diff options
33 files changed, 1326 insertions, 123 deletions
diff --git a/bitbake/lib/bb/cooker.py b/bitbake/lib/bb/cooker.py index 90022f3c35..dc131939ed 100644 --- a/bitbake/lib/bb/cooker.py +++ b/bitbake/lib/bb/cooker.py | |||
@@ -26,6 +26,7 @@ import json | |||
26 | import pickle | 26 | import pickle |
27 | import codecs | 27 | import codecs |
28 | import hashserv | 28 | import hashserv |
29 | import ctypes | ||
29 | 30 | ||
30 | logger = logging.getLogger("BitBake") | 31 | logger = logging.getLogger("BitBake") |
31 | collectlog = logging.getLogger("BitBake.Collection") | 32 | collectlog = logging.getLogger("BitBake.Collection") |
@@ -1998,9 +1999,9 @@ class ParsingFailure(Exception): | |||
1998 | Exception.__init__(self, realexception, recipe) | 1999 | Exception.__init__(self, realexception, recipe) |
1999 | 2000 | ||
2000 | class Parser(multiprocessing.Process): | 2001 | class Parser(multiprocessing.Process): |
2001 | def __init__(self, jobs, jobid_queue, results, quit, profile): | 2002 | def __init__(self, jobs, next_job_id, results, quit, profile): |
2002 | self.jobs = jobs | 2003 | self.jobs = jobs |
2003 | self.jobid_queue = jobid_queue | 2004 | self.next_job_id = next_job_id |
2004 | self.results = results | 2005 | self.results = results |
2005 | self.quit = quit | 2006 | self.quit = quit |
2006 | multiprocessing.Process.__init__(self) | 2007 | multiprocessing.Process.__init__(self) |
@@ -2059,20 +2060,22 @@ class Parser(multiprocessing.Process): | |||
2059 | multiprocessing.util.Finalize(None, bb.fetch.fetcher_parse_save, exitpriority=1) | 2060 | multiprocessing.util.Finalize(None, bb.fetch.fetcher_parse_save, exitpriority=1) |
2060 | 2061 | ||
2061 | pending = [] | 2062 | pending = [] |
2063 | havejobs = True | ||
2062 | try: | 2064 | try: |
2063 | while pending or not self.exit: | 2065 | while (havejobs or pending) and not self.exit: |
2064 | if self.quit.is_set(): | 2066 | if self.quit.is_set(): |
2065 | break | 2067 | break |
2066 | 2068 | ||
2067 | jobid = None | 2069 | job = None |
2068 | try: | 2070 | if havejobs: |
2069 | # Have to wait for all parsers to have forked | 2071 | with self.next_job_id.get_lock(): |
2070 | jobid = self.jobid_queue.get(True, 0.1) | 2072 | if self.next_job_id.value < len(self.jobs): |
2071 | except (ValueError, OSError, queue.Empty) as e: | 2073 | job = self.jobs[self.next_job_id.value] |
2072 | pass | 2074 | self.next_job_id.value += 1 |
2075 | else: | ||
2076 | havejobs = False | ||
2073 | 2077 | ||
2074 | if jobid is not None: | 2078 | if job: |
2075 | job = self.jobs[jobid] | ||
2076 | result = self.parse(*job) | 2079 | result = self.parse(*job) |
2077 | # Clear the siggen cache after parsing to control memory usage, its huge | 2080 | # Clear the siggen cache after parsing to control memory usage, its huge |
2078 | bb.parse.siggen.postparsing_clean_cache() | 2081 | bb.parse.siggen.postparsing_clean_cache() |
@@ -2085,7 +2088,6 @@ class Parser(multiprocessing.Process): | |||
2085 | except queue.Full: | 2088 | except queue.Full: |
2086 | pending.append(result) | 2089 | pending.append(result) |
2087 | finally: | 2090 | finally: |
2088 | self.jobs.close() | ||
2089 | self.results.close() | 2091 | self.results.close() |
2090 | self.results.join_thread() | 2092 | self.results.join_thread() |
2091 | 2093 | ||
@@ -2167,22 +2169,18 @@ class CookerParser(object): | |||
2167 | if self.toparse: | 2169 | if self.toparse: |
2168 | bb.event.fire(bb.event.ParseStarted(self.toparse), self.cfgdata) | 2170 | bb.event.fire(bb.event.ParseStarted(self.toparse), self.cfgdata) |
2169 | 2171 | ||
2170 | self.toparse_queue = multiprocessing.Queue(len(self.willparse)) | 2172 | next_job_id = multiprocessing.Value(ctypes.c_int, 0) |
2171 | self.parser_quit = multiprocessing.Event() | 2173 | self.parser_quit = multiprocessing.Event() |
2172 | self.result_queue = multiprocessing.Queue() | 2174 | self.result_queue = multiprocessing.Queue() |
2173 | 2175 | ||
2174 | # Have to pass in willparse at fork time so all parsing processes have the unpickleable data | 2176 | # Have to pass in willparse at fork time so all parsing processes have the unpickleable data |
2175 | # then access it by index from the parse queue. | 2177 | # then access it by index from the parse queue. |
2176 | for i in range(0, self.num_processes): | 2178 | for i in range(0, self.num_processes): |
2177 | parser = Parser(self.willparse, self.toparse_queue, self.result_queue, self.parser_quit, self.cooker.configuration.profile) | 2179 | parser = Parser(self.willparse, next_job_id, self.result_queue, self.parser_quit, self.cooker.configuration.profile) |
2178 | parser.start() | 2180 | parser.start() |
2179 | self.process_names.append(parser.name) | 2181 | self.process_names.append(parser.name) |
2180 | self.processes.append(parser) | 2182 | self.processes.append(parser) |
2181 | 2183 | ||
2182 | for jobid in range(len(self.willparse)): | ||
2183 | self.toparse_queue.put(jobid) | ||
2184 | self.toparse_queue.close() | ||
2185 | |||
2186 | self.results = itertools.chain(self.results, self.parse_generator()) | 2184 | self.results = itertools.chain(self.results, self.parse_generator()) |
2187 | 2185 | ||
2188 | def shutdown(self, clean=True, eventmsg="Parsing halted due to errors"): | 2186 | def shutdown(self, clean=True, eventmsg="Parsing halted due to errors"): |
diff --git a/meta/classes-global/sanity.bbclass b/meta/classes-global/sanity.bbclass index 1044ed9cc6..d875a022db 100644 --- a/meta/classes-global/sanity.bbclass +++ b/meta/classes-global/sanity.bbclass | |||
@@ -672,6 +672,8 @@ def check_sanity_sstate_dir_change(sstate_dir, data): | |||
672 | return testmsg | 672 | return testmsg |
673 | 673 | ||
674 | def check_sanity_version_change(status, d): | 674 | def check_sanity_version_change(status, d): |
675 | import glob | ||
676 | |||
675 | # Sanity checks to be done when SANITY_VERSION or NATIVELSBSTRING changes | 677 | # Sanity checks to be done when SANITY_VERSION or NATIVELSBSTRING changes |
676 | # In other words, these tests run once in a given build directory and then | 678 | # In other words, these tests run once in a given build directory and then |
677 | # never again until the sanity version or host distribution id/version changes. | 679 | # never again until the sanity version or host distribution id/version changes. |
@@ -703,6 +705,11 @@ def check_sanity_version_change(status, d): | |||
703 | if not check_app_exists('g++', d): | 705 | if not check_app_exists('g++', d): |
704 | missing = missing + "C++ Compiler (g++)," | 706 | missing = missing + "C++ Compiler (g++)," |
705 | 707 | ||
708 | # installing emacs on Ubuntu 24.04 pulls in emacs-gtk -> libgcc-14-dev despite gcc being 13 | ||
709 | # this breaks libcxx-native and compiler-rt-native builds so tell the user to fix things | ||
710 | if glob.glob("/usr/lib/gcc/*/14/libgcc_s.so") and not glob.glob("/usr/lib/gcc/*/14/libstdc++.so"): | ||
711 | status.addresult('libgcc-14-dev is installed and not libstdc++-14-dev which will break clang native compiles. Please remove one or install the other.') | ||
712 | |||
706 | required_utilities = d.getVar('SANITY_REQUIRED_UTILITIES') | 713 | required_utilities = d.getVar('SANITY_REQUIRED_UTILITIES') |
707 | 714 | ||
708 | for util in required_utilities.split(): | 715 | for util in required_utilities.split(): |
diff --git a/meta/classes-recipe/kernel-fit-image.bbclass b/meta/classes-recipe/kernel-fit-image.bbclass index 39845997ed..fd4c6a30fe 100644 --- a/meta/classes-recipe/kernel-fit-image.bbclass +++ b/meta/classes-recipe/kernel-fit-image.bbclass | |||
@@ -173,7 +173,7 @@ do_deploy() { | |||
173 | fi | 173 | fi |
174 | 174 | ||
175 | if [ -n "${INITRAMFS_IMAGE}" ]; then | 175 | if [ -n "${INITRAMFS_IMAGE}" ]; then |
176 | ln -snf fit-image-its "$deploy_dir/fitImage-its-${INITRAMFS_IMAGE_NAME}-${KERNEL_FIT_NAME}.its" | 176 | ln -snf fit-image.its "$deploy_dir/fitImage-its-${INITRAMFS_IMAGE_NAME}-${KERNEL_FIT_NAME}.its" |
177 | if [ -n "${KERNEL_FIT_LINK_NAME}" ]; then | 177 | if [ -n "${KERNEL_FIT_LINK_NAME}" ]; then |
178 | ln -snf fit-image.its "$deploy_dir/fitImage-its-${INITRAMFS_IMAGE_NAME}-${KERNEL_FIT_LINK_NAME}" | 178 | ln -snf fit-image.its "$deploy_dir/fitImage-its-${INITRAMFS_IMAGE_NAME}-${KERNEL_FIT_LINK_NAME}" |
179 | fi | 179 | fi |
diff --git a/meta/classes/toolchain/clang-native.bbclass b/meta/classes/toolchain/clang-native.bbclass index c8b20ff8c4..4de491a1cb 100644 --- a/meta/classes/toolchain/clang-native.bbclass +++ b/meta/classes/toolchain/clang-native.bbclass | |||
@@ -16,10 +16,3 @@ BUILD_READELF = "${BUILD_PREFIX}llvm-readelf" | |||
16 | DEPENDS += "clang-native libcxx-native compiler-rt-native" | 16 | DEPENDS += "clang-native libcxx-native compiler-rt-native" |
17 | 17 | ||
18 | LDFLAGS += " --rtlib=libgcc --unwindlib=libgcc" | 18 | LDFLAGS += " --rtlib=libgcc --unwindlib=libgcc" |
19 | |||
20 | # Some systems can have mixed gcc development headers, such as pieces of both gcc 13 | ||
21 | # and 14 which can cause build failures, particularly if libgcc and libstdc++ for | ||
22 | # gcc 13 are present but only libgcc for gcc 14 and not libstdc++ when the gcc | ||
23 | # version is gcc 13. Force the gcc install that matches gcc itself | ||
24 | BUILD_CFLAGS:append:class-native = " --gcc-install-dir=$(dirname $(gcc -print-libgcc-file-name))" | ||
25 | BUILD_CXXFLAGS:append:class-native = " --gcc-install-dir=$(dirname $(gcc -print-libgcc-file-name))" | ||
diff --git a/meta/conf/bitbake.conf b/meta/conf/bitbake.conf index b1f8ac5b11..bd186ffeec 100644 --- a/meta/conf/bitbake.conf +++ b/meta/conf/bitbake.conf | |||
@@ -745,7 +745,7 @@ SRC_URI = "" | |||
745 | PSEUDO_LOCALSTATEDIR ?= "${WORKDIR}/pseudo/" | 745 | PSEUDO_LOCALSTATEDIR ?= "${WORKDIR}/pseudo/" |
746 | PSEUDO_PASSWD ?= "${STAGING_DIR_TARGET}:${PSEUDO_SYSROOT}" | 746 | PSEUDO_PASSWD ?= "${STAGING_DIR_TARGET}:${PSEUDO_SYSROOT}" |
747 | PSEUDO_SYSROOT = "${COMPONENTS_DIR}/${BUILD_ARCH}/pseudo-native" | 747 | PSEUDO_SYSROOT = "${COMPONENTS_DIR}/${BUILD_ARCH}/pseudo-native" |
748 | PSEUDO_INCLUDE_PATHS = "/proc,${WORKDIR}/image,${WORKDIR}/package,${WORKDIR}/rootfs,${WORKDIR}/sstate-build-package/,${WORKDIR}/sstate-install-package/,${WORKDIR}/pkgdata,${WORKDIR}/minidebuginfo" | 748 | PSEUDO_INCLUDE_PATHS = "/proc,${WORKDIR}/image,${WORKDIR}/package,${WORKDIR}/rootfs,${WORKDIR}/sstate-build-package/,${WORKDIR}/sstate-install-package/,${WORKDIR}/pkgdata,${WORKDIR}/minidebuginfo,${WORKDIR}/devtool-deploy-target-stripped" |
749 | 749 | ||
750 | export PSEUDO_DISABLED = "1" | 750 | export PSEUDO_DISABLED = "1" |
751 | #export PSEUDO_PREFIX = "${STAGING_DIR_NATIVE}${prefix_native}" | 751 | #export PSEUDO_PREFIX = "${STAGING_DIR_NATIVE}${prefix_native}" |
diff --git a/meta/conf/distro/include/ptest-packagelists.inc b/meta/conf/distro/include/ptest-packagelists.inc index 4253c7b062..4451e00b48 100644 --- a/meta/conf/distro/include/ptest-packagelists.inc +++ b/meta/conf/distro/include/ptest-packagelists.inc | |||
@@ -25,6 +25,7 @@ PTESTS_FAST = "\ | |||
25 | gdk-pixbuf \ | 25 | gdk-pixbuf \ |
26 | glib-networking \ | 26 | glib-networking \ |
27 | gzip \ | 27 | gzip \ |
28 | icu \ | ||
28 | json-c \ | 29 | json-c \ |
29 | json-glib \ | 30 | json-glib \ |
30 | libconvert-asn1-perl \ | 31 | libconvert-asn1-perl \ |
diff --git a/meta/lib/oeqa/selftest/cases/devtool.py b/meta/lib/oeqa/selftest/cases/devtool.py index 9fc3eaa311..a11934852a 100644 --- a/meta/lib/oeqa/selftest/cases/devtool.py +++ b/meta/lib/oeqa/selftest/cases/devtool.py | |||
@@ -16,7 +16,7 @@ import json | |||
16 | 16 | ||
17 | from oeqa.selftest.case import OESelftestTestCase | 17 | from oeqa.selftest.case import OESelftestTestCase |
18 | from oeqa.utils.commands import runCmd, bitbake, get_bb_var, create_temp_layer | 18 | from oeqa.utils.commands import runCmd, bitbake, get_bb_var, create_temp_layer |
19 | from oeqa.utils.commands import get_bb_vars, runqemu, get_test_layer | 19 | from oeqa.utils.commands import get_bb_vars, runqemu, runqemu_check_taps, get_test_layer |
20 | from oeqa.core.decorator import OETestTag | 20 | from oeqa.core.decorator import OETestTag |
21 | 21 | ||
22 | oldmetapath = None | 22 | oldmetapath = None |
@@ -277,18 +277,8 @@ class DevtoolTestCase(OESelftestTestCase): | |||
277 | machine = get_bb_var('MACHINE') | 277 | machine = get_bb_var('MACHINE') |
278 | if not machine.startswith('qemu'): | 278 | if not machine.startswith('qemu'): |
279 | self.skipTest('This test only works with qemu machines') | 279 | self.skipTest('This test only works with qemu machines') |
280 | if not os.path.exists('/etc/runqemu-nosudo'): | 280 | if not runqemu_check_taps(): |
281 | self.skipTest('You must set up tap devices with scripts/runqemu-gen-tapdevs before running this test') | 281 | self.skipTest('You must set up tap devices with scripts/runqemu-gen-tapdevs before running this test') |
282 | result = runCmd('PATH="$PATH:/sbin:/usr/sbin" ip tuntap show', ignore_status=True) | ||
283 | if result.status != 0: | ||
284 | result = runCmd('PATH="$PATH:/sbin:/usr/sbin" ifconfig -a', ignore_status=True) | ||
285 | if result.status != 0: | ||
286 | self.skipTest('Failed to determine if tap devices exist with ifconfig or ip: %s' % result.output) | ||
287 | for line in result.output.splitlines(): | ||
288 | if line.startswith('tap'): | ||
289 | break | ||
290 | else: | ||
291 | self.skipTest('No tap devices found - you must set up tap devices with scripts/runqemu-gen-tapdevs before running this test') | ||
292 | 282 | ||
293 | def _test_devtool_add_git_url(self, git_url, version, pn, resulting_src_uri, srcrev=None): | 283 | def _test_devtool_add_git_url(self, git_url, version, pn, resulting_src_uri, srcrev=None): |
294 | self.track_for_cleanup(self.workspacedir) | 284 | self.track_for_cleanup(self.workspacedir) |
diff --git a/meta/lib/oeqa/utils/commands.py b/meta/lib/oeqa/utils/commands.py index b60a6e6c38..5eaedd2fd9 100644 --- a/meta/lib/oeqa/utils/commands.py +++ b/meta/lib/oeqa/utils/commands.py | |||
@@ -401,6 +401,16 @@ def runqemu(pn, ssh=True, runqemuparams='', image_fstype=None, launch_cmd=None, | |||
401 | targetlogger.removeHandler(handler) | 401 | targetlogger.removeHandler(handler) |
402 | qemu.stop() | 402 | qemu.stop() |
403 | 403 | ||
404 | def runqemu_check_taps(): | ||
405 | """Check if tap devices for runqemu are available""" | ||
406 | result = runCmd('PATH="$PATH:/sbin:/usr/sbin" ip tuntap show', ignore_status=True) | ||
407 | if result.status != 0: | ||
408 | return False | ||
409 | for line in result.output.splitlines(): | ||
410 | if line.startswith('tap'): | ||
411 | return True | ||
412 | return False | ||
413 | |||
404 | def updateEnv(env_file): | 414 | def updateEnv(env_file): |
405 | """ | 415 | """ |
406 | Source a file and update environment. | 416 | Source a file and update environment. |
diff --git a/meta/recipes-connectivity/kea/files/kea-dhcp-ddns.service b/meta/recipes-connectivity/kea/files/kea-dhcp-ddns.service index f6059d73cb..aec6446f0e 100644 --- a/meta/recipes-connectivity/kea/files/kea-dhcp-ddns.service +++ b/meta/recipes-connectivity/kea/files/kea-dhcp-ddns.service | |||
@@ -6,6 +6,7 @@ After=time-sync.target | |||
6 | 6 | ||
7 | [Service] | 7 | [Service] |
