rc7" + +CVE_STATUS[CVE-2020-25656] = "fixed-version: Fixed from version 5.10rc2" + +# CVE-2020-25661 has no known resolution + +# CVE-2020-25662 has no known resolution + +CVE_STATUS[CVE-2020-25668] = "fixed-version: Fixed from version 5.10rc3" + +CVE_STATUS[CVE-2020-25669] = "fixed-version: Fixed from version 5.10rc5" + +CVE_STATUS[CVE-2020-25670] = "fixed-version: Fixed from version 5.12rc7" + +CVE_STATUS[CVE-2020-25671] = "fixed-version: Fixed from version 5.12rc7" + +CVE_STATUS[CVE-2020-25672] = "fixed-version: Fixed from version 5.12rc7" + +CVE_STATUS[CVE-2020-25673] = "fixed-version: Fixed from version 5.12rc7" + +CVE_STATUS[CVE-2020-25704] = "fixed-version: Fixed from version 5.10rc3" + +CVE_STATUS[CVE-2020-25705] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2020-26088] = "fixed-version: Fixed from version 5.9rc1" + +CVE_STATUS[CVE-2020-26139] = "fixed-version: Fixed from version 5.13rc4" + +# CVE-2020-26140 has no known resolution + +CVE_STATUS[CVE-2020-26141] = "fixed-version: Fixed from version 5.13rc4" + +# CVE-2020-26142 has no known resolution + +# CVE-2020-26143 has no known resolution + +CVE_STATUS[CVE-2020-26145] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2020-26147] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2020-26541] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2020-26555] = "fixed-version: Fixed from version 5.13rc1" + +# CVE-2020-26556 has no known resolution + +# CVE-2020-26557 has no known resolution + +CVE_STATUS[CVE-2020-26558] = "fixed-version: Fixed from version 5.13rc1" + +# CVE-2020-26559 has no known resolution + +# CVE-2020-26560 has no known resolution + +CVE_STATUS[CVE-2020-27066] = "fixed-version: Fixed from version 5.6" + +CVE_STATUS[CVE-2020-27067] = "fixed-version: Fixed from version 4.14rc4" + +CVE_STATUS[CVE-2020-27068] = "fixed-version: Fixed from version 5.6rc2" + +CVE_STATUS[CVE-2020-27152] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2020-27170] = "fixed-version: Fixed from version 5.12rc5" + +CVE_STATUS[CVE-2020-27171] = "fixed-version: Fixed from version 5.12rc5" + +CVE_STATUS[CVE-2020-27194] = "fixed-version: Fixed from version 5.9" + +CVE_STATUS[CVE-2020-2732] = "fixed-version: Fixed from version 5.6rc4" + +# CVE-2020-27418 has no known resolution + +CVE_STATUS[CVE-2020-27673] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2020-27675] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2020-27777] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2020-27784] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2020-27786] = "fixed-version: Fixed from version 5.7rc6" + +CVE_STATUS[CVE-2020-27815] = "fixed-version: Fixed from version 5.11rc1" + +CVE_STATUS[CVE-2020-27820] = "fixed-version: Fixed from version 5.16rc1" + +CVE_STATUS[CVE-2020-27825] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2020-27830] = "fixed-version: Fixed from version 5.10rc7" + +CVE_STATUS[CVE-2020-27835] = "fixed-version: Fixed from version 5.10rc6" + +CVE_STATUS[CVE-2020-28097] = "fixed-version: Fixed from version 5.9rc6" + +CVE_STATUS[CVE-2020-28374] = "fixed-version: Fixed from version 5.11rc4" + +CVE_STATUS[CVE-2020-28588] = "fixed-version: Fixed from version 5.10rc7" + +CVE_STATUS[CVE-2020-28915] = "fixed-version: Fixed from version 5.9" + +CVE_STATUS[CVE-2020-28941] = "fixed-version: Fixed from version 5.10rc5" + +CVE_STATUS[CVE-2020-28974] = "fixed-version: Fixed from version 5.10rc3" + +CVE_STATUS[CVE-2020-29368] = "fixed-version: Fixed from version 5.8rc1" + +CVE_STATUS[CVE-2020-29369] = "fixed-version: Fixed from version 5.8rc7" + +CVE_STATUS[CVE-2020-29370] = "fixed-version: Fixed from version 5.6rc7" + +CVE_STATUS[CVE-2020-29371] = "fixed-version: Fixed from version 5.9rc2" + +CVE_STATUS[CVE-2020-29372] = "fixed-version: Fixed from version 5.7rc3" + +CVE_STATUS[CVE-2020-29373] = "fixed-version: Fixed from version 5.6rc2" + +CVE_STATUS[CVE-2020-29374] = "fixed-version: Fixed from version 5.8rc1" + +CVE_STATUS[CVE-2020-29534] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2020-29568] = "fixed-version: Fixed from version 5.11rc1" + +CVE_STATUS[CVE-2020-29569] = "fixed-version: Fixed from version 5.11rc1" + +CVE_STATUS[CVE-2020-29660] = "fixed-version: Fixed from version 5.10rc7" + +CVE_STATUS[CVE-2020-29661] = "fixed-version: Fixed from version 5.10rc7" + +CVE_STATUS[CVE-2020-35499] = "fixed-version: Fixed from version 5.11rc1" + +# CVE-2020-35501 has no known resolution + +CVE_STATUS[CVE-2020-35508] = "fixed-version: Fixed from version 5.10rc3" + +CVE_STATUS[CVE-2020-35513] = "fixed-version: Fixed from version 4.17rc1" + +CVE_STATUS[CVE-2020-35519] = "fixed-version: Fixed from version 5.10rc7" + +CVE_STATUS[CVE-2020-36158] = "fixed-version: Fixed from version 5.11rc1" + +CVE_STATUS[CVE-2020-36310] = "fixed-version: Fixed from version 5.8rc1" + +CVE_STATUS[CVE-2020-36311] = "fixed-version: Fixed from version 5.9rc5" + +CVE_STATUS[CVE-2020-36312] = "fixed-version: Fixed from version 5.9rc5" + +CVE_STATUS[CVE-2020-36313] = "fixed-version: Fixed from version 5.7rc1" + +CVE_STATUS[CVE-2020-36322] = "fixed-version: Fixed from version 5.11rc1" + +CVE_STATUS[CVE-2020-36385] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2020-36386] = "fixed-version: Fixed from version 5.9rc1" + +CVE_STATUS[CVE-2020-36387] = "fixed-version: Fixed from version 5.9rc1" + +CVE_STATUS[CVE-2020-36516] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2020-36557] = "fixed-version: Fixed from version 5.7rc1" + +CVE_STATUS[CVE-2020-36558] = "fixed-version: Fixed from version 5.6rc3" + +CVE_STATUS[CVE-2020-36691] = "fixed-version: Fixed from version 5.8rc1" + +CVE_STATUS[CVE-2020-36694] = "fixed-version: Fixed from version 5.10" + +CVE_STATUS[CVE-2020-36766] = "fixed-version: Fixed from version 5.9rc1" + +CVE_STATUS[CVE-2020-3702] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2020-4788] = "fixed-version: Fixed from version 5.10rc5" + +CVE_STATUS[CVE-2020-7053] = "fixed-version: Fixed from version 5.2rc1" + +CVE_STATUS[CVE-2020-8428] = "fixed-version: Fixed from version 5.5" + +CVE_STATUS[CVE-2020-8647] = "fixed-version: Fixed from version 5.6rc5" + +CVE_STATUS[CVE-2020-8648] = "fixed-version: Fixed from version 5.6rc3" + +CVE_STATUS[CVE-2020-8649] = "fixed-version: Fixed from version 5.6rc5" + +CVE_STATUS[CVE-2020-8694] = "fixed-version: Fixed from version 5.10rc4" + +# CVE-2020-8832 has no known resolution + +CVE_STATUS[CVE-2020-8834] = "fixed-version: Fixed from version 4.18rc1" + +CVE_STATUS[CVE-2020-8835] = "fixed-version: Fixed from version 5.7rc1" + +CVE_STATUS[CVE-2020-8992] = "fixed-version: Fixed from version 5.6rc2" + +CVE_STATUS[CVE-2020-9383] = "fixed-version: Fixed from version 5.6rc4" + +CVE_STATUS[CVE-2020-9391] = "fixed-version: Fixed from version 5.6rc3" + +CVE_STATUS[CVE-2021-0129] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2021-0342] = "fixed-version: Fixed from version 5.8rc1" + +# CVE-2021-0399 has no known resolution + +CVE_STATUS[CVE-2021-0447] = "fixed-version: Fixed from version 4.15rc1" + +CVE_STATUS[CVE-2021-0448] = "fixed-version: Fixed from version 5.9rc7" + +CVE_STATUS[CVE-2021-0512] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2021-0605] = "fixed-version: Fixed from version 5.8" + +# CVE-2021-0606 has no known resolution + +# CVE-2021-0695 has no known resolution + +CVE_STATUS[CVE-2021-0707] = "fixed-version: Fixed from version 5.11rc3" + +CVE_STATUS[CVE-2021-0920] = "fixed-version: Fixed from version 5.14rc4" + +# CVE-2021-0924 has no known resolution + +CVE_STATUS[CVE-2021-0929] = "fixed-version: Fixed from version 5.6rc1" + +CVE_STATUS[CVE-2021-0935] = "fixed-version: Fixed from version 4.16rc7" + +# CVE-2021-0936 has no known resolution + +CVE_STATUS[CVE-2021-0937] = "fixed-version: Fixed from version 5.12rc8" + +CVE_STATUS[CVE-2021-0938] = "fixed-version: Fixed from version 5.10rc4" + +CVE_STATUS[CVE-2021-0941] = "fixed-version: Fixed from version 5.12rc1" + +# CVE-2021-0961 has no known resolution + +CVE_STATUS[CVE-2021-1048] = "fixed-version: Fixed from version 5.9rc4" + +CVE_STATUS[CVE-2021-20177] = "fixed-version: Fixed from version 5.5rc1" + +CVE_STATUS[CVE-2021-20194] = "fixed-version: Fixed from version 5.10rc1" + +# CVE-2021-20219 has no known resolution + +CVE_STATUS[CVE-2021-20226] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2021-20239] = "fixed-version: Fixed from version 5.9rc1" + +CVE_STATUS[CVE-2021-20261] = "fixed-version: Fixed from version 4.5rc5" + +CVE_STATUS[CVE-2021-20265] = "fixed-version: Fixed from version 4.5rc3" + +CVE_STATUS[CVE-2021-20268] = "fixed-version: Fixed from version 5.11rc5" + +CVE_STATUS[CVE-2021-20292] = "fixed-version: Fixed from version 5.9rc1" + +CVE_STATUS[CVE-2021-20317] = "fixed-version: Fixed from version 5.4rc1" + +CVE_STATUS[CVE-2021-20320] = "fixed-version: Fixed from version 5.15rc3" + +CVE_STATUS[CVE-2021-20321] = "fixed-version: Fixed from version 5.15rc5" + +CVE_STATUS[CVE-2021-20322] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2021-21781] = "fixed-version: Fixed from version 5.11rc7" + +CVE_STATUS[CVE-2021-22543] = "fixed-version: Fixed from version 5.13" + +CVE_STATUS[CVE-2021-22555] = "fixed-version: Fixed from version 5.12rc8" + +CVE_STATUS[CVE-2021-22600] = "fixed-version: Fixed from version 5.16rc6" + +CVE_STATUS[CVE-2021-23133] = "fixed-version: Fixed from version 5.12rc8" + +CVE_STATUS[CVE-2021-23134] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2021-26401] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2021-26708] = "fixed-version: Fixed from version 5.11rc7" + +CVE_STATUS[CVE-2021-26930] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2021-26931] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2021-26932] = "fixed-version: Fixed from version 5.12rc1" + +# CVE-2021-26934 has no known resolution + +CVE_STATUS[CVE-2021-27363] = "fixed-version: Fixed