diff options
Diffstat (limited to 'meta/recipes-kernel')
92 files changed, 15196 insertions, 7321 deletions
diff --git a/meta/recipes-kernel/blktrace/blktrace/0001-bno_plot.py-btt_plot.py-Ask-for-python3-specifically.patch b/meta/recipes-kernel/blktrace/blktrace/0001-bno_plot.py-btt_plot.py-Ask-for-python3-specifically.patch new file mode 100644 index 0000000000..e2305a1111 --- /dev/null +++ b/meta/recipes-kernel/blktrace/blktrace/0001-bno_plot.py-btt_plot.py-Ask-for-python3-specifically.patch | |||
@@ -0,0 +1,35 @@ | |||
1 | From 6f4769e6e2c5cdc1262891470995e6dead937c7a Mon Sep 17 00:00:00 2001 | ||
2 | From: Sakib Sajal <sakib.sajal@windriver.com> | ||
3 | Date: Mon, 26 Jun 2023 17:57:36 -0400 | ||
4 | Subject: [PATCH] bno_plot.py, btt_plot.py: Ask for python3 specifically | ||
5 | |||
6 | python2 is deprecated, use python3. | ||
7 | |||
8 | Upstream-Status: Denied [https://www.spinics.net/lists/linux-btrace/msg01364.html] | ||
9 | |||
10 | Signed-off-by: Sakib Sajal <sakib.sajal@windriver.com> | ||
11 | --- | ||
12 | btt/bno_plot.py | 2 +- | ||
13 | btt/btt_plot.py | 2 +- | ||
14 | 2 files changed, 2 insertions(+), 2 deletions(-) | ||
15 | |||
16 | diff --git a/btt/bno_plot.py b/btt/bno_plot.py | ||
17 | index 3aa4e19..d7d7159 100644 | ||
18 | --- a/btt/bno_plot.py | ||
19 | +++ b/btt/bno_plot.py | ||
20 | @@ -1,4 +1,4 @@ | ||
21 | -#! /usr/bin/env python | ||
22 | +#! /usr/bin/env python3 | ||
23 | # | ||
24 | # btt blkno plotting interface | ||
25 | # | ||
26 | diff --git a/btt/btt_plot.py b/btt/btt_plot.py | ||
27 | index 40bc71f..8620d31 100755 | ||
28 | --- a/btt/btt_plot.py | ||
29 | +++ b/btt/btt_plot.py | ||
30 | @@ -1,4 +1,4 @@ | ||
31 | -#! /usr/bin/env python | ||
32 | +#! /usr/bin/env python3 | ||
33 | # | ||
34 | # btt_plot.py: Generate matplotlib plots for BTT generate data files | ||
35 | # | ||
diff --git a/meta/recipes-kernel/blktrace/blktrace_git.bb b/meta/recipes-kernel/blktrace/blktrace_1.3.0.bb index d4f5bac84f..f053490409 100644 --- a/meta/recipes-kernel/blktrace/blktrace_git.bb +++ b/meta/recipes-kernel/blktrace/blktrace_1.3.0.bb | |||
@@ -10,13 +10,11 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=393a5ca445f6965873eca0259a17f833" | |||
10 | 10 | ||
11 | DEPENDS = "libaio" | 11 | DEPENDS = "libaio" |
12 | 12 | ||
13 | SRCREV = "366d30b9cdb20345c5d064af850d686da79b89eb" | 13 | SRC_URI = "git://git.kernel.dk/blktrace.git;protocol=https;branch=master \ |
14 | 14 | file://0001-bno_plot.py-btt_plot.py-Ask-for-python3-specifically.patch \ | |
15 | PV = "1.3.0+git" | 15 | " |
16 | 16 | ||
17 | SRC_URI = "git://git.kernel.dk/blktrace.git;branch=master;protocol=https" | 17 | SRCREV = "366d30b9cdb20345c5d064af850d686da79b89eb" |
18 | |||
19 | S = "${WORKDIR}/git" | ||
20 | 18 | ||
21 | EXTRA_OEMAKE = "\ | 19 | EXTRA_OEMAKE = "\ |
22 | 'CC=${CC}' \ | 20 | 'CC=${CC}' \ |
diff --git a/meta/recipes-kernel/cryptodev/cryptodev-linux_1.13.bb b/meta/recipes-kernel/cryptodev/cryptodev-linux_1.14.bb index d5ea9d8529..451a8d7ef8 100644 --- a/meta/recipes-kernel/cryptodev/cryptodev-linux_1.13.bb +++ b/meta/recipes-kernel/cryptodev/cryptodev-linux_1.14.bb | |||
@@ -4,9 +4,8 @@ SUMMARY = "A /dev/crypto device driver header file" | |||
4 | 4 | ||
5 | do_compile[noexec] = "1" | 5 | do_compile[noexec] = "1" |
6 | 6 | ||
7 | # Just install cryptodev.h which is the only header file needed to be exported | ||
8 | do_install() { | 7 | do_install() { |
9 | install -D ${S}/crypto/cryptodev.h ${D}${includedir}/crypto/cryptodev.h | 8 | oe_runmake headers_install DESTDIR="${D}" |
10 | } | 9 | } |
11 | 10 | ||
12 | ALLOW_EMPTY:${PN} = "1" | 11 | ALLOW_EMPTY:${PN} = "1" |
diff --git a/meta/recipes-kernel/cryptodev/cryptodev-module_1.13.bb b/meta/recipes-kernel/cryptodev/cryptodev-module_1.14.bb index 5192cf03ed..88d76c9d23 100644 --- a/meta/recipes-kernel/cryptodev/cryptodev-module_1.13.bb +++ b/meta/recipes-kernel/cryptodev/cryptodev-module_1.14.bb | |||
@@ -7,10 +7,7 @@ inherit module | |||
7 | # Header file provided by a separate package | 7 | # Header file provided by a separate package |
8 | DEPENDS += "cryptodev-linux" | 8 | DEPENDS += "cryptodev-linux" |
9 | 9 | ||
10 | SRC_URI += "file://0001-Disable-installing-header-file-provided-by-another-p.patch \ | 10 | EXTRA_OEMAKE = 'KERNEL_DIR="${STAGING_KERNEL_DIR}" PREFIX="${D}"' |
11 | " | ||
12 | |||
13 | EXTRA_OEMAKE='KERNEL_DIR="${STAGING_KERNEL_DIR}" PREFIX="${D}"' | ||
14 | 11 | ||
15 | RCONFLICTS:${PN} = "ocf-linux" | 12 | RCONFLICTS:${PN} = "ocf-linux" |
16 | RREPLACES:${PN} = "ocf-linux" | 13 | RREPLACES:${PN} = "ocf-linux" |
diff --git a/meta/recipes-kernel/cryptodev/cryptodev-tests_1.13.bb b/meta/recipes-kernel/cryptodev/cryptodev-tests_1.14.bb index 458ad8ecf2..2cbee8a348 100644 --- a/meta/recipes-kernel/cryptodev/cryptodev-tests_1.13.bb +++ b/meta/recipes-kernel/cryptodev/cryptodev-tests_1.14.bb | |||
@@ -4,11 +4,7 @@ SUMMARY = "A test suite for /dev/crypto device driver" | |||
4 | 4 | ||
5 | DEPENDS += "openssl" | 5 | DEPENDS += "openssl" |
6 | 6 | ||
7 | SRC_URI += " \ | 7 | EXTRA_OEMAKE = 'KERNEL_DIR="${STAGING_EXECPREFIXDIR}" PREFIX="${D}"' |
8 | file://0001-tests-Makefile-do-not-use-Werror.patch \ | ||
9 | " | ||
10 | |||
11 | EXTRA_OEMAKE='KERNEL_DIR="${STAGING_EXECPREFIXDIR}" PREFIX="${D}"' | ||
12 | 8 | ||
13 | do_compile() { | 9 | do_compile() { |
14 | oe_runmake tests | 10 | oe_runmake tests |
diff --git a/meta/recipes-kernel/cryptodev/cryptodev.inc b/meta/recipes-kernel/cryptodev/cryptodev.inc index 64a9c2926b..16a8eb610a 100644 --- a/meta/recipes-kernel/cryptodev/cryptodev.inc +++ b/meta/recipes-kernel/cryptodev/cryptodev.inc | |||
@@ -10,9 +10,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263" | |||
10 | 10 | ||
11 | SRC_URI = "git://github.com/cryptodev-linux/cryptodev-linux;branch=master;protocol=https \ | 11 | SRC_URI = "git://github.com/cryptodev-linux/cryptodev-linux;branch=master;protocol=https \ |
12 | " | 12 | " |
13 | SRCREV = "bb8bc7cf60d2c0b097c8b3b0e807f805b577a53f" | 13 | SRCREV = "135cbff90af2ba97d88f1472be595ce78721972c" |
14 | PV = "1.13+git${SRCPV}" | 14 | PV = "1.14" |
15 | |||
16 | S = "${WORKDIR}/git" | ||
17 | 15 | ||
18 | CLEANBROKEN = "1" | 16 | CLEANBROKEN = "1" |
diff --git a/meta/recipes-kernel/cryptodev/files/0001-Disable-installing-header-file-provided-by-another-p.patch b/meta/recipes-kernel/cryptodev/files/0001-Disable-installing-header-file-provided-by-another-p.patch deleted file mode 100644 index c7fdef4da4..0000000000 --- a/meta/recipes-kernel/cryptodev/files/0001-Disable-installing-header-file-provided-by-another-p.patch +++ /dev/null | |||
@@ -1,25 +0,0 @@ | |||
1 | From 66d85d3f26e21cf7c38b27de0dcc42376f5d853e Mon Sep 17 00:00:00 2001 | ||
2 | From: Denys Dmytriyenko <denys@ti.com> | ||
3 | Date: Sun, 6 Apr 2014 19:51:39 -0400 | ||
4 | Subject: [PATCH] Disable installing header file provided by another package | ||
5 | |||
6 | Signed-off-by: Denys Dmytriyenko <denys@ti.com> | ||
7 | |||
8 | Upstream-Status: Inappropriate [ OE specific ] | ||
9 | |||
10 | --- | ||
11 | Makefile | 1 - | ||
12 | 1 file changed, 1 deletion(-) | ||
13 | |||
14 | diff --git a/Makefile b/Makefile | ||
15 | index d83aee6..c8d8ae5 100644 | ||
16 | --- a/Makefile | ||
17 | +++ b/Makefile | ||
18 | @@ -36,7 +36,6 @@ install: modules_install | ||
19 | |||
20 | modules_install: | ||
21 | $(MAKE) $(KERNEL_MAKE_OPTS) modules_install | ||
22 | - install -m 644 -D crypto/cryptodev.h $(DESTDIR)/$(includedir)/crypto/cryptodev.h | ||
23 | |||
24 | install_tests: tests | ||
25 | $(MAKE) -C tests install DESTDIR=$(PREFIX) | ||
diff --git a/meta/recipes-kernel/cryptodev/files/0001-tests-Makefile-do-not-use-Werror.patch b/meta/recipes-kernel/cryptodev/files/0001-tests-Makefile-do-not-use-Werror.patch deleted file mode 100644 index 3285548a57..0000000000 --- a/meta/recipes-kernel/cryptodev/files/0001-tests-Makefile-do-not-use-Werror.patch +++ /dev/null | |||
@@ -1,25 +0,0 @@ | |||
1 | From 47438e53e1156db0916c0f4683a24fe4d82152f2 Mon Sep 17 00:00:00 2001 | ||
2 | From: Alexander Kanavin <alex@linutronix.de> | ||
3 | Date: Fri, 10 Sep 2021 10:44:42 +0200 | ||
4 | Subject: [PATCH] tests/Makefile: do not use -Werror | ||
5 | |||
6 | Otherwise, openssl 3 deprecation warnings become errors. | ||
7 | Reported at https://github.com/cryptodev-linux/cryptodev-linux/issues/67 | ||
8 | |||
9 | Upstream-Status: Inappropriate [upstream needs to update the code] | ||
10 | Signed-off-by: Alexander Kanavin <alex@linutronix.de> | ||
11 | |||
12 | --- | ||
13 | tests/Makefile | 2 +- | ||
14 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
15 | |||
16 | diff --git a/tests/Makefile b/tests/Makefile | ||
17 | index 2fb7a9a..e94f80e 100644 | ||
18 | --- a/tests/Makefile | ||
19 | +++ b/tests/Makefile | ||
20 | @@ -1,4 +1,4 @@ | ||
21 | -CFLAGS += -I.. $(CRYPTODEV_CFLAGS) -Wall -Werror | ||
22 | +CFLAGS += -I.. $(CRYPTODEV_CFLAGS) -Wall | ||
23 | |||
24 | comp_progs := cipher_comp hash_comp hmac_comp | ||
25 | |||
diff --git a/meta/recipes-kernel/dtc/dtc/0001-meson.build-bump-version-to-1.7.0.patch b/meta/recipes-kernel/dtc/dtc/0001-meson.build-bump-version-to-1.7.0.patch deleted file mode 100644 index 79a3b92b44..0000000000 --- a/meta/recipes-kernel/dtc/dtc/0001-meson.build-bump-version-to-1.7.0.patch +++ /dev/null | |||
@@ -1,29 +0,0 @@ | |||
1 | From 9153522103bd4ed7e3299c4d073f66bb37cb2d42 Mon Sep 17 00:00:00 2001 | ||
2 | From: Nikolay Letov <letov.nikolay@gmail.com> | ||
3 | Date: Wed, 22 Feb 2023 13:36:07 +0300 | ||
4 | Subject: [PATCH 1/2] meson.build: bump version to 1.7.0 | ||
5 | |||
6 | [This was botched in the actual 1.7.0 release :( - David Gibson] | ||
7 | |||
8 | Upstream-Status: Backport [https://git.kernel.org/pub/scm/utils/dtc/dtc.git/commit/?id=64a907f08b9bedd89833c1eee674148cff2343c6] | ||
9 | |||
10 | Signed-off-by: Nikolay Letov <letov.nikolay@gmail.com> | ||
11 | Signed-off-by: Peter Marko <peter.marko@siemens.com> | ||
12 | --- | ||
13 | meson.build | 2 +- | ||
14 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
15 | |||
16 | diff --git a/meson.build b/meson.build | ||
17 | index 78251eb..d88cd9f 100644 | ||
18 | --- a/meson.build | ||
19 | +++ b/meson.build | ||
20 | @@ -1,5 +1,5 @@ | ||
21 | project('dtc', 'c', | ||
22 | - version: '1.6.0', | ||
23 | + version: '1.7.0', | ||
24 | license: ['GPL2+', 'BSD-2'], | ||
25 | default_options: 'werror=true', | ||
26 | ) | ||
27 | -- | ||
28 | 2.30.2 | ||
29 | |||
diff --git a/meta/recipes-kernel/dtc/dtc/0002-meson-allow-building-from-shallow-clones.patch b/meta/recipes-kernel/dtc/dtc/0002-meson-allow-building-from-shallow-clones.patch deleted file mode 100644 index 0284905913..0000000000 --- a/meta/recipes-kernel/dtc/dtc/0002-meson-allow-building-from-shallow-clones.patch +++ /dev/null | |||
@@ -1,38 +0,0 @@ | |||
1 | From 4415b0baece3c4351a6d3637c2754abbefd4795d Mon Sep 17 00:00:00 2001 | ||
2 | From: Peter Marko <peter.marko@siemens.com> | ||
3 | Date: Sat, 16 Dec 2023 18:58:31 +0100 | ||
4 | Subject: [PATCH 2/2] meson: allow building from shallow clones | ||
5 | |||
6 | When building from shallow clone, tag is not available | ||
7 | and version defaults to git hash. | ||
8 | Problem is that some builds check DTC version and fail the comparison. | ||
9 | Example is https://git.trustedfirmware.org/TF-A/trusted-firmware-a.git | ||
10 | Which fails to build with following error: | ||
11 | dtc version too old (039a994), you need at least version 1.4.4 | ||
12 | |||
13 | Drop --always from git describe command, see | ||
14 | https://github.com/mesonbuild/meson/blob/1.3.0/mesonbuild/utils/universal.py#L773 | ||
15 | This will make it more closer to build via Makefile. | ||
16 | |||
17 | Upstream-Status: Submitted [https://github.com/dgibson/dtc/pull/122] | ||
18 | |||
19 | Signed-off-by: Peter Marko <peter.marko@siemens.com> | ||
20 | --- | ||
21 | meson.build | 1 + | ||
22 | 1 file changed, 1 insertion(+) | ||
23 | |||
24 | diff --git a/meson.build b/meson.build | ||
25 | index 78251eb..fc0c92a 100644 | ||
26 | --- a/meson.build | ||
27 | +++ b/meson.build | ||
28 | @@ -56,6 +56,7 @@ py = py.find_installation(required: get_option('python')) | ||
29 | swig = find_program('swig', required: get_option('python')) | ||
30 | |||
31 | version_gen_h = vcs_tag( | ||
32 | + command: ['git', 'describe', '--dirty=+'], | ||
33 | input: 'version_gen.h.in', | ||
34 | output: 'version_gen.h', | ||
35 | ) | ||
36 | -- | ||
37 | 2.30.2 | ||
38 | |||
diff --git a/meta/recipes-kernel/dtc/dtc_1.7.0.bb b/meta/recipes-kernel/dtc/dtc_1.7.2.bb index 0702fc16df..92e83a9404 100644 --- a/meta/recipes-kernel/dtc/dtc_1.7.0.bb +++ b/meta/recipes-kernel/dtc/dtc_1.7.2.bb | |||
@@ -10,20 +10,17 @@ LIC_FILES_CHKSUM = "file://GPL;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ | |||
10 | 10 | ||
11 | SRC_URI = " \ | 11 | SRC_URI = " \ |
12 | git://git.kernel.org/pub/scm/utils/dtc/dtc.git;branch=main;protocol=https \ | 12 | git://git.kernel.org/pub/scm/utils/dtc/dtc.git;branch=main;protocol=https \ |
13 | file://0001-meson.build-bump-version-to-1.7.0.patch \ | ||
14 | file://0002-meson-allow-building-from-shallow-clones.patch \ | ||
15 | " | 13 | " |
16 | SRCREV = "039a99414e778332d8f9c04cbd3072e1dcc62798" | 14 | SRCREV = "2d10aa2afe35527728db30b35ec491ecb6959e5c" |
17 | 15 | ||
18 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>\d+(\.\d+)+)" | 16 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>\d+(\.\d+)+)" |
19 | 17 | ||
20 | S = "${WORKDIR}/git" | ||
21 | |||
22 | inherit meson pkgconfig | 18 | inherit meson pkgconfig |
23 | 19 | ||
24 | EXTRA_OEMESON = "-Dpython=disabled -Dvalgrind=disabled" | 20 | EXTRA_OEMESON = "-Dpython=disabled -Dvalgrind=disabled" |
25 | 21 | ||
26 | PACKAGECONFIG ??= "tools" | 22 | PACKAGECONFIG ??= "tools" |
23 | PACKAGECONFIG[tests] = "-Dtests=true,-Dtests=false," | ||
27 | PACKAGECONFIG[tools] = "-Dtools=true,-Dtools=false,flex-native bison-native" | 24 | PACKAGECONFIG[tools] = "-Dtools=true,-Dtools=false,flex-native bison-native" |
28 | PACKAGECONFIG[yaml] = "-Dyaml=enabled,-Dyaml=disabled,libyaml" | 25 | PACKAGECONFIG[yaml] = "-Dyaml=enabled,-Dyaml=disabled,libyaml" |
29 | 26 | ||
diff --git a/meta/recipes-kernel/dtc/python3-dtschema-wrapper_2021.10.bb b/meta/recipes-kernel/dtc/python3-dtschema-wrapper_2021.10.bb index 974fcba876..b19f53e20d 100644 --- a/meta/recipes-kernel/dtc/python3-dtschema-wrapper_2021.10.bb +++ b/meta/recipes-kernel/dtc/python3-dtschema-wrapper_2021.10.bb | |||
@@ -7,11 +7,13 @@ SRC_URI = "file://dt-doc-validate \ | |||
7 | file://dt-mk-schema \ | 7 | file://dt-mk-schema \ |
8 | file://dt-validate" | 8 | file://dt-validate" |
9 | 9 | ||
10 | S = "${UNPACKDIR}" | ||
11 | |||
10 | do_install() { | 12 | do_install() { |
11 | install -d ${D}${bindir}/ | 13 | install -d ${D}${bindir}/ |
12 | install -m 755 ${WORKDIR}/dt-doc-validate ${D}${bindir}/ | 14 | install -m 755 ${UNPACKDIR}/dt-doc-validate ${D}${bindir}/ |
13 | install -m 755 ${WORKDIR}/dt-mk-schema ${D}${bindir}/ | 15 | install -m 755 ${UNPACKDIR}/dt-mk-schema ${D}${bindir}/ |
14 | install -m 755 ${WORKDIR}/dt-validate ${D}${bindir}/ | 16 | install -m 755 ${UNPACKDIR}/dt-validate ${D}${bindir}/ |
15 | } | 17 | } |
16 | 18 | ||
17 | BBCLASSEXTEND = "native nativesdk" | 19 | BBCLASSEXTEND = "native nativesdk" |
diff --git a/meta/recipes-kernel/kern-tools/kern-tools-native_git.bb b/meta/recipes-kernel/kern-tools/kern-tools-native_git.bb index 8eff00821a..84b8b10a26 100644 --- a/meta/recipes-kernel/kern-tools/kern-tools-native_git.bb +++ b/meta/recipes-kernel/kern-tools/kern-tools-native_git.bb | |||
@@ -11,13 +11,12 @@ LIC_FILES_CHKSUM = "\ | |||
11 | 11 | ||
12 | DEPENDS += "git-replacement-native" | 12 | DEPENDS += "git-replacement-native" |
13 | 13 | ||
14 | SRCREV = "7160ebe8b865dd6028aef278efa219433db93f7e" | 14 | SRCREV = "fe67c98d2e9b74af44d0c4b660fa18e3a95e7edd" |
15 | PV = "0.3+git" | 15 | PV = "0.3+git" |
16 | 16 | ||
17 | inherit native | 17 | inherit native |
18 | 18 | ||
19 | SRC_URI = "git://git.yoctoproject.org/yocto-kernel-tools.git;branch=master;protocol=https" | 19 | SRC_URI = "git://git.yoctoproject.org/yocto-kernel-tools.git;branch=master;protocol=https" |
20 | S = "${WORKDIR}/git" | ||
21 | 20 | ||
22 | do_configure() { | 21 | do_configure() { |
23 | : | 22 | : |
diff --git a/meta/recipes-kernel/kernel-signing-keys/kernel-signing-keys-native.bb b/meta/recipes-kernel/kernel-signing-keys/kernel-signing-keys-native.bb new file mode 100644 index 0000000000..f346f1648a --- /dev/null +++ b/meta/recipes-kernel/kernel-signing-keys/kernel-signing-keys-native.bb | |||
@@ -0,0 +1,73 @@ | |||
1 | # Automatically generate key pairs in UBOOT_SIGN_KEYDIR if they do not exist. | ||
2 | # The key pair is generated by the kernel-signing-keys-native recipe and is not | ||
3 | # stored in the sstate cache. This can be beneficial from a security standpoint, | ||
4 | # as it avoids unintentionally caching and distributing private keys. | ||
5 | # However, this behavior can lead to non-reproducible builds. For example, if | ||
6 | # the keys are deleted, they must be manually restored, or you must run: | ||
7 | # bitbake -c cleanall kernel-signing-keys-native | ||
8 | # before new key pairs are generated. | ||
9 | # | ||
10 | # However, this approach is only suitable for simple or local development use | ||
11 | # cases. For more advanced or production-grade scenarios, a more robust solution | ||
12 | # is usually required—such as external signing or re-signing using e.g a HSM. | ||
13 | |||
14 | SUMMARY = "Signing keys for the kernel FIT image" | ||
15 | LICENSE = "MIT" | ||
16 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420" | ||
17 | |||
18 | require conf/image-fitimage.conf | ||
19 | |||
20 | DEPENDS += "openssl-native" | ||
21 | |||
22 | inherit native | ||
23 | |||
24 | do_fetch[noexec] = "1" | ||
25 | do_unpack[noexec] = "1" | ||
26 | do_patch[noexec] = "1" | ||
27 | do_configure[noexec] = "1" | ||
28 | do_install[noexec] = "1" | ||
29 | |||
30 | do_compile() { | ||
31 | if [ "${UBOOT_SIGN_ENABLE}" = "0" ] && [ "${FIT_GENERATE_KEYS}" = "1" ]; then | ||
32 | bbwarn "FIT_GENERATE_KEYS is set to 1 even though UBOOT_SIGN_ENABLE is set to 0. The keys will not be generated as they won't be used." | ||
33 | fi | ||
34 | |||
35 | if [ "${UBOOT_SIGN_ENABLE}" = "1" ] && [ "${FIT_GENERATE_KEYS}" = "1" ]; then | ||
36 | |||
37 | # Generate keys to sign configuration nodes, only if they don't already exist | ||
38 | if [ ! -f "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_KEYNAME}".key ] || \ | ||
39 | [ ! -f "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_KEYNAME}".crt ]; then | ||
40 | |||
41 | # make directory if it does not already exist | ||
42 | mkdir -p "${UBOOT_SIGN_KEYDIR}" | ||
43 | |||
44 | bbnote "Generating RSA private key for signing fitImage" | ||
45 | openssl genrsa ${FIT_KEY_GENRSA_ARGS} -out \ | ||
46 | "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_KEYNAME}".key \ | ||
47 | "${FIT_SIGN_NUMBITS}" | ||
48 | |||
49 | bbnote "Generating certificate for signing fitImage" | ||
50 | openssl req ${FIT_KEY_REQ_ARGS} "${FIT_KEY_SIGN_PKCS}" \ | ||
51 | -key "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_KEYNAME}".key \ | ||
52 | -out "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_KEYNAME}".crt | ||
53 | fi | ||
54 | |||
55 | # Generate keys to sign image nodes, only if they don't already exist | ||
56 | if [ ! -f "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_IMG_KEYNAME}".key ] || \ | ||
57 | [ ! -f "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_IMG_KEYNAME}".crt ]; then | ||
58 | |||
59 | # make directory if it does not already exist | ||
60 | mkdir -p "${UBOOT_SIGN_KEYDIR}" | ||
61 | |||
62 | bbnote "Generating RSA private key for signing fitImage" | ||
63 | openssl genrsa ${FIT_KEY_GENRSA_ARGS} -out \ | ||
64 | "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_IMG_KEYNAME}".key \ | ||
65 | "${FIT_SIGN_NUMBITS}" | ||
66 | |||
67 | bbnote "Generating certificate for signing fitImage" | ||
68 | openssl req ${FIT_KEY_REQ_ARGS} "${FIT_KEY_SIGN_PKCS}" \ | ||
69 | -key "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_IMG_KEYNAME}".key \ | ||
70 | -out "${UBOOT_SIGN_KEYDIR}/${UBOOT_SIGN_IMG_KEYNAME}".crt | ||
71 | fi | ||
72 | fi | ||
73 | } | ||
diff --git a/meta/recipes-kernel/kexec/kexec-tools/0001-arm64-kexec-disabled-check-if-kaslr-seed-dtb-propert.patch b/meta/recipes-kernel/kexec/kexec-tools/0001-arm64-kexec-disabled-check-if-kaslr-seed-dtb-propert.patch index ddc1519126..ee731cea4b 100644 --- a/meta/recipes-kernel/kexec/kexec-tools/0001-arm64-kexec-disabled-check-if-kaslr-seed-dtb-propert.patch +++ b/meta/recipes-kernel/kexec/kexec-tools/0001-arm64-kexec-disabled-check-if-kaslr-seed-dtb-propert.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From d48ec5e1a5fb7907520dee71b1d94045486a0c29 Mon Sep 17 00:00:00 2001 | 1 | From 9e95f8933bded10fdd664fc95492825347ec59a7 Mon Sep 17 00:00:00 2001 |
2 | From: Alexander Kamensky <alexander.kamensky42@gmail.com> | 2 | From: Alexander Kamensky <alexander.kamensky42@gmail.com> |
3 | Date: Thu, 12 Nov 2020 12:56:46 -0800 | 3 | Date: Thu, 12 Nov 2020 12:56:46 -0800 |
4 | Subject: [PATCH] arm64: kexec: disabled check if kaslr-seed dtb property was | 4 | Subject: [PATCH] arm64: kexec: disabled check if kaslr-seed dtb property was |
@@ -34,10 +34,10 @@ Upstream-Status: Submitted [http://lists.infradead.org/pipermail/kexec/2020-Nove | |||
34 | 1 file changed, 1 insertion(+), 13 deletions(-) | 34 | 1 file changed, 1 insertion(+), 13 deletions(-) |
35 | 35 | ||
36 | diff --git a/kexec/arch/arm64/kexec-arm64.c b/kexec/arch/arm64/kexec-arm64.c | 36 | diff --git a/kexec/arch/arm64/kexec-arm64.c b/kexec/arch/arm64/kexec-arm64.c |
37 | index ec6df4b..10238d9 100644 | 37 | index 9091f40..ea304f9 100644 |
38 | --- a/kexec/arch/arm64/kexec-arm64.c | 38 | --- a/kexec/arch/arm64/kexec-arm64.c |
39 | +++ b/kexec/arch/arm64/kexec-arm64.c | 39 | +++ b/kexec/arch/arm64/kexec-arm64.c |
40 | @@ -503,7 +503,7 @@ static int setup_2nd_dtb(struct dtb *dtb, char *command_line, int on_crash) | 40 | @@ -504,7 +504,7 @@ static int setup_2nd_dtb(struct dtb *dtb, char *command_line, int on_crash) |
41 | int len, range_len; | 41 | int len, range_len; |
42 | int nodeoffset; | 42 | int nodeoffset; |
43 | int new_size; | 43 | int new_size; |
@@ -46,7 +46,7 @@ index ec6df4b..10238d9 100644 | |||
46 | 46 | ||
47 | result = fdt_check_header(dtb->buf); | 47 | result = fdt_check_header(dtb->buf); |
48 | 48 | ||
49 | @@ -576,18 +576,6 @@ static int setup_2nd_dtb(struct dtb *dtb, char *command_line, int on_crash) | 49 | @@ -577,18 +577,6 @@ static int setup_2nd_dtb(struct dtb *dtb, char *command_line, int on_crash) |
50 | return result; | 50 | return result; |
51 | } | 51 | } |
52 | } else { | 52 | } else { |
@@ -65,6 +65,3 @@ index ec6df4b..10238d9 100644 | |||
65 | /* | 65 | /* |
66 | * Invoke the getrandom system call with | 66 | * Invoke the getrandom system call with |
67 | * GRND_NONBLOCK, to make sure we | 67 | * GRND_NONBLOCK, to make sure we |
68 | -- | ||
69 | 2.25.1 | ||
70 | |||
diff --git a/meta/recipes-kernel/kexec/kexec-tools/0001-kexec.c-add-MFD_NOEXEC_SEAL-flag-explicitly.patch b/meta/recipes-kernel/kexec/kexec-tools/0001-kexec.c-add-MFD_NOEXEC_SEAL-flag-explicitly.patch new file mode 100644 index 0000000000..5d994d9ffb --- /dev/null +++ b/meta/recipes-kernel/kexec/kexec-tools/0001-kexec.c-add-MFD_NOEXEC_SEAL-flag-explicitly.patch | |||
@@ -0,0 +1,43 @@ | |||
1 | From 0b176595ca1610037d1175e1786d1a8aff1fb43f Mon Sep 17 00:00:00 2001 | ||
2 | From: Chen Qi <Qi.Chen@windriver.com> | ||
3 | Date: Tue, 6 Aug 2024 21:42:43 -0700 | ||
4 | Subject: [PATCH] kexec.c: add MFD_NOEXEC_SEAL flag explicitly | ||
5 | |||
6 | Add MFD_NOEXEC_SEAL to avoid kernel warning like below: | ||
7 | |||
8 | kexec[970]: memfd_create() called without MFD_EXEC or MFD_NOEXEC_SEAL set | ||
9 | |||
10 | For old kernels, there will be no MFD_NOEXEC_SEAL definition, so fallback | ||
11 | to define it to 0. | ||
12 | |||
13 | Upstream-Status: Submitted [https://github.com/horms/kexec-tools/pull/7] | ||
14 | |||
15 | Signed-off-by: Chen Qi <Qi.Chen@windriver.com> | ||
16 | --- | ||
17 | kexec/kexec.c | 6 +++++- | ||
18 | 1 file changed, 5 insertions(+), 1 deletion(-) | ||
19 | |||
20 | diff --git a/kexec/kexec.c b/kexec/kexec.c | ||
21 | index 6bf12d7..2f8e7cc 100644 | ||
22 | --- a/kexec/kexec.c | ||
23 | +++ b/kexec/kexec.c | ||
24 | @@ -61,6 +61,10 @@ | ||
25 | #define KEXEC_LOADED_PATH "/sys/kernel/kexec_loaded" | ||
26 | #define KEXEC_CRASH_LOADED_PATH "/sys/kernel/kexec_crash_loaded" | ||
27 | |||
28 | +#ifndef MFD_NOEXEC_SEAL | ||
29 | +#define MFD_NOEXEC_SEAL 0 | ||
30 | +#endif | ||
31 | + | ||
32 | unsigned long long mem_min = 0; | ||
33 | unsigned long long mem_max = ULONG_MAX; | ||
34 | unsigned long elfcorehdrsz = 0; | ||
35 | @@ -661,7 +665,7 @@ static int copybuf_memfd(const char *kernel_buf, size_t size) | ||
36 | { | ||
37 | int fd, count; | ||
38 | |||
39 | - fd = memfd_create("kernel", MFD_ALLOW_SEALING); | ||
40 | + fd = memfd_create("kernel", MFD_ALLOW_SEALING | MFD_NOEXEC_SEAL); | ||
41 | if (fd == -1) | ||
42 | return fd; | ||
43 | |||
diff --git a/meta/recipes-kernel/kexec/kexec-tools/0001-ppc-fs2dt-Match-function-signatures.patch b/meta/recipes-kernel/kexec/kexec-tools/0001-ppc-fs2dt-Match-function-signatures.patch new file mode 100644 index 0000000000..483e5195a9 --- /dev/null +++ b/meta/recipes-kernel/kexec/kexec-tools/0001-ppc-fs2dt-Match-function-signatures.patch | |||
@@ -0,0 +1,31 @@ | |||
1 | From 4a07e8f22b4f224dca79767e5cb86a0de91498dc Mon Sep 17 00:00:00 2001 | ||
2 | From: Khem Raj <raj.khem@gmail.com> | ||
3 | Date: Sat, 17 May 2025 07:48:50 -0700 | ||
4 | Subject: [PATCH] ppc/fs2dt: Match function signatures | ||
5 | |||
6 | The prototypes of function pointers is analysed and | ||
7 | compiler finds the signature mismatches and complain about it. | ||
8 | |||
9 | ../kexec-tools-2.0.31/kexec/arch/ppc/fs2dt.c:338:44: error: incompatible function pointer types passing 'int (const void *, const void *)' to parameter of type 'int (*)(const struct dirent **, const struct dirent **)' [-Wincompatible-function-pointer-types] | ||
10 | 338 | numlist = scandir(pathname, &namelist, 0, comparefunc); | ||
11 | | ^~~~~~~~~~~ | ||
12 | |||
13 | Upstream-Status: Submitted [https://lore.kernel.org/kexec/20250517145852.2488183-1-raj.khem@gmail.com/T/#u] | ||
14 | Signed-off-by: Khem Raj <raj.khem@gmail.com> | ||
15 | --- | ||
16 | kexec/arch/ppc/fs2dt.c | 2 +- | ||
17 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
18 | |||
19 | diff --git a/kexec/arch/ppc/fs2dt.c b/kexec/arch/ppc/fs2dt.c | ||
20 | index fed499b..4952bfc 100644 | ||
21 | --- a/kexec/arch/ppc/fs2dt.c | ||
22 | +++ b/kexec/arch/ppc/fs2dt.c | ||
23 | @@ -292,7 +292,7 @@ static void putprops(char *fn, struct dirent **nlist, int numlist) | ||
24 | * Compare function used to sort the device-tree directories | ||
25 | * This function will be passed to scandir. | ||
26 | */ | ||
27 | -static int comparefunc(const void *dentry1, const void *dentry2) | ||
28 | +static int comparefunc(const struct dirent ** dentry1, const struct dirent **dentry2) | ||
29 | { | ||
30 | char *str1 = (*(struct dirent **)dentry1)->d_name; | ||
31 | char *str2 = (*(struct dirent **)dentry2)->d_name; | ||
diff --git a/meta/recipes-kernel/kexec/kexec-tools/0003-kexec-ARM-Fix-add_buffer_phys_virt-align-issue.patch b/meta/recipes-kernel/kexec/kexec-tools/0003-kexec-ARM-Fix-add_buffer_phys_virt-align-issue.patch deleted file mode 100644 index e874a8b4f1..0000000000 --- a/meta/recipes-kernel/kexec/kexec-tools/0003-kexec-ARM-Fix-add_buffer_phys_virt-align-issue.patch +++ /dev/null | |||
@@ -1,50 +0,0 @@ | |||
1 | From b62c1da8f8e641397add10367ee9c4cfdedb1cc0 Mon Sep 17 00:00:00 2001 | ||
2 | From: Haiqing Bai <Haiqing.Bai@windriver.com> | ||
3 | Date: Mon, 9 Jan 2017 15:26:29 +0800 | ||
4 | Subject: [PATCH] kexec: ARM: Fix add_buffer_phys_virt() align issue | ||
5 | |||
6 | When "CONFIG_ARM_LPAE" is enabled,3 level page table | ||
7 | is used by MMU, the "SECTION_SIZE" is defined with | ||
8 | (1 << 21), but 'add_buffer_phys_virt()' hardcode this | ||
9 | to (1 << 20). | ||
10 | |||
11 | Upstream-Status: Pending | ||
12 | |||
13 | Suggested-By:fredrik.markstrom@gmail.com | ||
14 | Signed-off-by: Haiqing Bai <Haiqing.Bai@windriver.com> | ||
15 | |||
16 | --- | ||
17 | kexec/arch/arm/crashdump-arm.c | 5 ++++- | ||
18 | 1 file changed, 4 insertions(+), 1 deletion(-) | ||
19 | |||
20 | diff --git a/kexec/arch/arm/crashdump-arm.c b/kexec/arch/arm/crashdump-arm.c | ||
21 | index 1ec1826..cc20f63 100644 | ||
22 | --- a/kexec/arch/arm/crashdump-arm.c | ||
23 | +++ b/kexec/arch/arm/crashdump-arm.c | ||
24 | @@ -242,6 +242,7 @@ int load_crashdump_segments(struct kexec_info *info, char *mod_cmdline) | ||
25 | void *buf; | ||
26 | int err; | ||
27 | int last_ranges; | ||
28 | + unsigned short align_bit_shift = 20; | ||
29 | |||
30 | /* | ||
31 | * First fetch all the memory (RAM) ranges that we are going to pass to | ||
32 | @@ -283,6 +284,7 @@ int load_crashdump_segments(struct kexec_info *info, char *mod_cmdline) | ||
33 | |||
34 | /* for support LPAE enabled kernel*/ | ||
35 | elf_info.class = ELFCLASS64; | ||
36 | + align_bit_shift = 21; | ||
37 | |||
38 | err = crash_create_elf64_headers(info, &elf_info, | ||
39 | usablemem_rgns.ranges, | ||
40 | @@ -304,8 +306,9 @@ int load_crashdump_segments(struct kexec_info *info, char *mod_cmdline) | ||
41 | * 1MB) so that available memory passed in kernel command line will be | ||
42 | * aligned to 1MB. This is because kernel create_mapping() wants memory | ||
43 | * regions to be aligned to SECTION_SIZE. | ||
44 | + * The SECTION_SIZE of LPAE kernel is '1UL << 21' defined in pgtable-3level.h | ||
45 | */ | ||
46 | - elfcorehdr = add_buffer_phys_virt(info, buf, bufsz, bufsz, 1 << 20, | ||
47 | + elfcorehdr = add_buffer_phys_virt(info, buf, bufsz, bufsz, 1 << align_bit_shift, | ||
48 | crash_kernel_mem.start, | ||
49 | crash_kernel_mem.end, -1, 0); | ||
50 | |||
diff --git a/meta/recipes-kernel/kexec/kexec-tools/Fix-building-on-x86_64-with-binutils-2.41.patch b/meta/recipes-kernel/kexec/kexec-tools/Fix-building-on-x86_64-with-binutils-2.41.patch deleted file mode 100644 index 4894f044fc..0000000000 --- a/meta/recipes-kernel/kexec/kexec-tools/Fix-building-on-x86_64-with-binutils-2.41.patch +++ /dev/null | |||
@@ -1,95 +0,0 @@ | |||
1 | From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001 | ||
2 | From: Michel Lind <salimma@fedoraproject.org> | ||
3 | Date: Tue, 30 Jan 2024 04:14:31 -0600 | ||
4 | Subject: [PATCH] Fix building on x86_64 with binutils 2.41 | ||
5 | |||
6 | Newer versions of the GNU assembler (observed with binutils 2.41) will | ||
7 | complain about the ".arch i386" in files assembled with "as --64", | ||
8 | with the message "Error: 64bit mode not supported on 'i386'". | ||
9 | |||
10 | Fix by moving ".arch i386" below the relevant ".code32" directive, so | ||
11 | that the assembler is no longer expecting 64-bit instructions to be used | ||
12 | by the time that the ".arch i386" directive is encountered. | ||
13 | |||
14 | Based on similar iPXE fix: | ||
15 | https://github.com/ipxe/ipxe/commit/6ca597eee | ||
16 | |||
17 | Signed-off-by: Michel Lind <michel@michel-slm.name> | ||
18 | Signed-off-by: Simon Horman <horms@kernel.org> | ||
19 | |||
20 | Upstream-Status: Backport [https://git.kernel.org/pub/scm/utils/kernel/kexec/kexec-tools.git/commit/?h=main&id=328de8e00e298f00d7ba6b25dc3950147e9642e6] | ||
21 | Signed-off-by: Yoann Congal <yoann.congal@smile.fr> | ||
22 | --- | ||
23 | purgatory/arch/i386/entry32-16-debug.S | 2 +- | ||
24 | purgatory/arch/i386/entry32-16.S | 2 +- | ||
25 | purgatory/arch/i386/entry32.S | 2 +- | ||
26 | purgatory/arch/i386/setup-x86.S | 2 +- | ||
27 | 4 files changed, 4 insertions(+), 4 deletions(-) | ||
28 | |||
29 | diff --git a/purgatory/arch/i386/entry32-16-debug.S b/purgatory/arch/i386/entry32-16-debug.S | ||
30 | index 5167944..12e1164 100644 | ||
31 | --- a/purgatory/arch/i386/entry32-16-debug.S | ||
32 | +++ b/purgatory/arch/i386/entry32-16-debug.S | ||
33 | @@ -25,10 +25,10 @@ | ||
34 | .globl entry16_debug_pre32 | ||
35 | .globl entry16_debug_first32 | ||
36 | .globl entry16_debug_old_first32 | ||
37 | - .arch i386 | ||
38 | .balign 16 | ||
39 | entry16_debug: | ||
40 | .code32 | ||
41 | + .arch i386 | ||
42 | /* Compute where I am running at (assumes esp valid) */ | ||
43 | call 1f | ||
44 | 1: popl %ebx | ||
45 | diff --git a/purgatory/arch/i386/entry32-16.S b/purgatory/arch/i386/entry32-16.S | ||
46 | index c051aab..eace095 100644 | ||
47 | --- a/purgatory/arch/i386/entry32-16.S | ||
48 | +++ b/purgatory/arch/i386/entry32-16.S | ||
49 | @@ -20,10 +20,10 @@ | ||
50 | #undef i386 | ||
51 | .text | ||
52 | .globl entry16, entry16_regs | ||
53 | - .arch i386 | ||
54 | .balign 16 | ||
55 | entry16: | ||
56 | .code32 | ||
57 | + .arch i386 | ||
58 | /* Compute where I am running at (assumes esp valid) */ | ||
59 | call 1f | ||
60 | 1: popl %ebx | ||
61 | diff --git a/purgatory/arch/i386/entry32.S b/purgatory/arch/i386/entry32.S | ||
62 | index f7a494f..8ce9e31 100644 | ||
63 | --- a/purgatory/arch/i386/entry32.S | ||
64 | +++ b/purgatory/arch/i386/entry32.S | ||
65 | @@ -20,10 +20,10 @@ | ||
66 | #undef i386 | ||
67 | |||
68 | .text | ||
69 | - .arch i386 | ||
70 | .globl entry32, entry32_regs | ||
71 | entry32: | ||
72 | .code32 | ||
73 | + .arch i386 | ||
74 | |||
75 | /* Setup a gdt that should that is generally usefully */ | ||
76 | lgdt %cs:gdt | ||
77 | diff --git a/purgatory/arch/i386/setup-x86.S b/purgatory/arch/i386/setup-x86.S | ||
78 | index 201bb2c..a212eed 100644 | ||
79 | --- a/purgatory/arch/i386/setup-x86.S | ||
80 | +++ b/purgatory/arch/i386/setup-x86.S | ||
81 | @@ -21,10 +21,10 @@ | ||
82 | #undef i386 | ||
83 | |||
84 | .text | ||
85 | - .arch i386 | ||
86 | .globl purgatory_start | ||
87 | purgatory_start: | ||
88 | .code32 | ||
89 | + .arch i386 | ||
90 | |||
91 | /* Load a gdt so I know what the segment registers are */ | ||
92 | lgdt %cs:gdt | ||
93 | -- | ||
94 | 2.39.2 | ||
95 | |||
diff --git a/meta/recipes-kernel/kexec/kexec-tools_2.0.28.bb b/meta/recipes-kernel/kexec/kexec-tools_2.0.31.bb index dec821ea88..7333aa73c1 100644 --- a/meta/recipes-kernel/kexec/kexec-tools_2.0.28.bb +++ b/meta/recipes-kernel/kexec/kexec-tools_2.0.31.bb | |||
@@ -1,12 +1,13 @@ | |||
1 | |||
2 | SUMMARY = "Kexec fast reboot tools" | 1 | SUMMARY = "Kexec fast reboot tools" |
3 | DESCRIPTION = "Kexec is a fast reboot feature that lets you reboot to a new Linux kernel" | 2 | DESCRIPTION = "Kexec is a fast reboot feature that lets you reboot to a new Linux kernel" |
4 | HOMEPAGE = "http://kernel.org/pub/linux/utils/kernel/kexec/" | 3 | HOMEPAGE = "http://kernel.org/pub/linux/utils/kernel/kexec/" |
5 | SECTION = "kernel/userland" | 4 | SECTION = "kernel/userland" |
6 | LICENSE = "GPL-2.0-only" | 5 | LICENSE = "GPL-2.0-only" |
7 | LIC_FILES_CHKSUM = "file://COPYING;md5=ea5bed2f60d357618ca161ad539f7c0a \ | 6 | LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263 \ |
8 | file://kexec/kexec.c;beginline=1;endline=20;md5=af10f6ae4a8715965e648aa687ad3e09" | 7 | file://kexec/kexec.c;beginline=1;endline=20;md5=af10f6ae4a8715965e648aa687ad3e09 \ |
8 | " | ||
9 | DEPENDS = "zlib xz" | 9 | DEPENDS = "zlib xz" |
10 | RDEPENDS:${PN} = "makedumpfile" | ||
10 | 11 | ||
11 | SRC_URI = "${KERNELORG_MIRROR}/linux/utils/kernel/kexec/kexec-tools-${PV}.tar.gz \ | 12 | SRC_URI = "${KERNELORG_MIRROR}/linux/utils/kernel/kexec/kexec-tools-${PV}.tar.gz \ |
12 | file://kdump \ | 13 | file://kdump \ |
@@ -14,19 +15,22 @@ SRC_URI = "${KERNELORG_MIRROR}/linux/utils/kernel/kexec/kexec-tools-${PV}.tar.gz | |||
14 | file://kdump.service \ | 15 | file://kdump.service \ |
15 | file://0001-powerpc-change-the-memory-size-limit.patch \ | 16 | file://0001-powerpc-change-the-memory-size-limit.patch \ |
16 | file://0002-purgatory-Pass-r-directly-to-linker.patch \ | 17 | file://0002-purgatory-Pass-r-directly-to-linker.patch \ |
17 | file://0003-kexec-ARM-Fix-add_buffer_phys_virt-align-issue.patch \ | ||
18 | file://0005-Disable-PIE-during-link.patch \ | 18 | file://0005-Disable-PIE-during-link.patch \ |
19 | file://0001-arm64-kexec-disabled-check-if-kaslr-seed-dtb-propert.patch \ | 19 | file://0001-arm64-kexec-disabled-check-if-kaslr-seed-dtb-propert.patch \ |
20 | file://Fix-building-on-x86_64-with-binutils-2.41.patch \ | 20 | file://0001-kexec.c-add-MFD_NOEXEC_SEAL-flag-explicitly.patch \ |
21 | file://0001-ppc-fs2dt-Match-function-signatures.patch \ | ||
21 | " | 22 | " |
22 | 23 | ||
23 | SRC_URI[sha256sum] = "f33d2660b3e38d25a127e87097978e0f7a9a73ab5151a29eb80974d169ff6a29" | 24 | SRC_URI[sha256sum] = "ddaaa65b02b4f8aa9222586b1f26565b93a4baeffd35bcbd523f15fae7aa4897" |
24 | 25 | ||
25 | inherit autotools update-rc.d systemd | 26 | inherit autotools update-rc.d systemd |
26 | 27 | ||
27 | export LDFLAGS = "-L${STAGING_LIBDIR}" | 28 | export LDFLAGS = "-L${STAGING_LIBDIR}" |
28 | EXTRA_OECONF = " --with-zlib=yes" | 29 | EXTRA_OECONF = " --with-zlib=yes" |
29 | 30 | ||
31 | # purgatory uses -msoft-float for ppc32/ppc64, it does not go with -maltivec | ||
32 | TUNE_CCARGS:remove:powerpc = "-maltivec" | ||
33 | |||
30 | do_compile:prepend() { | 34 | do_compile:prepend() { |
31 | # Remove the prepackaged config.h from the source tree as it overrides | 35 | # Remove the prepackaged config.h from the source tree as it overrides |
32 | # the same file generated by configure and placed in the build tree | 36 | # the same file generated by configure and placed in the build tree |
@@ -44,15 +48,15 @@ do_compile:prepend() { | |||
44 | 48 | ||
45 | do_install:append () { | 49 | do_install:append () { |
46 | install -d ${D}${sysconfdir}/sysconfig | 50 | install -d ${D}${sysconfdir}/sysconfig |
47 | install -m 0644 ${WORKDIR}/kdump.conf ${D}${sysconfdir}/sysconfig | 51 | install -m 0644 ${UNPACKDIR}/kdump.conf ${D}${sysconfdir}/sysconfig |
48 | 52 | ||
49 | if ${@bb.utils.contains('DISTRO_FEATURES', 'sysvinit', 'true', 'false', d)}; then | 53 | if ${@bb.utils.contains('DISTRO_FEATURES', 'sysvinit', 'true', 'false', d)}; then |
50 | install -D -m 0755 ${WORKDIR}/kdump ${D}${sysconfdir}/init.d/kdump | 54 | install -D -m 0755 ${UNPACKDIR}/kdump ${D}${sysconfdir}/init.d/kdump |
51 | fi | 55 | fi |
52 | 56 | ||
53 | if ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'true', 'false', d)}; then | 57 | if ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'true', 'false', d)}; then |
54 | install -D -m 0755 ${WORKDIR}/kdump ${D}${libexecdir}/kdump-helper | 58 | install -D -m 0755 ${UNPACKDIR}/kdump ${D}${libexecdir}/kdump-helper |
55 | install -D -m 0644 ${WORKDIR}/kdump.service ${D}${systemd_system_unitdir}/kdump.service | 59 | install -D -m 0644 ${UNPACKDIR}/kdump.service ${D}${systemd_system_unitdir}/kdump.service |
56 | sed -i -e 's,@LIBEXECDIR@,${libexecdir},g' ${D}${systemd_system_unitdir}/kdump.service | 60 | sed -i -e 's,@LIBEXECDIR@,${libexecdir},g' ${D}${systemd_system_unitdir}/kdump.service |
57 | fi | 61 | fi |
58 | } | 62 | } |
@@ -82,5 +86,8 @@ SYSTEMD_SERVICE:kdump = "kdump.service" | |||
82 | SECURITY_PIE_CFLAGS:remove = "-fPIE -pie" | 86 | SECURITY_PIE_CFLAGS:remove = "-fPIE -pie" |
83 | 87 | ||
84 | COMPATIBLE_HOST = '(x86_64.*|i.86.*|arm.*|aarch64.*|powerpc.*|mips.*)-(linux|freebsd.*)' | 88 | COMPATIBLE_HOST = '(x86_64.*|i.86.*|arm.*|aarch64.*|powerpc.*|mips.*)-(linux|freebsd.*)' |
89 | # makedumpfile would not compile on mips/rv32 | ||
90 | COMPATIBLE_HOST:mipsarcho32 = "null" | ||
91 | COMPATIBLE_HOST:riscv32 = "null" | ||
85 | 92 | ||
86 | INSANE_SKIP:${PN} = "arch" | 93 | INSANE_SKIP:${PN} = "arch" |
diff --git a/meta/recipes-kernel/kmod/depmodwrapper-cross_1.0.bb b/meta/recipes-kernel/kmod/depmodwrapper-cross_1.0.bb index 6c0739d64f..5e70e01102 100644 --- a/meta/recipes-kernel/kmod/depmodwrapper-cross_1.0.bb +++ b/meta/recipes-kernel/kmod/depmodwrapper-cross_1.0.bb | |||
@@ -1,7 +1,7 @@ | |||
1 | SUMMARY = "Wrapper script for the Linux kernel module dependency indexer" | 1 | SUMMARY = "Wrapper script for the Linux kernel module dependency indexer" |
2 | LICENSE = "MIT" | 2 | LICENSE = "MIT" |
3 | 3 | ||
4 | S = "${WORKDIR}" | 4 | S = "${UNPACKDIR}" |
5 | 5 | ||
6 | INHIBIT_DEFAULT_DEPS = "1" | 6 | INHIBIT_DEFAULT_DEPS = "1" |
7 | # The kernel and the staging dir for it is machine specific | 7 | # The kernel and the staging dir for it is machine specific |
diff --git a/meta/recipes-kernel/kmod/kmod/0001-Use-portable-implementation-for-basename-API.patch b/meta/recipes-kernel/kmod/kmod/0001-Use-portable-implementation-for-basename-API.patch deleted file mode 100644 index 6a7f9ded4f..0000000000 --- a/meta/recipes-kernel/kmod/kmod/0001-Use-portable-implementation-for-basename-API.patch +++ /dev/null | |||
@@ -1,136 +0,0 @@ | |||
1 | From 721ed6040c7aa47070faf6378c433089e178bd43 Mon Sep 17 00:00:00 2001 | ||
2 | From: Khem Raj <raj.khem@gmail.com> | ||
3 | Date: Sat, 9 Dec 2023 17:35:59 -0800 | ||
4 | Subject: [PATCH] Use portable implementation for basename API | ||
5 | |||
6 | musl has removed the non-prototype declaration of basename from | ||
7 | string.h [1] which now results in build errors with clang-17+ compiler | ||
8 | |||
9 | Implement GNU basename behavior using strchr which is portable across libcs | ||
10 | |||
11 | Fixes | ||
12 | ../git/tools/kmod.c:71:19: error: call to undeclared function 'basename'; ISO C99 and later do not support implicit function declarations [-Wimplicit-function-declaration] | ||
13 | 71 | "Commands:\n", basename(argv[0])); | ||
14 | | ^ | ||
15 | |||
16 | [1] https://git.musl-libc.org/cgit/musl/commit/?id=725e17ed6dff4d0cd22487bb64470881e86a92e7 | ||
17 | |||
18 | Upstream-Status: Submitted [https://github.com/kmod-project/kmod/pull/32] | ||
19 | |||
20 | Suggested-by: Rich Felker | ||
21 | |||
22 | Signed-off-by: Khem Raj <raj.khem@gmail.com> | ||
23 | --- | ||
24 | libkmod/libkmod-config.c | 2 +- | ||
25 | shared/util.c | 4 ++-- | ||
26 | shared/util.h | 7 +++++++ | ||
27 | testsuite/testsuite.c | 2 +- | ||
28 | tools/depmod.c | 2 +- | ||
29 | tools/kmod.c | 4 ++-- | ||
30 | 6 files changed, 14 insertions(+), 7 deletions(-) | ||
31 | |||
32 | diff --git a/libkmod/libkmod-config.c b/libkmod/libkmod-config.c | ||
33 | index e83621b..8aa555a 100644 | ||
34 | --- a/libkmod/libkmod-config.c | ||
35 | +++ b/libkmod/libkmod-config.c | ||
36 | @@ -794,7 +794,7 @@ static int conf_files_insert_sorted(struct kmod_ctx *ctx, | ||
37 | bool is_single = false; | ||
38 | |||
39 | if (name == NULL) { | ||
40 | - name = basename(path); | ||
41 | + name = gnu_basename(path); | ||
42 | is_single = true; | ||
43 | } | ||
44 | |||
45 | diff --git a/shared/util.c b/shared/util.c | ||
46 | index e2bab83..0e16670 100644 | ||
47 | --- a/shared/util.c | ||
48 | +++ b/shared/util.c | ||
49 | @@ -172,9 +172,9 @@ char *modname_normalize(const char *modname, char buf[static PATH_MAX], size_t * | ||
50 | |||
51 | char *path_to_modname(const char *path, char buf[static PATH_MAX], size_t *len) | ||
52 | { | ||
53 | - char *modname; | ||
54 | + const char *modname; | ||
55 | |||
56 | - modname = basename(path); | ||
57 | + modname = gnu_basename(path); | ||
58 | if (modname == NULL || modname[0] == '\0') | ||
59 | return NULL; | ||
60 | |||
61 | diff --git a/shared/util.h b/shared/util.h | ||
62 | index c4a3916..073dc5a 100644 | ||
63 | --- a/shared/util.h | ||
64 | +++ b/shared/util.h | ||
65 | @@ -5,6 +5,7 @@ | ||
66 | #include <stdbool.h> | ||
67 | #include <stdlib.h> | ||
68 | #include <stdio.h> | ||
69 | +#include <string.h> | ||
70 | #include <sys/types.h> | ||
71 | #include <sys/stat.h> | ||
72 | #include <time.h> | ||
73 | @@ -76,6 +77,12 @@ do { \ | ||
74 | __p->__v = (val); \ | ||
75 | } while(0) | ||
76 | |||
77 | +static _always_inline_ const char *gnu_basename(const char *s) | ||
78 | +{ | ||
79 | + const char *p = strrchr(s, '/'); | ||
80 | + return p ? p+1 : s; | ||
81 | +} | ||
82 | + | ||
83 | static _always_inline_ unsigned int ALIGN_POWER2(unsigned int u) | ||
84 | { | ||
85 | return 1 << ((sizeof(u) * 8) - __builtin_clz(u - 1)); | ||
86 | diff --git a/testsuite/testsuite.c b/testsuite/testsuite.c | ||
87 | index 318343a..aafc987 100644 | ||
88 | --- a/testsuite/testsuite.c | ||
89 | +++ b/testsuite/testsuite.c | ||
90 | @@ -70,7 +70,7 @@ static void help(void) | ||
91 | |||
92 | printf("Usage:\n" | ||
93 | "\t%s [options] <test>\n" | ||
94 | - "Options:\n", basename(progname)); | ||
95 | + "Options:\n", gnu_basename(progname)); | ||
96 | |||
97 | for (itr = options, itr_short = options_short; | ||
98 | itr->name != NULL; itr++, itr_short++) | ||
99 | diff --git a/tools/depmod.c b/tools/depmod.c | ||
100 | index 43fc354..cfb15b1 100644 | ||
101 | --- a/tools/depmod.c | ||
102 | +++ b/tools/depmod.c | ||
103 | @@ -762,7 +762,7 @@ static int cfg_files_insert_sorted(struct cfg_file ***p_files, size_t *p_n_files | ||
104 | if (name != NULL) | ||
105 | namelen = strlen(name); | ||
106 | else { | ||
107 | - name = basename(dir); | ||
108 | + name = gnu_basename(dir); | ||
109 | namelen = strlen(name); | ||
110 | dirlen -= namelen + 1; | ||
111 | } | ||
112 | diff --git a/tools/kmod.c b/tools/kmod.c | ||
113 | index 55689c0..df91e5c 100644 | ||
114 | --- a/tools/kmod.c | ||
115 | +++ b/tools/kmod.c | ||
116 | @@ -68,7 +68,7 @@ static int kmod_help(int argc, char *argv[]) | ||
117 | "Options:\n" | ||
118 | "\t-V, --version show version\n" | ||
119 | "\t-h, --help show this help\n\n" | ||
120 | - "Commands:\n", basename(argv[0])); | ||
121 | + "Commands:\n", gnu_basename(argv[0])); | ||
122 | |||
123 | for (i = 0; i < ARRAY_SIZE(kmod_cmds); i++) { | ||
124 | if (kmod_cmds[i]->help != NULL) { | ||
125 | @@ -156,7 +156,7 @@ static int handle_kmod_compat_commands(int argc, char *argv[]) | ||
126 | const char *cmd; | ||
127 | size_t i; | ||
128 | |||
129 | - cmd = basename(argv[0]); | ||
130 | + cmd = gnu_basename(argv[0]); | ||
131 | |||
132 | for (i = 0; i < ARRAY_SIZE(kmod_compat_cmds); i++) { | ||
133 | if (streq(kmod_compat_cmds[i]->name, cmd)) | ||
134 | -- | ||
135 | 2.43.0 | ||
136 | |||
diff --git a/meta/recipes-kernel/kmod/kmod/avoid_parallel_tests.patch b/meta/recipes-kernel/kmod/kmod/avoid_parallel_tests.patch deleted file mode 100644 index 04a8204815..0000000000 --- a/meta/recipes-kernel/kmod/kmod/avoid_parallel_tests.patch +++ /dev/null | |||
@@ -1,32 +0,0 @@ | |||
1 | From be6f82c54f694617c646ca1f8b5bcf93694e20ad Mon Sep 17 00:00:00 2001 | ||
2 | From: Tudor Florea <tudor.florea@enea.com> | ||
3 | Date: Fri, 6 Sep 2013 21:11:57 +0000 | ||
4 | Subject: [PATCH] kmod: avoid parallel-tests | ||
5 | |||
6 | Avoid parallel-tests as it remove | ||
7 | buildtest-TESTS and runtest-TESTS targets required by ptest. | ||
8 | In automake 1.13.4 parallel-tests is assumed by defauls. | ||
9 | In order to have buildtest-TESTS and runtest-TESTS targets | ||
10 | serial-tests is now required | ||
11 | |||
12 | Signed-off-by: Tudor Florea <tudor.florea@enea.com> | ||
13 | Upstream-Status: Inappropriate (disable feature incompatible with ptest) | ||
14 | |||
15 | --- | ||
16 | configure.ac | 2 +- | ||
17 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
18 | |||
19 | diff --git a/configure.ac b/configure.ac | ||
20 | index ee72283..60980c0 100644 | ||
21 | --- a/configure.ac | ||
22 | +++ b/configure.ac | ||
23 | @@ -14,8 +14,8 @@ AC_USE_SYSTEM_EXTENSIONS | ||
24 | AC_SYS_LARGEFILE | ||
25 | AC_PREFIX_DEFAULT([/usr]) | ||
26 | AM_MAINTAINER_MODE([enable]) | ||
27 | -AM_INIT_AUTOMAKE([check-news foreign 1.11 silent-rules tar-pax no-dist-gzip dist-xz subdir-objects color-tests parallel-tests]) | ||
28 | +AM_INIT_AUTOMAKE([check-news foreign 1.11 silent-rules tar-pax no-dist-gzip dist-xz subdir-objects color-tests serial-tests]) | ||
29 | AM_SILENT_RULES([yes]) | ||
30 | LT_INIT([disable-static pic-only]) | ||
31 | |||
32 | AS_IF([test "x$enable_static" = "xyes"], [AC_MSG_ERROR([--enable-static is not supported by kmod])]) | ||
diff --git a/meta/recipes-kernel/kmod/kmod/gtkdocdir.patch b/meta/recipes-kernel/kmod/kmod/gtkdocdir.patch deleted file mode 100644 index a34ea466e8..0000000000 --- a/meta/recipes-kernel/kmod/kmod/gtkdocdir.patch +++ /dev/null | |||
@@ -1,33 +0,0 @@ | |||
1 | From dd59095f70f774f6d1e767010e25b35ef6db4c4b Mon Sep 17 00:00:00 2001 | ||
2 | From: Ross Burton <ross.burton@arm.com> | ||
3 | Date: Fri, 8 Dec 2023 22:35:45 +0000 | ||
4 | Subject: [PATCH] configure: set docdir in GTK_DOC_CHECK | ||
5 | |||
6 | By passing --docdir in the GTK_DOC_CHECK arguments (to match | ||
7 | autogen.sh) autoreconf will work out of the box. | ||
8 | |||
9 | Without this autoreconf fails due to the documentation not being in | ||
10 | ./docs, the default location. | ||
11 | |||
12 | Upstream-Status: Submitted [https://lore.kernel.org/linux-modules/20231208224511.1363066-1-ross.burton@arm.com/T/#u] | ||
13 | Signed-off-by: Ross Burton <ross.burton@arm.com> | ||
14 | --- | ||
15 | configure.ac | 2 +- | ||
16 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
17 | |||
18 | diff --git a/configure.ac b/configure.ac | ||
19 | index de01e08..67696c4 100644 | ||
20 | --- a/configure.ac | ||
21 | +++ b/configure.ac | ||
22 | @@ -255,7 +255,7 @@ AS_IF([test "x$enable_coverage" = "xyes"], [ | ||
23 | AM_CONDITIONAL([ENABLE_COVERAGE], [test "x$enable_coverage" = "xyes"]) | ||
24 | |||
25 | m4_ifdef([GTK_DOC_CHECK], [ | ||
26 | -GTK_DOC_CHECK([1.14],[--flavour no-tmpl-flat]) | ||
27 | +GTK_DOC_CHECK([1.14],[--flavour no-tmpl-flat --docdir libkmod/docs]) | ||
28 | ], [ | ||
29 | AM_CONDITIONAL([ENABLE_GTK_DOC], false)]) | ||
30 | |||
31 | -- | ||
32 | 2.34.1 | ||
33 | |||
diff --git a/meta/recipes-kernel/kmod/kmod/run-ptest b/meta/recipes-kernel/kmod/kmod/run-ptest deleted file mode 100755 index 598dd2cb5f..0000000000 --- a/meta/recipes-kernel/kmod/kmod/run-ptest +++ /dev/null | |||
@@ -1,5 +0,0 @@ | |||
1 | #!/bin/sh | ||
2 | touch testsuite/stamp-rootfs | ||
3 | tar xf testmodule.tar | ||
4 | make -k runtest-TESTS 2>/dev/null| grep -e ^PASS -e ^FAIL | ||
5 | find testsuite -name *.ko -exec rm -f {} \; | ||
diff --git a/meta/recipes-kernel/kmod/kmod_31.bb b/meta/recipes-kernel/kmod/kmod_34.2.bb index 6ae83a7c66..e5923a64cf 100644 --- a/meta/recipes-kernel/kmod/kmod_31.bb +++ b/meta/recipes-kernel/kmod/kmod_34.2.bb | |||
@@ -13,29 +13,28 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=a6f89e2100d9b6cdffcea4f398e37343 \ | |||
13 | file://libkmod/COPYING;md5=a6f89e2100d9b6cdffcea4f398e37343 \ | 13 | file://libkmod/COPYING;md5=a6f89e2100d9b6cdffcea4f398e37343 \ |
14 | file://tools/COPYING;md5=751419260aa954499f7abaabaa882bbe \ | 14 | file://tools/COPYING;md5=751419260aa954499f7abaabaa882bbe \ |
15 | " | 15 | " |
16 | inherit autotools bash-completion gtk-doc pkgconfig manpages update-alternatives | 16 | inherit bash-completion gtk-doc manpages meson pkgconfig update-alternatives |
17 | 17 | ||
18 | SRCREV = "aff617ea871d0568cc491bd116c0be1e857463bb" | 18 | SRC_URI = "https://www.kernel.org/pub/linux/utils/kernel/${BPN}/${BP}.tar.xz \ |
19 | |||
20 | SRC_URI = "git://git.kernel.org/pub/scm/utils/kernel/kmod/kmod.git;branch=master;protocol=https \ | ||
21 | file://depmod-search.conf \ | 19 | file://depmod-search.conf \ |
22 | file://avoid_parallel_tests.patch \ | ||
23 | file://0001-Use-portable-implementation-for-basename-API.patch \ | ||
24 | file://gtkdocdir.patch \ | ||
25 | " | 20 | " |
21 | SRC_URI[sha256sum] = "5a5d5073070cc7e0c7a7a3c6ec2a0e1780850c8b47b3e3892226b93ffcb9cb54" | ||
26 | 22 | ||
27 | S = "${WORKDIR}/git" | 23 | EXTRA_OEMESON += "\ |
28 | 24 | -Ddistconfdir=${nonarch_base_libdir} \ | |
29 | EXTRA_OECONF += "--enable-tools" | 25 | --bindir=${base_bindir} \ |
26 | --sbindir=${base_sbindir} \ | ||
27 | -Dtools=true \ | ||
28 | " | ||
30 | 29 | ||
31 | PACKAGECONFIG ??= "zlib xz openssl" | 30 | PACKAGECONFIG ??= "zlib xz openssl" |
32 | PACKAGECONFIG[debug] = "--enable-debug,--disable-debug" | 31 | PACKAGECONFIG[debug] = "-Ddebug-messages=true,-Ddebug-messages=false" |
33 | PACKAGECONFIG[logging] = " --enable-logging,--disable-logging" | 32 | PACKAGECONFIG[logging] = " -Dlogging=true,-Dlogging=false" |
34 | PACKAGECONFIG[manpages] = "--enable-manpages, --disable-manpages, libxslt-native xmlto-native" | 33 | PACKAGECONFIG[manpages] = "-Dmanpages=true,-Dmanpages=false,scdoc-native" |
35 | PACKAGECONFIG[openssl] = "--with-openssl,--without-openssl,openssl" | 34 | PACKAGECONFIG[openssl] = "-Dopenssl=enabled,-Dopenssl=disabled,openssl" |
36 | PACKAGECONFIG[xz] = "--with-xz,--without-xz,xz" | 35 | PACKAGECONFIG[xz] = "-Dxz=enabled,-Dxz=disabled,xz" |
37 | PACKAGECONFIG[zlib] = "--with-zlib,--without-zlib,zlib" | 36 | PACKAGECONFIG[zlib] = "-Dzlib=enabled,-Dzlib=disabled,zlib" |
38 | PACKAGECONFIG[zstd] = "--with-zstd,--without-zstd,zstd" | 37 | PACKAGECONFIG[zstd] = "-Dzstd=enabled,-Dzstd=disabled,zstd" |
39 | 38 | ||
40 | PROVIDES += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | 39 | PROVIDES += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" |
41 | RPROVIDES:${PN} += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | 40 | RPROVIDES:${PN} += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" |
@@ -45,30 +44,19 @@ RREPLACES:${PN} += "module-init-tools-insmod-static module-init-tools-depmod mod | |||
45 | # to force user to remove old module-init-tools and replace them with kmod variants | 44 | # to force user to remove old module-init-tools and replace them with kmod variants |
46 | RCONFLICTS:libkmod2 += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" | 45 | RCONFLICTS:libkmod2 += "module-init-tools-insmod-static module-init-tools-depmod module-init-tools" |
47 | 46 | ||
48 | # autotools set prefix to /usr, however we want them in /bin and /sbin | ||
49 | EXTRA_OECONF += "--bindir=${base_bindir} --sbindir=${base_sbindir}" | ||
50 | |||
51 | do_install:append () { | 47 | do_install:append () { |
52 | install -dm755 ${D}${base_bindir} | ||
53 | install -dm755 ${D}${base_sbindir} | ||
54 | # add symlinks to kmod | ||
55 | ln -rs ${D}${base_bindir}/kmod ${D}${base_bindir}/lsmod | ||
56 | for tool in insmod rmmod depmod modinfo modprobe; do | ||
57 | ln -rs ${D}${base_bindir}/kmod ${D}${base_sbindir}/${tool} | ||
58 | done | ||
59 | # configuration directories | ||
60 | install -dm755 ${D}${nonarch_base_libdir}/depmod.d | ||
61 | install -dm755 ${D}${nonarch_base_libdir}/modprobe.d | ||
62 | install -dm755 ${D}${sysconfdir}/depmod.d | ||
63 | install -dm755 ${D}${sysconfdir}/modprobe.d | ||
64 | |||
65 | # install depmod.d file for search/ dir | 48 | # install depmod.d file for search/ dir |
66 | install -Dm644 "${WORKDIR}/depmod-search.conf" "${D}${nonarch_base_libdir}/depmod.d/search.conf" | 49 | install -Dm644 "${UNPACKDIR}/depmod-search.conf" "${D}${nonarch_base_libdir}/depmod.d/search.conf" |
67 | 50 | ||
68 | # Add .debug to the exclude path for depmod | 51 | # Add .debug to the exclude path for depmod |
69 | echo "exclude .debug" > ${D}${nonarch_base_libdir}/depmod.d/exclude.conf | 52 | echo "exclude .debug" > ${D}${nonarch_base_libdir}/depmod.d/exclude.conf |
70 | } | 53 | } |
71 | 54 | ||
55 | PACKAGES += "${PN}-fish-completion ${PN}-zsh-completion" | ||
56 | |||
57 | FILES:${PN}-fish-completion = "${datadir}/fish" | ||
58 | FILES:${PN}-zsh-completion = "${datadir}/zsh" | ||
59 | |||
72 | ALTERNATIVE_PRIORITY = "70" | 60 | ALTERNATIVE_PRIORITY = "70" |
73 | 61 | ||
74 | ALTERNATIVE:kmod = "insmod modprobe rmmod modinfo bin-lsmod lsmod depmod" | 62 | ALTERNATIVE:kmod = "insmod modprobe rmmod modinfo bin-lsmod lsmod depmod" |
@@ -78,9 +66,9 @@ ALTERNATIVE_LINK_NAME[insmod] = "${base_sbindir}/insmod" | |||
78 | ALTERNATIVE_LINK_NAME[modprobe] = "${base_sbindir}/modprobe" | 66 | ALTERNATIVE_LINK_NAME[modprobe] = "${base_sbindir}/modprobe" |
79 | ALTERNATIVE_LINK_NAME[rmmod] = "${base_sbindir}/rmmod" | 67 | ALTERNATIVE_LINK_NAME[rmmod] = "${base_sbindir}/rmmod" |
80 | ALTERNATIVE_LINK_NAME[modinfo] = "${base_sbindir}/modinfo" | 68 | ALTERNATIVE_LINK_NAME[modinfo] = "${base_sbindir}/modinfo" |
81 | ALTERNATIVE_LINK_NAME[bin-lsmod] = "${base_bindir}/lsmod" | 69 | ALTERNATIVE_LINK_NAME[bin-lsmod] = "${base_sbindir}/lsmod" |
82 | ALTERNATIVE_LINK_NAME[lsmod] = "${base_sbindir}/lsmod" | 70 | ALTERNATIVE_LINK_NAME[lsmod] = "${base_sbindir}/lsmod" |
83 | ALTERNATIVE_TARGET[lsmod] = "${base_bindir}/lsmod.${BPN}" | 71 | ALTERNATIVE_TARGET[lsmod] = "${base_sbindir}/lsmod.${BPN}" |
84 | 72 | ||
85 | PACKAGES =+ "libkmod" | 73 | PACKAGES =+ "libkmod" |
86 | FILES:libkmod = "${base_libdir}/libkmod*${SOLIBS} ${libdir}/libkmod*${SOLIBS}" | 74 | FILES:libkmod = "${base_libdir}/libkmod*${SOLIBS} ${libdir}/libkmod*${SOLIBS}" |
diff --git a/meta/recipes-kernel/libtraceevent/libtraceevent/meson.patch b/meta/recipes-kernel/libtraceevent/libtraceevent/meson.patch deleted file mode 100644 index 38b6107136..0000000000 --- a/meta/recipes-kernel/libtraceevent/libtraceevent/meson.patch +++ /dev/null | |||
@@ -1,74 +0,0 @@ | |||
1 | Fixes for the Meson build of libtraceevent: | ||
2 | |||
3 | - Make the plugin directory the same as the Makefiles | ||
4 | - Install the plugins as modules not static and versioned shared libraries | ||
5 | - Add an option to disable building the documentation (needs asciidoc and xmlto) | ||
6 | |||
7 | Upstream-Status: Pending | ||
8 | Signed-off-by: Ross Burton <ross.burton@arm.com> | ||
9 | |||
10 | diff --git a/meson.build b/meson.build | ||
11 | index b61c873..4bba4d8 100644 | ||
12 | --- a/meson.build | ||
13 | +++ b/meson.build | ||
14 | @@ -25,7 +25,7 @@ htmldir = join_paths(prefixdir, get_option('htmldir')) | ||
15 | libdir = join_paths(prefixdir, get_option('libdir')) | ||
16 | plugindir = get_option('plugindir') | ||
17 | if plugindir == '' | ||
18 | - plugindir = join_paths(libdir, 'libtraceevent/plugins') | ||
19 | + plugindir = join_paths(libdir, 'traceevent/plugins') | ||
20 | endif | ||
21 | |||
22 | add_project_arguments( | ||
23 | @@ -45,10 +45,13 @@ if cunit_dep.found() | ||
24 | subdir('utest') | ||
25 | endif | ||
26 | subdir('samples') | ||
27 | -subdir('Documentation') | ||
28 | |||
29 | -custom_target( | ||
30 | - 'docs', | ||
31 | - output: 'docs', | ||
32 | - depends: [html, man], | ||
33 | - command: ['echo']) | ||
34 | +if get_option('docs') | ||
35 | + subdir('Documentation') | ||
36 | + | ||
37 | + custom_target( | ||
38 | + 'docs', | ||
39 | + output: 'docs', | ||
40 | + depends: [html, man], | ||
41 | + command: ['echo']) | ||
42 | +endif | ||
43 | diff --git a/meson_options.txt b/meson_options.txt | ||
44 | index b2294f6..0611216 100644 | ||
45 | --- a/meson_options.txt | ||
46 | +++ b/meson_options.txt | ||
47 | @@ -4,6 +4,10 @@ | ||
48 | |||
49 | option('plugindir', type : 'string', | ||
50 | description : 'set the plugin dir') | ||
51 | + | ||
52 | +option('docs', type : 'boolean', value: true, | ||
53 | + description : 'build documentation') | ||
54 | + | ||
55 | option('htmldir', type : 'string', value : 'share/doc/libtraceevent-doc', | ||
56 | description : 'directory for HTML documentation') | ||
57 | option('asciidoctor', type : 'boolean', value: false, | ||
58 | diff --git a/plugins/meson.build b/plugins/meson.build | ||
59 | index 74ad664..4919be4 100644 | ||
60 | --- a/plugins/meson.build | ||
61 | +++ b/plugins/meson.build | ||
62 | @@ -19,11 +19,10 @@ plugins = [ | ||
63 | |||
64 | pdeps = [] | ||
65 | foreach plugin : plugins | ||
66 | - pdeps += library( | ||
67 | + pdeps += shared_module( | ||
68 | plugin.replace('.c', ''), | ||
69 | plugin, | ||
70 | name_prefix: '', | ||
71 | - version: library_version, | ||
72 | dependencies: [libtraceevent_dep], | ||
73 | include_directories: [incdir], | ||
74 | install: true, | ||
diff --git a/meta/recipes-kernel/libtraceevent/libtraceevent_1.7.3.bb b/meta/recipes-kernel/libtraceevent/libtraceevent_1.8.4.bb index bee7891832..75762e4def 100644 --- a/meta/recipes-kernel/libtraceevent/libtraceevent_1.7.3.bb +++ b/meta/recipes-kernel/libtraceevent/libtraceevent_1.8.4.bb | |||
@@ -8,15 +8,13 @@ LIC_FILES_CHKSUM = "file://LICENSES/GPL-2.0;md5=e6a75371ba4d16749254a51215d13f97 | |||
8 | file://LICENSES/LGPL-2.1;md5=b370887980db5dd40659b50909238dbd" | 8 | file://LICENSES/LGPL-2.1;md5=b370887980db5dd40659b50909238dbd" |
9 | SECTION = "libs" | 9 | SECTION = "libs" |
10 | 10 | ||
11 | SRCREV = "dd148189b74da3e2f45c7e536319fec97cb71213" | 11 | SRCREV = "bd47bd544c9ebc9f44bd88c2b2f2049230741058" |
12 | SRC_URI = "git://git.kernel.org/pub/scm/libs/libtrace/libtraceevent.git;branch=${BPN};protocol=https \ | 12 | SRC_URI = "git://git.kernel.org/pub/scm/libs/libtrace/libtraceevent.git;branch=${BPN};protocol=https \ |
13 | file://meson.patch" | 13 | " |
14 | |||
15 | S = "${WORKDIR}/git" | ||
16 | 14 | ||
17 | inherit meson pkgconfig | 15 | inherit meson pkgconfig |
18 | 16 | ||
19 | EXTRA_OEMESON = "-Ddocs=false" | 17 | EXTRA_OEMESON = "-Ddoc=false" |
20 | 18 | ||
21 | PACKAGES += "${PN}-plugins" | 19 | PACKAGES += "${PN}-plugins" |
22 | 20 | ||
diff --git a/meta/recipes-kernel/linux-firmware/linux-firmware_20240220.bb b/meta/recipes-kernel/linux-firmware/linux-firmware_20250509.bb index b35802d1dc..ea75271af8 100644 --- a/meta/recipes-kernel/linux-firmware/linux-firmware_20240220.bb +++ b/meta/recipes-kernel/linux-firmware/linux-firmware_20250509.bb | |||
@@ -39,6 +39,7 @@ LICENSE = "\ | |||
39 | & Firmware-kaweth \ | 39 | & Firmware-kaweth \ |
40 | & Firmware-linaro \ | 40 | & Firmware-linaro \ |
41 | & Firmware-Lontium \ | 41 | & Firmware-Lontium \ |
42 | & Firmware-mali_csffw \ | ||
42 | & Firmware-Marvell \ | 43 | & Firmware-Marvell \ |
43 | & Firmware-mediatek \ | 44 | & Firmware-mediatek \ |
44 | & Firmware-microchip \ | 45 | & Firmware-microchip \ |
@@ -54,6 +55,7 @@ LICENSE = "\ | |||
54 | & Firmware-powervr \ | 55 | & Firmware-powervr \ |
55 | & Firmware-qat \ | 56 | & Firmware-qat \ |
56 | & Firmware-qcom \ | 57 | & Firmware-qcom \ |
58 | & Firmware-qcom-2 \ | ||
57 | & Firmware-qcom-yamato \ | 59 | & Firmware-qcom-yamato \ |
58 | & Firmware-qla1280 \ | 60 | & Firmware-qla1280 \ |
59 | & Firmware-qla2xxx \ | 61 | & Firmware-qla2xxx \ |
@@ -71,6 +73,7 @@ LICENSE = "\ | |||
71 | & Firmware-ti-keystone \ | 73 | & Firmware-ti-keystone \ |
72 | & Firmware-ueagle-atm4-firmware \ | 74 | & Firmware-ueagle-atm4-firmware \ |
73 | & Firmware-via_vt6656 \ | 75 | & Firmware-via_vt6656 \ |
76 | & Firmware-wfx \ | ||
74 | & Firmware-wl1251 \ | 77 | & Firmware-wl1251 \ |
75 | & Firmware-xc4000 \ | 78 | & Firmware-xc4000 \ |
76 | & Firmware-xc5000 \ | 79 | & Firmware-xc5000 \ |
@@ -82,7 +85,7 @@ LICENSE = "\ | |||
82 | LIC_FILES_CHKSUM = "file://LICENCE.Abilis;md5=b5ee3f410780e56711ad48eadc22b8bc \ | 85 | LIC_FILES_CHKSUM = "file://LICENCE.Abilis;md5=b5ee3f410780e56711ad48eadc22b8bc \ |
83 | file://LICENCE.adsp_sst;md5=615c45b91a5a4a9fe046d6ab9a2df728 \ | 86 | file://LICENCE.adsp_sst;md5=615c45b91a5a4a9fe046d6ab9a2df728 \ |
84 | file://LICENCE.agere;md5=af0133de6b4a9b2522defd5f188afd31 \ | 87 | file://LICENCE.agere;md5=af0133de6b4a9b2522defd5f188afd31 \ |
85 | file://LICENSE.amdgpu;md5=a2589a05ea5b6bd2b7f4f623c7e7a649 \ | 88 | file://LICENSE.amdgpu;md5=1433dfea38c97a2e563a248a863dcb94 \ |
86 | file://LICENSE.amd-ucode;md5=6ca90c57f7b248de1e25c7f68ffc4698 \ | 89 | file://LICENSE.amd-ucode;md5=6ca90c57f7b248de1e25c7f68ffc4698 \ |
87 | file://LICENSE.amlogic_vdec;md5=dc44f59bf64a81643e500ad3f39a468a \ | 90 | file://LICENSE.amlogic_vdec;md5=dc44f59bf64a81643e500ad3f39a468a \ |
88 | file://LICENSE.amphion_vpu;md5=2bcdc00527b2d0542bd92b52aaec2b60 \ | 91 | file://LICENSE.amphion_vpu;md5=2bcdc00527b2d0542bd92b52aaec2b60 \ |
@@ -113,6 +116,7 @@ LIC_FILES_CHKSUM = "file://LICENCE.Abilis;md5=b5ee3f410780e56711ad48eadc22b8bc \ | |||
113 | file://LICENCE.kaweth;md5=b1d876e562f4b3b8d391ad8395dfe03f \ | 116 | file://LICENCE.kaweth;md5=b1d876e562f4b3b8d391ad8395dfe03f \ |
114 | file://LICENCE.linaro;md5=936d91e71cf9cd30e733db4bf11661cc \ | 117 | file://LICENCE.linaro;md5=936d91e71cf9cd30e733db4bf11661cc \ |
115 | file://LICENSE.Lontium;md5=4ec8dc582ff7295f39e2ca6a7b0be2b6 \ | 118 | file://LICENSE.Lontium;md5=4ec8dc582ff7295f39e2ca6a7b0be2b6 \ |
119 | file://LICENCE.mali_csffw;md5=e064aaec4d21ef856e1b76a6f5dc435f \ | ||
116 | file://LICENCE.Marvell;md5=28b6ed8bd04ba105af6e4dcd6e997772 \ | 120 | file://LICENCE.Marvell;md5=28b6ed8bd04ba105af6e4dcd6e997772 \ |
117 | file://LICENCE.mediatek;md5=7c1976b63217d76ce47d0a11d8a79cf2 \ | 121 | file://LICENCE.mediatek;md5=7c1976b63217d76ce47d0a11d8a79cf2 \ |
118 | file://LICENCE.microchip;md5=db753b00305675dfbf120e3f24a47277 \ | 122 | file://LICENCE.microchip;md5=db753b00305675dfbf120e3f24a47277 \ |
@@ -129,6 +133,7 @@ LIC_FILES_CHKSUM = "file://LICENCE.Abilis;md5=b5ee3f410780e56711ad48eadc22b8bc \ | |||
129 | file://LICENSE.powervr;md5=83045ed2a2cda15b4eaff682c98c9533 \ | 133 | file://LICENSE.powervr;md5=83045ed2a2cda15b4eaff682c98c9533 \ |
130 | file://LICENCE.qat_firmware;md5=72de83dfd9b87be7685ed099a39fbea4 \ | 134 | file://LICENCE.qat_firmware;md5=72de83dfd9b87be7685ed099a39fbea4 \ |
131 | file://LICENSE.qcom;md5=164e3362a538eb11d3ac51e8e134294b \ | 135 | file://LICENSE.qcom;md5=164e3362a538eb11d3ac51e8e134294b \ |
136 | file://LICENSE.qcom-2;md5=165287851294f2fb8ac8cbc5e24b02b0 \ | ||
132 | file://LICENSE.qcom_yamato;md5=d0de0eeccaf1843a850bf7a6777eec5c \ | 137 | file://LICENSE.qcom_yamato;md5=d0de0eeccaf1843a850bf7a6777eec5c \ |
133 | file://LICENCE.qla1280;md5=d6895732e622d950609093223a2c4f5d \ | 138 | file://LICENCE.qla1280;md5=d6895732e622d950609093223a2c4f5d \ |
134 | file://LICENCE.qla2xxx;md5=505855e921b75f1be4a437ad9b79dff0 \ | 139 | file://LICENCE.qla2xxx;md5=505855e921b75f1be4a437ad9b79dff0 \ |
@@ -142,7 +147,7 @@ LIC_FILES_CHKSUM = "file://LICENCE.Abilis;md5=b5ee3f410780e56711ad48eadc22b8bc \ | |||
142 | file://LICENCE.rtlwifi_firmware.txt;md5=00d06cfd3eddd5a2698948ead2ad54a5 \ | 147 | file://LICENCE.rtlwifi_firmware.txt;md5=00d06cfd3eddd5a2698948ead2ad54a5 \ |
143 | file://LICENSE.sdma_firmware;md5=51e8c19ecc2270f4b8ea30341ad63ce9 \ | 148 | file://LICENSE.sdma_firmware;md5=51e8c19ecc2270f4b8ea30341ad63ce9 \ |
144 | file://LICENCE.siano;md5=4556c1bf830067f12ca151ad953ec2a5 \ | 149 | file://LICENCE.siano;md5=4556c1bf830067f12ca151ad953ec2a5 \ |
145 | file://LICENCE.ti-connectivity;md5=c5e02be633f1499c109d1652514d85ec \ | 150 | file://LICENCE.ti-connectivity;md5=3b1e9cf54aba8146dad4b735777d406f \ |
146 | file://LICENCE.ti-keystone;md5=3a86335d32864b0bef996bee26cc0f2c \ | 151 | file://LICENCE.ti-keystone;md5=3a86335d32864b0bef996bee26cc0f2c \ |
147 | file://LICENCE.ueagle-atm4-firmware;md5=4ed7ea6b507ccc583b9d594417714118 \ | 152 | file://LICENCE.ueagle-atm4-firmware;md5=4ed7ea6b507ccc583b9d594417714118 \ |
148 | file://LICENCE.via_vt6656;md5=e4159694cba42d4377a912e78a6e850f \ | 153 | file://LICENCE.via_vt6656;md5=e4159694cba42d4377a912e78a6e850f \ |
@@ -150,11 +155,12 @@ LIC_FILES_CHKSUM = "file://LICENCE.Abilis;md5=b5ee3f410780e56711ad48eadc22b8bc \ | |||
150 | file://LICENCE.xc4000;md5=0ff51d2dc49fce04814c9155081092f0 \ | 155 | file://LICENCE.xc4000;md5=0ff51d2dc49fce04814c9155081092f0 \ |
151 | file://LICENCE.xc5000;md5=1e170c13175323c32c7f4d0998d53f66 \ | 156 | file://LICENCE.xc5000;md5=1e170c13175323c32c7f4d0998d53f66 \ |
152 | file://LICENCE.xc5000c;md5=12b02efa3049db65d524aeb418dd87ca \ | 157 | file://LICENCE.xc5000c;md5=12b02efa3049db65d524aeb418dd87ca \ |
158 | file://wfx/LICENCE.wf200;md5=4d1beff00d902c05c9c7e95a5d8eb52d \ | ||
153 | file://WHENCE;md5=${WHENCE_CHKSUM} \ | 159 | file://WHENCE;md5=${WHENCE_CHKSUM} \ |
154 | " | 160 | " |
155 | # WHENCE checksum is defined separately to ease overriding it if | 161 | # WHENCE checksum is defined separately to ease overriding it if |
156 | # class-devupstream is selected. | 162 | # class-devupstream is selected. |
157 | WHENCE_CHKSUM = "a344e6c28970fc7daafa81c10247aeb6" | 163 | WHENCE_CHKSUM = "d85e2f182f489a235400712cbfdb017a" |
158 | 164 | ||
159 | # These are not common licenses, set NO_GENERIC_LICENSE for them | 165 | # These are not common licenses, set NO_GENERIC_LICENSE for them |
160 | # so that the license files will be copied from fetched source | 166 | # so that the license files will be copied from fetched source |
@@ -192,6 +198,7 @@ NO_GENERIC_LICENSE[Firmware-iwlwifi_firmware] = "LICENCE.iwlwifi_firmware" | |||
192 | NO_GENERIC_LICENSE[Firmware-kaweth] = "LICENCE.kaweth" | 198 | NO_GENERIC_LICENSE[Firmware-kaweth] = "LICENCE.kaweth" |
193 | NO_GENERIC_LICENSE[Firmware-linaro] = "LICENCE.linaro" | 199 | NO_GENERIC_LICENSE[Firmware-linaro] = "LICENCE.linaro" |
194 | NO_GENERIC_LICENSE[Firmware-Lontium] = "LICENSE.Lontium" | 200 | NO_GENERIC_LICENSE[Firmware-Lontium] = "LICENSE.Lontium" |
201 | NO_GENERIC_LICENSE[Firmware-mali_csffw] = "LICENCE.mali_csffw" | ||
195 | NO_GENERIC_LICENSE[Firmware-Marvell] = "LICENCE.Marvell" | 202 | NO_GENERIC_LICENSE[Firmware-Marvell] = "LICENCE.Marvell" |
196 | NO_GENERIC_LICENSE[Firmware-mediatek] = "LICENCE.mediatek" | 203 | NO_GENERIC_LICENSE[Firmware-mediatek] = "LICENCE.mediatek" |
197 | NO_GENERIC_LICENSE[Firmware-microchip] = "LICENCE.microchip" | 204 | NO_GENERIC_LICENSE[Firmware-microchip] = "LICENCE.microchip" |
@@ -207,6 +214,7 @@ NO_GENERIC_LICENSE[Firmware-phanfw] = "LICENCE.phanfw" | |||
207 | NO_GENERIC_LICENSE[Firmware-powervr] = "LICENSE.powervr" | 214 | NO_GENERIC_LICENSE[Firmware-powervr] = "LICENSE.powervr" |
208 | NO_GENERIC_LICENSE[Firmware-qat] = "LICENCE.qat_firmware" | 215 | NO_GENERIC_LICENSE[Firmware-qat] = "LICENCE.qat_firmware" |
209 | NO_GENERIC_LICENSE[Firmware-qcom] = "LICENSE.qcom" | 216 | NO_GENERIC_LICENSE[Firmware-qcom] = "LICENSE.qcom" |
217 | NO_GENERIC_LICENSE[Firmware-qcom-2] = "LICENSE.qcom-2" | ||
210 | NO_GENERIC_LICENSE[Firmware-qcom-yamato] = "LICENSE.qcom_yamato" | 218 | NO_GENERIC_LICENSE[Firmware-qcom-yamato] = "LICENSE.qcom_yamato" |
211 | NO_GENERIC_LICENSE[Firmware-qla1280] = "LICENCE.qla1280" | 219 | NO_GENERIC_LICENSE[Firmware-qla1280] = "LICENCE.qla1280" |
212 | NO_GENERIC_LICENSE[Firmware-qla2xxx] = "LICENCE.qla2xxx" | 220 | NO_GENERIC_LICENSE[Firmware-qla2xxx] = "LICENCE.qla2xxx" |
@@ -224,6 +232,7 @@ NO_GENERIC_LICENSE[Firmware-ti-connectivity] = "LICENCE.ti-connectivity" | |||
224 | NO_GENERIC_LICENSE[Firmware-ti-keystone] = "LICENCE.ti-keystone" | 232 | NO_GENERIC_LICENSE[Firmware-ti-keystone] = "LICENCE.ti-keystone" |
225 | NO_GENERIC_LICENSE[Firmware-ueagle-atm4-firmware] = "LICENCE.ueagle-atm4-firmware" | 233 | NO_GENERIC_LICENSE[Firmware-ueagle-atm4-firmware] = "LICENCE.ueagle-atm4-firmware" |
226 | NO_GENERIC_LICENSE[Firmware-via_vt6656] = "LICENCE.via_vt6656" | 234 | NO_GENERIC_LICENSE[Firmware-via_vt6656] = "LICENCE.via_vt6656" |
235 | NO_GENERIC_LICENSE[Firmware-wfx] = "wfx/LICENCE.wf200" | ||
227 | NO_GENERIC_LICENSE[Firmware-wl1251] = "LICENCE.wl1251" | 236 | NO_GENERIC_LICENSE[Firmware-wl1251] = "LICENCE.wl1251" |
228 | NO_GENERIC_LICENSE[Firmware-xc4000] = "LICENCE.xc4000" | 237 | NO_GENERIC_LICENSE[Firmware-xc4000] = "LICENCE.xc4000" |
229 | NO_GENERIC_LICENSE[Firmware-xc5000] = "LICENCE.xc5000" | 238 | NO_GENERIC_LICENSE[Firmware-xc5000] = "LICENCE.xc5000" |
@@ -241,40 +250,83 @@ SRC_URI:class-devupstream = "git://git.kernel.org/pub/scm/linux/kernel/git/firmw | |||
241 | # Pin this to the 20220509 release, override this in local.conf | 250 | # Pin this to the 20220509 release, override this in local.conf |
242 | SRCREV:class-devupstream ?= "b19cbdca78ab2adfd210c91be15a22568e8b8cae" | 251 | SRCREV:class-devupstream ?= "b19cbdca78ab2adfd210c91be15a22568e8b8cae" |
243 | 252 | ||
244 | SRC_URI[sha256sum] = "bf0f239dc0801e9d6bf5d5fb3e2f549575632cf4688f4348184199cb02c2bcd7" | 253 | SRC_URI[sha256sum] = "f2c60d66f226a28130cb5643e6e544d3229673460e127c91ba03f1080cbd703e" |
245 | 254 | ||
246 | inherit allarch | 255 | inherit allarch |
247 | 256 | ||
248 | CLEANBROKEN = "1" | 257 | CLEANBROKEN = "1" |
249 | 258 | ||
250 | # Use PACKAGECONFIG_CONFARGS to set the Makefile target | ||
251 | PACKAGECONFIG ??= "" | 259 | PACKAGECONFIG ??= "" |
252 | # Enabling dedup will turn duplicate firmware files into links | 260 | PACKAGECONFIG[deduplicate] = ",,rdfind-native" |
253 | PACKAGECONFIG[deduplicate] = "install,install-nodedup,rdfind-native" | 261 | |
262 | # Possible values are "xz" and "zst". | ||
263 | FIRMWARE_COMPRESSION ?= "" | ||
264 | |||
265 | # Specifying -j requires GNU parallel, which is a part of meta-oe | ||
266 | PARALLEL_MAKE = "" | ||
267 | |||
268 | def fw_compr_suffix(d): | ||
269 | compr = d.getVar('FIRMWARE_COMPRESSION') | ||
270 | if compr == '': | ||
271 | return '' | ||
272 | if compr == 'zstd': | ||
273 | compr = 'zst' | ||
274 | return '-' + compr | ||
254 | 275 | ||
255 | do_compile() { | 276 | do_compile() { |
256 | : | 277 | : |
257 | } | 278 | } |
258 | 279 | ||
259 | do_install() { | 280 | do_install() { |
260 | oe_runmake 'DESTDIR=${D}' 'FIRMWAREDIR=${nonarch_base_libdir}/firmware' ${PACKAGECONFIG_CONFARGS} | 281 | sed -i 's:^./check_whence.py:#./check_whence.py:' ${S}/copy-firmware.sh |
282 | |||
283 | oe_runmake 'DESTDIR=${D}' 'FIRMWAREDIR=${nonarch_base_libdir}/firmware' install${@fw_compr_suffix(d)} | ||
284 | if [ "${@bb.utils.contains('PACKAGECONFIG', 'deduplicate', '1', '0', d)}" = "1" ]; then | ||
285 | oe_runmake 'DESTDIR=${D}' 'FIRMWAREDIR=${nonarch_base_libdir}/firmware' dedup | ||
286 | fi | ||
261 | cp LICEN[CS]E.* WHENCE ${D}${nonarch_base_libdir}/firmware/ | 287 | cp LICEN[CS]E.* WHENCE ${D}${nonarch_base_libdir}/firmware/ |
288 | cp wfx/LICEN[CS]E.* ${D}${nonarch_base_libdir}/firmware/wfx/ | ||
262 | } | 289 | } |
263 | 290 | ||
264 | |||
265 | PACKAGES =+ "${PN}-amphion-vpu-license ${PN}-amphion-vpu \ | 291 | PACKAGES =+ "${PN}-amphion-vpu-license ${PN}-amphion-vpu \ |
266 | ${PN}-cw1200-license ${PN}-cw1200 \ | 292 | ${PN}-cw1200-license ${PN}-cw1200 \ |
267 | ${PN}-ralink-license ${PN}-ralink \ | 293 | ${PN}-ralink-license ${PN}-ralink \ |
268 | ${PN}-mt76x-license ${PN}-mt7601u ${PN}-mt7650 ${PN}-mt76x2 \ | 294 | ${PN}-mt76x-license ${PN}-mt7601u ${PN}-mt7650 ${PN}-mt76x2 \ |
269 | ${PN}-radeon-license ${PN}-radeon \ | 295 | ${PN}-radeon-license ${PN}-radeon \ |
270 | ${PN}-amdgpu-license ${PN}-amdgpu \ | 296 | ${PN}-amdgpu-license ${PN}-amdgpu \ |
297 | ${PN}-amdgpu-aldebaran \ | ||
298 | ${PN}-amdgpu-carrizo \ | ||
299 | ${PN}-amdgpu-cezanne \ | ||
300 | ${PN}-amdgpu-fiji \ | ||
301 | ${PN}-amdgpu-hawaii \ | ||
302 | ${PN}-amdgpu-navi10 \ | ||
303 | ${PN}-amdgpu-navi14 \ | ||
304 | ${PN}-amdgpu-navi21 \ | ||
305 | ${PN}-amdgpu-navi22 \ | ||
306 | ${PN}-amdgpu-navi23 \ | ||
307 | ${PN}-amdgpu-navi24 \ | ||
308 | ${PN}-amdgpu-navi31 \ | ||
309 | ${PN}-amdgpu-navi32 \ | ||
310 | ${PN}-amdgpu-oland \ | ||
311 | ${PN}-amdgpu-polaris10 \ | ||
312 | ${PN}-amdgpu-polaris11 \ | ||
313 | ${PN}-amdgpu-polaris12 \ | ||
314 | ${PN}-amdgpu-raven \ | ||
315 | ${PN}-amdgpu-rembrandt \ | ||
316 | ${PN}-amdgpu-renoir \ | ||
317 | ${PN}-amdgpu-stoney \ | ||
318 | ${PN}-amdgpu-tonga \ | ||
319 | ${PN}-amdgpu-topaz \ | ||
320 | ${PN}-amdgpu-vega10 \ | ||
321 | ${PN}-amdgpu-vega12 \ | ||
322 | ${PN}-amdgpu-misc \ | ||
271 | ${PN}-marvell-license ${PN}-pcie8897 ${PN}-pcie8997 \ | 323 | ${PN}-marvell-license ${PN}-pcie8897 ${PN}-pcie8997 \ |
272 | ${PN}-mediatek-license ${PN}-mediatek \ | 324 | ${PN}-mediatek-license ${PN}-mediatek \ |
273 | ${PN}-microchip-license ${PN}-microchip \ | 325 | ${PN}-microchip-license ${PN}-microchip \ |
274 | ${PN}-moxa-license ${PN}-moxa \ | 326 | ${PN}-moxa-license ${PN}-moxa \ |
275 | ${PN}-sd8686 ${PN}-sd8688 ${PN}-sd8787 ${PN}-sd8797 ${PN}-sd8801 \ | 327 | ${PN}-sd8686 ${PN}-sd8688 ${PN}-sd8787 ${PN}-sd8797 ${PN}-sd8801 \ |
276 | ${PN}-sd8887 ${PN}-sd8897 ${PN}-sd8997 ${PN}-usb8997 \ | 328 | ${PN}-sd8887 ${PN}-sd8897 ${PN}-sd8997 ${PN}-usb8997 \ |
277 | ${PN}-ti-connectivity-license ${PN}-wlcommon ${PN}-wl12xx ${PN}-wl18xx \ | 329 | ${PN}-ti-connectivity-license ${PN}-wlcommon ${PN}-wl12xx ${PN}-wl18xx ${PN}-cc33xx \ |
278 | ${PN}-ti-keystone-license ${PN}-ti-keystone \ | 330 | ${PN}-ti-keystone-license ${PN}-ti-keystone \ |
279 | ${PN}-vt6656-license ${PN}-vt6656 \ | 331 | ${PN}-vt6656-license ${PN}-vt6656 \ |
280 | ${PN}-rs9113 ${PN}-rs9116 \ | 332 | ${PN}-rs9113 ${PN}-rs9116 \ |
@@ -322,7 +374,46 @@ PACKAGES =+ "${PN}-amphion-vpu-license ${PN}-amphion-vpu \ | |||
322 | ${PN}-cnm-license ${PN}-cnm \ | 374 | ${PN}-cnm-license ${PN}-cnm \ |
323 | ${PN}-atheros-license ${PN}-ar5523 ${PN}-ar9170 ${PN}-ath6k ${PN}-ath9k ${PN}-ath3k \ | 375 | ${PN}-atheros-license ${PN}-ar5523 ${PN}-ar9170 ${PN}-ath6k ${PN}-ath9k ${PN}-ath3k \ |
324 | ${PN}-carl9170 \ | 376 | ${PN}-carl9170 \ |
325 | ${PN}-ar3k-license ${PN}-ar3k ${PN}-ath10k-license ${PN}-ath10k ${PN}-ath11k ${PN}-qca \ | 377 | ${PN}-qcom-qcm2290-wifi ${PN}-qcom-qrb4210-wifi ${PN}-qcom-sdm845-modem \ |
378 | ${PN}-ar3k-license ${PN}-ar3k \ | ||
379 | ${PN}-ath10k-license ${PN}-ath10k \ | ||
380 | ${PN}-ath10k-qca4019 \ | ||
381 | ${PN}-ath10k-qca6174 \ | ||
382 | ${PN}-ath10k-qca9377 \ | ||
383 | ${PN}-ath10k-qca9887 \ | ||
384 | ${PN}-ath10k-qca9888 \ | ||
385 | ${PN}-ath10k-qca988x \ | ||
386 | ${PN}-ath10k-qca9984 \ | ||
387 | ${PN}-ath10k-qca99x0 \ | ||
388 | ${PN}-ath10k-wcn3990 \ | ||
389 | ${PN}-ath10k-misc \ | ||
390 | ${PN}-ath11k \ | ||
391 | ${PN}-ath11k-ipq5018 \ | ||
392 | ${PN}-ath11k-ipq6018 \ | ||
393 | ${PN}-ath11k-ipq8074 \ | ||
394 | ${PN}-ath11k-qca2066 \ | ||
395 | ${PN}-ath11k-qca6390 \ | ||
396 | ${PN}-ath11k-qca6698aq \ | ||
397 | ${PN}-ath11k-qcn9074 \ | ||
398 | ${PN}-ath11k-wcn6750 \ | ||
399 | ${PN}-ath11k-wcn6855 \ | ||
400 | ${PN}-ath11k-misc \ | ||
401 | ${PN}-ath12k \ | ||
402 | ${PN}-ath12k-qcn9274 \ | ||
403 | ${PN}-ath12k-wcn7850 \ | ||
404 | ${PN}-ath12k-misc \ | ||
405 | ${PN}-qca \ | ||
406 | ${PN}-qca-qca61x4-serial \ | ||
407 | ${PN}-qca-qca61x4-usb \ | ||
408 | ${PN}-qca-qca6390 \ | ||
409 | ${PN}-qca-qca6698 \ | ||
410 | ${PN}-qca-wcn3950 \ | ||
411 | ${PN}-qca-wcn3988 \ | ||
412 | ${PN}-qca-wcn399x \ | ||
413 | ${PN}-qca-wcn6750 \ | ||
414 | ${PN}-qca-qca2066 \ | ||
415 | ${PN}-qca-wcn7850 \ | ||
416 | ${PN}-qca-misc \ | ||
326 | \ | 417 | \ |
327 | ${PN}-imx-sdma-license ${PN}-imx-sdma-imx6q ${PN}-imx-sdma-imx7d \ | 418 | ${PN}-imx-sdma-license ${PN}-imx-sdma-imx6q ${PN}-imx-sdma-imx7d \ |
328 | \ | 419 | \ |
@@ -343,6 +434,7 @@ PACKAGES =+ "${PN}-amphion-vpu-license ${PN}-amphion-vpu \ | |||
343 | ${PN}-ibt-license ${PN}-ibt \ | 434 | ${PN}-ibt-license ${PN}-ibt \ |
344 | ${PN}-ibt-11-5 ${PN}-ibt-12-16 ${PN}-ibt-hw-37-7 ${PN}-ibt-hw-37-8 \ | 435 | ${PN}-ibt-11-5 ${PN}-ibt-12-16 ${PN}-ibt-hw-37-7 ${PN}-ibt-hw-37-8 \ |
345 | ${PN}-ibt-17 \ | 436 | ${PN}-ibt-17 \ |
437 | ${PN}-ibt-18 \ | ||
346 | ${PN}-ibt-20 \ | 438 | ${PN}-ibt-20 \ |
347 | ${PN}-ibt-misc \ | 439 | ${PN}-ibt-misc \ |
348 | ${PN}-i915-license ${PN}-i915 \ | 440 | ${PN}-i915-license ${PN}-i915 \ |
@@ -352,6 +444,8 @@ PACKAGES =+ "${PN}-amphion-vpu-license ${PN}-amphion-vpu \ | |||
352 | ${PN}-bnx2 \ | 444 | ${PN}-bnx2 \ |
353 | ${PN}-bnx2x \ | 445 | ${PN}-bnx2x \ |
354 | ${PN}-liquidio \ | 446 | ${PN}-liquidio \ |
447 | ${PN}-linaro-license \ | ||
448 | ${PN}-mali-csffw-arch108 ${PN}-mali-csffw-license \ | ||
355 | ${PN}-mellanox \ | 449 | ${PN}-mellanox \ |
356 | ${PN}-nvidia-license \ | 450 | ${PN}-nvidia-license \ |
357 | ${PN}-nvidia-tegra-k1 ${PN}-nvidia-tegra \ | 451 | ${PN}-nvidia-tegra-k1 ${PN}-nvidia-tegra \ |
@@ -374,29 +468,46 @@ PACKAGES =+ "${PN}-amphion-vpu-license ${PN}-amphion-vpu \ | |||
374 | ${PN}-prestera \ | 468 | ${PN}-prestera \ |
375 | ${PN}-qat ${PN}-qat-license \ | 469 | ${PN}-qat ${PN}-qat-license \ |
376 | ${PN}-qed \ | 470 | ${PN}-qed \ |
377 | ${PN}-qcom-license ${PN}-qcom-yamato-license \ | 471 | ${PN}-qcom-license ${PN}-qcom-2-license ${PN}-qcom-yamato-license \ |
472 | ${PN}-qcom-aic100 ${PN}-qcom-qdu100 \ | ||
378 | ${PN}-qcom-venus-1.8 ${PN}-qcom-venus-4.2 ${PN}-qcom-venus-5.2 ${PN}-qcom-venus-5.4 ${PN}-qcom-venus-6.0 \ | 473 | ${PN}-qcom-venus-1.8 ${PN}-qcom-venus-4.2 ${PN}-qcom-venus-5.2 ${PN}-qcom-venus-5.4 ${PN}-qcom-venus-6.0 \ |
379 | ${PN}-qcom-vpu-1.0 ${PN}-qcom-vpu-2.0 \ | 474 | ${PN}-qcom-vpu \ |
380 | ${PN}-qcom-adreno-a2xx ${PN}-qcom-adreno-a3xx ${PN}-qcom-adreno-a4xx ${PN}-qcom-adreno-a530 \ | 475 | ${PN}-qcom-adreno-a2xx ${PN}-qcom-adreno-a3xx ${PN}-qcom-adreno-a4xx ${PN}-qcom-adreno-a530 \ |
381 | ${PN}-qcom-adreno-a630 ${PN}-qcom-adreno-a650 ${PN}-qcom-adreno-a660 ${PN}-qcom-adreno-a702 \ | 476 | ${PN}-qcom-adreno-a623 ${PN}-qcom-adreno-a630 ${PN}-qcom-adreno-a650 ${PN}-qcom-adreno-a660 \ |
477 | ${PN}-qcom-adreno-a663 ${PN}-qcom-adreno-a702 ${PN}-qcom-adreno-g750 \ | ||
382 | ${PN}-qcom-apq8016-modem ${PN}-qcom-apq8016-wifi \ | 478 | ${PN}-qcom-apq8016-modem ${PN}-qcom-apq8016-wifi \ |
383 | ${PN}-qcom-apq8096-adreno ${PN}-qcom-apq8096-audio ${PN}-qcom-apq8096-modem \ | 479 | ${PN}-qcom-apq8096-adreno ${PN}-qcom-apq8096-audio ${PN}-qcom-apq8096-modem \ |
384 | ${PN}-qcom-qcm2290-adreno ${PN}-qcom-qcm2290-audio ${PN}-qcom-qcm2290-modem ${PN}-qcom-qcm2290-wifi \ | 480 | ${PN}-qcom-qcm2290-adreno ${PN}-qcom-qcm2290-audio ${PN}-qcom-qcm2290-modem \ |
385 | ${PN}-qcom-qrb4210-adreno ${PN}-qcom-qrb4210-audio ${PN}-qcom-qrb4210-compute \ | 481 | ${PN}-qcom-qcm6490-adreno \ |
386 | ${PN}-qcom-qrb4210-modem ${PN}-qcom-qrb4210-wifi \ | 482 | ${PN}-qcom-qcm6490-audio ${PN}-qcom-qcm6490-compute ${PN}-qcom-qcm6490-ipa ${PN}-qcom-qcm6490-wifi \ |
483 | ${PN}-qcom-qcs615-adreno \ | ||
484 | ${PN}-qcom-qcs8300-adreno ${PN}-qcom-qcs8300-audio ${PN}-qcom-qcs8300-compute \ | ||
485 | ${PN}-qcom-qcs8300-generalpurpose \ | ||
486 | ${PN}-qcom-qrb4210-adreno \ | ||
487 | ${PN}-qcom-qrb4210-audio ${PN}-qcom-qrb4210-compute ${PN}-qcom-qrb4210-modem \ | ||
488 | ${PN}-qcom-sa8775p-adreno ${PN}-qcom-sa8775p-audio ${PN}-qcom-sa8775p-compute \ | ||
489 | ${PN}-qcom-sa8775p-generalpurpose ${PN}-qcom-sa8775p-qupv3fw \ | ||
387 | ${PN}-qcom-sc8280xp-lenovo-x13s-compat \ | 490 | ${PN}-qcom-sc8280xp-lenovo-x13s-compat \ |
388 | ${PN}-qcom-sc8280xp-lenovo-x13s-audio \ | 491 | ${PN}-qcom-sc8280xp-lenovo-x13s-audio \ |
389 | ${PN}-qcom-sc8280xp-lenovo-x13s-adreno \ | 492 | ${PN}-qcom-sc8280xp-lenovo-x13s-adreno \ |
390 | ${PN}-qcom-sc8280xp-lenovo-x13s-compute \ | 493 | ${PN}-qcom-sc8280xp-lenovo-x13s-compute \ |
391 | ${PN}-qcom-sc8280xp-lenovo-x13s-sensors \ | 494 | ${PN}-qcom-sc8280xp-lenovo-x13s-sensors \ |
392 | ${PN}-qcom-sdm845-adreno ${PN}-qcom-sdm845-audio ${PN}-qcom-sdm845-compute ${PN}-qcom-sdm845-modem \ | 495 | ${PN}-qcom-sdm845-adreno ${PN}-qcom-sdm845-audio ${PN}-qcom-sdm845-compute \ |
393 | ${PN}-qcom-sdm845-thundercomm-db845c-sensors \ | 496 | ${PN}-qcom-sdm845-thundercomm-db845c-sensors \ |
394 | ${PN}-qcom-sm8250-adreno ${PN}-qcom-sm8250-audio ${PN}-qcom-sm8250-compute \ | 497 | ${PN}-qcom-sm8250-adreno ${PN}-qcom-sm8250-audio ${PN}-qcom-sm8250-compute \ |
395 | ${PN}-qcom-sm8250-thundercomm-rb5-sensors \ | 498 | ${PN}-qcom-sm8250-thundercomm-rb5-sensors \ |
499 | ${PN}-qcom-sm8550-audio-tplg \ | ||
500 | ${PN}-qcom-sm8650-audio-tplg \ | ||
501 | ${PN}-qcom-x1e80100-adreno ${PN}-qcom-x1e80100-audio \ | ||
502 | ${PN}-qcom-x1e80100-lenovo-t14s-g6-adreno ${PN}-qcom-x1e80100-lenovo-t14s-g6-audio \ | ||
503 | ${PN}-qcom-x1e80100-lenovo-t14s-g6-compute ${PN}-qcom-x1e80100-lenovo-t14s-g6-vpu \ | ||
504 | ${PN}-qcom-x1e80100-lenovo-yoga-slim7x-adreno ${PN}-qcom-x1e80100-lenovo-yoga-slim7x-audio \ | ||
505 | ${PN}-qcom-x1e80100-lenovo-yoga-slim7x-compute ${PN}-qcom-x1e80100-lenovo-yoga-slim7x-vpu \ | ||
396 | ${PN}-qla2xxx ${PN}-qla2xxx-license \ | 506 | ${PN}-qla2xxx ${PN}-qla2xxx-license \ |
397 | ${PN}-rockchip-license ${PN}-rockchip-dptx \ | 507 | ${PN}-rockchip-license ${PN}-rockchip-dptx \ |
398 | ${PN}-amlogic-vdec-license ${PN}-amlogic-vdec \ | 508 | ${PN}-amlogic-vdec-license ${PN}-amlogic-vdec \ |
399 | ${PN}-lt9611uxc ${PN}-lontium-license \ | 509 | ${PN}-lt9611uxc ${PN}-lontium-license \ |
510 | ${PN}-wfx-license ${PN}-wfx \ | ||
400 | ${PN}-whence-license \ | 511 | ${PN}-whence-license \ |
401 | ${PN}-wl1251-license ${PN}-wl1251 \ | 512 | ${PN}-wl1251-license ${PN}-wl1251 \ |
402 | ${PN}-xc4000-license ${PN}-xc4000 \ | 513 | ${PN}-xc4000-license ${PN}-xc4000 \ |
@@ -419,7 +530,7 @@ RDEPENDS:${PN}-amphion-vpu += "${PN}-amphion-vpu-license" | |||
419 | LICENSE:${PN}-cw1200 = "Firmware-cw1200" | 530 | LICENSE:${PN}-cw1200 = "Firmware-cw1200" |
420 | LICENSE:${PN}-cw1200-license = "Firmware-cw1200" | 531 | LICENSE:${PN}-cw1200-license = "Firmware-cw1200" |
421 | 532 | ||
422 | FILES:${PN}-cw1200 = "${nonarch_base_libdir}/firmware/wsm_22.bin" | 533 | FILES:${PN}-cw1200 = "${nonarch_base_libdir}/firmware/wsm_22.bin*" |
423 | FILES:${PN}-cw1200-license = "${nonarch_base_libdir}/firmware/LICENCE.cw1200" | 534 | FILES:${PN}-cw1200-license = "${nonarch_base_libdir}/firmware/LICENCE.cw1200" |
424 | 535 | ||
425 | RDEPENDS:${PN}-cw1200 += "${PN}-cw1200-license" | 536 | RDEPENDS:${PN}-cw1200 += "${PN}-cw1200-license" |
@@ -434,24 +545,24 @@ LICENSE:${PN}-atheros-license = "Firmware-atheros_firmware" | |||
434 | 545 | ||
435 | FILES:${PN}-atheros-license = "${nonarch_base_libdir}/firmware/LICENCE.atheros_firmware" | 546 | FILES:${PN}-atheros-license = "${nonarch_base_libdir}/firmware/LICENCE.atheros_firmware" |
436 | FILES:${PN}-ar5523 = " \ | 547 | FILES:${PN}-ar5523 = " \ |
437 | ${nonarch_base_libdir}/firmware/ar5523.bin \ | 548 | ${nonarch_base_libdir}/firmware/ar5523.bin* \ |
438 | " | 549 | " |
439 | FILES:${PN}-ar9170 = " \ | 550 | FILES:${PN}-ar9170 = " \ |
440 | ${nonarch_base_libdir}/firmware/ar9170*.fw \ | 551 | ${nonarch_base_libdir}/firmware/ar9170*.fw* \ |
441 | " | 552 | " |
442 | FILES:${PN}-ath3k = " \ | 553 | FILES:${PN}-ath3k = " \ |
443 | ${nonarch_base_libdir}/firmware/ath3k*fw \ | 554 | ${nonarch_base_libdir}/firmware/ath3k*fw* \ |
444 | " | 555 | " |
445 | FILES:${PN}-ath6k = " \ | 556 | FILES:${PN}-ath6k = " \ |
446 | ${nonarch_base_libdir}/firmware/ath6k \ | 557 | ${nonarch_base_libdir}/firmware/ath6k \ |
447 | " | 558 | " |
448 | FILES:${PN}-ath9k = " \ | 559 | FILES:${PN}-ath9k = " \ |
449 | ${nonarch_base_libdir}/firmware/ar9271.fw \ | 560 | ${nonarch_base_libdir}/firmware/ar9271.fw* \ |
450 | ${nonarch_base_libdir}/firmware/ar7010*.fw \ | 561 | ${nonarch_base_libdir}/firmware/ar7010*.fw* \ |
451 | ${nonarch_base_libdir}/firmware/htc_9271.fw \ | 562 | ${nonarch_base_libdir}/firmware/htc_9271.fw* \ |
452 | ${nonarch_base_libdir}/firmware/htc_7010.fw \ | 563 | ${nonarch_base_libdir}/firmware/htc_7010.fw* \ |
453 | ${nonarch_base_libdir}/firmware/ath9k_htc/htc_7010-1.4.0.fw \ | 564 | ${nonarch_base_libdir}/firmware/ath9k_htc/htc_7010-1.4.0.fw* \ |
454 | ${nonarch_base_libdir}/firmware/ath9k_htc/htc_9271-1.4.0.fw \ | 565 | ${nonarch_base_libdir}/firmware/ath9k_htc/htc_9271-1.4.0.fw* \ |
455 | " | 566 | " |
456 | 567 | ||
457 | RDEPENDS:${PN}-ar5523 += "${PN}-atheros-license" | 568 | RDEPENDS:${PN}-ar5523 += "${PN}-atheros-license" |
@@ -462,7 +573,7 @@ RDEPENDS:${PN}-ath9k += "${PN}-atheros-license" | |||
462 | # For carl9170 | 573 | # For carl9170 |
463 | 574 | ||
464 | FILES:${PN}-carl9170 = " \ | 575 | FILES:${PN}-carl9170 = " \ |
465 | ${nonarch_base_libdir}/firmware/carl9170*.fw \ | 576 | ${nonarch_base_libdir}/firmware/carl9170*.fw* \ |
466 | " | 577 | " |
467 | LICENSE:${PN}-carl9170 = "GPL-2.0-or-later" | 578 | LICENSE:${PN}-carl9170 = "GPL-2.0-or-later" |
468 | 579 | ||
@@ -470,8 +581,43 @@ LICENSE:${PN}-carl9170 = "GPL-2.0-or-later" | |||
470 | LICENSE:${PN}-ar3k = "Firmware-qualcommAthos_ar3k & Firmware-atheros_firmware" | 581 | LICENSE:${PN}-ar3k = "Firmware-qualcommAthos_ar3k & Firmware-atheros_firmware" |
471 | LICENSE:${PN}-ar3k-license = "Firmware-qualcommAthos_ar3k" | 582 | LICENSE:${PN}-ar3k-license = "Firmware-qualcommAthos_ar3k" |
472 | LICENSE:${PN}-ath10k = "Firmware-qualcommAthos_ath10k" | 583 | LICENSE:${PN}-ath10k = "Firmware-qualcommAthos_ath10k" |
584 | LICENSE:${PN}-ath10k-qca4019 = "Firmware-qualcommAthos_ath10k" | ||
585 | LICENSE:${PN}-ath10k-qca6174 = "Firmware-qualcommAthos_ath10k" | ||
586 | LICENSE:${PN}-ath10k-qca9377 = "Firmware-qualcommAthos_ath10k" | ||
587 | LICENSE:${PN}-ath10k-qca9887 = "Firmware-qualcommAthos_ath10k" | ||
588 | LICENSE:${PN}-ath10k-qca9888 = "Firmware-qualcommAthos_ath10k" | ||
589 | LICENSE:${PN}-ath10k-qca988x = "Firmware-qualcommAthos_ath10k" | ||
590 | LICENSE:${PN}-ath10k-qca9984 = "Firmware-qualcommAthos_ath10k" | ||
591 | LICENSE:${PN}-ath10k-qca99x0 = "Firmware-qualcommAthos_ath10k" | ||
592 | LICENSE:${PN}-ath10k-wcn3990 = "Firmware-qualcommAthos_ath10k" | ||
593 | LICENSE:${PN}-ath10k-misc = "Firmware-qualcommAthos_ath10k" | ||
473 | LICENSE:${PN}-ath10k-license = "Firmware-qualcommAthos_ath10k" | 594 | LICENSE:${PN}-ath10k-license = "Firmware-qualcommAthos_ath10k" |
474 | LICENSE:${PN}-qca = "Firmware-qualcommAthos_ath10k" | 595 | LICENSE:${PN}-ath11k = "Firmware-qualcommAthos_ath10k" |
596 | LICENSE:${PN}-ath11k-ipq5018 = "Firmware-qualcommAthos_ath10k" | ||
597 | LICENSE:${PN}-ath11k-ipq6018 = "Firmware-qualcommAthos_ath10k" | ||
598 | LICENSE:${PN}-ath11k-ipq8074 = "Firmware-qualcommAthos_ath10k" | ||
599 | LICENSE:${PN}-ath11k-qca2066 = "Firmware-qualcommAthos_ath10k" | ||
600 | LICENSE:${PN}-ath11k-qca6390 = "Firmware-qualcommAthos_ath10k" | ||
601 | LICENSE:${PN}-ath11k-qca6698aq = "Firmware-qualcommAthos_ath10k" | ||
602 | LICENSE:${PN}-ath11k-qcn9074 = "Firmware-qualcommAthos_ath10k" | ||
603 | LICENSE:${PN}-ath11k-wcn6750 = "Firmware-qualcommAthos_ath10k" | ||
604 | LICENSE:${PN}-ath11k-wcn6855 = "Firmware-qualcommAthos_ath10k" | ||
605 | LICENSE:${PN}-ath11k-misc = "Firmware-qualcommAthos_ath10k" | ||
606 | LICENSE:${PN}-ath12k = "Firmware-qualcommAthos_ath10k" | ||
607 | LICENSE:${PN}-ath12k-qcn9274 = "Firmware-qualcommAthos_ath10k" | ||
608 | LICENSE:${PN}-ath12k-wcn7850 = "Firmware-qualcommAthos_ath10k" | ||
609 | LICENSE:${PN}-ath12k-misc = "Firmware-qualcommAthos_ath10k" | ||
610 | LICENSE:${PN}-qca-qca61x4-serial = "Firmware-qualcommAthos_ath10k" | ||
611 | LICENSE:${PN}-qca-qca61x4-usb = "Firmware-qualcommAthos_ath10k" | ||
612 | LICENSE:${PN}-qca-qca6390 = "Firmware-qualcommAthos_ath10k" | ||
613 | LICENSE:${PN}-qca-qca6698 = "Firmware-qualcommAthos_ath10k" | ||
614 | LICENSE:${PN}-qca-wcn3950 = "Firmware-qcom" | ||
615 | LICENSE:${PN}-qca-wcn3988 = "Firmware-qcom" | ||
616 | LICENSE:${PN}-qca-wcn399x = "Firmware-qualcommAthos_ath10k" | ||
617 | LICENSE:${PN}-qca-wcn6750 = "Firmware-qualcommAthos_ath10k" | ||
618 | LICENSE:${PN}-qca-qca2066 = "Firmware-qualcommAthos_ath10k" | ||
619 | LICENSE:${PN}-qca-wcn7850 = "Firmware-qcom" | ||
620 | LICENSE:${PN}-qca-misc = "Firmware-qualcommAthos_ath10k & Firmware-qcom" | ||
475 | 621 | ||
476 | FILES:${PN}-ar3k-license = "${nonarch_base_libdir}/firmware/LICENSE.QualcommAtheros_ar3k" | 622 | FILES:${PN}-ar3k-license = "${nonarch_base_libdir}/firmware/LICENSE.QualcommAtheros_ar3k" |
477 | FILES:${PN}-ar3k = " \ | 623 | FILES:${PN}-ar3k = " \ |
@@ -479,30 +625,190 @@ FILES:${PN}-ar3k = " \ | |||
479 | " | 625 | " |
480 | 626 | ||
481 | FILES:${PN}-ath10k-license = "${nonarch_base_libdir}/firmware/LICENSE.QualcommAtheros_ath10k" | 627 | FILES:${PN}-ath10k-license = "${nonarch_base_libdir}/firmware/LICENSE.QualcommAtheros_ath10k" |
482 | FILES:${PN}-ath10k = " \ | 628 | FILES:${PN}-ath10k-qca4019 = "${nonarch_base_libdir}/firmware/ath10k/QCA4019" |
483 | ${nonarch_base_libdir}/firmware/ath10k \ | 629 | FILES:${PN}-ath10k-qca6174 = "${nonarch_base_libdir}/firmware/ath10k/QCA6174" |
484 | " | 630 | FILES:${PN}-ath10k-qca9377 = "${nonarch_base_libdir}/firmware/ath10k/QCA9377" |
485 | 631 | FILES:${PN}-ath10k-qca9887 = "${nonarch_base_libdir}/firmware/ath10k/QCA9887" | |
486 | FILES:${PN}-ath11k = " \ | 632 | FILES:${PN}-ath10k-qca9888 = "${nonarch_base_libdir}/firmware/ath10k/QCA9888" |
487 | ${nonarch_base_libdir}/firmware/ath11k \ | 633 | FILES:${PN}-ath10k-qca988x = "${nonarch_base_libdir}/firmware/ath10k/QCA988X" |
488 | " | 634 | FILES:${PN}-ath10k-qca9984 = "${nonarch_base_libdir}/firmware/ath10k/QCA9984" |
489 | 635 | FILES:${PN}-ath10k-qca99x0 = "${nonarch_base_libdir}/firmware/ath10k/QCA99X0" | |
490 | FILES:${PN}-qca = " \ | 636 | FILES:${PN}-ath10k-wcn3990 = "${nonarch_base_libdir}/firmware/ath10k/WCN3990" |
491 | ${nonarch_base_libdir}/firmware/qca \ | 637 | FILES:${PN}-ath10k-misc = "${nonarch_base_libdir}/firmware/ath10k/*" |
492 | " | 638 | # -ath10k is a virtual package that depends upon all ath10k packages. |
639 | ALLOW_EMPTY:${PN}-ath10k = "1" | ||
640 | # -ath10k-misc is a catch all package that includes all the ath10k | ||
641 | # firmwares that are not already included in other -ath10k- packages. | ||
642 | ALLOW_EMPTY:${PN}-ath10k-misc = "1" | ||
643 | |||
644 | FILES:${PN}-ath11k-ipq5018 = "${nonarch_base_libdir}/firmware/ath11k/IPQ5018" | ||
645 | FILES:${PN}-ath11k-ipq6018 = "${nonarch_base_libdir}/firmware/ath11k/IPQ6018" | ||
646 | FILES:${PN}-ath11k-ipq8074 = "${nonarch_base_libdir}/firmware/ath11k/IPQ8074" | ||
647 | FILES:${PN}-ath11k-qca2066 = "${nonarch_base_libdir}/firmware/ath11k/QCA2066" | ||
648 | FILES:${PN}-ath11k-qca6390 = "${nonarch_base_libdir}/firmware/ath11k/QCA6390" | ||
649 | FILES:${PN}-ath11k-qca6698aq = "${nonarch_base_libdir}/firmware/ath11k/QCA6698AQ" | ||
650 | FILES:${PN}-ath11k-qcn9074 = "${nonarch_base_libdir}/firmware/ath11k/QCN9074" | ||
651 | FILES:${PN}-ath11k-wcn6750 = "${nonarch_base_libdir}/firmware/ath11k/WCN6750" | ||
652 | FILES:${PN}-ath11k-wcn6855 = "${nonarch_base_libdir}/firmware/ath11k/WCN6855" | ||
653 | FILES:${PN}-ath11k-misc = "${nonarch_base_libdir}/firmware/ath11k/*" | ||
654 | # -ath11k is a virtual package that depends upon all ath11k packages. | ||
655 | ALLOW_EMPTY:${PN}-ath11k = "1" | ||
656 | # -ath11k-misc is a catch all package that includes all the ath11k | ||
657 | # firmwares that are not already included in other -ath11k- packages. | ||
658 | ALLOW_EMPTY:${PN}-ath11k-misc = "1" | ||
659 | |||
660 | FILES:${PN}-ath12k-qcn9274 = "${nonarch_base_libdir}/firmware/ath12k/QCN9274" | ||
661 | FILES:${PN}-ath12k-wcn7850 = "${nonarch_base_libdir}/firmware/ath12k/WCN7850" | ||
662 | FILES:${PN}-ath12k-misc = "${nonarch_base_libdir}/firmware/ath12k/*" | ||
663 | # -ath12k is a virtual package that depends upon all ath12k packages. | ||
664 | ALLOW_EMPTY:${PN}-ath12k = "1" | ||
665 | # -ath12k-misc is a catch all package that includes all the ath12k | ||
666 | # firmwares that are not already included in other -ath12k- packages. | ||
667 | ALLOW_EMPTY:${PN}-ath12k-misc = "1" | ||
668 | |||
669 | FILES:${PN}-qca-qca61x4-serial = " \ | ||
670 | ${nonarch_base_libdir}/firmware/qca/nvm_0*.bin* \ | ||
671 | ${nonarch_base_libdir}/firmware/qca/rampatch_0*.bin* \ | ||
672 | " | ||
673 | FILES:${PN}-qca-qca61x4-usb = " \ | ||
674 | ${nonarch_base_libdir}/firmware/qca/nvm_usb_*.bin* \ | ||
675 | ${nonarch_base_libdir}/firmware/qca/rampatch_usb_*.bin* \ | ||
676 | ${nonarch_base_libdir}/firmware/qca/QCA2066/nvm_usb_00130201_030a.bin* \ | ||
677 | ${nonarch_base_libdir}/firmware/qca/QCA2066/nvm_usb_00130201_gf_030a.bin* \ | ||
678 | ${nonarch_base_libdir}/firmware/qca/QCA2066/rampatch_usb_00130201.bin* \ | ||
679 | " | ||
680 | FILES:${PN}-qca-qca6390 = " \ | ||
681 | ${nonarch_base_libdir}/firmware/qca/htbtfw20.tlv* \ | ||
682 | ${nonarch_base_libdir}/firmware/qca/htnv20.bin* \ | ||
683 | " | ||
684 | FILES:${PN}-qca-qca6698 = " \ | ||
685 | ${nonarch_base_libdir}/firmware/qca/QCA6698/hpbtfw21.tlv* \ | ||
686 | ${nonarch_base_libdir}/firmware/qca/QCA6698/hpnv21.b206* \ | ||
687 | ${nonarch_base_libdir}/firmware/qca/QCA6698/hpnv21.b207* \ | ||
688 | ${nonarch_base_libdir}/firmware/qca/QCA6698/hpnv21.bin* \ | ||
689 | " | ||
690 | FILES:${PN}-qca-wcn3950 = " \ | ||
691 | ${nonarch_base_libdir}/firmware/qca/cmbtfw12.tlv* \ | ||
692 | ${nonarch_base_libdir}/firmware/qca/cmbtfw13.tlv* \ | ||
693 | ${nonarch_base_libdir}/firmware/qca/cmnv12.bin* \ | ||
694 | ${nonarch_base_libdir}/firmware/qca/cmnv13.bin* \ | ||
695 | ${nonarch_base_libdir}/firmware/qca/cmnv13s.bin* \ | ||
696 | ${nonarch_base_libdir}/firmware/qca/cmnv13t.bin* \ | ||
697 | " | ||
698 | FILES:${PN}-qca-wcn3988 = " \ | ||
699 | ${nonarch_base_libdir}/firmware/qca/apbtfw10.tlv* \ | ||
700 | ${nonarch_base_libdir}/firmware/qca/apbtfw11.tlv* \ | ||
701 | ${nonarch_base_libdir}/firmware/qca/apnv10.bin* \ | ||
702 | ${nonarch_base_libdir}/firmware/qca/apnv11.bin* \ | ||
703 | " | ||
704 | FILES:${PN}-qca-wcn399x = " \ | ||
705 | ${nonarch_base_libdir}/firmware/qca/crbtfw21.tlv* \ | ||
706 | ${nonarch_base_libdir}/firmware/qca/crnv21.bin* \ | ||
707 | ${nonarch_base_libdir}/firmware/qca/crbtfw32.tlv* \ | ||
708 | ${nonarch_base_libdir}/firmware/qca/crnv32.bin* \ | ||
709 | ${nonarch_base_libdir}/firmware/qca/crnv32u.bin* \ | ||
710 | " | ||
711 | FILES:${PN}-qca-wcn6750 = " \ | ||
712 | ${nonarch_base_libdir}/firmware/qca/msbtfw11.mbn* \ | ||
713 | ${nonarch_base_libdir}/firmware/qca/msbtfw11.tlv* \ | ||
714 | ${nonarch_base_libdir}/firmware/qca/msnv11.bin* \ | ||
715 | ${nonarch_base_libdir}/firmware/qca/msnv11.b0a* \ | ||
716 | ${nonarch_base_libdir}/firmware/qca/msnv11.b09* \ | ||
717 | " | ||
718 | FILES:${PN}-qca-qca2066 = " \ | ||
719 | ${nonarch_base_libdir}/firmware/qca/hpbtfw21.tlv* \ | ||
720 | ${nonarch_base_libdir}/firmware/qca/hpnv21.bin* \ | ||
721 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.bin* \ | ||
722 | ${nonarch_base_libdir}/firmware/qca/hpnv21.301* \ | ||
723 | ${nonarch_base_libdir}/firmware/qca/hpnv21.302* \ | ||
724 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.301* \ | ||
725 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.302* \ | ||
726 | ${nonarch_base_libdir}/firmware/qca/hpnv21.309* \ | ||
727 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.309* \ | ||
728 | ${nonarch_base_libdir}/firmware/qca/hpnv21.30a* \ | ||
729 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.30a* \ | ||
730 | ${nonarch_base_libdir}/firmware/qca/hpnv21.b8c* \ | ||
731 | ${nonarch_base_libdir}/firmware/qca/hpnv21.b9f* \ | ||
732 | ${nonarch_base_libdir}/firmware/qca/hpnv21.ba0* \ | ||
733 | ${nonarch_base_libdir}/firmware/qca/hpnv21.ba1* \ | ||
734 | ${nonarch_base_libdir}/firmware/qca/hpnv21.ba2* \ | ||
735 | ${nonarch_base_libdir}/firmware/qca/hpnv21.ba3* \ | ||
736 | ${nonarch_base_libdir}/firmware/qca/hpnv21.ba4* \ | ||
737 | ${nonarch_base_libdir}/firmware/qca/hpnv21.baa* \ | ||
738 | ${nonarch_base_libdir}/firmware/qca/hpnv21.bb8* \ | ||
739 | ${nonarch_base_libdir}/firmware/qca/hpnv21.b10c* \ | ||
740 | ${nonarch_base_libdir}/firmware/qca/hpnv21.b111* \ | ||
741 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.b8c* \ | ||
742 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.b9f* \ | ||
743 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.ba0* \ | ||
744 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.ba1* \ | ||
745 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.ba2* \ | ||
746 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.ba3* \ | ||
747 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.ba4* \ | ||
748 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.baa* \ | ||
749 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.bb8* \ | ||
750 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.b10c* \ | ||
751 | ${nonarch_base_libdir}/firmware/qca/hpnv21g.b111* \ | ||
752 | " | ||
753 | FILES:${PN}-qca-wcn7850 = " \ | ||
754 | ${nonarch_base_libdir}/firmware/qca/hmtbtfw20.tlv* \ | ||
755 | ${nonarch_base_libdir}/firmware/qca/hmtnv20.b10f* \ | ||
756 | ${nonarch_base_libdir}/firmware/qca/hmtnv20.b112* \ | ||
757 | ${nonarch_base_libdir}/firmware/qca/hmtnv20.bin* \ | ||
758 | " | ||
759 | FILES:${PN}-qca-misc = "${nonarch_base_libdir}/firmware/qca/*" | ||
760 | # -qca is a virtual package that depends upon all qca packages. | ||
761 | ALLOW_EMPTY:${PN}-qca = "1" | ||
762 | # -qca-misc is a catch all package that includes all the qca | ||
763 | # firmwares that are not already included in other -qca- packages. | ||
764 | ALLOW_EMPTY:${PN}-qca-misc = "1" | ||
493 | 765 | ||
494 | RDEPENDS:${PN}-ar3k += "${PN}-ar3k-license ${PN}-atheros-license" | 766 | RDEPENDS:${PN}-ar3k += "${PN}-ar3k-license ${PN}-atheros-license" |
495 | RDEPENDS:${PN}-ath10k += "${PN}-ath10k-license" | 767 | RDEPENDS:${PN}-ath10k += "${PN}-ath10k-license" |
768 | RDEPENDS:${PN}-ath10k-qca4019 += "${PN}-ath10k-license" | ||
769 | RDEPENDS:${PN}-ath10k-qca6174 += "${PN}-ath10k-license" | ||
770 | RDEPENDS:${PN}-ath10k-qca9377 += "${PN}-ath10k-license" | ||
771 | RDEPENDS:${PN}-ath10k-qca9887 += "${PN}-ath10k-license" | ||
772 | RDEPENDS:${PN}-ath10k-qca9888 += "${PN}-ath10k-license" | ||
773 | RDEPENDS:${PN}-ath10k-qca988x += "${PN}-ath10k-license" | ||
774 | RDEPENDS:${PN}-ath10k-qca9984 += "${PN}-ath10k-license" | ||
775 | RDEPENDS:${PN}-ath10k-qca99x0 += "${PN}-ath10k-license" | ||
776 | RDEPENDS:${PN}-ath10k-wcn3990 += "${PN}-ath10k-license" | ||
777 | RDEPENDS:${PN}-ath10k-misc += "${PN}-ath10k-license" | ||
496 | RDEPENDS:${PN}-ath11k += "${PN}-ath10k-license" | 778 | RDEPENDS:${PN}-ath11k += "${PN}-ath10k-license" |
497 | RDEPENDS:${PN}-qca += "${PN}-ath10k-license" | 779 | RDEPENDS:${PN}-ath11k-ipq5018 += "${PN}-ath10k-license" |
498 | 780 | RDEPENDS:${PN}-ath11k-ipq6018 += "${PN}-ath10k-license" | |
781 | RDEPENDS:${PN}-ath11k-ipq8074 += "${PN}-ath10k-license" | ||
782 | RDEPENDS:${PN}-ath11k-qca2066 += "${PN}-ath10k-license" | ||
783 | RDEPENDS:${PN}-ath11k-qca6390 += "${PN}-ath10k-license" | ||
784 | RDEPENDS:${PN}-ath11k-qca6698aq += "${PN}-ath10k-license" | ||
785 | RDEPENDS:${PN}-ath11k-qcn9074 += "${PN}-ath10k-license" | ||
786 | RDEPENDS:${PN}-ath11k-wcn6750 += "${PN}-ath10k-license" | ||
787 | RDEPENDS:${PN}-ath11k-wcn6855 += "${PN}-ath10k-license" | ||
788 | RDEPENDS:${PN}-ath11k-misc += "${PN}-ath10k-license" | ||
789 | RDEPENDS:${PN}-ath12k += "${PN}-ath10k-license" | ||
790 | RDEPENDS:${PN}-ath12k-qcn9274 += "${PN}-ath10k-license" | ||
791 | RDEPENDS:${PN}-ath12k-wcn7850 += "${PN}-ath10k-license" | ||
792 | RDEPENDS:${PN}-ath12k-misc += "${PN}-ath10k-license" | ||
793 | RDEPENDS:${PN}-qca += "${PN}-ath10k-license ${PN}-qcom-license" | ||
794 | RDEPENDS:${PN}-qca-qca61x4-serial += "${PN}-ath10k-license" | ||
795 | RDEPENDS:${PN}-qca-qca61x4-usb += "${PN}-ath10k-license" | ||
796 | RDEPENDS:${PN}-qca-qca6390 += "${PN}-ath10k-license" | ||
797 | RDEPENDS:${PN}-qca-qca6698 += "${PN}-ath10k-license" | ||
798 | RDEPENDS:${PN}-qca-wcn3950 += "${PN}-qcom-license" | ||
799 | RDEPENDS:${PN}-qca-wcn3988 += "${PN}-qcom-license" | ||
800 | RDEPENDS:${PN}-qca-wcn399x += "${PN}-ath10k-license" | ||
801 | RDEPENDS:${PN}-qca-wcn6750 += "${PN}-ath10k-license" | ||
802 | RDEPENDS:${PN}-qca-qca2066 += "${PN}-ath10k-license" | ||
803 | RDEPENDS:${PN}-qca-wcn7850 += "${PN}-qcom-license" | ||
804 | RDEPENDS:${PN}-qca-misc += "${PN}-ath10k-license ${PN}-qcom-license" | ||
499 | # For ralink | 805 | # For ralink |
500 | LICENSE:${PN}-ralink = "Firmware-ralink-firmware" | 806 | LICENSE:${PN}-ralink = "Firmware-ralink-firmware" |
501 | LICENSE:${PN}-ralink-license = "Firmware-ralink-firmware" | 807 | LICENSE:${PN}-ralink-license = "Firmware-ralink-firmware" |
502 | 808 | ||
503 | FILES:${PN}-ralink-license = "${nonarch_base_libdir}/firmware/LICENCE.ralink-firmware.txt" | 809 | FILES:${PN}-ralink-license = "${nonarch_base_libdir}/firmware/LICENCE.ralink-firmware.txt" |
504 | FILES:${PN}-ralink = " \ | 810 | FILES:${PN}-ralink = " \ |
505 | ${nonarch_base_libdir}/firmware/rt*.bin \ | 811 | ${nonarch_base_libdir}/firmware/rt*.bin* \ |
506 | " | 812 | " |
507 | 813 | ||
508 | RDEPENDS:${PN}-ralink += "${PN}-ralink-license" | 814 | RDEPENDS:${PN}-ralink += "${PN}-ralink-license" |
@@ -514,8 +820,8 @@ FILES:${PN}-mt76x-license = "${nonarch_base_libdir}/firmware/LICENCE.ralink_a_me | |||
514 | LICENSE:${PN}-mt7601u = "Firmware-ralink_a_mediatek_company_firmware" | 820 | LICENSE:${PN}-mt7601u = "Firmware-ralink_a_mediatek_company_firmware" |
515 | 821 | ||
516 | FILES:${PN}-mt7601u = " \ | 822 | FILES:${PN}-mt7601u = " \ |
517 | ${nonarch_base_libdir}/firmware/mediatek/mt7601u.bin \ | 823 | ${nonarch_base_libdir}/firmware/mediatek/mt7601u.bin* \ |
518 | ${nonarch_base_libdir}/firmware/mt7601u.bin \ | 824 | ${nonarch_base_libdir}/firmware/mt7601u.bin* \ |
519 | " | 825 | " |
520 | RDEPENDS:${PN}-mt7601u += "${PN}-mt76x-license" | 826 | RDEPENDS:${PN}-mt7601u += "${PN}-mt76x-license" |
521 | 827 | ||
@@ -523,8 +829,8 @@ RDEPENDS:${PN}-mt7601u += "${PN}-mt76x-license" | |||
523 | LICENSE:${PN}-mt7650 = "Firmware-ralink_a_mediatek_company_firmware" | 829 | LICENSE:${PN}-mt7650 = "Firmware-ralink_a_mediatek_company_firmware" |
524 | 830 | ||
525 | FILES:${PN}-mt7650 = " \ | 831 | FILES:${PN}-mt7650 = " \ |
526 | ${nonarch_base_libdir}/firmware/mediatek/mt7650.bin \ | 832 | ${nonarch_base_libdir}/firmware/mediatek/mt7650.bin* \ |
527 | ${nonarch_base_libdir}/firmware/mt7650.bin \ | 833 | ${nonarch_base_libdir}/firmware/mt7650.bin* \ |
528 | " | 834 | " |
529 | RDEPENDS:${PN}-mt7650 += "${PN}-mt76x-license" | 835 | RDEPENDS:${PN}-mt7650 += "${PN}-mt76x-license" |
530 | 836 | ||
@@ -532,10 +838,10 @@ RDEPENDS:${PN}-mt7650 += "${PN}-mt76x-license" | |||
532 | LICENSE:${PN}-mt76x2 = "Firmware-ralink_a_mediatek_company_firmware" | 838 | LICENSE:${PN}-mt76x2 = "Firmware-ralink_a_mediatek_company_firmware" |
533 | 839 | ||
534 | FILES:${PN}-mt76x2 = " \ | 840 | FILES:${PN}-mt76x2 = " \ |
535 | ${nonarch_base_libdir}/firmware/mediatek/mt7662.bin \ | 841 | ${nonarch_base_libdir}/firmware/mediatek/mt7662.bin* \ |
536 | ${nonarch_base_libdir}/firmware/mt7662.bin \ | 842 | ${nonarch_base_libdir}/firmware/mt7662.bin* \ |
537 | ${nonarch_base_libdir}/firmware/mediatek/mt7662_rom_patch.bin \ | 843 | ${nonarch_base_libdir}/firmware/mediatek/mt7662_rom_patch.bin* \ |
538 | ${nonarch_base_libdir}/firmware/mt7662_rom_patch.bin \ | 844 | ${nonarch_base_libdir}/firmware/mt7662_rom_patch.bin* \ |
539 | " | 845 | " |
540 | RDEPENDS:${PN}-mt76x2 += "${PN}-mt76x-license" | 846 | RDEPENDS:${PN}-mt76x2 += "${PN}-mt76x-license" |
541 | 847 | ||
@@ -545,8 +851,8 @@ LICENSE:${PN}-mediatek-license = "Firmware-mediatek" | |||
545 | 851 | ||
546 | FILES:${PN}-mediatek = " \ | 852 | FILES:${PN}-mediatek = " \ |
547 | ${nonarch_base_libdir}/firmware/mediatek/* \ | 853 | ${nonarch_base_libdir}/firmware/mediatek/* \ |
548 | ${nonarch_base_libdir}/firmware/vpu_d.bin \ | 854 | ${nonarch_base_libdir}/firmware/vpu_d.bin* \ |
549 | ${nonarch_base_libdir}/firmware/vpu_p.bin \ | 855 | ${nonarch_base_libdir}/firmware/vpu_p.bin* \ |
550 | " | 856 | " |
551 | FILES:${PN}-mediatek-license = " \ | 857 | FILES:${PN}-mediatek-license = " \ |
552 | ${nonarch_base_libdir}/firmware/LICENCE.mediatek \ | 858 | ${nonarch_base_libdir}/firmware/LICENCE.mediatek \ |
@@ -587,19 +893,120 @@ RDEPENDS:${PN}-radeon += "${PN}-radeon-license" | |||
587 | # For amdgpu | 893 | # For amdgpu |
588 | LICENSE:${PN}-amdgpu = "Firmware-amdgpu" | 894 | LICENSE:${PN}-amdgpu = "Firmware-amdgpu" |
589 | LICENSE:${PN}-amdgpu-license = "Firmware-amdgpu" | 895 | LICENSE:${PN}-amdgpu-license = "Firmware-amdgpu" |
896 | LICENSE:${PN}-amdgpu-aldebaran = "Firmware-amdgpu" | ||
897 | LICENSE:${PN}-amdgpu-carrizo = "Firmware-amdgpu" | ||
898 | LICENSE:${PN}-amdgpu-cezanne = "Firmware-amdgpu" | ||
899 | LICENSE:${PN}-amdgpu-fiji = "Firmware-amdgpu" | ||
900 | LICENSE:${PN}-amdgpu-hawaii = "Firmware-amdgpu" | ||
901 | LICENSE:${PN}-amdgpu-navi10 = "Firmware-amdgpu" | ||
902 | LICENSE:${PN}-amdgpu-navi14 = "Firmware-amdgpu" | ||
903 | LICENSE:${PN}-amdgpu-navi21 = "Firmware-amdgpu" | ||
904 | LICENSE:${PN}-amdgpu-navi22 = "Firmware-amdgpu" | ||
905 | LICENSE:${PN}-amdgpu-navi23 = "Firmware-amdgpu" | ||
906 | LICENSE:${PN}-amdgpu-navi24 = "Firmware-amdgpu" | ||
907 | LICENSE:${PN}-amdgpu-navi31 = "Firmware-amdgpu" | ||
908 | LICENSE:${PN}-amdgpu-navi32 = "Firmware-amdgpu" | ||
909 | LICENSE:${PN}-amdgpu-oland = "Firmware-amdgpu" | ||
910 | LICENSE:${PN}-amdgpu-polaris10 = "Firmware-amdgpu" | ||
911 | LICENSE:${PN}-amdgpu-polaris11 = "Firmware-amdgpu" | ||
912 | LICENSE:${PN}-amdgpu-polaris12 = "Firmware-amdgpu" | ||
913 | LICENSE:${PN}-amdgpu-raven = "Firmware-amdgpu" | ||
914 | LICENSE:${PN}-amdgpu-rembrandt = "Firmware-amdgpu" | ||
915 | LICENSE:${PN}-amdgpu-renoir = "Firmware-amdgpu" | ||
916 | LICENSE:${PN}-amdgpu-stoney = "Firmware-amdgpu" | ||
917 | LICENSE:${PN}-amdgpu-tonga = "Firmware-amdgpu" | ||
918 | LICENSE:${PN}-amdgpu-topaz = "Firmware-amdgpu" | ||
919 | LICENSE:${PN}-amdgpu-vega10 = "Firmware-amdgpu" | ||
920 | LICENSE:${PN}-amdgpu-vega12 = "Firmware-amdgpu" | ||
921 | LICENSE:${PN}-amdgpu-misc = "Firmware-amdgpu" | ||
590 | 922 | ||
591 | FILES:${PN}-amdgpu-license = "${nonarch_base_libdir}/firmware/LICENSE.amdgpu" | 923 | FILES:${PN}-amdgpu-license = "${nonarch_base_libdir}/firmware/LICENSE.amdgpu" |
592 | FILES:${PN}-amdgpu = " \ | 924 | FILES:${PN}-amdgpu-aldebaran = "${nonarch_base_libdir}/firmware/amdgpu/aldebaran_*.bin*" |
593 | ${nonarch_base_libdir}/firmware/amdgpu \ | 925 | FILES:${PN}-amdgpu-carrizo = "${nonarch_base_libdir}/firmware/amdgpu/carrizo_*.bin*" |
594 | " | 926 | FILES:${PN}-amdgpu-cezanne = "${nonarch_base_libdir}/firmware/amdgpu/green_sardine_*.bin*" |
927 | FILES:${PN}-amdgpu-fiji = "${nonarch_base_libdir}/firmware/amdgpu/fiji_*.bin*" | ||
928 | FILES:${PN}-amdgpu-hawaii = "${nonarch_base_libdir}/firmware/amdgpu/hawaii_*.bin*" | ||
929 | FILES:${PN}-amdgpu-navi10 = "${nonarch_base_libdir}/firmware/amdgpu/navi10_*.bin*" | ||
930 | FILES:${PN}-amdgpu-navi14 = "${nonarch_base_libdir}/firmware/amdgpu/navi14_*.bin*" | ||
931 | FILES:${PN}-amdgpu-navi21 = "${nonarch_base_libdir}/firmware/amdgpu/sienna_cichlid_*.bin*" | ||
932 | FILES:${PN}-amdgpu-navi22 = "${nonarch_base_libdir}/firmware/amdgpu/navy_flounder_*.bin*" | ||
933 | FILES:${PN}-amdgpu-navi23 = "${nonarch_base_libdir}/firmware/amdgpu/dimgrey_cavefish_*.bin*" | ||
934 | FILES:${PN}-amdgpu-navi24 = "${nonarch_base_libdir}/firmware/amdgpu/beige_goby_*.bin*" | ||
935 | FILES:${PN}-amdgpu-navi31 = "${nonarch_base_libdir}/firmware/amdgpu/gc_11_0_0_*.bin* \ | ||
936 | ${nonarch_base_libdir}/firmware/amdgpu/psp_13_0_0_sos.bin* \ | ||
937 | ${nonarch_base_libdir}/firmware/amdgpu/psp_13_0_0_ta.bin* \ | ||
938 | ${nonarch_base_libdir}/firmware/amdgpu/smu_13_0_0.bin* \ | ||
939 | ${nonarch_base_libdir}/firmware/amdgpu/dcn_3_2_0_dmcub.bin* \ | ||
940 | ${nonarch_base_libdir}/firmware/amdgpu/sdma_6_0_0.bin* \ | ||
941 | ${nonarch_base_libdir}/firmware/amdgpu/vcn_4_0_0.bin* \ | ||
942 | " | ||
943 | FILES:${PN}-amdgpu-navi32 = "${nonarch_base_libdir}/firmware/amdgpu/dcn_3_2_0_dmcub.bin* \ | ||
944 | ${nonarch_base_libdir}/firmware/amdgpu/gc_11_0_3_*.bin* \ | ||
945 | ${nonarch_base_libdir}/firmware/amdgpu/psp_13_0_10_sos.bin* \ | ||
946 | ${nonarch_base_libdir}/firmware/amdgpu/psp_13_0_10_ta.bin* \ | ||
947 | ${nonarch_base_libdir}/firmware/amdgpu/sdma_6_0_3.bin* \ | ||
948 | ${nonarch_base_libdir}/firmware/amdgpu/smu_13_0_10.bin* \ | ||
949 | ${nonarch_base_libdir}/firmware/amdgpu/vcn_4_0_0.bin* \ | ||
950 | " | ||
951 | FILES:${PN}-amdgpu-oland = "${nonarch_base_libdir}/firmware/amdgpu/oland_*.bin*" | ||
952 | FILES:${PN}-amdgpu-polaris10 = "${nonarch_base_libdir}/firmware/amdgpu/polaris10_*.bin*" | ||
953 | FILES:${PN}-amdgpu-polaris11 = "${nonarch_base_libdir}/firmware/amdgpu/polaris11_*.bin*" | ||
954 | FILES:${PN}-amdgpu-polaris12 = "${nonarch_base_libdir}/firmware/amdgpu/polaris12_*.bin*" | ||
955 | FILES:${PN}-amdgpu-raven = "${nonarch_base_libdir}/firmware/amdgpu/raven_*.bin*" | ||
956 | FILES:${PN}-amdgpu-rembrandt = "${nonarch_base_libdir}/firmware/amdgpu/yellow_carp_*.bin*" | ||
957 | FILES:${PN}-amdgpu-renoir = "${nonarch_base_libdir}/firmware/amdgpu/renoir_*.bin*" | ||
958 | FILES:${PN}-amdgpu-stoney = "${nonarch_base_libdir}/firmware/amdgpu/stoney_*.bin*" | ||
959 | FILES:${PN}-amdgpu-tonga = "${nonarch_base_libdir}/firmware/amdgpu/tonga_*.bin*" | ||
960 | FILES:${PN}-amdgpu-topaz = "${nonarch_base_libdir}/firmware/amdgpu/topaz_*.bin*" | ||
961 | FILES:${PN}-amdgpu-vega10 = "${nonarch_base_libdir}/firmware/amdgpu/vega10_*.bin*" | ||
962 | FILES:${PN}-amdgpu-vega12 = "${nonarch_base_libdir}/firmware/amdgpu/vega12_*.bin*" | ||
963 | FILES:${PN}-amdgpu-misc = "${nonarch_base_libdir}/firmware/amdgpu/*" | ||
964 | # -amdgpu is a virtual package that depends upon all amdgpu packages. | ||
965 | ALLOW_EMPTY:${PN}-amdgpu = "1" | ||
966 | # -amdgpu-misc is a catch all package that includes all the amdgpu | ||
967 | # firmwares that are not already included in other -amdgpu- packages. | ||
968 | ALLOW_EMPTY:${PN}-amdgpu-misc = "1" | ||
595 | 969 | ||
596 | RDEPENDS:${PN}-amdgpu += "${PN}-amdgpu-license" | 970 | RDEPENDS:${PN}-amdgpu += "${PN}-amdgpu-license" |
971 | RDEPENDS:${PN}-amdgpu-aldebaran += "${PN}-amdgpu-license" | ||
972 | RDEPENDS:${PN}-amdgpu-carrizo += "${PN}-amdgpu-license" | ||
973 | RDEPENDS:${PN}-amdgpu-cezanne += "${PN}-amdgpu-license" | ||
974 | RDEPENDS:${PN}-amdgpu-fiji += "${PN}-amdgpu-license" | ||
975 | RDEPENDS:${PN}-amdgpu-hawaii += "${PN}-amdgpu-license" | ||
976 | RDEPENDS:${PN}-amdgpu-navi10 += "${PN}-amdgpu-license" | ||
977 | RDEPENDS:${PN}-amdgpu-navi14 += "${PN}-amdgpu-license" | ||
978 | RDEPENDS:${PN}-amdgpu-navi21 += "${PN}-amdgpu-license" | ||
979 | RDEPENDS:${PN}-amdgpu-navi22 += "${PN}-amdgpu-license" | ||
980 | RDEPENDS:${PN}-amdgpu-navi23 += "${PN}-amdgpu-license" | ||
981 | RDEPENDS:${PN}-amdgpu-navi24 += "${PN}-amdgpu-license" | ||
982 | RDEPENDS:${PN}-amdgpu-navi31 += "${PN}-amdgpu-license" | ||
983 | RDEPENDS:${PN}-amdgpu-navi32 += "${PN}-amdgpu-license" | ||
984 | RDEPENDS:${PN}-amdgpu-oland += "${PN}-amdgpu-license" | ||
985 | RDEPENDS:${PN}-amdgpu-polaris10 += "${PN}-amdgpu-license" | ||
986 | RDEPENDS:${PN}-amdgpu-polaris11 += "${PN}-amdgpu-license" | ||
987 | RDEPENDS:${PN}-amdgpu-polaris12 += "${PN}-amdgpu-license" | ||
988 | RDEPENDS:${PN}-amdgpu-raven += "${PN}-amdgpu-license" | ||
989 | RDEPENDS:${PN}-amdgpu-rembrandt += "${PN}-amdgpu-license" | ||
990 | RDEPENDS:${PN}-amdgpu-renoir += "${PN}-amdgpu-license" | ||
991 | RDEPENDS:${PN}-amdgpu-stoney += "${PN}-amdgpu-license" | ||
992 | RDEPENDS:${PN}-amdgpu-tonga += "${PN}-amdgpu-license" | ||
993 | RDEPENDS:${PN}-amdgpu-topaz += "${PN}-amdgpu-license" | ||
994 | RDEPENDS:${PN}-amdgpu-vega10 += "${PN}-amdgpu-license" | ||
995 | RDEPENDS:${PN}-amdgpu-vega12 += "${PN}-amdgpu-license" | ||
996 | RDEPENDS:${PN}-amdgpu-misc += "${PN}-amdgpu-license" | ||
597 | 997 | ||
598 | # For lontium | 998 | # For lontium |
599 | LICENSE:${PN}-lt9611uxc = "Firmware-Lontium" | 999 | LICENSE:${PN}-lt9611uxc = "Firmware-Lontium" |
600 | 1000 | ||
601 | FILES:${PN}-lontium-license = "${nonarch_base_libdir}/firmware/LICENSE.Lontium" | 1001 | FILES:${PN}-lontium-license = "${nonarch_base_libdir}/firmware/LICENSE.Lontium" |
602 | FILES:${PN}-lt9611uxc = "${nonarch_base_libdir}/firmware/lt9611uxc_fw.bin" | 1002 | FILES:${PN}-lt9611uxc = "${nonarch_base_libdir}/firmware/lt9611uxc_fw.bin*" |
1003 | |||
1004 | # For Arm Mali | ||
1005 | LICENSE:${PN}-mali-csffw-arch108 = "Firmware-mali_csffw" | ||
1006 | FILES:${PN}-mali-csffw-license = "${nonarch_base_libdir}/firmware/LICENCE.mali_csffw" | ||
1007 | FILES:${PN}-mali-csffw-arch108 = "${nonarch_base_libdir}/firmware/arm/mali/arch10.8/mali_csffw.bin*" | ||
1008 | |||
1009 | RDEPENDS:${PN}-mali-csffw-arch108 += "${PN}-mali-csffw-license" | ||
603 | 1010 | ||
604 | # For marvell | 1011 | # For marvell |
605 | LICENSE:${PN}-pcie8897 = "Firmware-Marvell" | 1012 | LICENSE:${PN}-pcie8897 = "Firmware-Marvell" |
@@ -617,12 +1024,12 @@ LICENSE:${PN}-marvell-license = "Firmware-Marvell" | |||
617 | 1024 | ||
618 | FILES:${PN}-marvell-license = "${nonarch_base_libdir}/firmware/LICENCE.Marvell" | 1025 | FILES:${PN}-marvell-license = "${nonarch_base_libdir}/firmware/LICENCE.Marvell" |
619 | FILES:${PN}-pcie8897 = " \ | 1026 | FILES:${PN}-pcie8897 = " \ |
620 | ${nonarch_base_libdir}/firmware/mrvl/pcie8897_uapsta.bin \ | 1027 | ${nonarch_base_libdir}/firmware/mrvl/pcie8897_uapsta.bin* \ |
621 | " | 1028 | " |
622 | FILES:${PN}-pcie8997 = " \ | 1029 | FILES:${PN}-pcie8997 = " \ |
623 | ${nonarch_base_libdir}/firmware/mrvl/pcie8997_wlan_v4.bin \ | 1030 | ${nonarch_base_libdir}/firmware/mrvl/pcie8997_wlan_v4.bin* \ |
624 | ${nonarch_base_libdir}/firmware/mrvl/pcieuart8997_combo_v4.bin \ | 1031 | ${nonarch_base_libdir}/firmware/mrvl/pcieuart8997_combo_v4.bin* \ |
625 | ${nonarch_base_libdir}/firmware/mrvl/pcieusb8997_combo_v4.bin \ | 1032 | ${nonarch_base_libdir}/firmware/mrvl/pcieusb8997_combo_v4.bin* \ |
626 | " | 1033 | " |
627 | FILES:${PN}-sd8686 = " \ | 1034 | FILES:${PN}-sd8686 = " \ |
628 | ${nonarch_base_libdir}/firmware/libertas/sd8686_v9* \ | 1035 | ${nonarch_base_libdir}/firmware/libertas/sd8686_v9* \ |
@@ -633,31 +1040,35 @@ FILES:${PN}-sd8688 = " \ | |||
633 | ${nonarch_base_libdir}/firmware/mrvl/sd8688* \ | 1040 | ${nonarch_base_libdir}/firmware/mrvl/sd8688* \ |
634 | " | 1041 | " |
635 | FILES:${PN}-sd8787 = " \ | 1042 | FILES:${PN}-sd8787 = " \ |
636 | ${nonarch_base_libdir}/firmware/mrvl/sd8787_uapsta.bin \ | 1043 | ${nonarch_base_libdir}/firmware/mrvl/sd8787_uapsta.bin* \ |
637 | " | 1044 | " |
638 | FILES:${PN}-sd8797 = " \ | 1045 | FILES:${PN}-sd8797 = " \ |
639 | ${nonarch_base_libdir}/firmware/mrvl/sd8797_uapsta.bin \ | 1046 | ${nonarch_base_libdir}/firmware/mrvl/sd8797_uapsta.bin* \ |
640 | " | 1047 | " |
641 | FILES:${PN}-sd8801 = " \ | 1048 | FILES:${PN}-sd8801 = " \ |
642 | ${nonarch_base_libdir}/firmware/mrvl/sd8801_uapsta.bin \ | 1049 | ${nonarch_base_libdir}/firmware/mrvl/sd8801_uapsta.bin* \ |
643 | " | 1050 | " |
644 | FILES:${PN}-sd8887 = " \ | 1051 | FILES:${PN}-sd8887 = " \ |
645 | ${nonarch_base_libdir}/firmware/mrvl/sd8887_uapsta.bin \ | 1052 | ${nonarch_base_libdir}/firmware/mrvl/sd8887_uapsta.bin* \ |
646 | " | 1053 | " |
647 | FILES:${PN}-sd8897 = " \ | 1054 | FILES:${PN}-sd8897 = " \ |
648 | ${nonarch_base_libdir}/firmware/mrvl/sd8897_uapsta.bin \ | 1055 | ${nonarch_base_libdir}/firmware/mrvl/sd8897_uapsta.bin* \ |
649 | " | 1056 | " |
650 | do_install:append() { | 1057 | do_install:append() { |
651 | # The kernel 5.6.x driver still uses the old name, provide a symlink for | 1058 | # The kernel 5.6.x driver still uses the old name, provide a symlink for |
652 | # older kernels | 1059 | # older kernels |
653 | ln -fs sdsd8997_combo_v4.bin ${D}${nonarch_base_libdir}/firmware/mrvl/sd8997_uapsta.bin | 1060 | COMPR=$(echo ${@fw_compr_suffix(d)} | tr -d '-') |
1061 | if [ -n "$COMPR" ]; then | ||
1062 | COMPR=".$COMPR" | ||
1063 | fi | ||
1064 | ln -fs sdsd8997_combo_v4.bin$COMPR ${D}${nonarch_base_libdir}/firmware/mrvl/sd8997_uapsta.bin$COMPR | ||
654 | } | 1065 | } |
655 | FILES:${PN}-sd8997 = " \ | 1066 | FILES:${PN}-sd8997 = " \ |
656 | ${nonarch_base_libdir}/firmware/mrvl/sd8997_uapsta.bin \ | 1067 | ${nonarch_base_libdir}/firmware/mrvl/sd8997_uapsta.bin* \ |
657 | ${nonarch_base_libdir}/firmware/mrvl/sdsd8997_combo_v4.bin \ | 1068 | ${nonarch_base_libdir}/firmware/mrvl/sdsd8997_combo_v4.bin* \ |
658 | " | 1069 | " |
659 | FILES:${PN}-usb8997 = " \ | 1070 | FILES:${PN}-usb8997 = " \ |
660 | ${nonarch_base_libdir}/firmware/mrvl/usbusb8997_combo_v4.bin \ | 1071 | ${nonarch_base_libdir}/firmware/mrvl/usbusb8997_combo_v4.bin* \ |
661 | " | 1072 | " |
662 | 1073 | ||
663 | RDEPENDS:${PN}-sd8686 += "${PN}-marvell-license" | 1074 | RDEPENDS:${PN}-sd8686 += "${PN}-marvell-license" |
@@ -677,13 +1088,13 @@ FILES:${PN}-netronome-license = " \ | |||
677 | ${nonarch_base_libdir}/firmware/LICENCE.Netronome \ | 1088 | ${nonarch_base_libdir}/firmware/LICENCE.Netronome \ |
678 | " | 1089 | " |
679 | FILES:${PN}-netronome = " \ | 1090 | FILES:${PN}-netronome = " \ |
680 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0081*.nffw \ | 1091 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0081*.nffw* \ |
681 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0096*.nffw \ | 1092 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0096*.nffw* \ |
682 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0097*.nffw \ | 1093 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0097*.nffw* \ |
683 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0099*.nffw \ | 1094 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0099*.nffw* \ |
684 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0058-0011_2x40.nffw \ | 1095 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0058-0011_2x40.nffw* \ |
685 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0058-0012_2x40.nffw \ | 1096 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0058-0012_2x40.nffw* \ |
686 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0078-0011_1x100.nffw \ | 1097 | ${nonarch_base_libdir}/firmware/netronome/nic_AMDA0078-0011_1x100.nffw* \ |
687 | ${nonarch_base_libdir}/firmware/netronome/bpf \ | 1098 | ${nonarch_base_libdir}/firmware/netronome/bpf \ |
688 | ${nonarch_base_libdir}/firmware/netronome/flower \ | 1099 | ${nonarch_base_libdir}/firmware/netronome/flower \ |
689 | ${nonarch_base_libdir}/firmware/netronome/nic \ | 1100 | ${nonarch_base_libdir}/firmware/netronome/nic \ |
@@ -706,16 +1117,16 @@ LICENSE:${PN}-nxp-license = "Firmware-nxp" | |||
706 | 1117 | ||
707 | FILES:${PN}-nxp8987-sdio = "${nonarch_base_libdir}/firmware/nxp/*8987*" | 1118 | FILES:${PN}-nxp8987-sdio = "${nonarch_base_libdir}/firmware/nxp/*8987*" |
708 | FILES:${PN}-nxp8997-common = " \ | 1119 | FILES:${PN}-nxp8997-common = " \ |
709 | ${nonarch_base_libdir}/firmware/nxp/uartuart8997_bt_v4.bin \ | 1120 | ${nonarch_base_libdir}/firmware/nxp/uartuart8997_bt_v4.bin* \ |
710 | ${nonarch_base_libdir}/firmware/nxp/helper_uart_3000000.bin \ | 1121 | ${nonarch_base_libdir}/firmware/nxp/helper_uart_3000000.bin* \ |
711 | " | 1122 | " |
712 | ALLOW_EMPTY:${PN}-nxp8997-pcie = "1" | 1123 | ALLOW_EMPTY:${PN}-nxp8997-pcie = "1" |
713 | ALLOW_EMPTY:${PN}-nxp8997-sdio = "1" | 1124 | ALLOW_EMPTY:${PN}-nxp8997-sdio = "1" |
714 | FILES:${PN}-nxp9098-common = "${nonarch_base_libdir}/firmware/nxp/uartuart9098_bt_v1.bin" | 1125 | FILES:${PN}-nxp9098-common = "${nonarch_base_libdir}/firmware/nxp/uartuart9098_bt_v1.bin*" |
715 | ALLOW_EMPTY:${PN}-nxp9098-pcie = "1" | 1126 | ALLOW_EMPTY:${PN}-nxp9098-pcie = "1" |
716 | ALLOW_EMPTY:${PN}-nxp9098-sdio = "1" | 1127 | ALLOW_EMPTY:${PN}-nxp9098-sdio = "1" |
717 | FILES:${PN}-nxpiw416-sdio = "${nonarch_base_libdir}/firmware/nxp/*iw416*" | 1128 | FILES:${PN}-nxpiw416-sdio = "${nonarch_base_libdir}/firmware/nxp/*iw416*" |
718 | FILES:${PN}-nxpiw612-sdio = "${nonarch_base_libdir}/firmware/nxp/uartspi_n61x_v1.bin.se" | 1129 | FILES:${PN}-nxpiw612-sdio = "${nonarch_base_libdir}/firmware/nxp/uartspi_n61x_v1.bin.se*" |
719 | FILES:${PN}-nxp-license = "${nonarch_base_libdir}/firmware/LICENSE.nxp" | 1130 | FILES:${PN}-nxp-license = "${nonarch_base_libdir}/firmware/LICENSE.nxp" |
720 | 1131 | ||
721 | RDEPENDS:${PN}-nxp8987-sdio += "${PN}-nxp-license" | 1132 | RDEPENDS:${PN}-nxp8987-sdio += "${PN}-nxp-license" |
@@ -732,7 +1143,7 @@ RDEPENDS:${PN}-nxpiw612-sdio += "${PN}-nxp-license" | |||
732 | LICENSE:${PN}-nxp-mc = "Firmware-nxp_mc_firmware" | 1143 | LICENSE:${PN}-nxp-mc = "Firmware-nxp_mc_firmware" |
733 | LICENSE:${PN}-nxp-mc-license = "Firmware-nxp_mc_firmware" | 1144 | LICENSE:${PN}-nxp-mc-license = "Firmware-nxp_mc_firmware" |
734 | 1145 | ||
735 | FILES:${PN}-nxp-mc= "${nonarch_base_libdir}/firmware/dpaa2/mc/*" | 1146 | FILES:${PN}-nxp-mc = "${nonarch_base_libdir}/firmware/dpaa2/mc/*" |
736 | FILES:${PN}-nxp-mc-license = " \ | 1147 | FILES:${PN}-nxp-mc-license = " \ |
737 | ${nonarch_base_libdir}/firmware/LICENSE.nxp_mc_firmware \ | 1148 | ${nonarch_base_libdir}/firmware/LICENSE.nxp_mc_firmware \ |
738 | " | 1149 | " |
@@ -765,9 +1176,9 @@ LICENSE:${PN}-olpc = "Firmware-OLPC" | |||
765 | LICENSE:${PN}-olpc-license = "Firmware-OLPC" | 1176 | LICENSE:${PN}-olpc-license = "Firmware-OLPC" |
766 | 1177 | ||
767 | FILES:${PN}-olpc = " \ | 1178 | FILES:${PN}-olpc = " \ |
768 | ${nonarch_base_libdir}/firmware/libertas/lbtf_sdio.bin \ | 1179 | ${nonarch_base_libdir}/firmware/libertas/lbtf_sdio.bin* \ |
769 | ${nonarch_base_libdir}/firmware/lbtf_usb.bin \ | 1180 | ${nonarch_base_libdir}/firmware/lbtf_usb.bin* \ |
770 | ${nonarch_base_libdir}/firmware/libertas/usb8388_olpc.bin \ | 1181 | ${nonarch_base_libdir}/firmware/libertas/usb8388_olpc.bin* \ |
771 | " | 1182 | " |
772 | FILES:${PN}-olpc-license = "${nonarch_base_libdir}/firmware/LICENCE.OLPC" | 1183 | FILES:${PN}-olpc-license = "${nonarch_base_libdir}/firmware/LICENCE.OLPC" |
773 | 1184 | ||
@@ -777,7 +1188,7 @@ RDEPENDS:${PN}-olpc += "${PN}-olpc-license" | |||
777 | LICENSE:${PN}-phanfw = "Firmware-phanfw" | 1188 | LICENSE:${PN}-phanfw = "Firmware-phanfw" |
778 | LICENSE:${PN}-phanfw-license = "Firmware-phanfw" | 1189 | LICENSE:${PN}-phanfw-license = "Firmware-phanfw" |
779 | 1190 | ||
780 | FILES:${PN}-phanfw = "${nonarch_base_libdir}/firmware/phanfw.bin" | 1191 | FILES:${PN}-phanfw = "${nonarch_base_libdir}/firmware/phanfw.bin*" |
781 | FILES:${PN}-phanfw-license = "${nonarch_base_libdir}/firmware/LICENCE.phanfw" | 1192 | FILES:${PN}-phanfw-license = "${nonarch_base_libdir}/firmware/LICENCE.phanfw" |
782 | 1193 | ||
783 | RDEPENDS:${PN}-phanfw += "${PN}-phanfw-license" | 1194 | RDEPENDS:${PN}-phanfw += "${PN}-phanfw-license" |
@@ -804,8 +1215,8 @@ RDEPENDS:${PN}-qla2xxx += "${PN}-qla2xxx-license" | |||
804 | LICENSE:${PN}-rs9113 = "WHENCE" | 1215 | LICENSE:${PN}-rs9113 = "WHENCE" |
805 | LICENSE:${PN}-rs9116 = "WHENCE" | 1216 | LICENSE:${PN}-rs9116 = "WHENCE" |
806 | 1217 | ||
807 | FILES:${PN}-rs9113 = " ${nonarch_base_libdir}/firmware/rsi/rs9113*.rps " | 1218 | FILES:${PN}-rs9113 = " ${nonarch_base_libdir}/firmware/rsi/rs9113*.rps* " |
808 | FILES:${PN}-rs9116 = " ${nonarch_base_libdir}/firmware/rsi/rs9116*.rps " | 1219 | FILES:${PN}-rs9116 = " ${nonarch_base_libdir}/firmware/rsi/rs9116*.rps* " |
809 | 1220 | ||
810 | RDEPENDS:${PN}-rs9113 += "${PN}-whence-license" | 1221 | RDEPENDS:${PN}-rs9113 += "${PN}-whence-license" |
811 | RDEPENDS:${PN}-rs9116 += "${PN}-whence-license" | 1222 | RDEPENDS:${PN}-rs9116 += "${PN}-whence-license" |
@@ -827,37 +1238,40 @@ FILES:${PN}-rtl-license = " \ | |||
827 | ${nonarch_base_libdir}/firmware/LICENCE.rtlwifi_firmware.txt \ | 1238 | ${nonarch_base_libdir}/firmware/LICENCE.rtlwifi_firmware.txt \ |
828 | " | 1239 | " |
829 | FILES:${PN}-rtl8188 = " \ | 1240 | FILES:${PN}-rtl8188 = " \ |
830 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8188*.bin \ | 1241 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8188*.bin* \ |
831 | " | 1242 | " |
832 | FILES:${PN}-rtl8192cu = " \ | 1243 | FILES:${PN}-rtl8192cu = " \ |
833 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8192cufw*.bin \ | 1244 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8192cufw*.bin* \ |
834 | " | 1245 | " |
835 | FILES:${PN}-rtl8192ce = " \ | 1246 | FILES:${PN}-rtl8192ce = " \ |
836 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8192cfw*.bin \ | 1247 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8192cfw*.bin* \ |
837 | " | 1248 | " |
838 | FILES:${PN}-rtl8192su = " \ | 1249 | FILES:${PN}-rtl8192su = " \ |
839 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8712u.bin \ | 1250 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8712u.bin* \ |
840 | " | 1251 | " |
841 | FILES:${PN}-rtl8723 = " \ | 1252 | FILES:${PN}-rtl8723 = " \ |
842 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8723*.bin \ | 1253 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8723*.bin* \ |
1254 | ${nonarch_base_libdir}/firmware/rtw88/rtw8723*.bin* \ | ||
1255 | ${nonarch_base_libdir}/firmware/rtl_bt/rtl8723*.bin* \ | ||
843 | " | 1256 | " |
844 | FILES:${PN}-rtl8821 = " \ | 1257 | FILES:${PN}-rtl8821 = " \ |
845 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8821*.bin \ | 1258 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8821*.bin* \ |
846 | ${nonarch_base_libdir}/firmware/rtw88/rtw8821*.bin \ | 1259 | ${nonarch_base_libdir}/firmware/rtw88/rtw8821*.bin* \ |
1260 | ${nonarch_base_libdir}/firmware/rtl_bt/rtl8821*.bin \ | ||
847 | " | 1261 | " |
848 | FILES:${PN}-rtl8761 = " \ | 1262 | FILES:${PN}-rtl8761 = " \ |
849 | ${nonarch_base_libdir}/firmware/rtl_bt/rtl8761*.bin \ | 1263 | ${nonarch_base_libdir}/firmware/rtl_bt/rtl8761*.bin* \ |
850 | " | 1264 | " |
851 | FILES:${PN}-rtl8168 = " \ | 1265 | FILES:${PN}-rtl8168 = " \ |
852 | ${nonarch_base_libdir}/firmware/rtl_nic/rtl8168*.fw \ | 1266 | ${nonarch_base_libdir}/firmware/rtl_nic/rtl8168*.fw* \ |
853 | " | 1267 | " |
854 | FILES:${PN}-rtl8822 = " \ | 1268 | FILES:${PN}-rtl8822 = " \ |
855 | ${nonarch_base_libdir}/firmware/rtl_bt/rtl8822*.bin \ | 1269 | ${nonarch_base_libdir}/firmware/rtl_bt/rtl8822*.bin* \ |
856 | ${nonarch_base_libdir}/firmware/rtw88/rtw8822*.bin \ | 1270 | ${nonarch_base_libdir}/firmware/rtw88/rtw8822*.bin* \ |
857 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8822*.bin \ | 1271 | ${nonarch_base_libdir}/firmware/rtlwifi/rtl8822*.bin* \ |
858 | " | 1272 | " |
859 | FILES:${PN}-rtl-nic = " \ | 1273 | FILES:${PN}-rtl-nic = " \ |
860 | ${nonarch_base_libdir}/firmware/rtl_nic/*.fw \ | 1274 | ${nonarch_base_libdir}/firmware/rtl_nic/*.fw* \ |
861 | " | 1275 | " |
862 | 1276 | ||
863 | RDEPENDS:${PN}-rtl8188 += "${PN}-rtl-license" | 1277 | RDEPENDS:${PN}-rtl8188 += "${PN}-rtl-license" |
@@ -871,13 +1285,25 @@ RDEPENDS:${PN}-rtl8822 += "${PN}-rtl-license" | |||
871 | RDEPENDS:${PN}-rtl8168 += "${PN}-whence-license" | 1285 | RDEPENDS:${PN}-rtl8168 += "${PN}-whence-license" |
872 | RDEPENDS:${PN}-rtl-nic += "${PN}-whence-license" | 1286 | RDEPENDS:${PN}-rtl-nic += "${PN}-whence-license" |
873 | 1287 | ||
1288 | # For Silabs | ||
1289 | LICENSE:${PN}-wfx = "Firmware-wfx" | ||
1290 | LICENSE:${PN}-wfx-license = "Firmware-wfx" | ||
1291 | |||
1292 | FILES:${PN}-wfx = " \ | ||
1293 | ${nonarch_base_libdir}/firmware/wfx/*.pds* \ | ||
1294 | ${nonarch_base_libdir}/firmware/wfx/*.sec* \ | ||
1295 | " | ||
1296 | FILES:${PN}-wfx-license = "${nonarch_base_libdir}/firmware/wfx/LICENCE.wf200" | ||
1297 | |||
1298 | RDEPENDS:${PN}-wfx += "${PN}-wfx-license" | ||
1299 | |||
874 | # For TI wl1251 | 1300 | # For TI wl1251 |
875 | LICENSE:${PN}-wl1251 = "Firmware-wl1251" | 1301 | LICENSE:${PN}-wl1251 = "Firmware-wl1251" |
876 | LICENSE:${PN}-wl1251-license = "Firmware-wl1251" | 1302 | LICENSE:${PN}-wl1251-license = "Firmware-wl1251" |
877 | 1303 | ||
878 | FILES:${PN}-wl1251 = " \ | 1304 | FILES:${PN}-wl1251 = " \ |
879 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl1251-fw.bin \ | 1305 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl1251-fw.bin* \ |
880 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl1251-nvs.bin \ | 1306 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl1251-nvs.bin* \ |
881 | " | 1307 | " |
882 | FILES:${PN}-wl1251-license = "${nonarch_base_libdir}/firmware/LICENCE.wl1251" | 1308 | FILES:${PN}-wl1251-license = "${nonarch_base_libdir}/firmware/LICENCE.wl1251" |
883 | 1309 | ||
@@ -887,6 +1313,7 @@ RDEPENDS:${PN}-wl1251 += "${PN}-wl1251-license" | |||
887 | LICENSE:${PN}-wlcommon = "Firmware-ti-connectivity" | 1313 | LICENSE:${PN}-wlcommon = "Firmware-ti-connectivity" |
888 | LICENSE:${PN}-wl12xx = "Firmware-ti-connectivity" | 1314 | LICENSE:${PN}-wl12xx = "Firmware-ti-connectivity" |
889 | LICENSE:${PN}-wl18xx = "Firmware-ti-connectivity" | 1315 | LICENSE:${PN}-wl18xx = "Firmware-ti-connectivity" |
1316 | LICENSE:${PN}-cc33xx = "Firmware-ti-connectivity" | ||
890 | LICENSE:${PN}-ti-connectivity-license = "Firmware-ti-connectivity" | 1317 | LICENSE:${PN}-ti-connectivity-license = "Firmware-ti-connectivity" |
891 | 1318 | ||
892 | FILES:${PN}-ti-connectivity-license = "${nonarch_base_libdir}/firmware/LICENCE.ti-connectivity" | 1319 | FILES:${PN}-ti-connectivity-license = "${nonarch_base_libdir}/firmware/LICENCE.ti-connectivity" |
@@ -899,8 +1326,8 @@ FILES:${PN}-ti-connectivity-license = "${nonarch_base_libdir}/firmware/LICENCE.t | |||
899 | # symlink, both need to go to wlcommon. | 1326 | # symlink, both need to go to wlcommon. |
900 | FILES:${PN}-wlcommon = " \ | 1327 | FILES:${PN}-wlcommon = " \ |
901 | ${nonarch_base_libdir}/firmware/ti-connectivity/TI* \ | 1328 | ${nonarch_base_libdir}/firmware/ti-connectivity/TI* \ |
902 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl127x-nvs.bin \ | 1329 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl127x-nvs.bin* \ |
903 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl1271-nvs.bin \ | 1330 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl1271-nvs.bin* \ |
904 | " | 1331 | " |
905 | FILES:${PN}-wl12xx = " \ | 1332 | FILES:${PN}-wl12xx = " \ |
906 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl12* \ | 1333 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl12* \ |
@@ -909,8 +1336,13 @@ FILES:${PN}-wl18xx = " \ | |||
909 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl18* \ | 1336 | ${nonarch_base_libdir}/firmware/ti-connectivity/wl18* \ |
910 | " | 1337 | " |
911 | 1338 | ||
1339 | FILES:${PN}-cc33xx = " \ | ||
1340 | ${nonarch_base_libdir}/firmware/ti-connectivity/cc33* \ | ||
1341 | " | ||
1342 | |||
912 | RDEPENDS:${PN}-wl12xx = "${PN}-ti-connectivity-license ${PN}-wlcommon" | 1343 | RDEPENDS:${PN}-wl12xx = "${PN}-ti-connectivity-license ${PN}-wlcommon" |
913 | RDEPENDS:${PN}-wl18xx = "${PN}-ti-connectivity-license ${PN}-wlcommon" | 1344 | RDEPENDS:${PN}-wl18xx = "${PN}-ti-connectivity-license ${PN}-wlcommon" |
1345 | RDEPENDS:${PN}-cc33xx = "${PN}-ti-connectivity-license" | ||
914 | 1346 | ||
915 | # For ti-keystone | 1347 | # For ti-keystone |
916 | LICENSE:${PN}-ti-keystone = "Firmware-ti-keystone" | 1348 | LICENSE:${PN}-ti-keystone = "Firmware-ti-keystone" |
@@ -928,7 +1360,7 @@ LICENSE:${PN}-vt6656-license = "Firmware-via_vt6656" | |||
928 | 1360 | ||
929 | FILES:${PN}-vt6656-license = "${nonarch_base_libdir}/firmware/LICENCE.via_vt6656" | 1361 | FILES:${PN}-vt6656-license = "${nonarch_base_libdir}/firmware/LICENCE.via_vt6656" |
930 | FILES:${PN}-vt6656 = " \ | 1362 | FILES:${PN}-vt6656 = " \ |
931 | ${nonarch_base_libdir}/firmware/vntwusb.fw \ | 1363 | ${nonarch_base_libdir}/firmware/vntwusb.fw* \ |
932 | " | 1364 | " |
933 | 1365 | ||
934 | RDEPENDS:${PN}-vt6656 = "${PN}-vt6656-license" | 1366 | RDEPENDS:${PN}-vt6656 = "${PN}-vt6656-license" |
@@ -937,7 +1369,7 @@ RDEPENDS:${PN}-vt6656 = "${PN}-vt6656-license" | |||
937 | LICENSE:${PN}-xc4000 = "Firmware-xc4000" | 1369 | LICENSE:${PN}-xc4000 = "Firmware-xc4000" |
938 | LICENSE:${PN}-xc4000-license = "Firmware-xc4000" | 1370 | LICENSE:${PN}-xc4000-license = "Firmware-xc4000" |
939 | 1371 | ||
940 | FILES:${PN}-xc4000 = "${nonarch_base_libdir}/firmware/dvb-fe-xc4000-1.4.1.fw" | 1372 | FILES:${PN}-xc4000 = "${nonarch_base_libdir}/firmware/dvb-fe-xc4000-1.4.1.fw*" |
941 | FILES:${PN}-xc4000-license = "${nonarch_base_libdir}/firmware/LICENCE.xc4000" | 1373 | FILES:${PN}-xc4000-license = "${nonarch_base_libdir}/firmware/LICENCE.xc4000" |
942 | 1374 | ||
943 | RDEPENDS:${PN}-xc4000 += "${PN}-xc4000-license" | 1375 | RDEPENDS:${PN}-xc4000 += "${PN}-xc4000-license" |
@@ -946,7 +1378,7 @@ RDEPENDS:${PN}-xc4000 += "${PN}-xc4000-license" | |||
946 | LICENSE:${PN}-xc5000 = "Firmware-xc5000" | 1378 | LICENSE:${PN}-xc5000 = "Firmware-xc5000" |
947 | LICENSE:${PN}-xc5000-license = "Firmware-xc5000" | 1379 | LICENSE:${PN}-xc5000-license = "Firmware-xc5000" |
948 | 1380 | ||
949 | FILES:${PN}-xc5000 = "${nonarch_base_libdir}/firmware/dvb-fe-xc5000-1.6.114.fw" | 1381 | FILES:${PN}-xc5000 = "${nonarch_base_libdir}/firmware/dvb-fe-xc5000-1.6.114.fw*" |
950 | FILES:${PN}-xc5000-license = "${nonarch_base_libdir}/firmware/LICENCE.xc5000" | 1382 | FILES:${PN}-xc5000-license = "${nonarch_base_libdir}/firmware/LICENCE.xc5000" |
951 | 1383 | ||
952 | RDEPENDS:${PN}-xc5000 += "${PN}-xc5000-license" | 1384 | RDEPENDS:${PN}-xc5000 += "${PN}-xc5000-license" |
@@ -956,7 +1388,7 @@ LICENSE:${PN}-xc5000c = "Firmware-xc5000c" | |||
956 | LICENSE:${PN}-xc5000c-license = "Firmware-xc5000c" | 1388 | LICENSE:${PN}-xc5000c-license = "Firmware-xc5000c" |
957 | 1389 | ||
958 | FILES:${PN}-xc5000c = " \ | 1390 | FILES:${PN}-xc5000c = " \ |
959 | ${nonarch_base_libdir}/firmware/dvb-fe-xc5000c-4.1.30.7.fw \ | 1391 | ${nonarch_base_libdir}/firmware/dvb-fe-xc5000c-4.1.30.7.fw* \ |
960 | " | 1392 | " |
961 | FILES:${PN}-xc5000c-license = "${nonarch_base_libdir}/firmware/LICENCE.xc5000c" | 1393 | FILES:${PN}-xc5000c-license = "${nonarch_base_libdir}/firmware/LICENCE.xc5000c" |
962 | 1394 | ||
@@ -971,44 +1403,44 @@ FILES:${PN}-broadcom-license = "${nonarch_base_libdir}/firmware/LICENCE.broadcom | |||
971 | 1403 | ||
972 | # for i in `grep brcm WHENCE | grep ^File | sed 's/File: brcm.//g'`; do pkg=`echo $i | sed 's/-[sp40].*//g; s/\.bin//g; s/brcmfmac/bcm/g; s/_hdr/-hdr/g; s/BCM/bcm-0bb4-0306/g'`; echo "$i - $pkg"; echo -e "FILES:\${PN}-$pkg = \"\${nonarch_base_libdir}/firmware/brcm/$i\""; done | grep ^FILES | 1404 | # for i in `grep brcm WHENCE | grep ^File | sed 's/File: brcm.//g'`; do pkg=`echo $i | sed 's/-[sp40].*//g; s/\.bin//g; s/brcmfmac/bcm/g; s/_hdr/-hdr/g; s/BCM/bcm-0bb4-0306/g'`; echo "$i - $pkg"; echo -e "FILES:\${PN}-$pkg = \"\${nonarch_base_libdir}/firmware/brcm/$i\""; done | grep ^FILES |
973 | 1405 | ||
974 | FILES:${PN}-bcm43xx = "${nonarch_base_libdir}/firmware/brcm/bcm43xx-0.fw" | 1406 | FILES:${PN}-bcm43xx = "${nonarch_base_libdir}/firmware/brcm/bcm43xx-0.fw*" |
975 | FILES:${PN}-bcm43xx-hdr = "${nonarch_base_libdir}/firmware/brcm/bcm43xx_hdr-0.fw" | 1407 | FILES:${PN}-bcm43xx-hdr = "${nonarch_base_libdir}/firmware/brcm/bcm43xx_hdr-0.fw*" |
976 | FILES:${PN}-bcm4329-fullmac = "${nonarch_base_libdir}/firmware/brcm/bcm4329-fullmac-4.bin" | 1408 | FILES:${PN}-bcm4329-fullmac = "${nonarch_base_libdir}/firmware/brcm/bcm4329-fullmac-4.bin*" |
977 | FILES:${PN}-bcm43236b = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43236b.bin" | 1409 | FILES:${PN}-bcm43236b = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43236b.bin*" |
978 | FILES:${PN}-bcm4329 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4329-sdio.bin" | 1410 | FILES:${PN}-bcm4329 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4329-sdio.bin*" |
979 | FILES:${PN}-bcm4330 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4330-sdio.*" | 1411 | FILES:${PN}-bcm4330 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4330-sdio.*" |
980 | FILES:${PN}-bcm4334 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4334-sdio.bin" | 1412 | FILES:${PN}-bcm4334 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4334-sdio.bin*" |
981 | FILES:${PN}-bcm4335 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4335-sdio.bin" | 1413 | FILES:${PN}-bcm4335 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4335-sdio.bin*" |
982 | FILES:${PN}-bcm4339 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4339-sdio.bin \ | 1414 | FILES:${PN}-bcm4339 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4339-sdio.bin* \ |
983 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4339-sdio.bin \ | 1415 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4339-sdio.bin* \ |
984 | " | 1416 | " |
985 | FILES:${PN}-bcm43241b0 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b0-sdio.bin" | 1417 | FILES:${PN}-bcm43241b0 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b0-sdio.bin*" |
986 | FILES:${PN}-bcm43241b4 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b4-sdio.bin" | 1418 | FILES:${PN}-bcm43241b4 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b4-sdio.bin*" |
987 | FILES:${PN}-bcm43241b5 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b5-sdio.bin" | 1419 | FILES:${PN}-bcm43241b5 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43241b5-sdio.bin*" |
988 | FILES:${PN}-bcm43242a = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43242a.bin" | 1420 | FILES:${PN}-bcm43242a = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43242a.bin*" |
989 | FILES:${PN}-bcm43143 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43143.bin \ | 1421 | FILES:${PN}-bcm43143 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43143.bin* \ |
990 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac43143-sdio.bin \ | 1422 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac43143-sdio.bin* \ |
991 | " | 1423 | " |
992 | FILES:${PN}-bcm43430a0 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43430a0-sdio.*" | 1424 | FILES:${PN}-bcm43430a0 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43430a0-sdio.*" |
993 | FILES:${PN}-bcm43455 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43455-sdio.* \ | 1425 | FILES:${PN}-bcm43455 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43455-sdio.* \ |
994 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43455-sdio.* \ | 1426 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43455-sdio.* \ |
995 | " | 1427 | " |
996 | FILES:${PN}-bcm4350c2 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4350c2-pcie.bin" | 1428 | FILES:${PN}-bcm4350c2 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4350c2-pcie.bin*" |
997 | FILES:${PN}-bcm4350 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4350-pcie.bin" | 1429 | FILES:${PN}-bcm4350 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4350-pcie.bin*" |
998 | FILES:${PN}-bcm4356 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4356-sdio.* \ | 1430 | FILES:${PN}-bcm4356 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4356-sdio.* \ |
999 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4356-sdio.* \ | 1431 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4356-sdio.* \ |
1000 | " | 1432 | " |
1001 | FILES:${PN}-bcm43569 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43569.bin" | 1433 | FILES:${PN}-bcm43569 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43569.bin*" |
1002 | FILES:${PN}-bcm43570 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43570-pcie.bin \ | 1434 | FILES:${PN}-bcm43570 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43570-pcie.bin* \ |
1003 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43570-pcie.bin \ | 1435 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43570-pcie.bin* \ |
1004 | " | 1436 | " |
1005 | FILES:${PN}-bcm4358 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4358-pcie.bin" | 1437 | FILES:${PN}-bcm4358 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4358-pcie.bin*" |
1006 | FILES:${PN}-bcm43602 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43602-pcie.bin \ | 1438 | FILES:${PN}-bcm43602 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43602-pcie.bin* \ |
1007 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac43602-pcie.ap.bin \ | 1439 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac43602-pcie.ap.bin* \ |
1008 | " | 1440 | " |
1009 | FILES:${PN}-bcm4366b = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4366b-pcie.bin" | 1441 | FILES:${PN}-bcm4366b = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4366b-pcie.bin*" |
1010 | FILES:${PN}-bcm4366c = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4366c-pcie.bin" | 1442 | FILES:${PN}-bcm4366c = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4366c-pcie.bin*" |
1011 | FILES:${PN}-bcm4371 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4371-pcie.bin" | 1443 | FILES:${PN}-bcm4371 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4371-pcie.bin*" |
1012 | 1444 | ||
1013 | # for i in `grep brcm WHENCE | grep ^File | sed 's/File: brcm.//g'`; do pkg=`echo $i | sed 's/-[sp40].*//g; s/\.bin//g; s/brcmfmac/bcm/g; s/_hdr/-hdr/g; s/BCM/bcm-0bb4-0306/g'`; echo -e "LICENSE:\${PN}-$pkg = \"Firmware-broadcom_bcm43xx\"\nRDEPENDS_\${PN}-$pkg += \"\${PN}-broadcom-license\""; done | 1445 | # for i in `grep brcm WHENCE | grep ^File | sed 's/File: brcm.//g'`; do pkg=`echo $i | sed 's/-[sp40].*//g; s/\.bin//g; s/brcmfmac/bcm/g; s/_hdr/-hdr/g; s/BCM/bcm-0bb4-0306/g'`; echo -e "LICENSE:\${PN}-$pkg = \"Firmware-broadcom_bcm43xx\"\nRDEPENDS_\${PN}-$pkg += \"\${PN}-broadcom-license\""; done |
1014 | # Currently 1st one and last 6 have cypress LICENSE | 1446 | # Currently 1st one and last 6 have cypress LICENSE |
@@ -1071,24 +1503,24 @@ RDEPENDS:${PN}-bcm4371 += "${PN}-broadcom-license" | |||
1071 | LICENSE:${PN}-cypress-license = "Firmware-cypress" | 1503 | LICENSE:${PN}-cypress-license = "Firmware-cypress" |
1072 | FILES:${PN}-cypress-license = "${nonarch_base_libdir}/firmware/LICENCE.cypress" | 1504 | FILES:${PN}-cypress-license = "${nonarch_base_libdir}/firmware/LICENCE.cypress" |
1073 | 1505 | ||
1074 | FILES:${PN}-bcm-0bb4-0306 = "${nonarch_base_libdir}/firmware/brcm/BCM-0bb4-0306.hcd" | 1506 | FILES:${PN}-bcm-0bb4-0306 = "${nonarch_base_libdir}/firmware/brcm/BCM-0bb4-0306.hcd*" |
1075 | FILES:${PN}-bcm43340 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43340-sdio.* \ | 1507 | FILES:${PN}-bcm43340 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43340-sdio.* \ |
1076 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43340-sdio.*" | 1508 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43340-sdio.*" |
1077 | FILES:${PN}-bcm43362 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43362-sdio.* \ | 1509 | FILES:${PN}-bcm43362 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43362-sdio.* \ |
1078 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43362-sdio.*" | 1510 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43362-sdio.*" |
1079 | FILES:${PN}-bcm43430 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43430-sdio.* \ | 1511 | FILES:${PN}-bcm43430 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac43430-sdio.* \ |
1080 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43430-sdio.*" | 1512 | ${nonarch_base_libdir}/firmware/cypress/cyfmac43430-sdio.*" |
1081 | FILES:${PN}-bcm4354 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4354-sdio.bin \ | 1513 | FILES:${PN}-bcm4354 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4354-sdio.bin* \ |
1082 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4354-sdio.bin \ | 1514 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4354-sdio.bin* \ |
1083 | " | 1515 | " |
1084 | FILES:${PN}-bcm4356-pcie = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4356-pcie.* \ | 1516 | FILES:${PN}-bcm4356-pcie = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4356-pcie.* \ |
1085 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4356-pcie.* \ | 1517 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4356-pcie.* \ |
1086 | " | 1518 | " |
1087 | FILES:${PN}-bcm4373 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4373-sdio.bin \ | 1519 | FILES:${PN}-bcm4373 = "${nonarch_base_libdir}/firmware/brcm/brcmfmac4373-sdio.bin* \ |
1088 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac4373.bin \ | 1520 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac4373.bin* \ |
1089 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4373-sdio.bin \ | 1521 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4373-sdio.bin* \ |
1090 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac4373-sdio.clm_blob \ | 1522 | ${nonarch_base_libdir}/firmware/brcm/brcmfmac4373-sdio.clm_blob* \ |
1091 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4373-sdio.clm_blob \ | 1523 | ${nonarch_base_libdir}/firmware/cypress/cyfmac4373-sdio.clm_blob* \ |
1092 | " | 1524 | " |
1093 | 1525 | ||
1094 | LICENSE:${PN}-bcm-0bb4-0306 = "Firmware-cypress" | 1526 | LICENSE:${PN}-bcm-0bb4-0306 = "Firmware-cypress" |
@@ -1115,8 +1547,8 @@ LICENSE:${PN}-bnx2 = "WHENCE" | |||
1115 | LICENSE:${PN}-whence-license = "WHENCE" | 1547 | LICENSE:${PN}-whence-license = "WHENCE" |
1116 | 1548 | ||
1117 | FILES:${PN}-bnx2 = " \ | 1549 | FILES:${PN}-bnx2 = " \ |
1118 | ${nonarch_base_libdir}/firmware/bnx2/bnx2-mips*.fw \ | 1550 | ${nonarch_base_libdir}/firmware/bnx2/bnx2-mips*.fw* \ |
1119 | ${nonarch_base_libdir}/firmware/bnx2/bnx2-rv2p*.fw \ | 1551 | ${nonarch_base_libdir}/firmware/bnx2/bnx2-rv2p*.fw* \ |
1120 | " | 1552 | " |
1121 | FILES:${PN}-whence-license = "${nonarch_base_libdir}/firmware/WHENCE" | 1553 | FILES:${PN}-whence-license = "${nonarch_base_libdir}/firmware/WHENCE" |
1122 | 1554 | ||
@@ -1125,7 +1557,7 @@ RPROVIDES:${PN}-bnx2 = "${PN}-bnx2-mips" | |||
1125 | 1557 | ||
1126 | LICENSE:${PN}-bnx2x = "WHENCE" | 1558 | LICENSE:${PN}-bnx2x = "WHENCE" |
1127 | 1559 | ||
1128 | FILES:${PN}-bnx2x = "${nonarch_base_libdir}/firmware/bnx2x/bnx2x*.fw" | 1560 | FILES:${PN}-bnx2x = "${nonarch_base_libdir}/firmware/bnx2x/bnx2x*.fw*" |
1129 | 1561 | ||
1130 | RDEPENDS:${PN}-bnx2x += "${PN}-whence-license" | 1562 | RDEPENDS:${PN}-bnx2x += "${PN}-whence-license" |
1131 | 1563 | ||
@@ -1142,7 +1574,7 @@ RDEPENDS:${PN}-cirrus += "${PN}-cirrus-license" | |||
1142 | LICENSE:${PN}-cnm = "Firmware-cnm" | 1574 | LICENSE:${PN}-cnm = "Firmware-cnm" |
1143 | LICENSE:${PN}-cnm-license = "Firmware-cnm" | 1575 | LICENSE:${PN}-cnm-license = "Firmware-cnm" |
1144 | 1576 | ||
1145 | FILES:${PN}-cnm = "${nonarch_base_libdir}/firmware/cnm/wave521c_k3_codec_fw.bin" | 1577 | FILES:${PN}-cnm = "${nonarch_base_libdir}/firmware/cnm/wave521c_k3_codec_fw.bin*" |
1146 | FILES:${PN}-cnm-license = "${nonarch_base_libdir}/firmware/LICENCE.cnm" | 1578 | FILES:${PN}-cnm-license = "${nonarch_base_libdir}/firmware/LICENCE.cnm" |
1147 | 1579 | ||
1148 | RDEPENDS:${PN}-cnm += "${PN}-cnm-license" | 1580 | RDEPENDS:${PN}-cnm += "${PN}-cnm-license" |