8 | ExecStartPre=@BASE_BINDIR@/mkdir -p @LOCALSTATEDIR@/run/kea/ | 8 | ExecStartPre=@BASE_BINDIR@/mkdir -p @LOCALSTATEDIR@/run/kea/ |
9 | ExecStartPre=@BASE_BINDIR@/chmod 750 @LOCALSTATEDIR@/run/kea/ | ||
9 | ExecStart=@SBINDIR@/kea-dhcp-ddns -c @SYSCONFDIR@/kea/kea-dhcp-ddns.conf | 10 | ExecStart=@SBINDIR@/kea-dhcp-ddns -c @SYSCONFDIR@/kea/kea-dhcp-ddns.conf |
10 | 11 | ||
11 | [Install] | 12 | [Install] |
diff --git a/meta/recipes-connectivity/kea/files/kea-dhcp4.service b/meta/recipes-connectivity/kea/files/kea-dhcp4.service index b851ea71c5..a2ed4edb59 100644 --- a/meta/recipes-connectivity/kea/files/kea-dhcp4.service +++ b/meta/recipes-connectivity/kea/files/kea-dhcp4.service | |||
@@ -6,6 +6,7 @@ After=time-sync.target | |||
6 | 6 | ||
7 | [Service] | 7 | [Service] |
8 | ExecStartPre=@BASE_BINDIR@/mkdir -p @LOCALSTATEDIR@/run/kea/ | 8 | ExecStartPre=@BASE_BINDIR@/mkdir -p @LOCALSTATEDIR@/run/kea/ |
9 | ExecStartPre=@BASE_BINDIR@/chmod 750 @LOCALSTATEDIR@/run/kea/ | ||
9 | ExecStartPre=@BASE_BINDIR@/mkdir -p @LOCALSTATEDIR@/lib/kea | 10 | ExecStartPre=@BASE_BINDIR@/mkdir -p @LOCALSTATEDIR@/lib/kea |
10 | ExecStart=@SBINDIR@/kea-dhcp4 -c @SYSCONFDIR@/kea/kea-dhcp4.conf | 11 | ExecStart=@SBINDIR@/kea-dhcp4 -c @SYSCONFDIR@/kea/kea-dhcp4.conf |
11 | 12 | ||
diff --git a/meta/recipes-connectivity/kea/files/kea-dhcp6.service b/meta/recipes-connectivity/kea/files/kea-dhcp6.service index 0f9f0ef8d9..ed6e017d0c 100644 --- a/meta/recipes-connectivity/kea/files/kea-dhcp6.service +++ b/meta/recipes-connectivity/kea/files/kea-dhcp6.service | |||
@@ -6,6 +6,7 @@ After=time-sync.target | |||
6 | 6 | ||
7 | [Service] | 7 | [Service] |
8 | ExecStartPre=@BASE_BINDIR@/mkdir -p @LOCALSTATEDIR@/run/kea/ | 8 | ExecStartPre=@BASE_BINDIR@/mkdir -p @LOCALSTATEDIR@/run/kea/ |
9 | ExecStartPre=@BASE_BINDIR@/chmod 750 @LOCALSTATEDIR@/run/kea/ | ||
9 | ExecStartPre=@BASE_BINDIR@/mkdir -p @LOCALSTATEDIR@/lib/kea | 10 | ExecStartPre=@BASE_BINDIR@/mkdir -p @LOCALSTATEDIR@/lib/kea |
10 | ExecStart=@SBINDIR@/kea-dhcp6 -c @SYSCONFDIR@/kea/kea-dhcp6.conf | 11 | ExecStart=@SBINDIR@/kea-dhcp6 -c @SYSCONFDIR@/kea/kea-dhcp6.conf |
11 | 12 | ||
diff --git a/meta/recipes-connectivity/openssl/openssl_3.5.0.bb b/meta/recipes-connectivity/openssl/openssl_3.5.0.bb index 0f5c28dafa..a7d08d5b86 100644 --- a/meta/recipes-connectivity/openssl/openssl_3.5.0.bb +++ b/meta/recipes-connectivity/openssl/openssl_3.5.0.bb | |||
@@ -192,6 +192,11 @@ do_install:append:class-native () { | |||
192 | SSL_CERT_FILE=\${SSL_CERT_FILE:-${libdir}/ssl-3/cert.pem} \ | 192 | SSL_CERT_FILE=\${SSL_CERT_FILE:-${libdir}/ssl-3/cert.pem} \ |
193 | OPENSSL_ENGINES=\${OPENSSL_ENGINES:-${libdir}/engines-3} \ | 193 | OPENSSL_ENGINES=\${OPENSSL_ENGINES:-${libdir}/engines-3} \ |
194 | OPENSSL_MODULES=\${OPENSSL_MODULES:-${libdir}/ossl-modules} | 194 | OPENSSL_MODULES=\${OPENSSL_MODULES:-${libdir}/ossl-modules} |
195 | |||
196 | # Setting ENGINESDIR and MODULESDIR to invalid paths prevents host contamination, | ||
197 | # but also breaks the generated libcrypto.pc file. Post-Fix it manually here. | ||
198 | sed -i 's|^enginesdir=\($.libdir.\)/.*|enginesdir=\1/engines-3|' ${D}${libdir}/pkgconfig/libcrypto.pc | ||
199 | sed -i 's|^modulesdir=\($.libdir.\)/.*|modulesdir=\1/ossl-modules|' ${D}${libdir}/pkgconfig/libcrypto.pc | ||
195 | } | 200 | } |
196 | 201 | ||
197 | do_install:append:class-nativesdk () { | 202 | do_install:append:class-nativesdk () { |
diff --git a/meta/recipes-core/initrdscripts/initramfs-framework/overlayroot b/meta/recipes-core/initrdscripts/initramfs-framework/overlayroot index 0d41432878..db164d9846 100644 --- a/meta/recipes-core/initrdscripts/initramfs-framework/overlayroot +++ b/meta/recipes-core/initrdscripts/initramfs-framework/overlayroot | |||
@@ -38,10 +38,10 @@ | |||
38 | PATH=/sbin:/bin:/usr/sbin:/usr/bin | 38 | PATH=/sbin:/bin:/usr/sbin:/usr/bin |
39 | 39 | ||
40 | # We get OLDROOT from the rootfs module | 40 | # We get OLDROOT from the rootfs module |
41 | OLDROOT="/rootfs" | 41 | OLDROOT="${ROOTFS_DIR}" |
42 | 42 | ||
43 | NEWROOT="${RWMOUNT}/root" | ||
44 | RWMOUNT="/overlay" | 43 | RWMOUNT="/overlay" |
44 | NEWROOT="${RWMOUNT}/root" | ||
45 | ROMOUNT="${RWMOUNT}/rofs" | 45 | ROMOUNT="${RWMOUNT}/rofs" |
46 | UPPER_DIR="${RWMOUNT}/upper" | 46 | UPPER_DIR="${RWMOUNT}/upper" |
47 | WORK_DIR="${RWMOUNT}/work" | 47 | WORK_DIR="${RWMOUNT}/work" |
@@ -115,4 +115,9 @@ mount -n --move /proc ${NEWROOT}/proc | |||
115 | mount -n --move /sys ${NEWROOT}/sys | 115 | mount -n --move /sys ${NEWROOT}/sys |
116 | mount -n --move /dev ${NEWROOT}/dev | 116 | mount -n --move /dev ${NEWROOT}/dev |
117 | 117 | ||
118 | # Mount/move boot if is already mounted | ||
119 | if mountpoint -q ${OLDROOT}/boot; then | ||
120 | mount -n --move ${OLDROOT}/boot ${NEWROOT}/boot | ||
121 | fi | ||
122 | |||
118 | exec chroot ${NEWROOT}/ ${bootparam_init:-/sbin/init} || exit_gracefully "Couldn't chroot into overlay" | 123 | exec chroot ${NEWROOT}/ ${bootparam_init:-/sbin/init} || exit_gracefully "Couldn't chroot into overlay" |
diff --git a/meta/recipes-core/systemd/systemd_257.6.bb b/meta/recipes-core/systemd/systemd_257.6.bb index 5f7f20c434..9092d02c51 100644 --- a/meta/recipes-core/systemd/systemd_257.6.bb +++ b/meta/recipes-core/systemd/systemd_257.6.bb | |||
@@ -189,7 +189,7 @@ PACKAGECONFIG[no-dns-fallback] = "-Ddns-servers=" | |||
189 | PACKAGECONFIG[no-ntp-fallback] = "-Dntp-servers=" | 189 | PACKAGECONFIG[no-ntp-fallback] = "-Dntp-servers=" |
190 | PACKAGECONFIG[nss] = "-Dnss-systemd=true,-Dnss-systemd=false,,libnss-systemd" | 190 | PACKAGECONFIG[nss] = "-Dnss-systemd=true,-Dnss-systemd=false,,libnss-systemd" |
191 | PACKAGECONFIG[nss-mymachines] = "-Dnss-mymachines=enabled,-Dnss-mymachines=disabled" | 191 | PACKAGECONFIG[nss-mymachines] = "-Dnss-mymachines=enabled,-Dnss-mymachines=disabled" |
192 | PACKAGECONFIG[nss-resolve] = "-Dnss-resolve=enabled,-Dnss-resolve=disabled" | 192 | PACKAGECONFIG[nss-resolve] = "-Dnss-resolve=enabled,-Dnss-resolve=disabled,,libnss-resolve" |
193 | PACKAGECONFIG[oomd] = "-Doomd=true,-Doomd=false" | 193 | PACKAGECONFIG[oomd] = "-Doomd=true,-Doomd=false" |
194 | PACKAGECONFIG[openssl] = "-Dopenssl=enabled,-Dopenssl=disabled,openssl" | 194 | PACKAGECONFIG[openssl] = "-Dopenssl=enabled,-Dopenssl=disabled,openssl" |
195 | PACKAGECONFIG[p11kit] = "-Dp11kit=enabled,-Dp11kit=disabled,p11-kit" | 195 | PACKAGECONFIG[p11kit] = "-Dp11kit=enabled,-Dp11kit=disabled,p11-kit" |
diff --git a/meta/recipes-devtools/mmc/mmc-utils_git.bb b/meta/recipes-devtools/mmc/mmc-utils_git.bb index f3944aebf0..5b6a5f3777 100644 --- a/meta/recipes-devtools/mmc/mmc-utils_git.bb +++ b/meta/recipes-devtools/mmc/mmc-utils_git.bb | |||
@@ -5,12 +5,11 @@ LICENSE = "GPL-2.0-only" | |||
5 | LIC_FILES_CHKSUM = "file://mmc.c;beginline=1;endline=20;md5=fae32792e20f4d27ade1c5a762d16b7d" | 5 | LIC_FILES_CHKSUM = "file://mmc.c;beginline=1;endline=20;md5=fae32792e20f4d27ade1c5a762d16b7d" |
6 | 6 | ||
7 | SRCBRANCH ?= "master" | 7 | SRCBRANCH ?= "master" |
8 | SRCREV = "c515ea2e1cebfbf9d81aa6a5c1bf67a79d2a7e58" | 8 | SRCREV = "d8a8358a7207bd81d0c38dca2cf27a48bf411341" |
9 | 9 | ||
10 | PV = "0.1+git" | 10 | PV = "1.0" |
11 | 11 | ||
12 | SRC_URI = "git://git.kernel.org/pub/scm/utils/mmc/mmc-utils.git;branch=${SRCBRANCH};protocol=https" | 12 | SRC_URI = "git://git.kernel.org/pub/scm/utils/mmc/mmc-utils.git;branch=${SRCBRANCH};protocol=https;tag=v${PV}" |
13 | UPSTREAM_CHECK_COMMITS = "1" | ||
14 | 13 | ||
15 | DEPENDS = "python3-sphinx-native" | 14 | DEPENDS = "python3-sphinx-native" |
16 | EXTRA_OEMAKE = "C=" | 15 | EXTRA_OEMAKE = "C=" |
diff --git a/meta/recipes-devtools/python/python3-pdm_2.25.3.bb b/meta/recipes-devtools/python/python3-pdm_2.25.4.bb index f3ec4e60d3..1e25e18974 100644 --- a/meta/recipes-devtools/python/python3-pdm_2.25.3.bb +++ b/meta/recipes-devtools/python/python3-pdm_2.25.4.bb | |||
@@ -4,7 +4,7 @@ LICENSE = "MIT" | |||
4 | SECTION = "devel/python" | 4 | SECTION = "devel/python" |
5 | LIC_FILES_CHKSUM = "file://LICENSE;md5=2eb31a2cc1a758c34b499f287dd04ef2" | 5 | LIC_FILES_CHKSUM = "file://LICENSE;md5=2eb31a2cc1a758c34b499f287dd04ef2" |
6 | 6 | ||
7 | SRC_URI[sha256sum] = "6d0820f805dacf64d55a7fe56777e7d8349a2ee35efc3006f29b4573d1311c84" | 7 | SRC_URI[sha256sum] = "bd655d789429928d6e27ff6693c19c82bc81aa75ba51d7b1c6102d039c8f211c" |
8 | 8 | ||
9 | inherit pypi python_setuptools_build_meta | 9 | inherit pypi python_setuptools_build_meta |
10 | 10 | ||
diff --git a/meta/recipes-extended/screen/screen_5.0.0.bb b/meta/recipes-extended/screen/screen_5.0.1.bb index fec5663fc2..69f4098519 100644 --- a/meta/recipes-extended/screen/screen_5.0.0.bb +++ b/meta/recipes-extended/screen/screen_5.0.1.bb | |||
@@ -20,7 +20,7 @@ SRC_URI = "${GNU_MIRROR}/screen/screen-${PV}.tar.gz \ | |||
20 | ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'file://screen.pam', '', d)} \ | 20 | ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'file://screen.pam', '', d)} \ |
21 | " | 21 | " |
22 | 22 | ||
23 | SRC_URI[sha256sum] = "f04a39d00a0e5c7c86a55338808903082ad5df4d73df1a2fd3425976aed94971" | 23 | SRC_URI[sha256sum] = "2dae36f4db379ffcd14b691596ba6ec18ac3a9e22bc47ac239789ab58409869d" |
24 | 24 | ||
25 | inherit autotools-brokensep texinfo | 25 | inherit autotools-brokensep texinfo |
26 | 26 | ||
diff --git a/meta/recipes-extended/sudo/sudo_1.9.17.bb b/meta/recipes-extended/sudo/sudo_1.9.17p1.bb index 71d48f448d..83bfc0621c 100644 --- a/meta/recipes-extended/sudo/sudo_1.9.17.bb +++ b/meta/recipes-extended/sudo/sudo_1.9.17p1.bb | |||
@@ -7,7 +7,7 @@ SRC_URI = "https://www.sudo.ws/dist/sudo-${PV}.tar.gz \ | |||
7 | 7 | ||
8 | PAM_SRC_URI = "file://sudo.pam" | 8 | PAM_SRC_URI = "file://sudo.pam" |
9 | 9 | ||
10 | SRC_URI[sha256sum] = "3f212c69d534d5822b492d099abb02a593f91ca99f5afde5cb9bd3e1dcdad069" | 10 | SRC_URI[sha256sum] = "ff607ea717072197738a78f778692cd6df9a7e3e404565f51de063ca27455d32" |
11 | 11 | ||
12 | DEPENDS += " virtual/crypt ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" | 12 | DEPENDS += " virtual/crypt ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" |
13 | RDEPENDS:${PN} += " ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-limits pam-plugin-keyinit', '', d)}" | 13 | RDEPENDS:${PN} += " ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-limits pam-plugin-keyinit', '', d)}" |
diff --git a/meta/recipes-graphics/spir/spirv-llvm-translator_20.1.2.bb b/meta/recipes-graphics/spir/spirv-llvm-translator_20.1.4.bb index 4952e8ba4f..14e4bb74ac 100644 --- a/meta/recipes-graphics/spir/spirv-llvm-translator_20.1.2.bb +++ b/meta/recipes-graphics/spir/spirv-llvm-translator_20.1.4.bb | |||
@@ -6,12 +6,11 @@ LIC_FILES_CHKSUM = "file://LICENSE.TXT;md5=47e311aa9caedd1b3abf098bd7814d1d" | |||
6 | 6 | ||
7 | # pattern: llvm_branch_200, currently there are no minor releases, so, no llvm_branch_201 | 7 | # pattern: llvm_branch_200, currently there are no minor releases, so, no llvm_branch_201 |
8 | SPIRV_BRANCH = "llvm_release_${@oe.utils.trim_version('${PV}', 1).replace('.', '')}0" | 8 | SPIRV_BRANCH = "llvm_release_${@oe.utils.trim_version('${PV}', 1).replace('.', '')}0" |
9 | SRCREV = "74843f2186bb63b6802758222084da17fcbe603c" | ||
9 | SRC_URI = " \ | 10 | SRC_URI = " \ |
10 | git://github.com/KhronosGroup/SPIRV-LLVM-Translator;protocol=https;name=spirv;branch=${SPIRV_BRANCH} \ | 11 | git://github.com/KhronosGroup/SPIRV-LLVM-Translator;protocol=https;tag=v${PV};branch=${SPIRV_BRANCH} \ |
11 | " | 12 | " |
12 | 13 | ||
13 | SRCREV_spirv = "6dd8f2a1681a27f16c53d932d2765920f312aeb2" | ||
14 | |||
15 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>\d+(\.\d+)+)" | 14 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>\d+(\.\d+)+)" |
16 | 15 | ||
17 | DEPENDS = "clang spirv-tools spirv-headers" | 16 | DEPENDS = "clang spirv-tools spirv-headers" |
diff --git a/meta/recipes-graphics/wayland/wayland-protocols_1.45.bb b/meta/recipes-graphics/wayland/wayland-protocols_1.45.bb index d98ccf964f..840d196ace 100644 --- a/meta/recipes-graphics/wayland/wayland-protocols_1.45.bb +++ b/meta/recipes-graphics/wayland/wayland-protocols_1.45.bb | |||
@@ -9,8 +9,8 @@ LICENSE = "MIT" | |||
9 | LIC_FILES_CHKSUM = "file://COPYING;md5=c7b12b6702da38ca028ace54aae3d484 \ | 9 | LIC_FILES_CHKSUM = "file://COPYING;md5=c7b12b6702da38ca028ace54aae3d484 \ |
10 | file://stable/presentation-time/presentation-time.xml;endline=26;md5=4646cd7d9edc9fa55db941f2d3a7dc53" | 10 | file://stable/presentation-time/presentation-time.xml;endline=26;md5=4646cd7d9edc9fa55db941f2d3a7dc53" |
11 | 11 | ||
12 | SRC_URI = "https://gitlab.freedesktop.org/wayland/wayland-protocols/-/releases/${PV}/downloads/wayland-protocols-${PV}.tar.xz" | 12 | SRC_URI = "https://gitlab.freedesktop.org/wayland/wayland-protocols/-/archive/${PV}/wayland-protocols-${PV}.tar.bz2" |
13 | SRC_URI[sha256sum] = "4d2b2a9e3e099d017dc8107bf1c334d27bb87d9e4aff19a0c8d856d17cd41ef0" | 13 | SRC_URI[sha256sum] = "b73315c26d6c3374c19c2dff7e491f019d8597dc4dcd4473d9181f676f15f48f" |
14 | 14 | ||
15 | UPSTREAM_CHECK_URI = "https://gitlab.freedesktop.org/wayland/wayland-protocols/-/tags" | 15 | UPSTREAM_CHECK_URI = "https://gitlab.freedesktop.org/wayland/wayland-protocols/-/tags" |
16 | UPSTREAM_CHECK_REGEX = "releases/(?P<pver>.+)" | 16 | UPSTREAM_CHECK_REGEX = "releases/(?P<pver>.+)" |
diff --git a/meta/recipes-graphics/wayland/wayland-utils_1.2.0.bb b/meta/recipes-graphics/wayland/wayland-utils_1.2.0.bb index 59d414a0a6..47fae72666 100644 --- a/meta/recipes-graphics/wayland/wayland-utils_1.2.0.bb +++ b/meta/recipes-graphics/wayland/wayland-utils_1.2.0.bb | |||
@@ -9,8 +9,8 @@ LICENSE = "MIT" | |||
9 | LIC_FILES_CHKSUM = "file://COPYING;md5=548a66038a77415e1df51118625e832f \ | 9 | LIC_FILES_CHKSUM = "file://COPYING;md5=548a66038a77415e1df51118625e832f \ |
10 | " | 10 | " |
11 | 11 | ||
12 | SRC_URI = "https://gitlab.freedesktop.org/wayland/wayland-utils/-/releases/${PV}/downloads/${BPN}-${PV}.tar.xz" | 12 | SRC_URI = "https://gitlab.freedesktop.org/wayland/wayland-utils/-/archive/${PV}/${BPN}-${PV}.tar.bz2" |
13 | SRC_URI[sha256sum] = "d9278c22554586881802540751bcc42569262bf80cd9ac9b0fd12ff4bd09a9e4" | 13 | SRC_URI[sha256sum] = "f38c6a4ca2113cf716ca687a4cd8e24a11cbeeb04759678b7bb2da7d16335d18" |
14 | 14 | ||
15 | UPSTREAM_CHECK_URI = "https://gitlab.freedesktop.org/wayland/wayland-utils/-/tags" | 15 | UPSTREAM_CHECK_URI = "https://gitlab.freedesktop.org/wayland/wayland-utils/-/tags" |
16 | UPSTREAM_CHECK_REGEX = "releases/(?P<pver>.+)" | 16 | UPSTREAM_CHECK_REGEX = "releases/(?P<pver>.+)" |
diff --git a/meta/recipes-graphics/wayland/wayland_1.23.1.bb b/meta/recipes-graphics/wayland/wayland_1.23.1.bb index 3a5d91be04..1b29f7762e 100644 --- a/meta/recipes-graphics/wayland/wayland_1.23.1.bb +++ b/meta/recipes-graphics/wayland/wayland_1.23.1.bb | |||
@@ -12,11 +12,11 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=b31d8f53b6aaf2b4985d7dd7810a70d1 \ | |||
12 | 12 | ||
13 | DEPENDS = "expat libffi wayland-native" | 13 | DEPENDS = "expat libffi wayland-native" |
14 | 14 | ||
15 | SRC_URI = "https://gitlab.freedesktop.org/wayland/wayland/-/releases/${PV}/downloads/${BPN}-${PV}.tar.xz \ | 15 | SRC_URI = "https://gitlab.freedesktop.org/wayland/wayland/-/archive/${PV}/${BPN}-${PV}.tar.bz2 \ |