from version 5.12rc2" + +CVE_STATUS[CVE-2021-27364] = "fixed-version: Fixed from version 5.12rc2" + +CVE_STATUS[CVE-2021-27365] = "fixed-version: Fixed from version 5.12rc2" + +CVE_STATUS[CVE-2021-28038] = "fixed-version: Fixed from version 5.12rc2" + +CVE_STATUS[CVE-2021-28039] = "fixed-version: Fixed from version 5.12rc2" + +CVE_STATUS[CVE-2021-28375] = "fixed-version: Fixed from version 5.12rc3" + +CVE_STATUS[CVE-2021-28660] = "fixed-version: Fixed from version 5.12rc3" + +CVE_STATUS[CVE-2021-28688] = "fixed-version: Fixed from version 5.12rc6" + +CVE_STATUS[CVE-2021-28691] = "fixed-version: Fixed from version 5.13rc6" + +CVE_STATUS[CVE-2021-28711] = "fixed-version: Fixed from version 5.16rc7" + +CVE_STATUS[CVE-2021-28712] = "fixed-version: Fixed from version 5.16rc7" + +CVE_STATUS[CVE-2021-28713] = "fixed-version: Fixed from version 5.16rc7" + +CVE_STATUS[CVE-2021-28714] = "fixed-version: Fixed from version 5.16rc7" + +CVE_STATUS[CVE-2021-28715] = "fixed-version: Fixed from version 5.16rc7" + +CVE_STATUS[CVE-2021-28950] = "fixed-version: Fixed from version 5.12rc4" + +CVE_STATUS[CVE-2021-28951] = "fixed-version: Fixed from version 5.12rc2" + +CVE_STATUS[CVE-2021-28952] = "fixed-version: Fixed from version 5.12rc4" + +CVE_STATUS[CVE-2021-28964] = "fixed-version: Fixed from version 5.12rc4" + +CVE_STATUS[CVE-2021-28971] = "fixed-version: Fixed from version 5.12rc4" + +CVE_STATUS[CVE-2021-28972] = "fixed-version: Fixed from version 5.12rc4" + +CVE_STATUS[CVE-2021-29154] = "fixed-version: Fixed from version 5.12rc7" + +CVE_STATUS[CVE-2021-29155] = "fixed-version: Fixed from version 5.12rc8" + +CVE_STATUS[CVE-2021-29264] = "fixed-version: Fixed from version 5.12rc3" + +CVE_STATUS[CVE-2021-29265] = "fixed-version: Fixed from version 5.12rc3" + +CVE_STATUS[CVE-2021-29266] = "fixed-version: Fixed from version 5.12rc4" + +CVE_STATUS[CVE-2021-29646] = "fixed-version: Fixed from version 5.12rc5" + +CVE_STATUS[CVE-2021-29647] = "fixed-version: Fixed from version 5.12rc5" + +CVE_STATUS[CVE-2021-29648] = "fixed-version: Fixed from version 5.12rc5" + +CVE_STATUS[CVE-2021-29649] = "fixed-version: Fixed from version 5.12rc5" + +CVE_STATUS[CVE-2021-29650] = "fixed-version: Fixed from version 5.12rc5" + +CVE_STATUS[CVE-2021-29657] = "fixed-version: Fixed from version 5.12rc6" + +CVE_STATUS[CVE-2021-30002] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2021-30178] = "fixed-version: Fixed from version 5.12rc2" + +CVE_STATUS[CVE-2021-31440] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2021-3178] = "fixed-version: Fixed from version 5.11rc5" + +CVE_STATUS[CVE-2021-31829] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2021-31916] = "fixed-version: Fixed from version 5.12rc5" + +CVE_STATUS[CVE-2021-32078] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2021-32399] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2021-32606] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-33033] = "fixed-version: Fixed from version 5.12rc3" + +CVE_STATUS[CVE-2021-33034] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2021-33061] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2021-33098] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-33135] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2021-33200] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-3347] = "fixed-version: Fixed from version 5.11rc6" + +CVE_STATUS[CVE-2021-3348] = "fixed-version: Fixed from version 5.11rc6" + +CVE_STATUS[CVE-2021-33624] = "fixed-version: Fixed from version 5.13rc7" + +CVE_STATUS[CVE-2021-33655] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2021-33656] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2021-33909] = "fixed-version: Fixed from version 5.14rc3" + +CVE_STATUS[CVE-2021-3411] = "fixed-version: Fixed from version 5.10" + +CVE_STATUS[CVE-2021-3428] = "fixed-version: Fixed from version 5.9rc2" + +CVE_STATUS[CVE-2021-3444] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2021-34556] = "fixed-version: Fixed from version 5.14rc4" + +CVE_STATUS[CVE-2021-34693] = "fixed-version: Fixed from version 5.13rc7" + +CVE_STATUS[CVE-2021-3483] = "fixed-version: Fixed from version 5.12rc6" + +CVE_STATUS[CVE-2021-34866] = "fixed-version: Fixed from version 5.14" + +CVE_STATUS[CVE-2021-3489] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-3490] = "fixed-version: Fixed from version 5.13rc4" + +CVE_STATUS[CVE-2021-3491] = "fixed-version: Fixed from version 5.13rc1" + +# CVE-2021-3492 has no known resolution + +CVE_STATUS[CVE-2021-3493] = "fixed-version: Fixed from version 5.11rc1" + +CVE_STATUS[CVE-2021-34981] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2021-3501] = "fixed-version: Fixed from version 5.12rc8" + +CVE_STATUS[CVE-2021-35039] = "fixed-version: Fixed from version 5.13" + +CVE_STATUS[CVE-2021-3506] = "fixed-version: Fixed from version 5.13rc1" + +# CVE-2021-3542 has no known resolution + +CVE_STATUS[CVE-2021-3543] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2021-35477] = "fixed-version: Fixed from version 5.14rc4" + +CVE_STATUS[CVE-2021-3564] = "fixed-version: Fixed from version 5.13rc5" + +CVE_STATUS[CVE-2021-3573] = "fixed-version: Fixed from version 5.13rc5" + +CVE_STATUS[CVE-2021-3587] = "fixed-version: Fixed from version 5.13rc5" + +CVE_STATUS[CVE-2021-3600] = "fixed-version: Fixed from version 5.11" + +CVE_STATUS[CVE-2021-3609] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2021-3612] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2021-3635] = "fixed-version: Fixed from version 5.5rc7" + +CVE_STATUS[CVE-2021-3640] = "fixed-version: Fixed from version 5.16rc1" + +CVE_STATUS[CVE-2021-3653] = "fixed-version: Fixed from version 5.14rc7" + +CVE_STATUS[CVE-2021-3655] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2021-3656] = "fixed-version: Fixed from version 5.14rc7" + +CVE_STATUS[CVE-2021-3659] = "fixed-version: Fixed from version 5.12rc7" + +CVE_STATUS[CVE-2021-3669] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2021-3679] = "fixed-version: Fixed from version 5.14rc3" + +# CVE-2021-3714 has no known resolution + +CVE_STATUS[CVE-2021-3715] = "fixed-version: Fixed from version 5.6" + +CVE_STATUS[CVE-2021-37159] = "fixed-version: Fixed from version 5.14rc3" + +CVE_STATUS[CVE-2021-3732] = "fixed-version: Fixed from version 5.14rc6" + +CVE_STATUS[CVE-2021-3736] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2021-3739] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2021-3743] = "fixed-version: Fixed from version 5.13rc7" + +CVE_STATUS[CVE-2021-3744] = "fixed-version: Fixed from version 5.15rc4" + +CVE_STATUS[CVE-2021-3752] = "fixed-version: Fixed from version 5.16rc1" + +CVE_STATUS[CVE-2021-3753] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2021-37576] = "fixed-version: Fixed from version 5.14rc3" + +CVE_STATUS[CVE-2021-3759] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2021-3760] = "fixed-version: Fixed from version 5.15rc6" + +CVE_STATUS[CVE-2021-3764] = "fixed-version: Fixed from version 5.15rc4" + +CVE_STATUS[CVE-2021-3772] = "fixed-version: Fixed from version 5.15" + +CVE_STATUS[CVE-2021-38160] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2021-38166] = "fixed-version: Fixed from version 5.14rc6" + +CVE_STATUS[CVE-2021-38198] = "fixed-version: Fixed from version 5.13rc6" + +CVE_STATUS[CVE-2021-38199] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2021-38200] = "fixed-version: Fixed from version 5.13rc7" + +CVE_STATUS[CVE-2021-38201] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2021-38202] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2021-38203] = "fixed-version: Fixed from version 5.14rc2" + +CVE_STATUS[CVE-2021-38204] = "fixed-version: Fixed from version 5.14rc3" + +CVE_STATUS[CVE-2021-38205] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2021-38206] = "fixed-version: Fixed from version 5.13rc7" + +CVE_STATUS[CVE-2021-38207] = "fixed-version: Fixed from version 5.13rc7" + +CVE_STATUS[CVE-2021-38208] = "fixed-version: Fixed from version 5.13rc5" + +CVE_STATUS[CVE-2021-38209] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2021-38300] = "fixed-version: Fixed from version 5.15rc4" + +# CVE-2021-3847 has no known resolution + +# CVE-2021-3864 has no known resolution + +# CVE-2021-3892 has no known resolution + +CVE_STATUS[CVE-2021-3894] = "fixed-version: Fixed from version 5.15rc6" + +CVE_STATUS[CVE-2021-3896] = "fixed-version: Fixed from version 5.15rc6" + +CVE_STATUS[CVE-2021-3923] = "fixed-version: Fixed from version 5.16" + +CVE_STATUS[CVE-2021-39633] = "fixed-version: Fixed from version 5.14" + +CVE_STATUS[CVE-2021-39634] = "fixed-version: Fixed from version 5.9rc8" + +CVE_STATUS[CVE-2021-39636] = "fixed-version: Fixed from version 4.16rc1" + +CVE_STATUS[CVE-2021-39648] = "fixed-version: Fixed from version 5.11rc3" + +CVE_STATUS[CVE-2021-39656] = "fixed-version: Fixed from version 5.12rc3" + +CVE_STATUS[CVE-2021-39657] = "fixed-version: Fixed from version 5.11rc4" + +CVE_STATUS[CVE-2021-39685] = "fixed-version: Fixed from version 5.16rc5" + +CVE_STATUS[CVE-2021-39686] = "fixed-version: Fixed from version 5.16rc1" + +CVE_STATUS[CVE-2021-39698] = "fixed-version: Fixed from version 5.16rc5" + +CVE_STATUS[CVE-2021-39711] = "fixed-version: Fixed from version 4.18rc6" + +CVE_STATUS[CVE-2021-39713] = "fixed-version: Fixed from version 4.20rc1" + +CVE_STATUS[CVE-2021-39714] = "fixed-version: Fixed from version 4.12rc1" + +# CVE-2021-39800 has no known resolution + +# CVE-2021-39801 has no known resolution + +# CVE-2021-39802 has no known resolution + +CVE_STATUS[CVE-2021-4001] = "fixed-version: Fixed from version 5.16rc2" + +CVE_STATUS[CVE-2021-4002] = "fixed-version: Fixed from version 5.16rc3" + +CVE_STATUS[CVE-2021-4023] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2021-4028] = "fixed-version: Fixed from version 5.15rc4" + +CVE_STATUS[CVE-2021-4032] = "fixed-version: Fixed from version 5.15rc7" + +CVE_STATUS[CVE-2021-4037] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2021-40490] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2021-4083] = "fixed-version: Fixed from version 5.16rc4" + +CVE_STATUS[CVE-2021-4090] = "fixed-version: Fixed from version 5.16rc2" + +CVE_STATUS[CVE-2021-4093] = "fixed-version: Fixed from version 5.15rc7" + +CVE_STATUS[CVE-2021-4095] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2021-41073] = "fixed-version: Fixed from version 5.15rc2" + +CVE_STATUS[CVE-2021-4135] = "fixed-version: Fixed from version 5.16rc6" + +CVE_STATUS[CVE-2021-4148] = "fixed-version: Fixed from version 5.15" + +CVE_STATUS[CVE-2021-4149] = "fixed-version: Fixed from version 5.15rc6" + +CVE_STATUS[CVE-2021-4150] = "fixed-version: Fixed from version 5.15rc7" + +CVE_STATUS[CVE-2021-4154] = "fixed-version: Fixed from version 5.14rc2" + +CVE_STATUS[CVE-2021-4155] = "fixed-version: Fixed from version 5.16" + +CVE_STATUS[CVE-2021-4157] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2021-4159] = "fixed-version: Fixed from version 5.7rc1" + +CVE_STATUS[CVE-2021-41864] = "fixed-version: Fixed from version 5.15rc5" + +CVE_STATUS[CVE-2021-4197] = "fixed-version: Fixed from version 5.16" + +CVE_STATUS[CVE-2021-42008] = "fixed-version: Fixed from version 5.14rc7" + +CVE_STATUS[CVE-2021-4202] = "fixed-version: Fixed from version 5.16rc2" + +CVE_STATUS[CVE-2021-4203] = "fixed-version: Fixed from version 5.15rc4" + +CVE_STATUS[CVE-2021-4204] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2021-4218] = "fixed-version: Fixed from version 5.8rc1" + +CVE_STATUS[CVE-2021-42252] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2021-42327] = "fixed-version: Fixed from version 5.15" + +CVE_STATUS[CVE-2021-42739] = "fixed-version: Fixed from version 5.16rc1" + +CVE_STATUS[CVE-2021-43056] = "fixed-version: Fixed from version 5.15rc6" + +CVE_STATUS[CVE-2021-43057] = "fixed-version: Fixed from version 5.15rc3" + +CVE_STATUS[CVE-2021-43267] = "fixed-version: Fixed from version 5.15" + +CVE_STATUS[CVE-2021-43389] = "fixed-version: Fixed from version 5.15rc6" + +CVE_STATUS[CVE-2021-43975] = "fixed-version: Fixed from version 5.16rc2" + +CVE_STATUS[CVE-2021-43976] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2021-44733] = "fixed-version: Fixed from version 5.16rc7" + +CVE_STATUS[CVE-2021-44879] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2021-45095] = "fixed-version: Fixed from version 5.16rc6" + +CVE_STATUS[CVE-2021-45100] = "fixed-version: Fixed from version 5.16rc7" + +CVE_STATUS[CVE-2021-45402] = "fixed-version: Fixed from version 5.16rc6" + +CVE_STATUS[CVE-2021-45469] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2021-45480] = "fixed-version: Fixed from version 5.16rc6" + +CVE_STATUS[CVE-2021-45485] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2021-45486] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2021-45868] = "fixed-version: Fixed from version 5.16rc1" + +CVE_STATUS[CVE-2021-46283] = "fixed-version: Fixed from version 5.13rc7" + +CVE_STATUS[CVE-2022-0001] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-0002] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-0168] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-0171] = "fixed-version: Fixed from version 5.18rc4" + +CVE_STATUS[CVE-2022-0185] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-0264] = "fixed-version: Fixed from version 5.16rc6" + +CVE_STATUS[CVE-2022-0286] = "fixed-version: Fixed from version 5.14rc2" + +CVE_STATUS[CVE-2022-0322] = "fixed-version: Fixed from version 5.15rc6" + +CVE_STATUS[CVE-2022-0330] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-0382] = "fixed-version: Fixed from version 5.16" + +# CVE-2022-0400 has no known resolution + +CVE_STATUS[CVE-2022-0433] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-0435] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2022-0480] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2022-0487] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2022-0492] = "fixed-version: Fixed from version 5.17rc3" + +CVE_STATUS[CVE-2022-0494] = "fixed-version: Fixed from version 5.17rc5" + +CVE_STATUS[CVE-2022-0500] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-0516] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2022-0617] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-0644] = "fixed-version: Fixed from version 5.15rc7" + +CVE_STATUS[CVE-2022-0646] = "fixed-version: Fixed from version 5.17rc5" + +CVE_STATUS[CVE-2022-0742] = "fixed-version: Fixed from version 5.17rc7" + +CVE_STATUS[CVE-2022-0812] = "fixed-version: Fixed from version 5.8rc6" + +CVE_STATUS[CVE-2022-0847] = "fixed-version: Fixed from version 5.17rc6" + +CVE_STATUS[CVE-2022-0850] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2022-0854] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-0995] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-0998] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-1011] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-1012] = "fixed-version: Fixed from version 5.18rc6" + +CVE_STATUS[CVE-2022-1015] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1016] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1043] = "fixed-version: Fixed from version 5.14rc7" + +CVE_STATUS[CVE-2022-1048] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1055] = "fixed-version: Fixed from version 5.17rc3" + +# CVE-2022-1116 has no known resolution + +CVE_STATUS[CVE-2022-1158] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1184] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-1195] = "fixed-version: Fixed from version 5.16rc7" + +CVE_STATUS[CVE-2022-1198] = "fixed-version: Fixed from version 5.17rc6" + +CVE_STATUS[CVE-2022-1199] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-1204] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1205] = "fixed-version: Fixed from version 5.18rc1" + +# CVE-2022-1247 has no known resolution + +CVE_STATUS[CVE-2022-1263] = "fixed-version: Fixed from version 5.18rc3" + +CVE_STATUS[CVE-2022-1280] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2022-1353] = "fixed-version: Fixed from version 5.17" + +CVE_STATUS[CVE-2022-1419] = "fixed-version: Fixed from version 5.6rc2" + +CVE_STATUS[CVE-2022-1462] = "fixed-version: Fixed from version 5.19rc7" + +CVE_STATUS[CVE-2022-1508] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2022-1516] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1651] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1652] = "fixed-version: Fixed from version 5.18rc6" + +CVE_STATUS[CVE-2022-1671] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-1678] = "fixed-version: Fixed from version 4.20rc1" + +CVE_STATUS[CVE-2022-1679] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-1729] = "fixed-version: Fixed from version 5.18" + +CVE_STATUS[CVE-2022-1734] = "fixed-version: Fixed from version 5.18rc6" + +CVE_STATUS[CVE-2022-1786] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2022-1789] = "fixed-version: Fixed from version 5.18" + +CVE_STATUS[CVE-2022-1836] = "fixed-version: Fixed from version 5.18rc5" + +CVE_STATUS[CVE-2022-1852] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-1882] = "fixed-version: Fixed from version 5.19rc8" + +CVE_STATUS[CVE-2022-1943] = "fixed-version: Fixed from version 5.18rc7" + +CVE_STATUS[CVE-2022-1966] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-1972] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-1973] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-1974] = "fixed-version: Fixed from version 5.18rc6" + +CVE_STATUS[CVE-2022-1975] = "fixed-version: Fixed from version 5.18rc6" + +CVE_STATUS[CVE-2022-1976] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-1998] = "fixed-version: Fixed from version 5.17rc3" + +CVE_STATUS[CVE-2022-20008] = "fixed-version: Fixed from version 5.17rc5" + +CVE_STATUS[CVE-2022-20132] = "fixed-version: Fixed from version 5.16rc5" + +CVE_STATUS[CVE-2022-20141] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2022-20148] = "fixed-version: Fixed from version 5.16rc1" + +CVE_STATUS[CVE-2022-20153] = "fixed-version: Fixed from version 5.13rc1" + +CVE_STATUS[CVE-2022-20154] = "fixed-version: Fixed from version 5.16rc8" + +CVE_STATUS[CVE-2022-20158] = "fixed-version: Fixed from version 5.17" + +CVE_STATUS[CVE-2022-20166] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2022-20368] = "fixed-version: Fixed from version 5.17" + +CVE_STATUS[CVE-2022-20369] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-20409] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2022-20421] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2022-20422] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-20423] = "fixed-version: Fixed from version 5.17" + +CVE_STATUS[CVE-2022-20424] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2022-20565] = "fixed-version: Fixed from version 5.9rc4" + +CVE_STATUS[CVE-2022-20566] = "fixed-version: Fixed from version 5.19" + +CVE_STATUS[CVE-2022-20567] = "fixed-version: Fixed from version 4.16rc5" + +CVE_STATUS[CVE-2022-20568] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2022-20572] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-2078] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-21123] = "fixed-version: Fixed from version 5.19rc3" + +CVE_STATUS[CVE-2022-21125] = "fixed-version: Fixed from version 5.19rc3" + +CVE_STATUS[CVE-2022-21166] = "fixed-version: Fixed from version 5.19rc3" + +CVE_STATUS[CVE-2022-21385] = "fixed-version: Fixed from version 4.20" + +CVE_STATUS[CVE-2022-21499] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-21505] = "fixed-version: Fixed from version 5.19rc8" + +CVE_STATUS[CVE-2022-2153] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-2196] = "fixed-version: Fixed from version 6.2rc1" + +# CVE-2022-2209 has no