@@ -1152,13 +1584,13 @@ LICENSE:${PN}-imx-sdma-imx6q = "Firmware-imx-sdma_firmware" | |||
1152 | LICENSE:${PN}-imx-sdma-imx7d = "Firmware-imx-sdma_firmware" | 1584 | LICENSE:${PN}-imx-sdma-imx7d = "Firmware-imx-sdma_firmware" |
1153 | LICENSE:${PN}-imx-sdma-license = "Firmware-imx-sdma_firmware" | 1585 | LICENSE:${PN}-imx-sdma-license = "Firmware-imx-sdma_firmware" |
1154 | 1586 | ||
1155 | FILES:${PN}-imx-sdma-imx6q = "${nonarch_base_libdir}/firmware/imx/sdma/sdma-imx6q.bin" | 1587 | FILES:${PN}-imx-sdma-imx6q = "${nonarch_base_libdir}/firmware/imx/sdma/sdma-imx6q.bin*" |
1156 | 1588 | ||
1157 | RPROVIDES:${PN}-imx-sdma-imx6q = "firmware-imx-sdma-imx6q" | 1589 | RPROVIDES:${PN}-imx-sdma-imx6q = "firmware-imx-sdma-imx6q" |
1158 | RREPLACES:${PN}-imx-sdma-imx6q = "firmware-imx-sdma-imx6q" | 1590 | RREPLACES:${PN}-imx-sdma-imx6q = "firmware-imx-sdma-imx6q" |
1159 | RCONFLICTS:${PN}-imx-sdma-imx6q = "firmware-imx-sdma-imx6q" | 1591 | RCONFLICTS:${PN}-imx-sdma-imx6q = "firmware-imx-sdma-imx6q" |
1160 | 1592 | ||
1161 | FILES:${PN}-imx-sdma-imx7d = "${nonarch_base_libdir}/firmware/imx/sdma/sdma-imx7d.bin" | 1593 | FILES:${PN}-imx-sdma-imx7d = "${nonarch_base_libdir}/firmware/imx/sdma/sdma-imx7d.bin*" |
1162 | 1594 | ||
1163 | FILES:${PN}-imx-sdma-license = "${nonarch_base_libdir}/firmware/LICENSE.sdma_firmware" | 1595 | FILES:${PN}-imx-sdma-license = "${nonarch_base_libdir}/firmware/LICENSE.sdma_firmware" |
1164 | 1596 | ||
@@ -1193,34 +1625,33 @@ LICENSE:${PN}-iwlwifi-9260 = "Firmware-iwlwifi_firmware" | |||
1193 | LICENSE:${PN}-iwlwifi-misc = "Firmware-iwlwifi_firmware" | 1625 | LICENSE:${PN}-iwlwifi-misc = "Firmware-iwlwifi_firmware" |
1194 | LICENSE:${PN}-iwlwifi-license = "Firmware-iwlwifi_firmware" | 1626 | LICENSE:${PN}-iwlwifi-license = "Firmware-iwlwifi_firmware" |
1195 | 1627 | ||
1196 | |||
1197 | FILES:${PN}-iwlwifi-license = "${nonarch_base_libdir}/firmware/LICENCE.iwlwifi_firmware" | 1628 | FILES:${PN}-iwlwifi-license = "${nonarch_base_libdir}/firmware/LICENCE.iwlwifi_firmware" |
1198 | FILES:${PN}-iwlwifi-135-6 = "${nonarch_base_libdir}/firmware/iwlwifi-135-6.ucode" | 1629 | FILES:${PN}-iwlwifi-135-6 = "${nonarch_base_libdir}/firmware/iwlwifi-135-6.ucode*" |
1199 | FILES:${PN}-iwlwifi-3160-7 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-7.ucode" | 1630 | FILES:${PN}-iwlwifi-3160-7 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-7.ucode*" |
1200 | FILES:${PN}-iwlwifi-3160-8 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-8.ucode" | 1631 | FILES:${PN}-iwlwifi-3160-8 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-8.ucode*" |
1201 | FILES:${PN}-iwlwifi-3160-9 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-9.ucode" | 1632 | FILES:${PN}-iwlwifi-3160-9 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-9.ucode*" |
1202 | FILES:${PN}-iwlwifi-3160-10 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-10.ucode" | 1633 | FILES:${PN}-iwlwifi-3160-10 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-10.ucode*" |
1203 | FILES:${PN}-iwlwifi-3160-12 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-12.ucode" | 1634 | FILES:${PN}-iwlwifi-3160-12 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-12.ucode*" |
1204 | FILES:${PN}-iwlwifi-3160-13 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-13.ucode" | 1635 | FILES:${PN}-iwlwifi-3160-13 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-13.ucode*" |
1205 | FILES:${PN}-iwlwifi-3160-16 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-16.ucode" | 1636 | FILES:${PN}-iwlwifi-3160-16 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-16.ucode*" |
1206 | FILES:${PN}-iwlwifi-3160-17 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-17.ucode" | 1637 | FILES:${PN}-iwlwifi-3160-17 = "${nonarch_base_libdir}/firmware/iwlwifi-3160-17.ucode*" |
1207 | FILES:${PN}-iwlwifi-6000-4 = "${nonarch_base_libdir}/firmware/iwlwifi-6000-4.ucode" | 1638 | FILES:${PN}-iwlwifi-6000-4 = "${nonarch_base_libdir}/firmware/iwlwifi-6000-4.ucode*" |
1208 | FILES:${PN}-iwlwifi-6000g2a-5 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2a-5.ucode" | 1639 | FILES:${PN}-iwlwifi-6000g2a-5 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2a-5.ucode*" |
1209 | FILES:${PN}-iwlwifi-6000g2a-6 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2a-6.ucode" | 1640 | FILES:${PN}-iwlwifi-6000g2a-6 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2a-6.ucode*" |
1210 | FILES:${PN}-iwlwifi-6000g2b-5 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2b-5.ucode" | 1641 | FILES:${PN}-iwlwifi-6000g2b-5 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2b-5.ucode*" |
1211 | FILES:${PN}-iwlwifi-6000g2b-6 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2b-6.ucode" | 1642 | FILES:${PN}-iwlwifi-6000g2b-6 = "${nonarch_base_libdir}/firmware/iwlwifi-6000g2b-6.ucode*" |
1212 | FILES:${PN}-iwlwifi-6050-4 = "${nonarch_base_libdir}/firmware/iwlwifi-6050-4.ucode" | 1643 | FILES:${PN}-iwlwifi-6050-4 = "${nonarch_base_libdir}/firmware/iwlwifi-6050-4.ucode*" |
1213 | FILES:${PN}-iwlwifi-6050-5 = "${nonarch_base_libdir}/firmware/iwlwifi-6050-5.ucode" | 1644 | FILES:${PN}-iwlwifi-6050-5 = "${nonarch_base_libdir}/firmware/iwlwifi-6050-5.ucode*" |
1214 | FILES:${PN}-iwlwifi-7260 = "${nonarch_base_libdir}/firmware/iwlwifi-7260-*.ucode" | 1645 | FILES:${PN}-iwlwifi-7260 = "${nonarch_base_libdir}/firmware/iwlwifi-7260-*.ucode*" |
1215 | FILES:${PN}-iwlwifi-7265 = "${nonarch_base_libdir}/firmware/iwlwifi-7265-*.ucode" | 1646 | FILES:${PN}-iwlwifi-7265 = "${nonarch_base_libdir}/firmware/iwlwifi-7265-*.ucode*" |
1216 | FILES:${PN}-iwlwifi-7265d = "${nonarch_base_libdir}/firmware/iwlwifi-7265D-*.ucode" | 1647 | FILES:${PN}-iwlwifi-7265d = "${nonarch_base_libdir}/firmware/iwlwifi-7265D-*.ucode*" |
1217 | FILES:${PN}-iwlwifi-8000c = "${nonarch_base_libdir}/firmware/iwlwifi-8000C-*.ucode" | 1648 | FILES:${PN}-iwlwifi-8000c = "${nonarch_base_libdir}/firmware/iwlwifi-8000C-*.ucode*" |
1218 | FILES:${PN}-iwlwifi-8265 = "${nonarch_base_libdir}/firmware/iwlwifi-8265-*.ucode" | 1649 | FILES:${PN}-iwlwifi-8265 = "${nonarch_base_libdir}/firmware/iwlwifi-8265-*.ucode*" |
1219 | FILES:${PN}-iwlwifi-9000 = "${nonarch_base_libdir}/firmware/iwlwifi-9000-*.ucode" | 1650 | FILES:${PN}-iwlwifi-9000 = "${nonarch_base_libdir}/firmware/iwlwifi-9000-*.ucode*" |
1220 | FILES:${PN}-iwlwifi-9260 = "${nonarch_base_libdir}/firmware/iwlwifi-9260-*.ucode" | 1651 | FILES:${PN}-iwlwifi-9260 = "${nonarch_base_libdir}/firmware/iwlwifi-9260-*.ucode*" |
1221 | FILES:${PN}-iwlwifi-misc = " \ | 1652 | FILES:${PN}-iwlwifi-misc = " \ |
1222 | ${nonarch_base_libdir}/firmware/iwlwifi-*.ucode \ | 1653 | ${nonarch_base_libdir}/firmware/iwlwifi-*.ucode* \ |
1223 | ${nonarch_base_libdir}/firmware/iwlwifi-*.pnvm \ | 1654 | ${nonarch_base_libdir}/firmware/iwlwifi-*.pnvm* \ |
1224 | " | 1655 | " |
1225 | 1656 | ||
1226 | RDEPENDS:${PN}-iwlwifi-135-6 = "${PN}-iwlwifi-license" | 1657 | RDEPENDS:${PN}-iwlwifi-135-6 = "${PN}-iwlwifi-license" |
@@ -1272,16 +1703,18 @@ LICENSE:${PN}-ibt-hw-37-8 = "Firmware-ibt_firmware" | |||
1272 | LICENSE:${PN}-ibt-11-5 = "Firmware-ibt_firmware" | 1703 | LICENSE:${PN}-ibt-11-5 = "Firmware-ibt_firmware" |
1273 | LICENSE:${PN}-ibt-12-16 = "Firmware-ibt_firmware" | 1704 | LICENSE:${PN}-ibt-12-16 = "Firmware-ibt_firmware" |
1274 | LICENSE:${PN}-ibt-17 = "Firmware-ibt_firmware" | 1705 | LICENSE:${PN}-ibt-17 = "Firmware-ibt_firmware" |
1706 | LICENSE:${PN}-ibt-18 = "Firmware-ibt_firmware" | ||
1275 | LICENSE:${PN}-ibt-20 = "Firmware-ibt_firmware" | 1707 | LICENSE:${PN}-ibt-20 = "Firmware-ibt_firmware" |
1276 | LICENSE:${PN}-ibt-misc = "Firmware-ibt_firmware" | 1708 | LICENSE:${PN}-ibt-misc = "Firmware-ibt_firmware" |
1277 | 1709 | ||
1278 | FILES:${PN}-ibt-license = "${nonarch_base_libdir}/firmware/LICENCE.ibt_firmware" | 1710 | FILES:${PN}-ibt-license = "${nonarch_base_libdir}/firmware/LICENCE.ibt_firmware" |
1279 | FILES:${PN}-ibt-hw-37-7 = "${nonarch_base_libdir}/firmware/intel/ibt-hw-37.7*.bseq" | 1711 | FILES:${PN}-ibt-hw-37-7 = "${nonarch_base_libdir}/firmware/intel/ibt-hw-37.7*.bseq*" |
1280 | FILES:${PN}-ibt-hw-37-8 = "${nonarch_base_libdir}/firmware/intel/ibt-hw-37.8*.bseq" | 1712 | FILES:${PN}-ibt-hw-37-8 = "${nonarch_base_libdir}/firmware/intel/ibt-hw-37.8*.bseq*" |
1281 | FILES:${PN}-ibt-11-5 = "${nonarch_base_libdir}/firmware/intel/ibt-11-5.sfi ${nonarch_base_libdir}/firmware/intel/ibt-11-5.ddc" | 1713 | FILES:${PN}-ibt-11-5 = "${nonarch_base_libdir}/firmware/intel/ibt-11-5.sfi* ${nonarch_base_libdir}/firmware/intel/ibt-11-5.ddc*" |
1282 | FILES:${PN}-ibt-12-16 = "${nonarch_base_libdir}/firmware/intel/ibt-12-16.sfi ${nonarch_base_libdir}/firmware/intel/ibt-12-16.ddc" | 1714 | FILES:${PN}-ibt-12-16 = "${nonarch_base_libdir}/firmware/intel/ibt-12-16.sfi* ${nonarch_base_libdir}/firmware/intel/ibt-12-16.ddc*" |
1283 | FILES:${PN}-ibt-17 = "${nonarch_base_libdir}/firmware/intel/ibt-17-*.sfi ${nonarch_base_libdir}/firmware/intel/ibt-17-*.ddc" | 1715 | FILES:${PN}-ibt-17 = "${nonarch_base_libdir}/firmware/intel/ibt-17-*.sfi* ${nonarch_base_libdir}/firmware/intel/ibt-17-*.ddc*" |
1284 | FILES:${PN}-ibt-20 = "${nonarch_base_libdir}/firmware/intel/ibt-20-*.sfi ${nonarch_base_libdir}/firmware/intel/ibt-20-*.ddc" | 1716 | FILES:${PN}-ibt-18 = "${nonarch_base_libdir}/firmware/intel/ibt-18-*.sfi* ${nonarch_base_libdir}/firmware/intel/ibt-18-*.ddc*" |
1717 | FILES:${PN}-ibt-20 = "${nonarch_base_libdir}/firmware/intel/ibt-20-*.sfi* ${nonarch_base_libdir}/firmware/intel/ibt-20-*.ddc*" | ||
1285 | FILES:${PN}-ibt-misc = "${nonarch_base_libdir}/firmware/intel/ibt-*" | 1718 | FILES:${PN}-ibt-misc = "${nonarch_base_libdir}/firmware/intel/ibt-*" |
1286 | 1719 | ||
1287 | RDEPENDS:${PN}-ibt-hw-37-7 = "${PN}-ibt-license" | 1720 | RDEPENDS:${PN}-ibt-hw-37-7 = "${PN}-ibt-license" |
@@ -1289,10 +1722,11 @@ RDEPENDS:${PN}-ibt-hw-37.8 = "${PN}-ibt-license" | |||
1289 | RDEPENDS:${PN}-ibt-11-5 = "${PN}-ibt-license" | 1722 | RDEPENDS:${PN}-ibt-11-5 = "${PN}-ibt-license" |
1290 | RDEPENDS:${PN}-ibt-12-16 = "${PN}-ibt-license" | 1723 | RDEPENDS:${PN}-ibt-12-16 = "${PN}-ibt-license" |
1291 | RDEPENDS:${PN}-ibt-17 = "${PN}-ibt-license" | 1724 | RDEPENDS:${PN}-ibt-17 = "${PN}-ibt-license" |
1725 | RDEPENDS:${PN}-ibt-18 = "${PN}-ibt-license" | ||
1292 | RDEPENDS:${PN}-ibt-20 = "${PN}-ibt-license" | 1726 | RDEPENDS:${PN}-ibt-20 = "${PN}-ibt-license" |
1293 | RDEPENDS:${PN}-ibt-misc = "${PN}-ibt-license" | 1727 | RDEPENDS:${PN}-ibt-misc = "${PN}-ibt-license" |
1294 | 1728 | ||
1295 | ALLOW_EMPTY:${PN}-ibt= "1" | 1729 | ALLOW_EMPTY:${PN}-ibt = "1" |
1296 | ALLOW_EMPTY:${PN}-ibt-misc = "1" | 1730 | ALLOW_EMPTY:${PN}-ibt-misc = "1" |
1297 | 1731 | ||
1298 | LICENSE:${PN}-i915 = "Firmware-i915" | 1732 | LICENSE:${PN}-i915 = "Firmware-i915" |
@@ -1326,37 +1760,48 @@ RDEPENDS:${PN}-ice = "${PN}-ice-license" | |||
1326 | FILES:${PN}-adsp-sst-license = "${nonarch_base_libdir}/firmware/LICENCE.adsp_sst" | 1760 | FILES:${PN}-adsp-sst-license = "${nonarch_base_libdir}/firmware/LICENCE.adsp_sst" |
1327 | LICENSE:${PN}-adsp-sst = "Firmware-adsp_sst" | 1761 | LICENSE:${PN}-adsp-sst = "Firmware-adsp_sst" |
1328 | LICENSE:${PN}-adsp-sst-license = "Firmware-adsp_sst" | 1762 | LICENSE:${PN}-adsp-sst-license = "Firmware-adsp_sst" |
1329 | FILES:${PN}-adsp-sst = "${nonarch_base_libdir}/firmware/intel/dsp_fw*" | 1763 | FILES:${PN}-adsp-sst = "\ |
1764 | ${nonarch_base_libdir}/firmware/intel/dsp_fw* \ | ||
1765 | ${nonarch_base_libdir}/firmware/intel/avs/*/dsp_basefw.bin \ | ||
1766 | " | ||
1330 | RDEPENDS:${PN}-adsp-sst = "${PN}-adsp-sst-license" | 1767 | RDEPENDS:${PN}-adsp-sst = "${PN}-adsp-sst-license" |
1331 | 1768 | ||
1332 | # For QAT | 1769 | # For QAT |
1333 | LICENSE:${PN}-qat = "Firmware-qat" | 1770 | LICENSE:${PN}-qat = "Firmware-qat" |
1334 | LICENSE:${PN}-qat-license = "Firmware-qat" | 1771 | LICENSE:${PN}-qat-license = "Firmware-qat" |
1335 | FILES:${PN}-qat-license = "${nonarch_base_libdir}/firmware/LICENCE.qat_firmware" | 1772 | FILES:${PN}-qat-license = "${nonarch_base_libdir}/firmware/LICENCE.qat_firmware" |
1336 | FILES:${PN}-qat = "${nonarch_base_libdir}/firmware/qat*.bin" | 1773 | FILES:${PN}-qat = "${nonarch_base_libdir}/firmware/qat*.bin*" |
1337 | RDEPENDS:${PN}-qat = "${PN}-qat-license" | 1774 | RDEPENDS:${PN}-qat = "${PN}-qat-license" |
1338 | 1775 | ||
1339 | LICENSE:${PN}-qed = "WHENCE" | 1776 | LICENSE:${PN}-qed = "WHENCE" |
1340 | FILES:${PN}-qed = "${nonarch_base_libdir}/firmware/qed/*" | 1777 | FILES:${PN}-qed = "${nonarch_base_libdir}/firmware/qed/*" |
1341 | 1778 | ||
1779 | LICENSE:${PN}-linaro-license = "Firmware-linaro" | ||
1780 | FILES:${PN}-linaro-license = "${nonarch_base_libdir}/firmware/LICENCE.linaro" | ||
1781 | |||
1342 | # For QCOM VPU/GPU and SDM845 | 1782 | # For QCOM VPU/GPU and SDM845 |
1343 | LICENSE:${PN}-qcom-license = "Firmware-qcom" | 1783 | LICENSE:${PN}-qcom-license = "Firmware-qcom" |
1784 | LICENSE:${PN}-qcom-2-license = "Firmware-qcom-2" | ||
1344 | LICENSE:${PN}-qcom-yamato-license = "Firmware-qcom-yamato" | 1785 | LICENSE:${PN}-qcom-yamato-license = "Firmware-qcom-yamato" |
1786 | LICENSE:${PN}-qcom-aic100 = "Firmware-qcom" | ||
1787 | LICENSE:${PN}-qcom-qdu100 = "Firmware-qcom" | ||
1345 | LICENSE:${PN}-qcom-venus-1.8 = "Firmware-qcom" | 1788 | LICENSE:${PN}-qcom-venus-1.8 = "Firmware-qcom" |
1346 | LICENSE:${PN}-qcom-venus-4.2 = "Firmware-qcom" | 1789 | LICENSE:${PN}-qcom-venus-4.2 = "Firmware-qcom" |
1347 | LICENSE:${PN}-qcom-venus-5.2 = "Firmware-qcom" | 1790 | LICENSE:${PN}-qcom-venus-5.2 = "Firmware-qcom" |
1348 | LICENSE:${PN}-qcom-venus-5.4 = "Firmware-qcom" | 1791 | LICENSE:${PN}-qcom-venus-5.4 = "Firmware-qcom" |
1349 | LICENSE:${PN}-qcom-venus-6.0 = "Firmware-qcom" | 1792 | LICENSE:${PN}-qcom-venus-6.0 = "Firmware-qcom" |
1350 | LICENSE:${PN}-qcom-vpu-1.0 = "Firmware-qcom" | 1793 | LICENSE:${PN}-qcom-vpu = "Firmware-qcom" |
1351 | LICENSE:${PN}-qcom-vpu-2.0 = "Firmware-qcom" | ||
1352 | LICENSE:${PN}-qcom-adreno-a2xx = "Firmware-qcom Firmware-qcom-yamato" | 1794 | LICENSE:${PN}-qcom-adreno-a2xx = "Firmware-qcom Firmware-qcom-yamato" |
1353 | LICENSE:${PN}-qcom-adreno-a3xx = "Firmware-qcom" | 1795 | LICENSE:${PN}-qcom-adreno-a3xx = "Firmware-qcom" |
1354 | LICENSE:${PN}-qcom-adreno-a4xx = "Firmware-qcom" | 1796 | LICENSE:${PN}-qcom-adreno-a4xx = "Firmware-qcom" |
1355 | LICENSE:${PN}-qcom-adreno-a530 = "Firmware-qcom" | 1797 | LICENSE:${PN}-qcom-adreno-a530 = "Firmware-qcom" |
1798 | LICENSE:${PN}-qcom-adreno-a623 = "Firmware-qcom" | ||
1356 | LICENSE:${PN}-qcom-adreno-a630 = "Firmware-qcom" | 1799 | LICENSE:${PN}-qcom-adreno-a630 = "Firmware-qcom" |
1357 | LICENSE:${PN}-qcom-adreno-a650 = "Firmware-qcom" | 1800 | LICENSE:${PN}-qcom-adreno-a650 = "Firmware-qcom" |
1358 | LICENSE:${PN}-qcom-adreno-a660 = "Firmware-qcom" | 1801 | LICENSE:${PN}-qcom-adreno-a660 = "Firmware-qcom" |
1802 | LICENSE:${PN}-qcom-adreno-a663 = "Firmware-qcom" | ||
1359 | LICENSE:${PN}-qcom-adreno-a702 = "Firmware-qcom" | 1803 | LICENSE:${PN}-qcom-adreno-a702 = "Firmware-qcom" |
1804 | LICENSE:${PN}-qcom-adreno-g750 = "Firmware-qcom" | ||
1360 | LICENSE:${PN}-qcom-apq8016-modem = "Firmware-qcom" | 1805 | LICENSE:${PN}-qcom-apq8016-modem = "Firmware-qcom" |
1361 | LICENSE:${PN}-qcom-apq8016-wifi = "Firmware-qcom" | 1806 | LICENSE:${PN}-qcom-apq8016-wifi = "Firmware-qcom" |
1362 | LICENSE:${PN}-qcom-apq8096-audio = "Firmware-qcom" | 1807 | LICENSE:${PN}-qcom-apq8096-audio = "Firmware-qcom" |
@@ -1366,11 +1811,26 @@ LICENSE:${PN}-qcom-qcm2290-adreno = "Firmware-qcom" | |||
1366 | LICENSE:${PN}-qcom-qcm2290-audio = "Firmware-qcom" | 1811 | LICENSE:${PN}-qcom-qcm2290-audio = "Firmware-qcom" |
1367 | LICENSE:${PN}-qcom-qcm2290-modem = "Firmware-qcom" | 1812 | LICENSE:${PN}-qcom-qcm2290-modem = "Firmware-qcom" |
1368 | LICENSE:${PN}-qcom-qcm2290-wifi = "Firmware-qcom" | 1813 | LICENSE:${PN}-qcom-qcm2290-wifi = "Firmware-qcom" |
1814 | LICENSE:${PN}-qcom-qcm6490-adreno = "Firmware-qcom" | ||
1815 | LICENSE:${PN}-qcom-qcm6490-audio = "Firmware-qcom" | ||
1816 | LICENSE:${PN}-qcom-qcm6490-compute = "Firmware-qcom" | ||
1817 | LICENSE:${PN}-qcom-qcm6490-ipa = "Firmware-qcom" | ||
1818 | LICENSE:${PN}-qcom-qcm6490-wifi = "Firmware-qcom" | ||
1819 | LICENSE:${PN}-qcom-qcs615-adreno = "Firmware-qcom" | ||
1820 | LICENSE:${PN}-qcom-qcs8300-adreno = "Firmware-qcom" | ||
1821 | LICENSE:${PN}-qcom-qcs8300-audio = "Firmware-qcom-2" | ||
1822 | LICENSE:${PN}-qcom-qcs8300-compute = "Firmware-qcom-2" | ||
1823 | LICENSE:${PN}-qcom-qcs8300-generalpurpose = "Firmware-qcom-2" | ||
1369 | LICENSE:${PN}-qcom-qrb4210-adreno = "Firmware-qcom" | 1824 | LICENSE:${PN}-qcom-qrb4210-adreno = "Firmware-qcom" |
1370 | LICENSE:${PN}-qcom-qrb4210-audio = "Firmware-qcom" | 1825 | LICENSE:${PN}-qcom-qrb4210-audio = "Firmware-qcom" |
1371 | LICENSE:${PN}-qcom-qrb4210-compute = "Firmware-qcom" | 1826 | LICENSE:${PN}-qcom-qrb4210-compute = "Firmware-qcom" |
1372 | LICENSE:${PN}-qcom-qrb4210-modem = "Firmware-qcom" | 1827 | LICENSE:${PN}-qcom-qrb4210-modem = "Firmware-qcom" |
1373 | LICENSE:${PN}-qcom-qrb4210-wifi = "Firmware-qcom" | 1828 | LICENSE:${PN}-qcom-qrb4210-wifi = "Firmware-qcom" |
1829 | LICENSE:${PN}-qcom-sa8775p-adreno = "Firmware-qcom" | ||
1830 | LICENSE:${PN}-qcom-sa8775p-audio = "Firmware-qcom-2" | ||
1831 | LICENSE:${PN}-qcom-sa8775p-compute = "Firmware-qcom-2" | ||
1832 | LICENSE:${PN}-qcom-sa8775p-generalpurpose = "Firmware-qcom-2" | ||
1833 | LICENSE:${PN}-qcom-sa8775p-qupv3fw = "Firmware-qcom-2" | ||
1374 | LICENSE:${PN}-qcom-sc8280xp-lenovo-x13s-audio = "Firmware-qcom & Firmware-linaro" | 1834 | LICENSE:${PN}-qcom-sc8280xp-lenovo-x13s-audio = "Firmware-qcom & Firmware-linaro" |
1375 | LICENSE:${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "Firmware-qcom" | 1835 | LICENSE:${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "Firmware-qcom" |
1376 | LICENSE:${PN}-qcom-sc8280xp-lenovo-x13s-compute = "Firmware-qcom" | 1836 | LICENSE:${PN}-qcom-sc8280xp-lenovo-x13s-compute = "Firmware-qcom" |
@@ -1384,68 +1844,124 @@ LICENSE:${PN}-qcom-sm8250-audio = "Firmware-qcom" | |||
1384 | LICENSE:${PN}-qcom-sm8250-adreno = "Firmware-qcom" | 1844 | LICENSE:${PN}-qcom-sm8250-adreno = "Firmware-qcom" |
1385 | LICENSE:${PN}-qcom-sm8250-compute = "Firmware-qcom" | 1845 | LICENSE:${PN}-qcom-sm8250-compute = "Firmware-qcom" |
1386 | LICENSE:${PN}-qcom-sm8250-thundercomm-rb5-sensors = "Firmware-qcom" | 1846 | LICENSE:${PN}-qcom-sm8250-thundercomm-rb5-sensors = "Firmware-qcom" |
1847 | LICENSE:${PN}-qcom-sm8550-audio-tplg = "Firmware-linaro" | ||
1848 | LICENSE:${PN}-qcom-sm8650-audio-tplg = "Firmware-linaro" | ||
1849 | LICENSE:${PN}-qcom-x1e80100-adreno = "Firmware-qcom" | ||
1850 | LICENSE:${PN}-qcom-x1e80100-audio = "Firmware-qcom" | ||
1851 | LICENSE:${PN}-qcom-x1e80100-lenovo-t14s-g6-adreno = "Firmware-qcom" | ||
1852 | LICENSE:${PN}-qcom-x1e80100-lenovo-t14s-g6-audio = "Firmware-qcom & Firmware-linaro" | ||
1853 | LICENSE:${PN}-qcom-x1e80100-lenovo-t14s-g6-compute = "Firmware-qcom" | ||
1854 | LICENSE:${PN}-qcom-x1e80100-lenovo-t14s-g6-vpu = "Firmware-qcom" | ||
1855 | LICENSE:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-adreno = "Firmware-qcom" | ||
1856 | LICENSE:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-audio = "Firmware-qcom & Firmware-linaro" | ||
1857 | LICENSE:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-compute = "Firmware-qcom" | ||
1858 | LICENSE:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-vpu = "Firmware-qcom" | ||
1387 | 1859 | ||
1388 | FILES:${PN}-qcom-license = "${nonarch_base_libdir}/firmware/LICENSE.qcom ${nonarch_base_libdir}/firmware/qcom/NOTICE.txt" | 1860 | FILES:${PN}-qcom-license = "${nonarch_base_libdir}/firmware/LICENSE.qcom ${nonarch_base_libdir}/firmware/qcom/NOTICE.txt" |
1861 | FILES:${PN}-qcom-2-license = "${nonarch_base_libdir}/firmware/LICENSE.qcom-2" | ||
1389 | FILES:${PN}-qcom-yamato-license = "${nonarch_base_libdir}/firmware/LICENSE.qcom_yamato" | 1862 | FILES:${PN}-qcom-yamato-license = "${nonarch_base_libdir}/firmware/LICENSE.qcom_yamato" |
1863 | |||
1864 | FILES:${PN}-qcom-aic100 = "${nonarch_base_libdir}/firmware/qcom/aic100/*" | ||
1865 | FILES:${PN}-qcom-qdu100 = "${nonarch_base_libdir}/firmware/qcom/qdu100/*" | ||
1866 | |||
1390 | FILES:${PN}-qcom-venus-1.8 = "${nonarch_base_libdir}/firmware/qcom/venus-1.8/*" | 1867 | FILES:${PN}-qcom-venus-1.8 = "${nonarch_base_libdir}/firmware/qcom/venus-1.8/*" |
1391 | FILES:${PN}-qcom-venus-4.2 = "${nonarch_base_libdir}/firmware/qcom/venus-4.2/*" | 1868 | FILES:${PN}-qcom-venus-4.2 = "${nonarch_base_libdir}/firmware/qcom/venus-4.2/*" |
1392 | FILES:${PN}-qcom-venus-5.2 = "${nonarch_base_libdir}/firmware/qcom/venus-5.2/*" | 1869 | FILES:${PN}-qcom-venus-5.2 = "${nonarch_base_libdir}/firmware/qcom/venus-5.2/*" |
1393 | FILES:${PN}-qcom-venus-5.4 = "${nonarch_base_libdir}/firmware/qcom/venus-5.4/*" | 1870 | FILES:${PN}-qcom-venus-5.4 = "${nonarch_base_libdir}/firmware/qcom/venus-5.4/*" |
1394 | FILES:${PN}-qcom-venus-6.0 = "${nonarch_base_libdir}/firmware/qcom/venus-6.0/*" | 1871 | FILES:${PN}-qcom-venus-6.0 = "${nonarch_base_libdir}/firmware/qcom/venus-6.0/*" |
1395 | FILES:${PN}-qcom-vpu-1.0 = "${nonarch_base_libdir}/firmware/qcom/vpu-1.0/*" | 1872 | FILES:${PN}-qcom-vpu = " \ |
1396 | FILES:${PN}-qcom-vpu-2.0 = "${nonarch_base_libdir}/firmware/qcom/vpu-2.0/*" | 1873 | ${nonarch_base_libdir}/firmware/qcom/vpu/* \ |
1397 | FILES:${PN}-qcom-adreno-a2xx = "${nonarch_base_libdir}/firmware/qcom/leia_*.fw ${nonarch_base_libdir}/firmware/qcom/yamato_*.fw" | 1874 | ${nonarch_base_libdir}/firmware/qcom/vpu-1.0/* \ |
1398 | FILES:${PN}-qcom-adreno-a3xx = "${nonarch_base_libdir}/firmware/qcom/a3*_*.fw ${nonarch_base_libdir}/firmware/a300_*.fw" | 1875 | ${nonarch_base_libdir}/firmware/qcom/vpu-2.0/* \ |
1399 | FILES:${PN}-qcom-adreno-a4xx = "${nonarch_base_libdir}/firmware/qcom/a4*_*.fw" | 1876 | " |
1877 | FILES:${PN}-qcom-adreno-a2xx = "${nonarch_base_libdir}/firmware/qcom/leia_*.fw* ${nonarch_base_libdir}/firmware/qcom/yamato_*.fw* ${nonarch_base_libdir}/firmware/qcom/a2*_*.fw*" | ||
1878 | FILES:${PN}-qcom-adreno-a3xx = "${nonarch_base_libdir}/firmware/qcom/a3*_*.fw* ${nonarch_base_libdir}/firmware/a300_*.fw*" | ||
1879 | FILES:${PN}-qcom-adreno-a4xx = "${nonarch_base_libdir}/firmware/qcom/a4*_*.fw*" | ||
1400 | FILES:${PN}-qcom-adreno-a530 = "${nonarch_base_libdir}/firmware/qcom/a530*.fw*" | 1880 | FILES:${PN}-qcom-adreno-a530 = "${nonarch_base_libdir}/firmware/qcom/a530*.fw*" |
1881 | FILES:${PN}-qcom-adreno-a623 = "${nonarch_base_libdir}/firmware/qcom/a623*.*" | ||
1401 | FILES:${PN}-qcom-adreno-a630 = "${nonarch_base_libdir}/firmware/qcom/a630*.*" | 1882 | FILES:${PN}-qcom-adreno-a630 = "${nonarch_base_libdir}/firmware/qcom/a630*.*" |
1402 | FILES:${PN}-qcom-adreno-a650 = "${nonarch_base_libdir}/firmware/qcom/a650*.*" | 1883 | FILES:${PN}-qcom-adreno-a650 = "${nonarch_base_libdir}/firmware/qcom/a650*.*" |
1403 | FILES:${PN}-qcom-adreno-a660 = "${nonarch_base_libdir}/firmware/qcom/a660*.*" | 1884 | FILES:${PN}-qcom-adreno-a660 = "${nonarch_base_libdir}/firmware/qcom/a660*.*" |
1885 | FILES:${PN}-qcom-adreno-a663 = "${nonarch_base_libdir}/firmware/qcom/a663*.*" | ||
1404 | FILES:${PN}-qcom-adreno-a702 = "${nonarch_base_libdir}/firmware/qcom/a702*.*" | 1886 | FILES:${PN}-qcom-adreno-a702 = "${nonarch_base_libdir}/firmware/qcom/a702*.*" |
1405 | FILES:${PN}-qcom-apq8016-modem = "${nonarch_base_libdir}/firmware/qcom/apq8016/mba.mbn ${nonarch_base_libdir}/firmware/qcom/apq8016/modem.mbn" | 1887 | FILES:${PN}-qcom-adreno-g750 = "${nonarch_base_libdir}/firmware/qcom/gen70500_*.*" |
1406 | FILES:${PN}-qcom-apq8016-wifi = "${nonarch_base_libdir}/firmware/qcom/apq8016/wcnss.mbn ${nonarch_base_libdir}/firmware/qcom/apq8016/WCNSS*" | 1888 | FILES:${PN}-qcom-apq8016-modem = "${nonarch_base_libdir}/firmware/qcom/apq8016/mba.mbn* ${nonarch_base_libdir}/firmware/qcom/apq8016/modem.mbn*" |
1407 | FILES:${PN}-qcom-apq8096-adreno = "${nonarch_base_libdir}/firmware/qcom/apq8096/a530_zap.mbn ${nonarch_base_libdir}/firmware/qcom/a530_zap.mdt" | 1889 | FILES:${PN}-qcom-apq8016-wifi = "${nonarch_base_libdir}/firmware/qcom/apq8016/wcnss.mbn* ${nonarch_base_libdir}/firmware/qcom/apq8016/WCNSS*" |
1890 | FILES:${PN}-qcom-apq8096-adreno = "${nonarch_base_libdir}/firmware/qcom/apq8096/a530_zap.mbn* ${nonarch_base_libdir}/firmware/qcom/a530_zap.mdt*" | ||
1408 | FILES:${PN}-qcom-apq8096-audio = "${nonarch_base_libdir}/firmware/qcom/apq8096/adsp*.*" | 1891 | FILES:${PN}-qcom-apq8096-audio = "${nonarch_base_libdir}/firmware/qcom/apq8096/adsp*.*" |
1409 | FILES:${PN}-qcom-apq8096-modem = "${nonarch_base_libdir}/firmware/qcom/apq8096/mba.mbn ${nonarch_base_libdir}/firmware/qcom/apq8096/modem*.* ${nonarch_base_libdir}/firmware/qcom/apq8096/wlanmdsp.mbn" | 1892 | FILES:${PN}-qcom-apq8096-modem = "${nonarch_base_libdir}/firmware/qcom/apq8096/mba.mbn* ${nonarch_base_libdir}/firmware/qcom/apq8096/modem*.* ${nonarch_base_libdir}/firmware/qcom/apq8096/wlanmdsp.mbn*" |
1410 | FILES:${PN}-qcom-qcm2290-adreno = "${nonarch_base_libdir}/firmware/qcom/qcm2290/a702_zap.mbn" | 1893 | FILES:${PN}-qcom-qcm2290-adreno = "${nonarch_base_libdir}/firmware/qcom/qcm2290/a702_zap.mbn*" |
1411 | FILES:${PN}-qcom-qcm2290-audio = "${nonarch_base_libdir}/firmware/qcom/qcm2290/adsp*.*" | 1894 | FILES:${PN}-qcom-qcm2290-audio = "${nonarch_base_libdir}/firmware/qcom/qcm2290/adsp*.*" |
1412 | FILES:${PN}-qcom-qcm2290-modem = "${nonarch_base_libdir}/firmware/qcom/qcm2290/modem*.*" | 1895 | FILES:${PN}-qcom-qcm2290-modem = "${nonarch_base_libdir}/firmware/qcom/qcm2290/modem*.*" |
1413 | FILES:${PN}-qcom-qcm2290-wifi = "${nonarch_base_libdir}/firmware/qcom/qcm2290/wlanmdsp.mbn" | 1896 | FILES:${PN}-qcom-qcm2290-wifi = "${nonarch_base_libdir}/firmware/qcom/qcm2290/wlanmdsp.mbn* ${nonarch_base_libdir}/firmware/ath10k/WCN3990/hw1.0/qcm2290/*" |
1414 | FILES:${PN}-qcom-qrb4210-adreno = "${nonarch_base_libdir}/firmware/qcom/qrb4210/a610_zap.mbn" | 1897 | FILES:${PN}-qcom-qcm6490-adreno = "${nonarch_base_libdir}/firmware/qcom/qc[ms]6490/a660_zap.mbn*" |
1898 | FILES:${PN}-qcom-qcm6490-audio = "${nonarch_base_libdir}/firmware/qcom/qc[ms]6490/adsp*.* ${nonarch_base_libdir}/firmware/qcom/qc[ms]6490/battmgr.jsn" | ||
1899 | FILES:${PN}-qcom-qcm6490-compute = "${nonarch_base_libdir}/firmware/qcom/qc[ms]6490/cdsp*.*" | ||
1900 | FILES:${PN}-qcom-qcm6490-ipa = "${nonarch_base_libdir}/firmware/qcom/qcm6490/ipa_fws.mbn" | ||
1901 | FILES:${PN}-qcom-qcm6490-wifi = "${nonarch_base_libdir}/firmware/qcom/qc[ms]6490/wpss.mbn*" | ||
1902 | FILES:${PN}-qcom-qcs615-adreno = "${nonarch_base_libdir}/firmware/qcom/qcs615/a612_zap.mbn*" | ||
1903 | FILES:${PN}-qcom-qcs8300-adreno = "${nonarch_base_libdir}/firmware/qcom/qcs8300/a623_zap.mbn*" | ||
1904 | FILES:${PN}-qcom-qcs8300-audio = "${nonarch_base_libdir}/firmware/qcom/qcs8300/adsp*.*" | ||
1905 | FILES:${PN}-qcom-qcs8300-compute = "${nonarch_base_libdir}/firmware/qcom/qcs8300/cdsp*.*" | ||
1906 | FILES:${PN}-qcom-qcs8300-generalpurpose = "${nonarch_base_libdir}/firmware/qcom/qcs8300/gpdsp*.*" | ||
1907 | FILES:${PN}-qcom-qrb4210-adreno = "${nonarch_base_libdir}/firmware/qcom/qrb4210/a610_zap.mbn*" | ||
1415 | FILES:${PN}-qcom-qrb4210-audio = "${nonarch_base_libdir}/firmware/qcom/qrb4210/adsp*.*" | 1908 | FILES:${PN}-qcom-qrb4210-audio = "${nonarch_base_libdir}/firmware/qcom/qrb4210/adsp*.*" |
1416 | FILES:${PN}-qcom-qrb4210-compute = "${nonarch_base_libdir}/firmware/qcom/qrb4210/cdsp*.*" | 1909 | FILES:${PN}-qcom-qrb4210-compute = "${nonarch_base_libdir}/firmware/qcom/qrb4210/cdsp*.*" |
1417 | FILES:${PN}-qcom-qrb4210-modem = "${nonarch_base_libdir}/firmware/qcom/qrb4210/modem*.*" | 1910 | FILES:${PN}-qcom-qrb4210-modem = "${nonarch_base_libdir}/firmware/qcom/qrb4210/modem*.*" |
1418 | FILES:${PN}-qcom-qrb4210-wifi = "${nonarch_base_libdir}/firmware/qcom/qrb4210/wlanmdsp.mbn" | 1911 | FILES:${PN}-qcom-qrb4210-wifi = "${nonarch_base_libdir}/firmware/qcom/qrb4210/wlanmdsp.mbn* ${nonarch_base_libdir}/firmware/ath10k/WCN3990/hw1.0/qrb4210/*" |
1912 | FILES:${PN}-qcom-sa8775p-adreno = "${nonarch_base_libdir}/firmware/qcom/sa8775p/a663_zap.mbn*" | ||
1913 | FILES:${PN}-qcom-sa8775p-audio = "${nonarch_base_libdir}/firmware/qcom/sa8775p/adsp*.*" | ||
1914 | FILES:${PN}-qcom-sa8775p-compute = "${nonarch_base_libdir}/firmware/qcom/sa8775p/cdsp*.*" | ||
1915 | FILES:${PN}-qcom-sa8775p-generalpurpose = "${nonarch_base_libdir}/firmware/qcom/sa8775p/gpdsp*.*" | ||
1916 | FILES:${PN}-qcom-sa8775p-qupv3fw = "${nonarch_base_libdir}/firmware/qcom/sa8775p/qupv3fw.elf*" | ||
1419 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-compat = "${nonarch_base_libdir}/firmware/qcom/LENOVO/21BX" | 1917 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-compat = "${nonarch_base_libdir}/firmware/qcom/LENOVO/21BX" |
1420 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-audio = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/*adsp*.* ${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/battmgr.jsn ${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/audioreach-tplg.bin ${nonarch_base_libdir}/firmware/qcom/sc8280xp/SC8280XP-LENOVO-X13S-tplg.bin" | 1918 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-audio = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/*adsp*.* ${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/battmgr.jsn* ${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/audioreach-tplg.bin* ${nonarch_base_libdir}/firmware/qcom/sc8280xp/SC8280XP-LENOVO-X13S-tplg.bin*" |
1421 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/qcdxkmsuc8280.mbn" | 1919 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/qcdxkmsuc8280.mbn*" |
1422 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-compute = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/*cdsp*.*" | 1920 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-compute = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/*cdsp*.*" |
1423 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-sensors = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/*slpi*.*" | 1921 | FILES:${PN}-qcom-sc8280xp-lenovo-x13s-sensors = "${nonarch_base_libdir}/firmware/qcom/sc8280xp/LENOVO/21BX/*slpi*.*" |
1424 | FILES:${PN}-qcom-sdm845-adreno = "${nonarch_base_libdir}/firmware/qcom/sdm845/a630*.*" | 1922 | FILES:${PN}-qcom-sdm845-adreno = "${nonarch_base_libdir}/firmware/qcom/sdm845/a630*.*" |
1425 | FILES:${PN}-qcom-sdm845-audio = "${nonarch_base_libdir}/firmware/qcom/sdm845/adsp*.*" | 1923 | FILES:${PN}-qcom-sdm845-audio = "${nonarch_base_libdir}/firmware/qcom/sdm845/adsp*.*" |
1426 | FILES:${PN}-qcom-sdm845-compute = "${nonarch_base_libdir}/firmware/qcom/sdm845/cdsp*.*" | 1924 | FILES:${PN}-qcom-sdm845-compute = "${nonarch_base_libdir}/firmware/qcom/sdm845/cdsp*.*" |
1427 | FILES:${PN}-qcom-sdm845-modem = "${nonarch_base_libdir}/firmware/qcom/sdm845/mba.mbn ${nonarch_base_libdir}/firmware/qcom/sdm845/modem*.* ${nonarch_base_libdir}/firmware/qcom/sdm845/wlanmdsp.mbn ${nonarch_base_libdir}/firmware/qcom/sdm845/notice.txt_wlanmdsp" | 1925 | FILES:${PN}-qcom-sdm845-modem = "${nonarch_base_libdir}/firmware/qcom/sdm845/mba.mbn* ${nonarch_base_libdir}/firmware/qcom/sdm845/modem*.* ${nonarch_base_libdir}/firmware/qcom/sdm845/wlanmdsp.mbn* ${nonarch_base_libdir}/firmware/qcom/sdm845/notice.txt_wlanmdsp* \ |
1926 | ${nonarch_base_libdir}/firmware/ath10k/WCN3990/hw1.0/wlanmdsp.mbn* ${nonarch_base_libdir}/firmware/ath10k/WCN3990/hw1.0/notice.txt_wlanmdsp" | ||
1428 | FILES:${PN}-qcom-sdm845-thundercomm-db845c-sensors = "${nonarch_base_libdir}/firmware/qcom/sdm845/Thundercomm/db845c/slpi*.*" | 1927 | FILES:${PN}-qcom-sdm845-thundercomm-db845c-sensors = "${nonarch_base_libdir}/firmware/qcom/sdm845/Thundercomm/db845c/slpi*.*" |
1429 | FILES:${PN}-qcom-sm8250-adreno = "${nonarch_base_libdir}/firmware/qcom/sm8250/a650*.*" | 1928 | FILES:${PN}-qcom-sm8250-adreno = "${nonarch_base_libdir}/firmware/qcom/sm8250/a650*.*" |
1430 | FILES:${PN}-qcom-sm8250-audio = "${nonarch_base_libdir}/firmware/qcom/sm8250/adsp*.*" | 1929 | FILES:${PN}-qcom-sm8250-audio = "${nonarch_base_libdir}/firmware/qcom/sm8250/adsp*.*" |
1431 | FILES:${PN}-qcom-sm8250-compute = "${nonarch_base_libdir}/firmware/qcom/sm8250/cdsp*.*" | 1930 | FILES:${PN}-qcom-sm8250-compute = "${nonarch_base_libdir}/firmware/qcom/sm8250/cdsp*.*" |
1432 | FILES:${PN}-qcom-sm8250-thundercomm-rb5-sensors = "${nonarch_base_libdir}/firmware/qcom/sm8250/Thundercomm/RB5/slpi*.*" | 1931 | FILES:${PN}-qcom-sm8250-thundercomm-rb5-sensors = "${nonarch_base_libdir}/firmware/qcom/sm8250/Thundercomm/RB5/slpi*.*" |
1932 | FILES:${PN}-qcom-sm8550-audio-tplg = "${nonarch_base_libdir}/firmware/qcom/sm8550/*tplg.bin*" | ||
1933 | FILES:${PN}-qcom-sm8650-audio-tplg = "${nonarch_base_libdir}/firmware/qcom/sm8650/*tplg.bin*" | ||
1934 | FILES:${PN}-qcom-x1e80100-adreno = "${nonarch_base_libdir}/firmware/qcom/x1e80100/gen70500_zap.mbn*" | ||
1935 | FILES:${PN}-qcom-x1e80100-audio = "${nonarch_base_libdir}/firmware/qcom/x1e80100/adsp*.* ${nonarch_base_libdir}/firmware/qcom/x1e80100/battmgr.jsn" | ||
1936 | FILES:${PN}-qcom-x1e80100-lenovo-t14s-g6-adreno = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/21N1/qcdxkmsuc8380.mbn*" | ||
1937 | FILES:${PN}-qcom-x1e80100-lenovo-t14s-g6-audio = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/21N1/*adsp*.* ${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/21N1/battmgr.jsn* ${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/21N1/X1E80100-LENOVO-Thinkpad-T14s-tplg.bin* ${nonarch_base_libdir}/firmware/qcom/x1e80100/X1E80100-LENOVO-Thinkpad-T14s-tplg.bin*" | ||
1938 | FILES:${PN}-qcom-x1e80100-lenovo-t14s-g6-compute = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/21N1/*cdsp*.*" | ||
1939 | FILES:${PN}-qcom-x1e80100-lenovo-t14s-g6-vpu = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/21N1/qcvss8380.mbn*" | ||
1940 | FILES:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-adreno = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/qcdxkmsuc8380.mbn*" | ||
1941 | FILES:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-audio = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/*adsp*.* ${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/battmgr.jsn* ${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/X1E80100-LENOVO-Yoga-Slim7x-tplg.bin* ${nonarch_base_libdir}/firmware/qcom/x1e80100/X1E80100-LENOVO-Yoga-Slim7x-tplg.bin*" | ||
1942 | FILES:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-compute = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/*cdsp*.*" | ||
1943 | FILES:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-vpu = "${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/qcvss8380.mbn* ${nonarch_base_libdir}/firmware/qcom/x1e80100/LENOVO/83ED/qcav1e8380.mbn*" | ||
1944 | |||
1945 | RDEPENDS:${PN}-qcom-aic100 = "${PN}-qcom-license" | ||
1946 | RDEPENDS:${PN}-qcom-qdu100 = "${PN}-qcom-license" | ||
1433 | 1947 | ||
1434 | RDEPENDS:${PN}-qcom-venus-1.8 = "${PN}-qcom-license" | 1948 | RDEPENDS:${PN}-qcom-venus-1.8 = "${PN}-qcom-license" |
1435 | RDEPENDS:${PN}-qcom-venus-4.2 = "${PN}-qcom-license" | 1949 | RDEPENDS:${PN}-qcom-venus-4.2 = "${PN}-qcom-license" |
1436 | RDEPENDS:${PN}-qcom-venus-5.2 = "${PN}-qcom-license" | 1950 | RDEPENDS:${PN}-qcom-venus-5.2 = "${PN}-qcom-license" |
1437 | RDEPENDS:${PN}-qcom-venus-5.4 = "${PN}-qcom-license" | 1951 | RDEPENDS:${PN}-qcom-venus-5.4 = "${PN}-qcom-license" |
1438 | RDEPENDS:${PN}-qcom-venus-6.0 = "${PN}-qcom-license" | 1952 | RDEPENDS:${PN}-qcom-venus-6.0 = "${PN}-qcom-license" |
1439 | RDEPENDS:${PN}-qcom-vpu-1.0 = "${PN}-qcom-license" | 1953 | RDEPENDS:${PN}-qcom-vpu = "${PN}-qcom-license" |
1440 | RDEPENDS:${PN}-qcom-vpu-2.0 = "${PN}-qcom-license" | ||
1441 | RDEPENDS:${PN}-qcom-adreno-a2xx = "${PN}-qcom-license ${PN}-qcom-yamato-license" | 1954 | RDEPENDS:${PN}-qcom-adreno-a2xx = "${PN}-qcom-license ${PN}-qcom-yamato-license" |
1442 | RDEPENDS:${PN}-qcom-adreno-a3xx = "${PN}-qcom-license" | 1955 | RDEPENDS:${PN}-qcom-adreno-a3xx = "${PN}-qcom-license" |
1443 | RDEPENDS:${PN}-qcom-adreno-a4xx = "${PN}-qcom-license" | 1956 | RDEPENDS:${PN}-qcom-adreno-a4xx = "${PN}-qcom-license" |
1444 | RDEPENDS:${PN}-qcom-adreno-a530 = "${PN}-qcom-license" | 1957 | RDEPENDS:${PN}-qcom-adreno-a530 = "${PN}-qcom-license" |
1958 | RDEPENDS:${PN}-qcom-adreno-a623 = "${PN}-qcom-license" | ||
1445 | RDEPENDS:${PN}-qcom-adreno-a630 = "${PN}-qcom-license" | 1959 | RDEPENDS:${PN}-qcom-adreno-a630 = "${PN}-qcom-license" |
1446 | RDEPENDS:${PN}-qcom-adreno-a650 = "${PN}-qcom-license" | 1960 | RDEPENDS:${PN}-qcom-adreno-a650 = "${PN}-qcom-license" |
1447 | RDEPENDS:${PN}-qcom-adreno-a660 = "${PN}-qcom-license" | 1961 | RDEPENDS:${PN}-qcom-adreno-a660 = "${PN}-qcom-license" |
1962 | RDEPENDS:${PN}-qcom-adreno-a663 = "${PN}-qcom-license ${PN}-qcom-adreno-a660" | ||
1448 | RDEPENDS:${PN}-qcom-adreno-a702 = "${PN}-qcom-license" | 1963 | RDEPENDS:${PN}-qcom-adreno-a702 = "${PN}-qcom-license" |
1964 | RDEPENDS:${PN}-qcom-adreno-g750 = "${PN}-qcom-license" | ||
1449 | RDEPENDS:${PN}-qcom-apq8016-modem = "${PN}-qcom-license" | 1965 | RDEPENDS:${PN}-qcom-apq8016-modem = "${PN}-qcom-license" |
1450 | RDEPENDS:${PN}-qcom-apq8016-wifi = "${PN}-qcom-license" | 1966 | RDEPENDS:${PN}-qcom-apq8016-wifi = "${PN}-qcom-license" |
1451 | RDEPENDS:${PN}-qcom-apq8096-adreno = "${PN}-qcom-license" | 1967 | RDEPENDS:${PN}-qcom-apq8096-adreno = "${PN}-qcom-license" |
@@ -1455,12 +1971,33 @@ RDEPENDS:${PN}-qcom-qcm2290-adreno = "${PN}-qcom-license" | |||
1455 | RDEPENDS:${PN}-qcom-qcm2290-audio = "${PN}-qcom-license" | 1971 | RDEPENDS:${PN}-qcom-qcm2290-audio = "${PN}-qcom-license" |
1456 | RDEPENDS:${PN}-qcom-qcm2290-modem = "${PN}-qcom-license" | 1972 | RDEPENDS:${PN}-qcom-qcm2290-modem = "${PN}-qcom-license" |
1457 | RDEPENDS:${PN}-qcom-qcm2290-wifi = "${PN}-qcom-license" | 1973 | RDEPENDS:${PN}-qcom-qcm2290-wifi = "${PN}-qcom-license" |
1974 | RDEPENDS:${PN}-qcom-qcm6490-adreno = "${PN}-qcom-license" | ||
1975 | RPROVIDES:${PN}-qcom-qcm6490-adreno = "${PN}-qcom-qcs6490-adreno" | ||
1976 | RDEPENDS:${PN}-qcom-qcm6490-audio = "${PN}-qcom-license" | ||
1977 | RPROVIDES:${PN}-qcom-qcm6490-audio = "${PN}-qcom-qcs6490-audio" | ||
1978 | RDEPENDS:${PN}-qcom-qcm6490-compute = "${PN}-qcom-license" | ||
1979 | RPROVIDES:${PN}-qcom-qcm6490-compute = "${PN}-qcom-qcs6490-compute" | ||
1980 | RDEPENDS:${PN}-qcom-qcm6490-ipa = "${PN}-qcom-license" | ||
1981 | RDEPENDS:${PN}-qcom-qcm6490-wifi = "${PN}-qcom-license" | ||
1982 | RPROVIDES:${PN}-qcom-qcm6490-wifi = "${PN}-qcom-qcs6490-wifi" | ||
1983 | RDEPENDS:${PN}-qcom-qcs615-adreno = "${PN}-qcom-license" | ||
1984 | RDEPENDS:${PN}-qcom-qcs8300-adreno = "${PN}-qcom-license" | ||
1985 | RDEPENDS:${PN}-qcom-qcs8300-audio = "${PN}-qcom-2-license" | ||
1986 | RDEPENDS:${PN}-qcom-qcs8300-compute = "${PN}-qcom-2-license" | ||
1987 | RDEPENDS:${PN}-qcom-qcs8300-generalpurpose = "${PN}-qcom-2-license" | ||
1458 | RDEPENDS:${PN}-qcom-qrb4210-adreno = "${PN}-qcom-license" | 1988 | RDEPENDS:${PN}-qcom-qrb4210-adreno = "${PN}-qcom-license" |
1459 | RDEPENDS:${PN}-qcom-qrb4210-audio = "${PN}-qcom-license" | 1989 | RDEPENDS:${PN}-qcom-qrb4210-audio = "${PN}-qcom-license" |
1460 | RDEPENDS:${PN}-qcom-qrb4210-compute = "${PN}-qcom-license" | 1990 | RDEPENDS:${PN}-qcom-qrb4210-compute = "${PN}-qcom-license" |
1461 | RDEPENDS:${PN}-qcom-qrb4210-modem = "${PN}-qcom-license" | 1991 | RDEPENDS:${PN}-qcom-qrb4210-modem = "${PN}-qcom-license" |
1462 | RDEPENDS:${PN}-qcom-qrb4210-wifi = "${PN}-qcom-license" | 1992 | # Only symlinks in qcom-qrb4210-wifi, firmware is in qcom-qcm2290-wifi |
1463 | RDEPENDS:${PN}-qcom-sc8280xp-lenovo-x13s-audio = "${PN}-qcom-license" | 1993 | # c.f. https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=650e88378e76d5fad3997a5398f1ade47a74d924 |
1994 | RDEPENDS:${PN}-qcom-qrb4210-wifi = "${PN}-qcom-license ${PN}-qcom-qcm2290-wifi" | ||
1995 | RDEPENDS:${PN}-qcom-sa8775p-adreno = "${PN}-qcom-license" | ||
1996 | RDEPENDS:${PN}-qcom-sa8775p-audio = "${PN}-qcom-2-license" | ||
1997 | RDEPENDS:${PN}-qcom-sa8775p-compute = "${PN}-qcom-2-license" | ||
1998 | RDEPENDS:${PN}-qcom-sa8775p-generalpurpose = "${PN}-qcom-2-license" | ||
1999 | RDEPENDS:${PN}-qcom-sa8775p-qupv3fw = "${PN}-qcom-2-license" | ||
2000 | RDEPENDS:${PN}-qcom-sc8280xp-lenovo-x13s-audio = "${PN}-qcom-license ${PN}-linaro-license" | ||
1464 | RDEPENDS:${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "${PN}-qcom-license" | 2001 | RDEPENDS:${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "${PN}-qcom-license" |
1465 | RDEPENDS:${PN}-qcom-sc8280xp-lenovo-x13s-compute = "${PN}-qcom-license" | 2002 | RDEPENDS:${PN}-qcom-sc8280xp-lenovo-x13s-compute = "${PN}-qcom-license" |
1466 | RDEPENDS:${PN}-qcom-sc8280xp-lenovo-x13s-sensors = "${PN}-qcom-license" | 2003 | RDEPENDS:${PN}-qcom-sc8280xp-lenovo-x13s-sensors = "${PN}-qcom-license" |
@@ -1473,6 +2010,17 @@ RDEPENDS:${PN}-qcom-sm8250-adreno = "${PN}-qcom-license" | |||
1473 | RDEPENDS:${PN}-qcom-sm8250-audio = "${PN}-qcom-license" | 2010 | RDEPENDS:${PN}-qcom-sm8250-audio = "${PN}-qcom-license" |
1474 | RDEPENDS:${PN}-qcom-sm8250-compute = "${PN}-qcom-license" | 2011 | RDEPENDS:${PN}-qcom-sm8250-compute = "${PN}-qcom-license" |
1475 | RDEPENDS:${PN}-qcom-sm8250-thundercomm-rb5-sensors = "${PN}-qcom-license" | 2012 | RDEPENDS:${PN}-qcom-sm8250-thundercomm-rb5-sensors = "${PN}-qcom-license" |
2013 | RDEPENDS:${PN}-qcom-sm8550-audio-tplg = "${PN}-linaro-license" | ||
2014 | RDEPENDS:${PN}-qcom-sm8650-audio-tplg = "${PN}-linaro-license" | ||
2015 | RDEPENDS:${PN}-qcom-x1e80100-adreno = "${PN}-qcom-license" | ||
2016 | RDEPENDS:${PN}-qcom-x1e80100-audio = "${PN}-qcom-license" | ||
2017 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-t14s-g6-adreno = "${PN}-qcom-license" | ||
2018 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-t14s-g6-audio = "${PN}-qcom-license ${PN}-linaro-license" | ||
2019 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-t14s-g6-compute = "${PN}-qcom-license" | ||
2020 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-adreno = "${PN}-qcom-license" | ||
2021 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-audio = "${PN}-qcom-license ${PN}-linaro-license" | ||
2022 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-compute = "${PN}-qcom-license" | ||
2023 | RDEPENDS:${PN}-qcom-x1e80100-lenovo-yoga-slim7x-vpu = "${PN}-qcom-license" | ||
1476 | 2024 | ||
1477 | RRECOMMENDS:${PN}-qcom-sc8280xp-lenovo-x13s-audio = "${PN}-qcom-sc8280xp-lenovo-x13s-compat" | 2025 | RRECOMMENDS:${PN}-qcom-sc8280xp-lenovo-x13s-audio = "${PN}-qcom-sc8280xp-lenovo-x13s-compat" |
1478 | RRECOMMENDS:${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "${PN}-qcom-sc8280xp-lenovo-x13s-compat" | 2026 | RRECOMMENDS:${PN}-qcom-sc8280xp-lenovo-x13s-adreno = "${PN}-qcom-sc8280xp-lenovo-x13s-compat" |
@@ -1492,7 +2040,7 @@ RDEPENDS:${PN}-prestera = "${PN}-marvell-license" | |||
1492 | # For Rockchip | 2040 | # For Rockchip |
1493 | LICENSE:${PN}-rockchip-dptx = "Firmware-rockchip" | 2041 | LICENSE:${PN}-rockchip-dptx = "Firmware-rockchip" |
1494 | FILES:${PN}-rockchip-license = "${nonarch_base_libdir}/firmware/LICENCE.rockchip" | 2042 | FILES:${PN}-rockchip-license = "${nonarch_base_libdir}/firmware/LICENCE.rockchip" |
1495 | FILES:${PN}-rockchip-dptx = "${nonarch_base_libdir}/firmware/rockchip/dptx.bin" | 2043 | FILES:${PN}-rockchip-dptx = "${nonarch_base_libdir}/firmware/rockchip/dptx.bin*" |
1496 | RDEPENDS:${PN}-rockchip-dptx = "${PN}-rockchip-license" | 2044 | RDEPENDS:${PN}-rockchip-dptx = "${PN}-rockchip-license" |
1497 | 2045 | ||
1498 | # For Amlogic VDEC | 2046 | # For Amlogic VDEC |
@@ -1561,6 +2109,11 @@ RDEPENDS:${PN} += "${PN}-whence-license" | |||
1561 | # Make linux-firmware depend on all of the split-out packages. | 2109 | # Make linux-firmware depend on all of the split-out packages. |
1562 | # Make linux-firmware-iwlwifi depend on all of the split-out iwlwifi packages. | 2110 | # Make linux-firmware-iwlwifi depend on all of the split-out iwlwifi packages. |
1563 | # Make linux-firmware-ibt depend on all of the split-out ibt packages. | 2111 | # Make linux-firmware-ibt depend on all of the split-out ibt packages. |
2112 | # Make linux-firmware-ath10k depend on all of the split-out ath10k packages. | ||
2113 | # Make linux-firmware-ath11k depend on all of the split-out ath11k packages. | ||
2114 | # Make linux-firmware-ath12k depend on all of the split-out ath12k packages. | ||
2115 | # Make linux-firmware-qca depend on all of the split-out qca packages. | ||
2116 | # Make linux-firmware-amdgpu depend on all of the split-out amdgpu packages. | ||
1564 | python populate_packages:prepend () { | 2117 | python populate_packages:prepend () { |
1565 | firmware_pkgs = oe.utils.packages_filter_out_system(d) | 2118 | firmware_pkgs = oe.utils.packages_filter_out_system(d) |
1566 | d.appendVar('RRECOMMENDS:linux-firmware', ' ' + ' '.join(firmware_pkgs)) | 2119 | d.appendVar('RRECOMMENDS:linux-firmware', ' ' + ' '.join(firmware_pkgs)) |
@@ -1570,6 +2123,21 @@ python populate_packages:prepend () { | |||
1570 | 2123 | ||
1571 | ibt_pkgs = filter(lambda x: x.find('-ibt-') != -1, firmware_pkgs) | 2124 | ibt_pkgs = filter(lambda x: x.find('-ibt-') != -1, firmware_pkgs) |
1572 | d.appendVar('RRECOMMENDS:linux-firmware-ibt', ' ' + ' '.join(ibt_pkgs)) | 2125 | d.appendVar('RRECOMMENDS:linux-firmware-ibt', ' ' + ' '.join(ibt_pkgs)) |
2126 | |||
2127 | ath10k_pkgs = filter(lambda x: x.find('-ath10k-') != -1, firmware_pkgs) | ||
2128 | d.appendVar('RRECOMMENDS:linux-firmware-ath10k', ' ' + ' '.join(ath10k_pkgs)) | ||
2129 | |||
2130 | ath11k_pkgs = filter(lambda x: x.find('-ath11k-') != -1, firmware_pkgs) | ||
2131 | d.appendVar('RRECOMMENDS:linux-firmware-ath11k', ' ' + ' '.join(ath11k_pkgs)) | ||
2132 | |||
2133 | ath12k_pkgs = filter(lambda x: x.find('-ath12k-') != -1, firmware_pkgs) | ||
2134 | d.appendVar('RRECOMMENDS:linux-firmware-ath12k', ' ' + ' '.join(ath12k_pkgs)) | ||
2135 | |||
2136 | qca_pkgs = filter(lambda x: x.find('-qca-') != -1, firmware_pkgs) | ||
2137 | d.appendVar('RRECOMMENDS:linux-firmware-qca', ' ' + ' '.join(qca_pkgs)) | ||
2138 | |||
2139 | amdgpu_pkgs = filter(lambda x: x.find('-amdgpu-') != -1, firmware_pkgs) | ||
2140 | d.appendVar('RRECOMMENDS:linux-firmware-amdgpu', ' ' + ' '.join(amdgpu_pkgs)) | ||
1573 | } | 2141 | } |
1574 | 2142 | ||
1575 | # Firmware files are generally not ran on the CPU, so they can be | 2143 | # Firmware files are generally not ran on the CPU, so they can be |
diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers.inc b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers.inc index 3a8d32e785..1f5c47f453 100644 --- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers.inc +++ b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers.inc | |||
@@ -60,7 +60,7 @@ KORG_ARCHIVE_COMPRESSION ?= "xz" | |||
60 | SRC_URI = "${KERNELORG_MIRROR}/linux/kernel/v${HEADER_FETCH_VER}/linux-${PV}.tar.${KORG_ARCHIVE_COMPRESSION}" | 60 | SRC_URI = "${KERNELORG_MIRROR}/linux/kernel/v${HEADER_FETCH_VER}/linux-${PV}.tar.${KORG_ARCHIVE_COMPRESSION}" |
61 | UPSTREAM_CHECK_URI = "https://www.kernel.org/" | 61 | UPSTREAM_CHECK_URI = "https://www.kernel.org/" |
62 | 62 | ||
63 | S = "${WORKDIR}/linux-${PV}" | 63 | S = "${UNPACKDIR}/linux-${PV}" |
64 | 64 | ||
65 | EXTRA_OEMAKE = " HOSTCC="${BUILD_CC}" HOSTCPP="${BUILD_CPP}"" | 65 | EXTRA_OEMAKE = " HOSTCC="${BUILD_CC}" HOSTCPP="${BUILD_CPP}"" |
66 | 66 | ||
diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-kbuild-install_headers.sh-Strip-_UAPI-from-if-define.patch b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-kbuild-install_headers.sh-Strip-_UAPI-from-if-define.patch deleted file mode 100644 index 54528b6e6a..0000000000 --- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers/0001-kbuild-install_headers.sh-Strip-_UAPI-from-if-define.patch +++ /dev/null | |||
@@ -1,38 +0,0 @@ | |||
1 | From 9ca6c6a510bda90954aa2532711200b89dd1df89 Mon Sep 17 00:00:00 2001 | ||
2 | From: Dave Martin <Dave.Martin@arm.com> | ||
3 | Date: Tue, 11 Dec 2018 19:26:45 +0000 | ||
4 | Subject: [PATCH 1/3] kbuild: install_headers.sh: Strip _UAPI from | ||
5 | #if-defined() guards | ||
6 | |||
7 | install_headers.sh knows how to strip the _UAPI prefix from #ifdef/ | ||
8 | ifndef and #define directives used to guard headers against multiple | ||
9 | or inappropriate inclusion. Currently this does not work for guards | ||
10 | in the "#if defined()" style, which may be needed for non-trivial | ||
11 | cases. | ||
12 | |||
13 | This patch adds similar logic so that the _UAPI prefix is also | ||
14 | stripped from guard directives written using "#if defined()" etc. | ||
15 | |||
16 | This is not completely foolproof, but will work for simple cases of | ||
17 | using #if defined() to guard against inappropriate header inclusion. | ||
18 | |||
19 | Signed-off-by: Dave Martin <Dave.Martin@arm.com> | ||
20 | Signed-off-by: Bruce Ashfield <bruce.ashfield@windriver.com> | ||
21 | |||
22 | Upstream-Status: Submitted [https://www.spinics.net/lists/arm-kernel/msg694800.html] | ||
23 | --- | ||
24 | scripts/headers_install.sh | 1 + | ||
25 | 1 file changed, 1 insertion(+) | ||
26 | |||
27 | Index: linux-5.4/scripts/headers_install.sh | ||
28 | =================================================================== | ||
29 | --- linux-5.4.orig/scripts/headers_install.sh | ||
30 | +++ linux-5.4/scripts/headers_install.sh | ||
31 | @@ -36,6 +36,7 @@ | ||
32 | s/(^|[^a-zA-Z0-9])__packed([^a-zA-Z0-9_]|$)/\1__attribute__((packed))\2/g | ||
33 | s/(^|[[:space:](])(inline|asm|volatile)([[:space:](]|$)/\1__\2__\3/g | ||
34 | s@#(ifndef|define|endif[[:space:]]*/[*])[[:space:]]*_UAPI@#\1 @ | ||
35 | + :1;s/(#(if|elif)(.*[^A-Za-z0-9_])defined\([[:space:]]*)_UAPI/\1/;t1 | ||
36 | ' $INFILE > $TMPFILE || exit 1 | ||
37 | |||
38 | scripts/unifdef -U__KERNEL__ -D__EXPORTED_HEADERS__ $TMPFILE > $OUTFILE | ||
diff --git a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.6.bb b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.12.bb index d68de6ec7e..dd6add38de 100644 --- a/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.6.bb +++ b/meta/recipes-kernel/linux-libc-headers/linux-libc-headers_6.12.bb | |||
@@ -6,12 +6,7 @@ SRC_URI:append:libc-musl = "\ | |||
6 | file://0001-libc-compat.h-musl-_does_-define-IFF_LOWER_UP-DORMAN.patch \ | 6 | file://0001-libc-compat.h-musl-_does_-define-IFF_LOWER_UP-DORMAN.patch \ |
7 | " | 7 | " |
8 | 8 | ||
9 | SRC_URI += "\ | ||
10 | file://0001-kbuild-install_headers.sh-Strip-_UAPI-from-if-define.patch \ | ||
11 | " | ||
12 | |||
13 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | 9 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" |
14 | 10 | ||
15 | SRC_URI[sha256sum] = "d926a06c63dd8ac7df3f86ee1ffc2ce2a3b81a2d168484e76b5b389aba8e56d0" | 11 | SRC_URI[sha256sum] = "b1a2562be56e42afb3f8489d4c2a7ac472ac23098f1ef1c1e40da601f54625eb" |
16 | |||
17 | 12 | ||
diff --git a/meta/recipes-kernel/linux/cve-exclusion.inc b/meta/recipes-kernel/linux/cve-exclusion.inc index 7857633943..80c76433ef 100644 --- a/meta/recipes-kernel/linux/cve-exclusion.inc +++ b/meta/recipes-kernel/linux/cve-exclusion.inc | |||
@@ -32,3 +32,128 @@ CVE_STATUS[CVE-2020-11935] = "not-applicable-config: Issue only affects aufs, wh | |||
32 | CVE_STATUS[CVE-2023-23005] = "disputed: There are no realistic cases \ | 32 | CVE_STATUS[CVE-2023-23005] = "disputed: There are no realistic cases \ |
33 | in which a user can cause the alloc_memory_type error case to be reached. \ | 33 | in which a user can cause the alloc_memory_type error case to be reached. \ |
34 | See: https://bugzilla.suse.com/show_bug.cgi?id=1208844#c2" | 34 | See: https://bugzilla.suse.com/show_bug.cgi?id=1208844#c2" |
35 | |||
36 | # Old CVES taken before using new data from kernel CNA | ||
37 | |||
38 | CVE_STATUS[CVE-2014-8171] = "fixed-version: Fixed from version 3.12rc1" | ||
39 | |||
40 | CVE_STATUS[CVE-2017-1000255] = "fixed-version: Fixed from version 4.14rc5" | ||
41 | |||
42 | CVE_STATUS[CVE-2018-10840] = "fixed-version: Fixed from version 4.18rc1" | ||
43 | |||
44 | CVE_STATUS[CVE-2018-10876] = "fixed-version: Fixed from version 4.18rc4" | ||
45 | |||
46 | CVE_STATUS[CVE-2018-10882] = "fixed-version: Fixed from version 4.18rc4" | ||
47 | |||
48 | CVE_STATUS[CVE-2018-10902] = "fixed-version: Fixed from version 4.18rc6" | ||
49 | |||
50 | CVE_STATUS[CVE-2018-14625] = "fixed-version: Fixed from version 4.20rc6" | ||
51 | |||
52 | CVE_STATUS[CVE-2019-3016] = "fixed-version: Fixed from version 5.6rc1" | ||
53 | |||
54 | CVE_STATUS[CVE-2019-3819] = "fixed-version: Fixed from version 5.0rc6" | ||
55 | |||
56 | CVE_STATUS[CVE-2019-3887] = "fixed-version: Fixed from version 5.1rc4" | ||
57 | |||
58 | CVE_STATUS[CVE-2020-10742] = "fixed-version: Fixed from version 3.16rc1" | ||
59 | |||
60 | CVE_STATUS[CVE-2020-16119] = "fixed-version: Fixed from version 5.15rc2" | ||
61 | |||
62 | CVE_STATUS[CVE-2020-1749] = "fixed-version: Fixed from version 5.5rc1" | ||
63 | |||
64 | CVE_STATUS[CVE-2020-25672] = "fixed-version: Fixed from version 5.12rc7" | ||
65 | |||
66 | CVE_STATUS[CVE-2020-27815] = "fixed-version: Fixed from version 5.11rc1" | ||
67 | |||
68 | CVE_STATUS[CVE-2020-8834] = "fixed-version: Fixed from version 4.18rc1" | ||
69 | |||
70 | CVE_STATUS[CVE-2021-20194] = "fixed-version: Fixed from version 5.10rc1" | ||
71 | |||
72 | CVE_STATUS[CVE-2021-20265] = "fixed-version: Fixed from version 4.5rc3" | ||
73 | |||
74 | CVE_STATUS[CVE-2021-3564] = "fixed-version: Fixed from version 5.13rc5" | ||
75 | |||
76 | CVE_STATUS[CVE-2021-3669] = "fixed-version: Fixed from version 5.15rc1" | ||
77 | |||
78 | CVE_STATUS[CVE-2021-3759] = "fixed-version: Fixed from version 5.15rc1" | ||
79 | |||
80 | CVE_STATUS[CVE-2021-4218] = "fixed-version: Fixed from version 5.8rc1" | ||
81 | |||
82 | CVE_STATUS[CVE-2022-0286] = "fixed-version: Fixed from version 5.14rc2" | ||
83 | |||
84 | CVE_STATUS[CVE-2022-1462] = "fixed-version: Fixed from version 5.19rc7" | ||
85 | |||
86 | CVE_STATUS[CVE-2022-2308] = "fixed-version: Fixed from version 6.0" | ||
87 | |||
88 | CVE_STATUS[CVE-2022-2327] = "fixed-version: Fixed from version 5.12rc1" | ||
89 | |||
90 | CVE_STATUS[CVE-2022-2663] = "fixed-version: Fixed from version 6.0rc5" | ||
91 | |||
92 | CVE_STATUS[CVE-2022-2785] = "fixed-version: Fixed from version 6.0rc1" | ||
93 | |||
94 | CVE_STATUS[CVE-2022-3435] = "fixed-version: Fixed from version 6.1rc1" | ||
95 | |||
96 | CVE_STATUS[CVE-2022-3523] = "fixed-version: Fixed from version 6.1rc1" | ||
97 | |||
98 | CVE_STATUS[CVE-2022-3534] = "fixed-version: Fixed from version 6.2rc1" | ||
99 | |||
100 | CVE_STATUS[CVE-2022-3566] = "fixed-version: Fixed from version 6.1rc1" | ||
101 | |||
102 | CVE_STATUS[CVE-2022-3567] = "fixed-version: Fixed from version 6.1rc1" | ||
103 | |||
104 | CVE_STATUS[CVE-2022-3619] = "fixed-version: Fixed from version 6.1rc4" | ||
105 | |||
106 | CVE_STATUS[CVE-2022-3621] = "fixed-version: Fixed from version 6.1rc1" | ||
107 | |||
108 | CVE_STATUS[CVE-2022-3624] = "fixed-version: Fixed from version 6.0rc1" | ||
109 | |||
110 | CVE_STATUS[CVE-2022-3629] = "fixed-version: Fixed from version 6.0rc1" | ||
111 | |||
112 | CVE_STATUS[CVE-2022-3630] = "fixed-version: Fixed from version 6.0rc1" | ||
113 | |||
114 | CVE_STATUS[CVE-2022-3633] = "fixed-version: Fixed from version 6.0rc1" | ||
115 | |||
116 | CVE_STATUS[CVE-2022-3636] = "fixed-version: Fixed from version 5.19rc1" | ||
117 | |||
118 | CVE_STATUS[CVE-2022-36402] = "fixed-version: Fixed from version 6.5" | ||
119 | |||
120 | CVE_STATUS[CVE-2022-3646] = "fixed-version: Fixed from version 6.1rc1" | ||
121 | |||
122 | CVE_STATUS[CVE-2022-42895] = "fixed-version: Fixed from version 6.1rc4" | ||
123 | |||
124 | CVE_STATUS[CVE-2022-4382] = "fixed-version: Fixed from version 6.2rc5" | ||
125 | |||
126 | CVE_STATUS[CVE-2023-1073] = "fixed-version: Fixed from version 6.2rc5" | ||
127 | |||
128 | CVE_STATUS[CVE-2023-1074] = "fixed-version: Fixed from version 6.2rc6" | ||
129 | |||
130 | CVE_STATUS[CVE-2023-1075] = "fixed-version: Fixed from version 6.2rc7" | ||
131 | |||
132 | CVE_STATUS[CVE-2023-1076] = "fixed-version: Fixed from version 6.3rc1" | ||
133 | |||
134 | CVE_STATUS[CVE-2023-2898] = "fixed-version: Fixed from version 6.5rc1" | ||
135 | |||
136 | CVE_STATUS[CVE-2023-3079] = "not-applicable-config: Issue only affects chromium, which is not in linux-yocto" | ||
137 | |||
138 | CVE_STATUS[CVE-2023-3772] = "fixed-version: Fixed from version 6.5rc7" | ||
139 | |||
140 | CVE_STATUS[CVE-2023-3773] = "fixed-version: Fixed from version 6.5rc7" | ||
141 | |||
142 | CVE_STATUS[CVE-2023-4155] = "fixed-version: Fixed from version 6.5rc6" | ||
143 | |||
144 | CVE_STATUS[CVE-2023-6176] = "fixed-version: Fixed from version 6.6rc2" | ||
145 | |||
146 | # Fix https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f98364e926626c678fb4b9004b75cacf92ff0662 | ||
147 | CVE_STATUS[CVE-2023-6270] = "fixed-version: Fixed from 6.9" | ||
148 | |||
149 | # Fix https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=567320c46a60a3c39b69aa1df802d753817a3f86 | ||
150 | CVE_STATUS[CVE-2023-6610] = "fixed-version: Fixed from 6.7rc7" | ||
151 | |||
152 | #Fix https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=65c95f78917ea6fa7ff189a2c19879c4fe161873 | ||
153 | CVE_STATUS[CVE-2023-6679] = "fixed-version: Fixed from 6.7rc6" | ||
154 | |||
155 | #Fix https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=ad25ee36f00172f7d53242dc77c69fff7ced0755 | ||
156 | CVE_STATUS[CVE-2023-7042] = "fixed-version: Fixed from 6.9rc1" | ||
157 | |||
158 | #Fix https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=7315dc1e122c85ffdfc8defffbb8f8b616c2eb1a | ||
159 | CVE_STATUS[CVE-2024-0193] = "fixed-version: Fixed from 6.7" | ||
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc new file mode 100644 index 0000000000..b6082edf5c --- /dev/null +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc | |||
@@ -0,0 +1,13023 @@ | |||
1 | |||
2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. | ||
3 | # Generated at 2025-06-05 16:29:20.725105+00:00 for kernel version 6.12.31 | ||
4 | # From cvelistV5 cve_2025-06-05_1600Z | ||
5 | |||
6 | python check_kernel_cve_status_version() { | ||
7 | this_version = "6.12.31" | ||
8 | kernel_version = d.getVar("LINUX_VERSION") | ||
9 | if kernel_version != this_version: | ||
10 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) | ||
11 | } | ||
12 | do_cve_check[prefuncs] += "check_kernel_cve_status_version" | ||
13 | |||
14 | CVE_STATUS[CVE-2019-25160] = "fixed-version: Fixed from version 5.0" | ||
15 | |||
16 | CVE_STATUS[CVE-2019-25162] = "fixed-version: Fixed from version 6.0" | ||
17 | |||
18 | # CVE-2019-3459 has no known resolution | ||
19 | |||
20 | # CVE-2019-3460 has no known resolution | ||
21 | |||
22 | CVE_STATUS[CVE-2020-36775] = "fixed-version: Fixed from version 5.7" | ||
23 | |||
24 | CVE_STATUS[CVE-2020-36776] = "fixed-version: Fixed from version 5.13" | ||
25 | |||
26 | CVE_STATUS[CVE-2020-36777] = "fixed-version: Fixed from version 5.13" | ||
27 | |||
28 | CVE_STATUS[CVE-2020-36778] = "fixed-version: Fixed from version 5.13" | ||
29 | |||
30 | CVE_STATUS[CVE-2020-36779] = "fixed-version: Fixed from version 5.13" | ||
31 | |||
32 | CVE_STATUS[CVE-2020-36780] = "fixed-version: Fixed from version 5.13" | ||
33 | |||
34 | CVE_STATUS[CVE-2020-36781] = "fixed-version: Fixed from version 5.13" | ||
35 | |||
36 | CVE_STATUS[CVE-2020-36782] = "fixed-version: Fixed from version 5.13" | ||
37 | |||
38 | CVE_STATUS[CVE-2020-36783] = "fixed-version: Fixed from version 5.13" | ||
39 | |||
40 | CVE_STATUS[CVE-2020-36784] = "fixed-version: Fixed from version 5.13" | ||
41 | |||
42 | CVE_STATUS[CVE-2020-36785] = "fixed-version: Fixed from version 5.13" | ||
43 | |||
44 | CVE_STATUS[CVE-2020-36786] = "fixed-version: Fixed from version 5.13" | ||
45 | |||
46 | CVE_STATUS[CVE-2020-36787] = "fixed-version: Fixed from version 5.13" | ||
47 | |||
48 | CVE_STATUS[CVE-2020-36788] = "fixed-version: Fixed from version 5.15" | ||
49 | |||
50 | CVE_STATUS[CVE-2020-36789] = "fixed-version: Fixed from version 5.10" | ||
51 | |||
52 | CVE_STATUS[CVE-2020-36790] = "fixed-version: Fixed from version 5.9" | ||
53 | |||
54 | CVE_STATUS[CVE-2020-36791] = "fixed-version: Fixed from version 5.5.14" | ||
55 | |||
56 | # CVE-2021-28688 has no known resolution | ||
57 | |||
58 | # CVE-2021-28691 has no known resolution | ||
59 | |||
60 | # CVE-2021-28711 has no known resolution | ||
61 | |||
62 | # CVE-2021-28712 has no known resolution | ||
63 | |||
64 | # CVE-2021-28713 has no known resolution | ||
65 | |||
66 | # CVE-2021-28714 has no known resolution | ||
67 | |||
68 | # CVE-2021-28715 has no known resolution | ||
69 | |||
70 | CVE_STATUS[CVE-2021-46904] = "fixed-version: Fixed from version 5.12" | ||
71 | |||
72 | CVE_STATUS[CVE-2021-46905] = "fixed-version: Fixed from version 5.13" | ||
73 | |||
74 | CVE_STATUS[CVE-2021-46906] = "fixed-version: Fixed from version 5.13" | ||
75 | |||
76 | CVE_STATUS[CVE-2021-46908] = "fixed-version: Fixed from version 5.12" | ||
77 | |||
78 | CVE_STATUS[CVE-2021-46909] = "fixed-version: Fixed from version 5.12" | ||
79 | |||
80 | CVE_STATUS[CVE-2021-46910] = "fixed-version: Fixed from version 5.12" | ||
81 | |||
82 | CVE_STATUS[CVE-2021-46911] = "fixed-version: Fixed from version 5.12" | ||
83 | |||
84 | CVE_STATUS[CVE-2021-46912] = "fixed-version: Fixed from version 5.12" | ||
85 | |||
86 | CVE_STATUS[CVE-2021-46913] = "fixed-version: Fixed from version 5.12" | ||
87 | |||
88 | CVE_STATUS[CVE-2021-46914] = "fixed-version: Fixed from version 5.12" | ||
89 | |||
90 | CVE_STATUS[CVE-2021-46915] = "fixed-version: Fixed from version 5.12" | ||
91 | |||
92 | CVE_STATUS[CVE-2021-46916] = "fixed-version: Fixed from version 5.12" | ||
93 | |||
94 | CVE_STATUS[CVE-2021-46917] = "fixed-version: Fixed from version 5.12" | ||
95 | |||
96 | CVE_STATUS[CVE-2021-46918] = "fixed-version: Fixed from version 5.12" | ||
97 | |||
98 | CVE_STATUS[CVE-2021-46919] = "fixed-version: Fixed from version 5.12" | ||
99 | |||
100 | CVE_STATUS[CVE-2021-46920] = "fixed-version: Fixed from version 5.12" | ||
101 | |||
102 | CVE_STATUS[CVE-2021-46921] = "fixed-version: Fixed from version 5.12" | ||
103 | |||
104 | CVE_STATUS[CVE-2021-46922] = "fixed-version: Fixed from version 5.11.17" | ||
105 | |||
106 | CVE_STATUS[CVE-2021-46923] = "fixed-version: Fixed from version 5.16" | ||
107 | |||
108 | CVE_STATUS[CVE-2021-46924] = "fixed-version: Fixed from version 5.16" | ||
109 | |||
110 | CVE_STATUS[CVE-2021-46925] = "fixed-version: Fixed from version 5.16" | ||
111 | |||
112 | CVE_STATUS[CVE-2021-46926] = "fixed-version: Fixed from version 5.16" | ||
113 | |||
114 | CVE_STATUS[CVE-2021-46927] = "fixed-version: Fixed from version 5.16" | ||
115 | |||
116 | CVE_STATUS[CVE-2021-46928] = "fixed-version: Fixed from version 5.16" | ||
117 | |||
118 | CVE_STATUS[CVE-2021-46929] = "fixed-version: Fixed from version 5.16" | ||
119 | |||
120 | CVE_STATUS[CVE-2021-46930] = "fixed-version: Fixed from version 5.16" | ||
121 | |||
122 | CVE_STATUS[CVE-2021-46931] = "fixed-version: Fixed from version 5.16" | ||
123 | |||
124 | CVE_STATUS[CVE-2021-46932] = "fixed-version: Fixed from version 5.16" | ||
125 | |||
126 | CVE_STATUS[CVE-2021-46933] = "fixed-version: Fixed from version 5.16" | ||
127 | |||
128 | CVE_STATUS[CVE-2021-46934] = "fixed-version: Fixed from version 5.16" | ||
129 | |||
130 | CVE_STATUS[CVE-2021-46935] = "fixed-version: Fixed from version 5.16" | ||
131 | |||
132 | CVE_STATUS[CVE-2021-46936] = "fixed-version: Fixed from version 5.16" | ||
133 | |||
134 | CVE_STATUS[CVE-2021-46937] = "fixed-version: Fixed from version 5.16" | ||
135 | |||
136 | CVE_STATUS[CVE-2021-46938] = "fixed-version: Fixed from version 5.13" | ||
137 | |||
138 | CVE_STATUS[CVE-2021-46939] = "fixed-version: Fixed from version 5.13" | ||
139 | |||
140 | CVE_STATUS[CVE-2021-46940] = "fixed-version: Fixed from version 5.13" | ||
141 | |||
142 | CVE_STATUS[CVE-2021-46941] = "fixed-version: Fixed from version 5.13" | ||
143 | |||
144 | CVE_STATUS[CVE-2021-46942] = "fixed-version: Fixed from version 5.13" | ||
145 | |||
146 | CVE_STATUS[CVE-2021-46943] = "fixed-version: Fixed from version 5.13" | ||
147 | |||
148 | CVE_STATUS[CVE-2021-46944] = "fixed-version: Fixed from version 5.13" | ||
149 | |||
150 | CVE_STATUS[CVE-2021-46945] = "fixed-version: Fixed from version 5.13" | ||
151 | |||
152 | CVE_STATUS[CVE-2021-46947] = "fixed-version: Fixed from version 5.13" | ||
153 | |||
154 | CVE_STATUS[CVE-2021-46948] = "fixed-version: Fixed from version 5.13" | ||
155 | |||
156 | CVE_STATUS[CVE-2021-46949] = "fixed-version: Fixed from version 5.13" | ||
157 | |||
158 | CVE_STATUS[CVE-2021-46950] = "fixed-version: Fixed from version 5.13" | ||
159 | |||
160 | CVE_STATUS[CVE-2021-46951] = "fixed-version: Fixed from version 5.13" | ||
161 | |||
162 | CVE_STATUS[CVE-2021-46952] = "fixed-version: Fixed from version 5.13" | ||
163 | |||
164 | CVE_STATUS[CVE-2021-46953] = "fixed-version: Fixed from version 5.13" | ||
165 | |||
166 | CVE_STATUS[CVE-2021-46954] = "fixed-version: Fixed from version 5.13" | ||
167 | |||
168 | CVE_STATUS[CVE-2021-46955] = "fixed-version: Fixed from version 5.13" | ||
169 | |||
170 | CVE_STATUS[CVE-2021-46956] = "fixed-version: Fixed from version 5.13" | ||
171 | |||
172 | CVE_STATUS[CVE-2021-46957] = "fixed-version: Fixed from version 5.13" | ||
173 | |||
174 | CVE_STATUS[CVE-2021-46958] = "fixed-version: Fixed from version 5.13" | ||
175 | |||
176 | CVE_STATUS[CVE-2021-46959] = "fixed-version: Fixed from version 5.13" | ||
177 | |||
178 | CVE_STATUS[CVE-2021-46960] = "fixed-version: Fixed from version 5.13" | ||
179 | |||
180 | CVE_STATUS[CVE-2021-46961] = "fixed-version: Fixed from version 5.13" | ||
181 | |||
182 | CVE_STATUS[CVE-2021-46962] = "fixed-version: Fixed from version 5.13" | ||
183 | |||
184 | CVE_STATUS[CVE-2021-46963] = "fixed-version: Fixed from version 5.13" | ||
185 | |||
186 | CVE_STATUS[CVE-2021-46964] = "fixed-version: Fixed from version 5.13" | ||
187 | |||
188 | CVE_STATUS[CVE-2021-46965] = "fixed-version: Fixed from version 5.13" | ||
189 | |||
190 | CVE_STATUS[CVE-2021-46966] = "fixed-version: Fixed from version 5.13" | ||
191 | |||
192 | CVE_STATUS[CVE-2021-46967] = "fixed-version: Fixed from version 5.13" | ||
193 | |||
194 | CVE_STATUS[CVE-2021-46968] = "fixed-version: Fixed from version 5.13" | ||
195 | |||
196 | CVE_STATUS[CVE-2021-46969] = "fixed-version: Fixed from version 5.13" | ||
197 | |||
198 | CVE_STATUS[CVE-2021-46970] = "fixed-version: Fixed from version 5.13" | ||
199 | |||
200 | CVE_STATUS[CVE-2021-46971] = "fixed-version: Fixed from version 5.13" | ||
201 | |||
202 | CVE_STATUS[CVE-2021-46972] = "fixed-version: Fixed from version 5.13" | ||
203 | |||
204 | CVE_STATUS[CVE-2021-46973] = "fixed-version: Fixed from version 5.13" | ||
205 | |||
206 | CVE_STATUS[CVE-2021-46974] = "fixed-version: Fixed from version 5.13" | ||
207 | |||
208 | CVE_STATUS[CVE-2021-46976] = "fixed-version: Fixed from version 5.13" | ||
209 | |||
210 | CVE_STATUS[CVE-2021-46977] = "fixed-version: Fixed from version 5.13" | ||
211 | |||
212 | CVE_STATUS[CVE-2021-46978] = "fixed-version: Fixed from version 5.13" | ||
213 | |||
214 | CVE_STATUS[CVE-2021-46979] = "fixed-version: Fixed from version 5.13" | ||
215 | |||
216 | CVE_STATUS[CVE-2021-46980] = "fixed-version: Fixed from version 5.13" | ||
217 | |||
218 | CVE_STATUS[CVE-2021-46981] = "fixed-version: Fixed from version 5.13" | ||
219 | |||
220 | CVE_STATUS[CVE-2021-46982] = "fixed-version: Fixed from version 5.13" | ||
221 | |||
222 | CVE_STATUS[CVE-2021-46983] = "fixed-version: Fixed from version 5.13" | ||
223 | |||
224 | CVE_STATUS[CVE-2021-46984] = "fixed-version: Fixed from version 5.13" | ||
225 | |||
226 | CVE_STATUS[CVE-2021-46985] = "fixed-version: Fixed from version 5.13" | ||
227 | |||
228 | CVE_STATUS[CVE-2021-46986] = "fixed-version: Fixed from version 5.13" | ||
229 | |||
230 | CVE_STATUS[CVE-2021-46987] = "fixed-version: Fixed from version 5.13" | ||
231 | |||
232 | CVE_STATUS[CVE-2021-46988] = "fixed-version: Fixed from version 5.13" | ||
233 | |||
234 | CVE_STATUS[CVE-2021-46989] = "fixed-version: Fixed from version 5.13" | ||
235 | |||
236 | CVE_STATUS[CVE-2021-46990] = "fixed-version: Fixed from version 5.13" | ||
237 | |||
238 | CVE_STATUS[CVE-2021-46991] = "fixed-version: Fixed from version 5.13" | ||
239 | |||
240 | CVE_STATUS[CVE-2021-46992] = "fixed-version: Fixed from version 5.13" | ||
241 | |||
242 | CVE_STATUS[CVE-2021-46993] = "fixed-version: Fixed from version 5.13" | ||
243 | |||
244 | CVE_STATUS[CVE-2021-46994] = "fixed-version: Fixed from version 5.13" | ||
245 | |||
246 | CVE_STATUS[CVE-2021-46995] = "fixed-version: Fixed from version 5.13" | ||
247 | |||
248 | CVE_STATUS[CVE-2021-46996] = "fixed-version: Fixed from version 5.13" | ||
249 | |||
250 | CVE_STATUS[CVE-2021-46997] = "fixed-version: Fixed from version 5.13" | ||
251 | |||
252 | CVE_STATUS[CVE-2021-46998] = "fixed-version: Fixed from version 5.13" | ||
253 | |||
254 | CVE_STATUS[CVE-2021-46999] = "fixed-version: Fixed from version 5.13" | ||
255 | |||
256 | CVE_STATUS[CVE-2021-47000] = "fixed-version: Fixed from version 5.13" | ||
257 | |||
258 | CVE_STATUS[CVE-2021-47001] = "fixed-version: Fixed from version 5.13" | ||
259 | |||
260 | CVE_STATUS[CVE-2021-47002] = "fixed-version: Fixed from version 5.13" | ||
261 | |||
262 | CVE_STATUS[CVE-2021-47003] = "fixed-version: Fixed from version 5.13" | ||
263 | |||
264 | CVE_STATUS[CVE-2021-47004] = "fixed-version: Fixed from version 5.13" | ||
265 | |||
266 | CVE_STATUS[CVE-2021-47005] = "fixed-version: Fixed from version 5.13" | ||
267 | |||
268 | CVE_STATUS[CVE-2021-47006] = "fixed-version: Fixed from version 5.13" | ||
269 | |||
270 | CVE_STATUS[CVE-2021-47007] = "fixed-version: Fixed from version 5.13" | ||
271 | |||
272 | CVE_STATUS[CVE-2021-47008] = "fixed-version: Fixed from version 5.13" | ||
273 | |||
274 | CVE_STATUS[CVE-2021-47009] = "fixed-version: Fixed from version 5.13" | ||
275 | |||
276 | CVE_STATUS[CVE-2021-47010] = "fixed-version: Fixed from version 5.13" | ||
277 | |||
278 | CVE_STATUS[CVE-2021-47011] = "fixed-version: Fixed from version 5.13" | ||
279 | |||
280 | CVE_STATUS[CVE-2021-47012] = "fixed-version: Fixed from version 5.13" | ||
281 | |||
282 | CVE_STATUS[CVE-2021-47013] = "fixed-version: Fixed from version 5.13" | ||
283 | |||
284 | CVE_STATUS[CVE-2021-47014] = "fixed-version: Fixed from version 5.13" | ||
285 | |||
286 | CVE_STATUS[CVE-2021-47015] = "fixed-version: Fixed from version 5.13" | ||
287 | |||
288 | CVE_STATUS[CVE-2021-47016] = "fixed-version: Fixed from version 5.13" | ||
289 | |||
290 | CVE_STATUS[CVE-2021-47017] = "fixed-version: Fixed from version 5.13" | ||
291 | |||
292 | CVE_STATUS[CVE-2021-47018] = "fixed-version: Fixed from version 5.13" | ||
293 | |||
294 | CVE_STATUS[CVE-2021-47019] = "fixed-version: Fixed from version 5.13" | ||
295 | |||
296 | CVE_STATUS[CVE-2021-47020] = "fixed-version: Fixed from version 5.13" | ||
297 | |||
298 | CVE_STATUS[CVE-2021-47021] = "fixed-version: Fixed from version 5.13" | ||
299 | |||
300 | CVE_STATUS[CVE-2021-47022] = "fixed-version: Fixed from version 5.13" | ||
301 | |||
302 | CVE_STATUS[CVE-2021-47023] = "fixed-version: Fixed from version 5.13" | ||
303 | |||
304 | CVE_STATUS[CVE-2021-47024] = "fixed-version: Fixed from version 5.13" | ||
305 | |||
306 | CVE_STATUS[CVE-2021-47025] = "fixed-version: Fixed from version 5.13" | ||
307 | |||
308 | CVE_STATUS[CVE-2021-47026] = "fixed-version: Fixed from version 5.13" | ||
309 | |||
310 | CVE_STATUS[CVE-2021-47027] = "fixed-version: Fixed from version 5.13" | ||
311 | |||
312 | CVE_STATUS[CVE-2021-47028] = "fixed-version: Fixed from version 5.13" | ||
313 | |||
314 | CVE_STATUS[CVE-2021-47029] = "fixed-version: Fixed from version 5.13" | ||
315 | |||
316 | CVE_STATUS[CVE-2021-47030] = "fixed-version: Fixed from version 5.13" | ||
317 | |||
318 | CVE_STATUS[CVE-2021-47031] = "fixed-version: Fixed from version 5.13" | ||
319 | |||
320 | CVE_STATUS[CVE-2021-47032] = "fixed-version: Fixed from version 5.13" | ||
321 | |||
322 | CVE_STATUS[CVE-2021-47033] = "fixed-version: Fixed from version 5.13" | ||
323 | |||
324 | CVE_STATUS[CVE-2021-47034] = "fixed-version: Fixed from version 5.13" | ||
325 | |||
326 | CVE_STATUS[CVE-2021-47035] = "fixed-version: Fixed from version 5.13" | ||
327 | |||
328 | CVE_STATUS[CVE-2021-47036] = "fixed-version: Fixed from version 5.13" | ||
329 | |||
330 | CVE_STATUS[CVE-2021-47037] = "fixed-version: Fixed from version 5.13" | ||
331 | |||
332 | CVE_STATUS[CVE-2021-47038] = "fixed-version: Fixed from version 5.13" | ||
333 | |||
334 | CVE_STATUS[CVE-2021-47039] = "fixed-version: Fixed from version 5.13" | ||
335 | |||
336 | CVE_STATUS[CVE-2021-47040] = "fixed-version: Fixed from version 5.13" | ||
337 | |||
338 | CVE_STATUS[CVE-2021-47041] = "fixed-version: Fixed from version 5.13" | ||
339 | |||
340 | CVE_STATUS[CVE-2021-47042] = "fixed-version: Fixed from version 5.13" | ||
341 | |||
342 | CVE_STATUS[CVE-2021-47043] = "fixed-version: Fixed from version 5.13" | ||
343 | |||
344 | CVE_STATUS[CVE-2021-47044] = "fixed-version: Fixed from version 5.13" | ||
345 | |||
346 | CVE_STATUS[CVE-2021-47045] = "fixed-version: Fixed from version 5.13" | ||
347 | |||
348 | CVE_STATUS[CVE-2021-47046] = "fixed-version: Fixed from version 5.13" | ||
349 | |||
350 | CVE_STATUS[CVE-2021-47047] = "fixed-version: Fixed from version 5.13" | ||
351 | |||
352 | CVE_STATUS[CVE-2021-47048] = "fixed-version: Fixed from version 5.13" | ||
353 | |||
354 | CVE_STATUS[CVE-2021-47049] = "fixed-version: Fixed from version 5.13" | ||
355 | |||
356 | CVE_STATUS[CVE-2021-47050] = "fixed-version: Fixed from version 5.13" | ||
357 | |||
358 | CVE_STATUS[CVE-2021-47051] = "fixed-version: Fixed from version 5.13" | ||
359 | |||
360 | CVE_STATUS[CVE-2021-47052] = "fixed-version: Fixed from version 5.13" | ||
361 | |||
362 | CVE_STATUS[CVE-2021-47053] = "fixed-version: Fixed from version 5.13" | ||
363 | |||
364 | CVE_STATUS[CVE-2021-47054] = "fixed-version: Fixed from version 5.13" | ||
365 | |||
366 | CVE_STATUS[CVE-2021-47055] = "fixed-version: Fixed from version 5.13" | ||
367 | |||
368 | CVE_STATUS[CVE-2021-47056] = "fixed-version: Fixed from version 5.13" | ||
369 | |||
370 | CVE_STATUS[CVE-2021-47057] = "fixed-version: Fixed from version 5.13" | ||
371 | |||
372 | CVE_STATUS[CVE-2021-47058] = "fixed-version: Fixed from version 5.13" | ||
373 | |||
374 | CVE_STATUS[CVE-2021-47059] = "fixed-version: Fixed from version 5.13" | ||
375 | |||
376 | CVE_STATUS[CVE-2021-47060] = "fixed-version: Fixed from version 5.13" | ||
377 | |||
378 | CVE_STATUS[CVE-2021-47061] = "fixed-version: Fixed from version 5.13" | ||
379 | |||
380 | CVE_STATUS[CVE-2021-47062] = "fixed-version: Fixed from version 5.13" | ||
381 | |||
382 | CVE_STATUS[CVE-2021-47063] = "fixed-version: Fixed from version 5.13" | ||
383 | |||
384 | CVE_STATUS[CVE-2021-47064] = "fixed-version: Fixed from version 5.13" | ||
385 | |||
386 | CVE_STATUS[CVE-2021-47065] = "fixed-version: Fixed from version 5.13" | ||
387 | |||
388 | CVE_STATUS[CVE-2021-47066] = "fixed-version: Fixed from version 5.13" | ||
389 | |||
390 | CVE_STATUS[CVE-2021-47067] = "fixed-version: Fixed from version 5.13" | ||
391 | |||
392 | CVE_STATUS[CVE-2021-47068] = "fixed-version: Fixed from version 5.13" | ||
393 | |||
394 | CVE_STATUS[CVE-2021-47069] = "fixed-version: Fixed from version 5.13" | ||
395 | |||
396 | CVE_STATUS[CVE-2021-47070] = "fixed-version: Fixed from version 5.13" | ||
397 | |||
398 | CVE_STATUS[CVE-2021-47071] = "fixed-version: Fixed from version 5.13" | ||
399 | |||
400 | CVE_STATUS[CVE-2021-47072] = "fixed-version: Fixed from version 5.13" | ||
401 | |||
402 | CVE_STATUS[CVE-2021-47073] = "fixed-version: Fixed from version 5.13" | ||
403 | |||
404 | CVE_STATUS[CVE-2021-47074] = "fixed-version: Fixed from version 5.13" | ||
405 | |||
406 | CVE_STATUS[CVE-2021-47075] = "fixed-version: Fixed from version 5.13" | ||
407 | |||
408 | CVE_STATUS[CVE-2021-47076] = "fixed-version: Fixed from version 5.13" | ||
409 | |||
410 | CVE_STATUS[CVE-2021-47077] = "fixed-version: Fixed from version 5.13" | ||
411 | |||
412 | CVE_STATUS[CVE-2021-47078] = "fixed-version: Fixed from version 5.13" | ||
413 | |||
414 | CVE_STATUS[CVE-2021-47079] = "fixed-version: Fixed from version 5.13" | ||
415 | |||
416 | CVE_STATUS[CVE-2021-47080] = "fixed-version: Fixed from version 5.13" | ||
417 | |||
418 | CVE_STATUS[CVE-2021-47081] = "fixed-version: Fixed from version 5.13" | ||
419 | |||
420 | CVE_STATUS[CVE-2021-47082] = "fixed-version: Fixed from version 5.16" | ||
421 | |||
422 | CVE_STATUS[CVE-2021-47083] = "fixed-version: Fixed from version 5.16" | ||
423 | |||
424 | CVE_STATUS[CVE-2021-47086] = "fixed-version: Fixed from version 5.16" | ||
425 | |||
426 | CVE_STATUS[CVE-2021-47087] = "fixed-version: Fixed from version 5.16" | ||
427 | |||
428 | CVE_STATUS[CVE-2021-47088] = "fixed-version: Fixed from version 5.16" | ||
429 | |||
430 | CVE_STATUS[CVE-2021-47089] = "fixed-version: Fixed from version 5.16" | ||
431 | |||
432 | CVE_STATUS[CVE-2021-47090] = "fixed-version: Fixed from version 5.16" | ||
433 | |||
434 | CVE_STATUS[CVE-2021-47091] = "fixed-version: Fixed from version 5.16" | ||
435 | |||
436 | CVE_STATUS[CVE-2021-47092] = "fixed-version: Fixed from version 5.16" | ||
437 | |||
438 | CVE_STATUS[CVE-2021-47093] = "fixed-version: Fixed from version 5.16" | ||
439 | |||
440 | CVE_STATUS[CVE-2021-47094] = "fixed-version: Fixed from version 5.16" | ||
441 | |||
442 | CVE_STATUS[CVE-2021-47095] = "fixed-version: Fixed from version 5.16" | ||
443 | |||
444 | CVE_STATUS[CVE-2021-47096] = "fixed-version: Fixed from version 5.16" | ||
445 | |||
446 | CVE_STATUS[CVE-2021-47097] = "fixed-version: Fixed from version 5.16" | ||
447 | |||
448 | CVE_STATUS[CVE-2021-47098] = "fixed-version: Fixed from version 5.16" | ||
449 | |||
450 | CVE_STATUS[CVE-2021-47099] = "fixed-version: Fixed from version 5.16" | ||
451 | |||
452 | CVE_STATUS[CVE-2021-47100] = "fixed-version: Fixed from version 5.16" | ||
453 | |||
454 | CVE_STATUS[CVE-2021-47101] = "fixed-version: Fixed from version 5.16" | ||
455 | |||
456 | CVE_STATUS[CVE-2021-47102] = "fixed-version: Fixed from version 5.16" | ||
457 | |||
458 | CVE_STATUS[CVE-2021-47103] = "fixed-version: Fixed from version 5.16" | ||
459 | |||
460 | CVE_STATUS[CVE-2021-47104] = "fixed-version: Fixed from version 5.16" | ||
461 | |||
462 | CVE_STATUS[CVE-2021-47105] = "fixed-version: Fixed from version 5.16" | ||
463 | |||
464 | CVE_STATUS[CVE-2021-47106] = "fixed-version: Fixed from version 5.16" | ||
465 | |||
466 | CVE_STATUS[CVE-2021-47107] = "fixed-version: Fixed from version 5.16" | ||
467 | |||
468 | CVE_STATUS[CVE-2021-47108] = "fixed-version: Fixed from version 5.16" | ||
469 | |||
470 | CVE_STATUS[CVE-2021-47109] = "fixed-version: Fixed from version 5.13" | ||
471 | |||
472 | CVE_STATUS[CVE-2021-47110] = "fixed-version: Fixed from version 5.13" | ||
473 | |||
474 | CVE_STATUS[CVE-2021-47111] = "fixed-version: Fixed from version 5.13" | ||
475 | |||
476 | CVE_STATUS[CVE-2021-47112] = "fixed-version: Fixed from version 5.13" | ||
477 | |||
478 | CVE_STATUS[CVE-2021-47113] = "fixed-version: Fixed from version 5.13" | ||
479 | |||
480 | CVE_STATUS[CVE-2021-47114] = "fixed-version: Fixed from version 5.13" | ||
481 | |||
482 | CVE_STATUS[CVE-2021-47116] = "fixed-version: Fixed from version 5.13" | ||
483 | |||
484 | CVE_STATUS[CVE-2021-47117] = "fixed-version: Fixed from version 5.13" | ||
485 | |||
486 | CVE_STATUS[CVE-2021-47118] = "fixed-version: Fixed from version 5.13" | ||
487 | |||
488 | CVE_STATUS[CVE-2021-47119] = "fixed-version: Fixed from version 5.13" | ||
489 | |||
490 | CVE_STATUS[CVE-2021-47120] = "fixed-version: Fixed from version 5.13" | ||
491 | |||
492 | CVE_STATUS[CVE-2021-47121] = "fixed-version: Fixed from version 5.13" | ||
493 | |||
494 | CVE_STATUS[CVE-2021-47122] = "fixed-version: Fixed from version 5.13" | ||
495 | |||
496 | CVE_STATUS[CVE-2021-47123] = "fixed-version: Fixed from version 5.13" | ||
497 | |||
498 | CVE_STATUS[CVE-2021-47124] = "fixed-version: Fixed from version 5.13" | ||
499 | |||
500 | CVE_STATUS[CVE-2021-47125] = "fixed-version: Fixed from version 5.13" | ||
501 | |||
502 | CVE_STATUS[CVE-2021-47126] = "fixed-version: Fixed from version 5.13" | ||
503 | |||
504 | CVE_STATUS[CVE-2021-47127] = "fixed-version: Fixed from version 5.13" | ||
505 | |||
506 | CVE_STATUS[CVE-2021-47128] = "fixed-version: Fixed from version 5.13" | ||
507 | |||
508 | CVE_STATUS[CVE-2021-47129] = "fixed-version: Fixed from version 5.13" | ||
509 | |||
510 | CVE_STATUS[CVE-2021-47130] = "fixed-version: Fixed from version 5.13" | ||
511 | |||
512 | CVE_STATUS[CVE-2021-47131] = "fixed-version: Fixed from version 5.13" | ||
513 | |||
514 | CVE_STATUS[CVE-2021-47132] = "fixed-version: Fixed from version 5.13" | ||
515 | |||
516 | CVE_STATUS[CVE-2021-47133] = "fixed-version: Fixed from version 5.13" | ||
517 | |||
518 | CVE_STATUS[CVE-2021-47134] = "fixed-version: Fixed from version 5.13" | ||
519 | |||
520 | CVE_STATUS[CVE-2021-47135] = "fixed-version: Fixed from version 5.13" | ||
521 | |||
522 | CVE_STATUS[CVE-2021-47136] = "fixed-version: Fixed from version 5.13" | ||
523 | |||
524 | CVE_STATUS[CVE-2021-47137] = "fixed-version: Fixed from version 5.13" | ||
525 | |||
526 | CVE_STATUS[CVE-2021-47138] = "fixed-version: Fixed from version 5.13" | ||
527 | |||
528 | CVE_STATUS[CVE-2021-47139] = "fixed-version: Fixed from version 5.13" | ||
529 | |||
530 | CVE_STATUS[CVE-2021-47140] = "fixed-version: Fixed from version 5.13" | ||
531 | |||
532 | CVE_STATUS[CVE-2021-47141] = "fixed-version: Fixed from version 5.13" | ||
533 | |||
534 | CVE_STATUS[CVE-2021-47142] = "fixed-version: Fixed from version 5.13" | ||
535 | |||
536 | CVE_STATUS[CVE-2021-47143] = "fixed-version: Fixed from version 5.13" | ||
537 | |||
538 | CVE_STATUS[CVE-2021-47144] = "fixed-version: Fixed from version 5.13" | ||
539 | |||
540 | CVE_STATUS[CVE-2021-47145] = "fixed-version: Fixed from version 5.13" | ||
541 | |||
542 | CVE_STATUS[CVE-2021-47146] = "fixed-version: Fixed from version 5.13" | ||
543 | |||
544 | CVE_STATUS[CVE-2021-47147] = "fixed-version: Fixed from version 5.13" | ||
545 | |||
546 | CVE_STATUS[CVE-2021-47148] = "fixed-version: Fixed from version 5.13" | ||
547 | |||
548 | CVE_STATUS[CVE-2021-47149] = "fixed-version: Fixed from version 5.13" | ||
549 | |||
550 | CVE_STATUS[CVE-2021-47150] = "fixed-version: Fixed from version 5.13" | ||
551 | |||
552 | CVE_STATUS[CVE-2021-47151] = "fixed-version: Fixed from version 5.13" | ||
553 | |||
554 | CVE_STATUS[CVE-2021-47152] = "fixed-version: Fixed from version 5.13" | ||
555 | |||
556 | CVE_STATUS[CVE-2021-47153] = "fixed-version: Fixed from version 5.13" | ||
557 | |||
558 | CVE_STATUS[CVE-2021-47158] = "fixed-version: Fixed from version 5.13" | ||
559 | |||
560 | CVE_STATUS[CVE-2021-47159] = "fixed-version: Fixed from version 5.13" | ||
561 | |||
562 | CVE_STATUS[CVE-2021-47160] = "fixed-version: Fixed from version 5.13" | ||
563 | |||
564 | CVE_STATUS[CVE-2021-47161] = "fixed-version: Fixed from version 5.13" | ||
565 | |||
566 | CVE_STATUS[CVE-2021-47162] = "fixed-version: Fixed from version 5.13" | ||
567 | |||
568 | CVE_STATUS[CVE-2021-47163] = "fixed-version: Fixed from version 5.13" | ||
569 | |||
570 | CVE_STATUS[CVE-2021-47164] = "fixed-version: Fixed from version 5.13" | ||
571 | |||
572 | CVE_STATUS[CVE-2021-47165] = "fixed-version: Fixed from version 5.13" | ||
573 | |||
574 | CVE_STATUS[CVE-2021-47166] = "fixed-version: Fixed from version 5.13" | ||
575 | |||
576 | CVE_STATUS[CVE-2021-47167] = "fixed-version: Fixed from version 5.13" | ||
577 | |||
578 | CVE_STATUS[CVE-2021-47168] = "fixed-version: Fixed from version 5.13" | ||
579 | |||
580 | CVE_STATUS[CVE-2021-47169] = "fixed-version: Fixed from version 5.13" | ||
581 | |||
582 | CVE_STATUS[CVE-2021-47170] = "fixed-version: Fixed from version 5.13" | ||
583 | |||
584 | CVE_STATUS[CVE-2021-47171] = "fixed-version: Fixed from version 5.13" | ||
585 | |||
586 | CVE_STATUS[CVE-2021-47172] = "fixed-version: Fixed from version 5.13" | ||
587 | |||
588 | CVE_STATUS[CVE-2021-47173] = "fixed-version: Fixed from version 5.13" | ||
589 | |||
590 | CVE_STATUS[CVE-2021-47174] = "fixed-version: Fixed from version 5.13" | ||
591 | |||
592 | CVE_STATUS[CVE-2021-47175] = "fixed-version: Fixed from version 5.13" | ||
593 | |||
594 | CVE_STATUS[CVE-2021-47176] = "fixed-version: Fixed from version 5.13" | ||
595 | |||
596 | CVE_STATUS[CVE-2021-47177] = "fixed-version: Fixed from version 5.13" | ||
597 | |||
598 | CVE_STATUS[CVE-2021-47178] = "fixed-version: Fixed from version 5.13" | ||
599 | |||
600 | CVE_STATUS[CVE-2021-47179] = "fixed-version: Fixed from version 5.12.9" | ||
601 | |||
602 | CVE_STATUS[CVE-2021-47180] = "fixed-version: Fixed from version 5.13" | ||
603 | |||
604 | CVE_STATUS[CVE-2021-47181] = "fixed-version: Fixed from version 5.16" | ||
605 | |||
606 | CVE_STATUS[CVE-2021-47182] = "fixed-version: Fixed from version 5.16" | ||
607 | |||
608 | CVE_STATUS[CVE-2021-47183] = "fixed-version: Fixed from version 5.16" | ||
609 | |||
610 | CVE_STATUS[CVE-2021-47184] = "fixed-version: Fixed from version 5.16" | ||
611 | |||
612 | CVE_STATUS[CVE-2021-47185] = "fixed-version: Fixed from version 5.16" | ||
613 | |||
614 | CVE_STATUS[CVE-2021-47186] = "fixed-version: Fixed from version 5.16" | ||
615 | |||
616 | CVE_STATUS[CVE-2021-47187] = "fixed-version: Fixed from version 5.16" | ||
617 | |||
618 | CVE_STATUS[CVE-2021-47188] = "fixed-version: Fixed from version 5.16" | ||
619 | |||
620 | CVE_STATUS[CVE-2021-47189] = "fixed-version: Fixed from version 5.16" | ||
621 | |||
622 | CVE_STATUS[CVE-2021-47190] = "fixed-version: Fixed from version 5.16" | ||
623 | |||
624 | CVE_STATUS[CVE-2021-47191] = "fixed-version: Fixed from version 5.16" | ||
625 | |||
626 | CVE_STATUS[CVE-2021-47192] = "fixed-version: Fixed from version 5.16" | ||
627 | |||
628 | CVE_STATUS[CVE-2021-47193] = "fixed-version: Fixed from version 5.16" | ||
629 | |||
630 | CVE_STATUS[CVE-2021-47194] = "fixed-version: Fixed from version 5.16" | ||
631 | |||
632 | CVE_STATUS[CVE-2021-47195] = "fixed-version: Fixed from version 5.16" | ||
633 | |||
634 | CVE_STATUS[CVE-2021-47196] = "fixed-version: Fixed from version 5.16" | ||
635 | |||
636 | CVE_STATUS[CVE-2021-47197] = "fixed-version: Fixed from version 5.16" | ||
637 | |||
638 | CVE_STATUS[CVE-2021-47198] = "fixed-version: Fixed from version 5.16" | ||
639 | |||
640 | CVE_STATUS[CVE-2021-47199] = "fixed-version: Fixed from version 5.16" | ||
641 | |||
642 | CVE_STATUS[CVE-2021-47200] = "fixed-version: Fixed from version 5.16" | ||
643 | |||
644 | CVE_STATUS[CVE-2021-47201] = "fixed-version: Fixed from version 5.16" | ||
645 | |||
646 | CVE_STATUS[CVE-2021-47202] = "fixed-version: Fixed from version 5.16" | ||
647 | |||
648 | CVE_STATUS[CVE-2021-47203] = "fixed-version: Fixed from version 5.16" | ||
649 | |||
650 | CVE_STATUS[CVE-2021-47204] = "fixed-version: Fixed from version 5.16" | ||
651 | |||
652 | CVE_STATUS[CVE-2021-47205] = "fixed-version: Fixed from version 5.16" | ||
653 | |||
654 | CVE_STATUS[CVE-2021-47206] = "fixed-version: Fixed from version 5.16" | ||
655 | |||
656 | CVE_STATUS[CVE-2021-47207] = "fixed-version: Fixed from version 5.16" | ||
657 | |||
658 | CVE_STATUS[CVE-2021-47209] = "fixed-version: Fixed from version 5.16" | ||
659 | |||
660 | CVE_STATUS[CVE-2021-47210] = "fixed-version: Fixed from version 5.16" | ||
661 | |||
662 | CVE_STATUS[CVE-2021-47211] = "fixed-version: Fixed from version 5.16" | ||
663 | |||
664 | CVE_STATUS[CVE-2021-47212] = "fixed-version: Fixed from version 5.16" | ||
665 | |||
666 | CVE_STATUS[CVE-2021-47214] = "fixed-version: Fixed from version 5.16" | ||
667 | |||
668 | CVE_STATUS[CVE-2021-47215] = "fixed-version: Fixed from version 5.16" | ||
669 | |||
670 | CVE_STATUS[CVE-2021-47216] = "fixed-version: Fixed from version 5.16" | ||
671 | |||
672 | CVE_STATUS[CVE-2021-47217] = "fixed-version: Fixed from version 5.16" | ||
673 | |||
674 | CVE_STATUS[CVE-2021-47218] = "fixed-version: Fixed from version 5.16" | ||
675 | |||
676 | CVE_STATUS[CVE-2021-47219] = "fixed-version: Fixed from version 5.16" | ||
677 | |||
678 | CVE_STATUS[CVE-2021-47221] = "fixed-version: Fixed from version 5.13" | ||
679 | |||
680 | CVE_STATUS[CVE-2021-47222] = "fixed-version: Fixed from version 5.13" | ||
681 | |||
682 | CVE_STATUS[CVE-2021-47223] = "fixed-version: Fixed from version 5.13" | ||
683 | |||
684 | CVE_STATUS[CVE-2021-47224] = "fixed-version: Fixed from version 5.13" | ||
685 | |||
686 | CVE_STATUS[CVE-2021-47225] = "fixed-version: Fixed from version 5.13" | ||
687 | |||
688 | CVE_STATUS[CVE-2021-47226] = "fixed-version: Fixed from version 5.13" | ||
689 | |||
690 | CVE_STATUS[CVE-2021-47227] = "fixed-version: Fixed from version 5.13" | ||
691 | |||
692 | CVE_STATUS[CVE-2021-47228] = "fixed-version: Fixed from version 5.13" | ||
693 | |||
694 | CVE_STATUS[CVE-2021-47229] = "fixed-version: Fixed from version 5.13" | ||
695 | |||
696 | CVE_STATUS[CVE-2021-47230] = "fixed-version: Fixed from version 5.13" | ||
697 | |||
698 | CVE_STATUS[CVE-2021-47231] = "fixed-version: Fixed from version 5.13" | ||
699 | |||
700 | CVE_STATUS[CVE-2021-47232] = "fixed-version: Fixed from version 5.13" | ||
701 | |||
702 | CVE_STATUS[CVE-2021-47233] = "fixed-version: Fixed from version 5.13" | ||
703 | |||
704 | CVE_STATUS[CVE-2021-47234] = "fixed-version: Fixed from version 5.13" | ||
705 | |||
706 | CVE_STATUS[CVE-2021-47235] = "fixed-version: Fixed from version 5.13" | ||
707 | |||
708 | CVE_STATUS[CVE-2021-47236] = "fixed-version: Fixed from version 5.13" | ||
709 | |||
710 | CVE_STATUS[CVE-2021-47237] = "fixed-version: Fixed from version 5.13" | ||
711 | |||
712 | CVE_STATUS[CVE-2021-47238] = "fixed-version: Fixed from version 5.13" | ||
713 | |||
714 | CVE_STATUS[CVE-2021-47239] = "fixed-version: Fixed from version 5.12.13" | ||
715 | |||
716 | CVE_STATUS[CVE-2021-47240] = "fixed-version: Fixed from version 5.13" | ||
717 | |||
718 | CVE_STATUS[CVE-2021-47241] = "fixed-version: Fixed from version 5.13" | ||
719 | |||
720 | CVE_STATUS[CVE-2021-47242] = "fixed-version: Fixed from version 5.13" | ||
721 | |||
722 | CVE_STATUS[CVE-2021-47243] = "fixed-version: Fixed from version 5.13" | ||
723 | |||
724 | CVE_STATUS[CVE-2021-47244] = "fixed-version: Fixed from version 5.13" | ||
725 | |||
726 | CVE_STATUS[CVE-2021-47245] = "fixed-version: Fixed from version 5.13" | ||
727 | |||
728 | CVE_STATUS[CVE-2021-47246] = "fixed-version: Fixed from version 5.13" | ||
729 | |||
730 | CVE_STATUS[CVE-2021-47247] = "fixed-version: Fixed from version 5.13" | ||
731 | |||
732 | CVE_STATUS[CVE-2021-47248] = "fixed-version: Fixed from version 5.13" | ||
733 | |||
734 | CVE_STATUS[CVE-2021-47249] = "fixed-version: Fixed from version 5.13" | ||
735 | |||
736 | CVE_STATUS[CVE-2021-47250] = "fixed-version: Fixed from version 5.13" | ||
737 | |||
738 | CVE_STATUS[CVE-2021-47251] = "fixed-version: Fixed from version 5.13" | ||
739 | |||
740 | CVE_STATUS[CVE-2021-47252] = "fixed-version: Fixed from version 5.13" | ||
741 | |||
742 | CVE_STATUS[CVE-2021-47253] = "fixed-version: Fixed from version 5.13" | ||
743 | |||
744 | CVE_STATUS[CVE-2021-47254] = "fixed-version: Fixed from version 5.13" | ||
745 | |||
746 | CVE_STATUS[CVE-2021-47255] = "fixed-version: Fixed from version 5.13" | ||
747 | |||
748 | CVE_STATUS[CVE-2021-47256] = "fixed-version: Fixed from version 5.13" | ||
749 | |||
750 | CVE_STATUS[CVE-2021-47257] = "fixed-version: Fixed from version 5.13" | ||
751 | |||
752 | CVE_STATUS[CVE-2021-47258] = "fixed-version: Fixed from version 5.13" | ||
753 | |||
754 | CVE_STATUS[CVE-2021-47259] = "fixed-version: Fixed from version 5.13" | ||
755 | |||
756 | CVE_STATUS[CVE-2021-47260] = "fixed-version: Fixed from version 5.13" | ||
757 | |||
758 | CVE_STATUS[CVE-2021-47261] = "fixed-version: Fixed from version 5.13" | ||
759 | |||
760 | CVE_STATUS[CVE-2021-47262] = "fixed-version: Fixed from version 5.13" | ||
761 | |||
762 | CVE_STATUS[CVE-2021-47263] = "fixed-version: Fixed from version 5.13" | ||
763 | |||
764 | CVE_STATUS[CVE-2021-47264] = "fixed-version: Fixed from version 5.13" | ||
765 | |||
766 | CVE_STATUS[CVE-2021-47265] = "fixed-version: Fixed from version 5.13" | ||
767 | |||
768 | CVE_STATUS[CVE-2021-47266] = "fixed-version: Fixed from version 5.13" | ||
769 | |||
770 | CVE_STATUS[CVE-2021-47267] = "fixed-version: Fixed from version 5.13" | ||
771 | |||
772 | CVE_STATUS[CVE-2021-47268] = "fixed-version: Fixed from version 5.13" | ||
773 | |||
774 | CVE_STATUS[CVE-2021-47269] = "fixed-version: Fixed from version 5.13" | ||
775 | |||
776 | CVE_STATUS[CVE-2021-47270] = "fixed-version: Fixed from version 5.13" | ||
777 | |||
778 | CVE_STATUS[CVE-2021-47271] = "fixed-version: Fixed from version 5.13" | ||
779 | |||
780 | CVE_STATUS[CVE-2021-47272] = "fixed-version: Fixed from version 5.13" | ||
781 | |||
782 | CVE_STATUS[CVE-2021-47273] = "fixed-version: Fixed from version 5.13" | ||
783 | |||
784 | CVE_STATUS[CVE-2021-47274] = "fixed-version: Fixed from version 5.13" | ||
785 | |||
786 | CVE_STATUS[CVE-2021-47275] = "fixed-version: Fixed from version 5.13" | ||
787 | |||
788 | CVE_STATUS[CVE-2021-47276] = "fixed-version: Fixed from version 5.13" | ||
789 | |||
790 | CVE_STATUS[CVE-2021-47277] = "fixed-version: Fixed from version 5.13" | ||
791 | |||
792 | CVE_STATUS[CVE-2021-47278] = "fixed-version: Fixed from version 5.13" | ||
793 | |||
794 | CVE_STATUS[CVE-2021-47279] = "fixed-version: Fixed from version 5.13" | ||
795 | |||
796 | CVE_STATUS[CVE-2021-47280] = "fixed-version: Fixed from version 5.13" | ||
797 | |||
798 | CVE_STATUS[CVE-2021-47281] = "fixed-version: Fixed from version 5.13" | ||
799 | |||
800 | CVE_STATUS[CVE-2021-47282] = "fixed-version: Fixed from version 5.13" | ||
801 | |||
802 | CVE_STATUS[CVE-2021-47283] = "fixed-version: Fixed from version 5.13" | ||
803 | |||
804 | CVE_STATUS[CVE-2021-47284] = "fixed-version: Fixed from version 5.13" | ||
805 | |||
806 | CVE_STATUS[CVE-2021-47286] = "fixed-version: Fixed from version 5.14" | ||
807 | |||
808 | CVE_STATUS[CVE-2021-47287] = "fixed-version: Fixed from version 5.14" | ||
809 | |||
810 | CVE_STATUS[CVE-2021-47288] = "fixed-version: Fixed from version 5.14" | ||
811 | |||
812 | CVE_STATUS[CVE-2021-47289] = "fixed-version: Fixed from version 5.14" | ||
813 | |||
814 | CVE_STATUS[CVE-2021-47290] = "fixed-version: Fixed from version 5.14" | ||
815 | |||
816 | CVE_STATUS[CVE-2021-47291] = "fixed-version: Fixed from version 5.14" | ||
817 | |||
818 | CVE_STATUS[CVE-2021-47292] = "fixed-version: Fixed from version 5.14" | ||
819 | |||
820 | CVE_STATUS[CVE-2021-47293] = "fixed-version: Fixed from version 5.14" | ||
821 | |||
822 | CVE_STATUS[CVE-2021-47294] = "fixed-version: Fixed from version 5.14" | ||
823 | |||
824 | CVE_STATUS[CVE-2021-47295] = "fixed-version: Fixed from version 5.14" | ||
825 | |||
826 | CVE_STATUS[CVE-2021-47296] = "fixed-version: Fixed from version 5.14" | ||
827 | |||
828 | CVE_STATUS[CVE-2021-47297] = "fixed-version: Fixed from version 5.14" | ||
829 | |||
830 | CVE_STATUS[CVE-2021-47298] = "fixed-version: Fixed from version 5.14" | ||
831 | |||
832 | CVE_STATUS[CVE-2021-47299] = "fixed-version: Fixed from version 5.14" | ||
833 | |||
834 | CVE_STATUS[CVE-2021-47300] = "fixed-version: Fixed from version 5.14" | ||
835 | |||
836 | CVE_STATUS[CVE-2021-47301] = "fixed-version: Fixed from version 5.14" | ||
837 | |||
838 | CVE_STATUS[CVE-2021-47302] = "fixed-version: Fixed from version 5.14" | ||
839 | |||
840 | CVE_STATUS[CVE-2021-47303] = "fixed-version: Fixed from version 5.14" | ||
841 | |||
842 | CVE_STATUS[CVE-2021-47304] = "fixed-version: Fixed from version 5.14" | ||
843 | |||
844 | CVE_STATUS[CVE-2021-47305] = "fixed-version: Fixed from version 5.14" | ||
845 | |||
846 | CVE_STATUS[CVE-2021-47306] = "fixed-version: Fixed from version 5.14" | ||
847 | |||
848 | CVE_STATUS[CVE-2021-47307] = "fixed-version: Fixed from version 5.14" | ||
849 | |||
850 | CVE_STATUS[CVE-2021-47308] = "fixed-version: Fixed from version 5.14" | ||
851 | |||
852 | CVE_STATUS[CVE-2021-47309] = "fixed-version: Fixed from version 5.14" | ||
853 | |||
854 | CVE_STATUS[CVE-2021-47310] = "fixed-version: Fixed from version 5.14" | ||
855 | |||
856 | CVE_STATUS[CVE-2021-47311] = "fixed-version: Fixed from version 5.14" | ||
857 | |||
858 | CVE_STATUS[CVE-2021-47312] = "fixed-version: Fixed from version 5.13.5" | ||
859 | |||
860 | CVE_STATUS[CVE-2021-47313] = "fixed-version: Fixed from version 5.14" | ||
861 | |||
862 | CVE_STATUS[CVE-2021-47314] = "fixed-version: Fixed from version 5.14" | ||
863 | |||
864 | CVE_STATUS[CVE-2021-47315] = "fixed-version: Fixed from version 5.14" | ||
865 | |||
866 | CVE_STATUS[CVE-2021-47316] = "fixed-version: Fixed from version 5.14" | ||
867 | |||
868 | CVE_STATUS[CVE-2021-47317] = "fixed-version: Fixed from version 5.14" | ||
869 | |||
870 | CVE_STATUS[CVE-2021-47318] = "fixed-version: Fixed from version 5.14" | ||
871 | |||
872 | CVE_STATUS[CVE-2021-47319] = "fixed-version: Fixed from version 5.14" | ||
873 | |||
874 | CVE_STATUS[CVE-2021-47320] = "fixed-version: Fixed from version 5.14" | ||
875 | |||
876 | CVE_STATUS[CVE-2021-47321] = "fixed-version: Fixed from version 5.14" | ||
877 | |||
878 | CVE_STATUS[CVE-2021-47322] = "fixed-version: Fixed from version 5.14" | ||
879 | |||
880 | CVE_STATUS[CVE-2021-47323] = "fixed-version: Fixed from version 5.14" | ||
881 | |||
882 | CVE_STATUS[CVE-2021-47324] = "fixed-version: Fixed from version 5.14" | ||
883 | |||
884 | CVE_STATUS[CVE-2021-47325] = "fixed-version: Fixed from version 5.14" | ||
885 | |||
886 | CVE_STATUS[CVE-2021-47327] = "fixed-version: Fixed from version 5.14" | ||
887 | |||
888 | CVE_STATUS[CVE-2021-47328] = "fixed-version: Fixed from version 5.14" | ||
889 | |||
890 | CVE_STATUS[CVE-2021-47329] = "fixed-version: Fixed from version 5.14" | ||
891 | |||
892 | CVE_STATUS[CVE-2021-47330] = "fixed-version: Fixed from version 5.14" | ||
893 | |||
894 | CVE_STATUS[CVE-2021-47331] = "fixed-version: Fixed from version 5.14" | ||
895 | |||
896 | CVE_STATUS[CVE-2021-47332] = "fixed-version: Fixed from version 5.14" | ||
897 | |||
898 | CVE_STATUS[CVE-2021-47333] = "fixed-version: Fixed from version 5.14" | ||
899 | |||
900 | CVE_STATUS[CVE-2021-47334] = "fixed-version: Fixed from version 5.14" | ||
901 | |||
902 | CVE_STATUS[CVE-2021-47335] = "fixed-version: Fixed from version 5.14" | ||
903 | |||
904 | CVE_STATUS[CVE-2021-47336] = "fixed-version: Fixed from version 5.14" | ||
905 | |||
906 | CVE_STATUS[CVE-2021-47337] = "fixed-version: Fixed from version 5.14" | ||
907 | |||
908 | CVE_STATUS[CVE-2021-47338] = "fixed-version: Fixed from version 5.14" | ||
909 | |||
910 | CVE_STATUS[CVE-2021-47339] = "fixed-version: Fixed from version 5.14" | ||
911 | |||
912 | CVE_STATUS[CVE-2021-47340] = "fixed-version: Fixed from version 5.14" | ||
913 | |||
914 | CVE_STATUS[CVE-2021-47341] = "fixed-version: Fixed from version 5.14" | ||
915 | |||
916 | CVE_STATUS[CVE-2021-47342] = "fixed-version: Fixed from version 5.14" | ||
917 | |||
918 | CVE_STATUS[CVE-2021-47343] = "fixed-version: Fixed from version 5.14" | ||
919 | |||
920 | CVE_STATUS[CVE-2021-47344] = "fixed-version: Fixed from version 5.14" | ||
921 | |||
922 | CVE_STATUS[CVE-2021-47345] = "fixed-version: Fixed from version 5.14" | ||
923 | |||
924 | CVE_STATUS[CVE-2021-47346] = "fixed-version: Fixed from version 5.14" | ||
925 | |||
926 | CVE_STATUS[CVE-2021-47347] = "fixed-version: Fixed from version 5.14" | ||
927 | |||
928 | CVE_STATUS[CVE-2021-47348] = "fixed-version: Fixed from version 5.14" | ||
929 | |||
930 | CVE_STATUS[CVE-2021-47349] = "fixed-version: Fixed from version 5.14" | ||
931 | |||
932 | CVE_STATUS[CVE-2021-47350] = "fixed-version: Fixed from version 5.14" | ||
933 | |||
934 | CVE_STATUS[CVE-2021-47351] = "fixed-version: Fixed from version 5.14" | ||
935 | |||
936 | CVE_STATUS[CVE-2021-47352] = "fixed-version: Fixed from version 5.14" | ||
937 | |||
938 | CVE_STATUS[CVE-2021-47353] = "fixed-version: Fixed from version 5.14" | ||
939 | |||
940 | CVE_STATUS[CVE-2021-47354] = "fixed-version: Fixed from version 5.14" | ||
941 | |||
942 | CVE_STATUS[CVE-2021-47355] = "fixed-version: Fixed from version 5.14" | ||
943 | |||
944 | CVE_STATUS[CVE-2021-47356] = "fixed-version: Fixed from version 5.14" | ||
945 | |||
946 | CVE_STATUS[CVE-2021-47357] = "fixed-version: Fixed from version 5.14" | ||
947 | |||
948 | CVE_STATUS[CVE-2021-47358] = "fixed-version: Fixed from version 5.15" | ||
949 | |||
950 | CVE_STATUS[CVE-2021-47359] = "fixed-version: Fixed from version 5.15" | ||
951 | |||
952 | CVE_STATUS[CVE-2021-47360] = "fixed-version: Fixed from version 5.15" | ||
953 | |||
954 | CVE_STATUS[CVE-2021-47361] = "fixed-version: Fixed from version 5.15" | ||
955 | |||
956 | CVE_STATUS[CVE-2021-47362] = "fixed-version: Fixed from version 5.15" | ||
957 | |||
958 | CVE_STATUS[CVE-2021-47363] = "fixed-version: Fixed from version 5.15" | ||
959 | |||
960 | CVE_STATUS[CVE-2021-47364] = "fixed-version: Fixed from version 5.15" | ||
961 | |||
962 | CVE_STATUS[CVE-2021-47365] = "fixed-version: Fixed from version 5.15" | ||
963 | |||
964 | CVE_STATUS[CVE-2021-47366] = "fixed-version: Fixed from version 5.15" | ||
965 | |||
966 | CVE_STATUS[CVE-2021-47367] = "fixed-version: Fixed from version 5.15" | ||
967 | |||
968 | CVE_STATUS[CVE-2021-47368] = "fixed-version: Fixed from version 5.15" | ||
969 | |||
970 | CVE_STATUS[CVE-2021-47369] = "fixed-version: Fixed from version 5.15" | ||
971 | |||
972 | CVE_STATUS[CVE-2021-47370] = "fixed-version: Fixed from version 5.14.9" | ||
973 | |||
974 | CVE_STATUS[CVE-2021-47371] = "fixed-version: Fixed from version 5.15" | ||
975 | |||
976 | CVE_STATUS[CVE-2021-47372] = "fixed-version: Fixed from version 5.15" | ||
977 | |||
978 | CVE_STATUS[CVE-2021-47373] = "fixed-version: Fixed from version 5.15" | ||
979 | |||
980 | CVE_STATUS[CVE-2021-47374] = "fixed-version: Fixed from version 5.15" | ||
981 | |||
982 | CVE_STATUS[CVE-2021-47375] = "fixed-version: Fixed from version 5.15" | ||
983 | |||
984 | CVE_STATUS[CVE-2021-47376] = "fixed-version: Fixed from version 5.15" | ||
985 | |||
986 | CVE_STATUS[CVE-2021-47378] = "fixed-version: Fixed from version 5.15" | ||
987 | |||
988 | CVE_STATUS[CVE-2021-47379] = "fixed-version: Fixed from version 5.15" | ||
989 | |||
990 | CVE_STATUS[CVE-2021-47380] = "fixed-version: Fixed from version 5.15" | ||
991 | |||
992 | CVE_STATUS[CVE-2021-47381] = "fixed-version: Fixed from version 5.15" | ||
993 | |||
994 | CVE_STATUS[CVE-2021-47382] = "fixed-version: Fixed from version 5.15" | ||
995 | |||
996 | CVE_STATUS[CVE-2021-47383] = "fixed-version: Fixed from version 5.15" | ||
997 | |||
998 | CVE_STATUS[CVE-2021-47384] = "fixed-version: Fixed from version 5.15" | ||
999 | |||
1000 | CVE_STATUS[CVE-2021-47385] = "fixed-version: Fixed from version 5.15" | ||
1001 | |||
1002 | CVE_STATUS[CVE-2021-47386] = "fixed-version: Fixed from version 5.15" | ||
1003 | |||
1004 | CVE_STATUS[CVE-2021-47387] = "fixed-version: Fixed from version 5.15" | ||
1005 | |||
1006 | CVE_STATUS[CVE-2021-47388] = "fixed-version: Fixed from version 5.15" | ||
1007 | |||
1008 | CVE_STATUS[CVE-2021-47389] = "fixed-version: Fixed from version 5.15" | ||
1009 | |||
1010 | CVE_STATUS[CVE-2021-47390] = "fixed-version: Fixed from version 5.15" | ||
1011 | |||
1012 | CVE_STATUS[CVE-2021-47391] = "fixed-version: Fixed from version 5.15" | ||
1013 | |||
1014 | CVE_STATUS[CVE-2021-47392] = "fixed-version: Fixed from version 5.15" | ||
1015 | |||
1016 | CVE_STATUS[CVE-2021-47393] = "fixed-version: Fixed from version 5.15" | ||
1017 | |||
1018 | CVE_STATUS[CVE-2021-47394] = "fixed-version: Fixed from version 5.15" | ||
1019 | |||
1020 | CVE_STATUS[CVE-2021-47395] = "fixed-version: Fixed from version 5.15" | ||
1021 | |||
1022 | CVE_STATUS[CVE-2021-47396] = "fixed-version: Fixed from version 5.15" | ||
1023 | |||
1024 | CVE_STATUS[CVE-2021-47397] = "fixed-version: Fixed from version 5.15" | ||
1025 | |||
1026 | CVE_STATUS[CVE-2021-47398] = "fixed-version: Fixed from version 5.15" | ||
1027 | |||
1028 | CVE_STATUS[CVE-2021-47399] = "fixed-version: Fixed from version 5.15" | ||
1029 | |||
1030 | CVE_STATUS[CVE-2021-47400] = "fixed-version: Fixed from version 5.15" | ||
1031 | |||
1032 | CVE_STATUS[CVE-2021-47401] = "fixed-version: Fixed from version 5.15" | ||
1033 | |||
1034 | CVE_STATUS[CVE-2021-47402] = "fixed-version: Fixed from version 5.15" | ||
1035 | |||
1036 | CVE_STATUS[CVE-2021-47403] = "fixed-version: Fixed from version 5.15" | ||
1037 | |||
1038 | CVE_STATUS[CVE-2021-47404] = "fixed-version: Fixed from version 5.15" | ||
1039 | |||
1040 | CVE_STATUS[CVE-2021-47405] = "fixed-version: Fixed from version 5.15" | ||
1041 | |||
1042 | CVE_STATUS[CVE-2021-47406] = "fixed-version: Fixed from version 5.15" | ||
1043 | |||
1044 | CVE_STATUS[CVE-2021-47407] = "fixed-version: Fixed from version 5.15" | ||
1045 | |||
1046 | CVE_STATUS[CVE-2021-47408] = "fixed-version: Fixed from version 5.15" | ||
1047 | |||
1048 | CVE_STATUS[CVE-2021-47409] = "fixed-version: Fixed from version 5.15" | ||
1049 | |||
1050 | CVE_STATUS[CVE-2021-47410] = "fixed-version: Fixed from version 5.15" | ||
1051 | |||
1052 | CVE_STATUS[CVE-2021-47412] = "fixed-version: Fixed from version 5.15" | ||
1053 | |||
1054 | CVE_STATUS[CVE-2021-47413] = "fixed-version: Fixed from version 5.15" | ||
1055 | |||
1056 | CVE_STATUS[CVE-2021-47414] = "fixed-version: Fixed from version 5.15" | ||
1057 | |||
1058 | CVE_STATUS[CVE-2021-47415] = "fixed-version: Fixed from version 5.15" | ||
1059 | |||
1060 | CVE_STATUS[CVE-2021-47416] = "fixed-version: Fixed from version 5.15" | ||
1061 | |||
1062 | CVE_STATUS[CVE-2021-47417] = "fixed-version: Fixed from version 5.15" | ||
1063 | |||
1064 | CVE_STATUS[CVE-2021-47418] = "fixed-version: Fixed from version 5.15" | ||
1065 | |||
1066 | CVE_STATUS[CVE-2021-47419] = "fixed-version: Fixed from version 5.15" | ||
1067 | |||
1068 | CVE_STATUS[CVE-2021-47420] = "fixed-version: Fixed from version 5.15" | ||
1069 | |||
1070 | CVE_STATUS[CVE-2021-47421] = "fixed-version: Fixed from version 5.15" | ||
1071 | |||
1072 | CVE_STATUS[CVE-2021-47422] = "fixed-version: Fixed from version 5.15" | ||
1073 | |||
1074 | CVE_STATUS[CVE-2021-47423] = "fixed-version: Fixed from version 5.15" | ||
1075 | |||
1076 | CVE_STATUS[CVE-2021-47424] = "fixed-version: Fixed from version 5.15" | ||
1077 | |||
1078 | CVE_STATUS[CVE-2021-47425] = "fixed-version: Fixed from version 5.15" | ||
1079 | |||
1080 | CVE_STATUS[CVE-2021-47426] = "fixed-version: Fixed from version 5.15" | ||
1081 | |||
1082 | CVE_STATUS[CVE-2021-47427] = "fixed-version: Fixed from version 5.15" | ||
1083 | |||
1084 | CVE_STATUS[CVE-2021-47428] = "fixed-version: Fixed from version 5.15" | ||
1085 | |||
1086 | CVE_STATUS[CVE-2021-47429] = "fixed-version: Fixed from version 5.15" | ||
1087 | |||
1088 | CVE_STATUS[CVE-2021-47430] = "fixed-version: Fixed from version 5.15" | ||
1089 | |||
1090 | CVE_STATUS[CVE-2021-47431] = "fixed-version: Fixed from version 5.15" | ||
1091 | |||
1092 | CVE_STATUS[CVE-2021-47432] = "fixed-version: Fixed from version 6.7" | ||
1093 | |||
1094 | CVE_STATUS[CVE-2021-47433] = "fixed-version: Fixed from version 5.15" | ||
1095 | |||
1096 | CVE_STATUS[CVE-2021-47434] = "fixed-version: Fixed from version 5.15" | ||
1097 | |||
1098 | CVE_STATUS[CVE-2021-47435] = "fixed-version: Fixed from version 5.15" | ||
1099 | |||
1100 | CVE_STATUS[CVE-2021-47436] = "fixed-version: Fixed from version 5.14.14" | ||
1101 | |||
1102 | CVE_STATUS[CVE-2021-47437] = "fixed-version: Fixed from version 5.15" | ||
1103 | |||
1104 | CVE_STATUS[CVE-2021-47438] = "fixed-version: Fixed from version 5.15" | ||
1105 | |||
1106 | CVE_STATUS[CVE-2021-47439] = "fixed-version: Fixed from version 5.15" | ||
1107 | |||
1108 | CVE_STATUS[CVE-2021-47440] = "fixed-version: Fixed from version 5.15" | ||
1109 | |||
1110 | CVE_STATUS[CVE-2021-47441] = "fixed-version: Fixed from version 5.15" | ||
1111 | |||
1112 | CVE_STATUS[CVE-2021-47442] = "fixed-version: Fixed from version 5.15" | ||
1113 | |||
1114 | CVE_STATUS[CVE-2021-47443] = "fixed-version: Fixed from version 5.15" | ||
1115 | |||
1116 | CVE_STATUS[CVE-2021-47444] = "fixed-version: Fixed from version 5.15" | ||
1117 | |||
1118 | CVE_STATUS[CVE-2021-47445] = "fixed-version: Fixed from version 5.15" | ||
1119 | |||
1120 | CVE_STATUS[CVE-2021-47446] = "fixed-version: Fixed from version 5.15" | ||
1121 | |||
1122 | CVE_STATUS[CVE-2021-47447] = "fixed-version: Fixed from version 5.15" | ||
1123 | |||
1124 | CVE_STATUS[CVE-2021-47448] = "fixed-version: Fixed from version 5.15" | ||
1125 | |||
1126 | CVE_STATUS[CVE-2021-47449] = "fixed-version: Fixed from version 5.14.14" | ||
1127 | |||
1128 | CVE_STATUS[CVE-2021-47450] = "fixed-version: Fixed from version 5.15" | ||
1129 | |||
1130 | CVE_STATUS[CVE-2021-47451] = "fixed-version: Fixed from version 5.15" | ||
1131 | |||
1132 | CVE_STATUS[CVE-2021-47452] = "fixed-version: Fixed from version 5.15" | ||
1133 | |||
1134 | CVE_STATUS[CVE-2021-47453] = "fixed-version: Fixed from version 5.15" | ||
1135 | |||
1136 | CVE_STATUS[CVE-2021-47454] = "fixed-version: Fixed from version 5.15" | ||
1137 | |||
1138 | CVE_STATUS[CVE-2021-47455] = "fixed-version: Fixed from version 5.15" | ||
1139 | |||
1140 | CVE_STATUS[CVE-2021-47456] = "fixed-version: Fixed from version 5.15" | ||
1141 | |||
1142 | CVE_STATUS[CVE-2021-47457] = "fixed-version: Fixed from version 5.15" | ||
1143 | |||
1144 | CVE_STATUS[CVE-2021-47458] = "fixed-version: Fixed from version 5.15" | ||
1145 | |||
1146 | CVE_STATUS[CVE-2021-47459] = "fixed-version: Fixed from version 5.15" | ||
1147 | |||
1148 | CVE_STATUS[CVE-2021-47460] = "fixed-version: Fixed from version 5.15" | ||
1149 | |||
1150 | CVE_STATUS[CVE-2021-47461] = "fixed-version: Fixed from version 5.15" | ||
1151 | |||
1152 | CVE_STATUS[CVE-2021-47462] = "fixed-version: Fixed from version 5.15" | ||
1153 | |||
1154 | CVE_STATUS[CVE-2021-47463] = "fixed-version: Fixed from version 5.15" | ||
1155 | |||
1156 | CVE_STATUS[CVE-2021-47464] = "fixed-version: Fixed from version 5.15" | ||
1157 | |||
1158 | CVE_STATUS[CVE-2021-47465] = "fixed-version: Fixed from version 5.15" | ||
1159 | |||
1160 | CVE_STATUS[CVE-2021-47466] = "fixed-version: Fixed from version 5.15" | ||
1161 | |||
1162 | CVE_STATUS[CVE-2021-47467] = "fixed-version: Fixed from version 5.15" | ||
1163 | |||
1164 | CVE_STATUS[CVE-2021-47468] = "fixed-version: Fixed from version 5.15" | ||
1165 | |||
1166 | CVE_STATUS[CVE-2021-47470] = "fixed-version: Fixed from version 5.15" | ||
1167 | |||
1168 | CVE_STATUS[CVE-2021-47471] = "fixed-version: Fixed from version 5.15" | ||
1169 | |||
1170 | CVE_STATUS[CVE-2021-47473] = "fixed-version: Fixed from version 5.15" | ||
1171 | |||
1172 | CVE_STATUS[CVE-2021-47474] = "fixed-version: Fixed from version 5.16" | ||
1173 | |||
1174 | CVE_STATUS[CVE-2021-47475] = "fixed-version: Fixed from version 5.16" | ||
1175 | |||
1176 | CVE_STATUS[CVE-2021-47476] = "fixed-version: Fixed from version 5.16" | ||
1177 | |||
1178 | CVE_STATUS[CVE-2021-47477] = "fixed-version: Fixed from version 5.16" | ||
1179 | |||
1180 | CVE_STATUS[CVE-2021-47478] = "fixed-version: Fixed from version 5.16" | ||
1181 | |||
1182 | CVE_STATUS[CVE-2021-47479] = "fixed-version: Fixed from version 5.16" | ||
1183 | |||
1184 | CVE_STATUS[CVE-2021-47480] = "fixed-version: Fixed from version 5.15" | ||
1185 | |||
1186 | CVE_STATUS[CVE-2021-47481] = "fixed-version: Fixed from version 5.15" | ||
1187 | |||
1188 | CVE_STATUS[CVE-2021-47482] = "fixed-version: Fixed from version 5.15" | ||
1189 | |||
1190 | CVE_STATUS[CVE-2021-47483] = "fixed-version: Fixed from version 5.15" | ||
1191 | |||
1192 | CVE_STATUS[CVE-2021-47484] = "fixed-version: Fixed from version 5.15" | ||
1193 | |||
1194 | CVE_STATUS[CVE-2021-47485] = "fixed-version: Fixed from version 5.15" | ||
1195 | |||
1196 | CVE_STATUS[CVE-2021-47486] = "fixed-version: Fixed from version 5.15" | ||
1197 | |||
1198 | CVE_STATUS[CVE-2021-47489] = "fixed-version: Fixed from version 5.15" | ||
1199 | |||
1200 | CVE_STATUS[CVE-2021-47490] = "fixed-version: Fixed from version 5.15" | ||
1201 | |||
1202 | CVE_STATUS[CVE-2021-47491] = "fixed-version: Fixed from version 5.15" | ||
1203 | |||
1204 | CVE_STATUS[CVE-2021-47492] = "fixed-version: Fixed from version 5.15" | ||
1205 | |||
1206 | CVE_STATUS[CVE-2021-47493] = "fixed-version: Fixed from version 5.15" | ||
1207 | |||
1208 | CVE_STATUS[CVE-2021-47494] = "fixed-version: Fixed from version 5.15" | ||
1209 | |||
1210 | CVE_STATUS[CVE-2021-47495] = "fixed-version: Fixed from version 5.15" | ||
1211 | |||
1212 | CVE_STATUS[CVE-2021-47496] = "fixed-version: Fixed from version 5.15" | ||
1213 | |||
1214 | CVE_STATUS[CVE-2021-47497] = "fixed-version: Fixed from version 5.15" | ||
1215 | |||
1216 | CVE_STATUS[CVE-2021-47498] = "fixed-version: Fixed from version 5.15" | ||
1217 | |||
1218 | CVE_STATUS[CVE-2021-47499] = "fixed-version: Fixed from version 5.16" | ||
1219 | |||
1220 | CVE_STATUS[CVE-2021-47500] = "fixed-version: Fixed from version 5.16" | ||
1221 | |||
1222 | CVE_STATUS[CVE-2021-47501] = "fixed-version: Fixed from version 5.16" | ||
1223 | |||
1224 | CVE_STATUS[CVE-2021-47502] = "fixed-version: Fixed from version 5.16" | ||
1225 | |||
1226 | CVE_STATUS[CVE-2021-47503] = "fixed-version: Fixed from version 5.16" | ||
1227 | |||
1228 | CVE_STATUS[CVE-2021-47504] = "fixed-version: Fixed from version 5.16" | ||
1229 | |||
1230 | CVE_STATUS[CVE-2021-47505] = "fixed-version: Fixed from version 5.16" | ||
1231 | |||
1232 | CVE_STATUS[CVE-2021-47506] = "fixed-version: Fixed from version 5.16" | ||
1233 | |||
1234 | CVE_STATUS[CVE-2021-47507] = "fixed-version: Fixed from version 5.16" | ||
1235 | |||
1236 | CVE_STATUS[CVE-2021-47508] = "fixed-version: Fixed from version 5.16" | ||
1237 | |||
1238 | CVE_STATUS[CVE-2021-47509] = "fixed-version: Fixed from version 5.16" | ||
1239 | |||
1240 | CVE_STATUS[CVE-2021-47510] = "fixed-version: Fixed from version 5.16" | ||
1241 | |||
1242 | CVE_STATUS[CVE-2021-47511] = "fixed-version: Fixed from version 5.16" | ||
1243 | |||
1244 | CVE_STATUS[CVE-2021-47512] = "fixed-version: Fixed from version 5.16" | ||
1245 | |||
1246 | CVE_STATUS[CVE-2021-47513] = "fixed-version: Fixed from version 5.16" | ||
1247 | |||
1248 | CVE_STATUS[CVE-2021-47514] = "fixed-version: Fixed from version 5.16" | ||
1249 | |||
1250 | CVE_STATUS[CVE-2021-47515] = "fixed-version: Fixed from version 5.16" | ||
1251 | |||
1252 | CVE_STATUS[CVE-2021-47516] = "fixed-version: Fixed from version 5.16" | ||
1253 | |||
1254 | CVE_STATUS[CVE-2021-47517] = "fixed-version: Fixed from version 5.16" | ||
1255 | |||
1256 | CVE_STATUS[CVE-2021-47518] = "fixed-version: Fixed from version 5.16" | ||
1257 | |||
1258 | CVE_STATUS[CVE-2021-47519] = "fixed-version: Fixed from version 5.16" | ||
1259 | |||
1260 | CVE_STATUS[CVE-2021-47520] = "fixed-version: Fixed from version 5.16" | ||
1261 | |||
1262 | CVE_STATUS[CVE-2021-47521] = "fixed-version: Fixed from version 5.16" | ||
1263 | |||
1264 | CVE_STATUS[CVE-2021-47522] = "fixed-version: Fixed from version 5.16" | ||
1265 | |||
1266 | CVE_STATUS[CVE-2021-47523] = "fixed-version: Fixed from version 5.16" | ||
1267 | |||
1268 | CVE_STATUS[CVE-2021-47524] = "fixed-version: Fixed from version 5.16" | ||
1269 | |||
1270 | CVE_STATUS[CVE-2021-47525] = "fixed-version: Fixed from version 5.16" | ||
1271 | |||
1272 | CVE_STATUS[CVE-2021-47526] = "fixed-version: Fixed from version 5.16" | ||
1273 | |||
1274 | CVE_STATUS[CVE-2021-47527] = "fixed-version: Fixed from version 5.16" | ||
1275 | |||
1276 | CVE_STATUS[CVE-2021-47528] = "fixed-version: Fixed from version 5.16" | ||
1277 | |||
1278 | CVE_STATUS[CVE-2021-47529] = "fixed-version: Fixed from version 5.16" | ||
1279 | |||
1280 | CVE_STATUS[CVE-2021-47530] = "fixed-version: Fixed from version 5.16" | ||
1281 | |||
1282 | CVE_STATUS[CVE-2021-47531] = "fixed-version: Fixed from version 5.16" | ||
1283 | |||
1284 | CVE_STATUS[CVE-2021-47532] = "fixed-version: Fixed from version 5.16" | ||
1285 | |||
1286 | CVE_STATUS[CVE-2021-47533] = "fixed-version: Fixed from version 5.16" | ||
1287 | |||
1288 | CVE_STATUS[CVE-2021-47534] = "fixed-version: Fixed from version 5.16" | ||
1289 | |||
1290 | CVE_STATUS[CVE-2021-47535] = "fixed-version: Fixed from version 5.16" | ||
1291 | |||
1292 | CVE_STATUS[CVE-2021-47536] = "fixed-version: Fixed from version 5.16" | ||
1293 | |||
1294 | CVE_STATUS[CVE-2021-47537] = "fixed-version: Fixed from version 5.16" | ||
1295 | |||
1296 | CVE_STATUS[CVE-2021-47538] = "fixed-version: Fixed from version 5.16" | ||
1297 | |||
1298 | CVE_STATUS[CVE-2021-47539] = "fixed-version: Fixed from version 5.16" | ||
1299 | |||
1300 | CVE_STATUS[CVE-2021-47540] = "fixed-version: Fixed from version 5.16" | ||
1301 | |||
1302 | CVE_STATUS[CVE-2021-47541] = "fixed-version: Fixed from version 5.16" | ||
1303 | |||
1304 | CVE_STATUS[CVE-2021-47542] = "fixed-version: Fixed from version 5.16" | ||
1305 | |||
1306 | CVE_STATUS[CVE-2021-47544] = "fixed-version: Fixed from version 5.16" | ||
1307 | |||
1308 | CVE_STATUS[CVE-2021-47546] = "fixed-version: Fixed from version 5.16" | ||
1309 | |||
1310 | CVE_STATUS[CVE-2021-47547] = "fixed-version: Fixed from version 5.16" | ||
1311 | |||
1312 | CVE_STATUS[CVE-2021-47548] = "fixed-version: Fixed from version 5.16" | ||
1313 | |||
1314 | CVE_STATUS[CVE-2021-47549] = "fixed-version: Fixed from version 5.16" | ||
1315 | |||
1316 | CVE_STATUS[CVE-2021-47550] = "fixed-version: Fixed from version 5.16" | ||
1317 | |||
1318 | CVE_STATUS[CVE-2021-47551] = "fixed-version: Fixed from version 5.16" | ||
1319 | |||
1320 | CVE_STATUS[CVE-2021-47552] = "fixed-version: Fixed from version 5.16" | ||
1321 | |||
1322 | CVE_STATUS[CVE-2021-47553] = "fixed-version: Fixed from version 5.16" | ||
1323 | |||
1324 | CVE_STATUS[CVE-2021-47554] = "fixed-version: Fixed from version 5.16" | ||
1325 | |||
1326 | CVE_STATUS[CVE-2021-47555] = "fixed-version: Fixed from version 5.15.6" | ||
1327 | |||
1328 | CVE_STATUS[CVE-2021-47556] = "fixed-version: Fixed from version 5.16" | ||
1329 | |||
1330 | CVE_STATUS[CVE-2021-47557] = "fixed-version: Fixed from version 5.16" | ||
1331 | |||
1332 | CVE_STATUS[CVE-2021-47558] = "fixed-version: Fixed from version 5.16" | ||
1333 | |||
1334 | CVE_STATUS[CVE-2021-47559] = "fixed-version: Fixed from version 5.16" | ||
1335 | |||
1336 | CVE_STATUS[CVE-2021-47560] = "fixed-version: Fixed from version 5.16" | ||
1337 | |||
1338 | CVE_STATUS[CVE-2021-47561] = "fixed-version: Fixed from version 5.16" | ||
1339 | |||
1340 | CVE_STATUS[CVE-2021-47562] = "fixed-version: Fixed from version 5.16" | ||
1341 | |||
1342 | CVE_STATUS[CVE-2021-47563] = "fixed-version: Fixed from version 5.16" | ||
1343 | |||
1344 | CVE_STATUS[CVE-2021-47564] = "fixed-version: Fixed from version 5.16" | ||
1345 | |||
1346 | CVE_STATUS[CVE-2021-47565] = "fixed-version: Fixed from version 5.16" | ||
1347 | |||
1348 | CVE_STATUS[CVE-2021-47566] = "fixed-version: Fixed from version 5.16" | ||
1349 | |||
1350 | CVE_STATUS[CVE-2021-47567] = "fixed-version: Fixed from version 5.16" | ||
1351 | |||
1352 | CVE_STATUS[CVE-2021-47568] = "fixed-version: Fixed from version 5.16" | ||
1353 | |||
1354 | CVE_STATUS[CVE-2021-47569] = "fixed-version: Fixed from version 5.16" | ||
1355 | |||
1356 | CVE_STATUS[CVE-2021-47570] = "fixed-version: Fixed from version 5.16" | ||
1357 | |||
1358 | CVE_STATUS[CVE-2021-47571] = "fixed-version: Fixed from version 5.16" | ||
1359 | |||
1360 | CVE_STATUS[CVE-2021-47572] = "fixed-version: Fixed from version 5.16" | ||
1361 | |||
1362 | CVE_STATUS[CVE-2021-47576] = "fixed-version: Fixed from version 5.16" | ||
1363 | |||
1364 | CVE_STATUS[CVE-2021-47577] = "fixed-version: Fixed from version 5.16" | ||
1365 | |||
1366 | CVE_STATUS[CVE-2021-47578] = "fixed-version: Fixed from version 5.16" | ||
1367 | |||
1368 | CVE_STATUS[CVE-2021-47579] = "fixed-version: Fixed from version 5.16" | ||
1369 | |||
1370 | CVE_STATUS[CVE-2021-47580] = "fixed-version: Fixed from version 5.16" | ||
1371 | |||
1372 | CVE_STATUS[CVE-2021-47582] = "fixed-version: Fixed from version 5.16" | ||
1373 | |||
1374 | CVE_STATUS[CVE-2021-47583] = "fixed-version: Fixed from version 5.16" | ||
1375 | |||
1376 | CVE_STATUS[CVE-2021-47584] = "fixed-version: Fixed from version 5.16" | ||
1377 | |||
1378 | CVE_STATUS[CVE-2021-47585] = "fixed-version: Fixed from version 5.16" | ||
1379 | |||
1380 | CVE_STATUS[CVE-2021-47586] = "fixed-version: Fixed from version 5.16" | ||
1381 | |||
1382 | CVE_STATUS[CVE-2021-47587] = "fixed-version: Fixed from version 5.16" | ||
1383 | |||
1384 | CVE_STATUS[CVE-2021-47588] = "fixed-version: Fixed from version 5.16" | ||
1385 | |||
1386 | CVE_STATUS[CVE-2021-47589] = "fixed-version: Fixed from version 5.16" | ||
1387 | |||
1388 | CVE_STATUS[CVE-2021-47590] = "fixed-version: Fixed from version 5.16" | ||
1389 | |||
1390 | CVE_STATUS[CVE-2021-47591] = "fixed-version: Fixed from version 5.16" | ||
1391 | |||
1392 | CVE_STATUS[CVE-2021-47592] = "fixed-version: Fixed from version 5.16" | ||
1393 | |||
1394 | CVE_STATUS[CVE-2021-47593] = "fixed-version: Fixed from version 5.16" | ||
1395 | |||
1396 | CVE_STATUS[CVE-2021-47594] = "fixed-version: Fixed from version 5.16" | ||
1397 | |||
1398 | CVE_STATUS[CVE-2021-47595] = "fixed-version: Fixed from version 5.15.11" | ||
1399 | |||
1400 | CVE_STATUS[CVE-2021-47596] = "fixed-version: Fixed from version 5.16" | ||
1401 | |||
1402 | CVE_STATUS[CVE-2021-47597] = "fixed-version: Fixed from version 5.16" | ||
1403 | |||
1404 | CVE_STATUS[CVE-2021-47598] = "fixed-version: Fixed from version 5.16" | ||
1405 | |||
1406 | CVE_STATUS[CVE-2021-47599] = "fixed-version: Fixed from version 5.16" | ||
1407 | |||
1408 | CVE_STATUS[CVE-2021-47600] = "fixed-version: Fixed from version 5.16" | ||
1409 | |||
1410 | CVE_STATUS[CVE-2021-47601] = "fixed-version: Fixed from version 5.16" | ||
1411 | |||
1412 | CVE_STATUS[CVE-2021-47602] = "fixed-version: Fixed from version 5.16" | ||
1413 | |||
1414 | CVE_STATUS[CVE-2021-47603] = "fixed-version: Fixed from version 5.16" | ||
1415 | |||
1416 | CVE_STATUS[CVE-2021-47604] = "fixed-version: Fixed from version 5.16" | ||
1417 | |||
1418 | CVE_STATUS[CVE-2021-47605] = "fixed-version: Fixed from version 5.16" | ||
1419 | |||
1420 | CVE_STATUS[CVE-2021-47606] = "fixed-version: Fixed from version 5.16" | ||
1421 | |||
1422 | CVE_STATUS[CVE-2021-47607] = "fixed-version: Fixed from version 5.16" | ||
1423 | |||
1424 | CVE_STATUS[CVE-2021-47608] = "fixed-version: Fixed from version 5.16" | ||
1425 | |||
1426 | CVE_STATUS[CVE-2021-47609] = "fixed-version: Fixed from version 5.16" | ||
1427 | |||
1428 | CVE_STATUS[CVE-2021-47610] = "fixed-version: Fixed from version 5.16" | ||
1429 | |||
1430 | CVE_STATUS[CVE-2021-47611] = "fixed-version: Fixed from version 5.16" | ||
1431 | |||
1432 | CVE_STATUS[CVE-2021-47612] = "fixed-version: Fixed from version 5.16" | ||
1433 | |||
1434 | CVE_STATUS[CVE-2021-47613] = "fixed-version: Fixed from version 5.16" | ||
1435 | |||
1436 | CVE_STATUS[CVE-2021-47614] = "fixed-version: Fixed from version 5.16" | ||
1437 | |||
1438 | CVE_STATUS[CVE-2021-47616] = "fixed-version: Fixed from version 5.16" | ||
1439 | |||
1440 | CVE_STATUS[CVE-2021-47617] = "fixed-version: Fixed from version 5.17" | ||
1441 | |||
1442 | CVE_STATUS[CVE-2021-47618] = "fixed-version: Fixed from version 5.17" | ||
1443 | |||
1444 | CVE_STATUS[CVE-2021-47619] = "fixed-version: Fixed from version 5.17" | ||
1445 | |||
1446 | CVE_STATUS[CVE-2021-47620] = "fixed-version: Fixed from version 5.17" | ||
1447 | |||
1448 | CVE_STATUS[CVE-2021-47622] = "fixed-version: Fixed from version 5.17" | ||
1449 | |||
1450 | CVE_STATUS[CVE-2021-47623] = "fixed-version: Fixed from version 5.17" | ||
1451 | |||
1452 | CVE_STATUS[CVE-2021-47624] = "fixed-version: Fixed from version 5.17" | ||
1453 | |||
1454 | CVE_STATUS[CVE-2021-47631] = "fixed-version: Fixed from version 5.18" | ||
1455 | |||
1456 | CVE_STATUS[CVE-2021-47632] = "fixed-version: Fixed from version 5.18" | ||
1457 | |||
1458 | CVE_STATUS[CVE-2021-47633] = "fixed-version: Fixed from version 5.18" | ||
1459 | |||
1460 | CVE_STATUS[CVE-2021-47634] = "fixed-version: Fixed from version 5.18" | ||
1461 | |||
1462 | CVE_STATUS[CVE-2021-47635] = "fixed-version: Fixed from version 5.18" | ||
1463 | |||
1464 | CVE_STATUS[CVE-2021-47636] = "fixed-version: Fixed from version 5.18" | ||
1465 | |||
1466 | CVE_STATUS[CVE-2021-47637] = "fixed-version: Fixed from version 5.18" | ||
1467 | |||
1468 | CVE_STATUS[CVE-2021-47638] = "fixed-version: Fixed from version 5.18" | ||
1469 | |||
1470 | CVE_STATUS[CVE-2021-47639] = "fixed-version: Fixed from version 5.18" | ||
1471 | |||
1472 | CVE_STATUS[CVE-2021-47640] = "fixed-version: Fixed from version 5.18" | ||
1473 | |||
1474 | CVE_STATUS[CVE-2021-47641] = "fixed-version: Fixed from version 5.18" | ||
1475 | |||
1476 | CVE_STATUS[CVE-2021-47642] = "fixed-version: Fixed from version 5.18" | ||
1477 | |||
1478 | CVE_STATUS[CVE-2021-47643] = "fixed-version: Fixed from version 5.18" | ||
1479 | |||
1480 | CVE_STATUS[CVE-2021-47644] = "fixed-version: Fixed from version 5.18" | ||
1481 | |||
1482 | CVE_STATUS[CVE-2021-47645] = "fixed-version: Fixed from version 5.18" | ||
1483 | |||
1484 | CVE_STATUS[CVE-2021-47646] = "fixed-version: Fixed from version 5.18" | ||
1485 | |||
1486 | CVE_STATUS[CVE-2021-47647] = "fixed-version: Fixed from version 5.18" | ||
1487 | |||
1488 | CVE_STATUS[CVE-2021-47648] = "fixed-version: Fixed from version 5.18" | ||
1489 | |||
1490 | CVE_STATUS[CVE-2021-47649] = "fixed-version: Fixed from version 5.18" | ||
1491 | |||
1492 | CVE_STATUS[CVE-2021-47650] = "fixed-version: Fixed from version 5.18" | ||
1493 | |||
1494 | CVE_STATUS[CVE-2021-47651] = "fixed-version: Fixed from version 5.18" | ||
1495 | |||
1496 | CVE_STATUS[CVE-2021-47652] = "fixed-version: Fixed from version 5.18" | ||
1497 | |||
1498 | CVE_STATUS[CVE-2021-47653] = "fixed-version: Fixed from version 5.18" | ||
1499 | |||
1500 | CVE_STATUS[CVE-2021-47654] = "fixed-version: Fixed from version 5.18" | ||
1501 | |||
1502 | CVE_STATUS[CVE-2021-47655] = "fixed-version: Fixed from version 5.18" | ||
1503 | |||
1504 | CVE_STATUS[CVE-2021-47656] = "fixed-version: Fixed from version 5.18" | ||
1505 | |||
1506 | CVE_STATUS[CVE-2021-47657] = "fixed-version: Fixed from version 5.18" | ||
1507 | |||
1508 | CVE_STATUS[CVE-2021-47658] = "fixed-version: Fixed from version 5.17" | ||
1509 | |||
1510 | CVE_STATUS[CVE-2021-47659] = "fixed-version: Fixed from version 5.19" | ||
1511 | |||
1512 | CVE_STATUS[CVE-2021-47660] = "fixed-version: Fixed from version 5.19" | ||
1513 | |||
1514 | CVE_STATUS[CVE-2021-47668] = "fixed-version: Fixed from version 5.11" | ||
1515 | |||
1516 | CVE_STATUS[CVE-2021-47669] = "fixed-version: Fixed from version 5.11" | ||
1517 | |||
1518 | CVE_STATUS[CVE-2021-47670] = "fixed-version: Fixed from version 5.11" | ||
1519 | |||
1520 | CVE_STATUS[CVE-2021-47671] = "fixed-version: Fixed from version 5.16" | ||
1521 | |||
1522 | CVE_STATUS[CVE-2021-4439] = "fixed-version: Fixed from version 5.15" | ||
1523 | |||
1524 | CVE_STATUS[CVE-2021-4440] = "fixed-version: Fixed from version 5.10.218" | ||
1525 | |||
1526 | CVE_STATUS[CVE-2021-4441] = "fixed-version: Fixed from version 5.17" | ||
1527 | |||
1528 | CVE_STATUS[CVE-2021-4442] = "fixed-version: Fixed from version 5.12" | ||
1529 | |||
1530 | CVE_STATUS[CVE-2021-4453] = "fixed-version: Fixed from version 5.16" | ||
1531 | |||
1532 | CVE_STATUS[CVE-2021-4454] = "fixed-version: Fixed from version 6.2" | ||
1533 | |||
1534 | CVE_STATUS[CVE-2022-21546] = "fixed-version: Fixed from version 5.19" | ||
1535 | |||
1536 | # CVE-2022-26365 has no known resolution | ||
1537 | |||
1538 | # CVE-2022-33740 has no known resolution | ||
1539 | |||
1540 | # CVE-2022-33741 has no known resolution | ||
1541 | |||
1542 | # CVE-2022-33742 has no known resolution | ||
1543 | |||
1544 | # CVE-2022-33743 has no known resolution | ||
1545 | |||
1546 | # CVE-2022-33744 has no known resolution | ||
1547 | |||
1548 | # CVE-2022-3643 has no known resolution | ||
1549 | |||
1550 | # CVE-2022-42328 has no known resolution | ||
1551 | |||
1552 | # CVE-2022-42329 has no known resolution | ||
1553 | |||
1554 | CVE_STATUS[CVE-2022-48626] = "fixed-version: Fixed from version 5.17" | ||
1555 | |||
1556 | CVE_STATUS[CVE-2022-48627] = "fixed-version: Fixed from version 5.19" | ||
1557 | |||
1558 | CVE_STATUS[CVE-2022-48628] = "fixed-version: Fixed from version 6.6" | ||
1559 | |||
1560 | CVE_STATUS[CVE-2022-48629] = "fixed-version: Fixed from version 5.17" | ||
1561 | |||
1562 | CVE_STATUS[CVE-2022-48630] = "fixed-version: Fixed from version 5.18" | ||
1563 | |||
1564 | CVE_STATUS[CVE-2022-48631] = "fixed-version: Fixed from version 6.0" | ||
1565 | |||
1566 | CVE_STATUS[CVE-2022-48632] = "fixed-version: Fixed from version 6.0" | ||
1567 | |||
1568 | CVE_STATUS[CVE-2022-48633] = "fixed-version: Fixed from version 6.0" | ||
1569 | |||
1570 | CVE_STATUS[CVE-2022-48634] = "fixed-version: Fixed from version 6.0" | ||
1571 | |||
1572 | CVE_STATUS[CVE-2022-48635] = "fixed-version: Fixed from version 6.0" | ||
1573 | |||
1574 | CVE_STATUS[CVE-2022-48636] = "fixed-version: Fixed from version 6.0" | ||
1575 | |||
1576 | CVE_STATUS[CVE-2022-48637] = "fixed-version: Fixed from version 6.0" | ||
1577 | |||
1578 | CVE_STATUS[CVE-2022-48638] = "fixed-version: Fixed from version 6.0" | ||
1579 | |||
1580 | CVE_STATUS[CVE-2022-48639] = "fixed-version: Fixed from version 6.0" | ||
1581 | |||
1582 | CVE_STATUS[CVE-2022-48640] = "fixed-version: Fixed from version 6.0" | ||
1583 | |||
1584 | CVE_STATUS[CVE-2022-48641] = "fixed-version: Fixed from version 5.19.12" | ||
1585 | |||
1586 | CVE_STATUS[CVE-2022-48642] = "fixed-version: Fixed from version 6.0" | ||
1587 | |||
1588 | CVE_STATUS[CVE-2022-48643] = "fixed-version: Fixed from version 5.19.12" | ||
1589 | |||
1590 | CVE_STATUS[CVE-2022-48644] = "fixed-version: Fixed from version 6.0" | ||
1591 | |||
1592 | CVE_STATUS[CVE-2022-48645] = "fixed-version: Fixed from version 6.0" | ||
1593 | |||
1594 | CVE_STATUS[CVE-2022-48646] = "fixed-version: Fixed from version 6.0" | ||
1595 | |||
1596 | CVE_STATUS[CVE-2022-48647] = "fixed-version: Fixed from version 6.0" | ||
1597 | |||
1598 | CVE_STATUS[CVE-2022-48648] = "fixed-version: Fixed from version 6.0" | ||
1599 | |||
1600 | CVE_STATUS[CVE-2022-48649] = "fixed-version: Fixed from version 5.19.12" | ||
1601 | |||
1602 | CVE_STATUS[CVE-2022-48650] = "fixed-version: Fixed from version 6.0" | ||
1603 | |||
1604 | CVE_STATUS[CVE-2022-48651] = "fixed-version: Fixed from version 6.0" | ||
1605 | |||
1606 | CVE_STATUS[CVE-2022-48652] = "fixed-version: Fixed from version 6.0" | ||
1607 | |||
1608 | CVE_STATUS[CVE-2022-48653] = "fixed-version: Fixed from version 6.0" | ||
1609 | |||
1610 | CVE_STATUS[CVE-2022-48654] = "fixed-version: Fixed from version 6.0" | ||
1611 | |||
1612 | CVE_STATUS[CVE-2022-48655] = "fixed-version: Fixed from version 6.0" | ||
1613 | |||
1614 | CVE_STATUS[CVE-2022-48656] = "fixed-version: Fixed from version 6.0" | ||
1615 | |||
1616 | CVE_STATUS[CVE-2022-48657] = "fixed-version: Fixed from version 6.0" | ||
1617 | |||
1618 | CVE_STATUS[CVE-2022-48658] = "fixed-version: Fixed from version 6.0" | ||
1619 | |||
1620 | CVE_STATUS[CVE-2022-48659] = "fixed-version: Fixed from version 6.0" | ||
1621 | |||
1622 | CVE_STATUS[CVE-2022-48660] = "fixed-version: Fixed from version 6.0" | ||
1623 | |||
1624 | CVE_STATUS[CVE-2022-48661] = "fixed-version: Fixed from version 6.0" | ||
1625 | |||
1626 | CVE_STATUS[CVE-2022-48662] = "fixed-version: Fixed from version 6.0" | ||
1627 | |||
1628 | CVE_STATUS[CVE-2022-48663] = "fixed-version: Fixed from version 5.19.12" | ||
1629 | |||
1630 | CVE_STATUS[CVE-2022-48664] = "fixed-version: Fixed from version 6.0" | ||
1631 | |||
1632 | CVE_STATUS[CVE-2022-48665] = "fixed-version: Fixed from version 6.0" | ||
1633 | |||
1634 | CVE_STATUS[CVE-2022-48666] = "fixed-version: Fixed from version 6.0" | ||
1635 | |||
1636 | CVE_STATUS[CVE-2022-48667] = "fixed-version: Fixed from version 6.0" | ||
1637 | |||
1638 | CVE_STATUS[CVE-2022-48668] = "fixed-version: Fixed from version 6.0" | ||
1639 | |||
1640 | CVE_STATUS[CVE-2022-48669] = "fixed-version: Fixed from version 6.9" | ||
1641 | |||
1642 | CVE_STATUS[CVE-2022-48670] = "fixed-version: Fixed from version 6.0" | ||
1643 | |||
1644 | CVE_STATUS[CVE-2022-48671] = "fixed-version: Fixed from version 5.19.11" | ||
1645 | |||
1646 | CVE_STATUS[CVE-2022-48672] = "fixed-version: Fixed from version 6.0" | ||
1647 | |||
1648 | CVE_STATUS[CVE-2022-48673] = "fixed-version: Fixed from version 6.0" | ||
1649 | |||
1650 | CVE_STATUS[CVE-2022-48674] = "fixed-version: Fixed from version 6.0" | ||
1651 | |||
1652 | CVE_STATUS[CVE-2022-48675] = "fixed-version: Fixed from version 6.0" | ||
1653 | |||
1654 | CVE_STATUS[CVE-2022-48686] = "fixed-version: Fixed from version 6.0" | ||
1655 | |||
1656 | CVE_STATUS[CVE-2022-48687] = "fixed-version: Fixed from version 6.0" | ||
1657 | |||
1658 | CVE_STATUS[CVE-2022-48688] = "fixed-version: Fixed from version 6.0" | ||
1659 | |||
1660 | CVE_STATUS[CVE-2022-48689] = "fixed-version: Fixed from version 6.0" | ||
1661 | |||
1662 | CVE_STATUS[CVE-2022-48690] = "fixed-version: Fixed from version 6.0" | ||
1663 | |||
1664 | CVE_STATUS[CVE-2022-48691] = "fixed-version: Fixed from version 6.0" | ||
1665 | |||
1666 | CVE_STATUS[CVE-2022-48692] = "fixed-version: Fixed from version 6.0" | ||
1667 | |||
1668 | CVE_STATUS[CVE-2022-48693] = "fixed-version: Fixed from version 6.0" | ||
1669 | |||
1670 | CVE_STATUS[CVE-2022-48694] = "fixed-version: Fixed from version 6.0" | ||
1671 | |||
1672 | CVE_STATUS[CVE-2022-48695] = "fixed-version: Fixed from version 6.0" | ||
1673 | |||
1674 | CVE_STATUS[CVE-2022-48696] = "fixed-version: Fixed from version 6.0" | ||
1675 | |||
1676 | CVE_STATUS[CVE-2022-48697] = "fixed-version: Fixed from version 6.0" | ||
1677 | |||
1678 | CVE_STATUS[CVE-2022-48698] = "fixed-version: Fixed from version 6.0" | ||
1679 | |||
1680 | CVE_STATUS[CVE-2022-48699] = "fixed-version: Fixed from version 6.0" | ||
1681 | |||
1682 | CVE_STATUS[CVE-2022-48701] = "fixed-version: Fixed from version 6.0" | ||
1683 | |||
1684 | CVE_STATUS[CVE-2022-48702] = "fixed-version: Fixed from version 6.0" | ||
1685 | |||
1686 | CVE_STATUS[CVE-2022-48703] = "fixed-version: Fixed from version 6.0" | ||
1687 | |||
1688 | CVE_STATUS[CVE-2022-48704] = "fixed-version: Fixed from version 6.0" | ||
1689 | |||
1690 | CVE_STATUS[CVE-2022-48705] = "fixed-version: Fixed from version 6.0" | ||
1691 | |||
1692 | CVE_STATUS[CVE-2022-48706] = "fixed-version: Fixed from version 6.2" | ||
1693 | |||
1694 | CVE_STATUS[CVE-2022-48707] = "fixed-version: Fixed from version 6.2" | ||
1695 | |||
1696 | CVE_STATUS[CVE-2022-48708] = "fixed-version: Fixed from version 6.2" | ||
1697 | |||
1698 | CVE_STATUS[CVE-2022-48709] = "fixed-version: Fixed from version 6.2" | ||
1699 | |||
1700 | CVE_STATUS[CVE-2022-48710] = "fixed-version: Fixed from version 5.19" | ||
1701 | |||
1702 | CVE_STATUS[CVE-2022-48711] = "fixed-version: Fixed from version 5.17" | ||
1703 | |||
1704 | CVE_STATUS[CVE-2022-48712] = "fixed-version: Fixed from version 5.17" | ||
1705 | |||
1706 | CVE_STATUS[CVE-2022-48713] = "fixed-version: Fixed from version 5.17" | ||
1707 | |||
1708 | CVE_STATUS[CVE-2022-48714] = "fixed-version: Fixed from version 5.17" | ||
1709 | |||
1710 | CVE_STATUS[CVE-2022-48715] = "fixed-version: Fixed from version 5.17" | ||
1711 | |||
1712 | CVE_STATUS[CVE-2022-48716] = "fixed-version: Fixed from version 5.17" | ||
1713 | |||
1714 | CVE_STATUS[CVE-2022-48717] = "fixed-version: Fixed from version 5.17" | ||
1715 | |||
1716 | CVE_STATUS[CVE-2022-48718] = "fixed-version: Fixed from version 5.17" | ||
1717 | |||
1718 | CVE_STATUS[CVE-2022-48719] = "fixed-version: Fixed from version 5.17" | ||
1719 | |||
1720 | CVE_STATUS[CVE-2022-48720] = "fixed-version: Fixed from version 5.17" | ||
1721 | |||
1722 | CVE_STATUS[CVE-2022-48721] = "fixed-version: Fixed from version 5.17" | ||
1723 | |||
1724 | CVE_STATUS[CVE-2022-48722] = "fixed-version: Fixed from version 5.17" | ||
1725 | |||
1726 | CVE_STATUS[CVE-2022-48723] = "fixed-version: Fixed from version 5.17" | ||
1727 | |||
1728 | CVE_STATUS[CVE-2022-48724] = "fixed-version: Fixed from version 5.17" | ||
1729 | |||
1730 | CVE_STATUS[CVE-2022-48725] = "fixed-version: Fixed from version 5.17" | ||
1731 | |||
1732 | CVE_STATUS[CVE-2022-48726] = "fixed-version: Fixed from version 5.17" | ||
1733 | |||
1734 | CVE_STATUS[CVE-2022-48727] = "fixed-version: Fixed from version 5.17" | ||
1735 | |||
1736 | CVE_STATUS[CVE-2022-48728] = "fixed-version: Fixed from version 5.17" | ||
1737 | |||
1738 | CVE_STATUS[CVE-2022-48729] = "fixed-version: Fixed from version 5.17" | ||
1739 | |||
1740 | CVE_STATUS[CVE-2022-48730] = "fixed-version: Fixed from version 5.17" | ||
1741 | |||
1742 | CVE_STATUS[CVE-2022-48731] = "fixed-version: Fixed from version 5.17" | ||
1743 | |||
1744 | CVE_STATUS[CVE-2022-48732] = "fixed-version: Fixed from version 5.17" | ||
1745 | |||
1746 | CVE_STATUS[CVE-2022-48733] = "fixed-version: Fixed from version 5.17" | ||
1747 | |||
1748 | CVE_STATUS[CVE-2022-48734] = "fixed-version: Fixed from version 5.17" | ||
1749 | |||
1750 | CVE_STATUS[CVE-2022-48735] = "fixed-version: Fixed from version 5.17" | ||
1751 | |||
1752 | CVE_STATUS[CVE-2022-48738] = "fixed-version: Fixed from version 5.17" | ||
1753 | |||
1754 | CVE_STATUS[CVE-2022-48739] = "fixed-version: Fixed from version 5.17" | ||
1755 | |||
1756 | CVE_STATUS[CVE-2022-48740] = "fixed-version: Fixed from version 5.17" | ||
1757 | |||
1758 | CVE_STATUS[CVE-2022-48741] = "fixed-version: Fixed from version 5.17" | ||
1759 | |||
1760 | CVE_STATUS[CVE-2022-48742] = "fixed-version: Fixed from version 5.17" | ||
1761 | |||
1762 | CVE_STATUS[CVE-2022-48743] = "fixed-version: Fixed from version 5.17" | ||
1763 | |||
1764 | CVE_STATUS[CVE-2022-48744] = "fixed-version: Fixed from version 5.17" | ||
1765 | |||
1766 | CVE_STATUS[CVE-2022-48745] = "fixed-version: Fixed from version 5.17" | ||
1767 | |||
1768 | CVE_STATUS[CVE-2022-48746] = "fixed-version: Fixed from version 5.17" | ||
1769 | |||
1770 | CVE_STATUS[CVE-2022-48747] = "fixed-version: Fixed from version 5.17" | ||
1771 | |||
1772 | CVE_STATUS[CVE-2022-48748] = "fixed-version: Fixed from version 5.17" | ||
1773 | |||
1774 | CVE_STATUS[CVE-2022-48749] = "fixed-version: Fixed from version 5.17" | ||
1775 | |||
1776 | CVE_STATUS[CVE-2022-48750] = "fixed-version: Fixed from version 5.17" | ||
1777 | |||
1778 | CVE_STATUS[CVE-2022-48751] = "fixed-version: Fixed from version 5.17" | ||
1779 | |||
1780 | CVE_STATUS[CVE-2022-48752] = "fixed-version: Fixed from version 5.16.5" | ||
1781 | |||
1782 | CVE_STATUS[CVE-2022-48753] = "fixed-version: Fixed from version 5.17" | ||
1783 | |||
1784 | CVE_STATUS[CVE-2022-48754] = "fixed-version: Fixed from version 5.17" | ||
1785 | |||
1786 | CVE_STATUS[CVE-2022-48755] = "fixed-version: Fixed from version 5.17" | ||
1787 | |||
1788 | CVE_STATUS[CVE-2022-48756] = "fixed-version: Fixed from version 5.17" | ||
1789 | |||
1790 | CVE_STATUS[CVE-2022-48757] = "fixed-version: Fixed from version 5.17" | ||
1791 | |||
1792 | CVE_STATUS[CVE-2022-48758] = "fixed-version: Fixed from version 5.17" | ||
1793 | |||
1794 | CVE_STATUS[CVE-2022-48759] = "fixed-version: Fixed from version 5.17" | ||
1795 | |||
1796 | CVE_STATUS[CVE-2022-48760] = "fixed-version: Fixed from version 5.17" | ||
1797 | |||
1798 | CVE_STATUS[CVE-2022-48761] = "fixed-version: Fixed from version 5.17" | ||
1799 | |||
1800 | CVE_STATUS[CVE-2022-48762] = "fixed-version: Fixed from version 5.17" | ||
1801 | |||
1802 | CVE_STATUS[CVE-2022-48763] = "fixed-version: Fixed from version 5.17" | ||
1803 | |||
1804 | CVE_STATUS[CVE-2022-48764] = "fixed-version: Fixed from version 5.16.5" | ||
1805 | |||
1806 | CVE_STATUS[CVE-2022-48765] = "fixed-version: Fixed from version 5.17" | ||
1807 | |||
1808 | CVE_STATUS[CVE-2022-48766] = "fixed-version: Fixed from version 5.17" | ||
1809 | |||
1810 | CVE_STATUS[CVE-2022-48767] = "fixed-version: Fixed from version 5.17" | ||
1811 | |||
1812 | CVE_STATUS[CVE-2022-48768] = "fixed-version: Fixed from version 5.17" | ||
1813 | |||
1814 | CVE_STATUS[CVE-2022-48769] = "fixed-version: Fixed from version 5.17" | ||
1815 | |||
1816 | CVE_STATUS[CVE-2022-48770] = "fixed-version: Fixed from version 5.17" | ||
1817 | |||
1818 | CVE_STATUS[CVE-2022-48771] = "fixed-version: Fixed from version 5.17" | ||
1819 | |||
1820 | CVE_STATUS[CVE-2022-48772] = "fixed-version: Fixed from version 6.10" | ||
1821 | |||
1822 | CVE_STATUS[CVE-2022-48773] = "fixed-version: Fixed from version 5.17" | ||
1823 | |||
1824 | CVE_STATUS[CVE-2022-48774] = "fixed-version: Fixed from version 5.17" | ||
1825 | |||
1826 | CVE_STATUS[CVE-2022-48775] = "fixed-version: Fixed from version 5.17" | ||
1827 | |||
1828 | CVE_STATUS[CVE-2022-48776] = "fixed-version: Fixed from version 5.17" | ||
1829 | |||
1830 | CVE_STATUS[CVE-2022-48777] = "fixed-version: Fixed from version 5.17" | ||
1831 | |||
1832 | CVE_STATUS[CVE-2022-48778] = "fixed-version: Fixed from version 5.16.11" | ||
1833 | |||
1834 | CVE_STATUS[CVE-2022-48779] = "fixed-version: Fixed from version 5.17" | ||
1835 | |||
1836 | CVE_STATUS[CVE-2022-48780] = "fixed-version: Fixed from version 5.16.11" | ||
1837 | |||
1838 | CVE_STATUS[CVE-2022-48781] = "fixed-version: Fixed from version 5.17" | ||
1839 | |||
1840 | CVE_STATUS[CVE-2022-48782] = "fixed-version: Fixed from version 5.17" | ||
1841 | |||
1842 | CVE_STATUS[CVE-2022-48783] = "fixed-version: Fixed from version 5.16.11" | ||
1843 | |||
1844 | CVE_STATUS[CVE-2022-48784] = "fixed-version: Fixed from version 5.17" | ||
1845 | |||
1846 | CVE_STATUS[CVE-2022-48785] = "fixed-version: Fixed from version 5.17" | ||
1847 | |||
1848 | CVE_STATUS[CVE-2022-48786] = "fixed-version: Fixed from version 5.17" | ||
1849 | |||
1850 | CVE_STATUS[CVE-2022-48787] = "fixed-version: Fixed from version 5.16.11" | ||
1851 | |||
1852 | CVE_STATUS[CVE-2022-48788] = "fixed-version: Fixed from version 5.17" | ||
1853 | |||
1854 | CVE_STATUS[CVE-2022-48789] = "fixed-version: Fixed from version 5.17" | ||
1855 | |||
1856 | CVE_STATUS[CVE-2022-48790] = "fixed-version: Fixed from version 5.17" | ||
1857 | |||
1858 | CVE_STATUS[CVE-2022-48791] = "fixed-version: Fixed from version 5.17" | ||
1859 | |||
1860 | CVE_STATUS[CVE-2022-48792] = "fixed-version: Fixed from version 5.17" | ||
1861 | |||
1862 | CVE_STATUS[CVE-2022-48793] = "fixed-version: Fixed from version 5.17" | ||
1863 | |||
1864 | CVE_STATUS[CVE-2022-48794] = "fixed-version: Fixed from version 5.17" | ||
1865 | |||
1866 | CVE_STATUS[CVE-2022-48795] = "fixed-version: Fixed from version 5.17" | ||
1867 | |||
1868 | CVE_STATUS[CVE-2022-48796] = "fixed-version: Fixed from version 5.17" | ||
1869 | |||
1870 | CVE_STATUS[CVE-2022-48797] = "fixed-version: Fixed from version 5.17" | ||
1871 | |||
1872 | CVE_STATUS[CVE-2022-48798] = "fixed-version: Fixed from version 5.17" | ||
1873 | |||
1874 | CVE_STATUS[CVE-2022-48799] = "fixed-version: Fixed from version 5.17" | ||
1875 | |||
1876 | CVE_STATUS[CVE-2022-48800] = "fixed-version: Fixed from version 5.17" | ||
1877 | |||
1878 | CVE_STATUS[CVE-2022-48801] = "fixed-version: Fixed from version 5.17" | ||
1879 | |||
1880 | CVE_STATUS[CVE-2022-48802] = "fixed-version: Fixed from version 5.17" | ||
1881 | |||
1882 | CVE_STATUS[CVE-2022-48803] = "fixed-version: Fixed from version 5.17" | ||
1883 | |||
1884 | CVE_STATUS[CVE-2022-48804] = "fixed-version: Fixed from version 5.17" | ||
1885 | |||
1886 | CVE_STATUS[CVE-2022-48805] = "fixed-version: Fixed from version 5.17" | ||
1887 | |||
1888 | CVE_STATUS[CVE-2022-48806] = "fixed-version: Fixed from version 5.16.10" | ||
1889 | |||
1890 | CVE_STATUS[CVE-2022-48807] = "fixed-version: Fixed from version 5.17" | ||
1891 | |||
1892 | CVE_STATUS[CVE-2022-48808] = "fixed-version: Fixed from version 5.17" | ||
1893 | |||
1894 | CVE_STATUS[CVE-2022-48809] = "fixed-version: Fixed from version 5.17" | ||
1895 | |||
1896 | CVE_STATUS[CVE-2022-48810] = "fixed-version: Fixed from version 5.17" | ||
1897 | |||
1898 | CVE_STATUS[CVE-2022-48811] = "fixed-version: Fixed from version 5.17" | ||
1899 | |||
1900 | CVE_STATUS[CVE-2022-48812] = "fixed-version: Fixed from version 5.17" | ||
1901 | |||
1902 | CVE_STATUS[CVE-2022-48813] = "fixed-version: Fixed from version 5.17" | ||
1903 | |||
1904 | CVE_STATUS[CVE-2022-48814] = "fixed-version: Fixed from version 5.17" | ||
1905 | |||
1906 | CVE_STATUS[CVE-2022-48815] = "fixed-version: Fixed from version 5.17" | ||
1907 | |||
1908 | CVE_STATUS[CVE-2022-48816] = "fixed-version: Fixed from version 5.17" | ||
1909 | |||
1910 | CVE_STATUS[CVE-2022-48817] = "fixed-version: Fixed from version 5.17" | ||
1911 | |||
1912 | CVE_STATUS[CVE-2022-48818] = "fixed-version: Fixed from version 5.17" | ||
1913 | |||
1914 | CVE_STATUS[CVE-2022-48819] = "fixed-version: Fixed from version 5.17" | ||
1915 | |||
1916 | CVE_STATUS[CVE-2022-48820] = "fixed-version: Fixed from version 5.17" | ||
1917 | |||
1918 | CVE_STATUS[CVE-2022-48821] = "fixed-version: Fixed from version 5.17" | ||
1919 | |||
1920 | CVE_STATUS[CVE-2022-48822] = "fixed-version: Fixed from version 5.17" | ||
1921 | |||
1922 | CVE_STATUS[CVE-2022-48823] = "fixed-version: Fixed from version 5.17" | ||
1923 | |||
1924 | CVE_STATUS[CVE-2022-48824] = "fixed-version: Fixed from version 5.17" | ||
1925 | |||
1926 | CVE_STATUS[CVE-2022-48825] = "fixed-version: Fixed from version 5.17" | ||
1927 | |||
1928 | CVE_STATUS[CVE-2022-48826] = "fixed-version: Fixed from version 5.17" | ||
1929 | |||
1930 | CVE_STATUS[CVE-2022-48827] = "fixed-version: Fixed from version 5.17" | ||
1931 | |||
1932 | CVE_STATUS[CVE-2022-48828] = "fixed-version: Fixed from version 5.17" | ||
1933 | |||
1934 | CVE_STATUS[CVE-2022-48829] = "fixed-version: Fixed from version 5.17" | ||
1935 | |||
1936 | CVE_STATUS[CVE-2022-48830] = "fixed-version: Fixed from version 5.17" | ||
1937 | |||
1938 | CVE_STATUS[CVE-2022-48831] = "fixed-version: Fixed from version 5.17" | ||
1939 | |||
1940 | CVE_STATUS[CVE-2022-48832] = "fixed-version: Fixed from version 5.17" | ||
1941 | |||
1942 | CVE_STATUS[CVE-2022-48833] = "fixed-version: Fixed from version 5.17" | ||
1943 | |||
1944 | CVE_STATUS[CVE-2022-48834] = "fixed-version: Fixed from version 5.17" | ||
1945 | |||
1946 | CVE_STATUS[CVE-2022-48835] = "fixed-version: Fixed from version 5.17" | ||
1947 | |||
1948 | CVE_STATUS[CVE-2022-48836] = "fixed-version: Fixed from version 5.17" | ||
1949 | |||
1950 | CVE_STATUS[CVE-2022-48837] = "fixed-version: Fixed from version 5.16.17" | ||
1951 | |||
1952 | CVE_STATUS[CVE-2022-48838] = "fixed-version: Fixed from version 5.17" | ||
1953 | |||
1954 | CVE_STATUS[CVE-2022-48839] = "fixed-version: Fixed from version 5.17" | ||
1955 | |||
1956 | CVE_STATUS[CVE-2022-48840] = "fixed-version: Fixed from version 5.16.17" | ||
1957 | |||
1958 | CVE_STATUS[CVE-2022-48841] = "fixed-version: Fixed from version 5.17" | ||
1959 | |||
1960 | CVE_STATUS[CVE-2022-48842] = "fixed-version: Fixed from version 5.16.16" | ||
1961 | |||
1962 | CVE_STATUS[CVE-2022-48843] = "fixed-version: Fixed from version 5.17" | ||
1963 | |||
1964 | CVE_STATUS[CVE-2022-48844] = "fixed-version: Fixed from version 5.17" | ||
1965 | |||
1966 | CVE_STATUS[CVE-2022-48845] = "fixed-version: Fixed from version 5.17" | ||
1967 | |||
1968 | CVE_STATUS[CVE-2022-48846] = "fixed-version: Fixed from version 5.17" | ||
1969 | |||
1970 | CVE_STATUS[CVE-2022-48847] = "fixed-version: Fixed from version 5.17" | ||
1971 | |||
1972 | CVE_STATUS[CVE-2022-48848] = "fixed-version: Fixed from version 5.17" | ||
1973 | |||
1974 | CVE_STATUS[CVE-2022-48849] = "fixed-version: Fixed from version 5.17" | ||
1975 | |||
1976 | CVE_STATUS[CVE-2022-48850] = "fixed-version: Fixed from version 5.17" | ||
1977 | |||
1978 | CVE_STATUS[CVE-2022-48851] = "fixed-version: Fixed from version 5.17" | ||
1979 | |||
1980 | CVE_STATUS[CVE-2022-48852] = "fixed-version: Fixed from version 5.17" | ||
1981 | |||
1982 | CVE_STATUS[CVE-2022-48853] = "fixed-version: Fixed from version 5.17" | ||
1983 | |||
1984 | CVE_STATUS[CVE-2022-48854] = "fixed-version: Fixed from version 5.17" | ||
1985 | |||
1986 | CVE_STATUS[CVE-2022-48855] = "fixed-version: Fixed from version 5.17" | ||
1987 | |||
1988 | CVE_STATUS[CVE-2022-48856] = "fixed-version: Fixed from version 5.17" | ||
1989 | |||
1990 | CVE_STATUS[CVE-2022-48857] = "fixed-version: Fixed from version 5.17" | ||
1991 | |||
1992 | CVE_STATUS[CVE-2022-48858] = "fixed-version: Fixed from version 5.17" | ||
1993 | |||
1994 | CVE_STATUS[CVE-2022-48859] = "fixed-version: Fixed from version 5.17" | ||
1995 | |||
1996 | CVE_STATUS[CVE-2022-48860] = "fixed-version: Fixed from version 5.17" | ||
1997 | |||