16 | file://run-ptest \ | 16 | file://run-ptest \ |
17 | file://0001-build-Fix-strndup-detection-on-MinGW.patch \ | 17 | file://0001-build-Fix-strndup-detection-on-MinGW.patch \ |
18 | " | 18 | " |
19 | SRC_URI[sha256sum] = "864fb2a8399e2d0ec39d56e9d9b753c093775beadc6022ce81f441929a81e5ed" | 19 | SRC_URI[sha256sum] = "4afcf2942a39d8276d06dcefc89dfaf029222994778fd4c49aa68a702ebf698f" |
20 | 20 | ||
21 | UPSTREAM_CHECK_URI = "https://gitlab.freedesktop.org/wayland/wayland/-/tags" | 21 | UPSTREAM_CHECK_URI = "https://gitlab.freedesktop.org/wayland/wayland/-/tags" |
22 | UPSTREAM_CHECK_REGEX = "releases/(?P<pver>\d+\.\d+\.(?!9\d+)\d+)" | 22 | UPSTREAM_CHECK_REGEX = "releases/(?P<pver>\d+\.\d+\.(?!9\d+)\d+)" |
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index b6082edf5c..98e90078d4 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc | |||
@@ -1,10 +1,11 @@ | |||
1 | 1 | ||
2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. | 2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. |
3 | # Generated at 2025-06-05 16:29:20.725105+00:00 for kernel version 6.12.31 | 3 | # Generated at 2025-07-09 07:57:09.220247+00:00 for kernel version 6.12.36 |
4 | # From cvelistV5 cve_2025-06-05_1600Z | 4 | # From cvelistV5 cve_2025-07-09_0700Z-1-gca2b12e7c08 |
5 | |||
5 | 6 | ||
6 | python check_kernel_cve_status_version() { | 7 | python check_kernel_cve_status_version() { |
7 | this_version = "6.12.31" | 8 | this_version = "6.12.36" |
8 | kernel_version = d.getVar("LINUX_VERSION") | 9 | kernel_version = d.getVar("LINUX_VERSION") |
9 | if kernel_version != this_version: | 10 | if kernel_version != this_version: |
10 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) | 11 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) |
@@ -535,8 +536,6 @@ CVE_STATUS[CVE-2021-47142] = "fixed-version: Fixed from version 5.13" | |||
535 | 536 | ||
536 | CVE_STATUS[CVE-2021-47143] = "fixed-version: Fixed from version 5.13" | 537 | CVE_STATUS[CVE-2021-47143] = "fixed-version: Fixed from version 5.13" |
537 | 538 | ||
538 | CVE_STATUS[CVE-2021-47144] = "fixed-version: Fixed from version 5.13" | ||
539 | |||
540 | CVE_STATUS[CVE-2021-47145] = "fixed-version: Fixed from version 5.13" | 539 | CVE_STATUS[CVE-2021-47145] = "fixed-version: Fixed from version 5.13" |
541 | 540 | ||
542 | CVE_STATUS[CVE-2021-47146] = "fixed-version: Fixed from version 5.13" | 541 | CVE_STATUS[CVE-2021-47146] = "fixed-version: Fixed from version 5.13" |
@@ -913,7 +912,7 @@ CVE_STATUS[CVE-2021-47340] = "fixed-version: Fixed from version 5.14" | |||
913 | 912 | ||
914 | CVE_STATUS[CVE-2021-47341] = "fixed-version: Fixed from version 5.14" | 913 | CVE_STATUS[CVE-2021-47341] = "fixed-version: Fixed from version 5.14" |
915 | 914 | ||
916 | CVE_STATUS[CVE-2021-47342] = "fixed-version: Fixed from version 5.14" | 915 | CVE_STATUS[CVE-2021-47342] = "fixed-version: Fixed from version 5.10.77" |
917 | 916 | ||
918 | CVE_STATUS[CVE-2021-47343] = "fixed-version: Fixed from version 5.14" | 917 | CVE_STATUS[CVE-2021-47343] = "fixed-version: Fixed from version 5.14" |
919 | 918 | ||
@@ -2835,8 +2834,6 @@ CVE_STATUS[CVE-2022-49297] = "fixed-version: Fixed from version 5.19" | |||
2835 | 2834 | ||
2836 | CVE_STATUS[CVE-2022-49298] = "fixed-version: Fixed from version 5.19" | 2835 | CVE_STATUS[CVE-2022-49298] = "fixed-version: Fixed from version 5.19" |
2837 | 2836 | ||
2838 | CVE_STATUS[CVE-2022-49299] = "fixed-version: Fixed from version 5.19" | ||
2839 | |||
2840 | CVE_STATUS[CVE-2022-49300] = "fixed-version: Fixed from version 5.19" | 2837 | CVE_STATUS[CVE-2022-49300] = "fixed-version: Fixed from version 5.19" |
2841 | 2838 | ||
2842 | CVE_STATUS[CVE-2022-49301] = "fixed-version: Fixed from version 5.19" | 2839 | CVE_STATUS[CVE-2022-49301] = "fixed-version: Fixed from version 5.19" |
@@ -4077,6 +4074,588 @@ CVE_STATUS[CVE-2022-49931] = "fixed-version: Fixed from version 6.1" | |||
4077 | 4074 | ||
4078 | CVE_STATUS[CVE-2022-49932] = "fixed-version: Fixed from version 6.3" | 4075 | CVE_STATUS[CVE-2022-49932] = "fixed-version: Fixed from version 6.3" |
4079 | 4076 | ||
4077 | CVE_STATUS[CVE-2022-49934] = "fixed-version: Fixed from version 6.0" | ||
4078 | |||
4079 | CVE_STATUS[CVE-2022-49935] = "fixed-version: Fixed from version 6.0" | ||
4080 | |||
4081 | CVE_STATUS[CVE-2022-49936] = "fixed-version: Fixed from version 6.0" | ||
4082 | |||
4083 | CVE_STATUS[CVE-2022-49937] = "fixed-version: Fixed from version 6.0" | ||
4084 | |||
4085 | CVE_STATUS[CVE-2022-49938] = "fixed-version: Fixed from version 6.0" | ||
4086 | |||
4087 | CVE_STATUS[CVE-2022-49939] = "fixed-version: Fixed from version 6.0" | ||
4088 | |||
4089 | CVE_STATUS[CVE-2022-49940] = "fixed-version: Fixed from version 5.19.8" | ||
4090 | |||
4091 | CVE_STATUS[CVE-2022-49942] = "fixed-version: Fixed from version 6.0" | ||
4092 | |||
4093 | CVE_STATUS[CVE-2022-49943] = "fixed-version: Fixed from version 5.19.8" | ||
4094 | |||
4095 | CVE_STATUS[CVE-2022-49944] = "fixed-version: Fixed from version 6.0" | ||
4096 | |||
4097 | CVE_STATUS[CVE-2022-49945] = "fixed-version: Fixed from version 6.0" | ||
4098 | |||
4099 | CVE_STATUS[CVE-2022-49946] = "fixed-version: Fixed from version 6.0" | ||
4100 | |||
4101 | CVE_STATUS[CVE-2022-49947] = "fixed-version: Fixed from version 5.19.8" | ||
4102 | |||
4103 | CVE_STATUS[CVE-2022-49948] = "fixed-version: Fixed from version 6.0" | ||
4104 | |||
4105 | CVE_STATUS[CVE-2022-49949] = "fixed-version: Fixed from version 6.0" | ||
4106 | |||
4107 | CVE_STATUS[CVE-2022-49950] = "fixed-version: Fixed from version 6.0" | ||
4108 | |||
4109 | CVE_STATUS[CVE-2022-49951] = "fixed-version: Fixed from version 6.0" | ||
4110 | |||
4111 | CVE_STATUS[CVE-2022-49952] = "fixed-version: Fixed from version 6.0" | ||
4112 | |||
4113 | CVE_STATUS[CVE-2022-49953] = "fixed-version: Fixed from version 6.0" | ||
4114 | |||
4115 | CVE_STATUS[CVE-2022-49954] = "fixed-version: Fixed from version 6.0" | ||
4116 | |||
4117 | CVE_STATUS[CVE-2022-49955] = "fixed-version: Fixed from version 6.0" | ||
4118 | |||
4119 | CVE_STATUS[CVE-2022-49956] = "fixed-version: Fixed from version 6.0" | ||
4120 | |||
4121 | CVE_STATUS[CVE-2022-49957] = "fixed-version: Fixed from version 6.0" | ||
4122 | |||
4123 | CVE_STATUS[CVE-2022-49958] = "fixed-version: Fixed from version 6.0" | ||
4124 | |||
4125 | CVE_STATUS[CVE-2022-49959] = "fixed-version: Fixed from version 6.0" | ||
4126 | |||
4127 | CVE_STATUS[CVE-2022-49960] = "fixed-version: Fixed from version 6.0" | ||
4128 | |||
4129 | CVE_STATUS[CVE-2022-49961] = "fixed-version: Fixed from version 6.0" | ||
4130 | |||
4131 | CVE_STATUS[CVE-2022-49962] = "fixed-version: Fixed from version 6.0" | ||
4132 | |||
4133 | CVE_STATUS[CVE-2022-49963] = "fixed-version: Fixed from version 6.0" | ||
4134 | |||
4135 | CVE_STATUS[CVE-2022-49964] = "fixed-version: Fixed from version 6.0" | ||
4136 | |||
4137 | CVE_STATUS[CVE-2022-49965] = "fixed-version: Fixed from version 6.0" | ||
4138 | |||
4139 | CVE_STATUS[CVE-2022-49966] = "fixed-version: Fixed from version 6.0" | ||
4140 | |||
4141 | CVE_STATUS[CVE-2022-49967] = "fixed-version: Fixed from version 6.0" | ||
4142 | |||
4143 | CVE_STATUS[CVE-2022-49968] = "fixed-version: Fixed from version 6.0" | ||
4144 | |||
4145 | CVE_STATUS[CVE-2022-49969] = "fixed-version: Fixed from version 6.0" | ||
4146 | |||
4147 | CVE_STATUS[CVE-2022-49970] = "fixed-version: Fixed from version 5.19.8" | ||
4148 | |||
4149 | CVE_STATUS[CVE-2022-49971] = "fixed-version: Fixed from version 6.0" | ||
4150 | |||
4151 | CVE_STATUS[CVE-2022-49972] = "fixed-version: Fixed from version 6.0" | ||
4152 | |||
4153 | CVE_STATUS[CVE-2022-49973] = "fixed-version: Fixed from version 5.19.8" | ||
4154 | |||
4155 | CVE_STATUS[CVE-2022-49974] = "fixed-version: Fixed from version 6.0" | ||
4156 | |||
4157 | CVE_STATUS[CVE-2022-49975] = "fixed-version: Fixed from version 6.0" | ||
4158 | |||
4159 | CVE_STATUS[CVE-2022-49976] = "fixed-version: Fixed from version 6.0" | ||
4160 | |||
4161 | CVE_STATUS[CVE-2022-49977] = "fixed-version: Fixed from version 6.0" | ||
4162 | |||
4163 | CVE_STATUS[CVE-2022-49978] = "fixed-version: Fixed from version 6.0" | ||
4164 | |||
4165 | CVE_STATUS[CVE-2022-49979] = "fixed-version: Fixed from version 6.0" | ||
4166 | |||
4167 | CVE_STATUS[CVE-2022-49980] = "fixed-version: Fixed from version 6.0" | ||
4168 | |||
4169 | CVE_STATUS[CVE-2022-49981] = "fixed-version: Fixed from version 6.0" | ||
4170 | |||
4171 | CVE_STATUS[CVE-2022-49982] = "fixed-version: Fixed from version 6.0" | ||
4172 | |||
4173 | CVE_STATUS[CVE-2022-49983] = "fixed-version: Fixed from version 6.0" | ||
4174 | |||
4175 | CVE_STATUS[CVE-2022-49984] = "fixed-version: Fixed from version 6.0" | ||
4176 | |||
4177 | CVE_STATUS[CVE-2022-49985] = "fixed-version: Fixed from version 6.0" | ||
4178 | |||
4179 | CVE_STATUS[CVE-2022-49986] = "fixed-version: Fixed from version 6.0" | ||
4180 | |||
4181 | CVE_STATUS[CVE-2022-49987] = "fixed-version: Fixed from version 6.0" | ||
4182 | |||
4183 | CVE_STATUS[CVE-2022-49989] = "fixed-version: Fixed from version 6.0" | ||
4184 | |||
4185 | CVE_STATUS[CVE-2022-49990] = "fixed-version: Fixed from version 6.0" | ||
4186 | |||
4187 | CVE_STATUS[CVE-2022-49991] = "fixed-version: Fixed from version 6.0" | ||
4188 | |||
4189 | CVE_STATUS[CVE-2022-49992] = "fixed-version: Fixed from version 6.0" | ||
4190 | |||
4191 | CVE_STATUS[CVE-2022-49993] = "fixed-version: Fixed from version 6.0" | ||
4192 | |||
4193 | CVE_STATUS[CVE-2022-49994] = "fixed-version: Fixed from version 6.0" | ||
4194 | |||
4195 | CVE_STATUS[CVE-2022-49995] = "fixed-version: Fixed from version 6.0" | ||
4196 | |||
4197 | CVE_STATUS[CVE-2022-49996] = "fixed-version: Fixed from version 6.0" | ||
4198 | |||
4199 | CVE_STATUS[CVE-2022-49997] = "fixed-version: Fixed from version 6.0" | ||
4200 | |||
4201 | CVE_STATUS[CVE-2022-49998] = "fixed-version: Fixed from version 6.0" | ||
4202 | |||
4203 | CVE_STATUS[CVE-2022-49999] = "fixed-version: Fixed from version 6.0" | ||
4204 | |||
4205 | CVE_STATUS[CVE-2022-50000] = "fixed-version: Fixed from version 6.0" | ||
4206 | |||
4207 | CVE_STATUS[CVE-2022-50001] = "fixed-version: Fixed from version 6.0" | ||
4208 | |||
4209 | CVE_STATUS[CVE-2022-50002] = "fixed-version: Fixed from version 6.0" | ||
4210 | |||
4211 | CVE_STATUS[CVE-2022-50003] = "fixed-version: Fixed from version 6.0" | ||
4212 | |||
4213 | CVE_STATUS[CVE-2022-50004] = "fixed-version: Fixed from version 6.0" | ||
4214 | |||
4215 | CVE_STATUS[CVE-2022-50005] = "fixed-version: Fixed from version 6.0" | ||
4216 | |||
4217 | CVE_STATUS[CVE-2022-50006] = "fixed-version: Fixed from version 6.0" | ||
4218 | |||
4219 | CVE_STATUS[CVE-2022-50007] = "fixed-version: Fixed from version 6.0" | ||
4220 | |||
4221 | CVE_STATUS[CVE-2022-50008] = "fixed-version: Fixed from version 6.0" | ||
4222 | |||
4223 | CVE_STATUS[CVE-2022-50009] = "fixed-version: Fixed from version 6.0" | ||
4224 | |||
4225 | CVE_STATUS[CVE-2022-50010] = "fixed-version: Fixed from version 6.0" | ||
4226 | |||
4227 | CVE_STATUS[CVE-2022-50011] = "fixed-version: Fixed from version 6.0" | ||
4228 | |||
4229 | CVE_STATUS[CVE-2022-50012] = "fixed-version: Fixed from version 6.0" | ||
4230 | |||
4231 | CVE_STATUS[CVE-2022-50013] = "fixed-version: Fixed from version 6.0" | ||
4232 | |||
4233 | CVE_STATUS[CVE-2022-50014] = "fixed-version: Fixed from version 6.0" | ||
4234 | |||
4235 | CVE_STATUS[CVE-2022-50015] = "fixed-version: Fixed from version 6.0" | ||
4236 | |||
4237 | CVE_STATUS[CVE-2022-50016] = "fixed-version: Fixed from version 6.0" | ||
4238 | |||
4239 | CVE_STATUS[CVE-2022-50017] = "fixed-version: Fixed from version 6.0" | ||
4240 | |||
4241 | CVE_STATUS[CVE-2022-50019] = "fixed-version: Fixed from version 6.0" | ||
4242 | |||
4243 | CVE_STATUS[CVE-2022-50020] = "fixed-version: Fixed from version 6.0" | ||
4244 | |||
4245 | CVE_STATUS[CVE-2022-50021] = "fixed-version: Fixed from version 6.0" | ||
4246 | |||
4247 | CVE_STATUS[CVE-2022-50022] = "fixed-version: Fixed from version 6.0" | ||
4248 | |||
4249 | CVE_STATUS[CVE-2022-50023] = "fixed-version: Fixed from version 6.0" | ||
4250 | |||
4251 | CVE_STATUS[CVE-2022-50024] = "fixed-version: Fixed from version 6.0" | ||
4252 | |||
4253 | CVE_STATUS[CVE-2022-50025] = "fixed-version: Fixed from version 6.0" | ||
4254 | |||
4255 | CVE_STATUS[CVE-2022-50026] = "fixed-version: Fixed from version 6.0" | ||
4256 | |||
4257 | CVE_STATUS[CVE-2022-50027] = "fixed-version: Fixed from version 6.0" | ||
4258 | |||
4259 | CVE_STATUS[CVE-2022-50028] = "fixed-version: Fixed from version 6.0" | ||
4260 | |||
4261 | CVE_STATUS[CVE-2022-50029] = "fixed-version: Fixed from version 6.0" | ||
4262 | |||
4263 | CVE_STATUS[CVE-2022-50030] = "fixed-version: Fixed from version 6.0" | ||
4264 | |||
4265 | CVE_STATUS[CVE-2022-50031] = "fixed-version: Fixed from version 6.0" | ||
4266 | |||
4267 | CVE_STATUS[CVE-2022-50032] = "fixed-version: Fixed from version 6.0" | ||
4268 | |||
4269 | CVE_STATUS[CVE-2022-50033] = "fixed-version: Fixed from version 6.0" | ||
4270 | |||
4271 | CVE_STATUS[CVE-2022-50034] = "fixed-version: Fixed from version 6.0" | ||
4272 | |||
4273 | CVE_STATUS[CVE-2022-50035] = "fixed-version: Fixed from version 6.0" | ||
4274 | |||
4275 | CVE_STATUS[CVE-2022-50036] = "fixed-version: Fixed from version 6.0" | ||
4276 | |||
4277 | CVE_STATUS[CVE-2022-50037] = "fixed-version: Fixed from version 6.0" | ||
4278 | |||
4279 | CVE_STATUS[CVE-2022-50038] = "fixed-version: Fixed from version 6.0" | ||
4280 | |||
4281 | CVE_STATUS[CVE-2022-50039] = "fixed-version: Fixed from version 6.0" | ||
4282 | |||
4283 | CVE_STATUS[CVE-2022-50040] = "fixed-version: Fixed from version 6.0" | ||
4284 | |||
4285 | CVE_STATUS[CVE-2022-50041] = "fixed-version: Fixed from version 6.0" | ||
4286 | |||
4287 | CVE_STATUS[CVE-2022-50042] = "fixed-version: Fixed from version 6.0" | ||
4288 | |||
4289 | CVE_STATUS[CVE-2022-50043] = "fixed-version: Fixed from version 6.0" | ||
4290 | |||
4291 | CVE_STATUS[CVE-2022-50044] = "fixed-version: Fixed from version 6.0" | ||
4292 | |||
4293 | CVE_STATUS[CVE-2022-50045] = "fixed-version: Fixed from version 5.19.4" | ||
4294 | |||
4295 | CVE_STATUS[CVE-2022-50046] = "fixed-version: Fixed from version 6.0" | ||
4296 | |||
4297 | CVE_STATUS[CVE-2022-50047] = "fixed-version: Fixed from version 6.0" | ||
4298 | |||
4299 | CVE_STATUS[CVE-2022-50048] = "fixed-version: Fixed from version 6.0" | ||
4300 | |||
4301 | CVE_STATUS[CVE-2022-50049] = "fixed-version: Fixed from version 6.0" | ||
4302 | |||
4303 | CVE_STATUS[CVE-2022-50050] = "fixed-version: Fixed from version 6.0" | ||
4304 | |||
4305 | CVE_STATUS[CVE-2022-50051] = "fixed-version: Fixed from version 6.0" | ||
4306 | |||
4307 | CVE_STATUS[CVE-2022-50052] = "fixed-version: Fixed from version 6.0" | ||
4308 | |||
4309 | CVE_STATUS[CVE-2022-50053] = "fixed-version: Fixed from version 6.0" | ||
4310 | |||
4311 | CVE_STATUS[CVE-2022-50054] = "fixed-version: Fixed from version 6.0" | ||
4312 | |||
4313 | CVE_STATUS[CVE-2022-50055] = "fixed-version: Fixed from version 6.0" | ||
4314 | |||
4315 | CVE_STATUS[CVE-2022-50056] = "fixed-version: Fixed from version 6.0" | ||
4316 | |||
4317 | CVE_STATUS[CVE-2022-50057] = "fixed-version: Fixed from version 6.0" | ||