known resolution + +CVE_STATUS[CVE-2022-22942] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-23036] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-23037] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-23038] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-23039] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-23040] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-23041] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-23042] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-2308] = "fixed-version: Fixed from version 6.0" + +CVE_STATUS[CVE-2022-2318] = "fixed-version: Fixed from version 5.19rc5" + +CVE_STATUS[CVE-2022-23222] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-2327] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2022-2380] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-23816] = "fixed-version: Fixed from version 5.19rc7" + +# CVE-2022-23825 has no known resolution + +CVE_STATUS[CVE-2022-23960] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-24122] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-24448] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-24958] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-24959] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-2503] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-25258] = "fixed-version: Fixed from version 5.17rc4" + +# CVE-2022-25265 has no known resolution + +CVE_STATUS[CVE-2022-25375] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2022-25636] = "fixed-version: Fixed from version 5.17rc6" + +CVE_STATUS[CVE-2022-2585] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-2586] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-2588] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-2590] = "fixed-version: Fixed from version 6.0rc3" + +CVE_STATUS[CVE-2022-2602] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-26365] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-26373] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-2639] = "fixed-version: Fixed from version 5.18rc4" + +CVE_STATUS[CVE-2022-26490] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-2663] = "fixed-version: Fixed from version 6.0rc5" + +# CVE-2022-26878 has no known resolution + +CVE_STATUS[CVE-2022-26966] = "fixed-version: Fixed from version 5.17rc6" + +CVE_STATUS[CVE-2022-27223] = "fixed-version: Fixed from version 5.17rc6" + +CVE_STATUS[CVE-2022-27666] = "fixed-version: Fixed from version 5.17rc8" + +CVE_STATUS[CVE-2022-27672] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2022-2785] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-27950] = "fixed-version: Fixed from version 5.17rc5" + +CVE_STATUS[CVE-2022-28356] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-28388] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-28389] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-28390] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-2873] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-28796] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-28893] = "fixed-version: Fixed from version 5.18rc2" + +CVE_STATUS[CVE-2022-2905] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2022-29156] = "fixed-version: Fixed from version 5.17rc6" + +CVE_STATUS[CVE-2022-2938] = "fixed-version: Fixed from version 5.17rc2" + +CVE_STATUS[CVE-2022-29581] = "fixed-version: Fixed from version 5.18rc4" + +CVE_STATUS[CVE-2022-29582] = "fixed-version: Fixed from version 5.18rc2" + +CVE_STATUS[CVE-2022-2959] = "fixed-version: Fixed from version 5.19rc1" + +# CVE-2022-2961 has no known resolution + +CVE_STATUS[CVE-2022-2964] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2022-2977] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-2978] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-29900] = "fixed-version: Fixed from version 5.19rc7" + +CVE_STATUS[CVE-2022-29901] = "fixed-version: Fixed from version 5.19rc7" + +CVE_STATUS[CVE-2022-2991] = "fixed-version: Fixed from version 5.15rc1" + +CVE_STATUS[CVE-2022-29968] = "fixed-version: Fixed from version 5.18rc5" + +CVE_STATUS[CVE-2022-3028] = "fixed-version: Fixed from version 6.0rc3" + +CVE_STATUS[CVE-2022-30594] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-3061] = "fixed-version: Fixed from version 5.18rc5" + +CVE_STATUS[CVE-2022-3077] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3078] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-3103] = "fixed-version: Fixed from version 6.0rc3" + +CVE_STATUS[CVE-2022-3104] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3105] = "fixed-version: Fixed from version 5.16" + +CVE_STATUS[CVE-2022-3106] = "fixed-version: Fixed from version 5.16rc6" + +CVE_STATUS[CVE-2022-3107] = "fixed-version: Fixed from version 5.17" + +CVE_STATUS[CVE-2022-3108] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-3110] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3111] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-3112] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-3113] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-3114] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3115] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3169] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3170] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2022-3176] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2022-3202] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-32250] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-32296] = "fixed-version: Fixed from version 5.18rc6" + +# CVE-2022-3238 has no known resolution + +CVE_STATUS[CVE-2022-3239] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2022-32981] = "fixed-version: Fixed from version 5.19rc2" + +CVE_STATUS[CVE-2022-3303] = "fixed-version: Fixed from version 6.0rc5" + +CVE_STATUS[CVE-2022-3344] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2022-33740] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-33741] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-33742] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-33743] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-33744] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-33981] = "fixed-version: Fixed from version 5.18rc5" + +CVE_STATUS[CVE-2022-3424] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-3435] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-34494] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-34495] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-34918] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-3521] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3522] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3523] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3524] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3526] = "fixed-version: Fixed from version 5.18rc3" + +CVE_STATUS[CVE-2022-3531] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-3532] = "fixed-version: Fixed from version 6.2rc1" + +# CVE-2022-3533 has no known resolution + +CVE_STATUS[CVE-2022-3534] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-3535] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3541] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3542] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3543] = "fixed-version: Fixed from version 6.1rc1" + +# CVE-2022-3544 has no known resolution + +CVE_STATUS[CVE-2022-3545] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3564] = "fixed-version: Fixed from version 6.1rc4" + +CVE_STATUS[CVE-2022-3565] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3566] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3567] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3577] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3586] = "fixed-version: Fixed from version 6.0rc5" + +CVE_STATUS[CVE-2022-3594] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3595] = "fixed-version: Fixed from version 6.1rc1" + +# CVE-2022-3606 has no known resolution + +CVE_STATUS[CVE-2022-36123] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-3619] = "fixed-version: Fixed from version 6.1rc4" + +CVE_STATUS[CVE-2022-3621] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3623] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3624] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3625] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3628] = "fixed-version: Fixed from version 6.1rc5" + +CVE_STATUS[CVE-2022-36280] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-3629] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3630] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3633] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3635] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-3636] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-3640] = "fixed-version: Fixed from version 6.1rc4" + +# CVE-2022-36402 has no known resolution + +# CVE-2022-3642 has no known resolution + +CVE_STATUS[CVE-2022-3643] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-3646] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-3649] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-36879] = "fixed-version: Fixed from version 5.19rc8" + +CVE_STATUS[CVE-2022-36946] = "fixed-version: Fixed from version 5.19" + +CVE_STATUS[CVE-2022-3707] = "fixed-version: Fixed from version 6.2rc3" + +# CVE-2022-38096 has no known resolution + +CVE_STATUS[CVE-2022-38457] = "fixed-version: Fixed from version 6.2rc4" + +CVE_STATUS[CVE-2022-3903] = "fixed-version: Fixed from version 6.1rc2" + +CVE_STATUS[CVE-2022-3910] = "fixed-version: Fixed from version 6.0rc6" + +CVE_STATUS[CVE-2022-39188] = "fixed-version: Fixed from version 5.19rc8" + +CVE_STATUS[CVE-2022-39189] = "fixed-version: Fixed from version 5.19rc2" + +CVE_STATUS[CVE-2022-39190] = "fixed-version: Fixed from version 