1998 | CVE_STATUS[CVE-2022-48861] = "fixed-version: Fixed from version 5.17" | ||
1999 | |||
2000 | CVE_STATUS[CVE-2022-48862] = "fixed-version: Fixed from version 5.17" | ||
2001 | |||
2002 | CVE_STATUS[CVE-2022-48863] = "fixed-version: Fixed from version 5.17" | ||
2003 | |||
2004 | CVE_STATUS[CVE-2022-48864] = "fixed-version: Fixed from version 5.17" | ||
2005 | |||
2006 | CVE_STATUS[CVE-2022-48865] = "fixed-version: Fixed from version 5.17" | ||
2007 | |||
2008 | CVE_STATUS[CVE-2022-48866] = "fixed-version: Fixed from version 5.17" | ||
2009 | |||
2010 | CVE_STATUS[CVE-2022-48867] = "fixed-version: Fixed from version 6.2" | ||
2011 | |||
2012 | CVE_STATUS[CVE-2022-48868] = "fixed-version: Fixed from version 6.2" | ||
2013 | |||
2014 | CVE_STATUS[CVE-2022-48869] = "fixed-version: Fixed from version 6.2" | ||
2015 | |||
2016 | CVE_STATUS[CVE-2022-48870] = "fixed-version: Fixed from version 6.2" | ||
2017 | |||
2018 | CVE_STATUS[CVE-2022-48871] = "fixed-version: Fixed from version 6.2" | ||
2019 | |||
2020 | CVE_STATUS[CVE-2022-48872] = "fixed-version: Fixed from version 6.2" | ||
2021 | |||
2022 | CVE_STATUS[CVE-2022-48873] = "fixed-version: Fixed from version 6.2" | ||
2023 | |||
2024 | CVE_STATUS[CVE-2022-48874] = "fixed-version: Fixed from version 6.2" | ||
2025 | |||
2026 | CVE_STATUS[CVE-2022-48875] = "fixed-version: Fixed from version 6.2" | ||
2027 | |||
2028 | CVE_STATUS[CVE-2022-48876] = "fixed-version: Fixed from version 6.2" | ||
2029 | |||
2030 | CVE_STATUS[CVE-2022-48877] = "fixed-version: Fixed from version 6.2" | ||
2031 | |||
2032 | CVE_STATUS[CVE-2022-48878] = "fixed-version: Fixed from version 6.2" | ||
2033 | |||
2034 | CVE_STATUS[CVE-2022-48879] = "fixed-version: Fixed from version 6.2" | ||
2035 | |||
2036 | CVE_STATUS[CVE-2022-48880] = "fixed-version: Fixed from version 6.2" | ||
2037 | |||
2038 | CVE_STATUS[CVE-2022-48881] = "fixed-version: Fixed from version 6.2" | ||
2039 | |||
2040 | CVE_STATUS[CVE-2022-48882] = "fixed-version: Fixed from version 6.2" | ||
2041 | |||
2042 | CVE_STATUS[CVE-2022-48883] = "fixed-version: Fixed from version 6.2" | ||
2043 | |||
2044 | CVE_STATUS[CVE-2022-48884] = "fixed-version: Fixed from version 6.2" | ||
2045 | |||
2046 | CVE_STATUS[CVE-2022-48885] = "fixed-version: Fixed from version 6.2" | ||
2047 | |||
2048 | CVE_STATUS[CVE-2022-48886] = "fixed-version: Fixed from version 6.2" | ||
2049 | |||
2050 | CVE_STATUS[CVE-2022-48887] = "fixed-version: Fixed from version 6.2" | ||
2051 | |||
2052 | CVE_STATUS[CVE-2022-48888] = "fixed-version: Fixed from version 6.2" | ||
2053 | |||
2054 | CVE_STATUS[CVE-2022-48889] = "fixed-version: Fixed from version 6.2" | ||
2055 | |||
2056 | CVE_STATUS[CVE-2022-48890] = "fixed-version: Fixed from version 6.2" | ||
2057 | |||
2058 | CVE_STATUS[CVE-2022-48891] = "fixed-version: Fixed from version 6.2" | ||
2059 | |||
2060 | CVE_STATUS[CVE-2022-48892] = "fixed-version: Fixed from version 6.2" | ||
2061 | |||
2062 | CVE_STATUS[CVE-2022-48893] = "fixed-version: Fixed from version 6.2" | ||
2063 | |||
2064 | CVE_STATUS[CVE-2022-48894] = "fixed-version: Fixed from version 6.2" | ||
2065 | |||
2066 | CVE_STATUS[CVE-2022-48895] = "fixed-version: Fixed from version 6.2" | ||
2067 | |||
2068 | CVE_STATUS[CVE-2022-48896] = "fixed-version: Fixed from version 6.2" | ||
2069 | |||
2070 | CVE_STATUS[CVE-2022-48897] = "fixed-version: Fixed from version 6.2" | ||
2071 | |||
2072 | CVE_STATUS[CVE-2022-48898] = "fixed-version: Fixed from version 6.2" | ||
2073 | |||
2074 | CVE_STATUS[CVE-2022-48899] = "fixed-version: Fixed from version 6.2" | ||
2075 | |||
2076 | CVE_STATUS[CVE-2022-48901] = "fixed-version: Fixed from version 5.17" | ||
2077 | |||
2078 | CVE_STATUS[CVE-2022-48902] = "fixed-version: Fixed from version 5.17" | ||
2079 | |||
2080 | CVE_STATUS[CVE-2022-48903] = "fixed-version: Fixed from version 5.17" | ||
2081 | |||
2082 | CVE_STATUS[CVE-2022-48904] = "fixed-version: Fixed from version 5.17" | ||
2083 | |||
2084 | CVE_STATUS[CVE-2022-48905] = "fixed-version: Fixed from version 5.17" | ||
2085 | |||
2086 | CVE_STATUS[CVE-2022-48906] = "fixed-version: Fixed from version 5.17" | ||
2087 | |||
2088 | CVE_STATUS[CVE-2022-48907] = "fixed-version: Fixed from version 5.17" | ||
2089 | |||
2090 | CVE_STATUS[CVE-2022-48908] = "fixed-version: Fixed from version 5.17" | ||
2091 | |||
2092 | CVE_STATUS[CVE-2022-48909] = "fixed-version: Fixed from version 5.17" | ||
2093 | |||
2094 | CVE_STATUS[CVE-2022-48910] = "fixed-version: Fixed from version 5.17" | ||
2095 | |||
2096 | CVE_STATUS[CVE-2022-48911] = "fixed-version: Fixed from version 5.17" | ||
2097 | |||
2098 | CVE_STATUS[CVE-2022-48912] = "fixed-version: Fixed from version 5.17" | ||
2099 | |||
2100 | CVE_STATUS[CVE-2022-48913] = "fixed-version: Fixed from version 5.17" | ||
2101 | |||
2102 | CVE_STATUS[CVE-2022-48914] = "fixed-version: Fixed from version 5.16.13" | ||
2103 | |||
2104 | CVE_STATUS[CVE-2022-48915] = "fixed-version: Fixed from version 5.17" | ||
2105 | |||
2106 | CVE_STATUS[CVE-2022-48916] = "fixed-version: Fixed from version 5.17" | ||
2107 | |||
2108 | CVE_STATUS[CVE-2022-48918] = "fixed-version: Fixed from version 5.17" | ||
2109 | |||
2110 | CVE_STATUS[CVE-2022-48919] = "fixed-version: Fixed from version 5.17" | ||
2111 | |||
2112 | CVE_STATUS[CVE-2022-48920] = "fixed-version: Fixed from version 5.17" | ||
2113 | |||
2114 | CVE_STATUS[CVE-2022-48921] = "fixed-version: Fixed from version 5.17" | ||
2115 | |||
2116 | CVE_STATUS[CVE-2022-48922] = "fixed-version: Fixed from version 5.17" | ||
2117 | |||
2118 | CVE_STATUS[CVE-2022-48923] = "fixed-version: Fixed from version 5.17" | ||
2119 | |||
2120 | CVE_STATUS[CVE-2022-48924] = "fixed-version: Fixed from version 5.17" | ||
2121 | |||
2122 | CVE_STATUS[CVE-2022-48925] = "fixed-version: Fixed from version 5.17" | ||
2123 | |||
2124 | CVE_STATUS[CVE-2022-48926] = "fixed-version: Fixed from version 5.17" | ||
2125 | |||
2126 | CVE_STATUS[CVE-2022-48927] = "fixed-version: Fixed from version 5.17" | ||
2127 | |||
2128 | CVE_STATUS[CVE-2022-48928] = "fixed-version: Fixed from version 5.17" | ||
2129 | |||
2130 | CVE_STATUS[CVE-2022-48929] = "fixed-version: Fixed from version 5.16.12" | ||
2131 | |||
2132 | CVE_STATUS[CVE-2022-48930] = "fixed-version: Fixed from version 5.17" | ||
2133 | |||
2134 | CVE_STATUS[CVE-2022-48931] = "fixed-version: Fixed from version 5.17" | ||
2135 | |||
2136 | CVE_STATUS[CVE-2022-48932] = "fixed-version: Fixed from version 5.17" | ||
2137 | |||
2138 | CVE_STATUS[CVE-2022-48933] = "fixed-version: Fixed from version 5.17" | ||
2139 | |||
2140 | CVE_STATUS[CVE-2022-48934] = "fixed-version: Fixed from version 5.17" | ||
2141 | |||
2142 | CVE_STATUS[CVE-2022-48935] = "fixed-version: Fixed from version 5.17" | ||
2143 | |||
2144 | CVE_STATUS[CVE-2022-48937] = "fixed-version: Fixed from version 5.17" | ||
2145 | |||
2146 | CVE_STATUS[CVE-2022-48938] = "fixed-version: Fixed from version 5.17" | ||
2147 | |||
2148 | CVE_STATUS[CVE-2022-48939] = "fixed-version: Fixed from version 5.17" | ||
2149 | |||
2150 | CVE_STATUS[CVE-2022-48940] = "fixed-version: Fixed from version 5.17" | ||
2151 | |||
2152 | CVE_STATUS[CVE-2022-48941] = "fixed-version: Fixed from version 5.17" | ||
2153 | |||
2154 | CVE_STATUS[CVE-2022-48942] = "fixed-version: Fixed from version 5.17" | ||
2155 | |||
2156 | CVE_STATUS[CVE-2022-48943] = "fixed-version: Fixed from version 5.17" | ||
2157 | |||
2158 | CVE_STATUS[CVE-2022-48944] = "fixed-version: Fixed from version 5.17" | ||
2159 | |||
2160 | CVE_STATUS[CVE-2022-48945] = "fixed-version: Fixed from version 6.2" | ||
2161 | |||
2162 | CVE_STATUS[CVE-2022-48946] = "fixed-version: Fixed from version 6.2" | ||
2163 | |||
2164 | CVE_STATUS[CVE-2022-48947] = "fixed-version: Fixed from version 6.1" | ||
2165 | |||
2166 | CVE_STATUS[CVE-2022-48948] = "fixed-version: Fixed from version 6.2" | ||
2167 | |||
2168 | CVE_STATUS[CVE-2022-48949] = "fixed-version: Fixed from version 6.2" | ||
2169 | |||
2170 | CVE_STATUS[CVE-2022-48950] = "fixed-version: Fixed from version 6.1" | ||
2171 | |||
2172 | CVE_STATUS[CVE-2022-48951] = "fixed-version: Fixed from version 6.1" | ||
2173 | |||
2174 | CVE_STATUS[CVE-2022-48952] = "fixed-version: Fixed from version 6.2" | ||
2175 | |||
2176 | CVE_STATUS[CVE-2022-48953] = "fixed-version: Fixed from version 6.1" | ||
2177 | |||
2178 | CVE_STATUS[CVE-2022-48954] = "fixed-version: Fixed from version 6.1" | ||
2179 | |||
2180 | CVE_STATUS[CVE-2022-48955] = "fixed-version: Fixed from version 6.1" | ||
2181 | |||
2182 | CVE_STATUS[CVE-2022-48956] = "fixed-version: Fixed from version 6.1" | ||
2183 | |||
2184 | CVE_STATUS[CVE-2022-48957] = "fixed-version: Fixed from version 6.1" | ||
2185 | |||
2186 | CVE_STATUS[CVE-2022-48958] = "fixed-version: Fixed from version 6.1" | ||
2187 | |||
2188 | CVE_STATUS[CVE-2022-48959] = "fixed-version: Fixed from version 6.1" | ||
2189 | |||
2190 | CVE_STATUS[CVE-2022-48960] = "fixed-version: Fixed from version 6.1" | ||
2191 | |||
2192 | CVE_STATUS[CVE-2022-48961] = "fixed-version: Fixed from version 6.1" | ||
2193 | |||
2194 | CVE_STATUS[CVE-2022-48962] = "fixed-version: Fixed from version 6.1" | ||
2195 | |||
2196 | CVE_STATUS[CVE-2022-48963] = "fixed-version: Fixed from version 6.1" | ||
2197 | |||
2198 | CVE_STATUS[CVE-2022-48964] = "fixed-version: Fixed from version 6.1" | ||
2199 | |||
2200 | CVE_STATUS[CVE-2022-48965] = "fixed-version: Fixed from version 6.1" | ||
2201 | |||
2202 | CVE_STATUS[CVE-2022-48966] = "fixed-version: Fixed from version 6.1" | ||
2203 | |||
2204 | CVE_STATUS[CVE-2022-48967] = "fixed-version: Fixed from version 6.1" | ||
2205 | |||
2206 | CVE_STATUS[CVE-2022-48968] = "fixed-version: Fixed from version 6.1" | ||
2207 | |||
2208 | CVE_STATUS[CVE-2022-48969] = "fixed-version: Fixed from version 6.1" | ||
2209 | |||
2210 | CVE_STATUS[CVE-2022-48970] = "fixed-version: Fixed from version 6.1" | ||
2211 | |||
2212 | CVE_STATUS[CVE-2022-48971] = "fixed-version: Fixed from version 6.1" | ||
2213 | |||
2214 | CVE_STATUS[CVE-2022-48972] = "fixed-version: Fixed from version 6.1" | ||
2215 | |||
2216 | CVE_STATUS[CVE-2022-48973] = "fixed-version: Fixed from version 6.1" | ||
2217 | |||
2218 | CVE_STATUS[CVE-2022-48974] = "fixed-version: Fixed from version 6.1" | ||
2219 | |||
2220 | CVE_STATUS[CVE-2022-48975] = "fixed-version: Fixed from version 6.1" | ||
2221 | |||
2222 | CVE_STATUS[CVE-2022-48976] = "fixed-version: Fixed from version 6.1" | ||
2223 | |||
2224 | CVE_STATUS[CVE-2022-48977] = "fixed-version: Fixed from version 6.1" | ||
2225 | |||
2226 | CVE_STATUS[CVE-2022-48978] = "fixed-version: Fixed from version 6.1" | ||
2227 | |||
2228 | CVE_STATUS[CVE-2022-48979] = "fixed-version: Fixed from version 6.1" | ||
2229 | |||
2230 | CVE_STATUS[CVE-2022-48980] = "fixed-version: Fixed from version 6.1" | ||
2231 | |||
2232 | CVE_STATUS[CVE-2022-48981] = "fixed-version: Fixed from version 6.1" | ||
2233 | |||
2234 | CVE_STATUS[CVE-2022-48982] = "fixed-version: Fixed from version 6.1" | ||
2235 | |||
2236 | CVE_STATUS[CVE-2022-48983] = "fixed-version: Fixed from version 6.1" | ||
2237 | |||
2238 | CVE_STATUS[CVE-2022-48984] = "fixed-version: Fixed from version 6.1" | ||
2239 | |||
2240 | CVE_STATUS[CVE-2022-48985] = "fixed-version: Fixed from version 6.1" | ||
2241 | |||
2242 | CVE_STATUS[CVE-2022-48986] = "fixed-version: Fixed from version 6.1" | ||
2243 | |||
2244 | CVE_STATUS[CVE-2022-48987] = "fixed-version: Fixed from version 6.0.13" | ||
2245 | |||
2246 | CVE_STATUS[CVE-2022-48988] = "fixed-version: Fixed from version 6.1" | ||
2247 | |||
2248 | CVE_STATUS[CVE-2022-48989] = "fixed-version: Fixed from version 6.1" | ||
2249 | |||
2250 | CVE_STATUS[CVE-2022-48990] = "fixed-version: Fixed from version 6.1" | ||
2251 | |||
2252 | CVE_STATUS[CVE-2022-48991] = "fixed-version: Fixed from version 6.1" | ||
2253 | |||
2254 | CVE_STATUS[CVE-2022-48992] = "fixed-version: Fixed from version 6.1" | ||
2255 | |||
2256 | CVE_STATUS[CVE-2022-48994] = "fixed-version: Fixed from version 6.1" | ||
2257 | |||
2258 | CVE_STATUS[CVE-2022-48995] = "fixed-version: Fixed from version 6.1" | ||
2259 | |||
2260 | CVE_STATUS[CVE-2022-48996] = "fixed-version: Fixed from version 6.1" | ||
2261 | |||
2262 | CVE_STATUS[CVE-2022-48997] = "fixed-version: Fixed from version 6.1" | ||
2263 | |||
2264 | CVE_STATUS[CVE-2022-48998] = "fixed-version: Fixed from version 6.1" | ||
2265 | |||
2266 | CVE_STATUS[CVE-2022-48999] = "fixed-version: Fixed from version 6.1" | ||
2267 | |||
2268 | CVE_STATUS[CVE-2022-49000] = "fixed-version: Fixed from version 6.1" | ||
2269 | |||
2270 | CVE_STATUS[CVE-2022-49001] = "fixed-version: Fixed from version 6.1" | ||
2271 | |||
2272 | CVE_STATUS[CVE-2022-49002] = "fixed-version: Fixed from version 6.1" | ||
2273 | |||
2274 | CVE_STATUS[CVE-2022-49003] = "fixed-version: Fixed from version 6.1" | ||
2275 | |||
2276 | CVE_STATUS[CVE-2022-49004] = "fixed-version: Fixed from version 6.1" | ||
2277 | |||
2278 | CVE_STATUS[CVE-2022-49005] = "fixed-version: Fixed from version 6.1" | ||
2279 | |||
2280 | CVE_STATUS[CVE-2022-49006] = "fixed-version: Fixed from version 6.1" | ||
2281 | |||
2282 | CVE_STATUS[CVE-2022-49007] = "fixed-version: Fixed from version 6.1" | ||
2283 | |||
2284 | CVE_STATUS[CVE-2022-49008] = "fixed-version: Fixed from version 6.1" | ||
2285 | |||
2286 | CVE_STATUS[CVE-2022-49009] = "fixed-version: Fixed from version 6.1" | ||
2287 | |||
2288 | CVE_STATUS[CVE-2022-49010] = "fixed-version: Fixed from version 6.1" | ||
2289 | |||
2290 | CVE_STATUS[CVE-2022-49011] = "fixed-version: Fixed from version 6.1" | ||
2291 | |||
2292 | CVE_STATUS[CVE-2022-49012] = "fixed-version: Fixed from version 6.1" | ||
2293 | |||
2294 | CVE_STATUS[CVE-2022-49013] = "fixed-version: Fixed from version 6.1" | ||
2295 | |||
2296 | CVE_STATUS[CVE-2022-49014] = "fixed-version: Fixed from version 6.1" | ||
2297 | |||
2298 | CVE_STATUS[CVE-2022-49015] = "fixed-version: Fixed from version 6.1" | ||
2299 | |||
2300 | CVE_STATUS[CVE-2022-49016] = "fixed-version: Fixed from version 6.1" | ||
2301 | |||
2302 | CVE_STATUS[CVE-2022-49017] = "fixed-version: Fixed from version 6.1" | ||
2303 | |||
2304 | CVE_STATUS[CVE-2022-49018] = "fixed-version: Fixed from version 6.1" | ||
2305 | |||
2306 | CVE_STATUS[CVE-2022-49019] = "fixed-version: Fixed from version 6.1" | ||
2307 | |||
2308 | CVE_STATUS[CVE-2022-49020] = "fixed-version: Fixed from version 6.1" | ||
2309 | |||
2310 | CVE_STATUS[CVE-2022-49021] = "fixed-version: Fixed from version 6.1" | ||
2311 | |||
2312 | CVE_STATUS[CVE-2022-49022] = "fixed-version: Fixed from version 6.1" | ||
2313 | |||
2314 | CVE_STATUS[CVE-2022-49023] = "fixed-version: Fixed from version 6.1" | ||
2315 | |||
2316 | CVE_STATUS[CVE-2022-49024] = "fixed-version: Fixed from version 6.1" | ||
2317 | |||
2318 | CVE_STATUS[CVE-2022-49025] = "fixed-version: Fixed from version 6.1" | ||
2319 | |||
2320 | CVE_STATUS[CVE-2022-49026] = "fixed-version: Fixed from version 6.1" | ||
2321 | |||
2322 | CVE_STATUS[CVE-2022-49027] = "fixed-version: Fixed from version 6.1" | ||
2323 | |||
2324 | CVE_STATUS[CVE-2022-49028] = "fixed-version: Fixed from version 6.1" | ||
2325 | |||
2326 | CVE_STATUS[CVE-2022-49029] = "fixed-version: Fixed from version 6.1" | ||
2327 | |||
2328 | CVE_STATUS[CVE-2022-49030] = "fixed-version: Fixed from version 6.1" | ||
2329 | |||
2330 | CVE_STATUS[CVE-2022-49031] = "fixed-version: Fixed from version 6.1" | ||
2331 | |||
2332 | CVE_STATUS[CVE-2022-49032] = "fixed-version: Fixed from version 6.1" | ||
2333 | |||
2334 | CVE_STATUS[CVE-2022-49033] = "fixed-version: Fixed from version 6.1" | ||
2335 | |||
2336 | CVE_STATUS[CVE-2022-49034] = "cpe-stable-backport: Backported in 6.12.2" | ||
2337 | |||
2338 | CVE_STATUS[CVE-2022-49035] = "fixed-version: Fixed from version 6.1" | ||
2339 | |||
2340 | CVE_STATUS[CVE-2022-49044] = "fixed-version: Fixed from version 5.18" | ||
2341 | |||
2342 | CVE_STATUS[CVE-2022-49046] = "fixed-version: Fixed from version 5.18" | ||
2343 | |||
2344 | CVE_STATUS[CVE-2022-49047] = "fixed-version: Fixed from version 5.18" | ||
2345 | |||
2346 | CVE_STATUS[CVE-2022-49048] = "fixed-version: Fixed from version 5.18" | ||
2347 | |||
2348 | CVE_STATUS[CVE-2022-49049] = "fixed-version: Fixed from version 5.18" | ||
2349 | |||
2350 | CVE_STATUS[CVE-2022-49050] = "fixed-version: Fixed from version 5.18" | ||
2351 | |||
2352 | CVE_STATUS[CVE-2022-49051] = "fixed-version: Fixed from version 5.18" | ||
2353 | |||
2354 | CVE_STATUS[CVE-2022-49052] = "fixed-version: Fixed from version 5.18" | ||
2355 | |||
2356 | CVE_STATUS[CVE-2022-49053] = "fixed-version: Fixed from version 5.18" | ||
2357 | |||
2358 | CVE_STATUS[CVE-2022-49054] = "fixed-version: Fixed from version 5.18" | ||
2359 | |||
2360 | CVE_STATUS[CVE-2022-49055] = "fixed-version: Fixed from version 5.18" | ||
2361 | |||
2362 | CVE_STATUS[CVE-2022-49057] = "fixed-version: Fixed from version 5.18" | ||
2363 | |||
2364 | CVE_STATUS[CVE-2022-49058] = "fixed-version: Fixed from version 5.18" | ||
2365 | |||
2366 | CVE_STATUS[CVE-2022-49059] = "fixed-version: Fixed from version 5.18" | ||
2367 | |||
2368 | CVE_STATUS[CVE-2022-49060] = "fixed-version: Fixed from version 5.18" | ||
2369 | |||
2370 | CVE_STATUS[CVE-2022-49061] = "fixed-version: Fixed from version 5.18" | ||
2371 | |||
2372 | CVE_STATUS[CVE-2022-49062] = "fixed-version: Fixed from version 5.18" | ||
2373 | |||
2374 | CVE_STATUS[CVE-2022-49063] = "fixed-version: Fixed from version 5.18" | ||
2375 | |||
2376 | CVE_STATUS[CVE-2022-49064] = "fixed-version: Fixed from version 5.18" | ||
2377 | |||
2378 | CVE_STATUS[CVE-2022-49065] = "fixed-version: Fixed from version 5.18" | ||
2379 | |||
2380 | CVE_STATUS[CVE-2022-49066] = "fixed-version: Fixed from version 5.18" | ||
2381 | |||
2382 | CVE_STATUS[CVE-2022-49067] = "fixed-version: Fixed from version 5.18" | ||
2383 | |||
2384 | CVE_STATUS[CVE-2022-49068] = "fixed-version: Fixed from version 5.18" | ||
2385 | |||
2386 | CVE_STATUS[CVE-2022-49069] = "fixed-version: Fixed from version 5.18" | ||
2387 | |||
2388 | CVE_STATUS[CVE-2022-49070] = "fixed-version: Fixed from version 5.17.3" | ||
2389 | |||
2390 | CVE_STATUS[CVE-2022-49071] = "fixed-version: Fixed from version 5.18" | ||
2391 | |||
2392 | CVE_STATUS[CVE-2022-49072] = "fixed-version: Fixed from version 5.18" | ||
2393 | |||
2394 | CVE_STATUS[CVE-2022-49073] = "fixed-version: Fixed from version 5.18" | ||
2395 | |||
2396 | CVE_STATUS[CVE-2022-49074] = "fixed-version: Fixed from version 5.18" | ||
2397 | |||
2398 | CVE_STATUS[CVE-2022-49075] = "fixed-version: Fixed from version 5.18" | ||
2399 | |||
2400 | CVE_STATUS[CVE-2022-49076] = "fixed-version: Fixed from version 5.18" | ||
2401 | |||
2402 | CVE_STATUS[CVE-2022-49077] = "fixed-version: Fixed from version 5.18" | ||
2403 | |||
2404 | CVE_STATUS[CVE-2022-49078] = "fixed-version: Fixed from version 5.18" | ||
2405 | |||
2406 | CVE_STATUS[CVE-2022-49079] = "fixed-version: Fixed from version 5.18" | ||
2407 | |||
2408 | CVE_STATUS[CVE-2022-49080] = "fixed-version: Fixed from version 5.18" | ||
2409 | |||
2410 | CVE_STATUS[CVE-2022-49081] = "fixed-version: Fixed from version 5.18" | ||
2411 | |||
2412 | CVE_STATUS[CVE-2022-49082] = "fixed-version: Fixed from version 5.18" | ||
2413 | |||
2414 | CVE_STATUS[CVE-2022-49083] = "fixed-version: Fixed from version 5.18" | ||
2415 | |||
2416 | CVE_STATUS[CVE-2022-49084] = "fixed-version: Fixed from version 5.18" | ||
2417 | |||
2418 | CVE_STATUS[CVE-2022-49085] = "fixed-version: Fixed from version 5.18" | ||
2419 | |||
2420 | CVE_STATUS[CVE-2022-49086] = "fixed-version: Fixed from version 5.18" | ||
2421 | |||
2422 | CVE_STATUS[CVE-2022-49087] = "fixed-version: Fixed from version 5.18" | ||
2423 | |||
2424 | CVE_STATUS[CVE-2022-49088] = "fixed-version: Fixed from version 5.18" | ||
2425 | |||
2426 | CVE_STATUS[CVE-2022-49089] = "fixed-version: Fixed from version 5.18" | ||
2427 | |||
2428 | CVE_STATUS[CVE-2022-49090] = "fixed-version: Fixed from version 5.18" | ||
2429 | |||
2430 | CVE_STATUS[CVE-2022-49091] = "fixed-version: Fixed from version 5.18" | ||
2431 | |||
2432 | CVE_STATUS[CVE-2022-49092] = "fixed-version: Fixed from version 5.18" | ||
2433 | |||
2434 | CVE_STATUS[CVE-2022-49093] = "fixed-version: Fixed from version 5.18" | ||
2435 | |||
2436 | CVE_STATUS[CVE-2022-49094] = "fixed-version: Fixed from version 5.18" | ||
2437 | |||
2438 | CVE_STATUS[CVE-2022-49095] = "fixed-version: Fixed from version 5.18" | ||
2439 | |||
2440 | CVE_STATUS[CVE-2022-49096] = "fixed-version: Fixed from version 5.18" | ||
2441 | |||
2442 | CVE_STATUS[CVE-2022-49097] = "fixed-version: Fixed from version 5.18" | ||
2443 | |||
2444 | CVE_STATUS[CVE-2022-49098] = "fixed-version: Fixed from version 5.18" | ||
2445 | |||
2446 | CVE_STATUS[CVE-2022-49099] = "fixed-version: Fixed from version 5.18" | ||
2447 | |||
2448 | CVE_STATUS[CVE-2022-49100] = "fixed-version: Fixed from version 5.18" | ||
2449 | |||
2450 | CVE_STATUS[CVE-2022-49102] = "fixed-version: Fixed from version 5.18" | ||
2451 | |||
2452 | CVE_STATUS[CVE-2022-49103] = "fixed-version: Fixed from version 5.18" | ||
2453 | |||
2454 | CVE_STATUS[CVE-2022-49104] = "fixed-version: Fixed from version 5.18" | ||
2455 | |||
2456 | CVE_STATUS[CVE-2022-49105] = "fixed-version: Fixed from version 5.18" | ||
2457 | |||
2458 | CVE_STATUS[CVE-2022-49106] = "fixed-version: Fixed from version 5.18" | ||
2459 | |||
2460 | CVE_STATUS[CVE-2022-49107] = "fixed-version: Fixed from version 5.18" | ||
2461 | |||
2462 | CVE_STATUS[CVE-2022-49108] = "fixed-version: Fixed from version 5.18" | ||
2463 | |||
2464 | CVE_STATUS[CVE-2022-49109] = "fixed-version: Fixed from version 5.18" | ||
2465 | |||
2466 | CVE_STATUS[CVE-2022-49110] = "fixed-version: Fixed from version 5.18" | ||
2467 | |||
2468 | CVE_STATUS[CVE-2022-49111] = "fixed-version: Fixed from version 5.18" | ||
2469 | |||
2470 | CVE_STATUS[CVE-2022-49112] = "fixed-version: Fixed from version 5.18" | ||
2471 | |||
2472 | CVE_STATUS[CVE-2022-49113] = "fixed-version: Fixed from version 5.18" | ||
2473 | |||
2474 | CVE_STATUS[CVE-2022-49114] = "fixed-version: Fixed from version 5.18" | ||
2475 | |||
2476 | CVE_STATUS[CVE-2022-49115] = "fixed-version: Fixed from version 5.18" | ||
2477 | |||
2478 | CVE_STATUS[CVE-2022-49116] = "fixed-version: Fixed from version 5.18" | ||
2479 | |||
2480 | CVE_STATUS[CVE-2022-49117] = "fixed-version: Fixed from version 5.18" | ||
2481 | |||
2482 | CVE_STATUS[CVE-2022-49118] = "fixed-version: Fixed from version 5.18" | ||
2483 | |||
2484 | CVE_STATUS[CVE-2022-49119] = "fixed-version: Fixed from version 5.18" | ||
2485 | |||
2486 | CVE_STATUS[CVE-2022-49120] = "fixed-version: Fixed from version 5.18" | ||
2487 | |||
2488 | CVE_STATUS[CVE-2022-49121] = "fixed-version: Fixed from version 5.18" | ||
2489 | |||
2490 | CVE_STATUS[CVE-2022-49122] = "fixed-version: Fixed from version 5.18" | ||
2491 | |||
2492 | CVE_STATUS[CVE-2022-49123] = "fixed-version: Fixed from version 5.18" | ||
2493 | |||
2494 | CVE_STATUS[CVE-2022-49124] = "fixed-version: Fixed from version 5.18" | ||
2495 | |||
2496 | CVE_STATUS[CVE-2022-49125] = "fixed-version: Fixed from version 5.18" | ||
2497 | |||
2498 | CVE_STATUS[CVE-2022-49126] = "fixed-version: Fixed from version 5.18" | ||
2499 | |||
2500 | CVE_STATUS[CVE-2022-49127] = "fixed-version: Fixed from version 5.18" | ||
2501 | |||
2502 | CVE_STATUS[CVE-2022-49128] = "fixed-version: Fixed from version 5.18" | ||
2503 | |||
2504 | CVE_STATUS[CVE-2022-49129] = "fixed-version: Fixed from version 5.18" | ||
2505 | |||
2506 | CVE_STATUS[CVE-2022-49130] = "fixed-version: Fixed from version 5.18" | ||
2507 | |||
2508 | CVE_STATUS[CVE-2022-49131] = "fixed-version: Fixed from version 5.18" | ||
2509 | |||
2510 | CVE_STATUS[CVE-2022-49132] = "fixed-version: Fixed from version 5.18" | ||
2511 | |||
2512 | CVE_STATUS[CVE-2022-49133] = "fixed-version: Fixed from version 5.18" | ||
2513 | |||
2514 | CVE_STATUS[CVE-2022-49134] = "fixed-version: Fixed from version 5.18" | ||
2515 | |||
2516 | CVE_STATUS[CVE-2022-49135] = "fixed-version: Fixed from version 5.18" | ||
2517 | |||
2518 | CVE_STATUS[CVE-2022-49136] = "fixed-version: Fixed from version 5.18" | ||
2519 | |||
2520 | CVE_STATUS[CVE-2022-49137] = "fixed-version: Fixed from version 5.18" | ||
2521 | |||
2522 | CVE_STATUS[CVE-2022-49138] = "fixed-version: Fixed from version 5.18" | ||
2523 | |||
2524 | CVE_STATUS[CVE-2022-49139] = "fixed-version: Fixed from version 5.18" | ||
2525 | |||
2526 | CVE_STATUS[CVE-2022-49141] = "fixed-version: Fixed from version 5.18" | ||
2527 | |||
2528 | CVE_STATUS[CVE-2022-49142] = "fixed-version: Fixed from version 5.18" | ||
2529 | |||
2530 | CVE_STATUS[CVE-2022-49144] = "fixed-version: Fixed from version 5.18" | ||
2531 | |||
2532 | CVE_STATUS[CVE-2022-49145] = "fixed-version: Fixed from version 5.18" | ||
2533 | |||
2534 | CVE_STATUS[CVE-2022-49146] = "fixed-version: Fixed from version 5.18" | ||
2535 | |||
2536 | CVE_STATUS[CVE-2022-49147] = "fixed-version: Fixed from version 5.18" | ||
2537 | |||
2538 | CVE_STATUS[CVE-2022-49148] = "fixed-version: Fixed from version 5.18" | ||
2539 | |||
2540 | CVE_STATUS[CVE-2022-49149] = "fixed-version: Fixed from version 5.18" | ||
2541 | |||
2542 | CVE_STATUS[CVE-2022-49150] = "fixed-version: Fixed from version 5.18" | ||
2543 | |||
2544 | CVE_STATUS[CVE-2022-49151] = "fixed-version: Fixed from version 5.18" | ||
2545 | |||
2546 | CVE_STATUS[CVE-2022-49152] = "fixed-version: Fixed from version 5.18" | ||
2547 | |||
2548 | CVE_STATUS[CVE-2022-49153] = "fixed-version: Fixed from version 5.18" | ||
2549 | |||
2550 | CVE_STATUS[CVE-2022-49154] = "fixed-version: Fixed from version 5.18" | ||
2551 | |||
2552 | CVE_STATUS[CVE-2022-49155] = "fixed-version: Fixed from version 5.18" | ||
2553 | |||
2554 | CVE_STATUS[CVE-2022-49156] = "fixed-version: Fixed from version 5.18" | ||
2555 | |||
2556 | CVE_STATUS[CVE-2022-49157] = "fixed-version: Fixed from version 5.18" | ||
2557 | |||
2558 | CVE_STATUS[CVE-2022-49158] = "fixed-version: Fixed from version 5.18" | ||
2559 | |||
2560 | CVE_STATUS[CVE-2022-49159] = "fixed-version: Fixed from version 5.18" | ||
2561 | |||
2562 | CVE_STATUS[CVE-2022-49160] = "fixed-version: Fixed from version 5.18" | ||
2563 | |||
2564 | CVE_STATUS[CVE-2022-49161] = "fixed-version: Fixed from version 5.18" | ||
2565 | |||
2566 | CVE_STATUS[CVE-2022-49162] = "fixed-version: Fixed from version 5.18" | ||
2567 | |||
2568 | CVE_STATUS[CVE-2022-49163] = "fixed-version: Fixed from version 5.18" | ||
2569 | |||
2570 | CVE_STATUS[CVE-2022-49164] = "fixed-version: Fixed from version 5.18" | ||
2571 | |||
2572 | CVE_STATUS[CVE-2022-49165] = "fixed-version: Fixed from version 5.18" | ||
2573 | |||
2574 | CVE_STATUS[CVE-2022-49166] = "fixed-version: Fixed from version 5.18" | ||
2575 | |||
2576 | CVE_STATUS[CVE-2022-49167] = "fixed-version: Fixed from version 5.18" | ||
2577 | |||
2578 | CVE_STATUS[CVE-2022-49168] = "fixed-version: Fixed from version 5.18" | ||
2579 | |||
2580 | CVE_STATUS[CVE-2022-49169] = "fixed-version: Fixed from version 5.18" | ||
2581 | |||
2582 | CVE_STATUS[CVE-2022-49170] = "fixed-version: Fixed from version 5.18" | ||
2583 | |||
2584 | CVE_STATUS[CVE-2022-49171] = "fixed-version: Fixed from version 5.18" | ||
2585 | |||
2586 | CVE_STATUS[CVE-2022-49172] = "fixed-version: Fixed from version 5.18" | ||
2587 | |||
2588 | CVE_STATUS[CVE-2022-49173] = "fixed-version: Fixed from version 5.18" | ||
2589 | |||
2590 | CVE_STATUS[CVE-2022-49174] = "fixed-version: Fixed from version 5.18" | ||
2591 | |||
2592 | CVE_STATUS[CVE-2022-49175] = "fixed-version: Fixed from version 5.18" | ||
2593 | |||
2594 | CVE_STATUS[CVE-2022-49176] = "fixed-version: Fixed from version 5.18" | ||
2595 | |||
2596 | CVE_STATUS[CVE-2022-49177] = "fixed-version: Fixed from version 5.18" | ||
2597 | |||
2598 | CVE_STATUS[CVE-2022-49178] = "fixed-version: Fixed from version 5.18" | ||
2599 | |||
2600 | CVE_STATUS[CVE-2022-49179] = "fixed-version: Fixed from version 5.18" | ||
2601 | |||
2602 | CVE_STATUS[CVE-2022-49180] = "fixed-version: Fixed from version 5.18" | ||
2603 | |||
2604 | CVE_STATUS[CVE-2022-49182] = "fixed-version: Fixed from version 5.18" | ||
2605 | |||
2606 | CVE_STATUS[CVE-2022-49183] = "fixed-version: Fixed from version 5.18" | ||
2607 | |||
2608 | CVE_STATUS[CVE-2022-49184] = "fixed-version: Fixed from version 5.18" | ||
2609 | |||
2610 | CVE_STATUS[CVE-2022-49185] = "fixed-version: Fixed from version 5.18" | ||
2611 | |||
2612 | CVE_STATUS[CVE-2022-49186] = "fixed-version: Fixed from version 5.18" | ||
2613 | |||
2614 | CVE_STATUS[CVE-2022-49187] = "fixed-version: Fixed from version 5.18" | ||
2615 | |||
2616 | CVE_STATUS[CVE-2022-49188] = "fixed-version: Fixed from version 5.18" | ||
2617 | |||
2618 | CVE_STATUS[CVE-2022-49189] = "fixed-version: Fixed from version 5.18" | ||
2619 | |||
2620 | CVE_STATUS[CVE-2022-49190] = "fixed-version: Fixed from version 5.18" | ||
2621 | |||
2622 | CVE_STATUS[CVE-2022-49191] = "fixed-version: Fixed from version 5.18" | ||
2623 | |||
2624 | CVE_STATUS[CVE-2022-49192] = "fixed-version: Fixed from version 5.18" | ||
2625 | |||
2626 | CVE_STATUS[CVE-2022-49193] = "fixed-version: Fixed from version 5.18" | ||
2627 | |||
2628 | CVE_STATUS[CVE-2022-49194] = "fixed-version: Fixed from version 5.18" | ||
2629 | |||
2630 | CVE_STATUS[CVE-2022-49195] = "fixed-version: Fixed from version 5.18" | ||
2631 | |||
2632 | CVE_STATUS[CVE-2022-49196] = "fixed-version: Fixed from version 5.18" | ||
2633 | |||
2634 | CVE_STATUS[CVE-2022-49197] = "fixed-version: Fixed from version 5.18" | ||
2635 | |||
2636 | CVE_STATUS[CVE-2022-49198] = "fixed-version: Fixed from version 5.18" | ||
2637 | |||
2638 | CVE_STATUS[CVE-2022-49199] = "fixed-version: Fixed from version 5.18" | ||
2639 | |||
2640 | CVE_STATUS[CVE-2022-49200] = "fixed-version: Fixed from version 5.18" | ||
2641 | |||
2642 | CVE_STATUS[CVE-2022-49201] = "fixed-version: Fixed from version 5.18" | ||
2643 | |||
2644 | CVE_STATUS[CVE-2022-49202] = "fixed-version: Fixed from version 5.18" | ||
2645 | |||
2646 | CVE_STATUS[CVE-2022-49203] = "fixed-version: Fixed from version 5.18" | ||
2647 | |||
2648 | CVE_STATUS[CVE-2022-49204] = "fixed-version: Fixed from version 5.18" | ||
2649 | |||
2650 | CVE_STATUS[CVE-2022-49205] = "fixed-version: Fixed from version 5.18" | ||
2651 | |||
2652 | CVE_STATUS[CVE-2022-49206] = "fixed-version: Fixed from version 5.18" | ||
2653 | |||
2654 | CVE_STATUS[CVE-2022-49207] = "fixed-version: Fixed from version 5.18" | ||
2655 | |||
2656 | CVE_STATUS[CVE-2022-49208] = "fixed-version: Fixed from version 5.18" | ||
2657 | |||
2658 | CVE_STATUS[CVE-2022-49209] = "fixed-version: Fixed from version 5.18" | ||
2659 | |||
2660 | CVE_STATUS[CVE-2022-49210] = "fixed-version: Fixed from version 5.18" | ||
2661 | |||
2662 | CVE_STATUS[CVE-2022-49211] = "fixed-version: Fixed from version 5.18" | ||
2663 | |||
2664 | CVE_STATUS[CVE-2022-49212] = "fixed-version: Fixed from version 5.18" | ||
2665 | |||
2666 | CVE_STATUS[CVE-2022-49213] = "fixed-version: Fixed from version 5.18" | ||
2667 | |||
2668 | CVE_STATUS[CVE-2022-49214] = "fixed-version: Fixed from version 5.18" | ||
2669 | |||
2670 | CVE_STATUS[CVE-2022-49215] = "fixed-version: Fixed from version 5.18" | ||
2671 | |||
2672 | CVE_STATUS[CVE-2022-49216] = "fixed-version: Fixed from version 5.18" | ||
2673 | |||
2674 | CVE_STATUS[CVE-2022-49217] = "fixed-version: Fixed from version 5.18" | ||
2675 | |||
2676 | CVE_STATUS[CVE-2022-49218] = "fixed-version: Fixed from version 5.18" | ||
2677 | |||
2678 | CVE_STATUS[CVE-2022-49219] = "fixed-version: Fixed from version 5.18" | ||
2679 | |||
2680 | CVE_STATUS[CVE-2022-49220] = "fixed-version: Fixed from version 5.18" | ||
2681 | |||
2682 | CVE_STATUS[CVE-2022-49221] = "fixed-version: Fixed from version 5.18" | ||
2683 | |||
2684 | CVE_STATUS[CVE-2022-49222] = "fixed-version: Fixed from version 5.18" | ||
2685 | |||
2686 | CVE_STATUS[CVE-2022-49223] = "fixed-version: Fixed from version 5.18" | ||
2687 | |||
2688 | CVE_STATUS[CVE-2022-49224] = "fixed-version: Fixed from version 5.18" | ||
2689 | |||
2690 | CVE_STATUS[CVE-2022-49225] = "fixed-version: Fixed from version 5.18" | ||
2691 | |||
2692 | CVE_STATUS[CVE-2022-49226] = "fixed-version: Fixed from version 5.18" | ||
2693 | |||
2694 | CVE_STATUS[CVE-2022-49227] = "fixed-version: Fixed from version 5.18" | ||
2695 | |||
2696 | CVE_STATUS[CVE-2022-49228] = "fixed-version: Fixed from version 5.18" | ||
2697 | |||
2698 | CVE_STATUS[CVE-2022-49229] = "fixed-version: Fixed from version 5.18" | ||
2699 | |||
2700 | CVE_STATUS[CVE-2022-49230] = "fixed-version: Fixed from version 5.18" | ||
2701 | |||
2702 | CVE_STATUS[CVE-2022-49231] = "fixed-version: Fixed from version 5.18" | ||
2703 | |||
2704 | CVE_STATUS[CVE-2022-49232] = "fixed-version: Fixed from version 5.18" | ||
2705 | |||
2706 | CVE_STATUS[CVE-2022-49233] = "fixed-version: Fixed from version 5.18" | ||
2707 | |||
2708 | CVE_STATUS[CVE-2022-49234] = "fixed-version: Fixed from version 5.18" | ||
2709 | |||
2710 | CVE_STATUS[CVE-2022-49235] = "fixed-version: Fixed from version 5.18" | ||
2711 | |||
2712 | CVE_STATUS[CVE-2022-49236] = "fixed-version: Fixed from version 5.18" | ||
2713 | |||
2714 | CVE_STATUS[CVE-2022-49237] = "fixed-version: Fixed from version 5.18" | ||
2715 | |||
2716 | CVE_STATUS[CVE-2022-49238] = "fixed-version: Fixed from version 5.18" | ||
2717 | |||
2718 | CVE_STATUS[CVE-2022-49239] = "fixed-version: Fixed from version 5.18" | ||
2719 | |||
2720 | CVE_STATUS[CVE-2022-49240] = "fixed-version: Fixed from version 5.18" | ||
2721 | |||
2722 | CVE_STATUS[CVE-2022-49241] = "fixed-version: Fixed from version 5.18" | ||
2723 | |||
2724 | CVE_STATUS[CVE-2022-49242] = "fixed-version: Fixed from version 5.18" | ||
2725 | |||
2726 | CVE_STATUS[CVE-2022-49243] = "fixed-version: Fixed from version 5.18" | ||
2727 | |||
2728 | CVE_STATUS[CVE-2022-49244] = "fixed-version: Fixed from version 5.18" | ||
2729 | |||
2730 | CVE_STATUS[CVE-2022-49245] = "fixed-version: Fixed from version 5.18" | ||
2731 | |||
2732 | CVE_STATUS[CVE-2022-49246] = "fixed-version: Fixed from version 5.18" | ||
2733 | |||
2734 | CVE_STATUS[CVE-2022-49247] = "fixed-version: Fixed from version 5.18" | ||
2735 | |||
2736 | CVE_STATUS[CVE-2022-49248] = "fixed-version: Fixed from version 5.18" | ||
2737 | |||
2738 | CVE_STATUS[CVE-2022-49249] = "fixed-version: Fixed from version 5.18" | ||
2739 | |||
2740 | CVE_STATUS[CVE-2022-49250] = "fixed-version: Fixed from version 5.18" | ||
2741 | |||
2742 | CVE_STATUS[CVE-2022-49251] = "fixed-version: Fixed from version 5.18" | ||
2743 | |||
2744 | CVE_STATUS[CVE-2022-49252] = "fixed-version: Fixed from version 5.18" | ||
2745 | |||
2746 | CVE_STATUS[CVE-2022-49253] = "fixed-version: Fixed from version 5.18" | ||
2747 | |||
2748 | CVE_STATUS[CVE-2022-49254] = "fixed-version: Fixed from version 5.18" | ||
2749 | |||
2750 | CVE_STATUS[CVE-2022-49255] = "fixed-version: Fixed from version 5.18" | ||
2751 | |||
2752 | CVE_STATUS[CVE-2022-49256] = "fixed-version: Fixed from version 5.18" | ||
2753 | |||
2754 | CVE_STATUS[CVE-2022-49257] = "fixed-version: Fixed from version 5.18" | ||
2755 | |||
2756 | CVE_STATUS[CVE-2022-49258] = "fixed-version: Fixed from version 5.18" | ||
2757 | |||
2758 | CVE_STATUS[CVE-2022-49259] = "fixed-version: Fixed from version 5.18" | ||
2759 | |||
2760 | CVE_STATUS[CVE-2022-49260] = "fixed-version: Fixed from version 5.18" | ||
2761 | |||
2762 | CVE_STATUS[CVE-2022-49261] = "fixed-version: Fixed from version 5.18" | ||
2763 | |||
2764 | CVE_STATUS[CVE-2022-49262] = "fixed-version: Fixed from version 5.18" | ||
2765 | |||
2766 | CVE_STATUS[CVE-2022-49263] = "fixed-version: Fixed from version 5.18" | ||
2767 | |||
2768 | CVE_STATUS[CVE-2022-49264] = "fixed-version: Fixed from version 5.18" | ||
2769 | |||
2770 | CVE_STATUS[CVE-2022-49265] = "fixed-version: Fixed from version 5.18" | ||
2771 | |||
2772 | CVE_STATUS[CVE-2022-49266] = "fixed-version: Fixed from version 5.18" | ||
2773 | |||
2774 | CVE_STATUS[CVE-2022-49267] = "fixed-version: Fixed from version 5.18" | ||
2775 | |||
2776 | CVE_STATUS[CVE-2022-49268] = "fixed-version: Fixed from version 5.18" | ||
2777 | |||
2778 | CVE_STATUS[CVE-2022-49269] = "fixed-version: Fixed from version 5.18" | ||
2779 | |||
2780 | CVE_STATUS[CVE-2022-49270] = "fixed-version: Fixed from version 5.18" | ||
2781 | |||
2782 | CVE_STATUS[CVE-2022-49271] = "fixed-version: Fixed from version 5.18" | ||
2783 | |||
2784 | CVE_STATUS[CVE-2022-49272] = "fixed-version: Fixed from version 5.17.2" | ||
2785 | |||
2786 | CVE_STATUS[CVE-2022-49273] = "fixed-version: Fixed from version 5.18" | ||
2787 | |||
2788 | CVE_STATUS[CVE-2022-49274] = "fixed-version: Fixed from version 5.18" | ||
2789 | |||
2790 | CVE_STATUS[CVE-2022-49275] = "fixed-version: Fixed from version 5.18" | ||
2791 | |||
2792 | CVE_STATUS[CVE-2022-49276] = "fixed-version: Fixed from version 5.18" | ||
2793 | |||
2794 | CVE_STATUS[CVE-2022-49277] = "fixed-version: Fixed from version 5.18" | ||
2795 | |||
2796 | CVE_STATUS[CVE-2022-49278] = "fixed-version: Fixed from version 5.18" | ||
2797 | |||
2798 | CVE_STATUS[CVE-2022-49279] = "fixed-version: Fixed from version 5.18" | ||
2799 | |||
2800 | CVE_STATUS[CVE-2022-49280] = "fixed-version: Fixed from version 5.18" | ||
2801 | |||
2802 | CVE_STATUS[CVE-2022-49281] = "fixed-version: Fixed from version 5.18" | ||
2803 | |||
2804 | CVE_STATUS[CVE-2022-49282] = "fixed-version: Fixed from version 5.18" | ||
2805 | |||
2806 | CVE_STATUS[CVE-2022-49283] = "fixed-version: Fixed from version 5.18" | ||
2807 | |||
2808 | CVE_STATUS[CVE-2022-49284] = "fixed-version: Fixed from version 5.18" | ||
2809 | |||
2810 | CVE_STATUS[CVE-2022-49285] = "fixed-version: Fixed from version 5.18" | ||
2811 | |||
2812 | CVE_STATUS[CVE-2022-49286] = "fixed-version: Fixed from version 5.18" | ||
2813 | |||
2814 | CVE_STATUS[CVE-2022-49287] = "fixed-version: Fixed from version 5.18" | ||
2815 | |||
2816 | CVE_STATUS[CVE-2022-49288] = "fixed-version: Fixed from version 5.18" | ||
2817 | |||
2818 | CVE_STATUS[CVE-2022-49289] = "fixed-version: Fixed from version 5.18" | ||
2819 | |||
2820 | CVE_STATUS[CVE-2022-49290] = "fixed-version: Fixed from version 5.18" | ||
2821 | |||
2822 | CVE_STATUS[CVE-2022-49291] = "fixed-version: Fixed from version 5.18" | ||
2823 | |||
2824 | CVE_STATUS[CVE-2022-49292] = "fixed-version: Fixed from version 5.18" | ||
2825 | |||
2826 | CVE_STATUS[CVE-2022-49293] = "fixed-version: Fixed from version 5.18" | ||
2827 | |||
2828 | CVE_STATUS[CVE-2022-49294] = "fixed-version: Fixed from version 5.19" | ||
2829 | |||
2830 | CVE_STATUS[CVE-2022-49295] = "fixed-version: Fixed from version 5.19" | ||
2831 | |||
2832 | CVE_STATUS[CVE-2022-49296] = "fixed-version: Fixed from version 5.19" | ||
2833 | |||
2834 | CVE_STATUS[CVE-2022-49297] = "fixed-version: Fixed from version 5.19" | ||
2835 | |||
2836 | CVE_STATUS[CVE-2022-49298] = "fixed-version: Fixed from version 5.19" | ||
2837 | |||
2838 | CVE_STATUS[CVE-2022-49299] = "fixed-version: Fixed from version 5.19" | ||
2839 | |||
2840 | CVE_STATUS[CVE-2022-49300] = "fixed-version: Fixed from version 5.19" | ||
2841 | |||
2842 | CVE_STATUS[CVE-2022-49301] = "fixed-version: Fixed from version 5.19" | ||
2843 | |||
2844 | CVE_STATUS[CVE-2022-49302] = "fixed-version: Fixed from version 5.19" | ||
2845 | |||
2846 | CVE_STATUS[CVE-2022-49303] = "fixed-version: Fixed from version 5.19" | ||
2847 | |||
2848 | CVE_STATUS[CVE-2022-49304] = "fixed-version: Fixed from version 5.19" | ||
2849 | |||
2850 | CVE_STATUS[CVE-2022-49305] = "fixed-version: Fixed from version 5.19" | ||
2851 | |||
2852 | CVE_STATUS[CVE-2022-49306] = "fixed-version: Fixed from version 5.19" | ||
2853 | |||
2854 | CVE_STATUS[CVE-2022-49307] = "fixed-version: Fixed from version 5.19" | ||
2855 | |||
2856 | CVE_STATUS[CVE-2022-49308] = "fixed-version: Fixed from version 5.19" | ||
2857 | |||
2858 | CVE_STATUS[CVE-2022-49309] = "fixed-version: Fixed from version 5.19" | ||
2859 | |||
2860 | CVE_STATUS[CVE-2022-49310] = "fixed-version: Fixed from version 5.19" | ||
2861 | |||
2862 | CVE_STATUS[CVE-2022-49311] = "fixed-version: Fixed from version 5.19" | ||
2863 | |||
2864 | CVE_STATUS[CVE-2022-49312] = "fixed-version: Fixed from version 5.19" | ||
2865 | |||
2866 | CVE_STATUS[CVE-2022-49313] = "fixed-version: Fixed from version 5.19" | ||
2867 | |||
2868 | CVE_STATUS[CVE-2022-49314] = "fixed-version: Fixed from version 5.19" | ||
2869 | |||
2870 | CVE_STATUS[CVE-2022-49315] = "fixed-version: Fixed from version 5.19" | ||
2871 | |||
2872 | CVE_STATUS[CVE-2022-49316] = "fixed-version: Fixed from version 5.19" | ||
2873 | |||
2874 | CVE_STATUS[CVE-2022-49317] = "fixed-version: Fixed from version 5.19" | ||
2875 | |||
2876 | CVE_STATUS[CVE-2022-49318] = "fixed-version: Fixed from version 5.19" | ||
2877 | |||
2878 | CVE_STATUS[CVE-2022-49319] = "fixed-version: Fixed from version 5.19" | ||
2879 | |||
2880 | CVE_STATUS[CVE-2022-49320] = "fixed-version: Fixed from version 5.19" | ||
2881 | |||
2882 | CVE_STATUS[CVE-2022-49321] = "fixed-version: Fixed from version 5.19" | ||
2883 | |||
2884 | CVE_STATUS[CVE-2022-49322] = "fixed-version: Fixed from version 5.19" | ||
2885 | |||
2886 | CVE_STATUS[CVE-2022-49323] = "fixed-version: Fixed from version 5.19" | ||
2887 | |||
2888 | CVE_STATUS[CVE-2022-49324] = "fixed-version: Fixed from version 5.19" | ||
2889 | |||
2890 | CVE_STATUS[CVE-2022-49325] = "fixed-version: Fixed from version 5.19" | ||
2891 | |||
2892 | CVE_STATUS[CVE-2022-49326] = "fixed-version: Fixed from version 5.19" | ||
2893 | |||
2894 | CVE_STATUS[CVE-2022-49327] = "fixed-version: Fixed from version 5.19" | ||
2895 | |||
2896 | CVE_STATUS[CVE-2022-49328] = "fixed-version: Fixed from version 5.19" | ||
2897 | |||
2898 | CVE_STATUS[CVE-2022-49329] = "fixed-version: Fixed from version 5.19" | ||
2899 | |||
2900 | CVE_STATUS[CVE-2022-49330] = "fixed-version: Fixed from version 5.19" | ||
2901 | |||
2902 | CVE_STATUS[CVE-2022-49331] = "fixed-version: Fixed from version 5.19" | ||
2903 | |||
2904 | CVE_STATUS[CVE-2022-49332] = "fixed-version: Fixed from version 5.19" | ||
2905 | |||
2906 | CVE_STATUS[CVE-2022-49333] = "fixed-version: Fixed from version 5.19" | ||
2907 | |||
2908 | CVE_STATUS[CVE-2022-49334] = "fixed-version: Fixed from version 5.19" | ||
2909 | |||
2910 | CVE_STATUS[CVE-2022-49335] = "fixed-version: Fixed from version 5.19" | ||
2911 | |||
2912 | CVE_STATUS[CVE-2022-49336] = "fixed-version: Fixed from version 5.19" | ||
2913 | |||
2914 | CVE_STATUS[CVE-2022-49337] = "fixed-version: Fixed from version 5.19" | ||
2915 | |||
2916 | CVE_STATUS[CVE-2022-49338] = "fixed-version: Fixed from version 5.19" | ||
2917 | |||
2918 | CVE_STATUS[CVE-2022-49339] = "fixed-version: Fixed from version 5.19" | ||
2919 | |||
2920 | CVE_STATUS[CVE-2022-49340] = "fixed-version: Fixed from version 5.19" | ||
2921 | |||
2922 | CVE_STATUS[CVE-2022-49341] = "fixed-version: Fixed from version 5.19" | ||
2923 | |||
2924 | CVE_STATUS[CVE-2022-49342] = "fixed-version: Fixed from version 5.19" | ||
2925 | |||
2926 | CVE_STATUS[CVE-2022-49343] = "fixed-version: Fixed from version 5.19" | ||
2927 | |||
2928 | CVE_STATUS[CVE-2022-49344] = "fixed-version: Fixed from version 5.19" | ||
2929 | |||
2930 | CVE_STATUS[CVE-2022-49345] = "fixed-version: Fixed from version 5.19" | ||
2931 | |||
2932 | CVE_STATUS[CVE-2022-49346] = "fixed-version: Fixed from version 5.19" | ||
2933 | |||
2934 | CVE_STATUS[CVE-2022-49347] = "fixed-version: Fixed from version 5.19" | ||
2935 | |||
2936 | CVE_STATUS[CVE-2022-49348] = "fixed-version: Fixed from version 5.19" | ||
2937 | |||
2938 | CVE_STATUS[CVE-2022-49349] = "fixed-version: Fixed from version 5.19" | ||
2939 | |||
2940 | CVE_STATUS[CVE-2022-49350] = "fixed-version: Fixed from version 5.19" | ||
2941 | |||
2942 | CVE_STATUS[CVE-2022-49351] = "fixed-version: Fixed from version 5.19" | ||
2943 | |||
2944 | CVE_STATUS[CVE-2022-49352] = "fixed-version: Fixed from version 5.19" | ||
2945 | |||
2946 | CVE_STATUS[CVE-2022-49353] = "fixed-version: Fixed from version 5.18.4" | ||
2947 | |||
2948 | CVE_STATUS[CVE-2022-49354] = "fixed-version: Fixed from version 5.19" | ||
2949 | |||
2950 | CVE_STATUS[CVE-2022-49356] = "fixed-version: Fixed from version 5.19" | ||
2951 | |||
2952 | CVE_STATUS[CVE-2022-49357] = "fixed-version: Fixed from version 5.19" | ||
2953 | |||
2954 | CVE_STATUS[CVE-2022-49358] = "fixed-version: Fixed from version 5.19" | ||
2955 | |||
2956 | CVE_STATUS[CVE-2022-49359] = "fixed-version: Fixed from version 5.19" | ||
2957 | |||
2958 | CVE_STATUS[CVE-2022-49360] = "fixed-version: Fixed from version 5.19" | ||
2959 | |||
2960 | CVE_STATUS[CVE-2022-49361] = "fixed-version: Fixed from version 5.19" | ||
2961 | |||
2962 | CVE_STATUS[CVE-2022-49362] = "fixed-version: Fixed from version 5.19" | ||
2963 | |||
2964 | CVE_STATUS[CVE-2022-49363] = "fixed-version: Fixed from version 5.19" | ||
2965 | |||
2966 | CVE_STATUS[CVE-2022-49364] = "fixed-version: Fixed from version 5.19" | ||
2967 | |||
2968 | CVE_STATUS[CVE-2022-49365] = "fixed-version: Fixed from version 5.19" | ||
2969 | |||
2970 | CVE_STATUS[CVE-2022-49366] = "fixed-version: Fixed from version 5.19" | ||
2971 | |||
2972 | CVE_STATUS[CVE-2022-49367] = "fixed-version: Fixed from version 5.19" | ||
2973 | |||
2974 | CVE_STATUS[CVE-2022-49368] = "fixed-version: Fixed from version 5.19" | ||
2975 | |||
2976 | CVE_STATUS[CVE-2022-49369] = "fixed-version: Fixed from version 5.19" | ||
2977 | |||
2978 | CVE_STATUS[CVE-2022-49370] = "fixed-version: Fixed from version 5.19" | ||
2979 | |||
2980 | CVE_STATUS[CVE-2022-49371] = "fixed-version: Fixed from version 5.19" | ||
2981 | |||
2982 | CVE_STATUS[CVE-2022-49372] = "fixed-version: Fixed from version 5.19" | ||
2983 | |||
2984 | CVE_STATUS[CVE-2022-49373] = "fixed-version: Fixed from version 5.19" | ||
2985 | |||
2986 | CVE_STATUS[CVE-2022-49374] = "fixed-version: Fixed from version 5.19" | ||
2987 | |||
2988 | CVE_STATUS[CVE-2022-49375] = "fixed-version: Fixed from version 5.19" | ||
2989 | |||
2990 | CVE_STATUS[CVE-2022-49376] = "fixed-version: Fixed from version 5.19" | ||
2991 | |||
2992 | CVE_STATUS[CVE-2022-49377] = "fixed-version: Fixed from version 5.19" | ||
2993 | |||
2994 | CVE_STATUS[CVE-2022-49378] = "fixed-version: Fixed from version 5.19" | ||
2995 | |||
2996 | CVE_STATUS[CVE-2022-49379] = "fixed-version: Fixed from version 5.19" | ||
2997 | |||
2998 | CVE_STATUS[CVE-2022-49380] = "fixed-version: Fixed from version 5.19" | ||
2999 | |||
3000 | CVE_STATUS[CVE-2022-49381] = "fixed-version: Fixed from version 5.19" | ||
3001 | |||
3002 | CVE_STATUS[CVE-2022-49382] = "fixed-version: Fixed from version 5.19" | ||
3003 | |||
3004 | CVE_STATUS[CVE-2022-49383] = "fixed-version: Fixed from version 5.19" | ||
3005 | |||
3006 | CVE_STATUS[CVE-2022-49384] = "fixed-version: Fixed from version 5.19" | ||
3007 | |||
3008 | CVE_STATUS[CVE-2022-49385] = "fixed-version: Fixed from version 5.19" | ||
3009 | |||
3010 | CVE_STATUS[CVE-2022-49386] = "fixed-version: Fixed from version 5.19" | ||
3011 | |||
3012 | CVE_STATUS[CVE-2022-49387] = "fixed-version: Fixed from version 5.19" | ||
3013 | |||
3014 | CVE_STATUS[CVE-2022-49388] = "fixed-version: Fixed from version 5.19" | ||
3015 | |||
3016 | CVE_STATUS[CVE-2022-49389] = "fixed-version: Fixed from version 5.19" | ||
3017 | |||
3018 | CVE_STATUS[CVE-2022-49390] = "fixed-version: Fixed from version 5.19" | ||
3019 | |||
3020 | CVE_STATUS[CVE-2022-49391] = "fixed-version: Fixed from version 5.19" | ||
3021 | |||
3022 | CVE_STATUS[CVE-2022-49392] = "fixed-version: Fixed from version 5.19" | ||
3023 | |||
3024 | CVE_STATUS[CVE-2022-49393] = "fixed-version: Fixed from version 5.19" | ||
3025 | |||
3026 | CVE_STATUS[CVE-2022-49394] = "fixed-version: Fixed from version 5.19" | ||
3027 | |||
3028 | CVE_STATUS[CVE-2022-49395] = "fixed-version: Fixed from version 5.19" | ||
3029 | |||
3030 | CVE_STATUS[CVE-2022-49396] = "fixed-version: Fixed from version 5.19" | ||
3031 | |||
3032 | CVE_STATUS[CVE-2022-49397] = "fixed-version: Fixed from version 5.19" | ||
3033 | |||
3034 | CVE_STATUS[CVE-2022-49398] = "fixed-version: Fixed from version 5.19" | ||
3035 | |||
3036 | CVE_STATUS[CVE-2022-49399] = "fixed-version: Fixed from version 5.19" | ||
3037 | |||
3038 | CVE_STATUS[CVE-2022-49400] = "fixed-version: Fixed from version 5.19" | ||
3039 | |||
3040 | CVE_STATUS[CVE-2022-49401] = "fixed-version: Fixed from version 5.19" | ||
3041 | |||
3042 | CVE_STATUS[CVE-2022-49402] = "fixed-version: Fixed from version 5.19" | ||
3043 | |||
3044 | CVE_STATUS[CVE-2022-49403] = "fixed-version: Fixed from version 5.19" | ||
3045 | |||
3046 | CVE_STATUS[CVE-2022-49404] = "fixed-version: Fixed from version 5.19" | ||
3047 | |||
3048 | CVE_STATUS[CVE-2022-49405] = "fixed-version: Fixed from version 5.19" | ||
3049 | |||
3050 | CVE_STATUS[CVE-2022-49406] = "fixed-version: Fixed from version 5.19" | ||
3051 | |||
3052 | CVE_STATUS[CVE-2022-49407] = "fixed-version: Fixed from version 5.19" | ||
3053 | |||
3054 | CVE_STATUS[CVE-2022-49408] = "fixed-version: Fixed from version 5.19" | ||
3055 | |||
3056 | CVE_STATUS[CVE-2022-49409] = "fixed-version: Fixed from version 5.19" | ||
3057 | |||
3058 | CVE_STATUS[CVE-2022-49410] = "fixed-version: Fixed from version 5.19" | ||
3059 | |||
3060 | CVE_STATUS[CVE-2022-49411] = "fixed-version: Fixed from version 5.19" | ||
3061 | |||
3062 | CVE_STATUS[CVE-2022-49412] = "fixed-version: Fixed from version 5.19" | ||
3063 | |||
3064 | CVE_STATUS[CVE-2022-49413] = "fixed-version: Fixed from version 5.19" | ||
3065 | |||
3066 | CVE_STATUS[CVE-2022-49414] = "fixed-version: Fixed from version 5.19" | ||
3067 | |||
3068 | CVE_STATUS[CVE-2022-49415] = "fixed-version: Fixed from version 5.19" | ||
3069 | |||
3070 | CVE_STATUS[CVE-2022-49416] = "fixed-version: Fixed from version 5.19" | ||
3071 | |||
3072 | CVE_STATUS[CVE-2022-49417] = "fixed-version: Fixed from version 5.19" | ||
3073 | |||
3074 | CVE_STATUS[CVE-2022-49418] = "fixed-version: Fixed from version 5.19" | ||
3075 | |||
3076 | CVE_STATUS[CVE-2022-49419] = "fixed-version: Fixed from version 5.19" | ||
3077 | |||
3078 | CVE_STATUS[CVE-2022-49420] = "fixed-version: Fixed from version 5.19" | ||
3079 | |||
3080 | CVE_STATUS[CVE-2022-49421] = "fixed-version: Fixed from version 5.19" | ||
3081 | |||
3082 | CVE_STATUS[CVE-2022-49422] = "fixed-version: Fixed from version 5.19" | ||
3083 | |||
3084 | CVE_STATUS[CVE-2022-49423] = "fixed-version: Fixed from version 5.19" | ||
3085 | |||
3086 | CVE_STATUS[CVE-2022-49424] = "fixed-version: Fixed from version 5.19" | ||
3087 | |||
3088 | CVE_STATUS[CVE-2022-49425] = "fixed-version: Fixed from version 5.19" | ||
3089 | |||
3090 | CVE_STATUS[CVE-2022-49426] = "fixed-version: Fixed from version 5.19" | ||
3091 | |||
3092 | CVE_STATUS[CVE-2022-49427] = "fixed-version: Fixed from version 5.19" | ||
3093 | |||
3094 | CVE_STATUS[CVE-2022-49428] = "fixed-version: Fixed from version 5.19" | ||
3095 | |||
3096 | CVE_STATUS[CVE-2022-49429] = "fixed-version: Fixed from version 5.19" | ||
3097 | |||
3098 | CVE_STATUS[CVE-2022-49430] = "fixed-version: Fixed from version 5.19" | ||
3099 | |||
3100 | CVE_STATUS[CVE-2022-49431] = "fixed-version: Fixed from version 5.19" | ||
3101 | |||
3102 | CVE_STATUS[CVE-2022-49432] = "fixed-version: Fixed from version 5.19" | ||
3103 | |||
3104 | CVE_STATUS[CVE-2022-49433] = "fixed-version: Fixed from version 5.19" | ||
3105 | |||
3106 | CVE_STATUS[CVE-2022-49434] = "fixed-version: Fixed from version 5.19" | ||
3107 | |||
3108 | CVE_STATUS[CVE-2022-49435] = "fixed-version: Fixed from version 5.19" | ||
3109 | |||
3110 | CVE_STATUS[CVE-2022-49436] = "fixed-version: Fixed from version 5.19" | ||
3111 | |||
3112 | CVE_STATUS[CVE-2022-49437] = "fixed-version: Fixed from version 5.19" | ||
3113 | |||
3114 | CVE_STATUS[CVE-2022-49438] = "fixed-version: Fixed from version 5.19" | ||
3115 | |||
3116 | CVE_STATUS[CVE-2022-49439] = "fixed-version: Fixed from version 5.19" | ||
3117 | |||
3118 | CVE_STATUS[CVE-2022-49440] = "fixed-version: Fixed from version 5.19" | ||
3119 | |||
3120 | CVE_STATUS[CVE-2022-49441] = "fixed-version: Fixed from version 5.19" | ||
3121 | |||
3122 | CVE_STATUS[CVE-2022-49442] = "fixed-version: Fixed from version 5.19" | ||
3123 | |||
3124 | CVE_STATUS[CVE-2022-49443] = "fixed-version: Fixed from version 5.19" | ||
3125 | |||
3126 | CVE_STATUS[CVE-2022-49444] = "fixed-version: Fixed from version 5.19" | ||
3127 | |||
3128 | CVE_STATUS[CVE-2022-49445] = "fixed-version: Fixed from version 5.19" | ||
3129 | |||
3130 | CVE_STATUS[CVE-2022-49446] = "fixed-version: Fixed from version 5.19" | ||
3131 | |||
3132 | CVE_STATUS[CVE-2022-49447] = "fixed-version: Fixed from version 5.19" | ||
3133 | |||
3134 | CVE_STATUS[CVE-2022-49448] = "fixed-version: Fixed from version 5.19" | ||
3135 | |||
3136 | CVE_STATUS[CVE-2022-49449] = "fixed-version: Fixed from version 5.19" | ||
3137 | |||
3138 | CVE_STATUS[CVE-2022-49450] = "fixed-version: Fixed from version 5.19" | ||
3139 | |||
3140 | CVE_STATUS[CVE-2022-49451] = "fixed-version: Fixed from version 5.19" | ||
3141 | |||
3142 | CVE_STATUS[CVE-2022-49452] = "fixed-version: Fixed from version 5.19" | ||
3143 | |||
3144 | CVE_STATUS[CVE-2022-49453] = "fixed-version: Fixed from version 5.19" | ||
3145 | |||
3146 | CVE_STATUS[CVE-2022-49454] = "fixed-version: Fixed from version 5.19" | ||
3147 | |||
3148 | CVE_STATUS[CVE-2022-49455] = "fixed-version: Fixed from version 5.19" | ||
3149 | |||
3150 | CVE_STATUS[CVE-2022-49456] = "fixed-version: Fixed from version 5.19" | ||
3151 | |||
3152 | CVE_STATUS[CVE-2022-49457] = "fixed-version: Fixed from version 5.19" | ||
3153 | |||
3154 | CVE_STATUS[CVE-2022-49458] = "fixed-version: Fixed from version 5.19" | ||
3155 | |||
3156 | CVE_STATUS[CVE-2022-49459] = "fixed-version: Fixed from version 5.19" | ||
3157 | |||
3158 | CVE_STATUS[CVE-2022-49460] = "fixed-version: Fixed from version 5.19" | ||
3159 | |||
3160 | CVE_STATUS[CVE-2022-49461] = "fixed-version: Fixed from version 5.19" | ||
3161 | |||
3162 | CVE_STATUS[CVE-2022-49462] = "fixed-version: Fixed from version 5.19" | ||
3163 | |||
3164 | CVE_STATUS[CVE-2022-49463] = "fixed-version: Fixed from version 5.19" | ||
3165 | |||
3166 | CVE_STATUS[CVE-2022-49464] = "fixed-version: Fixed from version 5.19" | ||
3167 | |||
3168 | CVE_STATUS[CVE-2022-49465] = "fixed-version: Fixed from version 5.19" | ||
3169 | |||
3170 | CVE_STATUS[CVE-2022-49466] = "fixed-version: Fixed from version 5.19" | ||
3171 | |||
3172 | CVE_STATUS[CVE-2022-49467] = "fixed-version: Fixed from version 5.19" | ||
3173 | |||
3174 | CVE_STATUS[CVE-2022-49468] = "fixed-version: Fixed from version 5.19" | ||
3175 | |||
3176 | CVE_STATUS[CVE-2022-49469] = "fixed-version: Fixed from version 5.19" | ||
3177 | |||
3178 | CVE_STATUS[CVE-2022-49470] = "fixed-version: Fixed from version 5.19" | ||
3179 | |||
3180 | CVE_STATUS[CVE-2022-49471] = "fixed-version: Fixed from version 5.19" | ||
3181 | |||
3182 | CVE_STATUS[CVE-2022-49472] = "fixed-version: Fixed from version 5.19" | ||
3183 | |||
3184 | CVE_STATUS[CVE-2022-49473] = "fixed-version: Fixed from version 5.19" | ||
3185 | |||
3186 | CVE_STATUS[CVE-2022-49474] = "fixed-version: Fixed from version 5.19" | ||
3187 | |||
3188 | CVE_STATUS[CVE-2022-49475] = "fixed-version: Fixed from version 5.19" | ||
3189 | |||
3190 | CVE_STATUS[CVE-2022-49476] = "fixed-version: Fixed from version 5.19" | ||
3191 | |||
3192 | CVE_STATUS[CVE-2022-49477] = "fixed-version: Fixed from version 5.19" | ||
3193 | |||
3194 | CVE_STATUS[CVE-2022-49478] = "fixed-version: Fixed from version 5.19" | ||
3195 | |||
3196 | CVE_STATUS[CVE-2022-49479] = "fixed-version: Fixed from version 5.19" | ||
3197 | |||
3198 | CVE_STATUS[CVE-2022-49480] = "fixed-version: Fixed from version 5.19" | ||
3199 | |||
3200 | CVE_STATUS[CVE-2022-49481] = "fixed-version: Fixed from version 5.19" | ||
3201 | |||
3202 | CVE_STATUS[CVE-2022-49482] = "fixed-version: Fixed from version 5.19" | ||
3203 | |||
3204 | CVE_STATUS[CVE-2022-49483] = "fixed-version: Fixed from version 5.19" | ||
3205 | |||
3206 | CVE_STATUS[CVE-2022-49484] = "fixed-version: Fixed from version 5.19" | ||
3207 | |||
3208 | CVE_STATUS[CVE-2022-49485] = "fixed-version: Fixed from version 5.19" | ||
3209 | |||
3210 | CVE_STATUS[CVE-2022-49486] = "fixed-version: Fixed from version 5.19" | ||
3211 | |||
3212 | CVE_STATUS[CVE-2022-49487] = "fixed-version: Fixed from version 5.19" | ||
3213 | |||
3214 | CVE_STATUS[CVE-2022-49488] = "fixed-version: Fixed from version 5.19" | ||
3215 | |||
3216 | CVE_STATUS[CVE-2022-49489] = "fixed-version: Fixed from version 5.19" | ||
3217 | |||
3218 | CVE_STATUS[CVE-2022-49490] = "fixed-version: Fixed from version 5.19" | ||
3219 | |||
3220 | CVE_STATUS[CVE-2022-49491] = "fixed-version: Fixed from version 5.19" | ||
3221 | |||
3222 | CVE_STATUS[CVE-2022-49492] = "fixed-version: Fixed from version 5.19" | ||
3223 | |||
3224 | CVE_STATUS[CVE-2022-49493] = "fixed-version: Fixed from version 5.19" | ||
3225 | |||
3226 | CVE_STATUS[CVE-2022-49494] = "fixed-version: Fixed from version 5.19" | ||
3227 | |||
3228 | CVE_STATUS[CVE-2022-49495] = "fixed-version: Fixed from version 5.19" | ||
3229 | |||
3230 | CVE_STATUS[CVE-2022-49496] = "fixed-version: Fixed from version 5.19" | ||
3231 | |||
3232 | CVE_STATUS[CVE-2022-49497] = "fixed-version: Fixed from version 5.19" | ||
3233 | |||
3234 | CVE_STATUS[CVE-2022-49498] = "fixed-version: Fixed from version 5.19" | ||
3235 | |||
3236 | CVE_STATUS[CVE-2022-49499] = "fixed-version: Fixed from version 5.19" | ||
3237 | |||
3238 | CVE_STATUS[CVE-2022-49500] = "fixed-version: Fixed from version 5.19" | ||
3239 | |||
3240 | CVE_STATUS[CVE-2022-49501] = "fixed-version: Fixed from version 5.19" | ||
3241 | |||
3242 | CVE_STATUS[CVE-2022-49502] = "fixed-version: Fixed from version 5.19" | ||
3243 | |||
3244 | CVE_STATUS[CVE-2022-49503] = "fixed-version: Fixed from version 5.19" | ||
3245 | |||
3246 | CVE_STATUS[CVE-2022-49504] = "fixed-version: Fixed from version 5.19" | ||
3247 | |||
3248 | CVE_STATUS[CVE-2022-49505] = "fixed-version: Fixed from version 5.19" | ||
3249 | |||
3250 | CVE_STATUS[CVE-2022-49506] = "fixed-version: Fixed from version 5.19" | ||
3251 | |||
3252 | CVE_STATUS[CVE-2022-49507] = "fixed-version: Fixed from version 5.19" | ||
3253 | |||
3254 | CVE_STATUS[CVE-2022-49508] = "fixed-version: Fixed from version 5.19" | ||
3255 | |||
3256 | CVE_STATUS[CVE-2022-49509] = "fixed-version: Fixed from version 5.19" | ||
3257 | |||
3258 | CVE_STATUS[CVE-2022-49510] = "fixed-version: Fixed from version 5.19" | ||
3259 | |||
3260 | CVE_STATUS[CVE-2022-49511] = "fixed-version: Fixed from version 5.19" | ||
3261 | |||
3262 | CVE_STATUS[CVE-2022-49512] = "fixed-version: Fixed from version 5.19" | ||
3263 | |||
3264 | CVE_STATUS[CVE-2022-49513] = "fixed-version: Fixed from version 5.19" | ||
3265 | |||
3266 | CVE_STATUS[CVE-2022-49514] = "fixed-version: Fixed from version 5.19" | ||
3267 | |||
3268 | CVE_STATUS[CVE-2022-49515] = "fixed-version: Fixed from version 5.19" | ||
3269 | |||
3270 | CVE_STATUS[CVE-2022-49516] = "fixed-version: Fixed from version 5.19" | ||
3271 | |||
3272 | CVE_STATUS[CVE-2022-49517] = "fixed-version: Fixed from version 5.19" | ||
3273 | |||
3274 | CVE_STATUS[CVE-2022-49518] = "fixed-version: Fixed from version 5.19" | ||
3275 | |||
3276 | CVE_STATUS[CVE-2022-49519] = "fixed-version: Fixed from version 5.19" | ||
3277 | |||
3278 | CVE_STATUS[CVE-2022-49520] = "fixed-version: Fixed from version 5.19" | ||
3279 | |||
3280 | CVE_STATUS[CVE-2022-49521] = "fixed-version: Fixed from version 5.19" | ||
3281 | |||
3282 | CVE_STATUS[CVE-2022-49522] = "fixed-version: Fixed from version 5.19" | ||
3283 | |||
3284 | CVE_STATUS[CVE-2022-49523] = "fixed-version: Fixed from version 5.19" | ||
3285 | |||
3286 | CVE_STATUS[CVE-2022-49524] = "fixed-version: Fixed from version 5.19" | ||
3287 | |||
3288 | CVE_STATUS[CVE-2022-49525] = "fixed-version: Fixed from version 5.19" | ||
3289 | |||
3290 | CVE_STATUS[CVE-2022-49526] = "fixed-version: Fixed from version 5.19" | ||
3291 | |||
3292 | CVE_STATUS[CVE-2022-49527] = "fixed-version: Fixed from version 5.19" | ||
3293 | |||
3294 | CVE_STATUS[CVE-2022-49528] = "fixed-version: Fixed from version 5.19" | ||
3295 | |||
3296 | CVE_STATUS[CVE-2022-49529] = "fixed-version: Fixed from version 5.19" | ||
3297 | |||
3298 | CVE_STATUS[CVE-2022-49530] = "fixed-version: Fixed from version 5.19" | ||
3299 | |||
3300 | CVE_STATUS[CVE-2022-49531] = "fixed-version: Fixed from version 5.19" | ||
3301 | |||
3302 | CVE_STATUS[CVE-2022-49532] = "fixed-version: Fixed from version 5.19" | ||
3303 | |||
3304 | CVE_STATUS[CVE-2022-49533] = "fixed-version: Fixed from version 5.19" | ||
3305 | |||
3306 | CVE_STATUS[CVE-2022-49534] = "fixed-version: Fixed from version 5.19" | ||
3307 | |||
3308 | CVE_STATUS[CVE-2022-49535] = "fixed-version: Fixed from version 5.19" | ||
3309 | |||
3310 | CVE_STATUS[CVE-2022-49536] = "fixed-version: Fixed from version 5.19" | ||
3311 | |||
3312 | CVE_STATUS[CVE-2022-49537] = "fixed-version: Fixed from version 5.19" | ||
3313 | |||
3314 | CVE_STATUS[CVE-2022-49538] = "fixed-version: Fixed from version 5.19" | ||
3315 | |||
3316 | CVE_STATUS[CVE-2022-49539] = "fixed-version: Fixed from version 5.19" | ||
3317 | |||
3318 | CVE_STATUS[CVE-2022-49540] = "fixed-version: Fixed from version 5.19" | ||
3319 | |||
3320 | CVE_STATUS[CVE-2022-49541] = "fixed-version: Fixed from version 5.19" | ||
3321 | |||
3322 | CVE_STATUS[CVE-2022-49542] = "fixed-version: Fixed from version 5.19" | ||
3323 | |||
3324 | CVE_STATUS[CVE-2022-49543] = "fixed-version: Fixed from version 5.19" | ||
3325 | |||
3326 | CVE_STATUS[CVE-2022-49544] = "fixed-version: Fixed from version 5.19" | ||
3327 | |||
3328 | CVE_STATUS[CVE-2022-49545] = "fixed-version: Fixed from version 5.19" | ||
3329 | |||
3330 | CVE_STATUS[CVE-2022-49546] = "fixed-version: Fixed from version 5.19" | ||
3331 | |||
3332 | CVE_STATUS[CVE-2022-49547] = "fixed-version: Fixed from version 5.19" | ||
3333 | |||
3334 | CVE_STATUS[CVE-2022-49548] = "fixed-version: Fixed from version 5.19" | ||
3335 | |||
3336 | CVE_STATUS[CVE-2022-49549] = "fixed-version: Fixed from version 5.19" | ||
3337 | |||
3338 | CVE_STATUS[CVE-2022-49550] = "fixed-version: Fixed from version 5.19" | ||
3339 | |||
3340 | CVE_STATUS[CVE-2022-49551] = "fixed-version: Fixed from version 5.19" | ||
3341 | |||
3342 | CVE_STATUS[CVE-2022-49552] = "fixed-version: Fixed from version 5.19" | ||
3343 | |||
3344 | CVE_STATUS[CVE-2022-49553] = "fixed-version: Fixed from version 5.19" | ||
3345 | |||
3346 | CVE_STATUS[CVE-2022-49554] = "fixed-version: Fixed from version 5.19" | ||
3347 | |||
3348 | CVE_STATUS[CVE-2022-49555] = "fixed-version: Fixed from version 5.19" | ||
3349 | |||
3350 | CVE_STATUS[CVE-2022-49556] = "fixed-version: Fixed from version 5.19" | ||
3351 | |||
3352 | CVE_STATUS[CVE-2022-49557] = "fixed-version: Fixed from version 5.19" | ||
3353 | |||
3354 | CVE_STATUS[CVE-2022-49558] = "fixed-version: Fixed from version 5.19" | ||
3355 | |||
3356 | CVE_STATUS[CVE-2022-49559] = "fixed-version: Fixed from version 5.19" | ||
3357 | |||
3358 | CVE_STATUS[CVE-2022-49560] = "fixed-version: Fixed from version 5.19" | ||
3359 | |||
3360 | CVE_STATUS[CVE-2022-49561] = "fixed-version: Fixed from version 5.19" | ||
3361 | |||
3362 | CVE_STATUS[CVE-2022-49562] = "fixed-version: Fixed from version 5.19" | ||
3363 | |||
3364 | CVE_STATUS[CVE-2022-49563] = "fixed-version: Fixed from version 5.19" | ||
3365 | |||
3366 | CVE_STATUS[CVE-2022-49564] = "fixed-version: Fixed from version 5.19" | ||
3367 | |||
3368 | CVE_STATUS[CVE-2022-49565] = "fixed-version: Fixed from version 5.19" | ||
3369 | |||
3370 | CVE_STATUS[CVE-2022-49566] = "fixed-version: Fixed from version 5.19" | ||
3371 | |||
3372 | CVE_STATUS[CVE-2022-49567] = "fixed-version: Fixed from version 5.19" | ||
3373 | |||
3374 | CVE_STATUS[CVE-2022-49568] = "fixed-version: Fixed from version 5.19" | ||
3375 | |||
3376 | CVE_STATUS[CVE-2022-49569] = "fixed-version: Fixed from version 5.19" | ||
3377 | |||
3378 | CVE_STATUS[CVE-2022-49570] = "fixed-version: Fixed from version 5.19" | ||
3379 | |||
3380 | CVE_STATUS[CVE-2022-49571] = "fixed-version: Fixed from version 5.19" | ||
3381 | |||
3382 | CVE_STATUS[CVE-2022-49572] = "fixed-version: Fixed from version 5.19" | ||
3383 | |||
3384 | CVE_STATUS[CVE-2022-49573] = "fixed-version: Fixed from version 5.19" | ||
3385 | |||
3386 | CVE_STATUS[CVE-2022-49574] = "fixed-version: Fixed from version 5.19" | ||
3387 | |||
3388 | CVE_STATUS[CVE-2022-49575] = "fixed-version: Fixed from version 5.19" | ||
3389 | |||
3390 | CVE_STATUS[CVE-2022-49576] = "fixed-version: Fixed from version 5.19" | ||
3391 | |||
3392 | CVE_STATUS[CVE-2022-49577] = "fixed-version: Fixed from version 5.19" | ||
3393 | |||
3394 | CVE_STATUS[CVE-2022-49578] = "fixed-version: Fixed from version 5.19" | ||
3395 | |||
3396 | CVE_STATUS[CVE-2022-49579] = "fixed-version: Fixed from version 5.19" | ||
3397 | |||
3398 | CVE_STATUS[CVE-2022-49580] = "fixed-version: Fixed from version 5.19" | ||
3399 | |||
3400 | CVE_STATUS[CVE-2022-49581] = "fixed-version: Fixed from version 5.19" | ||
3401 | |||
3402 | CVE_STATUS[CVE-2022-49582] = "fixed-version: Fixed from version 5.19" | ||
3403 | |||
3404 | CVE_STATUS[CVE-2022-49583] = "fixed-version: Fixed from version 5.19" | ||
3405 | |||
3406 | CVE_STATUS[CVE-2022-49584] = "fixed-version: Fixed from version 5.19" | ||
3407 | |||
3408 | CVE_STATUS[CVE-2022-49585] = "fixed-version: Fixed from version 5.19" | ||
3409 | |||
3410 | CVE_STATUS[CVE-2022-49586] = "fixed-version: Fixed from version 5.19" | ||
3411 | |||
3412 | CVE_STATUS[CVE-2022-49587] = "fixed-version: Fixed from version 5.19" | ||
3413 | |||
3414 | CVE_STATUS[CVE-2022-49588] = "fixed-version: Fixed from version 5.19" | ||
3415 | |||
3416 | CVE_STATUS[CVE-2022-49589] = "fixed-version: Fixed from version 5.19" | ||
3417 | |||
3418 | CVE_STATUS[CVE-2022-49590] = "fixed-version: Fixed from version 5.19" | ||
3419 | |||
3420 | CVE_STATUS[CVE-2022-49591] = "fixed-version: Fixed from version 5.19" | ||
3421 | |||
3422 | CVE_STATUS[CVE-2022-49592] = "fixed-version: Fixed from version 5.19" | ||
3423 | |||
3424 | CVE_STATUS[CVE-2022-49593] = "fixed-version: Fixed from version 5.19" | ||
3425 | |||
3426 | CVE_STATUS[CVE-2022-49594] = "fixed-version: Fixed from version 5.19" | ||
3427 | |||
3428 | CVE_STATUS[CVE-2022-49595] = "fixed-version: Fixed from version 5.19" | ||
3429 | |||
3430 | CVE_STATUS[CVE-2022-49596] = "fixed-version: Fixed from version 5.19" | ||
3431 | |||
3432 | CVE_STATUS[CVE-2022-49597] = "fixed-version: Fixed from version 5.19" | ||
3433 | |||
3434 | CVE_STATUS[CVE-2022-49598] = "fixed-version: Fixed from version 5.19" | ||
3435 | |||
3436 | CVE_STATUS[CVE-2022-49599] = "fixed-version: Fixed from version 5.19" | ||
3437 | |||
3438 | CVE_STATUS[CVE-2022-49600] = "fixed-version: Fixed from version 5.19" | ||
3439 | |||
3440 | CVE_STATUS[CVE-2022-49601] = "fixed-version: Fixed from version 5.19" | ||
3441 | |||
3442 | CVE_STATUS[CVE-2022-49602] = "fixed-version: Fixed from version 5.19" | ||
3443 | |||
3444 | CVE_STATUS[CVE-2022-49603] = "fixed-version: Fixed from version 5.19" | ||
3445 | |||
3446 | CVE_STATUS[CVE-2022-49604] = "fixed-version: Fixed from version 5.19" | ||
3447 | |||
3448 | CVE_STATUS[CVE-2022-49605] = "fixed-version: Fixed from version 5.19" | ||
3449 | |||
3450 | CVE_STATUS[CVE-2022-49606] = "fixed-version: Fixed from version 5.19" | ||
3451 | |||
3452 | CVE_STATUS[CVE-2022-49607] = "fixed-version: Fixed from version 5.19" | ||
3453 | |||
3454 | CVE_STATUS[CVE-2022-49608] = "fixed-version: Fixed from version 5.19" | ||
3455 | |||
3456 | CVE_STATUS[CVE-2022-49609] = "fixed-version: Fixed from version 5.19" | ||
3457 | |||
3458 | CVE_STATUS[CVE-2022-49610] = "fixed-version: Fixed from version 5.19" | ||
3459 | |||
3460 | CVE_STATUS[CVE-2022-49611] = "fixed-version: Fixed from version 5.19" | ||
3461 | |||
3462 | CVE_STATUS[CVE-2022-49612] = "fixed-version: Fixed from version 5.19" | ||
3463 | |||
3464 | CVE_STATUS[CVE-2022-49613] = "fixed-version: Fixed from version 5.19" | ||
3465 | |||
3466 | CVE_STATUS[CVE-2022-49615] = "fixed-version: Fixed from version 5.19" | ||
3467 | |||
3468 | CVE_STATUS[CVE-2022-49616] = "fixed-version: Fixed from version 5.19" | ||
3469 | |||
3470 | CVE_STATUS[CVE-2022-49617] = "fixed-version: Fixed from version 5.19" | ||
3471 | |||
3472 | CVE_STATUS[CVE-2022-49618] = "fixed-version: Fixed from version 5.19" | ||
3473 | |||
3474 | CVE_STATUS[CVE-2022-49619] = "fixed-version: Fixed from version 5.19" | ||
3475 | |||
3476 | CVE_STATUS[CVE-2022-49620] = "fixed-version: Fixed from version 5.19" | ||
3477 | |||
3478 | CVE_STATUS[CVE-2022-49621] = "fixed-version: Fixed from version 5.19" | ||
3479 | |||
3480 | CVE_STATUS[CVE-2022-49622] = "fixed-version: Fixed from version 5.19" | ||
3481 | |||
3482 | CVE_STATUS[CVE-2022-49623] = "fixed-version: Fixed from version 5.19" | ||
3483 | |||
3484 | CVE_STATUS[CVE-2022-49624] = "fixed-version: Fixed from version 5.19" | ||
3485 | |||
3486 | CVE_STATUS[CVE-2022-49625] = "fixed-version: Fixed from version 5.19" | ||
3487 | |||
3488 | CVE_STATUS[CVE-2022-49626] = "fixed-version: Fixed from version 5.19" | ||
3489 | |||
3490 | CVE_STATUS[CVE-2022-49627] = "fixed-version: Fixed from version 5.19" | ||
3491 | |||
3492 | CVE_STATUS[CVE-2022-49628] = "fixed-version: Fixed from version 5.19" | ||
3493 | |||
3494 | CVE_STATUS[CVE-2022-49629] = "fixed-version: Fixed from version 5.19" | ||
3495 | |||
3496 | CVE_STATUS[CVE-2022-49630] = "fixed-version: Fixed from version 5.19" | ||
3497 | |||
3498 | CVE_STATUS[CVE-2022-49631] = "fixed-version: Fixed from version 5.19" | ||
3499 | |||
3500 | CVE_STATUS[CVE-2022-49632] = "fixed-version: Fixed from version 5.19" | ||
3501 | |||
3502 | CVE_STATUS[CVE-2022-49633] = "fixed-version: Fixed from version 5.19" | ||
3503 | |||
3504 | CVE_STATUS[CVE-2022-49634] = "fixed-version: Fixed from version 5.19" | ||
3505 | |||
3506 | CVE_STATUS[CVE-2022-49635] = "fixed-version: Fixed from version 5.19" | ||
3507 | |||
3508 | CVE_STATUS[CVE-2022-49636] = "fixed-version: Fixed from version 5.19" | ||
3509 | |||
3510 | CVE_STATUS[CVE-2022-49637] = "fixed-version: Fixed from version 5.19" | ||
3511 | |||
3512 | CVE_STATUS[CVE-2022-49638] = "fixed-version: Fixed from version 5.19" | ||
3513 | |||
3514 | CVE_STATUS[CVE-2022-49639] = "fixed-version: Fixed from version 5.19" | ||
3515 | |||
3516 | CVE_STATUS[CVE-2022-49640] = "fixed-version: Fixed from version 5.19" | ||
3517 | |||
3518 | CVE_STATUS[CVE-2022-49641] = "fixed-version: Fixed from version 5.19" | ||
3519 | |||
3520 | CVE_STATUS[CVE-2022-49642] = "fixed-version: Fixed from version 5.19" | ||
3521 | |||
3522 | CVE_STATUS[CVE-2022-49643] = "fixed-version: Fixed from version 5.19" | ||
3523 | |||
3524 | CVE_STATUS[CVE-2022-49644] = "fixed-version: Fixed from version 5.19" | ||
3525 | |||
3526 | CVE_STATUS[CVE-2022-49645] = "fixed-version: Fixed from version 5.19" | ||
3527 | |||
3528 | CVE_STATUS[CVE-2022-49646] = "fixed-version: Fixed from version 5.19" | ||
3529 | |||
3530 | CVE_STATUS[CVE-2022-49647] = "fixed-version: Fixed from version 5.19" | ||
3531 | |||
3532 | CVE_STATUS[CVE-2022-49648] = "fixed-version: Fixed from version 5.19" | ||
3533 | |||
3534 | CVE_STATUS[CVE-2022-49649] = "fixed-version: Fixed from version 5.19" | ||
3535 | |||
3536 | CVE_STATUS[CVE-2022-49650] = "fixed-version: Fixed from version 5.19" | ||
3537 | |||
3538 | CVE_STATUS[CVE-2022-49651] = "fixed-version: Fixed from version 5.19" | ||
3539 | |||
3540 | CVE_STATUS[CVE-2022-49652] = "fixed-version: Fixed from version 5.19" | ||
3541 | |||
3542 | CVE_STATUS[CVE-2022-49653] = "fixed-version: Fixed from version 5.19" | ||
3543 | |||
3544 | CVE_STATUS[CVE-2022-49654] = "fixed-version: Fixed from version 5.19" | ||
3545 | |||
3546 | CVE_STATUS[CVE-2022-49655] = "fixed-version: Fixed from version 5.19" | ||
3547 | |||
3548 | CVE_STATUS[CVE-2022-49656] = "fixed-version: Fixed from version 5.19" | ||
3549 | |||
3550 | CVE_STATUS[CVE-2022-49657] = "fixed-version: Fixed from version 5.19" | ||
3551 | |||
3552 | CVE_STATUS[CVE-2022-49658] = "fixed-version: Fixed from version 5.19" | ||
3553 | |||
3554 | CVE_STATUS[CVE-2022-49659] = "fixed-version: Fixed from version 5.19" | ||
3555 | |||
3556 | CVE_STATUS[CVE-2022-49661] = "fixed-version: Fixed from version 5.19" | ||
3557 | |||
3558 | CVE_STATUS[CVE-2022-49662] = "fixed-version: Fixed from version 5.19" | ||
3559 | |||
3560 | CVE_STATUS[CVE-2022-49663] = "fixed-version: Fixed from version 5.19" | ||
3561 | |||
3562 | CVE_STATUS[CVE-2022-49664] = "fixed-version: Fixed from version 5.19" | ||
3563 | |||
3564 | CVE_STATUS[CVE-2022-49665] = "fixed-version: Fixed from version 5.19" | ||
3565 | |||
3566 | CVE_STATUS[CVE-2022-49666] = "fixed-version: Fixed from version 5.19" | ||
3567 | |||
3568 | CVE_STATUS[CVE-2022-49667] = "fixed-version: Fixed from version 5.19" | ||
3569 | |||
3570 | CVE_STATUS[CVE-2022-49668] = "fixed-version: Fixed from version 5.19" | ||
3571 | |||
3572 | CVE_STATUS[CVE-2022-49669] = "fixed-version: Fixed from version 5.19" | ||
3573 | |||
3574 | CVE_STATUS[CVE-2022-49670] = "fixed-version: Fixed from version 5.19" | ||
3575 | |||
3576 | CVE_STATUS[CVE-2022-49671] = "fixed-version: Fixed from version 5.19" | ||
3577 | |||
3578 | CVE_STATUS[CVE-2022-49672] = "fixed-version: Fixed from version 5.19" | ||
3579 | |||
3580 | CVE_STATUS[CVE-2022-49673] = "fixed-version: Fixed from version 5.19" | ||
3581 | |||
3582 | CVE_STATUS[CVE-2022-49674] = "fixed-version: Fixed from version 5.19" | ||
3583 | |||
3584 | CVE_STATUS[CVE-2022-49675] = "fixed-version: Fixed from version 5.19" | ||
3585 | |||
3586 | CVE_STATUS[CVE-2022-49676] = "fixed-version: Fixed from version 5.19" | ||
3587 | |||
3588 | CVE_STATUS[CVE-2022-49677] = "fixed-version: Fixed from version 5.19" | ||
3589 | |||
3590 | CVE_STATUS[CVE-2022-49678] = "fixed-version: Fixed from version 5.19" | ||
3591 | |||
3592 | CVE_STATUS[CVE-2022-49679] = "fixed-version: Fixed from version 5.19" | ||
3593 | |||
3594 | CVE_STATUS[CVE-2022-49680] = "fixed-version: Fixed from version 5.19" | ||
3595 | |||
3596 | CVE_STATUS[CVE-2022-49681] = "fixed-version: Fixed from version 5.19" | ||
3597 | |||
3598 | CVE_STATUS[CVE-2022-49682] = "fixed-version: Fixed from version 5.19" | ||
3599 | |||
3600 | CVE_STATUS[CVE-2022-49683] = "fixed-version: Fixed from version 5.19" | ||
3601 | |||
3602 | CVE_STATUS[CVE-2022-49684] = "fixed-version: Fixed from version 5.19" | ||
3603 | |||
3604 | CVE_STATUS[CVE-2022-49685] = "fixed-version: Fixed from version 5.19" | ||
3605 | |||
3606 | CVE_STATUS[CVE-2022-49686] = "fixed-version: Fixed from version 5.19" | ||
3607 | |||
3608 | CVE_STATUS[CVE-2022-49687] = "fixed-version: Fixed from version 5.19" | ||
3609 | |||
3610 | CVE_STATUS[CVE-2022-49688] = "fixed-version: Fixed from version 5.19" | ||
3611 | |||
3612 | CVE_STATUS[CVE-2022-49691] = "fixed-version: Fixed from version 5.19" | ||
3613 | |||
3614 | CVE_STATUS[CVE-2022-49692] = "fixed-version: Fixed from version 5.19" | ||
3615 | |||
3616 | CVE_STATUS[CVE-2022-49693] = "fixed-version: Fixed from version 5.19" | ||
3617 | |||
3618 | CVE_STATUS[CVE-2022-49694] = "fixed-version: Fixed from version 5.19" | ||
3619 | |||
3620 | CVE_STATUS[CVE-2022-49695] = "fixed-version: Fixed from version 5.19" | ||
3621 | |||
3622 | CVE_STATUS[CVE-2022-49696] = "fixed-version: Fixed from version 5.19" | ||
3623 | |||
3624 | CVE_STATUS[CVE-2022-49697] = "fixed-version: Fixed from version 5.19" | ||
3625 | |||
3626 | CVE_STATUS[CVE-2022-49698] = "fixed-version: Fixed from version 5.19" | ||
3627 | |||
3628 | CVE_STATUS[CVE-2022-49699] = "fixed-version: Fixed from version 5.19" | ||
3629 | |||
3630 | CVE_STATUS[CVE-2022-49700] = "fixed-version: Fixed from version 5.19" | ||
3631 | |||
3632 | CVE_STATUS[CVE-2022-49701] = "fixed-version: Fixed from version 5.19" | ||
3633 | |||
3634 | CVE_STATUS[CVE-2022-49702] = "fixed-version: Fixed from version 5.19" | ||
3635 | |||
3636 | CVE_STATUS[CVE-2022-49703] = "fixed-version: Fixed from version 5.19" | ||
3637 | |||
3638 | CVE_STATUS[CVE-2022-49704] = "fixed-version: Fixed from version 5.19" | ||
3639 | |||
3640 | CVE_STATUS[CVE-2022-49705] = "fixed-version: Fixed from version 5.19" | ||
3641 | |||
3642 | CVE_STATUS[CVE-2022-49706] = "fixed-version: Fixed from version 5.19" | ||
3643 | |||
3644 | CVE_STATUS[CVE-2022-49707] = "fixed-version: Fixed from version 5.19" | ||
3645 | |||
3646 | CVE_STATUS[CVE-2022-49708] = "fixed-version: Fixed from version 5.19" | ||
3647 | |||
3648 | CVE_STATUS[CVE-2022-49709] = "fixed-version: Fixed from version 5.19" | ||
3649 | |||
3650 | CVE_STATUS[CVE-2022-49710] = "fixed-version: Fixed from version 5.19" | ||
3651 | |||
3652 | CVE_STATUS[CVE-2022-49711] = "fixed-version: Fixed from version 5.19" | ||
3653 | |||
3654 | CVE_STATUS[CVE-2022-49712] = "fixed-version: Fixed from version 5.19" | ||
3655 | |||
3656 | CVE_STATUS[CVE-2022-49713] = "fixed-version: Fixed from version 5.19" | ||
3657 | |||
3658 | CVE_STATUS[CVE-2022-49714] = "fixed-version: Fixed from version 5.19" | ||
3659 | |||
3660 | CVE_STATUS[CVE-2022-49715] = "fixed-version: Fixed from version 5.19" | ||
3661 | |||
3662 | CVE_STATUS[CVE-2022-49716] = "fixed-version: Fixed from version 5.19" | ||
3663 | |||
3664 | CVE_STATUS[CVE-2022-49717] = "fixed-version: Fixed from version 5.19" | ||
3665 | |||
3666 | CVE_STATUS[CVE-2022-49718] = "fixed-version: Fixed from version 5.19" | ||
3667 | |||
3668 | CVE_STATUS[CVE-2022-49719] = "fixed-version: Fixed from version 5.19" | ||
3669 | |||
3670 | CVE_STATUS[CVE-2022-49720] = "fixed-version: Fixed from version 5.19" | ||
3671 | |||
3672 | CVE_STATUS[CVE-2022-49721] = "fixed-version: Fixed from version 5.19" | ||
3673 | |||
3674 | CVE_STATUS[CVE-2022-49722] = "fixed-version: Fixed from version 5.19" | ||
3675 | |||
3676 | CVE_STATUS[CVE-2022-49723] = "fixed-version: Fixed from version 5.19" | ||
3677 | |||
3678 | CVE_STATUS[CVE-2022-49724] = "fixed-version: Fixed from version 5.19" | ||
3679 | |||
3680 | CVE_STATUS[CVE-2022-49725] = "fixed-version: Fixed from version 5.19" | ||
3681 | |||
3682 | CVE_STATUS[CVE-2022-49726] = "fixed-version: Fixed from version 5.19" | ||
3683 | |||
3684 | CVE_STATUS[CVE-2022-49727] = "fixed-version: Fixed from version 5.19" | ||
3685 | |||
3686 | CVE_STATUS[CVE-2022-49728] = "fixed-version: Fixed from version 5.19" | ||
3687 | |||
3688 | CVE_STATUS[CVE-2022-49729] = "fixed-version: Fixed from version 5.19" | ||
3689 | |||
3690 | CVE_STATUS[CVE-2022-49730] = "fixed-version: Fixed from version 5.19" | ||
3691 | |||
3692 | CVE_STATUS[CVE-2022-49731] = "fixed-version: Fixed from version 5.19" | ||
3693 | |||
3694 | CVE_STATUS[CVE-2022-49732] = "fixed-version: Fixed from version 5.19" | ||
3695 | |||
3696 | CVE_STATUS[CVE-2022-49733] = "fixed-version: Fixed from version 6.0" | ||
3697 | |||
3698 | CVE_STATUS[CVE-2022-49738] = "fixed-version: Fixed from version 6.2" | ||
3699 | |||
3700 | CVE_STATUS[CVE-2022-49739] = "fixed-version: Fixed from version 6.2" | ||
3701 | |||
3702 | CVE_STATUS[CVE-2022-49740] = "fixed-version: Fixed from version 6.2" | ||
3703 | |||
3704 | CVE_STATUS[CVE-2022-49741] = "fixed-version: Fixed from version 6.2" | ||
3705 | |||
3706 | CVE_STATUS[CVE-2022-49742] = "fixed-version: Fixed from version 6.2" | ||
3707 | |||
3708 | CVE_STATUS[CVE-2022-49743] = "fixed-version: Fixed from version 6.2" | ||
3709 | |||
3710 | CVE_STATUS[CVE-2022-49744] = "fixed-version: Fixed from version 6.2" | ||
3711 | |||
3712 | CVE_STATUS[CVE-2022-49745] = "fixed-version: Fixed from version 6.2" | ||
3713 | |||
3714 | CVE_STATUS[CVE-2022-49746] = "fixed-version: Fixed from version 6.2" | ||
3715 | |||
3716 | CVE_STATUS[CVE-2022-49747] = "fixed-version: Fixed from version 6.2" | ||
3717 | |||
3718 | CVE_STATUS[CVE-2022-49748] = "fixed-version: Fixed from version 6.2" | ||
3719 | |||
3720 | CVE_STATUS[CVE-2022-49749] = "fixed-version: Fixed from version 6.2" | ||
3721 | |||
3722 | CVE_STATUS[CVE-2022-49750] = "fixed-version: Fixed from version 6.2" | ||
3723 | |||
3724 | CVE_STATUS[CVE-2022-49751] = "fixed-version: Fixed from version 6.2" | ||
3725 | |||
3726 | CVE_STATUS[CVE-2022-49752] = "fixed-version: Fixed from version 6.2" | ||
3727 | |||
3728 | CVE_STATUS[CVE-2022-49753] = "fixed-version: Fixed from version 6.2" | ||
3729 | |||
3730 | CVE_STATUS[CVE-2022-49754] = "fixed-version: Fixed from version 6.2" | ||
3731 | |||
3732 | CVE_STATUS[CVE-2022-49755] = "fixed-version: Fixed from version 6.2" | ||
3733 | |||
3734 | CVE_STATUS[CVE-2022-49756] = "fixed-version: Fixed from version 6.2" | ||
3735 | |||
3736 | CVE_STATUS[CVE-2022-49757] = "fixed-version: Fixed from version 6.2" | ||
3737 | |||
3738 | CVE_STATUS[CVE-2022-49758] = "fixed-version: Fixed from version 6.2" | ||
3739 | |||
3740 | CVE_STATUS[CVE-2022-49759] = "fixed-version: Fixed from version 6.2" | ||
3741 | |||
3742 | CVE_STATUS[CVE-2022-49760] = "fixed-version: Fixed from version 6.2" | ||
3743 | |||
3744 | CVE_STATUS[CVE-2022-49761] = "fixed-version: Fixed from version 6.2" | ||
3745 | |||
3746 | CVE_STATUS[CVE-2022-49762] = "fixed-version: Fixed from version 6.1" | ||
3747 | |||
3748 | CVE_STATUS[CVE-2022-49763] = "fixed-version: Fixed from version 6.1" | ||
3749 | |||
3750 | CVE_STATUS[CVE-2022-49764] = "fixed-version: Fixed from version 6.1" | ||
3751 | |||
3752 | CVE_STATUS[CVE-2022-49765] = "fixed-version: Fixed from version 6.1" | ||
3753 | |||
3754 | CVE_STATUS[CVE-2022-49766] = "fixed-version: Fixed from version 6.1" | ||
3755 | |||
3756 | CVE_STATUS[CVE-2022-49767] = "fixed-version: Fixed from version 6.1" | ||
3757 | |||
3758 | CVE_STATUS[CVE-2022-49768] = "fixed-version: Fixed from version 6.1" | ||
3759 | |||
3760 | CVE_STATUS[CVE-2022-49769] = "fixed-version: Fixed from version 6.1" | ||
3761 | |||
3762 | CVE_STATUS[CVE-2022-49770] = "fixed-version: Fixed from version 6.1" | ||
3763 | |||
3764 | CVE_STATUS[CVE-2022-49771] = "fixed-version: Fixed from version 6.1" | ||
3765 | |||
3766 | CVE_STATUS[CVE-2022-49772] = "fixed-version: Fixed from version 6.1" | ||
3767 | |||
3768 | CVE_STATUS[CVE-2022-49773] = "fixed-version: Fixed from version 6.1" | ||
3769 | |||
3770 | CVE_STATUS[CVE-2022-49774] = "fixed-version: Fixed from version 6.1" | ||
3771 | |||
3772 | CVE_STATUS[CVE-2022-49775] = "fixed-version: Fixed from version 6.1" | ||
3773 | |||
3774 | CVE_STATUS[CVE-2022-49776] = "fixed-version: Fixed from version 6.1" | ||
3775 | |||
3776 | CVE_STATUS[CVE-2022-49777] = "fixed-version: Fixed from version 6.1" | ||
3777 | |||
3778 | CVE_STATUS[CVE-2022-49778] = "fixed-version: Fixed from version 6.1" | ||
3779 | |||
3780 | CVE_STATUS[CVE-2022-49779] = "fixed-version: Fixed from version 6.1" | ||
3781 | |||
3782 | CVE_STATUS[CVE-2022-49780] = "fixed-version: Fixed from version 6.1" | ||
3783 | |||
3784 | CVE_STATUS[CVE-2022-49781] = "fixed-version: Fixed from version 6.1" | ||
3785 | |||
3786 | CVE_STATUS[CVE-2022-49782] = "fixed-version: Fixed from version 6.0.10" | ||
3787 | |||
3788 | CVE_STATUS[CVE-2022-49783] = "fixed-version: Fixed from version 6.1" | ||
3789 | |||
3790 | CVE_STATUS[CVE-2022-49784] = "fixed-version: Fixed from version 6.1" | ||
3791 | |||
3792 | CVE_STATUS[CVE-2022-49785] = "fixed-version: Fixed from version 6.1" | ||
3793 | |||
3794 | CVE_STATUS[CVE-2022-49786] = "fixed-version: Fixed from version 6.1" | ||
3795 | |||
3796 | CVE_STATUS[CVE-2022-49787] = "fixed-version: Fixed from version 6.1" | ||
3797 | |||
3798 | CVE_STATUS[CVE-2022-49788] = "fixed-version: Fixed from version 6.1" | ||
3799 | |||
3800 | CVE_STATUS[CVE-2022-49789] = "fixed-version: Fixed from version 6.1" | ||
3801 | |||
3802 | CVE_STATUS[CVE-2022-49790] = "fixed-version: Fixed from version 6.1" | ||
3803 | |||
3804 | CVE_STATUS[CVE-2022-49791] = "fixed-version: Fixed from version 6.1" | ||
3805 | |||
3806 | CVE_STATUS[CVE-2022-49792] = "fixed-version: Fixed from version 6.1" | ||
3807 | |||
3808 | CVE_STATUS[CVE-2022-49793] = "fixed-version: Fixed from version 6.1" | ||
3809 | |||
3810 | CVE_STATUS[CVE-2022-49794] = "fixed-version: Fixed from version 6.1" | ||
3811 | |||
3812 | CVE_STATUS[CVE-2022-49795] = "fixed-version: Fixed from version 6.1" | ||
3813 | |||
3814 | CVE_STATUS[CVE-2022-49796] = "fixed-version: Fixed from version 6.1" | ||
3815 | |||
3816 | CVE_STATUS[CVE-2022-49797] = "fixed-version: Fixed from version 6.1" | ||
3817 | |||
3818 | CVE_STATUS[CVE-2022-49798] = "fixed-version: Fixed from version 6.1" | ||
3819 | |||
3820 | CVE_STATUS[CVE-2022-49799] = "fixed-version: Fixed from version 6.1" | ||
3821 | |||
3822 | CVE_STATUS[CVE-2022-49800] = "fixed-version: Fixed from version 6.1" | ||
3823 | |||
3824 | CVE_STATUS[CVE-2022-49801] = "fixed-version: Fixed from version 6.1" | ||
3825 | |||
3826 | CVE_STATUS[CVE-2022-49802] = "fixed-version: Fixed from version 6.1" | ||
3827 | |||
3828 | CVE_STATUS[CVE-2022-49803] = "fixed-version: Fixed from version 6.1" | ||
3829 | |||
3830 | CVE_STATUS[CVE-2022-49804] = "fixed-version: Fixed from version 6.1" | ||
3831 | |||
3832 | CVE_STATUS[CVE-2022-49805] = "fixed-version: Fixed from version 6.1" | ||
3833 | |||
3834 | CVE_STATUS[CVE-2022-49806] = "fixed-version: Fixed from version 6.1" | ||
3835 | |||
3836 | CVE_STATUS[CVE-2022-49807] = "fixed-version: Fixed from version 6.1" | ||
3837 | |||
3838 | CVE_STATUS[CVE-2022-49808] = "fixed-version: Fixed from version 6.1" | ||
3839 | |||
3840 | CVE_STATUS[CVE-2022-49809] = "fixed-version: Fixed from version 6.1" | ||
3841 | |||
3842 | CVE_STATUS[CVE-2022-49810] = "fixed-version: Fixed from version 6.1" | ||
3843 | |||
3844 | CVE_STATUS[CVE-2022-49811] = "fixed-version: Fixed from version 6.1" | ||
3845 | |||
3846 | CVE_STATUS[CVE-2022-49812] = "fixed-version: Fixed from version 6.1" | ||
3847 | |||
3848 | CVE_STATUS[CVE-2022-49813] = "fixed-version: Fixed from version 6.1" | ||
3849 | |||
3850 | CVE_STATUS[CVE-2022-49814] = "fixed-version: Fixed from version 6.1" | ||
3851 | |||
3852 | CVE_STATUS[CVE-2022-49815] = "fixed-version: Fixed from version 6.1" | ||
3853 | |||
3854 | CVE_STATUS[CVE-2022-49817] = "fixed-version: Fixed from version 6.1" | ||
3855 | |||
3856 | CVE_STATUS[CVE-2022-49818] = "fixed-version: Fixed from version 6.0.10" | ||
3857 | |||
3858 | CVE_STATUS[CVE-2022-49819] = "fixed-version: Fixed from version 6.1" | ||
3859 | |||
3860 | CVE_STATUS[CVE-2022-49820] = "fixed-version: Fixed from version 6.1" | ||
3861 | |||
3862 | CVE_STATUS[CVE-2022-49821] = "fixed-version: Fixed from version 6.1" | ||
3863 | |||
3864 | CVE_STATUS[CVE-2022-49822] = "fixed-version: Fixed from version 6.1" | ||
3865 | |||
3866 | CVE_STATUS[CVE-2022-49823] = "fixed-version: Fixed from version 6.1" | ||
3867 | |||
3868 | CVE_STATUS[CVE-2022-49824] = "fixed-version: Fixed from version 6.1" | ||
3869 | |||
3870 | CVE_STATUS[CVE-2022-49825] = "fixed-version: Fixed from version 6.1" | ||
3871 | |||
3872 | CVE_STATUS[CVE-2022-49826] = "fixed-version: Fixed from version 6.1" | ||
3873 | |||
3874 | CVE_STATUS[CVE-2022-49827] = "fixed-version: Fixed from version 6.1" | ||
3875 | |||
3876 | CVE_STATUS[CVE-2022-49828] = "fixed-version: Fixed from version 6.1" | ||
3877 | |||
3878 | CVE_STATUS[CVE-2022-49829] = "fixed-version: Fixed from version 6.1" | ||
3879 | |||
3880 | CVE_STATUS[CVE-2022-49830] = "fixed-version: Fixed from version 6.1" | ||
3881 | |||
3882 | CVE_STATUS[CVE-2022-49831] = "fixed-version: Fixed from version 6.1" | ||
3883 | |||
3884 | CVE_STATUS[CVE-2022-49832] = "fixed-version: Fixed from version 6.1" | ||
3885 | |||
3886 | CVE_STATUS[CVE-2022-49833] = "fixed-version: Fixed from version 6.1" | ||
3887 | |||
3888 | CVE_STATUS[CVE-2022-49834] = "fixed-version: Fixed from version 6.1" | ||
3889 | |||
3890 | CVE_STATUS[CVE-2022-49835] = "fixed-version: Fixed from version 6.1" | ||
3891 | |||
3892 | CVE_STATUS[CVE-2022-49836] = "fixed-version: Fixed from version 6.1" | ||
3893 | |||
3894 | CVE_STATUS[CVE-2022-49837] = "fixed-version: Fixed from version 6.1" | ||
3895 | |||
3896 | CVE_STATUS[CVE-2022-49838] = "fixed-version: Fixed from version 6.1" | ||
3897 | |||
3898 | CVE_STATUS[CVE-2022-49839] = "fixed-version: Fixed from version 6.1" | ||
3899 | |||
3900 | CVE_STATUS[CVE-2022-49840] = "fixed-version: Fixed from version 6.1" | ||
3901 | |||
3902 | CVE_STATUS[CVE-2022-49841] = "fixed-version: Fixed from version 6.1" | ||
3903 | |||
3904 | CVE_STATUS[CVE-2022-49842] = "fixed-version: Fixed from version 6.1" | ||
3905 | |||
3906 | CVE_STATUS[CVE-2022-49844] = "fixed-version: Fixed from version 6.1" | ||
3907 | |||
3908 | CVE_STATUS[CVE-2022-49845] = "fixed-version: Fixed from version 6.1" | ||
3909 | |||
3910 | CVE_STATUS[CVE-2022-49846] = "fixed-version: Fixed from version 6.1" | ||
3911 | |||
3912 | CVE_STATUS[CVE-2022-49847] = "fixed-version: Fixed from version 6.1" | ||
3913 | |||
3914 | CVE_STATUS[CVE-2022-49848] = "fixed-version: Fixed from version 6.1" | ||
3915 | |||
3916 | CVE_STATUS[CVE-2022-49849] = "fixed-version: Fixed from version 6.1" | ||
3917 | |||
3918 | CVE_STATUS[CVE-2022-49850] = "fixed-version: Fixed from version 6.1" | ||
3919 | |||
3920 | CVE_STATUS[CVE-2022-49851] = "fixed-version: Fixed from version 6.1" | ||
3921 | |||
3922 | CVE_STATUS[CVE-2022-49852] = "fixed-version: Fixed from version 6.1" | ||
3923 | |||
3924 | CVE_STATUS[CVE-2022-49853] = "fixed-version: Fixed from version 6.1" | ||
3925 | |||
3926 | CVE_STATUS[CVE-2022-49854] = "fixed-version: Fixed from version 6.1" | ||
3927 | |||
3928 | CVE_STATUS[CVE-2022-49855] = "fixed-version: Fixed from version 6.1" | ||
3929 | |||
3930 | CVE_STATUS[CVE-2022-49857] = "fixed-version: Fixed from version 6.1" | ||
3931 | |||
3932 | CVE_STATUS[CVE-2022-49858] = "fixed-version: Fixed from version 6.1" | ||
3933 | |||
3934 | CVE_STATUS[CVE-2022-49859] = "fixed-version: Fixed from version 6.1" | ||
3935 | |||
3936 | CVE_STATUS[CVE-2022-49860] = "fixed-version: Fixed from version 6.1" | ||
3937 | |||
3938 | CVE_STATUS[CVE-2022-49861] = "fixed-version: Fixed from version 6.1" | ||
3939 | |||
3940 | CVE_STATUS[CVE-2022-49862] = "fixed-version: Fixed from version 6.1" | ||
3941 | |||
3942 | CVE_STATUS[CVE-2022-49863] = "fixed-version: Fixed from version 6.1" | ||
3943 | |||
3944 | CVE_STATUS[CVE-2022-49864] = "fixed-version: Fixed from version 6.1" | ||
3945 | |||
3946 | CVE_STATUS[CVE-2022-49865] = "fixed-version: Fixed from version 6.1" | ||
3947 | |||
3948 | CVE_STATUS[CVE-2022-49866] = "fixed-version: Fixed from version 6.1" | ||
3949 | |||
3950 | CVE_STATUS[CVE-2022-49867] = "fixed-version: Fixed from version 6.1" | ||
3951 | |||
3952 | CVE_STATUS[CVE-2022-49868] = "fixed-version: Fixed from version 6.1" | ||
3953 | |||
3954 | CVE_STATUS[CVE-2022-49869] = "fixed-version: Fixed from version 6.1" | ||
3955 | |||
3956 | CVE_STATUS[CVE-2022-49870] = "fixed-version: Fixed from version 6.1" | ||
3957 | |||
3958 | CVE_STATUS[CVE-2022-49871] = "fixed-version: Fixed from version 6.1" | ||
3959 | |||
3960 | CVE_STATUS[CVE-2022-49872] = "fixed-version: Fixed from version 6.1" | ||
3961 | |||
3962 | CVE_STATUS[CVE-2022-49873] = "fixed-version: Fixed from version 6.1" | ||
3963 | |||
3964 | CVE_STATUS[CVE-2022-49874] = "fixed-version: Fixed from version 6.1" | ||
3965 | |||
3966 | CVE_STATUS[CVE-2022-49875] = "fixed-version: Fixed from version 6.1" | ||
3967 | |||
3968 | CVE_STATUS[CVE-2022-49876] = "fixed-version: Fixed from version 6.1" | ||
3969 | |||
3970 | CVE_STATUS[CVE-2022-49877] = "fixed-version: Fixed from version 6.1" | ||
3971 | |||
3972 | CVE_STATUS[CVE-2022-49878] = "fixed-version: Fixed from version 6.1" | ||
3973 | |||
3974 | CVE_STATUS[CVE-2022-49879] = "fixed-version: Fixed from version 6.1" | ||
3975 | |||
3976 | CVE_STATUS[CVE-2022-49880] = "fixed-version: Fixed from version 6.1" | ||
3977 | |||
3978 | CVE_STATUS[CVE-2022-49881] = "fixed-version: Fixed from version 6.1" | ||
3979 | |||
3980 | CVE_STATUS[CVE-2022-49882] = "fixed-version: Fixed from version 6.1" | ||
3981 | |||
3982 | CVE_STATUS[CVE-2022-49883] = "fixed-version: Fixed from version 6.1" | ||
3983 | |||
3984 | CVE_STATUS[CVE-2022-49884] = "fixed-version: Fixed from version 6.1" | ||
3985 | |||
3986 | CVE_STATUS[CVE-2022-49885] = "fixed-version: Fixed from version 6.1" | ||
3987 | |||
3988 | CVE_STATUS[CVE-2022-49886] = "fixed-version: Fixed from version 6.1" | ||
3989 | |||
3990 | CVE_STATUS[CVE-2022-49887] = "fixed-version: Fixed from version 6.1" | ||
3991 | |||
3992 | CVE_STATUS[CVE-2022-49888] = "fixed-version: Fixed from version 6.1" | ||
3993 | |||
3994 | CVE_STATUS[CVE-2022-49889] = "fixed-version: Fixed from version 6.0.8" | ||
3995 | |||
3996 | CVE_STATUS[CVE-2022-49890] = "fixed-version: Fixed from version 6.1" | ||
3997 | |||
3998 | CVE_STATUS[CVE-2022-49891] = "fixed-version: Fixed from version 6.1" | ||
3999 | |||
4000 | CVE_STATUS[CVE-2022-49892] = "fixed-version: Fixed from version 6.1" | ||
4001 | |||
4002 | CVE_STATUS[CVE-2022-49893] = "fixed-version: Fixed from version 6.1" | ||
4003 | |||
4004 | CVE_STATUS[CVE-2022-49894] = "fixed-version: Fixed from version 6.1" | ||
4005 | |||
4006 | CVE_STATUS[CVE-2022-49895] = "fixed-version: Fixed from version 6.1" | ||
4007 | |||
4008 | CVE_STATUS[CVE-2022-49896] = "fixed-version: Fixed from version 6.1" | ||
4009 | |||
4010 | CVE_STATUS[CVE-2022-49898] = "fixed-version: Fixed from version 6.1" | ||
4011 | |||
4012 | CVE_STATUS[CVE-2022-49899] = "fixed-version: Fixed from version 6.1" | ||
4013 | |||
4014 | CVE_STATUS[CVE-2022-49900] = "fixed-version: Fixed from version 6.1" | ||
4015 | |||
4016 | CVE_STATUS[CVE-2022-49901] = "fixed-version: Fixed from version 6.1" | ||
4017 | |||
4018 | CVE_STATUS[CVE-2022-49902] = "fixed-version: Fixed from version 6.1" | ||
4019 | |||
4020 | CVE_STATUS[CVE-2022-49903] = "fixed-version: Fixed from version 6.1" | ||
4021 | |||
4022 | CVE_STATUS[CVE-2022-49904] = "fixed-version: Fixed from version 6.1" | ||
4023 | |||
4024 | CVE_STATUS[CVE-2022-49905] = "fixed-version: Fixed from version 6.1" | ||
4025 | |||
4026 | CVE_STATUS[CVE-2022-49906] = "fixed-version: Fixed from version 6.1" | ||
4027 | |||
4028 | CVE_STATUS[CVE-2022-49907] = "fixed-version: Fixed from version 6.1" | ||
4029 | |||
4030 | CVE_STATUS[CVE-2022-49908] = "fixed-version: Fixed from version 6.1" | ||
4031 | |||
4032 | CVE_STATUS[CVE-2022-49909] = "fixed-version: Fixed from version 6.1" | ||
4033 | |||
4034 | CVE_STATUS[CVE-2022-49910] = "fixed-version: Fixed from version 6.1" | ||
4035 | |||
4036 | CVE_STATUS[CVE-2022-49911] = "fixed-version: Fixed from version 6.1" | ||
4037 | |||
4038 | CVE_STATUS[CVE-2022-49912] = "fixed-version: Fixed from version 6.1" | ||
4039 | |||
4040 | CVE_STATUS[CVE-2022-49913] = "fixed-version: Fixed from version 6.1" | ||
4041 | |||
4042 | CVE_STATUS[CVE-2022-49914] = "fixed-version: Fixed from version 6.1" | ||
4043 | |||
4044 | CVE_STATUS[CVE-2022-49915] = "fixed-version: Fixed from version 6.1" | ||
4045 | |||
4046 | CVE_STATUS[CVE-2022-49916] = "fixed-version: Fixed from version 6.1" | ||
4047 | |||
4048 | CVE_STATUS[CVE-2022-49917] = "fixed-version: Fixed from version 6.1" | ||
4049 | |||
4050 | CVE_STATUS[CVE-2022-49918] = "fixed-version: Fixed from version 6.1" | ||
4051 | |||
4052 | CVE_STATUS[CVE-2022-49919] = "fixed-version: Fixed from version 6.1" | ||
4053 | |||
4054 | CVE_STATUS[CVE-2022-49920] = "fixed-version: Fixed from version 6.1" | ||
4055 | |||
4056 | CVE_STATUS[CVE-2022-49921] = "fixed-version: Fixed from version 6.1" | ||
4057 | |||
4058 | CVE_STATUS[CVE-2022-49922] = "fixed-version: Fixed from version 6.1" | ||
4059 | |||
4060 | CVE_STATUS[CVE-2022-49923] = "fixed-version: Fixed from version 6.1" | ||
4061 | |||
4062 | CVE_STATUS[CVE-2022-49924] = "fixed-version: Fixed from version 6.1" | ||
4063 | |||
4064 | CVE_STATUS[CVE-2022-49925] = "fixed-version: Fixed from version 6.1" | ||
4065 | |||
4066 | CVE_STATUS[CVE-2022-49926] = "fixed-version: Fixed from version 6.1" | ||
4067 | |||
4068 | CVE_STATUS[CVE-2022-49927] = "fixed-version: Fixed from version 6.1" | ||
4069 | |||
4070 | CVE_STATUS[CVE-2022-49928] = "fixed-version: Fixed from version 6.1" | ||
4071 | |||
4072 | CVE_STATUS[CVE-2022-49929] = "fixed-version: Fixed from version 6.1" | ||
4073 | |||
4074 | CVE_STATUS[CVE-2022-49930] = "fixed-version: Fixed from version 6.1" | ||
4075 | |||
4076 | CVE_STATUS[CVE-2022-49931] = "fixed-version: Fixed from version 6.1" | ||
4077 | |||
4078 | CVE_STATUS[CVE-2022-49932] = "fixed-version: Fixed from version 6.3" | ||
4079 | |||
4080 | # CVE-2023-34319 has no known resolution | ||
4081 | |||
4082 | # CVE-2023-34324 has no known resolution | ||
4083 | |||
4084 | # CVE-2023-46838 has no known resolution | ||
4085 | |||
4086 | CVE_STATUS[CVE-2023-52433] = "fixed-version: Fixed from version 6.6" | ||
4087 | |||
4088 | CVE_STATUS[CVE-2023-52434] = "fixed-version: Fixed from version 6.7" | ||
4089 | |||
4090 | CVE_STATUS[CVE-2023-52435] = "fixed-version: Fixed from version 6.7" | ||
4091 | |||
4092 | CVE_STATUS[CVE-2023-52436] = "fixed-version: Fixed from version 6.8" | ||
4093 | |||
4094 | CVE_STATUS[CVE-2023-52438] = "fixed-version: Fixed from version 6.8" | ||
4095 | |||
4096 | CVE_STATUS[CVE-2023-52439] = "fixed-version: Fixed from version 6.8" | ||
4097 | |||
4098 | CVE_STATUS[CVE-2023-52440] = "fixed-version: Fixed from version 6.6" | ||
4099 | |||
4100 | CVE_STATUS[CVE-2023-52441] = "fixed-version: Fixed from version 6.5" | ||
4101 | |||
4102 | CVE_STATUS[CVE-2023-52442] = "fixed-version: Fixed from version 6.5" | ||
4103 | |||
4104 | CVE_STATUS[CVE-2023-52443] = "fixed-version: Fixed from version 6.8" | ||
4105 | |||
4106 | CVE_STATUS[CVE-2023-52444] = "fixed-version: Fixed from version 6.8" | ||
4107 | |||
4108 | CVE_STATUS[CVE-2023-52445] = "fixed-version: Fixed from version 6.8" | ||
4109 | |||
4110 | CVE_STATUS[CVE-2023-52446] = "fixed-version: Fixed from version 6.8" | ||
4111 | |||
4112 | CVE_STATUS[CVE-2023-52447] = "fixed-version: Fixed from version 6.8" | ||
4113 | |||
4114 | CVE_STATUS[CVE-2023-52448] = "fixed-version: Fixed from version 6.8" | ||
4115 | |||
4116 | CVE_STATUS[CVE-2023-52449] = "fixed-version: Fixed from version 6.8" | ||
4117 | |||
4118 | CVE_STATUS[CVE-2023-52450] = "fixed-version: Fixed from version 6.8" | ||
4119 | |||
4120 | CVE_STATUS[CVE-2023-52451] = "fixed-version: Fixed from version 6.8" | ||
4121 | |||
4122 | CVE_STATUS[CVE-2023-52452] = "fixed-version: Fixed from version 6.8" | ||
4123 | |||
4124 | CVE_STATUS[CVE-2023-52453] = "fixed-version: Fixed from version 6.8" | ||
4125 | |||
4126 | CVE_STATUS[CVE-2023-52454] = "fixed-version: Fixed from version 6.8" | ||
4127 | |||
4128 | CVE_STATUS[CVE-2023-52455] = "fixed-version: Fixed from version 6.8" | ||
4129 | |||
4130 | CVE_STATUS[CVE-2023-52456] = "fixed-version: Fixed from version 6.8" | ||
4131 | |||
4132 | CVE_STATUS[CVE-2023-52457] = "fixed-version: Fixed from version 6.8" | ||
4133 | |||
4134 | CVE_STATUS[CVE-2023-52458] = "fixed-version: Fixed from version 6.8" | ||
4135 | |||
4136 | CVE_STATUS[CVE-2023-52459] = "fixed-version: Fixed from version 6.8" | ||
4137 | |||
4138 | CVE_STATUS[CVE-2023-52460] = "fixed-version: Fixed from version 6.8" | ||
4139 | |||
4140 | CVE_STATUS[CVE-2023-52461] = "fixed-version: Fixed from version 6.8" | ||
4141 | |||
4142 | CVE_STATUS[CVE-2023-52462] = "fixed-version: Fixed from version 6.8" | ||
4143 | |||
4144 | CVE_STATUS[CVE-2023-52463] = "fixed-version: Fixed from version 6.8" | ||
4145 | |||
4146 | CVE_STATUS[CVE-2023-52464] = "fixed-version: Fixed from version 6.8" | ||
4147 | |||
4148 | CVE_STATUS[CVE-2023-52465] = "fixed-version: Fixed from version 6.8" | ||
4149 | |||
4150 | CVE_STATUS[CVE-2023-52467] = "fixed-version: Fixed from version 6.8" | ||
4151 | |||
4152 | CVE_STATUS[CVE-2023-52468] = "fixed-version: Fixed from version 6.8" | ||
4153 | |||
4154 | CVE_STATUS[CVE-2023-52469] = "fixed-version: Fixed from version 6.8" | ||
4155 | |||
4156 | CVE_STATUS[CVE-2023-52470] = "fixed-version: Fixed from version 6.8" | ||
4157 | |||
4158 | CVE_STATUS[CVE-2023-52471] = "fixed-version: Fixed from version 6.8" | ||
4159 | |||
4160 | CVE_STATUS[CVE-2023-52472] = "fixed-version: Fixed from version 6.8" | ||
4161 | |||
4162 | CVE_STATUS[CVE-2023-52473] = "fixed-version: Fixed from version 6.8" | ||
4163 | |||
4164 | CVE_STATUS[CVE-2023-52474] = "fixed-version: Fixed from version 6.4" | ||
4165 | |||
4166 | CVE_STATUS[CVE-2023-52475] = "fixed-version: Fixed from version 6.6" | ||
4167 | |||
4168 | CVE_STATUS[CVE-2023-52476] = "fixed-version: Fixed from version 6.6" | ||
4169 | |||
4170 | CVE_STATUS[CVE-2023-52477] = "fixed-version: Fixed from version 6.6" | ||
4171 | |||
4172 | CVE_STATUS[CVE-2023-52478] = "fixed-version: Fixed from version 6.6" | ||
4173 | |||
4174 | CVE_STATUS[CVE-2023-52479] = "fixed-version: Fixed from version 6.6" | ||
4175 | |||
4176 | CVE_STATUS[CVE-2023-52480] = "fixed-version: Fixed from version 6.6" | ||
4177 | |||
4178 | CVE_STATUS[CVE-2023-52481] = "fixed-version: Fixed from version 6.6" | ||
4179 | |||
4180 | CVE_STATUS[CVE-2023-52482] = "fixed-version: Fixed from version 6.6" | ||
4181 | |||
4182 | CVE_STATUS[CVE-2023-52483] = "fixed-version: Fixed from version 6.6" | ||
4183 | |||
4184 | CVE_STATUS[CVE-2023-52484] = "fixed-version: Fixed from version 6.6" | ||
4185 | |||
4186 | CVE_STATUS[CVE-2023-52485] = "fixed-version: Fixed from version 6.8" | ||
4187 | |||
4188 | CVE_STATUS[CVE-2023-52486] = "fixed-version: Fixed from version 6.8" | ||
4189 | |||
4190 | CVE_STATUS[CVE-2023-52487] = "fixed-version: Fixed from version 6.8" | ||
4191 | |||
4192 | CVE_STATUS[CVE-2023-52488] = "fixed-version: Fixed from version 6.8" | ||
4193 | |||
4194 | CVE_STATUS[CVE-2023-52489] = "fixed-version: Fixed from version 6.8" | ||
4195 | |||
4196 | CVE_STATUS[CVE-2023-52490] = "fixed-version: Fixed from version 6.8" | ||
4197 | |||
4198 | CVE_STATUS[CVE-2023-52491] = "fixed-version: Fixed from version 6.8" | ||
4199 | |||
4200 | CVE_STATUS[CVE-2023-52492] = "fixed-version: Fixed from version 6.8" | ||
4201 | |||
4202 | CVE_STATUS[CVE-2023-52493] = "fixed-version: Fixed from version 6.8" | ||
4203 | |||
4204 | CVE_STATUS[CVE-2023-52494] = "fixed-version: Fixed from version 6.8" | ||
4205 | |||
4206 | CVE_STATUS[CVE-2023-52495] = "fixed-version: Fixed from version 6.8" | ||
4207 | |||
4208 | CVE_STATUS[CVE-2023-52497] = "fixed-version: Fixed from version 6.8" | ||
4209 | |||
4210 | CVE_STATUS[CVE-2023-52498] = "fixed-version: Fixed from version 6.8" | ||
4211 | |||
4212 | CVE_STATUS[CVE-2023-52499] = "fixed-version: Fixed from version 6.6" | ||
4213 | |||
4214 | CVE_STATUS[CVE-2023-52500] = "fixed-version: Fixed from version 6.6" | ||
4215 | |||
4216 | CVE_STATUS[CVE-2023-52501] = "fixed-version: Fixed from version 6.6" | ||
4217 | |||
4218 | CVE_STATUS[CVE-2023-52502] = "fixed-version: Fixed from version 6.6" | ||
4219 | |||
4220 | CVE_STATUS[CVE-2023-52503] = "fixed-version: Fixed from version 6.6" | ||
4221 | |||
4222 | CVE_STATUS[CVE-2023-52504] = "fixed-version: Fixed from version 6.6" | ||
4223 | |||
4224 | CVE_STATUS[CVE-2023-52505] = "fixed-version: Fixed from version 6.6" | ||
4225 | |||
4226 | CVE_STATUS[CVE-2023-52506] = "fixed-version: Fixed from version 6.6" | ||
4227 | |||
4228 | CVE_STATUS[CVE-2023-52507] = "fixed-version: Fixed from version 6.6" | ||
4229 | |||
4230 | CVE_STATUS[CVE-2023-52508] = "fixed-version: Fixed from version 6.6" | ||
4231 | |||
4232 | CVE_STATUS[CVE-2023-52509] = "fixed-version: Fixed from version 6.6" | ||
4233 | |||
4234 | CVE_STATUS[CVE-2023-52510] = "fixed-version: Fixed from version 6.6" | ||
4235 | |||
4236 | CVE_STATUS[CVE-2023-52511] = "fixed-version: Fixed from version 6.6" | ||
4237 | |||
4238 | CVE_STATUS[CVE-2023-52512] = "fixed-version: Fixed from version 6.6" | ||
4239 | |||
4240 | CVE_STATUS[CVE-2023-52513] = "fixed-version: Fixed from version 6.6" | ||
4241 | |||
4242 | CVE_STATUS[CVE-2023-52515] = "fixed-version: Fixed from version 6.6" | ||
4243 | |||
4244 | CVE_STATUS[CVE-2023-52516] = "fixed-version: Fixed from version 6.6" | ||
4245 | |||
4246 | CVE_STATUS[CVE-2023-52517] = "fixed-version: Fixed from version 6.6" | ||
4247 | |||
4248 | CVE_STATUS[CVE-2023-52518] = "fixed-version: Fixed from version 6.6" | ||
4249 | |||
4250 | CVE_STATUS[CVE-2023-52519] = "fixed-version: Fixed from version 6.6" | ||
4251 | |||
4252 | CVE_STATUS[CVE-2023-52520] = "fixed-version: Fixed from version 6.6" | ||
4253 | |||
4254 | CVE_STATUS[CVE-2023-52522] = "fixed-version: Fixed from version 6.6" | ||
4255 | |||
4256 | CVE_STATUS[CVE-2023-52523] = "fixed-version: Fixed from version 6.6" | ||
4257 | |||
4258 | CVE_STATUS[CVE-2023-52524] = "fixed-version: Fixed from version 6.6" | ||
4259 | |||
4260 | CVE_STATUS[CVE-2023-52525] = "fixed-version: Fixed from version 6.5.7" | ||
4261 | |||
4262 | CVE_STATUS[CVE-2023-52526] = "fixed-version: Fixed from version 6.6" | ||
4263 | |||
4264 | CVE_STATUS[CVE-2023-52527] = "fixed-version: Fixed from version 6.6" | ||
4265 | |||
4266 | CVE_STATUS[CVE-2023-52528] = "fixed-version: Fixed from version 6.6" | ||
4267 | |||
4268 | CVE_STATUS[CVE-2023-52529] = "fixed-version: Fixed from version 6.6" | ||
4269 | |||
4270 | CVE_STATUS[CVE-2023-52530] = "fixed-version: Fixed from version 6.6" | ||
4271 | |||
4272 | CVE_STATUS[CVE-2023-52531] = "fixed-version: Fixed from version 6.6" | ||
4273 | |||
4274 | CVE_STATUS[CVE-2023-52532] = "fixed-version: Fixed from version 6.6" | ||
4275 | |||
4276 | CVE_STATUS[CVE-2023-52559] = "fixed-version: Fixed from version 6.6" | ||
4277 | |||
4278 | CVE_STATUS[CVE-2023-52560] = "fixed-version: Fixed from version 6.6" | ||
4279 | |||
4280 | CVE_STATUS[CVE-2023-52561] = "fixed-version: Fixed from version 6.6" | ||
4281 | |||
4282 | CVE_STATUS[CVE-2023-52562] = "fixed-version: Fixed from version 6.6" | ||
4283 | |||
4284 | CVE_STATUS[CVE-2023-52563] = "fixed-version: Fixed from version 6.6" | ||
4285 | |||
4286 | CVE_STATUS[CVE-2023-52564] = "fixed-version: Fixed from version 6.6" | ||
4287 | |||
4288 | CVE_STATUS[CVE-2023-52565] = "fixed-version: Fixed from version 6.6" | ||
4289 | |||
4290 | CVE_STATUS[CVE-2023-52566] = "fixed-version: Fixed from version 6.6" | ||
4291 | |||
4292 | CVE_STATUS[CVE-2023-52567] = "fixed-version: Fixed from version 6.6" | ||
4293 | |||
4294 | CVE_STATUS[CVE-2023-52568] = "fixed-version: Fixed from version 6.6" | ||
4295 | |||
4296 | CVE_STATUS[CVE-2023-52569] = "fixed-version: Fixed from version 6.6" | ||
4297 | |||
4298 | CVE_STATUS[CVE-2023-52570] = "fixed-version: Fixed from version 6.6" | ||
4299 | |||
4300 | CVE_STATUS[CVE-2023-52571] = "fixed-version: Fixed from version 6.6" | ||
4301 | |||
4302 | CVE_STATUS[CVE-2023-52572] = "fixed-version: Fixed from version 6.6" | ||
4303 | |||
4304 | CVE_STATUS[CVE-2023-52573] = "fixed-version: Fixed from version 6.6" | ||
4305 | |||
4306 | CVE_STATUS[CVE-2023-52574] = "fixed-version: Fixed from version 6.6" | ||
4307 | |||
4308 | CVE_STATUS[CVE-2023-52576] = "fixed-version: Fixed from version 6.6" | ||
4309 | |||
4310 | CVE_STATUS[CVE-2023-52577] = "fixed-version: Fixed from version 6.5.6" | ||
4311 | |||
4312 | CVE_STATUS[CVE-2023-52578] = "fixed-version: Fixed from version 6.6" | ||
4313 | |||
4314 | CVE_STATUS[CVE-2023-52580] = "fixed-version: Fixed from version 6.6" | ||
4315 | |||
4316 | CVE_STATUS[CVE-2023-52581] = "fixed-version: Fixed from version 6.6" | ||
4317 | |||
4318 | CVE_STATUS[CVE-2023-52582] = "fixed-version: Fixed from version 6.6" | ||
4319 | |||
4320 | CVE_STATUS[CVE-2023-52583] = "fixed-version: Fixed from version 6.8" | ||
4321 | |||
4322 | CVE_STATUS[CVE-2023-52584] = "fixed-version: Fixed from version 6.8" | ||
4323 | |||
4324 | CVE_STATUS[CVE-2023-52585] = "fixed-version: Fixed from version 6.8" | ||
4325 | |||
4326 | CVE_STATUS[CVE-2023-52586] = "fixed-version: Fixed from version 6.8" | ||
4327 | |||
4328 | CVE_STATUS[CVE-2023-52587] = "fixed-version: Fixed from version 6.8" | ||
4329 | |||
4330 | CVE_STATUS[CVE-2023-52588] = "fixed-version: Fixed from version 6.8" | ||
4331 | |||
4332 | CVE_STATUS[CVE-2023-52589] = "fixed-version: Fixed from version 6.8" | ||
4333 | |||
4334 | CVE_STATUS[CVE-2023-52590] = "fixed-version: Fixed from version 6.8" | ||
4335 | |||
4336 | CVE_STATUS[CVE-2023-52591] = "fixed-version: Fixed from version 6.8" | ||
4337 | |||
4338 | CVE_STATUS[CVE-2023-52593] = "fixed-version: Fixed from version 6.8" | ||
4339 | |||
4340 | CVE_STATUS[CVE-2023-52594] = "fixed-version: Fixed from version 6.8" | ||
4341 | |||
4342 | CVE_STATUS[CVE-2023-52595] = "fixed-version: Fixed from version 6.8" | ||
4343 | |||
4344 | CVE_STATUS[CVE-2023-52596] = "fixed-version: Fixed from version 6.8" | ||
4345 | |||
4346 | CVE_STATUS[CVE-2023-52597] = "fixed-version: Fixed from version 6.8" | ||
4347 | |||
4348 | CVE_STATUS[CVE-2023-52598] = "fixed-version: Fixed from version 6.8" | ||
4349 | |||
4350 | CVE_STATUS[CVE-2023-52599] = "fixed-version: Fixed from version 6.8" | ||
4351 | |||
4352 | CVE_STATUS[CVE-2023-52600] = "fixed-version: Fixed from version 6.8" | ||
4353 | |||
4354 | CVE_STATUS[CVE-2023-52601] = "fixed-version: Fixed from version 6.8" | ||
4355 | |||
4356 | CVE_STATUS[CVE-2023-52602] = "fixed-version: Fixed from version 6.8" | ||
4357 | |||
4358 | CVE_STATUS[CVE-2023-52603] = "fixed-version: Fixed from version 6.8" | ||
4359 | |||
4360 | CVE_STATUS[CVE-2023-52604] = "fixed-version: Fixed from version 6.8" | ||
4361 | |||
4362 | CVE_STATUS[CVE-2023-52606] = "fixed-version: Fixed from version 6.8" | ||
4363 | |||
4364 | CVE_STATUS[CVE-2023-52607] = "fixed-version: Fixed from version 6.8" | ||
4365 | |||
4366 | CVE_STATUS[CVE-2023-52608] = "fixed-version: Fixed from version 6.8" | ||
4367 | |||
4368 | CVE_STATUS[CVE-2023-52609] = "fixed-version: Fixed from version 6.8" | ||
4369 | |||
4370 | CVE_STATUS[CVE-2023-52610] = "fixed-version: Fixed from version 6.8" | ||
4371 | |||
4372 | CVE_STATUS[CVE-2023-52611] = "fixed-version: Fixed from version 6.8" | ||
4373 | |||
4374 | CVE_STATUS[CVE-2023-52612] = "fixed-version: Fixed from version 6.8" | ||
4375 | |||
4376 | CVE_STATUS[CVE-2023-52613] = "fixed-version: Fixed from version 6.8" | ||
4377 | |||
4378 | CVE_STATUS[CVE-2023-52614] = "fixed-version: Fixed from version 6.8" | ||
4379 | |||
4380 | CVE_STATUS[CVE-2023-52615] = "fixed-version: Fixed from version 6.8" | ||
4381 | |||
4382 | CVE_STATUS[CVE-2023-52616] = "fixed-version: Fixed from version 6.8" | ||
4383 | |||
4384 | CVE_STATUS[CVE-2023-52617] = "fixed-version: Fixed from version 6.8" | ||
4385 | |||
4386 | CVE_STATUS[CVE-2023-52618] = "fixed-version: Fixed from version 6.8" | ||
4387 | |||
4388 | CVE_STATUS[CVE-2023-52619] = "fixed-version: Fixed from version 6.8" | ||
4389 | |||
4390 | CVE_STATUS[CVE-2023-52620] = "fixed-version: Fixed from version 6.4" | ||
4391 | |||
4392 | CVE_STATUS[CVE-2023-52621] = "fixed-version: Fixed from version 6.8" | ||
4393 | |||
4394 | CVE_STATUS[CVE-2023-52622] = "fixed-version: Fixed from version 6.8" | ||
4395 | |||
4396 | CVE_STATUS[CVE-2023-52623] = "fixed-version: Fixed from version 6.8" | ||
4397 | |||
4398 | CVE_STATUS[CVE-2023-52624] = "fixed-version: Fixed from version 6.8" | ||
4399 | |||
4400 | CVE_STATUS[CVE-2023-52625] = "fixed-version: Fixed from version 6.8" | ||
4401 | |||
4402 | CVE_STATUS[CVE-2023-52626] = "fixed-version: Fixed from version 6.8" | ||
4403 | |||
4404 | CVE_STATUS[CVE-2023-52627] = "fixed-version: Fixed from version 6.8" | ||
4405 | |||
4406 | CVE_STATUS[CVE-2023-52628] = "fixed-version: Fixed from version 6.6" | ||
4407 | |||
4408 | CVE_STATUS[CVE-2023-52629] = "fixed-version: Fixed from version 6.6" | ||
4409 | |||
4410 | CVE_STATUS[CVE-2023-52631] = "fixed-version: Fixed from version 6.8" | ||
4411 | |||
4412 | CVE_STATUS[CVE-2023-52632] = "fixed-version: Fixed from version 6.8" | ||
4413 | |||
4414 | CVE_STATUS[CVE-2023-52633] = "fixed-version: Fixed from version 6.8" | ||
4415 | |||
4416 | CVE_STATUS[CVE-2023-52634] = "fixed-version: Fixed from version 6.8" | ||
4417 | |||
4418 | CVE_STATUS[CVE-2023-52635] = "fixed-version: Fixed from version 6.8" | ||
4419 | |||
4420 | CVE_STATUS[CVE-2023-52636] = "fixed-version: Fixed from version 6.8" | ||
4421 | |||
4422 | CVE_STATUS[CVE-2023-52637] = "fixed-version: Fixed from version 6.8" | ||
4423 | |||
4424 | CVE_STATUS[CVE-2023-52638] = "fixed-version: Fixed from version 6.8" | ||
4425 | |||
4426 | CVE_STATUS[CVE-2023-52639] = "fixed-version: Fixed from version 6.8" | ||
4427 | |||
4428 | CVE_STATUS[CVE-2023-52640] = "fixed-version: Fixed from version 6.8" | ||
4429 | |||
4430 | CVE_STATUS[CVE-2023-52641] = "fixed-version: Fixed from version 6.8" | ||
4431 | |||
4432 | CVE_STATUS[CVE-2023-52642] = "fixed-version: Fixed from version 6.8" | ||
4433 | |||
4434 | CVE_STATUS[CVE-2023-52643] = "fixed-version: Fixed from version 6.8" | ||
4435 | |||
4436 | CVE_STATUS[CVE-2023-52644] = "fixed-version: Fixed from version 6.9" | ||
4437 | |||
4438 | CVE_STATUS[CVE-2023-52645] = "fixed-version: Fixed from version 6.8" | ||
4439 | |||
4440 | CVE_STATUS[CVE-2023-52646] = "fixed-version: Fixed from version 6.2" | ||
4441 | |||
4442 | CVE_STATUS[CVE-2023-52647] = "fixed-version: Fixed from version 6.9" | ||
4443 | |||
4444 | CVE_STATUS[CVE-2023-52648] = "fixed-version: Fixed from version 6.9" | ||
4445 | |||
4446 | CVE_STATUS[CVE-2023-52649] = "fixed-version: Fixed from version 6.9" | ||
4447 | |||
4448 | CVE_STATUS[CVE-2023-52650] = "fixed-version: Fixed from version 6.9" | ||
4449 | |||
4450 | CVE_STATUS[CVE-2023-52652] = "fixed-version: Fixed from version 6.9" | ||
4451 | |||
4452 | CVE_STATUS[CVE-2023-52653] = "fixed-version: Fixed from version 6.9" | ||
4453 | |||
4454 | CVE_STATUS[CVE-2023-52654] = "fixed-version: Fixed from version 6.7" | ||
4455 | |||
4456 | CVE_STATUS[CVE-2023-52655] = "fixed-version: Fixed from version 6.7" | ||
4457 | |||
4458 | CVE_STATUS[CVE-2023-52656] = "fixed-version: Fixed from version 6.8" | ||
4459 | |||
4460 | CVE_STATUS[CVE-2023-52657] = "fixed-version: Fixed from version 6.8" | ||
4461 | |||
4462 | CVE_STATUS[CVE-2023-52658] = "fixed-version: Fixed from version 6.8" | ||
4463 | |||
4464 | CVE_STATUS[CVE-2023-52659] = "fixed-version: Fixed from version 6.9" | ||
4465 | |||
4466 | CVE_STATUS[CVE-2023-52660] = "fixed-version: Fixed from version 6.8" | ||
4467 | |||
4468 | CVE_STATUS[CVE-2023-52661] = "fixed-version: Fixed from version 6.9" | ||
4469 | |||
4470 | CVE_STATUS[CVE-2023-52662] = "fixed-version: Fixed from version 6.9" | ||
4471 | |||
4472 | CVE_STATUS[CVE-2023-52663] = "fixed-version: Fixed from version 6.9" | ||
4473 | |||
4474 | CVE_STATUS[CVE-2023-52664] = "fixed-version: Fixed from version 6.8" | ||
4475 | |||
4476 | CVE_STATUS[CVE-2023-52667] = "fixed-version: Fixed from version 6.8" | ||
4477 | |||
4478 | CVE_STATUS[CVE-2023-52668] = "fixed-version: Fixed from version 6.8" | ||
4479 | |||
4480 | CVE_STATUS[CVE-2023-52669] = "fixed-version: Fixed from version 6.8" | ||
4481 | |||
4482 | CVE_STATUS[CVE-2023-52670] = "fixed-version: Fixed from version 6.8" | ||
4483 | |||
4484 | CVE_STATUS[CVE-2023-52671] = "fixed-version: Fixed from version 6.8" | ||
4485 | |||
4486 | CVE_STATUS[CVE-2023-52672] = "fixed-version: Fixed from version 6.8" | ||
4487 | |||
4488 | CVE_STATUS[CVE-2023-52673] = "fixed-version: Fixed from version 6.8" | ||
4489 | |||
4490 | CVE_STATUS[CVE-2023-52674] = "fixed-version: Fixed from version 6.8" | ||
4491 | |||
4492 | CVE_STATUS[CVE-2023-52675] = "fixed-version: Fixed from version 6.8" | ||
4493 | |||
4494 | CVE_STATUS[CVE-2023-52676] = "fixed-version: Fixed from version 6.8" | ||
4495 | |||
4496 | CVE_STATUS[CVE-2023-52677] = "fixed-version: Fixed from version 6.8" | ||
4497 | |||
4498 | CVE_STATUS[CVE-2023-52678] = "fixed-version: Fixed from version 6.8" | ||
4499 | |||
4500 | CVE_STATUS[CVE-2023-52679] = "fixed-version: Fixed from version 6.8" | ||
4501 | |||
4502 | CVE_STATUS[CVE-2023-52680] = "fixed-version: Fixed from version 6.8" | ||
4503 | |||
4504 | CVE_STATUS[CVE-2023-52681] = "fixed-version: Fixed from version 6.8" | ||
4505 | |||
4506 | CVE_STATUS[CVE-2023-52682] = "fixed-version: Fixed from version 6.8" | ||
4507 | |||
4508 | CVE_STATUS[CVE-2023-52683] = "fixed-version: Fixed from version 6.8" | ||
4509 | |||
4510 | CVE_STATUS[CVE-2023-52684] = "fixed-version: Fixed from version 6.8" | ||
4511 | |||
4512 | CVE_STATUS[CVE-2023-52686] = "fixed-version: Fixed from version 6.8" | ||
4513 | |||
4514 | CVE_STATUS[CVE-2023-52687] = "fixed-version: Fixed from version 6.8" | ||
4515 | |||
4516 | CVE_STATUS[CVE-2023-52688] = "fixed-version: Fixed from version 6.8" | ||
4517 | |||
4518 | CVE_STATUS[CVE-2023-52689] = "fixed-version: Fixed from version 6.8" | ||
4519 | |||
4520 | CVE_STATUS[CVE-2023-52690] = "fixed-version: Fixed from version 6.8" | ||
4521 | |||
4522 | CVE_STATUS[CVE-2023-52691] = "fixed-version: Fixed from version 6.8" | ||
4523 | |||
4524 | CVE_STATUS[CVE-2023-52692] = "fixed-version: Fixed from version 6.8" | ||
4525 | |||
4526 | CVE_STATUS[CVE-2023-52693] = "fixed-version: Fixed from version 6.8" | ||
4527 | |||
4528 | CVE_STATUS[CVE-2023-52694] = "fixed-version: Fixed from version 6.8" | ||
4529 | |||
4530 | CVE_STATUS[CVE-2023-52695] = "fixed-version: Fixed from version 6.8" | ||
4531 | |||
4532 | CVE_STATUS[CVE-2023-52696] = "fixed-version: Fixed from version 6.8" | ||
4533 | |||
4534 | CVE_STATUS[CVE-2023-52697] = "fixed-version: Fixed from version 6.8" | ||
4535 | |||
4536 | CVE_STATUS[CVE-2023-52698] = "fixed-version: Fixed from version 6.8" | ||
4537 | |||
4538 | CVE_STATUS[CVE-2023-52699] = "fixed-version: Fixed from version 6.9" | ||
4539 | |||
4540 | CVE_STATUS[CVE-2023-52700] = "fixed-version: Fixed from version 6.2" | ||
4541 | |||
4542 | CVE_STATUS[CVE-2023-52701] = "fixed-version: Fixed from version 6.2" | ||
4543 | |||
4544 | CVE_STATUS[CVE-2023-52702] = "fixed-version: Fixed from version 6.2" | ||
4545 | |||
4546 | CVE_STATUS[CVE-2023-52703] = "fixed-version: Fixed from version 6.2" | ||
4547 | |||
4548 | CVE_STATUS[CVE-2023-52704] = "fixed-version: Fixed from version 6.2" | ||
4549 | |||
4550 | CVE_STATUS[CVE-2023-52705] = "fixed-version: Fixed from version 6.2" | ||
4551 | |||
4552 | CVE_STATUS[CVE-2023-52706] = "fixed-version: Fixed from version 6.2" | ||
4553 | |||
4554 | CVE_STATUS[CVE-2023-52707] = "fixed-version: Fixed from version 6.2" | ||
4555 | |||
4556 | CVE_STATUS[CVE-2023-52708] = "fixed-version: Fixed from version 6.2" | ||
4557 | |||
4558 | CVE_STATUS[CVE-2023-52730] = "fixed-version: Fixed from version 6.2" | ||
4559 | |||
4560 | CVE_STATUS[CVE-2023-52731] = "fixed-version: Fixed from version 6.2" | ||
4561 | |||
4562 | CVE_STATUS[CVE-2023-52732] = "fixed-version: Fixed from version 6.2" | ||
4563 | |||
4564 | # CVE-2023-52733 has no known resolution | ||
4565 | |||
4566 | CVE_STATUS[CVE-2023-52735] = "fixed-version: Fixed from version 6.2" | ||
4567 | |||
4568 | CVE_STATUS[CVE-2023-52736] = "fixed-version: Fixed from version 6.2" | ||
4569 | |||
4570 | CVE_STATUS[CVE-2023-52737] = "fixed-version: Fixed from version 6.2" | ||
4571 | |||
4572 | CVE_STATUS[CVE-2023-52738] = "fixed-version: Fixed from version 6.2" | ||
4573 | |||
4574 | CVE_STATUS[CVE-2023-52739] = "fixed-version: Fixed from version 6.2" | ||
4575 | |||
4576 | CVE_STATUS[CVE-2023-52740] = "fixed-version: Fixed from version 6.2" | ||
4577 | |||
4578 | CVE_STATUS[CVE-2023-52741] = "fixed-version: Fixed from version 6.2" | ||
4579 | |||
4580 | CVE_STATUS[CVE-2023-52742] = "fixed-version: Fixed from version 6.2" | ||
4581 | |||
4582 | CVE_STATUS[CVE-2023-52743] = "fixed-version: Fixed from version 6.2" | ||
4583 | |||
4584 | CVE_STATUS[CVE-2023-52744] = "fixed-version: Fixed from version 6.2" | ||
4585 | |||
4586 | CVE_STATUS[CVE-2023-52745] = "fixed-version: Fixed from version 6.1.12" | ||
4587 | |||
4588 | CVE_STATUS[CVE-2023-52746] = "fixed-version: Fixed from version 6.2" | ||
4589 | |||
4590 | CVE_STATUS[CVE-2023-52747] = "fixed-version: Fixed from version 6.2" | ||
4591 | |||
4592 | CVE_STATUS[CVE-2023-52748] = "fixed-version: Fixed from version 6.7" | ||
4593 | |||
4594 | CVE_STATUS[CVE-2023-52749] = "fixed-version: Fixed from version 6.7" | ||
4595 | |||
4596 | CVE_STATUS[CVE-2023-52750] = "fixed-version: Fixed from version 6.7" | ||
4597 | |||
4598 | CVE_STATUS[CVE-2023-52751] = "fixed-version: Fixed from version 6.7" | ||
4599 | |||
4600 | CVE_STATUS[CVE-2023-52752] = "fixed-version: Fixed from version 6.7" | ||
4601 | |||
4602 | CVE_STATUS[CVE-2023-52753] = "fixed-version: Fixed from version 6.7" | ||
4603 | |||
4604 | CVE_STATUS[CVE-2023-52754] = "fixed-version: Fixed from version 6.7" | ||
4605 | |||
4606 | CVE_STATUS[CVE-2023-52755] = "fixed-version: Fixed from version 6.7" | ||
4607 | |||
4608 | CVE_STATUS[CVE-2023-52757] = "fixed-version: Fixed from version 6.7" | ||
4609 | |||
4610 | CVE_STATUS[CVE-2023-52760] = "fixed-version: Fixed from version 6.7" | ||
4611 | |||
4612 | CVE_STATUS[CVE-2023-52761] = "fixed-version: Fixed from version 6.7" | ||
4613 | |||
4614 | CVE_STATUS[CVE-2023-52762] = "fixed-version: Fixed from version 6.7" | ||
4615 | |||
4616 | CVE_STATUS[CVE-2023-52763] = "fixed-version: Fixed from version 6.7" | ||
4617 | |||
4618 | CVE_STATUS[CVE-2023-52764] = "fixed-version: Fixed from version 6.7" | ||
4619 | |||
4620 | CVE_STATUS[CVE-2023-52765] = "fixed-version: Fixed from version 6.7" | ||
4621 | |||
4622 | CVE_STATUS[CVE-2023-52766] = "fixed-version: Fixed from version 6.7" | ||
4623 | |||
4624 | CVE_STATUS[CVE-2023-52767] = "fixed-version: Fixed from version 6.7" | ||
4625 | |||
4626 | CVE_STATUS[CVE-2023-52768] = "fixed-version: Fixed from version 6.7" | ||
4627 | |||
4628 | CVE_STATUS[CVE-2023-52769] = "fixed-version: Fixed from version 6.7" | ||
4629 | |||
4630 | CVE_STATUS[CVE-2023-52770] = "fixed-version: Fixed from version 6.7" | ||
4631 | |||
4632 | CVE_STATUS[CVE-2023-52771] = "fixed-version: Fixed from version 6.7" | ||
4633 | |||
4634 | CVE_STATUS[CVE-2023-52772] = "fixed-version: Fixed from version 6.7" | ||
4635 | |||
4636 | CVE_STATUS[CVE-2023-52773] = "fixed-version: Fixed from version 6.7" | ||
4637 | |||
4638 | CVE_STATUS[CVE-2023-52774] = "fixed-version: Fixed from version 6.7" | ||
4639 | |||
4640 | CVE_STATUS[CVE-2023-52775] = "fixed-version: Fixed from version 6.7" | ||
4641 | |||
4642 | CVE_STATUS[CVE-2023-52776] = "fixed-version: Fixed from version 6.7" | ||
4643 | |||
4644 | CVE_STATUS[CVE-2023-52777] = "fixed-version: Fixed from version 6.7" | ||
4645 | |||
4646 | CVE_STATUS[CVE-2023-52778] = "fixed-version: Fixed from version 6.7" | ||
4647 | |||
4648 | CVE_STATUS[CVE-2023-52779] = "fixed-version: Fixed from version 6.7" | ||
4649 | |||
4650 | CVE_STATUS[CVE-2023-52780] = "fixed-version: Fixed from version 6.7" | ||
4651 | |||
4652 | CVE_STATUS[CVE-2023-52781] = "fixed-version: Fixed from version 6.7" | ||
4653 | |||
4654 | CVE_STATUS[CVE-2023-52782] = "fixed-version: Fixed from version 6.7" | ||
4655 | |||
4656 | CVE_STATUS[CVE-2023-52783] = "fixed-version: Fixed from version 6.7" | ||
4657 | |||
4658 | CVE_STATUS[CVE-2023-52784] = "fixed-version: Fixed from version 6.7" | ||
4659 | |||
4660 | CVE_STATUS[CVE-2023-52785] = "fixed-version: Fixed from version 6.7" | ||
4661 | |||
4662 | CVE_STATUS[CVE-2023-52786] = "fixed-version: Fixed from version 6.7" | ||
4663 | |||
4664 | CVE_STATUS[CVE-2023-52787] = "fixed-version: Fixed from version 6.7" | ||
4665 | |||
4666 | CVE_STATUS[CVE-2023-52788] = "fixed-version: Fixed from version 6.7" | ||
4667 | |||
4668 | CVE_STATUS[CVE-2023-52789] = "fixed-version: Fixed from version 6.7" | ||
4669 | |||
4670 | CVE_STATUS[CVE-2023-52790] = "fixed-version: Fixed from version 6.7" | ||
4671 | |||
4672 | CVE_STATUS[CVE-2023-52791] = "fixed-version: Fixed from version 6.7" | ||
4673 | |||
4674 | CVE_STATUS[CVE-2023-52792] = "fixed-version: Fixed from version 6.7" | ||
4675 | |||
4676 | CVE_STATUS[CVE-2023-52794] = "fixed-version: Fixed from version 6.7" | ||
4677 | |||
4678 | CVE_STATUS[CVE-2023-52795] = "fixed-version: Fixed from version 6.7" | ||
4679 | |||
4680 | CVE_STATUS[CVE-2023-52796] = "fixed-version: Fixed from version 6.7" | ||
4681 | |||
4682 | CVE_STATUS[CVE-2023-52797] = "fixed-version: Fixed from version 6.7" | ||
4683 | |||
4684 | CVE_STATUS[CVE-2023-52798] = "fixed-version: Fixed from version 6.7" | ||
4685 | |||
4686 | CVE_STATUS[CVE-2023-52799] = "fixed-version: Fixed from version 6.7" | ||
4687 | |||
4688 | CVE_STATUS[CVE-2023-52800] = "fixed-version: Fixed from version 6.7" | ||
4689 | |||
4690 | CVE_STATUS[CVE-2023-52801] = "fixed-version: Fixed from version 6.7" | ||
4691 | |||
4692 | CVE_STATUS[CVE-2023-52803] = "fixed-version: Fixed from version 6.7" | ||
4693 | |||
4694 | CVE_STATUS[CVE-2023-52804] = "fixed-version: Fixed from version 6.7" | ||
4695 | |||
4696 | CVE_STATUS[CVE-2023-52805] = "fixed-version: Fixed from version 6.7" | ||
4697 | |||
4698 | CVE_STATUS[CVE-2023-52806] = "fixed-version: Fixed from version 6.7" | ||
4699 | |||
4700 | CVE_STATUS[CVE-2023-52807] = "fixed-version: Fixed from version 6.7" | ||
4701 | |||
4702 | CVE_STATUS[CVE-2023-52808] = "fixed-version: Fixed from version 6.7" | ||
4703 | |||
4704 | CVE_STATUS[CVE-2023-52809] = "fixed-version: Fixed from version 6.7" | ||
4705 | |||
4706 | CVE_STATUS[CVE-2023-52810] = "fixed-version: Fixed from version 6.7" | ||
4707 | |||
4708 | CVE_STATUS[CVE-2023-52811] = "fixed-version: Fixed from version 6.7" | ||
4709 | |||
4710 | CVE_STATUS[CVE-2023-52812] = "fixed-version: Fixed from version 6.7" | ||
4711 | |||
4712 | CVE_STATUS[CVE-2023-52813] = "fixed-version: Fixed from version 6.7" | ||
4713 | |||
4714 | CVE_STATUS[CVE-2023-52814] = "fixed-version: Fixed from version 6.7" | ||
4715 | |||
4716 | CVE_STATUS[CVE-2023-52815] = "fixed-version: Fixed from version 6.7" | ||
4717 | |||
4718 | CVE_STATUS[CVE-2023-52816] = "fixed-version: Fixed from version 6.7" | ||
4719 | |||
4720 | CVE_STATUS[CVE-2023-52817] = "fixed-version: Fixed from version 6.7" | ||
4721 | |||
4722 | CVE_STATUS[CVE-2023-52818] = "fixed-version: Fixed from version 6.7" | ||
4723 | |||
4724 | CVE_STATUS[CVE-2023-52819] = "fixed-version: Fixed from version 6.7" | ||
4725 | |||
4726 | CVE_STATUS[CVE-2023-52821] = "fixed-version: Fixed from version 6.7" | ||
4727 | |||
4728 | CVE_STATUS[CVE-2023-52825] = "fixed-version: Fixed from version 6.7" | ||
4729 | |||
4730 | CVE_STATUS[CVE-2023-52826] = "fixed-version: Fixed from version 6.7" | ||
4731 | |||
4732 | CVE_STATUS[CVE-2023-52827] = "fixed-version: Fixed from version 6.7" | ||
4733 | |||
4734 | CVE_STATUS[CVE-2023-52828] = "fixed-version: Fixed from version 6.7" | ||
4735 | |||
4736 | CVE_STATUS[CVE-2023-52829] = "fixed-version: Fixed from version 6.7" | ||
4737 | |||
4738 | CVE_STATUS[CVE-2023-52831] = "fixed-version: Fixed from version 6.7" | ||
4739 | |||
4740 | CVE_STATUS[CVE-2023-52832] = "fixed-version: Fixed from version 6.7" | ||
4741 | |||
4742 | CVE_STATUS[CVE-2023-52833] = "fixed-version: Fixed from version 6.7" | ||
4743 | |||
4744 | CVE_STATUS[CVE-2023-52834] = "fixed-version: Fixed from version 6.7" | ||
4745 | |||
4746 | CVE_STATUS[CVE-2023-52835] = "fixed-version: Fixed from version 6.7" | ||
4747 | |||
4748 | CVE_STATUS[CVE-2023-52836] = "fixed-version: Fixed from version 6.7" | ||
4749 | |||
4750 | CVE_STATUS[CVE-2023-52837] = "fixed-version: Fixed from version 6.7" | ||
4751 | |||
4752 | CVE_STATUS[CVE-2023-52838] = "fixed-version: Fixed from version 6.7" | ||
4753 | |||
4754 | CVE_STATUS[CVE-2023-52839] = "fixed-version: Fixed from version 6.7" | ||
4755 | |||
4756 | CVE_STATUS[CVE-2023-52840] = "fixed-version: Fixed from version 6.7" | ||
4757 | |||
4758 | CVE_STATUS[CVE-2023-52841] = "fixed-version: Fixed from version 6.7" | ||
4759 | |||
4760 | CVE_STATUS[CVE-2023-52842] = "fixed-version: Fixed from version 6.7" | ||
4761 | |||
4762 | CVE_STATUS[CVE-2023-52843] = "fixed-version: Fixed from version 6.7" | ||
4763 | |||
4764 | CVE_STATUS[CVE-2023-52844] = "fixed-version: Fixed from version 6.7" | ||
4765 | |||
4766 | CVE_STATUS[CVE-2023-52845] = "fixed-version: Fixed from version 6.7" | ||
4767 | |||
4768 | CVE_STATUS[CVE-2023-52846] = "fixed-version: Fixed from version 6.7" | ||
4769 | |||
4770 | CVE_STATUS[CVE-2023-52847] = "fixed-version: Fixed from version 6.7" | ||
4771 | |||
4772 | CVE_STATUS[CVE-2023-52848] = "fixed-version: Fixed from version 6.7" | ||
4773 | |||
4774 | CVE_STATUS[CVE-2023-52849] = "fixed-version: Fixed from version 6.7" | ||
4775 | |||
4776 | CVE_STATUS[CVE-2023-52850] = "fixed-version: Fixed from version 6.7" | ||
4777 | |||
4778 | CVE_STATUS[CVE-2023-52851] = "fixed-version: Fixed from version 6.7" | ||
4779 | |||
4780 | CVE_STATUS[CVE-2023-52852] = "fixed-version: Fixed from version 6.7" | ||
4781 | |||
4782 | CVE_STATUS[CVE-2023-52853] = "fixed-version: Fixed from version 6.7" | ||
4783 | |||
4784 | CVE_STATUS[CVE-2023-52854] = "fixed-version: Fixed from version 6.7" | ||
4785 | |||
4786 | CVE_STATUS[CVE-2023-52855] = "fixed-version: Fixed from version 6.7" | ||
4787 | |||
4788 | CVE_STATUS[CVE-2023-52856] = "fixed-version: Fixed from version 6.7" | ||
4789 | |||
4790 | CVE_STATUS[CVE-2023-52857] = "fixed-version: Fixed from version 6.7" | ||
4791 | |||
4792 | CVE_STATUS[CVE-2023-52858] = "fixed-version: Fixed from version 6.7" | ||
4793 | |||
4794 | CVE_STATUS[CVE-2023-52859] = "fixed-version: Fixed from version 6.7" | ||
4795 | |||
4796 | CVE_STATUS[CVE-2023-52860] = "fixed-version: Fixed from version 6.7" | ||
4797 | |||
4798 | CVE_STATUS[CVE-2023-52861] = "fixed-version: Fixed from version 6.7" | ||
4799 | |||
4800 | CVE_STATUS[CVE-2023-52862] = "fixed-version: Fixed from version 6.7" | ||
4801 | |||
4802 | CVE_STATUS[CVE-2023-52863] = "fixed-version: Fixed from version 6.7" | ||
4803 | |||
4804 | CVE_STATUS[CVE-2023-52864] = "fixed-version: Fixed from version 6.7" | ||
4805 | |||
4806 | CVE_STATUS[CVE-2023-52865] = "fixed-version: Fixed from version 6.7" | ||
4807 | |||
4808 | CVE_STATUS[CVE-2023-52866] = "fixed-version: Fixed from version 6.7" | ||
4809 | |||
4810 | CVE_STATUS[CVE-2023-52867] = "fixed-version: Fixed from version 6.7" | ||
4811 | |||
4812 | CVE_STATUS[CVE-2023-52868] = "fixed-version: Fixed from version 6.7" | ||
4813 | |||
4814 | CVE_STATUS[CVE-2023-52869] = "fixed-version: Fixed from version 6.7" | ||
4815 | |||
4816 | CVE_STATUS[CVE-2023-52870] = "fixed-version: Fixed from version 6.7" | ||
4817 | |||
4818 | CVE_STATUS[CVE-2023-52871] = "fixed-version: Fixed from version 6.7" | ||
4819 | |||
4820 | CVE_STATUS[CVE-2023-52872] = "fixed-version: Fixed from version 6.7" | ||
4821 | |||
4822 | CVE_STATUS[CVE-2023-52873] = "fixed-version: Fixed from version 6.7" | ||
4823 | |||
4824 | CVE_STATUS[CVE-2023-52874] = "fixed-version: Fixed from version 6.7" | ||
4825 | |||
4826 | CVE_STATUS[CVE-2023-52875] = "fixed-version: Fixed from version 6.7" | ||
4827 | |||
4828 | CVE_STATUS[CVE-2023-52876] = "fixed-version: Fixed from version 6.7" | ||
4829 | |||
4830 | CVE_STATUS[CVE-2023-52877] = "fixed-version: Fixed from version 6.7" | ||
4831 | |||
4832 | CVE_STATUS[CVE-2023-52878] = "fixed-version: Fixed from version 6.7" | ||
4833 | |||
4834 | CVE_STATUS[CVE-2023-52879] = "fixed-version: Fixed from version 6.7" | ||
4835 | |||
4836 | CVE_STATUS[CVE-2023-52880] = "fixed-version: Fixed from version 6.6" | ||
4837 | |||
4838 | CVE_STATUS[CVE-2023-52881] = "fixed-version: Fixed from version 6.7" | ||
4839 | |||
4840 | CVE_STATUS[CVE-2023-52882] = "fixed-version: Fixed from version 6.9" | ||
4841 | |||
4842 | CVE_STATUS[CVE-2023-52883] = "fixed-version: Fixed from version 6.6" | ||
4843 | |||
4844 | CVE_STATUS[CVE-2023-52884] = "fixed-version: Fixed from version 6.10" | ||
4845 | |||
4846 | CVE_STATUS[CVE-2023-52885] = "fixed-version: Fixed from version 6.5" | ||
4847 | |||
4848 | CVE_STATUS[CVE-2023-52886] = "fixed-version: Fixed from version 6.6" | ||
4849 | |||
4850 | CVE_STATUS[CVE-2023-52887] = "fixed-version: Fixed from version 6.10" | ||
4851 | |||
4852 | CVE_STATUS[CVE-2023-52888] = "fixed-version: Fixed from version 6.10" | ||
4853 | |||
4854 | CVE_STATUS[CVE-2023-52889] = "fixed-version: Fixed from version 6.11" | ||
4855 | |||
4856 | CVE_STATUS[CVE-2023-52893] = "fixed-version: Fixed from version 6.2" | ||
4857 | |||
4858 | CVE_STATUS[CVE-2023-52894] = "fixed-version: Fixed from version 6.2" | ||
4859 | |||
4860 | CVE_STATUS[CVE-2023-52895] = "fixed-version: Fixed from version 6.1.8" | ||
4861 | |||
4862 | CVE_STATUS[CVE-2023-52896] = "fixed-version: Fixed from version 6.2" | ||
4863 | |||
4864 | CVE_STATUS[CVE-2023-52897] = "fixed-version: Fixed from version 6.2" | ||
4865 | |||
4866 | CVE_STATUS[CVE-2023-52898] = "fixed-version: Fixed from version 6.2" | ||
4867 | |||
4868 | CVE_STATUS[CVE-2023-52899] = "fixed-version: Fixed from version 6.2" | ||
4869 | |||
4870 | CVE_STATUS[CVE-2023-52900] = "fixed-version: Fixed from version 6.2" | ||
4871 | |||
4872 | CVE_STATUS[CVE-2023-52901] = "fixed-version: Fixed from version 6.2" | ||
4873 | |||
4874 | CVE_STATUS[CVE-2023-52902] = "fixed-version: Fixed from version 6.2" | ||
4875 | |||
4876 | CVE_STATUS[CVE-2023-52903] = "fixed-version: Fixed from version 6.2" | ||
4877 | |||
4878 | CVE_STATUS[CVE-2023-52904] = "fixed-version: Fixed from version 5.15.168" | ||
4879 | |||
4880 | CVE_STATUS[CVE-2023-52905] = "fixed-version: Fixed from version 6.2" | ||
4881 | |||
4882 | CVE_STATUS[CVE-2023-52906] = "fixed-version: Fixed from version 6.2" | ||
4883 | |||
4884 | CVE_STATUS[CVE-2023-52907] = "fixed-version: Fixed from version 6.2" | ||
4885 | |||
4886 | CVE_STATUS[CVE-2023-52908] = "fixed-version: Fixed from version 6.1.7" | ||
4887 | |||
4888 | CVE_STATUS[CVE-2023-52909] = "fixed-version: Fixed from version 6.2" | ||
4889 | |||
4890 | CVE_STATUS[CVE-2023-52910] = "fixed-version: Fixed from version 6.2" | ||
4891 | |||
4892 | CVE_STATUS[CVE-2023-52911] = "fixed-version: Fixed from version 6.2" | ||
4893 | |||
4894 | CVE_STATUS[CVE-2023-52912] = "fixed-version: Fixed from version 6.2" | ||
4895 | |||
4896 | CVE_STATUS[CVE-2023-52913] = "fixed-version: Fixed from version 6.2" | ||
4897 | |||
4898 | CVE_STATUS[CVE-2023-52914] = "fixed-version: Fixed from version 6.2" | ||
4899 | |||
4900 | CVE_STATUS[CVE-2023-52915] = "fixed-version: Fixed from version 6.6" | ||
4901 | |||
4902 | CVE_STATUS[CVE-2023-52916] = "fixed-version: Fixed from version 6.6" | ||
4903 | |||
4904 | CVE_STATUS[CVE-2023-52918] = "fixed-version: Fixed from version 6.9" | ||
4905 | |||
4906 | CVE_STATUS[CVE-2023-52919] = "fixed-version: Fixed from version 6.6" | ||
4907 | |||
4908 | CVE_STATUS[CVE-2023-52920] = "fixed-version: Fixed from version 6.8" | ||
4909 | |||
4910 | CVE_STATUS[CVE-2023-52921] = "fixed-version: Fixed from version 6.5" | ||
4911 | |||
4912 | CVE_STATUS[CVE-2023-52922] = "fixed-version: Fixed from version 6.5" | ||
4913 | |||
4914 | CVE_STATUS[CVE-2023-52923] = "fixed-version: Fixed from version 6.5" | ||
4915 | |||
4916 | CVE_STATUS[CVE-2023-52924] = "fixed-version: Fixed from version 6.5" | ||
4917 | |||
4918 | CVE_STATUS[CVE-2023-52925] = "fixed-version: Fixed from version 6.4.12" | ||
4919 | |||
4920 | CVE_STATUS[CVE-2023-52926] = "fixed-version: Fixed from version 6.7" | ||
4921 | |||
4922 | CVE_STATUS[CVE-2023-52927] = "fixed-version: Fixed from version 6.6" | ||
4923 | |||
4924 | CVE_STATUS[CVE-2023-52928] = "fixed-version: Fixed from version 6.2" | ||
4925 | |||
4926 | CVE_STATUS[CVE-2023-52929] = "fixed-version: Fixed from version 6.2" | ||
4927 | |||
4928 | CVE_STATUS[CVE-2023-52930] = "fixed-version: Fixed from version 6.2" | ||
4929 | |||
4930 | CVE_STATUS[CVE-2023-52931] = "fixed-version: Fixed from version 6.2" | ||
4931 | |||
4932 | CVE_STATUS[CVE-2023-52932] = "fixed-version: Fixed from version 6.2" | ||
4933 | |||
4934 | CVE_STATUS[CVE-2023-52933] = "fixed-version: Fixed from version 6.2" | ||
4935 | |||
4936 | CVE_STATUS[CVE-2023-52934] = "fixed-version: Fixed from version 6.2" | ||
4937 | |||
4938 | CVE_STATUS[CVE-2023-52935] = "fixed-version: Fixed from version 6.2" | ||
4939 | |||
4940 | CVE_STATUS[CVE-2023-52936] = "fixed-version: Fixed from version 6.2" | ||
4941 | |||
4942 | CVE_STATUS[CVE-2023-52937] = "fixed-version: Fixed from version 6.2" | ||
4943 | |||
4944 | CVE_STATUS[CVE-2023-52938] = "fixed-version: Fixed from version 6.1.11" | ||
4945 | |||
4946 | CVE_STATUS[CVE-2023-52939] = "fixed-version: Fixed from version 6.2" | ||
4947 | |||
4948 | CVE_STATUS[CVE-2023-52940] = "fixed-version: Fixed from version 6.2" | ||
4949 | |||
4950 | CVE_STATUS[CVE-2023-52941] = "fixed-version: Fixed from version 6.2" | ||
4951 | |||
4952 | CVE_STATUS[CVE-2023-52942] = "fixed-version: Fixed from version 6.2" | ||
4953 | |||
4954 | CVE_STATUS[CVE-2023-52973] = "fixed-version: Fixed from version 6.2" | ||
4955 | |||
4956 | CVE_STATUS[CVE-2023-52974] = "fixed-version: Fixed from version 6.2" | ||
4957 | |||
4958 | CVE_STATUS[CVE-2023-52975] = "fixed-version: Fixed from version 6.2" | ||
4959 | |||
4960 | CVE_STATUS[CVE-2023-52976] = "fixed-version: Fixed from version 6.2" | ||
4961 | |||
4962 | CVE_STATUS[CVE-2023-52977] = "fixed-version: Fixed from version 6.1.11" | ||
4963 | |||
4964 | CVE_STATUS[CVE-2023-52978] = "fixed-version: Fixed from version 6.2" | ||
4965 | |||
4966 | CVE_STATUS[CVE-2023-52979] = "fixed-version: Fixed from version 6.2" | ||
4967 | |||
4968 | CVE_STATUS[CVE-2023-52980] = "fixed-version: Fixed from version 6.2" | ||
4969 | |||
4970 | CVE_STATUS[CVE-2023-52981] = "fixed-version: Fixed from version 6.2" | ||
4971 | |||
4972 | CVE_STATUS[CVE-2023-52982] = "fixed-version: Fixed from version 6.2" | ||
4973 | |||
4974 | CVE_STATUS[CVE-2023-52983] = "fixed-version: Fixed from version 6.1.11" | ||
4975 | |||
4976 | CVE_STATUS[CVE-2023-52984] = "fixed-version: Fixed from version 6.2" | ||
4977 | |||
4978 | CVE_STATUS[CVE-2023-52985] = "fixed-version: Fixed from version 6.2" | ||
4979 | |||
4980 | CVE_STATUS[CVE-2023-52986] = "fixed-version: Fixed from version 6.2" | ||
4981 | |||
4982 | CVE_STATUS[CVE-2023-52987] = "fixed-version: Fixed from version 6.2" | ||
4983 | |||
4984 | CVE_STATUS[CVE-2023-52988] = "fixed-version: Fixed from version 6.2" | ||
4985 | |||
4986 | CVE_STATUS[CVE-2023-52989] = "fixed-version: Fixed from version 6.2" | ||
4987 | |||
4988 | CVE_STATUS[CVE-2023-52991] = "fixed-version: Fixed from version 6.2" | ||
4989 | |||
4990 | CVE_STATUS[CVE-2023-52992] = "fixed-version: Fixed from version 6.2" | ||
4991 | |||
4992 | CVE_STATUS[CVE-2023-52993] = "fixed-version: Fixed from version 6.2" | ||
4993 | |||
4994 | CVE_STATUS[CVE-2023-52994] = "fixed-version: Fixed from version 6.1.9" | ||
4995 | |||
4996 | CVE_STATUS[CVE-2023-52995] = "fixed-version: Fixed from version 6.2" | ||
4997 | |||
4998 | CVE_STATUS[CVE-2023-52996] = "fixed-version: Fixed from version 6.2" | ||
4999 | |||
5000 | CVE_STATUS[CVE-2023-52997] = "fixed-version: Fixed from version 6.2" | ||
5001 | |||
5002 | CVE_STATUS[CVE-2023-52998] = "fixed-version: Fixed from version 6.2" | ||
5003 | |||
5004 | CVE_STATUS[CVE-2023-52999] = "fixed-version: Fixed from version 6.2" | ||
5005 | |||
5006 | CVE_STATUS[CVE-2023-53000] = "fixed-version: Fixed from version 6.2" | ||
5007 | |||
5008 | CVE_STATUS[CVE-2023-53001] = "fixed-version: Fixed from version 6.2" | ||
5009 | |||
5010 | CVE_STATUS[CVE-2023-53002] = "fixed-version: Fixed from version 6.2" | ||
5011 | |||
5012 | CVE_STATUS[CVE-2023-53003] = "fixed-version: Fixed from version 6.2" | ||
5013 | |||
5014 | CVE_STATUS[CVE-2023-53004] = "fixed-version: Fixed from version 6.2" | ||
5015 | |||
5016 | CVE_STATUS[CVE-2023-53005] = "fixed-version: Fixed from version 6.2" | ||
5017 | |||
5018 | CVE_STATUS[CVE-2023-53006] = "fixed-version: Fixed from version 6.2" | ||
5019 | |||
5020 | CVE_STATUS[CVE-2023-53007] = "fixed-version: Fixed from version 6.2" | ||
5021 | |||
5022 | CVE_STATUS[CVE-2023-53008] = "fixed-version: Fixed from version 6.2" | ||
5023 | |||
5024 | CVE_STATUS[CVE-2023-53009] = "fixed-version: Fixed from version 6.2" | ||
5025 | |||
5026 | CVE_STATUS[CVE-2023-53010] = "fixed-version: Fixed from version 6.2" | ||
5027 | |||
5028 | CVE_STATUS[CVE-2023-53011] = "fixed-version: Fixed from version 6.2" | ||
5029 | |||
5030 | # CVE-2023-53012 has no known resolution | ||
5031 | |||
5032 | CVE_STATUS[CVE-2023-53013] = "fixed-version: Fixed from version 6.2" | ||
5033 | |||
5034 | CVE_STATUS[CVE-2023-53014] = "fixed-version: Fixed from version 6.2" | ||
5035 | |||
5036 | CVE_STATUS[CVE-2023-53015] = "fixed-version: Fixed from version 6.2" | ||
5037 | |||
5038 | CVE_STATUS[CVE-2023-53016] = "fixed-version: Fixed from version 6.2" | ||
5039 | |||
5040 | CVE_STATUS[CVE-2023-53017] = "fixed-version: Fixed from version 6.2" | ||
5041 | |||
5042 | CVE_STATUS[CVE-2023-53018] = "fixed-version: Fixed from version 6.2" | ||
5043 | |||
5044 | CVE_STATUS[CVE-2023-53019] = "fixed-version: Fixed from version 6.2" | ||
5045 | |||
5046 | CVE_STATUS[CVE-2023-53020] = "fixed-version: Fixed from version 6.2" | ||
5047 | |||
5048 | CVE_STATUS[CVE-2023-53021] = "fixed-version: Fixed from version 6.2" | ||
5049 | |||
5050 | CVE_STATUS[CVE-2023-53022] = "fixed-version: Fixed from version 6.2" | ||
5051 | |||
5052 | CVE_STATUS[CVE-2023-53023] = "fixed-version: Fixed from version 6.2" | ||
5053 | |||
5054 | CVE_STATUS[CVE-2023-53024] = "fixed-version: Fixed from version 6.2" | ||
5055 | |||
5056 | CVE_STATUS[CVE-2023-53026] = "fixed-version: Fixed from version 6.2" | ||
5057 | |||
5058 | CVE_STATUS[CVE-2023-53028] = "fixed-version: Fixed from version 6.1.8" | ||
5059 | |||
5060 | CVE_STATUS[CVE-2023-53029] = "fixed-version: Fixed from version 6.1.8" | ||
5061 | |||
5062 | CVE_STATUS[CVE-2023-53030] = "fixed-version: Fixed from version 6.1.8" | ||
5063 | |||
5064 | CVE_STATUS[CVE-2023-53031] = "fixed-version: Fixed from version 6.2" | ||
5065 | |||
5066 | CVE_STATUS[CVE-2023-53032] = "fixed-version: Fixed from version 6.2" | ||
5067 | |||
5068 | CVE_STATUS[CVE-2023-53033] = "fixed-version: Fixed from version 6.2" | ||
5069 | |||
5070 | CVE_STATUS[CVE-2023-53034] = "cpe-stable-backport: Backported in 6.12.23" | ||
5071 | |||
5072 | CVE_STATUS[CVE-2023-53035] = "fixed-version: Fixed from version 6.3" | ||
5073 | |||
5074 | CVE_STATUS[CVE-2023-53036] = "fixed-version: Fixed from version 6.3" | ||
5075 | |||
5076 | CVE_STATUS[CVE-2023-53037] = "fixed-version: Fixed from version 6.3" | ||
5077 | |||
5078 | CVE_STATUS[CVE-2023-53038] = "fixed-version: Fixed from version 6.3" | ||
5079 | |||
5080 | CVE_STATUS[CVE-2023-53039] = "fixed-version: Fixed from version 6.3" | ||
5081 | |||
5082 | CVE_STATUS[CVE-2023-53040] = "fixed-version: Fixed from version 6.3" | ||
5083 | |||
5084 | CVE_STATUS[CVE-2023-53041] = "fixed-version: Fixed from version 6.3" | ||
5085 | |||
5086 | CVE_STATUS[CVE-2023-53042] = "fixed-version: Fixed from version 6.3" | ||
5087 | |||
5088 | CVE_STATUS[CVE-2023-53043] = "fixed-version: Fixed from version 6.3" | ||
5089 | |||
5090 | CVE_STATUS[CVE-2023-53044] = "fixed-version: Fixed from version 6.3" | ||
5091 | |||
5092 | CVE_STATUS[CVE-2023-53045] = "fixed-version: Fixed from version 6.3" | ||
5093 | |||
5094 | CVE_STATUS[CVE-2023-53046] = "fixed-version: Fixed from version 6.3" | ||
5095 | |||
5096 | CVE_STATUS[CVE-2023-53047] = "fixed-version: Fixed from version 6.3" | ||
5097 | |||
5098 | CVE_STATUS[CVE-2023-53048] = "fixed-version: Fixed from version 6.3" | ||
5099 | |||
5100 | CVE_STATUS[CVE-2023-53049] = "fixed-version: Fixed from version 6.3" | ||
5101 | |||
5102 | CVE_STATUS[CVE-2023-53050] = "fixed-version: Fixed from version 6.3" | ||
5103 | |||
5104 | CVE_STATUS[CVE-2023-53051] = "fixed-version: Fixed from version 6.3" | ||
5105 | |||
5106 | CVE_STATUS[CVE-2023-53052] = "fixed-version: Fixed from version 6.3" | ||
5107 | |||
5108 | CVE_STATUS[CVE-2023-53053] = "fixed-version: Fixed from version 6.3" | ||
5109 | |||
5110 | CVE_STATUS[CVE-2023-53054] = "fixed-version: Fixed from version 6.3" | ||
5111 | |||
5112 | CVE_STATUS[CVE-2023-53055] = "fixed-version: Fixed from version 6.3" | ||
5113 | |||
5114 | CVE_STATUS[CVE-2023-53056] = "fixed-version: Fixed from version 6.2.9" | ||
5115 | |||
5116 | CVE_STATUS[CVE-2023-53057] = "fixed-version: Fixed from version 6.3" | ||
5117 | |||
5118 | CVE_STATUS[CVE-2023-53058] = "fixed-version: Fixed from version 6.3" | ||
5119 | |||
5120 | CVE_STATUS[CVE-2023-53059] = "fixed-version: Fixed from version 6.3" | ||
5121 | |||
5122 | CVE_STATUS[CVE-2023-53060] = "fixed-version: Fixed from version 6.3" | ||
5123 | |||
5124 | CVE_STATUS[CVE-2023-53061] = "fixed-version: Fixed from version 6.3" | ||
5125 | |||
5126 | CVE_STATUS[CVE-2023-53062] = "fixed-version: Fixed from version 6.3" | ||
5127 | |||
5128 | CVE_STATUS[CVE-2023-53064] = "fixed-version: Fixed from version 6.3" | ||
5129 | |||
5130 | CVE_STATUS[CVE-2023-53065] = "fixed-version: Fixed from version 6.3" | ||
5131 | |||
5132 | CVE_STATUS[CVE-2023-53066] = "fixed-version: Fixed from version 6.3" | ||
5133 | |||
5134 | CVE_STATUS[CVE-2023-53067] = "fixed-version: Fixed from version 6.3" | ||
5135 | |||
5136 | CVE_STATUS[CVE-2023-53068] = "fixed-version: Fixed from version 6.3" | ||
5137 | |||
5138 | CVE_STATUS[CVE-2023-53069] = "fixed-version: Fixed from version 6.3" | ||
5139 | |||
5140 | CVE_STATUS[CVE-2023-53070] = "fixed-version: Fixed from version 6.3" | ||
5141 | |||
5142 | CVE_STATUS[CVE-2023-53071] = "fixed-version: Fixed from version 6.3" | ||
5143 | |||
5144 | CVE_STATUS[CVE-2023-53072] = "fixed-version: Fixed from version 6.3" | ||
5145 | |||
5146 | CVE_STATUS[CVE-2023-53073] = "fixed-version: Fixed from version 6.3" | ||
5147 | |||
5148 | CVE_STATUS[CVE-2023-53074] = "fixed-version: Fixed from version 6.3" | ||
5149 | |||
5150 | CVE_STATUS[CVE-2023-53075] = "fixed-version: Fixed from version 6.3" | ||
5151 | |||
5152 | CVE_STATUS[CVE-2023-53077] = "fixed-version: Fixed from version 6.3" | ||
5153 | |||
5154 | CVE_STATUS[CVE-2023-53078] = "fixed-version: Fixed from version 6.3" | ||
5155 | |||
5156 | CVE_STATUS[CVE-2023-53079] = "fixed-version: Fixed from version 6.3" | ||
5157 | |||
5158 | CVE_STATUS[CVE-2023-53080] = "fixed-version: Fixed from version 6.3" | ||
5159 | |||
5160 | CVE_STATUS[CVE-2023-53081] = "fixed-version: Fixed from version 6.3" | ||
5161 | |||
5162 | CVE_STATUS[CVE-2023-53082] = "fixed-version: Fixed from version 6.3" | ||
5163 | |||
5164 | CVE_STATUS[CVE-2023-53083] = "fixed-version: Fixed from version 6.3" | ||
5165 | |||
5166 | CVE_STATUS[CVE-2023-53084] = "fixed-version: Fixed from version 6.3" | ||
5167 | |||
5168 | CVE_STATUS[CVE-2023-53085] = "fixed-version: Fixed from version 6.3" | ||
5169 | |||
5170 | CVE_STATUS[CVE-2023-53086] = "fixed-version: Fixed from version 6.3" | ||
5171 | |||
5172 | CVE_STATUS[CVE-2023-53087] = "fixed-version: Fixed from version 6.3" | ||
5173 | |||
5174 | CVE_STATUS[CVE-2023-53088] = "fixed-version: Fixed from version 6.3" | ||
5175 | |||
5176 | CVE_STATUS[CVE-2023-53089] = "fixed-version: Fixed from version 6.3" | ||
5177 | |||
5178 | CVE_STATUS[CVE-2023-53090] = "fixed-version: Fixed from version 6.3" | ||
5179 | |||
5180 | CVE_STATUS[CVE-2023-53091] = "fixed-version: Fixed from version 6.3" | ||
5181 | |||
5182 | CVE_STATUS[CVE-2023-53092] = "fixed-version: Fixed from version 6.3" | ||
5183 | |||
5184 | CVE_STATUS[CVE-2023-53093] = "fixed-version: Fixed from version 6.3" | ||
5185 | |||
5186 | CVE_STATUS[CVE-2023-53094] = "fixed-version: Fixed from version 6.3" | ||
5187 | |||
5188 | CVE_STATUS[CVE-2023-53095] = "fixed-version: Fixed from version 6.3" | ||
5189 | |||
5190 | CVE_STATUS[CVE-2023-53096] = "fixed-version: Fixed from version 6.3" | ||
5191 | |||
5192 | CVE_STATUS[CVE-2023-53097] = "fixed-version: Fixed from version 6.3" | ||
5193 | |||
5194 | CVE_STATUS[CVE-2023-53098] = "fixed-version: Fixed from version 6.3" | ||
5195 | |||
5196 | CVE_STATUS[CVE-2023-53099] = "fixed-version: Fixed from version 6.3" | ||
5197 | |||
5198 | CVE_STATUS[CVE-2023-53100] = "fixed-version: Fixed from version 6.3" | ||
5199 | |||
5200 | CVE_STATUS[CVE-2023-53101] = "fixed-version: Fixed from version 6.3" | ||
5201 | |||
5202 | CVE_STATUS[CVE-2023-53102] = "fixed-version: Fixed from version 6.3" | ||
5203 | |||
5204 | CVE_STATUS[CVE-2023-53103] = "fixed-version: Fixed from version 6.3" | ||
5205 | |||
5206 | CVE_STATUS[CVE-2023-53105] = "fixed-version: Fixed from version 6.3" | ||
5207 | |||
5208 | CVE_STATUS[CVE-2023-53106] = "fixed-version: Fixed from version 6.3" | ||
5209 | |||
5210 | CVE_STATUS[CVE-2023-53107] = "fixed-version: Fixed from version 6.3" | ||
5211 | |||
5212 | CVE_STATUS[CVE-2023-53108] = "fixed-version: Fixed from version 6.3" | ||
5213 | |||
5214 | CVE_STATUS[CVE-2023-53109] = "fixed-version: Fixed from version 6.3" | ||
5215 | |||
5216 | CVE_STATUS[CVE-2023-53110] = "fixed-version: Fixed from version 6.3" | ||
5217 | |||
5218 | CVE_STATUS[CVE-2023-53111] = "fixed-version: Fixed from version 6.3" | ||
5219 | |||
5220 | CVE_STATUS[CVE-2023-53112] = "fixed-version: Fixed from version 6.3" | ||
5221 | |||
5222 | CVE_STATUS[CVE-2023-53113] = "fixed-version: Fixed from version 6.3" | ||
5223 | |||
5224 | CVE_STATUS[CVE-2023-53114] = "fixed-version: Fixed from version 6.3" | ||