4318 | |||
4319 | CVE_STATUS[CVE-2022-50058] = "fixed-version: Fixed from version 6.0" | ||
4320 | |||
4321 | CVE_STATUS[CVE-2022-50059] = "fixed-version: Fixed from version 6.0" | ||
4322 | |||
4323 | CVE_STATUS[CVE-2022-50060] = "fixed-version: Fixed from version 6.0" | ||
4324 | |||
4325 | CVE_STATUS[CVE-2022-50061] = "fixed-version: Fixed from version 6.0" | ||
4326 | |||
4327 | CVE_STATUS[CVE-2022-50062] = "fixed-version: Fixed from version 6.0" | ||
4328 | |||
4329 | CVE_STATUS[CVE-2022-50063] = "fixed-version: Fixed from version 6.0" | ||
4330 | |||
4331 | CVE_STATUS[CVE-2022-50064] = "fixed-version: Fixed from version 6.0" | ||
4332 | |||
4333 | CVE_STATUS[CVE-2022-50065] = "fixed-version: Fixed from version 6.0" | ||
4334 | |||
4335 | CVE_STATUS[CVE-2022-50066] = "fixed-version: Fixed from version 6.0" | ||
4336 | |||
4337 | CVE_STATUS[CVE-2022-50067] = "fixed-version: Fixed from version 6.0" | ||
4338 | |||
4339 | CVE_STATUS[CVE-2022-50068] = "fixed-version: Fixed from version 6.0" | ||
4340 | |||
4341 | CVE_STATUS[CVE-2022-50069] = "fixed-version: Fixed from version 6.0" | ||
4342 | |||
4343 | CVE_STATUS[CVE-2022-50070] = "fixed-version: Fixed from version 6.0" | ||
4344 | |||
4345 | CVE_STATUS[CVE-2022-50071] = "fixed-version: Fixed from version 6.0" | ||
4346 | |||
4347 | CVE_STATUS[CVE-2022-50072] = "fixed-version: Fixed from version 6.0" | ||
4348 | |||
4349 | CVE_STATUS[CVE-2022-50073] = "fixed-version: Fixed from version 6.0" | ||
4350 | |||
4351 | CVE_STATUS[CVE-2022-50074] = "fixed-version: Fixed from version 6.0" | ||
4352 | |||
4353 | CVE_STATUS[CVE-2022-50075] = "fixed-version: Fixed from version 6.0" | ||
4354 | |||
4355 | CVE_STATUS[CVE-2022-50076] = "fixed-version: Fixed from version 6.0" | ||
4356 | |||
4357 | CVE_STATUS[CVE-2022-50077] = "fixed-version: Fixed from version 6.0" | ||
4358 | |||
4359 | CVE_STATUS[CVE-2022-50078] = "fixed-version: Fixed from version 6.0" | ||
4360 | |||
4361 | CVE_STATUS[CVE-2022-50079] = "fixed-version: Fixed from version 6.0" | ||
4362 | |||
4363 | CVE_STATUS[CVE-2022-50080] = "fixed-version: Fixed from version 6.0" | ||
4364 | |||
4365 | CVE_STATUS[CVE-2022-50082] = "fixed-version: Fixed from version 6.0" | ||
4366 | |||
4367 | CVE_STATUS[CVE-2022-50083] = "fixed-version: Fixed from version 6.0" | ||
4368 | |||
4369 | CVE_STATUS[CVE-2022-50084] = "fixed-version: Fixed from version 6.0" | ||
4370 | |||
4371 | CVE_STATUS[CVE-2022-50085] = "fixed-version: Fixed from version 6.0" | ||
4372 | |||
4373 | CVE_STATUS[CVE-2022-50086] = "fixed-version: Fixed from version 6.0" | ||
4374 | |||
4375 | CVE_STATUS[CVE-2022-50087] = "fixed-version: Fixed from version 6.0" | ||
4376 | |||
4377 | CVE_STATUS[CVE-2022-50088] = "fixed-version: Fixed from version 6.0" | ||
4378 | |||
4379 | CVE_STATUS[CVE-2022-50089] = "fixed-version: Fixed from version 6.0" | ||
4380 | |||
4381 | CVE_STATUS[CVE-2022-50090] = "fixed-version: Fixed from version 6.0" | ||
4382 | |||
4383 | CVE_STATUS[CVE-2022-50091] = "fixed-version: Fixed from version 6.0" | ||
4384 | |||
4385 | CVE_STATUS[CVE-2022-50092] = "fixed-version: Fixed from version 6.0" | ||
4386 | |||
4387 | CVE_STATUS[CVE-2022-50093] = "fixed-version: Fixed from version 6.0" | ||
4388 | |||
4389 | CVE_STATUS[CVE-2022-50094] = "fixed-version: Fixed from version 6.0" | ||
4390 | |||
4391 | CVE_STATUS[CVE-2022-50095] = "fixed-version: Fixed from version 6.0" | ||
4392 | |||
4393 | CVE_STATUS[CVE-2022-50096] = "fixed-version: Fixed from version 6.0" | ||
4394 | |||
4395 | CVE_STATUS[CVE-2022-50097] = "fixed-version: Fixed from version 6.0" | ||
4396 | |||
4397 | CVE_STATUS[CVE-2022-50098] = "fixed-version: Fixed from version 6.0" | ||
4398 | |||
4399 | CVE_STATUS[CVE-2022-50099] = "fixed-version: Fixed from version 6.0" | ||
4400 | |||
4401 | CVE_STATUS[CVE-2022-50100] = "fixed-version: Fixed from version 6.0" | ||
4402 | |||
4403 | CVE_STATUS[CVE-2022-50101] = "fixed-version: Fixed from version 6.0" | ||
4404 | |||
4405 | CVE_STATUS[CVE-2022-50102] = "fixed-version: Fixed from version 6.0" | ||
4406 | |||
4407 | CVE_STATUS[CVE-2022-50103] = "fixed-version: Fixed from version 6.0" | ||
4408 | |||
4409 | CVE_STATUS[CVE-2022-50104] = "fixed-version: Fixed from version 6.0" | ||
4410 | |||
4411 | CVE_STATUS[CVE-2022-50105] = "fixed-version: Fixed from version 6.0" | ||
4412 | |||
4413 | CVE_STATUS[CVE-2022-50106] = "fixed-version: Fixed from version 6.0" | ||
4414 | |||
4415 | CVE_STATUS[CVE-2022-50107] = "fixed-version: Fixed from version 6.0" | ||
4416 | |||
4417 | CVE_STATUS[CVE-2022-50108] = "fixed-version: Fixed from version 6.0" | ||
4418 | |||
4419 | CVE_STATUS[CVE-2022-50109] = "fixed-version: Fixed from version 6.0" | ||
4420 | |||
4421 | CVE_STATUS[CVE-2022-50110] = "fixed-version: Fixed from version 6.0" | ||
4422 | |||
4423 | CVE_STATUS[CVE-2022-50111] = "fixed-version: Fixed from version 6.0" | ||
4424 | |||
4425 | CVE_STATUS[CVE-2022-50112] = "fixed-version: Fixed from version 6.0" | ||
4426 | |||
4427 | CVE_STATUS[CVE-2022-50113] = "fixed-version: Fixed from version 6.0" | ||
4428 | |||
4429 | CVE_STATUS[CVE-2022-50114] = "fixed-version: Fixed from version 6.0" | ||
4430 | |||
4431 | CVE_STATUS[CVE-2022-50115] = "fixed-version: Fixed from version 6.0" | ||
4432 | |||
4433 | CVE_STATUS[CVE-2022-50116] = "fixed-version: Fixed from version 6.0" | ||
4434 | |||
4435 | CVE_STATUS[CVE-2022-50117] = "fixed-version: Fixed from version 6.0" | ||
4436 | |||
4437 | CVE_STATUS[CVE-2022-50118] = "fixed-version: Fixed from version 6.0" | ||
4438 | |||
4439 | CVE_STATUS[CVE-2022-50119] = "fixed-version: Fixed from version 6.0" | ||
4440 | |||
4441 | CVE_STATUS[CVE-2022-50120] = "fixed-version: Fixed from version 6.0" | ||
4442 | |||
4443 | CVE_STATUS[CVE-2022-50121] = "fixed-version: Fixed from version 6.0" | ||
4444 | |||
4445 | CVE_STATUS[CVE-2022-50122] = "fixed-version: Fixed from version 6.0" | ||
4446 | |||
4447 | CVE_STATUS[CVE-2022-50123] = "fixed-version: Fixed from version 6.0" | ||
4448 | |||
4449 | CVE_STATUS[CVE-2022-50124] = "fixed-version: Fixed from version 6.0" | ||
4450 | |||
4451 | CVE_STATUS[CVE-2022-50125] = "fixed-version: Fixed from version 6.0" | ||
4452 | |||
4453 | CVE_STATUS[CVE-2022-50126] = "fixed-version: Fixed from version 6.0" | ||
4454 | |||
4455 | CVE_STATUS[CVE-2022-50127] = "fixed-version: Fixed from version 6.0" | ||
4456 | |||
4457 | CVE_STATUS[CVE-2022-50129] = "fixed-version: Fixed from version 6.0" | ||
4458 | |||
4459 | CVE_STATUS[CVE-2022-50130] = "fixed-version: Fixed from version 6.0" | ||
4460 | |||
4461 | CVE_STATUS[CVE-2022-50131] = "fixed-version: Fixed from version 6.0" | ||
4462 | |||
4463 | CVE_STATUS[CVE-2022-50132] = "fixed-version: Fixed from version 6.0" | ||
4464 | |||
4465 | CVE_STATUS[CVE-2022-50133] = "fixed-version: Fixed from version 6.0" | ||
4466 | |||
4467 | CVE_STATUS[CVE-2022-50134] = "fixed-version: Fixed from version 6.0" | ||
4468 | |||
4469 | CVE_STATUS[CVE-2022-50135] = "fixed-version: Fixed from version 6.0" | ||
4470 | |||
4471 | CVE_STATUS[CVE-2022-50136] = "fixed-version: Fixed from version 6.0" | ||
4472 | |||
4473 | CVE_STATUS[CVE-2022-50137] = "fixed-version: Fixed from version 6.0" | ||
4474 | |||
4475 | CVE_STATUS[CVE-2022-50138] = "fixed-version: Fixed from version 6.0" | ||
4476 | |||
4477 | CVE_STATUS[CVE-2022-50139] = "fixed-version: Fixed from version 6.0" | ||
4478 | |||
4479 | CVE_STATUS[CVE-2022-50140] = "fixed-version: Fixed from version 6.0" | ||
4480 | |||
4481 | CVE_STATUS[CVE-2022-50141] = "fixed-version: Fixed from version 6.0" | ||
4482 | |||
4483 | CVE_STATUS[CVE-2022-50142] = "fixed-version: Fixed from version 6.0" | ||
4484 | |||
4485 | CVE_STATUS[CVE-2022-50143] = "fixed-version: Fixed from version 6.0" | ||
4486 | |||
4487 | CVE_STATUS[CVE-2022-50144] = "fixed-version: Fixed from version 6.0" | ||
4488 | |||
4489 | CVE_STATUS[CVE-2022-50145] = "fixed-version: Fixed from version 6.0" | ||
4490 | |||
4491 | CVE_STATUS[CVE-2022-50146] = "fixed-version: Fixed from version 6.0" | ||
4492 | |||
4493 | CVE_STATUS[CVE-2022-50147] = "fixed-version: Fixed from version 6.0" | ||
4494 | |||
4495 | CVE_STATUS[CVE-2022-50148] = "fixed-version: Fixed from version 6.0" | ||
4496 | |||
4497 | CVE_STATUS[CVE-2022-50149] = "fixed-version: Fixed from version 6.0" | ||
4498 | |||
4499 | CVE_STATUS[CVE-2022-50151] = "fixed-version: Fixed from version 6.0" | ||
4500 | |||
4501 | CVE_STATUS[CVE-2022-50152] = "fixed-version: Fixed from version 6.0" | ||
4502 | |||
4503 | CVE_STATUS[CVE-2022-50153] = "fixed-version: Fixed from version 6.0" | ||
4504 | |||
4505 | CVE_STATUS[CVE-2022-50154] = "fixed-version: Fixed from version 6.0" | ||
4506 | |||
4507 | CVE_STATUS[CVE-2022-50155] = "fixed-version: Fixed from version 6.0" | ||
4508 | |||
4509 | CVE_STATUS[CVE-2022-50156] = "fixed-version: Fixed from version 6.0" | ||
4510 | |||
4511 | CVE_STATUS[CVE-2022-50157] = "fixed-version: Fixed from version 6.0" | ||
4512 | |||
4513 | CVE_STATUS[CVE-2022-50158] = "fixed-version: Fixed from version 6.0" | ||
4514 | |||
4515 | CVE_STATUS[CVE-2022-50159] = "fixed-version: Fixed from version 6.0" | ||
4516 | |||
4517 | CVE_STATUS[CVE-2022-50160] = "fixed-version: Fixed from version 6.0" | ||
4518 | |||
4519 | CVE_STATUS[CVE-2022-50161] = "fixed-version: Fixed from version 6.0" | ||
4520 | |||
4521 | CVE_STATUS[CVE-2022-50162] = "fixed-version: Fixed from version 6.0" | ||
4522 | |||
4523 | CVE_STATUS[CVE-2022-50163] = "fixed-version: Fixed from version 6.0" | ||
4524 | |||
4525 | CVE_STATUS[CVE-2022-50164] = "fixed-version: Fixed from version 6.0" | ||
4526 | |||
4527 | CVE_STATUS[CVE-2022-50165] = "fixed-version: Fixed from version 6.0" | ||
4528 | |||
4529 | CVE_STATUS[CVE-2022-50166] = "fixed-version: Fixed from version 6.0" | ||
4530 | |||
4531 | CVE_STATUS[CVE-2022-50167] = "fixed-version: Fixed from version 6.0" | ||
4532 | |||
4533 | CVE_STATUS[CVE-2022-50168] = "fixed-version: Fixed from version 6.0" | ||
4534 | |||
4535 | CVE_STATUS[CVE-2022-50169] = "fixed-version: Fixed from version 6.0" | ||
4536 | |||
4537 | CVE_STATUS[CVE-2022-50170] = "fixed-version: Fixed from version 6.0" | ||
4538 | |||
4539 | CVE_STATUS[CVE-2022-50171] = "fixed-version: Fixed from version 6.0" | ||
4540 | |||
4541 | CVE_STATUS[CVE-2022-50172] = "fixed-version: Fixed from version 6.0" | ||
4542 | |||
4543 | CVE_STATUS[CVE-2022-50173] = "fixed-version: Fixed from version 6.0" | ||
4544 | |||
4545 | CVE_STATUS[CVE-2022-50174] = "fixed-version: Fixed from version 6.0" | ||
4546 | |||
4547 | CVE_STATUS[CVE-2022-50175] = "fixed-version: Fixed from version 6.0" | ||
4548 | |||
4549 | CVE_STATUS[CVE-2022-50176] = "fixed-version: Fixed from version 6.0" | ||
4550 | |||
4551 | CVE_STATUS[CVE-2022-50177] = "fixed-version: Fixed from version 6.0" | ||
4552 | |||
4553 | CVE_STATUS[CVE-2022-50178] = "fixed-version: Fixed from version 6.0" | ||
4554 | |||
4555 | CVE_STATUS[CVE-2022-50179] = "fixed-version: Fixed from version 6.0" | ||
4556 | |||
4557 | CVE_STATUS[CVE-2022-50181] = "fixed-version: Fixed from version 6.0" | ||
4558 | |||
4559 | CVE_STATUS[CVE-2022-50182] = "fixed-version: Fixed from version 6.0" | ||
4560 | |||
4561 | CVE_STATUS[CVE-2022-50183] = "fixed-version: Fixed from version 6.0" | ||
4562 | |||
4563 | CVE_STATUS[CVE-2022-50184] = "fixed-version: Fixed from version 6.0" | ||
4564 | |||
4565 | CVE_STATUS[CVE-2022-50185] = "fixed-version: Fixed from version 6.0" | ||
4566 | |||
4567 | CVE_STATUS[CVE-2022-50186] = "fixed-version: Fixed from version 6.0" | ||
4568 | |||
4569 | CVE_STATUS[CVE-2022-50187] = "fixed-version: Fixed from version 6.0" | ||
4570 | |||
4571 | CVE_STATUS[CVE-2022-50188] = "fixed-version: Fixed from version 6.0" | ||
4572 | |||
4573 | CVE_STATUS[CVE-2022-50189] = "fixed-version: Fixed from version 6.0" | ||
4574 | |||
4575 | CVE_STATUS[CVE-2022-50190] = "fixed-version: Fixed from version 6.0" | ||
4576 | |||
4577 | CVE_STATUS[CVE-2022-50191] = "fixed-version: Fixed from version 6.0" | ||
4578 | |||
4579 | CVE_STATUS[CVE-2022-50192] = "fixed-version: Fixed from version 6.0" | ||
4580 | |||
4581 | CVE_STATUS[CVE-2022-50193] = "fixed-version: Fixed from version 6.0" | ||
4582 | |||
4583 | CVE_STATUS[CVE-2022-50194] = "fixed-version: Fixed from version 6.0" | ||
4584 | |||
4585 | CVE_STATUS[CVE-2022-50195] = "fixed-version: Fixed from version 6.0" | ||
4586 | |||
4587 | CVE_STATUS[CVE-2022-50196] = "fixed-version: Fixed from version 6.0" | ||
4588 | |||
4589 | CVE_STATUS[CVE-2022-50197] = "fixed-version: Fixed from version 6.0" | ||
4590 | |||
4591 | CVE_STATUS[CVE-2022-50198] = "fixed-version: Fixed from version 6.0" | ||
4592 | |||
4593 | CVE_STATUS[CVE-2022-50199] = "fixed-version: Fixed from version 6.0" | ||
4594 | |||
4595 | CVE_STATUS[CVE-2022-50200] = "fixed-version: Fixed from version 6.0" | ||
4596 | |||
4597 | CVE_STATUS[CVE-2022-50201] = "fixed-version: Fixed from version 6.0" | ||
4598 | |||
4599 | CVE_STATUS[CVE-2022-50202] = "fixed-version: Fixed from version 6.0" | ||
4600 | |||
4601 | CVE_STATUS[CVE-2022-50203] = "fixed-version: Fixed from version 6.0" | ||
4602 | |||
4603 | CVE_STATUS[CVE-2022-50204] = "fixed-version: Fixed from version 6.0" | ||
4604 | |||
4605 | CVE_STATUS[CVE-2022-50205] = "fixed-version: Fixed from version 6.0" | ||
4606 | |||
4607 | CVE_STATUS[CVE-2022-50206] = "fixed-version: Fixed from version 6.0" | ||
4608 | |||
4609 | CVE_STATUS[CVE-2022-50207] = "fixed-version: Fixed from version 6.0" | ||
4610 | |||
4611 | CVE_STATUS[CVE-2022-50208] = "fixed-version: Fixed from version 6.0" | ||
4612 | |||
4613 | CVE_STATUS[CVE-2022-50209] = "fixed-version: Fixed from version 6.0" | ||
4614 | |||
4615 | CVE_STATUS[CVE-2022-50210] = "fixed-version: Fixed from version 6.0" | ||
4616 | |||
4617 | CVE_STATUS[CVE-2022-50211] = "fixed-version: Fixed from version 6.0" | ||
4618 | |||
4619 | CVE_STATUS[CVE-2022-50212] = "fixed-version: Fixed from version 6.0" | ||
4620 | |||
4621 | CVE_STATUS[CVE-2022-50213] = "fixed-version: Fixed from version 6.0" | ||
4622 | |||
4623 | CVE_STATUS[CVE-2022-50214] = "fixed-version: Fixed from version 6.0" | ||
4624 | |||
4625 | CVE_STATUS[CVE-2022-50215] = "fixed-version: Fixed from version 6.0" | ||
4626 | |||
4627 | CVE_STATUS[CVE-2022-50217] = "fixed-version: Fixed from version 6.0" | ||
4628 | |||
4629 | CVE_STATUS[CVE-2022-50218] = "fixed-version: Fixed from version 6.0" | ||
4630 | |||
4631 | CVE_STATUS[CVE-2022-50219] = "fixed-version: Fixed from version 6.0" | ||
4632 | |||
4633 | CVE_STATUS[CVE-2022-50220] = "fixed-version: Fixed from version 6.0" | ||
4634 | |||
4635 | CVE_STATUS[CVE-2022-50221] = "fixed-version: Fixed from version 6.0" | ||
4636 | |||
4637 | CVE_STATUS[CVE-2022-50222] = "fixed-version: Fixed from version 6.0" | ||
4638 | |||
4639 | CVE_STATUS[CVE-2022-50223] = "fixed-version: Fixed from version 6.0" | ||
4640 | |||
4641 | CVE_STATUS[CVE-2022-50224] = "fixed-version: Fixed from version 6.0" | ||
4642 | |||
4643 | CVE_STATUS[CVE-2022-50225] = "fixed-version: Fixed from version 6.0" | ||
4644 | |||
4645 | CVE_STATUS[CVE-2022-50226] = "fixed-version: Fixed from version 6.0" | ||
4646 | |||
4647 | CVE_STATUS[CVE-2022-50227] = "fixed-version: Fixed from version 6.0" | ||
4648 | |||