6.0rc3" + +CVE_STATUS[CVE-2022-3977] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-39842] = "fixed-version: Fixed from version 5.19rc4" + +CVE_STATUS[CVE-2022-40133] = "fixed-version: Fixed from version 6.2rc4" + +CVE_STATUS[CVE-2022-40307] = "fixed-version: Fixed from version 6.0rc5" + +CVE_STATUS[CVE-2022-40476] = "fixed-version: Fixed from version 5.19rc4" + +CVE_STATUS[CVE-2022-40768] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-4095] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2022-40982] = "fixed-version: Fixed from version 6.5rc6" + +CVE_STATUS[CVE-2022-41218] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-41222] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2022-4127] = "fixed-version: Fixed from version 5.19rc6" + +CVE_STATUS[CVE-2022-4128] = "fixed-version: Fixed from version 5.19rc7" + +CVE_STATUS[CVE-2022-4129] = "fixed-version: Fixed from version 6.1rc6" + +CVE_STATUS[CVE-2022-4139] = "fixed-version: Fixed from version 6.1rc8" + +CVE_STATUS[CVE-2022-41674] = "fixed-version: Fixed from version 6.1rc1" + +# CVE-2022-41848 has no known resolution + +CVE_STATUS[CVE-2022-41849] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-41850] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-41858] = "fixed-version: Fixed from version 5.18rc2" + +CVE_STATUS[CVE-2022-42328] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-42329] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-42432] = "fixed-version: Fixed from version 6.0rc7" + +CVE_STATUS[CVE-2022-4269] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2022-42703] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2022-42719] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-42720] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-42721] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-42722] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-42895] = "fixed-version: Fixed from version 6.1rc4" + +CVE_STATUS[CVE-2022-42896] = "fixed-version: Fixed from version 6.1rc4" + +CVE_STATUS[CVE-2022-43750] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-4378] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-4379] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-4382] = "fixed-version: Fixed from version 6.2rc5" + +CVE_STATUS[CVE-2022-43945] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2022-44032] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2022-44033] = "fixed-version: Fixed from version 6.4rc1" + +# CVE-2022-44034 has no known resolution + +# CVE-2022-4543 has no known resolution + +CVE_STATUS[CVE-2022-45869] = "fixed-version: Fixed from version 6.1rc7" + +# CVE-2022-45884 has no known resolution + +# CVE-2022-45885 has no known resolution + +CVE_STATUS[CVE-2022-45886] = "fixed-version: Fixed from version 6.4rc3" + +CVE_STATUS[CVE-2022-45887] = "fixed-version: Fixed from version 6.4rc3" + +CVE_STATUS[CVE-2022-45888] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-45919] = "fixed-version: Fixed from version 6.4rc3" + +CVE_STATUS[CVE-2022-45934] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2022-4662] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2022-4696] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2022-4744] = "fixed-version: Fixed from version 5.16rc7" + +CVE_STATUS[CVE-2022-47518] = "fixed-version: Fixed from version 6.1rc8" + +CVE_STATUS[CVE-2022-47519] = "fixed-version: Fixed from version 6.1rc8" + +CVE_STATUS[CVE-2022-47520] = "fixed-version: Fixed from version 6.1rc8" + +CVE_STATUS[CVE-2022-47521] = "fixed-version: Fixed from version 6.1rc8" + +CVE_STATUS[CVE-2022-47929] = "fixed-version: Fixed from version 6.2rc4" + +CVE_STATUS[CVE-2022-47938] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-47939] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-47940] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2022-47941] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-47942] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-47943] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2022-47946] = "fixed-version: Fixed from version 5.12rc2" + +CVE_STATUS[CVE-2022-4842] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-48423] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-48424] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2022-48425] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2022-48502] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2023-0030] = "fixed-version: Fixed from version 5.0rc1" + +CVE_STATUS[CVE-2023-0045] = "fixed-version: Fixed from version 6.2rc3" + +CVE_STATUS[CVE-2023-0047] = "fixed-version: Fixed from version 5.16rc1" + +CVE_STATUS[CVE-2023-0122] = "fixed-version: Fixed from version 6.0rc4" + +CVE_STATUS[CVE-2023-0160] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-0179] = "fixed-version: Fixed from version 6.2rc5" + +CVE_STATUS[CVE-2023-0210] = "fixed-version: Fixed from version 6.2rc4" + +CVE_STATUS[CVE-2023-0240] = "fixed-version: Fixed from version 5.10rc1" + +CVE_STATUS[CVE-2023-0266] = "fixed-version: Fixed from version 6.2rc4" + +CVE_STATUS[CVE-2023-0386] = "fixed-version: Fixed from version 6.2rc6" + +CVE_STATUS[CVE-2023-0394] = "fixed-version: Fixed from version 6.2rc4" + +CVE_STATUS[CVE-2023-0458] = "fixed-version: Fixed from version 6.2rc5" + +CVE_STATUS[CVE-2023-0459] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-0461] = "fixed-version: Fixed from version 6.2rc3" + +CVE_STATUS[CVE-2023-0468] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2023-0469] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2023-0590] = "fixed-version: Fixed from version 6.1rc2" + +CVE_STATUS[CVE-2023-0597] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2023-0615] = "fixed-version: Fixed from version 6.1rc3" + +CVE_STATUS[CVE-2023-1032] = "fixed-version: Fixed from version 6.3rc2" + +CVE_STATUS[CVE-2023-1073] = "fixed-version: Fixed from version 6.2rc5" + +CVE_STATUS[CVE-2023-1074] = "fixed-version: Fixed from version 6.2rc6" + +CVE_STATUS[CVE-2023-1075] = "fixed-version: Fixed from version 6.2rc7" + +CVE_STATUS[CVE-2023-1076] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-1077] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-1078] = "fixed-version: Fixed from version 6.2rc8" + +CVE_STATUS[CVE-2023-1079] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-1095] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2023-1118] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-1192] = "fixed-version: Fixed from version 6.4rc1" + +# CVE-2023-1193 has no known resolution + +CVE_STATUS[CVE-2023-1194] = "fixed-version: Fixed from version 6.4rc6" + +CVE_STATUS[CVE-2023-1195] = "fixed-version: Fixed from version 6.1rc3" + +CVE_STATUS[CVE-2023-1206] = "fixed-version: Fixed from version 6.5rc4" + +CVE_STATUS[CVE-2023-1249] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2023-1252] = "fixed-version: Fixed from version 5.16rc1" + +CVE_STATUS[CVE-2023-1281] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-1295] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2023-1380] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-1382] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2023-1390] = "fixed-version: Fixed from version 5.11rc4" + +CVE_STATUS[CVE-2023-1513] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-1582] = "fixed-version: Fixed from version 5.17rc4" + +CVE_STATUS[CVE-2023-1583] = "fixed-version: Fixed from version 6.3rc4" + +CVE_STATUS[CVE-2023-1611] = "fixed-version: Fixed from version 6.3rc5" + +CVE_STATUS[CVE-2023-1637] = "fixed-version: Fixed from version 5.18rc2" + +CVE_STATUS[CVE-2023-1652] = "fixed-version: Fixed from version 6.2rc5" + +CVE_STATUS[CVE-2023-1670] = "fixed-version: Fixed from version 6.3rc4" + +CVE_STATUS[CVE-2023-1829] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-1838] = "fixed-version: Fixed from version 5.18" + +CVE_STATUS[CVE-2023-1855] = "fixed-version: Fixed from version 6.3rc3" + +CVE_STATUS[CVE-2023-1859] = "fixed-version: Fixed from version 6.3rc7" + +CVE_STATUS[CVE-2023-1872] = "fixed-version: Fixed from version 5.18rc2" + +CVE_STATUS[CVE-2023-1989] = "fixed-version: Fixed from version 6.3rc4" + +CVE_STATUS[CVE-2023-1990] = "fixed-version: Fixed from version 6.3rc3" + +CVE_STATUS[CVE-2023-1998] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-2002] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-2006] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2023-2007] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2023-2008] = "fixed-version: Fixed from version 5.19rc4" + +CVE_STATUS[CVE-2023-2019] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2023-20569] = "fixed-version: Fixed from version 6.5rc6" + +CVE_STATUS[CVE-2023-20588] = "fixed-version: Fixed from version 6.5rc6" + +CVE_STATUS[CVE-2023-20593] = "fixed-version: Fixed from version 6.5rc4" + +CVE_STATUS[CVE-2023-20928] = "fixed-version: Fixed from version 6.0rc1" + +# CVE-2023-20937 has no known resolution + +CVE_STATUS[CVE-2023-20938] = "fixed-version: Fixed from version 5.18rc5" + +# CVE-2023-20941 has no known resolution + +CVE_STATUS[CVE-2023-21102] = "fixed-version: Fixed from version 6.2rc4" + +CVE_STATUS[CVE-2023-21106] = "fixed-version: Fixed from version 6.2rc5" + +CVE_STATUS[CVE-2023-2124] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-21255] = "fixed-version: Fixed from version 6.4rc4" + +CVE_STATUS[CVE-2023-21264] = "fixed-version: Fixed from version 6.4rc5" + +# CVE-2023-21400 has no known resolution + +CVE_STATUS[CVE-2023-2156] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-2162] = "fixed-version: Fixed from version 6.2rc6" + +CVE_STATUS[CVE-2023-2163] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-2166] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2023-2176] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-2177] = "fixed-version: Fixed from version 5.19" + +CVE_STATUS[CVE-2023-2194] = "fixed-version: Fixed from version 6.3rc4" + +CVE_STATUS[CVE-2023-2235] = "fixed-version: Fixed from version 6.3rc3" + +CVE_STATUS[CVE-2023-2236] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2023-2248] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-2269] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-22995] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2023-22996] = "fixed-version: Fixed from version 5.18rc1" + +CVE_STATUS[CVE-2023-22997] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2023-22998] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2023-22999] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2023-23000] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2023-23001] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2023-23002] = "fixed-version: Fixed from version 5.17rc1" + +CVE_STATUS[CVE-2023-23003] = "fixed-version: Fixed from version 5.16rc6" + +CVE_STATUS[CVE-2023-23004] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2023-23005] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2023-23006] = "fixed-version: Fixed from version 5.16rc8" + +# CVE-2023-23039 has no known resolution + +CVE_STATUS[CVE-2023-23454] = "fixed-version: Fixed from version 6.2rc3" + +CVE_STATUS[CVE-2023-23455] = "fixed-version: Fixed from version 6.2rc3" + +CVE_STATUS[CVE-2023-23559] = "fixed-version: Fixed from version 6.2rc5" + +CVE_STATUS[CVE-2023-23586] = "fixed-version: Fixed from version 5.12rc1" + +CVE_STATUS[CVE-2023-2430] = "fixed-version: Fixed from version 6.2rc5" + +CVE_STATUS[CVE-2023-2483] = "fixed-version: Fixed from version 6.3rc4" + +CVE_STATUS[CVE-2023-25012] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-2513] = "fixed-version: Fixed from version 6.0rc1" + +# CVE-2023-25775 needs backporting (fixed from 6.6rc1) + +CVE_STATUS[CVE-2023-2598] = "fixed-version: Fixed from version 6.4rc1" + +# CVE-2023-26242 has no known resolution + +# CVE-2023-2640 has no known resolution + +CVE_STATUS[CVE-2023-26544] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2023-26545] = "fixed-version: Fixed from version 6.2" + +CVE_STATUS[CVE-2023-26605] = "fixed-version: Fixed from version 6.1rc7" + +CVE_STATUS[CVE-2023-26606] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2023-26607] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2023-28327] = "fixed-version: Fixed from version 6.1" + +CVE_STATUS[CVE-2023-28328] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2023-28410] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2023-28464] = "fixed-version: Fixed from version 6.3rc7" + +CVE_STATUS[CVE-2023-28466] = "fixed-version: Fixed from version 6.3rc2" + +CVE_STATUS[CVE-2023-2860] = "fixed-version: Fixed from version 6.0rc5" + +CVE_STATUS[CVE-2023-28772] = "fixed-version: Fixed from version 5.14rc1" + +CVE_STATUS[CVE-2023-28866] = "fixed-version: Fixed from version 6.3rc4" + +CVE_STATUS[CVE-2023-2898] = "fixed-version: Fixed from version 6.5rc1" + +CVE_STATUS[CVE-2023-2985] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-3006] = "fixed-version: Fixed from version 6.1rc1" + +# Skipping CVE-2023-3022, no affected_versions + +CVE_STATUS[CVE-2023-30456] = "fixed-version: Fixed from version 6.3rc3" + +CVE_STATUS[CVE-2023-30772] = "fixed-version: Fixed from version 6.3rc4" + +CVE_STATUS[CVE-2023-3090] = "fixed-version: Fixed from version 6.4rc2" + +CVE_STATUS[CVE-2023-3106] = "fixed-version: Fixed from version 4.8rc7" + +# Skipping CVE-2023-3108, no affected_versions + +# CVE-2023-31081 has no known resolution + +# CVE-2023-31082 has no known resolution + +# CVE-2023-31083 needs backporting (fixed from 6.6rc1) + +CVE_STATUS[CVE-2023-31084] = "fixed-version: Fixed from version 6.4rc3" + +# CVE-2023-31085 has no known resolution + +CVE_STATUS[CVE-2023-3111] = "fixed-version: Fixed from version 6.0rc2" + +CVE_STATUS[CVE-2023-3117] = "fixed-version: Fixed from version 6.4rc7" + +CVE_STATUS[CVE-2023-31248] = "fixed-version: Fixed from version 6.5rc2" + +CVE_STATUS[CVE-2023-3141] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-31436] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-3159] = "fixed-version: Fixed from version 5.18rc6" + +CVE_STATUS[CVE-2023-3161] = "fixed-version: Fixed from version 6.2rc7" + +CVE_STATUS[CVE-2023-3212] = "fixed-version: Fixed from version 6.4rc2" + +CVE_STATUS[CVE-2023-3220] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-32233] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-32247] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-32248] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-32250] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-32252] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-32254] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-32257] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-32258] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-32269] = "fixed-version: Fixed from version 6.2rc7" + +# CVE-2023-32629 has no known resolution + +CVE_STATUS[CVE-2023-3268] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-3269] = "fixed-version: Fixed from version 6.5rc1" + +CVE_STATUS[CVE-2023-3312] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-3317] = "fixed-version: Fixed from version 6.3rc6" + +CVE_STATUS[CVE-2023-33203] = "fixed-version: Fixed from version 6.3rc4" + +CVE_STATUS[CVE-2023-33250] = "fixed-version: Fixed from version 6.5rc1" + +CVE_STATUS[CVE-2023-33288] = "fixed-version: Fixed from version 6.3rc4" + +CVE_STATUS[CVE-2023-3338] = "fixed-version: Fixed from version 6.1rc1" + +CVE_STATUS[CVE-2023-3355] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-3357] = "fixed-version: Fixed from version 6.2rc1" + +CVE_STATUS[CVE-2023-3358] = "fixed-version: Fixed from version 6.2rc5" + +CVE_STATUS[CVE-2023-3359] = "fixed-version: Fixed from version 6.2rc7" + +CVE_STATUS[CVE-2023-3389] = "fixed-version: Fixed from version 6.0rc1" + +CVE_STATUS[CVE-2023-3390] = "fixed-version: Fixed from version 6.4rc7" + +CVE_STATUS[CVE-2023-33951] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-33952] = "fixed-version: Fixed from version 6.4rc1" + +# CVE-2023-3397 has no known resolution + +CVE_STATUS[CVE-2023-34255] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-34256] = "fixed-version: Fixed from version 6.4rc2" + +CVE_STATUS[CVE-2023-34319] = "fixed-version: Fixed from version 6.5rc6" + +CVE_STATUS[CVE-2023-3439] = "fixed-version: Fixed from version 5.18rc5" + +CVE_STATUS[CVE-2023-35001] = "fixed-version: Fixed from version 6.5rc2" + +CVE_STATUS[CVE-2023-3567] = "fixed-version: Fixed from version 6.2rc7" + +# CVE-2023-35693 has no known resolution + +CVE_STATUS[CVE-2023-35788] = "fixed-version: Fixed from version 6.4rc5" + +CVE_STATUS[CVE-2023-35823] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-35824] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-35826] = "fixed-version: Fixed from version 6.4rc1" + +# CVE-2023-35827 has no known resolution + +CVE_STATUS[CVE-2023-35828] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-35829] = "fixed-version: Fixed from version 6.4rc1" + +CVE_STATUS[CVE-2023-3609] = "fixed-version: Fixed from version 6.4rc7" + +CVE_STATUS[CVE-2023-3610] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-3611] = "fixed-version: Fixed from version 6.5rc2" + +# CVE-2023-3640 has no known resolution + +# CVE-2023-37453 needs backporting (fixed from 6.6rc1) + +# CVE-2023-37454 has no known resolution + +CVE_STATUS[CVE-2023-3772] = "fixed-version: Fixed from version 6.5rc7" + +CVE_STATUS[CVE-2023-3773] = "fixed-version: Fixed from version 6.5rc7" + +CVE_STATUS[CVE-2023-3776] = "fixed-version: Fixed from version 6.5rc2" + +CVE_STATUS[CVE-2023-3777] = "fixed-version: Fixed from version 6.5rc3" + +CVE_STATUS[CVE-2023-3812] = "fixed-version: Fixed from version 6.1rc4" + +CVE_STATUS[CVE-2023-38409] = "fixed-version: Fixed from version 6.3rc7" + +CVE_STATUS[CVE-2023-38426] = "fixed-version: Fixed from version 6.4rc3" + +CVE_STATUS[CVE-2023-38427] = "fixed-version: Fixed from version 6.4rc6" + +CVE_STATUS[CVE-2023-38428] = "fixed-version: Fixed from version 6.4rc3" + +CVE_STATUS[CVE-2023-38429] = "fixed-version: Fixed from version 6.4rc3" + +CVE_STATUS[CVE-2023-38430] = "fixed-version: Fixed from version 6.4rc6" + +CVE_STATUS[CVE-2023-38431] = "fixed-version: Fixed from version 6.4rc6" + +CVE_STATUS[CVE-2023-38432] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-3863] = "fixed-version: Fixed from version 6.5rc1" + +CVE_STATUS[CVE-2023-3865] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-3866] = "fixed-version: Fixed from version 6.4" + +CVE_STATUS[CVE-2023-3867] = "fixed-version: Fixed from version 6.5rc1" + +CVE_STATUS[CVE-2023-4004] = "fixed-version: Fixed from version 6.5rc3" + +# CVE-2023-4010 has no known resolution + +CVE_STATUS[CVE-2023-4015] = "fixed-version: Fixed from version 6.5rc4" + +CVE_STATUS[CVE-2023-40283] = "fixed-version: Fixed from version 6.5rc1" + +CVE_STATUS[CVE-2023-4128] = "fixed-version: Fixed from version 6.5rc5" + +CVE_STATUS[CVE-2023-4132] = "fixed-version: Fixed from version 6.5rc1" + +CVE_STATUS[CVE-2023-4133] = "fixed-version: Fixed from version 6.3" + +CVE_STATUS[CVE-2023-4134] = "fixed-version: Fixed from version 6.5rc1" + +CVE_STATUS[CVE-2023-4147] = "fixed-version: Fixed from version 6.5rc4" + +CVE_STATUS[CVE-2023-4155] = "fixed-version: Fixed from version 6.5rc6" + +CVE_STATUS[CVE-2023-4194] = "fixed-version: Fixed from version 6.5rc5" + +CVE_STATUS[CVE-2023-4206] = "fixed-version: Fixed from version 6.5rc5" + +CVE_STATUS[CVE-2023-4207] = "fixed-version: Fixed from version 6.5rc5" + +CVE_STATUS[CVE-2023-4208] = "fixed-version: Fixed from version 6.5rc5" + +CVE_STATUS[CVE-2023-4244] = "fixed-version: Fixed from version 6.5rc7" + +CVE_STATUS[CVE-2023-4273] = "fixed-version: Fixed from version 6.5rc5" + +# CVE-2023-42752 needs backporting (fixed from 6.6rc1) + +# CVE-2023-42753 needs backporting (fixed from 6.6rc1) + +CVE_STATUS[CVE-2023-42755] = "fixed-version: Fixed from version 6.3rc1" + +CVE_STATUS[CVE-2023-4385] = "fixed-version: Fixed from version 5.19rc1" + +CVE_STATUS[CVE-2023-4387] = "fixed-version: Fixed from version 5.18" + +CVE_STATUS[CVE-2023-4389] = "fixed-version: Fixed from version 5.18rc3" + +CVE_STATUS[CVE-2023-4394] = "fixed-version: Fixed from version 6.0rc3" + +CVE_STATUS[CVE-2023-4459] = "fixed-version: Fixed from version 5.18" + +CVE_STATUS[CVE-2023-4563] = "fixed-version: Fixed from version 6.5rc6" + +CVE_STATUS[CVE-2023-4569] = "fixed-version: Fixed from version 6.5rc7" + +CVE_STATUS[CVE-2023-4611] = "fixed-version: Fixed from version 6.5rc4" + +CVE_STATUS[CVE-2023-4622] = "fixed-version: Fixed from version 6.5rc1" + +# CVE-2023-4623 needs backporting (fixed from 6.6rc1) + +# CVE-2023-4881 needs backporting (fixed from 6.6rc1) + +# CVE-2023-4921 needs backporting (fixed from 6.6rc1) + +# CVE-2023-5158 has no known resolution + +# CVE-2023-5197 needs backporting (fixed from 6.6rc3) + diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.5.