5225 | |||
5226 | CVE_STATUS[CVE-2023-53115] = "fixed-version: Fixed from version 6.3" | ||
5227 | |||
5228 | CVE_STATUS[CVE-2023-53116] = "fixed-version: Fixed from version 6.3" | ||
5229 | |||
5230 | CVE_STATUS[CVE-2023-53117] = "fixed-version: Fixed from version 6.3" | ||
5231 | |||
5232 | CVE_STATUS[CVE-2023-53118] = "fixed-version: Fixed from version 6.2.8" | ||
5233 | |||
5234 | CVE_STATUS[CVE-2023-53119] = "fixed-version: Fixed from version 6.3" | ||
5235 | |||
5236 | CVE_STATUS[CVE-2023-53120] = "fixed-version: Fixed from version 6.3" | ||
5237 | |||
5238 | CVE_STATUS[CVE-2023-53121] = "fixed-version: Fixed from version 6.3" | ||
5239 | |||
5240 | CVE_STATUS[CVE-2023-53123] = "fixed-version: Fixed from version 6.3" | ||
5241 | |||
5242 | CVE_STATUS[CVE-2023-53124] = "fixed-version: Fixed from version 6.3" | ||
5243 | |||
5244 | CVE_STATUS[CVE-2023-53125] = "fixed-version: Fixed from version 6.3" | ||
5245 | |||
5246 | CVE_STATUS[CVE-2023-53126] = "fixed-version: Fixed from version 6.3" | ||
5247 | |||
5248 | CVE_STATUS[CVE-2023-53127] = "fixed-version: Fixed from version 6.3" | ||
5249 | |||
5250 | CVE_STATUS[CVE-2023-53128] = "fixed-version: Fixed from version 6.3" | ||
5251 | |||
5252 | CVE_STATUS[CVE-2023-53131] = "fixed-version: Fixed from version 6.3" | ||
5253 | |||
5254 | CVE_STATUS[CVE-2023-53132] = "fixed-version: Fixed from version 6.3" | ||
5255 | |||
5256 | CVE_STATUS[CVE-2023-53133] = "fixed-version: Fixed from version 6.3" | ||
5257 | |||
5258 | CVE_STATUS[CVE-2023-53134] = "fixed-version: Fixed from version 6.3" | ||
5259 | |||
5260 | CVE_STATUS[CVE-2023-53135] = "fixed-version: Fixed from version 6.3" | ||
5261 | |||
5262 | CVE_STATUS[CVE-2023-53136] = "fixed-version: Fixed from version 6.3" | ||
5263 | |||
5264 | CVE_STATUS[CVE-2023-53137] = "fixed-version: Fixed from version 6.3" | ||
5265 | |||
5266 | CVE_STATUS[CVE-2023-53138] = "fixed-version: Fixed from version 6.3" | ||
5267 | |||
5268 | CVE_STATUS[CVE-2023-53139] = "fixed-version: Fixed from version 6.3" | ||
5269 | |||
5270 | CVE_STATUS[CVE-2023-53140] = "fixed-version: Fixed from version 6.3" | ||
5271 | |||
5272 | CVE_STATUS[CVE-2023-53141] = "fixed-version: Fixed from version 6.3" | ||
5273 | |||
5274 | CVE_STATUS[CVE-2023-53142] = "fixed-version: Fixed from version 6.3" | ||
5275 | |||
5276 | CVE_STATUS[CVE-2023-53143] = "fixed-version: Fixed from version 6.3" | ||
5277 | |||
5278 | CVE_STATUS[CVE-2023-53144] = "fixed-version: Fixed from version 6.3" | ||
5279 | |||
5280 | CVE_STATUS[CVE-2023-53145] = "fixed-version: Fixed from version 6.3" | ||
5281 | |||
5282 | CVE_STATUS[CVE-2023-53146] = "fixed-version: Fixed from version 6.6" | ||
5283 | |||
5284 | CVE_STATUS[CVE-2024-26581] = "fixed-version: Fixed from version 6.8" | ||
5285 | |||
5286 | CVE_STATUS[CVE-2024-26582] = "fixed-version: Fixed from version 6.8" | ||
5287 | |||
5288 | CVE_STATUS[CVE-2024-26583] = "fixed-version: Fixed from version 6.8" | ||
5289 | |||
5290 | CVE_STATUS[CVE-2024-26584] = "fixed-version: Fixed from version 6.8" | ||
5291 | |||
5292 | CVE_STATUS[CVE-2024-26585] = "fixed-version: Fixed from version 6.8" | ||
5293 | |||
5294 | CVE_STATUS[CVE-2024-26586] = "fixed-version: Fixed from version 6.8" | ||
5295 | |||
5296 | CVE_STATUS[CVE-2024-26587] = "fixed-version: Fixed from version 6.8" | ||
5297 | |||
5298 | CVE_STATUS[CVE-2024-26588] = "fixed-version: Fixed from version 6.8" | ||
5299 | |||
5300 | CVE_STATUS[CVE-2024-26589] = "fixed-version: Fixed from version 6.8" | ||
5301 | |||
5302 | CVE_STATUS[CVE-2024-26590] = "fixed-version: Fixed from version 6.8" | ||
5303 | |||
5304 | CVE_STATUS[CVE-2024-26591] = "fixed-version: Fixed from version 6.8" | ||
5305 | |||
5306 | CVE_STATUS[CVE-2024-26592] = "fixed-version: Fixed from version 6.8" | ||
5307 | |||
5308 | CVE_STATUS[CVE-2024-26593] = "fixed-version: Fixed from version 6.8" | ||
5309 | |||
5310 | CVE_STATUS[CVE-2024-26594] = "fixed-version: Fixed from version 6.8" | ||
5311 | |||
5312 | CVE_STATUS[CVE-2024-26595] = "fixed-version: Fixed from version 6.8" | ||
5313 | |||
5314 | CVE_STATUS[CVE-2024-26596] = "fixed-version: Fixed from version 6.8" | ||
5315 | |||
5316 | CVE_STATUS[CVE-2024-26597] = "fixed-version: Fixed from version 6.8" | ||
5317 | |||
5318 | CVE_STATUS[CVE-2024-26598] = "fixed-version: Fixed from version 6.8" | ||
5319 | |||
5320 | CVE_STATUS[CVE-2024-26599] = "fixed-version: Fixed from version 6.8" | ||
5321 | |||
5322 | CVE_STATUS[CVE-2024-26600] = "fixed-version: Fixed from version 6.8" | ||
5323 | |||
5324 | CVE_STATUS[CVE-2024-26601] = "fixed-version: Fixed from version 6.8" | ||
5325 | |||
5326 | CVE_STATUS[CVE-2024-26602] = "fixed-version: Fixed from version 6.8" | ||
5327 | |||
5328 | CVE_STATUS[CVE-2024-26603] = "fixed-version: Fixed from version 6.8" | ||
5329 | |||
5330 | CVE_STATUS[CVE-2024-26604] = "fixed-version: Fixed from version 6.8" | ||
5331 | |||
5332 | CVE_STATUS[CVE-2024-26605] = "fixed-version: Fixed from version 6.8" | ||
5333 | |||
5334 | CVE_STATUS[CVE-2024-26606] = "fixed-version: Fixed from version 6.8" | ||
5335 | |||
5336 | CVE_STATUS[CVE-2024-26607] = "fixed-version: Fixed from version 6.8" | ||
5337 | |||
5338 | CVE_STATUS[CVE-2024-26608] = "fixed-version: Fixed from version 6.8" | ||
5339 | |||
5340 | CVE_STATUS[CVE-2024-26610] = "fixed-version: Fixed from version 6.8" | ||
5341 | |||
5342 | CVE_STATUS[CVE-2024-26611] = "fixed-version: Fixed from version 6.8" | ||
5343 | |||
5344 | CVE_STATUS[CVE-2024-26612] = "fixed-version: Fixed from version 6.8" | ||
5345 | |||
5346 | CVE_STATUS[CVE-2024-26614] = "fixed-version: Fixed from version 6.8" | ||
5347 | |||
5348 | CVE_STATUS[CVE-2024-26615] = "fixed-version: Fixed from version 6.8" | ||
5349 | |||
5350 | CVE_STATUS[CVE-2024-26616] = "fixed-version: Fixed from version 6.8" | ||
5351 | |||
5352 | CVE_STATUS[CVE-2024-26617] = "fixed-version: Fixed from version 6.8" | ||
5353 | |||
5354 | CVE_STATUS[CVE-2024-26618] = "fixed-version: Fixed from version 6.8" | ||
5355 | |||
5356 | CVE_STATUS[CVE-2024-26619] = "fixed-version: Fixed from version 6.8" | ||
5357 | |||
5358 | CVE_STATUS[CVE-2024-26620] = "fixed-version: Fixed from version 6.8" | ||
5359 | |||
5360 | CVE_STATUS[CVE-2024-26621] = "fixed-version: Fixed from version 6.8" | ||
5361 | |||
5362 | CVE_STATUS[CVE-2024-26622] = "fixed-version: Fixed from version 6.8" | ||
5363 | |||
5364 | CVE_STATUS[CVE-2024-26623] = "fixed-version: Fixed from version 6.8" | ||
5365 | |||
5366 | CVE_STATUS[CVE-2024-26625] = "fixed-version: Fixed from version 6.8" | ||
5367 | |||
5368 | CVE_STATUS[CVE-2024-26626] = "fixed-version: Fixed from version 6.7.4" | ||
5369 | |||
5370 | CVE_STATUS[CVE-2024-26627] = "fixed-version: Fixed from version 6.8" | ||
5371 | |||
5372 | CVE_STATUS[CVE-2024-26629] = "fixed-version: Fixed from version 6.8" | ||
5373 | |||
5374 | CVE_STATUS[CVE-2024-26630] = "fixed-version: Fixed from version 6.8" | ||
5375 | |||
5376 | CVE_STATUS[CVE-2024-26631] = "fixed-version: Fixed from version 6.8" | ||
5377 | |||
5378 | CVE_STATUS[CVE-2024-26632] = "fixed-version: Fixed from version 6.8" | ||
5379 | |||
5380 | CVE_STATUS[CVE-2024-26633] = "fixed-version: Fixed from version 6.8" | ||
5381 | |||
5382 | CVE_STATUS[CVE-2024-26634] = "fixed-version: Fixed from version 6.8" | ||
5383 | |||
5384 | CVE_STATUS[CVE-2024-26635] = "fixed-version: Fixed from version 6.8" | ||
5385 | |||
5386 | CVE_STATUS[CVE-2024-26636] = "fixed-version: Fixed from version 6.8" | ||
5387 | |||
5388 | CVE_STATUS[CVE-2024-26637] = "fixed-version: Fixed from version 6.8" | ||
5389 | |||
5390 | CVE_STATUS[CVE-2024-26638] = "fixed-version: Fixed from version 6.8" | ||
5391 | |||
5392 | CVE_STATUS[CVE-2024-26640] = "fixed-version: Fixed from version 6.8" | ||
5393 | |||
5394 | CVE_STATUS[CVE-2024-26641] = "fixed-version: Fixed from version 6.8" | ||
5395 | |||
5396 | CVE_STATUS[CVE-2024-26642] = "fixed-version: Fixed from version 6.8" | ||
5397 | |||
5398 | CVE_STATUS[CVE-2024-26643] = "fixed-version: Fixed from version 6.8" | ||
5399 | |||
5400 | CVE_STATUS[CVE-2024-26644] = "fixed-version: Fixed from version 6.8" | ||
5401 | |||
5402 | CVE_STATUS[CVE-2024-26645] = "fixed-version: Fixed from version 6.8" | ||
5403 | |||
5404 | CVE_STATUS[CVE-2024-26646] = "fixed-version: Fixed from version 6.8" | ||
5405 | |||
5406 | CVE_STATUS[CVE-2024-26647] = "fixed-version: Fixed from version 6.8" | ||
5407 | |||
5408 | CVE_STATUS[CVE-2024-26648] = "fixed-version: Fixed from version 6.8" | ||
5409 | |||
5410 | CVE_STATUS[CVE-2024-26649] = "fixed-version: Fixed from version 6.8" | ||
5411 | |||
5412 | CVE_STATUS[CVE-2024-26651] = "fixed-version: Fixed from version 6.9" | ||
5413 | |||
5414 | CVE_STATUS[CVE-2024-26652] = "fixed-version: Fixed from version 6.8" | ||
5415 | |||
5416 | CVE_STATUS[CVE-2024-26653] = "fixed-version: Fixed from version 6.9" | ||
5417 | |||
5418 | CVE_STATUS[CVE-2024-26654] = "fixed-version: Fixed from version 6.9" | ||
5419 | |||
5420 | CVE_STATUS[CVE-2024-26655] = "fixed-version: Fixed from version 6.9" | ||
5421 | |||
5422 | CVE_STATUS[CVE-2024-26656] = "fixed-version: Fixed from version 6.9" | ||
5423 | |||
5424 | CVE_STATUS[CVE-2024-26657] = "fixed-version: Fixed from version 6.9" | ||
5425 | |||
5426 | CVE_STATUS[CVE-2024-26658] = "fixed-version: Fixed from version 6.8" | ||
5427 | |||
5428 | CVE_STATUS[CVE-2024-26659] = "fixed-version: Fixed from version 6.8" | ||
5429 | |||
5430 | CVE_STATUS[CVE-2024-26660] = "fixed-version: Fixed from version 6.8" | ||
5431 | |||
5432 | CVE_STATUS[CVE-2024-26661] = "fixed-version: Fixed from version 6.8" | ||
5433 | |||
5434 | CVE_STATUS[CVE-2024-26662] = "fixed-version: Fixed from version 6.8" | ||
5435 | |||
5436 | CVE_STATUS[CVE-2024-26663] = "fixed-version: Fixed from version 6.8" | ||
5437 | |||
5438 | CVE_STATUS[CVE-2024-26664] = "fixed-version: Fixed from version 6.8" | ||
5439 | |||
5440 | CVE_STATUS[CVE-2024-26665] = "fixed-version: Fixed from version 6.8" | ||
5441 | |||
5442 | CVE_STATUS[CVE-2024-26666] = "fixed-version: Fixed from version 6.8" | ||
5443 | |||
5444 | CVE_STATUS[CVE-2024-26667] = "fixed-version: Fixed from version 6.8" | ||
5445 | |||
5446 | CVE_STATUS[CVE-2024-26668] = "fixed-version: Fixed from version 6.8" | ||
5447 | |||
5448 | CVE_STATUS[CVE-2024-26669] = "fixed-version: Fixed from version 6.8" | ||
5449 | |||
5450 | CVE_STATUS[CVE-2024-26670] = "fixed-version: Fixed from version 6.8" | ||
5451 | |||
5452 | CVE_STATUS[CVE-2024-26671] = "fixed-version: Fixed from version 6.8" | ||
5453 | |||
5454 | CVE_STATUS[CVE-2024-26672] = "fixed-version: Fixed from version 6.8" | ||
5455 | |||
5456 | CVE_STATUS[CVE-2024-26673] = "fixed-version: Fixed from version 6.8" | ||
5457 | |||
5458 | CVE_STATUS[CVE-2024-26674] = "fixed-version: Fixed from version 6.8" | ||
5459 | |||
5460 | CVE_STATUS[CVE-2024-26675] = "fixed-version: Fixed from version 6.8" | ||
5461 | |||
5462 | CVE_STATUS[CVE-2024-26676] = "fixed-version: Fixed from version 6.8" | ||
5463 | |||
5464 | CVE_STATUS[CVE-2024-26677] = "fixed-version: Fixed from version 6.8" | ||
5465 | |||
5466 | CVE_STATUS[CVE-2024-26678] = "fixed-version: Fixed from version 6.8" | ||
5467 | |||
5468 | CVE_STATUS[CVE-2024-26679] = "fixed-version: Fixed from version 6.8" | ||
5469 | |||
5470 | CVE_STATUS[CVE-2024-26680] = "fixed-version: Fixed from version 6.8" | ||
5471 | |||
5472 | CVE_STATUS[CVE-2024-26681] = "fixed-version: Fixed from version 6.8" | ||
5473 | |||
5474 | CVE_STATUS[CVE-2024-26682] = "fixed-version: Fixed from version 6.8" | ||
5475 | |||
5476 | CVE_STATUS[CVE-2024-26683] = "fixed-version: Fixed from version 6.8" | ||
5477 | |||
5478 | CVE_STATUS[CVE-2024-26684] = "fixed-version: Fixed from version 6.8" | ||
5479 | |||
5480 | CVE_STATUS[CVE-2024-26685] = "fixed-version: Fixed from version 6.8" | ||
5481 | |||
5482 | CVE_STATUS[CVE-2024-26686] = "fixed-version: Fixed from version 6.8" | ||
5483 | |||
5484 | CVE_STATUS[CVE-2024-26687] = "fixed-version: Fixed from version 6.8" | ||
5485 | |||
5486 | CVE_STATUS[CVE-2024-26688] = "fixed-version: Fixed from version 6.8" | ||
5487 | |||
5488 | CVE_STATUS[CVE-2024-26689] = "fixed-version: Fixed from version 6.8" | ||
5489 | |||
5490 | CVE_STATUS[CVE-2024-26690] = "fixed-version: Fixed from version 6.8" | ||
5491 | |||
5492 | CVE_STATUS[CVE-2024-26691] = "fixed-version: Fixed from version 6.8" | ||
5493 | |||
5494 | CVE_STATUS[CVE-2024-26692] = "fixed-version: Fixed from version 6.8" | ||
5495 | |||
5496 | CVE_STATUS[CVE-2024-26693] = "fixed-version: Fixed from version 6.8" | ||
5497 | |||
5498 | CVE_STATUS[CVE-2024-26694] = "fixed-version: Fixed from version 6.8" | ||
5499 | |||
5500 | CVE_STATUS[CVE-2024-26695] = "fixed-version: Fixed from version 6.8" | ||
5501 | |||
5502 | CVE_STATUS[CVE-2024-26696] = "fixed-version: Fixed from version 6.8" | ||
5503 | |||
5504 | CVE_STATUS[CVE-2024-26697] = "fixed-version: Fixed from version 6.8" | ||
5505 | |||
5506 | CVE_STATUS[CVE-2024-26698] = "fixed-version: Fixed from version 6.8" | ||
5507 | |||
5508 | CVE_STATUS[CVE-2024-26699] = "fixed-version: Fixed from version 6.8" | ||
5509 | |||
5510 | CVE_STATUS[CVE-2024-26700] = "fixed-version: Fixed from version 6.8" | ||
5511 | |||
5512 | CVE_STATUS[CVE-2024-26702] = "fixed-version: Fixed from version 6.8" | ||
5513 | |||
5514 | CVE_STATUS[CVE-2024-26703] = "fixed-version: Fixed from version 6.8" | ||
5515 | |||
5516 | CVE_STATUS[CVE-2024-26704] = "fixed-version: Fixed from version 6.8" | ||
5517 | |||
5518 | CVE_STATUS[CVE-2024-26705] = "fixed-version: Fixed from version 6.8" | ||
5519 | |||
5520 | CVE_STATUS[CVE-2024-26706] = "fixed-version: Fixed from version 6.8" | ||
5521 | |||
5522 | CVE_STATUS[CVE-2024-26707] = "fixed-version: Fixed from version 6.8" | ||
5523 | |||
5524 | CVE_STATUS[CVE-2024-26708] = "fixed-version: Fixed from version 6.8" | ||
5525 | |||
5526 | CVE_STATUS[CVE-2024-26709] = "fixed-version: Fixed from version 6.8" | ||
5527 | |||
5528 | # CVE-2024-26710 has no known resolution | ||
5529 | |||
5530 | CVE_STATUS[CVE-2024-26711] = "fixed-version: Fixed from version 6.8" | ||
5531 | |||
5532 | CVE_STATUS[CVE-2024-26712] = "fixed-version: Fixed from version 6.8" | ||
5533 | |||
5534 | CVE_STATUS[CVE-2024-26714] = "fixed-version: Fixed from version 6.8" | ||
5535 | |||
5536 | CVE_STATUS[CVE-2024-26715] = "fixed-version: Fixed from version 6.8" | ||
5537 | |||
5538 | CVE_STATUS[CVE-2024-26716] = "fixed-version: Fixed from version 6.8" | ||
5539 | |||
5540 | CVE_STATUS[CVE-2024-26717] = "fixed-version: Fixed from version 6.8" | ||
5541 | |||
5542 | CVE_STATUS[CVE-2024-26718] = "fixed-version: Fixed from version 6.8" | ||
5543 | |||
5544 | CVE_STATUS[CVE-2024-26719] = "fixed-version: Fixed from version 6.8" | ||
5545 | |||
5546 | CVE_STATUS[CVE-2024-26721] = "fixed-version: Fixed from version 6.8" | ||
5547 | |||
5548 | CVE_STATUS[CVE-2024-26722] = "fixed-version: Fixed from version 6.8" | ||
5549 | |||
5550 | CVE_STATUS[CVE-2024-26723] = "fixed-version: Fixed from version 6.8" | ||
5551 | |||
5552 | CVE_STATUS[CVE-2024-26724] = "fixed-version: Fixed from version 6.8" | ||
5553 | |||
5554 | CVE_STATUS[CVE-2024-26725] = "fixed-version: Fixed from version 6.8" | ||
5555 | |||
5556 | CVE_STATUS[CVE-2024-26726] = "fixed-version: Fixed from version 6.8" | ||
5557 | |||
5558 | CVE_STATUS[CVE-2024-26727] = "fixed-version: Fixed from version 6.8" | ||
5559 | |||
5560 | CVE_STATUS[CVE-2024-26728] = "fixed-version: Fixed from version 6.8" | ||
5561 | |||
5562 | CVE_STATUS[CVE-2024-26729] = "fixed-version: Fixed from version 6.8" | ||
5563 | |||
5564 | CVE_STATUS[CVE-2024-26730] = "fixed-version: Fixed from version 6.8" | ||
5565 | |||
5566 | CVE_STATUS[CVE-2024-26731] = "fixed-version: Fixed from version 6.8" | ||
5567 | |||
5568 | CVE_STATUS[CVE-2024-26732] = "fixed-version: Fixed from version 6.8" | ||
5569 | |||
5570 | CVE_STATUS[CVE-2024-26733] = "fixed-version: Fixed from version 6.8" | ||
5571 | |||
5572 | CVE_STATUS[CVE-2024-26734] = "fixed-version: Fixed from version 6.8" | ||
5573 | |||
5574 | CVE_STATUS[CVE-2024-26735] = "fixed-version: Fixed from version 6.8" | ||
5575 | |||
5576 | CVE_STATUS[CVE-2024-26736] = "fixed-version: Fixed from version 6.8" | ||
5577 | |||
5578 | CVE_STATUS[CVE-2024-26737] = "fixed-version: Fixed from version 6.8" | ||
5579 | |||
5580 | CVE_STATUS[CVE-2024-26738] = "fixed-version: Fixed from version 6.8" | ||
5581 | |||
5582 | CVE_STATUS[CVE-2024-26739] = "fixed-version: Fixed from version 6.8" | ||
5583 | |||
5584 | CVE_STATUS[CVE-2024-26740] = "fixed-version: Fixed from version 6.8" | ||
5585 | |||
5586 | CVE_STATUS[CVE-2024-26741] = "fixed-version: Fixed from version 6.8" | ||
5587 | |||
5588 | CVE_STATUS[CVE-2024-26742] = "fixed-version: Fixed from version 6.8" | ||
5589 | |||
5590 | CVE_STATUS[CVE-2024-26743] = "fixed-version: Fixed from version 6.8" | ||
5591 | |||
5592 | CVE_STATUS[CVE-2024-26744] = "fixed-version: Fixed from version 6.8" | ||
5593 | |||
5594 | CVE_STATUS[CVE-2024-26745] = "fixed-version: Fixed from version 6.8" | ||
5595 | |||
5596 | CVE_STATUS[CVE-2024-26746] = "fixed-version: Fixed from version 6.8" | ||
5597 | |||
5598 | CVE_STATUS[CVE-2024-26747] = "fixed-version: Fixed from version 6.8" | ||
5599 | |||
5600 | CVE_STATUS[CVE-2024-26748] = "fixed-version: Fixed from version 6.8" | ||
5601 | |||
5602 | CVE_STATUS[CVE-2024-26749] = "fixed-version: Fixed from version 6.8" | ||
5603 | |||
5604 | CVE_STATUS[CVE-2024-26750] = "fixed-version: Fixed from version 5.15.151" | ||
5605 | |||
5606 | CVE_STATUS[CVE-2024-26751] = "fixed-version: Fixed from version 6.8" | ||
5607 | |||
5608 | CVE_STATUS[CVE-2024-26752] = "fixed-version: Fixed from version 6.8" | ||
5609 | |||
5610 | CVE_STATUS[CVE-2024-26753] = "fixed-version: Fixed from version 6.8" | ||
5611 | |||
5612 | CVE_STATUS[CVE-2024-26754] = "fixed-version: Fixed from version 6.8" | ||
5613 | |||
5614 | CVE_STATUS[CVE-2024-26755] = "fixed-version: Fixed from version 6.8" | ||
5615 | |||
5616 | CVE_STATUS[CVE-2024-26756] = "fixed-version: Fixed from version 6.8" | ||
5617 | |||
5618 | CVE_STATUS[CVE-2024-26757] = "fixed-version: Fixed from version 6.8" | ||
5619 | |||
5620 | CVE_STATUS[CVE-2024-26758] = "fixed-version: Fixed from version 6.8" | ||
5621 | |||
5622 | CVE_STATUS[CVE-2024-26759] = "fixed-version: Fixed from version 6.8" | ||
5623 | |||
5624 | CVE_STATUS[CVE-2024-26760] = "fixed-version: Fixed from version 6.8" | ||
5625 | |||
5626 | CVE_STATUS[CVE-2024-26761] = "fixed-version: Fixed from version 6.8" | ||
5627 | |||
5628 | CVE_STATUS[CVE-2024-26762] = "fixed-version: Fixed from version 6.8" | ||
5629 | |||
5630 | CVE_STATUS[CVE-2024-26763] = "fixed-version: Fixed from version 6.8" | ||
5631 | |||
5632 | CVE_STATUS[CVE-2024-26764] = "fixed-version: Fixed from version 6.8" | ||
5633 | |||
5634 | CVE_STATUS[CVE-2024-26765] = "fixed-version: Fixed from version 6.8" | ||
5635 | |||
5636 | CVE_STATUS[CVE-2024-26766] = "fixed-version: Fixed from version 6.8" | ||
5637 | |||
5638 | CVE_STATUS[CVE-2024-26767] = "fixed-version: Fixed from version 6.8" | ||
5639 | |||
5640 | CVE_STATUS[CVE-2024-26768] = "fixed-version: Fixed from version 6.8" | ||
5641 | |||
5642 | CVE_STATUS[CVE-2024-26769] = "fixed-version: Fixed from version 6.8" | ||
5643 | |||
5644 | CVE_STATUS[CVE-2024-26770] = "fixed-version: Fixed from version 6.8" | ||
5645 | |||
5646 | CVE_STATUS[CVE-2024-26771] = "fixed-version: Fixed from version 6.8" | ||
5647 | |||
5648 | CVE_STATUS[CVE-2024-26772] = "fixed-version: Fixed from version 6.8" | ||
5649 | |||
5650 | CVE_STATUS[CVE-2024-26773] = "fixed-version: Fixed from version 6.8" | ||
5651 | |||
5652 | CVE_STATUS[CVE-2024-26774] = "fixed-version: Fixed from version 6.8" | ||
5653 | |||
5654 | CVE_STATUS[CVE-2024-26775] = "fixed-version: Fixed from version 6.8" | ||
5655 | |||
5656 | CVE_STATUS[CVE-2024-26776] = "fixed-version: Fixed from version 6.8" | ||
5657 | |||
5658 | CVE_STATUS[CVE-2024-26777] = "fixed-version: Fixed from version 6.8" | ||
5659 | |||
5660 | CVE_STATUS[CVE-2024-26778] = "fixed-version: Fixed from version 6.8" | ||
5661 | |||
5662 | CVE_STATUS[CVE-2024-26779] = "fixed-version: Fixed from version 6.8" | ||
5663 | |||
5664 | CVE_STATUS[CVE-2024-26780] = "fixed-version: Fixed from version 6.7.9" | ||
5665 | |||
5666 | CVE_STATUS[CVE-2024-26781] = "fixed-version: Fixed from version 6.7.9" | ||
5667 | |||
5668 | CVE_STATUS[CVE-2024-26782] = "fixed-version: Fixed from version 6.8" | ||
5669 | |||
5670 | CVE_STATUS[CVE-2024-26783] = "fixed-version: Fixed from version 6.8" | ||
5671 | |||
5672 | CVE_STATUS[CVE-2024-26784] = "fixed-version: Fixed from version 6.8" | ||
5673 | |||
5674 | CVE_STATUS[CVE-2024-26785] = "fixed-version: Fixed from version 6.8" | ||
5675 | |||
5676 | CVE_STATUS[CVE-2024-26786] = "fixed-version: Fixed from version 6.8" | ||
5677 | |||
5678 | CVE_STATUS[CVE-2024-26787] = "fixed-version: Fixed from version 6.8" | ||
5679 | |||
5680 | CVE_STATUS[CVE-2024-26788] = "fixed-version: Fixed from version 6.8" | ||
5681 | |||
5682 | CVE_STATUS[CVE-2024-26789] = "fixed-version: Fixed from version 6.8" | ||
5683 | |||
5684 | CVE_STATUS[CVE-2024-26790] = "fixed-version: Fixed from version 6.8" | ||
5685 | |||
5686 | CVE_STATUS[CVE-2024-26791] = "fixed-version: Fixed from version 6.8" | ||
5687 | |||
5688 | CVE_STATUS[CVE-2024-26792] = "fixed-version: Fixed from version 6.7.9" | ||
5689 | |||
5690 | CVE_STATUS[CVE-2024-26793] = "fixed-version: Fixed from version 6.8" | ||
5691 | |||
5692 | CVE_STATUS[CVE-2024-26794] = "fixed-version: Fixed from version 6.7.9" | ||
5693 | |||
5694 | CVE_STATUS[CVE-2024-26795] = "fixed-version: Fixed from version 6.8" | ||
5695 | |||
5696 | CVE_STATUS[CVE-2024-26796] = "fixed-version: Fixed from version 6.8" | ||
5697 | |||
5698 | CVE_STATUS[CVE-2024-26797] = "fixed-version: Fixed from version 6.8" | ||
5699 | |||
5700 | CVE_STATUS[CVE-2024-26798] = "fixed-version: Fixed from version 6.8" | ||
5701 | |||
5702 | CVE_STATUS[CVE-2024-26799] = "fixed-version: Fixed from version 6.8" | ||
5703 | |||
5704 | CVE_STATUS[CVE-2024-26800] = "fixed-version: Fixed from version 6.7.9" | ||
5705 | |||
5706 | CVE_STATUS[CVE-2024-26801] = "fixed-version: Fixed from version 6.8" | ||
5707 | |||
5708 | CVE_STATUS[CVE-2024-26802] = "fixed-version: Fixed from version 6.8" | ||
5709 | |||
5710 | CVE_STATUS[CVE-2024-26803] = "fixed-version: Fixed from version 6.8" | ||
5711 | |||
5712 | CVE_STATUS[CVE-2024-26804] = "fixed-version: Fixed from version 6.8" | ||
5713 | |||
5714 | CVE_STATUS[CVE-2024-26805] = "fixed-version: Fixed from version 6.8" | ||
5715 | |||
5716 | CVE_STATUS[CVE-2024-26806] = "fixed-version: Fixed from version 6.8" | ||
5717 | |||
5718 | CVE_STATUS[CVE-2024-26807] = "fixed-version: Fixed from version 6.8" | ||
5719 | |||
5720 | CVE_STATUS[CVE-2024-26808] = "fixed-version: Fixed from version 6.8" | ||
5721 | |||
5722 | CVE_STATUS[CVE-2024-26809] = "fixed-version: Fixed from version 6.9" | ||
5723 | |||
5724 | CVE_STATUS[CVE-2024-26810] = "fixed-version: Fixed from version 6.9" | ||
5725 | |||
5726 | CVE_STATUS[CVE-2024-26811] = "fixed-version: Fixed from version 6.9" | ||
5727 | |||
5728 | CVE_STATUS[CVE-2024-26812] = "fixed-version: Fixed from version 6.9" | ||
5729 | |||
5730 | CVE_STATUS[CVE-2024-26813] = "fixed-version: Fixed from version 6.9" | ||
5731 | |||
5732 | CVE_STATUS[CVE-2024-26814] = "fixed-version: Fixed from version 6.9" | ||
5733 | |||
5734 | CVE_STATUS[CVE-2024-26815] = "fixed-version: Fixed from version 6.9" | ||
5735 | |||
5736 | CVE_STATUS[CVE-2024-26816] = "fixed-version: Fixed from version 6.9" | ||
5737 | |||
5738 | CVE_STATUS[CVE-2024-26817] = "fixed-version: Fixed from version 6.9" | ||
5739 | |||
5740 | CVE_STATUS[CVE-2024-26818] = "fixed-version: Fixed from version 6.8" | ||
5741 | |||
5742 | CVE_STATUS[CVE-2024-26820] = "fixed-version: Fixed from version 6.8" | ||
5743 | |||
5744 | CVE_STATUS[CVE-2024-26822] = "fixed-version: Fixed from version 6.8" | ||
5745 | |||
5746 | CVE_STATUS[CVE-2024-26823] = "fixed-version: Fixed from version 6.8" | ||
5747 | |||
5748 | CVE_STATUS[CVE-2024-26824] = "fixed-version: Fixed from version 6.8" | ||
5749 | |||
5750 | CVE_STATUS[CVE-2024-26825] = "fixed-version: Fixed from version 6.8" | ||
5751 | |||
5752 | CVE_STATUS[CVE-2024-26826] = "fixed-version: Fixed from version 6.8" | ||
5753 | |||
5754 | CVE_STATUS[CVE-2024-26828] = "fixed-version: Fixed from version 6.8" | ||
5755 | |||
5756 | CVE_STATUS[CVE-2024-26829] = "fixed-version: Fixed from version 6.8" | ||
5757 | |||
5758 | CVE_STATUS[CVE-2024-26830] = "fixed-version: Fixed from version 6.8" | ||
5759 | |||
5760 | CVE_STATUS[CVE-2024-26831] = "fixed-version: Fixed from version 6.8" | ||
5761 | |||
5762 | CVE_STATUS[CVE-2024-26832] = "fixed-version: Fixed from version 6.8" | ||
5763 | |||
5764 | CVE_STATUS[CVE-2024-26833] = "fixed-version: Fixed from version 6.8" | ||
5765 | |||
5766 | CVE_STATUS[CVE-2024-26834] = "fixed-version: Fixed from version 6.8" | ||
5767 | |||
5768 | CVE_STATUS[CVE-2024-26835] = "fixed-version: Fixed from version 6.8" | ||
5769 | |||
5770 | CVE_STATUS[CVE-2024-26836] = "fixed-version: Fixed from version 6.8" | ||
5771 | |||
5772 | CVE_STATUS[CVE-2024-26837] = "fixed-version: Fixed from version 6.8" | ||
5773 | |||
5774 | CVE_STATUS[CVE-2024-26838] = "fixed-version: Fixed from version 6.8" | ||
5775 | |||
5776 | CVE_STATUS[CVE-2024-26839] = "fixed-version: Fixed from version 6.8" | ||
5777 | |||
5778 | CVE_STATUS[CVE-2024-26840] = "fixed-version: Fixed from version 6.8" | ||
5779 | |||
5780 | CVE_STATUS[CVE-2024-26841] = "fixed-version: Fixed from version 6.8" | ||
5781 | |||
5782 | CVE_STATUS[CVE-2024-26842] = "fixed-version: Fixed from version 6.8" | ||
5783 | |||
5784 | CVE_STATUS[CVE-2024-26843] = "fixed-version: Fixed from version 6.8" | ||
5785 | |||
5786 | CVE_STATUS[CVE-2024-26844] = "fixed-version: Fixed from version 6.8" | ||
5787 | |||
5788 | CVE_STATUS[CVE-2024-26845] = "fixed-version: Fixed from version 6.8" | ||
5789 | |||
5790 | CVE_STATUS[CVE-2024-26846] = "fixed-version: Fixed from version 6.8" | ||
5791 | |||
5792 | CVE_STATUS[CVE-2024-26847] = "fixed-version: Fixed from version 6.8" | ||
5793 | |||
5794 | CVE_STATUS[CVE-2024-26849] = "fixed-version: Fixed from version 6.8" | ||
5795 | |||
5796 | CVE_STATUS[CVE-2024-26850] = "fixed-version: Fixed from version 6.8" | ||
5797 | |||
5798 | CVE_STATUS[CVE-2024-26851] = "fixed-version: Fixed from version 6.8" | ||
5799 | |||
5800 | CVE_STATUS[CVE-2024-26852] = "fixed-version: Fixed from version 6.8" | ||
5801 | |||
5802 | CVE_STATUS[CVE-2024-26853] = "fixed-version: Fixed from version 6.8" | ||
5803 | |||
5804 | CVE_STATUS[CVE-2024-26854] = "fixed-version: Fixed from version 6.8" | ||
5805 | |||
5806 | CVE_STATUS[CVE-2024-26855] = "fixed-version: Fixed from version 6.8" | ||
5807 | |||
5808 | CVE_STATUS[CVE-2024-26856] = "fixed-version: Fixed from version 6.8" | ||
5809 | |||
5810 | CVE_STATUS[CVE-2024-26857] = "fixed-version: Fixed from version 6.8" | ||
5811 | |||
5812 | CVE_STATUS[CVE-2024-26858] = "fixed-version: Fixed from version 6.8" | ||
5813 | |||
5814 | CVE_STATUS[CVE-2024-26859] = "fixed-version: Fixed from version 6.9" | ||
5815 | |||
5816 | CVE_STATUS[CVE-2024-26860] = "fixed-version: Fixed from version 6.9" | ||
5817 | |||
5818 | CVE_STATUS[CVE-2024-26861] = "fixed-version: Fixed from version 6.9" | ||
5819 | |||
5820 | CVE_STATUS[CVE-2024-26862] = "fixed-version: Fixed from version 6.9" | ||
5821 | |||
5822 | CVE_STATUS[CVE-2024-26863] = "fixed-version: Fixed from version 6.9" | ||
5823 | |||
5824 | CVE_STATUS[CVE-2024-26864] = "fixed-version: Fixed from version 6.9" | ||
5825 | |||
5826 | CVE_STATUS[CVE-2024-26865] = "fixed-version: Fixed from version 6.9" | ||
5827 | |||
5828 | CVE_STATUS[CVE-2024-26866] = "fixed-version: Fixed from version 6.9" | ||
5829 | |||
5830 | CVE_STATUS[CVE-2024-26867] = "fixed-version: Fixed from version 6.8" | ||
5831 | |||
5832 | CVE_STATUS[CVE-2024-26868] = "fixed-version: Fixed from version 6.9" | ||
5833 | |||
5834 | CVE_STATUS[CVE-2024-26869] = "fixed-version: Fixed from version 6.9" | ||
5835 | |||
5836 | CVE_STATUS[CVE-2024-26870] = "fixed-version: Fixed from version 6.9" | ||
5837 | |||
5838 | CVE_STATUS[CVE-2024-26871] = "fixed-version: Fixed from version 6.9" | ||
5839 | |||
5840 | CVE_STATUS[CVE-2024-26872] = "fixed-version: Fixed from version 6.9" | ||
5841 | |||
5842 | CVE_STATUS[CVE-2024-26873] = "fixed-version: Fixed from version 6.9" | ||
5843 | |||
5844 | CVE_STATUS[CVE-2024-26874] = "fixed-version: Fixed from version 6.9" | ||
5845 | |||
5846 | CVE_STATUS[CVE-2024-26875] = "fixed-version: Fixed from version 6.9" | ||
5847 | |||
5848 | CVE_STATUS[CVE-2024-26876] = "fixed-version: Fixed from version 6.9" | ||
5849 | |||
5850 | CVE_STATUS[CVE-2024-26877] = "fixed-version: Fixed from version 6.9" | ||
5851 | |||
5852 | CVE_STATUS[CVE-2024-26878] = "fixed-version: Fixed from version 6.9" | ||
5853 | |||
5854 | CVE_STATUS[CVE-2024-26879] = "fixed-version: Fixed from version 6.9" | ||
5855 | |||
5856 | CVE_STATUS[CVE-2024-26880] = "fixed-version: Fixed from version 6.9" | ||
5857 | |||
5858 | CVE_STATUS[CVE-2024-26881] = "fixed-version: Fixed from version 6.9" | ||
5859 | |||
5860 | CVE_STATUS[CVE-2024-26882] = "fixed-version: Fixed from version 6.9" | ||
5861 | |||
5862 | CVE_STATUS[CVE-2024-26883] = "fixed-version: Fixed from version 6.9" | ||
5863 | |||
5864 | CVE_STATUS[CVE-2024-26884] = "fixed-version: Fixed from version 6.9" | ||
5865 | |||
5866 | CVE_STATUS[CVE-2024-26885] = "fixed-version: Fixed from version 6.9" | ||
5867 | |||
5868 | CVE_STATUS[CVE-2024-26886] = "fixed-version: Fixed from version 6.9" | ||
5869 | |||
5870 | CVE_STATUS[CVE-2024-26887] = "fixed-version: Fixed from version 6.9" | ||
5871 | |||
5872 | CVE_STATUS[CVE-2024-26888] = "fixed-version: Fixed from version 6.9" | ||
5873 | |||
5874 | CVE_STATUS[CVE-2024-26889] = "fixed-version: Fixed from version 6.9" | ||
5875 | |||
5876 | CVE_STATUS[CVE-2024-26890] = "fixed-version: Fixed from version 6.9" | ||
5877 | |||
5878 | CVE_STATUS[CVE-2024-26891] = "fixed-version: Fixed from version 6.9" | ||
5879 | |||
5880 | CVE_STATUS[CVE-2024-26892] = "fixed-version: Fixed from version 6.9" | ||
5881 | |||
5882 | CVE_STATUS[CVE-2024-26893] = "fixed-version: Fixed from version 6.9" | ||
5883 | |||
5884 | CVE_STATUS[CVE-2024-26894] = "fixed-version: Fixed from version 6.9" | ||
5885 | |||
5886 | CVE_STATUS[CVE-2024-26895] = "fixed-version: Fixed from version 6.9" | ||
5887 | |||
5888 | CVE_STATUS[CVE-2024-26896] = "fixed-version: Fixed from version 6.9" | ||
5889 | |||
5890 | CVE_STATUS[CVE-2024-26897] = "fixed-version: Fixed from version 6.9" | ||
5891 | |||
5892 | CVE_STATUS[CVE-2024-26898] = "fixed-version: Fixed from version 6.9" | ||
5893 | |||
5894 | CVE_STATUS[CVE-2024-26899] = "fixed-version: Fixed from version 6.9" | ||
5895 | |||
5896 | CVE_STATUS[CVE-2024-26900] = "fixed-version: Fixed from version 6.9" | ||
5897 | |||
5898 | CVE_STATUS[CVE-2024-26901] = "fixed-version: Fixed from version 6.9" | ||
5899 | |||
5900 | CVE_STATUS[CVE-2024-26902] = "fixed-version: Fixed from version 6.8" | ||
5901 | |||
5902 | CVE_STATUS[CVE-2024-26903] = "fixed-version: Fixed from version 6.8" | ||
5903 | |||
5904 | CVE_STATUS[CVE-2024-26906] = "fixed-version: Fixed from version 6.8" | ||
5905 | |||
5906 | CVE_STATUS[CVE-2024-26907] = "fixed-version: Fixed from version 6.8" | ||
5907 | |||
5908 | CVE_STATUS[CVE-2024-26909] = "fixed-version: Fixed from version 6.8" | ||
5909 | |||
5910 | CVE_STATUS[CVE-2024-26910] = "fixed-version: Fixed from version 6.8" | ||
5911 | |||
5912 | CVE_STATUS[CVE-2024-26911] = "fixed-version: Fixed from version 6.8" | ||
5913 | |||
5914 | CVE_STATUS[CVE-2024-26912] = "fixed-version: Fixed from version 6.8" | ||
5915 | |||
5916 | CVE_STATUS[CVE-2024-26913] = "fixed-version: Fixed from version 6.8" | ||
5917 | |||
5918 | CVE_STATUS[CVE-2024-26914] = "fixed-version: Fixed from version 6.8" | ||
5919 | |||
5920 | CVE_STATUS[CVE-2024-26915] = "fixed-version: Fixed from version 6.8" | ||
5921 | |||
5922 | CVE_STATUS[CVE-2024-26916] = "fixed-version: Fixed from version 6.8" | ||
5923 | |||
5924 | CVE_STATUS[CVE-2024-26917] = "fixed-version: Fixed from version 6.8" | ||
5925 | |||
5926 | CVE_STATUS[CVE-2024-26918] = "fixed-version: Fixed from version 6.8" | ||
5927 | |||
5928 | CVE_STATUS[CVE-2024-26919] = "fixed-version: Fixed from version 6.8" | ||
5929 | |||
5930 | CVE_STATUS[CVE-2024-26920] = "fixed-version: Fixed from version 6.8" | ||
5931 | |||
5932 | CVE_STATUS[CVE-2024-26921] = "fixed-version: Fixed from version 6.9" | ||
5933 | |||
5934 | CVE_STATUS[CVE-2024-26922] = "fixed-version: Fixed from version 6.9" | ||
5935 | |||
5936 | CVE_STATUS[CVE-2024-26923] = "fixed-version: Fixed from version 6.9" | ||
5937 | |||
5938 | CVE_STATUS[CVE-2024-26924] = "fixed-version: Fixed from version 6.9" | ||
5939 | |||
5940 | CVE_STATUS[CVE-2024-26925] = "fixed-version: Fixed from version 6.9" | ||
5941 | |||
5942 | CVE_STATUS[CVE-2024-26926] = "fixed-version: Fixed from version 6.9" | ||
5943 | |||
5944 | CVE_STATUS[CVE-2024-26927] = "fixed-version: Fixed from version 6.9" | ||
5945 | |||
5946 | CVE_STATUS[CVE-2024-26928] = "fixed-version: Fixed from version 6.9" | ||
5947 | |||
5948 | CVE_STATUS[CVE-2024-26930] = "fixed-version: Fixed from version 6.9" | ||
5949 | |||
5950 | CVE_STATUS[CVE-2024-26931] = "fixed-version: Fixed from version 6.9" | ||
5951 | |||
5952 | CVE_STATUS[CVE-2024-26932] = "fixed-version: Fixed from version 6.9" | ||
5953 | |||
5954 | CVE_STATUS[CVE-2024-26933] = "fixed-version: Fixed from version 6.9" | ||
5955 | |||
5956 | CVE_STATUS[CVE-2024-26934] = "fixed-version: Fixed from version 6.9" | ||
5957 | |||
5958 | CVE_STATUS[CVE-2024-26935] = "fixed-version: Fixed from version 6.9" | ||
5959 | |||
5960 | CVE_STATUS[CVE-2024-26936] = "fixed-version: Fixed from version 6.9" | ||
5961 | |||
5962 | CVE_STATUS[CVE-2024-26937] = "fixed-version: Fixed from version 6.9" | ||
5963 | |||
5964 | CVE_STATUS[CVE-2024-26938] = "fixed-version: Fixed from version 6.9" | ||
5965 | |||
5966 | CVE_STATUS[CVE-2024-26939] = "fixed-version: Fixed from version 6.9" | ||
5967 | |||
5968 | CVE_STATUS[CVE-2024-26940] = "fixed-version: Fixed from version 6.9" | ||
5969 | |||
5970 | CVE_STATUS[CVE-2024-26941] = "fixed-version: Fixed from version 6.9" | ||
5971 | |||
5972 | CVE_STATUS[CVE-2024-26942] = "fixed-version: Fixed from version 6.9" | ||
5973 | |||
5974 | CVE_STATUS[CVE-2024-26943] = "fixed-version: Fixed from version 6.9" | ||
5975 | |||
5976 | CVE_STATUS[CVE-2024-26944] = "fixed-version: Fixed from version 6.9" | ||
5977 | |||
5978 | CVE_STATUS[CVE-2024-26945] = "fixed-version: Fixed from version 6.9" | ||
5979 | |||
5980 | CVE_STATUS[CVE-2024-26946] = "fixed-version: Fixed from version 6.9" | ||
5981 | |||
5982 | CVE_STATUS[CVE-2024-26947] = "fixed-version: Fixed from version 6.9" | ||
5983 | |||
5984 | CVE_STATUS[CVE-2024-26948] = "fixed-version: Fixed from version 6.9" | ||
5985 | |||
5986 | CVE_STATUS[CVE-2024-26949] = "fixed-version: Fixed from version 6.9" | ||
5987 | |||
5988 | CVE_STATUS[CVE-2024-26950] = "fixed-version: Fixed from version 6.9" | ||
5989 | |||
5990 | CVE_STATUS[CVE-2024-26951] = "fixed-version: Fixed from version 6.9" | ||
5991 | |||
5992 | CVE_STATUS[CVE-2024-26952] = "fixed-version: Fixed from version 6.9" | ||
5993 | |||
5994 | CVE_STATUS[CVE-2024-26953] = "fixed-version: Fixed from version 6.9" | ||
5995 | |||
5996 | CVE_STATUS[CVE-2024-26954] = "fixed-version: Fixed from version 6.9" | ||
5997 | |||
5998 | CVE_STATUS[CVE-2024-26955] = "fixed-version: Fixed from version 6.9" | ||
5999 | |||
6000 | CVE_STATUS[CVE-2024-26956] = "fixed-version: Fixed from version 6.9" | ||
6001 | |||
6002 | CVE_STATUS[CVE-2024-26957] = "fixed-version: Fixed from version 6.9" | ||
6003 | |||
6004 | CVE_STATUS[CVE-2024-26958] = "fixed-version: Fixed from version 6.9" | ||
6005 | |||
6006 | CVE_STATUS[CVE-2024-26959] = "fixed-version: Fixed from version 6.9" | ||
6007 | |||
6008 | CVE_STATUS[CVE-2024-26960] = "fixed-version: Fixed from version 6.9" | ||
6009 | |||
6010 | CVE_STATUS[CVE-2024-26961] = "fixed-version: Fixed from version 6.9" | ||
6011 | |||
6012 | CVE_STATUS[CVE-2024-26962] = "fixed-version: Fixed from version 6.9" | ||
6013 | |||
6014 | CVE_STATUS[CVE-2024-26963] = "fixed-version: Fixed from version 6.9" | ||
6015 | |||
6016 | CVE_STATUS[CVE-2024-26964] = "fixed-version: Fixed from version 6.9" | ||
6017 | |||
6018 | CVE_STATUS[CVE-2024-26965] = "fixed-version: Fixed from version 6.9" | ||
6019 | |||
6020 | CVE_STATUS[CVE-2024-26966] = "fixed-version: Fixed from version 6.9" | ||
6021 | |||
6022 | CVE_STATUS[CVE-2024-26967] = "fixed-version: Fixed from version 6.9" | ||
6023 | |||
6024 | CVE_STATUS[CVE-2024-26968] = "fixed-version: Fixed from version 6.9" | ||
6025 | |||
6026 | CVE_STATUS[CVE-2024-26969] = "fixed-version: Fixed from version 6.9" | ||
6027 | |||
6028 | CVE_STATUS[CVE-2024-26970] = "fixed-version: Fixed from version 6.9" | ||
6029 | |||
6030 | CVE_STATUS[CVE-2024-26971] = "fixed-version: Fixed from version 6.9" | ||
6031 | |||
6032 | CVE_STATUS[CVE-2024-26973] = "fixed-version: Fixed from version 6.9" | ||
6033 | |||
6034 | CVE_STATUS[CVE-2024-26974] = "fixed-version: Fixed from version 6.9" | ||
6035 | |||
6036 | CVE_STATUS[CVE-2024-26975] = "fixed-version: Fixed from version 6.9" | ||
6037 | |||
6038 | CVE_STATUS[CVE-2024-26976] = "fixed-version: Fixed from version 6.9" | ||
6039 | |||
6040 | CVE_STATUS[CVE-2024-26977] = "fixed-version: Fixed from version 6.9" | ||
6041 | |||
6042 | CVE_STATUS[CVE-2024-26978] = "fixed-version: Fixed from version 6.9" | ||
6043 | |||
6044 | CVE_STATUS[CVE-2024-26980] = "fixed-version: Fixed from version 6.9" | ||
6045 | |||
6046 | CVE_STATUS[CVE-2024-26981] = "fixed-version: Fixed from version 6.9" | ||
6047 | |||
6048 | CVE_STATUS[CVE-2024-26982] = "fixed-version: Fixed from version 6.9" | ||
6049 | |||
6050 | CVE_STATUS[CVE-2024-26983] = "fixed-version: Fixed from version 6.9" | ||
6051 | |||
6052 | CVE_STATUS[CVE-2024-26984] = "fixed-version: Fixed from version 6.9" | ||
6053 | |||
6054 | CVE_STATUS[CVE-2024-26985] = "fixed-version: Fixed from version 6.9" | ||
6055 | |||
6056 | CVE_STATUS[CVE-2024-26986] = "fixed-version: Fixed from version 6.9" | ||
6057 | |||
6058 | CVE_STATUS[CVE-2024-26987] = "fixed-version: Fixed from version 6.9" | ||
6059 | |||
6060 | CVE_STATUS[CVE-2024-26988] = "fixed-version: Fixed from version 6.9" | ||
6061 | |||
6062 | CVE_STATUS[CVE-2024-26989] = "fixed-version: Fixed from version 6.9" | ||
6063 | |||
6064 | CVE_STATUS[CVE-2024-26990] = "fixed-version: Fixed from version 6.9" | ||
6065 | |||
6066 | CVE_STATUS[CVE-2024-26991] = "fixed-version: Fixed from version 6.9" | ||
6067 | |||
6068 | CVE_STATUS[CVE-2024-26992] = "fixed-version: Fixed from version 6.9" | ||
6069 | |||
6070 | CVE_STATUS[CVE-2024-26993] = "fixed-version: Fixed from version 6.9" | ||
6071 | |||
6072 | CVE_STATUS[CVE-2024-26994] = "fixed-version: Fixed from version 6.9" | ||
6073 | |||
6074 | CVE_STATUS[CVE-2024-26995] = "fixed-version: Fixed from version 6.9" | ||
6075 | |||
6076 | CVE_STATUS[CVE-2024-26996] = "fixed-version: Fixed from version 6.9" | ||
6077 | |||
6078 | CVE_STATUS[CVE-2024-26997] = "fixed-version: Fixed from version 6.8.8" | ||
6079 | |||
6080 | CVE_STATUS[CVE-2024-26998] = "fixed-version: Fixed from version 6.9" | ||
6081 | |||
6082 | CVE_STATUS[CVE-2024-26999] = "fixed-version: Fixed from version 6.9" | ||
6083 | |||
6084 | CVE_STATUS[CVE-2024-27000] = "fixed-version: Fixed from version 6.9" | ||
6085 | |||
6086 | CVE_STATUS[CVE-2024-27001] = "fixed-version: Fixed from version 6.9" | ||
6087 | |||
6088 | CVE_STATUS[CVE-2024-27002] = "fixed-version: Fixed from version 6.9" | ||
6089 | |||
6090 | CVE_STATUS[CVE-2024-27003] = "fixed-version: Fixed from version 6.9" | ||
6091 | |||
6092 | CVE_STATUS[CVE-2024-27004] = "fixed-version: Fixed from version 6.9" | ||
6093 | |||
6094 | CVE_STATUS[CVE-2024-27005] = "fixed-version: Fixed from version 6.9" | ||
6095 | |||
6096 | CVE_STATUS[CVE-2024-27006] = "fixed-version: Fixed from version 6.9" | ||
6097 | |||
6098 | CVE_STATUS[CVE-2024-27007] = "fixed-version: Fixed from version 6.9" | ||
6099 | |||
6100 | CVE_STATUS[CVE-2024-27008] = "fixed-version: Fixed from version 6.9" | ||
6101 | |||
6102 | CVE_STATUS[CVE-2024-27009] = "fixed-version: Fixed from version 6.9" | ||
6103 | |||
6104 | CVE_STATUS[CVE-2024-27010] = "fixed-version: Fixed from version 6.9" | ||
6105 | |||
6106 | CVE_STATUS[CVE-2024-27011] = "fixed-version: Fixed from version 6.9" | ||
6107 | |||
6108 | CVE_STATUS[CVE-2024-27012] = "fixed-version: Fixed from version 6.9" | ||
6109 | |||
6110 | CVE_STATUS[CVE-2024-27013] = "fixed-version: Fixed from version 6.9" | ||
6111 | |||
6112 | CVE_STATUS[CVE-2024-27014] = "fixed-version: Fixed from version 6.9" | ||
6113 | |||
6114 | CVE_STATUS[CVE-2024-27015] = "fixed-version: Fixed from version 6.9" | ||
6115 | |||
6116 | CVE_STATUS[CVE-2024-27016] = "fixed-version: Fixed from version 6.9" | ||
6117 | |||
6118 | CVE_STATUS[CVE-2024-27017] = "fixed-version: Fixed from version 6.9" | ||
6119 | |||
6120 | CVE_STATUS[CVE-2024-27018] = "fixed-version: Fixed from version 6.9" | ||
6121 | |||
6122 | CVE_STATUS[CVE-2024-27019] = "fixed-version: Fixed from version 6.9" | ||
6123 | |||
6124 | CVE_STATUS[CVE-2024-27020] = "fixed-version: Fixed from version 6.9" | ||
6125 | |||
6126 | CVE_STATUS[CVE-2024-27021] = "fixed-version: Fixed from version 6.9" | ||
6127 | |||
6128 | CVE_STATUS[CVE-2024-27022] = "fixed-version: Fixed from version 6.9" | ||
6129 | |||
6130 | CVE_STATUS[CVE-2024-27023] = "fixed-version: Fixed from version 6.7.7" | ||
6131 | |||
6132 | CVE_STATUS[CVE-2024-27024] = "fixed-version: Fixed from version 6.8" | ||
6133 | |||
6134 | CVE_STATUS[CVE-2024-27025] = "fixed-version: Fixed from version 6.9" | ||
6135 | |||
6136 | CVE_STATUS[CVE-2024-27026] = "fixed-version: Fixed from version 6.9" | ||
6137 | |||
6138 | CVE_STATUS[CVE-2024-27027] = "fixed-version: Fixed from version 6.9" | ||
6139 | |||
6140 | CVE_STATUS[CVE-2024-27028] = "fixed-version: Fixed from version 6.9" | ||
6141 | |||
6142 | CVE_STATUS[CVE-2024-27029] = "fixed-version: Fixed from version 6.9" | ||
6143 | |||
6144 | CVE_STATUS[CVE-2024-27030] = "fixed-version: Fixed from version 6.9" | ||
6145 | |||
6146 | CVE_STATUS[CVE-2024-27031] = "fixed-version: Fixed from version 6.9" | ||
6147 | |||
6148 | CVE_STATUS[CVE-2024-27032] = "fixed-version: Fixed from version 6.9" | ||
6149 | |||
6150 | CVE_STATUS[CVE-2024-27033] = "fixed-version: Fixed from version 6.9" | ||
6151 | |||
6152 | CVE_STATUS[CVE-2024-27034] = "fixed-version: Fixed from version 6.9" | ||
6153 | |||
6154 | CVE_STATUS[CVE-2024-27035] = "fixed-version: Fixed from version 6.9" | ||
6155 | |||
6156 | CVE_STATUS[CVE-2024-27036] = "fixed-version: Fixed from version 6.9" | ||
6157 | |||
6158 | CVE_STATUS[CVE-2024-27037] = "fixed-version: Fixed from version 6.9" | ||
6159 | |||
6160 | CVE_STATUS[CVE-2024-27038] = "fixed-version: Fixed from version 6.9" | ||
6161 | |||
6162 | CVE_STATUS[CVE-2024-27039] = "fixed-version: Fixed from version 6.9" | ||
6163 | |||
6164 | CVE_STATUS[CVE-2024-27040] = "fixed-version: Fixed from version 6.9" | ||
6165 | |||
6166 | CVE_STATUS[CVE-2024-27041] = "fixed-version: Fixed from version 6.9" | ||
6167 | |||
6168 | CVE_STATUS[CVE-2024-27042] = "fixed-version: Fixed from version 6.9" | ||
6169 | |||
6170 | CVE_STATUS[CVE-2024-27043] = "fixed-version: Fixed from version 6.9" | ||
6171 | |||
6172 | CVE_STATUS[CVE-2024-27044] = "fixed-version: Fixed from version 6.9" | ||
6173 | |||
6174 | CVE_STATUS[CVE-2024-27045] = "fixed-version: Fixed from version 6.9" | ||
6175 | |||
6176 | CVE_STATUS[CVE-2024-27046] = "fixed-version: Fixed from version 6.9" | ||
6177 | |||
6178 | CVE_STATUS[CVE-2024-27047] = "fixed-version: Fixed from version 6.9" | ||
6179 | |||
6180 | CVE_STATUS[CVE-2024-27048] = "fixed-version: Fixed from version 6.9" | ||
6181 | |||
6182 | CVE_STATUS[CVE-2024-27049] = "fixed-version: Fixed from version 6.9" | ||
6183 | |||
6184 | CVE_STATUS[CVE-2024-27050] = "fixed-version: Fixed from version 6.9" | ||
6185 | |||
6186 | CVE_STATUS[CVE-2024-27051] = "fixed-version: Fixed from version 6.9" | ||
6187 | |||
6188 | CVE_STATUS[CVE-2024-27052] = "fixed-version: Fixed from version 6.9" | ||
6189 | |||
6190 | CVE_STATUS[CVE-2024-27053] = "fixed-version: Fixed from version 6.9" | ||
6191 | |||
6192 | CVE_STATUS[CVE-2024-27054] = "fixed-version: Fixed from version 6.9" | ||
6193 | |||
6194 | CVE_STATUS[CVE-2024-27056] = "fixed-version: Fixed from version 6.8" | ||
6195 | |||
6196 | CVE_STATUS[CVE-2024-27057] = "fixed-version: Fixed from version 6.8" | ||
6197 | |||
6198 | CVE_STATUS[CVE-2024-27058] = "fixed-version: Fixed from version 6.9" | ||
6199 | |||
6200 | CVE_STATUS[CVE-2024-27059] = "fixed-version: Fixed from version 6.8" | ||
6201 | |||
6202 | CVE_STATUS[CVE-2024-27060] = "fixed-version: Fixed from version 6.8" | ||
6203 | |||
6204 | CVE_STATUS[CVE-2024-27061] = "fixed-version: Fixed from version 6.8" | ||
6205 | |||
6206 | CVE_STATUS[CVE-2024-27062] = "fixed-version: Fixed from version 6.8" | ||
6207 | |||
6208 | CVE_STATUS[CVE-2024-27063] = "fixed-version: Fixed from version 6.9" | ||
6209 | |||
6210 | CVE_STATUS[CVE-2024-27064] = "fixed-version: Fixed from version 6.9" | ||
6211 | |||
6212 | CVE_STATUS[CVE-2024-27065] = "fixed-version: Fixed from version 6.9" | ||
6213 | |||
6214 | CVE_STATUS[CVE-2024-27066] = "fixed-version: Fixed from version 6.9" | ||
6215 | |||
6216 | CVE_STATUS[CVE-2024-27067] = "fixed-version: Fixed from version 6.9" | ||
6217 | |||
6218 | CVE_STATUS[CVE-2024-27068] = "fixed-version: Fixed from version 6.9" | ||
6219 | |||
6220 | CVE_STATUS[CVE-2024-27069] = "fixed-version: Fixed from version 6.9" | ||
6221 | |||
6222 | CVE_STATUS[CVE-2024-27070] = "fixed-version: Fixed from version 6.9" | ||
6223 | |||
6224 | CVE_STATUS[CVE-2024-27071] = "fixed-version: Fixed from version 6.9" | ||
6225 | |||
6226 | CVE_STATUS[CVE-2024-27072] = "fixed-version: Fixed from version 6.9" | ||
6227 | |||
6228 | CVE_STATUS[CVE-2024-27073] = "fixed-version: Fixed from version 6.9" | ||
6229 | |||
6230 | CVE_STATUS[CVE-2024-27074] = "fixed-version: Fixed from version 6.9" | ||
6231 | |||
6232 | CVE_STATUS[CVE-2024-27075] = "fixed-version: Fixed from version 6.9" | ||
6233 | |||
6234 | CVE_STATUS[CVE-2024-27076] = "fixed-version: Fixed from version 6.9" | ||
6235 | |||
6236 | CVE_STATUS[CVE-2024-27077] = "fixed-version: Fixed from version 6.9" | ||
6237 | |||
6238 | CVE_STATUS[CVE-2024-27078] = "fixed-version: Fixed from version 6.9" | ||
6239 | |||
6240 | CVE_STATUS[CVE-2024-27079] = "fixed-version: Fixed from version 6.9" | ||
6241 | |||
6242 | CVE_STATUS[CVE-2024-27080] = "fixed-version: Fixed from version 6.9" | ||
6243 | |||
6244 | CVE_STATUS[CVE-2024-27388] = "fixed-version: Fixed from version 6.9" | ||
6245 | |||
6246 | CVE_STATUS[CVE-2024-27389] = "fixed-version: Fixed from version 6.9" | ||
6247 | |||
6248 | CVE_STATUS[CVE-2024-27390] = "fixed-version: Fixed from version 6.9" | ||
6249 | |||
6250 | CVE_STATUS[CVE-2024-27391] = "fixed-version: Fixed from version 6.9" | ||
6251 | |||
6252 | CVE_STATUS[CVE-2024-27392] = "fixed-version: Fixed from version 6.9" | ||
6253 | |||
6254 | CVE_STATUS[CVE-2024-27393] = "fixed-version: Fixed from version 6.9" | ||
6255 | |||
6256 | CVE_STATUS[CVE-2024-27394] = "fixed-version: Fixed from version 6.9" | ||
6257 | |||
6258 | CVE_STATUS[CVE-2024-27395] = "fixed-version: Fixed from version 6.9" | ||
6259 | |||
6260 | CVE_STATUS[CVE-2024-27396] = "fixed-version: Fixed from version 6.9" | ||
6261 | |||
6262 | CVE_STATUS[CVE-2024-27397] = "fixed-version: Fixed from version 6.8" | ||
6263 | |||
6264 | CVE_STATUS[CVE-2024-27398] = "fixed-version: Fixed from version 6.9" | ||
6265 | |||
6266 | CVE_STATUS[CVE-2024-27399] = "fixed-version: Fixed from version 6.9" | ||
6267 | |||
6268 | CVE_STATUS[CVE-2024-27400] = "fixed-version: Fixed from version 6.9" | ||
6269 | |||
6270 | CVE_STATUS[CVE-2024-27401] = "fixed-version: Fixed from version 6.9" | ||
6271 | |||
6272 | CVE_STATUS[CVE-2024-27402] = "fixed-version: Fixed from version 6.8" | ||
6273 | |||
6274 | CVE_STATUS[CVE-2024-27403] = "fixed-version: Fixed from version 6.8" | ||
6275 | |||
6276 | CVE_STATUS[CVE-2024-27404] = "fixed-version: Fixed from version 6.8" | ||
6277 | |||
6278 | CVE_STATUS[CVE-2024-27405] = "fixed-version: Fixed from version 6.8" | ||
6279 | |||
6280 | CVE_STATUS[CVE-2024-27406] = "fixed-version: Fixed from version 6.8" | ||
6281 | |||
6282 | CVE_STATUS[CVE-2024-27407] = "fixed-version: Fixed from version 6.8" | ||
6283 | |||
6284 | CVE_STATUS[CVE-2024-27408] = "fixed-version: Fixed from version 6.8" | ||
6285 | |||
6286 | CVE_STATUS[CVE-2024-27409] = "fixed-version: Fixed from version 6.8" | ||
6287 | |||
6288 | CVE_STATUS[CVE-2024-27410] = "fixed-version: Fixed from version 6.8" | ||
6289 | |||
6290 | CVE_STATUS[CVE-2024-27411] = "fixed-version: Fixed from version 6.7.9" | ||
6291 | |||
6292 | CVE_STATUS[CVE-2024-27412] = "fixed-version: Fixed from version 6.8" | ||
6293 | |||
6294 | CVE_STATUS[CVE-2024-27413] = "fixed-version: Fixed from version 6.8" | ||
6295 | |||
6296 | CVE_STATUS[CVE-2024-27414] = "fixed-version: Fixed from version 6.8" | ||
6297 | |||
6298 | CVE_STATUS[CVE-2024-27415] = "fixed-version: Fixed from version 6.8" | ||
6299 | |||
6300 | CVE_STATUS[CVE-2024-27416] = "fixed-version: Fixed from version 6.8" | ||
6301 | |||
6302 | CVE_STATUS[CVE-2024-27417] = "fixed-version: Fixed from version 6.8" | ||
6303 | |||
6304 | CVE_STATUS[CVE-2024-27418] = "fixed-version: Fixed from version 6.8" | ||
6305 | |||
6306 | CVE_STATUS[CVE-2024-27419] = "fixed-version: Fixed from version 6.8" | ||
6307 | |||
6308 | CVE_STATUS[CVE-2024-27431] = "fixed-version: Fixed from version 6.8" | ||
6309 | |||
6310 | CVE_STATUS[CVE-2024-27432] = "fixed-version: Fixed from version 6.9" | ||
6311 | |||
6312 | CVE_STATUS[CVE-2024-27433] = "fixed-version: Fixed from version 6.9" | ||
6313 | |||
6314 | CVE_STATUS[CVE-2024-27434] = "fixed-version: Fixed from version 6.9" | ||
6315 | |||
6316 | CVE_STATUS[CVE-2024-27435] = "fixed-version: Fixed from version 6.9" | ||
6317 | |||
6318 | CVE_STATUS[CVE-2024-27436] = "fixed-version: Fixed from version 6.9" | ||
6319 | |||
6320 | CVE_STATUS[CVE-2024-27437] = "fixed-version: Fixed from version 6.9" | ||
6321 | |||
6322 | CVE_STATUS[CVE-2024-31076] = "fixed-version: Fixed from version 6.10" | ||
6323 | |||
6324 | CVE_STATUS[CVE-2024-32936] = "fixed-version: Fixed from version 6.10" | ||
6325 | |||
6326 | CVE_STATUS[CVE-2024-33619] = "fixed-version: Fixed from version 6.10" | ||
6327 | |||
6328 | CVE_STATUS[CVE-2024-33621] = "fixed-version: Fixed from version 6.10" | ||
6329 | |||
6330 | CVE_STATUS[CVE-2024-33847] = "fixed-version: Fixed from version 6.10" | ||
6331 | |||
6332 | CVE_STATUS[CVE-2024-34027] = "fixed-version: Fixed from version 6.10" | ||
6333 | |||
6334 | CVE_STATUS[CVE-2024-34030] = "fixed-version: Fixed from version 6.10" | ||
6335 | |||
6336 | CVE_STATUS[CVE-2024-34777] = "fixed-version: Fixed from version 6.10" | ||
6337 | |||
6338 | CVE_STATUS[CVE-2024-35247] = "fixed-version: Fixed from version 6.10" | ||
6339 | |||
6340 | CVE_STATUS[CVE-2024-35784] = "fixed-version: Fixed from version 6.8" | ||
6341 | |||
6342 | CVE_STATUS[CVE-2024-35785] = "fixed-version: Fixed from version 6.8" | ||
6343 | |||
6344 | CVE_STATUS[CVE-2024-35786] = "fixed-version: Fixed from version 6.8" | ||
6345 | |||
6346 | CVE_STATUS[CVE-2024-35787] = "fixed-version: Fixed from version 6.9" | ||
6347 | |||
6348 | # CVE-2024-35788 has no known resolution | ||
6349 | |||
6350 | CVE_STATUS[CVE-2024-35789] = "fixed-version: Fixed from version 6.9" | ||
6351 | |||
6352 | CVE_STATUS[CVE-2024-35790] = "fixed-version: Fixed from version 6.8" | ||
6353 | |||
6354 | CVE_STATUS[CVE-2024-35791] = "fixed-version: Fixed from version 6.8" | ||
6355 | |||
6356 | CVE_STATUS[CVE-2024-35792] = "fixed-version: Fixed from version 6.8" | ||
6357 | |||
6358 | CVE_STATUS[CVE-2024-35793] = "fixed-version: Fixed from version 6.9" | ||
6359 | |||
6360 | CVE_STATUS[CVE-2024-35794] = "fixed-version: Fixed from version 6.9" | ||
6361 | |||
6362 | CVE_STATUS[CVE-2024-35795] = "fixed-version: Fixed from version 6.9" | ||
6363 | |||
6364 | CVE_STATUS[CVE-2024-35796] = "fixed-version: Fixed from version 6.9" | ||
6365 | |||
6366 | CVE_STATUS[CVE-2024-35797] = "fixed-version: Fixed from version 6.9" | ||
6367 | |||
6368 | CVE_STATUS[CVE-2024-35798] = "fixed-version: Fixed from version 6.9" | ||
6369 | |||
6370 | CVE_STATUS[CVE-2024-35799] = "fixed-version: Fixed from version 6.9" | ||
6371 | |||
6372 | CVE_STATUS[CVE-2024-35800] = "fixed-version: Fixed from version 6.9" | ||
6373 | |||
6374 | CVE_STATUS[CVE-2024-35801] = "fixed-version: Fixed from version 6.9" | ||
6375 | |||
6376 | CVE_STATUS[CVE-2024-35803] = "fixed-version: Fixed from version 6.9" | ||
6377 | |||
6378 | CVE_STATUS[CVE-2024-35804] = "fixed-version: Fixed from version 6.8" | ||
6379 | |||
6380 | CVE_STATUS[CVE-2024-35805] = "fixed-version: Fixed from version 6.9" | ||
6381 | |||
6382 | CVE_STATUS[CVE-2024-35806] = "fixed-version: Fixed from version 6.9" | ||
6383 | |||
6384 | CVE_STATUS[CVE-2024-35807] = "fixed-version: Fixed from version 6.9" | ||
6385 | |||
6386 | CVE_STATUS[CVE-2024-35808] = "fixed-version: Fixed from version 6.9" | ||
6387 | |||
6388 | CVE_STATUS[CVE-2024-35809] = "fixed-version: Fixed from version 6.9" | ||
6389 | |||
6390 | CVE_STATUS[CVE-2024-35810] = "fixed-version: Fixed from version 6.9" | ||
6391 | |||
6392 | CVE_STATUS[CVE-2024-35811] = "fixed-version: Fixed from version 6.9" | ||
6393 | |||
6394 | CVE_STATUS[CVE-2024-35813] = "fixed-version: Fixed from version 6.9" | ||
6395 | |||
6396 | CVE_STATUS[CVE-2024-35814] = "fixed-version: Fixed from version 6.9" | ||
6397 | |||
6398 | CVE_STATUS[CVE-2024-35815] = "fixed-version: Fixed from version 6.7.12" | ||
6399 | |||
6400 | CVE_STATUS[CVE-2024-35816] = "fixed-version: Fixed from version 6.8" | ||
6401 | |||
6402 | CVE_STATUS[CVE-2024-35817] = "fixed-version: Fixed from version 6.9" | ||
6403 | |||
6404 | CVE_STATUS[CVE-2024-35818] = "fixed-version: Fixed from version 6.9" | ||
6405 | |||
6406 | CVE_STATUS[CVE-2024-35819] = "fixed-version: Fixed from version 6.9" | ||
6407 | |||
6408 | CVE_STATUS[CVE-2024-35821] = "fixed-version: Fixed from version 6.9" | ||
6409 | |||
6410 | CVE_STATUS[CVE-2024-35822] = "fixed-version: Fixed from version 6.9" | ||
6411 | |||
6412 | CVE_STATUS[CVE-2024-35823] = "fixed-version: Fixed from version 6.8" | ||
6413 | |||
6414 | CVE_STATUS[CVE-2024-35824] = "fixed-version: Fixed from version 6.7.12" | ||
6415 | |||
6416 | CVE_STATUS[CVE-2024-35825] = "fixed-version: Fixed from version 6.8" | ||
6417 | |||
6418 | CVE_STATUS[CVE-2024-35826] = "fixed-version: Fixed from version 6.9" | ||
6419 | |||
6420 | CVE_STATUS[CVE-2024-35827] = "fixed-version: Fixed from version 6.9" | ||
6421 | |||
6422 | CVE_STATUS[CVE-2024-35828] = "fixed-version: Fixed from version 6.9" | ||
6423 | |||
6424 | CVE_STATUS[CVE-2024-35829] = "fixed-version: Fixed from version 6.9" | ||
6425 | |||
6426 | CVE_STATUS[CVE-2024-35830] = "fixed-version: Fixed from version 6.9" | ||
6427 | |||
6428 | CVE_STATUS[CVE-2024-35831] = "fixed-version: Fixed from version 6.9" | ||
6429 | |||
6430 | CVE_STATUS[CVE-2024-35832] = "fixed-version: Fixed from version 6.8" | ||
6431 | |||
6432 | CVE_STATUS[CVE-2024-35833] = "fixed-version: Fixed from version 6.8" | ||
6433 | |||
6434 | CVE_STATUS[CVE-2024-35834] = "fixed-version: Fixed from version 6.8" | ||
6435 | |||
6436 | CVE_STATUS[CVE-2024-35835] = "fixed-version: Fixed from version 6.8" | ||
6437 | |||
6438 | CVE_STATUS[CVE-2024-35836] = "fixed-version: Fixed from version 6.8" | ||
6439 | |||
6440 | CVE_STATUS[CVE-2024-35837] = "fixed-version: Fixed from version 6.8" | ||
6441 | |||
6442 | CVE_STATUS[CVE-2024-35838] = "fixed-version: Fixed from version 6.8" | ||
6443 | |||
6444 | CVE_STATUS[CVE-2024-35839] = "fixed-version: Fixed from version 6.8" | ||
6445 | |||
6446 | CVE_STATUS[CVE-2024-35840] = "fixed-version: Fixed from version 6.8" | ||
6447 | |||
6448 | CVE_STATUS[CVE-2024-35841] = "fixed-version: Fixed from version 6.8" | ||
6449 | |||
6450 | CVE_STATUS[CVE-2024-35842] = "fixed-version: Fixed from version 6.8" | ||
6451 | |||
6452 | CVE_STATUS[CVE-2024-35843] = "fixed-version: Fixed from version 6.9" | ||
6453 | |||
6454 | CVE_STATUS[CVE-2024-35844] = "fixed-version: Fixed from version 6.9" | ||
6455 | |||
6456 | CVE_STATUS[CVE-2024-35845] = "fixed-version: Fixed from version 6.9" | ||
6457 | |||
6458 | CVE_STATUS[CVE-2024-35846] = "fixed-version: Fixed from version 6.9" | ||
6459 | |||
6460 | CVE_STATUS[CVE-2024-35847] = "fixed-version: Fixed from version 6.9" | ||
6461 | |||
6462 | CVE_STATUS[CVE-2024-35848] = "fixed-version: Fixed from version 6.9" | ||
6463 | |||
6464 | CVE_STATUS[CVE-2024-35849] = "fixed-version: Fixed from version 6.9" | ||
6465 | |||
6466 | CVE_STATUS[CVE-2024-35850] = "fixed-version: Fixed from version 6.9" | ||
6467 | |||
6468 | CVE_STATUS[CVE-2024-35851] = "fixed-version: Fixed from version 6.9" | ||
6469 | |||
6470 | CVE_STATUS[CVE-2024-35852] = "fixed-version: Fixed from version 6.9" | ||
6471 | |||
6472 | CVE_STATUS[CVE-2024-35853] = "fixed-version: Fixed from version 6.9" | ||
6473 | |||
6474 | CVE_STATUS[CVE-2024-35854] = "fixed-version: Fixed from version 6.9" | ||
6475 | |||
6476 | CVE_STATUS[CVE-2024-35855] = "fixed-version: Fixed from version 6.9" | ||
6477 | |||
6478 | CVE_STATUS[CVE-2024-35856] = "fixed-version: Fixed from version 6.9" | ||
6479 | |||
6480 | CVE_STATUS[CVE-2024-35857] = "fixed-version: Fixed from version 6.9" | ||
6481 | |||
6482 | CVE_STATUS[CVE-2024-35858] = "fixed-version: Fixed from version 6.9" | ||
6483 | |||
6484 | CVE_STATUS[CVE-2024-35859] = "fixed-version: Fixed from version 6.9" | ||
6485 | |||
6486 | CVE_STATUS[CVE-2024-35860] = "fixed-version: Fixed from version 6.9" | ||
6487 | |||
6488 | CVE_STATUS[CVE-2024-35861] = "fixed-version: Fixed from version 6.9" | ||
6489 | |||
6490 | CVE_STATUS[CVE-2024-35862] = "fixed-version: Fixed from version 6.9" | ||
6491 | |||
6492 | CVE_STATUS[CVE-2024-35863] = "fixed-version: Fixed from version 6.9" | ||
6493 | |||
6494 | CVE_STATUS[CVE-2024-35864] = "fixed-version: Fixed from version 6.9" | ||
6495 | |||
6496 | CVE_STATUS[CVE-2024-35865] = "fixed-version: Fixed from version 6.9" | ||
6497 | |||
6498 | CVE_STATUS[CVE-2024-35866] = "fixed-version: Fixed from version 6.9" | ||
6499 | |||
6500 | CVE_STATUS[CVE-2024-35867] = "fixed-version: Fixed from version 6.9" | ||
6501 | |||
6502 | CVE_STATUS[CVE-2024-35868] = "fixed-version: Fixed from version 6.9" | ||
6503 | |||
6504 | CVE_STATUS[CVE-2024-35869] = "fixed-version: Fixed from version 6.9" | ||
6505 | |||
6506 | CVE_STATUS[CVE-2024-35870] = "fixed-version: Fixed from version 6.9" | ||
6507 | |||
6508 | CVE_STATUS[CVE-2024-35871] = "fixed-version: Fixed from version 6.9" | ||
6509 | |||
6510 | CVE_STATUS[CVE-2024-35872] = "fixed-version: Fixed from version 6.9" | ||
6511 | |||
6512 | CVE_STATUS[CVE-2024-35873] = "fixed-version: Fixed from version 6.9" | ||
6513 | |||
6514 | CVE_STATUS[CVE-2024-35874] = "fixed-version: Fixed from version 6.9" | ||
6515 | |||
6516 | CVE_STATUS[CVE-2024-35875] = "fixed-version: Fixed from version 6.9" | ||
6517 | |||
6518 | CVE_STATUS[CVE-2024-35877] = "fixed-version: Fixed from version 6.9" | ||
6519 | |||
6520 | CVE_STATUS[CVE-2024-35878] = "fixed-version: Fixed from version 6.9" | ||
6521 | |||
6522 | CVE_STATUS[CVE-2024-35879] = "fixed-version: Fixed from version 6.9" | ||
6523 | |||
6524 | CVE_STATUS[CVE-2024-35880] = "fixed-version: Fixed from version 6.9" | ||
6525 | |||
6526 | CVE_STATUS[CVE-2024-35882] = "fixed-version: Fixed from version 6.9" | ||
6527 | |||
6528 | CVE_STATUS[CVE-2024-35883] = "fixed-version: Fixed from version 6.9" | ||
6529 | |||
6530 | CVE_STATUS[CVE-2024-35884] = "fixed-version: Fixed from version 6.9" | ||
6531 | |||
6532 | CVE_STATUS[CVE-2024-35885] = "fixed-version: Fixed from version 6.9" | ||
6533 | |||
6534 | CVE_STATUS[CVE-2024-35886] = "fixed-version: Fixed from version 6.9" | ||
6535 | |||
6536 | CVE_STATUS[CVE-2024-35887] = "fixed-version: Fixed from version 6.9" | ||
6537 | |||
6538 | CVE_STATUS[CVE-2024-35888] = "fixed-version: Fixed from version 6.9" | ||
6539 | |||
6540 | CVE_STATUS[CVE-2024-35889] = "fixed-version: Fixed from version 6.9" | ||
6541 | |||
6542 | CVE_STATUS[CVE-2024-35890] = "fixed-version: Fixed from version 6.9" | ||
6543 | |||
6544 | CVE_STATUS[CVE-2024-35891] = "fixed-version: Fixed from version 6.9" | ||
6545 | |||
6546 | CVE_STATUS[CVE-2024-35892] = "fixed-version: Fixed from version 6.9" | ||
6547 | |||
6548 | CVE_STATUS[CVE-2024-35893] = "fixed-version: Fixed from version 6.9" | ||
6549 | |||
6550 | CVE_STATUS[CVE-2024-35894] = "fixed-version: Fixed from version 6.9" | ||
6551 | |||
6552 | CVE_STATUS[CVE-2024-35895] = "fixed-version: Fixed from version 6.9" | ||
6553 | |||
6554 | CVE_STATUS[CVE-2024-35896] = "fixed-version: Fixed from version 6.9" | ||
6555 | |||
6556 | CVE_STATUS[CVE-2024-35897] = "fixed-version: Fixed from version 6.9" | ||
6557 | |||
6558 | CVE_STATUS[CVE-2024-35898] = "fixed-version: Fixed from version 6.9" | ||
6559 | |||
6560 | CVE_STATUS[CVE-2024-35899] = "fixed-version: Fixed from version 6.9" | ||
6561 | |||
6562 | CVE_STATUS[CVE-2024-35900] = "fixed-version: Fixed from version 6.9" | ||
6563 | |||
6564 | CVE_STATUS[CVE-2024-35901] = "fixed-version: Fixed from version 6.9" | ||
6565 | |||
6566 | CVE_STATUS[CVE-2024-35902] = "fixed-version: Fixed from version 6.9" | ||
6567 | |||
6568 | CVE_STATUS[CVE-2024-35903] = "fixed-version: Fixed from version 6.9" | ||
6569 | |||
6570 | CVE_STATUS[CVE-2024-35904] = "fixed-version: Fixed from version 6.9" | ||
6571 | |||
6572 | CVE_STATUS[CVE-2024-35905] = "fixed-version: Fixed from version 6.9" | ||
6573 | |||
6574 | CVE_STATUS[CVE-2024-35907] = "fixed-version: Fixed from version 6.9" | ||
6575 | |||
6576 | CVE_STATUS[CVE-2024-35908] = "fixed-version: Fixed from version 6.9" | ||
6577 | |||
6578 | CVE_STATUS[CVE-2024-35909] = "fixed-version: Fixed from version 6.9" | ||
6579 | |||
6580 | CVE_STATUS[CVE-2024-35910] = "fixed-version: Fixed from version 6.9" | ||
6581 | |||
6582 | CVE_STATUS[CVE-2024-35911] = "fixed-version: Fixed from version 6.9" | ||
6583 | |||
6584 | CVE_STATUS[CVE-2024-35912] = "fixed-version: Fixed from version 6.9" | ||
6585 | |||
6586 | CVE_STATUS[CVE-2024-35913] = "fixed-version: Fixed from version 6.9" | ||
6587 | |||
6588 | CVE_STATUS[CVE-2024-35914] = "fixed-version: Fixed from version 6.9" | ||
6589 | |||
6590 | CVE_STATUS[CVE-2024-35915] = "fixed-version: Fixed from version 6.9" | ||
6591 | |||
6592 | CVE_STATUS[CVE-2024-35916] = "fixed-version: Fixed from version 6.9" | ||
6593 | |||
6594 | CVE_STATUS[CVE-2024-35917] = "fixed-version: Fixed from version 6.9" | ||
6595 | |||
6596 | CVE_STATUS[CVE-2024-35919] = "fixed-version: Fixed from version 6.9" | ||
6597 | |||
6598 | CVE_STATUS[CVE-2024-35920] = "fixed-version: Fixed from version 6.9" | ||
6599 | |||
6600 | CVE_STATUS[CVE-2024-35921] = "fixed-version: Fixed from version 6.9" | ||
6601 | |||
6602 | CVE_STATUS[CVE-2024-35922] = "fixed-version: Fixed from version 6.9" | ||
6603 | |||
6604 | CVE_STATUS[CVE-2024-35924] = "fixed-version: Fixed from version 6.9" | ||
6605 | |||
6606 | CVE_STATUS[CVE-2024-35925] = "fixed-version: Fixed from version 6.9" | ||
6607 | |||
6608 | CVE_STATUS[CVE-2024-35926] = "fixed-version: Fixed from version 6.9" | ||
6609 | |||
6610 | CVE_STATUS[CVE-2024-35927] = "fixed-version: Fixed from version 6.9" | ||
6611 | |||
6612 | CVE_STATUS[CVE-2024-35929] = "fixed-version: Fixed from version 6.9" | ||
6613 | |||
6614 | CVE_STATUS[CVE-2024-35930] = "fixed-version: Fixed from version 6.9" | ||
6615 | |||
6616 | CVE_STATUS[CVE-2024-35931] = "fixed-version: Fixed from version 6.9" | ||
6617 | |||
6618 | CVE_STATUS[CVE-2024-35932] = "fixed-version: Fixed from version 6.9" | ||
6619 | |||
6620 | CVE_STATUS[CVE-2024-35933] = "fixed-version: Fixed from version 6.9" | ||
6621 | |||
6622 | CVE_STATUS[CVE-2024-35934] = "fixed-version: Fixed from version 6.9" | ||
6623 | |||
6624 | CVE_STATUS[CVE-2024-35935] = "fixed-version: Fixed from version 6.9" | ||
6625 | |||
6626 | CVE_STATUS[CVE-2024-35936] = "fixed-version: Fixed from version 6.9" | ||
6627 | |||
6628 | CVE_STATUS[CVE-2024-35937] = "fixed-version: Fixed from version 6.9" | ||
6629 | |||
6630 | CVE_STATUS[CVE-2024-35938] = "fixed-version: Fixed from version 6.9" | ||
6631 | |||
6632 | CVE_STATUS[CVE-2024-35939] = "fixed-version: Fixed from version 6.9" | ||
6633 | |||
6634 | CVE_STATUS[CVE-2024-35940] = "fixed-version: Fixed from version 6.9" | ||
6635 | |||
6636 | CVE_STATUS[CVE-2024-35942] = "fixed-version: Fixed from version 6.9" | ||
6637 | |||
6638 | CVE_STATUS[CVE-2024-35943] = "fixed-version: Fixed from version 6.9" | ||
6639 | |||
6640 | CVE_STATUS[CVE-2024-35944] = "fixed-version: Fixed from version 6.9" | ||
6641 | |||
6642 | CVE_STATUS[CVE-2024-35945] = "fixed-version: Fixed from version 6.9" | ||
6643 | |||
6644 | CVE_STATUS[CVE-2024-35946] = "fixed-version: Fixed from version 6.9" | ||
6645 | |||
6646 | CVE_STATUS[CVE-2024-35947] = "fixed-version: Fixed from version 6.9" | ||
6647 | |||
6648 | CVE_STATUS[CVE-2024-35948] = "fixed-version: Fixed from version 6.9" | ||
6649 | |||
6650 | CVE_STATUS[CVE-2024-35949] = "fixed-version: Fixed from version 6.9" | ||
6651 | |||
6652 | CVE_STATUS[CVE-2024-35950] = "fixed-version: Fixed from version 6.9" | ||
6653 | |||
6654 | CVE_STATUS[CVE-2024-35951] = "fixed-version: Fixed from version 6.9" | ||
6655 | |||
6656 | CVE_STATUS[CVE-2024-35952] = "fixed-version: Fixed from version 6.9" | ||
6657 | |||
6658 | CVE_STATUS[CVE-2024-35953] = "fixed-version: Fixed from version 6.9" | ||
6659 | |||
6660 | CVE_STATUS[CVE-2024-35954] = "fixed-version: Fixed from version 6.9" | ||
6661 | |||
6662 | CVE_STATUS[CVE-2024-35955] = "fixed-version: Fixed from version 6.9" | ||
6663 | |||
6664 | CVE_STATUS[CVE-2024-35956] = "fixed-version: Fixed from version 6.9" | ||
6665 | |||
6666 | CVE_STATUS[CVE-2024-35957] = "fixed-version: Fixed from version 6.8.7" | ||
6667 | |||
6668 | CVE_STATUS[CVE-2024-35958] = "fixed-version: Fixed from version 6.9" | ||
6669 | |||
6670 | CVE_STATUS[CVE-2024-35959] = "fixed-version: Fixed from version 6.9" | ||
6671 | |||
6672 | CVE_STATUS[CVE-2024-35960] = "fixed-version: Fixed from version 6.9" | ||
6673 | |||
6674 | CVE_STATUS[CVE-2024-35961] = "fixed-version: Fixed from version 6.9" | ||
6675 | |||
6676 | CVE_STATUS[CVE-2024-35962] = "fixed-version: Fixed from version 6.8.7" | ||
6677 | |||
6678 | CVE_STATUS[CVE-2024-35963] = "fixed-version: Fixed from version 6.9" | ||
6679 | |||
6680 | CVE_STATUS[CVE-2024-35964] = "fixed-version: Fixed from version 6.9" | ||
6681 | |||
6682 | CVE_STATUS[CVE-2024-35965] = "fixed-version: Fixed from version 6.9" | ||
6683 | |||
6684 | CVE_STATUS[CVE-2024-35966] = "fixed-version: Fixed from version 6.9" | ||
6685 | |||
6686 | CVE_STATUS[CVE-2024-35967] = "fixed-version: Fixed from version 6.9" | ||
6687 | |||
6688 | CVE_STATUS[CVE-2024-35968] = "fixed-version: Fixed from version 6.9" | ||
6689 | |||
6690 | CVE_STATUS[CVE-2024-35969] = "fixed-version: Fixed from version 6.9" | ||
6691 | |||
6692 | CVE_STATUS[CVE-2024-35970] = "fixed-version: Fixed from version 6.9" | ||
6693 | |||
6694 | CVE_STATUS[CVE-2024-35971] = "fixed-version: Fixed from version 6.9" | ||
6695 | |||
6696 | CVE_STATUS[CVE-2024-35972] = "fixed-version: Fixed from version 6.9" | ||
6697 | |||
6698 | CVE_STATUS[CVE-2024-35973] = "fixed-version: Fixed from version 6.9" | ||
6699 | |||
6700 | CVE_STATUS[CVE-2024-35974] = "fixed-version: Fixed from version 6.9" | ||
6701 | |||
6702 | CVE_STATUS[CVE-2024-35975] = "fixed-version: Fixed from version 6.9" | ||
6703 | |||
6704 | CVE_STATUS[CVE-2024-35976] = "fixed-version: Fixed from version 6.9" | ||
6705 | |||
6706 | CVE_STATUS[CVE-2024-35977] = "fixed-version: Fixed from version 6.9" | ||
6707 | |||
6708 | CVE_STATUS[CVE-2024-35978] = "fixed-version: Fixed from version 6.9" | ||
6709 | |||
6710 | CVE_STATUS[CVE-2024-35979] = "fixed-version: Fixed from version 6.9" | ||
6711 | |||
6712 | CVE_STATUS[CVE-2024-35980] = "fixed-version: Fixed from version 6.9" | ||
6713 | |||
6714 | CVE_STATUS[CVE-2024-35981] = "fixed-version: Fixed from version 6.9" | ||
6715 | |||
6716 | CVE_STATUS[CVE-2024-35982] = "fixed-version: Fixed from version 6.9" | ||
6717 | |||
6718 | CVE_STATUS[CVE-2024-35983] = "fixed-version: Fixed from version 6.8.9" | ||
6719 | |||
6720 | CVE_STATUS[CVE-2024-35984] = "fixed-version: Fixed from version 6.9" | ||
6721 | |||
6722 | CVE_STATUS[CVE-2024-35985] = "fixed-version: Fixed from version 6.9" | ||
6723 | |||
6724 | CVE_STATUS[CVE-2024-35986] = "fixed-version: Fixed from version 6.9" | ||
6725 | |||
6726 | CVE_STATUS[CVE-2024-35987] = "fixed-version: Fixed from version 6.9" | ||
6727 | |||
6728 | CVE_STATUS[CVE-2024-35988] = "fixed-version: Fixed from version 6.9" | ||
6729 | |||
6730 | CVE_STATUS[CVE-2024-35989] = "fixed-version: Fixed from version 6.9" | ||
6731 | |||
6732 | CVE_STATUS[CVE-2024-35990] = "fixed-version: Fixed from version 6.9" | ||
6733 | |||
6734 | CVE_STATUS[CVE-2024-35991] = "fixed-version: Fixed from version 6.9" | ||
6735 | |||
6736 | CVE_STATUS[CVE-2024-35992] = "fixed-version: Fixed from version 6.9" | ||
6737 | |||
6738 | CVE_STATUS[CVE-2024-35993] = "fixed-version: Fixed from version 6.9" | ||
6739 | |||
6740 | CVE_STATUS[CVE-2024-35994] = "fixed-version: Fixed from version 6.9" | ||
6741 | |||
6742 | CVE_STATUS[CVE-2024-35995] = "fixed-version: Fixed from version 6.9" | ||
6743 | |||
6744 | CVE_STATUS[CVE-2024-35996] = "fixed-version: Fixed from version 6.8.9" | ||
6745 | |||
6746 | CVE_STATUS[CVE-2024-35997] = "fixed-version: Fixed from version 6.9" | ||
6747 | |||
6748 | CVE_STATUS[CVE-2024-35998] = "fixed-version: Fixed from version 6.9" | ||
6749 | |||
6750 | CVE_STATUS[CVE-2024-35999] = "fixed-version: Fixed from version 6.9" | ||
6751 | |||
6752 | CVE_STATUS[CVE-2024-36000] = "fixed-version: Fixed from version 6.9" | ||
6753 | |||
6754 | CVE_STATUS[CVE-2024-36001] = "fixed-version: Fixed from version 6.9" | ||
6755 | |||
6756 | CVE_STATUS[CVE-2024-36002] = "fixed-version: Fixed from version 6.8.9" | ||
6757 | |||
6758 | CVE_STATUS[CVE-2024-36003] = "fixed-version: Fixed from version 6.9" | ||
6759 | |||
6760 | CVE_STATUS[CVE-2024-36004] = "fixed-version: Fixed from version 6.9" | ||
6761 | |||
6762 | CVE_STATUS[CVE-2024-36005] = "fixed-version: Fixed from version 6.9" | ||
6763 | |||
6764 | CVE_STATUS[CVE-2024-36006] = "fixed-version: Fixed from version 6.9" | ||
6765 | |||
6766 | CVE_STATUS[CVE-2024-36007] = "fixed-version: Fixed from version 6.9" | ||
6767 | |||
6768 | CVE_STATUS[CVE-2024-36008] = "fixed-version: Fixed from version 6.9" | ||
6769 | |||
6770 | CVE_STATUS[CVE-2024-36009] = "fixed-version: Fixed from version 6.9" | ||
6771 | |||
6772 | CVE_STATUS[CVE-2024-36010] = "fixed-version: Fixed from version 6.8" | ||
6773 | |||
6774 | CVE_STATUS[CVE-2024-36011] = "fixed-version: Fixed from version 6.9" | ||
6775 | |||
6776 | CVE_STATUS[CVE-2024-36012] = "fixed-version: Fixed from version 6.9" | ||
6777 | |||
6778 | CVE_STATUS[CVE-2024-36013] = "fixed-version: Fixed from version 6.9" | ||
6779 | |||
6780 | CVE_STATUS[CVE-2024-36014] = "fixed-version: Fixed from version 6.10" | ||
6781 | |||
6782 | CVE_STATUS[CVE-2024-36015] = "fixed-version: Fixed from version 6.10" | ||
6783 | |||
6784 | CVE_STATUS[CVE-2024-36016] = "fixed-version: Fixed from version 6.10" | ||
6785 | |||
6786 | CVE_STATUS[CVE-2024-36017] = "fixed-version: Fixed from version 6.9" | ||
6787 | |||
6788 | CVE_STATUS[CVE-2024-36018] = "fixed-version: Fixed from version 6.9" | ||
6789 | |||
6790 | CVE_STATUS[CVE-2024-36019] = "fixed-version: Fixed from version 6.9" | ||
6791 | |||
6792 | CVE_STATUS[CVE-2024-36020] = "fixed-version: Fixed from version 6.9" | ||
6793 | |||
6794 | CVE_STATUS[CVE-2024-36021] = "fixed-version: Fixed from version 6.9" | ||
6795 | |||
6796 | CVE_STATUS[CVE-2024-36022] = "fixed-version: Fixed from version 6.9" | ||
6797 | |||
6798 | CVE_STATUS[CVE-2024-36023] = "fixed-version: Fixed from version 6.9" | ||
6799 | |||
6800 | CVE_STATUS[CVE-2024-36024] = "fixed-version: Fixed from version 6.9" | ||
6801 | |||
6802 | CVE_STATUS[CVE-2024-36025] = "fixed-version: Fixed from version 6.9" | ||
6803 | |||
6804 | CVE_STATUS[CVE-2024-36026] = "fixed-version: Fixed from version 6.9" | ||
6805 | |||
6806 | CVE_STATUS[CVE-2024-36027] = "fixed-version: Fixed from version 6.9" | ||
6807 | |||
6808 | CVE_STATUS[CVE-2024-36028] = "fixed-version: Fixed from version 6.9" | ||
6809 | |||
6810 | CVE_STATUS[CVE-2024-36029] = "fixed-version: Fixed from version 6.9" | ||
6811 | |||
6812 | CVE_STATUS[CVE-2024-36030] = "fixed-version: Fixed from version 6.9" | ||
6813 | |||
6814 | CVE_STATUS[CVE-2024-36031] = "fixed-version: Fixed from version 6.10" | ||
6815 | |||
6816 | CVE_STATUS[CVE-2024-36032] = "fixed-version: Fixed from version 6.9" | ||
6817 | |||
6818 | CVE_STATUS[CVE-2024-36033] = "fixed-version: Fixed from version 6.9" | ||
6819 | |||
6820 | CVE_STATUS[CVE-2024-36244] = "fixed-version: Fixed from version 6.10" | ||
6821 | |||
6822 | CVE_STATUS[CVE-2024-36270] = "fixed-version: Fixed from version 6.10" | ||
6823 | |||
6824 | CVE_STATUS[CVE-2024-36281] = "fixed-version: Fixed from version 6.10" | ||
6825 | |||
6826 | CVE_STATUS[CVE-2024-36286] = "fixed-version: Fixed from version 6.10" | ||
6827 | |||
6828 | CVE_STATUS[CVE-2024-36288] = "fixed-version: Fixed from version 6.9.4" | ||
6829 | |||
6830 | CVE_STATUS[CVE-2024-36476] = "cpe-stable-backport: Backported in 6.12.9" | ||
6831 | |||
6832 | CVE_STATUS[CVE-2024-36477] = "fixed-version: Fixed from version 6.10" | ||
6833 | |||
6834 | CVE_STATUS[CVE-2024-36478] = "fixed-version: Fixed from version 6.10" | ||
6835 | |||
6836 | CVE_STATUS[CVE-2024-36479] = "fixed-version: Fixed from version 6.10" | ||
6837 | |||
6838 | CVE_STATUS[CVE-2024-36481] = "fixed-version: Fixed from version 6.10" | ||
6839 | |||
6840 | CVE_STATUS[CVE-2024-36484] = "fixed-version: Fixed from version 6.10" | ||
6841 | |||
6842 | CVE_STATUS[CVE-2024-36489] = "fixed-version: Fixed from version 6.10" | ||
6843 | |||
6844 | CVE_STATUS[CVE-2024-36880] = "fixed-version: Fixed from version 6.9" | ||
6845 | |||
6846 | CVE_STATUS[CVE-2024-36881] = "fixed-version: Fixed from version 6.9" | ||
6847 | |||
6848 | CVE_STATUS[CVE-2024-36882] = "fixed-version: Fixed from version 6.9" | ||
6849 | |||
6850 | CVE_STATUS[CVE-2024-36883] = "fixed-version: Fixed from version 6.9" | ||
6851 | |||
6852 | CVE_STATUS[CVE-2024-36884] = "fixed-version: Fixed from version 6.9" | ||
6853 | |||
6854 | CVE_STATUS[CVE-2024-36886] = "fixed-version: Fixed from version 6.9" | ||
6855 | |||
6856 | CVE_STATUS[CVE-2024-36887] = "fixed-version: Fixed from version 6.8.10" | ||
6857 | |||
6858 | CVE_STATUS[CVE-2024-36888] = "fixed-version: Fixed from version 6.9" | ||
6859 | |||
6860 | CVE_STATUS[CVE-2024-36889] = "fixed-version: Fixed from version 6.9" | ||
6861 | |||
6862 | CVE_STATUS[CVE-2024-36890] = "fixed-version: Fixed from version 6.9" | ||
6863 | |||
6864 | CVE_STATUS[CVE-2024-36891] = "fixed-version: Fixed from version 6.9" | ||
6865 | |||
6866 | CVE_STATUS[CVE-2024-36892] = "fixed-version: Fixed from version 6.9" | ||
6867 | |||
6868 | CVE_STATUS[CVE-2024-36893] = "fixed-version: Fixed from version 6.9" | ||
6869 | |||
6870 | CVE_STATUS[CVE-2024-36894] = "fixed-version: Fixed from version 6.9" | ||
6871 | |||
6872 | CVE_STATUS[CVE-2024-36895] = "fixed-version: Fixed from version 6.9" | ||
6873 | |||
6874 | CVE_STATUS[CVE-2024-36896] = "fixed-version: Fixed from version 6.9" | ||
6875 | |||
6876 | CVE_STATUS[CVE-2024-36897] = "fixed-version: Fixed from version 6.9" | ||
6877 | |||
6878 | CVE_STATUS[CVE-2024-36898] = "fixed-version: Fixed from version 6.9" | ||
6879 | |||
6880 | CVE_STATUS[CVE-2024-36899] = "fixed-version: Fixed from version 6.9" | ||
6881 | |||
6882 | CVE_STATUS[CVE-2024-36900] = "fixed-version: Fixed from version 6.9" | ||
6883 | |||
6884 | CVE_STATUS[CVE-2024-36901] = "fixed-version: Fixed from version 6.9" | ||
6885 | |||
6886 | CVE_STATUS[CVE-2024-36902] = "fixed-version: Fixed from version 6.9" | ||
6887 | |||
6888 | CVE_STATUS[CVE-2024-36903] = "fixed-version: Fixed from version 6.9" | ||
6889 | |||
6890 | CVE_STATUS[CVE-2024-36904] = "fixed-version: Fixed from version 6.9" | ||
6891 | |||
6892 | CVE_STATUS[CVE-2024-36905] = "fixed-version: Fixed from version 6.9" | ||
6893 | |||
6894 | CVE_STATUS[CVE-2024-36906] = "fixed-version: Fixed from version 6.9" | ||
6895 | |||
6896 | CVE_STATUS[CVE-2024-36908] = "fixed-version: Fixed from version 6.9" | ||
6897 | |||
6898 | CVE_STATUS[CVE-2024-36909] = "fixed-version: Fixed from version 6.9" | ||
6899 | |||
6900 | CVE_STATUS[CVE-2024-36910] = "fixed-version: Fixed from version 6.9" | ||
6901 | |||
6902 | CVE_STATUS[CVE-2024-36911] = "fixed-version: Fixed from version 6.9" | ||
6903 | |||
6904 | CVE_STATUS[CVE-2024-36912] = "fixed-version: Fixed from version 6.9" | ||
6905 | |||
6906 | CVE_STATUS[CVE-2024-36913] = "fixed-version: Fixed from version 6.9" | ||
6907 | |||
6908 | CVE_STATUS[CVE-2024-36914] = "fixed-version: Fixed from version 6.9" | ||
6909 | |||
6910 | CVE_STATUS[CVE-2024-36915] = "fixed-version: Fixed from version 6.9" | ||
6911 | |||
6912 | CVE_STATUS[CVE-2024-36916] = "fixed-version: Fixed from version 6.9" | ||
6913 | |||
6914 | CVE_STATUS[CVE-2024-36917] = "fixed-version: Fixed from version 6.9" | ||
6915 | |||
6916 | CVE_STATUS[CVE-2024-36918] = "fixed-version: Fixed from version 6.9" | ||
6917 | |||
6918 | CVE_STATUS[CVE-2024-36919] = "fixed-version: Fixed from version 6.9" | ||
6919 | |||
6920 | CVE_STATUS[CVE-2024-36920] = "fixed-version: Fixed from version 6.9" | ||
6921 | |||
6922 | CVE_STATUS[CVE-2024-36921] = "fixed-version: Fixed from version 6.9" | ||
6923 | |||
6924 | CVE_STATUS[CVE-2024-36922] = "fixed-version: Fixed from version 6.9" | ||
6925 | |||
6926 | CVE_STATUS[CVE-2024-36923] = "fixed-version: Fixed from version 6.9" | ||
6927 | |||
6928 | CVE_STATUS[CVE-2024-36924] = "fixed-version: Fixed from version 6.9" | ||
6929 | |||
6930 | CVE_STATUS[CVE-2024-36925] = "fixed-version: Fixed from version 6.9" | ||
6931 | |||
6932 | CVE_STATUS[CVE-2024-36926] = "fixed-version: Fixed from version 6.9" | ||
6933 | |||
6934 | CVE_STATUS[CVE-2024-36927] = "fixed-version: Fixed from version 6.9" | ||
6935 | |||
6936 | CVE_STATUS[CVE-2024-36928] = "fixed-version: Fixed from version 6.9" | ||
6937 | |||
6938 | CVE_STATUS[CVE-2024-36929] = "fixed-version: Fixed from version 6.9" | ||
6939 | |||
6940 | CVE_STATUS[CVE-2024-36930] = "fixed-version: Fixed from version 6.9" | ||
6941 | |||
6942 | CVE_STATUS[CVE-2024-36931] = "fixed-version: Fixed from version 6.9" | ||
6943 | |||
6944 | CVE_STATUS[CVE-2024-36932] = "fixed-version: Fixed from version 6.9" | ||
6945 | |||
6946 | CVE_STATUS[CVE-2024-36933] = "fixed-version: Fixed from version 6.9" | ||
6947 | |||
6948 | CVE_STATUS[CVE-2024-36934] = "fixed-version: Fixed from version 6.9" | ||
6949 | |||
6950 | CVE_STATUS[CVE-2024-36935] = "fixed-version: Fixed from version 6.9" | ||
6951 | |||
6952 | CVE_STATUS[CVE-2024-36936] = "fixed-version: Fixed from version 6.9" | ||
6953 | |||
6954 | CVE_STATUS[CVE-2024-36937] = "fixed-version: Fixed from version 6.9" | ||
6955 | |||
6956 | CVE_STATUS[CVE-2024-36938] = "fixed-version: Fixed from version 6.9" | ||
6957 | |||
6958 | CVE_STATUS[CVE-2024-36939] = "fixed-version: Fixed from version 6.9" | ||
6959 | |||
6960 | CVE_STATUS[CVE-2024-36940] = "fixed-version: Fixed from version 6.9" | ||
6961 | |||
6962 | CVE_STATUS[CVE-2024-36941] = "fixed-version: Fixed from version 6.9" | ||
6963 | |||
6964 | CVE_STATUS[CVE-2024-36943] = "fixed-version: Fixed from version 6.9" | ||
6965 | |||
6966 | CVE_STATUS[CVE-2024-36944] = "fixed-version: Fixed from version 6.8.10" | ||
6967 | |||
6968 | CVE_STATUS[CVE-2024-36945] = "fixed-version: Fixed from version 6.9" | ||
6969 | |||
6970 | CVE_STATUS[CVE-2024-36946] = "fixed-version: Fixed from version 6.9" | ||
6971 | |||
6972 | CVE_STATUS[CVE-2024-36947] = "fixed-version: Fixed from version 6.9" | ||
6973 | |||
6974 | CVE_STATUS[CVE-2024-36948] = "fixed-version: Fixed from version 6.9" | ||
6975 | |||
6976 | CVE_STATUS[CVE-2024-36949] = "fixed-version: Fixed from version 6.9" | ||
6977 | |||
6978 | CVE_STATUS[CVE-2024-36950] = "fixed-version: Fixed from version 6.9" | ||
6979 | |||
6980 | CVE_STATUS[CVE-2024-36951] = "fixed-version: Fixed from version 6.9" | ||
6981 | |||
6982 | CVE_STATUS[CVE-2024-36952] = "fixed-version: Fixed from version 6.9" | ||
6983 | |||
6984 | CVE_STATUS[CVE-2024-36953] = "fixed-version: Fixed from version 6.9" | ||
6985 | |||
6986 | CVE_STATUS[CVE-2024-36954] = "fixed-version: Fixed from version 6.9" | ||
6987 | |||
6988 | CVE_STATUS[CVE-2024-36955] = "fixed-version: Fixed from version 6.9" | ||
6989 | |||
6990 | CVE_STATUS[CVE-2024-36956] = "fixed-version: Fixed from version 6.9" | ||
6991 | |||
6992 | CVE_STATUS[CVE-2024-36957] = "fixed-version: Fixed from version 6.9" | ||
6993 | |||
6994 | CVE_STATUS[CVE-2024-36958] = "fixed-version: Fixed from version 6.9" | ||
6995 | |||
6996 | CVE_STATUS[CVE-2024-36959] = "fixed-version: Fixed from version 6.9" | ||
6997 | |||
6998 | CVE_STATUS[CVE-2024-36960] = "fixed-version: Fixed from version 6.9" | ||
6999 | |||
7000 | CVE_STATUS[CVE-2024-36961] = "fixed-version: Fixed from version 6.9" | ||
7001 | |||
7002 | CVE_STATUS[CVE-2024-36962] = "fixed-version: Fixed from version 6.8.10" | ||
7003 | |||
7004 | CVE_STATUS[CVE-2024-36963] = "fixed-version: Fixed from version 6.9" | ||
7005 | |||
7006 | CVE_STATUS[CVE-2024-36964] = "fixed-version: Fixed from version 6.9" | ||
7007 | |||
7008 | CVE_STATUS[CVE-2024-36965] = "fixed-version: Fixed from version 6.10" | ||
7009 | |||
7010 | CVE_STATUS[CVE-2024-36966] = "fixed-version: Fixed from version 6.9" | ||
7011 | |||
7012 | CVE_STATUS[CVE-2024-36967] = "fixed-version: Fixed from version 6.10" | ||
7013 | |||
7014 | CVE_STATUS[CVE-2024-36968] = "fixed-version: Fixed from version 6.10" | ||
7015 | |||
7016 | CVE_STATUS[CVE-2024-36969] = "fixed-version: Fixed from version 6.10" | ||
7017 | |||
7018 | CVE_STATUS[CVE-2024-36970] = "fixed-version: Fixed from version 6.10" | ||
7019 | |||
7020 | CVE_STATUS[CVE-2024-36971] = "fixed-version: Fixed from version 6.10" | ||
7021 | |||
7022 | CVE_STATUS[CVE-2024-36972] = "fixed-version: Fixed from version 6.10" | ||
7023 | |||
7024 | CVE_STATUS[CVE-2024-36973] = "fixed-version: Fixed from version 6.10" | ||
7025 | |||
7026 | CVE_STATUS[CVE-2024-36974] = "fixed-version: Fixed from version 6.10" | ||
7027 | |||
7028 | CVE_STATUS[CVE-2024-36975] = "fixed-version: Fixed from version 6.10" | ||
7029 | |||
7030 | CVE_STATUS[CVE-2024-36976] = "fixed-version: Fixed from version 6.10" | ||
7031 | |||
7032 | CVE_STATUS[CVE-2024-36977] = "fixed-version: Fixed from version 6.10" | ||
7033 | |||
7034 | CVE_STATUS[CVE-2024-36978] = "fixed-version: Fixed from version 6.10" | ||
7035 | |||
7036 | CVE_STATUS[CVE-2024-36979] = "fixed-version: Fixed from version 6.10" | ||
7037 | |||
7038 | CVE_STATUS[CVE-2024-37021] = "fixed-version: Fixed from version 6.10" | ||
7039 | |||
7040 | CVE_STATUS[CVE-2024-37026] = "fixed-version: Fixed from version 6.10" | ||
7041 | |||
7042 | CVE_STATUS[CVE-2024-37078] = "fixed-version: Fixed from version 6.10" | ||
7043 | |||
7044 | CVE_STATUS[CVE-2024-37354] = "fixed-version: Fixed from version 6.10" | ||
7045 | |||
7046 | CVE_STATUS[CVE-2024-37356] = "fixed-version: Fixed from version 6.10" | ||
7047 | |||
7048 | CVE_STATUS[CVE-2024-38306] = "fixed-version: Fixed from version 6.10" | ||
7049 | |||
7050 | CVE_STATUS[CVE-2024-38381] = "fixed-version: Fixed from version 6.10" | ||
7051 | |||
7052 | CVE_STATUS[CVE-2024-38384] = "fixed-version: Fixed from version 6.10" | ||
7053 | |||
7054 | CVE_STATUS[CVE-2024-38385] = "fixed-version: Fixed from version 6.10" | ||
7055 | |||
7056 | CVE_STATUS[CVE-2024-38388] = "fixed-version: Fixed from version 6.10" | ||
7057 | |||
7058 | CVE_STATUS[CVE-2024-38390] = "fixed-version: Fixed from version 6.10" | ||
7059 | |||
7060 | CVE_STATUS[CVE-2024-38538] = "fixed-version: Fixed from version 6.10" | ||
7061 | |||
7062 | CVE_STATUS[CVE-2024-38539] = "fixed-version: Fixed from version 6.10" | ||
7063 | |||
7064 | CVE_STATUS[CVE-2024-38540] = "fixed-version: Fixed from version 6.10" | ||
7065 | |||
7066 | CVE_STATUS[CVE-2024-38541] = "fixed-version: Fixed from version 6.10" | ||
7067 | |||
7068 | CVE_STATUS[CVE-2024-38542] = "fixed-version: Fixed from version 6.10" | ||
7069 | |||
7070 | CVE_STATUS[CVE-2024-38543] = "fixed-version: Fixed from version 6.10" | ||
7071 | |||
7072 | CVE_STATUS[CVE-2024-38544] = "fixed-version: Fixed from version 6.10" | ||
7073 | |||
7074 | CVE_STATUS[CVE-2024-38545] = "fixed-version: Fixed from version 6.10" | ||
7075 | |||
7076 | CVE_STATUS[CVE-2024-38546] = "fixed-version: Fixed from version 6.10" | ||
7077 | |||
7078 | CVE_STATUS[CVE-2024-38547] = "fixed-version: Fixed from version 6.10" | ||
7079 | |||
7080 | CVE_STATUS[CVE-2024-38548] = "fixed-version: Fixed from version 6.10" | ||
7081 | |||
7082 | CVE_STATUS[CVE-2024-38549] = "fixed-version: Fixed from version 6.10" | ||
7083 | |||
7084 | CVE_STATUS[CVE-2024-38550] = "fixed-version: Fixed from version 6.10" | ||
7085 | |||
7086 | CVE_STATUS[CVE-2024-38551] = "fixed-version: Fixed from version 6.10" | ||
7087 | |||
7088 | CVE_STATUS[CVE-2024-38552] = "fixed-version: Fixed from version 6.10" | ||
7089 | |||
7090 | CVE_STATUS[CVE-2024-38553] = "fixed-version: Fixed from version 6.10" | ||
7091 | |||
7092 | CVE_STATUS[CVE-2024-38554] = "fixed-version: Fixed from version 6.10" | ||
7093 | |||
7094 | CVE_STATUS[CVE-2024-38555] = "fixed-version: Fixed from version 6.10" | ||
7095 | |||
7096 | CVE_STATUS[CVE-2024-38556] = "fixed-version: Fixed from version 6.10" | ||
7097 | |||
7098 | CVE_STATUS[CVE-2024-38557] = "fixed-version: Fixed from version 6.10" | ||
7099 | |||
7100 | CVE_STATUS[CVE-2024-38558] = "fixed-version: Fixed from version 6.10" | ||
7101 | |||
7102 | CVE_STATUS[CVE-2024-38559] = "fixed-version: Fixed from version 6.10" | ||
7103 | |||
7104 | CVE_STATUS[CVE-2024-38560] = "fixed-version: Fixed from version 6.10" | ||
7105 | |||
7106 | CVE_STATUS[CVE-2024-38561] = "fixed-version: Fixed from version 6.10" | ||
7107 | |||
7108 | CVE_STATUS[CVE-2024-38562] = "fixed-version: Fixed from version 6.10" | ||
7109 | |||
7110 | CVE_STATUS[CVE-2024-38563] = "fixed-version: Fixed from version 6.10" | ||
7111 | |||
7112 | CVE_STATUS[CVE-2024-38564] = "fixed-version: Fixed from version 6.10" | ||
7113 | |||
7114 | CVE_STATUS[CVE-2024-38565] = "fixed-version: Fixed from version 6.10" | ||
7115 | |||
7116 | CVE_STATUS[CVE-2024-38566] = "fixed-version: Fixed from version 6.10" | ||
7117 | |||
7118 | CVE_STATUS[CVE-2024-38567] = "fixed-version: Fixed from version 6.10" | ||
7119 | |||
7120 | CVE_STATUS[CVE-2024-38568] = "fixed-version: Fixed from version 6.10" | ||
7121 | |||
7122 | CVE_STATUS[CVE-2024-38569] = "fixed-version: Fixed from version 6.10" | ||
7123 | |||
7124 | CVE_STATUS[CVE-2024-38570] = "fixed-version: Fixed from version 6.10" | ||
7125 | |||
7126 | CVE_STATUS[CVE-2024-38571] = "fixed-version: Fixed from version 6.10" | ||
7127 | |||
7128 | CVE_STATUS[CVE-2024-38572] = "fixed-version: Fixed from version 6.10" | ||
7129 | |||
7130 | CVE_STATUS[CVE-2024-38573] = "fixed-version: Fixed from version 6.10" | ||
7131 | |||
7132 | CVE_STATUS[CVE-2024-38574] = "fixed-version: Fixed from version 6.10" | ||
7133 | |||
7134 | CVE_STATUS[CVE-2024-38575] = "fixed-version: Fixed from version 6.10" | ||
7135 | |||
7136 | CVE_STATUS[CVE-2024-38576] = "fixed-version: Fixed from version 6.10" | ||
7137 | |||
7138 | CVE_STATUS[CVE-2024-38577] = "fixed-version: Fixed from version 6.10" | ||
7139 | |||
7140 | CVE_STATUS[CVE-2024-38578] = "fixed-version: Fixed from version 6.10" | ||
7141 | |||
7142 | CVE_STATUS[CVE-2024-38579] = "fixed-version: Fixed from version 6.10" | ||
7143 | |||
7144 | CVE_STATUS[CVE-2024-38580] = "fixed-version: Fixed from version 6.9" | ||
7145 | |||
7146 | CVE_STATUS[CVE-2024-38581] = "fixed-version: Fixed from version 6.9" | ||
7147 | |||
7148 | CVE_STATUS[CVE-2024-38582] = "fixed-version: Fixed from version 6.10" | ||
7149 | |||
7150 | CVE_STATUS[CVE-2024-38583] = "fixed-version: Fixed from version 6.10" | ||
7151 | |||
7152 | CVE_STATUS[CVE-2024-38584] = "fixed-version: Fixed from version 6.10" | ||
7153 | |||
7154 | CVE_STATUS[CVE-2024-38585] = "fixed-version: Fixed from version 6.10" | ||
7155 | |||
7156 | CVE_STATUS[CVE-2024-38586] = "fixed-version: Fixed from version 6.10" | ||
7157 | |||
7158 | CVE_STATUS[CVE-2024-38587] = "fixed-version: Fixed from version 6.10" | ||
7159 | |||
7160 | CVE_STATUS[CVE-2024-38588] = "fixed-version: Fixed from version 6.10" | ||
7161 | |||
7162 | CVE_STATUS[CVE-2024-38589] = "fixed-version: Fixed from version 6.10" | ||
7163 | |||
7164 | CVE_STATUS[CVE-2024-38590] = "fixed-version: Fixed from version 6.10" | ||
7165 | |||
7166 | CVE_STATUS[CVE-2024-38591] = "fixed-version: Fixed from version 6.10" | ||
7167 | |||
7168 | CVE_STATUS[CVE-2024-38592] = "fixed-version: Fixed from version 6.10" | ||
7169 | |||
7170 | CVE_STATUS[CVE-2024-38593] = "fixed-version: Fixed from version 6.10" | ||
7171 | |||
7172 | CVE_STATUS[CVE-2024-38594] = "fixed-version: Fixed from version 6.10" | ||
7173 | |||
7174 | CVE_STATUS[CVE-2024-38595] = "fixed-version: Fixed from version 6.10" | ||
7175 | |||
7176 | CVE_STATUS[CVE-2024-38596] = "fixed-version: Fixed from version 6.10" | ||
7177 | |||
7178 | CVE_STATUS[CVE-2024-38597] = "fixed-version: Fixed from version 6.10" | ||
7179 | |||
7180 | CVE_STATUS[CVE-2024-38598] = "fixed-version: Fixed from version 6.10" | ||
7181 | |||
7182 | CVE_STATUS[CVE-2024-38599] = "fixed-version: Fixed from version 6.10" | ||
7183 | |||
7184 | CVE_STATUS[CVE-2024-38600] = "fixed-version: Fixed from version 6.10" | ||
7185 | |||
7186 | CVE_STATUS[CVE-2024-38601] = "fixed-version: Fixed from version 6.10" | ||
7187 | |||
7188 | CVE_STATUS[CVE-2024-38602] = "fixed-version: Fixed from version 6.10" | ||
7189 | |||
7190 | CVE_STATUS[CVE-2024-38603] = "fixed-version: Fixed from version 6.10" | ||
7191 | |||
7192 | CVE_STATUS[CVE-2024-38604] = "fixed-version: Fixed from version 6.10" | ||
7193 | |||
7194 | CVE_STATUS[CVE-2024-38605] = "fixed-version: Fixed from version 6.10" | ||
7195 | |||
7196 | CVE_STATUS[CVE-2024-38606] = "fixed-version: Fixed from version 6.10" | ||
7197 | |||
7198 | CVE_STATUS[CVE-2024-38607] = "fixed-version: Fixed from version 6.10" | ||
7199 | |||
7200 | CVE_STATUS[CVE-2024-38608] = "fixed-version: Fixed from version 6.10" | ||
7201 | |||
7202 | CVE_STATUS[CVE-2024-38609] = "fixed-version: Fixed from version 6.10" | ||
7203 | |||
7204 | CVE_STATUS[CVE-2024-38610] = "fixed-version: Fixed from version 6.10" | ||
7205 | |||
7206 | CVE_STATUS[CVE-2024-38611] = "fixed-version: Fixed from version 6.10" | ||
7207 | |||
7208 | CVE_STATUS[CVE-2024-38612] = "fixed-version: Fixed from version 6.10" | ||
7209 | |||
7210 | CVE_STATUS[CVE-2024-38613] = "fixed-version: Fixed from version 6.10" | ||
7211 | |||
7212 | CVE_STATUS[CVE-2024-38614] = "fixed-version: Fixed from version 6.10" | ||
7213 | |||
7214 | CVE_STATUS[CVE-2024-38615] = "fixed-version: Fixed from version 6.10" | ||
7215 | |||
7216 | CVE_STATUS[CVE-2024-38616] = "fixed-version: Fixed from version 6.10" | ||
7217 | |||
7218 | CVE_STATUS[CVE-2024-38617] = "fixed-version: Fixed from version 6.10" | ||
7219 | |||
7220 | CVE_STATUS[CVE-2024-38618] = "fixed-version: Fixed from version 6.10" | ||
7221 | |||
7222 | CVE_STATUS[CVE-2024-38619] = "fixed-version: Fixed from version 6.10" | ||
7223 | |||
7224 | CVE_STATUS[CVE-2024-38620] = "fixed-version: Fixed from version 6.10" | ||
7225 | |||
7226 | CVE_STATUS[CVE-2024-38621] = "fixed-version: Fixed from version 6.10" | ||
7227 | |||
7228 | CVE_STATUS[CVE-2024-38622] = "fixed-version: Fixed from version 6.10" | ||
7229 | |||
7230 | CVE_STATUS[CVE-2024-38623] = "fixed-version: Fixed from version 6.10" | ||
7231 | |||
7232 | CVE_STATUS[CVE-2024-38624] = "fixed-version: Fixed from version 6.10" | ||
7233 | |||
7234 | CVE_STATUS[CVE-2024-38625] = "fixed-version: Fixed from version 6.10" | ||
7235 | |||
7236 | CVE_STATUS[CVE-2024-38626] = "fixed-version: Fixed from version 6.10" | ||
7237 | |||
7238 | CVE_STATUS[CVE-2024-38627] = "fixed-version: Fixed from version 6.10" | ||
7239 | |||
7240 | CVE_STATUS[CVE-2024-38628] = "fixed-version: Fixed from version 6.10" | ||
7241 | |||
7242 | CVE_STATUS[CVE-2024-38629] = "fixed-version: Fixed from version 6.10" | ||
7243 | |||
7244 | CVE_STATUS[CVE-2024-38630] = "fixed-version: Fixed from version 6.10" | ||
7245 | |||
7246 | CVE_STATUS[CVE-2024-38631] = "fixed-version: Fixed from version 6.10" | ||
7247 | |||
7248 | CVE_STATUS[CVE-2024-38632] = "fixed-version: Fixed from version 6.10" | ||
7249 | |||
7250 | CVE_STATUS[CVE-2024-38633] = "fixed-version: Fixed from version 6.10" | ||
7251 | |||
7252 | CVE_STATUS[CVE-2024-38634] = "fixed-version: Fixed from version 6.10" | ||
7253 | |||
7254 | CVE_STATUS[CVE-2024-38635] = "fixed-version: Fixed from version 6.10" | ||
7255 | |||
7256 | CVE_STATUS[CVE-2024-38636] = "fixed-version: Fixed from version 6.10" | ||
7257 | |||
7258 | CVE_STATUS[CVE-2024-38637] = "fixed-version: Fixed from version 6.10" | ||
7259 | |||
7260 | CVE_STATUS[CVE-2024-38659] = "fixed-version: Fixed from version 6.10" | ||
7261 | |||
7262 | CVE_STATUS[CVE-2024-38661] = "fixed-version: Fixed from version 6.10" | ||
7263 | |||
7264 | CVE_STATUS[CVE-2024-38662] = "fixed-version: Fixed from version 6.10" | ||
7265 | |||
7266 | CVE_STATUS[CVE-2024-38663] = "fixed-version: Fixed from version 6.10" | ||
7267 | |||
7268 | CVE_STATUS[CVE-2024-38664] = "fixed-version: Fixed from version 6.10" | ||
7269 | |||
7270 | CVE_STATUS[CVE-2024-38667] = "fixed-version: Fixed from version 6.10" | ||
7271 | |||
7272 | CVE_STATUS[CVE-2024-38780] = "fixed-version: Fixed from version 6.10" | ||
7273 | |||
7274 | CVE_STATUS[CVE-2024-39276] = "fixed-version: Fixed from version 6.10" | ||
7275 | |||
7276 | CVE_STATUS[CVE-2024-39277] = "fixed-version: Fixed from version 6.10" | ||
7277 | |||
7278 | CVE_STATUS[CVE-2024-39282] = "cpe-stable-backport: Backported in 6.12.9" | ||
7279 | |||
7280 | CVE_STATUS[CVE-2024-39291] = "fixed-version: Fixed from version 6.10" | ||
7281 | |||
7282 | CVE_STATUS[CVE-2024-39292] = "fixed-version: Fixed from version 6.10" | ||
7283 | |||
7284 | CVE_STATUS[CVE-2024-39293] = "fixed-version: Fixed from version 6.10" | ||
7285 | |||
7286 | CVE_STATUS[CVE-2024-39296] = "fixed-version: Fixed from version 6.10" | ||
7287 | |||
7288 | CVE_STATUS[CVE-2024-39298] = "fixed-version: Fixed from version 6.10" | ||
7289 | |||
7290 | CVE_STATUS[CVE-2024-39301] = "fixed-version: Fixed from version 6.10" | ||
7291 | |||
7292 | CVE_STATUS[CVE-2024-39371] = "fixed-version: Fixed from version 6.10" | ||
7293 | |||
7294 | CVE_STATUS[CVE-2024-39461] = "fixed-version: Fixed from version 6.10" | ||
7295 | |||
7296 | CVE_STATUS[CVE-2024-39462] = "fixed-version: Fixed from version 6.10" | ||
7297 | |||
7298 | CVE_STATUS[CVE-2024-39463] = "fixed-version: Fixed from version 6.10" | ||
7299 | |||
7300 | CVE_STATUS[CVE-2024-39464] = "fixed-version: Fixed from version 6.10" | ||
7301 | |||
7302 | CVE_STATUS[CVE-2024-39465] = "fixed-version: Fixed from version 6.10" | ||
7303 | |||
7304 | CVE_STATUS[CVE-2024-39466] = "fixed-version: Fixed from version 6.10" | ||
7305 | |||
7306 | CVE_STATUS[CVE-2024-39467] = "fixed-version: Fixed from version 6.10" | ||
7307 | |||
7308 | CVE_STATUS[CVE-2024-39468] = "fixed-version: Fixed from version 6.10" | ||
7309 | |||
7310 | CVE_STATUS[CVE-2024-39469] = "fixed-version: Fixed from version 6.10" | ||
7311 | |||
7312 | CVE_STATUS[CVE-2024-39470] = "fixed-version: Fixed from version 6.10" | ||
7313 | |||
7314 | CVE_STATUS[CVE-2024-39471] = "fixed-version: Fixed from version 6.10" | ||
7315 | |||
7316 | CVE_STATUS[CVE-2024-39472] = "fixed-version: Fixed from version 6.10" | ||
7317 | |||
7318 | CVE_STATUS[CVE-2024-39473] = "fixed-version: Fixed from version 6.10" | ||
7319 | |||
7320 | CVE_STATUS[CVE-2024-39474] = "fixed-version: Fixed from version 6.10" | ||
7321 | |||
7322 | CVE_STATUS[CVE-2024-39475] = "fixed-version: Fixed from version 6.10" | ||
7323 | |||
7324 | CVE_STATUS[CVE-2024-39476] = "fixed-version: Fixed from version 6.10" | ||
7325 | |||
7326 | CVE_STATUS[CVE-2024-39477] = "fixed-version: Fixed from version 6.10" | ||
7327 | |||
7328 | CVE_STATUS[CVE-2024-39478] = "fixed-version: Fixed from version 6.10" | ||
7329 | |||
7330 | CVE_STATUS[CVE-2024-39479] = "fixed-version: Fixed from version 6.10" | ||
7331 | |||
7332 | CVE_STATUS[CVE-2024-39480] = "fixed-version: Fixed from version 6.10" | ||
7333 | |||
7334 | CVE_STATUS[CVE-2024-39481] = "fixed-version: Fixed from version 6.10" | ||
7335 | |||
7336 | CVE_STATUS[CVE-2024-39482] = "fixed-version: Fixed from version 6.10" | ||
7337 | |||
7338 | CVE_STATUS[CVE-2024-39483] = "fixed-version: Fixed from version 6.10" | ||
7339 | |||
7340 | CVE_STATUS[CVE-2024-39484] = "fixed-version: Fixed from version 6.10" | ||
7341 | |||
7342 | CVE_STATUS[CVE-2024-39485] = "fixed-version: Fixed from version 6.10" | ||
7343 | |||
7344 | CVE_STATUS[CVE-2024-39486] = "fixed-version: Fixed from version 6.10" | ||
7345 | |||
7346 | CVE_STATUS[CVE-2024-39487] = "fixed-version: Fixed from version 6.10" | ||
7347 | |||
7348 | CVE_STATUS[CVE-2024-39488] = "fixed-version: Fixed from version 6.10" | ||
7349 | |||
7350 | CVE_STATUS[CVE-2024-39489] = "fixed-version: Fixed from version 6.10" | ||
7351 | |||
7352 | CVE_STATUS[CVE-2024-39490] = "fixed-version: Fixed from version 6.10" | ||
7353 | |||
7354 | CVE_STATUS[CVE-2024-39491] = "fixed-version: Fixed from version 6.10" | ||
7355 | |||
7356 | CVE_STATUS[CVE-2024-39492] = "fixed-version: Fixed from version 6.10" | ||
7357 | |||
7358 | CVE_STATUS[CVE-2024-39493] = "fixed-version: Fixed from version 6.10" | ||
7359 | |||
7360 | CVE_STATUS[CVE-2024-39494] = "fixed-version: Fixed from version 6.10" | ||
7361 | |||
7362 | CVE_STATUS[CVE-2024-39495] = "fixed-version: Fixed from version 6.10" | ||
7363 | |||
7364 | CVE_STATUS[CVE-2024-39496] = "fixed-version: Fixed from version 6.10" | ||
7365 | |||
7366 | CVE_STATUS[CVE-2024-39497] = "fixed-version: Fixed from version 6.10" | ||
7367 | |||
7368 | CVE_STATUS[CVE-2024-39498] = "fixed-version: Fixed from version 6.10" | ||
7369 | |||
7370 | CVE_STATUS[CVE-2024-39499] = "fixed-version: Fixed from version 6.10" | ||
7371 | |||
7372 | CVE_STATUS[CVE-2024-39500] = "fixed-version: Fixed from version 6.10" | ||
7373 | |||
7374 | CVE_STATUS[CVE-2024-39502] = "fixed-version: Fixed from version 6.10" | ||
7375 | |||
7376 | CVE_STATUS[CVE-2024-39503] = "fixed-version: Fixed from version 6.10" | ||
7377 | |||
7378 | CVE_STATUS[CVE-2024-39504] = "fixed-version: Fixed from version 6.10" | ||
7379 | |||
7380 | CVE_STATUS[CVE-2024-39505] = "fixed-version: Fixed from version 6.10" | ||
7381 | |||
7382 | CVE_STATUS[CVE-2024-39506] = "fixed-version: Fixed from version 6.10" | ||
7383 | |||
7384 | CVE_STATUS[CVE-2024-39507] = "fixed-version: Fixed from version 6.10" | ||
7385 | |||
7386 | CVE_STATUS[CVE-2024-39508] = "fixed-version: Fixed from version 6.10" | ||
7387 | |||
7388 | CVE_STATUS[CVE-2024-39509] = "fixed-version: Fixed from version 6.10" | ||
7389 | |||
7390 | CVE_STATUS[CVE-2024-39510] = "fixed-version: Fixed from version 6.10" | ||
7391 | |||
7392 | CVE_STATUS[CVE-2024-40899] = "fixed-version: Fixed from version 6.10" | ||
7393 | |||
7394 | CVE_STATUS[CVE-2024-40900] = "fixed-version: Fixed from version 6.10" | ||
7395 | |||
7396 | CVE_STATUS[CVE-2024-40901] = "fixed-version: Fixed from version 6.10" | ||
7397 | |||
7398 | CVE_STATUS[CVE-2024-40902] = "fixed-version: Fixed from version 6.10" | ||
7399 | |||
7400 | CVE_STATUS[CVE-2024-40903] = "fixed-version: Fixed from version 6.10" | ||
7401 | |||
7402 | CVE_STATUS[CVE-2024-40904] = "fixed-version: Fixed from version 6.10" | ||
7403 | |||
7404 | CVE_STATUS[CVE-2024-40905] = "fixed-version: Fixed from version 6.10" | ||
7405 | |||
7406 | CVE_STATUS[CVE-2024-40906] = "fixed-version: Fixed from version 6.10" | ||
7407 | |||
7408 | CVE_STATUS[CVE-2024-40907] = "fixed-version: Fixed from version 6.10" | ||
7409 | |||
7410 | CVE_STATUS[CVE-2024-40908] = "fixed-version: Fixed from version 6.10" | ||
7411 | |||
7412 | CVE_STATUS[CVE-2024-40909] = "fixed-version: Fixed from version 6.10" | ||
7413 | |||
7414 | CVE_STATUS[CVE-2024-40910] = "fixed-version: Fixed from version 6.10" | ||
7415 | |||
7416 | CVE_STATUS[CVE-2024-40911] = "fixed-version: Fixed from version 6.10" | ||
7417 | |||
7418 | CVE_STATUS[CVE-2024-40912] = "fixed-version: Fixed from version 6.10" | ||
7419 | |||
7420 | CVE_STATUS[CVE-2024-40913] = "fixed-version: Fixed from version 6.10" | ||
7421 | |||
7422 | CVE_STATUS[CVE-2024-40914] = "fixed-version: Fixed from version 6.10" | ||
7423 | |||
7424 | CVE_STATUS[CVE-2024-40915] = "fixed-version: Fixed from version 6.10" | ||
7425 | |||
7426 | CVE_STATUS[CVE-2024-40916] = "fixed-version: Fixed from version 6.10" | ||
7427 | |||
7428 | CVE_STATUS[CVE-2024-40917] = "fixed-version: Fixed from version 6.10" | ||
7429 | |||
7430 | CVE_STATUS[CVE-2024-40918] = "fixed-version: Fixed from version 6.10" | ||
7431 | |||
7432 | CVE_STATUS[CVE-2024-40919] = "fixed-version: Fixed from version 6.10" | ||
7433 | |||
7434 | CVE_STATUS[CVE-2024-40920] = "fixed-version: Fixed from version 6.9.6" | ||
7435 | |||
7436 | CVE_STATUS[CVE-2024-40921] = "fixed-version: Fixed from version 6.9.6" | ||
7437 | |||
7438 | CVE_STATUS[CVE-2024-40922] = "fixed-version: Fixed from version 6.10" | ||
7439 | |||
7440 | CVE_STATUS[CVE-2024-40923] = "fixed-version: Fixed from version 6.10" | ||
7441 | |||
7442 | CVE_STATUS[CVE-2024-40924] = "fixed-version: Fixed from version 6.10" | ||
7443 | |||
7444 | CVE_STATUS[CVE-2024-40925] = "fixed-version: Fixed from version 6.10" | ||
7445 | |||
7446 | CVE_STATUS[CVE-2024-40926] = "fixed-version: Fixed from version 6.10" | ||
7447 | |||
7448 | CVE_STATUS[CVE-2024-40927] = "fixed-version: Fixed from version 6.10" | ||
7449 | |||
7450 | CVE_STATUS[CVE-2024-40928] = "fixed-version: Fixed from version 6.10" | ||
7451 | |||
7452 | CVE_STATUS[CVE-2024-40929] = "fixed-version: Fixed from version 6.10" | ||
7453 | |||
7454 | CVE_STATUS[CVE-2024-40930] = "fixed-version: Fixed from version 6.10" | ||
7455 | |||
7456 | CVE_STATUS[CVE-2024-40931] = "fixed-version: Fixed from version 6.10" | ||
7457 | |||
7458 | CVE_STATUS[CVE-2024-40932] = "fixed-version: Fixed from version 6.10" | ||
7459 | |||
7460 | CVE_STATUS[CVE-2024-40933] = "fixed-version: Fixed from version 6.10" | ||
7461 | |||
7462 | CVE_STATUS[CVE-2024-40934] = "fixed-version: Fixed from version 6.10" | ||
7463 | |||
7464 | CVE_STATUS[CVE-2024-40935] = "fixed-version: Fixed from version 6.10" | ||
7465 | |||
7466 | CVE_STATUS[CVE-2024-40936] = "fixed-version: Fixed from version 6.10" | ||
7467 | |||
7468 | CVE_STATUS[CVE-2024-40937] = "fixed-version: Fixed from version 6.10" | ||
7469 | |||
7470 | CVE_STATUS[CVE-2024-40938] = "fixed-version: Fixed from version 6.10" | ||
7471 | |||
7472 | CVE_STATUS[CVE-2024-40939] = "fixed-version: Fixed from version 6.10" | ||
7473 | |||
7474 | CVE_STATUS[CVE-2024-40940] = "fixed-version: Fixed from version 6.10" | ||
7475 | |||
7476 | CVE_STATUS[CVE-2024-40941] = "fixed-version: Fixed from version 6.10" | ||
7477 | |||
7478 | CVE_STATUS[CVE-2024-40942] = "fixed-version: Fixed from version 6.10" | ||
7479 | |||
7480 | CVE_STATUS[CVE-2024-40943] = "fixed-version: Fixed from version 6.10" | ||
7481 | |||
7482 | CVE_STATUS[CVE-2024-40944] = "fixed-version: Fixed from version 6.10" | ||
7483 | |||
7484 | CVE_STATUS[CVE-2024-40945] = "fixed-version: Fixed from version 6.10" | ||
7485 | |||
7486 | CVE_STATUS[CVE-2024-40947] = "fixed-version: Fixed from version 6.10" | ||
7487 | |||
7488 | CVE_STATUS[CVE-2024-40948] = "fixed-version: Fixed from version 6.10" | ||
7489 | |||
7490 | CVE_STATUS[CVE-2024-40949] = "fixed-version: Fixed from version 6.10" | ||
7491 | |||
7492 | CVE_STATUS[CVE-2024-40950] = "fixed-version: Fixed from version 6.10" | ||
7493 | |||
7494 | CVE_STATUS[CVE-2024-40951] = "fixed-version: Fixed from version 6.10" | ||
7495 | |||
7496 | CVE_STATUS[CVE-2024-40952] = "fixed-version: Fixed from version 6.10" | ||
7497 | |||
7498 | CVE_STATUS[CVE-2024-40953] = "fixed-version: Fixed from version 6.10" | ||
7499 | |||
7500 | CVE_STATUS[CVE-2024-40954] = "fixed-version: Fixed from version 6.10" | ||
7501 | |||
7502 | CVE_STATUS[CVE-2024-40955] = "fixed-version: Fixed from version 6.10" | ||
7503 | |||
7504 | CVE_STATUS[CVE-2024-40956] = "fixed-version: Fixed from version 6.10" | ||
7505 | |||
7506 | CVE_STATUS[CVE-2024-40957] = "fixed-version: Fixed from version 6.10" | ||
7507 | |||
7508 | CVE_STATUS[CVE-2024-40958] = "fixed-version: Fixed from version 6.10" | ||
7509 | |||
7510 | CVE_STATUS[CVE-2024-40959] = "fixed-version: Fixed from version 6.10" | ||
7511 | |||
7512 | CVE_STATUS[CVE-2024-40960] = "fixed-version: Fixed from version 6.10" | ||
7513 | |||
7514 | CVE_STATUS[CVE-2024-40961] = "fixed-version: Fixed from version 6.10" | ||
7515 | |||
7516 | CVE_STATUS[CVE-2024-40962] = "fixed-version: Fixed from version 6.10" | ||
7517 | |||
7518 | CVE_STATUS[CVE-2024-40963] = "fixed-version: Fixed from version 6.10" | ||
7519 | |||
7520 | CVE_STATUS[CVE-2024-40964] = "fixed-version: Fixed from version 6.10" | ||
7521 | |||
7522 | CVE_STATUS[CVE-2024-40965] = "fixed-version: Fixed from version 6.10" | ||
7523 | |||
7524 | CVE_STATUS[CVE-2024-40966] = "fixed-version: Fixed from version 6.10" | ||
7525 | |||
7526 | CVE_STATUS[CVE-2024-40967] = "fixed-version: Fixed from version 6.10" | ||
7527 | |||
7528 | CVE_STATUS[CVE-2024-40968] = "fixed-version: Fixed from version 6.10" | ||
7529 | |||
7530 | CVE_STATUS[CVE-2024-40969] = "fixed-version: Fixed from version 6.10" | ||
7531 | |||
7532 | CVE_STATUS[CVE-2024-40970] = "fixed-version: Fixed from version 6.10" | ||
7533 | |||
7534 | CVE_STATUS[CVE-2024-40971] = "fixed-version: Fixed from version 6.10" | ||
7535 | |||
7536 | CVE_STATUS[CVE-2024-40972] = "fixed-version: Fixed from version 6.10" | ||
7537 | |||
7538 | CVE_STATUS[CVE-2024-40973] = "fixed-version: Fixed from version 6.10" | ||
7539 | |||
7540 | CVE_STATUS[CVE-2024-40974] = "fixed-version: Fixed from version 6.10" | ||
7541 | |||
7542 | CVE_STATUS[CVE-2024-40975] = "fixed-version: Fixed from version 6.10" | ||
7543 | |||
7544 | CVE_STATUS[CVE-2024-40976] = "fixed-version: Fixed from version 6.10" | ||
7545 | |||
7546 | CVE_STATUS[CVE-2024-40977] = "fixed-version: Fixed from version 6.10" | ||
7547 | |||
7548 | CVE_STATUS[CVE-2024-40978] = "fixed-version: Fixed from version 6.10" | ||
7549 | |||
7550 | CVE_STATUS[CVE-2024-40979] = "fixed-version: Fixed from version 6.10" | ||
7551 | |||
7552 | CVE_STATUS[CVE-2024-40980] = "fixed-version: Fixed from version 6.10" | ||
7553 | |||
7554 | CVE_STATUS[CVE-2024-40981] = "fixed-version: Fixed from version 6.10" | ||
7555 | |||
7556 | CVE_STATUS[CVE-2024-40983] = "fixed-version: Fixed from version 6.10" | ||
7557 | |||
7558 | CVE_STATUS[CVE-2024-40984] = "fixed-version: Fixed from version 6.10" | ||
7559 | |||
7560 | CVE_STATUS[CVE-2024-40985] = "fixed-version: Fixed from version 6.10" | ||
7561 | |||
7562 | CVE_STATUS[CVE-2024-40986] = "fixed-version: Fixed from version 6.10" | ||
7563 | |||
7564 | CVE_STATUS[CVE-2024-40987] = "fixed-version: Fixed from version 6.10" | ||
7565 | |||
7566 | CVE_STATUS[CVE-2024-40988] = "fixed-version: Fixed from version 6.10" | ||
7567 | |||
7568 | CVE_STATUS[CVE-2024-40989] = "fixed-version: Fixed from version 6.10" | ||
7569 | |||
7570 | CVE_STATUS[CVE-2024-40990] = "fixed-version: Fixed from version 6.10" | ||
7571 | |||
7572 | CVE_STATUS[CVE-2024-40991] = "fixed-version: Fixed from version 6.10" | ||
7573 | |||
7574 | CVE_STATUS[CVE-2024-40992] = "fixed-version: Fixed from version 6.10" | ||
7575 | |||
7576 | CVE_STATUS[CVE-2024-40993] = "fixed-version: Fixed from version 6.9.7" | ||
7577 | |||
7578 | CVE_STATUS[CVE-2024-40994] = "fixed-version: Fixed from version 6.10" | ||
7579 | |||
7580 | CVE_STATUS[CVE-2024-40995] = "fixed-version: Fixed from version 6.10" | ||
7581 | |||
7582 | CVE_STATUS[CVE-2024-40996] = "fixed-version: Fixed from version 6.10" | ||
7583 | |||
7584 | CVE_STATUS[CVE-2024-40997] = "fixed-version: Fixed from version 6.10" | ||
7585 | |||
7586 | CVE_STATUS[CVE-2024-40998] = "fixed-version: Fixed from version 6.10" | ||
7587 | |||
7588 | CVE_STATUS[CVE-2024-40999] = "fixed-version: Fixed from version 6.10" | ||
7589 | |||
7590 | CVE_STATUS[CVE-2024-41000] = "fixed-version: Fixed from version 6.10" | ||
7591 | |||
7592 | CVE_STATUS[CVE-2024-41001] = "fixed-version: Fixed from version 6.10" | ||
7593 | |||
7594 | CVE_STATUS[CVE-2024-41002] = "fixed-version: Fixed from version 6.10" | ||
7595 | |||
7596 | CVE_STATUS[CVE-2024-41003] = "fixed-version: Fixed from version 6.10" | ||
7597 | |||
7598 | CVE_STATUS[CVE-2024-41004] = "fixed-version: Fixed from version 6.10" | ||
7599 | |||
7600 | CVE_STATUS[CVE-2024-41005] = "fixed-version: Fixed from version 6.10" | ||
7601 | |||
7602 | CVE_STATUS[CVE-2024-41006] = "fixed-version: Fixed from version 6.10" | ||
7603 | |||
7604 | CVE_STATUS[CVE-2024-41007] = "fixed-version: Fixed from version 6.10" | ||
7605 | |||
7606 | CVE_STATUS[CVE-2024-41008] = "fixed-version: Fixed from version 6.9" | ||
7607 | |||
7608 | CVE_STATUS[CVE-2024-41009] = "fixed-version: Fixed from version 6.10" | ||
7609 | |||
7610 | CVE_STATUS[CVE-2024-41010] = "fixed-version: Fixed from version 6.10" | ||
7611 | |||
7612 | CVE_STATUS[CVE-2024-41011] = "fixed-version: Fixed from version 6.9" | ||
7613 | |||
7614 | CVE_STATUS[CVE-2024-41012] = "fixed-version: Fixed from version 6.10" | ||
7615 | |||
7616 | CVE_STATUS[CVE-2024-41013] = "fixed-version: Fixed from version 6.11" | ||
7617 | |||
7618 | CVE_STATUS[CVE-2024-41014] = "fixed-version: Fixed from version 6.11" | ||
7619 | |||
7620 | CVE_STATUS[CVE-2024-41015] = "fixed-version: Fixed from version 6.11" | ||
7621 | |||
7622 | CVE_STATUS[CVE-2024-41016] = "fixed-version: Fixed from version 6.11" | ||
7623 | |||
7624 | CVE_STATUS[CVE-2024-41017] = "fixed-version: Fixed from version 6.11" | ||
7625 | |||
7626 | CVE_STATUS[CVE-2024-41018] = "fixed-version: Fixed from version 6.11" | ||
7627 | |||
7628 | CVE_STATUS[CVE-2024-41019] = "fixed-version: Fixed from version 6.11" | ||
7629 | |||
7630 | CVE_STATUS[CVE-2024-41020] = "fixed-version: Fixed from version 6.11" | ||
7631 | |||
7632 | CVE_STATUS[CVE-2024-41021] = "fixed-version: Fixed from version 6.11" | ||
7633 | |||
7634 | CVE_STATUS[CVE-2024-41022] = "fixed-version: Fixed from version 6.11" | ||
7635 | |||
7636 | CVE_STATUS[CVE-2024-41023] = "fixed-version: Fixed from version 6.10" | ||
7637 | |||
7638 | CVE_STATUS[CVE-2024-41025] = "fixed-version: Fixed from version 6.10" | ||
7639 | |||
7640 | CVE_STATUS[CVE-2024-41026] = "fixed-version: Fixed from version 6.10" | ||
7641 | |||
7642 | CVE_STATUS[CVE-2024-41027] = "fixed-version: Fixed from version 6.10" | ||
7643 | |||
7644 | CVE_STATUS[CVE-2024-41028] = "fixed-version: Fixed from version 6.10" | ||
7645 | |||
7646 | CVE_STATUS[CVE-2024-41029] = "fixed-version: Fixed from version 6.10" | ||
7647 | |||
7648 | CVE_STATUS[CVE-2024-41030] = "fixed-version: Fixed from version 6.10" | ||
7649 | |||
7650 | CVE_STATUS[CVE-2024-41031] = "fixed-version: Fixed from version 6.10" | ||
7651 | |||
7652 | CVE_STATUS[CVE-2024-41032] = "fixed-version: Fixed from version 6.10" | ||
7653 | |||
7654 | CVE_STATUS[CVE-2024-41033] = "fixed-version: Fixed from version 6.10" | ||
7655 | |||
7656 | CVE_STATUS[CVE-2024-41034] = "fixed-version: Fixed from version 6.10" | ||
7657 | |||
7658 | CVE_STATUS[CVE-2024-41035] = "fixed-version: Fixed from version 6.10" | ||
7659 | |||
7660 | CVE_STATUS[CVE-2024-41036] = "fixed-version: Fixed from version 6.10" | ||
7661 | |||
7662 | CVE_STATUS[CVE-2024-41037] = "fixed-version: Fixed from version 6.10" | ||
7663 | |||
7664 | CVE_STATUS[CVE-2024-41038] = "fixed-version: Fixed from version 6.10" | ||
7665 | |||
7666 | CVE_STATUS[CVE-2024-41039] = "fixed-version: Fixed from version 6.10" | ||
7667 | |||
7668 | CVE_STATUS[CVE-2024-41040] = "fixed-version: Fixed from version 6.10" | ||
7669 | |||
7670 | CVE_STATUS[CVE-2024-41041] = "fixed-version: Fixed from version 6.10" | ||
7671 | |||
7672 | CVE_STATUS[CVE-2024-41042] = "fixed-version: Fixed from version 6.10" | ||
7673 | |||
7674 | CVE_STATUS[CVE-2024-41043] = "fixed-version: Fixed from version 6.10" | ||
7675 | |||
7676 | CVE_STATUS[CVE-2024-41044] = "fixed-version: Fixed from version 6.10" | ||
7677 | |||
7678 | CVE_STATUS[CVE-2024-41045] = "fixed-version: Fixed from version 6.10" | ||
7679 | |||
7680 | CVE_STATUS[CVE-2024-41046] = "fixed-version: Fixed from version 6.10" | ||
7681 | |||
7682 | CVE_STATUS[CVE-2024-41047] = "fixed-version: Fixed from version 6.10" | ||
7683 | |||
7684 | CVE_STATUS[CVE-2024-41048] = "fixed-version: Fixed from version 6.10" | ||
7685 | |||
7686 | CVE_STATUS[CVE-2024-41049] = "fixed-version: Fixed from version 6.10" | ||
7687 | |||
7688 | CVE_STATUS[CVE-2024-41050] = "fixed-version: Fixed from version 6.10" | ||
7689 | |||
7690 | CVE_STATUS[CVE-2024-41051] = "fixed-version: Fixed from version 6.10" | ||
7691 | |||
7692 | CVE_STATUS[CVE-2024-41052] = "fixed-version: Fixed from version 6.9.10" | ||
7693 | |||
7694 | CVE_STATUS[CVE-2024-41053] = "fixed-version: Fixed from version 6.10" | ||
7695 | |||
7696 | CVE_STATUS[CVE-2024-41054] = "fixed-version: Fixed from version 6.10" | ||
7697 | |||
7698 | CVE_STATUS[CVE-2024-41055] = "fixed-version: Fixed from version 6.10" | ||
7699 | |||
7700 | CVE_STATUS[CVE-2024-41056] = "fixed-version: Fixed from version 6.10" | ||
7701 | |||
7702 | CVE_STATUS[CVE-2024-41057] = "fixed-version: Fixed from version 6.10" | ||
7703 | |||
7704 | CVE_STATUS[CVE-2024-41058] = "fixed-version: Fixed from version 6.10" | ||
7705 | |||
7706 | CVE_STATUS[CVE-2024-41059] = "fixed-version: Fixed from version 6.10" | ||
7707 | |||
7708 | CVE_STATUS[CVE-2024-41060] = "fixed-version: Fixed from version 6.10" | ||
7709 | |||
7710 | CVE_STATUS[CVE-2024-41061] = "fixed-version: Fixed from version 6.10" | ||
7711 | |||
7712 | CVE_STATUS[CVE-2024-41062] = "fixed-version: Fixed from version 6.10" | ||
7713 | |||
7714 | CVE_STATUS[CVE-2024-41063] = "fixed-version: Fixed from version 6.10" | ||
7715 | |||
7716 | CVE_STATUS[CVE-2024-41064] = "fixed-version: Fixed from version 6.10" | ||
7717 | |||
7718 | CVE_STATUS[CVE-2024-41065] = "fixed-version: Fixed from version 6.10" | ||
7719 | |||
7720 | CVE_STATUS[CVE-2024-41066] = "fixed-version: Fixed from version 6.10" | ||
7721 | |||
7722 | CVE_STATUS[CVE-2024-41067] = "fixed-version: Fixed from version 6.10" | ||
7723 | |||
7724 | CVE_STATUS[CVE-2024-41068] = "fixed-version: Fixed from version 6.10" | ||
7725 | |||
7726 | CVE_STATUS[CVE-2024-41069] = "fixed-version: Fixed from version 6.10" | ||
7727 | |||
7728 | CVE_STATUS[CVE-2024-41070] = "fixed-version: Fixed from version 6.10" | ||
7729 | |||
7730 | CVE_STATUS[CVE-2024-41072] = "fixed-version: Fixed from version 6.10" | ||
7731 | |||
7732 | CVE_STATUS[CVE-2024-41073] = "fixed-version: Fixed from version 6.10" | ||
7733 | |||
7734 | CVE_STATUS[CVE-2024-41074] = "fixed-version: Fixed from version 6.10" | ||
7735 | |||
7736 | CVE_STATUS[CVE-2024-41075] = "fixed-version: Fixed from version 6.10" | ||
7737 | |||
7738 | CVE_STATUS[CVE-2024-41076] = "fixed-version: Fixed from version 6.10" | ||
7739 | |||
7740 | CVE_STATUS[CVE-2024-41077] = "fixed-version: Fixed from version 6.10" | ||
7741 | |||
7742 | CVE_STATUS[CVE-2024-41078] = "fixed-version: Fixed from version 6.10" | ||
7743 | |||
7744 | CVE_STATUS[CVE-2024-41079] = "fixed-version: Fixed from version 6.10" | ||
7745 | |||
7746 | CVE_STATUS[CVE-2024-41080] = "fixed-version: Fixed from version 6.10" | ||
7747 | |||
7748 | CVE_STATUS[CVE-2024-41081] = "fixed-version: Fixed from version 6.10" | ||
7749 | |||
7750 | CVE_STATUS[CVE-2024-41082] = "fixed-version: Fixed from version 6.10" | ||
7751 | |||
7752 | CVE_STATUS[CVE-2024-41083] = "fixed-version: Fixed from version 6.10" | ||
7753 | |||
7754 | CVE_STATUS[CVE-2024-41084] = "fixed-version: Fixed from version 6.10" | ||
7755 | |||
7756 | CVE_STATUS[CVE-2024-41085] = "fixed-version: Fixed from version 6.10" | ||
7757 | |||
7758 | CVE_STATUS[CVE-2024-41086] = "fixed-version: Fixed from version 6.10" | ||
7759 | |||
7760 | CVE_STATUS[CVE-2024-41087] = "fixed-version: Fixed from version 6.10" | ||
7761 | |||
7762 | CVE_STATUS[CVE-2024-41088] = "fixed-version: Fixed from version 6.10" | ||
7763 | |||
7764 | CVE_STATUS[CVE-2024-41089] = "fixed-version: Fixed from version 6.10" | ||
7765 | |||
7766 | CVE_STATUS[CVE-2024-41090] = "fixed-version: Fixed from version 6.11" | ||
7767 | |||
7768 | CVE_STATUS[CVE-2024-41091] = "fixed-version: Fixed from version 6.11" | ||
7769 | |||
7770 | CVE_STATUS[CVE-2024-41092] = "fixed-version: Fixed from version 6.10" | ||
7771 | |||
7772 | CVE_STATUS[CVE-2024-41093] = "fixed-version: Fixed from version 6.10" | ||
7773 | |||
7774 | CVE_STATUS[CVE-2024-41094] = "fixed-version: Fixed from version 6.10" | ||
7775 | |||
7776 | CVE_STATUS[CVE-2024-41095] = "fixed-version: Fixed from version 6.10" | ||
7777 | |||
7778 | CVE_STATUS[CVE-2024-41096] = "fixed-version: Fixed from version 6.10" | ||
7779 | |||
7780 | CVE_STATUS[CVE-2024-41097] = "fixed-version: Fixed from version 6.10" | ||
7781 | |||
7782 | CVE_STATUS[CVE-2024-41098] = "fixed-version: Fixed from version 6.10" | ||
7783 | |||
7784 | CVE_STATUS[CVE-2024-41149] = "fixed-version: Fixed from version 6.12.7" | ||
7785 | |||
7786 | CVE_STATUS[CVE-2024-41932] = "cpe-stable-backport: Backported in 6.12.5" | ||
7787 | |||
7788 | CVE_STATUS[CVE-2024-41935] = "cpe-stable-backport: Backported in 6.12.5" | ||
7789 | |||
7790 | CVE_STATUS[CVE-2024-42063] = "fixed-version: Fixed from version 6.10" | ||
7791 | |||
7792 | CVE_STATUS[CVE-2024-42064] = "fixed-version: Fixed from version 6.10" | ||
7793 | |||
7794 | CVE_STATUS[CVE-2024-42065] = "fixed-version: Fixed from version 6.10" | ||
7795 | |||
7796 | CVE_STATUS[CVE-2024-42066] = "fixed-version: Fixed from version 6.10" | ||
7797 | |||
7798 | CVE_STATUS[CVE-2024-42067] = "fixed-version: Fixed from version 6.10" | ||
7799 | |||
7800 | CVE_STATUS[CVE-2024-42068] = "fixed-version: Fixed from version 6.10" | ||
7801 | |||
7802 | CVE_STATUS[CVE-2024-42069] = "fixed-version: Fixed from version 6.10" | ||
7803 | |||
7804 | CVE_STATUS[CVE-2024-42070] = "fixed-version: Fixed from version 6.10" | ||
7805 | |||
7806 | CVE_STATUS[CVE-2024-42071] = "fixed-version: Fixed from version 6.10" | ||
7807 | |||
7808 | CVE_STATUS[CVE-2024-42072] = "fixed-version: Fixed from version 6.10" | ||
7809 | |||
7810 | CVE_STATUS[CVE-2024-42073] = "fixed-version: Fixed from version 6.10" | ||
7811 | |||
7812 | CVE_STATUS[CVE-2024-42074] = "fixed-version: Fixed from version 6.10" | ||
7813 | |||
7814 | CVE_STATUS[CVE-2024-42075] = "fixed-version: Fixed from version 6.10" | ||
7815 | |||
7816 | CVE_STATUS[CVE-2024-42076] = "fixed-version: Fixed from version 6.10" | ||
7817 | |||
7818 | CVE_STATUS[CVE-2024-42077] = "fixed-version: Fixed from version 6.10" | ||
7819 | |||
7820 | CVE_STATUS[CVE-2024-42078] = "fixed-version: Fixed from version 6.10" | ||
7821 | |||
7822 | CVE_STATUS[CVE-2024-42079] = "fixed-version: Fixed from version 6.10" | ||
7823 | |||
7824 | CVE_STATUS[CVE-2024-42080] = "fixed-version: Fixed from version 6.10" | ||
7825 | |||
7826 | CVE_STATUS[CVE-2024-42081] = "fixed-version: Fixed from version 6.10" | ||
7827 | |||
7828 | CVE_STATUS[CVE-2024-42082] = "fixed-version: Fixed from version 6.10" | ||
7829 | |||
7830 | CVE_STATUS[CVE-2024-42083] = "fixed-version: Fixed from version 6.10" | ||
7831 | |||
7832 | CVE_STATUS[CVE-2024-42084] = "fixed-version: Fixed from version 6.10" | ||
7833 | |||
7834 | CVE_STATUS[CVE-2024-42085] = "fixed-version: Fixed from version 6.10" | ||
7835 | |||
7836 | CVE_STATUS[CVE-2024-42086] = "fixed-version: Fixed from version 6.10" | ||
7837 | |||
7838 | CVE_STATUS[CVE-2024-42087] = "fixed-version: Fixed from version 6.10" | ||
7839 | |||
7840 | CVE_STATUS[CVE-2024-42088] = "fixed-version: Fixed from version 6.10" | ||
7841 | |||
7842 | CVE_STATUS[CVE-2024-42089] = "fixed-version: Fixed from version 6.10" | ||
7843 | |||
7844 | CVE_STATUS[CVE-2024-42090] = "fixed-version: Fixed from version 6.10" | ||
7845 | |||
7846 | CVE_STATUS[CVE-2024-42091] = "fixed-version: Fixed from version 6.10" | ||
7847 | |||
7848 | CVE_STATUS[CVE-2024-42092] = "fixed-version: Fixed from version 6.10" | ||
7849 | |||
7850 | CVE_STATUS[CVE-2024-42093] = "fixed-version: Fixed from version 6.10" | ||
7851 | |||
7852 | CVE_STATUS[CVE-2024-42094] = "fixed-version: Fixed from version 6.10" | ||
7853 | |||
7854 | CVE_STATUS[CVE-2024-42095] = "fixed-version: Fixed from version 6.10" | ||
7855 | |||
7856 | CVE_STATUS[CVE-2024-42096] = "fixed-version: Fixed from version 6.10" | ||
7857 | |||
7858 | CVE_STATUS[CVE-2024-42097] = "fixed-version: Fixed from version 6.10" | ||
7859 | |||
7860 | CVE_STATUS[CVE-2024-42098] = "fixed-version: Fixed from version 6.10" | ||
7861 | |||
7862 | CVE_STATUS[CVE-2024-42099] = "fixed-version: Fixed from version 6.10" | ||
7863 | |||
7864 | CVE_STATUS[CVE-2024-42100] = "fixed-version: Fixed from version 6.10" | ||
7865 | |||
7866 | CVE_STATUS[CVE-2024-42101] = "fixed-version: Fixed from version 6.10" | ||
7867 | |||
7868 | CVE_STATUS[CVE-2024-42102] = "fixed-version: Fixed from version 6.10" | ||
7869 | |||
7870 | CVE_STATUS[CVE-2024-42103] = "fixed-version: Fixed from version 6.9.9" | ||
7871 | |||
7872 | CVE_STATUS[CVE-2024-42104] = "fixed-version: Fixed from version 6.10" | ||
7873 | |||
7874 | CVE_STATUS[CVE-2024-42105] = "fixed-version: Fixed from version 6.10" | ||
7875 | |||
7876 | CVE_STATUS[CVE-2024-42106] = "fixed-version: Fixed from version 6.10" | ||
7877 | |||
7878 | CVE_STATUS[CVE-2024-42107] = "fixed-version: Fixed from version 6.10" | ||
7879 | |||
7880 | CVE_STATUS[CVE-2024-42108] = "fixed-version: Fixed from version 6.10" | ||
7881 | |||
7882 | CVE_STATUS[CVE-2024-42109] = "fixed-version: Fixed from version 6.10" | ||
7883 | |||
7884 | CVE_STATUS[CVE-2024-42110] = "fixed-version: Fixed from version 6.10" | ||
7885 | |||
7886 | CVE_STATUS[CVE-2024-42111] = "fixed-version: Fixed from version 6.10" | ||
7887 | |||
7888 | CVE_STATUS[CVE-2024-42112] = "fixed-version: Fixed from version 6.10" | ||
7889 | |||
7890 | CVE_STATUS[CVE-2024-42113] = "fixed-version: Fixed from version 6.10" | ||
7891 | |||
7892 | CVE_STATUS[CVE-2024-42114] = "fixed-version: Fixed from version 6.10" | ||
7893 | |||
7894 | CVE_STATUS[CVE-2024-42115] = "fixed-version: Fixed from version 6.10" | ||
7895 | |||
7896 | CVE_STATUS[CVE-2024-42117] = "fixed-version: Fixed from version 6.10" | ||
7897 | |||
7898 | CVE_STATUS[CVE-2024-42118] = "fixed-version: Fixed from version 6.10" | ||
7899 | |||
7900 | CVE_STATUS[CVE-2024-42119] = "fixed-version: Fixed from version 6.10" | ||
7901 | |||
7902 | CVE_STATUS[CVE-2024-42120] = "fixed-version: Fixed from version 6.10" | ||
7903 | |||
7904 | CVE_STATUS[CVE-2024-42121] = "fixed-version: Fixed from version 6.10" | ||
7905 | |||
7906 | CVE_STATUS[CVE-2024-42122] = "fixed-version: Fixed from version 6.10" | ||
7907 | |||
7908 | CVE_STATUS[CVE-2024-42123] = "fixed-version: Fixed from version 6.10" | ||
7909 | |||
7910 | CVE_STATUS[CVE-2024-42124] = "fixed-version: Fixed from version 6.10" | ||
7911 | |||
7912 | CVE_STATUS[CVE-2024-42125] = "fixed-version: Fixed from version 6.10" | ||
7913 | |||
7914 | CVE_STATUS[CVE-2024-42126] = "fixed-version: Fixed from version 6.10" | ||
7915 | |||
7916 | CVE_STATUS[CVE-2024-42127] = "fixed-version: Fixed from version 6.10" | ||
7917 | |||
7918 | CVE_STATUS[CVE-2024-42128] = "fixed-version: Fixed from version 6.10" | ||
7919 | |||
7920 | CVE_STATUS[CVE-2024-42129] = "fixed-version: Fixed from version 6.10" | ||
7921 | |||
7922 | CVE_STATUS[CVE-2024-42130] = "fixed-version: Fixed from version 6.10" | ||
7923 | |||
7924 | CVE_STATUS[CVE-2024-42131] = "fixed-version: Fixed from version 6.10" | ||
7925 | |||
7926 | CVE_STATUS[CVE-2024-42132] = "fixed-version: Fixed from version 6.10" | ||
7927 | |||
7928 | CVE_STATUS[CVE-2024-42133] = "fixed-version: Fixed from version 6.10" | ||
7929 | |||
7930 | CVE_STATUS[CVE-2024-42134] = "fixed-version: Fixed from version 6.10" | ||
7931 | |||
7932 | CVE_STATUS[CVE-2024-42135] = "fixed-version: Fixed from version 6.10" | ||
7933 | |||
7934 | CVE_STATUS[CVE-2024-42136] = "fixed-version: Fixed from version 6.10" | ||
7935 | |||
7936 | CVE_STATUS[CVE-2024-42137] = "fixed-version: Fixed from version 6.10" | ||
7937 | |||
7938 | CVE_STATUS[CVE-2024-42138] = "fixed-version: Fixed from version 6.10" | ||
7939 | |||
7940 | CVE_STATUS[CVE-2024-42139] = "fixed-version: Fixed from version 6.10" | ||
7941 | |||
7942 | CVE_STATUS[CVE-2024-42140] = "fixed-version: Fixed from version 6.10" | ||
7943 | |||
7944 | CVE_STATUS[CVE-2024-42141] = "fixed-version: Fixed from version 6.10" | ||
7945 | |||
7946 | CVE_STATUS[CVE-2024-42142] = "fixed-version: Fixed from version 6.10" | ||
7947 | |||
7948 | CVE_STATUS[CVE-2024-42144] = "fixed-version: Fixed from version 6.10" | ||
7949 | |||
7950 | CVE_STATUS[CVE-2024-42145] = "fixed-version: Fixed from version 6.10" | ||
7951 | |||
7952 | CVE_STATUS[CVE-2024-42146] = "fixed-version: Fixed from version 6.10" | ||
7953 | |||
7954 | CVE_STATUS[CVE-2024-42147] = "fixed-version: Fixed from version 6.10" | ||
7955 | |||
7956 | CVE_STATUS[CVE-2024-42148] = "fixed-version: Fixed from version 6.10" | ||
7957 | |||
7958 | CVE_STATUS[CVE-2024-42149] = "fixed-version: Fixed from version 6.10" | ||
7959 | |||
7960 | CVE_STATUS[CVE-2024-42150] = "fixed-version: Fixed from version 6.10" | ||
7961 | |||
7962 | CVE_STATUS[CVE-2024-42151] = "fixed-version: Fixed from version 6.10" | ||
7963 | |||
7964 | CVE_STATUS[CVE-2024-42152] = "fixed-version: Fixed from version 6.10" | ||
7965 | |||
7966 | CVE_STATUS[CVE-2024-42153] = "fixed-version: Fixed from version 6.10" | ||
7967 | |||
7968 | CVE_STATUS[CVE-2024-42154] = "fixed-version: Fixed from version 6.10" | ||
7969 | |||
7970 | CVE_STATUS[CVE-2024-42155] = "fixed-version: Fixed from version 6.10" | ||
7971 | |||
7972 | CVE_STATUS[CVE-2024-42156] = "fixed-version: Fixed from version 6.10" | ||
7973 | |||
7974 | CVE_STATUS[CVE-2024-42157] = "fixed-version: Fixed from version 6.10" | ||
7975 | |||
7976 | CVE_STATUS[CVE-2024-42158] = "fixed-version: Fixed from version 6.10" | ||
7977 | |||
7978 | CVE_STATUS[CVE-2024-42159] = "fixed-version: Fixed from version 6.10" | ||
7979 | |||
7980 | CVE_STATUS[CVE-2024-42160] = "fixed-version: Fixed from version 6.10" | ||
7981 | |||
7982 | CVE_STATUS[CVE-2024-42161] = "fixed-version: Fixed from version 6.10" | ||
7983 | |||
7984 | CVE_STATUS[CVE-2024-42162] = "fixed-version: Fixed from version 6.10" | ||
7985 | |||
7986 | CVE_STATUS[CVE-2024-42223] = "fixed-version: Fixed from version 6.10" | ||
7987 | |||
7988 | CVE_STATUS[CVE-2024-42224] = "fixed-version: Fixed from version 6.10" | ||
7989 | |||
7990 | CVE_STATUS[CVE-2024-42225] = "fixed-version: Fixed from version 6.10" | ||
7991 | |||
7992 | CVE_STATUS[CVE-2024-42227] = "fixed-version: Fixed from version 6.10" | ||
7993 | |||
7994 | CVE_STATUS[CVE-2024-42228] = "fixed-version: Fixed from version 6.10" | ||
7995 | |||
7996 | CVE_STATUS[CVE-2024-42229] = "fixed-version: Fixed from version 6.10" | ||
7997 | |||
7998 | CVE_STATUS[CVE-2024-42230] = "fixed-version: Fixed from version 6.10" | ||
7999 | |||
8000 | CVE_STATUS[CVE-2024-42231] = "fixed-version: Fixed from version 6.10" | ||
8001 | |||
8002 | CVE_STATUS[CVE-2024-42232] = "fixed-version: Fixed from version 6.10" | ||
8003 | |||
8004 | CVE_STATUS[CVE-2024-42233] = "fixed-version: Fixed from version 6.10" | ||
8005 | |||
8006 | CVE_STATUS[CVE-2024-42234] = "fixed-version: Fixed from version 6.10" | ||
8007 | |||
8008 | CVE_STATUS[CVE-2024-42235] = "fixed-version: Fixed from version 6.10" | ||
8009 | |||
8010 | CVE_STATUS[CVE-2024-42236] = "fixed-version: Fixed from version 6.10" | ||
8011 | |||
8012 | CVE_STATUS[CVE-2024-42237] = "fixed-version: Fixed from version 6.10" | ||
8013 | |||
8014 | CVE_STATUS[CVE-2024-42238] = "fixed-version: Fixed from version 6.10" | ||
8015 | |||
8016 | CVE_STATUS[CVE-2024-42239] = "fixed-version: Fixed from version 6.10" | ||
8017 | |||
8018 | CVE_STATUS[CVE-2024-42240] = "fixed-version: Fixed from version 6.10" | ||
8019 | |||
8020 | CVE_STATUS[CVE-2024-42241] = "fixed-version: Fixed from version 6.10" | ||
8021 | |||
8022 | CVE_STATUS[CVE-2024-42242] = "fixed-version: Fixed from version 6.10" | ||
8023 | |||
8024 | CVE_STATUS[CVE-2024-42243] = "fixed-version: Fixed from version 6.10" | ||
8025 | |||
8026 | CVE_STATUS[CVE-2024-42244] = "fixed-version: Fixed from version 6.10" | ||
8027 | |||
8028 | CVE_STATUS[CVE-2024-42245] = "fixed-version: Fixed from version 6.10" | ||
8029 | |||
8030 | CVE_STATUS[CVE-2024-42246] = "fixed-version: Fixed from version 6.10" | ||
8031 | |||
8032 | CVE_STATUS[CVE-2024-42247] = "fixed-version: Fixed from version 6.10" | ||
8033 | |||
8034 | CVE_STATUS[CVE-2024-42248] = "fixed-version: Fixed from version 6.10" | ||
8035 | |||
8036 | CVE_STATUS[CVE-2024-42249] = "fixed-version: Fixed from version 6.10" | ||
8037 | |||
8038 | CVE_STATUS[CVE-2024-42250] = "fixed-version: Fixed from version 6.10" | ||
8039 | |||
8040 | CVE_STATUS[CVE-2024-42251] = "fixed-version: Fixed from version 6.10" | ||
8041 | |||
8042 | CVE_STATUS[CVE-2024-42252] = "fixed-version: Fixed from version 6.10" | ||
8043 | |||
8044 | CVE_STATUS[CVE-2024-42253] = "fixed-version: Fixed from version 6.10" | ||
8045 | |||
8046 | CVE_STATUS[CVE-2024-42254] = "fixed-version: Fixed from version 6.11" | ||
8047 | |||
8048 | CVE_STATUS[CVE-2024-42255] = "fixed-version: Fixed from version 6.11" | ||
8049 | |||
8050 | CVE_STATUS[CVE-2024-42256] = "fixed-version: Fixed from version 6.11" | ||
8051 | |||
8052 | CVE_STATUS[CVE-2024-42257] = "fixed-version: Fixed from version 6.11" | ||
8053 | |||
8054 | CVE_STATUS[CVE-2024-42258] = "fixed-version: Fixed from version 6.11" | ||
8055 | |||
8056 | CVE_STATUS[CVE-2024-42259] = "fixed-version: Fixed from version 6.11" | ||
8057 | |||
8058 | CVE_STATUS[CVE-2024-42260] = "fixed-version: Fixed from version 6.11" | ||
8059 | |||
8060 | CVE_STATUS[CVE-2024-42261] = "fixed-version: Fixed from version 6.11" | ||
8061 | |||
8062 | CVE_STATUS[CVE-2024-42262] = "fixed-version: Fixed from version 6.11" | ||
8063 | |||
8064 | CVE_STATUS[CVE-2024-42263] = "fixed-version: Fixed from version 6.11" | ||
8065 | |||
8066 | CVE_STATUS[CVE-2024-42264] = "fixed-version: Fixed from version 6.11" | ||
8067 | |||
8068 | CVE_STATUS[CVE-2024-42265] = "fixed-version: Fixed from version 6.11" | ||
8069 | |||
8070 | CVE_STATUS[CVE-2024-42266] = "fixed-version: Fixed from version 6.11" | ||
8071 | |||
8072 | CVE_STATUS[CVE-2024-42267] = "fixed-version: Fixed from version 6.11" | ||
8073 | |||
8074 | CVE_STATUS[CVE-2024-42268] = "fixed-version: Fixed from version 6.11" | ||
8075 | |||
8076 | CVE_STATUS[CVE-2024-42269] = "fixed-version: Fixed from version 6.11" | ||
8077 | |||
8078 | CVE_STATUS[CVE-2024-42270] = "fixed-version: Fixed from version 6.11" | ||
8079 | |||
8080 | CVE_STATUS[CVE-2024-42271] = "fixed-version: Fixed from version 6.11" | ||
8081 | |||
8082 | CVE_STATUS[CVE-2024-42272] = "fixed-version: Fixed from version 6.11" | ||
8083 | |||
8084 | CVE_STATUS[CVE-2024-42273] = "fixed-version: Fixed from version 6.11" | ||
8085 | |||
8086 | CVE_STATUS[CVE-2024-42274] = "fixed-version: Fixed from version 6.11" | ||
8087 | |||
8088 | CVE_STATUS[CVE-2024-42275] = "fixed-version: Fixed from version 6.11" | ||
8089 | |||
8090 | CVE_STATUS[CVE-2024-42276] = "fixed-version: Fixed from version 6.11" | ||
8091 | |||
8092 | CVE_STATUS[CVE-2024-42277] = "fixed-version: Fixed from version 6.11" | ||
8093 | |||
8094 | CVE_STATUS[CVE-2024-42278] = "fixed-version: Fixed from version 6.11" | ||
8095 | |||
8096 | CVE_STATUS[CVE-2024-42279] = "fixed-version: Fixed from version 6.11" | ||
8097 | |||
8098 | CVE_STATUS[CVE-2024-42280] = "fixed-version: Fixed from version 6.11" | ||
8099 | |||
8100 | CVE_STATUS[CVE-2024-42281] = "fixed-version: Fixed from version 6.11" | ||
8101 | |||
8102 | CVE_STATUS[CVE-2024-42282] = "fixed-version: Fixed from version 6.11" | ||
8103 | |||
8104 | CVE_STATUS[CVE-2024-42283] = "fixed-version: Fixed from version 6.11" | ||
8105 | |||
8106 | CVE_STATUS[CVE-2024-42284] = "fixed-version: Fixed from version 6.11" | ||
8107 | |||
8108 | CVE_STATUS[CVE-2024-42285] = "fixed-version: Fixed from version 6.11" | ||
8109 | |||
8110 | CVE_STATUS[CVE-2024-42286] = "fixed-version: Fixed from version 6.11" | ||
8111 | |||
8112 | CVE_STATUS[CVE-2024-42287] = "fixed-version: Fixed from version 6.11" | ||
8113 | |||
8114 | CVE_STATUS[CVE-2024-42288] = "fixed-version: Fixed from version 6.11" | ||
8115 | |||
8116 | CVE_STATUS[CVE-2024-42289] = "fixed-version: Fixed from version 6.11" | ||
8117 | |||
8118 | CVE_STATUS[CVE-2024-42290] = "fixed-version: Fixed from version 6.11" | ||
8119 | |||
8120 | CVE_STATUS[CVE-2024-42291] = "fixed-version: Fixed from version 6.11" | ||
8121 | |||
8122 | CVE_STATUS[CVE-2024-42292] = "fixed-version: Fixed from version 6.11" | ||
8123 | |||
8124 | CVE_STATUS[CVE-2024-42293] = "fixed-version: Fixed from version 6.11" | ||
8125 | |||
8126 | CVE_STATUS[CVE-2024-42294] = "fixed-version: Fixed from version 6.11" | ||
8127 | |||
8128 | CVE_STATUS[CVE-2024-42295] = "fixed-version: Fixed from version 6.11" | ||
8129 | |||
8130 | CVE_STATUS[CVE-2024-42296] = "fixed-version: Fixed from version 6.11" | ||
8131 | |||
8132 | CVE_STATUS[CVE-2024-42297] = "fixed-version: Fixed from version 6.11" | ||
8133 | |||
8134 | CVE_STATUS[CVE-2024-42298] = "fixed-version: Fixed from version 6.11" | ||
8135 | |||
8136 | CVE_STATUS[CVE-2024-42299] = "fixed-version: Fixed from version 6.11" | ||
8137 | |||
8138 | CVE_STATUS[CVE-2024-42300] = "fixed-version: Fixed from version 6.11" | ||
8139 | |||
8140 | CVE_STATUS[CVE-2024-42301] = "fixed-version: Fixed from version 6.11" | ||
8141 | |||
8142 | CVE_STATUS[CVE-2024-42302] = "fixed-version: Fixed from version 6.11" | ||
8143 | |||
8144 | CVE_STATUS[CVE-2024-42303] = "fixed-version: Fixed from version 6.11" | ||
8145 | |||
8146 | CVE_STATUS[CVE-2024-42304] = "fixed-version: Fixed from version 6.11" | ||
8147 | |||
8148 | CVE_STATUS[CVE-2024-42305] = "fixed-version: Fixed from version 6.11" | ||
8149 | |||
8150 | CVE_STATUS[CVE-2024-42306] = "fixed-version: Fixed from version 6.11" | ||
8151 | |||
8152 | CVE_STATUS[CVE-2024-42307] = "fixed-version: Fixed from version 6.11" | ||
8153 | |||
8154 | CVE_STATUS[CVE-2024-42309] = "fixed-version: Fixed from version 6.11" | ||
8155 | |||
8156 | CVE_STATUS[CVE-2024-42310] = "fixed-version: Fixed from version 6.11" | ||
8157 | |||
8158 | CVE_STATUS[CVE-2024-42311] = "fixed-version: Fixed from version 6.11" | ||
8159 | |||
8160 | CVE_STATUS[CVE-2024-42312] = "fixed-version: Fixed from version 6.11" | ||
8161 | |||
8162 | CVE_STATUS[CVE-2024-42313] = "fixed-version: Fixed from version 6.11" | ||
8163 | |||
8164 | CVE_STATUS[CVE-2024-42314] = "fixed-version: Fixed from version 6.11" | ||
8165 | |||
8166 | CVE_STATUS[CVE-2024-42315] = "fixed-version: Fixed from version 6.11" | ||
8167 | |||
8168 | CVE_STATUS[CVE-2024-42316] = "fixed-version: Fixed from version 6.11" | ||
8169 | |||
8170 | CVE_STATUS[CVE-2024-42317] = "fixed-version: Fixed from version 6.11" | ||
8171 | |||
8172 | CVE_STATUS[CVE-2024-42318] = "fixed-version: Fixed from version 6.11" | ||
8173 | |||
8174 | CVE_STATUS[CVE-2024-42319] = "fixed-version: Fixed from version 6.11" | ||
8175 | |||
8176 | CVE_STATUS[CVE-2024-42320] = "fixed-version: Fixed from version 6.11" | ||
8177 | |||
8178 | CVE_STATUS[CVE-2024-42321] = "fixed-version: Fixed from version 6.11" | ||
8179 | |||
8180 | CVE_STATUS[CVE-2024-42322] = "fixed-version: Fixed from version 6.11" | ||
8181 | |||
8182 | CVE_STATUS[CVE-2024-43098] = "cpe-stable-backport: Backported in 6.12.5" | ||
8183 | |||
8184 | CVE_STATUS[CVE-2024-43815] = "fixed-version: Fixed from version 6.11" | ||
8185 | |||
8186 | CVE_STATUS[CVE-2024-43816] = "fixed-version: Fixed from version 6.11" | ||
8187 | |||
8188 | CVE_STATUS[CVE-2024-43817] = "fixed-version: Fixed from version 6.11" | ||
8189 | |||
8190 | CVE_STATUS[CVE-2024-43818] = "fixed-version: Fixed from version 6.11" | ||
8191 | |||
8192 | CVE_STATUS[CVE-2024-43819] = "fixed-version: Fixed from version 6.11" | ||
8193 | |||
8194 | CVE_STATUS[CVE-2024-43820] = "fixed-version: Fixed from version 6.11" | ||
8195 | |||
8196 | CVE_STATUS[CVE-2024-43821] = "fixed-version: Fixed from version 6.11" | ||
8197 | |||
8198 | CVE_STATUS[CVE-2024-43822] = "fixed-version: Fixed from version 6.11" | ||
8199 | |||
8200 | CVE_STATUS[CVE-2024-43823] = "fixed-version: Fixed from version 6.11" | ||
8201 | |||
8202 | CVE_STATUS[CVE-2024-43824] = "fixed-version: Fixed from version 6.11" | ||
8203 | |||
8204 | CVE_STATUS[CVE-2024-43825] = "fixed-version: Fixed from version 6.11" | ||
8205 | |||
8206 | CVE_STATUS[CVE-2024-43826] = "fixed-version: Fixed from version 6.11" | ||
8207 | |||
8208 | CVE_STATUS[CVE-2024-43827] = "fixed-version: Fixed from version 6.11" | ||
8209 | |||
8210 | CVE_STATUS[CVE-2024-43828] = "fixed-version: Fixed from version 6.11" | ||
8211 | |||
8212 | CVE_STATUS[CVE-2024-43829] = "fixed-version: Fixed from version 6.11" | ||
8213 | |||
8214 | CVE_STATUS[CVE-2024-43830] = "fixed-version: Fixed from version 6.11" | ||
8215 | |||
8216 | CVE_STATUS[CVE-2024-43831] = "fixed-version: Fixed from version 6.11" | ||
8217 | |||
8218 | CVE_STATUS[CVE-2024-43832] = "fixed-version: Fixed from version 6.11" | ||
8219 | |||
8220 | CVE_STATUS[CVE-2024-43833] = "fixed-version: Fixed from version 6.11" | ||
8221 | |||
8222 | CVE_STATUS[CVE-2024-43834] = "fixed-version: Fixed from version 6.11" | ||
8223 | |||
8224 | CVE_STATUS[CVE-2024-43835] = "fixed-version: Fixed from version 6.11" | ||
8225 | |||
8226 | CVE_STATUS[CVE-2024-43836] = "fixed-version: Fixed from version 6.11" | ||
8227 | |||
8228 | CVE_STATUS[CVE-2024-43837] = "fixed-version: Fixed from version 6.11" | ||
8229 | |||
8230 | CVE_STATUS[CVE-2024-43838] = "fixed-version: Fixed from version 6.11" | ||
8231 | |||
8232 | CVE_STATUS[CVE-2024-43839] = "fixed-version: Fixed from version 6.11" | ||
8233 | |||
8234 | CVE_STATUS[CVE-2024-43840] = "fixed-version: Fixed from version 6.11" | ||
8235 | |||
8236 | CVE_STATUS[CVE-2024-43841] = "fixed-version: Fixed from version 6.11" | ||
8237 | |||
8238 | CVE_STATUS[CVE-2024-43842] = "fixed-version: Fixed from version 6.11" | ||
8239 | |||
8240 | CVE_STATUS[CVE-2024-43843] = "fixed-version: Fixed from version 6.11" | ||
8241 | |||
8242 | CVE_STATUS[CVE-2024-43844] = "fixed-version: Fixed from version 6.11" | ||
8243 | |||
8244 | CVE_STATUS[CVE-2024-43845] = "fixed-version: Fixed from version 6.11" | ||
8245 | |||
8246 | CVE_STATUS[CVE-2024-43846] = "fixed-version: Fixed from version 6.11" | ||
8247 | |||
8248 | CVE_STATUS[CVE-2024-43847] = "fixed-version: Fixed from version 6.11" | ||
8249 | |||
8250 | CVE_STATUS[CVE-2024-43848] = "fixed-version: Fixed from version 6.11" | ||
8251 | |||
8252 | CVE_STATUS[CVE-2024-43849] = "fixed-version: Fixed from version 6.11" | ||
8253 | |||
8254 | CVE_STATUS[CVE-2024-43850] = "fixed-version: Fixed from version 6.11" | ||
8255 | |||
8256 | CVE_STATUS[CVE-2024-43851] = "fixed-version: Fixed from version 6.11" | ||
8257 | |||
8258 | CVE_STATUS[CVE-2024-43852] = "fixed-version: Fixed from version 6.11" | ||
8259 | |||
8260 | CVE_STATUS[CVE-2024-43853] = "fixed-version: Fixed from version 6.11" | ||
8261 | |||
8262 | CVE_STATUS[CVE-2024-43854] = "fixed-version: Fixed from version 6.11" | ||
8263 | |||
8264 | CVE_STATUS[CVE-2024-43855] = "fixed-version: Fixed from version 6.11" | ||
8265 | |||
8266 | CVE_STATUS[CVE-2024-43856] = "fixed-version: Fixed from version 6.11" | ||
8267 | |||
8268 | CVE_STATUS[CVE-2024-43857] = "fixed-version: Fixed from version 6.11" | ||
8269 | |||
8270 | CVE_STATUS[CVE-2024-43858] = "fixed-version: Fixed from version 6.11" | ||
8271 | |||
8272 | CVE_STATUS[CVE-2024-43859] = "fixed-version: Fixed from version 6.11" | ||
8273 | |||
8274 | CVE_STATUS[CVE-2024-43860] = "fixed-version: Fixed from version 6.11" | ||
8275 | |||
8276 | CVE_STATUS[CVE-2024-43861] = "fixed-version: Fixed from version 6.11" | ||
8277 | |||
8278 | CVE_STATUS[CVE-2024-43862] = "fixed-version: Fixed from version 6.11" | ||
8279 | |||
8280 | CVE_STATUS[CVE-2024-43863] = "fixed-version: Fixed from version 6.11" | ||
8281 | |||
8282 | CVE_STATUS[CVE-2024-43864] = "fixed-version: Fixed from version 6.11" | ||
8283 | |||
8284 | CVE_STATUS[CVE-2024-43865] = "fixed-version: Fixed from version 6.11" | ||
8285 | |||
8286 | CVE_STATUS[CVE-2024-43866] = "fixed-version: Fixed from version 6.11" | ||
8287 | |||
8288 | CVE_STATUS[CVE-2024-43867] = "fixed-version: Fixed from version 6.11" | ||
8289 | |||
8290 | CVE_STATUS[CVE-2024-43868] = "fixed-version: Fixed from version 6.11" | ||
8291 | |||
8292 | CVE_STATUS[CVE-2024-43869] = "fixed-version: Fixed from version 6.11" | ||
8293 | |||
8294 | CVE_STATUS[CVE-2024-43870] = "fixed-version: Fixed from version 6.11" | ||
8295 | |||
8296 | CVE_STATUS[CVE-2024-43871] = "fixed-version: Fixed from version 6.11" | ||
8297 | |||
8298 | CVE_STATUS[CVE-2024-43872] = "fixed-version: Fixed from version 6.11" | ||
8299 | |||
8300 | CVE_STATUS[CVE-2024-43873] = "fixed-version: Fixed from version 6.11" | ||
8301 | |||
8302 | CVE_STATUS[CVE-2024-43874] = "fixed-version: Fixed from version 6.11" | ||
8303 | |||
8304 | CVE_STATUS[CVE-2024-43875] = "fixed-version: Fixed from version 6.11" | ||
8305 | |||
8306 | CVE_STATUS[CVE-2024-43876] = "fixed-version: Fixed from version 6.11" | ||
8307 | |||
8308 | CVE_STATUS[CVE-2024-43877] = "fixed-version: Fixed from version 6.11" | ||
8309 | |||
8310 | CVE_STATUS[CVE-2024-43878] = "fixed-version: Fixed from version 6.11" | ||
8311 | |||
8312 | CVE_STATUS[CVE-2024-43879] = "fixed-version: Fixed from version 6.11" | ||
8313 | |||
8314 | CVE_STATUS[CVE-2024-43880] = "fixed-version: Fixed from version 6.11" | ||
8315 | |||
8316 | CVE_STATUS[CVE-2024-43881] = "fixed-version: Fixed from version 6.11" | ||
8317 | |||
8318 | CVE_STATUS[CVE-2024-43882] = "fixed-version: Fixed from version 6.11" | ||
8319 | |||
8320 | CVE_STATUS[CVE-2024-43883] = "fixed-version: Fixed from version 6.11" | ||
8321 | |||
8322 | CVE_STATUS[CVE-2024-43884] = "fixed-version: Fixed from version 6.11" | ||
8323 | |||
8324 | CVE_STATUS[CVE-2024-43886] = "fixed-version: Fixed from version 6.11" | ||
8325 | |||
8326 | CVE_STATUS[CVE-2024-43887] = "fixed-version: Fixed from version 6.11" | ||
8327 | |||
8328 | CVE_STATUS[CVE-2024-43888] = "fixed-version: Fixed from version 6.11" | ||
8329 | |||
8330 | CVE_STATUS[CVE-2024-43889] = "fixed-version: Fixed from version 6.11" | ||
8331 | |||
8332 | CVE_STATUS[CVE-2024-43890] = "fixed-version: Fixed from version 6.11" | ||
8333 | |||
8334 | CVE_STATUS[CVE-2024-43891] = "fixed-version: Fixed from version 6.11" | ||
8335 | |||
8336 | CVE_STATUS[CVE-2024-43892] = "fixed-version: Fixed from version 6.11" | ||
8337 | |||
8338 | CVE_STATUS[CVE-2024-43893] = "fixed-version: Fixed from version 6.11" | ||
8339 | |||
8340 | CVE_STATUS[CVE-2024-43894] = "fixed-version: Fixed from version 6.11" | ||
8341 | |||
8342 | CVE_STATUS[CVE-2024-43895] = "fixed-version: Fixed from version 6.11" | ||
8343 | |||
8344 | CVE_STATUS[CVE-2024-43896] = "fixed-version: Fixed from version 6.11" | ||
8345 | |||
8346 | CVE_STATUS[CVE-2024-43897] = "fixed-version: Fixed from version 6.10.5" | ||
8347 | |||
8348 | CVE_STATUS[CVE-2024-43899] = "fixed-version: Fixed from version 6.11" | ||
8349 | |||
8350 | CVE_STATUS[CVE-2024-43900] = "fixed-version: Fixed from version 6.11" | ||
8351 | |||
8352 | CVE_STATUS[CVE-2024-43901] = "fixed-version: Fixed from version 6.11" | ||
8353 | |||
8354 | CVE_STATUS[CVE-2024-43902] = "fixed-version: Fixed from version 6.11" | ||
8355 | |||
8356 | CVE_STATUS[CVE-2024-43904] = "fixed-version: Fixed from version 6.11" | ||
8357 | |||
8358 | CVE_STATUS[CVE-2024-43905] = "fixed-version: Fixed from version 6.11" | ||
8359 | |||
8360 | CVE_STATUS[CVE-2024-43906] = "fixed-version: Fixed from version 6.11" | ||
8361 | |||
8362 | CVE_STATUS[CVE-2024-43907] = "fixed-version: Fixed from version 6.11" | ||
8363 | |||
8364 | CVE_STATUS[CVE-2024-43908] = "fixed-version: Fixed from version 6.11" | ||
8365 | |||
8366 | CVE_STATUS[CVE-2024-43909] = "fixed-version: Fixed from version 6.11" | ||
8367 | |||
8368 | CVE_STATUS[CVE-2024-43910] = "fixed-version: Fixed from version 6.11" | ||
8369 | |||
8370 | CVE_STATUS[CVE-2024-43911] = "fixed-version: Fixed from version 6.11" | ||
8371 | |||
8372 | CVE_STATUS[CVE-2024-43912] = "fixed-version: Fixed from version 6.11" | ||
8373 | |||
8374 | CVE_STATUS[CVE-2024-43913] = "fixed-version: Fixed from version 6.11" | ||
8375 | |||
8376 | CVE_STATUS[CVE-2024-43914] = "fixed-version: Fixed from version 6.11" | ||
8377 | |||
8378 | CVE_STATUS[CVE-2024-44931] = "fixed-version: Fixed from version 6.11" | ||
8379 | |||
8380 | CVE_STATUS[CVE-2024-44932] = "fixed-version: Fixed from version 6.11" | ||
8381 | |||
8382 | CVE_STATUS[CVE-2024-44933] = "fixed-version: Fixed from version 6.10.5" | ||
8383 | |||
8384 | CVE_STATUS[CVE-2024-44934] = "fixed-version: Fixed from version 6.11" | ||
8385 | |||
8386 | CVE_STATUS[CVE-2024-44935] = "fixed-version: Fixed from version 6.11" | ||
8387 | |||
8388 | CVE_STATUS[CVE-2024-44936] = "fixed-version: Fixed from version 6.11" | ||
8389 | |||
8390 | CVE_STATUS[CVE-2024-44937] = "fixed-version: Fixed from version 6.11" | ||
8391 | |||
8392 | CVE_STATUS[CVE-2024-44938] = "fixed-version: Fixed from version 6.11" | ||
8393 | |||
8394 | CVE_STATUS[CVE-2024-44939] = "fixed-version: Fixed from version 6.11" | ||
8395 | |||
8396 | CVE_STATUS[CVE-2024-44940] = "fixed-version: Fixed from version 6.11" | ||
8397 | |||
8398 | CVE_STATUS[CVE-2024-44941] = "fixed-version: Fixed from version 6.11" | ||
8399 | |||
8400 | CVE_STATUS[CVE-2024-44942] = "fixed-version: Fixed from version 6.11" | ||
8401 | |||
8402 | CVE_STATUS[CVE-2024-44943] = "fixed-version: Fixed from version 6.10" | ||
8403 | |||
8404 | CVE_STATUS[CVE-2024-44944] = "fixed-version: Fixed from version 6.11" | ||
8405 | |||
8406 | CVE_STATUS[CVE-2024-44945] = "fixed-version: Fixed from version 6.11" | ||
8407 | |||
8408 | CVE_STATUS[CVE-2024-44946] = "fixed-version: Fixed from version 6.11" | ||
8409 | |||
8410 | CVE_STATUS[CVE-2024-44947] = "fixed-version: Fixed from version 6.11" | ||
8411 | |||
8412 | CVE_STATUS[CVE-2024-44948] = "fixed-version: Fixed from version 6.11" | ||
8413 | |||
8414 | CVE_STATUS[CVE-2024-44949] = "fixed-version: Fixed from version 6.11" | ||
8415 | |||
8416 | CVE_STATUS[CVE-2024-44950] = "fixed-version: Fixed from version 6.11" | ||
8417 | |||
8418 | CVE_STATUS[CVE-2024-44951] = "fixed-version: Fixed from version 6.11" | ||
8419 | |||
8420 | CVE_STATUS[CVE-2024-44953] = "fixed-version: Fixed from version 6.11" | ||
8421 | |||
8422 | CVE_STATUS[CVE-2024-44954] = "fixed-version: Fixed from version 6.11" | ||
8423 | |||
8424 | CVE_STATUS[CVE-2024-44955] = "fixed-version: Fixed from version 6.11" | ||
8425 | |||
8426 | CVE_STATUS[CVE-2024-44956] = "fixed-version: Fixed from version 6.11" | ||
8427 | |||
8428 | CVE_STATUS[CVE-2024-44957] = "fixed-version: Fixed from version 6.11" | ||
8429 | |||
8430 | CVE_STATUS[CVE-2024-44958] = "fixed-version: Fixed from version 6.11" | ||
8431 | |||
8432 | CVE_STATUS[CVE-2024-44959] = "fixed-version: Fixed from version 6.11" | ||
8433 | |||
8434 | CVE_STATUS[CVE-2024-44960] = "fixed-version: Fixed from version 6.11" | ||
8435 | |||
8436 | CVE_STATUS[CVE-2024-44961] = "fixed-version: Fixed from version 6.11" | ||
8437 | |||
8438 | CVE_STATUS[CVE-2024-44962] = "fixed-version: Fixed from version 6.11" | ||
8439 | |||
8440 | CVE_STATUS[CVE-2024-44963] = "fixed-version: Fixed from version 6.11" | ||
8441 | |||
8442 | CVE_STATUS[CVE-2024-44964] = "fixed-version: Fixed from version 6.11" | ||
8443 | |||
8444 | CVE_STATUS[CVE-2024-44965] = "fixed-version: Fixed from version 6.11" | ||
8445 | |||
8446 | CVE_STATUS[CVE-2024-44966] = "fixed-version: Fixed from version 6.11" | ||
8447 | |||
8448 | CVE_STATUS[CVE-2024-44967] = "fixed-version: Fixed from version 6.11" | ||
8449 | |||
8450 | CVE_STATUS[CVE-2024-44968] = "fixed-version: Fixed from version 6.10.5" | ||