4649 | CVE_STATUS[CVE-2022-50228] = "fixed-version: Fixed from version 6.0" | ||
4650 | |||
4651 | CVE_STATUS[CVE-2022-50229] = "fixed-version: Fixed from version 6.0" | ||
4652 | |||
4653 | # CVE-2022-50230 has no known resolution | ||
4654 | |||
4655 | CVE_STATUS[CVE-2022-50231] = "fixed-version: Fixed from version 6.0" | ||
4656 | |||
4657 | # CVE-2022-50232 has no known resolution | ||
4658 | |||
4080 | # CVE-2023-34319 has no known resolution | 4659 | # CVE-2023-34319 has no known resolution |
4081 | 4660 | ||
4082 | # CVE-2023-34324 has no known resolution | 4661 | # CVE-2023-34324 has no known resolution |
@@ -4561,8 +5140,6 @@ CVE_STATUS[CVE-2023-52731] = "fixed-version: Fixed from version 6.2" | |||
4561 | 5140 | ||
4562 | CVE_STATUS[CVE-2023-52732] = "fixed-version: Fixed from version 6.2" | 5141 | CVE_STATUS[CVE-2023-52732] = "fixed-version: Fixed from version 6.2" |
4563 | 5142 | ||
4564 | # CVE-2023-52733 has no known resolution | ||
4565 | |||
4566 | CVE_STATUS[CVE-2023-52735] = "fixed-version: Fixed from version 6.2" | 5143 | CVE_STATUS[CVE-2023-52735] = "fixed-version: Fixed from version 6.2" |
4567 | 5144 | ||
4568 | CVE_STATUS[CVE-2023-52736] = "fixed-version: Fixed from version 6.2" | 5145 | CVE_STATUS[CVE-2023-52736] = "fixed-version: Fixed from version 6.2" |
@@ -5525,7 +6102,7 @@ CVE_STATUS[CVE-2024-26708] = "fixed-version: Fixed from version 6.8" | |||
5525 | 6102 | ||
5526 | CVE_STATUS[CVE-2024-26709] = "fixed-version: Fixed from version 6.8" | 6103 | CVE_STATUS[CVE-2024-26709] = "fixed-version: Fixed from version 6.8" |
5527 | 6104 | ||
5528 | # CVE-2024-26710 has no known resolution | 6105 | CVE_STATUS[CVE-2024-26710] = "fixed-version: Fixed from version 6.7.6" |
5529 | 6106 | ||
5530 | CVE_STATUS[CVE-2024-26711] = "fixed-version: Fixed from version 6.8" | 6107 | CVE_STATUS[CVE-2024-26711] = "fixed-version: Fixed from version 6.8" |
5531 | 6108 | ||
@@ -5689,8 +6266,6 @@ CVE_STATUS[CVE-2024-26792] = "fixed-version: Fixed from version 6.7.9" | |||
5689 | 6266 | ||
5690 | CVE_STATUS[CVE-2024-26793] = "fixed-version: Fixed from version 6.8" | 6267 | CVE_STATUS[CVE-2024-26793] = "fixed-version: Fixed from version 6.8" |
5691 | 6268 | ||
5692 | CVE_STATUS[CVE-2024-26794] = "fixed-version: Fixed from version 6.7.9" | ||
5693 | |||
5694 | CVE_STATUS[CVE-2024-26795] = "fixed-version: Fixed from version 6.8" | 6269 | CVE_STATUS[CVE-2024-26795] = "fixed-version: Fixed from version 6.8" |
5695 | 6270 | ||
5696 | CVE_STATUS[CVE-2024-26796] = "fixed-version: Fixed from version 6.8" | 6271 | CVE_STATUS[CVE-2024-26796] = "fixed-version: Fixed from version 6.8" |
@@ -6345,8 +6920,6 @@ CVE_STATUS[CVE-2024-35786] = "fixed-version: Fixed from version 6.8" | |||
6345 | 6920 | ||
6346 | CVE_STATUS[CVE-2024-35787] = "fixed-version: Fixed from version 6.9" | 6921 | CVE_STATUS[CVE-2024-35787] = "fixed-version: Fixed from version 6.9" |
6347 | 6922 | ||
6348 | # CVE-2024-35788 has no known resolution | ||
6349 | |||
6350 | CVE_STATUS[CVE-2024-35789] = "fixed-version: Fixed from version 6.9" | 6923 | CVE_STATUS[CVE-2024-35789] = "fixed-version: Fixed from version 6.9" |
6351 | 6924 | ||
6352 | CVE_STATUS[CVE-2024-35790] = "fixed-version: Fixed from version 6.8" | 6925 | CVE_STATUS[CVE-2024-35790] = "fixed-version: Fixed from version 6.8" |
@@ -6793,8 +7366,6 @@ CVE_STATUS[CVE-2024-36020] = "fixed-version: Fixed from version 6.9" | |||
6793 | 7366 | ||
6794 | CVE_STATUS[CVE-2024-36021] = "fixed-version: Fixed from version 6.9" | 7367 | CVE_STATUS[CVE-2024-36021] = "fixed-version: Fixed from version 6.9" |
6795 | 7368 | ||
6796 | CVE_STATUS[CVE-2024-36022] = "fixed-version: Fixed from version 6.9" | ||
6797 | |||
6798 | CVE_STATUS[CVE-2024-36023] = "fixed-version: Fixed from version 6.9" | 7369 | CVE_STATUS[CVE-2024-36023] = "fixed-version: Fixed from version 6.9" |
6799 | 7370 | ||
6800 | CVE_STATUS[CVE-2024-36024] = "fixed-version: Fixed from version 6.9" | 7371 | CVE_STATUS[CVE-2024-36024] = "fixed-version: Fixed from version 6.9" |
@@ -8421,8 +8992,6 @@ CVE_STATUS[CVE-2024-44953] = "fixed-version: Fixed from version 6.11" | |||
8421 | 8992 | ||
8422 | CVE_STATUS[CVE-2024-44954] = "fixed-version: Fixed from version 6.11" | 8993 | CVE_STATUS[CVE-2024-44954] = "fixed-version: Fixed from version 6.11" |
8423 | 8994 | ||
8424 | CVE_STATUS[CVE-2024-44955] = "fixed-version: Fixed from version 6.11" | ||
8425 | |||
8426 | CVE_STATUS[CVE-2024-44956] = "fixed-version: Fixed from version 6.11" | 8995 | CVE_STATUS[CVE-2024-44956] = "fixed-version: Fixed from version 6.11" |
8427 | 8996 | ||
8428 | CVE_STATUS[CVE-2024-44957] = "fixed-version: Fixed from version 6.11" | 8997 | CVE_STATUS[CVE-2024-44957] = "fixed-version: Fixed from version 6.11" |
@@ -8631,8 +9200,6 @@ CVE_STATUS[CVE-2024-46698] = "fixed-version: Fixed from version 6.11" | |||
8631 | 9200 | ||
8632 | CVE_STATUS[CVE-2024-46699] = "fixed-version: Fixed from version 6.11" | 9201 | CVE_STATUS[CVE-2024-46699] = "fixed-version: Fixed from version 6.11" |
8633 | 9202 | ||
8634 | # CVE-2024-46700 has no known resolution | ||
8635 | |||
8636 | CVE_STATUS[CVE-2024-46701] = "fixed-version: Fixed from version 6.11" | 9203 | CVE_STATUS[CVE-2024-46701] = "fixed-version: Fixed from version 6.11" |
8637 | 9204 | ||
8638 | CVE_STATUS[CVE-2024-46702] = "fixed-version: Fixed from version 6.11" | 9205 | CVE_STATUS[CVE-2024-46702] = "fixed-version: Fixed from version 6.11" |
@@ -9545,8 +10112,6 @@ CVE_STATUS[CVE-2024-50030] = "fixed-version: Fixed from version 6.12" | |||
9545 | 10112 | ||
9546 | CVE_STATUS[CVE-2024-50031] = "fixed-version: Fixed from version 6.12" | 10113 | CVE_STATUS[CVE-2024-50031] = "fixed-version: Fixed from version 6.12" |
9547 | 10114 | ||
9548 | CVE_STATUS[CVE-2024-50032] = "fixed-version: Fixed from version 6.11.4" | ||
9549 | |||
9550 | CVE_STATUS[CVE-2024-50033] = "fixed-version: Fixed from version 6.12" | 10115 | CVE_STATUS[CVE-2024-50033] = "fixed-version: Fixed from version 6.12" |
9551 | 10116 | ||
9552 | CVE_STATUS[CVE-2024-50034] = "fixed-version: Fixed from version 6.12" | 10117 | CVE_STATUS[CVE-2024-50034] = "fixed-version: Fixed from version 6.12" |
@@ -11011,8 +11576,6 @@ CVE_STATUS[CVE-2024-56784] = "cpe-stable-backport: Backported in 6.12.5" | |||
11011 | 11576 | ||
11012 | CVE_STATUS[CVE-2024-56785] = "cpe-stable-backport: Backported in 6.12.5" | 11577 | CVE_STATUS[CVE-2024-56785] = "cpe-stable-backport: Backported in 6.12.5" |
11013 | 11578 | ||
11014 | CVE_STATUS[CVE-2024-56786] = "cpe-stable-backport: Backported in 6.12.5" | ||
11015 | |||
11016 | CVE_STATUS[CVE-2024-56787] = "cpe-stable-backport: Backported in 6.12.5" | 11579 | CVE_STATUS[CVE-2024-56787] = "cpe-stable-backport: Backported in 6.12.5" |
11017 | 11580 | ||
11018 | CVE_STATUS[CVE-2024-56788] = "cpe-stable-backport: Backported in 6.12.7" | 11581 | CVE_STATUS[CVE-2024-56788] = "cpe-stable-backport: Backported in 6.12.7" |
@@ -11155,8 +11718,6 @@ CVE_STATUS[CVE-2024-57918] = "cpe-stable-backport: Backported in 6.12.10" | |||
11155 | 11718 | ||
11156 | CVE_STATUS[CVE-2024-57919] = "cpe-stable-backport: Backported in 6.12.10" | 11719 | CVE_STATUS[CVE-2024-57919] = "cpe-stable-backport: Backported in 6.12.10" |
11157 | 11720 | ||
11158 | # CVE-2024-57920 has no known resolution | ||
11159 | |||
11160 | CVE_STATUS[CVE-2024-57921] = "cpe-stable-backport: Backported in 6.12.10" | 11721 | CVE_STATUS[CVE-2024-57921] = "cpe-stable-backport: Backported in 6.12.10" |
11161 | 11722 | ||
11162 | CVE_STATUS[CVE-2024-57922] = "cpe-stable-backport: Backported in 6.12.10" | 11723 | CVE_STATUS[CVE-2024-57922] = "cpe-stable-backport: Backported in 6.12.10" |
@@ -11227,7 +11788,7 @@ CVE_STATUS[CVE-2024-57974] = "cpe-stable-backport: Backported in 6.12.13" | |||
11227 | 11788 | ||
11228 | CVE_STATUS[CVE-2024-57975] = "cpe-stable-backport: Backported in 6.12.13" | 11789 | CVE_STATUS[CVE-2024-57975] = "cpe-stable-backport: Backported in 6.12.13" |
11229 | 11790 | ||
11230 | # CVE-2024-57976 needs backporting (fixed from 6.14) | 11791 | CVE_STATUS[CVE-2024-57976] = "cpe-stable-backport: Backported in 6.12.36" |
11231 | 11792 | ||
11232 | CVE_STATUS[CVE-2024-57977] = "cpe-stable-backport: Backported in 6.12.13" | 11793 | CVE_STATUS[CVE-2024-57977] = "cpe-stable-backport: Backported in 6.12.13" |
11233 | 11794 | ||
@@ -11405,7 +11966,7 @@ CVE_STATUS[CVE-2024-58089] = "cpe-stable-backport: Backported in 6.12.17" | |||
11405 | 11966 | ||
11406 | CVE_STATUS[CVE-2024-58090] = "cpe-stable-backport: Backported in 6.12.18" | 11967 | CVE_STATUS[CVE-2024-58090] = "cpe-stable-backport: Backported in 6.12.18" |
11407 | 11968 | ||
11408 | # CVE-2024-58091 needs backporting (fixed from 6.14) | 11969 | CVE_STATUS[CVE-2024-58091] = "cpe-stable-backport: Backported in 6.12.36" |
11409 | 11970 | ||
11410 | CVE_STATUS[CVE-2024-58092] = "cpe-stable-backport: Backported in 6.12.22" | 11971 | CVE_STATUS[CVE-2024-58092] = "cpe-stable-backport: Backported in 6.12.22" |
11411 | 11972 | ||
@@ -11789,7 +12350,7 @@ CVE_STATUS[CVE-2025-21815] = "cpe-stable-backport: Backported in 6.12.14" | |||
11789 | 12350 | ||
11790 | CVE_STATUS[CVE-2025-21816] = "cpe-stable-backport: Backported in 6.12.14" | 12351 | CVE_STATUS[CVE-2025-21816] = "cpe-stable-backport: Backported in 6.12.14" |
11791 | 12352 | ||
11792 | # CVE-2025-21817 needs backporting (fixed from 6.14) | 12353 | CVE_STATUS[CVE-2025-21817] = "fixed-version: only affects 6.13.2 onwards" |
11793 | 12354 | ||
11794 | CVE_STATUS[CVE-2025-21819] = "cpe-stable-backport: Backported in 6.12.14" | 12355 | CVE_STATUS[CVE-2025-21819] = "cpe-stable-backport: Backported in 6.12.14" |
11795 | 12356 | ||
@@ -12351,7 +12912,7 @@ CVE_STATUS[CVE-2025-22099] = "fixed-version: only affects 6.14 onwards" | |||
12351 | 12912 | ||
12352 | CVE_STATUS[CVE-2025-22100] = "fixed-version: only affects 6.13 onwards" | 12913 | CVE_STATUS[CVE-2025-22100] = "fixed-version: only affects 6.13 onwards" |
12353 | 12914 | ||
12354 | # CVE-2025-22101 needs backporting (fixed from 6.15) | 12915 | CVE_STATUS[CVE-2025-22101] = "cpe-stable-backport: Backported in 6.12.36" |
12355 | 12916 | ||
12356 | CVE_STATUS[CVE-2025-22102] = "cpe-stable-backport: Backported in 6.12.30" | 12917 | CVE_STATUS[CVE-2025-22102] = "cpe-stable-backport: Backported in 6.12.30" |
12357 | 12918 | ||
@@ -12373,7 +12934,7 @@ CVE_STATUS[CVE-2025-22110] = "fixed-version: only affects 6.14 onwards" | |||
12373 | 12934 | ||
12374 | # CVE-2025-22111 needs backporting (fixed from 6.15) | 12935 | # CVE-2025-22111 needs backporting (fixed from 6.15) |
12375 | 12936 | ||
12376 | CVE_STATUS[CVE-2025-22112] = "fixed-version: only affects 6.14 onwards" | 12937 | CVE_STATUS[CVE-2025-22112] = "cpe-stable-backport: Backported in 6.12.35" |
12377 | 12938 | ||
12378 | # CVE-2025-22113 needs backporting (fixed from 6.15) | 12939 | # CVE-2025-22113 needs backporting (fixed from 6.15) |
12379 | 12940 | ||
@@ -12387,15 +12948,15 @@ CVE_STATUS[CVE-2025-22114] = "fixed-version: only affects 6.14 onwards" | |||
12387 | 12948 | ||
12388 | CVE_STATUS[CVE-2025-22118] = "fixed-version: only affects 6.13 onwards" | 12949 | CVE_STATUS[CVE-2025-22118] = "fixed-version: only affects 6.13 onwards" |
12389 | 12950 | ||
12390 | CVE_STATUS[CVE-2025-22119] = "fixed-version: only affects 6.14 onwards" | 12951 | CVE_STATUS[CVE-2025-22119] = "cpe-stable-backport: Backported in 6.12.35" |
12391 | 12952 | ||
12392 | CVE_STATUS[CVE-2025-22120] = "cpe-stable-backport: Backported in 6.12.26" | 12953 | CVE_STATUS[CVE-2025-22120] = "cpe-stable-backport: Backported in 6.12.26" |
12393 | 12954 | ||
12394 | # CVE-2025-22121 needs backporting (fixed from 6.15) | 12955 | # CVE-2025-22121 needs backporting (fixed from 6.15) |
12395 | 12956 | ||
12396 | # CVE-2025-22122 needs backporting (fixed from 6.15) | 12957 | CVE_STATUS[CVE-2025-22122] = "cpe-stable-backport: Backported in 6.12.33" |
12397 | 12958 | ||
12398 | # CVE-2025-22123 needs backporting (fixed from 6.15) | 12959 | CVE_STATUS[CVE-2025-22123] = "cpe-stable-backport: Backported in 6.12.33" |
12399 | 12960 | ||
12400 | # CVE-2025-22124 needs backporting (fixed from 6.15) | 12961 | # CVE-2025-22124 needs backporting (fixed from 6.15) |
12401 | 12962 | ||
@@ -12405,7 +12966,7 @@ CVE_STATUS[CVE-2025-22126] = "cpe-stable-backport: Backported in 6.12.25" | |||
12405 | 12966 | ||
12406 | # CVE-2025-22127 needs backporting (fixed from 6.15) | 12967 | # CVE-2025-22127 needs backporting (fixed from 6.15) |
12407 | 12968 | ||
12408 | # CVE-2025-22128 needs backporting (fixed from 6.15) | 12969 | CVE_STATUS[CVE-2025-22128] = "cpe-stable-backport: Backported in 6.12.35" |
12409 | 12970 | ||
12410 | # CVE-2025-23129 needs backporting (fixed from 6.15) | 12971 | # CVE-2025-23129 needs backporting (fixed from 6.15) |
12411 | 12972 | ||
@@ -12423,7 +12984,7 @@ CVE_STATUS[CVE-2025-23134] = "cpe-stable-backport: Backported in 6.12.23" | |||
12423 | 12984 | ||
12424 | CVE_STATUS[CVE-2025-23136] = "cpe-stable-backport: Backported in 6.12.23" | 12985 | CVE_STATUS[CVE-2025-23136] = "cpe-stable-backport: Backported in 6.12.23" |
12425 | 12986 | ||
12426 | # CVE-2025-23137 needs backporting (fixed from 6.15) | 12987 | CVE_STATUS[CVE-2025-23137] = "cpe-stable-backport: Backported in 6.12.35" |
12427 | 12988 | ||
12428 | CVE_STATUS[CVE-2025-23138] = "cpe-stable-backport: Backported in 6.12.23" | 12989 | CVE_STATUS[CVE-2025-23138] = "cpe-stable-backport: Backported in 6.12.23" |
12429 | 12990 | ||
@@ -12457,7 +13018,7 @@ CVE_STATUS[CVE-2025-23153] = "fixed-version: only affects 6.14 onwards" | |||
12457 | 13018 | ||
12458 | CVE_STATUS[CVE-2025-23154] = "cpe-stable-backport: Backported in 6.12.24" | 13019 | CVE_STATUS[CVE-2025-23154] = "cpe-stable-backport: Backported in 6.12.24" |
12459 | 13020 | ||
12460 | # CVE-2025-23155 needs backporting (fixed from 6.15) | 13021 | CVE_STATUS[CVE-2025-23155] = "cpe-stable-backport: Backported in 6.12.36" |
12461 | 13022 | ||
12462 | CVE_STATUS[CVE-2025-23156] = "cpe-stable-backport: Backported in 6.12.24" | 13023 | CVE_STATUS[CVE-2025-23156] = "cpe-stable-backport: Backported in 6.12.24" |
12463 | 13024 | ||
@@ -12671,7 +13232,7 @@ CVE_STATUS[CVE-2025-37840] = "cpe-stable-backport: Backported in 6.12.24" | |||
12671 | 13232 | ||
12672 | CVE_STATUS[CVE-2025-37841] = "cpe-stable-backport: Backported in 6.12.24" | 13233 | CVE_STATUS[CVE-2025-37841] = "cpe-stable-backport: Backported in 6.12.24" |
12673 | 13234 | ||
12674 | # CVE-2025-37842 needs backporting (fixed from 6.15) | 13235 | CVE_STATUS[CVE-2025-37842] = "cpe-stable-backport: Backported in 6.12.36" |
12675 | 13236 | ||
12676 | CVE_STATUS[CVE-2025-37843] = "cpe-stable-backport: Backported in 6.12.24" | 13237 | CVE_STATUS[CVE-2025-37843] = "cpe-stable-backport: Backported in 6.12.24" |
12677 | 13238 | ||
@@ -12697,7 +13258,7 @@ CVE_STATUS[CVE-2025-37853] = "cpe-stable-backport: Backported in 6.12.24" | |||
12697 | 13258 | ||
12698 | CVE_STATUS[CVE-2025-37854] = "cpe-stable-backport: Backported in 6.12.24" | 13259 | CVE_STATUS[CVE-2025-37854] = "cpe-stable-backport: Backported in 6.12.24" |
12699 | 13260 | ||
12700 | # CVE-2025-37855 needs backporting (fixed from 6.15) | 13261 | CVE_STATUS[CVE-2025-37855] = "fixed-version: only affects 6.14 onwards" |
12701 | 13262 | ||