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.5.bb new file mode 100644 index 0000000000..9b09bae615 --- /dev/null +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.5.bb @@ -0,0 +1,48 @@ +KBRANCH ?= "v6.5/standard/preempt-rt/base" + +require recipes-kernel/linux/linux-yocto.inc + +# CVE exclusions +include recipes-kernel/linux/cve-exclusion_6.5.inc + +# Skip processing of this recipe if it is not explicitly specified as the +# PREFERRED_PROVIDER for virtual/kernel. This avoids errors when trying +# to build multiple virtual/kernel providers, e.g. as dependency of +# core-image-rt-sdk, core-image-rt. +python () { + if d.getVar("KERNEL_PACKAGE_NAME") == "kernel" and d.getVar("PREFERRED_PROVIDER_virtual/kernel") != "linux-yocto-rt": + raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") +} + +SRCREV_machine ?= "6efddc0f385fb758e7eef43d9de133b1677eb72c" +SRCREV_meta ?= "06cf3d8830fda41ff271eec7da6e3c8425df790f" + +SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ + git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.5;destsuffix=${KMETA};protocol=https" + +LINUX_VERSION ?= "6.5.5" + +LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" + +DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" +DEPENDS += "openssl-native util-linux-native" + +PV = "${LINUX_VERSION}+git" + +KMETA = "kernel-meta" +KCONF_BSP_AUDIT_LEVEL = "1" + +LINUX_KERNEL_TYPE = "preempt-rt" + +COMPATIBLE_MACHINE = "^(qemux86|qemux86-64|qemuarm|qemuarmv5|qemuarm64|qemuppc|qemumips)$" + +KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb" + +# Functionality flags +KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc" +KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" +KERNEL_FEATURES:append:qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc" +KERNEL_FEATURES:append:qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc" +KERNEL_FEATURES:append:qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc" +KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" +KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc", "", d)}" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.5.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.5.bb new file mode 100644 index 0000000000..5325fbad53 --- /dev/null +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.5.bb @@ -0,0 +1,33 @@ +KBRANCH ?= "v6.5/standard/tiny/base" + +LINUX_KERNEL_TYPE = "tiny" +KCONFIG_MODE = "--allnoconfig" + +require recipes-kernel/linux/linux-yocto.inc + +# CVE exclusions +include recipes-kernel/linux/cve-exclusion_6.5.inc + +LINUX_VERSION ?= "6.5.5" +LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" + +DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" +DEPENDS += "openssl-native util-linux-native" + +KMETA = "kernel-meta" +KCONF_BSP_AUDIT_LEVEL = "2" + +SRCREV_machine ?= "5b2595c3e0dce2912b32ef69aaaacd52cd0e720c" +SRCREV_meta ?= "06cf3d8830fda41ff271eec7da6e3c8425df790f" + +PV = "${LINUX_VERSION}+git" + +SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ + git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.5;destsuffix=${KMETA};protocol=https" + +COMPATIBLE_MACHINE = "^(qemux86|qemux86-64|qemuarm64|qemuarm|qemuarmv5)$" + +# Functionality flags +KERNEL_FEATURES = "" + +KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.5.bb b/meta/recipes-kernel/linux/linux-yocto_6.5.bb new file mode 100644 index 0000000000..b9ed4be898 --- /dev/null +++ b/meta/recipes-kernel/linux/linux-yocto_6.5.bb @@ -0,0 +1,72 @@ +KBRANCH ?= "v6.5/standard/base" + +require recipes-kernel/linux/linux-yocto.inc + +# CVE exclusions +include recipes-kernel/linux/cve-exclusion.inc +include recipes-kernel/linux/cve-exclusion_6.5.inc + +# board specific branches +KBRANCH:qemuarm ?= "v6.5/standard/arm-versatile-926ejs" +KBRANCH:qemuarm64 ?= "v6.5/standard/qemuarm64" +KBRANCH:qemumips ?= "v6.5/standard/mti-malta32" +KBRANCH:qemuppc ?= "v6.5/standard/qemuppc" +KBRANCH:qemuriscv64 ?= "v6.5/standard/base" +KBRANCH:qemuriscv32 ?= "v6.5/standard/base" +KBRANCH:qemux86 ?= "v6.5/standard/base" +KBRANCH:qemux86-64 ?= "v6.5/standard/base" +KBRANCH:qemuloongarch64 ?= "v6.5/standard/base" +KBRANCH:qemumips64 ?= "v6.5/standard/mti-malta64" + +SRCREV_machine:qemuarm ?= "619d7b434792c35b501914d481eb3178d87b9f60" +SRCREV_machine:qemuarm64 ?= "5b2595c3e0dce2912b32ef69aaaacd52cd0e720c" +SRCREV_machine:qemuloongarch64 ?= "5b2595c3e0dce2912b32ef69aaaacd52cd0e720c" +SRCREV_machine:qemumips ?= "622b9a83a51276528ddd38ec9c239b7ef7eac1ee" +SRCREV_machine:qemuppc ?= "5b2595c3e0dce2912b32ef69aaaacd52cd0e720c" +SRCREV_machine:qemuriscv64 ?= "5b2595c3e0dce2912b32ef69aaaacd52cd0e720c" +SRCREV_machine:qemuriscv32 ?= "5b2595c3e0dce2912b32ef69aaaacd52cd0e720c" +SRCREV_machine:qemux86 ?= "5b2595c3e0dce2912b32ef69aaaacd52cd0e720c" +SRCREV_machine:qemux86-64 ?= "5b2595c3e0dce2912b32ef69aaaacd52cd0e720c" +SRCREV_machine:qemumips64 ?= "72909f2a89c5bcd4e8ab9aaab280eb961b4e1282" +SRCREV_machine ?= "5b2595c3e0dce2912b32ef69aaaacd52cd0e720c" +SRCREV_meta ?= "06cf3d8830fda41ff271eec7da6e3c8425df790f" + +# set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll +# get the /base branch, which is pure upstream -stable, and the same +# meta SRCREV as the linux-yocto-standard builds. Select your version using the +# normal PREFERRED_VERSION settings. +BBCLASSEXTEND = "devupstream:target" +SRCREV_machine:class-devupstream ?= "2309983b0ac063045af3b01b0251dfd118d45449" +PN:class-devupstream = "linux-yocto-upstream" +KBRANCH:class-devupstream = "v6.5/base" + +SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH};protocol=https \ + git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.5;destsuffix=${KMETA};protocol=https" + +LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" +LINUX_VERSION ?= "6.5.5" + +PV = "${LINUX_VERSION}+git" + +KMETA = "kernel-meta" +KCONF_BSP_AUDIT_LEVEL = "1" + +KERNEL_DEVICETREE:qemuarmv5 = "versatile-pb.dtb" + +COMPATIBLE_MACHINE = "^(qemuarm|qemuarmv5|qemuarm64|qemux86|qemuppc|qemuppc64|qemumips|qemumips64|qemux86-64|qemuriscv64|qemuriscv32|qemuloongarch64)$" + +# Functionality flags +KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc" +KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" +KERNEL_FEATURES:append:qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc cfg/net/mdio.scc" +KERNEL_FEATURES:append:qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc" +KERNEL_FEATURES:append:qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc" +KERNEL_FEATURES:append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}" +KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" +KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc", "", d)}" +KERNEL_FEATURES:append:powerpc =" arch/powerpc/powerpc-debug.scc" +KERNEL_FEATURES:append:powerpc64 =" arch/powerpc/powerpc-debug.scc" +KERNEL_FEATURES:append:powerpc64le =" arch/powerpc/powerpc-debug.scc" + +INSANE_SKIP:kernel-vmlinux:qemuppc64 = "textrel" + From patchwork Fri Sep 29 20:04:52 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 31405 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id A1D3CE728EA for ; Fri, 29 Sep 2023 20:05:15 +0000 (UTC) Received: from mail-qv1-f52.google.com (mail-qv1-f52.google.com [209.85.219.52]) by mx.groups.io with SMTP id smtpd.web10.27824.1696017907145725978 for ; Fri, 29 Sep 2023 13:05:07 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=J+Qb1TVS; spf=pass (domain: gmail.com, ip: 209.85.219.52, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f52.google.com with SMTP id 6a1803df08f44-65af726775eso4872156d6.0 for ; Fri, 29 Sep 2023 13:05:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1696017906; x=1696622706; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=PzyUiMJ5Jyw0G5BzG0MTpWN0ez09Q/0OEcWcjNsOHZc=; b=J+Qb1TVSx/3OuAQSqEGaoBrm+cAhh4xG+UiRZ8ZIUegrUZAvk8PvASvM/MyOsId25Z +zTp5JteYcOVhXBPjoWefTxmcM3txkLydl5DRQBCzerYqqsEZbzxjZ0Qw/SbwM8VxG4x a/GIY2z9KWkAv+1p+spBxP22i10avAxhsYZ8QANO0BajvJuaolrqc6d0GIczFda65wS+ Al+dy/r5b038Cz2LLGpNnuv6B6ufVcSyZsRws+OzBggniqADgPFw0To0joAGpLxJpWwN MHjiM7URrtzU8ffjR/pvVck5nm0GjTB/Ehy3e7ba/F8806QU7HD/+r9Fkjt9ve+gTRnx 25iQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696017906; x=1696622706; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=PzyUiMJ5Jyw0G5BzG0MTpWN0ez09Q/0OEcWcjNsOHZc=; b=Gen36cCRvo/EWxELg19ozw3aj20ay4htH1E5MsVRQ7AvnibVuwmhDdP9il/ZD+wZFa tPgEqf3J38+U9Ier25lORoN2wv0h7ruvQO+Mhx+lgzbF2mLXMQFIIfUuBI+103MFvASU udw+awgMyvQmxUlPiOVMZyD4Bu5OW5SNaE8Wi4hL6ivYClAsHhnvIxB1Ew6MJ2un2IkL bxcfkrd4sCjI5wNKZA80tGMuKZY0ziHi6hhQjizVODo39BN6W59TklEWgtxfT0kJBSfy MAbd9sAJJJ1ZDxNz4/DCFSqAZKansqa+rY1VqcTRtNTtR9d1RO7dnIHq4L0dO3r71dVW gj2g== X-Gm-Message-State: AOJu0YybUv4on+R0AL8egfWGkzW/1eHm/WdJCPei8dW4Qz6Z4SScU/M0 Wxj2NNnSTczALte51LwuQbebYko7x//bqw== X-Google-Smtp-Source: AGHT+IESUCHI5m6yf+GSpJfZYIQB0RhSMV0OnV/imm2T0dKsSxM81qEbA66lUF0mJVnGAvexrcjn4g== X-Received: by 2002:a05:6214:268c:b0:63f:9130:4e9c with SMTP id gm12-20020a056214268c00b0063f91304e9cmr5953935qvb.26.1696017906149; Fri, 29 Sep 2023 13:05:06 -0700 (PDT) Received: from build.lan ([174.112.183.231]) by smtp.gmail.com with ESMTPSA id t28-20020a0cb39c000000b0065cffe12ae9sm2115848qve.36.2023.09.29.13.05.05 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Sep 2023 13:05:05 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 08/10] linux-libc-headers: uprev to v6.5 Date: Fri, 29 Sep 2023 16:04:52 -0400 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 29 Sep 2023 20:05:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188426 From: Bruce Ashfield The 6.4 kernel has been EOLd and 6.5 will be the newest reference kernel. So we bump our libc-headers to match Signed-off-by: Bruce Ashfield --- .../{linux-libc-headers_6.4.bb => linux-libc-headers_6.5.