8451 | |||
8452 | CVE_STATUS[CVE-2024-44969] = "fixed-version: Fixed from version 6.11" | ||
8453 | |||
8454 | CVE_STATUS[CVE-2024-44970] = "fixed-version: Fixed from version 6.11" | ||
8455 | |||
8456 | CVE_STATUS[CVE-2024-44971] = "fixed-version: Fixed from version 6.11" | ||
8457 | |||
8458 | CVE_STATUS[CVE-2024-44972] = "fixed-version: Fixed from version 6.11" | ||
8459 | |||
8460 | CVE_STATUS[CVE-2024-44973] = "fixed-version: Fixed from version 6.11" | ||
8461 | |||
8462 | CVE_STATUS[CVE-2024-44974] = "fixed-version: Fixed from version 6.11" | ||
8463 | |||
8464 | CVE_STATUS[CVE-2024-44975] = "fixed-version: Fixed from version 6.11" | ||
8465 | |||
8466 | CVE_STATUS[CVE-2024-44976] = "fixed-version: Fixed from version 6.11" | ||
8467 | |||
8468 | CVE_STATUS[CVE-2024-44977] = "fixed-version: Fixed from version 6.11" | ||
8469 | |||
8470 | CVE_STATUS[CVE-2024-44978] = "fixed-version: Fixed from version 6.11" | ||
8471 | |||
8472 | CVE_STATUS[CVE-2024-44979] = "fixed-version: Fixed from version 6.11" | ||
8473 | |||
8474 | CVE_STATUS[CVE-2024-44980] = "fixed-version: Fixed from version 6.11" | ||
8475 | |||
8476 | CVE_STATUS[CVE-2024-44981] = "fixed-version: Fixed from version 6.11" | ||
8477 | |||
8478 | CVE_STATUS[CVE-2024-44982] = "fixed-version: Fixed from version 6.11" | ||
8479 | |||
8480 | CVE_STATUS[CVE-2024-44983] = "fixed-version: Fixed from version 6.11" | ||
8481 | |||
8482 | CVE_STATUS[CVE-2024-44984] = "fixed-version: Fixed from version 6.11" | ||
8483 | |||
8484 | CVE_STATUS[CVE-2024-44985] = "fixed-version: Fixed from version 6.11" | ||
8485 | |||
8486 | CVE_STATUS[CVE-2024-44986] = "fixed-version: Fixed from version 6.11" | ||
8487 | |||
8488 | CVE_STATUS[CVE-2024-44987] = "fixed-version: Fixed from version 6.11" | ||
8489 | |||
8490 | CVE_STATUS[CVE-2024-44988] = "fixed-version: Fixed from version 6.11" | ||
8491 | |||
8492 | CVE_STATUS[CVE-2024-44989] = "fixed-version: Fixed from version 6.11" | ||
8493 | |||
8494 | CVE_STATUS[CVE-2024-44990] = "fixed-version: Fixed from version 6.11" | ||
8495 | |||
8496 | CVE_STATUS[CVE-2024-44991] = "fixed-version: Fixed from version 6.11" | ||
8497 | |||
8498 | CVE_STATUS[CVE-2024-44992] = "fixed-version: Fixed from version 6.11" | ||
8499 | |||
8500 | CVE_STATUS[CVE-2024-44993] = "fixed-version: Fixed from version 6.11" | ||
8501 | |||
8502 | CVE_STATUS[CVE-2024-44994] = "fixed-version: Fixed from version 6.11" | ||
8503 | |||
8504 | CVE_STATUS[CVE-2024-44995] = "fixed-version: Fixed from version 6.11" | ||
8505 | |||
8506 | CVE_STATUS[CVE-2024-44996] = "fixed-version: Fixed from version 6.11" | ||
8507 | |||
8508 | CVE_STATUS[CVE-2024-44997] = "fixed-version: Fixed from version 6.11" | ||
8509 | |||
8510 | CVE_STATUS[CVE-2024-44998] = "fixed-version: Fixed from version 6.11" | ||
8511 | |||
8512 | CVE_STATUS[CVE-2024-44999] = "fixed-version: Fixed from version 6.11" | ||
8513 | |||
8514 | CVE_STATUS[CVE-2024-45000] = "fixed-version: Fixed from version 6.11" | ||
8515 | |||
8516 | CVE_STATUS[CVE-2024-45001] = "fixed-version: Fixed from version 6.11" | ||
8517 | |||
8518 | CVE_STATUS[CVE-2024-45002] = "fixed-version: Fixed from version 6.11" | ||
8519 | |||
8520 | CVE_STATUS[CVE-2024-45003] = "fixed-version: Fixed from version 6.11" | ||
8521 | |||
8522 | CVE_STATUS[CVE-2024-45004] = "fixed-version: Fixed from version 6.11" | ||
8523 | |||
8524 | CVE_STATUS[CVE-2024-45005] = "fixed-version: Fixed from version 6.11" | ||
8525 | |||
8526 | CVE_STATUS[CVE-2024-45006] = "fixed-version: Fixed from version 6.11" | ||
8527 | |||
8528 | CVE_STATUS[CVE-2024-45007] = "fixed-version: Fixed from version 6.11" | ||
8529 | |||
8530 | CVE_STATUS[CVE-2024-45008] = "fixed-version: Fixed from version 6.11" | ||
8531 | |||
8532 | CVE_STATUS[CVE-2024-45009] = "fixed-version: Fixed from version 6.11" | ||
8533 | |||
8534 | CVE_STATUS[CVE-2024-45010] = "fixed-version: Fixed from version 6.11" | ||
8535 | |||
8536 | CVE_STATUS[CVE-2024-45011] = "fixed-version: Fixed from version 6.11" | ||
8537 | |||
8538 | CVE_STATUS[CVE-2024-45012] = "fixed-version: Fixed from version 6.11" | ||
8539 | |||
8540 | CVE_STATUS[CVE-2024-45013] = "fixed-version: Fixed from version 6.11" | ||
8541 | |||
8542 | CVE_STATUS[CVE-2024-45014] = "fixed-version: Fixed from version 6.11" | ||
8543 | |||
8544 | CVE_STATUS[CVE-2024-45015] = "fixed-version: Fixed from version 6.11" | ||
8545 | |||
8546 | CVE_STATUS[CVE-2024-45016] = "fixed-version: Fixed from version 6.11" | ||
8547 | |||
8548 | CVE_STATUS[CVE-2024-45017] = "fixed-version: Fixed from version 6.11" | ||
8549 | |||
8550 | CVE_STATUS[CVE-2024-45018] = "fixed-version: Fixed from version 6.11" | ||
8551 | |||
8552 | CVE_STATUS[CVE-2024-45019] = "fixed-version: Fixed from version 6.11" | ||
8553 | |||
8554 | CVE_STATUS[CVE-2024-45020] = "fixed-version: Fixed from version 6.11" | ||
8555 | |||
8556 | CVE_STATUS[CVE-2024-45021] = "fixed-version: Fixed from version 6.11" | ||
8557 | |||
8558 | CVE_STATUS[CVE-2024-45022] = "fixed-version: Fixed from version 6.11" | ||
8559 | |||
8560 | CVE_STATUS[CVE-2024-45023] = "fixed-version: Fixed from version 6.11" | ||
8561 | |||
8562 | CVE_STATUS[CVE-2024-45024] = "fixed-version: Fixed from version 6.11" | ||
8563 | |||
8564 | CVE_STATUS[CVE-2024-45025] = "fixed-version: Fixed from version 6.11" | ||
8565 | |||
8566 | CVE_STATUS[CVE-2024-45026] = "fixed-version: Fixed from version 6.11" | ||
8567 | |||
8568 | CVE_STATUS[CVE-2024-45027] = "fixed-version: Fixed from version 6.11" | ||
8569 | |||
8570 | CVE_STATUS[CVE-2024-45028] = "fixed-version: Fixed from version 6.11" | ||
8571 | |||
8572 | CVE_STATUS[CVE-2024-45029] = "fixed-version: Fixed from version 6.11" | ||
8573 | |||
8574 | CVE_STATUS[CVE-2024-45030] = "fixed-version: Fixed from version 6.11" | ||
8575 | |||
8576 | CVE_STATUS[CVE-2024-45828] = "cpe-stable-backport: Backported in 6.12.5" | ||
8577 | |||
8578 | CVE_STATUS[CVE-2024-46672] = "fixed-version: Fixed from version 6.11" | ||
8579 | |||
8580 | CVE_STATUS[CVE-2024-46673] = "fixed-version: Fixed from version 6.11" | ||
8581 | |||
8582 | CVE_STATUS[CVE-2024-46674] = "fixed-version: Fixed from version 6.11" | ||
8583 | |||
8584 | CVE_STATUS[CVE-2024-46675] = "fixed-version: Fixed from version 6.11" | ||
8585 | |||
8586 | CVE_STATUS[CVE-2024-46676] = "fixed-version: Fixed from version 6.11" | ||
8587 | |||
8588 | CVE_STATUS[CVE-2024-46677] = "fixed-version: Fixed from version 6.11" | ||
8589 | |||
8590 | CVE_STATUS[CVE-2024-46678] = "fixed-version: Fixed from version 6.11" | ||
8591 | |||
8592 | CVE_STATUS[CVE-2024-46679] = "fixed-version: Fixed from version 6.11" | ||
8593 | |||
8594 | CVE_STATUS[CVE-2024-46680] = "fixed-version: Fixed from version 6.11" | ||
8595 | |||
8596 | CVE_STATUS[CVE-2024-46681] = "fixed-version: Fixed from version 6.11" | ||
8597 | |||
8598 | CVE_STATUS[CVE-2024-46682] = "fixed-version: Fixed from version 6.11" | ||
8599 | |||
8600 | CVE_STATUS[CVE-2024-46683] = "fixed-version: Fixed from version 6.11" | ||
8601 | |||
8602 | CVE_STATUS[CVE-2024-46684] = "fixed-version: Fixed from version 6.11" | ||
8603 | |||
8604 | CVE_STATUS[CVE-2024-46685] = "fixed-version: Fixed from version 6.11" | ||
8605 | |||
8606 | CVE_STATUS[CVE-2024-46686] = "fixed-version: Fixed from version 6.11" | ||
8607 | |||
8608 | CVE_STATUS[CVE-2024-46687] = "fixed-version: Fixed from version 6.11" | ||
8609 | |||
8610 | CVE_STATUS[CVE-2024-46688] = "fixed-version: Fixed from version 6.11" | ||
8611 | |||
8612 | CVE_STATUS[CVE-2024-46689] = "fixed-version: Fixed from version 6.11" | ||
8613 | |||
8614 | CVE_STATUS[CVE-2024-46690] = "fixed-version: Fixed from version 6.11" | ||
8615 | |||
8616 | CVE_STATUS[CVE-2024-46691] = "fixed-version: Fixed from version 6.11" | ||
8617 | |||
8618 | CVE_STATUS[CVE-2024-46692] = "fixed-version: Fixed from version 6.11" | ||
8619 | |||
8620 | CVE_STATUS[CVE-2024-46693] = "fixed-version: Fixed from version 6.11" | ||
8621 | |||
8622 | CVE_STATUS[CVE-2024-46694] = "fixed-version: Fixed from version 6.11" | ||
8623 | |||
8624 | CVE_STATUS[CVE-2024-46695] = "fixed-version: Fixed from version 6.11" | ||
8625 | |||
8626 | CVE_STATUS[CVE-2024-46696] = "fixed-version: Fixed from version 6.11" | ||
8627 | |||
8628 | CVE_STATUS[CVE-2024-46697] = "fixed-version: Fixed from version 6.11" | ||
8629 | |||
8630 | CVE_STATUS[CVE-2024-46698] = "fixed-version: Fixed from version 6.11" | ||
8631 | |||
8632 | CVE_STATUS[CVE-2024-46699] = "fixed-version: Fixed from version 6.11" | ||
8633 | |||
8634 | # CVE-2024-46700 has no known resolution | ||
8635 | |||
8636 | CVE_STATUS[CVE-2024-46701] = "fixed-version: Fixed from version 6.11" | ||
8637 | |||
8638 | CVE_STATUS[CVE-2024-46702] = "fixed-version: Fixed from version 6.11" | ||
8639 | |||
8640 | CVE_STATUS[CVE-2024-46703] = "fixed-version: Fixed from version 6.11" | ||
8641 | |||
8642 | CVE_STATUS[CVE-2024-46704] = "fixed-version: Fixed from version 6.11" | ||
8643 | |||
8644 | CVE_STATUS[CVE-2024-46705] = "fixed-version: Fixed from version 6.11" | ||
8645 | |||
8646 | CVE_STATUS[CVE-2024-46706] = "fixed-version: Fixed from version 6.11" | ||
8647 | |||
8648 | CVE_STATUS[CVE-2024-46707] = "fixed-version: Fixed from version 6.11" | ||
8649 | |||
8650 | CVE_STATUS[CVE-2024-46708] = "fixed-version: Fixed from version 6.11" | ||
8651 | |||
8652 | CVE_STATUS[CVE-2024-46709] = "fixed-version: Fixed from version 6.11" | ||
8653 | |||
8654 | CVE_STATUS[CVE-2024-46710] = "fixed-version: Fixed from version 6.11" | ||
8655 | |||
8656 | CVE_STATUS[CVE-2024-46711] = "fixed-version: Fixed from version 6.11" | ||
8657 | |||
8658 | CVE_STATUS[CVE-2024-46712] = "fixed-version: Fixed from version 6.10.8" | ||
8659 | |||
8660 | CVE_STATUS[CVE-2024-46713] = "fixed-version: Fixed from version 6.11" | ||
8661 | |||
8662 | CVE_STATUS[CVE-2024-46714] = "fixed-version: Fixed from version 6.11" | ||
8663 | |||
8664 | CVE_STATUS[CVE-2024-46715] = "fixed-version: Fixed from version 6.11" | ||
8665 | |||
8666 | CVE_STATUS[CVE-2024-46716] = "fixed-version: Fixed from version 6.11" | ||
8667 | |||
8668 | CVE_STATUS[CVE-2024-46717] = "fixed-version: Fixed from version 6.11" | ||
8669 | |||
8670 | CVE_STATUS[CVE-2024-46718] = "fixed-version: Fixed from version 6.11" | ||
8671 | |||
8672 | CVE_STATUS[CVE-2024-46719] = "fixed-version: Fixed from version 6.11" | ||
8673 | |||
8674 | CVE_STATUS[CVE-2024-46720] = "fixed-version: Fixed from version 6.11" | ||
8675 | |||
8676 | CVE_STATUS[CVE-2024-46721] = "fixed-version: Fixed from version 6.11" | ||
8677 | |||
8678 | CVE_STATUS[CVE-2024-46722] = "fixed-version: Fixed from version 6.11" | ||
8679 | |||
8680 | CVE_STATUS[CVE-2024-46723] = "fixed-version: Fixed from version 6.11" | ||
8681 | |||
8682 | CVE_STATUS[CVE-2024-46724] = "fixed-version: Fixed from version 6.11" | ||
8683 | |||
8684 | CVE_STATUS[CVE-2024-46725] = "fixed-version: Fixed from version 6.11" | ||
8685 | |||
8686 | CVE_STATUS[CVE-2024-46726] = "fixed-version: Fixed from version 6.11" | ||
8687 | |||
8688 | CVE_STATUS[CVE-2024-46727] = "fixed-version: Fixed from version 6.11" | ||
8689 | |||
8690 | CVE_STATUS[CVE-2024-46728] = "fixed-version: Fixed from version 6.11" | ||
8691 | |||
8692 | CVE_STATUS[CVE-2024-46729] = "fixed-version: Fixed from version 6.11" | ||
8693 | |||
8694 | CVE_STATUS[CVE-2024-46730] = "fixed-version: Fixed from version 6.11" | ||
8695 | |||
8696 | CVE_STATUS[CVE-2024-46731] = "fixed-version: Fixed from version 6.11" | ||
8697 | |||
8698 | CVE_STATUS[CVE-2024-46732] = "fixed-version: Fixed from version 6.11" | ||
8699 | |||
8700 | CVE_STATUS[CVE-2024-46733] = "fixed-version: Fixed from version 6.11" | ||
8701 | |||
8702 | CVE_STATUS[CVE-2024-46734] = "fixed-version: Fixed from version 6.10.10" | ||
8703 | |||
8704 | CVE_STATUS[CVE-2024-46735] = "fixed-version: Fixed from version 6.11" | ||
8705 | |||
8706 | CVE_STATUS[CVE-2024-46736] = "fixed-version: Fixed from version 6.11" | ||
8707 | |||
8708 | CVE_STATUS[CVE-2024-46737] = "fixed-version: Fixed from version 6.11" | ||
8709 | |||
8710 | CVE_STATUS[CVE-2024-46738] = "fixed-version: Fixed from version 6.11" | ||
8711 | |||
8712 | CVE_STATUS[CVE-2024-46739] = "fixed-version: Fixed from version 6.11" | ||
8713 | |||
8714 | CVE_STATUS[CVE-2024-46740] = "fixed-version: Fixed from version 6.11" | ||
8715 | |||
8716 | CVE_STATUS[CVE-2024-46741] = "fixed-version: Fixed from version 6.11" | ||
8717 | |||
8718 | CVE_STATUS[CVE-2024-46742] = "fixed-version: Fixed from version 6.11" | ||
8719 | |||
8720 | CVE_STATUS[CVE-2024-46743] = "fixed-version: Fixed from version 6.11" | ||
8721 | |||
8722 | CVE_STATUS[CVE-2024-46744] = "fixed-version: Fixed from version 6.11" | ||
8723 | |||
8724 | CVE_STATUS[CVE-2024-46745] = "fixed-version: Fixed from version 6.11" | ||
8725 | |||
8726 | CVE_STATUS[CVE-2024-46746] = "fixed-version: Fixed from version 6.11" | ||
8727 | |||
8728 | CVE_STATUS[CVE-2024-46747] = "fixed-version: Fixed from version 6.11" | ||
8729 | |||
8730 | CVE_STATUS[CVE-2024-46748] = "fixed-version: Fixed from version 6.11" | ||
8731 | |||
8732 | CVE_STATUS[CVE-2024-46749] = "fixed-version: Fixed from version 6.11" | ||
8733 | |||
8734 | CVE_STATUS[CVE-2024-46750] = "fixed-version: Fixed from version 6.11" | ||
8735 | |||
8736 | CVE_STATUS[CVE-2024-46751] = "fixed-version: Fixed from version 6.11" | ||
8737 | |||
8738 | CVE_STATUS[CVE-2024-46752] = "fixed-version: Fixed from version 6.11" | ||
8739 | |||
8740 | CVE_STATUS[CVE-2024-46753] = "fixed-version: Fixed from version 6.11" | ||
8741 | |||
8742 | CVE_STATUS[CVE-2024-46754] = "fixed-version: Fixed from version 6.11" | ||
8743 | |||
8744 | CVE_STATUS[CVE-2024-46755] = "fixed-version: Fixed from version 6.11" | ||
8745 | |||
8746 | CVE_STATUS[CVE-2024-46759] = "fixed-version: Fixed from version 6.11" | ||
8747 | |||
8748 | CVE_STATUS[CVE-2024-46760] = "fixed-version: Fixed from version 6.11" | ||
8749 | |||
8750 | CVE_STATUS[CVE-2024-46761] = "fixed-version: Fixed from version 6.11" | ||
8751 | |||
8752 | CVE_STATUS[CVE-2024-46762] = "fixed-version: Fixed from version 6.11" | ||
8753 | |||
8754 | CVE_STATUS[CVE-2024-46763] = "fixed-version: Fixed from version 6.11" | ||
8755 | |||
8756 | CVE_STATUS[CVE-2024-46764] = "fixed-version: Fixed from version 6.11" | ||
8757 | |||
8758 | CVE_STATUS[CVE-2024-46765] = "fixed-version: Fixed from version 6.11" | ||
8759 | |||
8760 | CVE_STATUS[CVE-2024-46766] = "fixed-version: Fixed from version 6.11" | ||
8761 | |||
8762 | CVE_STATUS[CVE-2024-46767] = "fixed-version: Fixed from version 6.11" | ||
8763 | |||
8764 | CVE_STATUS[CVE-2024-46768] = "fixed-version: Fixed from version 6.11" | ||
8765 | |||
8766 | CVE_STATUS[CVE-2024-46769] = "fixed-version: Fixed from version 6.11" | ||
8767 | |||
8768 | CVE_STATUS[CVE-2024-46770] = "fixed-version: Fixed from version 6.11" | ||
8769 | |||
8770 | CVE_STATUS[CVE-2024-46771] = "fixed-version: Fixed from version 6.11" | ||
8771 | |||
8772 | CVE_STATUS[CVE-2024-46772] = "fixed-version: Fixed from version 6.11" | ||
8773 | |||
8774 | CVE_STATUS[CVE-2024-46773] = "fixed-version: Fixed from version 6.11" | ||
8775 | |||
8776 | CVE_STATUS[CVE-2024-46774] = "fixed-version: Fixed from version 6.11" | ||
8777 | |||
8778 | CVE_STATUS[CVE-2024-46775] = "fixed-version: Fixed from version 6.11" | ||
8779 | |||
8780 | CVE_STATUS[CVE-2024-46776] = "fixed-version: Fixed from version 6.11" | ||
8781 | |||
8782 | CVE_STATUS[CVE-2024-46777] = "fixed-version: Fixed from version 6.11" | ||
8783 | |||
8784 | CVE_STATUS[CVE-2024-46778] = "fixed-version: Fixed from version 6.11" | ||
8785 | |||
8786 | CVE_STATUS[CVE-2024-46779] = "fixed-version: Fixed from version 6.11" | ||
8787 | |||
8788 | CVE_STATUS[CVE-2024-46780] = "fixed-version: Fixed from version 6.11" | ||
8789 | |||
8790 | CVE_STATUS[CVE-2024-46781] = "fixed-version: Fixed from version 6.11" | ||
8791 | |||
8792 | CVE_STATUS[CVE-2024-46782] = "fixed-version: Fixed from version 6.11" | ||
8793 | |||
8794 | CVE_STATUS[CVE-2024-46783] = "fixed-version: Fixed from version 6.11" | ||
8795 | |||
8796 | CVE_STATUS[CVE-2024-46784] = "fixed-version: Fixed from version 6.11" | ||
8797 | |||
8798 | CVE_STATUS[CVE-2024-46785] = "fixed-version: Fixed from version 6.11" | ||
8799 | |||
8800 | CVE_STATUS[CVE-2024-46786] = "fixed-version: Fixed from version 6.11" | ||
8801 | |||
8802 | CVE_STATUS[CVE-2024-46787] = "fixed-version: Fixed from version 6.11" | ||
8803 | |||
8804 | CVE_STATUS[CVE-2024-46788] = "fixed-version: Fixed from version 6.11" | ||
8805 | |||
8806 | CVE_STATUS[CVE-2024-46789] = "fixed-version: Fixed from version 6.11" | ||
8807 | |||
8808 | CVE_STATUS[CVE-2024-46790] = "fixed-version: Fixed from version 6.11" | ||
8809 | |||
8810 | CVE_STATUS[CVE-2024-46791] = "fixed-version: Fixed from version 6.11" | ||
8811 | |||
8812 | CVE_STATUS[CVE-2024-46792] = "fixed-version: Fixed from version 6.11" | ||
8813 | |||
8814 | CVE_STATUS[CVE-2024-46793] = "fixed-version: Fixed from version 6.11" | ||
8815 | |||
8816 | CVE_STATUS[CVE-2024-46794] = "fixed-version: Fixed from version 6.11" | ||
8817 | |||
8818 | CVE_STATUS[CVE-2024-46795] = "fixed-version: Fixed from version 6.11" | ||
8819 | |||
8820 | CVE_STATUS[CVE-2024-46796] = "fixed-version: Fixed from version 6.11" | ||
8821 | |||
8822 | CVE_STATUS[CVE-2024-46797] = "fixed-version: Fixed from version 6.11" | ||
8823 | |||
8824 | CVE_STATUS[CVE-2024-46798] = "fixed-version: Fixed from version 6.11" | ||
8825 | |||
8826 | CVE_STATUS[CVE-2024-46799] = "fixed-version: Fixed from version 6.11" | ||
8827 | |||
8828 | CVE_STATUS[CVE-2024-46800] = "fixed-version: Fixed from version 6.11" | ||
8829 | |||
8830 | CVE_STATUS[CVE-2024-46801] = "fixed-version: Fixed from version 6.11" | ||
8831 | |||
8832 | CVE_STATUS[CVE-2024-46802] = "fixed-version: Fixed from version 6.11" | ||
8833 | |||
8834 | CVE_STATUS[CVE-2024-46803] = "fixed-version: Fixed from version 6.11" | ||
8835 | |||
8836 | CVE_STATUS[CVE-2024-46804] = "fixed-version: Fixed from version 6.11" | ||
8837 | |||
8838 | CVE_STATUS[CVE-2024-46805] = "fixed-version: Fixed from version 6.11" | ||
8839 | |||
8840 | CVE_STATUS[CVE-2024-46806] = "fixed-version: Fixed from version 6.11" | ||
8841 | |||
8842 | CVE_STATUS[CVE-2024-46807] = "fixed-version: Fixed from version 6.11" | ||
8843 | |||
8844 | CVE_STATUS[CVE-2024-46808] = "fixed-version: Fixed from version 6.11" | ||
8845 | |||
8846 | CVE_STATUS[CVE-2024-46809] = "fixed-version: Fixed from version 6.11" | ||
8847 | |||
8848 | CVE_STATUS[CVE-2024-46810] = "fixed-version: Fixed from version 6.11" | ||
8849 | |||
8850 | CVE_STATUS[CVE-2024-46811] = "fixed-version: Fixed from version 6.11" | ||
8851 | |||
8852 | CVE_STATUS[CVE-2024-46812] = "fixed-version: Fixed from version 6.11" | ||
8853 | |||
8854 | CVE_STATUS[CVE-2024-46813] = "fixed-version: Fixed from version 6.11" | ||
8855 | |||
8856 | CVE_STATUS[CVE-2024-46814] = "fixed-version: Fixed from version 6.11" | ||
8857 | |||
8858 | CVE_STATUS[CVE-2024-46815] = "fixed-version: Fixed from version 6.11" | ||
8859 | |||
8860 | CVE_STATUS[CVE-2024-46816] = "fixed-version: Fixed from version 6.11" | ||
8861 | |||
8862 | CVE_STATUS[CVE-2024-46817] = "fixed-version: Fixed from version 6.11" | ||
8863 | |||
8864 | CVE_STATUS[CVE-2024-46818] = "fixed-version: Fixed from version 6.11" | ||
8865 | |||
8866 | CVE_STATUS[CVE-2024-46819] = "fixed-version: Fixed from version 6.11" | ||
8867 | |||
8868 | CVE_STATUS[CVE-2024-46820] = "fixed-version: Fixed from version 6.11" | ||
8869 | |||
8870 | CVE_STATUS[CVE-2024-46821] = "fixed-version: Fixed from version 6.11" | ||
8871 | |||
8872 | CVE_STATUS[CVE-2024-46822] = "fixed-version: Fixed from version 6.11" | ||
8873 | |||
8874 | CVE_STATUS[CVE-2024-46823] = "fixed-version: Fixed from version 6.11" | ||
8875 | |||
8876 | CVE_STATUS[CVE-2024-46824] = "fixed-version: Fixed from version 6.11" | ||
8877 | |||
8878 | CVE_STATUS[CVE-2024-46825] = "fixed-version: Fixed from version 6.11" | ||
8879 | |||
8880 | CVE_STATUS[CVE-2024-46826] = "fixed-version: Fixed from version 6.11" | ||
8881 | |||
8882 | CVE_STATUS[CVE-2024-46827] = "fixed-version: Fixed from version 6.11" | ||
8883 | |||
8884 | CVE_STATUS[CVE-2024-46828] = "fixed-version: Fixed from version 6.11" | ||
8885 | |||
8886 | CVE_STATUS[CVE-2024-46829] = "fixed-version: Fixed from version 6.11" | ||
8887 | |||
8888 | CVE_STATUS[CVE-2024-46830] = "fixed-version: Fixed from version 6.11" | ||
8889 | |||
8890 | CVE_STATUS[CVE-2024-46831] = "fixed-version: Fixed from version 6.11" | ||
8891 | |||
8892 | CVE_STATUS[CVE-2024-46832] = "fixed-version: Fixed from version 6.11" | ||
8893 | |||
8894 | CVE_STATUS[CVE-2024-46833] = "fixed-version: Fixed from version 6.11" | ||
8895 | |||
8896 | CVE_STATUS[CVE-2024-46834] = "fixed-version: Fixed from version 6.11" | ||
8897 | |||
8898 | CVE_STATUS[CVE-2024-46835] = "fixed-version: Fixed from version 6.11" | ||
8899 | |||
8900 | CVE_STATUS[CVE-2024-46836] = "fixed-version: Fixed from version 6.11" | ||
8901 | |||
8902 | CVE_STATUS[CVE-2024-46837] = "fixed-version: Fixed from version 6.11" | ||
8903 | |||
8904 | CVE_STATUS[CVE-2024-46838] = "fixed-version: Fixed from version 6.11" | ||
8905 | |||
8906 | CVE_STATUS[CVE-2024-46840] = "fixed-version: Fixed from version 6.11" | ||
8907 | |||
8908 | CVE_STATUS[CVE-2024-46841] = "fixed-version: Fixed from version 6.11" | ||
8909 | |||
8910 | CVE_STATUS[CVE-2024-46842] = "fixed-version: Fixed from version 6.11" | ||
8911 | |||
8912 | CVE_STATUS[CVE-2024-46843] = "fixed-version: Fixed from version 6.11" | ||
8913 | |||
8914 | CVE_STATUS[CVE-2024-46844] = "fixed-version: Fixed from version 6.11" | ||
8915 | |||
8916 | CVE_STATUS[CVE-2024-46845] = "fixed-version: Fixed from version 6.11" | ||
8917 | |||
8918 | CVE_STATUS[CVE-2024-46846] = "fixed-version: Fixed from version 6.11" | ||
8919 | |||
8920 | CVE_STATUS[CVE-2024-46847] = "fixed-version: Fixed from version 6.11" | ||
8921 | |||
8922 | CVE_STATUS[CVE-2024-46848] = "fixed-version: Fixed from version 6.11" | ||
8923 | |||
8924 | CVE_STATUS[CVE-2024-46849] = "fixed-version: Fixed from version 6.11" | ||
8925 | |||
8926 | CVE_STATUS[CVE-2024-46850] = "fixed-version: Fixed from version 6.11" | ||
8927 | |||
8928 | CVE_STATUS[CVE-2024-46851] = "fixed-version: Fixed from version 6.11" | ||
8929 | |||
8930 | CVE_STATUS[CVE-2024-46852] = "fixed-version: Fixed from version 6.11" | ||
8931 | |||
8932 | CVE_STATUS[CVE-2024-46853] = "fixed-version: Fixed from version 6.11" | ||
8933 | |||
8934 | CVE_STATUS[CVE-2024-46854] = "fixed-version: Fixed from version 6.11" | ||
8935 | |||
8936 | CVE_STATUS[CVE-2024-46855] = "fixed-version: Fixed from version 6.11" | ||
8937 | |||
8938 | CVE_STATUS[CVE-2024-46856] = "fixed-version: Fixed from version 6.11" | ||
8939 | |||
8940 | CVE_STATUS[CVE-2024-46857] = "fixed-version: Fixed from version 6.11" | ||
8941 | |||
8942 | CVE_STATUS[CVE-2024-46858] = "fixed-version: Fixed from version 6.11" | ||
8943 | |||
8944 | CVE_STATUS[CVE-2024-46859] = "fixed-version: Fixed from version 6.11" | ||
8945 | |||
8946 | CVE_STATUS[CVE-2024-46860] = "fixed-version: Fixed from version 6.11" | ||
8947 | |||
8948 | CVE_STATUS[CVE-2024-46861] = "fixed-version: Fixed from version 6.11" | ||
8949 | |||
8950 | CVE_STATUS[CVE-2024-46862] = "fixed-version: Fixed from version 6.11" | ||
8951 | |||
8952 | CVE_STATUS[CVE-2024-46863] = "fixed-version: Fixed from version 6.11" | ||
8953 | |||
8954 | CVE_STATUS[CVE-2024-46864] = "fixed-version: Fixed from version 6.11" | ||
8955 | |||
8956 | CVE_STATUS[CVE-2024-46865] = "fixed-version: Fixed from version 6.10.11" | ||
8957 | |||
8958 | CVE_STATUS[CVE-2024-46866] = "fixed-version: Fixed from version 6.11" | ||
8959 | |||
8960 | CVE_STATUS[CVE-2024-46867] = "fixed-version: Fixed from version 6.11" | ||
8961 | |||
8962 | CVE_STATUS[CVE-2024-46868] = "fixed-version: Fixed from version 6.11" | ||
8963 | |||
8964 | CVE_STATUS[CVE-2024-46869] = "fixed-version: Fixed from version 6.12" | ||
8965 | |||
8966 | CVE_STATUS[CVE-2024-46870] = "fixed-version: Fixed from version 6.11" | ||
8967 | |||
8968 | CVE_STATUS[CVE-2024-46871] = "fixed-version: Fixed from version 6.11" | ||
8969 | |||
8970 | CVE_STATUS[CVE-2024-46896] = "fixed-version: Fixed from version 6.12.7" | ||
8971 | |||
8972 | CVE_STATUS[CVE-2024-47141] = "cpe-stable-backport: Backported in 6.12.5" | ||
8973 | |||
8974 | CVE_STATUS[CVE-2024-47143] = "cpe-stable-backport: Backported in 6.12.5" | ||
8975 | |||
8976 | CVE_STATUS[CVE-2024-47408] = "cpe-stable-backport: Backported in 6.12.7" | ||
8977 | |||
8978 | CVE_STATUS[CVE-2024-47658] = "fixed-version: Fixed from version 6.11" | ||
8979 | |||
8980 | CVE_STATUS[CVE-2024-47659] = "fixed-version: Fixed from version 6.11" | ||
8981 | |||
8982 | CVE_STATUS[CVE-2024-47660] = "fixed-version: Fixed from version 6.11" | ||
8983 | |||
8984 | CVE_STATUS[CVE-2024-47661] = "fixed-version: Fixed from version 6.11" | ||
8985 | |||
8986 | CVE_STATUS[CVE-2024-47662] = "fixed-version: Fixed from version 6.11" | ||
8987 | |||
8988 | CVE_STATUS[CVE-2024-47663] = "fixed-version: Fixed from version 6.11" | ||
8989 | |||
8990 | CVE_STATUS[CVE-2024-47664] = "fixed-version: Fixed from version 6.11" | ||
8991 | |||
8992 | CVE_STATUS[CVE-2024-47665] = "fixed-version: Fixed from version 6.11" | ||
8993 | |||
8994 | CVE_STATUS[CVE-2024-47666] = "fixed-version: Fixed from version 6.11" | ||
8995 | |||
8996 | CVE_STATUS[CVE-2024-47667] = "fixed-version: Fixed from version 6.11" | ||
8997 | |||
8998 | CVE_STATUS[CVE-2024-47668] = "fixed-version: Fixed from version 6.11" | ||
8999 | |||
9000 | CVE_STATUS[CVE-2024-47669] = "fixed-version: Fixed from version 6.11" | ||
9001 | |||
9002 | CVE_STATUS[CVE-2024-47670] = "fixed-version: Fixed from version 6.11" | ||
9003 | |||
9004 | CVE_STATUS[CVE-2024-47671] = "fixed-version: Fixed from version 6.12" | ||
9005 | |||
9006 | CVE_STATUS[CVE-2024-47672] = "fixed-version: Fixed from version 6.11" | ||
9007 | |||
9008 | CVE_STATUS[CVE-2024-47673] = "fixed-version: Fixed from version 6.11" | ||
9009 | |||
9010 | CVE_STATUS[CVE-2024-47674] = "fixed-version: Fixed from version 6.11" | ||
9011 | |||
9012 | CVE_STATUS[CVE-2024-47675] = "fixed-version: Fixed from version 6.12" | ||
9013 | |||
9014 | CVE_STATUS[CVE-2024-47676] = "fixed-version: Fixed from version 6.12" | ||
9015 | |||
9016 | CVE_STATUS[CVE-2024-47677] = "fixed-version: Fixed from version 6.12" | ||
9017 | |||
9018 | CVE_STATUS[CVE-2024-47678] = "fixed-version: Fixed from version 6.12" | ||
9019 | |||
9020 | CVE_STATUS[CVE-2024-47679] = "fixed-version: Fixed from version 6.12" | ||
9021 | |||
9022 | CVE_STATUS[CVE-2024-47680] = "fixed-version: Fixed from version 6.12" | ||
9023 | |||
9024 | CVE_STATUS[CVE-2024-47681] = "fixed-version: Fixed from version 6.12" | ||
9025 | |||
9026 | CVE_STATUS[CVE-2024-47682] = "fixed-version: Fixed from version 6.12" | ||
9027 | |||
9028 | CVE_STATUS[CVE-2024-47683] = "fixed-version: Fixed from version 6.12" | ||
9029 | |||
9030 | CVE_STATUS[CVE-2024-47684] = "fixed-version: Fixed from version 6.12" | ||
9031 | |||
9032 | CVE_STATUS[CVE-2024-47685] = "fixed-version: Fixed from version 6.12" | ||
9033 | |||
9034 | CVE_STATUS[CVE-2024-47686] = "fixed-version: Fixed from version 6.12" | ||
9035 | |||
9036 | CVE_STATUS[CVE-2024-47687] = "fixed-version: Fixed from version 6.12" | ||
9037 | |||
9038 | CVE_STATUS[CVE-2024-47688] = "fixed-version: Fixed from version 6.12" | ||
9039 | |||
9040 | CVE_STATUS[CVE-2024-47689] = "fixed-version: Fixed from version 6.12" | ||
9041 | |||
9042 | CVE_STATUS[CVE-2024-47690] = "fixed-version: Fixed from version 6.12" | ||
9043 | |||
9044 | CVE_STATUS[CVE-2024-47691] = "fixed-version: Fixed from version 6.12" | ||
9045 | |||
9046 | CVE_STATUS[CVE-2024-47692] = "fixed-version: Fixed from version 6.12" | ||
9047 | |||
9048 | CVE_STATUS[CVE-2024-47693] = "fixed-version: Fixed from version 6.12" | ||
9049 | |||
9050 | CVE_STATUS[CVE-2024-47694] = "fixed-version: Fixed from version 6.12" | ||
9051 | |||
9052 | CVE_STATUS[CVE-2024-47695] = "fixed-version: Fixed from version 6.12" | ||
9053 | |||
9054 | CVE_STATUS[CVE-2024-47696] = "fixed-version: Fixed from version 6.12" | ||
9055 | |||
9056 | CVE_STATUS[CVE-2024-47697] = "fixed-version: Fixed from version 6.12" | ||
9057 | |||
9058 | CVE_STATUS[CVE-2024-47698] = "fixed-version: Fixed from version 6.12" | ||
9059 | |||
9060 | CVE_STATUS[CVE-2024-47699] = "fixed-version: Fixed from version 6.12" | ||
9061 | |||
9062 | CVE_STATUS[CVE-2024-47700] = "fixed-version: Fixed from version 6.12" | ||
9063 | |||
9064 | CVE_STATUS[CVE-2024-47701] = "fixed-version: Fixed from version 6.12" | ||
9065 | |||
9066 | CVE_STATUS[CVE-2024-47702] = "fixed-version: Fixed from version 6.12" | ||
9067 | |||
9068 | CVE_STATUS[CVE-2024-47703] = "fixed-version: Fixed from version 6.12" | ||
9069 | |||
9070 | CVE_STATUS[CVE-2024-47704] = "fixed-version: Fixed from version 6.12" | ||
9071 | |||
9072 | CVE_STATUS[CVE-2024-47705] = "fixed-version: Fixed from version 6.12" | ||
9073 | |||
9074 | CVE_STATUS[CVE-2024-47706] = "fixed-version: Fixed from version 6.12" | ||
9075 | |||
9076 | CVE_STATUS[CVE-2024-47707] = "fixed-version: Fixed from version 6.12" | ||
9077 | |||
9078 | CVE_STATUS[CVE-2024-47708] = "fixed-version: Fixed from version 6.12" | ||
9079 | |||
9080 | CVE_STATUS[CVE-2024-47709] = "fixed-version: Fixed from version 6.12" | ||
9081 | |||
9082 | CVE_STATUS[CVE-2024-47710] = "fixed-version: Fixed from version 6.12" | ||
9083 | |||
9084 | CVE_STATUS[CVE-2024-47711] = "fixed-version: Fixed from version 6.12" | ||
9085 | |||
9086 | CVE_STATUS[CVE-2024-47712] = "fixed-version: Fixed from version 6.12" | ||
9087 | |||
9088 | CVE_STATUS[CVE-2024-47713] = "fixed-version: Fixed from version 6.12" | ||
9089 | |||
9090 | CVE_STATUS[CVE-2024-47714] = "fixed-version: Fixed from version 6.12" | ||
9091 | |||
9092 | CVE_STATUS[CVE-2024-47715] = "fixed-version: Fixed from version 6.12" | ||
9093 | |||
9094 | CVE_STATUS[CVE-2024-47716] = "fixed-version: Fixed from version 6.12" | ||
9095 | |||
9096 | CVE_STATUS[CVE-2024-47717] = "fixed-version: Fixed from version 6.12" | ||
9097 | |||
9098 | CVE_STATUS[CVE-2024-47718] = "fixed-version: Fixed from version 6.12" | ||
9099 | |||
9100 | CVE_STATUS[CVE-2024-47719] = "fixed-version: Fixed from version 6.12" | ||
9101 | |||
9102 | CVE_STATUS[CVE-2024-47720] = "fixed-version: Fixed from version 6.12" | ||
9103 | |||
9104 | CVE_STATUS[CVE-2024-47721] = "fixed-version: Fixed from version 6.12" | ||
9105 | |||
9106 | CVE_STATUS[CVE-2024-47723] = "fixed-version: Fixed from version 6.12" | ||
9107 | |||
9108 | CVE_STATUS[CVE-2024-47724] = "fixed-version: Fixed from version 6.12" | ||
9109 | |||
9110 | CVE_STATUS[CVE-2024-47726] = "fixed-version: Fixed from version 6.12" | ||
9111 | |||
9112 | CVE_STATUS[CVE-2024-47727] = "fixed-version: Fixed from version 6.12" | ||
9113 | |||
9114 | CVE_STATUS[CVE-2024-47728] = "fixed-version: Fixed from version 6.12" | ||
9115 | |||
9116 | CVE_STATUS[CVE-2024-47729] = "fixed-version: Fixed from version 6.12" | ||
9117 | |||
9118 | CVE_STATUS[CVE-2024-47730] = "fixed-version: Fixed from version 6.12" | ||
9119 | |||
9120 | CVE_STATUS[CVE-2024-47731] = "fixed-version: Fixed from version 6.12" | ||
9121 | |||
9122 | CVE_STATUS[CVE-2024-47732] = "fixed-version: Fixed from version 6.12" | ||
9123 | |||
9124 | CVE_STATUS[CVE-2024-47733] = "fixed-version: Fixed from version 6.12" | ||
9125 | |||
9126 | CVE_STATUS[CVE-2024-47734] = "fixed-version: Fixed from version 6.12" | ||
9127 | |||
9128 | CVE_STATUS[CVE-2024-47735] = "fixed-version: Fixed from version 6.12" | ||
9129 | |||
9130 | CVE_STATUS[CVE-2024-47736] = "fixed-version: Fixed from version 6.12" | ||
9131 | |||
9132 | CVE_STATUS[CVE-2024-47737] = "fixed-version: Fixed from version 6.12" | ||
9133 | |||
9134 | CVE_STATUS[CVE-2024-47738] = "fixed-version: Fixed from version 6.12" | ||
9135 | |||
9136 | CVE_STATUS[CVE-2024-47739] = "fixed-version: Fixed from version 6.12" | ||
9137 | |||
9138 | CVE_STATUS[CVE-2024-47740] = "fixed-version: Fixed from version 6.12" | ||
9139 | |||
9140 | CVE_STATUS[CVE-2024-47741] = "fixed-version: Fixed from version 6.12" | ||
9141 | |||
9142 | CVE_STATUS[CVE-2024-47742] = "fixed-version: Fixed from version 6.12" | ||
9143 | |||
9144 | CVE_STATUS[CVE-2024-47743] = "fixed-version: Fixed from version 6.12" | ||
9145 | |||
9146 | CVE_STATUS[CVE-2024-47744] = "fixed-version: Fixed from version 6.12" | ||
9147 | |||
9148 | CVE_STATUS[CVE-2024-47745] = "fixed-version: Fixed from version 6.12" | ||
9149 | |||
9150 | CVE_STATUS[CVE-2024-47746] = "fixed-version: Fixed from version 6.12" | ||
9151 | |||
9152 | CVE_STATUS[CVE-2024-47747] = "fixed-version: Fixed from version 6.12" | ||
9153 | |||
9154 | CVE_STATUS[CVE-2024-47748] = "fixed-version: Fixed from version 6.12" | ||
9155 | |||
9156 | CVE_STATUS[CVE-2024-47749] = "fixed-version: Fixed from version 6.12" | ||
9157 | |||
9158 | CVE_STATUS[CVE-2024-47750] = "fixed-version: Fixed from version 6.12" | ||
9159 | |||
9160 | CVE_STATUS[CVE-2024-47751] = "fixed-version: Fixed from version 6.12" | ||
9161 | |||
9162 | CVE_STATUS[CVE-2024-47752] = "fixed-version: Fixed from version 6.12" | ||
9163 | |||
9164 | CVE_STATUS[CVE-2024-47753] = "fixed-version: Fixed from version 6.12" | ||
9165 | |||
9166 | CVE_STATUS[CVE-2024-47754] = "fixed-version: Fixed from version 6.12" | ||
9167 | |||
9168 | CVE_STATUS[CVE-2024-47756] = "fixed-version: Fixed from version 6.12" | ||
9169 | |||
9170 | CVE_STATUS[CVE-2024-47757] = "fixed-version: Fixed from version 6.12" | ||
9171 | |||
9172 | CVE_STATUS[CVE-2024-47794] = "cpe-stable-backport: Backported in 6.12.5" | ||
9173 | |||
9174 | CVE_STATUS[CVE-2024-47809] = "cpe-stable-backport: Backported in 6.12.5" | ||
9175 | |||
9176 | CVE_STATUS[CVE-2024-48873] = "cpe-stable-backport: Backported in 6.12.5" | ||
9177 | |||
9178 | CVE_STATUS[CVE-2024-48875] = "cpe-stable-backport: Backported in 6.12.5" | ||
9179 | |||
9180 | CVE_STATUS[CVE-2024-48876] = "cpe-stable-backport: Backported in 6.12.5" | ||
9181 | |||
9182 | CVE_STATUS[CVE-2024-48881] = "cpe-stable-backport: Backported in 6.12.5" | ||
9183 | |||
9184 | CVE_STATUS[CVE-2024-49568] = "cpe-stable-backport: Backported in 6.12.7" | ||
9185 | |||
9186 | CVE_STATUS[CVE-2024-49569] = "cpe-stable-backport: Backported in 6.12.5" | ||
9187 | |||
9188 | CVE_STATUS[CVE-2024-49570] = "cpe-stable-backport: Backported in 6.12.16" | ||
9189 | |||
9190 | CVE_STATUS[CVE-2024-49571] = "cpe-stable-backport: Backported in 6.12.7" | ||
9191 | |||
9192 | CVE_STATUS[CVE-2024-49573] = "cpe-stable-backport: Backported in 6.12.7" | ||
9193 | |||
9194 | CVE_STATUS[CVE-2024-49850] = "fixed-version: Fixed from version 6.12" | ||
9195 | |||
9196 | CVE_STATUS[CVE-2024-49851] = "fixed-version: Fixed from version 6.12" | ||
9197 | |||
9198 | CVE_STATUS[CVE-2024-49852] = "fixed-version: Fixed from version 6.12" | ||
9199 | |||
9200 | CVE_STATUS[CVE-2024-49853] = "fixed-version: Fixed from version 6.12" | ||
9201 | |||
9202 | # CVE-2024-49854 has no known resolution | ||
9203 | |||
9204 | CVE_STATUS[CVE-2024-49855] = "fixed-version: Fixed from version 6.12" | ||
9205 | |||
9206 | CVE_STATUS[CVE-2024-49856] = "fixed-version: Fixed from version 6.12" | ||
9207 | |||
9208 | CVE_STATUS[CVE-2024-49857] = "fixed-version: Fixed from version 6.12" | ||
9209 | |||
9210 | CVE_STATUS[CVE-2024-49858] = "fixed-version: Fixed from version 6.12" | ||
9211 | |||
9212 | CVE_STATUS[CVE-2024-49859] = "fixed-version: Fixed from version 6.12" | ||
9213 | |||
9214 | CVE_STATUS[CVE-2024-49860] = "fixed-version: Fixed from version 6.12" | ||
9215 | |||
9216 | CVE_STATUS[CVE-2024-49861] = "fixed-version: Fixed from version 6.12" | ||
9217 | |||
9218 | CVE_STATUS[CVE-2024-49862] = "fixed-version: Fixed from version 6.12" | ||
9219 | |||
9220 | CVE_STATUS[CVE-2024-49863] = "fixed-version: Fixed from version 6.12" | ||
9221 | |||
9222 | CVE_STATUS[CVE-2024-49864] = "fixed-version: Fixed from version 6.12" | ||
9223 | |||
9224 | CVE_STATUS[CVE-2024-49865] = "fixed-version: Fixed from version 6.12" | ||
9225 | |||
9226 | CVE_STATUS[CVE-2024-49866] = "fixed-version: Fixed from version 6.12" | ||
9227 | |||
9228 | CVE_STATUS[CVE-2024-49867] = "fixed-version: Fixed from version 6.12" | ||
9229 | |||
9230 | CVE_STATUS[CVE-2024-49868] = "fixed-version: Fixed from version 6.12" | ||
9231 | |||
9232 | CVE_STATUS[CVE-2024-49869] = "fixed-version: Fixed from version 6.12" | ||
9233 | |||
9234 | CVE_STATUS[CVE-2024-49870] = "fixed-version: Fixed from version 6.12" | ||
9235 | |||
9236 | CVE_STATUS[CVE-2024-49871] = "fixed-version: Fixed from version 6.12" | ||
9237 | |||
9238 | CVE_STATUS[CVE-2024-49872] = "fixed-version: Fixed from version 6.12" | ||
9239 | |||
9240 | CVE_STATUS[CVE-2024-49873] = "fixed-version: Fixed from version 6.12" | ||
9241 | |||
9242 | CVE_STATUS[CVE-2024-49874] = "fixed-version: Fixed from version 6.12" | ||
9243 | |||
9244 | CVE_STATUS[CVE-2024-49875] = "fixed-version: Fixed from version 6.12" | ||
9245 | |||
9246 | CVE_STATUS[CVE-2024-49876] = "fixed-version: Fixed from version 6.12" | ||
9247 | |||
9248 | CVE_STATUS[CVE-2024-49877] = "fixed-version: Fixed from version 6.12" | ||
9249 | |||
9250 | CVE_STATUS[CVE-2024-49878] = "fixed-version: Fixed from version 6.12" | ||
9251 | |||
9252 | CVE_STATUS[CVE-2024-49879] = "fixed-version: Fixed from version 6.12" | ||
9253 | |||
9254 | CVE_STATUS[CVE-2024-49880] = "fixed-version: Fixed from version 6.12" | ||
9255 | |||
9256 | CVE_STATUS[CVE-2024-49881] = "fixed-version: Fixed from version 6.12" | ||
9257 | |||
9258 | CVE_STATUS[CVE-2024-49882] = "fixed-version: Fixed from version 6.12" | ||
9259 | |||
9260 | CVE_STATUS[CVE-2024-49883] = "fixed-version: Fixed from version 6.12" | ||
9261 | |||
9262 | CVE_STATUS[CVE-2024-49884] = "fixed-version: Fixed from version 6.12" | ||
9263 | |||
9264 | CVE_STATUS[CVE-2024-49885] = "fixed-version: Fixed from version 6.12" | ||
9265 | |||
9266 | CVE_STATUS[CVE-2024-49886] = "fixed-version: Fixed from version 6.12" | ||
9267 | |||
9268 | CVE_STATUS[CVE-2024-49887] = "fixed-version: Fixed from version 6.12" | ||
9269 | |||
9270 | CVE_STATUS[CVE-2024-49888] = "fixed-version: Fixed from version 6.12" | ||
9271 | |||
9272 | CVE_STATUS[CVE-2024-49889] = "fixed-version: Fixed from version 6.12" | ||
9273 | |||
9274 | CVE_STATUS[CVE-2024-49890] = "fixed-version: Fixed from version 6.12" | ||
9275 | |||
9276 | CVE_STATUS[CVE-2024-49891] = "fixed-version: Fixed from version 6.12" | ||
9277 | |||
9278 | CVE_STATUS[CVE-2024-49892] = "fixed-version: Fixed from version 6.12" | ||
9279 | |||
9280 | CVE_STATUS[CVE-2024-49893] = "fixed-version: Fixed from version 6.12" | ||
9281 | |||
9282 | CVE_STATUS[CVE-2024-49894] = "fixed-version: Fixed from version 6.12" | ||
9283 | |||
9284 | CVE_STATUS[CVE-2024-49895] = "fixed-version: Fixed from version 6.12" | ||
9285 | |||
9286 | CVE_STATUS[CVE-2024-49896] = "fixed-version: Fixed from version 6.12" | ||
9287 | |||
9288 | CVE_STATUS[CVE-2024-49897] = "fixed-version: Fixed from version 6.12" | ||
9289 | |||
9290 | CVE_STATUS[CVE-2024-49898] = "fixed-version: Fixed from version 6.12" | ||
9291 | |||
9292 | CVE_STATUS[CVE-2024-49899] = "fixed-version: Fixed from version 6.12" | ||
9293 | |||
9294 | CVE_STATUS[CVE-2024-49900] = "fixed-version: Fixed from version 6.12" | ||
9295 | |||
9296 | CVE_STATUS[CVE-2024-49901] = "fixed-version: Fixed from version 6.12" | ||
9297 | |||
9298 | CVE_STATUS[CVE-2024-49902] = "fixed-version: Fixed from version 6.12" | ||
9299 | |||
9300 | CVE_STATUS[CVE-2024-49903] = "fixed-version: Fixed from version 6.12" | ||
9301 | |||
9302 | CVE_STATUS[CVE-2024-49904] = "fixed-version: Fixed from version 6.12" | ||
9303 | |||
9304 | CVE_STATUS[CVE-2024-49905] = "fixed-version: Fixed from version 6.12" | ||
9305 | |||
9306 | CVE_STATUS[CVE-2024-49906] = "fixed-version: Fixed from version 6.12" | ||
9307 | |||
9308 | CVE_STATUS[CVE-2024-49907] = "fixed-version: Fixed from version 6.12" | ||
9309 | |||
9310 | CVE_STATUS[CVE-2024-49908] = "fixed-version: Fixed from version 6.12" | ||
9311 | |||
9312 | CVE_STATUS[CVE-2024-49909] = "fixed-version: Fixed from version 6.12" | ||
9313 | |||
9314 | CVE_STATUS[CVE-2024-49910] = "fixed-version: Fixed from version 6.12" | ||
9315 | |||
9316 | CVE_STATUS[CVE-2024-49911] = "fixed-version: Fixed from version 6.12" | ||
9317 | |||
9318 | CVE_STATUS[CVE-2024-49912] = "fixed-version: Fixed from version 6.12" | ||
9319 | |||
9320 | CVE_STATUS[CVE-2024-49913] = "fixed-version: Fixed from version 6.12" | ||
9321 | |||
9322 | CVE_STATUS[CVE-2024-49914] = "fixed-version: Fixed from version 6.12" | ||
9323 | |||
9324 | CVE_STATUS[CVE-2024-49915] = "fixed-version: Fixed from version 6.12" | ||
9325 | |||
9326 | CVE_STATUS[CVE-2024-49916] = "fixed-version: Fixed from version 6.12" | ||
9327 | |||
9328 | CVE_STATUS[CVE-2024-49917] = "fixed-version: Fixed from version 6.12" | ||
9329 | |||
9330 | CVE_STATUS[CVE-2024-49918] = "fixed-version: Fixed from version 6.12" | ||
9331 | |||
9332 | CVE_STATUS[CVE-2024-49919] = "fixed-version: Fixed from version 6.12" | ||
9333 | |||
9334 | CVE_STATUS[CVE-2024-49920] = "fixed-version: Fixed from version 6.12" | ||
9335 | |||
9336 | CVE_STATUS[CVE-2024-49921] = "fixed-version: Fixed from version 6.12" | ||
9337 | |||
9338 | CVE_STATUS[CVE-2024-49922] = "fixed-version: Fixed from version 6.12" | ||
9339 | |||
9340 | CVE_STATUS[CVE-2024-49923] = "fixed-version: Fixed from version 6.12" | ||
9341 | |||
9342 | CVE_STATUS[CVE-2024-49924] = "fixed-version: Fixed from version 6.12" | ||
9343 | |||
9344 | CVE_STATUS[CVE-2024-49925] = "fixed-version: Fixed from version 6.12" | ||
9345 | |||
9346 | CVE_STATUS[CVE-2024-49926] = "fixed-version: Fixed from version 6.12" | ||
9347 | |||
9348 | CVE_STATUS[CVE-2024-49927] = "fixed-version: Fixed from version 6.12" | ||
9349 | |||
9350 | CVE_STATUS[CVE-2024-49928] = "fixed-version: Fixed from version 6.12" | ||
9351 | |||
9352 | CVE_STATUS[CVE-2024-49929] = "fixed-version: Fixed from version 6.12" | ||
9353 | |||
9354 | CVE_STATUS[CVE-2024-49930] = "fixed-version: Fixed from version 6.12" | ||
9355 | |||
9356 | CVE_STATUS[CVE-2024-49931] = "fixed-version: Fixed from version 6.12" | ||
9357 | |||
9358 | CVE_STATUS[CVE-2024-49932] = "fixed-version: Fixed from version 6.12" | ||
9359 | |||
9360 | CVE_STATUS[CVE-2024-49933] = "fixed-version: Fixed from version 6.12" | ||
9361 | |||
9362 | CVE_STATUS[CVE-2024-49934] = "fixed-version: Fixed from version 6.12" | ||
9363 | |||
9364 | CVE_STATUS[CVE-2024-49935] = "fixed-version: Fixed from version 6.12" | ||
9365 | |||
9366 | CVE_STATUS[CVE-2024-49936] = "fixed-version: Fixed from version 6.12" | ||
9367 | |||
9368 | CVE_STATUS[CVE-2024-49937] = "fixed-version: Fixed from version 6.12" | ||
9369 | |||
9370 | CVE_STATUS[CVE-2024-49938] = "fixed-version: Fixed from version 6.12" | ||
9371 | |||
9372 | CVE_STATUS[CVE-2024-49939] = "fixed-version: Fixed from version 6.12" | ||
9373 | |||
9374 | CVE_STATUS[CVE-2024-49940] = "fixed-version: Fixed from version 6.12" | ||
9375 | |||
9376 | CVE_STATUS[CVE-2024-49941] = "fixed-version: Fixed from version 6.12" | ||
9377 | |||
9378 | CVE_STATUS[CVE-2024-49942] = "fixed-version: Fixed from version 6.12" | ||
9379 | |||
9380 | CVE_STATUS[CVE-2024-49943] = "fixed-version: Fixed from version 6.12" | ||
9381 | |||
9382 | CVE_STATUS[CVE-2024-49944] = "fixed-version: Fixed from version 6.12" | ||
9383 | |||
9384 | CVE_STATUS[CVE-2024-49945] = "fixed-version: Fixed from version 6.12" | ||
9385 | |||
9386 | CVE_STATUS[CVE-2024-49946] = "fixed-version: Fixed from version 6.12" | ||
9387 | |||
9388 | CVE_STATUS[CVE-2024-49947] = "fixed-version: Fixed from version 6.12" | ||
9389 | |||
9390 | CVE_STATUS[CVE-2024-49948] = "fixed-version: Fixed from version 6.12" | ||
9391 | |||
9392 | CVE_STATUS[CVE-2024-49949] = "fixed-version: Fixed from version 6.12" | ||
9393 | |||
9394 | CVE_STATUS[CVE-2024-49950] = "fixed-version: Fixed from version 6.12" | ||
9395 | |||
9396 | CVE_STATUS[CVE-2024-49951] = "fixed-version: Fixed from version 6.12" | ||
9397 | |||
9398 | CVE_STATUS[CVE-2024-49952] = "fixed-version: Fixed from version 6.12" | ||
9399 | |||
9400 | CVE_STATUS[CVE-2024-49953] = "fixed-version: Fixed from version 6.12" | ||
9401 | |||
9402 | CVE_STATUS[CVE-2024-49954] = "fixed-version: Fixed from version 6.12" | ||
9403 | |||
9404 | CVE_STATUS[CVE-2024-49955] = "fixed-version: Fixed from version 6.12" | ||
9405 | |||
9406 | CVE_STATUS[CVE-2024-49956] = "fixed-version: Fixed from version 6.12" | ||
9407 | |||
9408 | CVE_STATUS[CVE-2024-49957] = "fixed-version: Fixed from version 6.12" | ||
9409 | |||
9410 | CVE_STATUS[CVE-2024-49958] = "fixed-version: Fixed from version 6.12" | ||
9411 | |||
9412 | CVE_STATUS[CVE-2024-49959] = "fixed-version: Fixed from version 6.12" | ||
9413 | |||
9414 | CVE_STATUS[CVE-2024-49960] = "fixed-version: Fixed from version 6.12" | ||
9415 | |||
9416 | CVE_STATUS[CVE-2024-49961] = "fixed-version: Fixed from version 6.12" | ||
9417 | |||
9418 | CVE_STATUS[CVE-2024-49962] = "fixed-version: Fixed from version 6.12" | ||
9419 | |||
9420 | CVE_STATUS[CVE-2024-49963] = "fixed-version: Fixed from version 6.12" | ||
9421 | |||
9422 | CVE_STATUS[CVE-2024-49964] = "fixed-version: Fixed from version 6.12" | ||
9423 | |||
9424 | CVE_STATUS[CVE-2024-49965] = "fixed-version: Fixed from version 6.12" | ||
9425 | |||
9426 | CVE_STATUS[CVE-2024-49966] = "fixed-version: Fixed from version 6.12" | ||
9427 | |||
9428 | CVE_STATUS[CVE-2024-49968] = "fixed-version: Fixed from version 6.12" | ||
9429 | |||
9430 | CVE_STATUS[CVE-2024-49969] = "fixed-version: Fixed from version 6.12" | ||
9431 | |||
9432 | CVE_STATUS[CVE-2024-49970] = "fixed-version: Fixed from version 6.12" | ||
9433 | |||
9434 | CVE_STATUS[CVE-2024-49971] = "fixed-version: Fixed from version 6.12" | ||
9435 | |||
9436 | CVE_STATUS[CVE-2024-49972] = "fixed-version: Fixed from version 6.12" | ||
9437 | |||
9438 | CVE_STATUS[CVE-2024-49973] = "fixed-version: Fixed from version 6.12" | ||
9439 | |||
9440 | CVE_STATUS[CVE-2024-49974] = "fixed-version: Fixed from version 6.12" | ||
9441 | |||
9442 | CVE_STATUS[CVE-2024-49975] = "fixed-version: Fixed from version 6.12" | ||
9443 | |||
9444 | CVE_STATUS[CVE-2024-49976] = "fixed-version: Fixed from version 6.12" | ||
9445 | |||
9446 | CVE_STATUS[CVE-2024-49977] = "fixed-version: Fixed from version 6.12" | ||
9447 | |||
9448 | CVE_STATUS[CVE-2024-49978] = "fixed-version: Fixed from version 6.12" | ||
9449 | |||
9450 | CVE_STATUS[CVE-2024-49979] = "fixed-version: Fixed from version 6.12" | ||
9451 | |||
9452 | CVE_STATUS[CVE-2024-49980] = "fixed-version: Fixed from version 6.12" | ||
9453 | |||
9454 | CVE_STATUS[CVE-2024-49981] = "fixed-version: Fixed from version 6.12" | ||
9455 | |||
9456 | CVE_STATUS[CVE-2024-49982] = "fixed-version: Fixed from version 6.12" | ||
9457 | |||
9458 | CVE_STATUS[CVE-2024-49983] = "fixed-version: Fixed from version 6.12" | ||
9459 | |||
9460 | CVE_STATUS[CVE-2024-49984] = "fixed-version: Fixed from version 6.12" | ||
9461 | |||
9462 | CVE_STATUS[CVE-2024-49985] = "fixed-version: Fixed from version 6.12" | ||
9463 | |||
9464 | CVE_STATUS[CVE-2024-49986] = "fixed-version: Fixed from version 6.12" | ||
9465 | |||
9466 | CVE_STATUS[CVE-2024-49987] = "fixed-version: Fixed from version 6.12" | ||
9467 | |||
9468 | CVE_STATUS[CVE-2024-49988] = "fixed-version: Fixed from version 6.12" | ||
9469 | |||
9470 | CVE_STATUS[CVE-2024-49989] = "fixed-version: Fixed from version 6.12" | ||
9471 | |||
9472 | CVE_STATUS[CVE-2024-49990] = "fixed-version: Fixed from version 6.12" | ||
9473 | |||
9474 | CVE_STATUS[CVE-2024-49991] = "fixed-version: Fixed from version 6.12" | ||
9475 | |||
9476 | CVE_STATUS[CVE-2024-49992] = "fixed-version: Fixed from version 6.12" | ||
9477 | |||
9478 | CVE_STATUS[CVE-2024-49994] = "fixed-version: Fixed from version 6.12" | ||
9479 | |||
9480 | CVE_STATUS[CVE-2024-49996] = "fixed-version: Fixed from version 6.12" | ||
9481 | |||
9482 | CVE_STATUS[CVE-2024-49997] = "fixed-version: Fixed from version 6.12" | ||
9483 | |||
9484 | CVE_STATUS[CVE-2024-49998] = "fixed-version: Fixed from version 6.12" | ||
9485 | |||
9486 | CVE_STATUS[CVE-2024-49999] = "fixed-version: Fixed from version 6.12" | ||
9487 | |||
9488 | CVE_STATUS[CVE-2024-50000] = "fixed-version: Fixed from version 6.12" | ||
9489 | |||
9490 | CVE_STATUS[CVE-2024-50001] = "fixed-version: Fixed from version 6.12" | ||
9491 | |||
9492 | CVE_STATUS[CVE-2024-50002] = "fixed-version: Fixed from version 6.12" | ||
9493 | |||
9494 | CVE_STATUS[CVE-2024-50003] = "fixed-version: Fixed from version 6.12" | ||
9495 | |||
9496 | CVE_STATUS[CVE-2024-50004] = "fixed-version: Fixed from version 6.12" | ||
9497 | |||
9498 | CVE_STATUS[CVE-2024-50005] = "fixed-version: Fixed from version 6.12" | ||
9499 | |||
9500 | CVE_STATUS[CVE-2024-50006] = "fixed-version: Fixed from version 6.12" | ||
9501 | |||
9502 | CVE_STATUS[CVE-2024-50007] = "fixed-version: Fixed from version 6.12" | ||
9503 | |||
9504 | CVE_STATUS[CVE-2024-50008] = "fixed-version: Fixed from version 6.12" | ||
9505 | |||
9506 | CVE_STATUS[CVE-2024-50009] = "fixed-version: Fixed from version 6.12" | ||
9507 | |||
9508 | CVE_STATUS[CVE-2024-50010] = "fixed-version: Fixed from version 6.12" | ||
9509 | |||
9510 | CVE_STATUS[CVE-2024-50011] = "fixed-version: Fixed from version 6.12" | ||
9511 | |||
9512 | CVE_STATUS[CVE-2024-50012] = "fixed-version: Fixed from version 6.12" | ||
9513 | |||
9514 | CVE_STATUS[CVE-2024-50013] = "fixed-version: Fixed from version 6.12" | ||
9515 | |||
9516 | CVE_STATUS[CVE-2024-50014] = "fixed-version: Fixed from version 6.12" | ||
9517 | |||
9518 | CVE_STATUS[CVE-2024-50015] = "fixed-version: Fixed from version 6.12" | ||
9519 | |||
9520 | CVE_STATUS[CVE-2024-50017] = "fixed-version: Fixed from version 6.12" | ||
9521 | |||
9522 | CVE_STATUS[CVE-2024-50019] = "fixed-version: Fixed from version 6.12" | ||
9523 | |||
9524 | CVE_STATUS[CVE-2024-50020] = "fixed-version: Fixed from version 6.12" | ||
9525 | |||
9526 | CVE_STATUS[CVE-2024-50021] = "fixed-version: Fixed from version 6.12" | ||
9527 | |||
9528 | CVE_STATUS[CVE-2024-50022] = "fixed-version: Fixed from version 6.12" | ||
9529 | |||
9530 | CVE_STATUS[CVE-2024-50023] = "fixed-version: Fixed from version 6.12" | ||
9531 | |||
9532 | CVE_STATUS[CVE-2024-50024] = "fixed-version: Fixed from version 6.12" | ||
9533 | |||
9534 | CVE_STATUS[CVE-2024-50025] = "fixed-version: Fixed from version 6.12" | ||
9535 | |||
9536 | CVE_STATUS[CVE-2024-50026] = "fixed-version: Fixed from version 6.12" | ||
9537 | |||
9538 | CVE_STATUS[CVE-2024-50027] = "fixed-version: Fixed from version 6.12" | ||
9539 | |||
9540 | CVE_STATUS[CVE-2024-50028] = "fixed-version: Fixed from version 6.12" | ||
9541 | |||
9542 | CVE_STATUS[CVE-2024-50029] = "fixed-version: Fixed from version 6.12" | ||
9543 | |||
9544 | CVE_STATUS[CVE-2024-50030] = "fixed-version: Fixed from version 6.12" | ||
9545 | |||
9546 | CVE_STATUS[CVE-2024-50031] = "fixed-version: Fixed from version 6.12" | ||
9547 | |||
9548 | CVE_STATUS[CVE-2024-50032] = "fixed-version: Fixed from version 6.11.4" | ||
9549 | |||
9550 | CVE_STATUS[CVE-2024-50033] = "fixed-version: Fixed from version 6.12" | ||
9551 | |||
9552 | CVE_STATUS[CVE-2024-50034] = "fixed-version: Fixed from version 6.12" | ||
9553 | |||
9554 | CVE_STATUS[CVE-2024-50035] = "fixed-version: Fixed from version 6.12" | ||
9555 | |||
9556 | CVE_STATUS[CVE-2024-50036] = "fixed-version: Fixed from version 6.12" | ||
9557 | |||
9558 | CVE_STATUS[CVE-2024-50037] = "fixed-version: Fixed from version 6.12" | ||
9559 | |||
9560 | CVE_STATUS[CVE-2024-50038] = "fixed-version: Fixed from version 6.12" | ||
9561 | |||
9562 | CVE_STATUS[CVE-2024-50039] = "fixed-version: Fixed from version 6.12" | ||
9563 | |||
9564 | CVE_STATUS[CVE-2024-50040] = "fixed-version: Fixed from version 6.12" | ||
9565 | |||
9566 | CVE_STATUS[CVE-2024-50041] = "fixed-version: Fixed from version 6.12" | ||
9567 | |||
9568 | CVE_STATUS[CVE-2024-50042] = "fixed-version: Fixed from version 6.12" | ||
9569 | |||
9570 | CVE_STATUS[CVE-2024-50043] = "fixed-version: Fixed from version 6.12" | ||
9571 | |||
9572 | CVE_STATUS[CVE-2024-50044] = "fixed-version: Fixed from version 6.12" | ||
9573 | |||
9574 | CVE_STATUS[CVE-2024-50045] = "fixed-version: Fixed from version 6.12" | ||
9575 | |||
9576 | CVE_STATUS[CVE-2024-50046] = "fixed-version: Fixed from version 6.12" | ||
9577 | |||
9578 | CVE_STATUS[CVE-2024-50047] = "fixed-version: Fixed from version 6.12" | ||
9579 | |||
9580 | CVE_STATUS[CVE-2024-50048] = "fixed-version: Fixed from version 6.12" | ||
9581 | |||
9582 | CVE_STATUS[CVE-2024-50049] = "fixed-version: Fixed from version 6.12" | ||
9583 | |||
9584 | CVE_STATUS[CVE-2024-50051] = "cpe-stable-backport: Backported in 6.12.5" | ||
9585 | |||
9586 | CVE_STATUS[CVE-2024-50055] = "fixed-version: Fixed from version 6.12" | ||
9587 | |||
9588 | CVE_STATUS[CVE-2024-50056] = "fixed-version: Fixed from version 6.12" | ||
9589 | |||
9590 | CVE_STATUS[CVE-2024-50057] = "fixed-version: Fixed from version 6.12" | ||
9591 | |||
9592 | CVE_STATUS[CVE-2024-50058] = "fixed-version: Fixed from version 6.12" | ||
9593 | |||
9594 | CVE_STATUS[CVE-2024-50059] = "fixed-version: Fixed from version 6.12" | ||
9595 | |||
9596 | CVE_STATUS[CVE-2024-50060] = "fixed-version: Fixed from version 6.12" | ||
9597 | |||
9598 | CVE_STATUS[CVE-2024-50061] = "fixed-version: Fixed from version 6.12" | ||
9599 | |||
9600 | CVE_STATUS[CVE-2024-50062] = "fixed-version: Fixed from version 6.12" | ||
9601 | |||
9602 | CVE_STATUS[CVE-2024-50063] = "fixed-version: Fixed from version 6.12" | ||
9603 | |||
9604 | CVE_STATUS[CVE-2024-50064] = "fixed-version: Fixed from version 6.12" | ||
9605 | |||
9606 | CVE_STATUS[CVE-2024-50065] = "fixed-version: Fixed from version 6.12" | ||
9607 | |||
9608 | CVE_STATUS[CVE-2024-50066] = "fixed-version: Fixed from version 6.12" | ||
9609 | |||
9610 | CVE_STATUS[CVE-2024-50067] = "fixed-version: Fixed from version 6.12" | ||
9611 | |||
9612 | CVE_STATUS[CVE-2024-50068] = "fixed-version: Fixed from version 6.12" | ||
9613 | |||
9614 | CVE_STATUS[CVE-2024-50069] = "fixed-version: Fixed from version 6.12" | ||
9615 | |||
9616 | CVE_STATUS[CVE-2024-50070] = "fixed-version: Fixed from version 6.12" | ||
9617 | |||
9618 | CVE_STATUS[CVE-2024-50071] = "fixed-version: Fixed from version 6.12" | ||
9619 | |||
9620 | CVE_STATUS[CVE-2024-50072] = "fixed-version: Fixed from version 6.12" | ||
9621 | |||
9622 | CVE_STATUS[CVE-2024-50073] = "fixed-version: Fixed from version 6.12" | ||
9623 | |||
9624 | CVE_STATUS[CVE-2024-50074] = "fixed-version: Fixed from version 6.12" | ||
9625 | |||
9626 | CVE_STATUS[CVE-2024-50075] = "fixed-version: Fixed from version 6.12" | ||
9627 | |||
9628 | CVE_STATUS[CVE-2024-50076] = "fixed-version: Fixed from version 6.12" | ||
9629 | |||
9630 | CVE_STATUS[CVE-2024-50077] = "fixed-version: Fixed from version 6.12" | ||
9631 | |||
9632 | CVE_STATUS[CVE-2024-50078] = "fixed-version: Fixed from version 6.12" | ||
9633 | |||
9634 | CVE_STATUS[CVE-2024-50079] = "fixed-version: Fixed from version 6.12" | ||
9635 | |||
9636 | CVE_STATUS[CVE-2024-50080] = "fixed-version: Fixed from version 6.12" | ||
9637 | |||
9638 | CVE_STATUS[CVE-2024-50081] = "fixed-version: Fixed from version 6.12" | ||
9639 | |||
9640 | CVE_STATUS[CVE-2024-50082] = "fixed-version: Fixed from version 6.12" | ||
9641 | |||
9642 | CVE_STATUS[CVE-2024-50083] = "fixed-version: Fixed from version 6.12" | ||
9643 | |||
9644 | CVE_STATUS[CVE-2024-50084] = "fixed-version: Fixed from version 6.12" | ||
9645 | |||
9646 | CVE_STATUS[CVE-2024-50085] = "fixed-version: Fixed from version 6.12" | ||
9647 | |||
9648 | CVE_STATUS[CVE-2024-50086] = "fixed-version: Fixed from version 6.12" | ||
9649 | |||
9650 | CVE_STATUS[CVE-2024-50087] = "fixed-version: Fixed from version 6.12" | ||
9651 | |||
9652 | CVE_STATUS[CVE-2024-50088] = "fixed-version: Fixed from version 6.12" | ||
9653 | |||
9654 | CVE_STATUS[CVE-2024-50090] = "fixed-version: Fixed from version 6.12" | ||
9655 | |||
9656 | CVE_STATUS[CVE-2024-50091] = "fixed-version: Fixed from version 6.12" | ||
9657 | |||
9658 | CVE_STATUS[CVE-2024-50092] = "fixed-version: Fixed from version 6.12" | ||
9659 | |||
9660 | CVE_STATUS[CVE-2024-50093] = "fixed-version: Fixed from version 6.12" | ||
9661 | |||
9662 | CVE_STATUS[CVE-2024-50094] = "fixed-version: Fixed from version 6.12" | ||
9663 | |||
9664 | CVE_STATUS[CVE-2024-50095] = "fixed-version: Fixed from version 6.12" | ||
9665 | |||
9666 | CVE_STATUS[CVE-2024-50096] = "fixed-version: Fixed from version 6.12" | ||
9667 | |||
9668 | CVE_STATUS[CVE-2024-50097] = "fixed-version: Fixed from version 6.11.4" | ||
9669 | |||
9670 | CVE_STATUS[CVE-2024-50098] = "fixed-version: Fixed from version 6.12" | ||
9671 | |||
9672 | CVE_STATUS[CVE-2024-50099] = "fixed-version: Fixed from version 6.12" | ||
9673 | |||
9674 | CVE_STATUS[CVE-2024-50100] = "fixed-version: Fixed from version 6.12" | ||
9675 | |||
9676 | CVE_STATUS[CVE-2024-50101] = "fixed-version: Fixed from version 6.12" | ||
9677 | |||
9678 | CVE_STATUS[CVE-2024-50102] = "fixed-version: Fixed from version 6.12" | ||
9679 | |||
9680 | CVE_STATUS[CVE-2024-50103] = "fixed-version: Fixed from version 6.12" | ||
9681 | |||
9682 | CVE_STATUS[CVE-2024-50104] = "fixed-version: Fixed from version 6.12" | ||
9683 | |||
9684 | CVE_STATUS[CVE-2024-50105] = "fixed-version: Fixed from version 6.12" | ||
9685 | |||
9686 | CVE_STATUS[CVE-2024-50106] = "fixed-version: Fixed from version 6.12" | ||
9687 | |||
9688 | CVE_STATUS[CVE-2024-50107] = "fixed-version: Fixed from version 6.12" | ||
9689 | |||
9690 | CVE_STATUS[CVE-2024-50108] = "fixed-version: Fixed from version 6.12" | ||
9691 | |||
9692 | CVE_STATUS[CVE-2024-50109] = "fixed-version: Fixed from version 6.12" | ||
9693 | |||
9694 | CVE_STATUS[CVE-2024-50110] = "fixed-version: Fixed from version 6.12" | ||
9695 | |||
9696 | CVE_STATUS[CVE-2024-50111] = "fixed-version: Fixed from version 6.12" | ||
9697 | |||
9698 | CVE_STATUS[CVE-2024-50112] = "fixed-version: Fixed from version 6.12" | ||
9699 | |||
9700 | CVE_STATUS[CVE-2024-50113] = "fixed-version: Fixed from version 6.12" | ||
9701 | |||
9702 | CVE_STATUS[CVE-2024-50114] = "fixed-version: Fixed from version 6.12" | ||
9703 | |||
9704 | CVE_STATUS[CVE-2024-50115] = "fixed-version: Fixed from version 6.12" | ||
9705 | |||
9706 | CVE_STATUS[CVE-2024-50116] = "fixed-version: Fixed from version 6.12" | ||
9707 | |||
9708 | CVE_STATUS[CVE-2024-50117] = "fixed-version: Fixed from version 6.12" | ||
9709 | |||
9710 | CVE_STATUS[CVE-2024-50118] = "fixed-version: Fixed from version 6.12" | ||
9711 | |||
9712 | CVE_STATUS[CVE-2024-50119] = "fixed-version: Fixed from version 6.12" | ||
9713 | |||
9714 | CVE_STATUS[CVE-2024-50120] = "fixed-version: Fixed from version 6.12" | ||
9715 | |||
9716 | CVE_STATUS[CVE-2024-50121] = "fixed-version: Fixed from version 6.12" | ||
9717 | |||
9718 | CVE_STATUS[CVE-2024-50122] = "fixed-version: Fixed from version 6.12" | ||
9719 | |||
9720 | CVE_STATUS[CVE-2024-50123] = "fixed-version: Fixed from version 6.12" | ||
9721 | |||
9722 | CVE_STATUS[CVE-2024-50124] = "fixed-version: Fixed from version 6.12" | ||
9723 | |||
9724 | CVE_STATUS[CVE-2024-50125] = "fixed-version: Fixed from version 6.12" | ||
9725 | |||
9726 | CVE_STATUS[CVE-2024-50126] = "fixed-version: Fixed from version 6.12" | ||
9727 | |||
9728 | CVE_STATUS[CVE-2024-50127] = "fixed-version: Fixed from version 6.12" | ||
9729 | |||
9730 | CVE_STATUS[CVE-2024-50128] = "fixed-version: Fixed from version 6.12" | ||
9731 | |||
9732 | CVE_STATUS[CVE-2024-50129] = "fixed-version: Fixed from version 6.12" | ||
9733 | |||
9734 | CVE_STATUS[CVE-2024-50130] = "fixed-version: Fixed from version 6.12" | ||
9735 | |||
9736 | CVE_STATUS[CVE-2024-50131] = "fixed-version: Fixed from version 6.12" | ||
9737 | |||
9738 | CVE_STATUS[CVE-2024-50132] = "fixed-version: Fixed from version 6.12" | ||
9739 | |||
9740 | CVE_STATUS[CVE-2024-50133] = "fixed-version: Fixed from version 6.12" | ||
9741 | |||
9742 | CVE_STATUS[CVE-2024-50134] = "fixed-version: Fixed from version 6.12" | ||
9743 | |||
9744 | CVE_STATUS[CVE-2024-50135] = "fixed-version: Fixed from version 6.12" | ||
9745 | |||
9746 | CVE_STATUS[CVE-2024-50136] = "fixed-version: Fixed from version 6.12" | ||
9747 | |||
9748 | CVE_STATUS[CVE-2024-50137] = "fixed-version: Fixed from version 6.12" | ||
9749 | |||
9750 | CVE_STATUS[CVE-2024-50138] = "fixed-version: Fixed from version 6.12" | ||
9751 | |||
9752 | CVE_STATUS[CVE-2024-50139] = "fixed-version: Fixed from version 6.12" | ||
9753 | |||
9754 | CVE_STATUS[CVE-2024-50140] = "fixed-version: Fixed from version 6.12" | ||
9755 | |||
9756 | CVE_STATUS[CVE-2024-50141] = "fixed-version: Fixed from version 6.12" | ||
9757 | |||
9758 | CVE_STATUS[CVE-2024-50142] = "fixed-version: Fixed from version 6.12" | ||
9759 | |||
9760 | CVE_STATUS[CVE-2024-50143] = "fixed-version: Fixed from version 6.12" | ||
9761 | |||
9762 | CVE_STATUS[CVE-2024-50144] = "fixed-version: Fixed from version 6.12" | ||
9763 | |||
9764 | CVE_STATUS[CVE-2024-50145] = "fixed-version: Fixed from version 6.12" | ||
9765 | |||
9766 | CVE_STATUS[CVE-2024-50146] = "fixed-version: Fixed from version 6.12" | ||
9767 | |||
9768 | CVE_STATUS[CVE-2024-50147] = "fixed-version: Fixed from version 6.12" | ||
9769 | |||
9770 | CVE_STATUS[CVE-2024-50148] = "fixed-version: Fixed from version 6.12" | ||
9771 | |||
9772 | CVE_STATUS[CVE-2024-50149] = "fixed-version: Fixed from version 6.12" | ||
9773 | |||
9774 | CVE_STATUS[CVE-2024-50150] = "fixed-version: Fixed from version 6.12" | ||
9775 | |||
9776 | CVE_STATUS[CVE-2024-50151] = "fixed-version: Fixed from version 6.12" | ||
9777 | |||
9778 | CVE_STATUS[CVE-2024-50152] = "fixed-version: Fixed from version 6.12" | ||
9779 | |||
9780 | CVE_STATUS[CVE-2024-50153] = "fixed-version: Fixed from version 6.12" | ||
9781 | |||
9782 | CVE_STATUS[CVE-2024-50154] = "fixed-version: Fixed from version 6.12" | ||
9783 | |||
9784 | CVE_STATUS[CVE-2024-50155] = "fixed-version: Fixed from version 6.12" | ||
9785 | |||
9786 | CVE_STATUS[CVE-2024-50156] = "fixed-version: Fixed from version 6.12" | ||
9787 | |||
9788 | CVE_STATUS[CVE-2024-50157] = "fixed-version: Fixed from version 6.12" | ||
9789 | |||
9790 | CVE_STATUS[CVE-2024-50158] = "fixed-version: Fixed from version 6.12" | ||
9791 | |||
9792 | CVE_STATUS[CVE-2024-50159] = "fixed-version: Fixed from version 6.12" | ||
9793 | |||
9794 | CVE_STATUS[CVE-2024-50160] = "fixed-version: Fixed from version 6.12" | ||
9795 | |||
9796 | CVE_STATUS[CVE-2024-50161] = "fixed-version: Fixed from version 6.12" | ||
9797 | |||
9798 | CVE_STATUS[CVE-2024-50162] = "fixed-version: Fixed from version 6.12" | ||
9799 | |||
9800 | CVE_STATUS[CVE-2024-50163] = "fixed-version: Fixed from version 6.12" | ||
9801 | |||
9802 | CVE_STATUS[CVE-2024-50164] = "fixed-version: Fixed from version 6.12" | ||
9803 | |||
9804 | CVE_STATUS[CVE-2024-50165] = "fixed-version: Fixed from version 6.12" | ||
9805 | |||
9806 | CVE_STATUS[CVE-2024-50166] = "fixed-version: Fixed from version 6.12" | ||
9807 | |||
9808 | CVE_STATUS[CVE-2024-50167] = "fixed-version: Fixed from version 6.12" | ||
9809 | |||
9810 | CVE_STATUS[CVE-2024-50168] = "fixed-version: Fixed from version 6.12" | ||
9811 | |||
9812 | CVE_STATUS[CVE-2024-50169] = "fixed-version: Fixed from version 6.12" | ||
9813 | |||
9814 | CVE_STATUS[CVE-2024-50170] = "fixed-version: Fixed from version 6.12" | ||
9815 | |||
9816 | CVE_STATUS[CVE-2024-50171] = "fixed-version: Fixed from version 6.12" | ||
9817 | |||
9818 | CVE_STATUS[CVE-2024-50172] = "fixed-version: Fixed from version 6.12" | ||
9819 | |||
9820 | CVE_STATUS[CVE-2024-50173] = "fixed-version: Fixed from version 6.12" | ||
9821 | |||
9822 | CVE_STATUS[CVE-2024-50174] = "fixed-version: Fixed from version 6.12" | ||
9823 | |||
9824 | CVE_STATUS[CVE-2024-50175] = "fixed-version: Fixed from version 6.12" | ||
9825 | |||
9826 | CVE_STATUS[CVE-2024-50176] = "fixed-version: Fixed from version 6.12" | ||
9827 | |||
9828 | CVE_STATUS[CVE-2024-50177] = "fixed-version: Fixed from version 6.12" | ||
9829 | |||
9830 | CVE_STATUS[CVE-2024-50178] = "fixed-version: Fixed from version 6.12" | ||
9831 | |||
9832 | CVE_STATUS[CVE-2024-50179] = "fixed-version: Fixed from version 6.12" | ||
9833 | |||
9834 | CVE_STATUS[CVE-2024-50180] = "fixed-version: Fixed from version 6.12" | ||
9835 | |||
9836 | CVE_STATUS[CVE-2024-50182] = "fixed-version: Fixed from version 6.12" | ||
9837 | |||
9838 | CVE_STATUS[CVE-2024-50183] = "fixed-version: Fixed from version 6.12" | ||
9839 | |||
9840 | CVE_STATUS[CVE-2024-50184] = "fixed-version: Fixed from version 6.12" | ||
9841 | |||
9842 | CVE_STATUS[CVE-2024-50185] = "fixed-version: Fixed from version 6.12" | ||
9843 | |||
9844 | CVE_STATUS[CVE-2024-50186] = "fixed-version: Fixed from version 6.12" | ||
9845 | |||
9846 | CVE_STATUS[CVE-2024-50187] = "fixed-version: Fixed from version 6.12" | ||
9847 | |||
9848 | CVE_STATUS[CVE-2024-50188] = "fixed-version: Fixed from version 6.12" | ||
9849 | |||
9850 | CVE_STATUS[CVE-2024-50189] = "fixed-version: Fixed from version 6.12" | ||
9851 | |||
9852 | CVE_STATUS[CVE-2024-50190] = "fixed-version: Fixed from version 6.12" | ||
9853 | |||
9854 | CVE_STATUS[CVE-2024-50191] = "fixed-version: Fixed from version 6.12" | ||
9855 | |||
9856 | CVE_STATUS[CVE-2024-50192] = "fixed-version: Fixed from version 6.12" | ||
9857 | |||
9858 | CVE_STATUS[CVE-2024-50193] = "fixed-version: Fixed from version 6.12" | ||
9859 | |||
9860 | CVE_STATUS[CVE-2024-50194] = "fixed-version: Fixed from version 6.12" | ||
9861 | |||
9862 | CVE_STATUS[CVE-2024-50195] = "fixed-version: Fixed from version 6.12" | ||
9863 | |||
9864 | CVE_STATUS[CVE-2024-50196] = "fixed-version: Fixed from version 6.12" | ||
9865 | |||
9866 | CVE_STATUS[CVE-2024-50197] = "fixed-version: Fixed from version 6.12" | ||
9867 | |||
9868 | CVE_STATUS[CVE-2024-50198] = "fixed-version: Fixed from version 6.12" | ||
9869 | |||
9870 | CVE_STATUS[CVE-2024-50199] = "fixed-version: Fixed from version 6.12" | ||
9871 | |||
9872 | CVE_STATUS[CVE-2024-50200] = "fixed-version: Fixed from version 6.12" | ||
9873 | |||
9874 | CVE_STATUS[CVE-2024-50201] = "fixed-version: Fixed from version 6.12" | ||
9875 | |||
9876 | CVE_STATUS[CVE-2024-50202] = "fixed-version: Fixed from version 6.12" | ||
9877 | |||
9878 | CVE_STATUS[CVE-2024-50203] = "fixed-version: Fixed from version 6.12" | ||
9879 | |||
9880 | CVE_STATUS[CVE-2024-50204] = "fixed-version: Fixed from version 6.12" | ||
9881 | |||
9882 | CVE_STATUS[CVE-2024-50205] = "fixed-version: Fixed from version 6.12" | ||
9883 | |||
9884 | CVE_STATUS[CVE-2024-50206] = "fixed-version: Fixed from version 6.12" | ||
9885 | |||
9886 | CVE_STATUS[CVE-2024-50207] = "fixed-version: Fixed from version 6.12" | ||
9887 | |||
9888 | CVE_STATUS[CVE-2024-50208] = "fixed-version: Fixed from version 6.12" | ||
9889 | |||
9890 | CVE_STATUS[CVE-2024-50209] = "fixed-version: Fixed from version 6.12" | ||
9891 | |||
9892 | CVE_STATUS[CVE-2024-50210] = "fixed-version: Fixed from version 6.11.6" | ||
9893 | |||
9894 | CVE_STATUS[CVE-2024-50211] = "fixed-version: Fixed from version 6.12" | ||
9895 | |||
9896 | CVE_STATUS[CVE-2024-50212] = "fixed-version: Fixed from version 6.12" | ||
9897 | |||
9898 | CVE_STATUS[CVE-2024-50213] = "fixed-version: Fixed from version 6.12" | ||
9899 | |||
9900 | CVE_STATUS[CVE-2024-50214] = "fixed-version: Fixed from version 6.12" | ||
9901 | |||
9902 | CVE_STATUS[CVE-2024-50215] = "fixed-version: Fixed from version 6.12" | ||
9903 | |||
9904 | CVE_STATUS[CVE-2024-50216] = "fixed-version: Fixed from version 6.12" | ||
9905 | |||
9906 | CVE_STATUS[CVE-2024-50217] = "fixed-version: Fixed from version 6.12" | ||
9907 | |||
9908 | CVE_STATUS[CVE-2024-50218] = "fixed-version: Fixed from version 6.12" | ||
9909 | |||
9910 | CVE_STATUS[CVE-2024-50220] = "fixed-version: Fixed from version 6.12" | ||
9911 | |||
9912 | CVE_STATUS[CVE-2024-50221] = "fixed-version: Fixed from version 6.12" | ||
9913 | |||
9914 | CVE_STATUS[CVE-2024-50222] = "fixed-version: Fixed from version 6.12" | ||
9915 | |||
9916 | CVE_STATUS[CVE-2024-50223] = "fixed-version: Fixed from version 6.12" | ||
9917 | |||
9918 | CVE_STATUS[CVE-2024-50224] = "fixed-version: Fixed from version 6.12" | ||
9919 | |||
9920 | CVE_STATUS[CVE-2024-50225] = "fixed-version: Fixed from version 6.12" | ||
9921 | |||
9922 | CVE_STATUS[CVE-2024-50226] = "fixed-version: Fixed from version 6.12" | ||
9923 | |||
9924 | CVE_STATUS[CVE-2024-50227] = "fixed-version: Fixed from version 6.12" | ||
9925 | |||
9926 | CVE_STATUS[CVE-2024-50229] = "fixed-version: Fixed from version 6.12" | ||
9927 | |||
9928 | CVE_STATUS[CVE-2024-50230] = "fixed-version: Fixed from version 6.12" | ||
9929 | |||
9930 | CVE_STATUS[CVE-2024-50231] = "fixed-version: Fixed from version 6.12" | ||
9931 | |||
9932 | CVE_STATUS[CVE-2024-50232] = "fixed-version: Fixed from version 6.12" | ||
9933 | |||
9934 | CVE_STATUS[CVE-2024-50233] = "fixed-version: Fixed from version 6.12" | ||
9935 | |||
9936 | CVE_STATUS[CVE-2024-50234] = "fixed-version: Fixed from version 6.12" | ||
9937 | |||
9938 | CVE_STATUS[CVE-2024-50235] = "fixed-version: Fixed from version 6.12" | ||
9939 | |||
9940 | CVE_STATUS[CVE-2024-50236] = "fixed-version: Fixed from version 6.12" | ||
9941 | |||
9942 | CVE_STATUS[CVE-2024-50237] = "fixed-version: Fixed from version 6.12" | ||
9943 | |||
9944 | CVE_STATUS[CVE-2024-50238] = "fixed-version: Fixed from version 6.12" | ||
9945 | |||
9946 | CVE_STATUS[CVE-2024-50239] = "fixed-version: Fixed from version 6.12" | ||
9947 | |||
9948 | CVE_STATUS[CVE-2024-50240] = "fixed-version: Fixed from version 6.12" | ||
9949 | |||
9950 | CVE_STATUS[CVE-2024-50241] = "fixed-version: Fixed from version 6.11.7" | ||
9951 | |||
9952 | CVE_STATUS[CVE-2024-50242] = "fixed-version: Fixed from version 6.12" | ||
9953 | |||
9954 | CVE_STATUS[CVE-2024-50243] = "fixed-version: Fixed from version 6.12" | ||
9955 | |||
9956 | CVE_STATUS[CVE-2024-50244] = "fixed-version: Fixed from version 6.12" | ||
9957 | |||
9958 | CVE_STATUS[CVE-2024-50245] = "fixed-version: Fixed from version 6.12" | ||
9959 | |||
9960 | CVE_STATUS[CVE-2024-50246] = "fixed-version: Fixed from version 6.12" | ||
9961 | |||
9962 | CVE_STATUS[CVE-2024-50247] = "fixed-version: Fixed from version 6.12" | ||
9963 | |||
9964 | CVE_STATUS[CVE-2024-50248] = "fixed-version: Fixed from version 6.12" | ||
9965 | |||
9966 | CVE_STATUS[CVE-2024-50249] = "fixed-version: Fixed from version 6.11.7" | ||
9967 | |||
9968 | CVE_STATUS[CVE-2024-50250] = "fixed-version: Fixed from version 6.12" | ||
9969 | |||
9970 | CVE_STATUS[CVE-2024-50251] = "fixed-version: Fixed from version 6.12" | ||
9971 | |||
9972 | CVE_STATUS[CVE-2024-50252] = "fixed-version: Fixed from version 6.12" | ||
9973 | |||
9974 | CVE_STATUS[CVE-2024-50253] = "fixed-version: Fixed from version 6.12" | ||
9975 | |||
9976 | CVE_STATUS[CVE-2024-50254] = "fixed-version: Fixed from version 6.12" | ||
9977 | |||
9978 | CVE_STATUS[CVE-2024-50255] = "fixed-version: Fixed from version 6.12" | ||
9979 | |||
9980 | CVE_STATUS[CVE-2024-50256] = "fixed-version: Fixed from version 6.12" | ||
9981 | |||
9982 | CVE_STATUS[CVE-2024-50257] = "fixed-version: Fixed from version 6.12" | ||
9983 | |||
9984 | CVE_STATUS[CVE-2024-50258] = "fixed-version: Fixed from version 6.12" | ||
9985 | |||
9986 | CVE_STATUS[CVE-2024-50259] = "fixed-version: Fixed from version 6.12" | ||
9987 | |||
9988 | CVE_STATUS[CVE-2024-50260] = "fixed-version: Fixed from version 6.12" | ||
9989 | |||
9990 | CVE_STATUS[CVE-2024-50261] = "fixed-version: Fixed from version 6.12" | ||
9991 | |||
9992 | CVE_STATUS[CVE-2024-50262] = "fixed-version: Fixed from version 6.12" | ||
9993 | |||
9994 | CVE_STATUS[CVE-2024-50263] = "fixed-version: Fixed from version 6.12" | ||
9995 | |||
9996 | CVE_STATUS[CVE-2024-50264] = "fixed-version: Fixed from version 6.12" | ||
9997 | |||
9998 | CVE_STATUS[CVE-2024-50265] = "fixed-version: Fixed from version 6.12" | ||
9999 | |||
10000 | CVE_STATUS[CVE-2024-50266] = "fixed-version: Fixed from version 6.12" | ||
10001 | |||
10002 | CVE_STATUS[CVE-2024-50267] = "fixed-version: Fixed from version 6.12" | ||
10003 | |||
10004 | CVE_STATUS[CVE-2024-50268] = "fixed-version: Fixed from version 6.12" | ||
10005 | |||
10006 | CVE_STATUS[CVE-2024-50269] = "fixed-version: Fixed from version 6.12" | ||
10007 | |||
10008 | CVE_STATUS[CVE-2024-50270] = "fixed-version: Fixed from version 6.12" | ||
10009 | |||
10010 | CVE_STATUS[CVE-2024-50271] = "fixed-version: Fixed from version 6.12" | ||
10011 | |||
10012 | CVE_STATUS[CVE-2024-50272] = "fixed-version: Fixed from version 6.12" | ||
10013 | |||
10014 | CVE_STATUS[CVE-2024-50273] = "fixed-version: Fixed from version 6.12" | ||
10015 | |||
10016 | CVE_STATUS[CVE-2024-50274] = "fixed-version: Fixed from version 6.12" | ||
10017 | |||
10018 | CVE_STATUS[CVE-2024-50275] = "fixed-version: Fixed from version 6.12" | ||
10019 | |||
10020 | CVE_STATUS[CVE-2024-50276] = "fixed-version: Fixed from version 6.12" | ||
10021 | |||
10022 | CVE_STATUS[CVE-2024-50277] = "fixed-version: Fixed from version 6.12" | ||
10023 | |||
10024 | CVE_STATUS[CVE-2024-50278] = "fixed-version: Fixed from version 6.12" | ||
10025 | |||
10026 | CVE_STATUS[CVE-2024-50279] = "fixed-version: Fixed from version 6.12" | ||
10027 | |||
10028 | CVE_STATUS[CVE-2024-50280] = "fixed-version: Fixed from version 6.12" | ||
10029 | |||
10030 | CVE_STATUS[CVE-2024-50281] = "fixed-version: Fixed from version 6.12" | ||
10031 | |||
10032 | CVE_STATUS[CVE-2024-50282] = "fixed-version: Fixed from version 6.12" | ||
10033 | |||
10034 | CVE_STATUS[CVE-2024-50283] = "fixed-version: Fixed from version 6.12" | ||
10035 | |||
10036 | CVE_STATUS[CVE-2024-50284] = "fixed-version: Fixed from version 6.12" | ||
10037 | |||
10038 | CVE_STATUS[CVE-2024-50285] = "fixed-version: Fixed from version 6.12" | ||
10039 | |||
10040 | CVE_STATUS[CVE-2024-50286] = "fixed-version: Fixed from version 6.12" | ||
10041 | |||
10042 | CVE_STATUS[CVE-2024-50287] = "fixed-version: Fixed from version 6.12" | ||
10043 | |||
10044 | CVE_STATUS[CVE-2024-50288] = "fixed-version: Fixed from version 6.12" | ||
10045 | |||
10046 | CVE_STATUS[CVE-2024-50289] = "fixed-version: Fixed from version 6.12" | ||
10047 | |||
10048 | CVE_STATUS[CVE-2024-50290] = "fixed-version: Fixed from version 6.12" | ||
10049 | |||
10050 | CVE_STATUS[CVE-2024-50291] = "fixed-version: Fixed from version 6.12" | ||
10051 | |||
10052 | CVE_STATUS[CVE-2024-50292] = "fixed-version: Fixed from version 6.12" | ||
10053 | |||
10054 | CVE_STATUS[CVE-2024-50293] = "fixed-version: Fixed from version 6.12" | ||
10055 | |||
10056 | CVE_STATUS[CVE-2024-50294] = "fixed-version: Fixed from version 6.12" | ||
10057 | |||
10058 | CVE_STATUS[CVE-2024-50295] = "fixed-version: Fixed from version 6.12" | ||
10059 | |||
10060 | CVE_STATUS[CVE-2024-50296] = "fixed-version: Fixed from version 6.12" | ||
10061 | |||
10062 | CVE_STATUS[CVE-2024-50297] = "fixed-version: Fixed from version 6.12" | ||
10063 | |||
10064 | CVE_STATUS[CVE-2024-50298] = "fixed-version: Fixed from version 6.12" | ||
10065 | |||
10066 | CVE_STATUS[CVE-2024-50299] = "fixed-version: Fixed from version 6.12" | ||
10067 | |||
10068 | CVE_STATUS[CVE-2024-50300] = "fixed-version: Fixed from version 6.12" | ||
10069 | |||
10070 | CVE_STATUS[CVE-2024-50301] = "fixed-version: Fixed from version 6.12" | ||
10071 | |||
10072 | CVE_STATUS[CVE-2024-50302] = "fixed-version: Fixed from version 6.12" | ||
10073 | |||
10074 | CVE_STATUS[CVE-2024-50303] = "fixed-version: Fixed from version 6.12" | ||
10075 | |||
10076 | CVE_STATUS[CVE-2024-50304] = "fixed-version: Fixed from version 6.12" | ||
10077 | |||
10078 | CVE_STATUS[CVE-2024-51729] = "cpe-stable-backport: Backported in 6.12.7" | ||
10079 | |||
10080 | CVE_STATUS[CVE-2024-52319] = "cpe-stable-backport: Backported in 6.12.7" | ||
10081 | |||
10082 | CVE_STATUS[CVE-2024-52332] = "cpe-stable-backport: Backported in 6.12.5" | ||
10083 | |||
10084 | CVE_STATUS[CVE-2024-52557] = "fixed-version: only affects 6.13 onwards" | ||
10085 | |||
10086 | CVE_STATUS[CVE-2024-52559] = "cpe-stable-backport: Backported in 6.12.16" | ||
10087 | |||
10088 | # CVE-2024-52560 needs backporting (fixed from 6.14) | ||
10089 | |||
10090 | CVE_STATUS[CVE-2024-53042] = "fixed-version: Fixed from version 6.12" | ||
10091 | |||
10092 | CVE_STATUS[CVE-2024-53043] = "fixed-version: Fixed from version 6.12" | ||
10093 | |||
10094 | CVE_STATUS[CVE-2024-53044] = "fixed-version: Fixed from version 6.12" | ||
10095 | |||
10096 | CVE_STATUS[CVE-2024-53045] = "fixed-version: Fixed from version 6.12" | ||
10097 | |||
10098 | CVE_STATUS[CVE-2024-53046] = "fixed-version: Fixed from version 6.12" | ||
10099 | |||
10100 | CVE_STATUS[CVE-2024-53047] = "fixed-version: Fixed from version 6.12" | ||
10101 | |||
10102 | CVE_STATUS[CVE-2024-53048] = "fixed-version: Fixed from version 6.12" | ||
10103 | |||
10104 | CVE_STATUS[CVE-2024-53049] = "fixed-version: Fixed from version 6.12" | ||
10105 | |||
10106 | CVE_STATUS[CVE-2024-53050] = "fixed-version: Fixed from version 6.12" | ||
10107 | |||
10108 | CVE_STATUS[CVE-2024-53051] = "fixed-version: Fixed from version 6.12" | ||
10109 | |||
10110 | CVE_STATUS[CVE-2024-53052] = "fixed-version: Fixed from version 6.12" | ||
10111 | |||
10112 | CVE_STATUS[CVE-2024-53053] = "fixed-version: Fixed from version 6.12" | ||
10113 | |||
10114 | CVE_STATUS[CVE-2024-53055] = "fixed-version: Fixed from version 6.12" | ||
10115 | |||
10116 | CVE_STATUS[CVE-2024-53056] = "fixed-version: Fixed from version 6.12" | ||
10117 | |||
10118 | CVE_STATUS[CVE-2024-53057] = "fixed-version: Fixed from version 6.12" | ||
10119 | |||
10120 | CVE_STATUS[CVE-2024-53058] = "fixed-version: Fixed from version 6.12" | ||
10121 | |||
10122 | CVE_STATUS[CVE-2024-53059] = "fixed-version: Fixed from version 6.12" | ||
10123 | |||
10124 | CVE_STATUS[CVE-2024-53060] = "fixed-version: Fixed from version 6.11.8" | ||
10125 | |||
10126 | CVE_STATUS[CVE-2024-53061] = "fixed-version: Fixed from version 6.12" | ||
10127 | |||
10128 | CVE_STATUS[CVE-2024-53062] = "fixed-version: Fixed from version 6.12" | ||
10129 | |||
10130 | CVE_STATUS[CVE-2024-53063] = "fixed-version: Fixed from version 6.12" | ||
10131 | |||
10132 | CVE_STATUS[CVE-2024-53064] = "fixed-version: Fixed from version 6.12" | ||
10133 | |||
10134 | CVE_STATUS[CVE-2024-53065] = "fixed-version: Fixed from version 6.12" | ||
10135 | |||
10136 | CVE_STATUS[CVE-2024-53066] = "fixed-version: Fixed from version 6.12" | ||
10137 | |||
10138 | CVE_STATUS[CVE-2024-53067] = "fixed-version: Fixed from version 6.12" | ||
10139 | |||
10140 | CVE_STATUS[CVE-2024-53068] = "fixed-version: Fixed from version 6.12" | ||
10141 | |||
10142 | CVE_STATUS[CVE-2024-53069] = "fixed-version: Fixed from version 6.12" | ||
10143 | |||
10144 | CVE_STATUS[CVE-2024-53070] = "fixed-version: Fixed from version 6.11.8" | ||
10145 | |||
10146 | CVE_STATUS[CVE-2024-53071] = "fixed-version: Fixed from version 6.12" | ||
10147 | |||
10148 | CVE_STATUS[CVE-2024-53072] = "fixed-version: Fixed from version 6.12" | ||
10149 | |||
10150 | CVE_STATUS[CVE-2024-53073] = "fixed-version: Fixed from version 6.11.7" | ||
10151 | |||
10152 | CVE_STATUS[CVE-2024-53074] = "fixed-version: Fixed from version 6.12" | ||
10153 | |||
10154 | CVE_STATUS[CVE-2024-53075] = "fixed-version: Fixed from version 6.12" | ||
10155 | |||
10156 | CVE_STATUS[CVE-2024-53076] = "fixed-version: Fixed from version 6.12" | ||
10157 | |||
10158 | CVE_STATUS[CVE-2024-53077] = "fixed-version: Fixed from version 6.12" | ||
10159 | |||
10160 | CVE_STATUS[CVE-2024-53078] = "fixed-version: Fixed from version 6.12" | ||
10161 | |||
10162 | CVE_STATUS[CVE-2024-53079] = "fixed-version: Fixed from version 6.12" | ||
10163 | |||
10164 | CVE_STATUS[CVE-2024-53080] = "fixed-version: Fixed from version 6.12" | ||
10165 | |||
10166 | CVE_STATUS[CVE-2024-53081] = "fixed-version: Fixed from version 6.12" | ||
10167 | |||
10168 | CVE_STATUS[CVE-2024-53082] = "fixed-version: Fixed from version 6.12" | ||
10169 | |||
10170 | CVE_STATUS[CVE-2024-53083] = "fixed-version: Fixed from version 6.12" | ||
10171 | |||
10172 | CVE_STATUS[CVE-2024-53084] = "fixed-version: Fixed from version 6.12" | ||
10173 | |||
10174 | CVE_STATUS[CVE-2024-53085] = "fixed-version: Fixed from version 6.12" | ||
10175 | |||
10176 | CVE_STATUS[CVE-2024-53086] = "fixed-version: Fixed from version 6.12" | ||
10177 | |||
10178 | CVE_STATUS[CVE-2024-53087] = "fixed-version: Fixed from version 6.12" | ||
10179 | |||
10180 | CVE_STATUS[CVE-2024-53088] = "fixed-version: Fixed from version 6.12" | ||
10181 | |||
10182 | CVE_STATUS[CVE-2024-53089] = "fixed-version: Fixed from version 6.12" | ||
10183 | |||
10184 | CVE_STATUS[CVE-2024-53090] = "fixed-version: Fixed from version 6.12" | ||
10185 | |||
10186 | CVE_STATUS[CVE-2024-53091] = "fixed-version: Fixed from version 6.12" | ||
10187 | |||
10188 | CVE_STATUS[CVE-2024-53092] = "fixed-version: Fixed from version 6.12" | ||
10189 | |||
10190 | CVE_STATUS[CVE-2024-53093] = "fixed-version: Fixed from version 6.12" | ||
10191 | |||
10192 | CVE_STATUS[CVE-2024-53094] = "fixed-version: Fixed from version 6.12" | ||
10193 | |||
10194 | CVE_STATUS[CVE-2024-53095] = "fixed-version: Fixed from version 6.12" | ||
10195 | |||
10196 | CVE_STATUS[CVE-2024-53096] = "fixed-version: Fixed from version 6.12" | ||
10197 | |||
10198 | CVE_STATUS[CVE-2024-53097] = "fixed-version: Fixed from version 6.11.9" | ||
10199 | |||
10200 | CVE_STATUS[CVE-2024-53098] = "fixed-version: Fixed from version 6.12" | ||
10201 | |||
10202 | CVE_STATUS[CVE-2024-53099] = "fixed-version: Fixed from version 6.12" | ||
10203 | |||
10204 | CVE_STATUS[CVE-2024-53100] = "fixed-version: Fixed from version 6.12" | ||
10205 | |||
10206 | CVE_STATUS[CVE-2024-53101] = "fixed-version: Fixed from version 6.12" | ||
10207 | |||
10208 | CVE_STATUS[CVE-2024-53103] = "cpe-stable-backport: Backported in 6.12.1" | ||
10209 | |||
10210 | CVE_STATUS[CVE-2024-53104] = "cpe-stable-backport: Backported in 6.12.1" | ||
10211 | |||
10212 | CVE_STATUS[CVE-2024-53105] = "fixed-version: Fixed from version 6.12" | ||
10213 | |||
10214 | CVE_STATUS[CVE-2024-53106] = "fixed-version: Fixed from version 6.12" | ||
10215 | |||
10216 | CVE_STATUS[CVE-2024-53107] = "fixed-version: Fixed from version 6.12" | ||
10217 | |||
10218 | CVE_STATUS[CVE-2024-53108] = "fixed-version: Fixed from version 6.12" | ||
10219 | |||
10220 | CVE_STATUS[CVE-2024-53109] = "fixed-version: Fixed from version 6.12" | ||
10221 | |||
10222 | CVE_STATUS[CVE-2024-53110] = "fixed-version: Fixed from version 6.12" | ||
10223 | |||
10224 | CVE_STATUS[CVE-2024-53111] = "fixed-version: Fixed from version 6.12" | ||
10225 | |||
10226 | CVE_STATUS[CVE-2024-53112] = "fixed-version: Fixed from version 6.12" | ||
10227 | |||
10228 | CVE_STATUS[CVE-2024-53113] = "fixed-version: Fixed from version 6.12" | ||
10229 | |||
10230 | CVE_STATUS[CVE-2024-53114] = "fixed-version: Fixed from version 6.12" | ||
10231 | |||
10232 | CVE_STATUS[CVE-2024-53115] = "fixed-version: Fixed from version 6.12" | ||
10233 | |||
10234 | CVE_STATUS[CVE-2024-53116] = "fixed-version: Fixed from version 6.12" | ||
10235 | |||
10236 | CVE_STATUS[CVE-2024-53117] = "fixed-version: Fixed from version 6.12" | ||
10237 | |||
10238 | CVE_STATUS[CVE-2024-53118] = "fixed-version: Fixed from version 6.12" | ||
10239 | |||
10240 | CVE_STATUS[CVE-2024-53119] = "fixed-version: Fixed from version 6.12" | ||
10241 | |||
10242 | CVE_STATUS[CVE-2024-53120] = "fixed-version: Fixed from version 6.12" | ||
10243 | |||
10244 | CVE_STATUS[CVE-2024-53121] = "fixed-version: Fixed from version 6.12" | ||
10245 | |||
10246 | CVE_STATUS[CVE-2024-53122] = "fixed-version: Fixed from version 6.12" | ||
10247 | |||
10248 | CVE_STATUS[CVE-2024-53123] = "fixed-version: Fixed from version 6.12" | ||
10249 | |||
10250 | CVE_STATUS[CVE-2024-53124] = "fixed-version: Fixed from version 6.12" | ||
10251 | |||
10252 | CVE_STATUS[CVE-2024-53125] = "fixed-version: Fixed from version 6.12" | ||
10253 | |||
10254 | CVE_STATUS[CVE-2024-53126] = "fixed-version: Fixed from version 6.12" | ||
10255 | |||
10256 | CVE_STATUS[CVE-2024-53127] = "fixed-version: Fixed from version 6.12" | ||
10257 | |||
10258 | CVE_STATUS[CVE-2024-53128] = "fixed-version: Fixed from version 6.12" | ||
10259 | |||
10260 | CVE_STATUS[CVE-2024-53129] = "fixed-version: Fixed from version 6.12" | ||
10261 | |||
10262 | CVE_STATUS[CVE-2024-53130] = "fixed-version: Fixed from version 6.12" | ||
10263 | |||
10264 | CVE_STATUS[CVE-2024-53131] = "fixed-version: Fixed from version 6.12" | ||
10265 | |||
10266 | CVE_STATUS[CVE-2024-53132] = "fixed-version: Fixed from version 6.12" | ||
10267 | |||
10268 | CVE_STATUS[CVE-2024-53133] = "fixed-version: Fixed from version 6.12" | ||
10269 | |||
10270 | CVE_STATUS[CVE-2024-53134] = "fixed-version: Fixed from version 6.12" | ||
10271 | |||
10272 | CVE_STATUS[CVE-2024-53135] = "fixed-version: Fixed from version 6.12" | ||
10273 | |||
10274 | CVE_STATUS[CVE-2024-53136] = "fixed-version: Fixed from version 6.11.10" | ||
10275 | |||
10276 | CVE_STATUS[CVE-2024-53137] = "fixed-version: Fixed from version 6.12" | ||
10277 | |||
10278 | CVE_STATUS[CVE-2024-53138] = "fixed-version: Fixed from version 6.12" | ||
10279 | |||
10280 | CVE_STATUS[CVE-2024-53139] = "fixed-version: Fixed from version 6.12" | ||
10281 | |||
10282 | CVE_STATUS[CVE-2024-53140] = "fixed-version: Fixed from version 6.12" | ||
10283 | |||
10284 | CVE_STATUS[CVE-2024-53141] = "cpe-stable-backport: Backported in 6.12.2" | ||
10285 | |||
10286 | CVE_STATUS[CVE-2024-53142] = "cpe-stable-backport: Backported in 6.12.2" | ||
10287 | |||
10288 | CVE_STATUS[CVE-2024-53143] = "cpe-stable-backport: Backported in 6.12.2" | ||
10289 | |||
10290 | CVE_STATUS[CVE-2024-53144] = "fixed-version: Fixed from version 6.12" | ||
10291 | |||
10292 | CVE_STATUS[CVE-2024-53145] = "cpe-stable-backport: Backported in 6.12.2" | ||
10293 | |||
10294 | CVE_STATUS[CVE-2024-53146] = "cpe-stable-backport: Backported in 6.12.2" | ||
10295 | |||
10296 | CVE_STATUS[CVE-2024-53147] = "cpe-stable-backport: Backported in 6.12.2" | ||
10297 | |||
10298 | CVE_STATUS[CVE-2024-53148] = "cpe-stable-backport: Backported in 6.12.2" | ||
10299 | |||
10300 | CVE_STATUS[CVE-2024-53149] = "cpe-stable-backport: Backported in 6.12.2" | ||
10301 | |||
10302 | CVE_STATUS[CVE-2024-53150] = "cpe-stable-backport: Backported in 6.12.2" | ||
10303 | |||
10304 | CVE_STATUS[CVE-2024-53151] = "cpe-stable-backport: Backported in 6.12.2" | ||
10305 | |||
10306 | CVE_STATUS[CVE-2024-53152] = "cpe-stable-backport: Backported in 6.12.2" | ||
10307 | |||
10308 | CVE_STATUS[CVE-2024-53153] = "cpe-stable-backport: Backported in 6.12.2" | ||
10309 | |||
10310 | CVE_STATUS[CVE-2024-53154] = "cpe-stable-backport: Backported in 6.12.2" | ||
10311 | |||
10312 | CVE_STATUS[CVE-2024-53155] = "cpe-stable-backport: Backported in 6.12.2" | ||
10313 | |||
10314 | CVE_STATUS[CVE-2024-53156] = "cpe-stable-backport: Backported in 6.12.2" | ||
10315 | |||
10316 | CVE_STATUS[CVE-2024-53157] = "cpe-stable-backport: Backported in 6.12.2" | ||
10317 | |||
10318 | CVE_STATUS[CVE-2024-53158] = "cpe-stable-backport: Backported in 6.12.2" | ||
10319 | |||
10320 | CVE_STATUS[CVE-2024-53160] = "cpe-stable-backport: Backported in 6.12.2" | ||
10321 | |||
10322 | CVE_STATUS[CVE-2024-53161] = "cpe-stable-backport: Backported in 6.12.2" | ||
10323 | |||
10324 | CVE_STATUS[CVE-2024-53162] = "cpe-stable-backport: Backported in 6.12.2" | ||
10325 | |||
10326 | CVE_STATUS[CVE-2024-53163] = "cpe-stable-backport: Backported in 6.12.2" | ||
10327 | |||
10328 | CVE_STATUS[CVE-2024-53164] = "cpe-stable-backport: Backported in 6.12.7" | ||
10329 | |||
10330 | CVE_STATUS[CVE-2024-53165] = "cpe-stable-backport: Backported in 6.12.2" | ||
10331 | |||
10332 | CVE_STATUS[CVE-2024-53166] = "cpe-stable-backport: Backported in 6.12.2" | ||
10333 | |||
10334 | CVE_STATUS[CVE-2024-53167] = "cpe-stable-backport: Backported in 6.12.2" | ||
10335 | |||
10336 | CVE_STATUS[CVE-2024-53168] = "cpe-stable-backport: Backported in 6.12.2" | ||
10337 | |||
10338 | CVE_STATUS[CVE-2024-53169] = "cpe-stable-backport: Backported in 6.12.2" | ||
10339 | |||
10340 | CVE_STATUS[CVE-2024-53170] = "cpe-stable-backport: Backported in 6.12.2" | ||
10341 | |||
10342 | CVE_STATUS[CVE-2024-53171] = "cpe-stable-backport: Backported in 6.12.2" | ||
10343 | |||
10344 | CVE_STATUS[CVE-2024-53172] = "cpe-stable-backport: Backported in 6.12.2" | ||
10345 | |||
10346 | CVE_STATUS[CVE-2024-53173] = "cpe-stable-backport: Backported in 6.12.2" | ||
10347 | |||
10348 | CVE_STATUS[CVE-2024-53174] = "cpe-stable-backport: Backported in 6.12.2" | ||
10349 | |||
10350 | CVE_STATUS[CVE-2024-53175] = "cpe-stable-backport: Backported in 6.12.2" | ||
10351 | |||
10352 | CVE_STATUS[CVE-2024-53176] = "cpe-stable-backport: Backported in 6.12.2" | ||
10353 | |||
10354 | CVE_STATUS[CVE-2024-53177] = "cpe-stable-backport: Backported in 6.12.2" | ||
10355 | |||
10356 | CVE_STATUS[CVE-2024-53178] = "cpe-stable-backport: Backported in 6.12.2" | ||
10357 | |||
10358 | CVE_STATUS[CVE-2024-53179] = "cpe-stable-backport: Backported in 6.12.2" | ||
10359 | |||
10360 | CVE_STATUS[CVE-2024-53180] = "cpe-stable-backport: Backported in 6.12.2" | ||
10361 | |||
10362 | CVE_STATUS[CVE-2024-53181] = "cpe-stable-backport: Backported in 6.12.2" | ||
10363 | |||
10364 | CVE_STATUS[CVE-2024-53182] = "cpe-stable-backport: Backported in 6.12.2" | ||
10365 | |||
10366 | CVE_STATUS[CVE-2024-53183] = "cpe-stable-backport: Backported in 6.12.2" | ||
10367 | |||
10368 | CVE_STATUS[CVE-2024-53184] = "cpe-stable-backport: Backported in 6.12.2" | ||
10369 | |||
10370 | CVE_STATUS[CVE-2024-53185] = "cpe-stable-backport: Backported in 6.12.2" | ||
10371 | |||
10372 | CVE_STATUS[CVE-2024-53186] = "cpe-stable-backport: Backported in 6.12.2" | ||
10373 | |||
10374 | CVE_STATUS[CVE-2024-53187] = "cpe-stable-backport: Backported in 6.12.2" | ||
10375 | |||
10376 | CVE_STATUS[CVE-2024-53188] = "cpe-stable-backport: Backported in 6.12.2" | ||
10377 | |||
10378 | CVE_STATUS[CVE-2024-53189] = "cpe-stable-backport: Backported in 6.12.2" | ||
10379 | |||
10380 | CVE_STATUS[CVE-2024-53190] = "cpe-stable-backport: Backported in 6.12.2" | ||
10381 | |||
10382 | CVE_STATUS[CVE-2024-53191] = "cpe-stable-backport: Backported in 6.12.2" | ||
10383 | |||
10384 | CVE_STATUS[CVE-2024-53192] = "cpe-stable-backport: Backported in 6.12.2" | ||
10385 | |||
10386 | CVE_STATUS[CVE-2024-53193] = "cpe-stable-backport: Backported in 6.12.2" | ||
10387 | |||
10388 | CVE_STATUS[CVE-2024-53194] = "cpe-stable-backport: Backported in 6.12.2" | ||
10389 | |||
10390 | CVE_STATUS[CVE-2024-53195] = "cpe-stable-backport: Backported in 6.12.2" | ||
10391 | |||
10392 | CVE_STATUS[CVE-2024-53196] = "cpe-stable-backport: Backported in 6.12.2" | ||
10393 | |||
10394 | CVE_STATUS[CVE-2024-53197] = "cpe-stable-backport: Backported in 6.12.2" | ||
10395 | |||
10396 | CVE_STATUS[CVE-2024-53198] = "cpe-stable-backport: Backported in 6.12.2" | ||
10397 | |||
10398 | CVE_STATUS[CVE-2024-53199] = "cpe-stable-backport: Backported in 6.12.2" | ||
10399 | |||
10400 | CVE_STATUS[CVE-2024-53200] = "cpe-stable-backport: Backported in 6.12.2" | ||
10401 | |||
10402 | CVE_STATUS[CVE-2024-53201] = "cpe-stable-backport: Backported in 6.12.2" | ||
10403 | |||
10404 | CVE_STATUS[CVE-2024-53202] = "cpe-stable-backport: Backported in 6.12.2" | ||
10405 | |||
10406 | CVE_STATUS[CVE-2024-53203] = "cpe-stable-backport: Backported in 6.12.2" | ||
10407 | |||
10408 | CVE_STATUS[CVE-2024-53204] = "cpe-stable-backport: Backported in 6.12.2" | ||
10409 | |||
10410 | CVE_STATUS[CVE-2024-53205] = "cpe-stable-backport: Backported in 6.12.2" | ||
10411 | |||
10412 | CVE_STATUS[CVE-2024-53206] = "cpe-stable-backport: Backported in 6.12.2" | ||
10413 | |||
10414 | CVE_STATUS[CVE-2024-53207] = "cpe-stable-backport: Backported in 6.12.2" | ||
10415 | |||
10416 | CVE_STATUS[CVE-2024-53208] = "cpe-stable-backport: Backported in 6.12.2" | ||
10417 | |||
10418 | CVE_STATUS[CVE-2024-53209] = "cpe-stable-backport: Backported in 6.12.2" | ||
10419 | |||
10420 | CVE_STATUS[CVE-2024-53210] = "cpe-stable-backport: Backported in 6.12.2" | ||
10421 | |||
10422 | CVE_STATUS[CVE-2024-53211] = "cpe-stable-backport: Backported in 6.12.2" | ||
10423 | |||
10424 | CVE_STATUS[CVE-2024-53212] = "cpe-stable-backport: Backported in 6.12.2" | ||
10425 | |||
10426 | CVE_STATUS[CVE-2024-53213] = "cpe-stable-backport: Backported in 6.12.2" | ||
10427 | |||
10428 | CVE_STATUS[CVE-2024-53214] = "cpe-stable-backport: Backported in 6.12.2" | ||
10429 | |||
10430 | CVE_STATUS[CVE-2024-53215] = "cpe-stable-backport: Backported in 6.12.2" | ||
10431 | |||
10432 | CVE_STATUS[CVE-2024-53216] = "cpe-stable-backport: Backported in 6.12.2" | ||
10433 | |||
10434 | CVE_STATUS[CVE-2024-53217] = "cpe-stable-backport: Backported in 6.12.2" | ||
10435 | |||
10436 | CVE_STATUS[CVE-2024-53218] = "cpe-stable-backport: Backported in 6.12.2" | ||
10437 | |||
10438 | CVE_STATUS[CVE-2024-53219] = "cpe-stable-backport: Backported in 6.12.2" | ||
10439 | |||
10440 | CVE_STATUS[CVE-2024-53220] = "cpe-stable-backport: Backported in 6.12.2" | ||
10441 | |||
10442 | CVE_STATUS[CVE-2024-53221] = "cpe-stable-backport: Backported in 6.12.2" | ||
10443 | |||
10444 | CVE_STATUS[CVE-2024-53222] = "cpe-stable-backport: Backported in 6.12.2" | ||
10445 | |||
10446 | CVE_STATUS[CVE-2024-53223] = "cpe-stable-backport: Backported in 6.12.2" | ||
10447 | |||
10448 | CVE_STATUS[CVE-2024-53224] = "cpe-stable-backport: Backported in 6.12.2" | ||
10449 | |||
10450 | CVE_STATUS[CVE-2024-53225] = "cpe-stable-backport: Backported in 6.12.2" | ||
10451 | |||
10452 | CVE_STATUS[CVE-2024-53226] = "cpe-stable-backport: Backported in 6.12.2" | ||
10453 | |||
10454 | CVE_STATUS[CVE-2024-53227] = "cpe-stable-backport: Backported in 6.12.2" | ||
10455 | |||
10456 | CVE_STATUS[CVE-2024-53228] = "cpe-stable-backport: Backported in 6.12.2" | ||
10457 | |||
10458 | CVE_STATUS[CVE-2024-53229] = "cpe-stable-backport: Backported in 6.12.2" | ||
10459 | |||
10460 | CVE_STATUS[CVE-2024-53230] = "cpe-stable-backport: Backported in 6.12.2" | ||
10461 | |||
10462 | CVE_STATUS[CVE-2024-53231] = "cpe-stable-backport: Backported in 6.12.2" | ||
10463 | |||
10464 | CVE_STATUS[CVE-2024-53232] = "cpe-stable-backport: Backported in 6.12.2" | ||
10465 | |||
10466 | CVE_STATUS[CVE-2024-53233] = "cpe-stable-backport: Backported in 6.12.2" | ||
10467 | |||
10468 | CVE_STATUS[CVE-2024-53234] = "cpe-stable-backport: Backported in 6.12.2" | ||
10469 | |||
10470 | CVE_STATUS[CVE-2024-53235] = "cpe-stable-backport: Backported in 6.12.2" | ||
10471 | |||
10472 | CVE_STATUS[CVE-2024-53236] = "cpe-stable-backport: Backported in 6.12.2" | ||
10473 | |||
10474 | CVE_STATUS[CVE-2024-53237] = "cpe-stable-backport: Backported in 6.12.2" | ||
10475 | |||
10476 | CVE_STATUS[CVE-2024-53238] = "cpe-stable-backport: Backported in 6.12.2" | ||
10477 | |||
10478 | CVE_STATUS[CVE-2024-53239] = "cpe-stable-backport: Backported in 6.12.2" | ||
10479 | |||
10480 | CVE_STATUS[CVE-2024-53240] = "cpe-stable-backport: Backported in 6.12.6" | ||
10481 | |||
10482 | CVE_STATUS[CVE-2024-53241] = "cpe-stable-backport: Backported in 6.12.6" | ||
10483 | |||
10484 | CVE_STATUS[CVE-2024-53680] = "cpe-stable-backport: Backported in 6.12.5" | ||
10485 | |||
10486 | CVE_STATUS[CVE-2024-53681] = "cpe-stable-backport: Backported in 6.12.9" | ||
10487 | |||
10488 | CVE_STATUS[CVE-2024-53682] = "cpe-stable-backport: Backported in 6.12.6" | ||
10489 | |||
10490 | CVE_STATUS[CVE-2024-53685] = "cpe-stable-backport: Backported in 6.12.7" | ||
10491 | |||
10492 | CVE_STATUS[CVE-2024-53687] = "cpe-stable-backport: Backported in 6.12.6" | ||
10493 | |||
10494 | CVE_STATUS[CVE-2024-53690] = "cpe-stable-backport: Backported in 6.12.7" | ||
10495 | |||
10496 | CVE_STATUS[CVE-2024-54031] = "fixed-version: Fixed from version 6.12.9" | ||
10497 | |||
10498 | CVE_STATUS[CVE-2024-54191] = "fixed-version: Fixed from version 6.12.6" | ||
10499 | |||
10500 | CVE_STATUS[CVE-2024-54193] = "cpe-stable-backport: Backported in 6.12.7" | ||
10501 | |||
10502 | CVE_STATUS[CVE-2024-54455] = "cpe-stable-backport: Backported in 6.12.7" | ||
10503 | |||
10504 | CVE_STATUS[CVE-2024-54456] = "cpe-stable-backport: Backported in 6.12.16" | ||
10505 | |||
10506 | CVE_STATUS[CVE-2024-54458] = "cpe-stable-backport: Backported in 6.12.16" | ||
10507 | |||
10508 | CVE_STATUS[CVE-2024-54460] = "cpe-stable-backport: Backported in 6.12.6" | ||
10509 | |||
10510 | CVE_STATUS[CVE-2024-54683] = "cpe-stable-backport: Backported in 6.12.6" | ||
10511 | |||
10512 | CVE_STATUS[CVE-2024-55639] = "cpe-stable-backport: Backported in 6.12.6" | ||
10513 | |||
10514 | CVE_STATUS[CVE-2024-55641] = "cpe-stable-backport: Backported in 6.12.6" | ||
10515 | |||
10516 | CVE_STATUS[CVE-2024-55642] = "cpe-stable-backport: Backported in 6.12.6" | ||
10517 | |||
10518 | CVE_STATUS[CVE-2024-55881] = "cpe-stable-backport: Backported in 6.12.7" | ||
10519 | |||
10520 | CVE_STATUS[CVE-2024-55916] = "cpe-stable-backport: Backported in 6.12.7" | ||
10521 | |||
10522 | CVE_STATUS[CVE-2024-56368] = "cpe-stable-backport: Backported in 6.12.7" | ||
10523 | |||
10524 | CVE_STATUS[CVE-2024-56369] = "cpe-stable-backport: Backported in 6.12.7" | ||
10525 | |||
10526 | CVE_STATUS[CVE-2024-56372] = "cpe-stable-backport: Backported in 6.12.7" | ||
10527 | |||
10528 | CVE_STATUS[CVE-2024-56531] = "cpe-stable-backport: Backported in 6.12.2" | ||
10529 | |||
10530 | CVE_STATUS[CVE-2024-56532] = "cpe-stable-backport: Backported in 6.12.2" | ||
10531 | |||
10532 | CVE_STATUS[CVE-2024-56533] = "cpe-stable-backport: Backported in 6.12.2" | ||
10533 | |||
10534 | CVE_STATUS[CVE-2024-56534] = "cpe-stable-backport: Backported in 6.12.2" | ||
10535 | |||
10536 | CVE_STATUS[CVE-2024-56535] = "cpe-stable-backport: Backported in 6.12.2" | ||
10537 | |||
10538 | CVE_STATUS[CVE-2024-56536] = "cpe-stable-backport: Backported in 6.12.2" | ||
10539 | |||
10540 | CVE_STATUS[CVE-2024-56537] = "cpe-stable-backport: Backported in 6.12.2" | ||
10541 | |||
10542 | CVE_STATUS[CVE-2024-56538] = "cpe-stable-backport: Backported in 6.12.2" | ||
10543 | |||
10544 | CVE_STATUS[CVE-2024-56539] = "cpe-stable-backport: Backported in 6.12.2" | ||
10545 | |||
10546 | CVE_STATUS[CVE-2024-56540] = "cpe-stable-backport: Backported in 6.12.2" | ||
10547 | |||
10548 | CVE_STATUS[CVE-2024-56541] = "cpe-stable-backport: Backported in 6.12.2" | ||
10549 | |||
10550 | CVE_STATUS[CVE-2024-56542] = "cpe-stable-backport: Backported in 6.12.2" | ||
10551 | |||
10552 | CVE_STATUS[CVE-2024-56543] = "cpe-stable-backport: Backported in 6.12.2" | ||
10553 | |||
10554 | CVE_STATUS[CVE-2024-56544] = "cpe-stable-backport: Backported in 6.12.2" | ||
10555 | |||
10556 | CVE_STATUS[CVE-2024-56545] = "cpe-stable-backport: Backported in 6.12.2" | ||
10557 | |||
10558 | CVE_STATUS[CVE-2024-56546] = "cpe-stable-backport: Backported in 6.12.2" | ||
10559 | |||
10560 | CVE_STATUS[CVE-2024-56547] = "cpe-stable-backport: Backported in 6.12.2" | ||
10561 | |||
10562 | CVE_STATUS[CVE-2024-56548] = "cpe-stable-backport: Backported in 6.12.2" | ||
10563 | |||
10564 | CVE_STATUS[CVE-2024-56549] = "cpe-stable-backport: Backported in 6.12.2" | ||
10565 | |||
10566 | CVE_STATUS[CVE-2024-56550] = "cpe-stable-backport: Backported in 6.12.4" | ||
10567 | |||
10568 | CVE_STATUS[CVE-2024-56551] = "cpe-stable-backport: Backported in 6.12.4" | ||
10569 | |||
10570 | CVE_STATUS[CVE-2024-56552] = "cpe-stable-backport: Backported in 6.12.4" | ||
10571 | |||
10572 | CVE_STATUS[CVE-2024-56553] = "cpe-stable-backport: Backported in 6.12.4" | ||
10573 | |||
10574 | CVE_STATUS[CVE-2024-56554] = "cpe-stable-backport: Backported in 6.12.4" | ||
10575 | |||
10576 | CVE_STATUS[CVE-2024-56555] = "cpe-stable-backport: Backported in 6.12.4" | ||
10577 | |||
10578 | CVE_STATUS[CVE-2024-56556] = "cpe-stable-backport: Backported in 6.12.4" | ||
10579 | |||
10580 | CVE_STATUS[CVE-2024-56557] = "cpe-stable-backport: Backported in 6.12.4" | ||
10581 | |||
10582 | CVE_STATUS[CVE-2024-56558] = "cpe-stable-backport: Backported in 6.12.4" | ||
10583 | |||
10584 | CVE_STATUS[CVE-2024-56559] = "cpe-stable-backport: Backported in 6.12.4" | ||
10585 | |||
10586 | CVE_STATUS[CVE-2024-56560] = "cpe-stable-backport: Backported in 6.12.4" | ||
10587 | |||
10588 | CVE_STATUS[CVE-2024-56561] = "cpe-stable-backport: Backported in 6.12.4" | ||
10589 | |||
10590 | CVE_STATUS[CVE-2024-56562] = "cpe-stable-backport: Backported in 6.12.4" | ||
10591 | |||
10592 | CVE_STATUS[CVE-2024-56563] = "cpe-stable-backport: Backported in 6.12.4" | ||
10593 | |||
10594 | CVE_STATUS[CVE-2024-56564] = "cpe-stable-backport: Backported in 6.12.4" | ||
10595 | |||
10596 | CVE_STATUS[CVE-2024-56565] = "cpe-stable-backport: Backported in 6.12.4" | ||
10597 | |||
10598 | CVE_STATUS[CVE-2024-56566] = "cpe-stable-backport: Backported in 6.12.4" | ||
10599 | |||
10600 | CVE_STATUS[CVE-2024-56567] = "cpe-stable-backport: Backported in 6.12.4" | ||
10601 | |||
10602 | CVE_STATUS[CVE-2024-56568] = "cpe-stable-backport: Backported in 6.12.4" | ||
10603 | |||
10604 | CVE_STATUS[CVE-2024-56569] = "cpe-stable-backport: Backported in 6.12.4" | ||
10605 | |||
10606 | CVE_STATUS[CVE-2024-56570] = "cpe-stable-backport: Backported in 6.12.4" | ||
10607 | |||
10608 | CVE_STATUS[CVE-2024-56572] = "cpe-stable-backport: Backported in 6.12.4" | ||
10609 | |||
10610 | CVE_STATUS[CVE-2024-56573] = "cpe-stable-backport: Backported in 6.12.4" | ||
10611 | |||
10612 | CVE_STATUS[CVE-2024-56574] = "cpe-stable-backport: Backported in 6.12.4" | ||
10613 | |||
10614 | CVE_STATUS[CVE-2024-56575] = "cpe-stable-backport: Backported in 6.12.4" | ||
10615 | |||
10616 | CVE_STATUS[CVE-2024-56576] = "cpe-stable-backport: Backported in 6.12.4" | ||
10617 | |||
10618 | CVE_STATUS[CVE-2024-56577] = "cpe-stable-backport: Backported in 6.12.4" | ||
10619 | |||
10620 | CVE_STATUS[CVE-2024-56578] = "cpe-stable-backport: Backported in 6.12.4" | ||
10621 | |||
10622 | CVE_STATUS[CVE-2024-56579] = "cpe-stable-backport: Backported in 6.12.4" | ||
10623 | |||
10624 | CVE_STATUS[CVE-2024-56580] = "cpe-stable-backport: Backported in 6.12.4" | ||
10625 | |||
10626 | CVE_STATUS[CVE-2024-56581] = "cpe-stable-backport: Backported in 6.12.4" | ||
10627 | |||
10628 | CVE_STATUS[CVE-2024-56582] = "cpe-stable-backport: Backported in 6.12.4" | ||
10629 | |||
10630 | CVE_STATUS[CVE-2024-56583] = "cpe-stable-backport: Backported in 6.12.5" | ||
10631 | |||
10632 | CVE_STATUS[CVE-2024-56584] = "cpe-stable-backport: Backported in 6.12.5" | ||
10633 | |||
10634 | CVE_STATUS[CVE-2024-56585] = "cpe-stable-backport: Backported in 6.12.5" | ||
10635 | |||
10636 | CVE_STATUS[CVE-2024-56586] = "cpe-stable-backport: Backported in 6.12.5" | ||
10637 | |||
10638 | CVE_STATUS[CVE-2024-56587] = "cpe-stable-backport: Backported in 6.12.5" | ||
10639 | |||
10640 | CVE_STATUS[CVE-2024-56588] = "cpe-stable-backport: Backported in 6.12.5" | ||
10641 | |||
10642 | CVE_STATUS[CVE-2024-56589] = "cpe-stable-backport: Backported in 6.12.5" | ||
10643 | |||
10644 | CVE_STATUS[CVE-2024-56590] = "cpe-stable-backport: Backported in 6.12.5" | ||
10645 | |||
10646 | CVE_STATUS[CVE-2024-56591] = "cpe-stable-backport: Backported in 6.12.5" | ||
10647 | |||
10648 | CVE_STATUS[CVE-2024-56592] = "cpe-stable-backport: Backported in 6.12.5" | ||
10649 | |||
10650 | CVE_STATUS[CVE-2024-56593] = "cpe-stable-backport: Backported in 6.12.5" | ||
10651 | |||
10652 | CVE_STATUS[CVE-2024-56594] = "cpe-stable-backport: Backported in 6.12.5" | ||
10653 | |||
10654 | CVE_STATUS[CVE-2024-56595] = "cpe-stable-backport: Backported in 6.12.5" | ||
10655 | |||
10656 | CVE_STATUS[CVE-2024-56596] = "cpe-stable-backport: Backported in 6.12.5" | ||
10657 | |||
10658 | CVE_STATUS[CVE-2024-56597] = "cpe-stable-backport: Backported in 6.12.5" | ||
10659 | |||
10660 | CVE_STATUS[CVE-2024-56598] = "cpe-stable-backport: Backported in 6.12.5" | ||
10661 | |||
10662 | CVE_STATUS[CVE-2024-56599] = "cpe-stable-backport: Backported in 6.12.5" | ||
10663 | |||
10664 | CVE_STATUS[CVE-2024-56600] = "cpe-stable-backport: Backported in 6.12.5" | ||
10665 | |||
10666 | CVE_STATUS[CVE-2024-56601] = "cpe-stable-backport: Backported in 6.12.5" | ||
10667 | |||
10668 | CVE_STATUS[CVE-2024-56602] = "cpe-stable-backport: Backported in 6.12.5" | ||
10669 | |||
10670 | CVE_STATUS[CVE-2024-56603] = "cpe-stable-backport: Backported in 6.12.5" | ||
10671 | |||
10672 | CVE_STATUS[CVE-2024-56604] = "cpe-stable-backport: Backported in 6.12.5" | ||
10673 | |||
10674 | CVE_STATUS[CVE-2024-56605] = "cpe-stable-backport: Backported in 6.12.5" | ||
10675 | |||
10676 | CVE_STATUS[CVE-2024-56606] = "cpe-stable-backport: Backported in 6.12.5" | ||
10677 | |||
10678 | CVE_STATUS[CVE-2024-56607] = "cpe-stable-backport: Backported in 6.12.5" | ||
10679 | |||
10680 | CVE_STATUS[CVE-2024-56608] = "cpe-stable-backport: Backported in 6.12.5" | ||
10681 | |||
10682 | CVE_STATUS[CVE-2024-56609] = "cpe-stable-backport: Backported in 6.12.5" | ||
10683 | |||
10684 | CVE_STATUS[CVE-2024-56610] = "cpe-stable-backport: Backported in 6.12.5" | ||
10685 | |||
10686 | CVE_STATUS[CVE-2024-56611] = "cpe-stable-backport: Backported in 6.12.5" | ||
10687 | |||
10688 | CVE_STATUS[CVE-2024-56612] = "cpe-stable-backport: Backported in 6.12.5" | ||
10689 | |||
10690 | CVE_STATUS[CVE-2024-56613] = "cpe-stable-backport: Backported in 6.12.5" | ||
10691 | |||
10692 | CVE_STATUS[CVE-2024-56614] = "cpe-stable-backport: Backported in 6.12.5" | ||
10693 | |||
10694 | CVE_STATUS[CVE-2024-56615] = "cpe-stable-backport: Backported in 6.12.5" | ||
10695 | |||
10696 | CVE_STATUS[CVE-2024-56616] = "cpe-stable-backport: Backported in 6.12.5" | ||
10697 | |||
10698 | CVE_STATUS[CVE-2024-56617] = "cpe-stable-backport: Backported in 6.12.5" | ||
10699 | |||
10700 | CVE_STATUS[CVE-2024-56618] = "cpe-stable-backport: Backported in 6.12.5" | ||
10701 | |||
10702 | CVE_STATUS[CVE-2024-56619] = "cpe-stable-backport: Backported in 6.12.5" | ||
10703 | |||
10704 | CVE_STATUS[CVE-2024-56620] = "cpe-stable-backport: Backported in 6.12.5" | ||
10705 | |||
10706 | CVE_STATUS[CVE-2024-56621] = "cpe-stable-backport: Backported in 6.12.5" | ||
10707 | |||
10708 | CVE_STATUS[CVE-2024-56622] = "cpe-stable-backport: Backported in 6.12.5" | ||
10709 | |||
10710 | CVE_STATUS[CVE-2024-56623] = "cpe-stable-backport: Backported in 6.12.5" | ||
10711 | |||
10712 | CVE_STATUS[CVE-2024-56624] = "cpe-stable-backport: Backported in 6.12.5" | ||
10713 | |||
10714 | CVE_STATUS[CVE-2024-56625] = "cpe-stable-backport: Backported in 6.12.5" | ||
10715 | |||
10716 | CVE_STATUS[CVE-2024-56626] = "cpe-stable-backport: Backported in 6.12.5" | ||
10717 | |||
10718 | CVE_STATUS[CVE-2024-56627] = "cpe-stable-backport: Backported in 6.12.5" | ||
10719 | |||
10720 | CVE_STATUS[CVE-2024-56628] = "cpe-stable-backport: Backported in 6.12.5" | ||
10721 | |||
10722 | CVE_STATUS[CVE-2024-56629] = "cpe-stable-backport: Backported in 6.12.5" | ||
10723 | |||
10724 | CVE_STATUS[CVE-2024-56630] = "cpe-stable-backport: Backported in 6.12.5" | ||
10725 | |||
10726 | CVE_STATUS[CVE-2024-56631] = "cpe-stable-backport: Backported in 6.12.5" | ||
10727 | |||
10728 | CVE_STATUS[CVE-2024-56632] = "cpe-stable-backport: Backported in 6.12.5" | ||
10729 | |||
10730 | CVE_STATUS[CVE-2024-56633] = "cpe-stable-backport: Backported in 6.12.5" | ||
10731 | |||
10732 | CVE_STATUS[CVE-2024-56634] = "cpe-stable-backport: Backported in 6.12.5" | ||
10733 | |||
10734 | CVE_STATUS[CVE-2024-56635] = "cpe-stable-backport: Backported in 6.12.5" | ||
10735 | |||
10736 | CVE_STATUS[CVE-2024-56636] = "cpe-stable-backport: Backported in 6.12.5" | ||
10737 | |||
10738 | CVE_STATUS[CVE-2024-56637] = "cpe-stable-backport: Backported in 6.12.5" | ||
10739 | |||
10740 | CVE_STATUS[CVE-2024-56638] = "cpe-stable-backport: Backported in 6.12.5" | ||
10741 | |||
10742 | CVE_STATUS[CVE-2024-56639] = "cpe-stable-backport: Backported in 6.12.5" | ||
10743 | |||
10744 | CVE_STATUS[CVE-2024-56640] = "cpe-stable-backport: Backported in 6.12.5" | ||
10745 | |||
10746 | CVE_STATUS[CVE-2024-56641] = "cpe-stable-backport: Backported in 6.12.5" | ||
10747 | |||
10748 | CVE_STATUS[CVE-2024-56642] = "cpe-stable-backport: Backported in 6.12.5" | ||
10749 | |||
10750 | CVE_STATUS[CVE-2024-56643] = "cpe-stable-backport: Backported in 6.12.5" | ||
10751 | |||
10752 | CVE_STATUS[CVE-2024-56644] = "cpe-stable-backport: Backported in 6.12.5" | ||
10753 | |||
10754 | CVE_STATUS[CVE-2024-56645] = "cpe-stable-backport: Backported in 6.12.5" | ||
10755 | |||
10756 | CVE_STATUS[CVE-2024-56646] = "cpe-stable-backport: Backported in 6.12.5" | ||
10757 | |||
10758 | CVE_STATUS[CVE-2024-56647] = "cpe-stable-backport: Backported in 6.12.5" | ||
10759 | |||
10760 | CVE_STATUS[CVE-2024-56648] = "cpe-stable-backport: Backported in 6.12.5" | ||
10761 | |||
10762 | CVE_STATUS[CVE-2024-56649] = "cpe-stable-backport: Backported in 6.12.5" | ||
10763 | |||
10764 | CVE_STATUS[CVE-2024-56650] = "cpe-stable-backport: Backported in 6.12.5" | ||
10765 | |||
10766 | CVE_STATUS[CVE-2024-56651] = "cpe-stable-backport: Backported in 6.12.5" | ||
10767 | |||
10768 | CVE_STATUS[CVE-2024-56652] = "cpe-stable-backport: Backported in 6.12.6" | ||
10769 | |||
10770 | CVE_STATUS[CVE-2024-56653] = "cpe-stable-backport: Backported in 6.12.6" | ||
10771 | |||
10772 | CVE_STATUS[CVE-2024-56654] = "cpe-stable-backport: Backported in 6.12.6" | ||
10773 | |||
10774 | CVE_STATUS[CVE-2024-56655] = "cpe-stable-backport: Backported in 6.12.6" | ||
10775 | |||
10776 | CVE_STATUS[CVE-2024-56656] = "cpe-stable-backport: Backported in 6.12.6" | ||
10777 | |||
10778 | CVE_STATUS[CVE-2024-56657] = "cpe-stable-backport: Backported in 6.12.6" | ||
10779 | |||
10780 | CVE_STATUS[CVE-2024-56658] = "cpe-stable-backport: Backported in 6.12.6" | ||
10781 | |||
10782 | CVE_STATUS[CVE-2024-56659] = "cpe-stable-backport: Backported in 6.12.6" | ||
10783 | |||
10784 | CVE_STATUS[CVE-2024-56660] = "cpe-stable-backport: Backported in 6.12.6" | ||
10785 | |||
10786 | CVE_STATUS[CVE-2024-56661] = "fixed-version: Fixed from version 6.12.6" | ||
10787 | |||
10788 | CVE_STATUS[CVE-2024-56662] = "cpe-stable-backport: Backported in 6.12.6" | ||
10789 | |||
10790 | CVE_STATUS[CVE-2024-56663] = "cpe-stable-backport: Backported in 6.12.6" | ||
10791 | |||
10792 | CVE_STATUS[CVE-2024-56664] = "cpe-stable-backport: Backported in 6.12.6" | ||
10793 | |||
10794 | CVE_STATUS[CVE-2024-56665] = "cpe-stable-backport: Backported in 6.12.6" | ||
10795 | |||
10796 | CVE_STATUS[CVE-2024-56666] = "cpe-stable-backport: Backported in 6.12.6" | ||
10797 | |||
10798 | CVE_STATUS[CVE-2024-56667] = "cpe-stable-backport: Backported in 6.12.6" | ||
10799 | |||
10800 | CVE_STATUS[CVE-2024-56668] = "cpe-stable-backport: Backported in 6.12.6" | ||
10801 | |||
10802 | CVE_STATUS[CVE-2024-56669] = "cpe-stable-backport: Backported in 6.12.6" | ||
10803 | |||
10804 | CVE_STATUS[CVE-2024-56670] = "cpe-stable-backport: Backported in 6.12.6" | ||
10805 | |||
10806 | CVE_STATUS[CVE-2024-56671] = "cpe-stable-backport: Backported in 6.12.6" | ||
10807 | |||
10808 | CVE_STATUS[CVE-2024-56672] = "cpe-stable-backport: Backported in 6.12.6" | ||
10809 | |||
10810 | CVE_STATUS[CVE-2024-56673] = "cpe-stable-backport: Backported in 6.12.6" | ||
10811 | |||
10812 | CVE_STATUS[CVE-2024-56674] = "cpe-stable-backport: Backported in 6.12.6" | ||
10813 | |||
10814 | CVE_STATUS[CVE-2024-56675] = "cpe-stable-backport: Backported in 6.12.6" | ||
10815 | |||
10816 | CVE_STATUS[CVE-2024-56676] = "cpe-stable-backport: Backported in 6.12.2" | ||
10817 | |||
10818 | CVE_STATUS[CVE-2024-56677] = "cpe-stable-backport: Backported in 6.12.2" | ||
10819 | |||
10820 | CVE_STATUS[CVE-2024-56678] = "cpe-stable-backport: Backported in 6.12.2" | ||
10821 | |||
10822 | CVE_STATUS[CVE-2024-56679] = "cpe-stable-backport: Backported in 6.12.2" | ||
10823 | |||
10824 | CVE_STATUS[CVE-2024-56680] = "cpe-stable-backport: Backported in 6.12.2" | ||
10825 | |||
10826 | CVE_STATUS[CVE-2024-56681] = "cpe-stable-backport: Backported in 6.12.2" | ||
10827 | |||
10828 | CVE_STATUS[CVE-2024-56682] = "cpe-stable-backport: Backported in 6.12.2" | ||
10829 | |||
10830 | CVE_STATUS[CVE-2024-56683] = "cpe-stable-backport: Backported in 6.12.2" | ||
10831 | |||
10832 | CVE_STATUS[CVE-2024-56684] = "cpe-stable-backport: Backported in 6.12.2" | ||
10833 | |||
10834 | CVE_STATUS[CVE-2024-56685] = "cpe-stable-backport: Backported in 6.12.2" | ||
10835 | |||
10836 | CVE_STATUS[CVE-2024-56687] = "cpe-stable-backport: Backported in 6.12.2" | ||
10837 | |||
10838 | CVE_STATUS[CVE-2024-56688] = "cpe-stable-backport: Backported in 6.12.2" | ||
10839 | |||
10840 | CVE_STATUS[CVE-2024-56689] = "cpe-stable-backport: Backported in 6.12.2" | ||
10841 | |||
10842 | CVE_STATUS[CVE-2024-56690] = "cpe-stable-backport: Backported in 6.12.2" | ||
10843 | |||
10844 | CVE_STATUS[CVE-2024-56691] = "cpe-stable-backport: Backported in 6.12.2" | ||
10845 | |||
10846 | CVE_STATUS[CVE-2024-56692] = "cpe-stable-backport: Backported in 6.12.2" | ||
10847 | |||
10848 | CVE_STATUS[CVE-2024-56693] = "cpe-stable-backport: Backported in 6.12.2" | ||
10849 | |||
10850 | CVE_STATUS[CVE-2024-56694] = "cpe-stable-backport: Backported in 6.12.2" | ||
10851 | |||
10852 | CVE_STATUS[CVE-2024-56695] = "cpe-stable-backport: Backported in 6.12.2" | ||
10853 | |||
10854 | CVE_STATUS[CVE-2024-56696] = "cpe-stable-backport: Backported in 6.12.2" | ||
10855 | |||
10856 | CVE_STATUS[CVE-2024-56697] = "cpe-stable-backport: Backported in 6.12.2" | ||
10857 | |||
10858 | CVE_STATUS[CVE-2024-56698] = "cpe-stable-backport: Backported in 6.12.2" | ||
10859 | |||
10860 | CVE_STATUS[CVE-2024-56699] = "cpe-stable-backport: Backported in 6.12.2" | ||
10861 | |||
10862 | CVE_STATUS[CVE-2024-56700] = "cpe-stable-backport: Backported in 6.12.2" | ||
10863 | |||
10864 | CVE_STATUS[CVE-2024-56701] = "cpe-stable-backport: Backported in 6.12.2" | ||
10865 | |||
10866 | CVE_STATUS[CVE-2024-56702] = "cpe-stable-backport: Backported in 6.12.2" | ||
10867 | |||
10868 | CVE_STATUS[CVE-2024-56703] = "cpe-stable-backport: Backported in 6.12.2" | ||
10869 | |||
10870 | CVE_STATUS[CVE-2024-56704] = "cpe-stable-backport: Backported in 6.12.2" | ||
10871 | |||
10872 | CVE_STATUS[CVE-2024-56705] = "cpe-stable-backport: Backported in 6.12.2" | ||
10873 | |||
10874 | CVE_STATUS[CVE-2024-56706] = "cpe-stable-backport: Backported in 6.12.2" | ||
10875 | |||
10876 | CVE_STATUS[CVE-2024-56707] = "cpe-stable-backport: Backported in 6.12.2" | ||
10877 | |||
10878 | CVE_STATUS[CVE-2024-56708] = "cpe-stable-backport: Backported in 6.12.2" | ||
10879 | |||
10880 | CVE_STATUS[CVE-2024-56709] = "cpe-stable-backport: Backported in 6.12.7" | ||
10881 | |||
10882 | CVE_STATUS[CVE-2024-56710] = "cpe-stable-backport: Backported in 6.12.7" | ||
10883 | |||
10884 | CVE_STATUS[CVE-2024-56711] = "cpe-stable-backport: Backported in 6.12.7" | ||
10885 | |||
10886 | CVE_STATUS[CVE-2024-56712] = "cpe-stable-backport: Backported in 6.12.7" | ||
10887 | |||
10888 | CVE_STATUS[CVE-2024-56713] = "cpe-stable-backport: Backported in 6.12.7" | ||
10889 | |||
10890 | CVE_STATUS[CVE-2024-56714] = "cpe-stable-backport: Backported in 6.12.7" | ||
10891 | |||
10892 | CVE_STATUS[CVE-2024-56715] = "cpe-stable-backport: Backported in 6.12.7" | ||
10893 | |||
10894 | CVE_STATUS[CVE-2024-56716] = "cpe-stable-backport: Backported in 6.12.7" | ||
10895 | |||
10896 | CVE_STATUS[CVE-2024-56717] = "cpe-stable-backport: Backported in 6.12.7" | ||
10897 | |||
10898 | CVE_STATUS[CVE-2024-56718] = "cpe-stable-backport: Backported in 6.12.7" | ||
10899 | |||
10900 | CVE_STATUS[CVE-2024-56719] = "cpe-stable-backport: Backported in 6.12.7" | ||
10901 | |||
10902 | CVE_STATUS[CVE-2024-56720] = "cpe-stable-backport: Backported in 6.12.2" | ||
10903 | |||
10904 | CVE_STATUS[CVE-2024-56721] = "cpe-stable-backport: Backported in 6.12.2" | ||
10905 | |||
10906 | CVE_STATUS[CVE-2024-56722] = "cpe-stable-backport: Backported in 6.12.2" | ||
10907 | |||
10908 | CVE_STATUS[CVE-2024-56723] = "cpe-stable-backport: Backported in 6.12.2" | ||
10909 | |||
10910 | CVE_STATUS[CVE-2024-56724] = "cpe-stable-backport: Backported in 6.12.2" | ||
10911 | |||
10912 | CVE_STATUS[CVE-2024-56725] = "cpe-stable-backport: Backported in 6.12.2" | ||
10913 | |||
10914 | CVE_STATUS[CVE-2024-56726] = "cpe-stable-backport: Backported in 6.12.2" | ||
10915 | |||
10916 | CVE_STATUS[CVE-2024-56727] = "cpe-stable-backport: Backported in 6.12.2" | ||
10917 | |||
10918 | CVE_STATUS[CVE-2024-56728] = "cpe-stable-backport: Backported in 6.12.2" | ||
10919 | |||
10920 | CVE_STATUS[CVE-2024-56729] = "cpe-stable-backport: Backported in 6.12.2" | ||
10921 | |||
10922 | CVE_STATUS[CVE-2024-56730] = "cpe-stable-backport: Backported in 6.12.2" | ||
10923 | |||
10924 | CVE_STATUS[CVE-2024-56739] = "cpe-stable-backport: Backported in 6.12.2" | ||
10925 | |||
10926 | CVE_STATUS[CVE-2024-56740] = "cpe-stable-backport: Backported in 6.12.2" | ||
10927 | |||
10928 | CVE_STATUS[CVE-2024-56742] = "cpe-stable-backport: Backported in 6.12.2" | ||
10929 | |||
10930 | CVE_STATUS[CVE-2024-56743] = "cpe-stable-backport: Backported in 6.12.2" | ||
10931 | |||
10932 | CVE_STATUS[CVE-2024-56744] = "cpe-stable-backport: Backported in 6.12.2" | ||
10933 | |||
10934 | CVE_STATUS[CVE-2024-56745] = "cpe-stable-backport: Backported in 6.12.2" | ||
10935 | |||
10936 | CVE_STATUS[CVE-2024-56746] = "cpe-stable-backport: Backported in 6.12.2" | ||
10937 | |||
10938 | CVE_STATUS[CVE-2024-56747] = "cpe-stable-backport: Backported in 6.12.2" | ||
10939 | |||
10940 | CVE_STATUS[CVE-2024-56748] = "cpe-stable-backport: Backported in 6.12.2" | ||
10941 | |||
10942 | CVE_STATUS[CVE-2024-56749] = "cpe-stable-backport: Backported in 6.12.2" | ||
10943 | |||
10944 | CVE_STATUS[CVE-2024-56750] = "cpe-stable-backport: Backported in 6.12.2" | ||
10945 | |||
10946 | CVE_STATUS[CVE-2024-56751] = "cpe-stable-backport: Backported in 6.12.2" | ||
10947 | |||
10948 | CVE_STATUS[CVE-2024-56752] = "cpe-stable-backport: Backported in 6.12.2" | ||
10949 | |||
10950 | CVE_STATUS[CVE-2024-56753] = "cpe-stable-backport: Backported in 6.12.2" | ||
10951 | |||
10952 | CVE_STATUS[CVE-2024-56754] = "cpe-stable-backport: Backported in 6.12.2" | ||
10953 | |||
10954 | CVE_STATUS[CVE-2024-56755] = "cpe-stable-backport: Backported in 6.12.2" | ||
10955 | |||
10956 | CVE_STATUS[CVE-2024-56756] = "cpe-stable-backport: Backported in 6.12.2" | ||
10957 | |||
10958 | CVE_STATUS[CVE-2024-56757] = "cpe-stable-backport: Backported in 6.12.8" | ||
10959 | |||
10960 | CVE_STATUS[CVE-2024-56758] = "cpe-stable-backport: Backported in 6.12.8" | ||
10961 | |||
10962 | CVE_STATUS[CVE-2024-56759] = "cpe-stable-backport: Backported in 6.12.8" | ||
10963 | |||
10964 | CVE_STATUS[CVE-2024-56760] = "cpe-stable-backport: Backported in 6.12.8" | ||
10965 | |||
10966 | CVE_STATUS[CVE-2024-56761] = "cpe-stable-backport: Backported in 6.12.8" | ||
10967 | |||
10968 | CVE_STATUS[CVE-2024-56763] = "cpe-stable-backport: Backported in 6.12.8" | ||
10969 | |||
10970 | CVE_STATUS[CVE-2024-56764] = "cpe-stable-backport: Backported in 6.12.8" | ||
10971 | |||
10972 | CVE_STATUS[CVE-2024-56765] = "cpe-stable-backport: Backported in 6.12.8" | ||
10973 | |||
10974 | CVE_STATUS[CVE-2024-56766] = "fixed-version: Fixed from version 6.12.8" | ||
10975 | |||
10976 | CVE_STATUS[CVE-2024-56767] = "cpe-stable-backport: Backported in 6.12.8" | ||
10977 | |||
10978 | CVE_STATUS[CVE-2024-56768] = "cpe-stable-backport: Backported in 6.12.8" | ||
10979 | |||
10980 | CVE_STATUS[CVE-2024-56769] = "cpe-stable-backport: Backported in 6.12.8" | ||
10981 | |||
10982 | CVE_STATUS[CVE-2024-56770] = "cpe-stable-backport: Backported in 6.12.6" | ||
10983 | |||
10984 | CVE_STATUS[CVE-2024-56771] = "cpe-stable-backport: Backported in 6.12.4" | ||
10985 | |||
10986 | CVE_STATUS[CVE-2024-56772] = "cpe-stable-backport: Backported in 6.12.4" | ||
10987 | |||
10988 | CVE_STATUS[CVE-2024-56773] = "cpe-stable-backport: Backported in 6.12.4" | ||
10989 | |||
10990 | CVE_STATUS[CVE-2024-56774] = "cpe-stable-backport: Backported in 6.12.4" | ||
10991 | |||
10992 | CVE_STATUS[CVE-2024-56775] = "cpe-stable-backport: Backported in 6.12.4" | ||
10993 | |||
10994 | CVE_STATUS[CVE-2024-56776] = "cpe-stable-backport: Backported in 6.12.4" | ||
10995 | |||
10996 | CVE_STATUS[CVE-2024-56777] = "cpe-stable-backport: Backported in 6.12.4" | ||
10997 | |||
10998 | CVE_STATUS[CVE-2024-56778] = "cpe-stable-backport: Backported in 6.12.4" | ||
10999 | |||
11000 | CVE_STATUS[CVE-2024-56779] = "cpe-stable-backport: Backported in 6.12.4" | ||
11001 | |||
11002 | CVE_STATUS[CVE-2024-56780] = "cpe-stable-backport: Backported in 6.12.4" | ||
11003 | |||
11004 | CVE_STATUS[CVE-2024-56781] = "cpe-stable-backport: Backported in 6.12.5" | ||
11005 | |||
11006 | CVE_STATUS[CVE-2024-56782] = "cpe-stable-backport: Backported in 6.12.5" | ||
11007 | |||
11008 | CVE_STATUS[CVE-2024-56783] = "cpe-stable-backport: Backported in 6.12.5" | ||
11009 | |||
11010 | CVE_STATUS[CVE-2024-56784] = "cpe-stable-backport: Backported in 6.12.5" | ||
11011 | |||
11012 | CVE_STATUS[CVE-2024-56785] = "cpe-stable-backport: Backported in 6.12.5" | ||
11013 | |||
11014 | CVE_STATUS[CVE-2024-56786] = "cpe-stable-backport: Backported in 6.12.5" | ||
11015 | |||
11016 | CVE_STATUS[CVE-2024-56787] = "cpe-stable-backport: Backported in 6.12.5" | ||
11017 | |||
11018 | CVE_STATUS[CVE-2024-56788] = "cpe-stable-backport: Backported in 6.12.7" | ||
11019 | |||
11020 | CVE_STATUS[CVE-2024-57791] = "cpe-stable-backport: Backported in 6.12.7" | ||
11021 | |||
11022 | CVE_STATUS[CVE-2024-57792] = "cpe-stable-backport: Backported in 6.12.8" | ||
11023 | |||
11024 | CVE_STATUS[CVE-2024-57793] = "cpe-stable-backport: Backported in 6.12.8" | ||
11025 | |||
11026 | CVE_STATUS[CVE-2024-57795] = "cpe-stable-backport: Backported in 6.12.9" | ||
11027 | |||
11028 | CVE_STATUS[CVE-2024-57798] = "cpe-stable-backport: Backported in 6.12.8" | ||
11029 | |||
11030 | CVE_STATUS[CVE-2024-57799] = "cpe-stable-backport: Backported in 6.12.8" | ||
11031 | |||
11032 | CVE_STATUS[CVE-2024-57800] = "cpe-stable-backport: Backported in 6.12.8" | ||
11033 | |||
11034 | CVE_STATUS[CVE-2024-57801] = "cpe-stable-backport: Backported in 6.12.9" | ||
11035 | |||
11036 | CVE_STATUS[CVE-2024-57802] = "cpe-stable-backport: Backported in 6.12.9" | ||
11037 | |||
11038 | CVE_STATUS[CVE-2024-57804] = "cpe-stable-backport: Backported in 6.12.8" | ||
11039 | |||
11040 | CVE_STATUS[CVE-2024-57805] = "cpe-stable-backport: Backported in 6.12.8" | ||
11041 | |||
11042 | CVE_STATUS[CVE-2024-57806] = "cpe-stable-backport: Backported in 6.12.8" | ||
11043 | |||
11044 | CVE_STATUS[CVE-2024-57807] = "cpe-stable-backport: Backported in 6.12.8" | ||
11045 | |||
11046 | CVE_STATUS[CVE-2024-57809] = "cpe-stable-backport: Backported in 6.12.4" | ||
11047 | |||
11048 | CVE_STATUS[CVE-2024-57834] = "cpe-stable-backport: Backported in 6.12.16" | ||
11049 | |||
11050 | CVE_STATUS[CVE-2024-57838] = "cpe-stable-backport: Backported in 6.12.4" | ||
11051 | |||
11052 | CVE_STATUS[CVE-2024-57839] = "cpe-stable-backport: Backported in 6.12.5" | ||
11053 | |||
11054 | CVE_STATUS[CVE-2024-57841] = "cpe-stable-backport: Backported in 6.12.9" | ||
11055 | |||
11056 | CVE_STATUS[CVE-2024-57843] = "cpe-stable-backport: Backported in 6.12.5" | ||
11057 | |||
11058 | CVE_STATUS[CVE-2024-57844] = "cpe-stable-backport: Backported in 6.12.9" | ||
11059 | |||
11060 | CVE_STATUS[CVE-2024-57849] = "cpe-stable-backport: Backported in 6.12.5" | ||
11061 | |||
11062 | CVE_STATUS[CVE-2024-57850] = "cpe-stable-backport: Backported in 6.12.5" | ||
11063 | |||
11064 | CVE_STATUS[CVE-2024-57852] = "cpe-stable-backport: Backported in 6.12.16" | ||
11065 | |||
11066 | CVE_STATUS[CVE-2024-57857] = "cpe-stable-backport: Backported in 6.12.9" | ||
11067 | |||
11068 | CVE_STATUS[CVE-2024-57872] = "cpe-stable-backport: Backported in 6.12.5" | ||
11069 | |||
11070 | CVE_STATUS[CVE-2024-57874] = "cpe-stable-backport: Backported in 6.12.5" | ||
11071 | |||
11072 | CVE_STATUS[CVE-2024-57875] = "cpe-stable-backport: Backported in 6.12.5" | ||
11073 | |||
11074 | CVE_STATUS[CVE-2024-57876] = "cpe-stable-backport: Backported in 6.12.5" | ||
11075 | |||
11076 | CVE_STATUS[CVE-2024-57877] = "cpe-stable-backport: Backported in 6.12.5" | ||
11077 | |||
11078 | CVE_STATUS[CVE-2024-57878] = "cpe-stable-backport: Backported in 6.12.5" | ||
11079 | |||
11080 | CVE_STATUS[CVE-2024-57879] = "cpe-stable-backport: Backported in 6.12.6" | ||
11081 | |||
11082 | CVE_STATUS[CVE-2024-57880] = "cpe-stable-backport: Backported in 6.12.6" | ||
11083 | |||
11084 | CVE_STATUS[CVE-2024-57881] = "cpe-stable-backport: Backported in 6.12.7" | ||
11085 | |||
11086 | CVE_STATUS[CVE-2024-57882] = "cpe-stable-backport: Backported in 6.12.9" | ||
11087 | |||
11088 | CVE_STATUS[CVE-2024-57883] = "cpe-stable-backport: Backported in 6.12.9" | ||
11089 | |||
11090 | CVE_STATUS[CVE-2024-57884] = "cpe-stable-backport: Backported in 6.12.9" | ||
11091 | |||
11092 | CVE_STATUS[CVE-2024-57885] = "cpe-stable-backport: Backported in 6.12.9" | ||
11093 | |||
11094 | CVE_STATUS[CVE-2024-57886] = "cpe-stable-backport: Backported in 6.12.9" | ||
11095 | |||
11096 | CVE_STATUS[CVE-2024-57887] = "cpe-stable-backport: Backported in 6.12.9" | ||
11097 | |||
11098 | CVE_STATUS[CVE-2024-57888] = "cpe-stable-backport: Backported in 6.12.9" | ||
11099 | |||
11100 | CVE_STATUS[CVE-2024-57889] = "cpe-stable-backport: Backported in 6.12.9" | ||
11101 | |||
11102 | CVE_STATUS[CVE-2024-57890] = "cpe-stable-backport: Backported in 6.12.9" | ||
11103 | |||
11104 | CVE_STATUS[CVE-2024-57891] = "cpe-stable-backport: Backported in 6.12.9" | ||
11105 | |||
11106 | CVE_STATUS[CVE-2024-57892] = "cpe-stable-backport: Backported in 6.12.9" | ||
11107 | |||
11108 | CVE_STATUS[CVE-2024-57893] = "cpe-stable-backport: Backported in 6.12.9" | ||
11109 | |||
11110 | CVE_STATUS[CVE-2024-57895] = "cpe-stable-backport: Backported in 6.12.9" | ||
11111 | |||
11112 | CVE_STATUS[CVE-2024-57896] = "cpe-stable-backport: Backported in 6.12.9" | ||
11113 | |||
11114 | CVE_STATUS[CVE-2024-57897] = "cpe-stable-backport: Backported in 6.12.9" | ||
11115 | |||
11116 | CVE_STATUS[CVE-2024-57898] = "cpe-stable-backport: Backported in 6.12.9" | ||
11117 | |||
11118 | CVE_STATUS[CVE-2024-57899] = "cpe-stable-backport: Backported in 6.12.9" | ||
11119 | |||
11120 | CVE_STATUS[CVE-2024-57900] = "cpe-stable-backport: Backported in 6.12.9" | ||
11121 | |||
11122 | CVE_STATUS[CVE-2024-57901] = "cpe-stable-backport: Backported in 6.12.9" | ||
11123 | |||
11124 | CVE_STATUS[CVE-2024-57902] = "cpe-stable-backport: Backported in 6.12.9" | ||
11125 | |||
11126 | CVE_STATUS[CVE-2024-57903] = "cpe-stable-backport: Backported in 6.12.9" | ||
11127 | |||
11128 | CVE_STATUS[CVE-2024-57904] = "cpe-stable-backport: Backported in 6.12.10" | ||
11129 | |||
11130 | CVE_STATUS[CVE-2024-57905] = "cpe-stable-backport: Backported in 6.12.10" | ||
11131 | |||
11132 | CVE_STATUS[CVE-2024-57906] = "cpe-stable-backport: Backported in 6.12.10" | ||
11133 | |||
11134 | CVE_STATUS[CVE-2024-57907] = "cpe-stable-backport: Backported in 6.12.10" | ||
11135 | |||
11136 | CVE_STATUS[CVE-2024-57908] = "cpe-stable-backport: Backported in 6.12.10" | ||
11137 | |||
11138 | CVE_STATUS[CVE-2024-57909] = "cpe-stable-backport: Backported in 6.12.10" | ||
11139 | |||
11140 | CVE_STATUS[CVE-2024-57910] = "cpe-stable-backport: Backported in 6.12.10" | ||
11141 | |||
11142 | CVE_STATUS[CVE-2024-57911] = "cpe-stable-backport: Backported in 6.12.10" | ||
11143 | |||
11144 | CVE_STATUS[CVE-2024-57912] = "cpe-stable-backport: Backported in 6.12.10" | ||
11145 | |||
11146 | CVE_STATUS[CVE-2024-57913] = "cpe-stable-backport: Backported in 6.12.10" | ||
11147 | |||
11148 | CVE_STATUS[CVE-2024-57914] = "cpe-stable-backport: Backported in 6.12.10" | ||
11149 | |||
11150 | CVE_STATUS[CVE-2024-57916] = "cpe-stable-backport: Backported in 6.12.10" | ||
11151 | |||
11152 | CVE_STATUS[CVE-2024-57917] = "cpe-stable-backport: Backported in 6.12.10" | ||
11153 | |||
11154 | CVE_STATUS[CVE-2024-57918] = "cpe-stable-backport: Backported in 6.12.10" | ||
11155 | |||
11156 | CVE_STATUS[CVE-2024-57919] = "cpe-stable-backport: Backported in 6.12.10" | ||
11157 | |||
11158 | # CVE-2024-57920 has no known resolution | ||
11159 | |||
11160 | CVE_STATUS[CVE-2024-57921] = "cpe-stable-backport: Backported in 6.12.10" | ||
11161 | |||
11162 | CVE_STATUS[CVE-2024-57922] = "cpe-stable-backport: Backported in 6.12.10" | ||
11163 | |||
11164 | CVE_STATUS[CVE-2024-57923] = "cpe-stable-backport: Backported in 6.12.10" | ||
11165 | |||
11166 | CVE_STATUS[CVE-2024-57924] = "cpe-stable-backport: Backported in 6.12.10" | ||
11167 | |||
11168 | CVE_STATUS[CVE-2024-57925] = "cpe-stable-backport: Backported in 6.12.10" | ||
11169 | |||
11170 | CVE_STATUS[CVE-2024-57926] = "cpe-stable-backport: Backported in 6.12.10" | ||
11171 | |||
11172 | CVE_STATUS[CVE-2024-57927] = "cpe-stable-backport: Backported in 6.12.10" | ||
11173 | |||
11174 | CVE_STATUS[CVE-2024-57928] = "cpe-stable-backport: Backported in 6.12.10" | ||
11175 | |||
11176 | CVE_STATUS[CVE-2024-57929] = "cpe-stable-backport: Backported in 6.12.10" | ||
11177 | |||
11178 | CVE_STATUS[CVE-2024-57930] = "fixed-version: Fixed from version 6.12.9" | ||
11179 | |||
11180 | CVE_STATUS[CVE-2024-57931] = "cpe-stable-backport: Backported in 6.12.9" | ||
11181 | |||
11182 | CVE_STATUS[CVE-2024-57932] = "cpe-stable-backport: Backported in 6.12.9" | ||
11183 | |||
11184 | CVE_STATUS[CVE-2024-57933] = "cpe-stable-backport: Backported in 6.12.9" | ||
11185 | |||
11186 | CVE_STATUS[CVE-2024-57934] = "cpe-stable-backport: Backported in 6.12.9" | ||
11187 | |||
11188 | CVE_STATUS[CVE-2024-57935] = "fixed-version: Fixed from version 6.12.9" | ||
11189 | |||
11190 | CVE_STATUS[CVE-2024-57936] = "cpe-stable-backport: Backported in 6.12.9" | ||
11191 | |||
11192 | CVE_STATUS[CVE-2024-57938] = "cpe-stable-backport: Backported in 6.12.9" | ||
11193 | |||
11194 | CVE_STATUS[CVE-2024-57939] = "cpe-stable-backport: Backported in 6.12.10" | ||
11195 | |||
11196 | CVE_STATUS[CVE-2024-57940] = "cpe-stable-backport: Backported in 6.12.10" | ||
11197 | |||
11198 | CVE_STATUS[CVE-2024-57941] = "cpe-stable-backport: Backported in 6.12.10" | ||
11199 | |||
11200 | CVE_STATUS[CVE-2024-57942] = "cpe-stable-backport: Backported in 6.12.10" | ||
11201 | |||
11202 | CVE_STATUS[CVE-2024-57943] = "cpe-stable-backport: Backported in 6.12.10" | ||
11203 | |||
11204 | CVE_STATUS[CVE-2024-57944] = "cpe-stable-backport: Backported in 6.12.10" | ||
11205 | |||
11206 | CVE_STATUS[CVE-2024-57945] = "cpe-stable-backport: Backported in 6.12.10" | ||
11207 | |||
11208 | CVE_STATUS[CVE-2024-57946] = "cpe-stable-backport: Backported in 6.12.8" | ||
11209 | |||
11210 | CVE_STATUS[CVE-2024-57947] = "fixed-version: Fixed from version 6.11" | ||
11211 | |||
11212 | CVE_STATUS[CVE-2024-57948] = "cpe-stable-backport: Backported in 6.12.11" | ||
11213 | |||
11214 | CVE_STATUS[CVE-2024-57949] = "cpe-stable-backport: Backported in 6.12.11" | ||
11215 | |||
11216 | CVE_STATUS[CVE-2024-57950] = "cpe-stable-backport: Backported in 6.12.12" | ||
11217 | |||
11218 | CVE_STATUS[CVE-2024-57951] = "cpe-stable-backport: Backported in 6.12.11" | ||
11219 | |||
11220 | CVE_STATUS[CVE-2024-57952] = "cpe-stable-backport: Backported in 6.12.12" | ||
11221 | |||
11222 | CVE_STATUS[CVE-2024-57953] = "cpe-stable-backport: Backported in 6.12.13" | ||
11223 | |||
11224 | CVE_STATUS[CVE-2024-57973] = "cpe-stable-backport: Backported in 6.12.13" | ||
11225 | |||
11226 | CVE_STATUS[CVE-2024-57974] = "cpe-stable-backport: Backported in 6.12.13" | ||
11227 | |||
11228 | CVE_STATUS[CVE-2024-57975] = "cpe-stable-backport: Backported in 6.12.13" | ||
11229 | |||
11230 | # CVE-2024-57976 needs backporting (fixed from 6.14) | ||
11231 | |||
11232 | CVE_STATUS[CVE-2024-57977] = "cpe-stable-backport: Backported in 6.12.13" | ||
11233 | |||
11234 | CVE_STATUS[CVE-2024-57978] = "cpe-stable-backport: Backported in 6.12.13" | ||
11235 | |||
11236 | CVE_STATUS[CVE-2024-57979] = "cpe-stable-backport: Backported in 6.12.13" | ||
11237 | |||
11238 | CVE_STATUS[CVE-2024-57980] = "cpe-stable-backport: Backported in 6.12.13" | ||
11239 | |||
11240 | CVE_STATUS[CVE-2024-57981] = "cpe-stable-backport: Backported in 6.12.13" | ||
11241 | |||
11242 | CVE_STATUS[CVE-2024-57982] = "cpe-stable-backport: Backported in 6.12.13" | ||
11243 | |||
11244 | CVE_STATUS[CVE-2024-57983] = "fixed-version: only affects 6.13 onwards" | ||
11245 | |||
11246 | CVE_STATUS[CVE-2024-57984] = "cpe-stable-backport: Backported in 6.12.13" | ||
11247 | |||
11248 | CVE_STATUS[CVE-2024-57985] = "cpe-stable-backport: Backported in 6.12.13" | ||
11249 | |||
11250 | CVE_STATUS[CVE-2024-57986] = "cpe-stable-backport: Backported in 6.12.13" | ||
11251 | |||
11252 | CVE_STATUS[CVE-2024-57987] = "cpe-stable-backport: Backported in 6.12.13" | ||
11253 | |||
11254 | CVE_STATUS[CVE-2024-57988] = "cpe-stable-backport: Backported in 6.12.13" | ||
11255 | |||
11256 | CVE_STATUS[CVE-2024-57989] = "cpe-stable-backport: Backported in 6.12.13" | ||
11257 | |||
11258 | CVE_STATUS[CVE-2024-57990] = "cpe-stable-backport: Backported in 6.12.13" | ||
11259 | |||
11260 | CVE_STATUS[CVE-2024-57991] = "fixed-version: only affects 6.13 onwards" | ||
11261 | |||
11262 | CVE_STATUS[CVE-2024-57992] = "fixed-version: only affects 6.13 onwards" | ||
11263 | |||
11264 | CVE_STATUS[CVE-2024-57993] = "cpe-stable-backport: Backported in 6.12.13" | ||
11265 | |||
11266 | CVE_STATUS[CVE-2024-57994] = "cpe-stable-backport: Backported in 6.12.13" | ||
11267 | |||
11268 | # CVE-2024-57995 needs backporting (fixed from 6.14) | ||
11269 | |||
11270 | CVE_STATUS[CVE-2024-57996] = "cpe-stable-backport: Backported in 6.12.13" | ||
11271 | |||
11272 | CVE_STATUS[CVE-2024-57997] = "cpe-stable-backport: Backported in 6.12.13" | ||
11273 | |||
11274 | CVE_STATUS[CVE-2024-57998] = "cpe-stable-backport: Backported in 6.12.13" | ||
11275 | |||
11276 | CVE_STATUS[CVE-2024-57999] = "cpe-stable-backport: Backported in 6.12.13" | ||
11277 | |||
11278 | CVE_STATUS[CVE-2024-58000] = "fixed-version: only affects 6.13 onwards" | ||
11279 | |||
11280 | CVE_STATUS[CVE-2024-58001] = "cpe-stable-backport: Backported in 6.12.14" | ||
11281 | |||
11282 | CVE_STATUS[CVE-2024-58002] = "cpe-stable-backport: Backported in 6.12.14" | ||
11283 | |||
11284 | CVE_STATUS[CVE-2024-58003] = "cpe-stable-backport: Backported in 6.12.14" | ||
11285 | |||
11286 | CVE_STATUS[CVE-2024-58004] = "cpe-stable-backport: Backported in 6.12.14" | ||
11287 | |||
11288 | CVE_STATUS[CVE-2024-58005] = "cpe-stable-backport: Backported in 6.12.14" | ||
11289 | |||
11290 | CVE_STATUS[CVE-2024-58006] = "cpe-stable-backport: Backported in 6.12.14" | ||
11291 | |||
11292 | CVE_STATUS[CVE-2024-58007] = "cpe-stable-backport: Backported in 6.12.14" | ||
11293 | |||
11294 | CVE_STATUS[CVE-2024-58008] = "cpe-stable-backport: Backported in 6.12.14" | ||
11295 | |||
11296 | CVE_STATUS[CVE-2024-58009] = "cpe-stable-backport: Backported in 6.12.14" | ||
11297 | |||
11298 | CVE_STATUS[CVE-2024-58010] = "cpe-stable-backport: Backported in 6.12.14" | ||
11299 | |||
11300 | CVE_STATUS[CVE-2024-58011] = "cpe-stable-backport: Backported in 6.12.14" | ||
11301 | |||
11302 | CVE_STATUS[CVE-2024-58012] = "cpe-stable-backport: Backported in 6.12.14" | ||
11303 | |||
11304 | CVE_STATUS[CVE-2024-58013] = "cpe-stable-backport: Backported in 6.12.14" | ||
11305 | |||
11306 | CVE_STATUS[CVE-2024-58014] = "cpe-stable-backport: Backported in 6.12.14" | ||
11307 | |||
11308 | # CVE-2024-58015 needs backporting (fixed from 6.14) | ||
11309 | |||
11310 | CVE_STATUS[CVE-2024-58016] = "cpe-stable-backport: Backported in 6.12.14" | ||
11311 | |||
11312 | CVE_STATUS[CVE-2024-58017] = "cpe-stable-backport: Backported in 6.12.14" | ||
11313 | |||
11314 | CVE_STATUS[CVE-2024-58018] = "cpe-stable-backport: Backported in 6.12.14" | ||
11315 | |||
11316 | CVE_STATUS[CVE-2024-58019] = "cpe-stable-backport: Backported in 6.12.14" | ||
11317 | |||
11318 | CVE_STATUS[CVE-2024-58020] = "cpe-stable-backport: Backported in 6.12.16" | ||
11319 | |||
11320 | CVE_STATUS[CVE-2024-58021] = "cpe-stable-backport: Backported in 6.12.16" | ||
11321 | |||
11322 | CVE_STATUS[CVE-2024-58022] = "fixed-version: only affects 6.13 onwards" | ||
11323 | |||
11324 | CVE_STATUS[CVE-2024-58034] = "cpe-stable-backport: Backported in 6.12.13" | ||
11325 | |||
11326 | CVE_STATUS[CVE-2024-58042] = "cpe-stable-backport: Backported in 6.12.13" | ||
11327 | |||
11328 | CVE_STATUS[CVE-2024-58051] = "cpe-stable-backport: Backported in 6.12.13" | ||
11329 | |||
11330 | CVE_STATUS[CVE-2024-58052] = "cpe-stable-backport: Backported in 6.12.13" | ||
11331 | |||
11332 | CVE_STATUS[CVE-2024-58053] = "cpe-stable-backport: Backported in 6.12.13" | ||
11333 | |||
11334 | CVE_STATUS[CVE-2024-58054] = "cpe-stable-backport: Backported in 6.12.13" | ||
11335 | |||
11336 | CVE_STATUS[CVE-2024-58055] = "cpe-stable-backport: Backported in 6.12.13" | ||
11337 | |||
11338 | CVE_STATUS[CVE-2024-58056] = "cpe-stable-backport: Backported in 6.12.13" | ||
11339 | |||
11340 | CVE_STATUS[CVE-2024-58057] = "cpe-stable-backport: Backported in 6.12.13" | ||
11341 | |||
11342 | CVE_STATUS[CVE-2024-58058] = "cpe-stable-backport: Backported in 6.12.13" | ||
11343 | |||
11344 | CVE_STATUS[CVE-2024-58059] = "fixed-version: only affects 6.13 onwards" | ||
11345 | |||
11346 | CVE_STATUS[CVE-2024-58060] = "cpe-stable-backport: Backported in 6.12.13" | ||
11347 | |||
11348 | CVE_STATUS[CVE-2024-58061] = "cpe-stable-backport: Backported in 6.12.13" | ||
11349 | |||
11350 | CVE_STATUS[CVE-2024-58062] = "cpe-stable-backport: Backported in 6.12.13" | ||
11351 | |||
11352 | CVE_STATUS[CVE-2024-58063] = "cpe-stable-backport: Backported in 6.12.13" | ||
11353 | |||
11354 | CVE_STATUS[CVE-2024-58064] = "cpe-stable-backport: Backported in 6.12.13" | ||
11355 | |||
11356 | CVE_STATUS[CVE-2024-58065] = "fixed-version: only affects 6.13 onwards" | ||
11357 | |||
11358 | CVE_STATUS[CVE-2024-58066] = "fixed-version: only affects 6.13 onwards" | ||
11359 | |||
11360 | CVE_STATUS[CVE-2024-58067] = "fixed-version: only affects 6.13 onwards" | ||
11361 | |||
11362 | CVE_STATUS[CVE-2024-58068] = "cpe-stable-backport: Backported in 6.12.13" | ||
11363 | |||
11364 | CVE_STATUS[CVE-2024-58069] = "cpe-stable-backport: Backported in 6.12.13" | ||
11365 | |||
11366 | CVE_STATUS[CVE-2024-58070] = "cpe-stable-backport: Backported in 6.12.13" | ||
11367 | |||
11368 | CVE_STATUS[CVE-2024-58071] = "cpe-stable-backport: Backported in 6.12.13" | ||
11369 | |||
11370 | CVE_STATUS[CVE-2024-58072] = "cpe-stable-backport: Backported in 6.12.13" | ||
11371 | |||
11372 | CVE_STATUS[CVE-2024-58073] = "fixed-version: only affects 6.13 onwards" | ||
11373 | |||
11374 | # CVE-2024-58074 needs backporting (fixed from 6.14) | ||
11375 | |||
11376 | CVE_STATUS[CVE-2024-58075] = "cpe-stable-backport: Backported in 6.12.13" | ||
11377 | |||
11378 | CVE_STATUS[CVE-2024-58076] = "cpe-stable-backport: Backported in 6.12.14" | ||
11379 | |||
11380 | CVE_STATUS[CVE-2024-58077] = "cpe-stable-backport: Backported in 6.12.14" | ||
11381 | |||
11382 | CVE_STATUS[CVE-2024-58078] = "cpe-stable-backport: Backported in 6.12.14" | ||
11383 | |||
11384 | CVE_STATUS[CVE-2024-58079] = "cpe-stable-backport: Backported in 6.12.14" | ||
11385 | |||
11386 | CVE_STATUS[CVE-2024-58080] = "cpe-stable-backport: Backported in 6.12.14" | ||
11387 | |||
11388 | CVE_STATUS[CVE-2024-58081] = "cpe-stable-backport: Backported in 6.12.14" | ||
11389 | |||
11390 | CVE_STATUS[CVE-2024-58082] = "cpe-stable-backport: Backported in 6.12.14" | ||
11391 | |||
11392 | CVE_STATUS[CVE-2024-58083] = "cpe-stable-backport: Backported in 6.12.14" | ||
11393 | |||
11394 | CVE_STATUS[CVE-2024-58084] = "cpe-stable-backport: Backported in 6.12.14" | ||
11395 | |||
11396 | CVE_STATUS[CVE-2024-58085] = "cpe-stable-backport: Backported in 6.12.14" | ||
11397 | |||
11398 | CVE_STATUS[CVE-2024-58086] = "cpe-stable-backport: Backported in 6.12.16" | ||
11399 | |||
11400 | CVE_STATUS[CVE-2024-58087] = "cpe-stable-backport: Backported in 6.12.6" | ||
11401 | |||
11402 | CVE_STATUS[CVE-2024-58088] = "cpe-stable-backport: Backported in 6.12.17" | ||
11403 | |||
11404 | CVE_STATUS[CVE-2024-58089] = "cpe-stable-backport: Backported in 6.12.17" | ||
11405 | |||
11406 | CVE_STATUS[CVE-2024-58090] = "cpe-stable-backport: Backported in 6.12.18" | ||
11407 | |||
11408 | # CVE-2024-58091 needs backporting (fixed from 6.14) | ||
11409 | |||
11410 | CVE_STATUS[CVE-2024-58092] = "cpe-stable-backport: Backported in 6.12.22" | ||
11411 | |||
11412 | # CVE-2024-58093 needs backporting (fixed from 6.15) | ||
11413 | |||
11414 | # CVE-2024-58094 needs backporting (fixed from 6.15) | ||
11415 | |||
11416 | # CVE-2024-58095 needs backporting (fixed from 6.15) | ||
11417 | |||
11418 | # CVE-2024-58096 needs backporting (fixed from 6.15) | ||
11419 | |||
11420 | # CVE-2024-58097 needs backporting (fixed from 6.15) | ||
11421 | |||
11422 | CVE_STATUS[CVE-2024-58098] = "cpe-stable-backport: Backported in 6.12.25" | ||
11423 | |||
11424 | CVE_STATUS[CVE-2024-58099] = "fixed-version: Fixed from version 6.12" | ||
11425 | |||
11426 | CVE_STATUS[CVE-2024-58100] = "cpe-stable-backport: Backported in 6.12.25" | ||
11427 | |||
11428 | CVE_STATUS[CVE-2024-58237] = "cpe-stable-backport: Backported in 6.12.9" | ||
11429 | |||
11430 | CVE_STATUS[CVE-2025-21629] = "cpe-stable-backport: Backported in 6.12.9" | ||
11431 | |||
11432 | CVE_STATUS[CVE-2025-21631] = "cpe-stable-backport: Backported in 6.12.10" | ||
11433 | |||
11434 | CVE_STATUS[CVE-2025-21632] = "cpe-stable-backport: Backported in 6.12.10" | ||
11435 | |||
11436 | CVE_STATUS[CVE-2025-21634] = "cpe-stable-backport: Backported in 6.12.10" | ||
11437 | |||
11438 | CVE_STATUS[CVE-2025-21635] = "cpe-stable-backport: Backported in 6.12.10" | ||
11439 | |||
11440 | CVE_STATUS[CVE-2025-21636] = "cpe-stable-backport: Backported in 6.12.10" | ||
11441 | |||
11442 | CVE_STATUS[CVE-2025-21637] = "cpe-stable-backport: Backported in 6.12.10" | ||
11443 | |||
11444 | CVE_STATUS[CVE-2025-21638] = "cpe-stable-backport: Backported in 6.12.10" | ||
11445 | |||
11446 | CVE_STATUS[CVE-2025-21639] = "cpe-stable-backport: Backported in 6.12.10" | ||
11447 | |||
11448 | CVE_STATUS[CVE-2025-21640] = "cpe-stable-backport: Backported in 6.12.10" | ||
11449 | |||
11450 | CVE_STATUS[CVE-2025-21641] = "cpe-stable-backport: Backported in 6.12.10" | ||
11451 | |||
11452 | CVE_STATUS[CVE-2025-21642] = "cpe-stable-backport: Backported in 6.12.10" | ||
11453 | |||
11454 | CVE_STATUS[CVE-2025-21643] = "cpe-stable-backport: Backported in 6.12.10" | ||
11455 | |||
11456 | CVE_STATUS[CVE-2025-21644] = "cpe-stable-backport: Backported in 6.12.10" | ||
11457 | |||
11458 | CVE_STATUS[CVE-2025-21645] = "cpe-stable-backport: Backported in 6.12.10" | ||
11459 | |||
11460 | CVE_STATUS[CVE-2025-21646] = "cpe-stable-backport: Backported in 6.12.10" | ||
11461 | |||
11462 | CVE_STATUS[CVE-2025-21647] = "cpe-stable-backport: Backported in 6.12.10" | ||
11463 | |||
11464 | CVE_STATUS[CVE-2025-21648] = "cpe-stable-backport: Backported in 6.12.10" | ||
11465 | |||
11466 | CVE_STATUS[CVE-2025-21649] = "cpe-stable-backport: Backported in 6.12.10" | ||
11467 | |||
11468 | CVE_STATUS[CVE-2025-21650] = "cpe-stable-backport: Backported in 6.12.10" | ||
11469 | |||
11470 | CVE_STATUS[CVE-2025-21651] = "cpe-stable-backport: Backported in 6.12.10" | ||
11471 | |||
11472 | CVE_STATUS[CVE-2025-21652] = "cpe-stable-backport: Backported in 6.12.10" | ||
11473 | |||
11474 | CVE_STATUS[CVE-2025-21653] = "cpe-stable-backport: Backported in 6.12.10" | ||
11475 | |||
11476 | CVE_STATUS[CVE-2025-21654] = "cpe-stable-backport: Backported in 6.12.10" | ||
11477 | |||
11478 | CVE_STATUS[CVE-2025-21655] = "cpe-stable-backport: Backported in 6.12.10" | ||
11479 | |||
11480 | CVE_STATUS[CVE-2025-21656] = "cpe-stable-backport: Backported in 6.12.10" | ||
11481 | |||
11482 | CVE_STATUS[CVE-2025-21657] = "cpe-stable-backport: Backported in 6.12.10" | ||
11483 | |||
11484 | CVE_STATUS[CVE-2025-21658] = "cpe-stable-backport: Backported in 6.12.10" | ||
11485 | |||
11486 | CVE_STATUS[CVE-2025-21659] = "cpe-stable-backport: Backported in 6.12.10" | ||
11487 | |||
11488 | CVE_STATUS[CVE-2025-21660] = "cpe-stable-backport: Backported in 6.12.10" | ||
11489 | |||
11490 | CVE_STATUS[CVE-2025-21661] = "cpe-stable-backport: Backported in 6.12.10" | ||
11491 | |||
11492 | CVE_STATUS[CVE-2025-21662] = "cpe-stable-backport: Backported in 6.12.10" | ||
11493 | |||
11494 | CVE_STATUS[CVE-2025-21663] = "cpe-stable-backport: Backported in 6.12.10" | ||
11495 | |||
11496 | CVE_STATUS[CVE-2025-21664] = "cpe-stable-backport: Backported in 6.12.10" | ||
11497 | |||
11498 | CVE_STATUS[CVE-2025-21665] = "cpe-stable-backport: Backported in 6.12.11" | ||
11499 | |||
11500 | CVE_STATUS[CVE-2025-21666] = "cpe-stable-backport: Backported in 6.12.11" | ||
11501 | |||
11502 | CVE_STATUS[CVE-2025-21667] = "cpe-stable-backport: Backported in 6.12.11" | ||
11503 | |||
11504 | CVE_STATUS[CVE-2025-21668] = "cpe-stable-backport: Backported in 6.12.11" | ||
11505 | |||
11506 | CVE_STATUS[CVE-2025-21669] = "cpe-stable-backport: Backported in 6.12.11" | ||
11507 | |||
11508 | CVE_STATUS[CVE-2025-21670] = "cpe-stable-backport: Backported in 6.12.11" | ||
11509 | |||
11510 | CVE_STATUS[CVE-2025-21671] = "fixed-version: Fixed from version 6.12.11" | ||
11511 | |||
11512 | CVE_STATUS[CVE-2025-21672] = "cpe-stable-backport: Backported in 6.12.11" | ||
11513 | |||
11514 | CVE_STATUS[CVE-2025-21673] = "cpe-stable-backport: Backported in 6.12.11" | ||
11515 | |||
11516 | CVE_STATUS[CVE-2025-21674] = "cpe-stable-backport: Backported in 6.12.11" | ||
11517 | |||
11518 | CVE_STATUS[CVE-2025-21675] = "cpe-stable-backport: Backported in 6.12.11" | ||
11519 | |||
11520 | CVE_STATUS[CVE-2025-21676] = "cpe-stable-backport: Backported in 6.12.11" | ||
11521 | |||
11522 | CVE_STATUS[CVE-2025-21677] = "cpe-stable-backport: Backported in 6.12.11" | ||
11523 | |||
11524 | CVE_STATUS[CVE-2025-21678] = "cpe-stable-backport: Backported in 6.12.11" | ||
11525 | |||
11526 | CVE_STATUS[CVE-2025-21679] = "fixed-version: Fixed from version 6.12.11" | ||
11527 | |||
11528 | CVE_STATUS[CVE-2025-21680] = "cpe-stable-backport: Backported in 6.12.11" | ||
11529 | |||
11530 | CVE_STATUS[CVE-2025-21681] = "cpe-stable-backport: Backported in 6.12.11" | ||
11531 | |||
11532 | CVE_STATUS[CVE-2025-21682] = "cpe-stable-backport: Backported in 6.12.11" | ||
11533 | |||
11534 | CVE_STATUS[CVE-2025-21683] = "cpe-stable-backport: Backported in 6.12.11" | ||
11535 | |||
11536 | CVE_STATUS[CVE-2025-21684] = "cpe-stable-backport: Backported in 6.12.11" | ||
11537 | |||
11538 | CVE_STATUS[CVE-2025-21685] = "cpe-stable-backport: Backported in 6.12.11" | ||
11539 | |||
11540 | CVE_STATUS[CVE-2025-21687] = "cpe-stable-backport: Backported in 6.12.12" | ||
11541 | |||
11542 | CVE_STATUS[CVE-2025-21688] = "cpe-stable-backport: Backported in 6.12.12" | ||
11543 | |||
11544 | CVE_STATUS[CVE-2025-21689] = "cpe-stable-backport: Backported in 6.12.12" | ||
11545 | |||
11546 | CVE_STATUS[CVE-2025-21690] = "cpe-stable-backport: Backported in 6.12.12" | ||
11547 | |||
11548 | CVE_STATUS[CVE-2025-21691] = "cpe-stable-backport: Backported in 6.12.12" | ||
11549 | |||
11550 | CVE_STATUS[CVE-2025-21692] = "cpe-stable-backport: Backported in 6.12.12" | ||
11551 | |||
11552 | CVE_STATUS[CVE-2025-21693] = "cpe-stable-backport: Backported in 6.12.12" | ||
11553 | |||
11554 | CVE_STATUS[CVE-2025-21694] = "cpe-stable-backport: Backported in 6.12.11" | ||
11555 | |||
11556 | CVE_STATUS[CVE-2025-21695] = "cpe-stable-backport: Backported in 6.12.11" | ||
11557 | |||
11558 | CVE_STATUS[CVE-2025-21696] = "cpe-stable-backport: Backported in 6.12.11" | ||
11559 | |||
11560 | CVE_STATUS[CVE-2025-21697] = "cpe-stable-backport: Backported in 6.12.11" | ||
11561 | |||
11562 | CVE_STATUS[CVE-2025-21699] = "cpe-stable-backport: Backported in 6.12.12" | ||
11563 | |||
11564 | CVE_STATUS[CVE-2025-21700] = "cpe-stable-backport: Backported in 6.12.13" | ||
11565 | |||
11566 | CVE_STATUS[CVE-2025-21701] = "cpe-stable-backport: Backported in 6.12.13" | ||
11567 | |||
11568 | CVE_STATUS[CVE-2025-21702] = "cpe-stable-backport: Backported in 6.12.14" | ||
11569 | |||
11570 | CVE_STATUS[CVE-2025-21703] = "cpe-stable-backport: Backported in 6.12.14" | ||
11571 | |||
11572 | CVE_STATUS[CVE-2025-21704] = "cpe-stable-backport: Backported in 6.12.16" | ||
11573 | |||
11574 | CVE_STATUS[CVE-2025-21705] = "cpe-stable-backport: Backported in 6.12.13" | ||
11575 | |||
11576 | CVE_STATUS[CVE-2025-21706] = "cpe-stable-backport: Backported in 6.12.13" | ||
11577 | |||
11578 | CVE_STATUS[CVE-2025-21707] = "cpe-stable-backport: Backported in 6.12.13" | ||
11579 | |||
11580 | CVE_STATUS[CVE-2025-21708] = "cpe-stable-backport: Backported in 6.12.13" | ||
11581 | |||
11582 | # CVE-2025-21709 needs backporting (fixed from 6.14) | ||