12702 | CVE_STATUS[CVE-2025-37856] = "cpe-stable-backport: Backported in 6.12.24" | 13263 | CVE_STATUS[CVE-2025-37856] = "cpe-stable-backport: Backported in 6.12.24" |
12703 | 13264 | ||
@@ -12937,8 +13498,6 @@ CVE_STATUS[CVE-2025-37974] = "cpe-stable-backport: Backported in 6.12.29" | |||
12937 | 13498 | ||
12938 | CVE_STATUS[CVE-2025-37975] = "cpe-stable-backport: Backported in 6.12.25" | 13499 | CVE_STATUS[CVE-2025-37975] = "cpe-stable-backport: Backported in 6.12.25" |
12939 | 13500 | ||
12940 | # CVE-2025-37976 has no known resolution | ||
12941 | |||
12942 | CVE_STATUS[CVE-2025-37977] = "cpe-stable-backport: Backported in 6.12.26" | 13501 | CVE_STATUS[CVE-2025-37977] = "cpe-stable-backport: Backported in 6.12.26" |
12943 | 13502 | ||
12944 | CVE_STATUS[CVE-2025-37978] = "cpe-stable-backport: Backported in 6.12.25" | 13503 | CVE_STATUS[CVE-2025-37978] = "cpe-stable-backport: Backported in 6.12.25" |
@@ -12985,12 +13544,476 @@ CVE_STATUS[CVE-2025-37998] = "cpe-stable-backport: Backported in 6.12.29" | |||
12985 | 13544 | ||
12986 | CVE_STATUS[CVE-2025-37999] = "cpe-stable-backport: Backported in 6.12.29" | 13545 | CVE_STATUS[CVE-2025-37999] = "cpe-stable-backport: Backported in 6.12.29" |
12987 | 13546 | ||
13547 | CVE_STATUS[CVE-2025-38000] = "cpe-stable-backport: Backported in 6.12.31" | ||
13548 | |||
13549 | CVE_STATUS[CVE-2025-38001] = "cpe-stable-backport: Backported in 6.12.32" | ||
13550 | |||
13551 | CVE_STATUS[CVE-2025-38002] = "fixed-version: only affects 6.13 onwards" | ||
13552 | |||
13553 | CVE_STATUS[CVE-2025-38003] = "cpe-stable-backport: Backported in 6.12.31" | ||
13554 | |||
13555 | CVE_STATUS[CVE-2025-38004] = "cpe-stable-backport: Backported in 6.12.31" | ||
13556 | |||
13557 | CVE_STATUS[CVE-2025-38005] = "cpe-stable-backport: Backported in 6.12.30" | ||
13558 | |||
13559 | CVE_STATUS[CVE-2025-38006] = "cpe-stable-backport: Backported in 6.12.30" | ||
13560 | |||
13561 | CVE_STATUS[CVE-2025-38007] = "cpe-stable-backport: Backported in 6.12.30" | ||
13562 | |||
13563 | CVE_STATUS[CVE-2025-38008] = "cpe-stable-backport: Backported in 6.12.30" | ||
13564 | |||
13565 | CVE_STATUS[CVE-2025-38009] = "cpe-stable-backport: Backported in 6.12.30" | ||
13566 | |||
13567 | CVE_STATUS[CVE-2025-38010] = "cpe-stable-backport: Backported in 6.12.30" | ||
13568 | |||
13569 | CVE_STATUS[CVE-2025-38011] = "cpe-stable-backport: Backported in 6.12.30" | ||
13570 | |||
13571 | CVE_STATUS[CVE-2025-38012] = "cpe-stable-backport: Backported in 6.12.30" | ||
13572 | |||
13573 | CVE_STATUS[CVE-2025-38013] = "cpe-stable-backport: Backported in 6.12.30" | ||
13574 | |||
13575 | CVE_STATUS[CVE-2025-38014] = "cpe-stable-backport: Backported in 6.12.30" | ||
13576 | |||
13577 | CVE_STATUS[CVE-2025-38015] = "cpe-stable-backport: Backported in 6.12.30" | ||
13578 | |||
13579 | CVE_STATUS[CVE-2025-38016] = "cpe-stable-backport: Backported in 6.12.30" | ||
13580 | |||
13581 | CVE_STATUS[CVE-2025-38017] = "fixed-version: only affects 6.14.4 onwards" | ||
13582 | |||
13583 | CVE_STATUS[CVE-2025-38018] = "cpe-stable-backport: Backported in 6.12.30" | ||
13584 | |||
13585 | CVE_STATUS[CVE-2025-38019] = "cpe-stable-backport: Backported in 6.12.30" | ||
13586 | |||
13587 | CVE_STATUS[CVE-2025-38020] = "cpe-stable-backport: Backported in 6.12.30" | ||
13588 | |||
13589 | CVE_STATUS[CVE-2025-38021] = "fixed-version: only affects 6.14 onwards" | ||
13590 | |||
13591 | CVE_STATUS[CVE-2025-38022] = "cpe-stable-backport: Backported in 6.12.30" | ||
13592 | |||
13593 | CVE_STATUS[CVE-2025-38023] = "cpe-stable-backport: Backported in 6.12.30" | ||
13594 | |||
13595 | CVE_STATUS[CVE-2025-38024] = "cpe-stable-backport: Backported in 6.12.30" | ||
13596 | |||
13597 | CVE_STATUS[CVE-2025-38025] = "fixed-version: only affects 6.13 onwards" | ||
13598 | |||
13599 | CVE_STATUS[CVE-2025-38027] = "cpe-stable-backport: Backported in 6.12.30" | ||
13600 | |||
13601 | CVE_STATUS[CVE-2025-38028] = "fixed-version: only affects 6.14 onwards" | ||
13602 | |||
13603 | # CVE-2025-38029 needs backporting (fixed from 6.15) | ||
13604 | |||
13605 | CVE_STATUS[CVE-2025-38031] = "cpe-stable-backport: Backported in 6.12.31" | ||
13606 | |||
13607 | CVE_STATUS[CVE-2025-38032] = "fixed-version: only affects 6.13 onwards" | ||
13608 | |||
13609 | CVE_STATUS[CVE-2025-38033] = "cpe-stable-backport: Backported in 6.12.31" | ||
13610 | |||
13611 | CVE_STATUS[CVE-2025-38034] = "cpe-stable-backport: Backported in 6.12.31" | ||
13612 | |||
13613 | CVE_STATUS[CVE-2025-38035] = "cpe-stable-backport: Backported in 6.12.31" | ||
13614 | |||
13615 | # CVE-2025-38036 needs backporting (fixed from 6.15) | ||
13616 | |||
13617 | CVE_STATUS[CVE-2025-38037] = "cpe-stable-backport: Backported in 6.12.31" | ||
13618 | |||
13619 | CVE_STATUS[CVE-2025-38038] = "cpe-stable-backport: Backported in 6.12.31" | ||
13620 | |||
13621 | CVE_STATUS[CVE-2025-38039] = "cpe-stable-backport: Backported in 6.12.31" | ||
13622 | |||
13623 | CVE_STATUS[CVE-2025-38040] = "cpe-stable-backport: Backported in 6.12.31" | ||
13624 | |||
13625 | # CVE-2025-38041 needs backporting (fixed from 6.15) | ||
13626 | |||
13627 | # CVE-2025-38042 needs backporting (fixed from 6.15) | ||
13628 | |||
13629 | CVE_STATUS[CVE-2025-38043] = "cpe-stable-backport: Backported in 6.12.31" | ||
13630 | |||
13631 | CVE_STATUS[CVE-2025-38044] = "cpe-stable-backport: Backported in 6.12.31" | ||
13632 | |||
13633 | CVE_STATUS[CVE-2025-38045] = "cpe-stable-backport: Backported in 6.12.31" | ||
13634 | |||
13635 | CVE_STATUS[CVE-2025-38047] = "cpe-stable-backport: Backported in 6.12.31" | ||
13636 | |||
13637 | CVE_STATUS[CVE-2025-38048] = "cpe-stable-backport: Backported in 6.12.31" | ||
13638 | |||
12988 | CVE_STATUS[CVE-2025-38049] = "cpe-stable-backport: Backported in 6.12.23" | 13639 | CVE_STATUS[CVE-2025-38049] = "cpe-stable-backport: Backported in 6.12.23" |
12989 | 13640 | ||
13641 | CVE_STATUS[CVE-2025-38050] = "fixed-version: only affects 6.14 onwards" | ||
13642 | |||
13643 | CVE_STATUS[CVE-2025-38051] = "cpe-stable-backport: Backported in 6.12.31" | ||
13644 | |||
13645 | CVE_STATUS[CVE-2025-38052] = "cpe-stable-backport: Backported in 6.12.31" | ||
13646 | |||
13647 | CVE_STATUS[CVE-2025-38053] = "cpe-stable-backport: Backported in 6.12.31" | ||
13648 | |||
13649 | CVE_STATUS[CVE-2025-38054] = "cpe-stable-backport: Backported in 6.12.31" | ||
13650 | |||
13651 | CVE_STATUS[CVE-2025-38055] = "cpe-stable-backport: Backported in 6.12.31" | ||
13652 | |||
13653 | CVE_STATUS[CVE-2025-38056] = "cpe-stable-backport: Backported in 6.12.31" | ||
13654 | |||
13655 | CVE_STATUS[CVE-2025-38057] = "cpe-stable-backport: Backported in 6.12.31" | ||
13656 | |||
13657 | CVE_STATUS[CVE-2025-38058] = "cpe-stable-backport: Backported in 6.12.31" | ||
13658 | |||
13659 | CVE_STATUS[CVE-2025-38059] = "cpe-stable-backport: Backported in 6.12.31" | ||
13660 | |||
13661 | CVE_STATUS[CVE-2025-38060] = "cpe-stable-backport: Backported in 6.12.31" | ||
13662 | |||
13663 | CVE_STATUS[CVE-2025-38061] = "cpe-stable-backport: Backported in 6.12.31" | ||
13664 | |||
13665 | CVE_STATUS[CVE-2025-38062] = "cpe-stable-backport: Backported in 6.12.31" | ||
13666 | |||
13667 | CVE_STATUS[CVE-2025-38063] = "cpe-stable-backport: Backported in 6.12.31" | ||
13668 | |||
13669 | # CVE-2025-38064 needs backporting (fixed from 6.15) | ||
13670 | |||
13671 | CVE_STATUS[CVE-2025-38065] = "cpe-stable-backport: Backported in 6.12.31" | ||
13672 | |||
13673 | CVE_STATUS[CVE-2025-38066] = "cpe-stable-backport: Backported in 6.12.31" | ||
13674 | |||
13675 | # CVE-2025-38067 needs backporting (fixed from 6.15) | ||
13676 | |||
13677 | CVE_STATUS[CVE-2025-38068] = "cpe-stable-backport: Backported in 6.12.31" | ||
13678 | |||
13679 | CVE_STATUS[CVE-2025-38069] = "cpe-stable-backport: Backported in 6.12.31" | ||
13680 | |||
13681 | CVE_STATUS[CVE-2025-38070] = "fixed-version: only affects 6.13 onwards" | ||
13682 | |||
13683 | CVE_STATUS[CVE-2025-38071] = "cpe-stable-backport: Backported in 6.12.31" | ||
13684 | |||
13685 | CVE_STATUS[CVE-2025-38072] = "cpe-stable-backport: Backported in 6.12.31" | ||
13686 | |||
13687 | CVE_STATUS[CVE-2025-38073] = "cpe-stable-backport: Backported in 6.12.31" | ||
13688 | |||
13689 | CVE_STATUS[CVE-2025-38074] = "cpe-stable-backport: Backported in 6.12.31" | ||
13690 | |||
13691 | CVE_STATUS[CVE-2025-38075] = "cpe-stable-backport: Backported in 6.12.31" | ||
13692 | |||
13693 | CVE_STATUS[CVE-2025-38076] = "fixed-version: only affects 6.13 onwards" | ||
13694 | |||
13695 | CVE_STATUS[CVE-2025-38077] = "cpe-stable-backport: Backported in 6.12.31" | ||
13696 | |||
13697 | CVE_STATUS[CVE-2025-38078] = "cpe-stable-backport: Backported in 6.12.31" | ||
13698 | |||
13699 | CVE_STATUS[CVE-2025-38079] = "cpe-stable-backport: Backported in 6.12.31" | ||
13700 | |||
13701 | CVE_STATUS[CVE-2025-38080] = "cpe-stable-backport: Backported in 6.12.31" | ||
13702 | |||
13703 | CVE_STATUS[CVE-2025-38081] = "cpe-stable-backport: Backported in 6.12.31" | ||
13704 | |||
13705 | CVE_STATUS[CVE-2025-38082] = "cpe-stable-backport: Backported in 6.12.32" | ||
13706 | |||
13707 | CVE_STATUS[CVE-2025-38083] = "cpe-stable-backport: Backported in 6.12.34" | ||
13708 | |||
13709 | CVE_STATUS[CVE-2025-38084] = "cpe-stable-backport: Backported in 6.12.35" | ||
13710 | |||
13711 | CVE_STATUS[CVE-2025-38085] = "cpe-stable-backport: Backported in 6.12.35" | ||
13712 | |||
13713 | CVE_STATUS[CVE-2025-38086] = "cpe-stable-backport: Backported in 6.12.35" | ||
13714 | |||
13715 | CVE_STATUS[CVE-2025-38087] = "cpe-stable-backport: Backported in 6.12.35" | ||
13716 | |||
13717 | CVE_STATUS[CVE-2025-38088] = "cpe-stable-backport: Backported in 6.12.34" | ||
13718 | |||
13719 | CVE_STATUS[CVE-2025-38089] = "cpe-stable-backport: Backported in 6.12.35" | ||
13720 | |||
13721 | CVE_STATUS[CVE-2025-38090] = "cpe-stable-backport: Backported in 6.12.35" | ||
13722 | |||
13723 | CVE_STATUS[CVE-2025-38091] = "cpe-stable-backport: Backported in 6.12.32" | ||
13724 | |||
13725 | CVE_STATUS[CVE-2025-38092] = "cpe-stable-backport: Backported in 6.12.32" | ||
13726 | |||
13727 | CVE_STATUS[CVE-2025-38093] = "cpe-stable-backport: Backported in 6.12.34" | ||
13728 | |||
13729 | CVE_STATUS[CVE-2025-38094] = "cpe-stable-backport: Backported in 6.12.30" | ||
13730 | |||
13731 | CVE_STATUS[CVE-2025-38095] = "cpe-stable-backport: Backported in 6.12.30" | ||
13732 | |||
13733 | CVE_STATUS[CVE-2025-38096] = "cpe-stable-backport: Backported in 6.12.31" | ||
13734 | |||
13735 | CVE_STATUS[CVE-2025-38097] = "cpe-stable-backport: Backported in 6.12.31" | ||
13736 | |||
13737 | CVE_STATUS[CVE-2025-38098] = "cpe-stable-backport: Backported in 6.12.31" | ||
13738 | |||
13739 | CVE_STATUS[CVE-2025-38099] = "cpe-stable-backport: Backported in 6.12.31" | ||
13740 | |||
13741 | CVE_STATUS[CVE-2025-38100] = "cpe-stable-backport: Backported in 6.12.34" | ||
13742 | |||
13743 | CVE_STATUS[CVE-2025-38101] = "cpe-stable-backport: Backported in 6.12.34" | ||
13744 | |||
13745 | CVE_STATUS[CVE-2025-38102] = "cpe-stable-backport: Backported in 6.12.34" | ||
13746 | |||
13747 | CVE_STATUS[CVE-2025-38103] = "cpe-stable-backport: Backported in 6.12.34" | ||
13748 | |||
12990 | # CVE-2025-38104 needs backporting (fixed from 6.15) | 13749 | # CVE-2025-38104 needs backporting (fixed from 6.15) |
12991 | 13750 | ||
13751 | # CVE-2025-38105 needs backporting (fixed from 6.16rc1) | ||
13752 | |||
13753 | CVE_STATUS[CVE-2025-38106] = "cpe-stable-backport: Backported in 6.12.34" | ||
13754 | |||
13755 | CVE_STATUS[CVE-2025-38107] = "cpe-stable-backport: Backported in 6.12.34" | ||
13756 | |||
13757 | CVE_STATUS[CVE-2025-38108] = "cpe-stable-backport: Backported in 6.12.34" | ||
13758 | |||
13759 | CVE_STATUS[CVE-2025-38109] = "cpe-stable-backport: Backported in 6.12.34" | ||
13760 | |||
13761 | CVE_STATUS[CVE-2025-38110] = "cpe-stable-backport: Backported in 6.12.34" | ||
13762 | |||
13763 | CVE_STATUS[CVE-2025-38111] = "cpe-stable-backport: Backported in 6.12.34" | ||
13764 | |||
13765 | CVE_STATUS[CVE-2025-38112] = "cpe-stable-backport: Backported in 6.12.34" | ||
13766 | |||
13767 | CVE_STATUS[CVE-2025-38113] = "cpe-stable-backport: Backported in 6.12.34" | ||
13768 | |||
13769 | CVE_STATUS[CVE-2025-38114] = "fixed-version: only affects 6.13 onwards" | ||
13770 | |||
13771 | CVE_STATUS[CVE-2025-38115] = "cpe-stable-backport: Backported in 6.12.34" | ||
13772 | |||
13773 | CVE_STATUS[CVE-2025-38116] = "fixed-version: only affects 6.14 onwards" | ||
13774 | |||
13775 | CVE_STATUS[CVE-2025-38117] = "cpe-stable-backport: Backported in 6.12.34" | ||
13776 | |||
13777 | CVE_STATUS[CVE-2025-38118] = "cpe-stable-backport: Backported in 6.12.34" | ||
13778 | |||
13779 | CVE_STATUS[CVE-2025-38119] = "cpe-stable-backport: Backported in 6.12.34" | ||
13780 | |||
13781 | CVE_STATUS[CVE-2025-38120] = "cpe-stable-backport: Backported in 6.12.34" | ||
13782 | |||
13783 | CVE_STATUS[CVE-2025-38121] = "fixed-version: only affects 6.14 onwards" | ||
13784 | |||
13785 | CVE_STATUS[CVE-2025-38122] = "cpe-stable-backport: Backported in 6.12.34" | ||
13786 | |||
13787 | CVE_STATUS[CVE-2025-38123] = "cpe-stable-backport: Backported in 6.12.34" | ||
13788 | |||
13789 | CVE_STATUS[CVE-2025-38124] = "cpe-stable-backport: Backported in 6.12.34" | ||
13790 | |||
13791 | CVE_STATUS[CVE-2025-38125] = "cpe-stable-backport: Backported in 6.12.34" | ||
13792 | |||
13793 | CVE_STATUS[CVE-2025-38126] = "cpe-stable-backport: Backported in 6.12.34" | ||
13794 | |||
13795 | CVE_STATUS[CVE-2025-38127] = "cpe-stable-backport: Backported in 6.12.34" | ||
13796 | |||
13797 | CVE_STATUS[CVE-2025-38128] = "fixed-version: only affects 6.13 onwards" | ||
13798 | |||
13799 | CVE_STATUS[CVE-2025-38129] = "cpe-stable-backport: Backported in 6.12.34" | ||
13800 | |||
13801 | CVE_STATUS[CVE-2025-38130] = "fixed-version: only affects 6.14 onwards" | ||
13802 | |||
13803 | CVE_STATUS[CVE-2025-38131] = "cpe-stable-backport: Backported in 6.12.34" | ||
13804 | |||
13805 | # CVE-2025-38132 needs backporting (fixed from 6.16rc1) | ||
13806 | |||
13807 | CVE_STATUS[CVE-2025-38133] = "fixed-version: only affects 6.15 onwards" | ||
13808 | |||
13809 | CVE_STATUS[CVE-2025-38134] = "cpe-stable-backport: Backported in 6.12.34" | ||
13810 | |||
13811 | CVE_STATUS[CVE-2025-38135] = "cpe-stable-backport: Backported in 6.12.34" | ||
13812 | |||
13813 | CVE_STATUS[CVE-2025-38136] = "cpe-stable-backport: Backported in 6.12.34" | ||
13814 | |||
13815 | # CVE-2025-38137 needs backporting (fixed from 6.16rc1) | ||
13816 | |||
13817 | CVE_STATUS[CVE-2025-38138] = "cpe-stable-backport: Backported in 6.12.34" | ||
13818 | |||
13819 | # CVE-2025-38139 needs backporting (fixed from 6.16rc1) | ||
13820 | |||
13821 | # CVE-2025-38140 needs backporting (fixed from 6.16rc1) | ||
13822 | |||
13823 | CVE_STATUS[CVE-2025-38141] = "cpe-stable-backport: Backported in 6.12.34" | ||
13824 | |||
13825 | CVE_STATUS[CVE-2025-38142] = "cpe-stable-backport: Backported in 6.12.34" | ||
13826 | |||
13827 | CVE_STATUS[CVE-2025-38143] = "cpe-stable-backport: Backported in 6.12.34" | ||
13828 | |||
13829 | CVE_STATUS[CVE-2025-38144] = "fixed-version: only affects 6.15 onwards" | ||
13830 | |||
13831 | CVE_STATUS[CVE-2025-38145] = "cpe-stable-backport: Backported in 6.12.34" | ||
13832 | |||