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-kernel/linux-libc-headers/{linux-libc-headers_6.4.bb => linux-libc-headers_6.5.bb} (83%) diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.4.bb b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.5.bb similarity index 83% rename from meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.4.bb rename to meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.5.bb index c52315499e..fa902741f2 100644 --- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.4.bb +++ b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.5.bb @@ -12,6 +12,6 @@ SRC_URI += "\ LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -SRC_URI[sha256sum] = "8fa0588f0c2ceca44cac77a0e39ba48c9f00a6b9dc69761c02a5d3efac8da7f3" +SRC_URI[sha256sum] = "7a574bbc20802ea76b52ca7faf07267f72045e861b18915c5272a98c27abf884" From patchwork Fri Sep 29 20:04:53 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 31406 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id BE11AE728EE for ; Fri, 29 Sep 2023 20:05:15 +0000 (UTC) Received: from mail-qk1-f181.google.com (mail-qk1-f181.google.com [209.85.222.181]) by mx.groups.io with SMTP id smtpd.web11.27712.1696017908581380386 for ; Fri, 29 Sep 2023 13:05:08 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=KcL8AhF0; spf=pass (domain: gmail.com, ip: 209.85.222.181, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qk1-f181.google.com with SMTP id af79cd13be357-7741bffd123so911511485a.0 for ; Fri, 29 Sep 2023 13:05:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1696017907; x=1696622707; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=HjlR7Ki1Lvcj5yd73XbZqscnzToaYMCGCJZj4Y5CcAA=; b=KcL8AhF0SEmqAFhy0d2lOFuKCoEktqE9Ue9V0FrtatsXpvthS3fOHJVcReekUcMnpr Ka2rJlaQYFtlgiCV+/kuRhwKFzEpRnJQ5luf3zmd08EUZ1kTm0Kuxwbt3VCI669sRukV deKdCZwUm+wMwlsLqoAwCXhb9RhcLdd+pBfbF9QKB9TDsxTDfF5M7BTGVQ9jcE+lCP2e IDNXhwJjO703nekyEx9HWza/QQx33tw143KJPF6UBndrlJrhS3ZnSsVXPL9S0CmKG6A3 2KOkeA8OdQULEga/OJBzCa4rB+AUdKl9MyrVonIUmGETgWGHuBIwpzeiUge6+PapciNZ QR/A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696017907; x=1696622707; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=HjlR7Ki1Lvcj5yd73XbZqscnzToaYMCGCJZj4Y5CcAA=; b=S4CJKj4UauPkrPiE9nYDfaGSUzAhI3bUJva4pKazEmvF0z2pCzICN0P37CWAO/JR+e p1hYgLBLbyEp1agiSB6ed4XDox+bJ3EtpJ+8wvpesp+FfCQiDbmu0JEugBoiZnh5IvgY IzIMVRt1ghTdMSRCJ8nxv0PJ0OCBwQxoHAQHZe1zyOC0Mlg39LKV4s5MslQMdTBJjO6c eF09H/y8/8/FCV7/Cxm5Fc/qFzuBJ50NpFznE96gpyuFkP44Io7xB3InKbxIyZ7KEFKm CY5fYVc3YWFGicJRcVJ3yhO/yMCuwLrJuxrSeRJUALpELMADDCx3nWQnd5O68FRvpW+R wGfw== X-Gm-Message-State: AOJu0YyfZ4Xl8dUrUXwLpk/WyTH7bBRekUm2XrDc8RFVOaPjvRfGmnHX +DKyV0HKclvqrcgvOpKIRBS7A7ByycQbVw== X-Google-Smtp-Source: AGHT+IEx1iMpXb5kvjxMaRpSPI5iIxmRLUDyWWheuR/MBoJWCCwhb5UWGYcARVxuqZr3fCUCYRzQ8g== X-Received: by 2002:a0c:e20d:0:b0:63d:657:4cb9 with SMTP id q13-20020a0ce20d000000b0063d06574cb9mr4756391qvl.42.1696017907665; Fri, 29 Sep 2023 13:05:07 -0700 (PDT) Received: from build.lan ([174.112.183.231]) by smtp.gmail.com with ESMTPSA id t28-20020a0cb39c000000b0065cffe12ae9sm2115848qve.36.2023.09.29.13.05.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Sep 2023 13:05:06 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 09/10] linux-libc-headers: default to 6.5 Date: Fri, 29 Sep 2023 16:04:53 -0400 Message-Id: <85b545177c70b85891fc40547aa9fb92d4be9954.1696017123.git.bruce.ashfield@gmail.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 29 Sep 2023 20:05:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188428 From: Bruce Ashfield kernel version 6.5 is the reference kernel for the fall release. This brings libc-headers up to date with that tested reference Signed-off-by: Bruce Ashfield --- meta/conf/distro/include/tcmode-default.inc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/conf/distro/include/tcmode-default.inc b/meta/conf/distro/include/tcmode-default.inc index 69280fd210..c72a60b3ba 100644 --- a/meta/conf/distro/include/tcmode-default.inc +++ b/meta/conf/distro/include/tcmode-default.inc @@ -21,7 +21,7 @@ SDKGCCVERSION ?= "${GCCVERSION}" BINUVERSION ?= "2.41%" GDBVERSION ?= "13.%" GLIBCVERSION ?= "2.38%" -LINUXLIBCVERSION ?= "6.4%" +LINUXLIBCVERSION ?= "6.5%" QEMUVERSION ?= "8.1%" GOVERSION ?= "1.20%" LLVMVERSION ?= "16.%" From patchwork Fri Sep 29 20:04:54 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Bruce Ashfield X-Patchwork-Id: 31407 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id CBA89E728F1 for ; Fri, 29 Sep 2023 20:05:15 +0000 (UTC) Received: from mail-qv1-f43.google.com (mail-qv1-f43.google.com [209.85.219.43]) by mx.groups.io with SMTP id smtpd.web10.27826.1696017909502010899 for ; Fri, 29 Sep 2023 13:05:09 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20230601 header.b=AB3H3RNZ; spf=pass (domain: gmail.com, ip: 209.85.219.43, mailfrom: bruce.ashfield@gmail.com) Received: by mail-qv1-f43.google.com with SMTP id 6a1803df08f44-65b05a45046so58131506d6.2 for ; Fri, 29 Sep 2023 13:05:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1696017908; x=1696622708; darn=lists.openembedded.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=YNwPgKhZXJrKBctuMO2Lu4Z9c/LSIMMNcXTFhp7JAGc=; b=AB3H3RNZZ7LJtXhZvu4rF1bWRhOqtWLIVKFzJvo4RrgcX0yBNjTjyHBH6JnTFBepYO qtz1fFTLbVaJMUey6epPQua2BBiRcpHK0GYzxCUONzu6PWx4JYG53Xw/CwDPz+zUUECg UDk8tJ+6bpXlHz7NsH/bwUjBAOTuGHxQ3HbXZNgkz+9wgOE2fqvbgslal2Gvb6rTc2bS xfF0ZwkrvtmLTOfxOGYCzOKlYGOT5RHgFyK048eBhy+mI2t6/L2NZPoFXVdWyy32bGKb dw//wRqbCHvq2ZuIampKdyYbeSQ68bBSD9muByzS703do1pTa68OmnQgVL15QzGIot0A 1vqQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696017908; x=1696622708; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=YNwPgKhZXJrKBctuMO2Lu4Z9c/LSIMMNcXTFhp7JAGc=; b=FFLjf1qY3+6uWgBri8T1xed5c0MxzgCBByUWDZB4lw4XPMSoGWnH9rJbnvNT+Cy65X QXfMxF/TAmkpCuy5tdUGQ+2nXZNJ6ZS+rUdTCHuwIMIftQMejXG+WJBZ7/81MowyQulI Uc3iAmlF29axQ0YTP646tzpEHs9xFIaw8w1HSpH8R4MkWv6BnhInZr4d4nqO2aw4bAba j4V0wCTpBM0L/cSRHzUFdvfAqKHyAjVGZF61UqO0OGBom6ja1tn0CklpaZJVzEdZlBlN /yUh1HcqmVCS+yHBgWmhwzNAM+W2pSCVub6xhl0vU3Azz5X9LPlfPd2ftRw1xJ9rUAEg KI6g== X-Gm-Message-State: AOJu0YzZQJ8gNtH9sxQXJV6TJKeUQ56CgcKTexr6mA0SPP1jzbF52biS LQ2RDT4zshHmtXZgCBW9LVJOq49zeX8wYg== X-Google-Smtp-Source: AGHT+IFhuxXp3mQCVC8QV5ers9zh/csz5J/UslVp6D9mOwbcj/4OLXMXgZ4PVQzV45r5Oby7UKdl7Q== X-Received: by 2002:a0c:f4cf:0:b0:64f:7fe6:bf1d with SMTP id o15-20020a0cf4cf000000b0064f7fe6bf1dmr5342875qvm.12.1696017908502; Fri, 29 Sep 2023 13:05:08 -0700 (PDT) Received: from build.lan ([174.112.183.231]) by smtp.gmail.com with ESMTPSA id t28-20020a0cb39c000000b0065cffe12ae9sm2115848qve.36.2023.09.29.13.05.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Sep 2023 13:05:07 -0700 (PDT) From: bruce.ashfield@gmail.com To: richard.purdie@linuxfoundation.org Cc: openembedded-core@lists.openembedded.org Subject: [PATCH 10/10] btrfs-progs: update to version v6.5.1 Date: Fri, 29 Sep 2023 16:04:54 -0400 Message-Id: X-Mailer: git-send-email 2.34.1 In-Reply-To: References: MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 29 Sep 2023 20:05:15 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-core/message/188429 From: Bruce Ashfield When building against 6.5+ kernel headers and musl the compiler has the following error: | image/main.c: In function 'restore_worker': | image/main.c:1588:1: error: unrecognizable insn: | 1588 | } | | ^ | (insn 3361 2993 2990 45 (parallel [ | (set (reg:DI 4 x4) | (zero_extend:DI (mem/c:SI (plus:DI (reg/f:DI 29 x29) | (const_int -260 [0xfffffffffffffefc])) [98 %sfp+-260 S4 A32]))) | (set (reg:DI 22 x22) | (zero_extend:DI (mem/c:SI (plus:DI (reg/f:DI 29 x29) | (const_int -256 [0xffffffffffffff00])) [98 %sfp+-256 S4 A64]))) | ]) -1 | (nil)) | during RTL pass: fma_steering | image/main.c:1588:1: internal compiler error: in extract_insn, at recog.cc:2791 Bumping to v6.5.1 solves the issue. Signed-off-by: Bruce Ashfield --- .../btrfs-tools/{btrfs-tools_6.3.3.bb => btrfs-tools_6.5.1.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta/recipes-devtools/btrfs-tools/{btrfs-tools_6.3.3.bb => btrfs-tools_6.5.1.bb} (98%) diff --git a/meta/recipes-devtools/btrfs-tools/btrfs-tools_6.3.3.bb b/meta/recipes-devtools/btrfs-tools/btrfs-tools_6.5.1.bb similarity index 98% rename from meta/recipes-devtools/btrfs-tools/btrfs-tools_6.3.3.bb rename to meta/recipes-devtools/btrfs-tools/btrfs-tools_6.5.1.bb index e7a64e8363..527e13d08e 100644 --- a/meta/recipes-devtools/btrfs-tools/btrfs-tools_6.3.3.bb +++ b/meta/recipes-devtools/btrfs-tools/btrfs-tools_6.5.1.bb @@ -18,7 +18,7 @@ DEPENDS = "util-linux zlib" SRC_URI = "git://git.kernel.org/pub/scm/linux/kernel/git/kdave/btrfs-progs.git;branch=master;protocol=https \ file://0001-Add-a-possibility-to-specify-where-python-modules-ar.patch \ " -SRCREV = "bb0ca35245858f17a6ced97aade1dd8d70f9c9d7" +SRCREV = "92d04d4780886a9850716e5529f1dace97779931" S = "${WORKDIR}/git" PACKAGECONFIG ??= " \