11583 | |||
11584 | CVE_STATUS[CVE-2025-21710] = "cpe-stable-backport: Backported in 6.12.13" | ||
11585 | |||
11586 | CVE_STATUS[CVE-2025-21711] = "cpe-stable-backport: Backported in 6.12.13" | ||
11587 | |||
11588 | CVE_STATUS[CVE-2025-21712] = "cpe-stable-backport: Backported in 6.12.13" | ||
11589 | |||
11590 | CVE_STATUS[CVE-2025-21713] = "cpe-stable-backport: Backported in 6.12.13" | ||
11591 | |||
11592 | CVE_STATUS[CVE-2025-21714] = "cpe-stable-backport: Backported in 6.12.13" | ||
11593 | |||
11594 | CVE_STATUS[CVE-2025-21715] = "cpe-stable-backport: Backported in 6.12.13" | ||
11595 | |||
11596 | CVE_STATUS[CVE-2025-21716] = "cpe-stable-backport: Backported in 6.12.13" | ||
11597 | |||
11598 | CVE_STATUS[CVE-2025-21717] = "fixed-version: only affects 6.13 onwards" | ||
11599 | |||
11600 | CVE_STATUS[CVE-2025-21718] = "cpe-stable-backport: Backported in 6.12.13" | ||
11601 | |||
11602 | CVE_STATUS[CVE-2025-21719] = "cpe-stable-backport: Backported in 6.12.13" | ||
11603 | |||
11604 | CVE_STATUS[CVE-2025-21720] = "cpe-stable-backport: Backported in 6.12.13" | ||
11605 | |||
11606 | CVE_STATUS[CVE-2025-21721] = "cpe-stable-backport: Backported in 6.12.13" | ||
11607 | |||
11608 | CVE_STATUS[CVE-2025-21722] = "cpe-stable-backport: Backported in 6.12.13" | ||
11609 | |||
11610 | CVE_STATUS[CVE-2025-21723] = "cpe-stable-backport: Backported in 6.12.13" | ||
11611 | |||
11612 | CVE_STATUS[CVE-2025-21724] = "cpe-stable-backport: Backported in 6.12.13" | ||
11613 | |||
11614 | CVE_STATUS[CVE-2025-21725] = "cpe-stable-backport: Backported in 6.12.13" | ||
11615 | |||
11616 | CVE_STATUS[CVE-2025-21726] = "cpe-stable-backport: Backported in 6.12.13" | ||
11617 | |||
11618 | CVE_STATUS[CVE-2025-21727] = "cpe-stable-backport: Backported in 6.12.13" | ||
11619 | |||
11620 | CVE_STATUS[CVE-2025-21728] = "cpe-stable-backport: Backported in 6.12.13" | ||
11621 | |||
11622 | CVE_STATUS[CVE-2025-21729] = "cpe-stable-backport: Backported in 6.12.13" | ||
11623 | |||
11624 | CVE_STATUS[CVE-2025-21730] = "fixed-version: only affects 6.13 onwards" | ||
11625 | |||
11626 | CVE_STATUS[CVE-2025-21731] = "cpe-stable-backport: Backported in 6.12.13" | ||
11627 | |||
11628 | CVE_STATUS[CVE-2025-21732] = "cpe-stable-backport: Backported in 6.12.14" | ||
11629 | |||
11630 | CVE_STATUS[CVE-2025-21733] = "cpe-stable-backport: Backported in 6.12.14" | ||
11631 | |||
11632 | CVE_STATUS[CVE-2025-21734] = "cpe-stable-backport: Backported in 6.12.14" | ||
11633 | |||
11634 | CVE_STATUS[CVE-2025-21735] = "cpe-stable-backport: Backported in 6.12.14" | ||
11635 | |||
11636 | CVE_STATUS[CVE-2025-21736] = "cpe-stable-backport: Backported in 6.12.14" | ||
11637 | |||
11638 | CVE_STATUS[CVE-2025-21737] = "cpe-stable-backport: Backported in 6.12.14" | ||
11639 | |||
11640 | CVE_STATUS[CVE-2025-21738] = "cpe-stable-backport: Backported in 6.12.14" | ||
11641 | |||
11642 | CVE_STATUS[CVE-2025-21739] = "cpe-stable-backport: Backported in 6.12.14" | ||
11643 | |||
11644 | CVE_STATUS[CVE-2025-21741] = "cpe-stable-backport: Backported in 6.12.14" | ||
11645 | |||
11646 | CVE_STATUS[CVE-2025-21742] = "cpe-stable-backport: Backported in 6.12.14" | ||
11647 | |||
11648 | CVE_STATUS[CVE-2025-21743] = "cpe-stable-backport: Backported in 6.12.14" | ||
11649 | |||
11650 | CVE_STATUS[CVE-2025-21744] = "cpe-stable-backport: Backported in 6.12.14" | ||
11651 | |||
11652 | CVE_STATUS[CVE-2025-21745] = "cpe-stable-backport: Backported in 6.12.14" | ||
11653 | |||
11654 | CVE_STATUS[CVE-2025-21746] = "cpe-stable-backport: Backported in 6.12.17" | ||
11655 | |||
11656 | CVE_STATUS[CVE-2025-21747] = "fixed-version: only affects 6.13 onwards" | ||
11657 | |||
11658 | CVE_STATUS[CVE-2025-21748] = "cpe-stable-backport: Backported in 6.12.14" | ||
11659 | |||
11660 | CVE_STATUS[CVE-2025-21749] = "cpe-stable-backport: Backported in 6.12.14" | ||
11661 | |||
11662 | CVE_STATUS[CVE-2025-21750] = "cpe-stable-backport: Backported in 6.12.14" | ||
11663 | |||
11664 | # CVE-2025-21751 needs backporting (fixed from 6.14) | ||
11665 | |||
11666 | # CVE-2025-21752 needs backporting (fixed from 6.14) | ||
11667 | |||
11668 | CVE_STATUS[CVE-2025-21753] = "cpe-stable-backport: Backported in 6.12.14" | ||
11669 | |||
11670 | CVE_STATUS[CVE-2025-21754] = "cpe-stable-backport: Backported in 6.12.14" | ||
11671 | |||
11672 | CVE_STATUS[CVE-2025-21756] = "cpe-stable-backport: Backported in 6.12.16" | ||
11673 | |||
11674 | CVE_STATUS[CVE-2025-21758] = "cpe-stable-backport: Backported in 6.12.16" | ||
11675 | |||
11676 | CVE_STATUS[CVE-2025-21759] = "cpe-stable-backport: Backported in 6.12.16" | ||
11677 | |||
11678 | CVE_STATUS[CVE-2025-21760] = "cpe-stable-backport: Backported in 6.12.16" | ||
11679 | |||
11680 | CVE_STATUS[CVE-2025-21761] = "cpe-stable-backport: Backported in 6.12.16" | ||
11681 | |||
11682 | CVE_STATUS[CVE-2025-21762] = "cpe-stable-backport: Backported in 6.12.16" | ||
11683 | |||
11684 | CVE_STATUS[CVE-2025-21763] = "cpe-stable-backport: Backported in 6.12.16" | ||
11685 | |||
11686 | CVE_STATUS[CVE-2025-21764] = "cpe-stable-backport: Backported in 6.12.16" | ||
11687 | |||
11688 | CVE_STATUS[CVE-2025-21765] = "cpe-stable-backport: Backported in 6.12.16" | ||
11689 | |||
11690 | CVE_STATUS[CVE-2025-21766] = "cpe-stable-backport: Backported in 6.12.16" | ||
11691 | |||
11692 | CVE_STATUS[CVE-2025-21767] = "cpe-stable-backport: Backported in 6.12.16" | ||
11693 | |||
11694 | CVE_STATUS[CVE-2025-21768] = "cpe-stable-backport: Backported in 6.12.16" | ||
11695 | |||
11696 | CVE_STATUS[CVE-2025-21769] = "fixed-version: only affects 6.13 onwards" | ||
11697 | |||
11698 | CVE_STATUS[CVE-2025-21770] = "cpe-stable-backport: Backported in 6.12.16" | ||
11699 | |||
11700 | CVE_STATUS[CVE-2025-21771] = "cpe-stable-backport: Backported in 6.12.16" | ||
11701 | |||
11702 | CVE_STATUS[CVE-2025-21772] = "cpe-stable-backport: Backported in 6.12.16" | ||
11703 | |||
11704 | CVE_STATUS[CVE-2025-21773] = "cpe-stable-backport: Backported in 6.12.16" | ||
11705 | |||
11706 | CVE_STATUS[CVE-2025-21774] = "cpe-stable-backport: Backported in 6.12.16" | ||
11707 | |||
11708 | CVE_STATUS[CVE-2025-21775] = "cpe-stable-backport: Backported in 6.12.16" | ||
11709 | |||
11710 | CVE_STATUS[CVE-2025-21776] = "cpe-stable-backport: Backported in 6.12.16" | ||
11711 | |||
11712 | CVE_STATUS[CVE-2025-21777] = "cpe-stable-backport: Backported in 6.12.16" | ||
11713 | |||
11714 | CVE_STATUS[CVE-2025-21778] = "cpe-stable-backport: Backported in 6.12.16" | ||
11715 | |||
11716 | CVE_STATUS[CVE-2025-21779] = "cpe-stable-backport: Backported in 6.12.16" | ||
11717 | |||
11718 | CVE_STATUS[CVE-2025-21780] = "cpe-stable-backport: Backported in 6.12.16" | ||
11719 | |||
11720 | CVE_STATUS[CVE-2025-21781] = "cpe-stable-backport: Backported in 6.12.16" | ||
11721 | |||
11722 | CVE_STATUS[CVE-2025-21782] = "cpe-stable-backport: Backported in 6.12.16" | ||
11723 | |||
11724 | CVE_STATUS[CVE-2025-21783] = "cpe-stable-backport: Backported in 6.12.16" | ||
11725 | |||
11726 | CVE_STATUS[CVE-2025-21784] = "cpe-stable-backport: Backported in 6.12.16" | ||
11727 | |||
11728 | CVE_STATUS[CVE-2025-21785] = "cpe-stable-backport: Backported in 6.12.16" | ||
11729 | |||
11730 | CVE_STATUS[CVE-2025-21786] = "cpe-stable-backport: Backported in 6.12.16" | ||
11731 | |||
11732 | CVE_STATUS[CVE-2025-21787] = "cpe-stable-backport: Backported in 6.12.16" | ||
11733 | |||
11734 | CVE_STATUS[CVE-2025-21788] = "cpe-stable-backport: Backported in 6.12.16" | ||
11735 | |||
11736 | CVE_STATUS[CVE-2025-21789] = "cpe-stable-backport: Backported in 6.12.16" | ||
11737 | |||
11738 | CVE_STATUS[CVE-2025-21790] = "cpe-stable-backport: Backported in 6.12.16" | ||
11739 | |||
11740 | CVE_STATUS[CVE-2025-21791] = "cpe-stable-backport: Backported in 6.12.16" | ||
11741 | |||
11742 | CVE_STATUS[CVE-2025-21792] = "cpe-stable-backport: Backported in 6.12.16" | ||
11743 | |||
11744 | CVE_STATUS[CVE-2025-21793] = "cpe-stable-backport: Backported in 6.12.16" | ||
11745 | |||
11746 | CVE_STATUS[CVE-2025-21794] = "cpe-stable-backport: Backported in 6.12.16" | ||
11747 | |||
11748 | CVE_STATUS[CVE-2025-21795] = "cpe-stable-backport: Backported in 6.12.16" | ||
11749 | |||
11750 | CVE_STATUS[CVE-2025-21796] = "cpe-stable-backport: Backported in 6.12.16" | ||
11751 | |||
11752 | CVE_STATUS[CVE-2025-21797] = "fixed-version: only affects 6.13 onwards" | ||
11753 | |||
11754 | CVE_STATUS[CVE-2025-21798] = "cpe-stable-backport: Backported in 6.12.13" | ||
11755 | |||
11756 | CVE_STATUS[CVE-2025-21799] = "cpe-stable-backport: Backported in 6.12.13" | ||
11757 | |||
11758 | CVE_STATUS[CVE-2025-21800] = "cpe-stable-backport: Backported in 6.12.13" | ||
11759 | |||
11760 | CVE_STATUS[CVE-2025-21801] = "cpe-stable-backport: Backported in 6.12.13" | ||
11761 | |||
11762 | CVE_STATUS[CVE-2025-21802] = "cpe-stable-backport: Backported in 6.12.13" | ||
11763 | |||
11764 | CVE_STATUS[CVE-2025-21803] = "cpe-stable-backport: Backported in 6.12.13" | ||
11765 | |||
11766 | CVE_STATUS[CVE-2025-21804] = "cpe-stable-backport: Backported in 6.12.13" | ||
11767 | |||
11768 | CVE_STATUS[CVE-2025-21805] = "cpe-stable-backport: Backported in 6.12.13" | ||
11769 | |||
11770 | CVE_STATUS[CVE-2025-21806] = "cpe-stable-backport: Backported in 6.12.13" | ||
11771 | |||
11772 | # CVE-2025-21807 needs backporting (fixed from 6.14) | ||
11773 | |||
11774 | CVE_STATUS[CVE-2025-21808] = "cpe-stable-backport: Backported in 6.12.13" | ||
11775 | |||
11776 | CVE_STATUS[CVE-2025-21809] = "cpe-stable-backport: Backported in 6.12.13" | ||
11777 | |||
11778 | CVE_STATUS[CVE-2025-21810] = "cpe-stable-backport: Backported in 6.12.13" | ||
11779 | |||
11780 | CVE_STATUS[CVE-2025-21811] = "cpe-stable-backport: Backported in 6.12.13" | ||
11781 | |||
11782 | CVE_STATUS[CVE-2025-21812] = "cpe-stable-backport: Backported in 6.12.13" | ||
11783 | |||
11784 | CVE_STATUS[CVE-2025-21813] = "cpe-stable-backport: Backported in 6.12.14" | ||
11785 | |||
11786 | CVE_STATUS[CVE-2025-21814] = "cpe-stable-backport: Backported in 6.12.14" | ||
11787 | |||
11788 | CVE_STATUS[CVE-2025-21815] = "cpe-stable-backport: Backported in 6.12.14" | ||
11789 | |||
11790 | CVE_STATUS[CVE-2025-21816] = "cpe-stable-backport: Backported in 6.12.14" | ||
11791 | |||
11792 | # CVE-2025-21817 needs backporting (fixed from 6.14) | ||
11793 | |||
11794 | CVE_STATUS[CVE-2025-21819] = "cpe-stable-backport: Backported in 6.12.14" | ||
11795 | |||
11796 | CVE_STATUS[CVE-2025-21820] = "cpe-stable-backport: Backported in 6.12.14" | ||
11797 | |||
11798 | CVE_STATUS[CVE-2025-21821] = "cpe-stable-backport: Backported in 6.12.16" | ||
11799 | |||
11800 | CVE_STATUS[CVE-2025-21822] = "fixed-version: only affects 6.13 onwards" | ||
11801 | |||
11802 | CVE_STATUS[CVE-2025-21823] = "cpe-stable-backport: Backported in 6.12.16" | ||
11803 | |||
11804 | CVE_STATUS[CVE-2025-21824] = "cpe-stable-backport: Backported in 6.12.16" | ||
11805 | |||
11806 | CVE_STATUS[CVE-2025-21825] = "cpe-stable-backport: Backported in 6.12.13" | ||
11807 | |||
11808 | CVE_STATUS[CVE-2025-21826] = "cpe-stable-backport: Backported in 6.12.13" | ||
11809 | |||
11810 | CVE_STATUS[CVE-2025-21827] = "cpe-stable-backport: Backported in 6.12.13" | ||
11811 | |||
11812 | CVE_STATUS[CVE-2025-21828] = "cpe-stable-backport: Backported in 6.12.13" | ||
11813 | |||
11814 | CVE_STATUS[CVE-2025-21829] = "cpe-stable-backport: Backported in 6.12.13" | ||
11815 | |||
11816 | CVE_STATUS[CVE-2025-21830] = "cpe-stable-backport: Backported in 6.12.13" | ||
11817 | |||
11818 | CVE_STATUS[CVE-2025-21831] = "cpe-stable-backport: Backported in 6.12.14" | ||
11819 | |||
11820 | CVE_STATUS[CVE-2025-21832] = "cpe-stable-backport: Backported in 6.12.14" | ||
11821 | |||
11822 | # CVE-2025-21833 needs backporting (fixed from 6.14) | ||
11823 | |||
11824 | CVE_STATUS[CVE-2025-21834] = "cpe-stable-backport: Backported in 6.12.14" | ||
11825 | |||
11826 | CVE_STATUS[CVE-2025-21835] = "cpe-stable-backport: Backported in 6.12.16" | ||
11827 | |||
11828 | CVE_STATUS[CVE-2025-21836] = "cpe-stable-backport: Backported in 6.12.16" | ||
11829 | |||
11830 | CVE_STATUS[CVE-2025-21838] = "cpe-stable-backport: Backported in 6.12.16" | ||
11831 | |||
11832 | CVE_STATUS[CVE-2025-21839] = "cpe-stable-backport: Backported in 6.12.16" | ||
11833 | |||
11834 | CVE_STATUS[CVE-2025-21840] = "fixed-version: only affects 6.13 onwards" | ||
11835 | |||
11836 | CVE_STATUS[CVE-2025-21841] = "cpe-stable-backport: Backported in 6.12.16" | ||
11837 | |||
11838 | CVE_STATUS[CVE-2025-21842] = "cpe-stable-backport: Backported in 6.12.16" | ||
11839 | |||
11840 | CVE_STATUS[CVE-2025-21843] = "fixed-version: only affects 6.13 onwards" | ||
11841 | |||
11842 | CVE_STATUS[CVE-2025-21844] = "cpe-stable-backport: Backported in 6.12.17" | ||
11843 | |||
11844 | CVE_STATUS[CVE-2025-21845] = "cpe-stable-backport: Backported in 6.12.17" | ||
11845 | |||
11846 | CVE_STATUS[CVE-2025-21846] = "cpe-stable-backport: Backported in 6.12.17" | ||
11847 | |||
11848 | CVE_STATUS[CVE-2025-21847] = "cpe-stable-backport: Backported in 6.12.17" | ||
11849 | |||
11850 | CVE_STATUS[CVE-2025-21848] = "cpe-stable-backport: Backported in 6.12.17" | ||
11851 | |||
11852 | CVE_STATUS[CVE-2025-21849] = "cpe-stable-backport: Backported in 6.12.17" | ||
11853 | |||
11854 | CVE_STATUS[CVE-2025-21850] = "fixed-version: only affects 6.13 onwards" | ||
11855 | |||
11856 | CVE_STATUS[CVE-2025-21851] = "cpe-stable-backport: Backported in 6.12.17" | ||
11857 | |||
11858 | CVE_STATUS[CVE-2025-21852] = "cpe-stable-backport: Backported in 6.12.17" | ||
11859 | |||
11860 | CVE_STATUS[CVE-2025-21853] = "cpe-stable-backport: Backported in 6.12.17" | ||
11861 | |||
11862 | CVE_STATUS[CVE-2025-21854] = "cpe-stable-backport: Backported in 6.12.17" | ||
11863 | |||
11864 | CVE_STATUS[CVE-2025-21855] = "cpe-stable-backport: Backported in 6.12.17" | ||
11865 | |||
11866 | CVE_STATUS[CVE-2025-21856] = "cpe-stable-backport: Backported in 6.12.17" | ||
11867 | |||
11868 | CVE_STATUS[CVE-2025-21857] = "cpe-stable-backport: Backported in 6.12.17" | ||
11869 | |||
11870 | CVE_STATUS[CVE-2025-21858] = "cpe-stable-backport: Backported in 6.12.17" | ||
11871 | |||
11872 | CVE_STATUS[CVE-2025-21859] = "cpe-stable-backport: Backported in 6.12.17" | ||
11873 | |||
11874 | CVE_STATUS[CVE-2025-21860] = "fixed-version: only affects 6.13 onwards" | ||
11875 | |||
11876 | CVE_STATUS[CVE-2025-21861] = "cpe-stable-backport: Backported in 6.12.17" | ||
11877 | |||
11878 | CVE_STATUS[CVE-2025-21862] = "cpe-stable-backport: Backported in 6.12.17" | ||
11879 | |||
11880 | CVE_STATUS[CVE-2025-21863] = "cpe-stable-backport: Backported in 6.12.17" | ||
11881 | |||
11882 | CVE_STATUS[CVE-2025-21864] = "cpe-stable-backport: Backported in 6.12.17" | ||
11883 | |||
11884 | CVE_STATUS[CVE-2025-21865] = "cpe-stable-backport: Backported in 6.12.17" | ||
11885 | |||
11886 | CVE_STATUS[CVE-2025-21866] = "cpe-stable-backport: Backported in 6.12.17" | ||
11887 | |||
11888 | CVE_STATUS[CVE-2025-21867] = "cpe-stable-backport: Backported in 6.12.17" | ||
11889 | |||
11890 | CVE_STATUS[CVE-2025-21868] = "cpe-stable-backport: Backported in 6.12.17" | ||
11891 | |||
11892 | CVE_STATUS[CVE-2025-21869] = "cpe-stable-backport: Backported in 6.12.17" | ||
11893 | |||
11894 | CVE_STATUS[CVE-2025-21870] = "cpe-stable-backport: Backported in 6.12.17" | ||
11895 | |||
11896 | CVE_STATUS[CVE-2025-21871] = "cpe-stable-backport: Backported in 6.12.17" | ||
11897 | |||
11898 | CVE_STATUS[CVE-2025-21872] = "cpe-stable-backport: Backported in 6.12.18" | ||
11899 | |||
11900 | CVE_STATUS[CVE-2025-21873] = "cpe-stable-backport: Backported in 6.12.18" | ||
11901 | |||
11902 | CVE_STATUS[CVE-2025-21874] = "cpe-stable-backport: Backported in 6.12.18" | ||
11903 | |||
11904 | CVE_STATUS[CVE-2025-21875] = "cpe-stable-backport: Backported in 6.12.18" | ||
11905 | |||
11906 | CVE_STATUS[CVE-2025-21876] = "cpe-stable-backport: Backported in 6.12.18" | ||
11907 | |||
11908 | CVE_STATUS[CVE-2025-21877] = "cpe-stable-backport: Backported in 6.12.18" | ||
11909 | |||
11910 | CVE_STATUS[CVE-2025-21878] = "cpe-stable-backport: Backported in 6.12.18" | ||
11911 | |||
11912 | CVE_STATUS[CVE-2025-21879] = "fixed-version: only affects 6.13 onwards" | ||
11913 | |||
11914 | CVE_STATUS[CVE-2025-21880] = "cpe-stable-backport: Backported in 6.12.18" | ||
11915 | |||
11916 | CVE_STATUS[CVE-2025-21881] = "cpe-stable-backport: Backported in 6.12.18" | ||
11917 | |||
11918 | CVE_STATUS[CVE-2025-21882] = "fixed-version: only affects 6.13 onwards" | ||
11919 | |||
11920 | CVE_STATUS[CVE-2025-21883] = "cpe-stable-backport: Backported in 6.12.18" | ||
11921 | |||
11922 | # CVE-2025-21884 needs backporting (fixed from 6.14) | ||
11923 | |||
11924 | CVE_STATUS[CVE-2025-21885] = "cpe-stable-backport: Backported in 6.12.18" | ||
11925 | |||
11926 | CVE_STATUS[CVE-2025-21886] = "cpe-stable-backport: Backported in 6.12.18" | ||
11927 | |||
11928 | CVE_STATUS[CVE-2025-21887] = "cpe-stable-backport: Backported in 6.12.18" | ||
11929 | |||
11930 | CVE_STATUS[CVE-2025-21888] = "cpe-stable-backport: Backported in 6.12.18" | ||
11931 | |||
11932 | CVE_STATUS[CVE-2025-21889] = "cpe-stable-backport: Backported in 6.12.18" | ||
11933 | |||
11934 | CVE_STATUS[CVE-2025-21890] = "cpe-stable-backport: Backported in 6.12.18" | ||
11935 | |||
11936 | CVE_STATUS[CVE-2025-21891] = "cpe-stable-backport: Backported in 6.12.18" | ||
11937 | |||
11938 | CVE_STATUS[CVE-2025-21892] = "cpe-stable-backport: Backported in 6.12.18" | ||
11939 | |||
11940 | CVE_STATUS[CVE-2025-21893] = "cpe-stable-backport: Backported in 6.12.21" | ||
11941 | |||
11942 | CVE_STATUS[CVE-2025-21894] = "cpe-stable-backport: Backported in 6.12.18" | ||
11943 | |||
11944 | CVE_STATUS[CVE-2025-21895] = "cpe-stable-backport: Backported in 6.12.18" | ||
11945 | |||
11946 | CVE_STATUS[CVE-2025-21896] = "fixed-version: only affects 6.13 onwards" | ||
11947 | |||
11948 | CVE_STATUS[CVE-2025-21897] = "cpe-stable-backport: Backported in 6.12.18" | ||
11949 | |||
11950 | CVE_STATUS[CVE-2025-21898] = "cpe-stable-backport: Backported in 6.12.18" | ||
11951 | |||
11952 | CVE_STATUS[CVE-2025-21899] = "cpe-stable-backport: Backported in 6.12.18" | ||
11953 | |||
11954 | CVE_STATUS[CVE-2025-21900] = "cpe-stable-backport: Backported in 6.12.18" | ||
11955 | |||
11956 | CVE_STATUS[CVE-2025-21901] = "cpe-stable-backport: Backported in 6.12.18" | ||
11957 | |||
11958 | CVE_STATUS[CVE-2025-21902] = "cpe-stable-backport: Backported in 6.12.19" | ||
11959 | |||
11960 | CVE_STATUS[CVE-2025-21903] = "cpe-stable-backport: Backported in 6.12.19" | ||
11961 | |||
11962 | CVE_STATUS[CVE-2025-21904] = "cpe-stable-backport: Backported in 6.12.19" | ||
11963 | |||
11964 | CVE_STATUS[CVE-2025-21905] = "cpe-stable-backport: Backported in 6.12.19" | ||
11965 | |||
11966 | CVE_STATUS[CVE-2025-21906] = "cpe-stable-backport: Backported in 6.12.19" | ||
11967 | |||
11968 | CVE_STATUS[CVE-2025-21907] = "cpe-stable-backport: Backported in 6.12.19" | ||
11969 | |||
11970 | CVE_STATUS[CVE-2025-21908] = "cpe-stable-backport: Backported in 6.12.19" | ||
11971 | |||
11972 | CVE_STATUS[CVE-2025-21909] = "cpe-stable-backport: Backported in 6.12.19" | ||
11973 | |||
11974 | CVE_STATUS[CVE-2025-21910] = "cpe-stable-backport: Backported in 6.12.19" | ||
11975 | |||
11976 | CVE_STATUS[CVE-2025-21911] = "cpe-stable-backport: Backported in 6.12.19" | ||
11977 | |||
11978 | CVE_STATUS[CVE-2025-21912] = "cpe-stable-backport: Backported in 6.12.19" | ||
11979 | |||
11980 | CVE_STATUS[CVE-2025-21913] = "cpe-stable-backport: Backported in 6.12.19" | ||
11981 | |||
11982 | CVE_STATUS[CVE-2025-21914] = "cpe-stable-backport: Backported in 6.12.19" | ||
11983 | |||
11984 | CVE_STATUS[CVE-2025-21915] = "cpe-stable-backport: Backported in 6.12.19" | ||
11985 | |||
11986 | CVE_STATUS[CVE-2025-21916] = "cpe-stable-backport: Backported in 6.12.19" | ||
11987 | |||
11988 | CVE_STATUS[CVE-2025-21917] = "cpe-stable-backport: Backported in 6.12.19" | ||
11989 | |||
11990 | CVE_STATUS[CVE-2025-21918] = "cpe-stable-backport: Backported in 6.12.19" | ||
11991 | |||
11992 | CVE_STATUS[CVE-2025-21919] = "cpe-stable-backport: Backported in 6.12.19" | ||
11993 | |||
11994 | CVE_STATUS[CVE-2025-21920] = "cpe-stable-backport: Backported in 6.12.19" | ||
11995 | |||
11996 | CVE_STATUS[CVE-2025-21921] = "cpe-stable-backport: Backported in 6.12.19" | ||
11997 | |||
11998 | CVE_STATUS[CVE-2025-21922] = "cpe-stable-backport: Backported in 6.12.19" | ||
11999 | |||
12000 | CVE_STATUS[CVE-2025-21923] = "cpe-stable-backport: Backported in 6.12.19" | ||
12001 | |||
12002 | CVE_STATUS[CVE-2025-21924] = "cpe-stable-backport: Backported in 6.12.19" | ||
12003 | |||
12004 | CVE_STATUS[CVE-2025-21925] = "cpe-stable-backport: Backported in 6.12.19" | ||
12005 | |||
12006 | CVE_STATUS[CVE-2025-21926] = "cpe-stable-backport: Backported in 6.12.19" | ||
12007 | |||
12008 | CVE_STATUS[CVE-2025-21927] = "cpe-stable-backport: Backported in 6.12.19" | ||
12009 | |||
12010 | CVE_STATUS[CVE-2025-21928] = "cpe-stable-backport: Backported in 6.12.19" | ||
12011 | |||
12012 | CVE_STATUS[CVE-2025-21929] = "cpe-stable-backport: Backported in 6.12.19" | ||
12013 | |||
12014 | CVE_STATUS[CVE-2025-21930] = "cpe-stable-backport: Backported in 6.12.19" | ||
12015 | |||
12016 | CVE_STATUS[CVE-2025-21931] = "cpe-stable-backport: Backported in 6.12.19" | ||
12017 | |||
12018 | CVE_STATUS[CVE-2025-21932] = "cpe-stable-backport: Backported in 6.12.19" | ||
12019 | |||
12020 | CVE_STATUS[CVE-2025-21933] = "fixed-version: only affects 6.13 onwards" | ||
12021 | |||
12022 | CVE_STATUS[CVE-2025-21934] = "cpe-stable-backport: Backported in 6.12.19" | ||
12023 | |||
12024 | CVE_STATUS[CVE-2025-21935] = "cpe-stable-backport: Backported in 6.12.19" | ||
12025 | |||
12026 | CVE_STATUS[CVE-2025-21936] = "cpe-stable-backport: Backported in 6.12.19" | ||
12027 | |||
12028 | CVE_STATUS[CVE-2025-21937] = "cpe-stable-backport: Backported in 6.12.19" | ||
12029 | |||
12030 | CVE_STATUS[CVE-2025-21938] = "cpe-stable-backport: Backported in 6.12.19" | ||
12031 | |||
12032 | CVE_STATUS[CVE-2025-21939] = "cpe-stable-backport: Backported in 6.12.19" | ||
12033 | |||
12034 | CVE_STATUS[CVE-2025-21940] = "cpe-stable-backport: Backported in 6.12.19" | ||
12035 | |||
12036 | CVE_STATUS[CVE-2025-21941] = "cpe-stable-backport: Backported in 6.12.19" | ||
12037 | |||
12038 | CVE_STATUS[CVE-2025-21942] = "fixed-version: only affects 6.13.2 onwards" | ||
12039 | |||
12040 | CVE_STATUS[CVE-2025-21943] = "cpe-stable-backport: Backported in 6.12.19" | ||
12041 | |||
12042 | CVE_STATUS[CVE-2025-21944] = "cpe-stable-backport: Backported in 6.12.19" | ||
12043 | |||
12044 | CVE_STATUS[CVE-2025-21945] = "cpe-stable-backport: Backported in 6.12.19" | ||
12045 | |||
12046 | CVE_STATUS[CVE-2025-21946] = "cpe-stable-backport: Backported in 6.12.19" | ||
12047 | |||
12048 | CVE_STATUS[CVE-2025-21947] = "cpe-stable-backport: Backported in 6.12.19" | ||
12049 | |||
12050 | CVE_STATUS[CVE-2025-21948] = "cpe-stable-backport: Backported in 6.12.19" | ||
12051 | |||
12052 | # CVE-2025-21949 needs backporting (fixed from 6.14) | ||
12053 | |||
12054 | CVE_STATUS[CVE-2025-21950] = "cpe-stable-backport: Backported in 6.12.19" | ||
12055 | |||
12056 | CVE_STATUS[CVE-2025-21951] = "cpe-stable-backport: Backported in 6.12.19" | ||
12057 | |||
12058 | CVE_STATUS[CVE-2025-21952] = "fixed-version: only affects 6.13 onwards" | ||
12059 | |||
12060 | CVE_STATUS[CVE-2025-21953] = "fixed-version: only affects 6.13 onwards" | ||
12061 | |||
12062 | CVE_STATUS[CVE-2025-21954] = "cpe-stable-backport: Backported in 6.12.20" | ||
12063 | |||
12064 | CVE_STATUS[CVE-2025-21955] = "cpe-stable-backport: Backported in 6.12.20" | ||
12065 | |||
12066 | CVE_STATUS[CVE-2025-21956] = "cpe-stable-backport: Backported in 6.12.20" | ||
12067 | |||
12068 | CVE_STATUS[CVE-2025-21957] = "cpe-stable-backport: Backported in 6.12.20" | ||
12069 | |||
12070 | CVE_STATUS[CVE-2025-21958] = "cpe-stable-backport: Backported in 6.12.20" | ||
12071 | |||
12072 | CVE_STATUS[CVE-2025-21959] = "cpe-stable-backport: Backported in 6.12.20" | ||
12073 | |||
12074 | CVE_STATUS[CVE-2025-21960] = "cpe-stable-backport: Backported in 6.12.20" | ||
12075 | |||
12076 | CVE_STATUS[CVE-2025-21961] = "cpe-stable-backport: Backported in 6.12.20" | ||
12077 | |||
12078 | CVE_STATUS[CVE-2025-21962] = "cpe-stable-backport: Backported in 6.12.20" | ||
12079 | |||
12080 | CVE_STATUS[CVE-2025-21963] = "cpe-stable-backport: Backported in 6.12.20" | ||
12081 | |||
12082 | CVE_STATUS[CVE-2025-21964] = "cpe-stable-backport: Backported in 6.12.20" | ||
12083 | |||
12084 | CVE_STATUS[CVE-2025-21965] = "cpe-stable-backport: Backported in 6.12.20" | ||
12085 | |||
12086 | CVE_STATUS[CVE-2025-21966] = "cpe-stable-backport: Backported in 6.12.20" | ||
12087 | |||
12088 | CVE_STATUS[CVE-2025-21967] = "cpe-stable-backport: Backported in 6.12.20" | ||
12089 | |||
12090 | CVE_STATUS[CVE-2025-21968] = "cpe-stable-backport: Backported in 6.12.20" | ||
12091 | |||
12092 | CVE_STATUS[CVE-2025-21969] = "cpe-stable-backport: Backported in 6.12.20" | ||
12093 | |||
12094 | CVE_STATUS[CVE-2025-21970] = "cpe-stable-backport: Backported in 6.12.20" | ||
12095 | |||
12096 | CVE_STATUS[CVE-2025-21971] = "cpe-stable-backport: Backported in 6.12.20" | ||
12097 | |||
12098 | CVE_STATUS[CVE-2025-21972] = "cpe-stable-backport: Backported in 6.12.20" | ||
12099 | |||
12100 | CVE_STATUS[CVE-2025-21973] = "cpe-stable-backport: Backported in 6.12.20" | ||
12101 | |||
12102 | CVE_STATUS[CVE-2025-21974] = "cpe-stable-backport: Backported in 6.12.20" | ||
12103 | |||
12104 | CVE_STATUS[CVE-2025-21975] = "cpe-stable-backport: Backported in 6.12.20" | ||
12105 | |||
12106 | CVE_STATUS[CVE-2025-21976] = "cpe-stable-backport: Backported in 6.12.20" | ||
12107 | |||
12108 | CVE_STATUS[CVE-2025-21977] = "cpe-stable-backport: Backported in 6.12.20" | ||
12109 | |||
12110 | CVE_STATUS[CVE-2025-21978] = "cpe-stable-backport: Backported in 6.12.20" | ||
12111 | |||
12112 | CVE_STATUS[CVE-2025-21979] = "cpe-stable-backport: Backported in 6.12.20" | ||
12113 | |||
12114 | CVE_STATUS[CVE-2025-21980] = "cpe-stable-backport: Backported in 6.12.20" | ||
12115 | |||
12116 | CVE_STATUS[CVE-2025-21981] = "cpe-stable-backport: Backported in 6.12.20" | ||
12117 | |||
12118 | CVE_STATUS[CVE-2025-21982] = "cpe-stable-backport: Backported in 6.12.20" | ||
12119 | |||
12120 | CVE_STATUS[CVE-2025-21983] = "cpe-stable-backport: Backported in 6.12.20" | ||
12121 | |||
12122 | CVE_STATUS[CVE-2025-21984] = "cpe-stable-backport: Backported in 6.12.20" | ||
12123 | |||
12124 | CVE_STATUS[CVE-2025-21985] = "cpe-stable-backport: Backported in 6.12.20" | ||
12125 | |||
12126 | CVE_STATUS[CVE-2025-21986] = "cpe-stable-backport: Backported in 6.12.20" | ||
12127 | |||
12128 | CVE_STATUS[CVE-2025-21987] = "cpe-stable-backport: Backported in 6.12.18" | ||
12129 | |||
12130 | # CVE-2025-21988 has no known resolution | ||
12131 | |||
12132 | CVE_STATUS[CVE-2025-21989] = "cpe-stable-backport: Backported in 6.12.20" | ||
12133 | |||
12134 | CVE_STATUS[CVE-2025-21990] = "cpe-stable-backport: Backported in 6.12.20" | ||
12135 | |||
12136 | CVE_STATUS[CVE-2025-21991] = "cpe-stable-backport: Backported in 6.12.20" | ||
12137 | |||
12138 | CVE_STATUS[CVE-2025-21992] = "cpe-stable-backport: Backported in 6.12.20" | ||
12139 | |||
12140 | CVE_STATUS[CVE-2025-21993] = "cpe-stable-backport: Backported in 6.12.20" | ||
12141 | |||
12142 | CVE_STATUS[CVE-2025-21994] = "cpe-stable-backport: Backported in 6.12.21" | ||
12143 | |||
12144 | CVE_STATUS[CVE-2025-21995] = "cpe-stable-backport: Backported in 6.12.21" | ||
12145 | |||
12146 | CVE_STATUS[CVE-2025-21996] = "cpe-stable-backport: Backported in 6.12.21" | ||
12147 | |||
12148 | CVE_STATUS[CVE-2025-21997] = "cpe-stable-backport: Backported in 6.12.21" | ||
12149 | |||
12150 | CVE_STATUS[CVE-2025-21998] = "cpe-stable-backport: Backported in 6.12.21" | ||
12151 | |||
12152 | CVE_STATUS[CVE-2025-21999] = "cpe-stable-backport: Backported in 6.12.21" | ||
12153 | |||
12154 | CVE_STATUS[CVE-2025-22000] = "cpe-stable-backport: Backported in 6.12.21" | ||
12155 | |||
12156 | CVE_STATUS[CVE-2025-22001] = "cpe-stable-backport: Backported in 6.12.21" | ||
12157 | |||
12158 | CVE_STATUS[CVE-2025-22002] = "cpe-stable-backport: Backported in 6.12.21" | ||
12159 | |||
12160 | CVE_STATUS[CVE-2025-22003] = "cpe-stable-backport: Backported in 6.12.21" | ||
12161 | |||
12162 | CVE_STATUS[CVE-2025-22004] = "cpe-stable-backport: Backported in 6.12.21" | ||
12163 | |||
12164 | CVE_STATUS[CVE-2025-22005] = "cpe-stable-backport: Backported in 6.12.21" | ||
12165 | |||
12166 | CVE_STATUS[CVE-2025-22006] = "cpe-stable-backport: Backported in 6.12.21" | ||
12167 | |||
12168 | CVE_STATUS[CVE-2025-22007] = "cpe-stable-backport: Backported in 6.12.21" | ||
12169 | |||
12170 | CVE_STATUS[CVE-2025-22008] = "cpe-stable-backport: Backported in 6.12.21" | ||
12171 | |||
12172 | CVE_STATUS[CVE-2025-22009] = "cpe-stable-backport: Backported in 6.12.21" | ||
12173 | |||
12174 | CVE_STATUS[CVE-2025-22010] = "cpe-stable-backport: Backported in 6.12.21" | ||
12175 | |||
12176 | CVE_STATUS[CVE-2025-22011] = "cpe-stable-backport: Backported in 6.12.21" | ||
12177 | |||
12178 | CVE_STATUS[CVE-2025-22012] = "fixed-version: only affects 6.13 onwards" | ||
12179 | |||
12180 | CVE_STATUS[CVE-2025-22013] = "cpe-stable-backport: Backported in 6.12.21" | ||
12181 | |||
12182 | CVE_STATUS[CVE-2025-22014] = "cpe-stable-backport: Backported in 6.12.21" | ||
12183 | |||
12184 | CVE_STATUS[CVE-2025-22015] = "cpe-stable-backport: Backported in 6.12.21" | ||
12185 | |||
12186 | CVE_STATUS[CVE-2025-22016] = "cpe-stable-backport: Backported in 6.12.21" | ||
12187 | |||
12188 | CVE_STATUS[CVE-2025-22017] = "cpe-stable-backport: Backported in 6.12.21" | ||
12189 | |||
12190 | CVE_STATUS[CVE-2025-22018] = "cpe-stable-backport: Backported in 6.12.22" | ||
12191 | |||
12192 | CVE_STATUS[CVE-2025-22019] = "cpe-stable-backport: Backported in 6.12.22" | ||
12193 | |||
12194 | CVE_STATUS[CVE-2025-22020] = "cpe-stable-backport: Backported in 6.12.22" | ||
12195 | |||
12196 | CVE_STATUS[CVE-2025-22021] = "cpe-stable-backport: Backported in 6.12.22" | ||
12197 | |||
12198 | CVE_STATUS[CVE-2025-22022] = "cpe-stable-backport: Backported in 6.12.22" | ||
12199 | |||
12200 | CVE_STATUS[CVE-2025-22023] = "cpe-stable-backport: Backported in 6.12.22" | ||
12201 | |||
12202 | CVE_STATUS[CVE-2025-22024] = "cpe-stable-backport: Backported in 6.12.23" | ||
12203 | |||
12204 | CVE_STATUS[CVE-2025-22025] = "cpe-stable-backport: Backported in 6.12.23" | ||
12205 | |||
12206 | CVE_STATUS[CVE-2025-22026] = "cpe-stable-backport: Backported in 6.12.24" | ||
12207 | |||
12208 | CVE_STATUS[CVE-2025-22027] = "cpe-stable-backport: Backported in 6.12.23" | ||
12209 | |||
12210 | CVE_STATUS[CVE-2025-22028] = "cpe-stable-backport: Backported in 6.12.23" | ||
12211 | |||
12212 | CVE_STATUS[CVE-2025-22030] = "cpe-stable-backport: Backported in 6.12.23" | ||
12213 | |||
12214 | CVE_STATUS[CVE-2025-22031] = "fixed-version: only affects 6.13 onwards" | ||
12215 | |||
12216 | CVE_STATUS[CVE-2025-22032] = "cpe-stable-backport: Backported in 6.12.23" | ||
12217 | |||
12218 | CVE_STATUS[CVE-2025-22033] = "cpe-stable-backport: Backported in 6.12.23" | ||
12219 | |||
12220 | CVE_STATUS[CVE-2025-22034] = "cpe-stable-backport: Backported in 6.12.23" | ||
12221 | |||
12222 | CVE_STATUS[CVE-2025-22035] = "cpe-stable-backport: Backported in 6.12.23" | ||
12223 | |||
12224 | CVE_STATUS[CVE-2025-22036] = "cpe-stable-backport: Backported in 6.12.23" | ||
12225 | |||
12226 | CVE_STATUS[CVE-2025-22037] = "cpe-stable-backport: Backported in 6.12.23" | ||
12227 | |||
12228 | CVE_STATUS[CVE-2025-22038] = "cpe-stable-backport: Backported in 6.12.23" | ||
12229 | |||
12230 | CVE_STATUS[CVE-2025-22039] = "cpe-stable-backport: Backported in 6.12.23" | ||
12231 | |||
12232 | CVE_STATUS[CVE-2025-22040] = "cpe-stable-backport: Backported in 6.12.23" | ||
12233 | |||
12234 | CVE_STATUS[CVE-2025-22041] = "cpe-stable-backport: Backported in 6.12.23" | ||
12235 | |||
12236 | CVE_STATUS[CVE-2025-22042] = "cpe-stable-backport: Backported in 6.12.23" | ||
12237 | |||
12238 | CVE_STATUS[CVE-2025-22043] = "cpe-stable-backport: Backported in 6.12.23" | ||
12239 | |||
12240 | CVE_STATUS[CVE-2025-22044] = "cpe-stable-backport: Backported in 6.12.23" | ||
12241 | |||
12242 | CVE_STATUS[CVE-2025-22045] = "cpe-stable-backport: Backported in 6.12.23" | ||
12243 | |||
12244 | CVE_STATUS[CVE-2025-22046] = "cpe-stable-backport: Backported in 6.12.23" | ||
12245 | |||
12246 | CVE_STATUS[CVE-2025-22047] = "cpe-stable-backport: Backported in 6.12.23" | ||
12247 | |||
12248 | CVE_STATUS[CVE-2025-22048] = "cpe-stable-backport: Backported in 6.12.23" | ||
12249 | |||
12250 | CVE_STATUS[CVE-2025-22049] = "cpe-stable-backport: Backported in 6.12.23" | ||
12251 | |||
12252 | CVE_STATUS[CVE-2025-22050] = "cpe-stable-backport: Backported in 6.12.23" | ||
12253 | |||
12254 | CVE_STATUS[CVE-2025-22051] = "fixed-version: only affects 6.13 onwards" | ||
12255 | |||
12256 | CVE_STATUS[CVE-2025-22052] = "fixed-version: only affects 6.13 onwards" | ||
12257 | |||
12258 | CVE_STATUS[CVE-2025-22053] = "cpe-stable-backport: Backported in 6.12.23" | ||
12259 | |||
12260 | CVE_STATUS[CVE-2025-22054] = "cpe-stable-backport: Backported in 6.12.23" | ||
12261 | |||
12262 | CVE_STATUS[CVE-2025-22055] = "cpe-stable-backport: Backported in 6.12.23" | ||
12263 | |||
12264 | CVE_STATUS[CVE-2025-22056] = "cpe-stable-backport: Backported in 6.12.23" | ||
12265 | |||
12266 | CVE_STATUS[CVE-2025-22057] = "cpe-stable-backport: Backported in 6.12.23" | ||
12267 | |||
12268 | CVE_STATUS[CVE-2025-22058] = "cpe-stable-backport: Backported in 6.12.23" | ||
12269 | |||
12270 | CVE_STATUS[CVE-2025-22059] = "cpe-stable-backport: Backported in 6.12.23" | ||
12271 | |||
12272 | CVE_STATUS[CVE-2025-22060] = "cpe-stable-backport: Backported in 6.12.23" | ||
12273 | |||
12274 | CVE_STATUS[CVE-2025-22061] = "fixed-version: only affects 6.14 onwards" | ||
12275 | |||
12276 | CVE_STATUS[CVE-2025-22062] = "cpe-stable-backport: Backported in 6.12.23" | ||
12277 | |||
12278 | CVE_STATUS[CVE-2025-22063] = "cpe-stable-backport: Backported in 6.12.23" | ||
12279 | |||
12280 | CVE_STATUS[CVE-2025-22064] = "cpe-stable-backport: Backported in 6.12.23" | ||
12281 | |||
12282 | CVE_STATUS[CVE-2025-22065] = "cpe-stable-backport: Backported in 6.12.23" | ||
12283 | |||
12284 | CVE_STATUS[CVE-2025-22066] = "cpe-stable-backport: Backported in 6.12.23" | ||
12285 | |||
12286 | CVE_STATUS[CVE-2025-22067] = "cpe-stable-backport: Backported in 6.12.23" | ||
12287 | |||
12288 | CVE_STATUS[CVE-2025-22068] = "cpe-stable-backport: Backported in 6.12.23" | ||
12289 | |||
12290 | CVE_STATUS[CVE-2025-22069] = "fixed-version: only affects 6.14 onwards" | ||
12291 | |||
12292 | CVE_STATUS[CVE-2025-22070] = "cpe-stable-backport: Backported in 6.12.23" | ||
12293 | |||
12294 | CVE_STATUS[CVE-2025-22071] = "cpe-stable-backport: Backported in 6.12.23" | ||
12295 | |||
12296 | CVE_STATUS[CVE-2025-22072] = "cpe-stable-backport: Backported in 6.12.23" | ||
12297 | |||
12298 | CVE_STATUS[CVE-2025-22073] = "cpe-stable-backport: Backported in 6.12.23" | ||
12299 | |||
12300 | CVE_STATUS[CVE-2025-22074] = "cpe-stable-backport: Backported in 6.12.23" | ||
12301 | |||
12302 | CVE_STATUS[CVE-2025-22075] = "cpe-stable-backport: Backported in 6.12.23" | ||
12303 | |||
12304 | CVE_STATUS[CVE-2025-22076] = "cpe-stable-backport: Backported in 6.12.23" | ||
12305 | |||
12306 | CVE_STATUS[CVE-2025-22077] = "cpe-stable-backport: Backported in 6.12.25" | ||
12307 | |||
12308 | CVE_STATUS[CVE-2025-22078] = "cpe-stable-backport: Backported in 6.12.23" | ||
12309 | |||
12310 | CVE_STATUS[CVE-2025-22079] = "cpe-stable-backport: Backported in 6.12.23" | ||
12311 | |||
12312 | CVE_STATUS[CVE-2025-22080] = "cpe-stable-backport: Backported in 6.12.23" | ||
12313 | |||
12314 | CVE_STATUS[CVE-2025-22081] = "cpe-stable-backport: Backported in 6.12.23" | ||
12315 | |||
12316 | CVE_STATUS[CVE-2025-22082] = "cpe-stable-backport: Backported in 6.12.23" | ||
12317 | |||
12318 | CVE_STATUS[CVE-2025-22083] = "cpe-stable-backport: Backported in 6.12.23" | ||
12319 | |||
12320 | CVE_STATUS[CVE-2025-22084] = "cpe-stable-backport: Backported in 6.12.23" | ||
12321 | |||
12322 | CVE_STATUS[CVE-2025-22085] = "cpe-stable-backport: Backported in 6.12.23" | ||
12323 | |||
12324 | CVE_STATUS[CVE-2025-22086] = "cpe-stable-backport: Backported in 6.12.23" | ||
12325 | |||
12326 | CVE_STATUS[CVE-2025-22087] = "cpe-stable-backport: Backported in 6.12.23" | ||
12327 | |||
12328 | CVE_STATUS[CVE-2025-22088] = "cpe-stable-backport: Backported in 6.12.23" | ||
12329 | |||
12330 | CVE_STATUS[CVE-2025-22089] = "cpe-stable-backport: Backported in 6.12.23" | ||
12331 | |||
12332 | CVE_STATUS[CVE-2025-22090] = "cpe-stable-backport: Backported in 6.12.23" | ||
12333 | |||
12334 | CVE_STATUS[CVE-2025-22091] = "cpe-stable-backport: Backported in 6.12.23" | ||
12335 | |||
12336 | CVE_STATUS[CVE-2025-22092] = "fixed-version: only affects 6.13 onwards" | ||
12337 | |||
12338 | CVE_STATUS[CVE-2025-22093] = "cpe-stable-backport: Backported in 6.12.23" | ||
12339 | |||
12340 | CVE_STATUS[CVE-2025-22094] = "fixed-version: only affects 6.13 onwards" | ||
12341 | |||
12342 | CVE_STATUS[CVE-2025-22095] = "cpe-stable-backport: Backported in 6.12.23" | ||
12343 | |||
12344 | CVE_STATUS[CVE-2025-22096] = "fixed-version: only affects 6.14 onwards" | ||
12345 | |||
12346 | CVE_STATUS[CVE-2025-22097] = "cpe-stable-backport: Backported in 6.12.23" | ||
12347 | |||
12348 | CVE_STATUS[CVE-2025-22098] = "fixed-version: only affects 6.13 onwards" | ||
12349 | |||
12350 | CVE_STATUS[CVE-2025-22099] = "fixed-version: only affects 6.14 onwards" | ||
12351 | |||
12352 | CVE_STATUS[CVE-2025-22100] = "fixed-version: only affects 6.13 onwards" | ||
12353 | |||
12354 | # CVE-2025-22101 needs backporting (fixed from 6.15) | ||
12355 | |||
12356 | CVE_STATUS[CVE-2025-22102] = "cpe-stable-backport: Backported in 6.12.30" | ||
12357 | |||
12358 | # CVE-2025-22103 needs backporting (fixed from 6.15) | ||
12359 | |||
12360 | # CVE-2025-22104 needs backporting (fixed from 6.15) | ||
12361 | |||
12362 | # CVE-2025-22105 needs backporting (fixed from 6.15) | ||
12363 | |||
12364 | # CVE-2025-22106 needs backporting (fixed from 6.15) | ||
12365 | |||
12366 | # CVE-2025-22107 needs backporting (fixed from 6.15) | ||
12367 | |||
12368 | # CVE-2025-22108 needs backporting (fixed from 6.15) | ||
12369 | |||
12370 | # CVE-2025-22109 needs backporting (fixed from 6.15) | ||
12371 | |||
12372 | CVE_STATUS[CVE-2025-22110] = "fixed-version: only affects 6.14 onwards" | ||
12373 | |||
12374 | # CVE-2025-22111 needs backporting (fixed from 6.15) | ||
12375 | |||
12376 | CVE_STATUS[CVE-2025-22112] = "fixed-version: only affects 6.14 onwards" | ||
12377 | |||
12378 | # CVE-2025-22113 needs backporting (fixed from 6.15) | ||
12379 | |||
12380 | CVE_STATUS[CVE-2025-22114] = "fixed-version: only affects 6.14 onwards" | ||
12381 | |||
12382 | # CVE-2025-22115 needs backporting (fixed from 6.15) | ||
12383 | |||
12384 | # CVE-2025-22116 needs backporting (fixed from 6.15) | ||
12385 | |||
12386 | # CVE-2025-22117 needs backporting (fixed from 6.15) | ||
12387 | |||
12388 | CVE_STATUS[CVE-2025-22118] = "fixed-version: only affects 6.13 onwards" | ||
12389 | |||
12390 | CVE_STATUS[CVE-2025-22119] = "fixed-version: only affects 6.14 onwards" | ||
12391 | |||
12392 | CVE_STATUS[CVE-2025-22120] = "cpe-stable-backport: Backported in 6.12.26" | ||
12393 | |||
12394 | # CVE-2025-22121 needs backporting (fixed from 6.15) | ||
12395 | |||
12396 | # CVE-2025-22122 needs backporting (fixed from 6.15) | ||
12397 | |||
12398 | # CVE-2025-22123 needs backporting (fixed from 6.15) | ||
12399 | |||
12400 | # CVE-2025-22124 needs backporting (fixed from 6.15) | ||
12401 | |||
12402 | # CVE-2025-22125 needs backporting (fixed from 6.15) | ||
12403 | |||
12404 | CVE_STATUS[CVE-2025-22126] = "cpe-stable-backport: Backported in 6.12.25" | ||
12405 | |||
12406 | # CVE-2025-22127 needs backporting (fixed from 6.15) | ||
12407 | |||
12408 | # CVE-2025-22128 needs backporting (fixed from 6.15) | ||
12409 | |||
12410 | # CVE-2025-23129 needs backporting (fixed from 6.15) | ||
12411 | |||
12412 | # CVE-2025-23130 needs backporting (fixed from 6.15) | ||
12413 | |||
12414 | # CVE-2025-23131 needs backporting (fixed from 6.15) | ||
12415 | |||
12416 | # CVE-2025-23132 needs backporting (fixed from 6.15) | ||
12417 | |||
12418 | # CVE-2025-23133 needs backporting (fixed from 6.15) | ||
12419 | |||
12420 | CVE_STATUS[CVE-2025-23134] = "cpe-stable-backport: Backported in 6.12.23" | ||
12421 | |||
12422 | # CVE-2025-23135 needs backporting (fixed from 6.15) | ||
12423 | |||
12424 | CVE_STATUS[CVE-2025-23136] = "cpe-stable-backport: Backported in 6.12.23" | ||
12425 | |||
12426 | # CVE-2025-23137 needs backporting (fixed from 6.15) | ||
12427 | |||
12428 | CVE_STATUS[CVE-2025-23138] = "cpe-stable-backport: Backported in 6.12.23" | ||
12429 | |||
12430 | CVE_STATUS[CVE-2025-23140] = "cpe-stable-backport: Backported in 6.12.25" | ||
12431 | |||
12432 | CVE_STATUS[CVE-2025-23141] = "cpe-stable-backport: Backported in 6.12.24" | ||
12433 | |||
12434 | CVE_STATUS[CVE-2025-23142] = "cpe-stable-backport: Backported in 6.12.24" | ||
12435 | |||
12436 | CVE_STATUS[CVE-2025-23143] = "cpe-stable-backport: Backported in 6.12.24" | ||
12437 | |||
12438 | CVE_STATUS[CVE-2025-23144] = "cpe-stable-backport: Backported in 6.12.24" | ||
12439 | |||
12440 | CVE_STATUS[CVE-2025-23145] = "cpe-stable-backport: Backported in 6.12.24" | ||
12441 | |||
12442 | CVE_STATUS[CVE-2025-23146] = "cpe-stable-backport: Backported in 6.12.24" | ||
12443 | |||
12444 | CVE_STATUS[CVE-2025-23147] = "cpe-stable-backport: Backported in 6.12.24" | ||
12445 | |||
12446 | CVE_STATUS[CVE-2025-23148] = "cpe-stable-backport: Backported in 6.12.24" | ||
12447 | |||
12448 | CVE_STATUS[CVE-2025-23149] = "cpe-stable-backport: Backported in 6.12.24" | ||
12449 | |||
12450 | CVE_STATUS[CVE-2025-23150] = "cpe-stable-backport: Backported in 6.12.24" | ||
12451 | |||
12452 | CVE_STATUS[CVE-2025-23151] = "cpe-stable-backport: Backported in 6.12.24" | ||
12453 | |||
12454 | CVE_STATUS[CVE-2025-23152] = "fixed-version: only affects 6.14 onwards" | ||
12455 | |||
12456 | CVE_STATUS[CVE-2025-23153] = "fixed-version: only affects 6.14 onwards" | ||
12457 | |||
12458 | CVE_STATUS[CVE-2025-23154] = "cpe-stable-backport: Backported in 6.12.24" | ||
12459 | |||
12460 | # CVE-2025-23155 needs backporting (fixed from 6.15) | ||
12461 | |||
12462 | CVE_STATUS[CVE-2025-23156] = "cpe-stable-backport: Backported in 6.12.24" | ||
12463 | |||
12464 | CVE_STATUS[CVE-2025-23157] = "cpe-stable-backport: Backported in 6.12.24" | ||
12465 | |||
12466 | CVE_STATUS[CVE-2025-23158] = "cpe-stable-backport: Backported in 6.12.24" | ||
12467 | |||
12468 | CVE_STATUS[CVE-2025-23159] = "cpe-stable-backport: Backported in 6.12.24" | ||
12469 | |||
12470 | CVE_STATUS[CVE-2025-23160] = "cpe-stable-backport: Backported in 6.12.24" | ||
12471 | |||
12472 | CVE_STATUS[CVE-2025-23161] = "cpe-stable-backport: Backported in 6.12.24" | ||
12473 | |||
12474 | CVE_STATUS[CVE-2025-23162] = "cpe-stable-backport: Backported in 6.12.24" | ||
12475 | |||
12476 | CVE_STATUS[CVE-2025-23163] = "cpe-stable-backport: Backported in 6.12.24" | ||
12477 | |||
12478 | CVE_STATUS[CVE-2025-37738] = "cpe-stable-backport: Backported in 6.12.24" | ||
12479 | |||
12480 | CVE_STATUS[CVE-2025-37739] = "cpe-stable-backport: Backported in 6.12.24" | ||
12481 | |||
12482 | CVE_STATUS[CVE-2025-37740] = "cpe-stable-backport: Backported in 6.12.24" | ||
12483 | |||
12484 | CVE_STATUS[CVE-2025-37741] = "cpe-stable-backport: Backported in 6.12.24" | ||
12485 | |||
12486 | CVE_STATUS[CVE-2025-37742] = "cpe-stable-backport: Backported in 6.12.24" | ||
12487 | |||
12488 | # CVE-2025-37743 needs backporting (fixed from 6.15) | ||
12489 | |||
12490 | CVE_STATUS[CVE-2025-37744] = "cpe-stable-backport: Backported in 6.12.24" | ||
12491 | |||
12492 | CVE_STATUS[CVE-2025-37745] = "cpe-stable-backport: Backported in 6.12.24" | ||
12493 | |||
12494 | # CVE-2025-37746 needs backporting (fixed from 6.15) | ||
12495 | |||
12496 | CVE_STATUS[CVE-2025-37747] = "cpe-stable-backport: Backported in 6.12.24" | ||
12497 | |||
12498 | CVE_STATUS[CVE-2025-37748] = "cpe-stable-backport: Backported in 6.12.24" | ||
12499 | |||
12500 | CVE_STATUS[CVE-2025-37749] = "cpe-stable-backport: Backported in 6.12.24" | ||
12501 | |||
12502 | CVE_STATUS[CVE-2025-37750] = "cpe-stable-backport: Backported in 6.12.24" | ||
12503 | |||
12504 | CVE_STATUS[CVE-2025-37751] = "fixed-version: only affects 6.14 onwards" | ||
12505 | |||
12506 | CVE_STATUS[CVE-2025-37752] = "cpe-stable-backport: Backported in 6.12.24" | ||
12507 | |||
12508 | CVE_STATUS[CVE-2025-37754] = "cpe-stable-backport: Backported in 6.12.24" | ||
12509 | |||
12510 | CVE_STATUS[CVE-2025-37755] = "cpe-stable-backport: Backported in 6.12.24" | ||
12511 | |||
12512 | CVE_STATUS[CVE-2025-37756] = "cpe-stable-backport: Backported in 6.12.24" | ||
12513 | |||
12514 | CVE_STATUS[CVE-2025-37757] = "cpe-stable-backport: Backported in 6.12.24" | ||
12515 | |||
12516 | CVE_STATUS[CVE-2025-37758] = "cpe-stable-backport: Backported in 6.12.24" | ||
12517 | |||
12518 | CVE_STATUS[CVE-2025-37759] = "cpe-stable-backport: Backported in 6.12.24" | ||
12519 | |||
12520 | CVE_STATUS[CVE-2025-37760] = "cpe-stable-backport: Backported in 6.12.25" | ||
12521 | |||
12522 | CVE_STATUS[CVE-2025-37761] = "cpe-stable-backport: Backported in 6.12.25" | ||
12523 | |||
12524 | CVE_STATUS[CVE-2025-37762] = "fixed-version: only affects 6.14 onwards" | ||
12525 | |||
12526 | CVE_STATUS[CVE-2025-37763] = "cpe-stable-backport: Backported in 6.12.25" | ||
12527 | |||
12528 | CVE_STATUS[CVE-2025-37764] = "cpe-stable-backport: Backported in 6.12.25" | ||
12529 | |||
12530 | CVE_STATUS[CVE-2025-37765] = "cpe-stable-backport: Backported in 6.12.25" | ||
12531 | |||
12532 | CVE_STATUS[CVE-2025-37766] = "cpe-stable-backport: Backported in 6.12.25" | ||
12533 | |||
12534 | CVE_STATUS[CVE-2025-37767] = "cpe-stable-backport: Backported in 6.12.25" | ||
12535 | |||
12536 | CVE_STATUS[CVE-2025-37768] = "cpe-stable-backport: Backported in 6.12.25" | ||
12537 | |||
12538 | CVE_STATUS[CVE-2025-37769] = "cpe-stable-backport: Backported in 6.12.25" | ||
12539 | |||
12540 | CVE_STATUS[CVE-2025-37770] = "cpe-stable-backport: Backported in 6.12.25" | ||
12541 | |||
12542 | CVE_STATUS[CVE-2025-37771] = "cpe-stable-backport: Backported in 6.12.25" | ||
12543 | |||
12544 | CVE_STATUS[CVE-2025-37772] = "cpe-stable-backport: Backported in 6.12.25" | ||
12545 | |||
12546 | CVE_STATUS[CVE-2025-37773] = "cpe-stable-backport: Backported in 6.12.25" | ||
12547 | |||
12548 | CVE_STATUS[CVE-2025-37774] = "cpe-stable-backport: Backported in 6.12.25" | ||
12549 | |||
12550 | CVE_STATUS[CVE-2025-37775] = "cpe-stable-backport: Backported in 6.12.25" | ||
12551 | |||
12552 | CVE_STATUS[CVE-2025-37776] = "cpe-stable-backport: Backported in 6.12.25" | ||
12553 | |||
12554 | CVE_STATUS[CVE-2025-37777] = "cpe-stable-backport: Backported in 6.12.26" | ||
12555 | |||
12556 | CVE_STATUS[CVE-2025-37778] = "cpe-stable-backport: Backported in 6.12.25" | ||
12557 | |||
12558 | CVE_STATUS[CVE-2025-37779] = "fixed-version: only affects 6.14 onwards" | ||
12559 | |||
12560 | CVE_STATUS[CVE-2025-37780] = "cpe-stable-backport: Backported in 6.12.25" | ||
12561 | |||
12562 | CVE_STATUS[CVE-2025-37781] = "cpe-stable-backport: Backported in 6.12.25" | ||
12563 | |||
12564 | CVE_STATUS[CVE-2025-37783] = "fixed-version: only affects 6.14 onwards" | ||
12565 | |||
12566 | CVE_STATUS[CVE-2025-37784] = "cpe-stable-backport: Backported in 6.12.25" | ||
12567 | |||
12568 | CVE_STATUS[CVE-2025-37785] = "cpe-stable-backport: Backported in 6.12.23" | ||
12569 | |||
12570 | CVE_STATUS[CVE-2025-37786] = "cpe-stable-backport: Backported in 6.12.25" | ||
12571 | |||
12572 | CVE_STATUS[CVE-2025-37787] = "cpe-stable-backport: Backported in 6.12.25" | ||
12573 | |||
12574 | CVE_STATUS[CVE-2025-37788] = "cpe-stable-backport: Backported in 6.12.25" | ||
12575 | |||
12576 | CVE_STATUS[CVE-2025-37789] = "cpe-stable-backport: Backported in 6.12.25" | ||
12577 | |||
12578 | CVE_STATUS[CVE-2025-37790] = "cpe-stable-backport: Backported in 6.12.25" | ||
12579 | |||
12580 | CVE_STATUS[CVE-2025-37791] = "cpe-stable-backport: Backported in 6.12.25" | ||
12581 | |||
12582 | CVE_STATUS[CVE-2025-37792] = "cpe-stable-backport: Backported in 6.12.25" | ||
12583 | |||
12584 | CVE_STATUS[CVE-2025-37793] = "cpe-stable-backport: Backported in 6.12.25" | ||
12585 | |||
12586 | CVE_STATUS[CVE-2025-37794] = "cpe-stable-backport: Backported in 6.12.25" | ||
12587 | |||
12588 | CVE_STATUS[CVE-2025-37796] = "cpe-stable-backport: Backported in 6.12.25" | ||
12589 | |||
12590 | CVE_STATUS[CVE-2025-37797] = "cpe-stable-backport: Backported in 6.12.26" | ||
12591 | |||
12592 | CVE_STATUS[CVE-2025-37798] = "cpe-stable-backport: Backported in 6.12.24" | ||
12593 | |||
12594 | CVE_STATUS[CVE-2025-37799] = "cpe-stable-backport: Backported in 6.12.26" | ||
12595 | |||
12596 | CVE_STATUS[CVE-2025-37800] = "cpe-stable-backport: Backported in 6.12.26" | ||
12597 | |||
12598 | CVE_STATUS[CVE-2025-37801] = "cpe-stable-backport: Backported in 6.12.26" | ||
12599 | |||
12600 | CVE_STATUS[CVE-2025-37802] = "cpe-stable-backport: Backported in 6.12.26" | ||
12601 | |||
12602 | # CVE-2025-37803 needs backporting (fixed from 6.15) | ||
12603 | |||
12604 | CVE_STATUS[CVE-2025-37805] = "cpe-stable-backport: Backported in 6.12.26" | ||
12605 | |||
12606 | CVE_STATUS[CVE-2025-37806] = "cpe-stable-backport: Backported in 6.12.26" | ||
12607 | |||
12608 | CVE_STATUS[CVE-2025-37807] = "cpe-stable-backport: Backported in 6.12.26" | ||
12609 | |||
12610 | CVE_STATUS[CVE-2025-37808] = "cpe-stable-backport: Backported in 6.12.26" | ||
12611 | |||
12612 | CVE_STATUS[CVE-2025-37809] = "cpe-stable-backport: Backported in 6.12.26" | ||
12613 | |||
12614 | CVE_STATUS[CVE-2025-37810] = "cpe-stable-backport: Backported in 6.12.26" | ||
12615 | |||
12616 | CVE_STATUS[CVE-2025-37811] = "cpe-stable-backport: Backported in 6.12.26" | ||
12617 | |||
12618 | CVE_STATUS[CVE-2025-37812] = "cpe-stable-backport: Backported in 6.12.26" | ||
12619 | |||
12620 | CVE_STATUS[CVE-2025-37813] = "cpe-stable-backport: Backported in 6.12.26" | ||
12621 | |||
12622 | CVE_STATUS[CVE-2025-37814] = "cpe-stable-backport: Backported in 6.12.26" | ||
12623 | |||
12624 | CVE_STATUS[CVE-2025-37815] = "cpe-stable-backport: Backported in 6.12.26" | ||
12625 | |||
12626 | CVE_STATUS[CVE-2025-37816] = "cpe-stable-backport: Backported in 6.12.26" | ||
12627 | |||
12628 | CVE_STATUS[CVE-2025-37817] = "cpe-stable-backport: Backported in 6.12.26" | ||
12629 | |||
12630 | CVE_STATUS[CVE-2025-37818] = "cpe-stable-backport: Backported in 6.12.26" | ||
12631 | |||
12632 | CVE_STATUS[CVE-2025-37819] = "cpe-stable-backport: Backported in 6.12.26" | ||
12633 | |||
12634 | CVE_STATUS[CVE-2025-37820] = "cpe-stable-backport: Backported in 6.12.26" | ||
12635 | |||
12636 | CVE_STATUS[CVE-2025-37821] = "cpe-stable-backport: Backported in 6.12.29" | ||
12637 | |||
12638 | CVE_STATUS[CVE-2025-37822] = "cpe-stable-backport: Backported in 6.12.26" | ||
12639 | |||
12640 | CVE_STATUS[CVE-2025-37823] = "cpe-stable-backport: Backported in 6.12.26" | ||
12641 | |||
12642 | CVE_STATUS[CVE-2025-37824] = "cpe-stable-backport: Backported in 6.12.26" | ||
12643 | |||
12644 | CVE_STATUS[CVE-2025-37825] = "fixed-version: only affects 6.14 onwards" | ||
12645 | |||
12646 | CVE_STATUS[CVE-2025-37826] = "cpe-stable-backport: Backported in 6.12.26" | ||
12647 | |||
12648 | CVE_STATUS[CVE-2025-37827] = "cpe-stable-backport: Backported in 6.12.26" | ||
12649 | |||
12650 | CVE_STATUS[CVE-2025-37828] = "cpe-stable-backport: Backported in 6.12.26" | ||
12651 | |||
12652 | CVE_STATUS[CVE-2025-37829] = "cpe-stable-backport: Backported in 6.12.26" | ||
12653 | |||
12654 | CVE_STATUS[CVE-2025-37830] = "cpe-stable-backport: Backported in 6.12.26" | ||
12655 | |||
12656 | CVE_STATUS[CVE-2025-37831] = "cpe-stable-backport: Backported in 6.12.26" | ||
12657 | |||
12658 | CVE_STATUS[CVE-2025-37833] = "cpe-stable-backport: Backported in 6.12.26" | ||
12659 | |||
12660 | CVE_STATUS[CVE-2025-37834] = "cpe-stable-backport: Backported in 6.12.26" | ||
12661 | |||
12662 | CVE_STATUS[CVE-2025-37836] = "cpe-stable-backport: Backported in 6.12.24" | ||
12663 | |||
12664 | CVE_STATUS[CVE-2025-37837] = "cpe-stable-backport: Backported in 6.12.24" | ||
12665 | |||
12666 | CVE_STATUS[CVE-2025-37838] = "cpe-stable-backport: Backported in 6.12.24" | ||
12667 | |||
12668 | CVE_STATUS[CVE-2025-37839] = "cpe-stable-backport: Backported in 6.12.24" | ||
12669 | |||
12670 | CVE_STATUS[CVE-2025-37840] = "cpe-stable-backport: Backported in 6.12.24" | ||
12671 | |||
12672 | CVE_STATUS[CVE-2025-37841] = "cpe-stable-backport: Backported in 6.12.24" | ||
12673 | |||
12674 | # CVE-2025-37842 needs backporting (fixed from 6.15) | ||
12675 | |||
12676 | CVE_STATUS[CVE-2025-37843] = "cpe-stable-backport: Backported in 6.12.24" | ||
12677 | |||
12678 | CVE_STATUS[CVE-2025-37844] = "cpe-stable-backport: Backported in 6.12.24" | ||
12679 | |||
12680 | CVE_STATUS[CVE-2025-37845] = "cpe-stable-backport: Backported in 6.12.24" | ||
12681 | |||
12682 | CVE_STATUS[CVE-2025-37846] = "cpe-stable-backport: Backported in 6.12.24" | ||
12683 | |||
12684 | CVE_STATUS[CVE-2025-37847] = "cpe-stable-backport: Backported in 6.12.24" | ||
12685 | |||
12686 | CVE_STATUS[CVE-2025-37848] = "cpe-stable-backport: Backported in 6.12.24" | ||
12687 | |||
12688 | CVE_STATUS[CVE-2025-37849] = "cpe-stable-backport: Backported in 6.12.24" | ||
12689 | |||
12690 | CVE_STATUS[CVE-2025-37850] = "cpe-stable-backport: Backported in 6.12.24" | ||
12691 | |||
12692 | CVE_STATUS[CVE-2025-37851] = "cpe-stable-backport: Backported in 6.12.24" | ||
12693 | |||
12694 | CVE_STATUS[CVE-2025-37852] = "cpe-stable-backport: Backported in 6.12.24" | ||
12695 | |||
12696 | CVE_STATUS[CVE-2025-37853] = "cpe-stable-backport: Backported in 6.12.24" | ||
12697 | |||
12698 | CVE_STATUS[CVE-2025-37854] = "cpe-stable-backport: Backported in 6.12.24" | ||
12699 | |||
12700 | # CVE-2025-37855 needs backporting (fixed from 6.15) | ||
12701 | |||
12702 | CVE_STATUS[CVE-2025-37856] = "cpe-stable-backport: Backported in 6.12.24" | ||
12703 | |||
12704 | CVE_STATUS[CVE-2025-37857] = "cpe-stable-backport: Backported in 6.12.24" | ||
12705 | |||
12706 | CVE_STATUS[CVE-2025-37858] = "cpe-stable-backport: Backported in 6.12.24" | ||
12707 | |||
12708 | CVE_STATUS[CVE-2025-37859] = "cpe-stable-backport: Backported in 6.12.24" | ||
12709 | |||
12710 | # CVE-2025-37860 needs backporting (fixed from 6.15) | ||
12711 | |||
12712 | CVE_STATUS[CVE-2025-37861] = "cpe-stable-backport: Backported in 6.12.24" | ||
12713 | |||
12714 | CVE_STATUS[CVE-2025-37862] = "cpe-stable-backport: Backported in 6.12.24" | ||
12715 | |||
12716 | CVE_STATUS[CVE-2025-37863] = "cpe-stable-backport: Backported in 6.12.25" | ||
12717 | |||
12718 | CVE_STATUS[CVE-2025-37864] = "cpe-stable-backport: Backported in 6.12.25" | ||
12719 | |||
12720 | CVE_STATUS[CVE-2025-37865] = "cpe-stable-backport: Backported in 6.12.25" | ||
12721 | |||
12722 | CVE_STATUS[CVE-2025-37866] = "fixed-version: only affects 6.14 onwards" | ||
12723 | |||
12724 | CVE_STATUS[CVE-2025-37867] = "cpe-stable-backport: Backported in 6.12.25" | ||
12725 | |||
12726 | CVE_STATUS[CVE-2025-37868] = "cpe-stable-backport: Backported in 6.12.25" | ||
12727 | |||
12728 | CVE_STATUS[CVE-2025-37869] = "cpe-stable-backport: Backported in 6.12.25" | ||
12729 | |||
12730 | CVE_STATUS[CVE-2025-37870] = "cpe-stable-backport: Backported in 6.12.25" | ||
12731 | |||
12732 | CVE_STATUS[CVE-2025-37871] = "cpe-stable-backport: Backported in 6.12.25" | ||
12733 | |||
12734 | CVE_STATUS[CVE-2025-37872] = "cpe-stable-backport: Backported in 6.12.25" | ||
12735 | |||
12736 | CVE_STATUS[CVE-2025-37873] = "cpe-stable-backport: Backported in 6.12.25" | ||
12737 | |||
12738 | CVE_STATUS[CVE-2025-37874] = "cpe-stable-backport: Backported in 6.12.25" | ||
12739 | |||
12740 | CVE_STATUS[CVE-2025-37875] = "cpe-stable-backport: Backported in 6.12.25" | ||
12741 | |||
12742 | CVE_STATUS[CVE-2025-37876] = "cpe-stable-backport: Backported in 6.12.26" | ||
12743 | |||
12744 | CVE_STATUS[CVE-2025-37877] = "cpe-stable-backport: Backported in 6.12.26" | ||
12745 | |||
12746 | CVE_STATUS[CVE-2025-37878] = "cpe-stable-backport: Backported in 6.12.26" | ||
12747 | |||
12748 | CVE_STATUS[CVE-2025-37879] = "cpe-stable-backport: Backported in 6.12.26" | ||
12749 | |||
12750 | # CVE-2025-37880 needs backporting (fixed from 6.15) | ||
12751 | |||
12752 | CVE_STATUS[CVE-2025-37881] = "cpe-stable-backport: Backported in 6.12.26" | ||
12753 | |||
12754 | CVE_STATUS[CVE-2025-37882] = "cpe-stable-backport: Backported in 6.12.26" | ||
12755 | |||
12756 | CVE_STATUS[CVE-2025-37883] = "cpe-stable-backport: Backported in 6.12.26" | ||
12757 | |||
12758 | CVE_STATUS[CVE-2025-37884] = "cpe-stable-backport: Backported in 6.12.26" | ||
12759 | |||
12760 | CVE_STATUS[CVE-2025-37885] = "cpe-stable-backport: Backported in 6.12.26" | ||
12761 | |||
12762 | CVE_STATUS[CVE-2025-37886] = "cpe-stable-backport: Backported in 6.12.26" | ||
12763 | |||
12764 | CVE_STATUS[CVE-2025-37887] = "cpe-stable-backport: Backported in 6.12.26" | ||
12765 | |||
12766 | CVE_STATUS[CVE-2025-37888] = "cpe-stable-backport: Backported in 6.12.26" | ||
12767 | |||
12768 | CVE_STATUS[CVE-2025-37889] = "cpe-stable-backport: Backported in 6.12.20" | ||
12769 | |||
12770 | CVE_STATUS[CVE-2025-37890] = "cpe-stable-backport: Backported in 6.12.28" | ||
12771 | |||
12772 | CVE_STATUS[CVE-2025-37891] = "cpe-stable-backport: Backported in 6.12.28" | ||
12773 | |||
12774 | CVE_STATUS[CVE-2025-37892] = "cpe-stable-backport: Backported in 6.12.24" | ||
12775 | |||
12776 | CVE_STATUS[CVE-2025-37893] = "cpe-stable-backport: Backported in 6.12.23" | ||
12777 | |||
12778 | CVE_STATUS[CVE-2025-37894] = "cpe-stable-backport: Backported in 6.12.28" | ||
12779 | |||
12780 | CVE_STATUS[CVE-2025-37895] = "cpe-stable-backport: Backported in 6.12.28" | ||
12781 | |||
12782 | CVE_STATUS[CVE-2025-37896] = "fixed-version: only affects 6.14 onwards" | ||
12783 | |||
12784 | CVE_STATUS[CVE-2025-37897] = "cpe-stable-backport: Backported in 6.12.28" | ||
12785 | |||
12786 | CVE_STATUS[CVE-2025-37898] = "fixed-version: only affects 6.13 onwards" | ||
12787 | |||
12788 | CVE_STATUS[CVE-2025-37899] = "cpe-stable-backport: Backported in 6.12.28" | ||
12789 | |||
12790 | CVE_STATUS[CVE-2025-37900] = "cpe-stable-backport: Backported in 6.12.28" | ||
12791 | |||
12792 | CVE_STATUS[CVE-2025-37901] = "cpe-stable-backport: Backported in 6.12.28" | ||
12793 | |||
12794 | CVE_STATUS[CVE-2025-37903] = "cpe-stable-backport: Backported in 6.12.28" | ||
12795 | |||
12796 | CVE_STATUS[CVE-2025-37904] = "fixed-version: only affects 6.13 onwards" | ||
12797 | |||
12798 | CVE_STATUS[CVE-2025-37905] = "cpe-stable-backport: Backported in 6.12.28" | ||
12799 | |||
12800 | # CVE-2025-37906 needs backporting (fixed from 6.15) | ||
12801 | |||
12802 | CVE_STATUS[CVE-2025-37907] = "cpe-stable-backport: Backported in 6.12.28" | ||
12803 | |||
12804 | CVE_STATUS[CVE-2025-37908] = "cpe-stable-backport: Backported in 6.12.28" | ||
12805 | |||
12806 | CVE_STATUS[CVE-2025-37909] = "cpe-stable-backport: Backported in 6.12.28" | ||
12807 | |||
12808 | CVE_STATUS[CVE-2025-37910] = "cpe-stable-backport: Backported in 6.12.28" | ||
12809 | |||
12810 | CVE_STATUS[CVE-2025-37911] = "cpe-stable-backport: Backported in 6.12.28" | ||
12811 | |||
12812 | CVE_STATUS[CVE-2025-37912] = "cpe-stable-backport: Backported in 6.12.28" | ||
12813 | |||
12814 | CVE_STATUS[CVE-2025-37913] = "cpe-stable-backport: Backported in 6.12.28" | ||
12815 | |||
12816 | CVE_STATUS[CVE-2025-37914] = "cpe-stable-backport: Backported in 6.12.28" | ||
12817 | |||
12818 | CVE_STATUS[CVE-2025-37915] = "cpe-stable-backport: Backported in 6.12.28" | ||
12819 | |||
12820 | CVE_STATUS[CVE-2025-37916] = "cpe-stable-backport: Backported in 6.12.28" | ||
12821 | |||
12822 | CVE_STATUS[CVE-2025-37917] = "cpe-stable-backport: Backported in 6.12.28" | ||
12823 | |||
12824 | CVE_STATUS[CVE-2025-37918] = "cpe-stable-backport: Backported in 6.12.28" | ||
12825 | |||
12826 | CVE_STATUS[CVE-2025-37919] = "cpe-stable-backport: Backported in 6.12.28" | ||
12827 | |||
12828 | CVE_STATUS[CVE-2025-37920] = "cpe-stable-backport: Backported in 6.12.28" | ||
12829 | |||
12830 | CVE_STATUS[CVE-2025-37921] = "cpe-stable-backport: Backported in 6.12.28" | ||
12831 | |||
12832 | CVE_STATUS[CVE-2025-37922] = "cpe-stable-backport: Backported in 6.12.28" | ||
12833 | |||
12834 | CVE_STATUS[CVE-2025-37923] = "cpe-stable-backport: Backported in 6.12.28" | ||
12835 | |||
12836 | CVE_STATUS[CVE-2025-37924] = "cpe-stable-backport: Backported in 6.12.28" | ||
12837 | |||
12838 | # CVE-2025-37925 needs backporting (fixed from 6.15) | ||
12839 | |||
12840 | CVE_STATUS[CVE-2025-37926] = "cpe-stable-backport: Backported in 6.12.28" | ||
12841 | |||
12842 | CVE_STATUS[CVE-2025-37927] = "cpe-stable-backport: Backported in 6.12.28" | ||
12843 | |||
12844 | CVE_STATUS[CVE-2025-37928] = "cpe-stable-backport: Backported in 6.12.28" | ||
12845 | |||
12846 | CVE_STATUS[CVE-2025-37929] = "cpe-stable-backport: Backported in 6.12.28" | ||
12847 | |||
12848 | CVE_STATUS[CVE-2025-37930] = "cpe-stable-backport: Backported in 6.12.28" | ||
12849 | |||
12850 | CVE_STATUS[CVE-2025-37931] = "cpe-stable-backport: Backported in 6.12.28" | ||
12851 | |||
12852 | CVE_STATUS[CVE-2025-37932] = "cpe-stable-backport: Backported in 6.12.28" | ||
12853 | |||
12854 | CVE_STATUS[CVE-2025-37933] = "cpe-stable-backport: Backported in 6.12.28" | ||
12855 | |||
12856 | CVE_STATUS[CVE-2025-37934] = "cpe-stable-backport: Backported in 6.12.28" | ||
12857 | |||
12858 | CVE_STATUS[CVE-2025-37935] = "cpe-stable-backport: Backported in 6.12.28" | ||
12859 | |||
12860 | CVE_STATUS[CVE-2025-37936] = "cpe-stable-backport: Backported in 6.12.28" | ||
12861 | |||
12862 | CVE_STATUS[CVE-2025-37937] = "cpe-stable-backport: Backported in 6.12.23" | ||
12863 | |||
12864 | CVE_STATUS[CVE-2025-37938] = "cpe-stable-backport: Backported in 6.12.26" | ||
12865 | |||
12866 | CVE_STATUS[CVE-2025-37939] = "fixed-version: only affects 6.13 onwards" | ||
12867 | |||
12868 | CVE_STATUS[CVE-2025-37940] = "cpe-stable-backport: Backported in 6.12.24" | ||
12869 | |||
12870 | CVE_STATUS[CVE-2025-37941] = "cpe-stable-backport: Backported in 6.12.24" | ||
12871 | |||
12872 | CVE_STATUS[CVE-2025-37942] = "cpe-stable-backport: Backported in 6.12.24" | ||
12873 | |||
12874 | CVE_STATUS[CVE-2025-37943] = "cpe-stable-backport: Backported in 6.12.24" | ||
12875 | |||
12876 | CVE_STATUS[CVE-2025-37944] = "cpe-stable-backport: Backported in 6.12.25" | ||
12877 | |||
12878 | CVE_STATUS[CVE-2025-37945] = "cpe-stable-backport: Backported in 6.12.24" | ||
12879 | |||
12880 | CVE_STATUS[CVE-2025-37946] = "cpe-stable-backport: Backported in 6.12.29" | ||
12881 | |||
12882 | CVE_STATUS[CVE-2025-37947] = "cpe-stable-backport: Backported in 6.12.29" | ||
12883 | |||
12884 | CVE_STATUS[CVE-2025-37948] = "cpe-stable-backport: Backported in 6.12.29" | ||
12885 | |||
12886 | CVE_STATUS[CVE-2025-37949] = "cpe-stable-backport: Backported in 6.12.29" | ||
12887 | |||
12888 | CVE_STATUS[CVE-2025-37950] = "fixed-version: only affects 6.14 onwards" | ||
12889 | |||
12890 | CVE_STATUS[CVE-2025-37951] = "cpe-stable-backport: Backported in 6.12.29" | ||
12891 | |||
12892 | CVE_STATUS[CVE-2025-37952] = "cpe-stable-backport: Backported in 6.12.29" | ||
12893 | |||
12894 | CVE_STATUS[CVE-2025-37953] = "cpe-stable-backport: Backported in 6.12.29" | ||
12895 | |||
12896 | CVE_STATUS[CVE-2025-37954] = "cpe-stable-backport: Backported in 6.12.29" | ||
12897 | |||
12898 | CVE_STATUS[CVE-2025-37955] = "cpe-stable-backport: Backported in 6.12.29" | ||
12899 | |||
12900 | CVE_STATUS[CVE-2025-37956] = "cpe-stable-backport: Backported in 6.12.29" | ||
12901 | |||
12902 | CVE_STATUS[CVE-2025-37957] = "cpe-stable-backport: Backported in 6.12.29" | ||
12903 | |||
12904 | CVE_STATUS[CVE-2025-37958] = "cpe-stable-backport: Backported in 6.12.29" | ||
12905 | |||
12906 | CVE_STATUS[CVE-2025-37959] = "cpe-stable-backport: Backported in 6.12.29" | ||
12907 | |||
12908 | CVE_STATUS[CVE-2025-37960] = "cpe-stable-backport: Backported in 6.12.29" | ||
12909 | |||
12910 | CVE_STATUS[CVE-2025-37961] = "cpe-stable-backport: Backported in 6.12.29" | ||
12911 | |||
12912 | CVE_STATUS[CVE-2025-37962] = "cpe-stable-backport: Backported in 6.12.29" | ||
12913 | |||
12914 | CVE_STATUS[CVE-2025-37963] = "cpe-stable-backport: Backported in 6.12.29" | ||
12915 | |||
12916 | CVE_STATUS[CVE-2025-37964] = "cpe-stable-backport: Backported in 6.12.29" | ||
12917 | |||
12918 | CVE_STATUS[CVE-2025-37965] = "cpe-stable-backport: Backported in 6.12.29" | ||
12919 | |||
12920 | CVE_STATUS[CVE-2025-37966] = "fixed-version: only affects 6.13 onwards" | ||
12921 | |||
12922 | CVE_STATUS[CVE-2025-37967] = "cpe-stable-backport: Backported in 6.12.30" | ||
12923 | |||
12924 | CVE_STATUS[CVE-2025-37968] = "cpe-stable-backport: Backported in 6.12.30" | ||
12925 | |||
12926 | CVE_STATUS[CVE-2025-37969] = "cpe-stable-backport: Backported in 6.12.29" | ||
12927 | |||
12928 | CVE_STATUS[CVE-2025-37970] = "cpe-stable-backport: Backported in 6.12.29" | ||
12929 | |||
12930 | CVE_STATUS[CVE-2025-37971] = "cpe-stable-backport: Backported in 6.12.29" | ||
12931 | |||
12932 | CVE_STATUS[CVE-2025-37972] = "cpe-stable-backport: Backported in 6.12.29" | ||
12933 | |||
12934 | CVE_STATUS[CVE-2025-37973] = "cpe-stable-backport: Backported in 6.12.29" | ||
12935 | |||
12936 | CVE_STATUS[CVE-2025-37974] = "cpe-stable-backport: Backported in 6.12.29" | ||
12937 | |||
12938 | CVE_STATUS[CVE-2025-37975] = "cpe-stable-backport: Backported in 6.12.25" | ||
12939 | |||
12940 | # CVE-2025-37976 has no known resolution | ||
12941 | |||
12942 | CVE_STATUS[CVE-2025-37977] = "cpe-stable-backport: Backported in 6.12.26" | ||
12943 | |||
12944 | CVE_STATUS[CVE-2025-37978] = "cpe-stable-backport: Backported in 6.12.25" | ||
12945 | |||
12946 | CVE_STATUS[CVE-2025-37979] = "cpe-stable-backport: Backported in 6.12.25" | ||
12947 | |||
12948 | CVE_STATUS[CVE-2025-37980] = "cpe-stable-backport: Backported in 6.12.25" | ||
12949 | |||
12950 | CVE_STATUS[CVE-2025-37981] = "cpe-stable-backport: Backported in 6.12.25" | ||
12951 | |||
12952 | CVE_STATUS[CVE-2025-37982] = "cpe-stable-backport: Backported in 6.12.25" | ||
12953 | |||
12954 | CVE_STATUS[CVE-2025-37983] = "cpe-stable-backport: Backported in 6.12.26" | ||
12955 | |||
12956 | # CVE-2025-37984 needs backporting (fixed from 6.15) | ||
12957 | |||
12958 | CVE_STATUS[CVE-2025-37985] = "cpe-stable-backport: Backported in 6.12.26" | ||
12959 | |||
12960 | CVE_STATUS[CVE-2025-37986] = "cpe-stable-backport: Backported in 6.12.26" | ||
12961 | |||
12962 | CVE_STATUS[CVE-2025-37987] = "cpe-stable-backport: Backported in 6.12.26" | ||
12963 | |||
12964 | CVE_STATUS[CVE-2025-37988] = "cpe-stable-backport: Backported in 6.12.26" | ||
12965 | |||
12966 | CVE_STATUS[CVE-2025-37989] = "cpe-stable-backport: Backported in 6.12.26" | ||
12967 | |||
12968 | CVE_STATUS[CVE-2025-37990] = "cpe-stable-backport: Backported in 6.12.28" | ||
12969 | |||
12970 | CVE_STATUS[CVE-2025-37991] = "cpe-stable-backport: Backported in 6.12.28" | ||
12971 | |||
12972 | CVE_STATUS[CVE-2025-37992] = "cpe-stable-backport: Backported in 6.12.30" | ||
12973 | |||
12974 | CVE_STATUS[CVE-2025-37993] = "cpe-stable-backport: Backported in 6.12.29" | ||
12975 | |||
12976 | CVE_STATUS[CVE-2025-37994] = "cpe-stable-backport: Backported in 6.12.29" | ||
12977 | |||
12978 | CVE_STATUS[CVE-2025-37995] = "cpe-stable-backport: Backported in 6.12.29" | ||
12979 | |||
12980 | CVE_STATUS[CVE-2025-37996] = "fixed-version: only affects 6.14 onwards" | ||
12981 | |||
12982 | CVE_STATUS[CVE-2025-37997] = "cpe-stable-backport: Backported in 6.12.29" | ||
12983 | |||
12984 | CVE_STATUS[CVE-2025-37998] = "cpe-stable-backport: Backported in 6.12.29" | ||
12985 | |||
12986 | CVE_STATUS[CVE-2025-37999] = "cpe-stable-backport: Backported in 6.12.29" | ||
12987 | |||
12988 | CVE_STATUS[CVE-2025-38049] = "cpe-stable-backport: Backported in 6.12.23" | ||
12989 | |||
12990 | # CVE-2025-38104 needs backporting (fixed from 6.15) | ||
12991 | |||
12992 | CVE_STATUS[CVE-2025-38152] = "cpe-stable-backport: Backported in 6.12.23" | ||
12993 | |||
12994 | CVE_STATUS[CVE-2025-38240] = "cpe-stable-backport: Backported in 6.12.23" | ||
12995 | |||
12996 | CVE_STATUS[CVE-2025-38479] = "cpe-stable-backport: Backported in 6.12.23" | ||
12997 | |||
12998 | CVE_STATUS[CVE-2025-38575] = "cpe-stable-backport: Backported in 6.12.23" | ||
12999 | |||
13000 | CVE_STATUS[CVE-2025-38637] = "cpe-stable-backport: Backported in 6.12.23" | ||
13001 | |||
13002 | CVE_STATUS[CVE-2025-39688] = "cpe-stable-backport: Backported in 6.12.23" | ||
13003 | |||
13004 | CVE_STATUS[CVE-2025-39728] = "cpe-stable-backport: Backported in 6.12.23" | ||
13005 | |||
13006 | CVE_STATUS[CVE-2025-39735] = "cpe-stable-backport: Backported in 6.12.23" | ||
13007 | |||
13008 | CVE_STATUS[CVE-2025-39755] = "fixed-version: only affects 6.13 onwards" | ||
13009 | |||
13010 | CVE_STATUS[CVE-2025-39778] = "cpe-stable-backport: Backported in 6.12.23" | ||
13011 | |||
13012 | CVE_STATUS[CVE-2025-39930] = "fixed-version: only affects 6.14 onwards" | ||
13013 | |||
13014 | CVE_STATUS[CVE-2025-39989] = "cpe-stable-backport: Backported in 6.12.23" | ||
13015 | |||
13016 | # CVE-2025-40014 needs backporting (fixed from 6.15) | ||
13017 | |||
13018 | CVE_STATUS[CVE-2025-40114] = "cpe-stable-backport: Backported in 6.12.23" | ||
13019 | |||
13020 | # CVE-2025-40325 needs backporting (fixed from 6.15) | ||
13021 | |||
13022 | # CVE-2025-40364 has no known resolution | ||
13023 | |||
diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc deleted file mode 100644 index 0e42cea24a..0000000000 --- a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc +++ /dev/null | |||
@@ -1,5384 +0,0 @@ | |||
1 | |||
2 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. | ||
3 | # Generated at 2024-03-19 21:27:37.303325+00:00 for version 6.6.22 | ||
4 | |||
5 | python check_kernel_cve_status_version() { | ||
6 | this_version = "6.6.22" | ||
7 | kernel_version = d.getVar("LINUX_VERSION") | ||
8 | if kernel_version != this_version: | ||
9 | bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) | ||
10 | } | ||
11 | do_cve_check[prefuncs] += "check_kernel_cve_status_version" | ||
12 | |||
13 | CVE_STATUS[CVE-2003-1604] = "fixed-version: Fixed from version 2.6.12rc2" | ||
14 | |||
15 | CVE_STATUS[CVE-2004-0230] = "fixed-version: Fixed from version 3.6rc1" | ||
16 | |||
17 | # CVE-2005-3660 has no known resolution | ||
18 | |||
19 | CVE_STATUS[CVE-2006-3635] = "fixed-version: Fixed from version 2.6.26rc5" | ||
20 | |||
21 | CVE_STATUS[CVE-2006-5331] = "fixed-version: Fixed from version 2.6.19rc3" | ||
22 | |||
23 | CVE_STATUS[CVE-2006-6128] = "fixed-version: Fixed from version 2.6.19rc2" | ||
24 | |||
25 | # CVE-2007-3719 has no known resolution | ||
26 | |||
27 | CVE_STATUS[CVE-2007-4774] = "fixed-version: Fixed from version 2.6.12rc2" | ||
28 | |||
29 | CVE_STATUS[CVE-2007-6761] = "fixed-version: Fixed from version 2.6.24rc6" | ||
30 | |||
31 | CVE_STATUS[CVE-2007-6762] = "fixed-version: Fixed from version 2.6.20rc5" | ||
32 | |||
33 | # CVE-2008-2544 has no known resolution | ||
34 | |||
35 | # CVE-2008-4609 has no known resolution | ||
36 | |||
37 | CVE_STATUS[CVE-2008-7316] = "fixed-version: Fixed from version 2.6.25rc1" | ||
38 | |||
39 | CVE_STATUS[CVE-2009-2692] = "fixed-version: Fixed from version 2.6.31rc6" | ||
40 | |||
41 | CVE_STATUS[CVE-2010-0008] = "fixed-version: Fixed from version 2.6.23rc9" | ||
42 | |||
43 | CVE_STATUS[CVE-2010-3432] = "fixed-version: Fixed from version 2.6.36rc5" | ||
44 | |||
45 | # CVE-2010-4563 has no known resolution | ||
46 | |||
47 | CVE_STATUS[CVE-2010-4648] = "fixed-version: Fixed from version 2.6.37rc6" | ||
48 | |||
49 | CVE_STATUS[CVE-2010-5313] = "fixed-version: Fixed from version 2.6.38rc1" | ||
50 | |||
51 | # CVE-2010-5321 has no known resolution | ||
52 | |||
53 | CVE_STATUS[CVE-2010-5328] = "fixed-version: Fixed from version 2.6.35rc1" | ||
54 | |||
55 | CVE_STATUS[CVE-2010-5329] = "fixed-version: Fixed from version 2.6.39rc1" | ||
56 | |||
57 | CVE_STATUS[CVE-2010-5331] = "fixed-version: Fixed from version 2.6.34rc7" | ||
58 | |||
59 | CVE_STATUS[CVE-2010-5332] = "fixed-version: Fixed from version 2.6.37rc1" | ||
60 | |||
61 | CVE_STATUS[CVE-2011-4098] = "fixed-version: Fixed from version 3.2rc1" | ||
62 | |||
63 | CVE_STATUS[CVE-2011-4131] = "fixed-version: Fixed from version 3.3rc1" | ||
64 | |||
65 | CVE_STATUS[CVE-2011-4915] = "fixed-version: Fixed from version 3.2rc1" | ||
66 | |||
67 | # CVE-2011-4916 has no known resolution | ||
68 | |||
69 | # CVE-2011-4917 has no known resolution | ||
70 | |||
71 | CVE_STATUS[CVE-2011-5321] = "fixed-version: Fixed from version 3.2rc1" | ||
72 | |||
73 | CVE_STATUS[CVE-2011-5327] = "fixed-version: Fixed from version 3.1rc1" | ||
74 | |||
75 | CVE_STATUS[CVE-2012-0957] = "fixed-version: Fixed from version 3.7rc2" | ||
76 | |||
77 | CVE_STATUS[CVE-2012-2119] = "fixed-version: Fixed from version 3.5rc1" | ||
78 | |||
79 | CVE_STATUS[CVE-2012-2136] = "fixed-version: Fixed from version 3.5rc1" | ||
80 | |||
81 | CVE_STATUS[CVE-2012-2137] = "fixed-version: Fixed from version 3.5rc2" | ||
82 | |||
83 | CVE_STATUS[CVE-2012-2313] = "fixed-version: Fixed from version 3.4rc6" | ||
84 | |||
85 | CVE_STATUS[CVE-2012-2319] = "fixed-version: Fixed from version 3.4rc6" | ||
86 | |||
87 | CVE_STATUS[CVE-2012-2372] = "fixed-version: Fixed from version 3.13rc4" | ||
88 | |||
89 | CVE_STATUS[CVE-2012-2375] = "fixed-version: Fixed from version 3.4rc1" | ||
90 | |||
91 | CVE_STATUS[CVE-2012-2390] = "fixed-version: Fixed from version 3.5rc1" | ||
92 | |||
93 | CVE_STATUS[CVE-2012-2669] = "fixed-version: Fixed from version 3.5rc4" | ||
94 | |||
95 | CVE_STATUS[CVE-2012-2744] = "fixed-version: Fixed from version 2.6.34rc1" | ||
96 | |||
97 | CVE_STATUS[CVE-2012-2745] = "fixed-version: Fixed from version 3.4rc3" | ||
98 | |||
99 | CVE_STATUS[CVE-2012-3364] = "fixed-version: Fixed from version 3.5rc6" | ||
100 | |||
101 | CVE_STATUS[CVE-2012-3375] = "fixed-version: Fixed from version 3.4rc5" | ||
102 | |||
103 | CVE_STATUS[CVE-2012-3400] = "fixed-version: Fixed from version 3.5rc5" | ||
104 | |||
105 | CVE_STATUS[CVE-2012-3412] = "fixed-version: Fixed from version 3.6rc2" | ||
106 | |||
107 | CVE_STATUS[CVE-2012-3430] = "fixed-version: Fixed from version 3.6rc1" | ||
108 | |||
109 | CVE_STATUS[CVE-2012-3510] = "fixed-version: Fixed from version 2.6.19rc4" | ||
110 | |||
111 | CVE_STATUS[CVE-2012-3511] = "fixed-version: Fixed from version 3.5rc6" | ||
112 | |||
113 | CVE_STATUS[CVE-2012-3520] = "fixed-version: Fixed from version 3.6rc3" | ||
114 | |||
115 | CVE_STATUS[CVE-2012-3552] = "fixed-version: Fixed from version 3.0rc1" | ||
116 | |||
117 | # Skipping CVE-2012-4220, no affected_versions | ||
118 | |||
119 | # Skipping CVE-2012-4221, no affected_versions | ||
120 | |||
121 | # Skipping CVE-2012-4222, no affected_versions | ||
122 | |||
123 | CVE_STATUS[CVE-2012-4398] = "fixed-version: Fixed from version 3.4rc1" | ||
124 | |||
125 | CVE_STATUS[CVE-2012-4444] = "fixed-version: Fixed from version 2.6.36rc4" | ||
126 | |||
127 | CVE_STATUS[CVE-2012-4461] = "fixed-version: Fixed from version 3.7rc6" | ||
128 | |||
129 | CVE_STATUS[CVE-2012-4467] = "fixed-version: Fixed from version 3.6rc5" | ||
130 | |||
131 | CVE_STATUS[CVE-2012-4508] = "fixed-version: Fixed from version 3.7rc3" | ||
132 | |||
133 | CVE_STATUS[CVE-2012-4530] = "fixed-version: Fixed from version 3.8rc1" | ||
134 | |||
135 | # CVE-2012-4542 has no known resolution | ||
136 | |||
137 | CVE_STATUS[CVE-2012-4565] = "fixed-version: Fixed from version 3.7rc4" | ||
138 | |||
139 | CVE_STATUS[CVE-2012-5374] = "fixed-version: Fixed from version 3.8rc1" | ||
140 | |||
141 | CVE_STATUS[CVE-2012-5375] = "fixed-version: Fixed from version 3.8rc1" | ||
142 | |||
143 | CVE_STATUS[CVE-2012-5517] = "fixed-version: Fixed from version 3.6rc1" | ||
144 | |||
145 | CVE_STATUS[CVE-2012-6536] = "fixed-version: Fixed from version 3.6rc7" | ||
146 | |||
147 | CVE_STATUS[CVE-2012-6537] = "fixed-version: Fixed from version 3.6rc7" | ||
148 | |||
149 | CVE_STATUS[CVE-2012-6538] = "fixed-version: Fixed from version 3.6rc7" | ||
150 | |||
151 | CVE_STATUS[CVE-2012-6539] = "fixed-version: Fixed from version 3.6rc3" | ||
152 | |||
153 | CVE_STATUS[CVE-2012-6540] = "fixed-version: Fixed from version 3.6rc3" | ||
154 | |||
155 | CVE_STATUS[CVE-2012-6541] = "fixed-version: Fixed from version 3.6rc3" | ||
156 | |||
157 | CVE_STATUS[CVE-2012-6542] = "fixed-version: Fixed from version 3.6rc3" | ||
158 | |||
159 | CVE_STATUS[CVE-2012-6543] = "fixed-version: Fixed from version 3.6rc3" | ||
160 | |||
161 | CVE_STATUS[CVE-2012-6544] = "fixed-version: Fixed from version 3.6rc3" | ||
162 | |||
163 | CVE_STATUS[CVE-2012-6545] = "fixed-version: Fixed from version 3.6rc3" | ||
164 | |||
165 | CVE_STATUS[CVE-2012-6546] = "fixed-version: Fixed from version 3.6rc3" | ||
166 | |||
167 | CVE_STATUS[CVE-2012-6547] = "fixed-version: Fixed from version 3.6rc1" | ||
168 | |||
169 | CVE_STATUS[CVE-2012-6548] = "fixed-version: Fixed from version 3.6rc1" | ||
170 | |||
171 | CVE_STATUS[CVE-2012-6549] = "fixed-version: Fixed from version 3.6rc1" | ||
172 | |||
173 | CVE_STATUS[CVE-2012-6638] = "fixed-version: Fixed from version 3.3rc1" | ||
174 | |||
175 | CVE_STATUS[CVE-2012-6647] = "fixed-version: Fixed from version 3.6rc2" | ||
176 | |||
177 | CVE_STATUS[CVE-2012-6657] = "fixed-version: Fixed from version 3.6" | ||
178 | |||
179 | CVE_STATUS[CVE-2012-6689] = "fixed-version: Fixed from version 3.6rc5" | ||
180 | |||
181 | CVE_STATUS[CVE-2012-6701] = "fixed-version: Fixed from version 3.5rc1" | ||
182 | |||
183 | CVE_STATUS[CVE-2012-6703] = "fixed-version: Fixed from version 3.7rc1" | ||
184 | |||
185 | CVE_STATUS[CVE-2012-6704] = "fixed-version: Fixed from version 3.5rc1" | ||
186 | |||
187 | CVE_STATUS[CVE-2012-6712] = "fixed-version: Fixed from version 3.4rc1" | ||
188 | |||
189 | CVE_STATUS[CVE-2013-0160] = "fixed-version: Fixed from version 3.9rc1" | ||
190 | |||
191 | CVE_STATUS[CVE-2013-0190] = "fixed-version: Fixed from version 3.8rc5" | ||
192 | |||
193 | CVE_STATUS[CVE-2013-0216] = "fixed-version: Fixed from version 3.8rc7" | ||
194 | |||
195 | CVE_STATUS[CVE-2013-0217] = "fixed-version: Fixed from version 3.8rc7" | ||
196 | |||
197 | CVE_STATUS[CVE-2013-0228] = "fixed-version: Fixed from version 3.8" | ||
198 | |||
199 | CVE_STATUS[CVE-2013-0231] = "fixed-version: Fixed from version 3.8rc7" | ||
200 | |||
201 | CVE_STATUS[CVE-2013-0268] = "fixed-version: Fixed from version 3.8rc6" | ||
202 | |||
203 | CVE_STATUS[CVE-2013-0290] = "fixed-version: Fixed from version 3.8" | ||
204 | |||
205 | CVE_STATUS[CVE-2013-0309] = "fixed-version: Fixed from version 3.7rc1" | ||
206 | |||
207 | CVE_STATUS[CVE-2013-0310] = "fixed-version: Fixed from version 3.5" | ||
208 | |||
209 | CVE_STATUS[CVE-2013-0311] = "fixed-version: Fixed from version 3.7rc8" | ||
210 | |||
211 | CVE_STATUS[CVE-2013-0313] = "fixed-version: Fixed from version 3.8rc5" | ||
212 | |||
213 | CVE_STATUS[CVE-2013-0343] = "fixed-version: Fixed from version 3.11rc7" | ||
214 | |||
215 | CVE_STATUS[CVE-2013-0349] = "fixed-version: Fixed from version 3.8rc6" | ||
216 | |||
217 | CVE_STATUS[CVE-2013-0871] = "fixed-version: Fixed from version 3.8rc5" | ||
218 | |||
219 | CVE_STATUS[CVE-2013-0913] = "fixed-version: Fixed from version 3.9rc4" | ||
220 | |||
221 | CVE_STATUS[CVE-2013-0914] = "fixed-version: Fixed from version 3.9rc3" | ||
222 | |||
223 | CVE_STATUS[CVE-2013-1059] = "fixed-version: Fixed from version 3.11rc1" | ||
224 | |||
225 | CVE_STATUS[CVE-2013-1763] = "fixed-version: Fixed from version 3.9rc1" | ||
226 | |||
227 | CVE_STATUS[CVE-2013-1767] = "fixed-version: Fixed from version 3.9rc1" | ||
228 | |||
229 | CVE_STATUS[CVE-2013-1772] = "fixed-version: Fixed from version 3.5rc1" | ||
230 | |||
231 | CVE_STATUS[CVE-2013-1773] = "fixed-version: Fixed from version 3.3rc1" | ||
232 | |||
233 | CVE_STATUS[CVE-2013-1774] = "fixed-version: Fixed from version 3.8rc5" | ||
234 | |||
235 | CVE_STATUS[CVE-2013-1792] = "fixed-version: Fixed from version 3.9rc3" | ||
236 | |||
237 | CVE_STATUS[CVE-2013-1796] = "fixed-version: Fixed from version 3.9rc4" | ||
238 | |||
239 | CVE_STATUS[CVE-2013-1797] = "fixed-version: Fixed from version 3.9rc4" | ||
240 | |||
241 | CVE_STATUS[CVE-2013-1798] = "fixed-version: Fixed from version 3.9rc4" | ||
242 | |||
243 | CVE_STATUS[CVE-2013-1819] = "fixed-version: Fixed from version 3.8rc6" | ||
244 | |||
245 | CVE_STATUS[CVE-2013-1826] = "fixed-version: Fixed from version 3.6rc7" | ||
246 | |||
247 | CVE_STATUS[CVE-2013-1827] = "fixed-version: Fixed from version 3.6rc3" | ||
248 | |||
249 | CVE_STATUS[CVE-2013-1828] = "fixed-version: Fixed from version 3.9rc2" | ||
250 | |||
251 | CVE_STATUS[CVE-2013-1848] = "fixed-version: Fixed from version 3.9rc3" | ||
252 | |||
253 | CVE_STATUS[CVE-2013-1858] = "fixed-version: Fixed from version 3.9rc3" | ||
254 | |||
255 | CVE_STATUS[CVE-2013-1860] = "fixed-version: Fixed from version 3.9rc3" | ||
256 | |||
257 | CVE_STATUS[CVE-2013-1928] = "fixed-version: Fixed from version 3.7rc3" | ||
258 | |||
259 | CVE_STATUS[CVE-2013-1929] = "fixed-version: Fixed from version 3.9rc6" | ||
260 | |||
261 | # Skipping CVE-2013-1935, no affected_versions | ||
262 | |||
263 | CVE_STATUS[CVE-2013-1943] = "fixed-version: Fixed from version 3.0rc1" | ||
264 | |||
265 | CVE_STATUS[CVE-2013-1956] = "fixed-version: Fixed from version 3.9rc5" | ||
266 | |||
267 | CVE_STATUS[CVE-2013-1957] = "fixed-version: Fixed from version 3.9rc5" | ||
268 | |||
269 | CVE_STATUS[CVE-2013-1958] = "fixed-version: Fixed from version 3.9rc5" | ||
270 | |||
271 | CVE_STATUS[CVE-2013-1959] = "fixed-version: Fixed from version 3.9rc7" | ||
272 | |||
273 | CVE_STATUS[CVE-2013-1979] = "fixed-version: Fixed from version 3.9rc8" | ||
274 | |||
275 | CVE_STATUS[CVE-2013-2015] = "fixed-version: Fixed from version 3.8rc2" | ||
276 | |||
277 | CVE_STATUS[CVE-2013-2017] = "fixed-version: Fixed from version 2.6.34" | ||
278 | |||
279 | CVE_STATUS[CVE-2013-2058] = "fixed-version: Fixed from version 3.8rc4" | ||
280 | |||
281 | CVE_STATUS[CVE-2013-2094] = "fixed-version: Fixed from version 3.9rc8" | ||
282 | |||
283 | CVE_STATUS[CVE-2013-2128] = "fixed-version: Fixed from version 2.6.34rc4" | ||
284 | |||
285 | CVE_STATUS[CVE-2013-2140] = "fixed-version: Fixed from version 3.11rc3" | ||
286 | |||
287 | CVE_STATUS[CVE-2013-2141] = "fixed-version: Fixed from version 3.9rc8" | ||
288 | |||
289 | CVE_STATUS[CVE-2013-2146] = "fixed-version: Fixed from version 3.9rc8" | ||
290 | |||
291 | CVE_STATUS[CVE-2013-2147] = "fixed-version: Fixed from version 3.12rc3" | ||
292 | |||
293 | CVE_STATUS[CVE-2013-2148] = "fixed-version: Fixed from version 3.11rc1" | ||
294 | |||
295 | CVE_STATUS[CVE-2013-2164] = "fixed-version: Fixed from version 3.11rc1" | ||
296 | |||
297 | # Skipping CVE-2013-2188, no affected_versions | ||
298 | |||
299 | CVE_STATUS[CVE-2013-2206] = "fixed-version: Fixed from version 3.9rc4" | ||
300 | |||
301 | # Skipping CVE-2013-2224, no affected_versions | ||
302 | |||
303 | CVE_STATUS[CVE-2013-2232] = "fixed-version: Fixed from version 3.10" | ||
304 | |||
305 | CVE_STATUS[CVE-2013-2234] = "fixed-version: Fixed from version 3.10" | ||
306 | |||
307 | CVE_STATUS[CVE-2013-2237] = "fixed-version: Fixed from version 3.9rc6" | ||
308 | |||
309 | # Skipping CVE-2013-2239, no affected_versions | ||
310 | |||
311 | CVE_STATUS[CVE-2013-2546] = "fixed-version: Fixed from version 3.9rc1" | ||
312 | |||
313 | CVE_STATUS[CVE-2013-2547] = "fixed-version: Fixed from version 3.9rc1" | ||
314 | |||
315 | CVE_STATUS[CVE-2013-2548] = "fixed-version: Fixed from version 3.9rc1" | ||
316 | |||
317 | CVE_STATUS[CVE-2013-2596] = "fixed-version: Fixed from version 3.9rc8" | ||
318 | |||
319 | CVE_STATUS[CVE-2013-2634] = "fixed-version: Fixed from version 3.9rc3" | ||
320 | |||
321 | CVE_STATUS[CVE-2013-2635] = "fixed-version: Fixed from version 3.9rc3" | ||
322 | |||
323 | CVE_STATUS[CVE-2013-2636] = "fixed-version: Fixed from version 3.9rc3" | ||
324 | |||
325 | CVE_STATUS[CVE-2013-2850] = "fixed-version: Fixed from version 3.10rc4" | ||
326 | |||
327 | CVE_STATUS[CVE-2013-2851] = "fixed-version: Fixed from version 3.11rc1" | ||
328 | |||
329 | CVE_STATUS[CVE-2013-2852] = "fixed-version: Fixed from version 3.10rc6" | ||
330 | |||
331 | CVE_STATUS[CVE-2013-2888] = "fixed-version: Fixed from version 3.12rc1" | ||
332 | |||
333 | CVE_STATUS[CVE-2013-2889] = "fixed-version: Fixed from version 3.12rc2" | ||
334 | |||
335 | CVE_STATUS[CVE-2013-2890] = "fixed-version: Fixed from version 3.12rc2" | ||
336 | |||
337 | CVE_STATUS[CVE-2013-2891] = "fixed-version: Fixed from version 3.12rc2" | ||
338 | |||
339 | CVE_STATUS[CVE-2013-2892] = "fixed-version: Fixed from version 3.12rc1" | ||
340 | |||
341 | CVE_STATUS[CVE-2013-2893] = "fixed-version: Fixed from version 3.12rc2" | ||
342 | |||
343 | CVE_STATUS[CVE-2013-2894] = "fixed-version: Fixed from version 3.12rc2" | ||
344 | |||
345 | CVE_STATUS[CVE-2013-2895] = "fixed-version: Fixed from version 3.12rc2" | ||
346 | |||
347 | CVE_STATUS[CVE-2013-2896] = "fixed-version: Fixed from version 3.12rc1" | ||
348 | |||
349 | CVE_STATUS[CVE-2013-2897] = "fixed-version: Fixed from version 3.12rc2" | ||
350 | |||
351 | CVE_STATUS[CVE-2013-2898] = "fixed-version: Fixed from version 3.12rc1" | ||
352 | |||
353 | CVE_STATUS[CVE-2013-2899] = "fixed-version: Fixed from version 3.12rc1" | ||
354 | |||
355 | CVE_STATUS[CVE-2013-2929] = "fixed-version: Fixed from version 3.13rc1" | ||
356 | |||
357 | CVE_STATUS[CVE-2013-2930] = "fixed-version: Fixed from version 3.13rc1" | ||
358 | |||
359 | CVE_STATUS[CVE-2013-3076] = "fixed-version: Fixed from version 3.9" | ||
360 | |||
361 | CVE_STATUS[CVE-2013-3222] = "fixed-version: Fixed from version 3.9rc7" | ||
362 | |||
363 | CVE_STATUS[CVE-2013-3223] = "fixed-version: Fixed from version 3.9rc7" | ||
364 | |||
365 | CVE_STATUS[CVE-2013-3224] = "fixed-version: Fixed from version 3.9rc7" | ||
366 | |||
367 | CVE_STATUS[CVE-2013-3225] = "fixed-version: Fixed from version 3.9rc7" | ||
368 | |||
369 | CVE_STATUS[CVE-2013-3226] = "fixed-version: Fixed from version 3.9rc7" | ||
370 | |||
371 | CVE_STATUS[CVE-2013-3227] = "fixed-version: Fixed from version 3.9rc7" | ||
372 | |||
373 | CVE_STATUS[CVE-2013-3228] = "fixed-version: Fixed from version 3.9rc7" | ||
374 | |||
375 | CVE_STATUS[CVE-2013-3229] = "fixed-version: Fixed from version 3.9rc7" | ||
376 | |||
377 | CVE_STATUS[CVE-2013-3230] = "fixed-version: Fixed from version 3.9rc7" | ||
378 | |||
379 | CVE_STATUS[CVE-2013-3231] = "fixed-version: Fixed from version 3.9rc7" | ||
380 | |||
381 | CVE_STATUS[CVE-2013-3232] = "fixed-version: Fixed from version 3.9rc7" | ||
382 | |||
383 | CVE_STATUS[CVE-2013-3233] = "fixed-version: Fixed from version 3.9rc7" | ||
384 | |||
385 | CVE_STATUS[CVE-2013-3234] = "fixed-version: Fixed from version 3.9rc7" | ||
386 | |||
387 | CVE_STATUS[CVE-2013-3235] = "fixed-version: Fixed from version 3.9rc7" | ||
388 | |||
389 | CVE_STATUS[CVE-2013-3236] = "fixed-version: Fixed from version 3.9rc7" | ||
390 | |||
391 | CVE_STATUS[CVE-2013-3237] = "fixed-version: Fixed from version 3.9rc7" | ||
392 | |||
393 | CVE_STATUS[CVE-2013-3301] = "fixed-version: Fixed from version 3.9rc7" | ||
394 | |||
395 | CVE_STATUS[CVE-2013-3302] = "fixed-version: Fixed from version 3.8rc3" | ||
396 | |||
397 | CVE_STATUS[CVE-2013-4125] = "fixed-version: Fixed from version 3.11rc1" | ||
398 | |||
399 | CVE_STATUS[CVE-2013-4127] = "fixed-version: Fixed from version 3.11rc1" | ||
400 | |||
401 | CVE_STATUS[CVE-2013-4129] = "fixed-version: Fixed from version 3.11rc1" | ||
402 | |||
403 | CVE_STATUS[CVE-2013-4162] = "fixed-version: Fixed from version 3.11rc1" | ||
404 | |||
405 | CVE_STATUS[CVE-2013-4163] = "fixed-version: Fixed from version 3.11rc1" | ||
406 | |||
407 | CVE_STATUS[CVE-2013-4205] = "fixed-version: Fixed from version 3.11rc5" | ||
408 | |||
409 | CVE_STATUS[CVE-2013-4220] = "fixed-version: Fixed from version 3.10rc4" | ||
410 | |||
411 | CVE_STATUS[CVE-2013-4247] = "fixed-version: Fixed from version 3.10rc5" | ||
412 | |||
413 | CVE_STATUS[CVE-2013-4254] = "fixed-version: Fixed from version 3.11rc6" | ||
414 | |||
415 | CVE_STATUS[CVE-2013-4270] = "fixed-version: Fixed from version 3.12rc4" | ||
416 | |||
417 | CVE_STATUS[CVE-2013-4299] = "fixed-version: Fixed from version 3.12rc6" | ||
418 | |||
419 | CVE_STATUS[CVE-2013-4300] = "fixed-version: Fixed from version 3.11" | ||
420 | |||
421 | CVE_STATUS[CVE-2013-4312] = "fixed-version: Fixed from version 4.5rc1" | ||
422 | |||
423 | CVE_STATUS[CVE-2013-4343] = "fixed-version: Fixed from version 3.12rc2" | ||
424 | |||
425 | CVE_STATUS[CVE-2013-4345] = "fixed-version: Fixed from version 3.13rc2" | ||
426 | |||
427 | CVE_STATUS[CVE-2013-4348] = "fixed-version: Fixed from version 3.13rc1" | ||
428 | |||
429 | CVE_STATUS[CVE-2013-4350] = "fixed-version: Fixed from version 3.12rc2" | ||
430 | |||
431 | CVE_STATUS[CVE-2013-4387] = "fixed-version: Fixed from version 3.12rc4" | ||
432 | |||
433 | CVE_STATUS[CVE-2013-4470] = "fixed-version: Fixed from version 3.12rc7" | ||
434 | |||
435 | CVE_STATUS[CVE-2013-4483] = "fixed-version: Fixed from version 3.10rc1" | ||
436 | |||
437 | CVE_STATUS[CVE-2013-4511] = "fixed-version: Fixed from version 3.12" | ||
438 | |||
439 | CVE_STATUS[CVE-2013-4512] = "fixed-version: Fixed from version 3.12" | ||
440 | |||
441 | CVE_STATUS[CVE-2013-4513] = "fixed-version: Fixed from version 3.12" | ||
442 | |||
443 | CVE_STATUS[CVE-2013-4514] = "fixed-version: Fixed from version 3.12" | ||
444 | |||
445 | CVE_STATUS[CVE-2013-4515] = "fixed-version: Fixed from version 3.12" | ||
446 | |||
447 | CVE_STATUS[CVE-2013-4516] = "fixed-version: Fixed from version 3.12" | ||
448 | |||
449 | CVE_STATUS[CVE-2013-4563] = "fixed-version: Fixed from version 3.13rc1" | ||
450 | |||
451 | CVE_STATUS[CVE-2013-4579] = "fixed-version: Fixed from version 3.13rc7" | ||
452 | |||
453 | CVE_STATUS[CVE-2013-4587] = "fixed-version: Fixed from version 3.13rc4" | ||
454 | |||
455 | CVE_STATUS[CVE-2013-4588] = "fixed-version: Fixed from version 2.6.33rc4" | ||
456 | |||
457 | CVE_STATUS[CVE-2013-4591] = "fixed-version: Fixed from version 3.8rc1" | ||
458 | |||
459 | CVE_STATUS[CVE-2013-4592] = "fixed-version: Fixed from version 3.7rc1" | ||
460 | |||
461 | # Skipping CVE-2013-4737, no affected_versions | ||
462 | |||
463 | # Skipping CVE-2013-4738, no affected_versions | ||
464 | |||
465 | # Skipping CVE-2013-4739, no affected_versions | ||
466 | |||
467 | CVE_STATUS[CVE-2013-5634] = "fixed-version: Fixed from version 3.10rc5" | ||
468 | |||
469 | CVE_STATUS[CVE-2013-6282] = "fixed-version: Fixed from version 3.6rc6" | ||
470 | |||
471 | CVE_STATUS[CVE-2013-6367] = "fixed-version: Fixed from version 3.13rc4" | ||
472 | |||
473 | CVE_STATUS[CVE-2013-6368] = "fixed-version: Fixed from version 3.13rc4" | ||
474 | |||
475 | CVE_STATUS[CVE-2013-6376] = "fixed-version: Fixed from version 3.13rc4" | ||
476 | |||
477 | CVE_STATUS[CVE-2013-6378] = "fixed-version: Fixed from version 3.13rc1" | ||
478 | |||
479 | CVE_STATUS[CVE-2013-6380] = "fixed-version: Fixed from version 3.13rc1" | ||
480 | |||
481 | CVE_STATUS[CVE-2013-6381] = "fixed-version: Fixed from version 3.13rc1" | ||
482 | |||
483 | CVE_STATUS[CVE-2013-6382] = "fixed-version: Fixed from version 3.13rc4" | ||
484 | |||
485 | CVE_STATUS[CVE-2013-6383] = "fixed-version: Fixed from version 3.12" | ||
486 | |||
487 | # Skipping CVE-2013-6392, no affected_versions | ||
488 | |||
489 | CVE_STATUS[CVE-2013-6431] = "fixed-version: Fixed from version 3.12rc1" | ||
490 | |||
491 | CVE_STATUS[CVE-2013-6432] = "fixed-version: Fixed from version 3.13rc1" | ||
492 | |||
493 | CVE_STATUS[CVE-2013-6885] = "fixed-version: Fixed from version 3.14rc1" | ||
494 | |||
495 | CVE_STATUS[CVE-2013-7026] = "fixed-version: Fixed from version 3.13rc1" | ||
496 | |||
497 | CVE_STATUS[CVE-2013-7027] = "fixed-version: Fixed from version 3.12rc7" | ||
498 | |||
499 | CVE_STATUS[CVE-2013-7263] = "fixed-version: Fixed from version 3.13rc1" | ||
500 | |||
501 | CVE_STATUS[CVE-2013-7264] = "fixed-version: Fixed from version 3.13rc1" | ||
502 | |||
503 | CVE_STATUS[CVE-2013-7265] = "fixed-version: Fixed from version 3.13rc1" | ||
504 | |||
505 | CVE_STATUS[CVE-2013-7266] = "fixed-version: Fixed from version 3.13rc1" | ||
506 | |||
507 | CVE_STATUS[CVE-2013-7267] = "fixed-version: Fixed from version 3.13rc1" | ||
508 | |||
509 | CVE_STATUS[CVE-2013-7268] = "fixed-version: Fixed from version 3.13rc1" | ||
510 | |||
511 | CVE_STATUS[CVE-2013-7269] = "fixed-version: Fixed from version 3.13rc1" | ||
512 | |||
513 | CVE_STATUS[CVE-2013-7270] = "fixed-version: Fixed from version 3.13rc1" | ||
514 | |||
515 | CVE_STATUS[CVE-2013-7271] = "fixed-version: Fixed from version 3.13rc1" | ||
516 | |||
517 | CVE_STATUS[CVE-2013-7281] = "fixed-version: Fixed from version 3.13rc1" | ||
518 | |||
519 | CVE_STATUS[CVE-2013-7339] = "fixed-version: Fixed from version 3.13rc7" | ||
520 | |||
521 | CVE_STATUS[CVE-2013-7348] = "fixed-version: Fixed from version 3.13rc1" | ||
522 | |||
523 | CVE_STATUS[CVE-2013-7421] = "fixed-version: Fixed from version 3.19rc1" | ||
524 | |||
525 | # CVE-2013-7445 has no known resolution | ||
526 | |||
527 | CVE_STATUS[CVE-2013-7446] = "fixed-version: Fixed from version 4.4rc4" | ||
528 | |||
529 | CVE_STATUS[CVE-2013-7470] = "fixed-version: Fixed from version 3.12rc7" | ||
530 | |||
531 | CVE_STATUS[CVE-2014-0038] = "fixed-version: Fixed from version 3.14rc1" | ||
532 | |||
533 | CVE_STATUS[CVE-2014-0049] = "fixed-version: Fixed from version 3.14rc5" | ||
534 | |||
535 | CVE_STATUS[CVE-2014-0055] = "fixed-version: Fixed from version 3.14" | ||
536 | |||
537 | CVE_STATUS[CVE-2014-0069] = "fixed-version: Fixed from version 3.14rc4" | ||
538 | |||
539 | CVE_STATUS[CVE-2014-0077] = "fixed-version: Fixed from version 3.14" | ||
540 | |||
541 | CVE_STATUS[CVE-2014-0100] = "fixed-version: Fixed from version 3.14rc7" | ||
542 | |||
543 | CVE_STATUS[CVE-2014-0101] = "fixed-version: Fixed from version 3.14rc6" | ||
544 | |||
545 | CVE_STATUS[CVE-2014-0102] = "fixed-version: Fixed from version 3.14rc6" | ||
546 | |||
547 | CVE_STATUS[CVE-2014-0131] = "fixed-version: Fixed from version 3.14rc7" | ||
548 | |||
549 | CVE_STATUS[CVE-2014-0155] = "fixed-version: Fixed from version 3.15rc2" | ||
550 | |||
551 | CVE_STATUS[CVE-2014-0181] = "fixed-version: Fixed from version 3.15rc5" | ||
552 | |||
553 | CVE_STATUS[CVE-2014-0196] = "fixed-version: Fixed from version 3.15rc5" | ||
554 | |||
555 | CVE_STATUS[CVE-2014-0203] = "fixed-version: Fixed from version 2.6.33rc5" | ||
556 | |||
557 | CVE_STATUS[CVE-2014-0205] = "fixed-version: Fixed from version 2.6.37rc1" | ||
558 | |||
559 | CVE_STATUS[CVE-2014-0206] = "fixed-version: Fixed from version 3.16rc3" | ||
560 | |||
561 | # Skipping CVE-2014-0972, no affected_versions | ||
562 | |||
563 | CVE_STATUS[CVE-2014-1438] = "fixed-version: Fixed from version 3.13" | ||
564 | |||
565 | CVE_STATUS[CVE-2014-1444] = "fixed-version: Fixed from version 3.12rc7" | ||
566 | |||
567 | CVE_STATUS[CVE-2014-1445] = "fixed-version: Fixed from version 3.12rc7" | ||
568 | |||
569 | CVE_STATUS[CVE-2014-1446] = "fixed-version: Fixed from version 3.13rc7" | ||
570 | |||
571 | CVE_STATUS[CVE-2014-1690] = "fixed-version: Fixed from version 3.13rc8" | ||
572 | |||
573 | CVE_STATUS[CVE-2014-1737] = "fixed-version: Fixed from version 3.15rc5" | ||
574 | |||
575 | CVE_STATUS[CVE-2014-1738] = "fixed-version: Fixed from version 3.15rc5" | ||
576 | |||
577 | CVE_STATUS[CVE-2014-1739] = "fixed-version: Fixed from version 3.15rc6" | ||
578 | |||
579 | CVE_STATUS[CVE-2014-1874] = "fixed-version: Fixed from version 3.14rc2" | ||
580 | |||
581 | CVE_STATUS[CVE-2014-2038] = "fixed-version: Fixed from version 3.14rc1" | ||
582 | |||
583 | CVE_STATUS[CVE-2014-2039] = "fixed-version: Fixed from version 3.14rc3" | ||
584 | |||
585 | CVE_STATUS[CVE-2014-2309] = "fixed-version: Fixed from version 3.14rc7" | ||
586 | |||
587 | CVE_STATUS[CVE-2014-2523] = "fixed-version: Fixed from version 3.14rc1" | ||
588 | |||
589 | CVE_STATUS[CVE-2014-2568] = "fixed-version: Fixed from version 3.14" | ||
590 | |||
591 | CVE_STATUS[CVE-2014-2580] = "fixed-version: Fixed from version 3.15rc1" | ||
592 | |||
593 | CVE_STATUS[CVE-2014-2672] = "fixed-version: Fixed from version 3.14rc6" | ||
594 | |||
595 | CVE_STATUS[CVE-2014-2673] = "fixed-version: Fixed from version 3.14rc6" | ||
596 | |||
597 | CVE_STATUS[CVE-2014-2678] = "fixed-version: Fixed from version 3.15rc1" | ||
598 | |||
599 | CVE_STATUS[CVE-2014-2706] = "fixed-version: Fixed from version 3.14rc6" | ||
600 | |||
601 | CVE_STATUS[CVE-2014-2739] = "fixed-version: Fixed from version 3.15rc1" | ||
602 | |||
603 | CVE_STATUS[CVE-2014-2851] = "fixed-version: Fixed from version 3.15rc2" | ||
604 | |||
605 | CVE_STATUS[CVE-2014-2889] = "fixed-version: Fixed from version 3.2rc7" | ||
606 | |||
607 | CVE_STATUS[CVE-2014-3122] = "fixed-version: Fixed from version 3.15rc1" | ||
608 | |||
609 | CVE_STATUS[CVE-2014-3144] = "fixed-version: Fixed from version 3.15rc2" | ||
610 | |||
611 | CVE_STATUS[CVE-2014-3145] = "fixed-version: Fixed from version 3.15rc2" | ||
612 | |||
613 | CVE_STATUS[CVE-2014-3153] = "fixed-version: Fixed from version 3.15" | ||
614 | |||
615 | CVE_STATUS[CVE-2014-3180] = "fixed-version: Fixed from version 3.17rc4" | ||
616 | |||
617 | CVE_STATUS[CVE-2014-3181] = "fixed-version: Fixed from version 3.17rc3" | ||
618 | |||
619 | CVE_STATUS[CVE-2014-3182] = "fixed-version: Fixed from version 3.17rc2" | ||
620 | |||
621 | CVE_STATUS[CVE-2014-3183] = "fixed-version: Fixed from version 3.17rc2" | ||
622 | |||
623 | CVE_STATUS[CVE-2014-3184] = "fixed-version: Fixed from version 3.17rc2" | ||
624 | |||
625 | CVE_STATUS[CVE-2014-3185] = "fixed-version: Fixed from version 3.17rc3" | ||
626 | |||
627 | CVE_STATUS[CVE-2014-3186] = "fixed-version: Fixed from version 3.17rc3" | ||
628 | |||
629 | # Skipping CVE-2014-3519, no affected_versions | ||
630 | |||
631 | CVE_STATUS[CVE-2014-3534] = "fixed-version: Fixed from version 3.16rc7" | ||
632 | |||
633 | CVE_STATUS[CVE-2014-3535] = "fixed-version: Fixed from version 2.6.36rc1" | ||
634 | |||
635 | CVE_STATUS[CVE-2014-3601] = "fixed-version: Fixed from version 3.17rc2" | ||
636 | |||
637 | CVE_STATUS[CVE-2014-3610] = "fixed-version: Fixed from version 3.18rc2" | ||
638 | |||
639 | CVE_STATUS[CVE-2014-3611] = "fixed-version: Fixed from version 3.18rc2" | ||
640 | |||
641 | CVE_STATUS[CVE-2014-3631] = "fixed-version: Fixed from version 3.17rc5" | ||
642 | |||
643 | CVE_STATUS[CVE-2014-3645] = "fixed-version: Fixed from version 3.12rc1" | ||
644 | |||
645 | CVE_STATUS[CVE-2014-3646] = "fixed-version: Fixed from version 3.18rc2" | ||
646 | |||
647 | CVE_STATUS[CVE-2014-3647] = "fixed-version: Fixed from version 3.18rc2" | ||
648 | |||
649 | CVE_STATUS[CVE-2014-3673] = "fixed-version: Fixed from version 3.18rc1" | ||
650 | |||
651 | CVE_STATUS[CVE-2014-3687] = "fixed-version: Fixed from version 3.18rc1" | ||
652 | |||
653 | CVE_STATUS[CVE-2014-3688] = "fixed-version: Fixed from version 3.18rc1" | ||
654 | |||
655 | CVE_STATUS[CVE-2014-3690] = "fixed-version: Fixed from version 3.18rc1" | ||
656 | |||
657 | CVE_STATUS[CVE-2014-3917] = "fixed-version: Fixed from version 3.16rc1" | ||
658 | |||
659 | CVE_STATUS[CVE-2014-3940] = "fixed-version: Fixed from version 3.15" | ||
660 | |||
661 | CVE_STATUS[CVE-2014-4014] = "fixed-version: Fixed from version 3.16rc1" | ||
662 | |||
663 | CVE_STATUS[CVE-2014-4027] = "fixed-version: Fixed from version 3.14rc1" | ||
664 | |||
665 | CVE_STATUS[CVE-2014-4157] = "fixed-version: Fixed from version 3.15rc1" | ||
666 | |||
667 | CVE_STATUS[CVE-2014-4171] = "fixed-version: Fixed from version 3.16rc3" | ||
668 | |||
669 | # Skipping CVE-2014-4322, no affected_versions | ||
670 | |||
671 | # Skipping CVE-2014-4323, no affected_versions | ||
672 | |||
673 | CVE_STATUS[CVE-2014-4508] = "fixed-version: Fixed from version 3.16rc3" | ||
674 | |||
675 | CVE_STATUS[CVE-2014-4608] = "fixed-version: Fixed from version 3.18rc1" | ||
676 | |||
677 | CVE_STATUS[CVE-2014-4611] = "fixed-version: Fixed from version 3.16rc3" | ||
678 | |||
679 | CVE_STATUS[CVE-2014-4652] = "fixed-version: Fixed from version 3.16rc2" | ||
680 | |||
681 | CVE_STATUS[CVE-2014-4653] = "fixed-version: Fixed from version 3.16rc2" | ||
682 | |||
683 | CVE_STATUS[CVE-2014-4654] = "fixed-version: Fixed from version 3.16rc2" | ||
684 | |||
685 | CVE_STATUS[CVE-2014-4655] = "fixed-version: Fixed from version 3.16rc2" | ||
686 | |||
687 | CVE_STATUS[CVE-2014-4656] = "fixed-version: Fixed from version 3.16rc2" | ||
688 | |||
689 | CVE_STATUS[CVE-2014-4667] = "fixed-version: Fixed from version 3.16rc1" | ||
690 | |||
691 | CVE_STATUS[CVE-2014-4699] = "fixed-version: Fixed from version 3.16rc4" | ||
692 | |||
693 | CVE_STATUS[CVE-2014-4943] = "fixed-version: Fixed from version 3.16rc6" | ||
694 | |||
695 | CVE_STATUS[CVE-2014-5045] = "fixed-version: Fixed from version 3.16rc7" | ||
696 | |||
697 | CVE_STATUS[CVE-2014-5077] = "fixed-version: Fixed from version 3.16" | ||
698 | |||
699 | CVE_STATUS[CVE-2014-5206] = "fixed-version: Fixed from version 3.17rc1" | ||
700 | |||
701 | CVE_STATUS[CVE-2014-5207] = "fixed-version: Fixed from version 3.17rc1" | ||
702 | |||
703 | # Skipping CVE-2014-5332, no affected_versions | ||
704 | |||
705 | CVE_STATUS[CVE-2014-5471] = "fixed-version: Fixed from version 3.17rc2" | ||
706 | |||
707 | CVE_STATUS[CVE-2014-5472] = "fixed-version: Fixed from version 3.17rc2" | ||
708 | |||
709 | CVE_STATUS[CVE-2014-6410] = "fixed-version: Fixed from version 3.17rc5" | ||
710 | |||
711 | CVE_STATUS[CVE-2014-6416] = "fixed-version: Fixed from version 3.17rc5" | ||
712 | |||
713 | CVE_STATUS[CVE-2014-6417] = "fixed-version: Fixed from version 3.17rc5" | ||
714 | |||
715 | CVE_STATUS[CVE-2014-6418] = "fixed-version: Fixed from version 3.17rc5" | ||
716 | |||
717 | CVE_STATUS[CVE-2014-7145] = "fixed-version: Fixed from version 3.17rc2" | ||
718 | |||
719 | # Skipping CVE-2014-7207, no affected_versions | ||
720 | |||
721 | CVE_STATUS[CVE-2014-7283] = "fixed-version: Fixed from version 3.15rc1" | ||
722 | |||
723 | CVE_STATUS[CVE-2014-7284] = "fixed-version: Fixed from version 3.15rc7" | ||
724 | |||
725 | CVE_STATUS[CVE-2014-7822] = "fixed-version: Fixed from version 3.16rc1" | ||
726 | |||
727 | CVE_STATUS[CVE-2014-7825] = "fixed-version: Fixed from version 3.18rc3" | ||
728 | |||
729 | CVE_STATUS[CVE-2014-7826] = "fixed-version: Fixed from version 3.18rc3" | ||
730 | |||
731 | CVE_STATUS[CVE-2014-7841] = "fixed-version: Fixed from version 3.18rc5" | ||
732 | |||
733 | CVE_STATUS[CVE-2014-7842] = "fixed-version: Fixed from version 3.18rc1" | ||
734 | |||
735 | CVE_STATUS[CVE-2014-7843] = "fixed-version: Fixed from version 3.18rc5" | ||
736 | |||
737 | CVE_STATUS[CVE-2014-7970] = "fixed-version: Fixed from version 3.18rc1" | ||
738 | |||
739 | CVE_STATUS[CVE-2014-7975] = "fixed-version: Fixed from version 3.18rc1" | ||
740 | |||
741 | CVE_STATUS[CVE-2014-8086] = "fixed-version: Fixed from version 3.18rc3" | ||
742 | |||
743 | CVE_STATUS[CVE-2014-8133] = "fixed-version: Fixed from version 3.19rc1" | ||
744 | |||
745 | CVE_STATUS[CVE-2014-8134] = "fixed-version: Fixed from version 3.19rc1" | ||
746 | |||
747 | CVE_STATUS[CVE-2014-8159] = "fixed-version: Fixed from version 4.0rc7" | ||
748 | |||
749 | CVE_STATUS[CVE-2014-8160] = "fixed-version: Fixed from version 3.18rc1" | ||
750 | |||
751 | CVE_STATUS[CVE-2014-8171] = "fixed-version: Fixed from version 3.12rc1" | ||
752 | |||
753 | CVE_STATUS[CVE-2014-8172] = "fixed-version: Fixed from version 3.13rc1" | ||
754 | |||
755 | CVE_STATUS[CVE-2014-8173] = "fixed-version: Fixed from version 3.13rc5" | ||
756 | |||
757 | # Skipping CVE-2014-8181, no affected_versions | ||
758 | |||
759 | CVE_STATUS[CVE-2014-8369] = "fixed-version: Fixed from version 3.18rc2" | ||
760 | |||
761 | CVE_STATUS[CVE-2014-8480] = "fixed-version: Fixed from version 3.18rc2" | ||
762 | |||
763 | CVE_STATUS[CVE-2014-8481] = "fixed-version: Fixed from version 3.18rc2" | ||
764 | |||
765 | CVE_STATUS[CVE-2014-8559] = "fixed-version: Fixed from version 3.19rc1" | ||
766 | |||
767 | CVE_STATUS[CVE-2014-8709] = "fixed-version: Fixed from version 3.14rc3" | ||
768 | |||
769 | CVE_STATUS[CVE-2014-8884] = "fixed-version: Fixed from version 3.18rc1" | ||
770 | |||
771 | CVE_STATUS[CVE-2014-8989] = "fixed-version: Fixed from version 3.19rc1" | ||
772 | |||
773 | CVE_STATUS[CVE-2014-9090] = "fixed-version: Fixed from version 3.18rc6" | ||
774 | |||
775 | CVE_STATUS[CVE-2014-9322] = "fixed-version: Fixed from version 3.18rc6" | ||
776 | |||
777 | CVE_STATUS[CVE-2014-9419] = "fixed-version: Fixed from version 3.19rc1" | ||
778 | |||
779 | CVE_STATUS[CVE-2014-9420] = "fixed-version: Fixed from version 3.19rc1" | ||
780 | |||
781 | CVE_STATUS[CVE-2014-9428] = "fixed-version: Fixed from version 3.19rc3" | ||
782 | |||
783 | CVE_STATUS[CVE-2014-9529] = "fixed-version: Fixed from version 3.19rc4" | ||
784 | |||
785 | CVE_STATUS[CVE-2014-9584] = "fixed-version: Fixed from version 3.19rc3" | ||
786 | |||
787 | CVE_STATUS[CVE-2014-9585] = "fixed-version: Fixed from version 3.19rc4" | ||
788 | |||
789 | CVE_STATUS[CVE-2014-9644] = "fixed-version: Fixed from version 3.19rc1" | ||
790 | |||
791 | CVE_STATUS[CVE-2014-9683] = "fixed-version: Fixed from version 3.19rc1" | ||
792 | |||
793 | CVE_STATUS[CVE-2014-9710] = "fixed-version: Fixed from version 3.19rc1" | ||
794 | |||
795 | CVE_STATUS[CVE-2014-9715] = "fixed-version: Fixed from version 3.15rc1" | ||
796 | |||
797 | CVE_STATUS[CVE-2014-9717] = "fixed-version: Fixed from version 4.1rc1" | ||
798 | |||
799 | CVE_STATUS[CVE-2014-9728] = "fixed-version: Fixed from version 3.19rc3" | ||
800 | |||
801 | CVE_STATUS[CVE-2014-9729] = "fixed-version: Fixed from version 3.19rc3" | ||
802 | |||
803 | CVE_STATUS[CVE-2014-9730] = "fixed-version: Fixed from version 3.19rc3" | ||
804 | |||
805 | CVE_STATUS[CVE-2014-9731] = "fixed-version: Fixed from version 3.19rc3" | ||
806 | |||
807 | # Skipping CVE-2014-9777, no affected_versions | ||
808 | |||
809 | # Skipping CVE-2014-9778, no affected_versions | ||
810 | |||
811 | # Skipping CVE-2014-9779, no affected_versions | ||
812 | |||
813 | # Skipping CVE-2014-9780, no affected_versions | ||
814 | |||
815 | # Skipping CVE-2014-9781, no affected_versions | ||
816 | |||
817 | # Skipping CVE-2014-9782, no affected_versions | ||
818 | |||
819 | # Skipping CVE-2014-9783, no affected_versions | ||
820 | |||
821 | # Skipping CVE-2014-9784, no affected_versions | ||
822 | |||
823 | # Skipping CVE-2014-9785, no affected_versions | ||
824 | |||
825 | # Skipping CVE-2014-9786, no affected_versions | ||
826 | |||
827 | # Skipping CVE-2014-9787, no affected_versions | ||
828 | |||
829 | # Skipping CVE-2014-9788, no affected_versions | ||
830 | |||
831 | # Skipping CVE-2014-9789, no affected_versions | ||
832 | |||
833 | CVE_STATUS[CVE-2014-9803] = "fixed-version: Fixed from version 3.16rc1" | ||
834 | |||
835 | # Skipping CVE-2014-9863, no affected_versions | ||
836 | |||
837 | # Skipping CVE-2014-9864, no affected_versions | ||
838 | |||
839 | # Skipping CVE-2014-9865, no affected_versions | ||
840 | |||
841 | # Skipping CVE-2014-9866, no affected_versions | ||
842 | |||
843 | # Skipping CVE-2014-9867, no affected_versions | ||
844 | |||
845 | # Skipping CVE-2014-9868, no affected_versions | ||
846 | |||
847 | # Skipping CVE-2014-9869, no affected_versions | ||
848 | |||
849 | CVE_STATUS[CVE-2014-9870] = "fixed-version: Fixed from version 3.11rc1" | ||
850 | |||
851 | # Skipping CVE-2014-9871, no affected_versions | ||
852 | |||
853 | # Skipping CVE-2014-9872, no affected_versions | ||
854 | |||
855 | # Skipping CVE-2014-9873, no affected_versions | ||
856 | |||
857 | # Skipping CVE-2014-9874, no affected_versions | ||
858 | |||
859 | # Skipping CVE-2014-9875, no affected_versions | ||
860 | |||
861 | # Skipping CVE-2014-9876, no affected_versions | ||
862 | |||
863 | # Skipping CVE-2014-9877, no affected_versions | ||
864 | |||
865 | # Skipping CVE-2014-9878, no affected_versions | ||
866 | |||
867 | # Skipping CVE-2014-9879, no affected_versions | ||
868 | |||
869 | # Skipping CVE-2014-9880, no affected_versions | ||
870 | |||
871 | # Skipping CVE-2014-9881, no affected_versions | ||
872 | |||
873 | # Skipping CVE-2014-9882, no affected_versions | ||
874 | |||
875 | # Skipping CVE-2014-9883, no affected_versions | ||
876 | |||
877 | # Skipping CVE-2014-9884, no affected_versions | ||
878 | |||
879 | # Skipping CVE-2014-9885, no affected_versions | ||
880 | |||
881 | # Skipping CVE-2014-9886, no affected_versions | ||
882 | |||
883 | # Skipping CVE-2014-9887, no affected_versions | ||
884 | |||
885 | CVE_STATUS[CVE-2014-9888] = "fixed-version: Fixed from version 3.13rc1" | ||
886 | |||
887 | # Skipping CVE-2014-9889, no affected_versions | ||
888 | |||
889 | # Skipping CVE-2014-9890, no affected_versions | ||
890 | |||
891 | # Skipping CVE-2014-9891, no affected_versions | ||
892 | |||
893 | # Skipping CVE-2014-9892, no affected_versions | ||
894 | |||
895 | # Skipping CVE-2014-9893, no affected_versions | ||
896 | |||
897 | # Skipping CVE-2014-9894, no affected_versions | ||
898 | |||
899 | CVE_STATUS[CVE-2014-9895] = "fixed-version: Fixed from version 3.11rc1" | ||
900 | |||
901 | # Skipping CVE-2014-9896, no affected_versions | ||
902 | |||
903 | # Skipping CVE-2014-9897, no affected_versions | ||
904 | |||
905 | # Skipping CVE-2014-9898, no affected_versions | ||
906 | |||
907 | # Skipping CVE-2014-9899, no affected_versions | ||
908 | |||
909 | # Skipping CVE-2014-9900, no affected_versions | ||
910 | |||
911 | CVE_STATUS[CVE-2014-9903] = "fixed-version: Fixed from version 3.14rc4" | ||
912 | |||
913 | CVE_STATUS[CVE-2014-9904] = "fixed-version: Fixed from version 3.17rc1" | ||
914 | |||
915 | CVE_STATUS[CVE-2014-9914] = "fixed-version: Fixed from version 3.16rc1" | ||
916 | |||
917 | CVE_STATUS[CVE-2014-9922] = "fixed-version: Fixed from version 3.18rc2" | ||
918 | |||
919 | CVE_STATUS[CVE-2014-9940] = "fixed-version: Fixed from version 3.19rc1" | ||
920 | |||
921 | CVE_STATUS[CVE-2015-0239] = "fixed-version: Fixed from version 3.19rc6" | ||
922 | |||
923 | CVE_STATUS[CVE-2015-0274] = "fixed-version: Fixed from version 3.15rc5" | ||
924 | |||
925 | CVE_STATUS[CVE-2015-0275] = "fixed-version: Fixed from version 4.1rc1" | ||
926 | |||
927 | # Skipping CVE-2015-0777, no affected_versions | ||
928 | |||
929 | # Skipping CVE-2015-1328, no affected_versions | ||
930 | |||
931 | CVE_STATUS[CVE-2015-1333] = "fixed-version: Fixed from version 4.2rc5" | ||
932 | |||
933 | CVE_STATUS[CVE-2015-1339] = "fixed-version: Fixed from version 4.4rc5" | ||
934 | |||
935 | CVE_STATUS[CVE-2015-1350] = "fixed-version: Fixed from version 4.9rc1" | ||
936 | |||
937 | CVE_STATUS[CVE-2015-1420] = "fixed-version: Fixed from version 4.1rc7" | ||
938 | |||
939 | CVE_STATUS[CVE-2015-1421] = "fixed-version: Fixed from version 3.19rc7" | ||
940 | |||
941 | CVE_STATUS[CVE-2015-1465] = "fixed-version: Fixed from version 3.19rc7" | ||
942 | |||
943 | CVE_STATUS[CVE-2015-1573] = "fixed-version: Fixed from version 3.19rc5" | ||
944 | |||
945 | CVE_STATUS[CVE-2015-1593] = "fixed-version: Fixed from version 4.0rc1" | ||
946 | |||
947 | CVE_STATUS[CVE-2015-1805] = "fixed-version: Fixed from version 3.16rc1" | ||
948 | |||
949 | CVE_STATUS[CVE-2015-2041] = "fixed-version: Fixed from version 3.19rc7" | ||
950 | |||
951 | CVE_STATUS[CVE-2015-2042] = "fixed-version: Fixed from version 3.19" | ||
952 | |||
953 | CVE_STATUS[CVE-2015-2150] = "fixed-version: Fixed from version 4.0rc4" | ||
954 | |||
955 | CVE_STATUS[CVE-2015-2666] = "fixed-version: Fixed from version 4.0rc1" | ||
956 | |||
957 | CVE_STATUS[CVE-2015-2672] = "fixed-version: Fixed from version 4.0rc3" | ||
958 | |||
959 | CVE_STATUS[CVE-2015-2686] = "fixed-version: Fixed from version 4.0rc6" | ||
960 | |||
961 | CVE_STATUS[CVE-2015-2830] = "fixed-version: Fixed from version 4.0rc3" | ||
962 | |||
963 | # CVE-2015-2877 has no known resolution | ||
964 | |||
965 | CVE_STATUS[CVE-2015-2922] = "fixed-version: Fixed from version 4.0rc7" | ||
966 | |||
967 | CVE_STATUS[CVE-2015-2925] = "fixed-version: Fixed from version 4.3rc1" | ||
968 | |||
969 | CVE_STATUS[CVE-2015-3212] = "fixed-version: Fixed from version 4.2rc1" | ||
970 | |||
971 | CVE_STATUS[CVE-2015-3214] = "fixed-version: Fixed from version 2.6.33rc8" | ||
972 | |||
973 | CVE_STATUS[CVE-2015-3288] = "fixed-version: Fixed from version 4.2rc2" | ||
974 | |||
975 | CVE_STATUS[CVE-2015-3290] = "fixed-version: Fixed from version 4.2rc3" | ||
976 | |||
977 | CVE_STATUS[CVE-2015-3291] = "fixed-version: Fixed from version 4.2rc3" | ||
978 | |||
979 | CVE_STATUS[CVE-2015-3331] = "fixed-version: Fixed from version 4.0rc5" | ||
980 | |||
981 | # Skipping CVE-2015-3332, no affected_versions | ||
982 | |||
983 | CVE_STATUS[CVE-2015-3339] = "fixed-version: Fixed from version 4.1rc1" | ||
984 | |||
985 | CVE_STATUS[CVE-2015-3636] = "fixed-version: Fixed from version 4.1rc2" | ||
986 | |||
987 | CVE_STATUS[CVE-2015-4001] = "fixed-version: Fixed from version 4.1rc7" | ||
988 | |||
989 | CVE_STATUS[CVE-2015-4002] = "fixed-version: Fixed from version 4.1rc7" | ||
990 | |||
991 | CVE_STATUS[CVE-2015-4003] = "fixed-version: Fixed from version 4.1rc7" | ||
992 | |||
993 | CVE_STATUS[CVE-2015-4004] = "fixed-version: Fixed from version 4.3rc1" | ||
994 | |||
995 | CVE_STATUS[CVE-2015-4036] = "fixed-version: Fixed from version 4.0rc1" | ||
996 | |||
997 | CVE_STATUS[CVE-2015-4167] = "fixed-version: Fixed from version 4.0rc1" | ||
998 | |||
999 | CVE_STATUS[CVE-2015-4170] = "fixed-version: Fixed from version 3.13rc5" | ||
1000 | |||
1001 | CVE_STATUS[CVE-2015-4176] = "fixed-version: Fixed from version 4.1rc1" | ||
1002 | |||
1003 | CVE_STATUS[CVE-2015-4177] = "fixed-version: Fixed from version 4.1rc1" | ||
1004 | |||
1005 | CVE_STATUS[CVE-2015-4178] = "fixed-version: Fixed from version 4.1rc1" | ||
1006 | |||
1007 | CVE_STATUS[CVE-2015-4692] = "fixed-version: Fixed from version 4.2rc1" | ||
1008 | |||
1009 | CVE_STATUS[CVE-2015-4700] = "fixed-version: Fixed from version 4.1rc6" | ||
1010 | |||
1011 | CVE_STATUS[CVE-2015-5156] = "fixed-version: Fixed from version 4.2rc7" | ||
1012 | |||
1013 | CVE_STATUS[CVE-2015-5157] = "fixed-version: Fixed from version 4.2rc3" | ||
1014 | |||
1015 | CVE_STATUS[CVE-2015-5257] = "fixed-version: Fixed from version 4.3rc3" | ||
1016 | |||
1017 | CVE_STATUS[CVE-2015-5283] = "fixed-version: Fixed from version 4.3rc3" | ||
1018 | |||
1019 | CVE_STATUS[CVE-2015-5307] = "fixed-version: Fixed from version 4.4rc1" | ||
1020 | |||
1021 | CVE_STATUS[CVE-2015-5327] = "fixed-version: Fixed from version 4.4rc1" | ||
1022 | |||
1023 | CVE_STATUS[CVE-2015-5364] = "fixed-version: Fixed from version 4.1rc7" | ||
1024 | |||
1025 | CVE_STATUS[CVE-2015-5366] = "fixed-version: Fixed from version 4.1rc7" | ||
1026 | |||
1027 | CVE_STATUS[CVE-2015-5697] = "fixed-version: Fixed from version 4.2rc6" | ||
1028 | |||
1029 | CVE_STATUS[CVE-2015-5706] = "fixed-version: Fixed from version 4.1rc3" | ||
1030 | |||
1031 | CVE_STATUS[CVE-2015-5707] = "fixed-version: Fixed from version 4.1rc1" | ||
1032 | |||
1033 | CVE_STATUS[CVE-2015-6252] = "fixed-version: Fixed from version 4.2rc5" | ||
1034 | |||
1035 | CVE_STATUS[CVE-2015-6526] = "fixed-version: Fixed from version 4.1rc1" | ||
1036 | |||
1037 | # CVE-2015-6619 has no known resolution | ||
1038 | |||
1039 | # CVE-2015-6646 has no known resolution | ||
1040 | |||
1041 | CVE_STATUS[CVE-2015-6937] = "fixed-version: Fixed from version 4.3rc1" | ||
1042 | |||
1043 | # Skipping CVE-2015-7312, no affected_versions | ||
1044 | |||
1045 | CVE_STATUS[CVE-2015-7509] = "fixed-version: Fixed from version 3.7rc1" | ||
1046 | |||
1047 | CVE_STATUS[CVE-2015-7513] = "fixed-version: Fixed from version 4.4rc7" | ||
1048 | |||
1049 | CVE_STATUS[CVE-2015-7515] = "fixed-version: Fixed from version 4.4rc6" | ||
1050 | |||
1051 | CVE_STATUS[CVE-2015-7550] = "fixed-version: Fixed from version 4.4rc8" | ||
1052 | |||
1053 | # Skipping CVE-2015-7553, no affected_versions | ||
1054 | |||
1055 | CVE_STATUS[CVE-2015-7566] = "fixed-version: Fixed from version 4.5rc2" | ||
1056 | |||
1057 | CVE_STATUS[CVE-2015-7613] = "fixed-version: Fixed from version 4.3rc4" | ||
1058 | |||
1059 | CVE_STATUS[CVE-2015-7799] = "fixed-version: Fixed from version 4.4rc1" | ||
1060 | |||
1061 | CVE_STATUS[CVE-2015-7833] = "fixed-version: Fixed from version 4.6rc6" | ||
1062 | |||
1063 | # Skipping CVE-2015-7837, no affected_versions | ||
1064 | |||
1065 | CVE_STATUS[CVE-2015-7872] = "fixed-version: Fixed from version 4.3rc7" | ||
1066 | |||
1067 | CVE_STATUS[CVE-2015-7884] = "fixed-version: Fixed from version 4.4rc1" | ||
1068 | |||
1069 | CVE_STATUS[CVE-2015-7885] = "fixed-version: Fixed from version 4.4rc1" | ||
1070 | |||
1071 | CVE_STATUS[CVE-2015-7990] = "fixed-version: Fixed from version 4.4rc4" | ||
1072 | |||
1073 | # Skipping CVE-2015-8019, no affected_versions | ||
1074 | |||
1075 | CVE_STATUS[CVE-2015-8104] = "fixed-version: Fixed from version 4.4rc1" | ||
1076 | |||
1077 | CVE_STATUS[CVE-2015-8215] = "fixed-version: Fixed from version 4.0rc3" | ||
1078 | |||
1079 | CVE_STATUS[CVE-2015-8324] = "fixed-version: Fixed from version 2.6.34rc1" | ||
1080 | |||
1081 | CVE_STATUS[CVE-2015-8374] = "fixed-version: Fixed from version 4.4rc1" | ||
1082 | |||
1083 | CVE_STATUS[CVE-2015-8539] = "fixed-version: Fixed from version 4.4rc3" | ||
1084 | |||
1085 | CVE_STATUS[CVE-2015-8543] = "fixed-version: Fixed from version 4.4rc6" | ||
1086 | |||
1087 | CVE_STATUS[CVE-2015-8550] = "fixed-version: Fixed from version 4.4rc6" | ||
1088 | |||
1089 | CVE_STATUS[CVE-2015-8551] = "fixed-version: Fixed from version 4.4rc6" | ||
1090 | |||
1091 | CVE_STATUS[CVE-2015-8552] = "fixed-version: Fixed from version 4.4rc6" | ||
1092 | |||
1093 | CVE_STATUS[CVE-2015-8553] = "fixed-version: Fixed from version 4.4rc6" | ||
1094 | |||
1095 | CVE_STATUS[CVE-2015-8569] = "fixed-version: Fixed from version 4.4rc6" | ||
1096 | |||
1097 | CVE_STATUS[CVE-2015-8575] = "fixed-version: Fixed from version 4.4rc6" | ||
1098 | |||
1099 | CVE_STATUS[CVE-2015-8660] = "fixed-version: Fixed from version 4.4rc4" | ||
1100 | |||
1101 | CVE_STATUS[CVE-2015-8709] = "fixed-version: Fixed from version 4.10rc1" | ||
1102 | |||
1103 | CVE_STATUS[CVE-2015-8746] = "fixed-version: Fixed from version 4.3rc1" | ||
1104 | |||
1105 | CVE_STATUS[CVE-2015-8767] = "fixed-version: Fixed from version 4.3rc4" | ||
1106 | |||
1107 | CVE_STATUS[CVE-2015-8785] = "fixed-version: Fixed from version 4.4rc5" | ||
1108 | |||
1109 | CVE_STATUS[CVE-2015-8787] = "fixed-version: Fixed from version 4.4rc1" | ||
1110 | |||
1111 | CVE_STATUS[CVE-2015-8812] = "fixed-version: Fixed from version 4.5rc1" | ||
1112 | |||
1113 | CVE_STATUS[CVE-2015-8816] = "fixed-version: Fixed from version 4.4rc6" | ||
1114 | |||
1115 | CVE_STATUS[CVE-2015-8830] = "fixed-version: Fixed from version 4.1rc1" | ||
1116 | |||
1117 | CVE_STATUS[CVE-2015-8839] = "fixed-version: Fixed from version 4.5rc1" | ||
1118 | |||
1119 | CVE_STATUS[CVE-2015-8844] = "fixed-version: Fixed from version 4.4rc3" | ||
1120 | |||
1121 | CVE_STATUS[CVE-2015-8845] = "fixed-version: Fixed from version 4.4rc3" | ||
1122 | |||
1123 | # Skipping CVE-2015-8937, no affected_versions | ||
1124 | |||
1125 | # Skipping CVE-2015-8938, no affected_versions | ||
1126 | |||
1127 | # Skipping CVE-2015-8939, no affected_versions | ||
1128 | |||
1129 | # Skipping CVE-2015-8940, no affected_versions | ||
1130 | |||
1131 | # Skipping CVE-2015-8941, no affected_versions | ||
1132 | |||
1133 | # Skipping CVE-2015-8942, no affected_versions | ||
1134 | |||
1135 | # Skipping CVE-2015-8943, no affected_versions | ||
1136 | |||
1137 | # Skipping CVE-2015-8944, no affected_versions | ||
1138 | |||
1139 | CVE_STATUS[CVE-2015-8950] = "fixed-version: Fixed from version 4.1rc2" | ||
1140 | |||
1141 | CVE_STATUS[CVE-2015-8952] = "fixed-version: Fixed from version 4.6rc1" | ||
1142 | |||
1143 | CVE_STATUS[CVE-2015-8953] = "fixed-version: Fixed from version 4.3" | ||
1144 | |||
1145 | CVE_STATUS[CVE-2015-8955] = "fixed-version: Fixed from version 4.1rc1" | ||
1146 | |||
1147 | CVE_STATUS[CVE-2015-8956] = "fixed-version: Fixed from version 4.2rc1" | ||
1148 | |||
1149 | CVE_STATUS[CVE-2015-8961] = "fixed-version: Fixed from version 4.4rc1" | ||
1150 | |||
1151 | CVE_STATUS[CVE-2015-8962] = "fixed-version: Fixed from version 4.4rc1" | ||
1152 | |||
1153 | CVE_STATUS[CVE-2015-8963] = "fixed-version: Fixed from version 4.4" | ||
1154 | |||
1155 | CVE_STATUS[CVE-2015-8964] = "fixed-version: Fixed from version 4.5rc1" | ||
1156 | |||
1157 | CVE_STATUS[CVE-2015-8966] = "fixed-version: Fixed from version 4.4rc8" | ||
1158 | |||
1159 | CVE_STATUS[CVE-2015-8967] = "fixed-version: Fixed from version 4.0rc1" | ||
1160 | |||
1161 | CVE_STATUS[CVE-2015-8970] = "fixed-version: Fixed from version 4.5rc1" | ||
1162 | |||
1163 | CVE_STATUS[CVE-2015-9004] = "fixed-version: Fixed from version 3.19rc7" | ||
1164 | |||
1165 | CVE_STATUS[CVE-2015-9016] = "fixed-version: Fixed from version 4.3rc1" | ||
1166 | |||
1167 | CVE_STATUS[CVE-2015-9289] = "fixed-version: Fixed from version 4.2rc1" | ||
1168 | |||
1169 | CVE_STATUS[CVE-2016-0617] = "fixed-version: Fixed from version 4.5rc1" | ||
1170 | |||
1171 | CVE_STATUS[CVE-2016-0723] = "fixed-version: Fixed from version 4.5rc2" | ||
1172 | |||
1173 | CVE_STATUS[CVE-2016-0728] = "fixed-version: Fixed from version 4.5rc1" | ||
1174 | |||
1175 | CVE_STATUS[CVE-2016-0758] = "fixed-version: Fixed from version 4.6" | ||
1176 | |||
1177 | # Skipping CVE-2016-0774, no affected_versions | ||
1178 | |||
1179 | CVE_STATUS[CVE-2016-0821] = "fixed-version: Fixed from version 4.3rc1" | ||
1180 | |||
1181 | CVE_STATUS[CVE-2016-0823] = "fixed-version: Fixed from version 4.0rc5" | ||
1182 | |||
1183 | CVE_STATUS[CVE-2016-10044] = "fixed-version: Fixed from version 4.8rc7" | ||
1184 | |||
1185 | CVE_STATUS[CVE-2016-10088] = "fixed-version: Fixed from version 4.10rc1" | ||
1186 | |||
1187 | CVE_STATUS[CVE-2016-10147] = "fixed-version: Fixed from version 4.9" | ||
1188 | |||
1189 | CVE_STATUS[CVE-2016-10150] = "fixed-version: Fixed from version 4.9rc8" | ||
1190 | |||
1191 | CVE_STATUS[CVE-2016-10153] = "fixed-version: Fixed from version 4.10rc1" | ||
1192 | |||
1193 | CVE_STATUS[CVE-2016-10154] = "fixed-version: Fixed from version 4.10rc1" | ||
1194 | |||
1195 | CVE_STATUS[CVE-2016-10200] = "fixed-version: Fixed from version 4.9rc7" | ||
1196 | |||
1197 | CVE_STATUS[CVE-2016-10208] = "fixed-version: Fixed from version 4.10rc1" | ||
1198 | |||
1199 | CVE_STATUS[CVE-2016-10229] = "fixed-version: Fixed from version 4.5rc1" | ||
1200 | |||
1201 | CVE_STATUS[CVE-2016-10318] = "fixed-version: Fixed from version 4.8rc6" | ||
1202 | |||
1203 | CVE_STATUS[CVE-2016-10723] = "fixed-version: Fixed from version 4.19rc1" | ||
1204 | |||
1205 | CVE_STATUS[CVE-2016-10741] = "fixed-version: Fixed from version 4.10rc1" | ||
1206 | |||
1207 | CVE_STATUS[CVE-2016-10764] = "fixed-version: Fixed from version 4.10rc1" | ||
1208 | |||
1209 | CVE_STATUS[CVE-2016-10905] = "fixed-version: Fixed from version 4.8rc1" | ||
1210 | |||
1211 | CVE_STATUS[CVE-2016-10906] = "fixed-version: Fixed from version 4.5rc6" | ||
1212 | |||
1213 | CVE_STATUS[CVE-2016-10907] = "fixed-version: Fixed from version 4.9rc1" | ||
1214 | |||
1215 | CVE_STATUS[CVE-2016-1237] = "fixed-version: Fixed from version 4.7rc5" | ||
1216 | |||
1217 | CVE_STATUS[CVE-2016-1575] = "fixed-version: Fixed from version 4.5rc1" | ||
1218 | |||
1219 | CVE_STATUS[CVE-2016-1576] = "fixed-version: Fixed from version 4.5rc1" | ||
1220 | |||
1221 | CVE_STATUS[CVE-2016-1583] = "fixed-version: Fixed from version 4.7rc3" | ||
1222 | |||
1223 | CVE_STATUS[CVE-2016-2053] = "fixed-version: Fixed from version 4.3rc1" | ||
1224 | |||
1225 | CVE_STATUS[CVE-2016-2069] = "fixed-version: Fixed from version 4.5rc1" | ||
1226 | |||
1227 | CVE_STATUS[CVE-2016-2070] = "fixed-version: Fixed from version 4.4" | ||
1228 | |||
1229 | CVE_STATUS[CVE-2016-2085] = "fixed-version: Fixed from version 4.5rc4" | ||
1230 | |||
1231 | CVE_STATUS[CVE-2016-2117] = "fixed-version: Fixed from version 4.6rc5" | ||
1232 | |||
1233 | CVE_STATUS[CVE-2016-2143] = "fixed-version: Fixed from version 4.5" | ||
1234 | |||
1235 | CVE_STATUS[CVE-2016-2184] = "fixed-version: Fixed from version 4.6rc1" | ||
1236 | |||
1237 | CVE_STATUS[CVE-2016-2185] = "fixed-version: Fixed from version 4.6rc1" | ||
1238 | |||
1239 | CVE_STATUS[CVE-2016-2186] = "fixed-version: Fixed from version 4.6rc1" | ||
1240 | |||
1241 | CVE_STATUS[CVE-2016-2187] = "fixed-version: Fixed from version 4.6rc5" | ||
1242 | |||
1243 | CVE_STATUS[CVE-2016-2188] = "fixed-version: Fixed from version 4.11rc2" | ||
1244 | |||
1245 | CVE_STATUS[CVE-2016-2383] = "fixed-version: Fixed from version 4.5rc4" | ||
1246 | |||
1247 | CVE_STATUS[CVE-2016-2384] = "fixed-version: Fixed from version 4.5rc4" | ||
1248 | |||
1249 | CVE_STATUS[CVE-2016-2543] = "fixed-version: Fixed from version 4.5rc1" | ||
1250 | |||
1251 | CVE_STATUS[CVE-2016-2544] = "fixed-version: Fixed from version 4.5rc1" | ||
1252 | |||
1253 | CVE_STATUS[CVE-2016-2545] = "fixed-version: Fixed from version 4.5rc1" | ||
1254 | |||
1255 | CVE_STATUS[CVE-2016-2546] = "fixed-version: Fixed from version 4.5rc1" | ||
1256 | |||
1257 | CVE_STATUS[CVE-2016-2547] = "fixed-version: Fixed from version 4.5rc1" | ||
1258 | |||
1259 | CVE_STATUS[CVE-2016-2548] = "fixed-version: Fixed from version 4.5rc1" | ||
1260 | |||
1261 | CVE_STATUS[CVE-2016-2549] = "fixed-version: Fixed from version 4.5rc1" | ||
1262 | |||
1263 | CVE_STATUS[CVE-2016-2550] = "fixed-version: Fixed from version 4.5rc4" | ||
1264 | |||
1265 | CVE_STATUS[CVE-2016-2782] = "fixed-version: Fixed from version 4.5rc2" | ||
1266 | |||
1267 | CVE_STATUS[CVE-2016-2847] = "fixed-version: Fixed from version 4.5rc1" | ||
1268 | |||
1269 | # Skipping CVE-2016-2853, no affected_versions | ||
1270 | |||
1271 | # Skipping CVE-2016-2854, no affected_versions | ||
1272 | |||
1273 | CVE_STATUS[CVE-2016-3044] = "fixed-version: Fixed from version 4.5" | ||
1274 | |||
1275 | CVE_STATUS[CVE-2016-3070] = "fixed-version: Fixed from version 4.4rc1" | ||
1276 | |||
1277 | CVE_STATUS[CVE-2016-3134] = "fixed-version: Fixed from version 4.6rc2" | ||
1278 | |||
1279 | CVE_STATUS[CVE-2016-3135] = "fixed-version: Fixed from version 4.6rc1" | ||
1280 | |||
1281 | CVE_STATUS[CVE-2016-3136] = "fixed-version: Fixed from version 4.6rc3" | ||
1282 | |||
1283 | CVE_STATUS[CVE-2016-3137] = "fixed-version: Fixed from version 4.6rc3" | ||
1284 | |||
1285 | CVE_STATUS[CVE-2016-3138] = "fixed-version: Fixed from version 4.6rc1" | ||
1286 | |||
1287 | CVE_STATUS[CVE-2016-3139] = "fixed-version: Fixed from version 3.17rc1" | ||
1288 | |||
1289 | CVE_STATUS[CVE-2016-3140] = "fixed-version: Fixed from version 4.6rc3" | ||
1290 | |||
1291 | CVE_STATUS[CVE-2016-3156] = "fixed-version: Fixed from version 4.6rc1" | ||
1292 | |||
1293 | CVE_STATUS[CVE-2016-3157] = "fixed-version: Fixed from version 4.6rc1" | ||
1294 | |||
1295 | CVE_STATUS[CVE-2016-3672] = "fixed-version: Fixed from version 4.6rc1" | ||
1296 | |||
1297 | CVE_STATUS[CVE-2016-3689] = "fixed-version: Fixed from version 4.6rc1" | ||
1298 | |||
1299 | # Skipping CVE-2016-3695, no affected_versions | ||
1300 | |||
1301 | # Skipping CVE-2016-3699, no affected_versions | ||
1302 | |||
1303 | # Skipping CVE-2016-3707, no affected_versions | ||
1304 | |||
1305 | CVE_STATUS[CVE-2016-3713] = "fixed-version: Fixed from version 4.7rc1" | ||
1306 | |||
1307 | # CVE-2016-3775 has no known resolution | ||
1308 | |||
1309 | # CVE-2016-3802 has no known resolution | ||
1310 | |||
1311 | # CVE-2016-3803 has no known resolution | ||
1312 | |||
1313 | CVE_STATUS[CVE-2016-3841] = "fixed-version: Fixed from version 4.4rc4" | ||
1314 | |||
1315 | CVE_STATUS[CVE-2016-3857] = "fixed-version: Fixed from version 4.8rc2" | ||
1316 | |||
1317 | CVE_STATUS[CVE-2016-3951] = "fixed-version: Fixed from version 4.5" | ||
1318 | |||
1319 | CVE_STATUS[CVE-2016-3955] = "fixed-version: Fixed from version 4.6rc3" | ||
1320 | |||
1321 | CVE_STATUS[CVE-2016-3961] = "fixed-version: Fixed from version 4.6rc5" | ||
1322 | |||
1323 | CVE_STATUS[CVE-2016-4440] = "fixed-version: Fixed from version 4.7rc1" | ||
1324 | |||
1325 | CVE_STATUS[CVE-2016-4470] = "fixed-version: Fixed from version 4.7rc4" | ||
1326 | |||
1327 | CVE_STATUS[CVE-2016-4482] = "fixed-version: Fixed from version 4.7rc1" | ||
1328 | |||
1329 | CVE_STATUS[CVE-2016-4485] = "fixed-version: Fixed from version 4.6" | ||
1330 | |||
1331 | CVE_STATUS[CVE-2016-4486] = "fixed-version: Fixed from version 4.6" | ||
1332 | |||
1333 | CVE_STATUS[CVE-2016-4557] = "fixed-version: Fixed from version 4.6rc6" | ||
1334 | |||
1335 | CVE_STATUS[CVE-2016-4558] = "fixed-version: Fixed from version 4.6rc7" | ||
1336 | |||
1337 | CVE_STATUS[CVE-2016-4565] = "fixed-version: Fixed from version 4.6rc6" | ||
1338 | |||
1339 | CVE_STATUS[CVE-2016-4568] = "fixed-version: Fixed from version 4.6rc6" | ||
1340 | |||
1341 | CVE_STATUS[CVE-2016-4569] = "fixed-version: Fixed from version 4.7rc1" | ||
1342 | |||
1343 | CVE_STATUS[CVE-2016-4578] = "fixed-version: Fixed from version 4.7rc1" | ||
1344 | |||
1345 | CVE_STATUS[CVE-2016-4580] = "fixed-version: Fixed from version 4.6" | ||
1346 | |||
1347 | CVE_STATUS[CVE-2016-4581] = "fixed-version: Fixed from version 4.6rc7" | ||
1348 | |||
1349 | CVE_STATUS[CVE-2016-4794] = "fixed-version: Fixed from version 4.7rc4" | ||
1350 | |||
1351 | CVE_STATUS[CVE-2016-4805] = "fixed-version: Fixed from version 4.6rc1" | ||
1352 | |||
1353 | CVE_STATUS[CVE-2016-4913] = "fixed-version: Fixed from version 4.6" | ||
1354 | |||
1355 | CVE_STATUS[CVE-2016-4951] = "fixed-version: Fixed from version 4.7rc1" | ||
1356 | |||
1357 | CVE_STATUS[CVE-2016-4997] = "fixed-version: Fixed from version 4.7rc1" | ||
1358 | |||
1359 | CVE_STATUS[CVE-2016-4998] = "fixed-version: Fixed from version 4.7rc1" | ||
1360 | |||
1361 | CVE_STATUS[CVE-2016-5195] = "fixed-version: Fixed from version 4.9rc2" | ||
1362 | |||
1363 | CVE_STATUS[CVE-2016-5243] = "fixed-version: Fixed from version 4.7rc3" | ||
1364 | |||
1365 | CVE_STATUS[CVE-2016-5244] = "fixed-version: Fixed from version 4.7rc3" | ||
1366 | |||
1367 | # Skipping CVE-2016-5340, no affected_versions | ||
1368 | |||
1369 | # Skipping CVE-2016-5342, no affected_versions | ||
1370 | |||
1371 | # Skipping CVE-2016-5343, no affected_versions | ||
1372 | |||
1373 | # Skipping CVE-2016-5344, no affected_versions | ||
1374 | |||
1375 | CVE_STATUS[CVE-2016-5400] = "fixed-version: Fixed from version 4.7" | ||
1376 | |||
1377 | CVE_STATUS[CVE-2016-5412] = "fixed-version: Fixed from version 4.8rc1" | ||
1378 | |||
1379 | CVE_STATUS[CVE-2016-5696] = "fixed-version: Fixed from version 4.7" | ||
1380 | |||
1381 | CVE_STATUS[CVE-2016-5728] = "fixed-version: Fixed from version 4.7rc1" | ||
1382 | |||
1383 | CVE_STATUS[CVE-2016-5828] = "fixed-version: Fixed from version 4.7rc6" | ||
1384 | |||
1385 | CVE_STATUS[CVE-2016-5829] = "fixed-version: Fixed from version 4.7rc5" | ||
1386 | |||
1387 | # CVE-2016-5870 has no known resolution | ||
1388 | |||
1389 | CVE_STATUS[CVE-2016-6130] = "fixed-version: Fixed from version 4.6rc6" | ||
1390 | |||
1391 | CVE_STATUS[CVE-2016-6136] = "fixed-version: Fixed from version 4.8rc1" | ||
1392 | |||
1393 | CVE_STATUS[CVE-2016-6156] = "fixed-version: Fixed from version 4.7rc7" | ||
1394 | |||
1395 | CVE_STATUS[CVE-2016-6162] = "fixed-version: Fixed from version 4.7" | ||
1396 | |||
1397 | CVE_STATUS[CVE-2016-6187] = "fixed-version: Fixed from version 4.7rc7" | ||
1398 | |||
1399 | CVE_STATUS[CVE-2016-6197] = "fixed-version: Fixed from version 4.6rc1" | ||
1400 | |||
1401 | CVE_STATUS[CVE-2016-6198] = "fixed-version: Fixed from version 4.6" | ||
1402 | |||
1403 | CVE_STATUS[CVE-2016-6213] = "fixed-version: Fixed from version 4.9rc1" | ||
1404 | |||
1405 | CVE_STATUS[CVE-2016-6327] = "fixed-version: Fixed from version 4.6rc1" | ||
1406 | |||
1407 | CVE_STATUS[CVE-2016-6480] = "fixed-version: Fixed from version 4.8rc3" | ||
1408 | |||
1409 | CVE_STATUS[CVE-2016-6516] = "fixed-version: Fixed from version 4.8rc1" | ||
1410 | |||
1411 | # Skipping CVE-2016-6753, no affected_versions | ||
1412 | |||
1413 | CVE_STATUS[CVE-2016-6786] = "fixed-version: Fixed from version 4.0rc1" | ||
1414 | |||
1415 | CVE_STATUS[CVE-2016-6787] = "fixed-version: Fixed from version 4.0rc1" | ||
1416 | |||
1417 | CVE_STATUS[CVE-2016-6828] = "fixed-version: Fixed from version 4.8rc5" | ||
1418 | |||
1419 | CVE_STATUS[CVE-2016-7039] = "fixed-version: Fixed from version 4.9rc4" | ||
1420 | |||
1421 | CVE_STATUS[CVE-2016-7042] = "fixed-version: Fixed from version 4.9rc3" | ||
1422 | |||
1423 | CVE_STATUS[CVE-2016-7097] = "fixed-version: Fixed from version 4.9rc1" | ||
1424 | |||
1425 | CVE_STATUS[CVE-2016-7117] = "fixed-version: Fixed from version 4.6rc1" | ||
1426 | |||
1427 | # Skipping CVE-2016-7118, no affected_versions | ||
1428 | |||
1429 | CVE_STATUS[CVE-2016-7425] = "fixed-version: Fixed from version 4.9rc1" | ||
1430 | |||
1431 | CVE_STATUS[CVE-2016-7910] = "fixed-version: Fixed from version 4.8rc1" | ||
1432 | |||
1433 | CVE_STATUS[CVE-2016-7911] = "fixed-version: Fixed from version 4.7rc7" | ||
1434 | |||
1435 | CVE_STATUS[CVE-2016-7912] = "fixed-version: Fixed from version 4.6rc5" | ||
1436 | |||
1437 | CVE_STATUS[CVE-2016-7913] = "fixed-version: Fixed from version 4.6rc1" | ||
1438 | |||
1439 | CVE_STATUS[CVE-2016-7914] = "fixed-version: Fixed from version 4.6rc4" | ||
1440 | |||
1441 | CVE_STATUS[CVE-2016-7915] = "fixed-version: Fixed from version 4.6rc1" | ||
1442 | |||
1443 | CVE_STATUS[CVE-2016-7916] = "fixed-version: Fixed from version 4.6rc7" | ||
1444 | |||
1445 | CVE_STATUS[CVE-2016-7917] = "fixed-version: Fixed from version 4.5rc6" | ||
1446 | |||
1447 | CVE_STATUS[CVE-2016-8399] = "fixed-version: Fixed from version 4.9" | ||
1448 | |||
1449 | # Skipping CVE-2016-8401, no affected_versions | ||
1450 | |||
1451 | # Skipping CVE-2016-8402, no affected_versions | ||
1452 | |||
1453 | # Skipping CVE-2016-8403, no affected_versions | ||
1454 | |||
1455 | # Skipping CVE-2016-8404, no affected_versions | ||
1456 | |||
1457 | CVE_STATUS[CVE-2016-8405] = "fixed-version: Fixed from version 4.10rc6" | ||
1458 | |||
1459 | # Skipping CVE-2016-8406, no affected_versions | ||
1460 | |||
1461 | # Skipping CVE-2016-8407, no affected_versions | ||
1462 | |||
1463 | CVE_STATUS[CVE-2016-8630] = "fixed-version: Fixed from version 4.9rc4" | ||
1464 | |||
1465 | CVE_STATUS[CVE-2016-8632] = "fixed-version: Fixed from version 4.9rc8" | ||
1466 | |||
1467 | CVE_STATUS[CVE-2016-8633] = "fixed-version: Fixed from version 4.9rc4" | ||
1468 | |||
1469 | CVE_STATUS[CVE-2016-8636] = "fixed-version: Fixed from version 4.10rc8" | ||
1470 | |||
1471 | CVE_STATUS[CVE-2016-8645] = "fixed-version: Fixed from version 4.9rc6" | ||
1472 | |||
1473 | CVE_STATUS[CVE-2016-8646] = "fixed-version: Fixed from version 4.4rc1" | ||
1474 | |||
1475 | CVE_STATUS[CVE-2016-8650] = "fixed-version: Fixed from version 4.9rc7" | ||
1476 | |||
1477 | CVE_STATUS[CVE-2016-8655] = "fixed-version: Fixed from version 4.9rc8" | ||
1478 | |||
1479 | CVE_STATUS[CVE-2016-8658] = "fixed-version: Fixed from version 4.8rc7" | ||
1480 | |||
1481 | # CVE-2016-8660 has no known resolution | ||
1482 | |||
1483 | CVE_STATUS[CVE-2016-8666] = "fixed-version: Fixed from version 4.6rc1" | ||
1484 | |||
1485 | CVE_STATUS[CVE-2016-9083] = "fixed-version: Fixed from version 4.9rc4" | ||
1486 | |||
1487 | CVE_STATUS[CVE-2016-9084] = "fixed-version: Fixed from version 4.9rc4" | ||
1488 | |||
1489 | CVE_STATUS[CVE-2016-9120] = "fixed-version: Fixed from version 4.6rc1" | ||
1490 | |||
1491 | CVE_STATUS[CVE-2016-9178] = "fixed-version: Fixed from version 4.8rc7" | ||
1492 | |||
1493 | CVE_STATUS[CVE-2016-9191] = "fixed-version: Fixed from version 4.10rc4" | ||
1494 | |||
1495 | CVE_STATUS[CVE-2016-9313] = "fixed-version: Fixed from version 4.9rc3" | ||
1496 | |||
1497 | CVE_STATUS[CVE-2016-9555] = "fixed-version: Fixed from version 4.9rc4" | ||
1498 | |||
1499 | CVE_STATUS[CVE-2016-9576] = "fixed-version: Fixed from version 4.9" | ||
1500 | |||
1501 | CVE_STATUS[CVE-2016-9588] = "fixed-version: Fixed from version 4.10rc1" | ||
1502 | |||
1503 | CVE_STATUS[CVE-2016-9604] = "fixed-version: Fixed from version 4.11rc8" | ||
1504 | |||
1505 | # Skipping CVE-2016-9644, no affected_versions | ||
1506 | |||
1507 | CVE_STATUS[CVE-2016-9685] = "fixed-version: Fixed from version 4.6rc1" | ||
1508 | |||
1509 | CVE_STATUS[CVE-2016-9754] = "fixed-version: Fixed from version 4.7rc1" | ||
1510 | |||
1511 | CVE_STATUS[CVE-2016-9755] = "fixed-version: Fixed from version 4.9rc8" | ||
1512 | |||
1513 | CVE_STATUS[CVE-2016-9756] = "fixed-version: Fixed from version 4.9rc7" | ||
1514 | |||
1515 | CVE_STATUS[CVE-2016-9777] = "fixed-version: Fixed from version 4.9rc7" | ||
1516 | |||
1517 | CVE_STATUS[CVE-2016-9793] = "fixed-version: Fixed from version 4.9rc8" | ||
1518 | |||
1519 | CVE_STATUS[CVE-2016-9794] = "fixed-version: Fixed from version 4.7rc1" | ||
1520 | |||
1521 | CVE_STATUS[CVE-2016-9806] = "fixed-version: Fixed from version 4.7rc1" | ||
1522 | |||
1523 | CVE_STATUS[CVE-2016-9919] = "fixed-version: Fixed from version 4.9rc8" | ||
1524 | |||
1525 | # Skipping CVE-2017-0403, no affected_versions | ||
1526 | |||
1527 | # Skipping CVE-2017-0404, no affected_versions | ||
1528 | |||
1529 | # Skipping CVE-2017-0426, no affected_versions | ||
1530 | |||
1531 | # Skipping CVE-2017-0427, no affected_versions | ||
1532 | |||
1533 | # CVE-2017-0507 has no known resolution | ||
1534 | |||
1535 | # CVE-2017-0508 has no known resolution | ||
1536 | |||
1537 | # Skipping CVE-2017-0510, no affected_versions | ||
1538 | |||
1539 | # Skipping CVE-2017-0528, no affected_versions | ||
1540 | |||
1541 | # Skipping CVE-2017-0537, no affected_versions | ||
1542 | |||
1543 | # CVE-2017-0564 has no known resolution | ||
1544 | |||
1545 | CVE_STATUS[CVE-2017-0605] = "fixed-version: Fixed from version 4.12rc1" | ||
1546 | |||
1547 | CVE_STATUS[CVE-2017-0627] = "fixed-version: Fixed from version 4.14rc1" | ||
1548 | |||
1549 | # CVE-2017-0630 has no known resolution | ||
1550 | |||
1551 | # CVE-2017-0749 has no known resolution | ||
1552 | |||
1553 | CVE_STATUS[CVE-2017-0750] = "fixed-version: Fixed from version 4.5rc1" | ||
1554 | |||
1555 | CVE_STATUS[CVE-2017-0786] = "fixed-version: Fixed from version 4.14rc4" | ||
1556 | |||
1557 | CVE_STATUS[CVE-2017-0861] = "fixed-version: Fixed from version 4.15rc3" | ||
1558 | |||
1559 | CVE_STATUS[CVE-2017-1000] = "fixed-version: Fixed from version 4.13rc5" | ||
1560 | |||
1561 | CVE_STATUS[CVE-2017-1000111] = "fixed-version: Fixed from version 4.13rc5" | ||
1562 | |||
1563 | CVE_STATUS[CVE-2017-1000112] = "fixed-version: Fixed from version 4.13rc5" | ||
1564 | |||
1565 | CVE_STATUS[CVE-2017-1000251] = "fixed-version: Fixed from version 4.14rc1" | ||
1566 | |||
1567 | CVE_STATUS[CVE-2017-1000252] = "fixed-version: Fixed from version 4.14rc1" | ||
1568 | |||
1569 | CVE_STATUS[CVE-2017-1000253] = "fixed-version: Fixed from version 4.1rc1" | ||
1570 | |||
1571 | CVE_STATUS[CVE-2017-1000255] = "fixed-version: Fixed from version 4.14rc5" | ||
1572 | |||
1573 | CVE_STATUS[CVE-2017-1000363] = "fixed-version: Fixed from version 4.12rc2" | ||
1574 | |||
1575 | CVE_STATUS[CVE-2017-1000364] = "fixed-version: Fixed from version 4.12rc6" | ||
1576 | |||
1577 | CVE_STATUS[CVE-2017-1000365] = "fixed-version: Fixed from version 4.12rc7" | ||
1578 | |||
1579 | CVE_STATUS[CVE-2017-1000370] = "fixed-version: Fixed from version 4.13rc1" | ||
1580 | |||
1581 | CVE_STATUS[CVE-2017-1000371] = "fixed-version: Fixed from version 4.13rc1" | ||
1582 | |||
1583 | CVE_STATUS[CVE-2017-1000379] = "fixed-version: Fixed from version 4.12rc6" | ||
1584 | |||
1585 | CVE_STATUS[CVE-2017-1000380] = "fixed-version: Fixed from version 4.12rc5" | ||
1586 | |||
1587 | CVE_STATUS[CVE-2017-1000405] = "fixed-version: Fixed from version 4.15rc2" | ||
1588 | |||
1589 | CVE_STATUS[CVE-2017-1000407] = "fixed-version: Fixed from version 4.15rc3" | ||
1590 | |||
1591 | CVE_STATUS[CVE-2017-1000410] = "fixed-version: Fixed from version 4.15rc8" | ||
1592 | |||
1593 | CVE_STATUS[CVE-2017-10661] = "fixed-version: Fixed from version 4.11rc1" | ||
1594 | |||
1595 | CVE_STATUS[CVE-2017-10662] = "fixed-version: Fixed from version 4.12rc1" | ||
1596 | |||
1597 | CVE_STATUS[CVE-2017-10663] = "fixed-version: Fixed from version 4.13rc1" | ||
1598 | |||
1599 | CVE_STATUS[CVE-2017-10810] = "fixed-version: Fixed from version 4.12rc1" | ||
1600 | |||
1601 | CVE_STATUS[CVE-2017-10911] = "fixed-version: Fixed from version 4.12rc7" | ||
1602 | |||
1603 | CVE_STATUS[CVE-2017-11089] = "fixed-version: Fixed from version 4.13rc1" | ||
1604 | |||
1605 | CVE_STATUS[CVE-2017-11176] = "fixed-version: Fixed from version 4.13rc1" | ||
1606 | |||
1607 | CVE_STATUS[CVE-2017-11472] = "fixed-version: Fixed from version 4.12rc1" | ||
1608 | |||
1609 | CVE_STATUS[CVE-2017-11473] = "fixed-version: Fixed from version 4.13rc2" | ||
1610 | |||
1611 | CVE_STATUS[CVE-2017-11600] = "fixed-version: Fixed from version 4.13" | ||
1612 | |||
1613 | CVE_STATUS[CVE-2017-12134] = "fixed-version: Fixed from version 4.13rc6" | ||
1614 | |||
1615 | CVE_STATUS[CVE-2017-12146] = "fixed-version: Fixed from version 4.13rc1" | ||
1616 | |||
1617 | CVE_STATUS[CVE-2017-12153] = "fixed-version: Fixed from version 4.14rc2" | ||
1618 | |||
1619 | CVE_STATUS[CVE-2017-12154] = "fixed-version: Fixed from version 4.14rc1" | ||
1620 | |||
1621 | CVE_STATUS[CVE-2017-12168] = "fixed-version: Fixed from version 4.9rc6" | ||
1622 | |||
1623 | CVE_STATUS[CVE-2017-12188] = "fixed-version: Fixed from version 4.14rc5" | ||
1624 | |||
1625 | CVE_STATUS[CVE-2017-12190] = "fixed-version: Fixed from version 4.14rc5" | ||
1626 | |||
1627 | CVE_STATUS[CVE-2017-12192] = "fixed-version: Fixed from version 4.14rc3" | ||
1628 | |||
1629 | CVE_STATUS[CVE-2017-12193] = "fixed-version: Fixed from version 4.14rc7" | ||
1630 | |||
1631 | CVE_STATUS[CVE-2017-12762] = "fixed-version: Fixed from version 4.13rc4" | ||
1632 | |||
1633 | CVE_STATUS[CVE-2017-13080] = "fixed-version: Fixed from version 4.14rc6" | ||
1634 | |||
1635 | CVE_STATUS[CVE-2017-13166] = "fixed-version: Fixed from version 4.16rc1" | ||
1636 | |||
1637 | CVE_STATUS[CVE-2017-13167] = "fixed-version: Fixed from version 4.5rc4" | ||
1638 | |||
1639 | CVE_STATUS[CVE-2017-13168] = "fixed-version: Fixed from version 4.18rc4" | ||
1640 | |||
1641 | CVE_STATUS[CVE-2017-13215] = "fixed-version: Fixed from version 4.5rc1" | ||
1642 | |||
1643 | CVE_STATUS[CVE-2017-13216] = "fixed-version: Fixed from version 4.15rc8" | ||
1644 | |||
1645 | CVE_STATUS[CVE-2017-13220] = "fixed-version: Fixed from version 3.19rc3" | ||
1646 | |||
1647 | # CVE-2017-13221 has no known resolution | ||
1648 | |||
1649 | # CVE-2017-13222 has no known resolution | ||
1650 | |||
1651 | CVE_STATUS[CVE-2017-13305] = "fixed-version: Fixed from version 4.12rc5" | ||
1652 | |||
1653 | CVE_STATUS[CVE-2017-13686] = "fixed-version: Fixed from version 4.13rc7" | ||
1654 | |||
1655 | # CVE-2017-13693 has no known resolution | ||
1656 | |||
1657 | # CVE-2017-13694 has no known resolution | ||
1658 | |||
1659 | CVE_STATUS[CVE-2017-13695] = "fixed-version: Fixed from version 4.17rc1" | ||
1660 | |||
1661 | CVE_STATUS[CVE-2017-13715] = "fixed-version: Fixed from version 4.3rc1" | ||
1662 | |||
1663 | CVE_STATUS[CVE-2017-14051] = "fixed-version: Fixed from version 4.14rc1" | ||
1664 | |||
1665 | CVE_STATUS[CVE-2017-14106] = "fixed-version: Fixed from version 4.12rc3" | ||
1666 | |||
1667 | CVE_STATUS[CVE-2017-14140] = "fixed-version: Fixed from version 4.13rc6" | ||
1668 | |||
1669 | CVE_STATUS[CVE-2017-14156] = "fixed-version: Fixed from version 4.14rc1" | ||
1670 | |||
1671 | CVE_STATUS[CVE-2017-14340] = "fixed-version: Fixed from version 4.14rc1" | ||
1672 | |||
1673 | CVE_STATUS[CVE-2017-14489] = "fixed-version: Fixed from version 4.14rc3" | ||
1674 | |||
1675 | CVE_STATUS[CVE-2017-14497] = "fixed-version: Fixed from version 4.13" | ||
1676 | |||
1677 | CVE_STATUS[CVE-2017-14954] = "fixed-version: Fixed from version 4.14rc3" | ||
1678 | |||
1679 | CVE_STATUS[CVE-2017-14991] = "fixed-version: Fixed from version 4.14rc2" | ||
1680 | |||
1681 | CVE_STATUS[CVE-2017-15102] = "fixed-version: Fixed from version 4.9rc1" | ||
1682 | |||
1683 | CVE_STATUS[CVE-2017-15115] = "fixed-version: Fixed from version 4.14rc6" | ||
1684 | |||
1685 | CVE_STATUS[CVE-2017-15116] = "fixed-version: Fixed from version 4.2rc1" | ||
1686 | |||
1687 | CVE_STATUS[CVE-2017-15121] = "fixed-version: Fixed from version 3.11rc1" | ||
1688 | |||
1689 | CVE_STATUS[CVE-2017-15126] = "fixed-version: Fixed from version 4.14rc4" | ||
1690 | |||
1691 | CVE_STATUS[CVE-2017-15127] = "fixed-version: Fixed from version 4.13rc5" | ||
1692 | |||
1693 | CVE_STATUS[CVE-2017-15128] = "fixed-version: Fixed from version 4.14rc8" | ||
1694 | |||
1695 | CVE_STATUS[CVE-2017-15129] = "fixed-version: Fixed from version 4.15rc5" | ||
1696 | |||
1697 | CVE_STATUS[CVE-2017-15265] = "fixed-version: Fixed from version 4.14rc5" | ||
1698 | |||
1699 | CVE_STATUS[CVE-2017-15274] = "fixed-version: Fixed from version 4.12rc5" | ||
1700 | |||
1701 | CVE_STATUS[CVE-2017-15299] = "fixed-version: Fixed from version 4.14rc6" | ||
1702 | |||
1703 | CVE_STATUS[CVE-2017-15306] = "fixed-version: Fixed from version 4.14rc7" | ||
1704 | |||
1705 | CVE_STATUS[CVE-2017-15537] = "fixed-version: Fixed from version 4.14rc3" | ||
1706 | |||
1707 | CVE_STATUS[CVE-2017-15649] = "fixed-version: Fixed from version 4.14rc4" | ||
1708 | |||
1709 | CVE_STATUS[CVE-2017-15868] = "fixed-version: Fixed from version 3.19rc3" | ||
1710 | |||
1711 | CVE_STATUS[CVE-2017-15951] = "fixed-version: Fixed from version 4.14rc6" | ||
1712 | |||
1713 | CVE_STATUS[CVE-2017-16525] = "fixed-version: Fixed from version 4.14rc5" | ||
1714 | |||
1715 | CVE_STATUS[CVE-2017-16526] = "fixed-version: Fixed from version 4.14rc4" | ||
1716 | |||
1717 | CVE_STATUS[CVE-2017-16527] = "fixed-version: Fixed from version 4.14rc5" | ||
1718 | |||
1719 | CVE_STATUS[CVE-2017-16528] = "fixed-version: Fixed from version 4.14rc1" | ||
1720 | |||
1721 | CVE_STATUS[CVE-2017-16529] = "fixed-version: Fixed from version 4.14rc4" | ||
1722 | |||
1723 | CVE_STATUS[CVE-2017-16530] = "fixed-version: Fixed from version 4.14rc4" | ||
1724 | |||
1725 | CVE_STATUS[CVE-2017-16531] = "fixed-version: Fixed from version 4.14rc4" | ||
1726 | |||
1727 | CVE_STATUS[CVE-2017-16532] = "fixed-version: Fixed from version 4.14rc5" | ||
1728 | |||
1729 | CVE_STATUS[CVE-2017-16533] = "fixed-version: Fixed from version 4.14rc5" | ||
1730 | |||
1731 | CVE_STATUS[CVE-2017-16534] = "fixed-version: Fixed from version 4.14rc4" | ||
1732 | |||
1733 | CVE_STATUS[CVE-2017-16535] = "fixed-version: Fixed from version 4.14rc6" | ||
1734 | |||
1735 | CVE_STATUS[CVE-2017-16536] = "fixed-version: Fixed from version 4.15rc1" | ||
1736 | |||
1737 | CVE_STATUS[CVE-2017-16537] = "fixed-version: Fixed from version 4.15rc1" | ||
1738 | |||
1739 | CVE_STATUS[CVE-2017-16538] = "fixed-version: Fixed from version 4.16rc1" | ||
1740 | |||
1741 | CVE_STATUS[CVE-2017-16643] = "fixed-version: Fixed from version 4.14rc7" | ||
1742 | |||
1743 | CVE_STATUS[CVE-2017-16644] = "fixed-version: Fixed from version 4.16rc1" | ||
1744 | |||
1745 | CVE_STATUS[CVE-2017-16645] = "fixed-version: Fixed from version 4.14rc6" | ||
1746 | |||
1747 | CVE_STATUS[CVE-2017-16646] = "fixed-version: Fixed from version 4.15rc1" | ||
1748 | |||
1749 | CVE_STATUS[CVE-2017-16647] = "fixed-version: Fixed from version 4.14" | ||
1750 | |||
1751 | CVE_STATUS[CVE-2017-16648] = "fixed-version: Fixed from version 4.15rc1" | ||
1752 | |||
1753 | CVE_STATUS[CVE-2017-16649] = "fixed-version: Fixed from version 4.14" | ||
1754 | |||
1755 | CVE_STATUS[CVE-2017-16650] = "fixed-version: Fixed from version 4.14" | ||
1756 | |||
1757 | CVE_STATUS[CVE-2017-16911] = "fixed-version: Fixed from version 4.15rc4" | ||
1758 | |||
1759 | CVE_STATUS[CVE-2017-16912] = "fixed-version: Fixed from version 4.15rc4" | ||
1760 | |||
1761 | CVE_STATUS[CVE-2017-16913] = "fixed-version: Fixed from version 4.15rc4" | ||
1762 | |||
1763 | CVE_STATUS[CVE-2017-16914] = "fixed-version: Fixed from version 4.15rc4" | ||
1764 | |||