13833 | CVE_STATUS[CVE-2025-38146] = "cpe-stable-backport: Backported in 6.12.34" | ||
13834 | |||
13835 | CVE_STATUS[CVE-2025-38147] = "cpe-stable-backport: Backported in 6.12.34" | ||
13836 | |||
13837 | CVE_STATUS[CVE-2025-38148] = "cpe-stable-backport: Backported in 6.12.34" | ||
13838 | |||
13839 | CVE_STATUS[CVE-2025-38149] = "cpe-stable-backport: Backported in 6.12.34" | ||
13840 | |||
13841 | CVE_STATUS[CVE-2025-38150] = "fixed-version: only affects 6.15 onwards" | ||
13842 | |||
13843 | CVE_STATUS[CVE-2025-38151] = "cpe-stable-backport: Backported in 6.12.34" | ||
13844 | |||
12992 | CVE_STATUS[CVE-2025-38152] = "cpe-stable-backport: Backported in 6.12.23" | 13845 | CVE_STATUS[CVE-2025-38152] = "cpe-stable-backport: Backported in 6.12.23" |
12993 | 13846 | ||
13847 | CVE_STATUS[CVE-2025-38153] = "cpe-stable-backport: Backported in 6.12.34" | ||
13848 | |||
13849 | CVE_STATUS[CVE-2025-38154] = "cpe-stable-backport: Backported in 6.12.34" | ||
13850 | |||
13851 | CVE_STATUS[CVE-2025-38155] = "cpe-stable-backport: Backported in 6.12.34" | ||
13852 | |||
13853 | CVE_STATUS[CVE-2025-38156] = "cpe-stable-backport: Backported in 6.12.34" | ||
13854 | |||
13855 | CVE_STATUS[CVE-2025-38157] = "cpe-stable-backport: Backported in 6.12.34" | ||
13856 | |||
13857 | CVE_STATUS[CVE-2025-38158] = "cpe-stable-backport: Backported in 6.12.34" | ||
13858 | |||
13859 | CVE_STATUS[CVE-2025-38159] = "cpe-stable-backport: Backported in 6.12.34" | ||
13860 | |||
13861 | CVE_STATUS[CVE-2025-38160] = "cpe-stable-backport: Backported in 6.12.34" | ||
13862 | |||
13863 | CVE_STATUS[CVE-2025-38161] = "cpe-stable-backport: Backported in 6.12.34" | ||
13864 | |||
13865 | CVE_STATUS[CVE-2025-38162] = "cpe-stable-backport: Backported in 6.12.34" | ||
13866 | |||
13867 | CVE_STATUS[CVE-2025-38163] = "cpe-stable-backport: Backported in 6.12.34" | ||
13868 | |||
13869 | CVE_STATUS[CVE-2025-38164] = "cpe-stable-backport: Backported in 6.12.34" | ||
13870 | |||
13871 | CVE_STATUS[CVE-2025-38165] = "cpe-stable-backport: Backported in 6.12.34" | ||
13872 | |||
13873 | CVE_STATUS[CVE-2025-38166] = "cpe-stable-backport: Backported in 6.12.34" | ||
13874 | |||
13875 | CVE_STATUS[CVE-2025-38167] = "cpe-stable-backport: Backported in 6.12.34" | ||
13876 | |||
13877 | CVE_STATUS[CVE-2025-38168] = "cpe-stable-backport: Backported in 6.12.34" | ||
13878 | |||
13879 | CVE_STATUS[CVE-2025-38169] = "cpe-stable-backport: Backported in 6.12.34" | ||
13880 | |||
13881 | CVE_STATUS[CVE-2025-38170] = "cpe-stable-backport: Backported in 6.12.34" | ||
13882 | |||
13883 | CVE_STATUS[CVE-2025-38171] = "fixed-version: only affects 6.15 onwards" | ||
13884 | |||
13885 | CVE_STATUS[CVE-2025-38172] = "cpe-stable-backport: Backported in 6.12.34" | ||
13886 | |||
13887 | CVE_STATUS[CVE-2025-38173] = "cpe-stable-backport: Backported in 6.12.34" | ||
13888 | |||
13889 | CVE_STATUS[CVE-2025-38174] = "cpe-stable-backport: Backported in 6.12.33" | ||
13890 | |||
13891 | CVE_STATUS[CVE-2025-38175] = "fixed-version: only affects 6.14 onwards" | ||
13892 | |||
13893 | CVE_STATUS[CVE-2025-38176] = "fixed-version: only affects 6.14 onwards" | ||
13894 | |||
13895 | CVE_STATUS[CVE-2025-38177] = "cpe-stable-backport: Backported in 6.12.28" | ||
13896 | |||
13897 | CVE_STATUS[CVE-2025-38178] = "fixed-version: only affects 6.16rc1 onwards" | ||
13898 | |||
13899 | CVE_STATUS[CVE-2025-38179] = "cpe-stable-backport: Backported in 6.12.35" | ||
13900 | |||
13901 | CVE_STATUS[CVE-2025-38180] = "cpe-stable-backport: Backported in 6.12.35" | ||
13902 | |||
13903 | CVE_STATUS[CVE-2025-38181] = "cpe-stable-backport: Backported in 6.12.35" | ||
13904 | |||
13905 | CVE_STATUS[CVE-2025-38182] = "cpe-stable-backport: Backported in 6.12.35" | ||
13906 | |||
13907 | CVE_STATUS[CVE-2025-38183] = "cpe-stable-backport: Backported in 6.12.35" | ||
13908 | |||
13909 | CVE_STATUS[CVE-2025-38184] = "cpe-stable-backport: Backported in 6.12.35" | ||
13910 | |||
13911 | CVE_STATUS[CVE-2025-38185] = "cpe-stable-backport: Backported in 6.12.35" | ||
13912 | |||
13913 | CVE_STATUS[CVE-2025-38186] = "cpe-stable-backport: Backported in 6.12.35" | ||
13914 | |||
13915 | # CVE-2025-38187 needs backporting (fixed from 6.16rc3) | ||
13916 | |||
13917 | CVE_STATUS[CVE-2025-38188] = "cpe-stable-backport: Backported in 6.12.35" | ||
13918 | |||
13919 | CVE_STATUS[CVE-2025-38189] = "cpe-stable-backport: Backported in 6.12.35" | ||
13920 | |||
13921 | CVE_STATUS[CVE-2025-38190] = "cpe-stable-backport: Backported in 6.12.35" | ||
13922 | |||
13923 | CVE_STATUS[CVE-2025-38191] = "cpe-stable-backport: Backported in 6.12.35" | ||
13924 | |||
13925 | CVE_STATUS[CVE-2025-38192] = "cpe-stable-backport: Backported in 6.12.35" | ||
13926 | |||
13927 | CVE_STATUS[CVE-2025-38193] = "cpe-stable-backport: Backported in 6.12.35" | ||
13928 | |||
13929 | CVE_STATUS[CVE-2025-38194] = "cpe-stable-backport: Backported in 6.12.35" | ||
13930 | |||
13931 | CVE_STATUS[CVE-2025-38195] = "cpe-stable-backport: Backported in 6.12.35" | ||
13932 | |||
13933 | CVE_STATUS[CVE-2025-38196] = "fixed-version: only affects 6.13 onwards" | ||
13934 | |||
13935 | CVE_STATUS[CVE-2025-38197] = "cpe-stable-backport: Backported in 6.12.35" | ||
13936 | |||
13937 | CVE_STATUS[CVE-2025-38198] = "cpe-stable-backport: Backported in 6.12.35" | ||
13938 | |||
13939 | # CVE-2025-38199 needs backporting (fixed from 6.16rc1) | ||
13940 | |||
13941 | CVE_STATUS[CVE-2025-38200] = "cpe-stable-backport: Backported in 6.12.35" | ||
13942 | |||
13943 | CVE_STATUS[CVE-2025-38201] = "cpe-stable-backport: Backported in 6.12.35" | ||
13944 | |||
13945 | CVE_STATUS[CVE-2025-38202] = "cpe-stable-backport: Backported in 6.12.35" | ||
13946 | |||
13947 | # CVE-2025-38203 needs backporting (fixed from 6.16rc1) | ||
13948 | |||
13949 | # CVE-2025-38204 needs backporting (fixed from 6.16rc1) | ||
13950 | |||
13951 | # CVE-2025-38205 needs backporting (fixed from 6.16rc1) | ||
13952 | |||
13953 | # CVE-2025-38206 needs backporting (fixed from 6.16rc1) | ||
13954 | |||
13955 | # CVE-2025-38207 needs backporting (fixed from 6.16rc1) | ||
13956 | |||
13957 | CVE_STATUS[CVE-2025-38208] = "cpe-stable-backport: Backported in 6.12.35" | ||
13958 | |||
13959 | CVE_STATUS[CVE-2025-38209] = "fixed-version: only affects 6.15 onwards" | ||
13960 | |||
13961 | CVE_STATUS[CVE-2025-38210] = "cpe-stable-backport: Backported in 6.12.35" | ||
13962 | |||
13963 | CVE_STATUS[CVE-2025-38211] = "cpe-stable-backport: Backported in 6.12.35" | ||
13964 | |||
13965 | CVE_STATUS[CVE-2025-38212] = "cpe-stable-backport: Backported in 6.12.35" | ||
13966 | |||
13967 | CVE_STATUS[CVE-2025-38213] = "cpe-stable-backport: Backported in 6.12.35" | ||
13968 | |||
13969 | CVE_STATUS[CVE-2025-38214] = "cpe-stable-backport: Backported in 6.12.35" | ||
13970 | |||
13971 | CVE_STATUS[CVE-2025-38215] = "cpe-stable-backport: Backported in 6.12.35" | ||
13972 | |||
13973 | CVE_STATUS[CVE-2025-38216] = "cpe-stable-backport: Backported in 6.12.35" | ||
13974 | |||
13975 | CVE_STATUS[CVE-2025-38217] = "cpe-stable-backport: Backported in 6.12.35" | ||
13976 | |||
13977 | CVE_STATUS[CVE-2025-38218] = "cpe-stable-backport: Backported in 6.12.35" | ||
13978 | |||
13979 | CVE_STATUS[CVE-2025-38219] = "cpe-stable-backport: Backported in 6.12.35" | ||
13980 | |||
13981 | CVE_STATUS[CVE-2025-38220] = "cpe-stable-backport: Backported in 6.12.35" | ||
13982 | |||
13983 | CVE_STATUS[CVE-2025-38221] = "fixed-version: only affects 6.15 onwards" | ||
13984 | |||
13985 | CVE_STATUS[CVE-2025-38222] = "cpe-stable-backport: Backported in 6.12.35" | ||
13986 | |||
13987 | CVE_STATUS[CVE-2025-38223] = "cpe-stable-backport: Backported in 6.12.35" | ||
13988 | |||
13989 | CVE_STATUS[CVE-2025-38224] = "cpe-stable-backport: Backported in 6.12.35" | ||
13990 | |||
13991 | CVE_STATUS[CVE-2025-38225] = "cpe-stable-backport: Backported in 6.12.35" | ||
13992 | |||
13993 | CVE_STATUS[CVE-2025-38226] = "cpe-stable-backport: Backported in 6.12.35" | ||
13994 | |||
13995 | CVE_STATUS[CVE-2025-38227] = "cpe-stable-backport: Backported in 6.12.35" | ||
13996 | |||
13997 | CVE_STATUS[CVE-2025-38228] = "cpe-stable-backport: Backported in 6.12.35" | ||
13998 | |||
13999 | CVE_STATUS[CVE-2025-38229] = "cpe-stable-backport: Backported in 6.12.35" | ||
14000 | |||
14001 | CVE_STATUS[CVE-2025-38230] = "cpe-stable-backport: Backported in 6.12.36" | ||
14002 | |||
14003 | CVE_STATUS[CVE-2025-38231] = "cpe-stable-backport: Backported in 6.12.35" | ||
14004 | |||
14005 | CVE_STATUS[CVE-2025-38232] = "cpe-stable-backport: Backported in 6.12.35" | ||
14006 | |||
14007 | CVE_STATUS[CVE-2025-38233] = "fixed-version: only affects 6.13 onwards" | ||
14008 | |||
14009 | # CVE-2025-38234 needs backporting (fixed from 6.16rc1) | ||
14010 | |||
14011 | CVE_STATUS[CVE-2025-38235] = "fixed-version: only affects 6.15 onwards" | ||
14012 | |||
14013 | CVE_STATUS[CVE-2025-38236] = "cpe-stable-backport: Backported in 6.12.36" | ||
14014 | |||
14015 | # CVE-2025-38237 needs backporting (fixed from 6.16rc1) | ||
14016 | |||
12994 | CVE_STATUS[CVE-2025-38240] = "cpe-stable-backport: Backported in 6.12.23" | 14017 | CVE_STATUS[CVE-2025-38240] = "cpe-stable-backport: Backported in 6.12.23" |
12995 | 14018 | ||
12996 | CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23" | 14019 | CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23" |
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 5a7bad9017..baa13c866e 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb | |||
@@ -14,13 +14,13 @@ python () { | |||
14 | raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") | 14 | raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") |
15 | } | 15 | } |
16 | 16 | ||
17 | SRCREV_machine ?= "7cb6d42c40de351ecab0a083aef260f84407de0d" | 17 | SRCREV_machine ?= "6f409db4f0082642197240f39b8a58850c8eb884" |
18 | SRCREV_meta ?= "60b8562e9989f268ad5d241989f56b71cfa1f648" | 18 | SRCREV_meta ?= "f8cd1607519efd135e4037c84b6e42684b12c5a8" |
19 | 19 | ||
20 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ | 20 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ |
21 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" | 21 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" |
22 | 22 | ||
23 | LINUX_VERSION ?= "6.12.31" | 23 | LINUX_VERSION ?= "6.12.36" |
24 | 24 | ||
25 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | 25 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" |
26 | 26 | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 0fad73dddd..ec2136f035 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb | |||
@@ -8,7 +8,7 @@ require recipes-kernel/linux/linux-yocto.inc | |||
8 | # CVE exclusions | 8 | # CVE exclusions |
9 | include recipes-kernel/linux/cve-exclusion_6.12.inc | 9 | include recipes-kernel/linux/cve-exclusion_6.12.inc |
10 | 10 | ||
11 | LINUX_VERSION ?= "6.12.31" | 11 | LINUX_VERSION ?= "6.12.36" |
12 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | 12 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" |
13 | 13 | ||
14 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | 14 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" |
@@ -17,8 +17,8 @@ DEPENDS += "openssl-native util-linux-native" | |||
17 | KMETA = "kernel-meta" | 17 | KMETA = "kernel-meta" |
18 | KCONF_BSP_AUDIT_LEVEL = "2" | 18 | KCONF_BSP_AUDIT_LEVEL = "2" |
19 | 19 | ||
20 | SRCREV_machine ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | 20 | SRCREV_machine ?= "5633e9a98a153afa6b2051b116faef6c5e855bd8" |
21 | SRCREV_meta ?= "60b8562e9989f268ad5d241989f56b71cfa1f648" | 21 | SRCREV_meta ?= "f8cd1607519efd135e4037c84b6e42684b12c5a8" |
22 | 22 | ||
23 | PV = "${LINUX_VERSION}+git" | 23 | PV = "${LINUX_VERSION}+git" |
24 | 24 | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto.inc b/meta/recipes-kernel/linux/linux-yocto.inc index 389329030d..4d0a726bb6 100644 --- a/meta/recipes-kernel/linux/linux-yocto.inc +++ b/meta/recipes-kernel/linux/linux-yocto.inc | |||
@@ -37,6 +37,22 @@ KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'efi', 'cfg/ | |||
37 | KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'numa', 'features/numa/numa.scc', '', d)}" | 37 | KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'numa', 'features/numa/numa.scc', '', d)}" |
38 | KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'vfat', 'cfg/fs/vfat.scc', '', d)}" | 38 | KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'vfat', 'cfg/fs/vfat.scc', '', d)}" |
39 | 39 | ||
40 | KERNEL_FEATURES_RISCV = "\ | ||
41 | arch/riscv/tunes/riscv-isa-clear.scc \ | ||
42 | ${@bb.utils.contains( 'TUNE_FEATURES', 'rv 32 i m a', 'arch/riscv/tunes/riscv-isa-rv32i.scc', '', d)} \ | ||
43 | ${@bb.utils.contains( 'TUNE_FEATURES', 'rv 64 i m a', 'arch/riscv/tunes/riscv-isa-rv64i.scc', '', d)} \ | ||
44 | ${@bb.utils.contains( 'TUNE_FEATURES', 'f d', 'arch/riscv/tunes/riscv-isa-fpu.scc', '', d)} \ | ||
45 | ${@bb.utils.contains( 'TUNE_FEATURES', 'c', 'arch/riscv/tunes/riscv-isa-c.scc', '', d)} \ | ||
46 | ${@bb.utils.contains( 'TUNE_FEATURES', 'v', 'arch/riscv/tunes/riscv-isa-v.scc', '', d)} \ | ||
47 | ${@bb.utils.contains_any('TUNE_FEATURES', 'b zba', 'arch/riscv/tunes/riscv-isa-zba.scc', '', d)} \ | ||
48 | ${@bb.utils.contains_any('TUNE_FEATURES', 'b zbb', 'arch/riscv/tunes/riscv-isa-zbb.scc', '', d)} \ | ||
49 | ${@bb.utils.contains( 'TUNE_FEATURES', 'zbc', 'arch/riscv/tunes/riscv-isa-zbc.scc', '', d)} \ | ||
50 | ${@bb.utils.contains( 'TUNE_FEATURES', 'zicbom', 'arch/riscv/tunes/riscv-isa-zicbom.scc', '', d)} \ | ||
51 | " | ||
52 | |||
53 | KERNEL_FEATURES:append:riscv32 = " ${KERNEL_FEATURES_RISCV}" | ||
54 | KERNEL_FEATURES:append:riscv64 = " ${KERNEL_FEATURES_RISCV}" | ||
55 | |||
40 | # A KMACHINE is the mapping of a yocto $MACHINE to what is built | 56 | # A KMACHINE is the mapping of a yocto $MACHINE to what is built |
41 | # by the kernel. This is typically the branch that should be built, | 57 | # by the kernel. This is typically the branch that should be built, |
42 | # and it can be specific to the machine or shared | 58 | # and it can be specific to the machine or shared |
diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index 262ae35704..205c8a3ed5 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb | |||
@@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" | |||
18 | KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" | 18 | KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" |
19 | KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" | 19 | KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" |
20 | 20 | ||
21 | SRCREV_machine:qemuarm ?= "37a1fd13ca538e7785daf01434495a614bc55ead" | 21 | SRCREV_machine:qemuarm ?= "511b6848cd392ee9bbc841794a5e905f4db31689" |
22 | SRCREV_machine:qemuarm64 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | 22 | SRCREV_machine:qemuarm64 ?= "5633e9a98a153afa6b2051b116faef6c5e855bd8" |
23 | SRCREV_machine:qemuloongarch64 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | 23 | SRCREV_machine:qemuloongarch64 ?= "5633e9a98a153afa6b2051b116faef6c5e855bd8" |
24 | SRCREV_machine:qemumips ?= "2bcf58ea5aa19d54c436e63c59ab09b307e9ee8e" | 24 | SRCREV_machine:qemumips ?= "afbfb2216d4f16a231b834922a937641864c8931" |