1765 | CVE_STATUS[CVE-2017-16939] = "fixed-version: Fixed from version 4.14rc7" | ||
1766 | |||
1767 | CVE_STATUS[CVE-2017-16994] = "fixed-version: Fixed from version 4.15rc1" | ||
1768 | |||
1769 | CVE_STATUS[CVE-2017-16995] = "fixed-version: Fixed from version 4.15rc5" | ||
1770 | |||
1771 | CVE_STATUS[CVE-2017-16996] = "fixed-version: Fixed from version 4.15rc5" | ||
1772 | |||
1773 | CVE_STATUS[CVE-2017-17052] = "fixed-version: Fixed from version 4.13rc7" | ||
1774 | |||
1775 | CVE_STATUS[CVE-2017-17053] = "fixed-version: Fixed from version 4.13rc7" | ||
1776 | |||
1777 | CVE_STATUS[CVE-2017-17448] = "fixed-version: Fixed from version 4.15rc4" | ||
1778 | |||
1779 | CVE_STATUS[CVE-2017-17449] = "fixed-version: Fixed from version 4.15rc4" | ||
1780 | |||
1781 | CVE_STATUS[CVE-2017-17450] = "fixed-version: Fixed from version 4.15rc4" | ||
1782 | |||
1783 | CVE_STATUS[CVE-2017-17558] = "fixed-version: Fixed from version 4.15rc4" | ||
1784 | |||
1785 | CVE_STATUS[CVE-2017-17712] = "fixed-version: Fixed from version 4.15rc4" | ||
1786 | |||
1787 | CVE_STATUS[CVE-2017-17741] = "fixed-version: Fixed from version 4.15rc5" | ||
1788 | |||
1789 | CVE_STATUS[CVE-2017-17805] = "fixed-version: Fixed from version 4.15rc4" | ||
1790 | |||
1791 | CVE_STATUS[CVE-2017-17806] = "fixed-version: Fixed from version 4.15rc4" | ||
1792 | |||
1793 | CVE_STATUS[CVE-2017-17807] = "fixed-version: Fixed from version 4.15rc3" | ||
1794 | |||
1795 | CVE_STATUS[CVE-2017-17852] = "fixed-version: Fixed from version 4.15rc5" | ||
1796 | |||
1797 | CVE_STATUS[CVE-2017-17853] = "fixed-version: Fixed from version 4.15rc5" | ||
1798 | |||
1799 | CVE_STATUS[CVE-2017-17854] = "fixed-version: Fixed from version 4.15rc5" | ||
1800 | |||
1801 | CVE_STATUS[CVE-2017-17855] = "fixed-version: Fixed from version 4.15rc5" | ||
1802 | |||
1803 | CVE_STATUS[CVE-2017-17856] = "fixed-version: Fixed from version 4.15rc5" | ||
1804 | |||
1805 | CVE_STATUS[CVE-2017-17857] = "fixed-version: Fixed from version 4.15rc5" | ||
1806 | |||
1807 | CVE_STATUS[CVE-2017-17862] = "fixed-version: Fixed from version 4.15rc1" | ||
1808 | |||
1809 | CVE_STATUS[CVE-2017-17863] = "fixed-version: Fixed from version 4.15rc5" | ||
1810 | |||
1811 | CVE_STATUS[CVE-2017-17864] = "fixed-version: Fixed from version 4.15rc5" | ||
1812 | |||
1813 | CVE_STATUS[CVE-2017-17975] = "fixed-version: Fixed from version 4.17rc1" | ||
1814 | |||
1815 | CVE_STATUS[CVE-2017-18017] = "fixed-version: Fixed from version 4.11rc7" | ||
1816 | |||
1817 | CVE_STATUS[CVE-2017-18075] = "fixed-version: Fixed from version 4.15rc7" | ||
1818 | |||
1819 | CVE_STATUS[CVE-2017-18079] = "fixed-version: Fixed from version 4.13rc1" | ||
1820 | |||
1821 | # CVE-2017-18169 has no known resolution | ||
1822 | |||
1823 | CVE_STATUS[CVE-2017-18174] = "fixed-version: Fixed from version 4.7rc1" | ||
1824 | |||
1825 | CVE_STATUS[CVE-2017-18193] = "fixed-version: Fixed from version 4.13rc1" | ||
1826 | |||
1827 | CVE_STATUS[CVE-2017-18200] = "fixed-version: Fixed from version 4.14rc5" | ||
1828 | |||
1829 | CVE_STATUS[CVE-2017-18202] = "fixed-version: Fixed from version 4.15rc2" | ||
1830 | |||
1831 | CVE_STATUS[CVE-2017-18203] = "fixed-version: Fixed from version 4.15rc1" | ||
1832 | |||
1833 | CVE_STATUS[CVE-2017-18204] = "fixed-version: Fixed from version 4.15rc1" | ||
1834 | |||
1835 | CVE_STATUS[CVE-2017-18208] = "fixed-version: Fixed from version 4.15rc2" | ||
1836 | |||
1837 | CVE_STATUS[CVE-2017-18216] = "fixed-version: Fixed from version 4.15rc1" | ||
1838 | |||
1839 | CVE_STATUS[CVE-2017-18218] = "fixed-version: Fixed from version 4.13rc1" | ||
1840 | |||
1841 | CVE_STATUS[CVE-2017-18221] = "fixed-version: Fixed from version 4.12rc4" | ||
1842 | |||
1843 | CVE_STATUS[CVE-2017-18222] = "fixed-version: Fixed from version 4.12rc1" | ||
1844 | |||
1845 | CVE_STATUS[CVE-2017-18224] = "fixed-version: Fixed from version 4.15rc1" | ||
1846 | |||
1847 | CVE_STATUS[CVE-2017-18232] = "fixed-version: Fixed from version 4.16rc1" | ||
1848 | |||
1849 | CVE_STATUS[CVE-2017-18241] = "fixed-version: Fixed from version 4.13rc1" | ||
1850 | |||
1851 | CVE_STATUS[CVE-2017-18249] = "fixed-version: Fixed from version 4.12rc1" | ||
1852 | |||
1853 | CVE_STATUS[CVE-2017-18255] = "fixed-version: Fixed from version 4.11rc1" | ||
1854 | |||
1855 | CVE_STATUS[CVE-2017-18257] = "fixed-version: Fixed from version 4.11rc1" | ||
1856 | |||
1857 | CVE_STATUS[CVE-2017-18261] = "fixed-version: Fixed from version 4.13rc6" | ||
1858 | |||
1859 | CVE_STATUS[CVE-2017-18270] = "fixed-version: Fixed from version 4.14rc3" | ||
1860 | |||
1861 | CVE_STATUS[CVE-2017-18344] = "fixed-version: Fixed from version 4.15rc4" | ||
1862 | |||
1863 | CVE_STATUS[CVE-2017-18360] = "fixed-version: Fixed from version 4.12rc2" | ||
1864 | |||
1865 | CVE_STATUS[CVE-2017-18379] = "fixed-version: Fixed from version 4.14rc3" | ||
1866 | |||
1867 | CVE_STATUS[CVE-2017-18509] = "fixed-version: Fixed from version 4.11rc1" | ||
1868 | |||
1869 | CVE_STATUS[CVE-2017-18549] = "fixed-version: Fixed from version 4.13rc1" | ||
1870 | |||
1871 | CVE_STATUS[CVE-2017-18550] = "fixed-version: Fixed from version 4.13rc1" | ||
1872 | |||
1873 | CVE_STATUS[CVE-2017-18551] = "fixed-version: Fixed from version 4.15rc9" | ||
1874 | |||
1875 | CVE_STATUS[CVE-2017-18552] = "fixed-version: Fixed from version 4.11rc1" | ||
1876 | |||
1877 | CVE_STATUS[CVE-2017-18595] = "fixed-version: Fixed from version 4.15rc6" | ||
1878 | |||
1879 | CVE_STATUS[CVE-2017-2583] = "fixed-version: Fixed from version 4.10rc4" | ||
1880 | |||
1881 | CVE_STATUS[CVE-2017-2584] = "fixed-version: Fixed from version 4.10rc4" | ||
1882 | |||
1883 | CVE_STATUS[CVE-2017-2596] = "fixed-version: Fixed from version 4.11rc1" | ||
1884 | |||
1885 | CVE_STATUS[CVE-2017-2618] = "fixed-version: Fixed from version 4.10rc8" | ||
1886 | |||
1887 | CVE_STATUS[CVE-2017-2634] = "fixed-version: Fixed from version 2.6.25rc1" | ||
1888 | |||
1889 | CVE_STATUS[CVE-2017-2636] = "fixed-version: Fixed from version 4.11rc2" | ||
1890 | |||
1891 | CVE_STATUS[CVE-2017-2647] = "fixed-version: Fixed from version 3.18rc1" | ||
1892 | |||
1893 | CVE_STATUS[CVE-2017-2671] = "fixed-version: Fixed from version 4.11rc6" | ||
1894 | |||
1895 | CVE_STATUS[CVE-2017-5123] = "fixed-version: Fixed from version 4.14rc5" | ||
1896 | |||
1897 | CVE_STATUS[CVE-2017-5546] = "fixed-version: Fixed from version 4.10rc4" | ||
1898 | |||
1899 | CVE_STATUS[CVE-2017-5547] = "fixed-version: Fixed from version 4.10rc5" | ||
1900 | |||
1901 | CVE_STATUS[CVE-2017-5548] = "fixed-version: Fixed from version 4.10rc5" | ||
1902 | |||
1903 | CVE_STATUS[CVE-2017-5549] = "fixed-version: Fixed from version 4.10rc4" | ||
1904 | |||
1905 | CVE_STATUS[CVE-2017-5550] = "fixed-version: Fixed from version 4.10rc4" | ||
1906 | |||
1907 | CVE_STATUS[CVE-2017-5551] = "fixed-version: Fixed from version 4.10rc4" | ||
1908 | |||
1909 | CVE_STATUS[CVE-2017-5576] = "fixed-version: Fixed from version 4.10rc6" | ||
1910 | |||
1911 | CVE_STATUS[CVE-2017-5577] = "fixed-version: Fixed from version 4.10rc6" | ||
1912 | |||
1913 | CVE_STATUS[CVE-2017-5669] = "fixed-version: Fixed from version 4.11rc1" | ||
1914 | |||
1915 | CVE_STATUS[CVE-2017-5715] = "fixed-version: Fixed from version 4.15rc8" | ||
1916 | |||
1917 | CVE_STATUS[CVE-2017-5753] = "fixed-version: Fixed from version 4.15rc8" | ||
1918 | |||
1919 | CVE_STATUS[CVE-2017-5754] = "fixed-version: Fixed from version 4.16rc1" | ||
1920 | |||
1921 | CVE_STATUS[CVE-2017-5897] = "fixed-version: Fixed from version 4.10rc8" | ||
1922 | |||
1923 | CVE_STATUS[CVE-2017-5967] = "fixed-version: Fixed from version 4.11rc1" | ||
1924 | |||
1925 | CVE_STATUS[CVE-2017-5970] = "fixed-version: Fixed from version 4.10rc8" | ||
1926 | |||
1927 | CVE_STATUS[CVE-2017-5972] = "fixed-version: Fixed from version 4.4rc1" | ||
1928 | |||
1929 | CVE_STATUS[CVE-2017-5986] = "fixed-version: Fixed from version 4.10rc8" | ||
1930 | |||
1931 | CVE_STATUS[CVE-2017-6001] = "fixed-version: Fixed from version 4.10rc4" | ||
1932 | |||
1933 | CVE_STATUS[CVE-2017-6074] = "fixed-version: Fixed from version 4.10" | ||
1934 | |||
1935 | CVE_STATUS[CVE-2017-6214] = "fixed-version: Fixed from version 4.10rc8" | ||
1936 | |||
1937 | CVE_STATUS[CVE-2017-6345] = "fixed-version: Fixed from version 4.10" | ||
1938 | |||
1939 | CVE_STATUS[CVE-2017-6346] = "fixed-version: Fixed from version 4.10" | ||
1940 | |||
1941 | CVE_STATUS[CVE-2017-6347] = "fixed-version: Fixed from version 4.11rc1" | ||
1942 | |||
1943 | CVE_STATUS[CVE-2017-6348] = "fixed-version: Fixed from version 4.10" | ||
1944 | |||
1945 | CVE_STATUS[CVE-2017-6353] = "fixed-version: Fixed from version 4.11rc1" | ||
1946 | |||
1947 | CVE_STATUS[CVE-2017-6874] = "fixed-version: Fixed from version 4.11rc2" | ||
1948 | |||
1949 | CVE_STATUS[CVE-2017-6951] = "fixed-version: Fixed from version 3.18rc1" | ||
1950 | |||
1951 | CVE_STATUS[CVE-2017-7184] = "fixed-version: Fixed from version 4.11rc5" | ||
1952 | |||
1953 | CVE_STATUS[CVE-2017-7187] = "fixed-version: Fixed from version 4.11rc5" | ||
1954 | |||
1955 | CVE_STATUS[CVE-2017-7261] = "fixed-version: Fixed from version 4.11rc6" | ||
1956 | |||
1957 | CVE_STATUS[CVE-2017-7273] = "fixed-version: Fixed from version 4.10rc4" | ||
1958 | |||
1959 | CVE_STATUS[CVE-2017-7277] = "fixed-version: Fixed from version 4.11rc4" | ||
1960 | |||
1961 | CVE_STATUS[CVE-2017-7294] = "fixed-version: Fixed from version 4.11rc6" | ||
1962 | |||
1963 | CVE_STATUS[CVE-2017-7308] = "fixed-version: Fixed from version 4.11rc6" | ||
1964 | |||
1965 | CVE_STATUS[CVE-2017-7346] = "fixed-version: Fixed from version 4.12rc5" | ||
1966 | |||
1967 | # CVE-2017-7369 has no known resolution | ||
1968 | |||
1969 | CVE_STATUS[CVE-2017-7374] = "fixed-version: Fixed from version 4.11rc4" | ||
1970 | |||
1971 | CVE_STATUS[CVE-2017-7472] = "fixed-version: Fixed from version 4.11rc8" | ||
1972 | |||
1973 | CVE_STATUS[CVE-2017-7477] = "fixed-version: Fixed from version 4.11" | ||
1974 | |||
1975 | CVE_STATUS[CVE-2017-7482] = "fixed-version: Fixed from version 4.12rc7" | ||
1976 | |||
1977 | CVE_STATUS[CVE-2017-7487] = "fixed-version: Fixed from version 4.12rc1" | ||
1978 | |||
1979 | CVE_STATUS[CVE-2017-7495] = "fixed-version: Fixed from version 4.7rc1" | ||
1980 | |||
1981 | CVE_STATUS[CVE-2017-7518] = "fixed-version: Fixed from version 4.12rc7" | ||
1982 | |||
1983 | CVE_STATUS[CVE-2017-7533] = "fixed-version: Fixed from version 4.13rc1" | ||
1984 | |||
1985 | CVE_STATUS[CVE-2017-7541] = "fixed-version: Fixed from version 4.13rc1" | ||
1986 | |||
1987 | CVE_STATUS[CVE-2017-7542] = "fixed-version: Fixed from version 4.13rc2" | ||
1988 | |||
1989 | CVE_STATUS[CVE-2017-7558] = "fixed-version: Fixed from version 4.13" | ||
1990 | |||
1991 | CVE_STATUS[CVE-2017-7616] = "fixed-version: Fixed from version 4.11rc6" | ||
1992 | |||
1993 | CVE_STATUS[CVE-2017-7618] = "fixed-version: Fixed from version 4.11rc8" | ||
1994 | |||
1995 | CVE_STATUS[CVE-2017-7645] = "fixed-version: Fixed from version 4.11" | ||
1996 | |||
1997 | CVE_STATUS[CVE-2017-7889] = "fixed-version: Fixed from version 4.11rc7" | ||
1998 | |||
1999 | CVE_STATUS[CVE-2017-7895] = "fixed-version: Fixed from version 4.11" | ||
2000 | |||
2001 | CVE_STATUS[CVE-2017-7979] = "fixed-version: Fixed from version 4.11rc8" | ||
2002 | |||
2003 | CVE_STATUS[CVE-2017-8061] = "fixed-version: Fixed from version 4.11rc4" | ||
2004 | |||
2005 | CVE_STATUS[CVE-2017-8062] = "fixed-version: Fixed from version 4.11rc2" | ||
2006 | |||
2007 | CVE_STATUS[CVE-2017-8063] = "fixed-version: Fixed from version 4.11rc1" | ||
2008 | |||
2009 | CVE_STATUS[CVE-2017-8064] = "fixed-version: Fixed from version 4.11rc1" | ||
2010 | |||
2011 | CVE_STATUS[CVE-2017-8065] = "fixed-version: Fixed from version 4.11rc1" | ||
2012 | |||
2013 | CVE_STATUS[CVE-2017-8066] = "fixed-version: Fixed from version 4.11rc1" | ||
2014 | |||
2015 | CVE_STATUS[CVE-2017-8067] = "fixed-version: Fixed from version 4.11rc1" | ||
2016 | |||
2017 | CVE_STATUS[CVE-2017-8068] = "fixed-version: Fixed from version 4.10rc8" | ||
2018 | |||
2019 | CVE_STATUS[CVE-2017-8069] = "fixed-version: Fixed from version 4.10rc8" | ||
2020 | |||
2021 | CVE_STATUS[CVE-2017-8070] = "fixed-version: Fixed from version 4.10rc8" | ||
2022 | |||
2023 | CVE_STATUS[CVE-2017-8071] = "fixed-version: Fixed from version 4.10rc7" | ||
2024 | |||
2025 | CVE_STATUS[CVE-2017-8072] = "fixed-version: Fixed from version 4.10rc7" | ||
2026 | |||
2027 | CVE_STATUS[CVE-2017-8106] = "fixed-version: Fixed from version 3.16rc1" | ||
2028 | |||
2029 | CVE_STATUS[CVE-2017-8240] = "fixed-version: Fixed from version 3.19rc6" | ||
2030 | |||
2031 | # CVE-2017-8242 has no known resolution | ||
2032 | |||
2033 | # CVE-2017-8244 has no known resolution | ||
2034 | |||
2035 | # CVE-2017-8245 has no known resolution | ||
2036 | |||
2037 | # CVE-2017-8246 has no known resolution | ||
2038 | |||
2039 | CVE_STATUS[CVE-2017-8797] = "fixed-version: Fixed from version 4.12rc1" | ||
2040 | |||
2041 | CVE_STATUS[CVE-2017-8824] = "fixed-version: Fixed from version 4.15rc3" | ||
2042 | |||
2043 | CVE_STATUS[CVE-2017-8831] = "fixed-version: Fixed from version 4.13rc1" | ||
2044 | |||
2045 | CVE_STATUS[CVE-2017-8890] = "fixed-version: Fixed from version 4.12rc1" | ||
2046 | |||
2047 | CVE_STATUS[CVE-2017-8924] = "fixed-version: Fixed from version 4.11rc2" | ||
2048 | |||
2049 | CVE_STATUS[CVE-2017-8925] = "fixed-version: Fixed from version 4.11rc2" | ||
2050 | |||
2051 | CVE_STATUS[CVE-2017-9059] = "fixed-version: Fixed from version 4.12rc1" | ||
2052 | |||
2053 | CVE_STATUS[CVE-2017-9074] = "fixed-version: Fixed from version 4.12rc2" | ||
2054 | |||
2055 | CVE_STATUS[CVE-2017-9075] = "fixed-version: Fixed from version 4.12rc2" | ||
2056 | |||
2057 | CVE_STATUS[CVE-2017-9076] = "fixed-version: Fixed from version 4.12rc2" | ||
2058 | |||
2059 | CVE_STATUS[CVE-2017-9077] = "fixed-version: Fixed from version 4.12rc2" | ||
2060 | |||
2061 | CVE_STATUS[CVE-2017-9150] = "fixed-version: Fixed from version 4.12rc1" | ||
2062 | |||
2063 | CVE_STATUS[CVE-2017-9211] = "fixed-version: Fixed from version 4.12rc3" | ||
2064 | |||
2065 | CVE_STATUS[CVE-2017-9242] = "fixed-version: Fixed from version 4.12rc3" | ||
2066 | |||
2067 | CVE_STATUS[CVE-2017-9605] = "fixed-version: Fixed from version 4.12rc5" | ||
2068 | |||
2069 | CVE_STATUS[CVE-2017-9725] = "fixed-version: Fixed from version 4.3rc7" | ||
2070 | |||
2071 | CVE_STATUS[CVE-2017-9984] = "fixed-version: Fixed from version 4.13rc1" | ||
2072 | |||
2073 | CVE_STATUS[CVE-2017-9985] = "fixed-version: Fixed from version 4.13rc1" | ||
2074 | |||
2075 | CVE_STATUS[CVE-2017-9986] = "fixed-version: Fixed from version 4.15rc1" | ||
2076 | |||
2077 | CVE_STATUS[CVE-2018-1000004] = "fixed-version: Fixed from version 4.15rc9" | ||
2078 | |||
2079 | CVE_STATUS[CVE-2018-1000026] = "fixed-version: Fixed from version 4.16rc1" | ||
2080 | |||
2081 | CVE_STATUS[CVE-2018-1000028] = "fixed-version: Fixed from version 4.15" | ||
2082 | |||
2083 | CVE_STATUS[CVE-2018-1000199] = "fixed-version: Fixed from version 4.16" | ||
2084 | |||
2085 | CVE_STATUS[CVE-2018-1000200] = "fixed-version: Fixed from version 4.17rc5" | ||
2086 | |||
2087 | CVE_STATUS[CVE-2018-1000204] = "fixed-version: Fixed from version 4.17rc7" | ||
2088 | |||
2089 | CVE_STATUS[CVE-2018-10021] = "fixed-version: Fixed from version 4.16rc7" | ||
2090 | |||
2091 | CVE_STATUS[CVE-2018-10074] = "fixed-version: Fixed from version 4.16rc7" | ||
2092 | |||
2093 | CVE_STATUS[CVE-2018-10087] = "fixed-version: Fixed from version 4.13rc1" | ||
2094 | |||
2095 | CVE_STATUS[CVE-2018-10124] = "fixed-version: Fixed from version 4.13rc1" | ||
2096 | |||
2097 | CVE_STATUS[CVE-2018-10322] = "fixed-version: Fixed from version 4.17rc4" | ||
2098 | |||
2099 | CVE_STATUS[CVE-2018-10323] = "fixed-version: Fixed from version 4.17rc4" | ||
2100 | |||
2101 | CVE_STATUS[CVE-2018-1065] = "fixed-version: Fixed from version 4.16rc3" | ||
2102 | |||
2103 | CVE_STATUS[CVE-2018-1066] = "fixed-version: Fixed from version 4.11rc1" | ||
2104 | |||
2105 | CVE_STATUS[CVE-2018-10675] = "fixed-version: Fixed from version 4.13rc6" | ||
2106 | |||
2107 | CVE_STATUS[CVE-2018-1068] = "fixed-version: Fixed from version 4.16rc5" | ||
2108 | |||
2109 | CVE_STATUS[CVE-2018-10840] = "fixed-version: Fixed from version 4.18rc1" | ||
2110 | |||
2111 | CVE_STATUS[CVE-2018-10853] = "fixed-version: Fixed from version 4.18rc1" | ||
2112 | |||
2113 | CVE_STATUS[CVE-2018-1087] = "fixed-version: Fixed from version 4.16rc7" | ||
2114 | |||
2115 | # CVE-2018-10872 has no known resolution | ||
2116 | |||
2117 | CVE_STATUS[CVE-2018-10876] = "fixed-version: Fixed from version 4.18rc4" | ||
2118 | |||
2119 | CVE_STATUS[CVE-2018-10877] = "fixed-version: Fixed from version 4.18rc4" | ||
2120 | |||
2121 | CVE_STATUS[CVE-2018-10878] = "fixed-version: Fixed from version 4.18rc4" | ||
2122 | |||
2123 | CVE_STATUS[CVE-2018-10879] = "fixed-version: Fixed from version 4.18rc4" | ||
2124 | |||
2125 | CVE_STATUS[CVE-2018-10880] = "fixed-version: Fixed from version 4.18rc4" | ||
2126 | |||
2127 | CVE_STATUS[CVE-2018-10881] = "fixed-version: Fixed from version 4.18rc4" | ||
2128 | |||
2129 | CVE_STATUS[CVE-2018-10882] = "fixed-version: Fixed from version 4.18rc4" | ||
2130 | |||
2131 | CVE_STATUS[CVE-2018-10883] = "fixed-version: Fixed from version 4.18rc4" | ||
2132 | |||
2133 | CVE_STATUS[CVE-2018-10901] = "fixed-version: Fixed from version 2.6.36rc1" | ||
2134 | |||
2135 | CVE_STATUS[CVE-2018-10902] = "fixed-version: Fixed from version 4.18rc6" | ||
2136 | |||
2137 | CVE_STATUS[CVE-2018-1091] = "fixed-version: Fixed from version 4.14rc2" | ||
2138 | |||
2139 | CVE_STATUS[CVE-2018-1092] = "fixed-version: Fixed from version 4.17rc1" | ||
2140 | |||
2141 | CVE_STATUS[CVE-2018-1093] = "fixed-version: Fixed from version 4.17rc1" | ||
2142 | |||
2143 | CVE_STATUS[CVE-2018-10938] = "fixed-version: Fixed from version 4.13rc5" | ||
2144 | |||
2145 | CVE_STATUS[CVE-2018-1094] = "fixed-version: Fixed from version 4.17rc1" | ||
2146 | |||
2147 | CVE_STATUS[CVE-2018-10940] = "fixed-version: Fixed from version 4.17rc3" | ||
2148 | |||
2149 | CVE_STATUS[CVE-2018-1095] = "fixed-version: Fixed from version 4.17rc1" | ||
2150 | |||
2151 | CVE_STATUS[CVE-2018-1108] = "fixed-version: Fixed from version 4.17rc2" | ||
2152 | |||
2153 | CVE_STATUS[CVE-2018-1118] = "fixed-version: Fixed from version 4.18rc1" | ||
2154 | |||
2155 | CVE_STATUS[CVE-2018-1120] = "fixed-version: Fixed from version 4.17rc6" | ||
2156 | |||
2157 | # CVE-2018-1121 has no known resolution | ||
2158 | |||
2159 | CVE_STATUS[CVE-2018-11232] = "fixed-version: Fixed from version 4.11rc1" | ||
2160 | |||
2161 | CVE_STATUS[CVE-2018-1128] = "fixed-version: Fixed from version 4.19rc1" | ||
2162 | |||
2163 | CVE_STATUS[CVE-2018-1129] = "fixed-version: Fixed from version 4.19rc1" | ||
2164 | |||
2165 | CVE_STATUS[CVE-2018-1130] = "fixed-version: Fixed from version 4.16rc7" | ||
2166 | |||
2167 | CVE_STATUS[CVE-2018-11412] = "fixed-version: Fixed from version 4.18rc1" | ||
2168 | |||
2169 | CVE_STATUS[CVE-2018-11506] = "fixed-version: Fixed from version 4.17rc7" | ||
2170 | |||
2171 | CVE_STATUS[CVE-2018-11508] = "fixed-version: Fixed from version 4.17rc5" | ||
2172 | |||
2173 | # CVE-2018-11987 has no known resolution | ||
2174 | |||
2175 | CVE_STATUS[CVE-2018-12126] = "fixed-version: Fixed from version 5.2rc1" | ||
2176 | |||
2177 | CVE_STATUS[CVE-2018-12127] = "fixed-version: Fixed from version 5.2rc1" | ||
2178 | |||
2179 | CVE_STATUS[CVE-2018-12130] = "fixed-version: Fixed from version 5.2rc1" | ||
2180 | |||
2181 | CVE_STATUS[CVE-2018-12207] = "fixed-version: Fixed from version 5.4rc2" | ||
2182 | |||
2183 | CVE_STATUS[CVE-2018-12232] = "fixed-version: Fixed from version 4.18rc1" | ||
2184 | |||
2185 | CVE_STATUS[CVE-2018-12233] = "fixed-version: Fixed from version 4.18rc2" | ||
2186 | |||
2187 | CVE_STATUS[CVE-2018-12633] = "fixed-version: Fixed from version 4.18rc1" | ||
2188 | |||
2189 | CVE_STATUS[CVE-2018-12714] = "fixed-version: Fixed from version 4.18rc2" | ||
2190 | |||
2191 | CVE_STATUS[CVE-2018-12896] = "fixed-version: Fixed from version 4.19rc1" | ||
2192 | |||
2193 | CVE_STATUS[CVE-2018-12904] = "fixed-version: Fixed from version 4.18rc1" | ||
2194 | |||
2195 | # CVE-2018-12928 has no known resolution | ||
2196 | |||
2197 | # CVE-2018-12929 has no known resolution | ||
2198 | |||
2199 | # CVE-2018-12930 has no known resolution | ||
2200 | |||
2201 | # CVE-2018-12931 has no known resolution | ||
2202 | |||
2203 | CVE_STATUS[CVE-2018-13053] = "fixed-version: Fixed from version 4.19rc1" | ||
2204 | |||
2205 | CVE_STATUS[CVE-2018-13093] = "fixed-version: Fixed from version 4.18rc1" | ||
2206 | |||
2207 | CVE_STATUS[CVE-2018-13094] = "fixed-version: Fixed from version 4.18rc1" | ||
2208 | |||
2209 | CVE_STATUS[CVE-2018-13095] = "fixed-version: Fixed from version 4.18rc3" | ||
2210 | |||
2211 | CVE_STATUS[CVE-2018-13096] = "fixed-version: Fixed from version 4.19rc1" | ||
2212 | |||
2213 | CVE_STATUS[CVE-2018-13097] = "fixed-version: Fixed from version 4.19rc1" | ||
2214 | |||
2215 | CVE_STATUS[CVE-2018-13098] = "fixed-version: Fixed from version 4.19rc1" | ||
2216 | |||
2217 | CVE_STATUS[CVE-2018-13099] = "fixed-version: Fixed from version 4.19rc1" | ||
2218 | |||
2219 | CVE_STATUS[CVE-2018-13100] = "fixed-version: Fixed from version 4.19rc1" | ||
2220 | |||
2221 | CVE_STATUS[CVE-2018-13405] = "fixed-version: Fixed from version 4.18rc4" | ||
2222 | |||
2223 | CVE_STATUS[CVE-2018-13406] = "fixed-version: Fixed from version 4.18rc1" | ||
2224 | |||
2225 | CVE_STATUS[CVE-2018-14609] = "fixed-version: Fixed from version 4.19rc1" | ||
2226 | |||
2227 | CVE_STATUS[CVE-2018-14610] = "fixed-version: Fixed from version 4.19rc1" | ||
2228 | |||
2229 | CVE_STATUS[CVE-2018-14611] = "fixed-version: Fixed from version 4.19rc1" | ||
2230 | |||
2231 | CVE_STATUS[CVE-2018-14612] = "fixed-version: Fixed from version 4.19rc1" | ||
2232 | |||
2233 | CVE_STATUS[CVE-2018-14613] = "fixed-version: Fixed from version 4.19rc1" | ||
2234 | |||
2235 | CVE_STATUS[CVE-2018-14614] = "fixed-version: Fixed from version 4.19rc1" | ||
2236 | |||
2237 | CVE_STATUS[CVE-2018-14615] = "fixed-version: Fixed from version 4.19rc1" | ||
2238 | |||
2239 | CVE_STATUS[CVE-2018-14616] = "fixed-version: Fixed from version 4.19rc1" | ||
2240 | |||
2241 | CVE_STATUS[CVE-2018-14617] = "fixed-version: Fixed from version 4.19rc1" | ||
2242 | |||
2243 | CVE_STATUS[CVE-2018-14619] = "fixed-version: Fixed from version 4.15rc4" | ||
2244 | |||
2245 | CVE_STATUS[CVE-2018-14625] = "fixed-version: Fixed from version 4.20rc6" | ||
2246 | |||
2247 | CVE_STATUS[CVE-2018-14633] = "fixed-version: Fixed from version 4.19rc6" | ||
2248 | |||
2249 | CVE_STATUS[CVE-2018-14634] = "fixed-version: Fixed from version 4.13rc1" | ||
2250 | |||
2251 | CVE_STATUS[CVE-2018-14641] = "fixed-version: Fixed from version 4.19rc4" | ||
2252 | |||
2253 | CVE_STATUS[CVE-2018-14646] = "fixed-version: Fixed from version 4.15rc8" | ||
2254 | |||
2255 | CVE_STATUS[CVE-2018-14656] = "fixed-version: Fixed from version 4.19rc2" | ||
2256 | |||
2257 | CVE_STATUS[CVE-2018-14678] = "fixed-version: Fixed from version 4.18rc8" | ||
2258 | |||
2259 | CVE_STATUS[CVE-2018-14734] = "fixed-version: Fixed from version 4.18rc1" | ||
2260 | |||
2261 | CVE_STATUS[CVE-2018-15471] = "fixed-version: Fixed from version 4.19rc7" | ||
2262 | |||
2263 | CVE_STATUS[CVE-2018-15572] = "fixed-version: Fixed from version 4.19rc1" | ||
2264 | |||
2265 | CVE_STATUS[CVE-2018-15594] = "fixed-version: Fixed from version 4.19rc1" | ||
2266 | |||
2267 | CVE_STATUS[CVE-2018-16276] = "fixed-version: Fixed from version 4.18rc5" | ||
2268 | |||
2269 | CVE_STATUS[CVE-2018-16597] = "fixed-version: Fixed from version 4.8rc1" | ||
2270 | |||
2271 | CVE_STATUS[CVE-2018-16658] = "fixed-version: Fixed from version 4.19rc2" | ||
2272 | |||
2273 | CVE_STATUS[CVE-2018-16862] = "fixed-version: Fixed from version 4.20rc5" | ||
2274 | |||
2275 | CVE_STATUS[CVE-2018-16871] = "fixed-version: Fixed from version 4.20rc3" | ||
2276 | |||
2277 | CVE_STATUS[CVE-2018-16880] = "fixed-version: Fixed from version 5.0rc5" | ||
2278 | |||
2279 | CVE_STATUS[CVE-2018-16882] = "fixed-version: Fixed from version 4.20" | ||
2280 | |||
2281 | CVE_STATUS[CVE-2018-16884] = "fixed-version: Fixed from version 5.0rc1" | ||
2282 | |||
2283 | # CVE-2018-16885 has no known resolution | ||
2284 | |||
2285 | CVE_STATUS[CVE-2018-17182] = "fixed-version: Fixed from version 4.19rc4" | ||
2286 | |||
2287 | CVE_STATUS[CVE-2018-17972] = "fixed-version: Fixed from version 4.19rc7" | ||
2288 | |||
2289 | # CVE-2018-17977 has no known resolution | ||
2290 | |||
2291 | CVE_STATUS[CVE-2018-18021] = "fixed-version: Fixed from version 4.19rc7" | ||
2292 | |||
2293 | CVE_STATUS[CVE-2018-18281] = "fixed-version: Fixed from version 4.19" | ||
2294 | |||
2295 | CVE_STATUS[CVE-2018-18386] = "fixed-version: Fixed from version 4.15rc6" | ||
2296 | |||
2297 | CVE_STATUS[CVE-2018-18397] = "fixed-version: Fixed from version 4.20rc5" | ||
2298 | |||
2299 | CVE_STATUS[CVE-2018-18445] = "fixed-version: Fixed from version 4.19rc7" | ||
2300 | |||
2301 | CVE_STATUS[CVE-2018-18559] = "fixed-version: Fixed from version 4.15rc2" | ||
2302 | |||
2303 | # CVE-2018-18653 has no known resolution | ||
2304 | |||
2305 | CVE_STATUS[CVE-2018-18690] = "fixed-version: Fixed from version 4.17rc4" | ||
2306 | |||
2307 | CVE_STATUS[CVE-2018-18710] = "fixed-version: Fixed from version 4.20rc1" | ||
2308 | |||
2309 | CVE_STATUS[CVE-2018-18955] = "fixed-version: Fixed from version 4.20rc2" | ||
2310 | |||
2311 | CVE_STATUS[CVE-2018-19406] = "fixed-version: Fixed from version 4.20rc5" | ||
2312 | |||
2313 | CVE_STATUS[CVE-2018-19407] = "fixed-version: Fixed from version 4.20rc5" | ||
2314 | |||
2315 | CVE_STATUS[CVE-2018-19824] = "fixed-version: Fixed from version 4.20rc6" | ||
2316 | |||
2317 | CVE_STATUS[CVE-2018-19854] = "fixed-version: Fixed from version 4.20rc3" | ||
2318 | |||
2319 | CVE_STATUS[CVE-2018-19985] = "fixed-version: Fixed from version 4.20" | ||
2320 | |||
2321 | CVE_STATUS[CVE-2018-20169] = "fixed-version: Fixed from version 4.20rc6" | ||
2322 | |||
2323 | CVE_STATUS[CVE-2018-20449] = "fixed-version: Fixed from version 4.15rc2" | ||
2324 | |||
2325 | CVE_STATUS[CVE-2018-20509] = "fixed-version: Fixed from version 4.14rc1" | ||
2326 | |||
2327 | CVE_STATUS[CVE-2018-20510] = "fixed-version: Fixed from version 4.16rc3" | ||
2328 | |||
2329 | CVE_STATUS[CVE-2018-20511] = "fixed-version: Fixed from version 4.19rc5" | ||
2330 | |||
2331 | CVE_STATUS[CVE-2018-20669] = "fixed-version: Fixed from version 5.0rc1" | ||
2332 | |||
2333 | CVE_STATUS[CVE-2018-20784] = "fixed-version: Fixed from version 5.0rc1" | ||
2334 | |||
2335 | CVE_STATUS[CVE-2018-20836] = "fixed-version: Fixed from version 4.20rc1" | ||
2336 | |||
2337 | CVE_STATUS[CVE-2018-20854] = "fixed-version: Fixed from version 4.20rc1" | ||
2338 | |||
2339 | CVE_STATUS[CVE-2018-20855] = "fixed-version: Fixed from version 4.19rc1" | ||
2340 | |||
2341 | CVE_STATUS[CVE-2018-20856] = "fixed-version: Fixed from version 4.19rc1" | ||
2342 | |||
2343 | CVE_STATUS[CVE-2018-20961] = "fixed-version: Fixed from version 4.17rc1" | ||
2344 | |||
2345 | CVE_STATUS[CVE-2018-20976] = "fixed-version: Fixed from version 4.18rc1" | ||
2346 | |||
2347 | CVE_STATUS[CVE-2018-21008] = "fixed-version: Fixed from version 4.18rc1" | ||
2348 | |||
2349 | CVE_STATUS[CVE-2018-25015] = "fixed-version: Fixed from version 4.15rc9" | ||
2350 | |||
2351 | CVE_STATUS[CVE-2018-25020] = "fixed-version: Fixed from version 4.17rc7" | ||
2352 | |||
2353 | # CVE-2018-3574 has no known resolution | ||
2354 | |||
2355 | CVE_STATUS[CVE-2018-3620] = "fixed-version: Fixed from version 4.19rc1" | ||
2356 | |||
2357 | CVE_STATUS[CVE-2018-3639] = "fixed-version: Fixed from version 4.17rc7" | ||
2358 | |||
2359 | CVE_STATUS[CVE-2018-3646] = "fixed-version: Fixed from version 4.19rc1" | ||
2360 | |||
2361 | CVE_STATUS[CVE-2018-3665] = "fixed-version: Fixed from version 3.7rc1" | ||
2362 | |||
2363 | CVE_STATUS[CVE-2018-3693] = "fixed-version: Fixed from version 4.19rc1" | ||
2364 | |||
2365 | CVE_STATUS[CVE-2018-5332] = "fixed-version: Fixed from version 4.15rc8" | ||
2366 | |||
2367 | CVE_STATUS[CVE-2018-5333] = "fixed-version: Fixed from version 4.15rc8" | ||
2368 | |||
2369 | CVE_STATUS[CVE-2018-5344] = "fixed-version: Fixed from version 4.15rc8" | ||
2370 | |||
2371 | CVE_STATUS[CVE-2018-5390] = "fixed-version: Fixed from version 4.18rc7" | ||
2372 | |||
2373 | CVE_STATUS[CVE-2018-5391] = "fixed-version: Fixed from version 4.19rc1" | ||
2374 | |||
2375 | CVE_STATUS[CVE-2018-5703] = "fixed-version: Fixed from version 4.16rc5" | ||
2376 | |||
2377 | CVE_STATUS[CVE-2018-5750] = "fixed-version: Fixed from version 4.16rc1" | ||
2378 | |||
2379 | CVE_STATUS[CVE-2018-5803] = "fixed-version: Fixed from version 4.16rc1" | ||
2380 | |||
2381 | CVE_STATUS[CVE-2018-5814] = "fixed-version: Fixed from version 4.17rc6" | ||
2382 | |||
2383 | CVE_STATUS[CVE-2018-5848] = "fixed-version: Fixed from version 4.16rc1" | ||
2384 | |||
2385 | # Skipping CVE-2018-5856, no affected_versions | ||
2386 | |||
2387 | CVE_STATUS[CVE-2018-5873] = "fixed-version: Fixed from version 4.11rc8" | ||
2388 | |||
2389 | CVE_STATUS[CVE-2018-5953] = "fixed-version: Fixed from version 4.15rc2" | ||
2390 | |||
2391 | CVE_STATUS[CVE-2018-5995] = "fixed-version: Fixed from version 4.15rc2" | ||
2392 | |||
2393 | CVE_STATUS[CVE-2018-6412] = "fixed-version: Fixed from version 4.16rc5" | ||
2394 | |||
2395 | CVE_STATUS[CVE-2018-6554] = "fixed-version: Fixed from version 4.17rc1" | ||
2396 | |||
2397 | CVE_STATUS[CVE-2018-6555] = "fixed-version: Fixed from version 4.17rc1" | ||
2398 | |||
2399 | # CVE-2018-6559 has no known resolution | ||
2400 | |||
2401 | CVE_STATUS[CVE-2018-6927] = "fixed-version: Fixed from version 4.15rc9" | ||
2402 | |||
2403 | CVE_STATUS[CVE-2018-7191] = "fixed-version: Fixed from version 4.14rc6" | ||
2404 | |||
2405 | CVE_STATUS[CVE-2018-7273] = "fixed-version: Fixed from version 4.15rc2" | ||
2406 | |||
2407 | CVE_STATUS[CVE-2018-7480] = "fixed-version: Fixed from version 4.11rc1" | ||
2408 | |||
2409 | CVE_STATUS[CVE-2018-7492] = "fixed-version: Fixed from version 4.15rc3" | ||
2410 | |||
2411 | CVE_STATUS[CVE-2018-7566] = "fixed-version: Fixed from version 4.16rc2" | ||
2412 | |||
2413 | CVE_STATUS[CVE-2018-7740] = "fixed-version: Fixed from version 4.16rc7" | ||
2414 | |||
2415 | CVE_STATUS[CVE-2018-7754] = "fixed-version: Fixed from version 4.15rc2" | ||
2416 | |||
2417 | CVE_STATUS[CVE-2018-7755] = "fixed-version: Fixed from version 4.19rc5" | ||
2418 | |||
2419 | CVE_STATUS[CVE-2018-7757] = "fixed-version: Fixed from version 4.16rc1" | ||
2420 | |||
2421 | CVE_STATUS[CVE-2018-7995] = "fixed-version: Fixed from version 4.16rc5" | ||
2422 | |||
2423 | CVE_STATUS[CVE-2018-8043] = "fixed-version: Fixed from version 4.16rc1" | ||
2424 | |||
2425 | CVE_STATUS[CVE-2018-8087] = "fixed-version: Fixed from version 4.16rc1" | ||
2426 | |||
2427 | CVE_STATUS[CVE-2018-8781] = "fixed-version: Fixed from version 4.16rc7" | ||
2428 | |||
2429 | CVE_STATUS[CVE-2018-8822] = "fixed-version: Fixed from version 4.16rc7" | ||
2430 | |||
2431 | CVE_STATUS[CVE-2018-8897] = "fixed-version: Fixed from version 4.16rc7" | ||
2432 | |||
2433 | CVE_STATUS[CVE-2018-9363] = "fixed-version: Fixed from version 4.19rc1" | ||
2434 | |||
2435 | CVE_STATUS[CVE-2018-9385] = "fixed-version: Fixed from version 4.17rc3" | ||
2436 | |||
2437 | CVE_STATUS[CVE-2018-9415] = "fixed-version: Fixed from version 4.17rc3" | ||
2438 | |||
2439 | CVE_STATUS[CVE-2018-9422] = "fixed-version: Fixed from version 4.6rc1" | ||
2440 | |||
2441 | CVE_STATUS[CVE-2018-9465] = "fixed-version: Fixed from version 4.15rc6" | ||
2442 | |||
2443 | CVE_STATUS[CVE-2018-9516] = "fixed-version: Fixed from version 4.18rc5" | ||
2444 | |||
2445 | CVE_STATUS[CVE-2018-9517] = "fixed-version: Fixed from version 4.14rc1" | ||
2446 | |||
2447 | CVE_STATUS[CVE-2018-9518] = "fixed-version: Fixed from version 4.16rc3" | ||
2448 | |||
2449 | CVE_STATUS[CVE-2018-9568] = "fixed-version: Fixed from version 4.14rc4" | ||
2450 | |||
2451 | CVE_STATUS[CVE-2019-0136] = "fixed-version: Fixed from version 5.2rc6" | ||
2452 | |||
2453 | CVE_STATUS[CVE-2019-0145] = "fixed-version: Fixed from version 5.2rc1" | ||
2454 | |||
2455 | CVE_STATUS[CVE-2019-0146] = "fixed-version: Fixed from version 5.2rc1" | ||
2456 | |||
2457 | CVE_STATUS[CVE-2019-0147] = "fixed-version: Fixed from version 5.2rc1" | ||
2458 | |||
2459 | CVE_STATUS[CVE-2019-0148] = "fixed-version: Fixed from version 5.2rc1" | ||
2460 | |||
2461 | CVE_STATUS[CVE-2019-0149] = "fixed-version: Fixed from version 5.3rc1" | ||
2462 | |||
2463 | CVE_STATUS[CVE-2019-0154] = "fixed-version: Fixed from version 5.4rc8" | ||
2464 | |||
2465 | CVE_STATUS[CVE-2019-0155] = "fixed-version: Fixed from version 5.4rc8" | ||
2466 | |||
2467 | CVE_STATUS[CVE-2019-10124] = "fixed-version: Fixed from version 5.1rc1" | ||
2468 | |||
2469 | CVE_STATUS[CVE-2019-10125] = "fixed-version: Fixed from version 5.1rc1" | ||
2470 | |||
2471 | CVE_STATUS[CVE-2019-10126] = "fixed-version: Fixed from version 5.2rc6" | ||
2472 | |||
2473 | # CVE-2019-10140 has no known resolution | ||
2474 | |||
2475 | CVE_STATUS[CVE-2019-10142] = "fixed-version: Fixed from version 5.2rc1" | ||
2476 | |||
2477 | CVE_STATUS[CVE-2019-10207] = "fixed-version: Fixed from version 5.3rc3" | ||
2478 | |||
2479 | CVE_STATUS[CVE-2019-10220] = "fixed-version: Fixed from version 5.4rc2" | ||
2480 | |||
2481 | CVE_STATUS[CVE-2019-10638] = "fixed-version: Fixed from version 5.2rc1" | ||
2482 | |||
2483 | CVE_STATUS[CVE-2019-10639] = "fixed-version: Fixed from version 5.1rc4" | ||
2484 | |||
2485 | CVE_STATUS[CVE-2019-11085] = "fixed-version: Fixed from version 5.0rc3" | ||
2486 | |||
2487 | CVE_STATUS[CVE-2019-11091] = "fixed-version: Fixed from version 5.2rc1" | ||
2488 | |||
2489 | CVE_STATUS[CVE-2019-11135] = "fixed-version: Fixed from version 5.4rc8" | ||
2490 | |||
2491 | CVE_STATUS[CVE-2019-11190] = "fixed-version: Fixed from version 4.8rc5" | ||
2492 | |||
2493 | CVE_STATUS[CVE-2019-11191] = "fixed-version: Fixed from version 5.1rc1" | ||
2494 | |||
2495 | CVE_STATUS[CVE-2019-1125] = "fixed-version: Fixed from version 5.3rc4" | ||
2496 | |||
2497 | CVE_STATUS[CVE-2019-11477] = "fixed-version: Fixed from version 5.2rc6" | ||
2498 | |||
2499 | CVE_STATUS[CVE-2019-11478] = "fixed-version: Fixed from version 5.2rc6" | ||
2500 | |||
2501 | CVE_STATUS[CVE-2019-11479] = "fixed-version: Fixed from version 5.2rc6" | ||
2502 | |||
2503 | CVE_STATUS[CVE-2019-11486] = "fixed-version: Fixed from version 5.1rc4" | ||
2504 | |||
2505 | CVE_STATUS[CVE-2019-11487] = "fixed-version: Fixed from version 5.1rc5" | ||
2506 | |||
2507 | CVE_STATUS[CVE-2019-11599] = "fixed-version: Fixed from version 5.1rc6" | ||
2508 | |||
2509 | CVE_STATUS[CVE-2019-11683] = "fixed-version: Fixed from version 5.1" | ||
2510 | |||
2511 | CVE_STATUS[CVE-2019-11810] = "fixed-version: Fixed from version 5.1rc1" | ||
2512 | |||
2513 | CVE_STATUS[CVE-2019-11811] = "fixed-version: Fixed from version 5.1rc1" | ||
2514 | |||
2515 | CVE_STATUS[CVE-2019-11815] = "fixed-version: Fixed from version 5.1rc4" | ||
2516 | |||
2517 | CVE_STATUS[CVE-2019-11833] = "fixed-version: Fixed from version 5.2rc1" | ||
2518 | |||
2519 | CVE_STATUS[CVE-2019-11884] = "fixed-version: Fixed from version 5.2rc1" | ||
2520 | |||
2521 | CVE_STATUS[CVE-2019-12378] = "fixed-version: Fixed from version 5.2rc3" | ||
2522 | |||
2523 | CVE_STATUS[CVE-2019-12379] = "fixed-version: Fixed from version 5.3rc1" | ||
2524 | |||
2525 | CVE_STATUS[CVE-2019-12380] = "fixed-version: Fixed from version 5.2rc3" | ||
2526 | |||
2527 | CVE_STATUS[CVE-2019-12381] = "fixed-version: Fixed from version 5.2rc3" | ||
2528 | |||
2529 | CVE_STATUS[CVE-2019-12382] = "fixed-version: Fixed from version 5.3rc1" | ||
2530 | |||
2531 | CVE_STATUS[CVE-2019-12454] = "fixed-version: Fixed from version 5.3rc1" | ||
2532 | |||
2533 | CVE_STATUS[CVE-2019-12455] = "fixed-version: Fixed from version 5.3rc1" | ||
2534 | |||
2535 | # CVE-2019-12456 has no known resolution | ||
2536 | |||
2537 | CVE_STATUS[CVE-2019-12614] = "fixed-version: Fixed from version 5.3rc1" | ||
2538 | |||
2539 | CVE_STATUS[CVE-2019-12615] = "fixed-version: Fixed from version 5.2rc4" | ||
2540 | |||
2541 | CVE_STATUS[CVE-2019-12817] = "fixed-version: Fixed from version 5.2rc7" | ||
2542 | |||
2543 | CVE_STATUS[CVE-2019-12818] = "fixed-version: Fixed from version 5.0" | ||
2544 | |||
2545 | CVE_STATUS[CVE-2019-12819] = "fixed-version: Fixed from version 5.0rc8" | ||
2546 | |||
2547 | CVE_STATUS[CVE-2019-12881] = "fixed-version: Fixed from version 4.18rc1" | ||
2548 | |||
2549 | CVE_STATUS[CVE-2019-12984] = "fixed-version: Fixed from version 5.2rc6" | ||
2550 | |||
2551 | CVE_STATUS[CVE-2019-13233] = "fixed-version: Fixed from version 5.2rc4" | ||
2552 | |||
2553 | CVE_STATUS[CVE-2019-13272] = "fixed-version: Fixed from version 5.2" | ||
2554 | |||
2555 | CVE_STATUS[CVE-2019-13631] = "fixed-version: Fixed from version 5.3rc1" | ||
2556 | |||
2557 | CVE_STATUS[CVE-2019-13648] = "fixed-version: Fixed from version 5.3rc2" | ||
2558 | |||
2559 | CVE_STATUS[CVE-2019-14283] = "fixed-version: Fixed from version 5.3rc1" | ||
2560 | |||
2561 | CVE_STATUS[CVE-2019-14284] = "fixed-version: Fixed from version 5.3rc1" | ||
2562 | |||
2563 | CVE_STATUS[CVE-2019-14615] = "fixed-version: Fixed from version 5.5rc7" | ||
2564 | |||
2565 | CVE_STATUS[CVE-2019-14763] = "fixed-version: Fixed from version 4.17rc1" | ||
2566 | |||
2567 | CVE_STATUS[CVE-2019-14814] = "fixed-version: Fixed from version 5.3" | ||
2568 | |||
2569 | CVE_STATUS[CVE-2019-14815] = "fixed-version: Fixed from version 5.3" | ||
2570 | |||
2571 | CVE_STATUS[CVE-2019-14816] = "fixed-version: Fixed from version 5.3" | ||
2572 | |||
2573 | CVE_STATUS[CVE-2019-14821] = "fixed-version: Fixed from version 5.4rc1" | ||
2574 | |||
2575 | CVE_STATUS[CVE-2019-14835] = "fixed-version: Fixed from version 5.3" | ||
2576 | |||
2577 | CVE_STATUS[CVE-2019-14895] = "fixed-version: Fixed from version 5.5rc3" | ||
2578 | |||
2579 | CVE_STATUS[CVE-2019-14896] = "fixed-version: Fixed from version 5.5" | ||
2580 | |||
2581 | CVE_STATUS[CVE-2019-14897] = "fixed-version: Fixed from version 5.5" | ||
2582 | |||
2583 | # CVE-2019-14898 has no known resolution | ||
2584 | |||
2585 | CVE_STATUS[CVE-2019-14901] = "fixed-version: Fixed from version 5.5rc3" | ||
2586 | |||
2587 | CVE_STATUS[CVE-2019-15030] = "fixed-version: Fixed from version 5.3rc8" | ||
2588 | |||
2589 | CVE_STATUS[CVE-2019-15031] = "fixed-version: Fixed from version 5.3rc8" | ||
2590 | |||
2591 | CVE_STATUS[CVE-2019-15090] = "fixed-version: Fixed from version 5.2rc2" | ||
2592 | |||
2593 | CVE_STATUS[CVE-2019-15098] = "fixed-version: Fixed from version 5.4rc1" | ||
2594 | |||
2595 | CVE_STATUS[CVE-2019-15099] = "fixed-version: Fixed from version 5.5rc1" | ||
2596 | |||
2597 | CVE_STATUS[CVE-2019-15117] = "fixed-version: Fixed from version 5.3rc5" | ||
2598 | |||
2599 | CVE_STATUS[CVE-2019-15118] = "fixed-version: Fixed from version 5.3rc5" | ||
2600 | |||
2601 | CVE_STATUS[CVE-2019-15211] = "fixed-version: Fixed from version 5.3rc1" | ||
2602 | |||
2603 | CVE_STATUS[CVE-2019-15212] = "fixed-version: Fixed from version 5.2rc3" | ||
2604 | |||
2605 | CVE_STATUS[CVE-2019-15213] = "fixed-version: Fixed from version 5.3rc1" | ||
2606 | |||
2607 | CVE_STATUS[CVE-2019-15214] = "fixed-version: Fixed from version 5.1rc6" | ||
2608 | |||
2609 | CVE_STATUS[CVE-2019-15215] = "fixed-version: Fixed from version 5.3rc1" | ||
2610 | |||
2611 | CVE_STATUS[CVE-2019-15216] = "fixed-version: Fixed from version 5.1" | ||
2612 | |||
2613 | CVE_STATUS[CVE-2019-15217] = "fixed-version: Fixed from version 5.3rc1" | ||
2614 | |||
2615 | CVE_STATUS[CVE-2019-15218] = "fixed-version: Fixed from version 5.2rc3" | ||
2616 | |||
2617 | CVE_STATUS[CVE-2019-15219] = "fixed-version: Fixed from version 5.2rc3" | ||
2618 | |||
2619 | CVE_STATUS[CVE-2019-15220] = "fixed-version: Fixed from version 5.3rc1" | ||
2620 | |||
2621 | CVE_STATUS[CVE-2019-15221] = "fixed-version: Fixed from version 5.2" | ||
2622 | |||
2623 | CVE_STATUS[CVE-2019-15222] = "fixed-version: Fixed from version 5.3rc3" | ||
2624 | |||
2625 | CVE_STATUS[CVE-2019-15223] = "fixed-version: Fixed from version 5.2rc3" | ||
2626 | |||
2627 | # CVE-2019-15239 has no known resolution | ||
2628 | |||
2629 | # CVE-2019-15290 has no known resolution | ||
2630 | |||
2631 | CVE_STATUS[CVE-2019-15291] = "fixed-version: Fixed from version 5.5rc1" | ||
2632 | |||
2633 | CVE_STATUS[CVE-2019-15292] = "fixed-version: Fixed from version 5.1rc1" | ||
2634 | |||
2635 | CVE_STATUS[CVE-2019-15504] = "fixed-version: Fixed from version 5.3" | ||
2636 | |||
2637 | CVE_STATUS[CVE-2019-15505] = "fixed-version: Fixed from version 5.4rc1" | ||
2638 | |||
2639 | CVE_STATUS[CVE-2019-15538] = "fixed-version: Fixed from version 5.3rc6" | ||
2640 | |||
2641 | CVE_STATUS[CVE-2019-15666] = "fixed-version: Fixed from version 5.1" | ||
2642 | |||
2643 | # CVE-2019-15791 has no known resolution | ||
2644 | |||
2645 | # CVE-2019-15792 has no known resolution | ||
2646 | |||
2647 | # CVE-2019-15793 has no known resolution | ||
2648 | |||
2649 | CVE_STATUS[CVE-2019-15794] = "fixed-version: Fixed from version 5.12" | ||
2650 | |||
2651 | CVE_STATUS[CVE-2019-15807] = "fixed-version: Fixed from version 5.2rc3" | ||
2652 | |||
2653 | # CVE-2019-15902 has no known resolution | ||
2654 | |||
2655 | CVE_STATUS[CVE-2019-15916] = "fixed-version: Fixed from version 5.1rc1" | ||
2656 | |||
2657 | CVE_STATUS[CVE-2019-15917] = "fixed-version: Fixed from version 5.1rc1" | ||
2658 | |||
2659 | CVE_STATUS[CVE-2019-15918] = "fixed-version: Fixed from version 5.1rc6" | ||
2660 | |||
2661 | CVE_STATUS[CVE-2019-15919] = "fixed-version: Fixed from version 5.1rc6" | ||
2662 | |||
2663 | CVE_STATUS[CVE-2019-15920] = "fixed-version: Fixed from version 5.1rc6" | ||
2664 | |||
2665 | CVE_STATUS[CVE-2019-15921] = "fixed-version: Fixed from version 5.1rc3" | ||
2666 | |||
2667 | CVE_STATUS[CVE-2019-15922] = "fixed-version: Fixed from version 5.1rc4" | ||
2668 | |||
2669 | CVE_STATUS[CVE-2019-15923] = "fixed-version: Fixed from version 5.1rc4" | ||
2670 | |||
2671 | CVE_STATUS[CVE-2019-15924] = "fixed-version: Fixed from version 5.1rc4" | ||
2672 | |||
2673 | CVE_STATUS[CVE-2019-15925] = "fixed-version: Fixed from version 5.3rc1" | ||
2674 | |||
2675 | CVE_STATUS[CVE-2019-15926] = "fixed-version: Fixed from version 5.3rc1" | ||
2676 | |||
2677 | CVE_STATUS[CVE-2019-15927] = "fixed-version: Fixed from version 5.0rc2" | ||
2678 | |||
2679 | # CVE-2019-16089 has no known resolution | ||
2680 | |||
2681 | CVE_STATUS[CVE-2019-16229] = "fixed-version: Fixed from version 5.5rc1" | ||
2682 | |||
2683 | CVE_STATUS[CVE-2019-16230] = "fixed-version: Fixed from version 5.5rc1" | ||
2684 | |||
2685 | CVE_STATUS[CVE-2019-16231] = "fixed-version: Fixed from version 5.4rc6" | ||
2686 | |||
2687 | CVE_STATUS[CVE-2019-16232] = "fixed-version: Fixed from version 5.5rc1" | ||
2688 | |||
2689 | CVE_STATUS[CVE-2019-16233] = "fixed-version: Fixed from version 5.4rc5" | ||
2690 | |||
2691 | CVE_STATUS[CVE-2019-16234] = "fixed-version: Fixed from version 5.4rc4" | ||
2692 | |||
2693 | CVE_STATUS[CVE-2019-16413] = "fixed-version: Fixed from version 5.1rc1" | ||
2694 | |||
2695 | CVE_STATUS[CVE-2019-16714] = "fixed-version: Fixed from version 5.3rc7" | ||
2696 | |||
2697 | CVE_STATUS[CVE-2019-16746] = "fixed-version: Fixed from version 5.4rc2" | ||
2698 | |||
2699 | CVE_STATUS[CVE-2019-16921] = "fixed-version: Fixed from version 4.17rc1" | ||
2700 | |||
2701 | CVE_STATUS[CVE-2019-16994] = "fixed-version: Fixed from version 5.0" | ||
2702 | |||
2703 | CVE_STATUS[CVE-2019-16995] = "fixed-version: Fixed from version 5.1rc1" | ||
2704 | |||
2705 | CVE_STATUS[CVE-2019-17052] = "fixed-version: Fixed from version 5.4rc1" | ||
2706 | |||
2707 | CVE_STATUS[CVE-2019-17053] = "fixed-version: Fixed from version 5.4rc1" | ||
2708 | |||
2709 | CVE_STATUS[CVE-2019-17054] = "fixed-version: Fixed from version 5.4rc1" | ||
2710 | |||
2711 | CVE_STATUS[CVE-2019-17055] = "fixed-version: Fixed from version 5.4rc1" | ||
2712 | |||
2713 | CVE_STATUS[CVE-2019-17056] = "fixed-version: Fixed from version 5.4rc1" | ||
2714 | |||
2715 | CVE_STATUS[CVE-2019-17075] = "fixed-version: Fixed from version 5.4rc3" | ||
2716 | |||
2717 | CVE_STATUS[CVE-2019-17133] = "fixed-version: Fixed from version 5.4rc4" | ||
2718 | |||
2719 | CVE_STATUS[CVE-2019-17351] = "fixed-version: Fixed from version 5.3rc1" | ||
2720 | |||
2721 | CVE_STATUS[CVE-2019-17666] = "fixed-version: Fixed from version 5.4rc6" | ||
2722 | |||
2723 | CVE_STATUS[CVE-2019-18198] = "fixed-version: Fixed from version 5.4rc1" | ||
2724 | |||
2725 | CVE_STATUS[CVE-2019-18282] = "fixed-version: Fixed from version 5.4rc6" | ||
2726 | |||
2727 | CVE_STATUS[CVE-2019-18660] = "fixed-version: Fixed from version 5.5rc1" | ||
2728 | |||
2729 | CVE_STATUS[CVE-2019-18675] = "fixed-version: Fixed from version 4.17rc5" | ||
2730 | |||
2731 | # CVE-2019-18680 has no known resolution | ||
2732 | |||
2733 | CVE_STATUS[CVE-2019-18683] = "fixed-version: Fixed from version 5.5rc1" | ||
2734 | |||
2735 | CVE_STATUS[CVE-2019-18786] = "fixed-version: Fixed from version 5.5rc1" | ||
2736 | |||
2737 | CVE_STATUS[CVE-2019-18805] = "fixed-version: Fixed from version 5.1rc7" | ||
2738 | |||
2739 | CVE_STATUS[CVE-2019-18806] = "fixed-version: Fixed from version 5.4rc2" | ||
2740 | |||
2741 | CVE_STATUS[CVE-2019-18807] = "fixed-version: Fixed from version 5.4rc2" | ||
2742 | |||
2743 | CVE_STATUS[CVE-2019-18808] = "fixed-version: Fixed from version 5.5rc1" | ||
2744 | |||
2745 | CVE_STATUS[CVE-2019-18809] = "fixed-version: Fixed from version 5.5rc1" | ||
2746 | |||
2747 | CVE_STATUS[CVE-2019-18810] = "fixed-version: Fixed from version 5.4rc2" | ||
2748 | |||
2749 | CVE_STATUS[CVE-2019-18811] = "fixed-version: Fixed from version 5.4rc7" | ||
2750 | |||
2751 | CVE_STATUS[CVE-2019-18812] = "fixed-version: Fixed from version 5.4rc7" | ||
2752 | |||
2753 | CVE_STATUS[CVE-2019-18813] = "fixed-version: Fixed from version 5.4rc6" | ||
2754 | |||
2755 | CVE_STATUS[CVE-2019-18814] = "fixed-version: Fixed from version 5.7rc7" | ||
2756 | |||
2757 | CVE_STATUS[CVE-2019-18885] = "fixed-version: Fixed from version 5.1rc1" | ||
2758 | |||
2759 | CVE_STATUS[CVE-2019-19036] = "fixed-version: Fixed from version 5.4rc1" | ||
2760 | |||
2761 | CVE_STATUS[CVE-2019-19037] = "fixed-version: Fixed from version 5.5rc3" | ||
2762 | |||
2763 | CVE_STATUS[CVE-2019-19039] = "fixed-version: Fixed from version 5.7rc1" | ||
2764 | |||
2765 | CVE_STATUS[CVE-2019-19043] = "fixed-version: Fixed from version 5.5rc1" | ||
2766 | |||
2767 | CVE_STATUS[CVE-2019-19044] = "fixed-version: Fixed from version 5.4rc6" | ||
2768 | |||
2769 | CVE_STATUS[CVE-2019-19045] = "fixed-version: Fixed from version 5.4rc6" | ||
2770 | |||
2771 | CVE_STATUS[CVE-2019-19046] = "fixed-version: Fixed from version 5.5rc1" | ||
2772 | |||
2773 | CVE_STATUS[CVE-2019-19047] = "fixed-version: Fixed from version 5.4rc6" | ||
2774 | |||
2775 | CVE_STATUS[CVE-2019-19048] = "fixed-version: Fixed from version 5.4rc3" | ||
2776 | |||
2777 | CVE_STATUS[CVE-2019-19049] = "fixed-version: Fixed from version 5.4rc5" | ||
2778 | |||
2779 | CVE_STATUS[CVE-2019-19050] = "fixed-version: Fixed from version 5.5rc1" | ||
2780 | |||
2781 | CVE_STATUS[CVE-2019-19051] = "fixed-version: Fixed from version 5.4rc6" | ||
2782 | |||
2783 | CVE_STATUS[CVE-2019-19052] = "fixed-version: Fixed from version 5.4rc7" | ||
2784 | |||
2785 | CVE_STATUS[CVE-2019-19053] = "fixed-version: Fixed from version 5.5rc1" | ||
2786 | |||
2787 | CVE_STATUS[CVE-2019-19054] = "fixed-version: Fixed from version 5.5rc1" | ||
2788 | |||
2789 | CVE_STATUS[CVE-2019-19055] = "fixed-version: Fixed from version 5.4rc4" | ||
2790 | |||
2791 | CVE_STATUS[CVE-2019-19056] = "fixed-version: Fixed from version 5.5rc1" | ||
2792 | |||
2793 | CVE_STATUS[CVE-2019-19057] = "fixed-version: Fixed from version 5.5rc1" | ||
2794 | |||
2795 | CVE_STATUS[CVE-2019-19058] = "fixed-version: Fixed from version 5.4rc4" | ||
2796 | |||
2797 | CVE_STATUS[CVE-2019-19059] = "fixed-version: Fixed from version 5.4rc4" | ||
2798 | |||
2799 | CVE_STATUS[CVE-2019-19060] = "fixed-version: Fixed from version 5.4rc3" | ||
2800 | |||
2801 | CVE_STATUS[CVE-2019-19061] = "fixed-version: Fixed from version 5.4rc3" | ||
2802 | |||
2803 | CVE_STATUS[CVE-2019-19062] = "fixed-version: Fixed from version 5.5rc1" | ||
2804 | |||
2805 | CVE_STATUS[CVE-2019-19063] = "fixed-version: Fixed from version 5.5rc1" | ||
2806 | |||
2807 | CVE_STATUS[CVE-2019-19064] = "fixed-version: Fixed from version 5.5rc1" | ||
2808 | |||
2809 | CVE_STATUS[CVE-2019-19065] = "fixed-version: Fixed from version 5.4rc3" | ||
2810 | |||
2811 | CVE_STATUS[CVE-2019-19066] = "fixed-version: Fixed from version 5.5rc1" | ||
2812 | |||
2813 | CVE_STATUS[CVE-2019-19067] = "fixed-version: Fixed from version 5.4rc2" | ||
2814 | |||
2815 | CVE_STATUS[CVE-2019-19068] = "fixed-version: Fixed from version 5.5rc1" | ||
2816 | |||
2817 | CVE_STATUS[CVE-2019-19069] = "fixed-version: Fixed from version 5.4rc3" | ||
2818 | |||
2819 | CVE_STATUS[CVE-2019-19070] = "fixed-version: Fixed from version 5.5rc1" | ||
2820 | |||
2821 | CVE_STATUS[CVE-2019-19071] = "fixed-version: Fixed from version 5.5rc1" | ||
2822 | |||
2823 | CVE_STATUS[CVE-2019-19072] = "fixed-version: Fixed from version 5.4rc1" | ||
2824 | |||
2825 | CVE_STATUS[CVE-2019-19073] = "fixed-version: Fixed from version 5.4rc1" | ||
2826 | |||
2827 | CVE_STATUS[CVE-2019-19074] = "fixed-version: Fixed from version 5.4rc1" | ||
2828 | |||
2829 | CVE_STATUS[CVE-2019-19075] = "fixed-version: Fixed from version 5.4rc2" | ||
2830 | |||
2831 | CVE_STATUS[CVE-2019-19076] = "fixed-version: Fixed from version 5.4rc1" | ||
2832 | |||
2833 | CVE_STATUS[CVE-2019-19077] = "fixed-version: Fixed from version 5.4rc1" | ||
2834 | |||
2835 | CVE_STATUS[CVE-2019-19078] = "fixed-version: Fixed from version 5.5rc1" | ||
2836 | |||
2837 | CVE_STATUS[CVE-2019-19079] = "fixed-version: Fixed from version 5.3" | ||
2838 | |||
2839 | CVE_STATUS[CVE-2019-19080] = "fixed-version: Fixed from version 5.4rc1" | ||
2840 | |||
2841 | CVE_STATUS[CVE-2019-19081] = "fixed-version: Fixed from version 5.4rc1" | ||
2842 | |||
2843 | CVE_STATUS[CVE-2019-19082] = "fixed-version: Fixed from version 5.4rc1" | ||
2844 | |||
2845 | CVE_STATUS[CVE-2019-19083] = "fixed-version: Fixed from version 5.4rc2" | ||
2846 | |||
2847 | CVE_STATUS[CVE-2019-19227] = "fixed-version: Fixed from version 5.1rc3" | ||
2848 | |||
2849 | CVE_STATUS[CVE-2019-19241] = "fixed-version: Fixed from version 5.5rc1" | ||
2850 | |||
2851 | CVE_STATUS[CVE-2019-19252] = "fixed-version: Fixed from version 5.5rc1" | ||
2852 | |||
2853 | CVE_STATUS[CVE-2019-19318] = "fixed-version: Fixed from version 5.4rc1" | ||
2854 | |||
2855 | CVE_STATUS[CVE-2019-19319] = "fixed-version: Fixed from version 5.2rc1" | ||
2856 | |||
2857 | CVE_STATUS[CVE-2019-19332] = "fixed-version: Fixed from version 5.5rc1" | ||
2858 | |||
2859 | CVE_STATUS[CVE-2019-19338] = "fixed-version: Fixed from version 5.5rc1" | ||
2860 | |||
2861 | CVE_STATUS[CVE-2019-19377] = "fixed-version: Fixed from version 5.7rc1" | ||
2862 | |||
2863 | # CVE-2019-19378 has no known resolution | ||
2864 | |||
2865 | CVE_STATUS[CVE-2019-19447] = "fixed-version: Fixed from version 5.5rc1" | ||
2866 | |||
2867 | CVE_STATUS[CVE-2019-19448] = "fixed-version: Fixed from version 5.9rc1" | ||
2868 | |||
2869 | CVE_STATUS[CVE-2019-19449] = "fixed-version: Fixed from version 5.10rc1" | ||
2870 | |||
2871 | CVE_STATUS[CVE-2019-19462] = "fixed-version: Fixed from version 5.8rc1" | ||
2872 | |||
2873 | CVE_STATUS[CVE-2019-19523] = "fixed-version: Fixed from version 5.4rc3" | ||
2874 | |||
2875 | CVE_STATUS[CVE-2019-19524] = "fixed-version: Fixed from version 5.4rc8" | ||
2876 | |||
2877 | CVE_STATUS[CVE-2019-19525] = "fixed-version: Fixed from version 5.4rc2" | ||
2878 | |||
2879 | CVE_STATUS[CVE-2019-19526] = "fixed-version: Fixed from version 5.4rc4" | ||
2880 | |||
2881 | CVE_STATUS[CVE-2019-19527] = "fixed-version: Fixed from version 5.3rc4" | ||
2882 | |||
2883 | CVE_STATUS[CVE-2019-19528] = "fixed-version: Fixed from version 5.4rc3" | ||
2884 | |||
2885 | CVE_STATUS[CVE-2019-19529] = "fixed-version: Fixed from version 5.4rc7" | ||
2886 | |||
2887 | CVE_STATUS[CVE-2019-19530] = "fixed-version: Fixed from version 5.3rc5" | ||
2888 | |||
2889 | CVE_STATUS[CVE-2019-19531] = "fixed-version: Fixed from version 5.3rc4" | ||
2890 | |||
2891 | CVE_STATUS[CVE-2019-19532] = "fixed-version: Fixed from version 5.4rc6" | ||
2892 | |||
2893 | CVE_STATUS[CVE-2019-19533] = "fixed-version: Fixed from version 5.4rc1" | ||
2894 | |||
2895 | CVE_STATUS[CVE-2019-19534] = "fixed-version: Fixed from version 5.4rc7" | ||
2896 | |||
2897 | CVE_STATUS[CVE-2019-19535] = "fixed-version: Fixed from version 5.3rc4" | ||
2898 | |||
2899 | CVE_STATUS[CVE-2019-19536] = "fixed-version: Fixed from version 5.3rc4" | ||
2900 | |||
2901 | CVE_STATUS[CVE-2019-19537] = "fixed-version: Fixed from version 5.3rc5" | ||
2902 | |||
2903 | CVE_STATUS[CVE-2019-19543] = "fixed-version: Fixed from version 5.2rc1" | ||
2904 | |||
2905 | CVE_STATUS[CVE-2019-19602] = "fixed-version: Fixed from version 5.5rc1" | ||
2906 | |||
2907 | CVE_STATUS[CVE-2019-19767] = "fixed-version: Fixed from version 5.5rc1" | ||
2908 | |||
2909 | CVE_STATUS[CVE-2019-19768] = "fixed-version: Fixed from version 5.6rc4" | ||
2910 | |||
2911 | CVE_STATUS[CVE-2019-19769] = "fixed-version: Fixed from version 5.6rc5" | ||
2912 | |||
2913 | CVE_STATUS[CVE-2019-19770] = "fixed-version: Fixed from version 5.9rc1" | ||
2914 | |||
2915 | CVE_STATUS[CVE-2019-19807] = "fixed-version: Fixed from version 5.4rc7" | ||
2916 | |||
2917 | CVE_STATUS[CVE-2019-19813] = "fixed-version: Fixed from version 5.2rc1" | ||
2918 | |||
2919 | # CVE-2019-19814 has no known resolution | ||
2920 | |||
2921 | CVE_STATUS[CVE-2019-19815] = "fixed-version: Fixed from version 5.3rc1" | ||
2922 | |||
2923 | CVE_STATUS[CVE-2019-19816] = "fixed-version: Fixed from version 5.2rc1" | ||
2924 | |||
2925 | CVE_STATUS[CVE-2019-19922] = "fixed-version: Fixed from version 5.4rc1" | ||
2926 | |||
2927 | CVE_STATUS[CVE-2019-19927] = "fixed-version: Fixed from version 5.1rc6" | ||
2928 | |||
2929 | CVE_STATUS[CVE-2019-19947] = "fixed-version: Fixed from version 5.5rc3" | ||
2930 | |||
2931 | CVE_STATUS[CVE-2019-19965] = "fixed-version: Fixed from version 5.5rc2" | ||
2932 | |||
2933 | CVE_STATUS[CVE-2019-19966] = "fixed-version: Fixed from version 5.2rc1" | ||
2934 | |||
2935 | CVE_STATUS[CVE-2019-1999] = "fixed-version: Fixed from version 5.1rc3" | ||
2936 | |||
2937 | CVE_STATUS[CVE-2019-20054] = "fixed-version: Fixed from version 5.1rc3" | ||
2938 | |||
2939 | CVE_STATUS[CVE-2019-20095] = "fixed-version: Fixed from version 5.2rc1" | ||
2940 | |||
2941 | CVE_STATUS[CVE-2019-20096] = "fixed-version: Fixed from version 5.1rc4" | ||
2942 | |||
2943 | CVE_STATUS[CVE-2019-2024] = "fixed-version: Fixed from version 4.16rc1" | ||
2944 | |||
2945 | CVE_STATUS[CVE-2019-2025] = "fixed-version: Fixed from version 4.20rc5" | ||
2946 | |||
2947 | CVE_STATUS[CVE-2019-20422] = "fixed-version: Fixed from version 5.4rc1" | ||
2948 | |||
2949 | CVE_STATUS[CVE-2019-2054] = "fixed-version: Fixed from version 4.8rc1" | ||
2950 | |||
2951 | CVE_STATUS[CVE-2019-20636] = "fixed-version: Fixed from version 5.5rc6" | ||
2952 | |||
2953 | # CVE-2019-20794 has no known resolution | ||
2954 | |||
2955 | CVE_STATUS[CVE-2019-20806] = "fixed-version: Fixed from version 5.2rc1" | ||
2956 | |||
2957 | CVE_STATUS[CVE-2019-20810] = "fixed-version: Fixed from version 5.6rc1" | ||
2958 | |||
2959 | CVE_STATUS[CVE-2019-20811] = "fixed-version: Fixed from version 5.1rc3" | ||
2960 | |||
2961 | CVE_STATUS[CVE-2019-20812] = "fixed-version: Fixed from version 5.5rc3" | ||
2962 | |||
2963 | CVE_STATUS[CVE-2019-20908] = "fixed-version: Fixed from version 5.4rc1" | ||
2964 | |||
2965 | CVE_STATUS[CVE-2019-20934] = "fixed-version: Fixed from version 5.3rc2" | ||
2966 | |||
2967 | CVE_STATUS[CVE-2019-2101] = "fixed-version: Fixed from version 5.1rc1" | ||
2968 | |||
2969 | CVE_STATUS[CVE-2019-2181] = "fixed-version: Fixed from version 5.2rc1" | ||
2970 | |||
2971 | CVE_STATUS[CVE-2019-2182] = "fixed-version: Fixed from version 4.16rc3" | ||
2972 | |||
2973 | CVE_STATUS[CVE-2019-2213] = "fixed-version: Fixed from version 5.2rc6" | ||
2974 | |||
2975 | CVE_STATUS[CVE-2019-2214] = "fixed-version: Fixed from version 5.3rc2" | ||
2976 | |||
2977 | CVE_STATUS[CVE-2019-2215] = "fixed-version: Fixed from version 4.16rc1" | ||
2978 | |||
2979 | CVE_STATUS[CVE-2019-25044] = "fixed-version: Fixed from version 5.2rc4" | ||
2980 | |||
2981 | CVE_STATUS[CVE-2019-25045] = "fixed-version: Fixed from version 5.1" | ||
2982 | |||
2983 | CVE_STATUS[CVE-2019-3016] = "fixed-version: Fixed from version 5.6rc1" | ||
2984 | |||
2985 | CVE_STATUS[CVE-2019-3459] = "fixed-version: Fixed from version 5.1rc1" | ||
2986 | |||
2987 | CVE_STATUS[CVE-2019-3460] = "fixed-version: Fixed from version 5.1rc1" | ||
2988 | |||
2989 | CVE_STATUS[CVE-2019-3701] = "fixed-version: Fixed from version 5.0rc3" | ||
2990 | |||
2991 | CVE_STATUS[CVE-2019-3819] = "fixed-version: Fixed from version 5.0rc6" | ||
2992 | |||
2993 | CVE_STATUS[CVE-2019-3837] = "fixed-version: Fixed from version 3.18rc1" | ||
2994 | |||
2995 | CVE_STATUS[CVE-2019-3846] = "fixed-version: Fixed from version 5.2rc6" | ||
2996 | |||
2997 | CVE_STATUS[CVE-2019-3874] = "fixed-version: Fixed from version 5.2rc1" | ||
2998 | |||
2999 | CVE_STATUS[CVE-2019-3882] = "fixed-version: Fixed from version 5.1rc4" | ||
3000 | |||
3001 | CVE_STATUS[CVE-2019-3887] = "fixed-version: Fixed from version 5.1rc4" | ||
3002 | |||
3003 | CVE_STATUS[CVE-2019-3892] = "fixed-version: Fixed from version 5.1rc6" | ||
3004 | |||
3005 | CVE_STATUS[CVE-2019-3896] = "fixed-version: Fixed from version 2.6.35rc1" | ||
3006 | |||
3007 | CVE_STATUS[CVE-2019-3900] = "fixed-version: Fixed from version 5.2rc4" | ||
3008 | |||
3009 | CVE_STATUS[CVE-2019-3901] = "fixed-version: Fixed from version 4.6rc6" | ||
3010 | |||
3011 | CVE_STATUS[CVE-2019-5108] = "fixed-version: Fixed from version 5.3" | ||
3012 | |||
3013 | # Skipping CVE-2019-5489, no affected_versions | ||
3014 | |||
3015 | CVE_STATUS[CVE-2019-6133] = "fixed-version: Fixed from version 5.0rc2" | ||
3016 | |||
3017 | CVE_STATUS[CVE-2019-6974] = "fixed-version: Fixed from version 5.0rc6" | ||
3018 | |||
3019 | CVE_STATUS[CVE-2019-7221] = "fixed-version: Fixed from version 5.0rc6" | ||
3020 | |||
3021 | CVE_STATUS[CVE-2019-7222] = "fixed-version: Fixed from version 5.0rc6" | ||
3022 | |||
3023 | CVE_STATUS[CVE-2019-7308] = "fixed-version: Fixed from version 5.0rc3" | ||
3024 | |||
3025 | CVE_STATUS[CVE-2019-8912] = "fixed-version: Fixed from version 5.0rc8" | ||
3026 | |||
3027 | CVE_STATUS[CVE-2019-8956] = "fixed-version: Fixed from version 5.0rc6" | ||
3028 | |||
3029 | CVE_STATUS[CVE-2019-8980] = "fixed-version: Fixed from version 5.1rc1" | ||
3030 | |||
3031 | CVE_STATUS[CVE-2019-9003] = "fixed-version: Fixed from version 5.0rc4" | ||
3032 | |||
3033 | CVE_STATUS[CVE-2019-9162] = "fixed-version: Fixed from version 5.0rc7" | ||
3034 | |||
3035 | CVE_STATUS[CVE-2019-9213] = "fixed-version: Fixed from version 5.0" | ||
3036 | |||
3037 | CVE_STATUS[CVE-2019-9245] = "fixed-version: Fixed from version 5.0rc1" | ||
3038 | |||
3039 | CVE_STATUS[CVE-2019-9444] = "fixed-version: Fixed from version 4.15rc2" | ||
3040 | |||
3041 | CVE_STATUS[CVE-2019-9445] = "fixed-version: Fixed from version 5.1rc1" | ||
3042 | |||
3043 | CVE_STATUS[CVE-2019-9453] = "fixed-version: Fixed from version 5.2rc1" | ||
3044 | |||
3045 | CVE_STATUS[CVE-2019-9454] = "fixed-version: Fixed from version 4.15rc9" | ||
3046 | |||
3047 | CVE_STATUS[CVE-2019-9455] = "fixed-version: Fixed from version 5.0rc1" | ||
3048 | |||
3049 | CVE_STATUS[CVE-2019-9456] = "fixed-version: Fixed from version 4.16rc6" | ||
3050 | |||
3051 | CVE_STATUS[CVE-2019-9457] = "fixed-version: Fixed from version 4.13rc1" | ||
3052 | |||
3053 | CVE_STATUS[CVE-2019-9458] = "fixed-version: Fixed from version 4.19rc7" | ||
3054 | |||
3055 | CVE_STATUS[CVE-2019-9466] = "fixed-version: Fixed from version 5.1rc1" | ||
3056 | |||
3057 | CVE_STATUS[CVE-2019-9500] = "fixed-version: Fixed from version 5.1rc1" | ||
3058 | |||
3059 | CVE_STATUS[CVE-2019-9503] = "fixed-version: Fixed from version 5.1rc1" | ||
3060 | |||
3061 | CVE_STATUS[CVE-2019-9506] = "fixed-version: Fixed from version 5.2" | ||
3062 | |||
3063 | CVE_STATUS[CVE-2019-9857] = "fixed-version: Fixed from version 5.1rc2" | ||
3064 | |||
3065 | CVE_STATUS[CVE-2020-0009] = "fixed-version: Fixed from version 5.6rc3" | ||
3066 | |||
3067 | CVE_STATUS[CVE-2020-0030] = "fixed-version: Fixed from version 4.16rc3" | ||
3068 | |||
3069 | CVE_STATUS[CVE-2020-0041] = "fixed-version: Fixed from version 5.5rc2" | ||
3070 | |||
3071 | CVE_STATUS[CVE-2020-0066] = "fixed-version: Fixed from version 4.3rc7" | ||
3072 | |||
3073 | CVE_STATUS[CVE-2020-0067] = "fixed-version: Fixed from version 5.5rc1" | ||
3074 | |||
3075 | CVE_STATUS[CVE-2020-0110] = "fixed-version: Fixed from version 5.6rc2" | ||
3076 | |||
3077 | CVE_STATUS[CVE-2020-0255] = "fixed-version: Fixed from version 5.7rc4" | ||
3078 | |||
3079 | CVE_STATUS[CVE-2020-0305] = "fixed-version: Fixed from version 5.5rc6" | ||
3080 | |||
3081 | # CVE-2020-0347 has no known resolution | ||
3082 | |||
3083 | CVE_STATUS[CVE-2020-0404] = "fixed-version: Fixed from version 5.6rc1" | ||
3084 | |||
3085 | CVE_STATUS[CVE-2020-0423] = "fixed-version: Fixed from version 5.10rc1" | ||
3086 | |||
3087 | CVE_STATUS[CVE-2020-0427] = "fixed-version: Fixed from version 5.5rc1" | ||
3088 | |||
3089 | CVE_STATUS[CVE-2020-0429] = "fixed-version: Fixed from version 4.14rc4" | ||
3090 | |||
3091 | CVE_STATUS[CVE-2020-0430] = "fixed-version: Fixed from version 4.18rc1" | ||
3092 | |||
3093 | CVE_STATUS[CVE-2020-0431] = "fixed-version: Fixed from version 5.5rc6" | ||
3094 | |||
3095 | CVE_STATUS[CVE-2020-0432] = "fixed-version: Fixed from version 5.6rc1" | ||
3096 | |||
3097 | CVE_STATUS[CVE-2020-0433] = "fixed-version: Fixed from version 4.19rc1" | ||
3098 | |||
3099 | CVE_STATUS[CVE-2020-0435] = "fixed-version: Fixed from version 4.19rc1" | ||
3100 | |||
3101 | CVE_STATUS[CVE-2020-0444] = "fixed-version: Fixed from version 5.6rc4" | ||
3102 | |||
3103 | CVE_STATUS[CVE-2020-0465] = "fixed-version: Fixed from version 5.9rc4" | ||
3104 | |||
3105 | CVE_STATUS[CVE-2020-0466] = "fixed-version: Fixed from version 5.9rc2" | ||
3106 | |||
3107 | CVE_STATUS[CVE-2020-0543] = "fixed-version: Fixed from version 5.8rc1" | ||
3108 | |||
3109 | CVE_STATUS[CVE-2020-10135] = "fixed-version: Fixed from version 5.8rc1" | ||
3110 | |||
3111 | CVE_STATUS[CVE-2020-10690] = "fixed-version: Fixed from version 5.5rc5" | ||
3112 | |||
3113 | # CVE-2020-10708 has no known resolution | ||
3114 | |||
3115 | CVE_STATUS[CVE-2020-10711] = "fixed-version: Fixed from version 5.7rc6" | ||
3116 | |||
3117 | CVE_STATUS[CVE-2020-10720] = "fixed-version: Fixed from version 5.2rc3" | ||
3118 | |||
3119 | CVE_STATUS[CVE-2020-10732] = "fixed-version: Fixed from version 5.7" | ||
3120 | |||
3121 | CVE_STATUS[CVE-2020-10742] = "fixed-version: Fixed from version 3.16rc1" | ||
3122 | |||
3123 | CVE_STATUS[CVE-2020-10751] = "fixed-version: Fixed from version 5.7rc4" | ||
3124 | |||
3125 | CVE_STATUS[CVE-2020-10757] = "fixed-version: Fixed from version 5.8rc1" | ||
3126 | |||
3127 | CVE_STATUS[CVE-2020-10766] = "fixed-version: Fixed from version 5.8rc1" | ||
3128 | |||
3129 | CVE_STATUS[CVE-2020-10767] = "fixed-version: Fixed from version 5.8rc1" | ||
3130 | |||
3131 | CVE_STATUS[CVE-2020-10768] = "fixed-version: Fixed from version 5.8rc1" | ||
3132 | |||
3133 | CVE_STATUS[CVE-2020-10769] = "fixed-version: Fixed from version 5.0rc3" | ||
3134 | |||
3135 | CVE_STATUS[CVE-2020-10773] = "fixed-version: Fixed from version 5.4rc6" | ||
3136 | |||
3137 | # CVE-2020-10774 has no known resolution | ||
3138 | |||
3139 | CVE_STATUS[CVE-2020-10781] = "fixed-version: Fixed from version 5.8rc6" | ||
3140 | |||
3141 | CVE_STATUS[CVE-2020-10942] = "fixed-version: Fixed from version 5.6rc4" | ||
3142 | |||
3143 | CVE_STATUS[CVE-2020-11494] = "fixed-version: Fixed from version 5.7rc1" | ||
3144 | |||
3145 | CVE_STATUS[CVE-2020-11565] = "fixed-version: Fixed from version 5.7rc1" | ||
3146 | |||
3147 | CVE_STATUS[CVE-2020-11608] = "fixed-version: Fixed from version 5.7rc1" | ||
3148 | |||
3149 | CVE_STATUS[CVE-2020-11609] = "fixed-version: Fixed from version 5.7rc1" | ||
3150 | |||
3151 | CVE_STATUS[CVE-2020-11668] = "fixed-version: Fixed from version 5.7rc1" | ||
3152 | |||
3153 | CVE_STATUS[CVE-2020-11669] = "fixed-version: Fixed from version 5.2rc1" | ||
3154 | |||
3155 | # CVE-2020-11725 has no known resolution | ||
3156 | |||
3157 | CVE_STATUS[CVE-2020-11884] = "fixed-version: Fixed from version 5.7rc4" | ||
3158 | |||
3159 | # CVE-2020-11935 has no known resolution | ||
3160 | |||
3161 | CVE_STATUS[CVE-2020-12114] = "fixed-version: Fixed from version 5.3rc1" | ||
3162 | |||
3163 | CVE_STATUS[CVE-2020-12351] = "fixed-version: Fixed from version 5.10rc1" | ||
3164 | |||
3165 | CVE_STATUS[CVE-2020-12352] = "fixed-version: Fixed from version 5.10rc1" | ||
3166 | |||
3167 | CVE_STATUS[CVE-2020-12362] = "fixed-version: Fixed from version 5.11rc1" | ||
3168 | |||
3169 | CVE_STATUS[CVE-2020-12363] = "fixed-version: Fixed from version 5.11rc1" | ||
3170 | |||
3171 | CVE_STATUS[CVE-2020-12364] = "fixed-version: Fixed from version 5.11rc1" | ||
3172 | |||
3173 | CVE_STATUS[CVE-2020-12464] = "fixed-version: Fixed from version 5.7rc3" | ||
3174 | |||
3175 | CVE_STATUS[CVE-2020-12465] = "fixed-version: Fixed from version 5.6rc6" | ||
3176 | |||
3177 | CVE_STATUS[CVE-2020-12652] = "fixed-version: Fixed from version 5.5rc7" | ||
3178 | |||
3179 | CVE_STATUS[CVE-2020-12653] = "fixed-version: Fixed from version 5.6rc1" | ||
3180 | |||
3181 | CVE_STATUS[CVE-2020-12654] = "fixed-version: Fixed from version 5.6rc1" | ||
3182 | |||
3183 | CVE_STATUS[CVE-2020-12655] = "fixed-version: Fixed from version 5.7rc1" | ||
3184 | |||
3185 | CVE_STATUS[CVE-2020-12656] = "fixed-version: Fixed from version 5.8rc1" | ||
3186 | |||
3187 | CVE_STATUS[CVE-2020-12657] = "fixed-version: Fixed from version 5.7rc1" | ||
3188 | |||
3189 | CVE_STATUS[CVE-2020-12659] = "fixed-version: Fixed from version 5.7rc2" | ||
3190 | |||
3191 | CVE_STATUS[CVE-2020-12768] = "fixed-version: Fixed from version 5.6rc4" | ||
3192 | |||
3193 | CVE_STATUS[CVE-2020-12769] = "fixed-version: Fixed from version 5.5rc6" | ||
3194 | |||
3195 | CVE_STATUS[CVE-2020-12770] = "fixed-version: Fixed from version 5.7rc3" | ||
3196 | |||
3197 | CVE_STATUS[CVE-2020-12771] = "fixed-version: Fixed from version 5.8rc2" | ||
3198 | |||
3199 | CVE_STATUS[CVE-2020-12826] = "fixed-version: Fixed from version 5.7rc1" | ||
3200 | |||
3201 | CVE_STATUS[CVE-2020-12888] = "fixed-version: Fixed from version 5.8rc1" | ||
3202 | |||
3203 | CVE_STATUS[CVE-2020-12912] = "fixed-version: Fixed from version 5.10rc4" | ||
3204 | |||
3205 | CVE_STATUS[CVE-2020-13143] = "fixed-version: Fixed from version 5.7rc6" | ||
3206 | |||
3207 | CVE_STATUS[CVE-2020-13974] = "fixed-version: Fixed from version 5.8rc1" | ||
3208 | |||
3209 | # CVE-2020-14304 has no known resolution | ||
3210 | |||
3211 | CVE_STATUS[CVE-2020-14305] = "fixed-version: Fixed from version 4.12rc1" | ||
3212 | |||
3213 | CVE_STATUS[CVE-2020-14314] = "fixed-version: Fixed from version 5.9rc2" | ||
3214 | |||
3215 | CVE_STATUS[CVE-2020-14331] = "fixed-version: Fixed from version 5.9rc1" | ||
3216 | |||
3217 | CVE_STATUS[CVE-2020-14351] = "fixed-version: Fixed from version 5.10rc1" | ||
3218 | |||
3219 | CVE_STATUS[CVE-2020-14353] = "fixed-version: Fixed from version 4.14rc3" | ||
3220 | |||
3221 | CVE_STATUS[CVE-2020-14356] = "fixed-version: Fixed from version 5.8rc5" | ||
3222 | |||
3223 | CVE_STATUS[CVE-2020-14381] = "fixed-version: Fixed from version 5.6rc6" | ||
3224 | |||
3225 | CVE_STATUS[CVE-2020-14385] = "fixed-version: Fixed from version 5.9rc4" | ||
3226 | |||
3227 | CVE_STATUS[CVE-2020-14386] = "fixed-version: Fixed from version 5.9rc4" | ||
3228 | |||
3229 | CVE_STATUS[CVE-2020-14390] = "fixed-version: Fixed from version 5.9rc6" | ||
3230 | |||
3231 | CVE_STATUS[CVE-2020-14416] = "fixed-version: Fixed from version 5.5" | ||
3232 | |||
3233 | CVE_STATUS[CVE-2020-15393] = "fixed-version: Fixed from version 5.8rc3" | ||
3234 | |||
3235 | CVE_STATUS[CVE-2020-15436] = "fixed-version: Fixed from version 5.8rc2" | ||
3236 | |||
3237 | CVE_STATUS[CVE-2020-15437] = "fixed-version: Fixed from version 5.8rc7" | ||
3238 | |||
3239 | CVE_STATUS[CVE-2020-15780] = "fixed-version: Fixed from version 5.8rc3" | ||
3240 | |||
3241 | # CVE-2020-15802 has no known resolution | ||
3242 | |||
3243 | CVE_STATUS[CVE-2020-15852] = "fixed-version: Fixed from version 5.8rc6" | ||
3244 | |||
3245 | CVE_STATUS[CVE-2020-16119] = "fixed-version: Fixed from version 5.15rc2" | ||
3246 | |||
3247 | CVE_STATUS[CVE-2020-16120] = "fixed-version: Fixed from version 5.8rc1" | ||
3248 | |||
3249 | CVE_STATUS[CVE-2020-16166] = "fixed-version: Fixed from version 5.8" | ||
3250 | |||
3251 | CVE_STATUS[CVE-2020-1749] = "fixed-version: Fixed from version 5.5rc1" | ||
3252 | |||
3253 | CVE_STATUS[CVE-2020-24394] = "fixed-version: Fixed from version 5.8rc4" | ||
3254 | |||
3255 | CVE_STATUS[CVE-2020-24490] = "fixed-version: Fixed from version 5.8" | ||
3256 | |||
3257 | # CVE-2020-24502 has no known resolution | ||
3258 | |||
3259 | # CVE-2020-24503 has no known resolution | ||
3260 | |||
3261 | CVE_STATUS[CVE-2020-24504] = "fixed-version: Fixed from version 5.12rc1" | ||
3262 | |||
3263 | CVE_STATUS[CVE-2020-24586] = "fixed-version: Fixed from version 5.13rc4" | ||
3264 | |||
3265 | CVE_STATUS[CVE-2020-24587] = "fixed-version: Fixed from version 5.13rc4" | ||
3266 | |||
3267 | CVE_STATUS[CVE-2020-24588] = "fixed-version: Fixed from version 5.13rc4" | ||
3268 | |||
3269 | CVE_STATUS[CVE-2020-25211] = "fixed-version: Fixed from version 5.9rc7" | ||
3270 | |||
3271 | CVE_STATUS[CVE-2020-25212] = "fixed-version: Fixed from version 5.9rc1" | ||
3272 | |||
3273 | # CVE-2020-25220 has no known resolution | ||
3274 | |||
3275 | CVE_STATUS[CVE-2020-25221] = "fixed-version: Fixed from version 5.9rc4" | ||
3276 | |||
3277 | CVE_STATUS[CVE-2020-25284] = "fixed-version: Fixed from version 5.9rc5" | ||
3278 | |||
3279 | CVE_STATUS[CVE-2020-25285] = "fixed-version: Fixed from version 5.9rc4" | ||
3280 | |||
3281 | CVE_STATUS[CVE-2020-25639] = "fixed-version: Fixed from version 5.12rc1" | ||
3282 | |||
3283 | CVE_STATUS[CVE-2020-25641] = "fixed-version: Fixed from version 5.9rc4" | ||
3284 | |||
3285 | CVE_STATUS[CVE-2020-25643] = "fixed-version: Fixed from version 5.9rc7" | ||
3286 | |||
3287 | CVE_STATUS[CVE-2020-25645] = "fixed-version: Fixed from version 5.9rc7" | ||
3288 | |||
3289 | CVE_STATUS[CVE-2020-25656] = "fixed-version: Fixed from version 5.10rc2" | ||
3290 | |||
3291 | # CVE-2020-25661 has no known resolution | ||
3292 | |||
3293 | # CVE-2020-25662 has no known resolution | ||
3294 | |||
3295 | CVE_STATUS[CVE-2020-25668] = "fixed-version: Fixed from version 5.10rc3" | ||
3296 | |||
3297 | CVE_STATUS[CVE-2020-25669] = "fixed-version: Fixed from version 5.10rc5" | ||
3298 | |||
3299 | CVE_STATUS[CVE-2020-25670] = "fixed-version: Fixed from version 5.12rc7" | ||
3300 | |||
3301 | CVE_STATUS[CVE-2020-25671] = "fixed-version: Fixed from version 5.12rc7" | ||
3302 | |||
3303 | CVE_STATUS[CVE-2020-25672] = "fixed-version: Fixed from version 5.12rc7" | ||
3304 | |||
3305 | CVE_STATUS[CVE-2020-25673] = "fixed-version: Fixed from version 5.12rc7" | ||
3306 | |||
3307 | CVE_STATUS[CVE-2020-25704] = "fixed-version: Fixed from version 5.10rc3" | ||
3308 | |||
3309 | CVE_STATUS[CVE-2020-25705] = "fixed-version: Fixed from version 5.10rc1" | ||
3310 | |||
3311 | CVE_STATUS[CVE-2020-26088] = "fixed-version: Fixed from version 5.9rc1" | ||
3312 | |||
3313 | CVE_STATUS[CVE-2020-26139] = "fixed-version: Fixed from version 5.13rc4" | ||
3314 | |||
3315 | # CVE-2020-26140 has no known resolution | ||
3316 | |||
3317 | CVE_STATUS[CVE-2020-26141] = "fixed-version: Fixed from version 5.13rc4" | ||
3318 | |||
3319 | # CVE-2020-26142 has no known resolution | ||
3320 | |||
3321 | # CVE-2020-26143 has no known resolution | ||
3322 | |||
3323 | CVE_STATUS[CVE-2020-26145] = "fixed-version: Fixed from version 5.13rc4" | ||
3324 | |||
3325 | CVE_STATUS[CVE-2020-26147] = "fixed-version: Fixed from version 5.13rc4" | ||
3326 | |||
3327 | CVE_STATUS[CVE-2020-26541] = "fixed-version: Fixed from version 5.13rc1" | ||
3328 | |||
3329 | CVE_STATUS[CVE-2020-26555] = "fixed-version: Fixed from version 5.13rc1" | ||
3330 | |||
3331 | # CVE-2020-26556 has no known resolution | ||
3332 | |||
3333 | # CVE-2020-26557 has no known resolution | ||
3334 | |||
3335 | CVE_STATUS[CVE-2020-26558] = "fixed-version: Fixed from version 5.13rc1" | ||
3336 | |||
3337 | # CVE-2020-26559 has no known resolution | ||
3338 | |||
3339 | # CVE-2020-26560 has no known resolution | ||
3340 | |||
3341 | CVE_STATUS[CVE-2020-27066] = "fixed-version: Fixed from version 5.6" | ||
3342 | |||
3343 | CVE_STATUS[CVE-2020-27067] = "fixed-version: Fixed from version 4.14rc4" | ||
3344 | |||
3345 | CVE_STATUS[CVE-2020-27068] = "fixed-version: Fixed from version 5.6rc2" | ||
3346 | |||
3347 | CVE_STATUS[CVE-2020-27152] = "fixed-version: Fixed from version 5.10rc1" | ||
3348 | |||
3349 | CVE_STATUS[CVE-2020-27170] = "fixed-version: Fixed from version 5.12rc5" | ||
3350 | |||
3351 | CVE_STATUS[CVE-2020-27171] = "fixed-version: Fixed from version 5.12rc5" | ||
3352 | |||
3353 | CVE_STATUS[CVE-2020-27194] = "fixed-version: Fixed from version 5.9" | ||
3354 | |||
3355 | CVE_STATUS[CVE-2020-2732] = "fixed-version: Fixed from version 5.6rc4" | ||
3356 | |||
3357 | CVE_STATUS[CVE-2020-27418] = "fixed-version: Fixed from version 5.6rc5" | ||
3358 | |||
3359 | CVE_STATUS[CVE-2020-27673] = "fixed-version: Fixed from version 5.10rc1" | ||
3360 | |||
3361 | CVE_STATUS[CVE-2020-27675] = "fixed-version: Fixed from version 5.10rc1" | ||
3362 | |||
3363 | CVE_STATUS[CVE-2020-27777] = "fixed-version: Fixed from version 5.10rc1" | ||
3364 | |||
3365 | CVE_STATUS[CVE-2020-27784] = "fixed-version: Fixed from version 5.10rc1" | ||
3366 | |||
3367 | CVE_STATUS[CVE-2020-27786] = "fixed-version: Fixed from version 5.7rc6" | ||
3368 | |||
3369 | CVE_STATUS[CVE-2020-27815] = "fixed-version: Fixed from version 5.11rc1" | ||
3370 | |||
3371 | CVE_STATUS[CVE-2020-27820] = "fixed-version: Fixed from version 5.16rc1" | ||
3372 | |||
3373 | CVE_STATUS[CVE-2020-27825] = "fixed-version: Fixed from version 5.10rc1" | ||
3374 | |||
3375 | CVE_STATUS[CVE-2020-27830] = "fixed-version: Fixed from version 5.10rc7" | ||
3376 | |||
3377 | CVE_STATUS[CVE-2020-27835] = "fixed-version: Fixed from version 5.10rc6" | ||
3378 | |||
3379 | CVE_STATUS[CVE-2020-28097] = "fixed-version: Fixed from version 5.9rc6" | ||
3380 | |||
3381 | CVE_STATUS[CVE-2020-28374] = "fixed-version: Fixed from version 5.11rc4" | ||
3382 | |||
3383 | CVE_STATUS[CVE-2020-28588] = "fixed-version: Fixed from version 5.10rc7" | ||
3384 | |||
3385 | CVE_STATUS[CVE-2020-28915] = "fixed-version: Fixed from version 5.9" | ||
3386 | |||
3387 | CVE_STATUS[CVE-2020-28941] = "fixed-version: Fixed from version 5.10rc5" | ||
3388 | |||
3389 | CVE_STATUS[CVE-2020-28974] = "fixed-version: Fixed from version 5.10rc3" | ||
3390 | |||
3391 | CVE_STATUS[CVE-2020-29368] = "fixed-version: Fixed from version 5.8rc1" | ||
3392 | |||
3393 | CVE_STATUS[CVE-2020-29369] = "fixed-version: Fixed from version 5.8rc7" | ||
3394 | |||
3395 | CVE_STATUS[CVE-2020-29370] = "fixed-version: Fixed from version 5.6rc7" | ||
3396 | |||
3397 | CVE_STATUS[CVE-2020-29371] = "fixed-version: Fixed from version 5.9rc2" | ||
3398 | |||
3399 | CVE_STATUS[CVE-2020-29372] = "fixed-version: Fixed from version 5.7rc3" | ||
3400 | |||
3401 | CVE_STATUS[CVE-2020-29373] = "fixed-version: Fixed from version 5.6rc2" | ||
3402 | |||
3403 | CVE_STATUS[CVE-2020-29374] = "fixed-version: Fixed from version 5.8rc1" | ||
3404 | |||
3405 | CVE_STATUS[CVE-2020-29534] = "fixed-version: Fixed from version 5.10rc1" | ||
3406 | |||
3407 | CVE_STATUS[CVE-2020-29568] = "fixed-version: Fixed from version 5.11rc1" | ||
3408 | |||
3409 | CVE_STATUS[CVE-2020-29569] = "fixed-version: Fixed from version 5.11rc1" | ||
3410 | |||
3411 | CVE_STATUS[CVE-2020-29660] = "fixed-version: Fixed from version 5.10rc7" | ||
3412 | |||
3413 | CVE_STATUS[CVE-2020-29661] = "fixed-version: Fixed from version 5.10rc7" | ||
3414 | |||
3415 | CVE_STATUS[CVE-2020-35499] = "fixed-version: Fixed from version 5.11rc1" | ||
3416 | |||
3417 | # CVE-2020-35501 has no known resolution | ||
3418 | |||
3419 | CVE_STATUS[CVE-2020-35508] = "fixed-version: Fixed from version 5.10rc3" | ||
3420 | |||
3421 | CVE_STATUS[CVE-2020-35513] = "fixed-version: Fixed from version 4.17rc1" | ||
3422 | |||
3423 | CVE_STATUS[CVE-2020-35519] = "fixed-version: Fixed from version 5.10rc7" | ||
3424 | |||
3425 | CVE_STATUS[CVE-2020-36158] = "fixed-version: Fixed from version 5.11rc1" | ||
3426 | |||
3427 | CVE_STATUS[CVE-2020-36310] = "fixed-version: Fixed from version 5.8rc1" | ||
3428 | |||
3429 | CVE_STATUS[CVE-2020-36311] = "fixed-version: Fixed from version 5.9rc5" | ||
3430 | |||
3431 | CVE_STATUS[CVE-2020-36312] = "fixed-version: Fixed from version 5.9rc5" | ||
3432 | |||
3433 | CVE_STATUS[CVE-2020-36313] = "fixed-version: Fixed from version 5.7rc1" | ||
3434 | |||
3435 | CVE_STATUS[CVE-2020-36322] = "fixed-version: Fixed from version 5.11rc1" | ||
3436 | |||
3437 | CVE_STATUS[CVE-2020-36385] = "fixed-version: Fixed from version 5.10rc1" | ||
3438 | |||
3439 | CVE_STATUS[CVE-2020-36386] = "fixed-version: Fixed from version 5.9rc1" | ||
3440 | |||
3441 | CVE_STATUS[CVE-2020-36387] = "fixed-version: Fixed from version 5.9rc1" | ||
3442 | |||
3443 | CVE_STATUS[CVE-2020-36516] = "fixed-version: Fixed from version 5.17rc2" | ||
3444 | |||
3445 | CVE_STATUS[CVE-2020-36557] = "fixed-version: Fixed from version 5.7rc1" | ||
3446 | |||
3447 | CVE_STATUS[CVE-2020-36558] = "fixed-version: Fixed from version 5.6rc3" | ||
3448 | |||
3449 | CVE_STATUS[CVE-2020-36691] = "fixed-version: Fixed from version 5.8rc1" | ||
3450 | |||
3451 | CVE_STATUS[CVE-2020-36694] = "fixed-version: Fixed from version 5.10" | ||
3452 | |||
3453 | CVE_STATUS[CVE-2020-36766] = "fixed-version: Fixed from version 5.9rc1" | ||
3454 | |||
3455 | CVE_STATUS[CVE-2020-3702] = "fixed-version: Fixed from version 5.12rc1" | ||
3456 | |||
3457 | CVE_STATUS[CVE-2020-4788] = "fixed-version: Fixed from version 5.10rc5" | ||
3458 | |||
3459 | CVE_STATUS[CVE-2020-7053] = "fixed-version: Fixed from version 5.2rc1" | ||
3460 | |||
3461 | CVE_STATUS[CVE-2020-8428] = "fixed-version: Fixed from version 5.5" | ||
3462 | |||
3463 | CVE_STATUS[CVE-2020-8647] = "fixed-version: Fixed from version 5.6rc5" | ||
3464 | |||
3465 | CVE_STATUS[CVE-2020-8648] = "fixed-version: Fixed from version 5.6rc3" | ||
3466 | |||
3467 | CVE_STATUS[CVE-2020-8649] = "fixed-version: Fixed from version 5.6rc5" | ||
3468 | |||
3469 | CVE_STATUS[CVE-2020-8694] = "fixed-version: Fixed from version 5.10rc4" | ||
3470 | |||
3471 | # CVE-2020-8832 has no known resolution | ||
3472 | |||
3473 | CVE_STATUS[CVE-2020-8834] = "fixed-version: Fixed from version 4.18rc1" | ||
3474 | |||
3475 | CVE_STATUS[CVE-2020-8835] = "fixed-version: Fixed from version 5.7rc1" | ||
3476 | |||
3477 | CVE_STATUS[CVE-2020-8992] = "fixed-version: Fixed from version 5.6rc2" | ||
3478 | |||
3479 | CVE_STATUS[CVE-2020-9383] = "fixed-version: Fixed from version 5.6rc4" | ||
3480 | |||
3481 | CVE_STATUS[CVE-2020-9391] = "fixed-version: Fixed from version 5.6rc3" | ||
3482 | |||
3483 | CVE_STATUS[CVE-2021-0129] = "fixed-version: Fixed from version 5.13rc1" | ||
3484 | |||
3485 | CVE_STATUS[CVE-2021-0342] = "fixed-version: Fixed from version 5.8rc1" | ||
3486 | |||
3487 | # CVE-2021-0399 has no known resolution | ||
3488 | |||
3489 | CVE_STATUS[CVE-2021-0447] = "fixed-version: Fixed from version 4.15rc1" | ||
3490 | |||
3491 | CVE_STATUS[CVE-2021-0448] = "fixed-version: Fixed from version 5.9rc7" | ||
3492 | |||
3493 | CVE_STATUS[CVE-2021-0512] = "fixed-version: Fixed from version 5.12rc1" | ||
3494 | |||
3495 | CVE_STATUS[CVE-2021-0605] = "fixed-version: Fixed from version 5.8" | ||
3496 | |||
3497 | # CVE-2021-0606 has no known resolution | ||
3498 | |||
3499 | # CVE-2021-0695 has no known resolution | ||
3500 | |||
3501 | CVE_STATUS[CVE-2021-0707] = "fixed-version: Fixed from version 5.11rc3" | ||
3502 | |||
3503 | CVE_STATUS[CVE-2021-0920] = "fixed-version: Fixed from version 5.14rc4" | ||
3504 | |||
3505 | # CVE-2021-0924 has no known resolution | ||
3506 | |||
3507 | CVE_STATUS[CVE-2021-0929] = "fixed-version: Fixed from version 5.6rc1" | ||
3508 | |||
3509 | CVE_STATUS[CVE-2021-0935] = "fixed-version: Fixed from version 4.16rc7" | ||
3510 | |||
3511 | # CVE-2021-0936 has no known resolution | ||
3512 | |||
3513 | CVE_STATUS[CVE-2021-0937] = "fixed-version: Fixed from version 5.12rc8" | ||
3514 | |||
3515 | CVE_STATUS[CVE-2021-0938] = "fixed-version: Fixed from version 5.10rc4" | ||
3516 | |||
3517 | CVE_STATUS[CVE-2021-0941] = "fixed-version: Fixed from version 5.12rc1" | ||
3518 | |||
3519 | # CVE-2021-0961 has no known resolution | ||
3520 | |||
3521 | CVE_STATUS[CVE-2021-1048] = "fixed-version: Fixed from version 5.9rc4" | ||
3522 | |||
3523 | CVE_STATUS[CVE-2021-20177] = "fixed-version: Fixed from version 5.5rc1" | ||
3524 | |||
3525 | CVE_STATUS[CVE-2021-20194] = "fixed-version: Fixed from version 5.10rc1" | ||
3526 | |||
3527 | # CVE-2021-20219 has no known resolution | ||
3528 | |||
3529 | CVE_STATUS[CVE-2021-20226] = "fixed-version: Fixed from version 5.10rc1" | ||
3530 | |||
3531 | CVE_STATUS[CVE-2021-20239] = "fixed-version: Fixed from version 5.9rc1" | ||
3532 | |||
3533 | CVE_STATUS[CVE-2021-20261] = "fixed-version: Fixed from version 4.5rc5" | ||
3534 | |||
3535 | CVE_STATUS[CVE-2021-20265] = "fixed-version: Fixed from version 4.5rc3" | ||
3536 | |||
3537 | CVE_STATUS[CVE-2021-20268] = "fixed-version: Fixed from version 5.11rc5" | ||
3538 | |||
3539 | CVE_STATUS[CVE-2021-20292] = "fixed-version: Fixed from version 5.9rc1" | ||
3540 | |||
3541 | CVE_STATUS[CVE-2021-20317] = "fixed-version: Fixed from version 5.4rc1" | ||
3542 | |||
3543 | CVE_STATUS[CVE-2021-20320] = "fixed-version: Fixed from version 5.15rc3" | ||
3544 | |||
3545 | CVE_STATUS[CVE-2021-20321] = "fixed-version: Fixed from version 5.15rc5" | ||
3546 | |||
3547 | CVE_STATUS[CVE-2021-20322] = "fixed-version: Fixed from version 5.15rc1" | ||
3548 | |||
3549 | CVE_STATUS[CVE-2021-21781] = "fixed-version: Fixed from version 5.11rc7" | ||
3550 | |||
3551 | CVE_STATUS[CVE-2021-22543] = "fixed-version: Fixed from version 5.13" | ||
3552 | |||
3553 | CVE_STATUS[CVE-2021-22555] = "fixed-version: Fixed from version 5.12rc8" | ||
3554 | |||
3555 | CVE_STATUS[CVE-2021-22600] = "fixed-version: Fixed from version 5.16rc6" | ||
3556 | |||
3557 | CVE_STATUS[CVE-2021-23133] = "fixed-version: Fixed from version 5.12rc8" | ||
3558 | |||
3559 | CVE_STATUS[CVE-2021-23134] = "fixed-version: Fixed from version 5.13rc1" | ||
3560 | |||
3561 | CVE_STATUS[CVE-2021-26401] = "fixed-version: Fixed from version 5.17rc8" | ||
3562 | |||
3563 | CVE_STATUS[CVE-2021-26708] = "fixed-version: Fixed from version 5.11rc7" | ||
3564 | |||
3565 | CVE_STATUS[CVE-2021-26930] = "fixed-version: Fixed from version 5.12rc1" | ||
3566 | |||
3567 | CVE_STATUS[CVE-2021-26931] = "fixed-version: Fixed from version 5.12rc1" | ||
3568 | |||
3569 | CVE_STATUS[CVE-2021-26932] = "fixed-version: Fixed from version 5.12rc1" | ||
3570 | |||
3571 | # CVE-2021-26934 has no known resolution | ||
3572 | |||
3573 | CVE_STATUS[CVE-2021-27363] = "fixed-version: Fixed from version 5.12rc2" | ||
3574 | |||
3575 | CVE_STATUS[CVE-2021-27364] = "fixed-version: Fixed from version 5.12rc2" | ||
3576 | |||
3577 | CVE_STATUS[CVE-2021-27365] = "fixed-version: Fixed from version 5.12rc2" | ||
3578 | |||
3579 | CVE_STATUS[CVE-2021-28038] = "fixed-version: Fixed from version 5.12rc2" | ||
3580 | |||
3581 | CVE_STATUS[CVE-2021-28039] = "fixed-version: Fixed from version 5.12rc2" | ||
3582 | |||
3583 | CVE_STATUS[CVE-2021-28375] = "fixed-version: Fixed from version 5.12rc3" | ||
3584 | |||
3585 | CVE_STATUS[CVE-2021-28660] = "fixed-version: Fixed from version 5.12rc3" | ||
3586 | |||
3587 | CVE_STATUS[CVE-2021-28688] = "fixed-version: Fixed from version 5.12rc6" | ||
3588 | |||
3589 | CVE_STATUS[CVE-2021-28691] = "fixed-version: Fixed from version 5.13rc6" | ||
3590 | |||
3591 | CVE_STATUS[CVE-2021-28711] = "fixed-version: Fixed from version 5.16rc7" | ||
3592 | |||
3593 | CVE_STATUS[CVE-2021-28712] = "fixed-version: Fixed from version 5.16rc7" | ||
3594 | |||
3595 | CVE_STATUS[CVE-2021-28713] = "fixed-version: Fixed from version 5.16rc7" | ||
3596 | |||
3597 | CVE_STATUS[CVE-2021-28714] = "fixed-version: Fixed from version 5.16rc7" | ||
3598 | |||
3599 | CVE_STATUS[CVE-2021-28715] = "fixed-version: Fixed from version 5.16rc7" | ||
3600 | |||
3601 | CVE_STATUS[CVE-2021-28950] = "fixed-version: Fixed from version 5.12rc4" | ||
3602 | |||
3603 | CVE_STATUS[CVE-2021-28951] = "fixed-version: Fixed from version 5.12rc2" | ||
3604 | |||
3605 | CVE_STATUS[CVE-2021-28952] = "fixed-version: Fixed from version 5.12rc4" | ||
3606 | |||
3607 | CVE_STATUS[CVE-2021-28964] = "fixed-version: Fixed from version 5.12rc4" | ||
3608 | |||
3609 | CVE_STATUS[CVE-2021-28971] = "fixed-version: Fixed from version 5.12rc4" | ||
3610 | |||
3611 | CVE_STATUS[CVE-2021-28972] = "fixed-version: Fixed from version 5.12rc4" | ||
3612 | |||
3613 | CVE_STATUS[CVE-2021-29154] = "fixed-version: Fixed from version 5.12rc7" | ||
3614 | |||
3615 | CVE_STATUS[CVE-2021-29155] = "fixed-version: Fixed from version 5.12rc8" | ||
3616 | |||
3617 | CVE_STATUS[CVE-2021-29264] = "fixed-version: Fixed from version 5.12rc3" | ||
3618 | |||
3619 | CVE_STATUS[CVE-2021-29265] = "fixed-version: Fixed from version 5.12rc3" | ||
3620 | |||
3621 | CVE_STATUS[CVE-2021-29266] = "fixed-version: Fixed from version 5.12rc4" | ||
3622 | |||
3623 | CVE_STATUS[CVE-2021-29646] = "fixed-version: Fixed from version 5.12rc5" | ||
3624 | |||
3625 | CVE_STATUS[CVE-2021-29647] = "fixed-version: Fixed from version 5.12rc5" | ||
3626 | |||
3627 | CVE_STATUS[CVE-2021-29648] = "fixed-version: Fixed from version 5.12rc5" | ||
3628 | |||
3629 | CVE_STATUS[CVE-2021-29649] = "fixed-version: Fixed from version 5.12rc5" | ||
3630 | |||
3631 | CVE_STATUS[CVE-2021-29650] = "fixed-version: Fixed from version 5.12rc5" | ||
3632 | |||
3633 | CVE_STATUS[CVE-2021-29657] = "fixed-version: Fixed from version 5.12rc6" | ||
3634 | |||
3635 | CVE_STATUS[CVE-2021-30002] = "fixed-version: Fixed from version 5.12rc1" | ||
3636 | |||
3637 | CVE_STATUS[CVE-2021-30178] = "fixed-version: Fixed from version 5.12rc2" | ||
3638 | |||
3639 | CVE_STATUS[CVE-2021-31440] = "fixed-version: Fixed from version 5.13rc1" | ||
3640 | |||
3641 | CVE_STATUS[CVE-2021-3178] = "fixed-version: Fixed from version 5.11rc5" | ||
3642 | |||
3643 | CVE_STATUS[CVE-2021-31829] = "fixed-version: Fixed from version 5.13rc1" | ||
3644 | |||
3645 | CVE_STATUS[CVE-2021-31916] = "fixed-version: Fixed from version 5.12rc5" | ||
3646 | |||
3647 | CVE_STATUS[CVE-2021-32078] = "fixed-version: Fixed from version 5.13rc1" | ||
3648 | |||
3649 | CVE_STATUS[CVE-2021-32399] = "fixed-version: Fixed from version 5.13rc1" | ||
3650 | |||
3651 | CVE_STATUS[CVE-2021-32606] = "fixed-version: Fixed from version 5.13rc4" | ||
3652 | |||
3653 | CVE_STATUS[CVE-2021-33033] = "fixed-version: Fixed from version 5.12rc3" | ||
3654 | |||
3655 | CVE_STATUS[CVE-2021-33034] = "fixed-version: Fixed from version 5.13rc1" | ||
3656 | |||
3657 | CVE_STATUS[CVE-2021-33061] = "fixed-version: Fixed from version 5.18rc1" | ||
3658 | |||
3659 | CVE_STATUS[CVE-2021-33098] = "fixed-version: Fixed from version 5.13rc4" | ||
3660 | |||
3661 | CVE_STATUS[CVE-2021-33135] = "fixed-version: Fixed from version 5.17rc8" | ||
3662 | |||
3663 | CVE_STATUS[CVE-2021-33200] = "fixed-version: Fixed from version 5.13rc4" | ||
3664 | |||
3665 | CVE_STATUS[CVE-2021-3347] = "fixed-version: Fixed from version 5.11rc6" | ||
3666 | |||
3667 | CVE_STATUS[CVE-2021-3348] = "fixed-version: Fixed from version 5.11rc6" | ||
3668 | |||
3669 | CVE_STATUS[CVE-2021-33624] = "fixed-version: Fixed from version 5.13rc7" | ||
3670 | |||
3671 | CVE_STATUS[CVE-2021-33630] = "fixed-version: Fixed from version 5.4rc1" | ||
3672 | |||
3673 | CVE_STATUS[CVE-2021-33631] = "fixed-version: Fixed from version 6.2rc1" | ||
3674 | |||
3675 | CVE_STATUS[CVE-2021-33655] = "fixed-version: Fixed from version 5.19rc6" | ||
3676 | |||
3677 | CVE_STATUS[CVE-2021-33656] = "fixed-version: Fixed from version 5.12rc1" | ||
3678 | |||
3679 | CVE_STATUS[CVE-2021-33909] = "fixed-version: Fixed from version 5.14rc3" | ||
3680 | |||
3681 | CVE_STATUS[CVE-2021-3411] = "fixed-version: Fixed from version 5.10" | ||
3682 | |||
3683 | CVE_STATUS[CVE-2021-3428] = "fixed-version: Fixed from version 5.9rc2" | ||
3684 | |||
3685 | CVE_STATUS[CVE-2021-3444] = "fixed-version: Fixed from version 5.12rc1" | ||
3686 | |||
3687 | CVE_STATUS[CVE-2021-34556] = "fixed-version: Fixed from version 5.14rc4" | ||
3688 | |||
3689 | CVE_STATUS[CVE-2021-34693] = "fixed-version: Fixed from version 5.13rc7" | ||
3690 | |||
3691 | CVE_STATUS[CVE-2021-3483] = "fixed-version: Fixed from version 5.12rc6" | ||
3692 | |||
3693 | CVE_STATUS[CVE-2021-34866] = "fixed-version: Fixed from version 5.14" | ||
3694 | |||
3695 | CVE_STATUS[CVE-2021-3489] = "fixed-version: Fixed from version 5.13rc4" | ||
3696 | |||
3697 | CVE_STATUS[CVE-2021-3490] = "fixed-version: Fixed from version 5.13rc4" | ||
3698 | |||
3699 | CVE_STATUS[CVE-2021-3491] = "fixed-version: Fixed from version 5.13rc1" | ||
3700 | |||
3701 | # CVE-2021-3492 has no known resolution | ||
3702 | |||
3703 | CVE_STATUS[CVE-2021-3493] = "fixed-version: Fixed from version 5.11rc1" | ||
3704 | |||
3705 | CVE_STATUS[CVE-2021-34981] = "fixed-version: Fixed from version 5.14rc1" | ||
3706 | |||
3707 | CVE_STATUS[CVE-2021-3501] = "fixed-version: Fixed from version 5.12rc8" | ||
3708 | |||
3709 | CVE_STATUS[CVE-2021-35039] = "fixed-version: Fixed from version 5.13" | ||
3710 | |||
3711 | CVE_STATUS[CVE-2021-3506] = "fixed-version: Fixed from version 5.13rc1" | ||
3712 | |||
3713 | # CVE-2021-3542 has no known resolution | ||
3714 | |||
3715 | CVE_STATUS[CVE-2021-3543] = "fixed-version: Fixed from version 5.13rc1" | ||
3716 | |||
3717 | CVE_STATUS[CVE-2021-35477] = "fixed-version: Fixed from version 5.14rc4" | ||
3718 | |||
3719 | CVE_STATUS[CVE-2021-3564] = "fixed-version: Fixed from version 5.13rc5" | ||
3720 | |||
3721 | CVE_STATUS[CVE-2021-3573] = "fixed-version: Fixed from version 5.13rc5" | ||
3722 | |||
3723 | CVE_STATUS[CVE-2021-3587] = "fixed-version: Fixed from version 5.13rc5" | ||
3724 | |||
3725 | CVE_STATUS[CVE-2021-3600] = "fixed-version: Fixed from version 5.11" | ||
3726 | |||
3727 | CVE_STATUS[CVE-2021-3609] = "fixed-version: Fixed from version 5.14rc1" | ||
3728 | |||
3729 | CVE_STATUS[CVE-2021-3612] = "fixed-version: Fixed from version 5.12rc1" | ||
3730 | |||
3731 | CVE_STATUS[CVE-2021-3635] = "fixed-version: Fixed from version 5.5rc7" | ||
3732 | |||
3733 | CVE_STATUS[CVE-2021-3640] = "fixed-version: Fixed from version 5.16rc1" | ||
3734 | |||
3735 | CVE_STATUS[CVE-2021-3653] = "fixed-version: Fixed from version 5.14rc7" | ||
3736 | |||
3737 | CVE_STATUS[CVE-2021-3655] = "fixed-version: Fixed from version 5.14rc1" | ||
3738 | |||
3739 | CVE_STATUS[CVE-2021-3656] = "fixed-version: Fixed from version 5.14rc7" | ||
3740 | |||
3741 | CVE_STATUS[CVE-2021-3659] = "fixed-version: Fixed from version 5.12rc7" | ||
3742 | |||
3743 | CVE_STATUS[CVE-2021-3669] = "fixed-version: Fixed from version 5.15rc1" | ||
3744 | |||
3745 | CVE_STATUS[CVE-2021-3679] = "fixed-version: Fixed from version 5.14rc3" | ||
3746 | |||
3747 | # CVE-2021-3714 has no known resolution | ||
3748 | |||
3749 | CVE_STATUS[CVE-2021-3715] = "fixed-version: Fixed from version 5.6" | ||
3750 | |||
3751 | CVE_STATUS[CVE-2021-37159] = "fixed-version: Fixed from version 5.14rc3" | ||
3752 | |||
3753 | CVE_STATUS[CVE-2021-3732] = "fixed-version: Fixed from version 5.14rc6" | ||
3754 | |||
3755 | CVE_STATUS[CVE-2021-3736] = "fixed-version: Fixed from version 5.15rc1" | ||
3756 | |||
3757 | CVE_STATUS[CVE-2021-3739] = "fixed-version: Fixed from version 5.15rc1" | ||
3758 | |||
3759 | CVE_STATUS[CVE-2021-3743] = "fixed-version: Fixed from version 5.13rc7" | ||
3760 | |||
3761 | CVE_STATUS[CVE-2021-3744] = "fixed-version: Fixed from version 5.15rc4" | ||
3762 | |||
3763 | CVE_STATUS[CVE-2021-3752] = "fixed-version: Fixed from version 5.16rc1" | ||
3764 | |||
3765 | CVE_STATUS[CVE-2021-3753] = "fixed-version: Fixed from version 5.15rc1" | ||
3766 | |||
3767 | CVE_STATUS[CVE-2021-37576] = "fixed-version: Fixed from version 5.14rc3" | ||
3768 | |||
3769 | CVE_STATUS[CVE-2021-3759] = "fixed-version: Fixed from version 5.15rc1" | ||
3770 | |||
3771 | CVE_STATUS[CVE-2021-3760] = "fixed-version: Fixed from version 5.15rc6" | ||
3772 | |||
3773 | CVE_STATUS[CVE-2021-3764] = "fixed-version: Fixed from version 5.15rc4" | ||
3774 | |||
3775 | CVE_STATUS[CVE-2021-3772] = "fixed-version: Fixed from version 5.15" | ||
3776 | |||
3777 | CVE_STATUS[CVE-2021-38160] = "fixed-version: Fixed from version 5.14rc1" | ||
3778 | |||
3779 | CVE_STATUS[CVE-2021-38166] = "fixed-version: Fixed from version 5.14rc6" | ||
3780 | |||
3781 | CVE_STATUS[CVE-2021-38198] = "fixed-version: Fixed from version 5.13rc6" | ||
3782 | |||
3783 | CVE_STATUS[CVE-2021-38199] = "fixed-version: Fixed from version 5.14rc1" | ||
3784 | |||
3785 | CVE_STATUS[CVE-2021-38200] = "fixed-version: Fixed from version 5.13rc7" | ||
3786 | |||
3787 | CVE_STATUS[CVE-2021-38201] = "fixed-version: Fixed from version 5.14rc1" | ||
3788 | |||
3789 | CVE_STATUS[CVE-2021-38202] = "fixed-version: Fixed from version 5.14rc1" | ||
3790 | |||
3791 | CVE_STATUS[CVE-2021-38203] = "fixed-version: Fixed from version 5.14rc2" | ||
3792 | |||
3793 | CVE_STATUS[CVE-2021-38204] = "fixed-version: Fixed from version 5.14rc3" | ||
3794 | |||
3795 | CVE_STATUS[CVE-2021-38205] = "fixed-version: Fixed from version 5.14rc1" | ||
3796 | |||
3797 | CVE_STATUS[CVE-2021-38206] = "fixed-version: Fixed from version 5.13rc7" | ||
3798 | |||
3799 | CVE_STATUS[CVE-2021-38207] = "fixed-version: Fixed from version 5.13rc7" | ||
3800 | |||
3801 | CVE_STATUS[CVE-2021-38208] = "fixed-version: Fixed from version 5.13rc5" | ||
3802 | |||
3803 | CVE_STATUS[CVE-2021-38209] = "fixed-version: Fixed from version 5.13rc1" | ||
3804 | |||
3805 | CVE_STATUS[CVE-2021-38300] = "fixed-version: Fixed from version 5.15rc4" | ||
3806 | |||
3807 | # CVE-2021-3847 has no known resolution | ||
3808 | |||
3809 | # CVE-2021-3864 has no known resolution | ||
3810 | |||
3811 | # CVE-2021-3892 has no known resolution | ||
3812 | |||
3813 | CVE_STATUS[CVE-2021-3894] = "fixed-version: Fixed from version 5.15rc6" | ||
3814 | |||
3815 | CVE_STATUS[CVE-2021-3896] = "fixed-version: Fixed from version 5.15rc6" | ||
3816 | |||
3817 | CVE_STATUS[CVE-2021-3923] = "fixed-version: Fixed from version 5.16" | ||
3818 | |||
3819 | CVE_STATUS[CVE-2021-39633] = "fixed-version: Fixed from version 5.14" | ||
3820 | |||
3821 | CVE_STATUS[CVE-2021-39634] = "fixed-version: Fixed from version 5.9rc8" | ||
3822 | |||
3823 | CVE_STATUS[CVE-2021-39636] = "fixed-version: Fixed from version 4.16rc1" | ||
3824 | |||
3825 | CVE_STATUS[CVE-2021-39648] = "fixed-version: Fixed from version 5.11rc3" | ||
3826 | |||
3827 | CVE_STATUS[CVE-2021-39656] = "fixed-version: Fixed from version 5.12rc3" | ||
3828 | |||
3829 | CVE_STATUS[CVE-2021-39657] = "fixed-version: Fixed from version 5.11rc4" | ||
3830 | |||
3831 | CVE_STATUS[CVE-2021-39685] = "fixed-version: Fixed from version 5.16rc5" | ||
3832 | |||
3833 | CVE_STATUS[CVE-2021-39686] = "fixed-version: Fixed from version 5.16rc1" | ||
3834 | |||
3835 | CVE_STATUS[CVE-2021-39698] = "fixed-version: Fixed from version 5.16rc5" | ||
3836 | |||
3837 | CVE_STATUS[CVE-2021-39711] = "fixed-version: Fixed from version 4.18rc6" | ||
3838 | |||
3839 | CVE_STATUS[CVE-2021-39713] = "fixed-version: Fixed from version 4.20rc1" | ||
3840 | |||
3841 | CVE_STATUS[CVE-2021-39714] = "fixed-version: Fixed from version 4.12rc1" | ||
3842 | |||
3843 | # CVE-2021-39800 has no known resolution | ||
3844 | |||
3845 | # CVE-2021-39801 has no known resolution | ||
3846 | |||
3847 | # CVE-2021-39802 has no known resolution | ||
3848 | |||
3849 | CVE_STATUS[CVE-2021-4001] = "fixed-version: Fixed from version 5.16rc2" | ||
3850 | |||
3851 | CVE_STATUS[CVE-2021-4002] = "fixed-version: Fixed from version 5.16rc3" | ||
3852 | |||
3853 | CVE_STATUS[CVE-2021-4023] = "fixed-version: Fixed from version 5.15rc1" | ||
3854 | |||
3855 | CVE_STATUS[CVE-2021-4028] = "fixed-version: Fixed from version 5.15rc4" | ||
3856 | |||
3857 | CVE_STATUS[CVE-2021-4032] = "fixed-version: Fixed from version 5.15rc7" | ||
3858 | |||
3859 | CVE_STATUS[CVE-2021-4037] = "fixed-version: Fixed from version 5.12rc1" | ||
3860 | |||
3861 | CVE_STATUS[CVE-2021-40490] = "fixed-version: Fixed from version 5.15rc1" | ||
3862 | |||
3863 | CVE_STATUS[CVE-2021-4083] = "fixed-version: Fixed from version 5.16rc4" | ||
3864 | |||
3865 | CVE_STATUS[CVE-2021-4090] = "fixed-version: Fixed from version 5.16rc2" | ||
3866 | |||
3867 | CVE_STATUS[CVE-2021-4093] = "fixed-version: Fixed from version 5.15rc7" | ||
3868 | |||
3869 | CVE_STATUS[CVE-2021-4095] = "fixed-version: Fixed from version 5.17rc1" | ||
3870 | |||
3871 | CVE_STATUS[CVE-2021-41073] = "fixed-version: Fixed from version 5.15rc2" | ||
3872 | |||
3873 | CVE_STATUS[CVE-2021-4135] = "fixed-version: Fixed from version 5.16rc6" | ||
3874 | |||
3875 | CVE_STATUS[CVE-2021-4148] = "fixed-version: Fixed from version 5.15" | ||
3876 | |||
3877 | CVE_STATUS[CVE-2021-4149] = "fixed-version: Fixed from version 5.15rc6" | ||
3878 | |||
3879 | CVE_STATUS[CVE-2021-4150] = "fixed-version: Fixed from version 5.15rc7" | ||
3880 | |||
3881 | CVE_STATUS[CVE-2021-4154] = "fixed-version: Fixed from version 5.14rc2" | ||
3882 | |||
3883 | CVE_STATUS[CVE-2021-4155] = "fixed-version: Fixed from version 5.16" | ||
3884 | |||
3885 | CVE_STATUS[CVE-2021-4157] = "fixed-version: Fixed from version 5.13rc1" | ||
3886 | |||
3887 | CVE_STATUS[CVE-2021-4159] = "fixed-version: Fixed from version 5.7rc1" | ||
3888 | |||
3889 | CVE_STATUS[CVE-2021-41864] = "fixed-version: Fixed from version 5.15rc5" | ||
3890 | |||
3891 | CVE_STATUS[CVE-2021-4197] = "fixed-version: Fixed from version 5.16" | ||
3892 | |||
3893 | CVE_STATUS[CVE-2021-42008] = "fixed-version: Fixed from version 5.14rc7" | ||
3894 | |||
3895 | CVE_STATUS[CVE-2021-4202] = "fixed-version: Fixed from version 5.16rc2" | ||
3896 | |||
3897 | CVE_STATUS[CVE-2021-4203] = "fixed-version: Fixed from version 5.15rc4" | ||
3898 | |||
3899 | CVE_STATUS[CVE-2021-4204] = "fixed-version: Fixed from version 5.17rc1" | ||
3900 | |||
3901 | CVE_STATUS[CVE-2021-4218] = "fixed-version: Fixed from version 5.8rc1" | ||
3902 | |||
3903 | CVE_STATUS[CVE-2021-42252] = "fixed-version: Fixed from version 5.15rc1" | ||
3904 | |||
3905 | CVE_STATUS[CVE-2021-42327] = "fixed-version: Fixed from version 5.15" | ||
3906 | |||
3907 | CVE_STATUS[CVE-2021-42739] = "fixed-version: Fixed from version 5.16rc1" | ||
3908 | |||
3909 | CVE_STATUS[CVE-2021-43056] = "fixed-version: Fixed from version 5.15rc6" | ||
3910 | |||
3911 | CVE_STATUS[CVE-2021-43057] = "fixed-version: Fixed from version 5.15rc3" | ||
3912 | |||
3913 | CVE_STATUS[CVE-2021-43267] = "fixed-version: Fixed from version 5.15" | ||
3914 | |||
3915 | CVE_STATUS[CVE-2021-43389] = "fixed-version: Fixed from version 5.15rc6" | ||
3916 | |||
3917 | CVE_STATUS[CVE-2021-43975] = "fixed-version: Fixed from version 5.16rc2" | ||
3918 | |||
3919 | CVE_STATUS[CVE-2021-43976] = "fixed-version: Fixed from version 5.17rc1" | ||
3920 | |||
3921 | CVE_STATUS[CVE-2021-44733] = "fixed-version: Fixed from version 5.16rc7" | ||
3922 | |||
3923 | CVE_STATUS[CVE-2021-44879] = "fixed-version: Fixed from version 5.17rc1" | ||
3924 | |||
3925 | CVE_STATUS[CVE-2021-45095] = "fixed-version: Fixed from version 5.16rc6" | ||
3926 | |||
3927 | CVE_STATUS[CVE-2021-45100] = "fixed-version: Fixed from version 5.16rc7" | ||
3928 | |||
3929 | CVE_STATUS[CVE-2021-45402] = "fixed-version: Fixed from version 5.16rc6" | ||
3930 | |||
3931 | CVE_STATUS[CVE-2021-45469] = "fixed-version: Fixed from version 5.17rc1" | ||
3932 | |||
3933 | CVE_STATUS[CVE-2021-45480] = "fixed-version: Fixed from version 5.16rc6" | ||
3934 | |||
3935 | CVE_STATUS[CVE-2021-45485] = "fixed-version: Fixed from version 5.14rc1" | ||
3936 | |||
3937 | CVE_STATUS[CVE-2021-45486] = "fixed-version: Fixed from version 5.13rc1" | ||
3938 | |||
3939 | CVE_STATUS[CVE-2021-45868] = "fixed-version: Fixed from version 5.16rc1" | ||
3940 | |||
3941 | CVE_STATUS[CVE-2021-46283] = "fixed-version: Fixed from version 5.13rc7" | ||
3942 | |||
3943 | CVE_STATUS[CVE-2022-0001] = "fixed-version: Fixed from version 5.17rc8" | ||
3944 | |||
3945 | CVE_STATUS[CVE-2022-0002] = "fixed-version: Fixed from version 5.17rc8" | ||
3946 | |||
3947 | CVE_STATUS[CVE-2022-0168] = "fixed-version: Fixed from version 5.18rc1" | ||
3948 | |||
3949 | CVE_STATUS[CVE-2022-0171] = "fixed-version: Fixed from version 5.18rc4" | ||
3950 | |||
3951 | CVE_STATUS[CVE-2022-0185] = "fixed-version: Fixed from version 5.17rc1" | ||
3952 | |||
3953 | CVE_STATUS[CVE-2022-0264] = "fixed-version: Fixed from version 5.16rc6" | ||
3954 | |||
3955 | CVE_STATUS[CVE-2022-0286] = "fixed-version: Fixed from version 5.14rc2" | ||
3956 | |||
3957 | CVE_STATUS[CVE-2022-0322] = "fixed-version: Fixed from version 5.15rc6" | ||
3958 | |||
3959 | CVE_STATUS[CVE-2022-0330] = "fixed-version: Fixed from version 5.17rc2" | ||
3960 | |||
3961 | CVE_STATUS[CVE-2022-0382] = "fixed-version: Fixed from version 5.16" | ||
3962 | |||
3963 | # CVE-2022-0400 has no known resolution | ||
3964 | |||
3965 | CVE_STATUS[CVE-2022-0433] = "fixed-version: Fixed from version 5.17rc1" | ||
3966 | |||
3967 | CVE_STATUS[CVE-2022-0435] = "fixed-version: Fixed from version 5.17rc4" | ||
3968 | |||
3969 | CVE_STATUS[CVE-2022-0480] = "fixed-version: Fixed from version 5.15rc1" | ||
3970 | |||
3971 | CVE_STATUS[CVE-2022-0487] = "fixed-version: Fixed from version 5.17rc4" | ||
3972 | |||
3973 | CVE_STATUS[CVE-2022-0492] = "fixed-version: Fixed from version 5.17rc3" | ||
3974 | |||
3975 | CVE_STATUS[CVE-2022-0494] = "fixed-version: Fixed from version 5.17rc5" | ||
3976 | |||
3977 | CVE_STATUS[CVE-2022-0500] = "fixed-version: Fixed from version 5.17rc1" | ||
3978 | |||
3979 | CVE_STATUS[CVE-2022-0516] = "fixed-version: Fixed from version 5.17rc4" | ||
3980 | |||
3981 | CVE_STATUS[CVE-2022-0617] = "fixed-version: Fixed from version 5.17rc2" | ||
3982 | |||
3983 | CVE_STATUS[CVE-2022-0644] = "fixed-version: Fixed from version 5.15rc7" | ||
3984 | |||
3985 | CVE_STATUS[CVE-2022-0646] = "fixed-version: Fixed from version 5.17rc5" | ||
3986 | |||
3987 | CVE_STATUS[CVE-2022-0742] = "fixed-version: Fixed from version 5.17rc7" | ||
3988 | |||
3989 | CVE_STATUS[CVE-2022-0812] = "fixed-version: Fixed from version 5.8rc6" | ||
3990 | |||
3991 | CVE_STATUS[CVE-2022-0847] = "fixed-version: Fixed from version 5.17rc6" | ||
3992 | |||
3993 | CVE_STATUS[CVE-2022-0850] = "fixed-version: Fixed from version 5.14rc1" | ||
3994 | |||
3995 | CVE_STATUS[CVE-2022-0854] = "fixed-version: Fixed from version 5.17rc8" | ||
3996 | |||
3997 | CVE_STATUS[CVE-2022-0995] = "fixed-version: Fixed from version 5.17rc8" | ||
3998 | |||
3999 | CVE_STATUS[CVE-2022-0998] = "fixed-version: Fixed from version 5.17rc1" | ||
4000 | |||
4001 | CVE_STATUS[CVE-2022-1011] = "fixed-version: Fixed from version 5.17rc8" | ||
4002 | |||
4003 | CVE_STATUS[CVE-2022-1012] = "fixed-version: Fixed from version 5.18rc6" | ||
4004 | |||
4005 | CVE_STATUS[CVE-2022-1015] = "fixed-version: Fixed from version 5.18rc1" | ||
4006 | |||
4007 | CVE_STATUS[CVE-2022-1016] = "fixed-version: Fixed from version 5.18rc1" | ||
4008 | |||
4009 | CVE_STATUS[CVE-2022-1043] = "fixed-version: Fixed from version 5.14rc7" | ||
4010 | |||
4011 | CVE_STATUS[CVE-2022-1048] = "fixed-version: Fixed from version 5.18rc1" | ||
4012 | |||
4013 | CVE_STATUS[CVE-2022-1055] = "fixed-version: Fixed from version 5.17rc3" | ||
4014 | |||
4015 | # CVE-2022-1116 has no known resolution | ||
4016 | |||
4017 | CVE_STATUS[CVE-2022-1158] = "fixed-version: Fixed from version 5.18rc1" | ||
4018 | |||
4019 | CVE_STATUS[CVE-2022-1184] = "fixed-version: Fixed from version 5.19rc1" | ||
4020 | |||
4021 | CVE_STATUS[CVE-2022-1195] = "fixed-version: Fixed from version 5.16rc7" | ||
4022 | |||
4023 | CVE_STATUS[CVE-2022-1198] = "fixed-version: Fixed from version 5.17rc6" | ||
4024 | |||
4025 | CVE_STATUS[CVE-2022-1199] = "fixed-version: Fixed from version 5.17rc8" | ||
4026 | |||
4027 | CVE_STATUS[CVE-2022-1204] = "fixed-version: Fixed from version 5.18rc1" | ||
4028 | |||
4029 | CVE_STATUS[CVE-2022-1205] = "fixed-version: Fixed from version 5.18rc1" | ||
4030 | |||
4031 | # CVE-2022-1247 has no known resolution | ||
4032 | |||
4033 | CVE_STATUS[CVE-2022-1263] = "fixed-version: Fixed from version 5.18rc3" | ||
4034 | |||
4035 | CVE_STATUS[CVE-2022-1280] = "fixed-version: Fixed from version 5.15rc1" | ||
4036 | |||
4037 | CVE_STATUS[CVE-2022-1353] = "fixed-version: Fixed from version 5.17" | ||
4038 | |||
4039 | CVE_STATUS[CVE-2022-1419] = "fixed-version: Fixed from version 5.6rc2" | ||
4040 | |||
4041 | CVE_STATUS[CVE-2022-1462] = "fixed-version: Fixed from version 5.19rc7" | ||
4042 | |||
4043 | CVE_STATUS[CVE-2022-1508] = "fixed-version: Fixed from version 5.15rc1" | ||
4044 | |||
4045 | CVE_STATUS[CVE-2022-1516] = "fixed-version: Fixed from version 5.18rc1" | ||
4046 | |||
4047 | CVE_STATUS[CVE-2022-1651] = "fixed-version: Fixed from version 5.18rc1" | ||
4048 | |||
4049 | CVE_STATUS[CVE-2022-1652] = "fixed-version: Fixed from version 5.18rc6" | ||
4050 | |||
4051 | CVE_STATUS[CVE-2022-1671] = "fixed-version: Fixed from version 5.18rc1" | ||
4052 | |||
4053 | CVE_STATUS[CVE-2022-1678] = "fixed-version: Fixed from version 4.20rc1" | ||
4054 | |||
4055 | CVE_STATUS[CVE-2022-1679] = "fixed-version: Fixed from version 6.0rc1" | ||
4056 | |||
4057 | CVE_STATUS[CVE-2022-1729] = "fixed-version: Fixed from version 5.18" | ||
4058 | |||
4059 | CVE_STATUS[CVE-2022-1734] = "fixed-version: Fixed from version 5.18rc6" | ||
4060 | |||
4061 | CVE_STATUS[CVE-2022-1786] = "fixed-version: Fixed from version 5.12rc1" | ||
4062 | |||
4063 | CVE_STATUS[CVE-2022-1789] = "fixed-version: Fixed from version 5.18" | ||
4064 | |||
4065 | CVE_STATUS[CVE-2022-1836] = "fixed-version: Fixed from version 5.18rc5" | ||
4066 | |||
4067 | CVE_STATUS[CVE-2022-1852] = "fixed-version: Fixed from version 5.19rc1" | ||
4068 | |||
4069 | CVE_STATUS[CVE-2022-1882] = "fixed-version: Fixed from version 5.19rc8" | ||
4070 | |||
4071 | CVE_STATUS[CVE-2022-1943] = "fixed-version: Fixed from version 5.18rc7" | ||
4072 | |||
4073 | CVE_STATUS[CVE-2022-1966] = "fixed-version: Fixed from version 5.19rc1" | ||
4074 | |||
4075 | CVE_STATUS[CVE-2022-1972] = "fixed-version: Fixed from version 5.19rc1" | ||
4076 | |||
4077 | CVE_STATUS[CVE-2022-1973] = "fixed-version: Fixed from version 5.19rc1" | ||
4078 | |||
4079 | CVE_STATUS[CVE-2022-1974] = "fixed-version: Fixed from version 5.18rc6" | ||
4080 | |||
4081 | CVE_STATUS[CVE-2022-1975] = "fixed-version: Fixed from version 5.18rc6" | ||
4082 | |||
4083 | CVE_STATUS[CVE-2022-1976] = "fixed-version: Fixed from version 5.19rc1" | ||
4084 | |||
4085 | CVE_STATUS[CVE-2022-1998] = "fixed-version: Fixed from version 5.17rc3" | ||
4086 | |||
4087 | CVE_STATUS[CVE-2022-20008] = "fixed-version: Fixed from version 5.17rc5" | ||
4088 | |||
4089 | CVE_STATUS[CVE-2022-20132] = "fixed-version: Fixed from version 5.16rc5" | ||
4090 | |||
4091 | CVE_STATUS[CVE-2022-20141] = "fixed-version: Fixed from version 5.15rc1" | ||
4092 | |||
4093 | CVE_STATUS[CVE-2022-20148] = "fixed-version: Fixed from version 5.16rc1" | ||
4094 | |||
4095 | CVE_STATUS[CVE-2022-20153] = "fixed-version: Fixed from version 5.13rc1" | ||
4096 | |||
4097 | CVE_STATUS[CVE-2022-20154] = "fixed-version: Fixed from version 5.16rc8" | ||
4098 | |||
4099 | CVE_STATUS[CVE-2022-20158] = "fixed-version: Fixed from version 5.17" | ||
4100 | |||
4101 | CVE_STATUS[CVE-2022-20166] = "fixed-version: Fixed from version 5.10rc1" | ||
4102 | |||
4103 | CVE_STATUS[CVE-2022-20368] = "fixed-version: Fixed from version 5.17" | ||
4104 | |||
4105 | CVE_STATUS[CVE-2022-20369] = "fixed-version: Fixed from version 5.18rc1" | ||
4106 | |||
4107 | CVE_STATUS[CVE-2022-20409] = "fixed-version: Fixed from version 5.12rc1" | ||
4108 | |||
4109 | CVE_STATUS[CVE-2022-20421] = "fixed-version: Fixed from version 6.0rc4" | ||
4110 | |||
4111 | CVE_STATUS[CVE-2022-20422] = "fixed-version: Fixed from version 6.0rc1" | ||
4112 | |||
4113 | CVE_STATUS[CVE-2022-20423] = "fixed-version: Fixed from version 5.17" | ||
4114 | |||
4115 | CVE_STATUS[CVE-2022-20424] = "fixed-version: Fixed from version 5.12rc1" | ||
4116 | |||
4117 | CVE_STATUS[CVE-2022-20565] = "fixed-version: Fixed from version 5.9rc4" | ||
4118 | |||
4119 | CVE_STATUS[CVE-2022-20566] = "fixed-version: Fixed from version 5.19" | ||
4120 | |||
4121 | CVE_STATUS[CVE-2022-20567] = "fixed-version: Fixed from version 4.16rc5" | ||
4122 | |||
4123 | CVE_STATUS[CVE-2022-20568] = "fixed-version: Fixed from version 5.12rc1" | ||
4124 | |||
4125 | CVE_STATUS[CVE-2022-20572] = "fixed-version: Fixed from version 5.19rc1" | ||
4126 | |||
4127 | CVE_STATUS[CVE-2022-2078] = "fixed-version: Fixed from version 5.19rc1" | ||
4128 | |||
4129 | CVE_STATUS[CVE-2022-21123] = "fixed-version: Fixed from version 5.19rc3" | ||
4130 | |||
4131 | CVE_STATUS[CVE-2022-21125] = "fixed-version: Fixed from version 5.19rc3" | ||
4132 | |||
4133 | CVE_STATUS[CVE-2022-21166] = "fixed-version: Fixed from version 5.19rc3" | ||
4134 | |||
4135 | CVE_STATUS[CVE-2022-21385] = "fixed-version: Fixed from version 4.20" | ||
4136 | |||
4137 | CVE_STATUS[CVE-2022-21499] = "fixed-version: Fixed from version 5.19rc1" | ||
4138 | |||
4139 | CVE_STATUS[CVE-2022-21505] = "fixed-version: Fixed from version 5.19rc8" | ||
4140 | |||
4141 | CVE_STATUS[CVE-2022-2153] = "fixed-version: Fixed from version 5.18rc1" | ||
4142 | |||
4143 | CVE_STATUS[CVE-2022-2196] = "fixed-version: Fixed from version 6.2rc1" | ||
4144 | |||
4145 | # CVE-2022-2209 has no known resolution | ||
4146 | |||
4147 | CVE_STATUS[CVE-2022-22942] = "fixed-version: Fixed from version 5.17rc2" | ||
4148 | |||
4149 | CVE_STATUS[CVE-2022-23036] = "fixed-version: Fixed from version 5.17rc8" | ||
4150 | |||
4151 | CVE_STATUS[CVE-2022-23037] = "fixed-version: Fixed from version 5.17rc8" | ||
4152 | |||
4153 | CVE_STATUS[CVE-2022-23038] = "fixed-version: Fixed from version 5.17rc8" | ||
4154 | |||
4155 | CVE_STATUS[CVE-2022-23039] = "fixed-version: Fixed from version 5.17rc8" | ||
4156 | |||
4157 | CVE_STATUS[CVE-2022-23040] = "fixed-version: Fixed from version 5.17rc8" | ||
4158 | |||
4159 | CVE_STATUS[CVE-2022-23041] = "fixed-version: Fixed from version 5.17rc8" | ||
4160 | |||
4161 | CVE_STATUS[CVE-2022-23042] = "fixed-version: Fixed from version 5.17rc8" | ||
4162 | |||
4163 | CVE_STATUS[CVE-2022-2308] = "fixed-version: Fixed from version 6.0" | ||
4164 | |||
4165 | CVE_STATUS[CVE-2022-2318] = "fixed-version: Fixed from version 5.19rc5" | ||
4166 | |||
4167 | CVE_STATUS[CVE-2022-23222] = "fixed-version: Fixed from version 5.17rc1" | ||
4168 | |||
4169 | CVE_STATUS[CVE-2022-2327] = "fixed-version: Fixed from version 5.12rc1" | ||
4170 | |||
4171 | CVE_STATUS[CVE-2022-2380] = "fixed-version: Fixed from version 5.18rc1" | ||
4172 | |||
4173 | CVE_STATUS[CVE-2022-23816] = "fixed-version: Fixed from version 5.19rc7" | ||
4174 | |||
4175 | # CVE-2022-23825 has no known resolution | ||
4176 | |||
4177 | CVE_STATUS[CVE-2022-23960] = "fixed-version: Fixed from version 5.17rc8" | ||
4178 | |||
4179 | CVE_STATUS[CVE-2022-24122] = "fixed-version: Fixed from version 5.17rc2" | ||
4180 | |||
4181 | CVE_STATUS[CVE-2022-24448] = "fixed-version: Fixed from version 5.17rc2" | ||
4182 | |||
4183 | CVE_STATUS[CVE-2022-24958] = "fixed-version: Fixed from version 5.17rc1" | ||
4184 | |||
4185 | CVE_STATUS[CVE-2022-24959] = "fixed-version: Fixed from version 5.17rc2" | ||
4186 | |||
4187 | CVE_STATUS[CVE-2022-2503] = "fixed-version: Fixed from version 5.19rc1" | ||
4188 | |||
4189 | CVE_STATUS[CVE-2022-25258] = "fixed-version: Fixed from version 5.17rc4" | ||
4190 | |||
4191 | # CVE-2022-25265 has no known resolution | ||
4192 | |||
4193 | CVE_STATUS[CVE-2022-25375] = "fixed-version: Fixed from version 5.17rc4" | ||
4194 | |||
4195 | CVE_STATUS[CVE-2022-25636] = "fixed-version: Fixed from version 5.17rc6" | ||
4196 | |||
4197 | CVE_STATUS[CVE-2022-2585] = "fixed-version: Fixed from version 6.0rc1" | ||
4198 | |||
4199 | CVE_STATUS[CVE-2022-2586] = "fixed-version: Fixed from version 6.0rc1" | ||
4200 | |||
4201 | CVE_STATUS[CVE-2022-2588] = "fixed-version: Fixed from version 6.0rc1" | ||
4202 | |||
4203 | CVE_STATUS[CVE-2022-2590] = "fixed-version: Fixed from version 6.0rc3" | ||
4204 | |||
4205 | CVE_STATUS[CVE-2022-2602] = "fixed-version: Fixed from version 6.1rc1" | ||
4206 | |||
4207 | CVE_STATUS[CVE-2022-26365] = "fixed-version: Fixed from version 5.19rc6" | ||
4208 | |||
4209 | CVE_STATUS[CVE-2022-26373] = "fixed-version: Fixed from version 6.0rc1" | ||
4210 | |||
4211 | CVE_STATUS[CVE-2022-2639] = "fixed-version: Fixed from version 5.18rc4" | ||
4212 | |||
4213 | CVE_STATUS[CVE-2022-26490] = "fixed-version: Fixed from version 5.17rc1" | ||
4214 | |||
4215 | CVE_STATUS[CVE-2022-2663] = "fixed-version: Fixed from version 6.0rc5" | ||
4216 | |||
4217 | # CVE-2022-26878 has no known resolution | ||
4218 | |||
4219 | CVE_STATUS[CVE-2022-26966] = "fixed-version: Fixed from version 5.17rc6" | ||
4220 | |||
4221 | CVE_STATUS[CVE-2022-27223] = "fixed-version: Fixed from version 5.17rc6" | ||
4222 | |||
4223 | CVE_STATUS[CVE-2022-27666] = "fixed-version: Fixed from version 5.17rc8" | ||
4224 | |||
4225 | CVE_STATUS[CVE-2022-27672] = "fixed-version: Fixed from version 6.2" | ||
4226 | |||
4227 | CVE_STATUS[CVE-2022-2785] = "fixed-version: Fixed from version 6.0rc1" | ||
4228 | |||
4229 | CVE_STATUS[CVE-2022-27950] = "fixed-version: Fixed from version 5.17rc5" | ||
4230 | |||
4231 | CVE_STATUS[CVE-2022-28356] = "fixed-version: Fixed from version 5.18rc1" | ||
4232 | |||
4233 | CVE_STATUS[CVE-2022-28388] = "fixed-version: Fixed from version 5.18rc1" | ||
4234 | |||
4235 | CVE_STATUS[CVE-2022-28389] = "fixed-version: Fixed from version 5.18rc1" | ||
4236 | |||
4237 | CVE_STATUS[CVE-2022-28390] = "fixed-version: Fixed from version 5.18rc1" | ||
4238 | |||
4239 | CVE_STATUS[CVE-2022-2873] = "fixed-version: Fixed from version 5.19rc1" | ||
4240 | |||
4241 | CVE_STATUS[CVE-2022-28796] = "fixed-version: Fixed from version 5.18rc1" | ||
4242 | |||
4243 | CVE_STATUS[CVE-2022-28893] = "fixed-version: Fixed from version 5.18rc2" | ||
4244 | |||
4245 | CVE_STATUS[CVE-2022-2905] = "fixed-version: Fixed from version 6.0rc4" | ||
4246 | |||
4247 | CVE_STATUS[CVE-2022-29156] = "fixed-version: Fixed from version 5.17rc6" | ||
4248 | |||
4249 | CVE_STATUS[CVE-2022-2938] = "fixed-version: Fixed from version 5.17rc2" | ||
4250 | |||
4251 | CVE_STATUS[CVE-2022-29581] = "fixed-version: Fixed from version 5.18rc4" | ||
4252 | |||
4253 | CVE_STATUS[CVE-2022-29582] = "fixed-version: Fixed from version 5.18rc2" | ||
4254 | |||
4255 | CVE_STATUS[CVE-2022-2959] = "fixed-version: Fixed from version 5.19rc1" | ||
4256 | |||
4257 | # CVE-2022-2961 has no known resolution | ||
4258 | |||
4259 | CVE_STATUS[CVE-2022-2964] = "fixed-version: Fixed from version 5.17rc4" | ||
4260 | |||
4261 | CVE_STATUS[CVE-2022-2977] = "fixed-version: Fixed from version 5.18rc1" | ||
4262 | |||
4263 | CVE_STATUS[CVE-2022-2978] = "fixed-version: Fixed from version 6.1rc1" | ||
4264 | |||
4265 | CVE_STATUS[CVE-2022-29900] = "fixed-version: Fixed from version 5.19rc7" | ||
4266 | |||
4267 | CVE_STATUS[CVE-2022-29901] = "fixed-version: Fixed from version 5.19rc7" | ||
4268 | |||
4269 | CVE_STATUS[CVE-2022-2991] = "fixed-version: Fixed from version 5.15rc1" | ||
4270 | |||
4271 | CVE_STATUS[CVE-2022-29968] = "fixed-version: Fixed from version 5.18rc5" | ||
4272 | |||
4273 | CVE_STATUS[CVE-2022-3028] = "fixed-version: Fixed from version 6.0rc3" | ||
4274 | |||
4275 | CVE_STATUS[CVE-2022-30594] = "fixed-version: Fixed from version 5.18rc1" | ||
4276 | |||
4277 | CVE_STATUS[CVE-2022-3061] = "fixed-version: Fixed from version 5.18rc5" | ||
4278 | |||
4279 | CVE_STATUS[CVE-2022-3077] = "fixed-version: Fixed from version 5.19rc1" | ||
4280 | |||
4281 | CVE_STATUS[CVE-2022-3078] = "fixed-version: Fixed from version 5.18rc1" | ||
4282 | |||
4283 | CVE_STATUS[CVE-2022-3103] = "fixed-version: Fixed from version 6.0rc3" | ||
4284 | |||
4285 | CVE_STATUS[CVE-2022-3104] = "fixed-version: Fixed from version 5.19rc1" | ||
4286 | |||
4287 | CVE_STATUS[CVE-2022-3105] = "fixed-version: Fixed from version 5.16" | ||
4288 | |||
4289 | CVE_STATUS[CVE-2022-3106] = "fixed-version: Fixed from version 5.16rc6" | ||
4290 | |||
4291 | CVE_STATUS[CVE-2022-3107] = "fixed-version: Fixed from version 5.17" | ||
4292 | |||
4293 | CVE_STATUS[CVE-2022-3108] = "fixed-version: Fixed from version 5.17rc1" | ||
4294 | |||
4295 | CVE_STATUS[CVE-2022-3110] = "fixed-version: Fixed from version 5.19rc1" | ||
4296 | |||
4297 | CVE_STATUS[CVE-2022-3111] = "fixed-version: Fixed from version 5.18rc1" | ||
4298 | |||
4299 | CVE_STATUS[CVE-2022-3112] = "fixed-version: Fixed from version 5.18rc1" | ||
4300 | |||
4301 | CVE_STATUS[CVE-2022-3113] = "fixed-version: Fixed from version 5.18rc1" | ||
4302 | |||
4303 | CVE_STATUS[CVE-2022-3114] = "fixed-version: Fixed from version 5.19rc1" | ||
4304 | |||
4305 | CVE_STATUS[CVE-2022-3115] = "fixed-version: Fixed from version 5.19rc1" | ||
4306 | |||
4307 | CVE_STATUS[CVE-2022-3169] = "fixed-version: Fixed from version 6.1rc1" | ||
4308 | |||
4309 | CVE_STATUS[CVE-2022-3170] = "fixed-version: Fixed from version 6.0rc4" | ||
4310 | |||
4311 | CVE_STATUS[CVE-2022-3176] = "fixed-version: Fixed from version 5.17rc1" | ||
4312 | |||
4313 | CVE_STATUS[CVE-2022-3202] = "fixed-version: Fixed from version 5.18rc1" | ||
4314 | |||
4315 | CVE_STATUS[CVE-2022-32250] = "fixed-version: Fixed from version 5.19rc1" | ||
4316 | |||
4317 | CVE_STATUS[CVE-2022-32296] = "fixed-version: Fixed from version 5.18rc6" | ||
4318 | |||
4319 | # CVE-2022-3238 has no known resolution | ||
4320 | |||
4321 | CVE_STATUS[CVE-2022-3239] = "fixed-version: Fixed from version 5.18rc1" | ||
4322 | |||
4323 | CVE_STATUS[CVE-2022-32981] = "fixed-version: Fixed from version 5.19rc2" | ||
4324 | |||
4325 | CVE_STATUS[CVE-2022-3303] = "fixed-version: Fixed from version 6.0rc5" | ||
4326 | |||
4327 | CVE_STATUS[CVE-2022-3344] = "fixed-version: Fixed from version 6.1rc7" | ||
4328 | |||
4329 | CVE_STATUS[CVE-2022-33740] = "fixed-version: Fixed from version 5.19rc6" | ||
4330 | |||
4331 | CVE_STATUS[CVE-2022-33741] = "fixed-version: Fixed from version 5.19rc6" | ||
4332 | |||
4333 | CVE_STATUS[CVE-2022-33742] = "fixed-version: Fixed from version 5.19rc6" | ||
4334 | |||
4335 | CVE_STATUS[CVE-2022-33743] = "fixed-version: Fixed from version 5.19rc6" | ||
4336 | |||
4337 | CVE_STATUS[CVE-2022-33744] = "fixed-version: Fixed from version 5.19rc6" | ||
4338 | |||
4339 | CVE_STATUS[CVE-2022-33981] = "fixed-version: Fixed from version 5.18rc5" | ||
4340 | |||
4341 | CVE_STATUS[CVE-2022-3424] = "fixed-version: Fixed from version 6.2rc1" | ||
4342 | |||
4343 | CVE_STATUS[CVE-2022-3435] = "fixed-version: Fixed from version 6.1rc1" | ||
4344 | |||
4345 | CVE_STATUS[CVE-2022-34494] = "fixed-version: Fixed from version 5.19rc1" | ||
4346 | |||
4347 | CVE_STATUS[CVE-2022-34495] = "fixed-version: Fixed from version 5.19rc1" | ||
4348 | |||
4349 | CVE_STATUS[CVE-2022-34918] = "fixed-version: Fixed from version 5.19rc6" | ||
4350 | |||
4351 | CVE_STATUS[CVE-2022-3521] = "fixed-version: Fixed from version 6.1rc1" | ||
4352 | |||
4353 | CVE_STATUS[CVE-2022-3522] = "fixed-version: Fixed from version 6.1rc1" | ||
4354 | |||
4355 | CVE_STATUS[CVE-2022-3523] = "fixed-version: Fixed from version 6.1rc1" | ||
4356 | |||
4357 | CVE_STATUS[CVE-2022-3524] = "fixed-version: Fixed from version 6.1rc1" | ||
4358 | |||
4359 | CVE_STATUS[CVE-2022-3526] = "fixed-version: Fixed from version 5.18rc3" | ||
4360 | |||
4361 | CVE_STATUS[CVE-2022-3531] = "fixed-version: Fixed from version 6.2rc1" | ||
4362 | |||
4363 | CVE_STATUS[CVE-2022-3532] = "fixed-version: Fixed from version 6.2rc1" | ||
4364 | |||
4365 | # CVE-2022-3533 has no known resolution | ||
4366 | |||
4367 | CVE_STATUS[CVE-2022-3534] = "fixed-version: Fixed from version 6.2rc1" | ||
4368 | |||
4369 | CVE_STATUS[CVE-2022-3535] = "fixed-version: Fixed from version 6.1rc1" | ||
4370 | |||
4371 | CVE_STATUS[CVE-2022-3541] = "fixed-version: Fixed from version 6.1rc1" | ||
4372 | |||
4373 | CVE_STATUS[CVE-2022-3542] = "fixed-version: Fixed from version 6.1rc1" | ||
4374 | |||
4375 | CVE_STATUS[CVE-2022-3543] = "fixed-version: Fixed from version 6.1rc1" | ||
4376 | |||
4377 | # CVE-2022-3544 has no known resolution | ||
4378 | |||
4379 | CVE_STATUS[CVE-2022-3545] = "fixed-version: Fixed from version 6.0rc1" | ||
4380 | |||
4381 | CVE_STATUS[CVE-2022-3564] = "fixed-version: Fixed from version 6.1rc4" | ||
4382 | |||
4383 | CVE_STATUS[CVE-2022-3565] = "fixed-version: Fixed from version 6.1rc1" | ||
4384 | |||
4385 | CVE_STATUS[CVE-2022-3566] = "fixed-version: Fixed from version 6.1rc1" | ||
4386 | |||
4387 | CVE_STATUS[CVE-2022-3567] = "fixed-version: Fixed from version 6.1rc1" | ||
4388 | |||
4389 | CVE_STATUS[CVE-2022-3577] = "fixed-version: Fixed from version 5.19rc1" | ||
4390 | |||
4391 | CVE_STATUS[CVE-2022-3586] = "fixed-version: Fixed from version 6.0rc5" | ||
4392 | |||
4393 | CVE_STATUS[CVE-2022-3594] = "fixed-version: Fixed from version 6.1rc1" | ||
4394 | |||
4395 | CVE_STATUS[CVE-2022-3595] = "fixed-version: Fixed from version 6.1rc1" | ||
4396 | |||
4397 | # CVE-2022-3606 has no known resolution | ||
4398 | |||
4399 | CVE_STATUS[CVE-2022-36123] = "fixed-version: Fixed from version 5.19rc6" | ||
4400 | |||
4401 | CVE_STATUS[CVE-2022-3619] = "fixed-version: Fixed from version 6.1rc4" | ||
4402 | |||
4403 | CVE_STATUS[CVE-2022-3621] = "fixed-version: Fixed from version 6.1rc1" | ||
4404 | |||
4405 | CVE_STATUS[CVE-2022-3623] = "fixed-version: Fixed from version 6.1rc1" | ||
4406 | |||
4407 | CVE_STATUS[CVE-2022-3624] = "fixed-version: Fixed from version 6.0rc1" | ||
4408 | |||
4409 | CVE_STATUS[CVE-2022-3625] = "fixed-version: Fixed from version 6.0rc1" | ||
4410 | |||
4411 | CVE_STATUS[CVE-2022-3628] = "fixed-version: Fixed from version 6.1rc5" | ||
4412 | |||
4413 | CVE_STATUS[CVE-2022-36280] = "fixed-version: Fixed from version 6.2rc1" | ||
4414 | |||
4415 | CVE_STATUS[CVE-2022-3629] = "fixed-version: Fixed from version 6.0rc1" | ||
4416 | |||
4417 | CVE_STATUS[CVE-2022-3630] = "fixed-version: Fixed from version 6.0rc1" | ||
4418 | |||
4419 | CVE_STATUS[CVE-2022-3633] = "fixed-version: Fixed from version 6.0rc1" | ||
4420 | |||
4421 | CVE_STATUS[CVE-2022-3635] = "fixed-version: Fixed from version 6.0rc1" | ||
4422 | |||
4423 | CVE_STATUS[CVE-2022-3636] = "fixed-version: Fixed from version 5.19rc1" | ||
4424 | |||
4425 | CVE_STATUS[CVE-2022-3640] = "fixed-version: Fixed from version 6.1rc4" | ||
4426 | |||
4427 | CVE_STATUS[CVE-2022-36402] = "fixed-version: Fixed from version 6.5" | ||
4428 | |||
4429 | # CVE-2022-3642 has no known resolution | ||
4430 | |||
4431 | CVE_STATUS[CVE-2022-3643] = "fixed-version: Fixed from version 6.1" | ||
4432 | |||
4433 | CVE_STATUS[CVE-2022-3646] = "fixed-version: Fixed from version 6.1rc1" | ||
4434 | |||
4435 | CVE_STATUS[CVE-2022-3649] = "fixed-version: Fixed from version 6.1rc1" | ||
4436 | |||
4437 | CVE_STATUS[CVE-2022-36879] = "fixed-version: Fixed from version 5.19rc8" | ||
4438 | |||
4439 | CVE_STATUS[CVE-2022-36946] = "fixed-version: Fixed from version 5.19" | ||
4440 | |||
4441 | CVE_STATUS[CVE-2022-3707] = "fixed-version: Fixed from version 6.2rc3" | ||
4442 | |||
4443 | # CVE-2022-38096 has no known resolution | ||
4444 | |||
4445 | CVE_STATUS[CVE-2022-38457] = "fixed-version: Fixed from version 6.2rc4" | ||
4446 | |||
4447 | CVE_STATUS[CVE-2022-3903] = "fixed-version: Fixed from version 6.1rc2" | ||
4448 | |||
4449 | CVE_STATUS[CVE-2022-3910] = "fixed-version: Fixed from version 6.0rc6" | ||
4450 | |||
4451 | CVE_STATUS[CVE-2022-39188] = "fixed-version: Fixed from version 5.19rc8" | ||
4452 | |||
4453 | CVE_STATUS[CVE-2022-39189] = "fixed-version: Fixed from version 5.19rc2" | ||
4454 | |||
4455 | CVE_STATUS[CVE-2022-39190] = "fixed-version: Fixed from version 6.0rc3" | ||
4456 | |||
4457 | CVE_STATUS[CVE-2022-3977] = "fixed-version: Fixed from version 6.1rc1" | ||
4458 | |||
4459 | CVE_STATUS[CVE-2022-39842] = "fixed-version: Fixed from version 5.19rc4" | ||
4460 | |||
4461 | CVE_STATUS[CVE-2022-40133] = "fixed-version: Fixed from version 6.2rc4" | ||
4462 | |||
4463 | CVE_STATUS[CVE-2022-40307] = "fixed-version: Fixed from version 6.0rc5" | ||
4464 | |||
4465 | CVE_STATUS[CVE-2022-40476] = "fixed-version: Fixed from version 5.19rc4" | ||
4466 | |||
4467 | CVE_STATUS[CVE-2022-40768] = "fixed-version: Fixed from version 6.1rc1" | ||
4468 | |||
4469 | CVE_STATUS[CVE-2022-4095] = "fixed-version: Fixed from version 6.0rc4" | ||
4470 | |||
4471 | CVE_STATUS[CVE-2022-40982] = "fixed-version: Fixed from version 6.5rc6" | ||
4472 | |||
4473 | CVE_STATUS[CVE-2022-41218] = "fixed-version: Fixed from version 6.2rc1" | ||
4474 | |||
4475 | CVE_STATUS[CVE-2022-41222] = "fixed-version: Fixed from version 5.14rc1" | ||
4476 | |||
4477 | CVE_STATUS[CVE-2022-4127] = "fixed-version: Fixed from version 5.19rc6" | ||
4478 | |||
4479 | CVE_STATUS[CVE-2022-4128] = "fixed-version: Fixed from version 5.19rc7" | ||
4480 | |||
4481 | CVE_STATUS[CVE-2022-4129] = "fixed-version: Fixed from version 6.1rc6" | ||
4482 | |||
4483 | CVE_STATUS[CVE-2022-4139] = "fixed-version: Fixed from version 6.1rc8" | ||
4484 | |||
4485 | CVE_STATUS[CVE-2022-41674] = "fixed-version: Fixed from version 6.1rc1" | ||
4486 | |||
4487 | # CVE-2022-41848 has no known resolution | ||
4488 | |||
4489 | CVE_STATUS[CVE-2022-41849] = "fixed-version: Fixed from version 6.1rc1" | ||
4490 | |||
4491 | CVE_STATUS[CVE-2022-41850] = "fixed-version: Fixed from version 6.1rc1" | ||
4492 | |||
4493 | CVE_STATUS[CVE-2022-41858] = "fixed-version: Fixed from version 5.18rc2" | ||
4494 | |||
4495 | CVE_STATUS[CVE-2022-42328] = "fixed-version: Fixed from version 6.1" | ||
4496 | |||
4497 | CVE_STATUS[CVE-2022-42329] = "fixed-version: Fixed from version 6.1" | ||
4498 | |||
4499 | CVE_STATUS[CVE-2022-42432] = "fixed-version: Fixed from version 6.0rc7" | ||
4500 | |||
4501 | CVE_STATUS[CVE-2022-4269] = "fixed-version: Fixed from version 6.3rc1" | ||
4502 | |||
4503 | CVE_STATUS[CVE-2022-42703] = "fixed-version: Fixed from version 6.0rc4" | ||
4504 | |||
4505 | CVE_STATUS[CVE-2022-42719] = "fixed-version: Fixed from version 6.1rc1" | ||
4506 | |||
4507 | CVE_STATUS[CVE-2022-42720] = "fixed-version: Fixed from version 6.1rc1" | ||
4508 | |||
4509 | CVE_STATUS[CVE-2022-42721] = "fixed-version: Fixed from version 6.1rc1" | ||
4510 | |||
4511 | CVE_STATUS[CVE-2022-42722] = "fixed-version: Fixed from version 6.1rc1" | ||
4512 | |||
4513 | CVE_STATUS[CVE-2022-42895] = "fixed-version: Fixed from version 6.1rc4" | ||
4514 | |||
4515 | CVE_STATUS[CVE-2022-42896] = "fixed-version: Fixed from version 6.1rc4" | ||
4516 | |||
4517 | CVE_STATUS[CVE-2022-43750] = "fixed-version: Fixed from version 6.1rc1" | ||
4518 | |||
4519 | CVE_STATUS[CVE-2022-4378] = "fixed-version: Fixed from version 6.1" | ||
4520 | |||
4521 | CVE_STATUS[CVE-2022-4379] = "fixed-version: Fixed from version 6.2rc1" | ||
4522 | |||
4523 | CVE_STATUS[CVE-2022-4382] = "fixed-version: Fixed from version 6.2rc5" | ||
4524 | |||
4525 | CVE_STATUS[CVE-2022-43945] = "fixed-version: Fixed from version 6.1rc1" | ||
4526 | |||
4527 | CVE_STATUS[CVE-2022-44032] = "fixed-version: Fixed from version 6.4rc1" | ||
4528 | |||
4529 | CVE_STATUS[CVE-2022-44033] = "fixed-version: Fixed from version 6.4rc1" | ||
4530 | |||
4531 | CVE_STATUS[CVE-2022-44034] = "fixed-version: Fixed from version 6.4rc1" | ||
4532 | |||
4533 | # CVE-2022-4543 has no known resolution | ||
4534 | |||
4535 | CVE_STATUS[CVE-2022-45869] = "fixed-version: Fixed from version 6.1rc7" | ||
4536 | |||
4537 | # CVE-2022-45884 has no known resolution | ||
4538 | |||
4539 | # CVE-2022-45885 has no known resolution | ||
4540 | |||
4541 | CVE_STATUS[CVE-2022-45886] = "fixed-version: Fixed from version 6.4rc3" | ||
4542 | |||
4543 | CVE_STATUS[CVE-2022-45887] = "fixed-version: Fixed from version 6.4rc3" | ||
4544 | |||
4545 | CVE_STATUS[CVE-2022-45888] = "fixed-version: Fixed from version 6.2rc1" | ||
4546 | |||
4547 | CVE_STATUS[CVE-2022-45919] = "fixed-version: Fixed from version 6.4rc3" | ||
4548 | |||
4549 | CVE_STATUS[CVE-2022-45934] = "fixed-version: Fixed from version 6.1" | ||
4550 | |||
4551 | CVE_STATUS[CVE-2022-4662] = "fixed-version: Fixed from version 6.0rc4" | ||
4552 | |||
4553 | CVE_STATUS[CVE-2022-4696] = "fixed-version: Fixed from version 5.12rc1" | ||
4554 | |||
4555 | CVE_STATUS[CVE-2022-4744] = "fixed-version: Fixed from version 5.16rc7" | ||
4556 | |||
4557 | CVE_STATUS[CVE-2022-47518] = "fixed-version: Fixed from version 6.1rc8" | ||
4558 | |||
4559 | CVE_STATUS[CVE-2022-47519] = "fixed-version: Fixed from version 6.1rc8" | ||
4560 | |||
4561 | CVE_STATUS[CVE-2022-47520] = "fixed-version: Fixed from version 6.1rc8" | ||
4562 | |||
4563 | CVE_STATUS[CVE-2022-47521] = "fixed-version: Fixed from version 6.1rc8" | ||
4564 | |||
4565 | CVE_STATUS[CVE-2022-47929] = "fixed-version: Fixed from version 6.2rc4" | ||
4566 | |||
4567 | CVE_STATUS[CVE-2022-47938] = "fixed-version: Fixed from version 6.0rc1" | ||
4568 | |||
4569 | CVE_STATUS[CVE-2022-47939] = "fixed-version: Fixed from version 6.0rc1" | ||
4570 | |||
4571 | CVE_STATUS[CVE-2022-47940] = "fixed-version: Fixed from version 5.19rc1" | ||
4572 | |||
4573 | CVE_STATUS[CVE-2022-47941] = "fixed-version: Fixed from version 6.0rc1" | ||
4574 | |||
4575 | CVE_STATUS[CVE-2022-47942] = "fixed-version: Fixed from version 6.0rc1" | ||
4576 | |||
4577 | CVE_STATUS[CVE-2022-47943] = "fixed-version: Fixed from version 6.0rc1" | ||
4578 | |||
4579 | CVE_STATUS[CVE-2022-47946] = "fixed-version: Fixed from version 5.12rc2" | ||
4580 | |||
4581 | CVE_STATUS[CVE-2022-4842] = "fixed-version: Fixed from version 6.2rc1" | ||
4582 | |||
4583 | CVE_STATUS[CVE-2022-48423] = "fixed-version: Fixed from version 6.2rc1" | ||
4584 | |||
4585 | CVE_STATUS[CVE-2022-48424] = "fixed-version: Fixed from version 6.2rc1" | ||
4586 | |||
4587 | CVE_STATUS[CVE-2022-48425] = "fixed-version: Fixed from version 6.4rc1" | ||
4588 | |||
4589 | CVE_STATUS[CVE-2022-48502] = "fixed-version: Fixed from version 6.2rc1" | ||
4590 | |||
4591 | CVE_STATUS[CVE-2022-48619] = "fixed-version: Fixed from version 5.18rc1" | ||
4592 | |||
4593 | CVE_STATUS[CVE-2023-0030] = "fixed-version: Fixed from version 5.0rc1" | ||
4594 | |||
4595 | CVE_STATUS[CVE-2023-0045] = "fixed-version: Fixed from version 6.2rc3" | ||
4596 | |||
4597 | CVE_STATUS[CVE-2023-0047] = "fixed-version: Fixed from version 5.16rc1" | ||
4598 | |||
4599 | CVE_STATUS[CVE-2023-0122] = "fixed-version: Fixed from version 6.0rc4" | ||
4600 | |||
4601 | CVE_STATUS[CVE-2023-0160] = "fixed-version: Fixed from version 6.4rc1" | ||
4602 | |||
4603 | CVE_STATUS[CVE-2023-0179] = "fixed-version: Fixed from version 6.2rc5" | ||
4604 | |||
4605 | CVE_STATUS[CVE-2023-0210] = "fixed-version: Fixed from version 6.2rc4" | ||
4606 | |||
4607 | CVE_STATUS[CVE-2023-0240] = "fixed-version: Fixed from version 5.10rc1" | ||
4608 | |||
4609 | CVE_STATUS[CVE-2023-0266] = "fixed-version: Fixed from version 6.2rc4" | ||
4610 | |||
4611 | CVE_STATUS[CVE-2023-0386] = "fixed-version: Fixed from version 6.2rc6" | ||
4612 | |||
4613 | CVE_STATUS[CVE-2023-0394] = "fixed-version: Fixed from version 6.2rc4" | ||
4614 | |||
4615 | CVE_STATUS[CVE-2023-0458] = "fixed-version: Fixed from version 6.2rc5" | ||
4616 | |||
4617 | CVE_STATUS[CVE-2023-0459] = "fixed-version: Fixed from version 6.3rc1" | ||
4618 | |||
4619 | CVE_STATUS[CVE-2023-0461] = "fixed-version: Fixed from version 6.2rc3" | ||
4620 | |||
4621 | CVE_STATUS[CVE-2023-0468] = "fixed-version: Fixed from version 6.1rc7" | ||
4622 | |||
4623 | CVE_STATUS[CVE-2023-0469] = "fixed-version: Fixed from version 6.1rc7" | ||
4624 | |||
4625 | CVE_STATUS[CVE-2023-0590] = "fixed-version: Fixed from version 6.1rc2" | ||
4626 | |||
4627 | CVE_STATUS[CVE-2023-0597] = "fixed-version: Fixed from version 6.2rc1" | ||
4628 | |||
4629 | CVE_STATUS[CVE-2023-0615] = "fixed-version: Fixed from version 6.1rc3" | ||
4630 | |||
4631 | CVE_STATUS[CVE-2023-1032] = "fixed-version: Fixed from version 6.3rc2" | ||
4632 | |||
4633 | CVE_STATUS[CVE-2023-1073] = "fixed-version: Fixed from version 6.2rc5" | ||
4634 | |||
4635 | CVE_STATUS[CVE-2023-1074] = "fixed-version: Fixed from version 6.2rc6" | ||
4636 | |||
4637 | CVE_STATUS[CVE-2023-1075] = "fixed-version: Fixed from version 6.2rc7" | ||
4638 | |||
4639 | CVE_STATUS[CVE-2023-1076] = "fixed-version: Fixed from version 6.3rc1" | ||
4640 | |||
4641 | CVE_STATUS[CVE-2023-1077] = "fixed-version: Fixed from version 6.3rc1" | ||
4642 | |||
4643 | CVE_STATUS[CVE-2023-1078] = "fixed-version: Fixed from version 6.2rc8" | ||
4644 | |||
4645 | CVE_STATUS[CVE-2023-1079] = "fixed-version: Fixed from version 6.3rc1" | ||
4646 | |||
4647 | CVE_STATUS[CVE-2023-1095] = "fixed-version: Fixed from version 6.0rc1" | ||
4648 | |||
4649 | CVE_STATUS[CVE-2023-1118] = "fixed-version: Fixed from version 6.3rc1" | ||
4650 | |||
4651 | CVE_STATUS[CVE-2023-1192] = "fixed-version: Fixed from version 6.4rc1" | ||
4652 | |||
4653 | CVE_STATUS[CVE-2023-1193] = "fixed-version: Fixed from version 6.3rc6" | ||
4654 | |||
4655 | CVE_STATUS[CVE-2023-1194] = "fixed-version: Fixed from version 6.4rc6" | ||
4656 | |||
4657 | CVE_STATUS[CVE-2023-1195] = "fixed-version: Fixed from version 6.1rc3" | ||
4658 | |||
4659 | CVE_STATUS[CVE-2023-1206] = "fixed-version: Fixed from version 6.5rc4" | ||
4660 | |||
4661 | CVE_STATUS[CVE-2023-1249] = "fixed-version: Fixed from version 5.18rc1" | ||
4662 | |||
4663 | CVE_STATUS[CVE-2023-1252] = "fixed-version: Fixed from version 5.16rc1" | ||
4664 | |||
4665 | CVE_STATUS[CVE-2023-1281] = "fixed-version: Fixed from version 6.2" | ||
4666 | |||
4667 | CVE_STATUS[CVE-2023-1295] = "fixed-version: Fixed from version 5.12rc1" | ||
4668 | |||
4669 | CVE_STATUS[CVE-2023-1380] = "fixed-version: Fixed from version 6.4rc1" | ||
4670 | |||
4671 | CVE_STATUS[CVE-2023-1382] = "fixed-version: Fixed from version 6.1rc7" | ||
4672 | |||
4673 | CVE_STATUS[CVE-2023-1390] = "fixed-version: Fixed from version 5.11rc4" | ||
4674 | |||
4675 | # CVE-2023-1476 has no known resolution | ||
4676 | |||
4677 | CVE_STATUS[CVE-2023-1513] = "fixed-version: Fixed from version 6.2" | ||
4678 | |||
4679 | CVE_STATUS[CVE-2023-1582] = "fixed-version: Fixed from version 5.17rc4" | ||
4680 | |||
4681 | CVE_STATUS[CVE-2023-1583] = "fixed-version: Fixed from version 6.3rc4" | ||
4682 | |||
4683 | CVE_STATUS[CVE-2023-1611] = "fixed-version: Fixed from version 6.3rc5" | ||
4684 | |||
4685 | CVE_STATUS[CVE-2023-1637] = "fixed-version: Fixed from version 5.18rc2" | ||
4686 | |||
4687 | CVE_STATUS[CVE-2023-1652] = "fixed-version: Fixed from version 6.2rc5" | ||
4688 | |||
4689 | CVE_STATUS[CVE-2023-1670] = "fixed-version: Fixed from version 6.3rc4" | ||
4690 | |||
4691 | CVE_STATUS[CVE-2023-1829] = "fixed-version: Fixed from version 6.3rc1" | ||
4692 | |||
4693 | CVE_STATUS[CVE-2023-1838] = "fixed-version: Fixed from version 5.18" | ||
4694 | |||
4695 | CVE_STATUS[CVE-2023-1855] = "fixed-version: Fixed from version 6.3rc3" | ||
4696 | |||
4697 | CVE_STATUS[CVE-2023-1859] = "fixed-version: Fixed from version 6.3rc7" | ||
4698 | |||
4699 | CVE_STATUS[CVE-2023-1872] = "fixed-version: Fixed from version 5.18rc2" | ||
4700 | |||
4701 | CVE_STATUS[CVE-2023-1989] = "fixed-version: Fixed from version 6.3rc4" | ||
4702 | |||
4703 | CVE_STATUS[CVE-2023-1990] = "fixed-version: Fixed from version 6.3rc3" | ||
4704 | |||
4705 | CVE_STATUS[CVE-2023-1998] = "fixed-version: Fixed from version 6.3rc1" | ||
4706 | |||
4707 | CVE_STATUS[CVE-2023-2002] = "fixed-version: Fixed from version 6.4rc1" | ||
4708 | |||
4709 | CVE_STATUS[CVE-2023-2006] = "fixed-version: Fixed from version 6.1rc7" | ||
4710 | |||
4711 | CVE_STATUS[CVE-2023-2007] = "fixed-version: Fixed from version 6.0rc1" | ||
4712 | |||
4713 | CVE_STATUS[CVE-2023-2008] = "fixed-version: Fixed from version 5.19rc4" | ||
4714 | |||
4715 | CVE_STATUS[CVE-2023-2019] = "fixed-version: Fixed from version 6.0rc1" | ||
4716 | |||
4717 | CVE_STATUS[CVE-2023-20569] = "fixed-version: Fixed from version 6.5rc6" | ||
4718 | |||
4719 | CVE_STATUS[CVE-2023-20588] = "fixed-version: Fixed from version 6.5rc6" | ||
4720 | |||
4721 | CVE_STATUS[CVE-2023-20593] = "fixed-version: Fixed from version 6.5rc4" | ||
4722 | |||
4723 | CVE_STATUS[CVE-2023-20928] = "fixed-version: Fixed from version 6.0rc1" | ||
4724 | |||
4725 | # CVE-2023-20937 has no known resolution | ||
4726 | |||
4727 | CVE_STATUS[CVE-2023-20938] = "fixed-version: Fixed from version 5.18rc5" | ||
4728 | |||
4729 | # CVE-2023-20941 has no known resolution | ||
4730 | |||
4731 | CVE_STATUS[CVE-2023-21102] = "fixed-version: Fixed from version 6.2rc4" | ||
4732 | |||
4733 | CVE_STATUS[CVE-2023-21106] = "fixed-version: Fixed from version 6.2rc5" | ||
4734 | |||
4735 | CVE_STATUS[CVE-2023-2124] = "fixed-version: Fixed from version 6.4rc1" | ||
4736 | |||
4737 | CVE_STATUS[CVE-2023-21255] = "fixed-version: Fixed from version 6.4rc4" | ||
4738 | |||
4739 | CVE_STATUS[CVE-2023-21264] = "fixed-version: Fixed from version 6.4rc5" | ||
4740 | |||
4741 | # CVE-2023-21400 has no known resolution | ||
4742 | |||
4743 | CVE_STATUS[CVE-2023-2156] = "fixed-version: Fixed from version 6.3" | ||
4744 | |||
4745 | CVE_STATUS[CVE-2023-2162] = "fixed-version: Fixed from version 6.2rc6" | ||
4746 | |||
4747 | CVE_STATUS[CVE-2023-2163] = "fixed-version: Fixed from version 6.3" | ||
4748 | |||
4749 | CVE_STATUS[CVE-2023-2166] = "fixed-version: Fixed from version 6.1" | ||
4750 | |||
4751 | CVE_STATUS[CVE-2023-2176] = "fixed-version: Fixed from version 6.3rc1" | ||
4752 | |||
4753 | CVE_STATUS[CVE-2023-2177] = "fixed-version: Fixed from version 5.19" | ||
4754 | |||
4755 | CVE_STATUS[CVE-2023-2194] = "fixed-version: Fixed from version 6.3rc4" | ||
4756 | |||
4757 | CVE_STATUS[CVE-2023-2235] = "fixed-version: Fixed from version 6.3rc3" | ||
4758 | |||
4759 | CVE_STATUS[CVE-2023-2236] = "fixed-version: Fixed from version 6.1rc7" | ||
4760 | |||
4761 | CVE_STATUS[CVE-2023-2248] = "fixed-version: Fixed from version 6.3" | ||
4762 | |||
4763 | CVE_STATUS[CVE-2023-2269] = "fixed-version: Fixed from version 6.4rc1" | ||
4764 | |||
4765 | CVE_STATUS[CVE-2023-22995] = "fixed-version: Fixed from version 5.17rc1" | ||
4766 | |||
4767 | CVE_STATUS[CVE-2023-22996] = "fixed-version: Fixed from version 5.18rc1" | ||
4768 | |||
4769 | CVE_STATUS[CVE-2023-22997] = "fixed-version: Fixed from version 6.2rc1" | ||
4770 | |||
4771 | CVE_STATUS[CVE-2023-22998] = "fixed-version: Fixed from version 6.0rc1" | ||
4772 | |||
4773 | CVE_STATUS[CVE-2023-22999] = "fixed-version: Fixed from version 5.17rc1" | ||
4774 | |||
4775 | CVE_STATUS[CVE-2023-23000] = "fixed-version: Fixed from version 5.17rc1" | ||
4776 | |||
4777 | CVE_STATUS[CVE-2023-23001] = "fixed-version: Fixed from version 5.17rc1" | ||
4778 | |||
4779 | CVE_STATUS[CVE-2023-23002] = "fixed-version: Fixed from version 5.17rc1" | ||
4780 | |||
4781 | CVE_STATUS[CVE-2023-23003] = "fixed-version: Fixed from version 5.16rc6" | ||
4782 | |||
4783 | CVE_STATUS[CVE-2023-23004] = "fixed-version: Fixed from version 5.19rc1" | ||
4784 | |||
4785 | CVE_STATUS[CVE-2023-23005] = "fixed-version: Fixed from version 6.2rc1" | ||
4786 | |||
4787 | CVE_STATUS[CVE-2023-23006] = "fixed-version: Fixed from version 5.16rc8" | ||
4788 | |||
4789 | # CVE-2023-23039 has no known resolution | ||
4790 | |||
4791 | CVE_STATUS[CVE-2023-23454] = "fixed-version: Fixed from version 6.2rc3" | ||
4792 | |||
4793 | CVE_STATUS[CVE-2023-23455] = "fixed-version: Fixed from version 6.2rc3" | ||
4794 | |||
4795 | CVE_STATUS[CVE-2023-23559] = "fixed-version: Fixed from version 6.2rc5" | ||
4796 | |||
4797 | CVE_STATUS[CVE-2023-23586] = "fixed-version: Fixed from version 5.12rc1" | ||
4798 | |||
4799 | CVE_STATUS[CVE-2023-2430] = "fixed-version: Fixed from version 6.2rc5" | ||
4800 | |||
4801 | CVE_STATUS[CVE-2023-2483] = "fixed-version: Fixed from version 6.3rc4" | ||
4802 | |||
4803 | CVE_STATUS[CVE-2023-25012] = "fixed-version: Fixed from version 6.3rc1" | ||
4804 | |||
4805 | CVE_STATUS[CVE-2023-2513] = "fixed-version: Fixed from version 6.0rc1" | ||
4806 | |||
4807 | CVE_STATUS[CVE-2023-25775] = "fixed-version: Fixed from version 6.6rc1" | ||
4808 | |||
4809 | CVE_STATUS[CVE-2023-2598] = "fixed-version: Fixed from version 6.4rc1" | ||
4810 | |||
4811 | # CVE-2023-26242 has no known resolution | ||
4812 | |||
4813 | # CVE-2023-2640 has no known resolution | ||
4814 | |||
4815 | CVE_STATUS[CVE-2023-26544] = "fixed-version: Fixed from version 6.2rc1" | ||
4816 | |||
4817 | CVE_STATUS[CVE-2023-26545] = "fixed-version: Fixed from version 6.2" | ||
4818 | |||
4819 | CVE_STATUS[CVE-2023-26605] = "fixed-version: Fixed from version 6.1rc7" | ||
4820 | |||
4821 | CVE_STATUS[CVE-2023-26606] = "fixed-version: Fixed from version 6.2rc1" | ||
4822 | |||
4823 | CVE_STATUS[CVE-2023-26607] = "fixed-version: Fixed from version 6.1rc1" | ||
4824 | |||
4825 | CVE_STATUS[CVE-2023-28327] = "fixed-version: Fixed from version 6.1" | ||
4826 | |||
4827 | CVE_STATUS[CVE-2023-28328] = "fixed-version: Fixed from version 6.2rc1" | ||
4828 | |||
4829 | CVE_STATUS[CVE-2023-28410] = "fixed-version: Fixed from version 5.19rc1" | ||
4830 | |||
4831 | CVE_STATUS[CVE-2023-28464] = "fixed-version: Fixed from version 6.3rc7" | ||
4832 | |||
4833 | CVE_STATUS[CVE-2023-28466] = "fixed-version: Fixed from version 6.3rc2" | ||
4834 | |||
4835 | CVE_STATUS[CVE-2023-2860] = "fixed-version: Fixed from version 6.0rc5" | ||
4836 | |||
4837 | CVE_STATUS[CVE-2023-28772] = "fixed-version: Fixed from version 5.14rc1" | ||
4838 | |||
4839 | CVE_STATUS[CVE-2023-28866] = "fixed-version: Fixed from version 6.3rc4" | ||
4840 | |||
4841 | CVE_STATUS[CVE-2023-2898] = "fixed-version: Fixed from version 6.5rc1" | ||
4842 | |||
4843 | CVE_STATUS[CVE-2023-2985] = "fixed-version: Fixed from version 6.3rc1" | ||
4844 | |||
4845 | CVE_STATUS[CVE-2023-3006] = "fixed-version: Fixed from version 6.1rc1" | ||
4846 | |||
4847 | # Skipping CVE-2023-3022, no affected_versions | ||
4848 | |||
4849 | CVE_STATUS[CVE-2023-30456] = "fixed-version: Fixed from version 6.3rc3" | ||
4850 | |||
4851 | CVE_STATUS[CVE-2023-30772] = "fixed-version: Fixed from version 6.3rc4" | ||
4852 | |||
4853 | CVE_STATUS[CVE-2023-3090] = "fixed-version: Fixed from version 6.4rc2" | ||
4854 | |||
4855 | CVE_STATUS[CVE-2023-3106] = "fixed-version: Fixed from version 4.8rc7" | ||
4856 | |||
4857 | # Skipping CVE-2023-3108, no affected_versions | ||
4858 | |||
4859 | # CVE-2023-31081 has no known resolution | ||
4860 | |||
4861 | # CVE-2023-31082 has no known resolution | ||
4862 | |||
4863 | CVE_STATUS[CVE-2023-31083] = "fixed-version: Fixed from version 6.6rc1" | ||
4864 | |||
4865 | CVE_STATUS[CVE-2023-31084] = "fixed-version: Fixed from version 6.4rc3" | ||
4866 | |||
4867 | CVE_STATUS[CVE-2023-31085] = "fixed-version: Fixed from version 6.6rc5" | ||
4868 | |||
4869 | CVE_STATUS[CVE-2023-3111] = "fixed-version: Fixed from version 6.0rc2" | ||
4870 | |||
4871 | CVE_STATUS[CVE-2023-3117] = "fixed-version: Fixed from version 6.4rc7" | ||
4872 | |||
4873 | CVE_STATUS[CVE-2023-31248] = "fixed-version: Fixed from version 6.5rc2" | ||
4874 | |||
4875 | CVE_STATUS[CVE-2023-3141] = "fixed-version: Fixed from version 6.4rc1" | ||
4876 | |||
4877 | CVE_STATUS[CVE-2023-31436] = "fixed-version: Fixed from version 6.3" | ||
4878 | |||
4879 | CVE_STATUS[CVE-2023-3159] = "fixed-version: Fixed from version 5.18rc6" | ||
4880 | |||
4881 | CVE_STATUS[CVE-2023-3161] = "fixed-version: Fixed from version 6.2rc7" | ||
4882 | |||
4883 | CVE_STATUS[CVE-2023-3212] = "fixed-version: Fixed from version 6.4rc2" | ||
4884 | |||
4885 | CVE_STATUS[CVE-2023-3220] = "fixed-version: Fixed from version 6.3rc1" | ||
4886 | |||
4887 | CVE_STATUS[CVE-2023-32233] = "fixed-version: Fixed from version 6.4rc1" | ||
4888 | |||
4889 | CVE_STATUS[CVE-2023-32247] = "fixed-version: Fixed from version 6.4rc1" | ||
4890 | |||
4891 | CVE_STATUS[CVE-2023-32248] = "fixed-version: Fixed from version 6.4rc1" | ||
4892 | |||
4893 | CVE_STATUS[CVE-2023-32250] = "fixed-version: Fixed from version 6.4rc1" | ||
4894 | |||
4895 | CVE_STATUS[CVE-2023-32252] = "fixed-version: Fixed from version 6.4rc1" | ||
4896 | |||
4897 | CVE_STATUS[CVE-2023-32254] = "fixed-version: Fixed from version 6.4rc1" | ||
4898 | |||
4899 | CVE_STATUS[CVE-2023-32257] = "fixed-version: Fixed from version 6.4rc1" | ||
4900 | |||
4901 | CVE_STATUS[CVE-2023-32258] = "fixed-version: Fixed from version 6.4rc1" | ||
4902 | |||
4903 | CVE_STATUS[CVE-2023-32269] = "fixed-version: Fixed from version 6.2rc7" | ||
4904 | |||
4905 | # CVE-2023-32629 has no known resolution | ||
4906 | |||
4907 | CVE_STATUS[CVE-2023-3268] = "fixed-version: Fixed from version 6.4rc1" | ||
4908 | |||
4909 | CVE_STATUS[CVE-2023-3269] = "fixed-version: Fixed from version 6.5rc1" | ||
4910 | |||
4911 | CVE_STATUS[CVE-2023-3312] = "fixed-version: Fixed from version 6.4rc1" | ||
4912 | |||
4913 | CVE_STATUS[CVE-2023-3317] = "fixed-version: Fixed from version 6.3rc6" | ||
4914 | |||
4915 | CVE_STATUS[CVE-2023-33203] = "fixed-version: Fixed from version 6.3rc4" | ||
4916 | |||
4917 | CVE_STATUS[CVE-2023-33250] = "fixed-version: Fixed from version 6.5rc1" | ||
4918 | |||
4919 | CVE_STATUS[CVE-2023-33288] = "fixed-version: Fixed from version 6.3rc4" | ||
4920 | |||
4921 | CVE_STATUS[CVE-2023-3338] = "fixed-version: Fixed from version 6.1rc1" | ||
4922 | |||
4923 | CVE_STATUS[CVE-2023-3355] = "fixed-version: Fixed from version 6.3rc1" | ||
4924 | |||
4925 | CVE_STATUS[CVE-2023-3357] = "fixed-version: Fixed from version 6.2rc1" | ||
4926 | |||
4927 | CVE_STATUS[CVE-2023-3358] = "fixed-version: Fixed from version 6.2rc5" | ||
4928 | |||
4929 | CVE_STATUS[CVE-2023-3359] = "fixed-version: Fixed from version 6.2rc7" | ||
4930 | |||
4931 | CVE_STATUS[CVE-2023-3389] = "fixed-version: Fixed from version 6.0rc1" | ||
4932 | |||
4933 | CVE_STATUS[CVE-2023-3390] = "fixed-version: Fixed from version 6.4rc7" | ||
4934 | |||
4935 | CVE_STATUS[CVE-2023-33951] = "fixed-version: Fixed from version 6.4rc1" | ||
4936 | |||
4937 | CVE_STATUS[CVE-2023-33952] = "fixed-version: Fixed from version 6.4rc1" | ||
4938 | |||
4939 | # CVE-2023-3397 has no known resolution | ||
4940 | |||
4941 | CVE_STATUS[CVE-2023-34255] = "fixed-version: Fixed from version 6.4rc1" | ||
4942 | |||
4943 | CVE_STATUS[CVE-2023-34256] = "fixed-version: Fixed from version 6.4rc2" | ||
4944 | |||
4945 | CVE_STATUS[CVE-2023-34319] = "fixed-version: Fixed from version 6.5rc6" | ||
4946 | |||
4947 | CVE_STATUS[CVE-2023-34324] = "fixed-version: Fixed from version 6.6rc6" | ||
4948 | |||
4949 | CVE_STATUS[CVE-2023-3439] = "fixed-version: Fixed from version 5.18rc5" | ||
4950 | |||
4951 | CVE_STATUS[CVE-2023-35001] = "fixed-version: Fixed from version 6.5rc2" | ||
4952 | |||
4953 | CVE_STATUS[CVE-2023-3567] = "fixed-version: Fixed from version 6.2rc7" | ||
4954 | |||
4955 | # CVE-2023-35693 has no known resolution | ||
4956 | |||
4957 | CVE_STATUS[CVE-2023-35788] = "fixed-version: Fixed from version 6.4rc5" | ||
4958 | |||
4959 | CVE_STATUS[CVE-2023-35823] = "fixed-version: Fixed from version 6.4rc1" | ||
4960 | |||
4961 | CVE_STATUS[CVE-2023-35824] = "fixed-version: Fixed from version 6.4rc1" | ||
4962 | |||
4963 | CVE_STATUS[CVE-2023-35826] = "fixed-version: Fixed from version 6.4rc1" | ||
4964 | |||
4965 | CVE_STATUS[CVE-2023-35827] = "fixed-version: Fixed from version 6.6rc6" | ||
4966 | |||
4967 | CVE_STATUS[CVE-2023-35828] = "fixed-version: Fixed from version 6.4rc1" | ||
4968 | |||
4969 | CVE_STATUS[CVE-2023-35829] = "fixed-version: Fixed from version 6.4rc1" | ||
4970 | |||
4971 | CVE_STATUS[CVE-2023-3609] = "fixed-version: Fixed from version 6.4rc7" | ||
4972 | |||
4973 | CVE_STATUS[CVE-2023-3610] = "fixed-version: Fixed from version 6.4" | ||