25 | SRCREV_machine:qemuppc ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | 25 | SRCREV_machine:qemuppc ?= "5633e9a98a153afa6b2051b116faef6c5e855bd8" |
26 | SRCREV_machine:qemuriscv64 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | 26 | SRCREV_machine:qemuriscv64 ?= "5633e9a98a153afa6b2051b116faef6c5e855bd8" |
27 | SRCREV_machine:qemuriscv32 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | 27 | SRCREV_machine:qemuriscv32 ?= "5633e9a98a153afa6b2051b116faef6c5e855bd8" |
28 | SRCREV_machine:qemux86 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | 28 | SRCREV_machine:qemux86 ?= "5633e9a98a153afa6b2051b116faef6c5e855bd8" |
29 | SRCREV_machine:qemux86-64 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | 29 | SRCREV_machine:qemux86-64 ?= "5633e9a98a153afa6b2051b116faef6c5e855bd8" |
30 | SRCREV_machine:qemumips64 ?= "6470f58a8f04951f202cf85afb4421d2e7ec9995" | 30 | SRCREV_machine:qemumips64 ?= "707ad7179119ed07e5911b61b08b7b11d2c9a352" |
31 | SRCREV_machine ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | 31 | SRCREV_machine ?= "5633e9a98a153afa6b2051b116faef6c5e855bd8" |
32 | SRCREV_meta ?= "60b8562e9989f268ad5d241989f56b71cfa1f648" | 32 | SRCREV_meta ?= "f8cd1607519efd135e4037c84b6e42684b12c5a8" |
33 | 33 | ||
34 | # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll | 34 | # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll |
35 | # get the <version>/base branch, which is pure upstream -stable, and the same | 35 | # get the <version>/base branch, which is pure upstream -stable, and the same |
36 | # meta SRCREV as the linux-yocto-standard builds. Select your version using the | 36 | # meta SRCREV as the linux-yocto-standard builds. Select your version using the |
37 | # normal PREFERRED_VERSION settings. | 37 | # normal PREFERRED_VERSION settings. |
38 | BBCLASSEXTEND = "devupstream:target" | 38 | BBCLASSEXTEND = "devupstream:target" |
39 | SRCREV_machine:class-devupstream ?= "df3f6d10f353de274cc7c87f52dba5d26f185393" | 39 | SRCREV_machine:class-devupstream ?= "df64e51d4ab83244b6a4eb11eb41f89403611e24" |
40 | PN:class-devupstream = "linux-yocto-upstream" | 40 | PN:class-devupstream = "linux-yocto-upstream" |
41 | KBRANCH:class-devupstream = "v6.12/base" | 41 | KBRANCH:class-devupstream = "v6.12/base" |
42 | 42 | ||
@@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA | |||
44 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" | 44 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" |
45 | 45 | ||
46 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | 46 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" |
47 | LINUX_VERSION ?= "6.12.31" | 47 | LINUX_VERSION ?= "6.12.36" |
48 | 48 | ||
49 | PV = "${LINUX_VERSION}+git" | 49 | PV = "${LINUX_VERSION}+git" |
50 | 50 | ||
diff --git a/meta/recipes-support/icu/icu/0001-ICU-23120-Mask-UnicodeStringTest-TestLargeMemory-on-.patch b/meta/recipes-support/icu/icu/0001-ICU-23120-Mask-UnicodeStringTest-TestLargeMemory-on-.patch new file mode 100644 index 0000000000..e2e9546679 --- /dev/null +++ b/meta/recipes-support/icu/icu/0001-ICU-23120-Mask-UnicodeStringTest-TestLargeMemory-on-.patch | |||
@@ -0,0 +1,28 @@ | |||
1 | From 4b3e6888c2aaba6465f1bc96f61b17a2513050f3 Mon Sep 17 00:00:00 2001 | ||
2 | From: David Seifert <soap@gentoo.org> | ||
3 | Date: Sat, 21 Jun 2025 12:28:15 +0200 | ||
4 | Subject: [PATCH] ICU-23120 Mask UnicodeStringTest::TestLargeMemory on 32-bit | ||
5 | platforms | ||
6 | |||
7 | Upstream-Status: Submitted [https://github.com/unicode-org/icu/pull/3496] | ||
8 | Signed-off-by: Daisuke Yamane <yamane07ynct@gmail.com> | ||
9 | --- | ||
10 | test/intltest/ustrtest.cpp | 2 +- | ||
11 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
12 | |||
13 | diff --git a/test/intltest/ustrtest.cpp b/test/intltest/ustrtest.cpp | ||
14 | index 56976b3e3d2..26225f5b5b5 100644 | ||
15 | --- a/test/intltest/ustrtest.cpp | ||
16 | +++ b/test/intltest/ustrtest.cpp | ||
17 | @@ -2353,7 +2353,7 @@ void UnicodeStringTest::TestUnicodeStringInsertAppendToSelf() { | ||
18 | } | ||
19 | |||
20 | void UnicodeStringTest::TestLargeMemory() { | ||
21 | -#if U_PLATFORM_IS_LINUX_BASED || U_PLATFORM_IS_DARWIN_BASED | ||
22 | +#if (U_PLATFORM_IS_LINUX_BASED || U_PLATFORM_IS_DARWIN_BASED) && (UINTPTR_MAX == 0xFFFFFFFFFFFFFFFF) | ||
23 | if(quick) { return; } | ||
24 | IcuTestErrorCode status(*this, "TestLargeMemory"); | ||
25 | constexpr uint32_t len = 2147483643; | ||
26 | -- | ||
27 | 2.43.0 | ||
28 | |||
diff --git a/meta/recipes-support/icu/icu/0001-test-Add-support-ptest.patch b/meta/recipes-support/icu/icu/0001-test-Add-support-ptest.patch new file mode 100644 index 0000000000..88350c0db5 --- /dev/null +++ b/meta/recipes-support/icu/icu/0001-test-Add-support-ptest.patch | |||
@@ -0,0 +1,84 @@ | |||
1 | From 783d9e0d3d7824fbca53c2c3a80e8e5e23eacc82 Mon Sep 17 00:00:00 2001 | ||
2 | From: Daisuke Yamane <yamane07ynct@gmail.com> | ||
3 | Date: Tue, 1 Jul 2025 18:35:25 +0900 | ||
4 | Subject: [PATCH] test: Add support ptest | ||
5 | |||
6 | Upstream-Status: Inappropriate [oe-core specific] | ||
7 | |||
8 | Signed-off-by: Daisuke Yamane <yamane07ynct@gmail.com> | ||
9 | --- | ||
10 | test/cintltst/Makefile.in | 2 +- | ||
11 | test/intltest/Makefile.in | 2 +- | ||
12 | test/intltest/intltest.cpp | 2 +- | ||
13 | test/iotest/Makefile.in | 2 +- | ||
14 | test/letest/Makefile.in | 2 +- | ||
15 | 5 files changed, 5 insertions(+), 5 deletions(-) | ||
16 | |||
17 | diff --git a/test/cintltst/Makefile.in b/test/cintltst/Makefile.in | ||
18 | index 552a105..9cf3071 100644 | ||
19 | --- a/test/cintltst/Makefile.in | ||
20 | +++ b/test/cintltst/Makefile.in | ||
21 | @@ -39,7 +39,7 @@ CPPFLAGS += -I$(top_srcdir)/common -I$(top_srcdir)/i18n -I$(top_srcdir)/tools/ct | ||
22 | ifdef QNX_TARGET | ||
23 | DEFS += -D'ICU_UNICODE_VERSION="$(UNICODE_VERSION)"' -D'ICU_VERSION="@VERSION@"' -D'ICUDATA_NAME="$(ICUDATA_PLATFORM_NAME)"' -D'U_TOPSRCDIR="/var/icu_tests"' -D'U_TOPBUILDDIR="/var/icu_tests/"' | ||
24 | else | ||
25 | -DEFS += -D'ICU_UNICODE_VERSION="$(UNICODE_VERSION)"' -D'ICU_VERSION="@VERSION@"' -D'ICUDATA_NAME="$(ICUDATA_PLATFORM_NAME)"' -D'U_TOPSRCDIR="$(top_srcdir)/"' -D'U_TOPBUILDDIR="$(BUILDDIR)"' | ||
26 | +DEFS += -D'ICU_UNICODE_VERSION="$(UNICODE_VERSION)"' -D'ICU_VERSION="@VERSION@"' -D'ICUDATA_NAME="$(ICUDATA_PLATFORM_NAME)"' -D'U_TOPSRCDIR="$(PTEST_PATH)/"' -D'U_TOPBUILDDIR="$(PTEST_PATH)/"' | ||
27 | endif | ||
28 | LIBS = $(LIBCTESTFW) $(LIBICUI18N) $(LIBICUTOOLUTIL) $(LIBICUUC) $(DEFAULT_LIBS) $(LIB_M) | ||
29 | |||
30 | diff --git a/test/intltest/Makefile.in b/test/intltest/Makefile.in | ||
31 | index 5d4a03b..ca4e4cd 100644 | ||
32 | --- a/test/intltest/Makefile.in | ||
33 | +++ b/test/intltest/Makefile.in | ||
34 | @@ -39,7 +39,7 @@ CPPFLAGS += -DUNISTR_FROM_CHAR_EXPLICIT= -DUNISTR_FROM_STRING_EXPLICIT= | ||
35 | ifdef QNX_TARGET | ||
36 | DEFS += -D'U_TOPSRCDIR="/var/icu_tests"' -D'U_TOPBUILDDIR="/var/icu_tests/"' | ||
37 | else | ||
38 | -DEFS += -D'U_TOPSRCDIR="$(top_srcdir)/"' -D'U_TOPBUILDDIR="$(BUILDDIR)"' | ||
39 | +DEFS += -D'U_TOPSRCDIR="$(PTEST_PATH)/"' -D'U_TOPBUILDDIR="$(PTEST_PATH)/"' | ||
40 | endif | ||
41 | LIBS = $(LIBCTESTFW) $(LIBICUI18N) $(LIBICUUC) $(LIBICUTOOLUTIL) $(DEFAULT_LIBS) $(LIB_M) $(LIB_THREAD) | ||
42 | |||
43 | diff --git a/test/intltest/intltest.cpp b/test/intltest/intltest.cpp | ||
44 | index 3806d0f..33829b0 100644 | ||
45 | --- a/test/intltest/intltest.cpp | ||
46 | +++ b/test/intltest/intltest.cpp | ||
47 | @@ -1713,7 +1713,7 @@ static bool fileExists(const char* fileName) { | ||
48 | * Returns the path to icu/testdata/ | ||
49 | */ | ||
50 | const char *IntlTest::getSharedTestData(UErrorCode& err) { | ||
51 | -#define SOURCE_TARBALL_TOP U_TOPSRCDIR U_FILE_SEP_STRING ".." U_FILE_SEP_STRING | ||
52 | +#define SOURCE_TARBALL_TOP U_TOPSRCDIR U_FILE_SEP_STRING | ||
53 | #define REPO_TOP SOURCE_TARBALL_TOP ".." U_FILE_SEP_STRING | ||
54 | #define FILE_NAME U_FILE_SEP_STRING "message2" U_FILE_SEP_STRING "valid-tests.json" | ||
55 | const char *srcDataDir = nullptr; | ||
56 | diff --git a/test/iotest/Makefile.in b/test/iotest/Makefile.in | ||
57 | index 16c510f..9eeff4b 100644 | ||
58 | --- a/test/iotest/Makefile.in | ||
59 | +++ b/test/iotest/Makefile.in | ||
60 | @@ -39,7 +39,7 @@ CPPFLAGS += -DUNISTR_FROM_CHAR_EXPLICIT= -DUNISTR_FROM_STRING_EXPLICIT= | ||
61 | ifdef QNX_TARGET | ||
62 | DEFS += -D'U_TOPSRCDIR="/var/icu_tests"' -D'U_TOPBUILDDIR="/var/icu_tests/"' | ||
63 | else | ||
64 | -DEFS += -D'U_TOPSRCDIR="$(top_srcdir)/"' -D'U_TOPBUILDDIR="$(BUILDDIR)"' | ||
65 | +DEFS += -D'U_TOPSRCDIR="$(PTEST_PATH)/"' -D'U_TOPBUILDDIR="$(PTEST_PATH)/"' | ||
66 | endif | ||
67 | LIBS = $(LIBCTESTFW) $(LIBICUTOOLUTIL) $(LIBICUIO) $(LIBICUI18N) $(LIBICUUC) $(DEFAULT_LIBS) $(LIB_M) | ||
68 | |||
69 | diff --git a/test/letest/Makefile.in b/test/letest/Makefile.in | ||
70 | index 156c86f..555a820 100644 | ||
71 | --- a/test/letest/Makefile.in | ||
72 | +++ b/test/letest/Makefile.in | ||
73 | @@ -30,7 +30,7 @@ BUILDDIR := $(BUILDDIR:test\\cintltst/../../=) | ||
74 | BUILDDIR := $(BUILDDIR:TEST\\CINTLTST/../../=) | ||
75 | |||
76 | CPPFLAGS += -I$(top_srcdir)/common -I$(top_srcdir)/i18n -I$(top_srcdir)/tools/ctestfw -I$(top_srcdir)/tools/toolutil -I$(top_srcdir)/layoutex $(ICULE_CFLAGS) $(ICULEHB_CFLAGS) | ||
77 | -DEFS += -D'U_TOPSRCDIR="$(top_srcdir)/"' -D'U_TOPBUILDDIR="$(BUILDDIR)"' | ||
78 | +DEFS += -D'U_TOPSRCDIR="$(PTEST_PATH)/"' -D'U_TOPBUILDDIR="$(PTEST_PATH)/"' | ||
79 | LIBS = $(LIBICULX) $(LIBICUUC) $(LIBICUI18N) $(LIBCTESTFW) $(LIBICUTOOLUTIL) $(DEFAULT_LIBS) $(LIB_M) $(ICULEHB_LIBS) | ||
80 | |||
81 | COMMONOBJECTS = SimpleFontInstance.o | ||
82 | -- | ||
83 | 2.43.0 | ||
84 | |||
diff --git a/meta/recipes-support/icu/icu/run-ptest b/meta/recipes-support/icu/icu/run-ptest new file mode 100755 index 0000000000..e5bf27a822 --- /dev/null +++ b/meta/recipes-support/icu/icu/run-ptest | |||
@@ -0,0 +1,13 @@ | |||
1 | #!/bin/sh | ||
2 | |||
3 | TOPDIR=$(dirname "$(realpath $0)") | ||
4 | cd ${TOPDIR}/test/tests | ||
5 | TESTS=$(find . -executable -type f) | ||
6 | for t in ${TESTS}; do | ||
7 | ./$t | ||
8 | if [ "$?" = "0" ]; then | ||
9 | echo "PASS: $t" | ||
10 | else | ||
11 | echo "FAIL: $t" | ||
12 | fi | ||
13 | done | ||
diff --git a/meta/recipes-support/icu/icu_77-1.bb b/meta/recipes-support/icu/icu_77-1.bb index e655b18ad2..cd81a6c729 100644 --- a/meta/recipes-support/icu/icu_77-1.bb +++ b/meta/recipes-support/icu/icu_77-1.bb | |||
@@ -119,6 +119,9 @@ SRC_URI = "${BASE_SRC_URI};name=code \ | |||
119 | ${DATA_SRC_URI};name=data \ | 119 | ${DATA_SRC_URI};name=data \ |
120 | file://filter.json \ | 120 | file://filter.json \ |
121 | file://0001-icu-Added-armeb-support.patch \ | 121 | file://0001-icu-Added-armeb-support.patch \ |
122 | file://0001-ICU-23120-Mask-UnicodeStringTest-TestLargeMemory-on-.patch \ | ||
123 | file://0001-test-Add-support-ptest.patch \ | ||
124 | file://run-ptest \ | ||
122 | " | 125 | " |
123 | 126 | ||
124 | SRC_URI:append:class-target = "\ | 127 | SRC_URI:append:class-target = "\ |
@@ -160,3 +163,23 @@ do_make_icudata() { | |||
160 | } | 163 | } |
161 | 164 | ||
162 | addtask make_icudata before do_configure after do_patch do_prepare_recipe_sysroot | 165 | addtask make_icudata before do_configure after do_patch do_prepare_recipe_sysroot |
166 | |||
167 | inherit ptest | ||
168 | RDEPENDS:${PN}-ptest += "bash" | ||
169 | |||
170 | do_compile_ptest() { | ||
171 | oe_runmake -C test everything PTEST_PATH=${PTEST_PATH} | ||
172 | } | ||
173 | |||
174 | do_install_ptest() { | ||
175 | install -d ${D}${PTEST_PATH}/test | ||
176 | install -d ${D}${PTEST_PATH}/data | ||
177 | cp -r ${S}/test/testdata ${D}/${PTEST_PATH}/test | ||
178 | cp -r ${S}/data/unidata ${D}/${PTEST_PATH}/data/ | ||
179 | cp -r ${S}/data/sprep ${D}/${PTEST_PATH}/data/ | ||
180 | cp -r ${S}/../testdata ${D}/${PTEST_PATH}/ | ||
181 | cp -r ${B}/test/testdata/out ${D}/${PTEST_PATH}/test/testdata | ||
182 | |||
183 | install -d ${D}${PTEST_PATH}/test/tests | ||
184 | find ${B}/test/ -type f -executable -exec cp {} ${D}${PTEST_PATH}/test/tests \; | ||
185 | } | ||
diff --git a/meta/recipes-support/re2c/re2c_4.2.bb b/meta/recipes-support/re2c/re2c_4.3.bb index 0696080603..eafdf93078 100644 --- a/meta/recipes-support/re2c/re2c_4.2.bb +++ b/meta/recipes-support/re2c/re2c_4.3.bb | |||
@@ -7,7 +7,7 @@ LICENSE = "PD" | |||
7 | LIC_FILES_CHKSUM = "file://LICENSE;md5=64eca4d8a3b67f9dc7656094731a2c8d" | 7 | LIC_FILES_CHKSUM = "file://LICENSE;md5=64eca4d8a3b67f9dc7656094731a2c8d" |
8 | 8 | ||
9 | SRC_URI = "${GITHUB_BASE_URI}/download/${PV}/${BPN}-${PV}.tar.xz" | 9 | SRC_URI = "${GITHUB_BASE_URI}/download/${PV}/${BPN}-${PV}.tar.xz" |
10 | SRC_URI[sha256sum] = "c9dc2b24f340d135a07a1ac63ff53f7f8f74997fed5a4e9132a64050dbc3da1f" | 10 | SRC_URI[sha256sum] = "51e88d6d6b6ab03eb7970276aca7e0db4f8e29c958b84b561d2fdcb8351c7150" |
11 | GITHUB_BASE_URI = "https://github.com/skvadrik/re2c/releases" | 11 | GITHUB_BASE_URI = "https://github.com/skvadrik/re2c/releases" |
12 | 12 | ||
13 | BBCLASSEXTEND = "native nativesdk" | 13 | BBCLASSEXTEND = "native nativesdk" |
diff --git a/scripts/contrib/improve_kernel_cve_report.py b/scripts/contrib/improve_kernel_cve_report.py index 829cc4cd30..5c39df05a5 100755 --- a/scripts/contrib/improve_kernel_cve_report.py +++ b/scripts/contrib/improve_kernel_cve_report.py | |||
@@ -340,6 +340,10 @@ def cve_update(cve_data, cve, entry): | |||
340 | if cve_data[cve]['status'] == entry['status']: | 340 | if cve_data[cve]['status'] == entry['status']: |
341 | return | 341 | return |
342 | if entry['status'] == "Unpatched" and cve_data[cve]['status'] == "Patched": | 342 | if entry['status'] == "Unpatched" and cve_data[cve]['status'] == "Patched": |
343 | # Backported-patch (e.g. vendor kernel repo with cherry-picked CVE patch) | ||
344 | # has priority over unpatch from CNA | ||
345 | if cve_data[cve]['detail'] == "backported-patch": | ||
346 | return | ||
343 | logging.warning("CVE entry %s update from Patched to Unpatched from the scan result", cve) | 347 | logging.warning("CVE entry %s update from Patched to Unpatched from the scan result", cve) |
344 | cve_data[cve] = copy_data(cve_data[cve], entry) | 348 | cve_data[cve] = copy_data(cve_data[cve], entry) |
345 | return | 349 | return |
@@ -441,10 +445,12 @@ def main(): | |||
441 | is_kernel=True | 445 | is_kernel=True |
442 | if not is_kernel: | 446 | if not is_kernel: |
443 | continue | 447 | continue |
444 | 448 | # We remove custom versions after - | |
449 | upstream_version = Version(pkg["version"].split("-")[0]) | ||
450 | logging.info("Checking kernel %s", upstream_version) | ||
445 | kernel_cves = get_kernel_cves(args.datadir, | 451 | kernel_cves = get_kernel_cves(args.datadir, |
446 | compiled_files, | 452 | compiled_files, |
447 | Version(pkg["version"])) | 453 | upstream_version) |
448 | logging.info("Total kernel cves from kernel CNA: %s", len(kernel_cves)) | 454 | logging.info("Total kernel cves from kernel CNA: %s", len(kernel_cves)) |
449 | cves = {issue["id"]: issue for issue in pkg["issue"]} | 455 | cves = {issue["id"]: issue for issue in pkg["issue"]} |
450 | logging.info("Total kernel before processing cves: %s", len(cves)) | 456 | logging.info("Total kernel before processing cves: %s", len(cves)) |