4974 | |||
4975 | CVE_STATUS[CVE-2023-3611] = "fixed-version: Fixed from version 6.5rc2" | ||
4976 | |||
4977 | # CVE-2023-3640 has no known resolution | ||
4978 | |||
4979 | CVE_STATUS[CVE-2023-37453] = "fixed-version: Fixed from version 6.6rc1" | ||
4980 | |||
4981 | # CVE-2023-37454 has no known resolution | ||
4982 | |||
4983 | CVE_STATUS[CVE-2023-3772] = "fixed-version: Fixed from version 6.5rc7" | ||
4984 | |||
4985 | CVE_STATUS[CVE-2023-3773] = "fixed-version: Fixed from version 6.5rc7" | ||
4986 | |||
4987 | CVE_STATUS[CVE-2023-3776] = "fixed-version: Fixed from version 6.5rc2" | ||
4988 | |||
4989 | CVE_STATUS[CVE-2023-3777] = "fixed-version: Fixed from version 6.5rc3" | ||
4990 | |||
4991 | CVE_STATUS[CVE-2023-3812] = "fixed-version: Fixed from version 6.1rc4" | ||
4992 | |||
4993 | CVE_STATUS[CVE-2023-38409] = "fixed-version: Fixed from version 6.3rc7" | ||
4994 | |||
4995 | CVE_STATUS[CVE-2023-38426] = "fixed-version: Fixed from version 6.4rc3" | ||
4996 | |||
4997 | CVE_STATUS[CVE-2023-38427] = "fixed-version: Fixed from version 6.4rc6" | ||
4998 | |||
4999 | CVE_STATUS[CVE-2023-38428] = "fixed-version: Fixed from version 6.4rc3" | ||
5000 | |||
5001 | CVE_STATUS[CVE-2023-38429] = "fixed-version: Fixed from version 6.4rc3" | ||
5002 | |||
5003 | CVE_STATUS[CVE-2023-38430] = "fixed-version: Fixed from version 6.4rc6" | ||
5004 | |||
5005 | CVE_STATUS[CVE-2023-38431] = "fixed-version: Fixed from version 6.4rc6" | ||
5006 | |||
5007 | CVE_STATUS[CVE-2023-38432] = "fixed-version: Fixed from version 6.4" | ||
5008 | |||
5009 | CVE_STATUS[CVE-2023-3863] = "fixed-version: Fixed from version 6.5rc1" | ||
5010 | |||
5011 | CVE_STATUS[CVE-2023-3865] = "fixed-version: Fixed from version 6.4" | ||
5012 | |||
5013 | CVE_STATUS[CVE-2023-3866] = "fixed-version: Fixed from version 6.4" | ||
5014 | |||
5015 | CVE_STATUS[CVE-2023-3867] = "fixed-version: Fixed from version 6.5rc1" | ||
5016 | |||
5017 | CVE_STATUS[CVE-2023-39189] = "fixed-version: Fixed from version 6.6rc1" | ||
5018 | |||
5019 | CVE_STATUS[CVE-2023-39191] = "fixed-version: Fixed from version 6.3rc1" | ||
5020 | |||
5021 | CVE_STATUS[CVE-2023-39192] = "fixed-version: Fixed from version 6.6rc1" | ||
5022 | |||
5023 | CVE_STATUS[CVE-2023-39193] = "fixed-version: Fixed from version 6.6rc1" | ||
5024 | |||
5025 | CVE_STATUS[CVE-2023-39194] = "fixed-version: Fixed from version 6.5rc7" | ||
5026 | |||
5027 | CVE_STATUS[CVE-2023-39197] = "fixed-version: Fixed from version 6.5rc1" | ||
5028 | |||
5029 | CVE_STATUS[CVE-2023-39198] = "fixed-version: Fixed from version 6.5rc7" | ||
5030 | |||
5031 | CVE_STATUS[CVE-2023-4004] = "fixed-version: Fixed from version 6.5rc3" | ||
5032 | |||
5033 | # CVE-2023-4010 has no known resolution | ||
5034 | |||
5035 | CVE_STATUS[CVE-2023-4015] = "fixed-version: Fixed from version 6.5rc4" | ||
5036 | |||
5037 | CVE_STATUS[CVE-2023-40283] = "fixed-version: Fixed from version 6.5rc1" | ||
5038 | |||
5039 | CVE_STATUS[CVE-2023-40791] = "fixed-version: Fixed from version 6.5rc6" | ||
5040 | |||
5041 | CVE_STATUS[CVE-2023-4128] = "fixed-version: Fixed from version 6.5rc5" | ||
5042 | |||
5043 | CVE_STATUS[CVE-2023-4132] = "fixed-version: Fixed from version 6.5rc1" | ||
5044 | |||
5045 | CVE_STATUS[CVE-2023-4133] = "fixed-version: Fixed from version 6.3" | ||
5046 | |||
5047 | CVE_STATUS[CVE-2023-4134] = "fixed-version: Fixed from version 6.5rc1" | ||
5048 | |||
5049 | CVE_STATUS[CVE-2023-4147] = "fixed-version: Fixed from version 6.5rc4" | ||
5050 | |||
5051 | CVE_STATUS[CVE-2023-4155] = "fixed-version: Fixed from version 6.5rc6" | ||
5052 | |||
5053 | CVE_STATUS[CVE-2023-4194] = "fixed-version: Fixed from version 6.5rc5" | ||
5054 | |||
5055 | CVE_STATUS[CVE-2023-4206] = "fixed-version: Fixed from version 6.5rc5" | ||
5056 | |||
5057 | CVE_STATUS[CVE-2023-4207] = "fixed-version: Fixed from version 6.5rc5" | ||
5058 | |||
5059 | CVE_STATUS[CVE-2023-4208] = "fixed-version: Fixed from version 6.5rc5" | ||
5060 | |||
5061 | CVE_STATUS[CVE-2023-4244] = "fixed-version: Fixed from version 6.5rc7" | ||
5062 | |||
5063 | CVE_STATUS[CVE-2023-4273] = "fixed-version: Fixed from version 6.5rc5" | ||
5064 | |||
5065 | CVE_STATUS[CVE-2023-42752] = "fixed-version: Fixed from version 6.6rc1" | ||
5066 | |||
5067 | CVE_STATUS[CVE-2023-42753] = "fixed-version: Fixed from version 6.6rc1" | ||
5068 | |||
5069 | CVE_STATUS[CVE-2023-42754] = "fixed-version: Fixed from version 6.6rc3" | ||
5070 | |||
5071 | CVE_STATUS[CVE-2023-42755] = "fixed-version: Fixed from version 6.3rc1" | ||
5072 | |||
5073 | CVE_STATUS[CVE-2023-42756] = "fixed-version: Fixed from version 6.6rc3" | ||
5074 | |||
5075 | CVE_STATUS[CVE-2023-4385] = "fixed-version: Fixed from version 5.19rc1" | ||
5076 | |||
5077 | CVE_STATUS[CVE-2023-4387] = "fixed-version: Fixed from version 5.18" | ||
5078 | |||
5079 | CVE_STATUS[CVE-2023-4389] = "fixed-version: Fixed from version 5.18rc3" | ||
5080 | |||
5081 | CVE_STATUS[CVE-2023-4394] = "fixed-version: Fixed from version 6.0rc3" | ||
5082 | |||
5083 | CVE_STATUS[CVE-2023-44466] = "fixed-version: Fixed from version 6.5rc2" | ||
5084 | |||
5085 | CVE_STATUS[CVE-2023-4459] = "fixed-version: Fixed from version 5.18" | ||
5086 | |||
5087 | CVE_STATUS[CVE-2023-4563] = "fixed-version: Fixed from version 6.5rc6" | ||
5088 | |||
5089 | CVE_STATUS[CVE-2023-4569] = "fixed-version: Fixed from version 6.5rc7" | ||
5090 | |||
5091 | CVE_STATUS[CVE-2023-45862] = "fixed-version: Fixed from version 6.3rc1" | ||
5092 | |||
5093 | CVE_STATUS[CVE-2023-45863] = "fixed-version: Fixed from version 6.3rc1" | ||
5094 | |||
5095 | CVE_STATUS[CVE-2023-45871] = "fixed-version: Fixed from version 6.6rc1" | ||
5096 | |||
5097 | CVE_STATUS[CVE-2023-45898] = "fixed-version: Fixed from version 6.6rc1" | ||
5098 | |||
5099 | CVE_STATUS[CVE-2023-4610] = "fixed-version: Fixed from version 6.4" | ||
5100 | |||
5101 | CVE_STATUS[CVE-2023-4611] = "fixed-version: Fixed from version 6.5rc4" | ||
5102 | |||
5103 | CVE_STATUS[CVE-2023-4622] = "fixed-version: Fixed from version 6.5rc1" | ||
5104 | |||
5105 | CVE_STATUS[CVE-2023-4623] = "fixed-version: Fixed from version 6.6rc1" | ||
5106 | |||
5107 | CVE_STATUS[CVE-2023-46343] = "fixed-version: Fixed from version 6.6rc7" | ||
5108 | |||
5109 | CVE_STATUS[CVE-2023-46813] = "fixed-version: Fixed from version 6.6rc7" | ||
5110 | |||
5111 | CVE_STATUS[CVE-2023-46838] = "cpe-stable-backport: Backported in 6.6.14" | ||
5112 | |||
5113 | CVE_STATUS[CVE-2023-46862] = "fixed-version: Fixed from version 6.6" | ||
5114 | |||
5115 | # CVE-2023-47233 has no known resolution | ||
5116 | |||
5117 | CVE_STATUS[CVE-2023-4732] = "fixed-version: Fixed from version 5.14rc1" | ||
5118 | |||
5119 | CVE_STATUS[CVE-2023-4881] = "fixed-version: Fixed from version 6.6rc1" | ||
5120 | |||
5121 | CVE_STATUS[CVE-2023-4921] = "fixed-version: Fixed from version 6.6rc1" | ||
5122 | |||
5123 | CVE_STATUS[CVE-2023-50431] = "cpe-stable-backport: Backported in 6.6.14" | ||
5124 | |||
5125 | CVE_STATUS[CVE-2023-5090] = "fixed-version: Fixed from version 6.6rc7" | ||
5126 | |||
5127 | CVE_STATUS[CVE-2023-51042] = "fixed-version: Fixed from version 6.5rc1" | ||
5128 | |||
5129 | CVE_STATUS[CVE-2023-51043] = "fixed-version: Fixed from version 6.5rc3" | ||
5130 | |||
5131 | CVE_STATUS[CVE-2023-5158] = "fixed-version: Fixed from version 6.6rc5" | ||
5132 | |||
5133 | CVE_STATUS[CVE-2023-51779] = "cpe-stable-backport: Backported in 6.6.9" | ||
5134 | |||
5135 | CVE_STATUS[CVE-2023-5178] = "fixed-version: Fixed from version 6.6rc7" | ||
5136 | |||
5137 | CVE_STATUS[CVE-2023-51780] = "cpe-stable-backport: Backported in 6.6.8" | ||
5138 | |||
5139 | CVE_STATUS[CVE-2023-51781] = "cpe-stable-backport: Backported in 6.6.8" | ||
5140 | |||
5141 | CVE_STATUS[CVE-2023-51782] = "cpe-stable-backport: Backported in 6.6.8" | ||
5142 | |||
5143 | CVE_STATUS[CVE-2023-5197] = "fixed-version: Fixed from version 6.6rc3" | ||
5144 | |||
5145 | CVE_STATUS[CVE-2023-52340] = "fixed-version: Fixed from version 6.3rc1" | ||
5146 | |||
5147 | CVE_STATUS[CVE-2023-52429] = "cpe-stable-backport: Backported in 6.6.18" | ||
5148 | |||
5149 | CVE_STATUS[CVE-2023-52433] = "fixed-version: Fixed from version 6.6rc1" | ||
5150 | |||
5151 | CVE_STATUS[CVE-2023-52434] = "cpe-stable-backport: Backported in 6.6.8" | ||
5152 | |||
5153 | CVE_STATUS[CVE-2023-52435] = "cpe-stable-backport: Backported in 6.6.11" | ||
5154 | |||
5155 | CVE_STATUS[CVE-2023-52436] = "cpe-stable-backport: Backported in 6.6.13" | ||
5156 | |||
5157 | CVE_STATUS[CVE-2023-52438] = "cpe-stable-backport: Backported in 6.6.13" | ||
5158 | |||
5159 | CVE_STATUS[CVE-2023-52439] = "cpe-stable-backport: Backported in 6.6.13" | ||
5160 | |||
5161 | CVE_STATUS[CVE-2023-52440] = "fixed-version: Fixed from version 6.6rc1" | ||
5162 | |||
5163 | CVE_STATUS[CVE-2023-52441] = "fixed-version: Fixed from version 6.5rc4" | ||
5164 | |||
5165 | CVE_STATUS[CVE-2023-52442] = "fixed-version: Fixed from version 6.5rc4" | ||
5166 | |||
5167 | CVE_STATUS[CVE-2023-52443] = "cpe-stable-backport: Backported in 6.6.14" | ||
5168 | |||
5169 | CVE_STATUS[CVE-2023-52444] = "cpe-stable-backport: Backported in 6.6.14" | ||
5170 | |||
5171 | CVE_STATUS[CVE-2023-52445] = "cpe-stable-backport: Backported in 6.6.14" | ||
5172 | |||
5173 | CVE_STATUS[CVE-2023-52446] = "cpe-stable-backport: Backported in 6.6.14" | ||
5174 | |||
5175 | CVE_STATUS[CVE-2023-52447] = "cpe-stable-backport: Backported in 6.6.14" | ||
5176 | |||
5177 | CVE_STATUS[CVE-2023-52448] = "cpe-stable-backport: Backported in 6.6.14" | ||
5178 | |||
5179 | CVE_STATUS[CVE-2023-52449] = "cpe-stable-backport: Backported in 6.6.14" | ||
5180 | |||
5181 | CVE_STATUS[CVE-2023-52450] = "cpe-stable-backport: Backported in 6.6.14" | ||
5182 | |||
5183 | CVE_STATUS[CVE-2023-52451] = "cpe-stable-backport: Backported in 6.6.14" | ||
5184 | |||
5185 | CVE_STATUS[CVE-2023-52452] = "cpe-stable-backport: Backported in 6.6.14" | ||
5186 | |||
5187 | CVE_STATUS[CVE-2023-52453] = "cpe-stable-backport: Backported in 6.6.14" | ||
5188 | |||
5189 | CVE_STATUS[CVE-2023-52454] = "cpe-stable-backport: Backported in 6.6.14" | ||
5190 | |||
5191 | CVE_STATUS[CVE-2023-52455] = "cpe-stable-backport: Backported in 6.6.14" | ||
5192 | |||
5193 | CVE_STATUS[CVE-2023-52456] = "cpe-stable-backport: Backported in 6.6.14" | ||
5194 | |||
5195 | CVE_STATUS[CVE-2023-52457] = "cpe-stable-backport: Backported in 6.6.14" | ||
5196 | |||
5197 | CVE_STATUS[CVE-2023-52458] = "cpe-stable-backport: Backported in 6.6.14" | ||
5198 | |||
5199 | CVE_STATUS[CVE-2023-52459] = "cpe-stable-backport: Backported in 6.6.14" | ||
5200 | |||
5201 | CVE_STATUS[CVE-2023-52460] = "fixed-version: only affects 6.7rc1 onwards" | ||
5202 | |||
5203 | CVE_STATUS[CVE-2023-52461] = "fixed-version: only affects 6.7rc1 onwards" | ||
5204 | |||
5205 | CVE_STATUS[CVE-2023-52462] = "cpe-stable-backport: Backported in 6.6.14" | ||
5206 | |||
5207 | CVE_STATUS[CVE-2023-52463] = "cpe-stable-backport: Backported in 6.6.14" | ||
5208 | |||
5209 | CVE_STATUS[CVE-2023-52464] = "cpe-stable-backport: Backported in 6.6.14" | ||
5210 | |||
5211 | CVE_STATUS[CVE-2023-5345] = "fixed-version: Fixed from version 6.6rc4" | ||
5212 | |||
5213 | CVE_STATUS[CVE-2023-5633] = "fixed-version: Fixed from version 6.6rc6" | ||
5214 | |||
5215 | CVE_STATUS[CVE-2023-5717] = "fixed-version: Fixed from version 6.6rc7" | ||
5216 | |||
5217 | CVE_STATUS[CVE-2023-5972] = "fixed-version: Fixed from version 6.6rc7" | ||
5218 | |||
5219 | CVE_STATUS[CVE-2023-6039] = "fixed-version: Fixed from version 6.5rc5" | ||
5220 | |||
5221 | CVE_STATUS[CVE-2023-6040] = "fixed-version: Fixed from version 5.18rc1" | ||
5222 | |||
5223 | CVE_STATUS[CVE-2023-6111] = "cpe-stable-backport: Backported in 6.6.3" | ||
5224 | |||
5225 | CVE_STATUS[CVE-2023-6121] = "cpe-stable-backport: Backported in 6.6.4" | ||
5226 | |||
5227 | CVE_STATUS[CVE-2023-6176] = "fixed-version: Fixed from version 6.6rc2" | ||
5228 | |||
5229 | CVE_STATUS[CVE-2023-6200] = "cpe-stable-backport: Backported in 6.6.9" | ||
5230 | |||
5231 | # CVE-2023-6238 has no known resolution | ||
5232 | |||
5233 | # CVE-2023-6240 has no known resolution | ||
5234 | |||
5235 | # CVE-2023-6270 has no known resolution | ||
5236 | |||
5237 | # CVE-2023-6356 has no known resolution | ||
5238 | |||
5239 | CVE_STATUS[CVE-2023-6531] = "cpe-stable-backport: Backported in 6.6.7" | ||
5240 | |||
5241 | # CVE-2023-6535 has no known resolution | ||
5242 | |||
5243 | # CVE-2023-6536 has no known resolution | ||
5244 | |||
5245 | CVE_STATUS[CVE-2023-6546] = "fixed-version: Fixed from version 6.5rc7" | ||
5246 | |||
5247 | CVE_STATUS[CVE-2023-6560] = "cpe-stable-backport: Backported in 6.6.5" | ||
5248 | |||
5249 | CVE_STATUS[CVE-2023-6606] = "cpe-stable-backport: Backported in 6.6.9" | ||
5250 | |||
5251 | CVE_STATUS[CVE-2023-6610] = "cpe-stable-backport: Backported in 6.6.13" | ||
5252 | |||
5253 | CVE_STATUS[CVE-2023-6622] = "cpe-stable-backport: Backported in 6.6.7" | ||
5254 | |||
5255 | CVE_STATUS[CVE-2023-6679] = "fixed-version: only affects 6.7rc1 onwards" | ||
5256 | |||
5257 | CVE_STATUS[CVE-2023-6817] = "cpe-stable-backport: Backported in 6.6.7" | ||
5258 | |||
5259 | CVE_STATUS[CVE-2023-6915] = "cpe-stable-backport: Backported in 6.6.13" | ||
5260 | |||
5261 | CVE_STATUS[CVE-2023-6931] = "cpe-stable-backport: Backported in 6.6.7" | ||
5262 | |||
5263 | CVE_STATUS[CVE-2023-6932] = "cpe-stable-backport: Backported in 6.6.5" | ||
5264 | |||
5265 | # CVE-2023-7042 has no known resolution | ||
5266 | |||
5267 | CVE_STATUS[CVE-2023-7192] = "fixed-version: Fixed from version 6.3rc1" | ||
5268 | |||
5269 | CVE_STATUS[CVE-2024-0193] = "cpe-stable-backport: Backported in 6.6.10" | ||
5270 | |||
5271 | CVE_STATUS[CVE-2024-0340] = "fixed-version: Fixed from version 6.4rc6" | ||
5272 | |||
5273 | CVE_STATUS[CVE-2024-0443] = "fixed-version: Fixed from version 6.4rc7" | ||
5274 | |||
5275 | CVE_STATUS[CVE-2024-0562] = "fixed-version: Fixed from version 6.0rc3" | ||
5276 | |||
5277 | # CVE-2024-0564 has no known resolution | ||
5278 | |||
5279 | CVE_STATUS[CVE-2024-0565] = "cpe-stable-backport: Backported in 6.6.8" | ||
5280 | |||
5281 | CVE_STATUS[CVE-2024-0582] = "cpe-stable-backport: Backported in 6.6.5" | ||
5282 | |||
5283 | CVE_STATUS[CVE-2024-0584] = "cpe-stable-backport: Backported in 6.6.5" | ||
5284 | |||
5285 | CVE_STATUS[CVE-2024-0607] = "cpe-stable-backport: Backported in 6.6.3" | ||
5286 | |||
5287 | CVE_STATUS[CVE-2024-0639] = "fixed-version: Fixed from version 6.5rc1" | ||
5288 | |||
5289 | CVE_STATUS[CVE-2024-0641] = "fixed-version: Fixed from version 6.6rc5" | ||
5290 | |||
5291 | CVE_STATUS[CVE-2024-0646] = "cpe-stable-backport: Backported in 6.6.7" | ||
5292 | |||
5293 | CVE_STATUS[CVE-2024-0775] = "fixed-version: Fixed from version 6.4rc2" | ||
5294 | |||
5295 | # CVE-2024-0841 has no known resolution | ||
5296 | |||
5297 | CVE_STATUS[CVE-2024-1085] = "cpe-stable-backport: Backported in 6.6.14" | ||
5298 | |||
5299 | CVE_STATUS[CVE-2024-1086] = "cpe-stable-backport: Backported in 6.6.15" | ||
5300 | |||
5301 | CVE_STATUS[CVE-2024-1151] = "cpe-stable-backport: Backported in 6.6.18" | ||
5302 | |||
5303 | CVE_STATUS[CVE-2024-1312] = "fixed-version: Fixed from version 6.5rc4" | ||
5304 | |||
5305 | # CVE-2024-21803 has no known resolution | ||
5306 | |||
5307 | # CVE-2024-22099 has no known resolution | ||
5308 | |||
5309 | # CVE-2024-22386 has no known resolution | ||
5310 | |||
5311 | CVE_STATUS[CVE-2024-22705] = "cpe-stable-backport: Backported in 6.6.10" | ||
5312 | |||
5313 | # CVE-2024-23196 has no known resolution | ||
5314 | |||
5315 | # CVE-2024-23307 has no known resolution | ||
5316 | |||
5317 | # CVE-2024-23848 has no known resolution | ||
5318 | |||
5319 | CVE_STATUS[CVE-2024-23849] = "cpe-stable-backport: Backported in 6.6.15" | ||
5320 | |||
5321 | CVE_STATUS[CVE-2024-23850] = "cpe-stable-backport: Backported in 6.6.18" | ||
5322 | |||
5323 | CVE_STATUS[CVE-2024-23851] = "cpe-stable-backport: Backported in 6.6.18" | ||
5324 | |||
5325 | CVE_STATUS[CVE-2024-24855] = "fixed-version: Fixed from version 6.5rc2" | ||
5326 | |||
5327 | # CVE-2024-24857 has no known resolution | ||
5328 | |||
5329 | # CVE-2024-24858 has no known resolution | ||
5330 | |||
5331 | # CVE-2024-24859 has no known resolution | ||
5332 | |||
5333 | CVE_STATUS[CVE-2024-24860] = "cpe-stable-backport: Backported in 6.6.14" | ||
5334 | |||
5335 | # CVE-2024-24861 has no known resolution | ||
5336 | |||
5337 | # CVE-2024-24864 has no known resolution | ||
5338 | |||
5339 | # CVE-2024-25739 has no known resolution | ||
5340 | |||
5341 | # CVE-2024-25740 has no known resolution | ||
5342 | |||
5343 | # CVE-2024-25741 has no known resolution | ||
5344 | |||
5345 | CVE_STATUS[CVE-2024-25744] = "cpe-stable-backport: Backported in 6.6.7" | ||
5346 | |||
5347 | CVE_STATUS[CVE-2024-26581] = "cpe-stable-backport: Backported in 6.6.17" | ||
5348 | |||
5349 | CVE_STATUS[CVE-2024-26582] = "cpe-stable-backport: Backported in 6.6.18" | ||
5350 | |||
5351 | CVE_STATUS[CVE-2024-26583] = "cpe-stable-backport: Backported in 6.6.18" | ||
5352 | |||
5353 | CVE_STATUS[CVE-2024-26584] = "cpe-stable-backport: Backported in 6.6.18" | ||
5354 | |||
5355 | CVE_STATUS[CVE-2024-26585] = "cpe-stable-backport: Backported in 6.6.18" | ||
5356 | |||
5357 | CVE_STATUS[CVE-2024-26586] = "cpe-stable-backport: Backported in 6.6.14" | ||
5358 | |||
5359 | CVE_STATUS[CVE-2024-26587] = "cpe-stable-backport: Backported in 6.6.14" | ||
5360 | |||
5361 | CVE_STATUS[CVE-2024-26588] = "cpe-stable-backport: Backported in 6.6.14" | ||
5362 | |||
5363 | CVE_STATUS[CVE-2024-26589] = "cpe-stable-backport: Backported in 6.6.14" | ||
5364 | |||
5365 | CVE_STATUS[CVE-2024-26590] = "cpe-stable-backport: Backported in 6.6.14" | ||
5366 | |||
5367 | CVE_STATUS[CVE-2024-26591] = "cpe-stable-backport: Backported in 6.6.14" | ||
5368 | |||
5369 | CVE_STATUS[CVE-2024-26592] = "cpe-stable-backport: Backported in 6.6.14" | ||
5370 | |||
5371 | CVE_STATUS[CVE-2024-26593] = "cpe-stable-backport: Backported in 6.6.18" | ||
5372 | |||
5373 | CVE_STATUS[CVE-2024-26594] = "cpe-stable-backport: Backported in 6.6.14" | ||
5374 | |||
5375 | CVE_STATUS[CVE-2024-26595] = "cpe-stable-backport: Backported in 6.6.14" | ||
5376 | |||
5377 | # CVE-2024-26596 needs backporting (fixed from 6.8rc1) | ||
5378 | |||
5379 | CVE_STATUS[CVE-2024-26597] = "cpe-stable-backport: Backported in 6.6.14" | ||
5380 | |||
5381 | CVE_STATUS[CVE-2024-26598] = "cpe-stable-backport: Backported in 6.6.14" | ||
5382 | |||
5383 | CVE_STATUS[CVE-2024-26599] = "cpe-stable-backport: Backported in 6.6.14" | ||
5384 | |||
diff --git a/meta/recipes-kernel/linux/generate-cve-exclusions.py b/meta/recipes-kernel/linux/generate-cve-exclusions.py index aa9195aab4..dfc16663a5 100755 --- a/meta/recipes-kernel/linux/generate-cve-exclusions.py +++ b/meta/recipes-kernel/linux/generate-cve-exclusions.py | |||
@@ -1,7 +1,7 @@ | |||
1 | #! /usr/bin/env python3 | 1 | #! /usr/bin/env python3 |
2 | 2 | ||
3 | # Generate granular CVE status metadata for a specific version of the kernel | 3 | # Generate granular CVE status metadata for a specific version of the kernel |
4 | # using data from linuxkernelcves.com. | 4 | # using json data from cvelistV5 or vulns repository |
5 | # | 5 | # |
6 | # SPDX-License-Identifier: GPL-2.0-only | 6 | # SPDX-License-Identifier: GPL-2.0-only |
7 | 7 | ||
@@ -9,7 +9,9 @@ import argparse | |||
9 | import datetime | 9 | import datetime |
10 | import json | 10 | import json |
11 | import pathlib | 11 | import pathlib |
12 | import re | 12 | import os |
13 | import glob | ||
14 | import subprocess | ||
13 | 15 | ||
14 | from packaging.version import Version | 16 | from packaging.version import Version |
15 | 17 | ||
@@ -25,26 +27,82 @@ def parse_version(s): | |||
25 | return Version(s) | 27 | return Version(s) |
26 | return None | 28 | return None |
27 | 29 | ||
30 | def get_fixed_versions(cve_info, base_version): | ||
31 | ''' | ||
32 | Get fixed versionss | ||
33 | ''' | ||
34 | first_affected = None | ||
35 | fixed = None | ||
36 | fixed_backport = None | ||
37 | next_version = Version(str(base_version) + ".5000") | ||
38 | for affected in cve_info["containers"]["cna"]["affected"]: | ||
39 | # In case the CVE info is not complete, it might not have default status and therefore | ||
40 | # we don't know the status of this CVE. | ||
41 | if not "defaultStatus" in affected: | ||
42 | return first_affected, fixed, fixed_backport | ||
43 | if affected["defaultStatus"] == "affected": | ||
44 | for version in affected["versions"]: | ||
45 | v = Version(version["version"]) | ||
46 | if v == Version('0'): | ||
47 | #Skiping non-affected | ||
48 | continue | ||
49 | if version["status"] == "unaffected" and first_affected and v < first_affected: | ||
50 | first_affected = Version(f"{v.major}.{v.minor}") | ||
51 | if version["status"] == "affected" and not first_affected: | ||
52 | first_affected = v | ||
53 | elif (version["status"] == "unaffected" and | ||
54 | version['versionType'] == "original_commit_for_fix"): | ||
55 | fixed = v | ||
56 | elif base_version < v and v < next_version: | ||
57 | fixed_backport = v | ||
58 | elif affected["defaultStatus"] == "unaffected": | ||
59 | # Only specific versions are affected. We care only about our base version | ||
60 | if "versions" not in affected: | ||
61 | continue | ||
62 | for version in affected["versions"]: | ||
63 | if "versionType" not in version: | ||
64 | continue | ||
65 | if version["versionType"] == "git": | ||
66 | continue | ||
67 | v = Version(version["version"]) | ||
68 | # in case it is not in our base version | ||
69 | less_than = Version(version["lessThan"]) | ||
70 | |||
71 | if not first_affected: | ||
72 | first_affected = v | ||
73 | fixed = less_than | ||
74 | if base_version < v and v < next_version: | ||
75 | fixed_backport = less_than | ||
76 | |||
77 | return first_affected, fixed, fixed_backport | ||
78 | |||
79 | def is_linux_cve(cve_info): | ||
80 | '''Return true is the CVE belongs to Linux''' | ||
81 | if not "affected" in cve_info["containers"]["cna"]: | ||
82 | return False | ||
83 | for affected in cve_info["containers"]["cna"]["affected"]: | ||
84 | if not "product" in affected: | ||
85 | return False | ||
86 | if affected["product"] == "Linux" and affected["vendor"] == "Linux": | ||
87 | return True | ||
88 | return False | ||
28 | 89 | ||
29 | def main(argp=None): | 90 | def main(argp=None): |
30 | parser = argparse.ArgumentParser() | 91 | parser = argparse.ArgumentParser() |
31 | parser.add_argument("datadir", type=pathlib.Path, help="Path to a clone of https://github.com/nluedtke/linux_kernel_cves") | 92 | parser.add_argument("datadir", type=pathlib.Path, help="Path to a clone of https://github.com/CVEProject/cvelistV5 or https://git.kernel.org/pub/scm/linux/security/vulns.git") |
32 | parser.add_argument("version", type=Version, help="Kernel version number to generate data for, such as 6.1.38") | 93 | parser.add_argument("version", type=Version, help="Kernel version number to generate data for, such as 6.1.38") |
33 | 94 | ||
34 | args = parser.parse_args(argp) | 95 | args = parser.parse_args(argp) |
35 | datadir = args.datadir | 96 | datadir = args.datadir.resolve() |
36 | version = args.version | 97 | version = args.version |
37 | base_version = f"{version.major}.{version.minor}" | 98 | base_version = Version(f"{version.major}.{version.minor}") |
38 | 99 | ||
39 | with open(datadir / "data" / "kernel_cves.json", "r") as f: | 100 | data_version = subprocess.check_output(("git", "describe", "--tags", "HEAD"), cwd=datadir, text=True) |
40 | cve_data = json.load(f) | ||
41 | |||
42 | with open(datadir / "data" / "stream_fixes.json", "r") as f: | ||
43 | stream_data = json.load(f) | ||
44 | 101 | ||
45 | print(f""" | 102 | print(f""" |
46 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. | 103 | # Auto-generated CVE metadata, DO NOT EDIT BY HAND. |
47 | # Generated at {datetime.datetime.now(datetime.timezone.utc)} for version {version} | 104 | # Generated at {datetime.datetime.now(datetime.timezone.utc)} for kernel version {version} |
105 | # From {datadir.name} {data_version} | ||
48 | 106 | ||
49 | python check_kernel_cve_status_version() {{ | 107 | python check_kernel_cve_status_version() {{ |
50 | this_version = "{version}" | 108 | this_version = "{version}" |
@@ -55,17 +113,23 @@ python check_kernel_cve_status_version() {{ | |||
55 | do_cve_check[prefuncs] += "check_kernel_cve_status_version" | 113 | do_cve_check[prefuncs] += "check_kernel_cve_status_version" |
56 | """) | 114 | """) |
57 | 115 | ||
58 | for cve, data in cve_data.items(): | 116 | # Loop though all CVES and check if they are kernel related, newer than 2015 |
59 | if "affected_versions" not in data: | 117 | pattern = os.path.join(datadir, '**', "CVE-20*.json") |
60 | print(f"# Skipping {cve}, no affected_versions") | ||
61 | print() | ||
62 | continue | ||
63 | 118 | ||
64 | affected = data["affected_versions"] | 119 | files = glob.glob(pattern, recursive=True) |
65 | first_affected, fixed = re.search(r"(.+) to (.+)", affected).groups() | 120 | for cve_file in sorted(files): |
66 | first_affected = parse_version(first_affected) | 121 | # Get CVE Id |
67 | fixed = parse_version(fixed) | 122 | cve = cve_file[cve_file.rfind("/")+1:cve_file.rfind(".json")] |
123 | # We process from 2015 data, old request are not properly formated | ||
124 | year = cve.split("-")[1] | ||
125 | if int(year) < 2015: | ||
126 | continue | ||
127 | with open(cve_file, 'r', encoding='utf-8') as json_file: | ||
128 | cve_info = json.load(json_file) | ||
68 | 129 | ||
130 | if not is_linux_cve(cve_info): | ||
131 | continue | ||
132 | first_affected, fixed, backport_ver = get_fixed_versions(cve_info, base_version) | ||
69 | if not fixed: | 133 | if not fixed: |
70 | print(f"# {cve} has no known resolution") | 134 | print(f"# {cve} has no known resolution") |
71 | elif first_affected and version < first_affected: | 135 | elif first_affected and version < first_affected: |
@@ -75,19 +139,13 @@ do_cve_check[prefuncs] += "check_kernel_cve_status_version" | |||
75 | f'CVE_STATUS[{cve}] = "fixed-version: Fixed from version {fixed}"' | 139 | f'CVE_STATUS[{cve}] = "fixed-version: Fixed from version {fixed}"' |
76 | ) | 140 | ) |
77 | else: | 141 | else: |
78 | if cve in stream_data: | 142 | if backport_ver: |
79 | backport_data = stream_data[cve] | 143 | if backport_ver <= version: |
80 | if base_version in backport_data: | 144 | print( |
81 | backport_ver = Version(backport_data[base_version]["fixed_version"]) | 145 | f'CVE_STATUS[{cve}] = "cpe-stable-backport: Backported in {backport_ver}"' |
82 | if backport_ver <= version: | 146 | ) |
83 | print( | ||
84 | f'CVE_STATUS[{cve}] = "cpe-stable-backport: Backported in {backport_ver}"' | ||
85 | ) | ||
86 | else: | ||
87 | # TODO print a note that the kernel needs bumping | ||
88 | print(f"# {cve} needs backporting (fixed from {backport_ver})") | ||
89 | else: | 147 | else: |
90 | print(f"# {cve} needs backporting (fixed from {fixed})") | 148 | print(f"# {cve} may need backporting (fixed from {backport_ver})") |
91 | else: | 149 | else: |
92 | print(f"# {cve} needs backporting (fixed from {fixed})") | 150 | print(f"# {cve} needs backporting (fixed from {fixed})") |
93 | 151 | ||
diff --git a/meta/recipes-kernel/linux/kernel-devsrc.bb b/meta/recipes-kernel/linux/kernel-devsrc.bb index fafab475f3..3d2eb3929e 100644 --- a/meta/recipes-kernel/linux/kernel-devsrc.bb +++ b/meta/recipes-kernel/linux/kernel-devsrc.bb | |||
@@ -7,7 +7,7 @@ SECTION = "kernel" | |||
7 | 7 | ||
8 | LICENSE = "GPL-2.0-only" | 8 | LICENSE = "GPL-2.0-only" |
9 | 9 | ||
10 | inherit linux-kernel-base | 10 | inherit kernelsrc |
11 | 11 | ||
12 | # Whilst not a module, this ensures we don't get multilib extended (which would make no sense) | 12 | # Whilst not a module, this ensures we don't get multilib extended (which would make no sense) |
13 | inherit module-base | 13 | inherit module-base |
@@ -20,19 +20,15 @@ do_install[depends] += "virtual/kernel:do_shared_workdir" | |||
20 | do_install[depends] += "virtual/kernel:do_install" | 20 | do_install[depends] += "virtual/kernel:do_install" |
21 | 21 | ||
22 | # There's nothing to do here, except install the source where we can package it | 22 | # There's nothing to do here, except install the source where we can package it |
23 | do_fetch[noexec] = "1" | ||
24 | do_unpack[noexec] = "1" | ||
25 | do_patch[noexec] = "1" | ||
26 | do_configure[noexec] = "1" | 23 | do_configure[noexec] = "1" |
27 | do_compile[noexec] = "1" | 24 | do_compile[noexec] = "1" |
28 | deltask do_populate_sysroot | 25 | deltask do_populate_sysroot |
29 | 26 | ||
30 | S = "${STAGING_KERNEL_DIR}" | ||
31 | B = "${STAGING_KERNEL_BUILDDIR}" | 27 | B = "${STAGING_KERNEL_BUILDDIR}" |
32 | 28 | ||
33 | PACKAGE_ARCH = "${MACHINE_ARCH}" | 29 | PACKAGE_ARCH = "${MACHINE_ARCH}" |
34 | 30 | ||
35 | KERNEL_BUILD_ROOT="${nonarch_base_libdir}/modules/" | 31 | KERNEL_BUILD_ROOT = "${nonarch_base_libdir}/modules/" |
36 | 32 | ||
37 | do_install() { | 33 | do_install() { |
38 | kerneldir=${D}${KERNEL_BUILD_ROOT}${KERNEL_VERSION} | 34 | kerneldir=${D}${KERNEL_BUILD_ROOT}${KERNEL_VERSION} |
@@ -75,7 +71,8 @@ do_install() { | |||
75 | if [ -s Module.symvers ]; then | 71 | if [ -s Module.symvers ]; then |
76 | cp Module.symvers $kerneldir/build | 72 | cp Module.symvers $kerneldir/build |
77 | fi | 73 | fi |
78 | cp System.map* $kerneldir/build | 74 | cp System.map-* $kerneldir/build |
75 | ln -s System.map-* $kerneldir/build/System.map | ||
79 | if [ -s Module.markers ]; then | 76 | if [ -s Module.markers ]; then |
80 | cp Module.markers $kerneldir/build | 77 | cp Module.markers $kerneldir/build |
81 | fi | 78 | fi |
@@ -134,6 +131,7 @@ do_install() { | |||
134 | rm -f $kerneldir/build/include/generated/.vdso-offsets.h.cmd | 131 | rm -f $kerneldir/build/include/generated/.vdso-offsets.h.cmd |
135 | rm -f $kerneldir/build/include/generated/.compat_vdso-offsets.h.cmd | 132 | rm -f $kerneldir/build/include/generated/.compat_vdso-offsets.h.cmd |
136 | rm -f $kerneldir/build/include/generated/.vdso32-offsets.h.cmd | 133 | rm -f $kerneldir/build/include/generated/.vdso32-offsets.h.cmd |
134 | rm -f $kerneldir/build/include/generated/.vdso64-offsets.h.cmd | ||
137 | ) | 135 | ) |
138 | 136 | ||
139 | # now grab the chunks from the source tree that we need | 137 | # now grab the chunks from the source tree that we need |
@@ -155,7 +153,7 @@ do_install() { | |||
155 | # these are a few files associated with objtool, since we'll need to | 153 | # these are a few files associated with objtool, since we'll need to |
156 | # rebuild it | 154 | # rebuild it |
157 | cp -a --parents tools/build/Build.include $kerneldir/build/ | 155 | cp -a --parents tools/build/Build.include $kerneldir/build/ |
158 | cp -a --parents tools/build/Build $kerneldir/build/ | 156 | cp -a --parents tools/build/Build $kerneldir/build/ 2>/dev/null || : |
159 | cp -a --parents tools/build/fixdep.c $kerneldir/build/ | 157 | cp -a --parents tools/build/fixdep.c $kerneldir/build/ |
160 | cp -a --parents tools/scripts/utilities.mak $kerneldir/build/ | 158 | cp -a --parents tools/scripts/utilities.mak $kerneldir/build/ |
161 | 159 | ||
@@ -183,6 +181,10 @@ do_install() { | |||
183 | cp -a --parents arch/arm64/kernel/vdso/note.S $kerneldir/build/ | 181 | cp -a --parents arch/arm64/kernel/vdso/note.S $kerneldir/build/ |
184 | cp -a --parents arch/arm64/kernel/vdso/gen_vdso_offsets.sh $kerneldir/build/ | 182 | cp -a --parents arch/arm64/kernel/vdso/gen_vdso_offsets.sh $kerneldir/build/ |
185 | 183 | ||
184 | # 6.12+ | ||
185 | cp -a --parents arch/arm64/kernel/vdso/vgetrandom.c $kerneldir/build/ 2>/dev/null || : | ||
186 | cp -a --parents arch/arm64/kernel/vdso/vgetrandom-chacha.S $kerneldir/build/ 2>/dev/null || : | ||
187 | |||
186 | cp -a --parents arch/arm64/kernel/module.lds $kerneldir/build/ 2>/dev/null || : | 188 | cp -a --parents arch/arm64/kernel/module.lds $kerneldir/build/ 2>/dev/null || : |
187 | 189 | ||
188 | # 5.13+ needs these tools | 190 | # 5.13+ needs these tools |
@@ -193,6 +195,10 @@ do_install() { | |||
193 | cp -a --parents arch/arm64/tools/gen-sysreg.awk $kerneldir/build/ 2>/dev/null || : | 195 | cp -a --parents arch/arm64/tools/gen-sysreg.awk $kerneldir/build/ 2>/dev/null || : |
194 | cp -a --parents arch/arm64/tools/sysreg $kerneldir/build/ 2>/dev/null || : | 196 | cp -a --parents arch/arm64/tools/sysreg $kerneldir/build/ 2>/dev/null || : |
195 | 197 | ||
198 | # 6.12+ | ||
199 | cp -a --parents arch/arm64/tools/syscall_64.tbl $kerneldir/build/ 2>/dev/null || : | ||
200 | cp -a --parents arch/arm64/tools/syscall_32.tbl $kerneldir/build/ 2>/dev/null || : | ||
201 | |||
196 | if [ -e $kerneldir/build/arch/arm64/tools/gen-cpucaps.awk ]; then | 202 | if [ -e $kerneldir/build/arch/arm64/tools/gen-cpucaps.awk ]; then |
197 | sed -i -e "s,#!.*awk.*,#!${USRBINPATH}/env awk," $kerneldir/build/arch/arm64/tools/gen-cpucaps.awk | 203 | sed -i -e "s,#!.*awk.*,#!${USRBINPATH}/env awk," $kerneldir/build/arch/arm64/tools/gen-cpucaps.awk |
198 | fi | 204 | fi |
@@ -217,6 +223,11 @@ do_install() { | |||
217 | # v6,1+ | 223 | # v6,1+ |
218 | cp -a --parents arch/powerpc/kernel/asm-offsets.c $kerneldir/build/ 2>/dev/null || : | 224 | cp -a --parents arch/powerpc/kernel/asm-offsets.c $kerneldir/build/ 2>/dev/null || : |
219 | cp -a --parents arch/powerpc/kernel/head_booke.h $kerneldir/build/ 2>/dev/null || : | 225 | cp -a --parents arch/powerpc/kernel/head_booke.h $kerneldir/build/ 2>/dev/null || : |
226 | |||
227 | # 6.12+ | ||
228 | cp -a --parents arch/powerpc/kernel/vdso/vgetrandom.c $kerneldir/build/ 2>/dev/null || : | ||
229 | cp -a --parents arch/powerpc/kernel/vdso/vgetrandom-chacha.S $kerneldir/build/ 2>/dev/null || : | ||
230 | cp -a --parents arch/powerpc/lib/crtsavres.S $kerneldir/build/ 2>/dev/null || : | ||
220 | fi | 231 | fi |
221 | if [ "${ARCH}" = "riscv" ]; then | 232 | if [ "${ARCH}" = "riscv" ]; then |
222 | cp -a --parents arch/riscv/kernel/vdso/*gettimeofday.* $kerneldir/build/ | 233 | cp -a --parents arch/riscv/kernel/vdso/*gettimeofday.* $kerneldir/build/ |
diff --git a/meta/recipes-kernel/linux/linux-dummy.bb b/meta/recipes-kernel/linux/linux-dummy.bb index 2396f46202..d7f39a452d 100644 --- a/meta/recipes-kernel/linux/linux-dummy.bb +++ b/meta/recipes-kernel/linux/linux-dummy.bb | |||
@@ -23,14 +23,13 @@ FILES:kernel-vmlinux = "" | |||
23 | ALLOW_EMPTY:kernel-vmlinux = "1" | 23 | ALLOW_EMPTY:kernel-vmlinux = "1" |
24 | DESCRIPTION:kernel-vmlinux = "Kernel vmlinux meta package" | 24 | DESCRIPTION:kernel-vmlinux = "Kernel vmlinux meta package" |
25 | 25 | ||
26 | |||
27 | INHIBIT_DEFAULT_DEPS = "1" | 26 | INHIBIT_DEFAULT_DEPS = "1" |
28 | 27 | ||
29 | COMPATIBLE_HOST = ".*-linux" | 28 | COMPATIBLE_HOST = ".*-linux" |
30 | 29 | ||
31 | |||
32 | SRC_URI = "file://COPYING.GPL" | 30 | SRC_URI = "file://COPYING.GPL" |
33 | S = "${WORKDIR}" | 31 | |
32 | S = "${UNPACKDIR}" | ||
34 | 33 | ||
35 | do_configure() { | 34 | do_configure() { |
36 | : | 35 | : |
diff --git a/meta/recipes-kernel/linux/linux-yocto-dev.bb b/meta/recipes-kernel/linux/linux-yocto-dev.bb index bd3e5a9406..4b1f93a692 100644 --- a/meta/recipes-kernel/linux/linux-yocto-dev.bb +++ b/meta/recipes-kernel/linux/linux-yocto-dev.bb | |||
@@ -14,7 +14,7 @@ require recipes-kernel/linux/linux-yocto.inc | |||
14 | # provide this .inc to set specific revisions | 14 | # provide this .inc to set specific revisions |
15 | include recipes-kernel/linux/linux-yocto-dev-revisions.inc | 15 | include recipes-kernel/linux/linux-yocto-dev-revisions.inc |
16 | 16 | ||
17 | KBRANCH = "v6.8/standard/base" | 17 | KBRANCH = "v6.15/standard/base" |
18 | KMETA = "kernel-meta" | 18 | KMETA = "kernel-meta" |
19 | 19 | ||
20 | SRC_URI = "git://git.yoctoproject.org/linux-yocto-dev.git;branch=${KBRANCH};name=machine;protocol=https \ | 20 | SRC_URI = "git://git.yoctoproject.org/linux-yocto-dev.git;branch=${KBRANCH};name=machine;protocol=https \ |
@@ -28,17 +28,12 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto-dev.git;branch=${KBRANCH};name | |||
28 | SRCREV_machine ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}' | 28 | SRCREV_machine ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}' |
29 | SRCREV_meta ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}' | 29 | SRCREV_meta ?= '${@oe.utils.conditional("PREFERRED_PROVIDER_virtual/kernel", "linux-yocto-dev", "${AUTOREV}", "29594404d7fe73cd80eaa4ee8c43dcc53970c60e", d)}' |
30 | 30 | ||
31 | LINUX_VERSION ?= "6.8" | 31 | LINUX_VERSION ?= "6.15" |
32 | LINUX_VERSION_EXTENSION ?= "-yoctodev-${LINUX_KERNEL_TYPE}" | 32 | LINUX_VERSION_EXTENSION ?= "-yoctodev-${LINUX_KERNEL_TYPE}" |
33 | PV = "${LINUX_VERSION}+git" | 33 | PV = "${LINUX_VERSION}+git" |
34 | 34 | ||
35 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | 35 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" |
36 | 36 | ||
37 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | ||
38 | DEPENDS += "${@bb.utils.contains('ARCH', 'powerpc', 'elfutils-native', '', d)}" | ||
39 | DEPENDS += "openssl-native util-linux-native" | ||
40 | DEPENDS += "gmp-native libmpc-native" | ||
41 | |||
42 | # yaml and dtschema are required for 5.16+ device tree validation, libyaml is checked | 37 | # yaml and dtschema are required for 5.16+ device tree validation, libyaml is checked |
43 | # via pkgconfig, so must always be present, but we can wrap the others to make them | 38 | # via pkgconfig, so must always be present, but we can wrap the others to make them |
44 | # conditional | 39 | # conditional |
@@ -56,9 +51,9 @@ KERNEL_DEVICETREE:qemuarmv5 = "arm/versatile-pb.dtb" | |||
56 | # Functionality flags | 51 | # Functionality flags |
57 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc" | 52 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc" |
58 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" | 53 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" |
59 | KERNEL_FEATURES:append:qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc" | 54 | KERNEL_FEATURES:append:qemuall = " cfg/virtio.scc features/drm-bochs/drm-bochs.scc" |
60 | KERNEL_FEATURES:append:qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc" | 55 | KERNEL_FEATURES:append:qemux86 = " cfg/sound.scc cfg/paravirt_kvm.scc" |
61 | KERNEL_FEATURES:append:qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc" | 56 | KERNEL_FEATURES:append:qemux86-64 = " cfg/sound.scc cfg/paravirt_kvm.scc" |
62 | KERNEL_FEATURES:append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}" | 57 | KERNEL_FEATURES:append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}" |
63 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" | 58 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" |
64 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc features/gpio/sim.scc", "", d)}" | 59 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc features/gpio/sim.scc", "", d)}" |
diff --git a/meta/recipes-kernel/linux/linux-yocto-fitimage.bb b/meta/recipes-kernel/linux/linux-yocto-fitimage.bb new file mode 100644 index 0000000000..6ce1960a87 --- /dev/null +++ b/meta/recipes-kernel/linux/linux-yocto-fitimage.bb | |||
@@ -0,0 +1,13 @@ | |||
1 | SUMMARY = "The Linux kernel as a FIT image (optionally with initramfs)" | ||
2 | SECTION = "kernel" | ||
3 | |||
4 | # If an initramfs is included in the FIT image more licenses apply. | ||
5 | # But also the kernel uses more than one license (see Documentation/process/license-rules.rst) | ||
6 | LICENSE = "GPL-2.0-with-Linux-syscall-note" | ||
7 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/files/common-licenses/GPL-2.0-with-Linux-syscall-note;md5=0bad96c422c41c3a94009dcfe1bff992" | ||
8 | |||
9 | inherit linux-kernel-base kernel-fit-image | ||
10 | |||
11 | # Set the version of this recipe to the version of the included kernel | ||
12 | # (without taking the long way around via PV) | ||
13 | PKGV = "${@get_kernelversion_file("${STAGING_KERNEL_BUILDDIR}")}" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index eb5e1da33c..5a7bad9017 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb | |||
@@ -1,9 +1,9 @@ | |||
1 | KBRANCH ?= "v6.6/standard/preempt-rt/base" | 1 | KBRANCH ?= "v6.12/standard/preempt-rt/base" |
2 | 2 | ||
3 | require recipes-kernel/linux/linux-yocto.inc | 3 | require recipes-kernel/linux/linux-yocto.inc |
4 | 4 | ||
5 | # CVE exclusions | 5 | # CVE exclusions |
6 | include recipes-kernel/linux/cve-exclusion_6.6.inc | 6 | include recipes-kernel/linux/cve-exclusion_6.12.inc |
7 | 7 | ||
8 | # Skip processing of this recipe if it is not explicitly specified as the | 8 | # Skip processing of this recipe if it is not explicitly specified as the |
9 | # PREFERRED_PROVIDER for virtual/kernel. This avoids errors when trying | 9 | # PREFERRED_PROVIDER for virtual/kernel. This avoids errors when trying |
@@ -14,13 +14,13 @@ python () { | |||
14 | raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") | 14 | raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") |
15 | } | 15 | } |
16 | 16 | ||
17 | SRCREV_machine ?= "1c3234ba160c59eb50739f23591a87daf09fac35" | 17 | SRCREV_machine ?= "7cb6d42c40de351ecab0a083aef260f84407de0d" |
18 | SRCREV_meta ?= "a1711f65dcd5f88160d30447dcab3b88a1562690" | 18 | SRCREV_meta ?= "60b8562e9989f268ad5d241989f56b71cfa1f648" |
19 | 19 | ||
20 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ | 20 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ |
21 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" | 21 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" |
22 | 22 | ||
23 | LINUX_VERSION ?= "6.6.22" | 23 | LINUX_VERSION ?= "6.12.31" |
24 | 24 | ||
25 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | 25 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" |
26 | 26 | ||
@@ -41,8 +41,8 @@ KERNEL_DEVICETREE:qemuarmv5 = "arm/versatile-pb.dtb" | |||
41 | # Functionality flags | 41 | # Functionality flags |
42 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc" | 42 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc features/taskstats/taskstats.scc" |
43 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" | 43 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" |
44 | KERNEL_FEATURES:append:qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc" | 44 | KERNEL_FEATURES:append:qemuall = " cfg/virtio.scc features/drm-bochs/drm-bochs.scc" |
45 | KERNEL_FEATURES:append:qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc" | 45 | KERNEL_FEATURES:append:qemux86 = " cfg/sound.scc cfg/paravirt_kvm.scc" |
46 | KERNEL_FEATURES:append:qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc" | 46 | KERNEL_FEATURES:append:qemux86-64 = " cfg/sound.scc cfg/paravirt_kvm.scc" |
47 | KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" | 47 | KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" |
48 | KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc features/gpio/sim.scc", "", d)}" | 48 | KERNEL_FEATURES:append = "${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc features/gpio/sim.scc", "", d)}" |
diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 7d6197db5e..0fad73dddd 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.6.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb | |||
@@ -1,4 +1,4 @@ | |||
1 | KBRANCH ?= "v6.6/standard/tiny/base" | 1 | KBRANCH ?= "v6.12/standard/tiny/base" |
2 | 2 | ||
3 | LINUX_KERNEL_TYPE = "tiny" | 3 | LINUX_KERNEL_TYPE = "tiny" |
4 | KCONFIG_MODE = "--allnoconfig" | 4 | KCONFIG_MODE = "--allnoconfig" |
@@ -6,9 +6,9 @@ KCONFIG_MODE = "--allnoconfig" | |||
6 | require recipes-kernel/linux/linux-yocto.inc | 6 | require recipes-kernel/linux/linux-yocto.inc |
7 | 7 | ||
8 | # CVE exclusions | 8 | # CVE exclusions |
9 | include recipes-kernel/linux/cve-exclusion_6.6.inc | 9 | include recipes-kernel/linux/cve-exclusion_6.12.inc |
10 | 10 | ||
11 | LINUX_VERSION ?= "6.6.22" | 11 | LINUX_VERSION ?= "6.12.31" |
12 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | 12 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" |
13 | 13 | ||
14 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" | 14 | DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" |
@@ -17,17 +17,17 @@ DEPENDS += "openssl-native util-linux-native" | |||
17 | KMETA = "kernel-meta" | 17 | KMETA = "kernel-meta" |
18 | KCONF_BSP_AUDIT_LEVEL = "2" | 18 | KCONF_BSP_AUDIT_LEVEL = "2" |
19 | 19 | ||
20 | SRCREV_machine ?= "ca83799fcbc094fdd52caec7c4dca64189acd842" | 20 | SRCREV_machine ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" |
21 | SRCREV_meta ?= "a1711f65dcd5f88160d30447dcab3b88a1562690" | 21 | SRCREV_meta ?= "60b8562e9989f268ad5d241989f56b71cfa1f648" |
22 | 22 | ||
23 | PV = "${LINUX_VERSION}+git" | 23 | PV = "${LINUX_VERSION}+git" |
24 | 24 | ||
25 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ | 25 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ |
26 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" | 26 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" |
27 | 27 | ||
28 | COMPATIBLE_MACHINE = "^(qemux86|qemux86-64|qemuarm64|qemuarm|qemuarmv5)$" | 28 | COMPATIBLE_MACHINE = "^(qemux86|qemux86-64|qemuarm64|qemuarm|qemuarmv5)$" |
29 | 29 | ||
30 | # Functionality flags | 30 | # Functionality flags |
31 | KERNEL_FEATURES = "" | 31 | KERNEL_FEATURES:append:qemuall = " cfg/virtio.scc cfg/fs/ext4.scc" |
32 | 32 | ||
33 | KERNEL_DEVICETREE:qemuarmv5 = "arm/versatile-pb.dtb" | 33 | KERNEL_DEVICETREE:qemuarmv5 = "arm/versatile-pb.dtb" |
diff --git a/meta/recipes-kernel/linux/linux-yocto.inc b/meta/recipes-kernel/linux/linux-yocto.inc index 0132fcffb3..389329030d 100644 --- a/meta/recipes-kernel/linux/linux-yocto.inc +++ b/meta/recipes-kernel/linux/linux-yocto.inc | |||
@@ -1,6 +1,6 @@ | |||
1 | SUMMARY = "Linux kernel" | 1 | SUMMARY = "Linux kernel" |
2 | SECTION = "kernel" | 2 | SECTION = "kernel" |
3 | LICENSE = "GPL-2.0-only" | 3 | LICENSE = "GPL-2.0-with-Linux-syscall-note" |
4 | HOMEPAGE = "https://www.yoctoproject.org/" | 4 | HOMEPAGE = "https://www.yoctoproject.org/" |
5 | 5 | ||
6 | LIC_FILES_CHKSUM ?= "file://COPYING;md5=d7810fab7487fb0aad327b76f1be7cd7" | 6 | LIC_FILES_CHKSUM ?= "file://COPYING;md5=d7810fab7487fb0aad327b76f1be7cd7" |
@@ -31,7 +31,7 @@ DEPENDS:append:arc = " libgcc" | |||
31 | KERNEL_CC:append:arc = " ${TOOLCHAIN_OPTIONS}" | 31 | KERNEL_CC:append:arc = " ${TOOLCHAIN_OPTIONS}" |
32 | KERNEL_LD:append:arc = " ${TOOLCHAIN_OPTIONS}" | 32 | KERNEL_LD:append:arc = " ${TOOLCHAIN_OPTIONS}" |
33 | 33 | ||
34 | KERNEL_FEATURES:append:qemuall=" features/debug/printk.scc features/taskstats/taskstats.scc" | 34 | KERNEL_FEATURES:append:qemuall = " features/debug/printk.scc features/taskstats/taskstats.scc" |
35 | 35 | ||
36 | KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'efi', 'cfg/efi.scc', '', d)}" | 36 | KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'efi', 'cfg/efi.scc', '', d)}" |
37 | KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'numa', 'features/numa/numa.scc', '', d)}" | 37 | KERNEL_FEATURES:append = " ${@bb.utils.contains('MACHINE_FEATURES', 'numa', 'features/numa/numa.scc', '', d)}" |
@@ -57,7 +57,7 @@ do_install:append(){ | |||
57 | } | 57 | } |
58 | 58 | ||
59 | # enable kernel-sample for oeqa/runtime/cases's ksample.py test | 59 | # enable kernel-sample for oeqa/runtime/cases's ksample.py test |
60 | KERNEL_FEATURES:append:qemuall=" features/kernel-sample/kernel-sample.scc" | 60 | KERNEL_FEATURES:append:qemuall = " features/kernel-sample/kernel-sample.scc" |
61 | 61 | ||
62 | KERNEL_DEBUG ?= "" | 62 | KERNEL_DEBUG ?= "" |
63 | # These used to be version specific, but are now common dependencies. New | 63 | # These used to be version specific, but are now common dependencies. New |
diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb new file mode 100644 index 0000000000..262ae35704 --- /dev/null +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb | |||
@@ -0,0 +1,79 @@ | |||
1 | KBRANCH ?= "v6.12/standard/base" | ||
2 | |||
3 | require recipes-kernel/linux/linux-yocto.inc | ||
4 | |||
5 | # CVE exclusions | ||
6 | include recipes-kernel/linux/cve-exclusion.inc | ||
7 | include recipes-kernel/linux/cve-exclusion_6.12.inc | ||
8 | |||
9 | # board specific branches | ||
10 | KBRANCH:qemuarm ?= "v6.12/standard/arm-versatile-926ejs" | ||
11 | KBRANCH:qemuarm64 ?= "v6.12/standard/base" | ||
12 | KBRANCH:qemumips ?= "v6.12/standard/mti-malta32" | ||
13 | KBRANCH:qemuppc ?= "v6.12/standard/qemuppc" | ||
14 | KBRANCH:qemuriscv64 ?= "v6.12/standard/base" | ||
15 | KBRANCH:qemuriscv32 ?= "v6.12/standard/base" | ||
16 | KBRANCH:qemux86 ?= "v6.12/standard/base" | ||
17 | KBRANCH:qemux86.104 ?= "v6.12/standard/base" | ||
18 | KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" | ||
19 | KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" | ||
20 | |||
21 | SRCREV_machine:qemuarm ?= "37a1fd13ca538e7785daf01434495a614bc55ead" | ||
22 | SRCREV_machine:qemuarm64 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
23 | SRCREV_machine:qemuloongarch64 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
24 | SRCREV_machine:qemumips ?= "2bcf58ea5aa19d54c436e63c59ab09b307e9ee8e" | ||
25 | SRCREV_machine:qemuppc ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
26 | SRCREV_machine:qemuriscv64 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
27 | SRCREV_machine:qemuriscv32 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
28 | SRCREV_machine:qemux86 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
29 | SRCREV_machine:qemux86-64 ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
30 | SRCREV_machine:qemumips64 ?= "6470f58a8f04951f202cf85afb4421d2e7ec9995" | ||
31 | SRCREV_machine ?= "298aefdf4112e7c0a84522e4acf2c722e433c8a0" | ||
32 | SRCREV_meta ?= "60b8562e9989f268ad5d241989f56b71cfa1f648" | ||
33 | |||
34 | # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll | ||
35 | # get the <version>/base branch, which is pure upstream -stable, and the same | ||
36 | # meta SRCREV as the linux-yocto-standard builds. Select your version using the | ||
37 | # normal PREFERRED_VERSION settings. | ||
38 | BBCLASSEXTEND = "devupstream:target" | ||
39 | SRCREV_machine:class-devupstream ?= "df3f6d10f353de274cc7c87f52dba5d26f185393" | ||
40 | PN:class-devupstream = "linux-yocto-upstream" | ||
41 | KBRANCH:class-devupstream = "v6.12/base" | ||
42 | |||
43 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH};protocol=https \ | ||
44 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" | ||
45 | |||
46 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
47 | LINUX_VERSION ?= "6.12.31" | ||
48 | |||
49 | PV = "${LINUX_VERSION}+git" | ||
50 | |||
51 | KMETA = "kernel-meta" | ||
52 | KCONF_BSP_AUDIT_LEVEL = "1" | ||
53 | |||
54 | KERNEL_DEVICETREE:qemuarmv5 = "arm/versatile-pb.dtb" | ||
55 | |||
56 | COMPATIBLE_MACHINE = "^(qemuarm|qemuarmv5|qemuarm64|qemux86|qemuppc|qemuppc64|qemumips|qemumips64|qemux86-64|qemuriscv64|qemuriscv32|qemuloongarch64)$" | ||
57 | |||
58 | # Functionality flags | ||
59 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc" | ||
60 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" | ||
61 | KERNEL_FEATURES:append:qemuall = " cfg/virtio.scc features/drm-bochs/drm-bochs.scc cfg/net/mdio.scc" | ||
62 | KERNEL_FEATURES:append:qemux86 = " cfg/sound.scc cfg/paravirt_kvm.scc" | ||
63 | KERNEL_FEATURES:append:qemux86-64 = " cfg/sound.scc cfg/paravirt_kvm.scc" | ||
64 | KERNEL_FEATURES:append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}" | ||
65 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc features/nf_tables/nft_test.scc", "", d)}" | ||
66 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc features/gpio/sim.scc", "", d)}" | ||
67 | KERNEL_FEATURES:append = " ${@bb.utils.contains("KERNEL_DEBUG", "True", " features/reproducibility/reproducibility.scc features/debug/debug-btf.scc", "", d)}" | ||
68 | # libteam ptests from meta-oe needs it | ||
69 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/net/team/team.scc", "", d)}" | ||
70 | # openl2tp tests from meta-networking needs it | ||
71 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " cgl/cfg/net/l2tp.scc", "", d)}" | ||
72 | KERNEL_FEATURES:append:powerpc = " arch/powerpc/powerpc-debug.scc" | ||
73 | KERNEL_FEATURES:append:powerpc64 = " arch/powerpc/powerpc-debug.scc" | ||
74 | KERNEL_FEATURES:append:powerpc64le = " arch/powerpc/powerpc-debug.scc" | ||
75 | # Do not add debug info for riscv32, it fails during depmod | ||
76 | # ERROR: modpost: __ex_table+0x17a4 references non-executable section '.debug_loclists' | ||
77 | # Check again during next major version upgrade | ||
78 | KERNEL_FEATURES:remove:riscv32 = "features/debug/debug-kernel.scc" | ||
79 | INSANE_SKIP:kernel-vmlinux:qemuppc64 = "textrel" | ||
diff --git a/meta/recipes-kernel/linux/linux-yocto_6.6.bb b/meta/recipes-kernel/linux/linux-yocto_6.6.bb deleted file mode 100644 index 01cb6a860c..0000000000 --- a/meta/recipes-kernel/linux/linux-yocto_6.6.bb +++ /dev/null | |||
@@ -1,72 +0,0 @@ | |||
1 | KBRANCH ?= "v6.6/standard/base" | ||
2 | |||
3 | require recipes-kernel/linux/linux-yocto.inc | ||
4 | |||
5 | # CVE exclusions | ||
6 | include recipes-kernel/linux/cve-exclusion.inc | ||
7 | include recipes-kernel/linux/cve-exclusion_6.6.inc | ||
8 | |||
9 | # board specific branches | ||
10 | KBRANCH:qemuarm ?= "v6.6/standard/arm-versatile-926ejs" | ||
11 | KBRANCH:qemuarm64 ?= "v6.6/standard/qemuarm64" | ||
12 | KBRANCH:qemumips ?= "v6.6/standard/mti-malta32" | ||
13 | KBRANCH:qemuppc ?= "v6.6/standard/qemuppc" | ||
14 | KBRANCH:qemuriscv64 ?= "v6.6/standard/base" | ||
15 | KBRANCH:qemuriscv32 ?= "v6.6/standard/base" | ||
16 | KBRANCH:qemux86 ?= "v6.6/standard/base" | ||
17 | KBRANCH:qemux86-64 ?= "v6.6/standard/base" | ||
18 | KBRANCH:qemuloongarch64 ?= "v6.6/standard/base" | ||
19 | KBRANCH:qemumips64 ?= "v6.6/standard/mti-malta64" | ||
20 | |||
21 | SRCREV_machine:qemuarm ?= "0873b6f725956acf2e6d57d720edd8a2177e18ce" | ||
22 | SRCREV_machine:qemuarm64 ?= "ca83799fcbc094fdd52caec7c4dca64189acd842" | ||
23 | SRCREV_machine:qemuloongarch64 ?= "ca83799fcbc094fdd52caec7c4dca64189acd842" | ||
24 | SRCREV_machine:qemumips ?= "6a81581711b1cb35046c637ecfbb6b17a8abbcb5" | ||
25 | SRCREV_machine:qemuppc ?= "ca83799fcbc094fdd52caec7c4dca64189acd842" | ||
26 | SRCREV_machine:qemuriscv64 ?= "ca83799fcbc094fdd52caec7c4dca64189acd842" | ||
27 | SRCREV_machine:qemuriscv32 ?= "ca83799fcbc094fdd52caec7c4dca64189acd842" | ||
28 | SRCREV_machine:qemux86 ?= "ca83799fcbc094fdd52caec7c4dca64189acd842" | ||
29 | SRCREV_machine:qemux86-64 ?= "ca83799fcbc094fdd52caec7c4dca64189acd842" | ||
30 | SRCREV_machine:qemumips64 ?= "6cb075269e42d03857c95ebc8b5f8e154f155add" | ||
31 | SRCREV_machine ?= "ca83799fcbc094fdd52caec7c4dca64189acd842" | ||
32 | SRCREV_meta ?= "a1711f65dcd5f88160d30447dcab3b88a1562690" | ||
33 | |||
34 | # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll | ||
35 | # get the <version>/base branch, which is pure upstream -stable, and the same | ||
36 | # meta SRCREV as the linux-yocto-standard builds. Select your version using the | ||
37 | # normal PREFERRED_VERSION settings. | ||
38 | BBCLASSEXTEND = "devupstream:target" | ||
39 | SRCREV_machine:class-devupstream ?= "6a646d9fe8a2bf8d25817ceddf96dfc5eb5446db" | ||
40 | PN:class-devupstream = "linux-yocto-upstream" | ||
41 | KBRANCH:class-devupstream = "v6.6/base" | ||
42 | |||
43 | SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRANCH};protocol=https \ | ||
44 | git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.6;destsuffix=${KMETA};protocol=https" | ||
45 | |||
46 | LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" | ||
47 | LINUX_VERSION ?= "6.6.22" | ||
48 | |||
49 | PV = "${LINUX_VERSION}+git" | ||
50 | |||
51 | KMETA = "kernel-meta" | ||
52 | KCONF_BSP_AUDIT_LEVEL = "1" | ||
53 | |||
54 | KERNEL_DEVICETREE:qemuarmv5 = "arm/versatile-pb.dtb" | ||
55 | |||
56 | COMPATIBLE_MACHINE = "^(qemuarm|qemuarmv5|qemuarm64|qemux86|qemuppc|qemuppc64|qemumips|qemumips64|qemux86-64|qemuriscv64|qemuriscv32|qemuloongarch64)$" | ||
57 | |||
58 | # Functionality flags | ||
59 | KERNEL_EXTRA_FEATURES ?= "features/netfilter/netfilter.scc" | ||
60 | KERNEL_FEATURES:append = " ${KERNEL_EXTRA_FEATURES}" | ||
61 | KERNEL_FEATURES:append:qemuall=" cfg/virtio.scc features/drm-bochs/drm-bochs.scc cfg/net/mdio.scc" | ||
62 | KERNEL_FEATURES:append:qemux86=" cfg/sound.scc cfg/paravirt_kvm.scc" | ||
63 | KERNEL_FEATURES:append:qemux86-64=" cfg/sound.scc cfg/paravirt_kvm.scc" | ||
64 | KERNEL_FEATURES:append = " ${@bb.utils.contains("TUNE_FEATURES", "mx32", " cfg/x32.scc", "", d)}" | ||
65 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/scsi/scsi-debug.scc", "", d)}" | ||
66 | KERNEL_FEATURES:append = " ${@bb.utils.contains("DISTRO_FEATURES", "ptest", " features/gpio/mockup.scc features/gpio/sim.scc", "", d)}" | ||
67 | KERNEL_FEATURES:append:powerpc =" arch/powerpc/powerpc-debug.scc" | ||
68 | KERNEL_FEATURES:append:powerpc64 =" arch/powerpc/powerpc-debug.scc" | ||
69 | KERNEL_FEATURES:append:powerpc64le =" arch/powerpc/powerpc-debug.scc" | ||
70 | |||
71 | INSANE_SKIP:kernel-vmlinux:qemuppc64 = "textrel" | ||
72 | |||
diff --git a/meta/recipes-kernel/lttng/babeltrace2/0001-Make-bt_field_blob_get_length-return-size_t-instead-.patch b/meta/recipes-kernel/lttng/babeltrace2/0001-Make-bt_field_blob_get_length-return-size_t-instead-.patch new file mode 100644 index 0000000000..4dffa7bfa5 --- /dev/null +++ b/meta/recipes-kernel/lttng/babeltrace2/0001-Make-bt_field_blob_get_length-return-size_t-instead-.patch | |||
@@ -0,0 +1,38 @@ | |||
1 | From a73cef80a0d4129f74ab2e160a15693235aad4d1 Mon Sep 17 00:00:00 2001 | ||
2 | From: Khem Raj <raj.khem@gmail.com> | ||
3 | Date: Thu, 20 Mar 2025 18:10:08 -0700 | ||
4 | Subject: [PATCH] Cast result of bt_field_blob_get_length to size_t in | ||
5 | constructor of bt2s::span | ||
6 | |||
7 | Fixes errors e.g. | ||
8 | | ../../git/src/cpp-common/bt2/field.hpp:1139:82: error: non-constant-expression cannot be narrowed from type 'std::uint64_t' (aka 'unsigned long long') to 'size_type' (aka 'unsigned int') in initializer list [-Wc++11-narrowing] | ||
9 | | 1139 | return {internal::CommonBlobFieldSpec<LibObjT>::data(this->libObjPtr()), this->length()}; | ||
10 | | | ^~~~~~~~~~~~~~ | ||
11 | | ../../git/src/plugins/ctf/common/src/msg-iter.cpp:744:56: note: in instantiation of member function 'bt2::CommonBlobField<bt_field>::data' requested here | ||
12 | | 744 | std::memcpy(&this->_stackTopCurSubField().asBlob().data()[_mCurBlobFieldDataOffset], | ||
13 | | | ^ | ||
14 | | ../../git/src/cpp-common/bt2/field.hpp:1139:82: note: insert an explicit cast to silence this issue | ||
15 | | 1139 | return {internal::CommonBlobFieldSpec<LibObjT>::data(this->libObjPtr()), this->length()}; | ||
16 | | | ^~~~~~~~~~~~~~ | ||
17 | | | static_cast<size_type>( ) | ||
18 | |||
19 | Upstream-Status: Backport [https://github.com/efficios/babeltrace/commit/1e6b34e411c61135ad256047a985a9bad927eae0] | ||
20 | |||
21 | Signed-off-by: Khem Raj <raj.khem@gmail.com> | ||
22 | --- | ||
23 | src/cpp-common/bt2/field.hpp | 2 +- | ||
24 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
25 | |||
26 | diff --git a/src/cpp-common/bt2/field.hpp b/src/cpp-common/bt2/field.hpp | ||
27 | index 8b291f7a..3a7d30a4 100644 | ||
28 | --- a/src/cpp-common/bt2/field.hpp | ||
29 | +++ b/src/cpp-common/bt2/field.hpp | ||
30 | @@ -1136,7 +1136,7 @@ public: | ||
31 | |||
32 | bt2s::span<typename internal::CommonBlobFieldSpec<LibObjT>::Data> data() const noexcept | ||
33 | { | ||
34 | - return {internal::CommonBlobFieldSpec<LibObjT>::data(this->libObjPtr()), this->length()}; | ||
35 | + return {internal::CommonBlobFieldSpec<LibObjT>::data(this->libObjPtr()), static_cast<std::size_t>(this->length())}; | ||
36 | } | ||
37 | |||
38 | std::uint64_t length() const noexcept | ||
diff --git a/meta/recipes-kernel/lttng/babeltrace2/0001-Make-manpages-multilib-identical.patch b/meta/recipes-kernel/lttng/babeltrace2/0001-Make-manpages-multilib-identical.patch index 2401b176e6..c2b76b1ed5 100644 --- a/meta/recipes-kernel/lttng/babeltrace2/0001-Make-manpages-multilib-identical.patch +++ b/meta/recipes-kernel/lttng/babeltrace2/0001-Make-manpages-multilib-identical.patch | |||
@@ -3,17 +3,20 @@ From: Jeremy Puhlman <jpuhlman@mvista.com> | |||
3 | Date: Mon, 9 Mar 2020 21:10:35 +0000 | 3 | Date: Mon, 9 Mar 2020 21:10:35 +0000 |
4 | Subject: [PATCH] Make manpages multilib identical | 4 | Subject: [PATCH] Make manpages multilib identical |
5 | 5 | ||
6 | Upstream-Status: Pending | 6 | Upstream-Status: Submitted [https://review.lttng.org/c/babeltrace/+/14222] |
7 | |||
7 | Signed-off-by: Jeremy Puhlman <jpuhlman@mvista.com> | 8 | Signed-off-by: Jeremy Puhlman <jpuhlman@mvista.com> |
9 | Signed-off-by: Bin Lan <bin.lan.cn@windriver.com> | ||
8 | --- | 10 | --- |
9 | doc/man/asciidoc-attrs.conf.in | 4 ++-- | 11 | doc/man/asciidoc-attrs.conf.in | 4 ++-- |
10 | 1 file changed, 2 insertions(+), 2 deletions(-) | 12 | 1 file changed, 2 insertions(+), 2 deletions(-) |
11 | 13 | ||
12 | diff --git a/doc/man/asciidoc-attrs.conf.in b/doc/man/asciidoc-attrs.conf.in | 14 | diff --git a/doc/man/asciidoc-attrs.conf.in b/doc/man/asciidoc-attrs.conf.in |
13 | index ad1183f1..e11c7031 100644 | 15 | index 88fb13ce2..27858b720 100644 |
14 | --- a/doc/man/asciidoc-attrs.conf.in | 16 | --- a/doc/man/asciidoc-attrs.conf.in |
15 | +++ b/doc/man/asciidoc-attrs.conf.in | 17 | +++ b/doc/man/asciidoc-attrs.conf.in |
16 | @@ -1,7 +1,7 @@ | 18 | @@ -4,8 +4,8 @@ |
19 | |||
17 | [attributes] | 20 | [attributes] |
18 | # default values | 21 | # default values |
19 | -system_plugin_path="@LIBDIR@/babeltrace2/plugins" | 22 | -system_plugin_path="@LIBDIR@/babeltrace2/plugins" |
@@ -24,5 +27,4 @@ index ad1183f1..e11c7031 100644 | |||
24 | enable_debug_info="@ENABLE_DEBUG_INFO_VAL@" | 27 | enable_debug_info="@ENABLE_DEBUG_INFO_VAL@" |
25 | defrdport=5344 | 28 | defrdport=5344 |
26 | -- | 29 | -- |
27 | 2.24.1 | 30 | 2.34.1 |
28 | |||
diff --git a/meta/recipes-kernel/lttng/babeltrace2/0001-tests-do-not-run-test-applications-from-.libs.patch b/meta/recipes-kernel/lttng/babeltrace2/0001-tests-do-not-run-test-applications-from-.libs.patch deleted file mode 100644 index 805dde8064..0000000000 --- a/meta/recipes-kernel/lttng/babeltrace2/0001-tests-do-not-run-test-applications-from-.libs.patch +++ /dev/null | |||
@@ -1,28 +0,0 @@ | |||
1 | From 582713cc9a013481eeef253195d644020f637ec4 Mon Sep 17 00:00:00 2001 | ||
2 | Message-Id: <582713cc9a013481eeef253195d644020f637ec4.1583403622.git.wallinux@gmail.com> | ||
3 | From: Anders Wallin <wallinux@gmail.com> | ||
4 | Date: Thu, 5 Mar 2020 11:20:04 +0100 | ||
5 | Subject: [PATCH] tests: do not run test applications from .libs | ||
6 | |||
7 | Cross compile specific change | ||
8 | |||
9 | Upstream-Status: Inappropriate [oe-core specific] | ||
10 | |||
11 | Signed-off-by: Anders Wallin <wallinux@gmail.com> | ||
12 | --- | ||
13 | tests/lib/test_plugin | 2 +- | ||
14 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
15 | |||
16 | diff --git a/tests/lib/test_plugin b/tests/lib/test_plugin | ||
17 | index 652c90cc..1f817c50 100755 | ||
18 | --- a/tests/lib/test_plugin | ||
19 | +++ b/tests/lib/test_plugin | ||
20 | @@ -26,4 +26,4 @@ fi | ||
21 | # shellcheck source=../utils/utils.sh | ||
22 | source "$UTILSSH" | ||
23 | |||
24 | -"${BT_TESTS_BUILDDIR}/lib/plugin" "${BT_TESTS_BUILDDIR}/lib/test-plugin-plugins/.libs" | ||
25 | +"${BT_TESTS_BUILDDIR}/lib/plugin" "${BT_TESTS_BUILDDIR}/lib/test-plugin-plugins" | ||
26 | -- | ||
27 | 2.25.1 | ||
28 | |||
diff --git a/meta/recipes-kernel/lttng/babeltrace2/0001-tests-fix-test-applications-in-cpp-common.patch b/meta/recipes-kernel/lttng/babeltrace2/0001-tests-fix-test-applications-in-cpp-common.patch new file mode 100644 index 0000000000..87f94fb087 --- /dev/null +++ b/meta/recipes-kernel/lttng/babeltrace2/0001-tests-fix-test-applications-in-cpp-common.patch | |||
@@ -0,0 +1,129 @@ | |||
1 | From 1dc81f272855d94e6a78f7d10ea952745d991aa9 Mon Sep 17 00:00:00 2001 | ||
2 | From: Bin Lan <bin.lan.cn@windriver.com> | ||
3 | Date: Tue, 11 Mar 2025 17:19:11 +0800 | ||
4 | Subject: [PATCH] Tests: fix test applications in cpp-common are needed to | ||
5 | re-build | ||
6 | |||
7 | Test applications in cpp-common directory are needed to re-build when | ||
8 | calling make check in embedded system. The following error is shown | ||
9 | when running test applications: | ||
10 | make[3]: *** No rule to make target 'cpp-common/test-c-string-view.cpp', | ||
11 | needed by 'cpp-common/test-c-string-view.o'. | ||
12 | make[3]: *** No rule to make target '../tests/utils/tap/libtap.la', | ||
13 | needed by 'cpp-common/test-c-string-view'. | ||
14 | make[3]: *** No rule to make target '../src/common/libcommon.la', | ||
15 | needed by 'cpp-common/test-c-string-view'. | ||
16 | make[3]: *** No rule to make target '../src/logging/liblogging.la', | ||
17 | needed by 'cpp-common/test-c-string-view'. | ||
18 | ... | ||
19 | make[2]: *** [Makefile:1274: check-TESTS] Error 2 | ||
20 | make[1]: *** [Makefile:1805: check-am] Error 2 | ||
21 | make: *** [Makefile:1033: check-recursive] Error 1 | ||
22 | make: Target 'check' not remade because of errors. | ||
23 | |||
24 | Create some new shell scripts which are used to call test applications | ||
25 | in cpp-common directory. Then these test applications can run without | ||
26 | actually examining the source code. | ||
27 | |||
28 | Upstream-Status: Submitted [https://review.lttng.org/c/babeltrace/+/14213] | ||
29 | |||
30 | Signed-off-by: Bin Lan <bin.lan.cn@windriver.com> | ||
31 | --- | ||
32 | tests/Makefile.am | 6 +++--- | ||
33 | tests/cpp-common/test-c-string-view.sh | 17 +++++++++++++++++ | ||
34 | tests/cpp-common/test-unicode-conv.sh | 17 +++++++++++++++++ | ||
35 | tests/cpp-common/test-uuid.sh | 17 +++++++++++++++++ | ||
36 | 4 files changed, 54 insertions(+), 3 deletions(-) | ||
37 | create mode 100755 tests/cpp-common/test-c-string-view.sh | ||
38 | create mode 100755 tests/cpp-common/test-unicode-conv.sh | ||
39 | create mode 100755 tests/cpp-common/test-uuid.sh | ||
40 | |||
41 | diff --git a/tests/Makefile.am b/tests/Makefile.am | ||
42 | index 2a4022bc4..c79b77b32 100644 | ||
43 | --- a/tests/Makefile.am | ||
44 | +++ b/tests/Makefile.am | ||
45 | @@ -129,9 +129,9 @@ cpp_common_test_unicode_conv_LDADD = \ | ||
46 | $(COMMON_TEST_LDADD) | ||
47 | |||
48 | TESTS_CPP_COMMON = \ | ||
49 | - cpp-common/test-c-string-view \ | ||
50 | - cpp-common/test-uuid \ | ||
51 | - cpp-common/test-unicode-conv | ||
52 | + cpp-common/test-c-string-view.sh \ | ||
53 | + cpp-common/test-uuid.sh \ | ||
54 | + cpp-common/test-unicode-conv.sh | ||
55 | |||
56 | TESTS_LIB = \ | ||
57 | lib/test-bt-uuid \ | ||
58 | diff --git a/tests/cpp-common/test-c-string-view.sh b/tests/cpp-common/test-c-string-view.sh | ||
59 | new file mode 100755 | ||
60 | index 000000000..9c2ca5818 | ||
61 | --- /dev/null | ||
62 | +++ b/tests/cpp-common/test-c-string-view.sh | ||
63 | @@ -0,0 +1,17 @@ | ||
64 | +#!/bin/bash | ||
65 | +# | ||
66 | +# SPDX-License-Identifier: GPL-2.0-only | ||
67 | +# | ||
68 | +# Copyright (C) 2025 Bin Lan <bin.lan.cn@windriver.com> | ||
69 | +# | ||
70 | + | ||
71 | +if [ -n "${BT_TESTS_SRCDIR:-}" ]; then | ||
72 | + UTILSSH="$BT_TESTS_SRCDIR/utils/utils.sh" | ||
73 | +else | ||
74 | + UTILSSH="$(dirname "$0")/../utils/utils.sh" | ||
75 | +fi | ||
76 | + | ||
77 | +# shellcheck source=../utils/utils.sh | ||
78 | +source "$UTILSSH" | ||
79 | + | ||
80 | +"${BT_TESTS_BUILDDIR}/cpp-common/test-c-string-view" "$BT_TESTS_BT2_BIN" | ||
81 | diff --git a/tests/cpp-common/test-unicode-conv.sh b/tests/cpp-common/test-unicode-conv.sh | ||
82 | new file mode 100755 | ||
83 | index 000000000..df490b2eb | ||
84 | --- /dev/null | ||
85 | +++ b/tests/cpp-common/test-unicode-conv.sh | ||
86 | @@ -0,0 +1,17 @@ | ||
87 | +#!/bin/bash | ||
88 | +# | ||
89 | +# SPDX-License-Identifier: GPL-2.0-only | ||
90 | +# | ||
91 | +# Copyright (C) 2025 Bin Lan <bin.lan.cn@windriver.com> | ||
92 | +# | ||
93 | + | ||
94 | +if [ -n "${BT_TESTS_SRCDIR:-}" ]; then | ||
95 | + UTILSSH="$BT_TESTS_SRCDIR/utils/utils.sh" | ||
96 | +else | ||
97 | + UTILSSH="$(dirname "$0")/../utils/utils.sh" | ||
98 | +fi | ||
99 | + | ||
100 | +# shellcheck source=../utils/utils.sh | ||
101 | +source "$UTILSSH" | ||
102 | + | ||
103 | +"${BT_TESTS_BUILDDIR}/cpp-common/test-unicode-conv" "$BT_TESTS_BT2_BIN" | ||
104 | diff --git a/tests/cpp-common/test-uuid.sh b/tests/cpp-common/test-uuid.sh | ||
105 | new file mode 100755 | ||
106 | index 000000000..8c65daa94 | ||
107 | --- /dev/null | ||
108 | +++ b/tests/cpp-common/test-uuid.sh | ||
109 | @@ -0,0 +1,17 @@ | ||
110 | +#!/bin/bash | ||
111 | +# | ||
112 | +# SPDX-License-Identifier: GPL-2.0-only | ||
113 | +# | ||
114 | +# Copyright (C) 2025 Bin Lan <bin.lan.cn@windriver.com> | ||
115 | +# | ||
116 | + | ||
117 | +if [ -n "${BT_TESTS_SRCDIR:-}" ]; then | ||
118 | + UTILSSH="$BT_TESTS_SRCDIR/utils/utils.sh" | ||
119 | +else | ||
120 | + UTILSSH="$(dirname "$0")/../utils/utils.sh" | ||
121 | +fi | ||
122 | + | ||
123 | +# shellcheck source=../utils/utils.sh | ||
124 | +source "$UTILSSH" | ||
125 | + | ||
126 | +"${BT_TESTS_BUILDDIR}/cpp-common/test-uuid" "$BT_TESTS_BT2_BIN" | ||
127 | -- | ||
128 | 2.34.1 | ||
129 | |||
diff --git a/meta/recipes-kernel/lttng/babeltrace2/0001-tests-set-the-correct-plugin-directory.patch b/meta/recipes-kernel/lttng/babeltrace2/0001-tests-set-the-correct-plugin-directory.patch new file mode 100644 index 0000000000..7ac7582ad7 --- /dev/null +++ b/meta/recipes-kernel/lttng/babeltrace2/0001-tests-set-the-correct-plugin-directory.patch | |||
@@ -0,0 +1,30 @@ | |||
1 | From 32494b1726a881883cb6d317ab76d1ec3f1fa740 Mon Sep 17 00:00:00 2001 | ||
2 | From: Bin Lan <bin.lan.cn@windriver.com> | ||
3 | Date: Wed, 5 Mar 2025 10:51:11 +0800 | ||
4 | Subject: [PATCH] tests: set the correct directory of plugin shared library | ||
5 | |||
6 | The plugin shared libraries are put in test-plugins-plugins/.libs when | ||
7 | building in a host. test-plugins-plugins/.libs is not exist when cross | ||
8 | build. The plugin shared libraries are put in test-plugins-plugins | ||
9 | directory when cross build. | ||
10 | |||
11 | Upstream-Status: Inappropriate [oe specific] | ||
12 | |||
13 | Signed-off-by: Bin Lan <bin.lan.cn@windriver.com> | ||
14 | --- | ||
15 | tests/lib/test-plugins.sh | 2 +- | ||
16 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
17 | |||
18 | diff --git a/tests/lib/test-plugins.sh b/tests/lib/test-plugins.sh | ||
19 | index f83e42baa..939236393 100755 | ||
20 | --- a/tests/lib/test-plugins.sh | ||
21 | +++ b/tests/lib/test-plugins.sh | ||
22 | @@ -14,4 +14,4 @@ fi | ||
23 | # shellcheck source=../utils/utils.sh | ||
24 | source "$UTILSSH" | ||
25 | |||
26 | -"${BT_TESTS_BUILDDIR}/lib/test-plugins" "${BT_TESTS_BUILDDIR}/lib/test-plugins-plugins/.libs" | ||
27 | +"${BT_TESTS_BUILDDIR}/lib/test-plugins" "${BT_TESTS_BUILDDIR}/lib/test-plugins-plugins" | ||
28 | -- | ||
29 | 2.34.1 | ||
30 | |||
diff --git a/meta/recipes-kernel/lttng/babeltrace2/run-ptest b/meta/recipes-kernel/lttng/babeltrace2/run-ptest index 71a9c81bfb..a0bf33b75d 100755 --- a/meta/recipes-kernel/lttng/babeltrace2/run-ptest +++ b/meta/recipes-kernel/lttng/babeltrace2/run-ptest | |||
@@ -4,7 +4,7 @@ | |||
4 | 4 | ||
5 | # Without --ignore-exit, the tap harness causes any FAILs within a | 5 | # Without --ignore-exit, the tap harness causes any FAILs within a |
6 | # test plan to raise ERRORs; this is just noise. | 6 | # test plan to raise ERRORs; this is just noise. |
7 | makeargs="LOG_DRIVER_FLAGS=--ignore-exit abs_top_srcdir=$PWD abs_top_builddir=$PWD GREP=grep SED=sed PYTHON=python3" | 7 | makeargs="LOG_DRIVER_FLAGS=--ignore-exit abs_top_srcdir=$PWD abs_top_builddir=$PWD" |
8 | 8 | ||
9 | exec 2> error.log | 9 | exec 2> error.log |
10 | make -C tests -k -s $makeargs $target | 10 | make -C tests -k -s $makeargs $target |
@@ -16,4 +16,4 @@ if [ -e tests/test-suite.log ]; then | |||
16 | cat tests/test-suite.log | 16 | cat tests/test-suite.log |
17 | fi | 17 | fi |
18 | 18 | ||
19 | exit $exitcode \ No newline at end of file | 19 | exit $exitcode |
diff --git a/meta/recipes-kernel/lttng/babeltrace2_2.0.5.bb b/meta/recipes-kernel/lttng/babeltrace2_2.1.1.bb index 9a4007fb25..8bab7f677a 100644 --- a/meta/recipes-kernel/lttng/babeltrace2_2.0.5.bb +++ b/meta/recipes-kernel/lttng/babeltrace2_2.1.1.bb | |||
@@ -2,21 +2,21 @@ SUMMARY = "Babeltrace2 - Trace Format Babel Tower" | |||
2 | DESCRIPTION = "Babeltrace provides trace read and write libraries in host side, as well as a trace converter, which used to convert LTTng 2.0 traces into human-readable log." | 2 | DESCRIPTION = "Babeltrace provides trace read and write libraries in host side, as well as a trace converter, which used to convert LTTng 2.0 traces into human-readable log." |
3 | HOMEPAGE = "http://babeltrace.org/" | 3 | HOMEPAGE = "http://babeltrace.org/" |
4 | BUGTRACKER = "https://bugs.lttng.org/projects/babeltrace" | 4 | BUGTRACKER = "https://bugs.lttng.org/projects/babeltrace" |
5 | LICENSE = "MIT & GPL-2.0-only & LGPL-2.1-only & BSD-2-Clause" | 5 | LICENSE = "MIT & GPL-2.0-only & LGPL-2.1-only & BSD-2-Clause & BSD-4-Clause & GPL-3.0-or-later & CC-BY-SA-4.0 & PSF-2.0" |
6 | LIC_FILES_CHKSUM = "file://LICENSE;md5=a6a458c13f18385b7bc5069a6d7b176e" | 6 | LIC_FILES_CHKSUM = "file://LICENSE;md5=f6b015e4f388d6e78adb1b1f9a887d06" |
7 | 7 | ||
8 | DEPENDS = "glib-2.0 util-linux popt bison-native flex-native" | 8 | DEPENDS = "glib-2.0 util-linux popt bison-native flex-native virtual/libiconv" |
9 | 9 | ||
10 | SRC_URI = "git://git.efficios.com/babeltrace.git;branch=stable-2.0;protocol=https \ | 10 | SRC_URI = "git://git.efficios.com/babeltrace.git;branch=stable-2.1;protocol=https;tag=v${PV} \ |
11 | file://run-ptest \ | 11 | file://run-ptest \ |
12 | file://0001-tests-do-not-run-test-applications-from-.libs.patch \ | ||
13 | file://0001-Make-manpages-multilib-identical.patch \ | 12 | file://0001-Make-manpages-multilib-identical.patch \ |
13 | file://0001-tests-fix-test-applications-in-cpp-common.patch \ | ||
14 | file://0001-tests-set-the-correct-plugin-directory.patch \ | ||
15 | file://0001-Make-bt_field_blob_get_length-return-size_t-instead-.patch \ | ||
14 | " | 16 | " |
15 | SRCREV = "66e76d1ea601705928899138f02730a3a2a3153d" | 17 | SRCREV = "7f2f8cd6dac497cbb466efb31219b531c62013f5" |
16 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>2(\.\d+)+)$" | 18 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>2(\.\d+)+)$" |
17 | 19 | ||
18 | S = "${WORKDIR}/git" | ||
19 | |||
20 | inherit autotools pkgconfig ptest python3targetconfig | 20 | inherit autotools pkgconfig ptest python3targetconfig |
21 | 21 | ||
22 | EXTRA_OECONF = "--disable-debug-info --disable-Werror" | 22 | EXTRA_OECONF = "--disable-debug-info --disable-Werror" |
@@ -28,10 +28,19 @@ FILES:${PN}-staticdev += "${libdir}/babeltrace2/plugins/*.a" | |||
28 | FILES:${PN} += "${libdir}/babeltrace2/plugins/*.so" | 28 | FILES:${PN} += "${libdir}/babeltrace2/plugins/*.so" |
29 | 29 | ||
30 | ASNEEDED = "" | 30 | ASNEEDED = "" |
31 | LDFLAGS:append = "${@bb.utils.contains('DISTRO_FEATURES', 'ld-is-lld ptest', ' -fuse-ld=bfd ', '', d)}" | 31 | LDFLAGS += "${@bb.utils.contains('DISTRO_FEATURES', 'ld-is-lld ptest', '-fuse-ld=bfd ', '', d)}" |
32 | 32 | ||
33 | # coreutils since we need full mktemp | 33 | # coreutils since we need full mktemp |
34 | RDEPENDS:${PN}-ptest += "bash gawk python3 make grep coreutils findutils" | 34 | RDEPENDS:${PN}-ptest += "bash gawk python3 make grep coreutils findutils" |
35 | RDEPENDS:${PN}-ptest:append:libc-glibc = " glibc-gconv-utf-16 glibc-gconv-utf-32" | ||
36 | |||
37 | do_configure:append() { | ||
38 | # when doing cross compile, the path ${B}/src/plugins/ctf/common/src/metadata/tsdl | ||
39 | # is not created by the babeltrace2 build system. It is need when generating | ||
40 | # parser.cpp by executing /bin/bash ../../git/config/ylwrap. | ||
41 | # So make this directory after configuration. | ||
42 | mkdir -p ${B}/src/plugins/ctf/common/src/metadata/tsdl | ||
43 | } | ||
35 | 44 | ||
36 | do_compile_ptest () { | 45 | do_compile_ptest () { |
37 | make -C tests all | 46 | make -C tests all |
@@ -51,6 +60,12 @@ do_install_ptest () { | |||
51 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; | 60 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; |
52 | find "${S}/tests/$d" -maxdepth 1 -name *.expect \ | 61 | find "${S}/tests/$d" -maxdepth 1 -name *.expect \ |
53 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; | 62 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; |
63 | find "${S}/tests/$d" -maxdepth 1 -name *.ref \ | ||
64 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; | ||
65 | find "${S}/tests/$d" -maxdepth 1 -name *.mctf \ | ||
66 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; | ||
67 | find "${S}/tests/$d" -maxdepth 1 -name *.json \ | ||
68 | -exec install -t "${D}${PTEST_PATH}/tests/$d" {} \; | ||
54 | done | 69 | done |
55 | install -d "${D}${PTEST_PATH}/tests/data/ctf-traces/" | 70 | install -d "${D}${PTEST_PATH}/tests/data/ctf-traces/" |
56 | cp -a ${S}/tests/data/ctf-traces/* ${D}${PTEST_PATH}/tests/data/ctf-traces/ | 71 | cp -a ${S}/tests/data/ctf-traces/* ${D}${PTEST_PATH}/tests/data/ctf-traces/ |
@@ -92,4 +107,26 @@ do_install_ptest () { | |||
92 | 107 | ||
93 | # Remove architechture specific testfiles | 108 | # Remove architechture specific testfiles |
94 | rm -rf ${D}${PTEST_PATH}/tests/data/plugins/flt.lttng-utils.debug-info/* | 109 | rm -rf ${D}${PTEST_PATH}/tests/data/plugins/flt.lttng-utils.debug-info/* |
110 | |||
111 | # Set the correct environment variables when running embedded environment | ||
112 | envsh=${D}${PTEST_PATH}/tests/utils/env.sh | ||
113 | sed -i "/BT_TESTS_SRCDIR/c\_set_var_def BT_TESTS_SRCDIR '${PTEST_PATH}/tests'" $envsh | ||
114 | sed -i "/BT_TESTS_BUILDDIR/c\_set_var_def BT_TESTS_BUILDDIR '${PTEST_PATH}/tests'" $envsh | ||
115 | sed -i "/BT_TESTS_AWK_BIN/c\_set_var_def BT_TESTS_AWK_BIN 'gawk'" $envsh | ||
116 | sed -i "/BT_TESTS_GREP_BIN/c\_set_var_def BT_TESTS_GREP_BIN 'grep'" $envsh | ||
117 | sed -i "/BT_TESTS_PYTHON_BIN/c\_set_var_def BT_TESTS_PYTHON_BIN 'python3'" $envsh | ||
118 | sed -i "/BT_TESTS_SED_BIN/c\_set_var_def BT_TESTS_SED_BIN 'sed'" $envsh | ||
119 | sed -i "/BT_TESTS_CC_BIN/c\_set_var_def BT_TESTS_CC_BIN ''" $envsh | ||
120 | } | ||
121 | |||
122 | do_install:append:class-nativesdk() { | ||
123 | mkdir -p ${D}${SDKPATHNATIVE}/environment-setup.d | ||
124 | cat <<- EOF > ${D}${SDKPATHNATIVE}/environment-setup.d/babeltrace2.sh | ||
125 | export BABELTRACE_PLUGIN_PATH="${libdir}/babeltrace2/plugins" | ||
126 | export LIBBABELTRACE2_PLUGIN_PROVIDER_DIR="${libdir}/babeltrace2/plugin-providers" | ||
127 | EOF | ||
95 | } | 128 | } |
129 | |||
130 | FILES:${PN}:append:class-nativesdk = " ${SDKPATHNATIVE}/environment-setup.d/babeltrace2.sh" | ||
131 | |||
132 | BBCLASSEXTEND = "nativesdk" | ||
diff --git a/meta/recipes-kernel/lttng/babeltrace_1.5.11.bb b/meta/recipes-kernel/lttng/babeltrace_1.5.11.bb index f4d9b5e42a..8ec80167a0 100644 --- a/meta/recipes-kernel/lttng/babeltrace_1.5.11.bb +++ b/meta/recipes-kernel/lttng/babeltrace_1.5.11.bb | |||
@@ -13,8 +13,6 @@ SRC_URI = "git://git.efficios.com/babeltrace.git;branch=stable-1.5;protocol=http | |||
13 | SRCREV = "91c00f70884887ff5c4849a8e3d47e311a22ba9d" | 13 | SRCREV = "91c00f70884887ff5c4849a8e3d47e311a22ba9d" |
14 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>1(\.\d+)+)$" | 14 | UPSTREAM_CHECK_GITTAGREGEX = "v(?P<pver>1(\.\d+)+)$" |
15 | 15 | ||
16 | S = "${WORKDIR}/git" | ||
17 | |||
18 | inherit autotools pkgconfig ptest | 16 | inherit autotools pkgconfig ptest |
19 | 17 | ||
20 | EXTRA_OECONF = "--disable-debug-info" | 18 | EXTRA_OECONF = "--disable-debug-info" |
@@ -96,3 +94,5 @@ do_install_ptest () { | |||
96 | sed -i 's:^BTBIN.*:BTBIN=/usr/bin/babeltrace:' ${f} | 94 | sed -i 's:^BTBIN.*:BTBIN=/usr/bin/babeltrace:' ${f} |
97 | done | 95 | done |
98 | } | 96 | } |
97 | |||
98 | BBCLASSEXTEND = "nativesdk" | ||
diff --git a/meta/recipes-kernel/lttng/lttng-modules/0001-Fix-sched_stat_runtime-changed-in-linux-6.8.0-rc1.patch b/meta/recipes-kernel/lttng/lttng-modules/0001-Fix-sched_stat_runtime-changed-in-linux-6.8.0-rc1.patch deleted file mode 100644 index a0d932c7b7..0000000000 --- a/meta/recipes-kernel/lttng/lttng-modules/0001-Fix-sched_stat_runtime-changed-in-linux-6.8.0-rc1.patch +++ /dev/null | |||
@@ -1,70 +0,0 @@ | |||
1 | From 9e59c2f6387aeb832ae3af3095f987529722e08f Mon Sep 17 00:00:00 2001 | ||
2 | From: Kienan Stewart <kstewart@efficios.com> | ||
3 | Date: Mon, 22 Jan 2024 11:10:37 -0500 | ||
4 | Subject: [PATCH 1/5] Fix: sched_stat_runtime changed in linux 6.8.0-rc1 | ||
5 | |||
6 | See upstream commit: | ||
7 | |||
8 | commit 5fe6ec8f6ab549b6422e41551abb51802bd48bc7 | ||
9 | Author: Peter Zijlstra <peterz@infradead.org> | ||
10 | Date: Mon Nov 6 13:41:43 2023 +0100 | ||
11 | |||
12 | sched: Remove vruntime from trace_sched_stat_runtime() | ||
13 | |||
14 | Tracing the runtime delta makes sense, observer can sum over time. | ||
15 | Tracing the absolute vruntime makes less sense, inconsistent: | ||
16 | absolute-vs-delta, but also vruntime delta can be computed from | ||
17 | runtime delta. | ||
18 | |||
19 | Removing the vruntime thing also makes the two tracepoint sites | ||
20 | identical, allowing to unify the code in a later patch. | ||
21 | |||
22 | Upstream-Status: Backport [Uhttps://review.lttng.org/c/lttng-modules/+/11700] | ||
23 | |||
24 | Change-Id: I24ebb4e06dbb646a1af75ac62b74f3821ff197de | ||
25 | Signed-off-by: Kienan Stewart <kstewart@efficios.com> | ||
26 | Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> | ||
27 | --- | ||
28 | include/instrumentation/events/sched.h | 19 +++++++++++++++++++ | ||
29 | 1 file changed, 19 insertions(+) | ||
30 | |||
31 | diff --git a/include/instrumentation/events/sched.h b/include/instrumentation/events/sched.h | ||
32 | index 066a0f8..24cf37c 100644 | ||
33 | --- a/include/instrumentation/events/sched.h | ||
34 | +++ b/include/instrumentation/events/sched.h | ||
35 | @@ -646,6 +646,24 @@ LTTNG_TRACEPOINT_EVENT_INSTANCE(sched_stat_template, sched_stat_blocked, | ||
36 | TP_ARGS(tsk, delay)) | ||
37 | #endif | ||
38 | |||
39 | +#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(6,8,0)) | ||
40 | +/* | ||
41 | + * Tracepoint for accounting runtime (time the task is executing | ||
42 | + * on a CPU). | ||
43 | + */ | ||
44 | +LTTNG_TRACEPOINT_EVENT(sched_stat_runtime, | ||
45 | + | ||
46 | + TP_PROTO(struct task_struct *tsk, u64 runtime), | ||
47 | + | ||
48 | + TP_ARGS(tsk, runtime), | ||
49 | + | ||
50 | + TP_FIELDS( | ||
51 | + ctf_array_text(char, comm, tsk->comm, TASK_COMM_LEN) | ||
52 | + ctf_integer(pid_t, tid, tsk->pid) | ||
53 | + ctf_integer(u64, runtime, runtime) | ||
54 | + ) | ||
55 | +) | ||
56 | +#else | ||
57 | /* | ||
58 | * Tracepoint for accounting runtime (time the task is executing | ||
59 | * on a CPU). | ||
60 | @@ -663,6 +681,7 @@ LTTNG_TRACEPOINT_EVENT(sched_stat_runtime, | ||
61 | ctf_integer(u64, vruntime, vruntime) | ||
62 | ) | ||
63 | ) | ||
64 | +#endif | ||
65 | |||
66 | #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,12,0) || \ | ||
67 | LTTNG_RT_KERNEL_RANGE(4,9,27,18, 4,10,0,0) || \ | ||
68 | -- | ||
69 | 2.39.2 | ||
70 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch b/meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch new file mode 100644 index 0000000000..eb43abbae2 --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-modules/0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch | |||
@@ -0,0 +1,35 @@ | |||
1 | From 0e2095bcc50e7a07d3478f8d3c0ae5ad46575594 Mon Sep 17 00:00:00 2001 | ||
2 | From: Mikko Rapeli <mikko.rapeli@linaro.org> | ||
3 | Date: Mon, 28 Apr 2025 12:07:24 +0000 | ||
4 | Subject: [PATCH] lttng-modules: fix sigaction build without | ||
5 | CONFIG_COMPAT_OLD_SIGACTION | ||
6 | |||
7 | Workaround build failure when CONFIG_COMPAT_OLD_SIGACTION is not enabled | ||
8 | in kernel config. | ||
9 | |||
10 | Upstream-Status: Submitted [https://bugs.lttng.org/issues/1426] | ||
11 | |||
12 | Signed-off-by: Mikko Rapeli <mikko.rapeli@linaro.org> | ||
13 | --- | ||
14 | .../instrumentation/syscalls/headers/arm-32-syscalls_pointers.h | 2 ++ | ||
15 | 1 file changed, 2 insertions(+) | ||
16 | |||
17 | diff --git a/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h b/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h | ||
18 | index 5f4ca5b..1514cae 100644 | ||
19 | --- a/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h | ||
20 | +++ b/include/instrumentation/syscalls/headers/arm-32-syscalls_pointers.h | ||
21 | @@ -1890,9 +1890,11 @@ TRACE_SYSCALL_TABLE(chroot, chroot, 61, 1) | ||
22 | #ifndef OVERRIDE_TABLE_32_ustat | ||
23 | TRACE_SYSCALL_TABLE(ustat, ustat, 62, 2) | ||
24 | #endif | ||
25 | +#ifdef CONFIG_COMPAT_OLD_SIGACTION | ||
26 | #ifndef OVERRIDE_TABLE_32_sigaction | ||
27 | TRACE_SYSCALL_TABLE(sigaction, sigaction, 67, 3) | ||
28 | #endif | ||
29 | +#endif /* CONFIG_COMPAT_OLD_SIGACTION */ | ||
30 | #ifndef OVERRIDE_TABLE_32_sigpending | ||
31 | TRACE_SYSCALL_TABLE(sigpending, sigpending, 73, 1) | ||
32 | #endif | ||
33 | -- | ||
34 | 2.49.0 | ||
35 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch b/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch index 120528bf9c..4911982461 100644 --- a/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch +++ b/meta/recipes-kernel/lttng/lttng-modules/0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 878f89b6136ff7b870a19e04901cc6f316bbe10a Mon Sep 17 00:00:00 2001 | 1 | From 60d423945bd4f4c4b7bfc6f29da9231152d05690 Mon Sep 17 00:00:00 2001 |
2 | From: Bruce Ashfield <bruce.ashfield@gmail.com> | 2 | From: Bruce Ashfield <bruce.ashfield@gmail.com> |
3 | Date: Sat, 15 May 2021 10:26:38 -0400 | 3 | Date: Sat, 15 May 2021 10:26:38 -0400 |
4 | Subject: [PATCH] src/Kbuild: change missing CONFIG_TRACEPOINTS to warning | 4 | Subject: [PATCH] src/Kbuild: change missing CONFIG_TRACEPOINTS to warning |
@@ -19,10 +19,10 @@ Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> | |||
19 | src/Kbuild | 7 ++++++- | 19 | src/Kbuild | 7 ++++++- |
20 | 1 file changed, 6 insertions(+), 1 deletion(-) | 20 | 1 file changed, 6 insertions(+), 1 deletion(-) |
21 | 21 | ||
22 | Index: lttng-modules-2.13.10/src/Kbuild | 22 | diff --git a/src/Kbuild b/src/Kbuild |
23 | =================================================================== | 23 | index 7137874..04eb5c9 100644 |
24 | --- lttng-modules-2.13.10.orig/src/Kbuild | 24 | --- a/src/Kbuild |
25 | +++ lttng-modules-2.13.10/src/Kbuild | 25 | +++ b/src/Kbuild |
26 | @@ -2,10 +2,13 @@ | 26 | @@ -2,10 +2,13 @@ |
27 | 27 | ||
28 | ifdef CONFIG_LOCALVERSION # Check if dot-config is included. | 28 | ifdef CONFIG_LOCALVERSION # Check if dot-config is included. |
@@ -38,7 +38,7 @@ Index: lttng-modules-2.13.10/src/Kbuild | |||
38 | TOP_LTTNG_MODULES_DIR := $(shell dirname $(lastword $(MAKEFILE_LIST)))/.. | 38 | TOP_LTTNG_MODULES_DIR := $(shell dirname $(lastword $(MAKEFILE_LIST)))/.. |
39 | 39 | ||
40 | lttng_check_linux_version = $(shell pwd)/include/linux/version.h | 40 | lttng_check_linux_version = $(shell pwd)/include/linux/version.h |
41 | @@ -150,3 +153,5 @@ lttng-statedump-objs := lttng-statedump- | 41 | @@ -150,3 +153,5 @@ lttng-statedump-objs := lttng-statedump-impl.o |
42 | obj-$(CONFIG_LTTNG) += probes/ | 42 | obj-$(CONFIG_LTTNG) += probes/ |
43 | obj-$(CONFIG_LTTNG) += lib/ | 43 | obj-$(CONFIG_LTTNG) += lib/ |
44 | obj-$(CONFIG_LTTNG) += tests/ | 44 | obj-$(CONFIG_LTTNG) += tests/ |
diff --git a/meta/recipes-kernel/lttng/lttng-modules/0002-Fix-timer_start-changed-in-linux-6.8.0-rc1.patch b/meta/recipes-kernel/lttng/lttng-modules/0002-Fix-timer_start-changed-in-linux-6.8.0-rc1.patch deleted file mode 100644 index 5a4294db02..0000000000 --- a/meta/recipes-kernel/lttng/lttng-modules/0002-Fix-timer_start-changed-in-linux-6.8.0-rc1.patch +++ /dev/null | |||
@@ -1,100 +0,0 @@ | |||
1 | From d52ab4b9a71a4bef535dadb8e7062112ac5c0c88 Mon Sep 17 00:00:00 2001 | ||
2 | From: Kienan Stewart <kstewart@efficios.com> | ||
3 | Date: Mon, 22 Jan 2024 11:33:39 -0500 | ||
4 | Subject: [PATCH 2/5] Fix: timer_start changed in linux 6.8.0-rc1 | ||
5 | |||
6 | See upstream commit | ||
7 | |||
8 | commit dbcdcb62b59db2cf6a24113873b90da15c6f0b19 | ||
9 | Author: Anna-Maria Behnsen <anna-maria@linutronix.de> | ||
10 | Date: Fri Dec 1 10:26:26 2023 +0100 | ||
11 | |||
12 | tracing/timers: Enhance timer_start tracepoint | ||
13 | |||
14 | For starting a timer, the timer is enqueued into a bucket of the timer | ||
15 | wheel. The bucket expiry is the defacto expiry of the timer but it is not | ||
16 | equal the timer expiry because of increasing granularity when bucket is in | ||
17 | a higher level of the wheel. To be able to figure out in a trace whether a | ||
18 | timer expired in time or not, the bucket expiry time is required as well. | ||
19 | |||
20 | Add bucket expiry time to the timer_start tracepoint and thereby simplify | ||
21 | the arguments. | ||
22 | |||
23 | Upstream-Status: Backport [Uhttps://review.lttng.org/c/lttng-modules/+/11700] | ||
24 | |||
25 | Change-Id: I4868092765745b1efd0c48f13c0b837f2007dcb6 | ||
26 | Signed-off-by: Kienan Stewart <kstewart@efficios.com> | ||
27 | Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> | ||
28 | --- | ||
29 | include/instrumentation/events/timer.h | 24 +++++++++++++----------- | ||
30 | 1 file changed, 13 insertions(+), 11 deletions(-) | ||
31 | |||
32 | diff --git a/include/instrumentation/events/timer.h b/include/instrumentation/events/timer.h | ||
33 | index 91a2cd9..ce571f5 100644 | ||
34 | --- a/include/instrumentation/events/timer.h | ||
35 | +++ b/include/instrumentation/events/timer.h | ||
36 | @@ -45,8 +45,7 @@ LTTNG_TRACEPOINT_EVENT_INSTANCE(timer_class, timer_init, | ||
37 | TP_ARGS(timer) | ||
38 | ) | ||
39 | |||
40 | -#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,2,0) || \ | ||
41 | - LTTNG_RHEL_KERNEL_RANGE(3,10,0,957,0,0, 3,11,0,0,0,0)) | ||
42 | +#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(6,8,0)) | ||
43 | /** | ||
44 | * timer_start - called when the timer is started | ||
45 | * @timer: pointer to struct timer_list | ||
46 | @@ -55,39 +54,42 @@ LTTNG_TRACEPOINT_EVENT_INSTANCE(timer_class, timer_init, | ||
47 | */ | ||
48 | LTTNG_TRACEPOINT_EVENT(timer_start, | ||
49 | |||
50 | - TP_PROTO(struct timer_list *timer, unsigned long expires, | ||
51 | - unsigned int flags), | ||
52 | + TP_PROTO(struct timer_list *timer, unsigned long bucket_expiry), | ||
53 | |||
54 | - TP_ARGS(timer, expires, flags), | ||
55 | + TP_ARGS(timer, bucket_expiry), | ||
56 | |||
57 | TP_FIELDS( | ||
58 | ctf_integer_hex(void *, timer, timer) | ||
59 | ctf_integer_hex(void *, function, timer->function) | ||
60 | - ctf_integer(unsigned long, expires, expires) | ||
61 | + ctf_integer(unsigned long, expires, timer->expires) | ||
62 | + ctf_integer(unsigned long, bucket_expiry, bucket_expiry) | ||
63 | ctf_integer(unsigned long, now, jiffies) | ||
64 | - ctf_integer(unsigned int, flags, flags) | ||
65 | + ctf_integer(unsigned int, flags, timer->flags) | ||
66 | ) | ||
67 | ) | ||
68 | -#else /* #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,2,0)) */ | ||
69 | +#else | ||
70 | /** | ||
71 | * timer_start - called when the timer is started | ||
72 | * @timer: pointer to struct timer_list | ||
73 | * @expires: the timers expiry time | ||
74 | + * @flags: the timers expiry time | ||
75 | */ | ||
76 | LTTNG_TRACEPOINT_EVENT(timer_start, | ||
77 | |||
78 | - TP_PROTO(struct timer_list *timer, unsigned long expires), | ||
79 | + TP_PROTO(struct timer_list *timer, unsigned long expires, | ||
80 | + unsigned int flags), | ||
81 | |||
82 | - TP_ARGS(timer, expires), | ||
83 | + TP_ARGS(timer, expires, flags), | ||
84 | |||
85 | TP_FIELDS( | ||
86 | ctf_integer_hex(void *, timer, timer) | ||
87 | ctf_integer_hex(void *, function, timer->function) | ||
88 | ctf_integer(unsigned long, expires, expires) | ||
89 | ctf_integer(unsigned long, now, jiffies) | ||
90 | + ctf_integer(unsigned int, flags, flags) | ||
91 | ) | ||
92 | ) | ||
93 | -#endif /* #else #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,2,0)) */ | ||
94 | +#endif | ||
95 | |||
96 | #if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(5,2,0) || \ | ||
97 | LTTNG_RHEL_KERNEL_RANGE(4,18,0,193,0,0, 4,19,0,0,0,0)) | ||
98 | -- | ||
99 | 2.39.2 | ||
100 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-modules/0003-Fix-strlcopy-removed-in-linux-6.8.0-rc1.patch b/meta/recipes-kernel/lttng/lttng-modules/0003-Fix-strlcopy-removed-in-linux-6.8.0-rc1.patch deleted file mode 100644 index 4ad9adc5c2..0000000000 --- a/meta/recipes-kernel/lttng/lttng-modules/0003-Fix-strlcopy-removed-in-linux-6.8.0-rc1.patch +++ /dev/null | |||
@@ -1,46 +0,0 @@ | |||
1 | From 7432f583674294b676577b6505b89fc74dc5c7ab Mon Sep 17 00:00:00 2001 | ||
2 | From: Kienan Stewart <kstewart@efficios.com> | ||
3 | Date: Mon, 22 Jan 2024 11:47:40 -0500 | ||
4 | Subject: [PATCH 3/5] Fix: strlcopy removed in linux 6.8.0-rc1 | ||
5 | |||
6 | See upstream commit: | ||
7 | |||
8 | commit d26270061ae66b915138af7cd73ca6f8b85e6b44 | ||
9 | Author: Kees Cook <keescook@chromium.org> | ||
10 | Date: Thu Jan 18 12:31:55 2024 -0800 | ||
11 | |||
12 | string: Remove strlcpy() | ||
13 | |||
14 | With all the users of strlcpy() removed[1] from the kernel, remove the | ||
15 | API, self-tests, and other references. Leave mentions in Documentation | ||
16 | (about its deprecation), and in checkpatch.pl (to help migrate host-only | ||
17 | tools/ usage). Long live strscpy(). | ||
18 | |||
19 | Upstream-Status: Backport [Uhttps://review.lttng.org/c/lttng-modules/+/11700] | ||
20 | |||
21 | Change-Id: I27cdff70a504b25340cc59150ed8e959d9629e43 | ||
22 | Signed-off-by: Kienan Stewart <kstewart@efficios.com> | ||
23 | Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> | ||
24 | --- | ||
25 | src/lib/ringbuffer/ring_buffer_backend.c | 4 ++++ | ||
26 | 1 file changed, 4 insertions(+) | ||
27 | |||
28 | diff --git a/src/lib/ringbuffer/ring_buffer_backend.c b/src/lib/ringbuffer/ring_buffer_backend.c | ||
29 | index 9a339be..2181145 100644 | ||
30 | --- a/src/lib/ringbuffer/ring_buffer_backend.c | ||
31 | +++ b/src/lib/ringbuffer/ring_buffer_backend.c | ||
32 | @@ -405,7 +405,11 @@ int channel_backend_init(struct channel_backend *chanb, | ||
33 | chanb->extra_reader_sb = | ||
34 | (config->mode == RING_BUFFER_OVERWRITE) ? 1 : 0; | ||
35 | chanb->num_subbuf = num_subbuf; | ||
36 | +#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(6,8,0)) | ||
37 | + strscpy(chanb->name, name, NAME_MAX); | ||
38 | +#else | ||
39 | strlcpy(chanb->name, name, NAME_MAX); | ||
40 | +#endif | ||
41 | memcpy(&chanb->config, config, sizeof(chanb->config)); | ||
42 | |||
43 | if (config->alloc == RING_BUFFER_ALLOC_PER_CPU) { | ||
44 | -- | ||
45 | 2.39.2 | ||
46 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-modules/0004-Fix-btrfs_chunk-tracepoints-changed-in-linux-6.8.0-r.patch b/meta/recipes-kernel/lttng/lttng-modules/0004-Fix-btrfs_chunk-tracepoints-changed-in-linux-6.8.0-r.patch deleted file mode 100644 index c9b1af37c8..0000000000 --- a/meta/recipes-kernel/lttng/lttng-modules/0004-Fix-btrfs_chunk-tracepoints-changed-in-linux-6.8.0-r.patch +++ /dev/null | |||
@@ -1,124 +0,0 @@ | |||
1 | From c8198382fe1cede3e16aae9978642a113a217e4c Mon Sep 17 00:00:00 2001 | ||
2 | From: Kienan Stewart <kstewart@efficios.com> | ||
3 | Date: Mon, 22 Jan 2024 12:17:33 -0500 | ||
4 | Subject: [PATCH 4/5] Fix: btrfs_chunk tracepoints changed in linux 6.8.0-rc1 | ||
5 | |||
6 | See upstream commit: | ||
7 | |||
8 | commit 7dc66abb5a47778d7db327783a0ba172b8cff0b5 | ||
9 | Author: Filipe Manana <fdmanana@suse.com> | ||
10 | Date: Tue Nov 21 13:38:38 2023 +0000 | ||
11 | |||
12 | btrfs: use a dedicated data structure for chunk maps | ||
13 | |||
14 | Currently we abuse the extent_map structure for two purposes: | ||
15 | |||
16 | 1) To actually represent extents for inodes; | ||
17 | 2) To represent chunk mappings. | ||
18 | |||
19 | This is odd and has several disadvantages: | ||
20 | |||
21 | 1) To create a chunk map, we need to do two memory allocations: one for | ||
22 | an extent_map structure and another one for a map_lookup structure, so | ||
23 | more potential for an allocation failure and more complicated code to | ||
24 | manage and link two structures; | ||
25 | |||
26 | 2) For a chunk map we actually only use 3 fields (24 bytes) of the | ||
27 | respective extent map structure: the 'start' field to have the logical | ||
28 | start address of the chunk, the 'len' field to have the chunk's size, | ||
29 | and the 'orig_block_len' field to contain the chunk's stripe size. | ||
30 | |||
31 | Besides wasting a memory, it's also odd and not intuitive at all to | ||
32 | have the stripe size in a field named 'orig_block_len'. | ||
33 | |||
34 | We are also using 'block_len' of the extent_map structure to contain | ||
35 | the chunk size, so we have 2 fields for the same value, 'len' and | ||
36 | 'block_len', which is pointless; | ||
37 | |||
38 | 3) When an extent map is associated to a chunk mapping, we set the bit | ||
39 | EXTENT_FLAG_FS_MAPPING on its flags and then make its member named | ||
40 | 'map_lookup' point to the associated map_lookup structure. This means | ||
41 | that for an extent map associated to an inode extent, we are not using | ||
42 | this 'map_lookup' pointer, so wasting 8 bytes (on a 64 bits platform); | ||
43 | |||
44 | 4) Extent maps associated to a chunk mapping are never merged or split so | ||
45 | it's pointless to use the existing extent map infrastructure. | ||
46 | |||
47 | So add a dedicated data structure named 'btrfs_chunk_map' to represent | ||
48 | chunk mappings, this is basically the existing map_lookup structure with | ||
49 | some extra fields: | ||
50 | |||
51 | 1) 'start' to contain the chunk logical address; | ||
52 | 2) 'chunk_len' to contain the chunk's length; | ||
53 | 3) 'stripe_size' for the stripe size; | ||
54 | 4) 'rb_node' for insertion into a rb tree; | ||
55 | 5) 'refs' for reference counting. | ||
56 | |||
57 | This way we do a single memory allocation for chunk mappings and we don't | ||
58 | waste memory for them with unused/unnecessary fields from an extent_map. | ||
59 | |||
60 | We also save 8 bytes from the extent_map structure by removing the | ||
61 | 'map_lookup' pointer, so the size of struct extent_map is reduced from | ||
62 | 144 bytes down to 136 bytes, and we can now have 30 extents map per 4K | ||
63 | page instead of 28. | ||
64 | |||
65 | Upstream-Status: Backport [Uhttps://review.lttng.org/c/lttng-modules/+/11700] | ||
66 | |||
67 | Change-Id: Ie52b5ac83df4bc6abeb84d958c4f5d24ae0d8c75 | ||
68 | Signed-off-by: Kienan Stewart <kstewart@efficios.com> | ||
69 | Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> | ||
70 | --- | ||
71 | include/instrumentation/events/btrfs.h | 37 +++++++++++++++++++++++++- | ||
72 | 1 file changed, 36 insertions(+), 1 deletion(-) | ||
73 | |||
74 | diff --git a/include/instrumentation/events/btrfs.h b/include/instrumentation/events/btrfs.h | ||
75 | index 7c7b9b0..a2a412b 100644 | ||
76 | --- a/include/instrumentation/events/btrfs.h | ||
77 | +++ b/include/instrumentation/events/btrfs.h | ||
78 | @@ -1609,7 +1609,42 @@ LTTNG_TRACEPOINT_EVENT(btrfs_delayed_ref_head, | ||
79 | ) | ||
80 | #endif | ||
81 | |||
82 | -#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,14,0)) | ||
83 | +#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(6,8,0)) | ||
84 | + | ||
85 | +LTTNG_TRACEPOINT_EVENT_CLASS(btrfs__chunk, | ||
86 | + | ||
87 | + TP_PROTO(const struct btrfs_fs_info *fs_info, const struct btrfs_chunk_map *map, | ||
88 | + u64 offset, u64 size), | ||
89 | + | ||
90 | + TP_ARGS(fs_info, map, offset, size), | ||
91 | + | ||
92 | + TP_FIELDS( | ||
93 | + ctf_integer(int, num_stripes, map->num_stripes) | ||
94 | + ctf_integer(u64, type, map->type) | ||
95 | + ctf_integer(int, sub_stripes, map->sub_stripes) | ||
96 | + ctf_integer(u64, offset, offset) | ||
97 | + ctf_integer(u64, size, size) | ||
98 | + ctf_integer(u64, root_objectid, fs_info->chunk_root->root_key.objectid) | ||
99 | + ) | ||
100 | +) | ||
101 | + | ||
102 | +LTTNG_TRACEPOINT_EVENT_INSTANCE(btrfs__chunk, btrfs_chunk_alloc, | ||
103 | + | ||
104 | + TP_PROTO(const struct btrfs_fs_info *fs_info, const struct btrfs_chunk_map *map, | ||
105 | + u64 offset, u64 size), | ||
106 | + | ||
107 | + TP_ARGS(fs_info, map, offset, size) | ||
108 | +) | ||
109 | + | ||
110 | +LTTNG_TRACEPOINT_EVENT_INSTANCE(btrfs__chunk, btrfs_chunk_free, | ||
111 | + | ||
112 | + TP_PROTO(const struct btrfs_fs_info *fs_info, const struct btrfs_chunk_map *map, | ||
113 | + u64 offset, u64 size), | ||
114 | + | ||
115 | + TP_ARGS(fs_info, map, offset, size) | ||
116 | +) | ||
117 | + | ||
118 | +#elif (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,14,0)) | ||
119 | |||
120 | LTTNG_TRACEPOINT_EVENT_CLASS(btrfs__chunk, | ||
121 | |||
122 | -- | ||
123 | 2.39.2 | ||
124 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-modules/0005-Fix-btrfs_get_extent-flags-and-compress_type-changed.patch b/meta/recipes-kernel/lttng/lttng-modules/0005-Fix-btrfs_get_extent-flags-and-compress_type-changed.patch deleted file mode 100644 index 65c33dafef..0000000000 --- a/meta/recipes-kernel/lttng/lttng-modules/0005-Fix-btrfs_get_extent-flags-and-compress_type-changed.patch +++ /dev/null | |||
@@ -1,88 +0,0 @@ | |||
1 | From 86db094386b43bb5c6b47552f9a4826ca8ba917d Mon Sep 17 00:00:00 2001 | ||
2 | From: Kienan Stewart <kstewart@efficios.com> | ||
3 | Date: Mon, 22 Jan 2024 13:13:36 -0500 | ||
4 | Subject: [PATCH 5/5] Fix: btrfs_get_extent flags and compress_type changed in | ||
5 | linux 6.8.0-rc1 | ||
6 | |||
7 | See upstream commit: | ||
8 | |||
9 | commit f86f7a75e2fb5fd7d31d00eab8a392f97ba42ce9 | ||
10 | Author: Filipe Manana <fdmanana@suse.com> | ||
11 | Date: Mon Dec 4 16:20:33 2023 +0000 | ||
12 | |||
13 | btrfs: use the flags of an extent map to identify the compression type | ||
14 | |||
15 | Currently, in struct extent_map, we use an unsigned int (32 bits) to | ||
16 | identify the compression type of an extent and an unsigned long (64 bits | ||
17 | on a 64 bits platform, 32 bits otherwise) for flags. We are only using | ||
18 | 6 different flags, so an unsigned long is excessive and we can use flags | ||
19 | to identify the compression type instead of using a dedicated 32 bits | ||
20 | field. | ||
21 | |||
22 | We can easily have tens or hundreds of thousands (or more) of extent maps | ||
23 | on busy and large filesystems, specially with compression enabled or many | ||
24 | or large files with tons of small extents. So it's convenient to have the | ||
25 | extent_map structure as small as possible in order to use less memory. | ||
26 | |||
27 | So remove the compression type field from struct extent_map, use flags | ||
28 | to identify the compression type and shorten the flags field from an | ||
29 | unsigned long to a u32. This saves 8 bytes (on 64 bits platforms) and | ||
30 | reduces the size of the structure from 136 bytes down to 128 bytes, using | ||
31 | now only two cache lines, and increases the number of extent maps we can | ||
32 | have per 4K page from 30 to 32. By using a u32 for the flags instead of | ||
33 | an unsigned long, we no longer use test_bit(), set_bit() and clear_bit(), | ||
34 | but that level of atomicity is not needed as most flags are never cleared | ||
35 | once set (before adding an extent map to the tree), and the ones that can | ||
36 | be cleared or set after an extent map is added to the tree, are always | ||
37 | performed while holding the write lock on the extent map tree, while the | ||
38 | reader holds a lock on the tree or tests for a flag that never changes | ||
39 | once the extent map is in the tree (such as compression flags). | ||
40 | |||
41 | Upstream-Status: Backport [Uhttps://review.lttng.org/c/lttng-modules/+/11700] | ||
42 | |||
43 | Change-Id: I95402d43f064c016b423b48652e4968d3db9b8a9 | ||
44 | Signed-off-by: Kienan Stewart <kstewart@efficios.com> | ||
45 | Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> | ||
46 | --- | ||
47 | include/instrumentation/events/btrfs.h | 25 ++++++++++++++++++++++++- | ||
48 | 1 file changed, 24 insertions(+), 1 deletion(-) | ||
49 | |||
50 | diff --git a/include/instrumentation/events/btrfs.h b/include/instrumentation/events/btrfs.h | ||
51 | index a2a412b..ffb1b64 100644 | ||
52 | --- a/include/instrumentation/events/btrfs.h | ||
53 | +++ b/include/instrumentation/events/btrfs.h | ||
54 | @@ -177,7 +177,30 @@ LTTNG_TRACEPOINT_EVENT_INSTANCE(btrfs__inode, btrfs_inode_evict, | ||
55 | ) | ||
56 | #endif | ||
57 | |||
58 | -#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,14,0)) | ||
59 | +#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(6,8,0)) | ||
60 | + | ||
61 | +LTTNG_TRACEPOINT_EVENT(btrfs_get_extent, | ||
62 | + | ||
63 | + TP_PROTO(const struct btrfs_root *root, const struct btrfs_inode *inode, | ||
64 | + const struct extent_map *map), | ||
65 | + | ||
66 | + TP_ARGS(root, inode, map), | ||
67 | + | ||
68 | + TP_FIELDS( | ||
69 | + ctf_integer(u64, root_objectid, root->root_key.objectid) | ||
70 | + ctf_integer(u64, ino, btrfs_ino(inode)) | ||
71 | + ctf_integer(u64, start, map->start) | ||
72 | + ctf_integer(u64, len, map->len) | ||
73 | + ctf_integer(u64, orig_start, map->orig_start) | ||
74 | + ctf_integer(u64, block_start, map->block_start) | ||
75 | + ctf_integer(u64, block_len, map->block_len) | ||
76 | + ctf_integer(unsigned int, flags, map->flags) | ||
77 | + ctf_integer(int, refs, refcount_read(&map->refs)) | ||
78 | + ctf_integer(unsigned int, compress_type, extent_map_compression(map)) | ||
79 | + ) | ||
80 | +) | ||
81 | + | ||
82 | +#elif (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(4,14,0)) | ||
83 | |||
84 | LTTNG_TRACEPOINT_EVENT(btrfs_get_extent, | ||
85 | |||
86 | -- | ||
87 | 2.39.2 | ||
88 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-modules/0006-Fix-ext4_discard_preallocations-changed-in-linux-6.8.patch b/meta/recipes-kernel/lttng/lttng-modules/0006-Fix-ext4_discard_preallocations-changed-in-linux-6.8.patch deleted file mode 100644 index c35f5b61fa..0000000000 --- a/meta/recipes-kernel/lttng/lttng-modules/0006-Fix-ext4_discard_preallocations-changed-in-linux-6.8.patch +++ /dev/null | |||
@@ -1,52 +0,0 @@ | |||
1 | From c1e074414f087b6ecc229a9385a44eb3b3dfeaea Mon Sep 17 00:00:00 2001 | ||
2 | From: Kienan Stewart <kstewart@efficios.com> | ||
3 | Date: Mon, 5 Feb 2024 08:52:29 -0500 | ||
4 | Subject: [PATCH] Fix: ext4_discard_preallocations changed in linux 6.8.0-rc3 | ||
5 | |||
6 | See upstream commit: | ||
7 | |||
8 | commit f0e54b6087de9571ec61c189d6c378b81edbe3b2 | ||
9 | Author: Kemeng Shi <shikemeng@huaweicloud.com> | ||
10 | Date: Fri Jan 5 17:21:02 2024 +0800 | ||
11 | |||
12 | ext4: remove 'needed' in trace_ext4_discard_preallocations | ||
13 | |||
14 | As 'needed' to trace_ext4_discard_preallocations is always 0 which | ||
15 | is meaningless. Just remove it. | ||
16 | |||
17 | Change-Id: Ib6b698ca553c4beebd4ca791c83bbbb927901758 | ||
18 | Signed-off-by: Kienan Stewart <kstewart@efficios.com> | ||
19 | Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com> | ||
20 | |||
21 | Upstream-Status: Backport [https://github.com/lttng/lttng-modules/commit/2da4de37de6382b4440737fdf4320e08a089afcd] | ||
22 | |||
23 | Signed-off-by: Yogesh Tyagi <yogesh.tyagi@intel.com> | ||
24 | --- | ||
25 | include/instrumentation/events/ext4.h | 14 +++++++++++++- | ||
26 | 1 file changed, 13 insertions(+), 1 deletion(-) | ||
27 | |||
28 | diff --git a/include/instrumentation/events/ext4.h b/include/instrumentation/events/ext4.h | ||
29 | index 222416e..05a6453 100644 | ||
30 | --- a/include/instrumentation/events/ext4.h | ||
31 | +++ b/include/instrumentation/events/ext4.h | ||
32 | @@ -490,7 +490,19 @@ LTTNG_TRACEPOINT_EVENT(ext4_mb_release_group_pa, | ||
33 | ) | ||
34 | #endif | ||
35 | |||
36 | -#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(5,9,0) || \ | ||
37 | +#if (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(6,8,0)) | ||
38 | +LTTNG_TRACEPOINT_EVENT(ext4_discard_preallocations, | ||
39 | + TP_PROTO(struct inode *inode, unsigned int len), | ||
40 | + | ||
41 | + TP_ARGS(inode, len), | ||
42 | + | ||
43 | + TP_FIELDS( | ||
44 | + ctf_integer(dev_t, dev, inode->i_sb->s_dev) | ||
45 | + ctf_integer(ino_t, ino, inode->i_ino) | ||
46 | + ctf_integer(unsigned int, len, len) | ||
47 | + ) | ||
48 | +) | ||
49 | +#elif (LTTNG_LINUX_VERSION_CODE >= LTTNG_KERNEL_VERSION(5,9,0) || \ | ||
50 | LTTNG_KERNEL_RANGE(5,8,6, 5,9,0)) | ||
51 | LTTNG_TRACEPOINT_EVENT(ext4_discard_preallocations, | ||
52 | TP_PROTO(struct inode *inode, unsigned int len, unsigned int needed), | ||
diff --git a/meta/recipes-kernel/lttng/lttng-modules_2.13.11.bb b/meta/recipes-kernel/lttng/lttng-modules_2.13.19.bb index 5d2379df84..63ba488515 100644 --- a/meta/recipes-kernel/lttng/lttng-modules_2.13.11.bb +++ b/meta/recipes-kernel/lttng/lttng-modules_2.13.19.bb | |||
@@ -3,27 +3,23 @@ SUMMARY = "Linux Trace Toolkit KERNEL MODULE" | |||
3 | DESCRIPTION = "The lttng-modules 2.0 package contains the kernel tracer modules" | 3 | DESCRIPTION = "The lttng-modules 2.0 package contains the kernel tracer modules" |
4 | HOMEPAGE = "https://lttng.org/" | 4 | HOMEPAGE = "https://lttng.org/" |
5 | LICENSE = "LGPL-2.1-only & GPL-2.0-only & MIT" | 5 | LICENSE = "LGPL-2.1-only & GPL-2.0-only & MIT" |
6 | LIC_FILES_CHKSUM = "file://LICENSE;md5=0464cff101a009c403cd2ed65d01d4c4" | 6 | LIC_FILES_CHKSUM = "file://LICENSE;md5=8d0d9f08888046474772a5d745d89d6a" |
7 | 7 | ||
8 | inherit module | 8 | inherit module |
9 | 9 | ||
10 | include lttng-platforms.inc | 10 | include lttng-platforms.inc |
11 | 11 | ||
12 | SRC_URI = "https://lttng.org/files/${BPN}/${BPN}-${PV}.tar.bz2 \ | 12 | SRC_URI = "https://lttng.org/files/${BPN}/${BPN}-${PV}.tar.bz2 \ |
13 | file://0001-Fix-sched_stat_runtime-changed-in-linux-6.8.0-rc1.patch \ | 13 | file://0001-lttng-modules-fix-sigaction-build-without-CONFIG_COM.patch \ |
14 | file://0002-Fix-timer_start-changed-in-linux-6.8.0-rc1.patch \ | 14 | " |
15 | file://0003-Fix-strlcopy-removed-in-linux-6.8.0-rc1.patch \ | ||
16 | file://0004-Fix-btrfs_chunk-tracepoints-changed-in-linux-6.8.0-r.patch \ | ||
17 | file://0005-Fix-btrfs_get_extent-flags-and-compress_type-changed.patch \ | ||
18 | file://0006-Fix-ext4_discard_preallocations-changed-in-linux-6.8.patch \ | ||
19 | " | ||
20 | 15 | ||
21 | # Use :append here so that the patch is applied also when using devupstream | 16 | # Use :append here so that the patch is applied also when using devupstream |
22 | SRC_URI:append = " file://0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch" | 17 | SRC_URI:append = " file://0001-src-Kbuild-change-missing-CONFIG_TRACEPOINTS-to-warn.patch \ |
18 | " | ||
23 | 19 | ||
24 | SRC_URI[sha256sum] = "297211d6fda459c85793c1f498c90fad2939cda7939d503f3ec5eaaf5fbec3c7" | 20 | SRC_URI[sha256sum] = "06d704633749039f8fa72a954bec6486058386e2a0c3557b22c484698f9b34d5" |
25 | 21 | ||
26 | export INSTALL_MOD_DIR="kernel/lttng-modules" | 22 | export INSTALL_MOD_DIR = "kernel/lttng-modules" |
27 | 23 | ||
28 | EXTRA_OEMAKE += "KERNELDIR='${STAGING_KERNEL_DIR}'" | 24 | EXTRA_OEMAKE += "KERNELDIR='${STAGING_KERNEL_DIR}'" |
29 | 25 | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/0001-Fix-rotation-destroy-flush-fix-session-daemon-abort-.patch b/meta/recipes-kernel/lttng/lttng-tools/0001-Fix-rotation-destroy-flush-fix-session-daemon-abort-.patch new file mode 100644 index 0000000000..e5c9677073 --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-tools/0001-Fix-rotation-destroy-flush-fix-session-daemon-abort-.patch | |||
@@ -0,0 +1,53 @@ | |||
1 | From ea47622987d0947af3e8f75d16d52e27ebd60166 Mon Sep 17 00:00:00 2001 | ||
2 | From: Xiangyu Chen <xiangyu.chen@windriver.com> | ||
3 | Date: Mon, 25 Mar 2024 18:20:14 +0800 | ||
4 | Subject: [PATCH] Fix: rotation-destroy-flush: fix session daemon abort if no | ||
5 | kernel module present | ||
6 | |||
7 | Testing rotation-destroy-flush when no lttng kernel modules present, it would | ||
8 | be failed with error message: | ||
9 | |||
10 | Error: Unable to load required module lttng-ring-buffer-client-discard | ||
11 | not ok 1 - Start session daemon | ||
12 | Failed test 'Start session daemon' | ||
13 | not ok 2 - Create session rotation_destroy_flush in -o /tmp/tmp.test_rot ... | ||
14 | ... | ||
15 | |||
16 | This because test script that sets the LTTNG_ABORT_ON_ERROR environment | ||
17 | variable. It's this environment variable that causes the sessiond to handle the | ||
18 | kernel module loading failure as an abort rather than a warning. | ||
19 | |||
20 | Using "check_skip_kernel_test" to detect whether the kernel module fails to | ||
21 | load is expected or not. If the failure is expected, the script won't set that | ||
22 | environment variable any more. | ||
23 | |||
24 | Fixes: 3a174400 | ||
25 | ("tests:add check_skip_kernel_test to check root user and lttng kernel modules") | ||
26 | |||
27 | Submitted [https://review.lttng.org/c/lttng-tools/+/12155] | ||
28 | Upstream-Status: Backport [https://github.com/lttng/lttng-tools/commit/78f5b22de60c114c5c83410015a08bdd212edc0b] | ||
29 | Change-Id: I371e9ba717613e2940186f710cf3cccd35baed6c | ||
30 | Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com> | ||
31 | --- | ||
32 | .../ust/rotation-destroy-flush/test_rotation_destroy_flush | 6 +++--- | ||
33 | 1 file changed, 3 insertions(+), 3 deletions(-) | ||
34 | |||
35 | diff --git a/tests/regression/ust/rotation-destroy-flush/test_rotation_destroy_flush b/tests/regression/ust/rotation-destroy-flush/test_rotation_destroy_flush | ||
36 | index 8ef4f0d..e506b53 100755 | ||
37 | --- a/tests/regression/ust/rotation-destroy-flush/test_rotation_destroy_flush | ||
38 | +++ b/tests/regression/ust/rotation-destroy-flush/test_rotation_destroy_flush | ||
39 | @@ -23,11 +23,11 @@ SIZE_LIMIT=$PAGE_SIZE | ||
40 | NR_ITER=10 | ||
41 | NUM_TESTS=$((15*$NR_ITER)) | ||
42 | |||
43 | -# Ensure the daemons invoke abort on error. | ||
44 | -export LTTNG_ABORT_ON_ERROR=1 | ||
45 | - | ||
46 | source $TESTDIR/utils/utils.sh | ||
47 | |||
48 | +# Ensure the daemons invoke abort on error. | ||
49 | +check_skip_kernel_test || export LTTNG_ABORT_ON_ERROR=1 | ||
50 | + | ||
51 | # MUST set TESTDIR before calling those functions | ||
52 | function run_app() | ||
53 | { | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/0001-compat-Define-off64_t-as-off_t-on-linux.patch b/meta/recipes-kernel/lttng/lttng-tools/0001-compat-Define-off64_t-as-off_t-on-linux.patch index 4e21d1e9f1..e68feb2753 100644 --- a/meta/recipes-kernel/lttng/lttng-tools/0001-compat-Define-off64_t-as-off_t-on-linux.patch +++ b/meta/recipes-kernel/lttng/lttng-tools/0001-compat-Define-off64_t-as-off_t-on-linux.patch | |||
@@ -1,7 +1,11 @@ | |||
1 | From 74b3844737b03492756b4f896c938b504b069f14 Mon Sep 17 00:00:00 2001 | 1 | From e5b2615aaad44a1c0d52da1469b28f99cfb12b5f Mon Sep 17 00:00:00 2001 |
2 | From: Jérémie Galarneau <jeremie.galarneau@efficios.com> | 2 | From: =?UTF-8?q?J=C3=A9r=C3=A9mie=20Galarneau?= |
3 | <jeremie.galarneau@efficios.com> | ||
3 | Date: Tue, 17 Jan 2023 16:57:35 -0500 | 4 | Date: Tue, 17 Jan 2023 16:57:35 -0500 |
4 | Subject: [PATCH] compat: off64_t is not defined by musl | 5 | Subject: [PATCH] compat: off64_t is not defined by musl |
6 | MIME-Version: 1.0 | ||
7 | Content-Type: text/plain; charset=UTF-8 | ||
8 | Content-Transfer-Encoding: 8bit | ||
5 | 9 | ||
6 | This helps compile with latest musl, where off64_t is not defined unless | 10 | This helps compile with latest musl, where off64_t is not defined unless |
7 | _LARGEFILE64_SOURCE is defined. On glibc, _LARGEFILE64_SOURCE is defined | 11 | _LARGEFILE64_SOURCE is defined. On glibc, _LARGEFILE64_SOURCE is defined |
@@ -14,12 +18,18 @@ As such, it is safe to assume off_t is 64-bit wide. This is checked by a | |||
14 | static_assert to catch any platform where autoconf would let a 32-bit | 18 | static_assert to catch any platform where autoconf would let a 32-bit |
15 | off_t slip. | 19 | off_t slip. |
16 | 20 | ||
17 | Upstream-Status: Submitted [https://review.lttng.org/c/lttng-tools/+/9268] | 21 | Submitted [https://review.lttng.org/c/lttng-tools/+/9268] |
22 | Upstream-Status: Backport [https://github.com/lttng/lttng-tools/commit/57fd993799a2b081c826f6fc8def32d28d526bfb] | ||
18 | Reported-by: Khem Raj <raj.khem@gmail.com> | 23 | Reported-by: Khem Raj <raj.khem@gmail.com> |
19 | Signed-off-by: Jérémie Galarneau <jeremie.galarneau@efficios.com> | 24 | Signed-off-by: Jérémie Galarneau <jeremie.galarneau@efficios.com> |
20 | Change-Id: If2c6007a8c85bc3f3065002af8a7538b882fb4a8 | 25 | Change-Id: If2c6007a8c85bc3f3065002af8a7538b882fb4a8 |
21 | --- | 26 | --- |
27 | src/common/compat/compat-fcntl.c | 5 ++++- | ||
28 | src/common/compat/fcntl.h | 10 +++------- | ||
29 | 2 files changed, 7 insertions(+), 8 deletions(-) | ||
22 | 30 | ||
31 | diff --git a/src/common/compat/compat-fcntl.c b/src/common/compat/compat-fcntl.c | ||
32 | index 5c0bdc9..18bab0a 100644 | ||
23 | --- a/src/common/compat/compat-fcntl.c | 33 | --- a/src/common/compat/compat-fcntl.c |
24 | +++ b/src/common/compat/compat-fcntl.c | 34 | +++ b/src/common/compat/compat-fcntl.c |
25 | @@ -8,14 +8,17 @@ | 35 | @@ -8,14 +8,17 @@ |
@@ -41,6 +51,8 @@ Change-Id: If2c6007a8c85bc3f3065002af8a7538b882fb4a8 | |||
41 | #ifdef HAVE_SYNC_FILE_RANGE | 51 | #ifdef HAVE_SYNC_FILE_RANGE |
42 | return sync_file_range(fd, offset, nbytes, flags); | 52 | return sync_file_range(fd, offset, nbytes, flags); |
43 | #else | 53 | #else |
54 | diff --git a/src/common/compat/fcntl.h b/src/common/compat/fcntl.h | ||
55 | index 5e566e5..93b22b7 100644 | ||
44 | --- a/src/common/compat/fcntl.h | 56 | --- a/src/common/compat/fcntl.h |
45 | +++ b/src/common/compat/fcntl.h | 57 | +++ b/src/common/compat/fcntl.h |
46 | @@ -13,16 +13,12 @@ | 58 | @@ -13,16 +13,12 @@ |
@@ -61,7 +73,7 @@ Change-Id: If2c6007a8c85bc3f3065002af8a7538b882fb4a8 | |||
61 | unsigned int flags); | 73 | unsigned int flags); |
62 | #define lttng_sync_file_range(fd, offset, nbytes, flags) \ | 74 | #define lttng_sync_file_range(fd, offset, nbytes, flags) \ |
63 | compat_sync_file_range(fd, offset, nbytes, flags) | 75 | compat_sync_file_range(fd, offset, nbytes, flags) |
64 | @@ -37,8 +33,8 @@ extern int compat_sync_file_range(int fd | 76 | @@ -37,8 +33,8 @@ extern int compat_sync_file_range(int fd, off64_t offset, off64_t nbytes, |
65 | #define SYNC_FILE_RANGE_WAIT_BEFORE 0 | 77 | #define SYNC_FILE_RANGE_WAIT_BEFORE 0 |
66 | #define SYNC_FILE_RANGE_WRITE 0 | 78 | #define SYNC_FILE_RANGE_WRITE 0 |
67 | 79 | ||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/0001-fix-lttng-tools-fails-to-compile-with-libxml2-2.14.0.patch b/meta/recipes-kernel/lttng/lttng-tools/0001-fix-lttng-tools-fails-to-compile-with-libxml2-2.14.0.patch new file mode 100644 index 0000000000..7c2b893731 --- /dev/null +++ b/meta/recipes-kernel/lttng/lttng-tools/0001-fix-lttng-tools-fails-to-compile-with-libxml2-2.14.0.patch | |||
@@ -0,0 +1,55 @@ | |||
1 | From 0b19e10a8a52fab0bfadbac5ce70f1b2d185a1d1 Mon Sep 17 00:00:00 2001 | ||
2 | From: Hongxu Jia <hongxu.jia@windriver.com> | ||
3 | Date: Wed, 21 May 2025 13:09:25 +0800 | ||
4 | Subject: [PATCH] fix lttng-tools fails to compile with libxml2 2.14.0+ | ||
5 | |||
6 | Description: | ||
7 | | In file included from /srv/pokybuild/yocto-worker/qemux86-alt/build/build/tmp/work/core2-32-poky-linux/lttng-tools/2.13.15/recipe-sysroot/usr/include/libxml2/libxml/parser.h:25, | ||
8 | | from ../../../../lttng-tools-2.13.15/src/common/config/session-config.c:29: | ||
9 | | /srv/pokybuild/yocto-worker/qemux86-alt/build/build/tmp/work/core2-32-poky-linux/lttng-tools/2.13.15/recipe-sysroot/usr/include/libxml2/libxml/encoding.h:173:7: note: declared here | ||
10 | | 173 | } input XML_DEPRECATED_MEMBER; | ||
11 | | | ^~~~~ | ||
12 | | ../../../../lttng-tools-2.13.15/src/common/config/session-config.c:432:15: error: called object is not a function or function pointer | ||
13 | | 432 | ret = handler->input(out_str, &out_len, (const xmlChar *) in_str, &in_len); | ||
14 | | | ^~~~~~~ | ||
15 | | At top level: | ||
16 | | cc1: note: unrecognized command-line option '-Wno-incomplete-setjmp-declaration' may have been intended to silence earlier diagnostics | ||
17 | |||
18 | |||
19 | According to [1][2], the UTF-8 handler is | ||
20 | ``` | ||
21 | static xmlCharEncError | ||
22 | UTF8ToUTF8(void *vctxt ATTRIBUTE_UNUSED, | ||
23 | unsigned char* out, int *outlen, | ||
24 | const unsigned char* in, int *inlen, | ||
25 | int flush ATTRIBUTE_UNUSED) | ||
26 | ``` | ||
27 | |||
28 | Update input.func with setting ATTRIBUTE_UNUSED params with NULL and 0 | ||
29 | |||
30 | [1] https://gitlab.gnome.org/GNOME/libxml2/-/commit/38f475072aefe032fff1dc058df3e56c1e7062fa | ||
31 | [2] https://gitlab.gnome.org/GNOME/libxml2/-/commit/69b83bb68e2a8ed0013f80c51b9a358714b00c9a#478024cc18a2cc8dbaed34076e9775f6827f413d_2188_2201 | ||
32 | |||
33 | Upstream-Status: Submitted [https://github.com/lttng/lttng-tools/pull/170] | ||
34 | Signed-off-by: Marko, Peter <Peter.Marko@siemens.com> | ||
35 | Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | ||
36 | --- | ||
37 | src/common/config/session-config.c | 2 +- | ||
38 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
39 | |||
40 | diff --git a/src/common/config/session-config.c b/src/common/config/session-config.c | ||
41 | index bb4e9fe..4042d34 100644 | ||
42 | --- a/src/common/config/session-config.c | ||
43 | +++ b/src/common/config/session-config.c | ||
44 | @@ -429,7 +429,7 @@ static xmlChar *encode_string(const char *in_str) | ||
45 | goto end; | ||
46 | } | ||
47 | |||
48 | - ret = handler->input(out_str, &out_len, (const xmlChar *) in_str, &in_len); | ||
49 | + ret = handler->input.func(NULL, out_str, &out_len, (const xmlChar *) in_str, &in_len, 0); | ||
50 | if (ret < 0) { | ||
51 | xmlFree(out_str); | ||
52 | out_str = NULL; | ||
53 | -- | ||
54 | 2.34.1 | ||
55 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/0001-tests-add-check_skip_kernel_test-to-check-root-user-.patch b/meta/recipes-kernel/lttng/lttng-tools/0001-tests-add-check_skip_kernel_test-to-check-root-user-.patch index 2671a1908e..cb2c763b51 100644 --- a/meta/recipes-kernel/lttng/lttng-tools/0001-tests-add-check_skip_kernel_test-to-check-root-user-.patch +++ b/meta/recipes-kernel/lttng/lttng-tools/0001-tests-add-check_skip_kernel_test-to-check-root-user-.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From cf558f802b259a33605fe0ede4d74ae2ff6be699 Mon Sep 17 00:00:00 2001 | 1 | From 76976da4e01ce90923f61ba734e066faefb76beb Mon Sep 17 00:00:00 2001 |
2 | From: Xiangyu Chen <xiangyu.chen@windriver.com> | 2 | From: Xiangyu Chen <xiangyu.chen@windriver.com> |
3 | Date: Mon, 12 Feb 2024 09:23:54 -0500 | 3 | Date: Mon, 12 Feb 2024 09:23:54 -0500 |
4 | Subject: [PATCH] tests: add check_skip_kernel_test to check root user and | 4 | Subject: [PATCH] tests: add check_skip_kernel_test to check root user and |
@@ -83,7 +83,7 @@ Signed-off-by: Jérémie Galarneau <jeremie.galarneau@efficios.com> | |||
83 | 47 files changed, 166 insertions(+), 363 deletions(-) | 83 | 47 files changed, 166 insertions(+), 363 deletions(-) |
84 | 84 | ||
85 | diff --git a/tests/destructive/metadata-regeneration b/tests/destructive/metadata-regeneration | 85 | diff --git a/tests/destructive/metadata-regeneration b/tests/destructive/metadata-regeneration |
86 | index b81e7af32..36b130d17 100755 | 86 | index b81e7af..36b130d 100755 |
87 | --- a/tests/destructive/metadata-regeneration | 87 | --- a/tests/destructive/metadata-regeneration |
88 | +++ b/tests/destructive/metadata-regeneration | 88 | +++ b/tests/destructive/metadata-regeneration |
89 | @@ -185,19 +185,13 @@ function test_ust_streaming () | 89 | @@ -185,19 +185,13 @@ function test_ust_streaming () |
@@ -108,7 +108,7 @@ index b81e7af32..36b130d17 100755 | |||
108 | start_lttng_relayd "-o $TRACE_PATH" | 108 | start_lttng_relayd "-o $TRACE_PATH" |
109 | start_lttng_sessiond | 109 | start_lttng_sessiond |
110 | diff --git a/tests/perf/test_perf_raw.in b/tests/perf/test_perf_raw.in | 110 | diff --git a/tests/perf/test_perf_raw.in b/tests/perf/test_perf_raw.in |
111 | index f293ccd71..d35529a87 100644 | 111 | index f293ccd..d35529a 100644 |
112 | --- a/tests/perf/test_perf_raw.in | 112 | --- a/tests/perf/test_perf_raw.in |
113 | +++ b/tests/perf/test_perf_raw.in | 113 | +++ b/tests/perf/test_perf_raw.in |
114 | @@ -137,12 +137,6 @@ function test_kernel_raw() | 114 | @@ -137,12 +137,6 @@ function test_kernel_raw() |
@@ -134,7 +134,7 @@ index f293ccd71..d35529a87 100644 | |||
134 | modprobe lttng-test | 134 | modprobe lttng-test |
135 | test_kernel_raw | 135 | test_kernel_raw |
136 | diff --git a/tests/regression/kernel/test_all_events b/tests/regression/kernel/test_all_events | 136 | diff --git a/tests/regression/kernel/test_all_events b/tests/regression/kernel/test_all_events |
137 | index 2e20888df..044f9b65f 100755 | 137 | index 2e20888..044f9b6 100755 |
138 | --- a/tests/regression/kernel/test_all_events | 138 | --- a/tests/regression/kernel/test_all_events |
139 | +++ b/tests/regression/kernel/test_all_events | 139 | +++ b/tests/regression/kernel/test_all_events |
140 | @@ -43,13 +43,7 @@ plan_tests $NUM_TESTS | 140 | @@ -43,13 +43,7 @@ plan_tests $NUM_TESTS |
@@ -153,7 +153,7 @@ index 2e20888df..044f9b65f 100755 | |||
153 | validate_lttng_modules_present | 153 | validate_lttng_modules_present |
154 | start_lttng_sessiond | 154 | start_lttng_sessiond |
155 | diff --git a/tests/regression/kernel/test_callstack b/tests/regression/kernel/test_callstack | 155 | diff --git a/tests/regression/kernel/test_callstack b/tests/regression/kernel/test_callstack |
156 | index a4477fd7c..d8d6b5e0f 100755 | 156 | index a4477fd..d8d6b5e 100755 |
157 | --- a/tests/regression/kernel/test_callstack | 157 | --- a/tests/regression/kernel/test_callstack |
158 | +++ b/tests/regression/kernel/test_callstack | 158 | +++ b/tests/regression/kernel/test_callstack |
159 | @@ -134,13 +134,7 @@ plan_tests $NUM_TESTS | 159 | @@ -134,13 +134,7 @@ plan_tests $NUM_TESTS |
@@ -172,7 +172,7 @@ index a4477fd7c..d8d6b5e0f 100755 | |||
172 | validate_lttng_modules_present | 172 | validate_lttng_modules_present |
173 | start_lttng_sessiond | 173 | start_lttng_sessiond |
174 | diff --git a/tests/regression/kernel/test_channel b/tests/regression/kernel/test_channel | 174 | diff --git a/tests/regression/kernel/test_channel b/tests/regression/kernel/test_channel |
175 | index 9cc74c4e8..4c377bd2a 100755 | 175 | index 9cc74c4..4c377bd 100755 |
176 | --- a/tests/regression/kernel/test_channel | 176 | --- a/tests/regression/kernel/test_channel |
177 | +++ b/tests/regression/kernel/test_channel | 177 | +++ b/tests/regression/kernel/test_channel |
178 | @@ -47,13 +47,7 @@ function test_channel_buffer_too_large() | 178 | @@ -47,13 +47,7 @@ function test_channel_buffer_too_large() |
@@ -191,7 +191,7 @@ index 9cc74c4e8..4c377bd2a 100755 | |||
191 | start_lttng_sessiond | 191 | start_lttng_sessiond |
192 | 192 | ||
193 | diff --git a/tests/regression/kernel/test_clock_override b/tests/regression/kernel/test_clock_override | 193 | diff --git a/tests/regression/kernel/test_clock_override b/tests/regression/kernel/test_clock_override |
194 | index 72892898b..48a3f926a 100755 | 194 | index 7289289..48a3f92 100755 |
195 | --- a/tests/regression/kernel/test_clock_override | 195 | --- a/tests/regression/kernel/test_clock_override |
196 | +++ b/tests/regression/kernel/test_clock_override | 196 | +++ b/tests/regression/kernel/test_clock_override |
197 | @@ -172,13 +172,7 @@ TESTS=( | 197 | @@ -172,13 +172,7 @@ TESTS=( |
@@ -210,7 +210,7 @@ index 72892898b..48a3f926a 100755 | |||
210 | validate_lttng_modules_present | 210 | validate_lttng_modules_present |
211 | trap signal_cleanup SIGTERM SIGINT | 211 | trap signal_cleanup SIGTERM SIGINT |
212 | diff --git a/tests/regression/kernel/test_event_basic b/tests/regression/kernel/test_event_basic | 212 | diff --git a/tests/regression/kernel/test_event_basic b/tests/regression/kernel/test_event_basic |
213 | index ac9ec0549..387e2f733 100755 | 213 | index ac9ec05..387e2f7 100755 |
214 | --- a/tests/regression/kernel/test_event_basic | 214 | --- a/tests/regression/kernel/test_event_basic |
215 | +++ b/tests/regression/kernel/test_event_basic | 215 | +++ b/tests/regression/kernel/test_event_basic |
216 | @@ -73,13 +73,7 @@ plan_tests $NUM_TESTS | 216 | @@ -73,13 +73,7 @@ plan_tests $NUM_TESTS |
@@ -229,7 +229,7 @@ index ac9ec0549..387e2f733 100755 | |||
229 | validate_lttng_modules_present | 229 | validate_lttng_modules_present |
230 | start_lttng_sessiond | 230 | start_lttng_sessiond |
231 | diff --git a/tests/regression/kernel/test_kernel_function b/tests/regression/kernel/test_kernel_function | 231 | diff --git a/tests/regression/kernel/test_kernel_function b/tests/regression/kernel/test_kernel_function |
232 | index b1d5491fc..ea16cdeef 100755 | 232 | index b1d5491..ea16cde 100755 |
233 | --- a/tests/regression/kernel/test_kernel_function | 233 | --- a/tests/regression/kernel/test_kernel_function |
234 | +++ b/tests/regression/kernel/test_kernel_function | 234 | +++ b/tests/regression/kernel/test_kernel_function |
235 | @@ -43,13 +43,7 @@ plan_tests $NUM_TESTS | 235 | @@ -43,13 +43,7 @@ plan_tests $NUM_TESTS |
@@ -248,7 +248,7 @@ index b1d5491fc..ea16cdeef 100755 | |||
248 | start_lttng_sessiond_notap | 248 | start_lttng_sessiond_notap |
249 | validate_lttng_modules_present | 249 | validate_lttng_modules_present |
250 | diff --git a/tests/regression/kernel/test_lttng_logger b/tests/regression/kernel/test_lttng_logger | 250 | diff --git a/tests/regression/kernel/test_lttng_logger b/tests/regression/kernel/test_lttng_logger |
251 | index b8f7ded82..00eaae823 100755 | 251 | index b8f7ded..00eaae8 100755 |
252 | --- a/tests/regression/kernel/test_lttng_logger | 252 | --- a/tests/regression/kernel/test_lttng_logger |
253 | +++ b/tests/regression/kernel/test_lttng_logger | 253 | +++ b/tests/regression/kernel/test_lttng_logger |
254 | @@ -110,13 +110,7 @@ plan_tests $NUM_TESTS | 254 | @@ -110,13 +110,7 @@ plan_tests $NUM_TESTS |
@@ -267,7 +267,7 @@ index b8f7ded82..00eaae823 100755 | |||
267 | validate_lttng_modules_present | 267 | validate_lttng_modules_present |
268 | start_lttng_sessiond | 268 | start_lttng_sessiond |
269 | diff --git a/tests/regression/kernel/test_ns_contexts b/tests/regression/kernel/test_ns_contexts | 269 | diff --git a/tests/regression/kernel/test_ns_contexts b/tests/regression/kernel/test_ns_contexts |
270 | index 0c8718d78..59e2568f6 100755 | 270 | index 7d447bc..1c71ea5 100755 |
271 | --- a/tests/regression/kernel/test_ns_contexts | 271 | --- a/tests/regression/kernel/test_ns_contexts |
272 | +++ b/tests/regression/kernel/test_ns_contexts | 272 | +++ b/tests/regression/kernel/test_ns_contexts |
273 | @@ -108,13 +108,7 @@ plan_tests $NUM_TESTS | 273 | @@ -108,13 +108,7 @@ plan_tests $NUM_TESTS |
@@ -286,7 +286,7 @@ index 0c8718d78..59e2568f6 100755 | |||
286 | system_has_ns=0 | 286 | system_has_ns=0 |
287 | if [ -d "/proc/$$/ns" ]; then | 287 | if [ -d "/proc/$$/ns" ]; then |
288 | diff --git a/tests/regression/kernel/test_ns_contexts_change b/tests/regression/kernel/test_ns_contexts_change | 288 | diff --git a/tests/regression/kernel/test_ns_contexts_change b/tests/regression/kernel/test_ns_contexts_change |
289 | index 42a61276b..3f5e4eeab 100755 | 289 | index 42a6127..3f5e4ee 100755 |
290 | --- a/tests/regression/kernel/test_ns_contexts_change | 290 | --- a/tests/regression/kernel/test_ns_contexts_change |
291 | +++ b/tests/regression/kernel/test_ns_contexts_change | 291 | +++ b/tests/regression/kernel/test_ns_contexts_change |
292 | @@ -162,14 +162,7 @@ plan_tests $NUM_TESTS | 292 | @@ -162,14 +162,7 @@ plan_tests $NUM_TESTS |
@@ -306,7 +306,7 @@ index 42a61276b..3f5e4eeab 100755 | |||
306 | system_has_ns=0 | 306 | system_has_ns=0 |
307 | if [ -d "/proc/$$/ns" ]; then | 307 | if [ -d "/proc/$$/ns" ]; then |
308 | diff --git a/tests/regression/kernel/test_rotation_destroy_flush b/tests/regression/kernel/test_rotation_destroy_flush | 308 | diff --git a/tests/regression/kernel/test_rotation_destroy_flush b/tests/regression/kernel/test_rotation_destroy_flush |
309 | index cb773d7df..0af514b49 100755 | 309 | index cb773d7..0af514b 100755 |
310 | --- a/tests/regression/kernel/test_rotation_destroy_flush | 310 | --- a/tests/regression/kernel/test_rotation_destroy_flush |
311 | +++ b/tests/regression/kernel/test_rotation_destroy_flush | 311 | +++ b/tests/regression/kernel/test_rotation_destroy_flush |
312 | @@ -120,13 +120,7 @@ TESTS=( | 312 | @@ -120,13 +120,7 @@ TESTS=( |
@@ -325,7 +325,7 @@ index cb773d7df..0af514b49 100755 | |||
325 | validate_lttng_modules_present | 325 | validate_lttng_modules_present |
326 | trap signal_cleanup SIGTERM SIGINT | 326 | trap signal_cleanup SIGTERM SIGINT |
327 | diff --git a/tests/regression/kernel/test_select_poll_epoll b/tests/regression/kernel/test_select_poll_epoll | 327 | diff --git a/tests/regression/kernel/test_select_poll_epoll b/tests/regression/kernel/test_select_poll_epoll |
328 | index d8245a0e7..20f0ef0ae 100755 | 328 | index d8245a0..20f0ef0 100755 |
329 | --- a/tests/regression/kernel/test_select_poll_epoll | 329 | --- a/tests/regression/kernel/test_select_poll_epoll |
330 | +++ b/tests/regression/kernel/test_select_poll_epoll | 330 | +++ b/tests/regression/kernel/test_select_poll_epoll |
331 | @@ -374,13 +374,7 @@ if test $? != 0; then | 331 | @@ -374,13 +374,7 @@ if test $? != 0; then |
@@ -344,7 +344,7 @@ index d8245a0e7..20f0ef0ae 100755 | |||
344 | validate_lttng_modules_present | 344 | validate_lttng_modules_present |
345 | 345 | ||
346 | diff --git a/tests/regression/kernel/test_syscall b/tests/regression/kernel/test_syscall | 346 | diff --git a/tests/regression/kernel/test_syscall b/tests/regression/kernel/test_syscall |
347 | index 401a18a8d..219d94703 100755 | 347 | index 401a18a..219d947 100755 |
348 | --- a/tests/regression/kernel/test_syscall | 348 | --- a/tests/regression/kernel/test_syscall |
349 | +++ b/tests/regression/kernel/test_syscall | 349 | +++ b/tests/regression/kernel/test_syscall |
350 | @@ -664,13 +664,7 @@ plan_tests $NUM_TESTS | 350 | @@ -664,13 +664,7 @@ plan_tests $NUM_TESTS |
@@ -363,7 +363,7 @@ index 401a18a8d..219d94703 100755 | |||
363 | validate_lttng_modules_present | 363 | validate_lttng_modules_present |
364 | start_lttng_sessiond | 364 | start_lttng_sessiond |
365 | diff --git a/tests/regression/kernel/test_userspace_probe b/tests/regression/kernel/test_userspace_probe | 365 | diff --git a/tests/regression/kernel/test_userspace_probe b/tests/regression/kernel/test_userspace_probe |
366 | index 1091ee65e..5d984d666 100755 | 366 | index 1091ee6..5d984d6 100755 |
367 | --- a/tests/regression/kernel/test_userspace_probe | 367 | --- a/tests/regression/kernel/test_userspace_probe |
368 | +++ b/tests/regression/kernel/test_userspace_probe | 368 | +++ b/tests/regression/kernel/test_userspace_probe |
369 | @@ -815,13 +815,7 @@ fi | 369 | @@ -815,13 +815,7 @@ fi |
@@ -382,7 +382,7 @@ index 1091ee65e..5d984d666 100755 | |||
382 | validate_lttng_modules_present | 382 | validate_lttng_modules_present |
383 | start_lttng_sessiond | 383 | start_lttng_sessiond |
384 | diff --git a/tests/regression/tools/clear/test_kernel b/tests/regression/tools/clear/test_kernel | 384 | diff --git a/tests/regression/tools/clear/test_kernel b/tests/regression/tools/clear/test_kernel |
385 | index 06fb1c368..48250a742 100755 | 385 | index 06fb1c3..48250a7 100755 |
386 | --- a/tests/regression/tools/clear/test_kernel | 386 | --- a/tests/regression/tools/clear/test_kernel |
387 | +++ b/tests/regression/tools/clear/test_kernel | 387 | +++ b/tests/regression/tools/clear/test_kernel |
388 | @@ -536,12 +536,6 @@ plan_tests $NUM_TESTS | 388 | @@ -536,12 +536,6 @@ plan_tests $NUM_TESTS |
@@ -408,7 +408,7 @@ index 06fb1c368..48250a742 100755 | |||
408 | trap signal_cleanup SIGTERM SIGINT | 408 | trap signal_cleanup SIGTERM SIGINT |
409 | 409 | ||
410 | diff --git a/tests/regression/tools/filtering/test_invalid_filter b/tests/regression/tools/filtering/test_invalid_filter | 410 | diff --git a/tests/regression/tools/filtering/test_invalid_filter b/tests/regression/tools/filtering/test_invalid_filter |
411 | index 7d9e524d9..8435e5546 100755 | 411 | index 7d9e524..8435e55 100755 |
412 | --- a/tests/regression/tools/filtering/test_invalid_filter | 412 | --- a/tests/regression/tools/filtering/test_invalid_filter |
413 | +++ b/tests/regression/tools/filtering/test_invalid_filter | 413 | +++ b/tests/regression/tools/filtering/test_invalid_filter |
414 | @@ -168,13 +168,7 @@ done | 414 | @@ -168,13 +168,7 @@ done |
@@ -427,7 +427,7 @@ index 7d9e524d9..8435e5546 100755 | |||
427 | diag "Test kernel filters" | 427 | diag "Test kernel filters" |
428 | i=0 | 428 | i=0 |
429 | diff --git a/tests/regression/tools/filtering/test_unsupported_op b/tests/regression/tools/filtering/test_unsupported_op | 429 | diff --git a/tests/regression/tools/filtering/test_unsupported_op b/tests/regression/tools/filtering/test_unsupported_op |
430 | index 299247a3c..91eb86d21 100755 | 430 | index 299247a..91eb86d 100755 |
431 | --- a/tests/regression/tools/filtering/test_unsupported_op | 431 | --- a/tests/regression/tools/filtering/test_unsupported_op |
432 | +++ b/tests/regression/tools/filtering/test_unsupported_op | 432 | +++ b/tests/regression/tools/filtering/test_unsupported_op |
433 | @@ -103,13 +103,7 @@ while [ "$i" -lt "$OP_COUNT" ]; do | 433 | @@ -103,13 +103,7 @@ while [ "$i" -lt "$OP_COUNT" ]; do |
@@ -446,7 +446,7 @@ index 299247a3c..91eb86d21 100755 | |||
446 | diag "Test kernel unsupported filter operations" | 446 | diag "Test kernel unsupported filter operations" |
447 | 447 | ||
448 | diff --git a/tests/regression/tools/filtering/test_valid_filter b/tests/regression/tools/filtering/test_valid_filter | 448 | diff --git a/tests/regression/tools/filtering/test_valid_filter b/tests/regression/tools/filtering/test_valid_filter |
449 | index e76ffa25f..1ba7c79bb 100755 | 449 | index e76ffa2..1ba7c79 100755 |
450 | --- a/tests/regression/tools/filtering/test_valid_filter | 450 | --- a/tests/regression/tools/filtering/test_valid_filter |
451 | +++ b/tests/regression/tools/filtering/test_valid_filter | 451 | +++ b/tests/regression/tools/filtering/test_valid_filter |
452 | @@ -1452,13 +1452,7 @@ KERNEL_FILTERS=( | 452 | @@ -1452,13 +1452,7 @@ KERNEL_FILTERS=( |
@@ -465,7 +465,7 @@ index e76ffa25f..1ba7c79bb 100755 | |||
465 | diag "Test kernel valid filters" | 465 | diag "Test kernel valid filters" |
466 | 466 | ||
467 | diff --git a/tests/regression/tools/health/test_health.sh b/tests/regression/tools/health/test_health.sh | 467 | diff --git a/tests/regression/tools/health/test_health.sh b/tests/regression/tools/health/test_health.sh |
468 | index b3d6419d2..68716e6b9 100644 | 468 | index b3d6419..68716e6 100644 |
469 | --- a/tests/regression/tools/health/test_health.sh | 469 | --- a/tests/regression/tools/health/test_health.sh |
470 | +++ b/tests/regression/tools/health/test_health.sh | 470 | +++ b/tests/regression/tools/health/test_health.sh |
471 | @@ -82,7 +82,7 @@ function test_health | 471 | @@ -82,7 +82,7 @@ function test_health |
@@ -500,7 +500,7 @@ index b3d6419d2..68716e6b9 100644 | |||
500 | i=0 | 500 | i=0 |
501 | while [ "$i" -lt "$THREAD_COUNT" ]; do | 501 | while [ "$i" -lt "$THREAD_COUNT" ]; do |
502 | diff --git a/tests/regression/tools/health/test_thread_ok b/tests/regression/tools/health/test_thread_ok | 502 | diff --git a/tests/regression/tools/health/test_thread_ok b/tests/regression/tools/health/test_thread_ok |
503 | index e84adb611..e5e23543f 100755 | 503 | index e84adb6..e5e2354 100755 |
504 | --- a/tests/regression/tools/health/test_thread_ok | 504 | --- a/tests/regression/tools/health/test_thread_ok |
505 | +++ b/tests/regression/tools/health/test_thread_ok | 505 | +++ b/tests/regression/tools/health/test_thread_ok |
506 | @@ -67,7 +67,7 @@ function test_thread_ok | 506 | @@ -67,7 +67,7 @@ function test_thread_ok |
@@ -527,7 +527,7 @@ index e84adb611..e5e23543f 100755 | |||
527 | 527 | ||
528 | rm -rf ${HEALTH_PATH} | 528 | rm -rf ${HEALTH_PATH} |
529 | diff --git a/tests/regression/tools/live/test_kernel b/tests/regression/tools/live/test_kernel | 529 | diff --git a/tests/regression/tools/live/test_kernel b/tests/regression/tools/live/test_kernel |
530 | index b622b5214..fdaa09f0d 100755 | 530 | index b622b52..fdaa09f 100755 |
531 | --- a/tests/regression/tools/live/test_kernel | 531 | --- a/tests/regression/tools/live/test_kernel |
532 | +++ b/tests/regression/tools/live/test_kernel | 532 | +++ b/tests/regression/tools/live/test_kernel |
533 | @@ -39,13 +39,11 @@ function clean_live_tracing() | 533 | @@ -39,13 +39,11 @@ function clean_live_tracing() |
@@ -549,7 +549,7 @@ index b622b5214..fdaa09f0d 100755 | |||
549 | modprobe lttng-test | 549 | modprobe lttng-test |
550 | 550 | ||
551 | diff --git a/tests/regression/tools/live/test_lttng_kernel b/tests/regression/tools/live/test_lttng_kernel | 551 | diff --git a/tests/regression/tools/live/test_lttng_kernel b/tests/regression/tools/live/test_lttng_kernel |
552 | index a23d9373a..1b933648f 100755 | 552 | index a23d937..1b93364 100755 |
553 | --- a/tests/regression/tools/live/test_lttng_kernel | 553 | --- a/tests/regression/tools/live/test_lttng_kernel |
554 | +++ b/tests/regression/tools/live/test_lttng_kernel | 554 | +++ b/tests/regression/tools/live/test_lttng_kernel |
555 | @@ -45,13 +45,7 @@ function clean_live_tracing() | 555 | @@ -45,13 +45,7 @@ function clean_live_tracing() |
@@ -568,7 +568,7 @@ index a23d9373a..1b933648f 100755 | |||
568 | modprobe lttng-test | 568 | modprobe lttng-test |
569 | 569 | ||
570 | diff --git a/tests/regression/tools/metadata/test_kernel b/tests/regression/tools/metadata/test_kernel | 570 | diff --git a/tests/regression/tools/metadata/test_kernel b/tests/regression/tools/metadata/test_kernel |
571 | index 57cace6ea..26e95d93a 100755 | 571 | index 57cace6..26e95d9 100755 |
572 | --- a/tests/regression/tools/metadata/test_kernel | 572 | --- a/tests/regression/tools/metadata/test_kernel |
573 | +++ b/tests/regression/tools/metadata/test_kernel | 573 | +++ b/tests/regression/tools/metadata/test_kernel |
574 | @@ -91,13 +91,7 @@ plan_tests $NUM_TESTS | 574 | @@ -91,13 +91,7 @@ plan_tests $NUM_TESTS |
@@ -587,7 +587,7 @@ index 57cace6ea..26e95d93a 100755 | |||
587 | validate_lttng_modules_present | 587 | validate_lttng_modules_present |
588 | modprobe lttng-test | 588 | modprobe lttng-test |
589 | diff --git a/tests/regression/tools/notification/test_notification_kernel_buffer_usage b/tests/regression/tools/notification/test_notification_kernel_buffer_usage | 589 | diff --git a/tests/regression/tools/notification/test_notification_kernel_buffer_usage b/tests/regression/tools/notification/test_notification_kernel_buffer_usage |
590 | index 76e69a77e..8fdaabb3e 100755 | 590 | index 76e69a7..8fdaabb 100755 |
591 | --- a/tests/regression/tools/notification/test_notification_kernel_buffer_usage | 591 | --- a/tests/regression/tools/notification/test_notification_kernel_buffer_usage |
592 | +++ b/tests/regression/tools/notification/test_notification_kernel_buffer_usage | 592 | +++ b/tests/regression/tools/notification/test_notification_kernel_buffer_usage |
593 | @@ -60,29 +60,27 @@ function test_buffer_usage_notification | 593 | @@ -60,29 +60,27 @@ function test_buffer_usage_notification |
@@ -638,7 +638,7 @@ index 76e69a77e..8fdaabb3e 100755 | |||
638 | +rm -rf "${consumerd_pipe[@]}" 2> /dev/null | 638 | +rm -rf "${consumerd_pipe[@]}" 2> /dev/null |
639 | rm -rf "$TEST_TMPDIR" | 639 | rm -rf "$TEST_TMPDIR" |
640 | diff --git a/tests/regression/tools/notification/test_notification_kernel_capture b/tests/regression/tools/notification/test_notification_kernel_capture | 640 | diff --git a/tests/regression/tools/notification/test_notification_kernel_capture b/tests/regression/tools/notification/test_notification_kernel_capture |
641 | index 88f123d3d..0f8a2bc6f 100755 | 641 | index 88f123d..0f8a2bc 100755 |
642 | --- a/tests/regression/tools/notification/test_notification_kernel_capture | 642 | --- a/tests/regression/tools/notification/test_notification_kernel_capture |
643 | +++ b/tests/regression/tools/notification/test_notification_kernel_capture | 643 | +++ b/tests/regression/tools/notification/test_notification_kernel_capture |
644 | @@ -31,22 +31,21 @@ function test_basic_error_path | 644 | @@ -31,22 +31,21 @@ function test_basic_error_path |
@@ -676,7 +676,7 @@ index 88f123d3d..0f8a2bc6f 100755 | |||
676 | 676 | ||
677 | rm -f "$TESTAPP_STATE_PATH" | 677 | rm -f "$TESTAPP_STATE_PATH" |
678 | diff --git a/tests/regression/tools/notification/test_notification_kernel_error b/tests/regression/tools/notification/test_notification_kernel_error | 678 | diff --git a/tests/regression/tools/notification/test_notification_kernel_error b/tests/regression/tools/notification/test_notification_kernel_error |
679 | index 80fe6e5b5..b757ec2b4 100755 | 679 | index 80fe6e5..b757ec2 100755 |
680 | --- a/tests/regression/tools/notification/test_notification_kernel_error | 680 | --- a/tests/regression/tools/notification/test_notification_kernel_error |
681 | +++ b/tests/regression/tools/notification/test_notification_kernel_error | 681 | +++ b/tests/regression/tools/notification/test_notification_kernel_error |
682 | @@ -30,23 +30,22 @@ function test_basic_error_path | 682 | @@ -30,23 +30,22 @@ function test_basic_error_path |
@@ -715,7 +715,7 @@ index 80fe6e5b5..b757ec2b4 100755 | |||
715 | 715 | ||
716 | rm -f "$TESTAPP_STATE_PATH" | 716 | rm -f "$TESTAPP_STATE_PATH" |
717 | diff --git a/tests/regression/tools/notification/test_notification_kernel_instrumentation b/tests/regression/tools/notification/test_notification_kernel_instrumentation | 717 | diff --git a/tests/regression/tools/notification/test_notification_kernel_instrumentation b/tests/regression/tools/notification/test_notification_kernel_instrumentation |
718 | index 90545a541..705f7703d 100755 | 718 | index 90545a5..705f770 100755 |
719 | --- a/tests/regression/tools/notification/test_notification_kernel_instrumentation | 719 | --- a/tests/regression/tools/notification/test_notification_kernel_instrumentation |
720 | +++ b/tests/regression/tools/notification/test_notification_kernel_instrumentation | 720 | +++ b/tests/regression/tools/notification/test_notification_kernel_instrumentation |
721 | @@ -28,22 +28,21 @@ function test_kernel_instrumentation_notification | 721 | @@ -28,22 +28,21 @@ function test_kernel_instrumentation_notification |
@@ -753,7 +753,7 @@ index 90545a541..705f7703d 100755 | |||
753 | 753 | ||
754 | rm -f "$TESTAPP_STATE_PATH" | 754 | rm -f "$TESTAPP_STATE_PATH" |
755 | diff --git a/tests/regression/tools/notification/test_notification_kernel_syscall b/tests/regression/tools/notification/test_notification_kernel_syscall | 755 | diff --git a/tests/regression/tools/notification/test_notification_kernel_syscall b/tests/regression/tools/notification/test_notification_kernel_syscall |
756 | index d273cb55d..7fa235388 100755 | 756 | index d273cb5..7fa2353 100755 |
757 | --- a/tests/regression/tools/notification/test_notification_kernel_syscall | 757 | --- a/tests/regression/tools/notification/test_notification_kernel_syscall |
758 | +++ b/tests/regression/tools/notification/test_notification_kernel_syscall | 758 | +++ b/tests/regression/tools/notification/test_notification_kernel_syscall |
759 | @@ -31,19 +31,18 @@ function test_kernel_syscall_notification | 759 | @@ -31,19 +31,18 @@ function test_kernel_syscall_notification |
@@ -786,7 +786,7 @@ index d273cb55d..7fa235388 100755 | |||
786 | 786 | ||
787 | rm -f "$TESTAPP_STATE_PATH" | 787 | rm -f "$TESTAPP_STATE_PATH" |
788 | diff --git a/tests/regression/tools/notification/test_notification_kernel_userspace_probe b/tests/regression/tools/notification/test_notification_kernel_userspace_probe | 788 | diff --git a/tests/regression/tools/notification/test_notification_kernel_userspace_probe b/tests/regression/tools/notification/test_notification_kernel_userspace_probe |
789 | index 8ef8d708d..abddd9be7 100755 | 789 | index 8ef8d70..abddd9b 100755 |
790 | --- a/tests/regression/tools/notification/test_notification_kernel_userspace_probe | 790 | --- a/tests/regression/tools/notification/test_notification_kernel_userspace_probe |
791 | +++ b/tests/regression/tools/notification/test_notification_kernel_userspace_probe | 791 | +++ b/tests/regression/tools/notification/test_notification_kernel_userspace_probe |
792 | @@ -29,18 +29,18 @@ function test_kernel_userspace_probe_notification | 792 | @@ -29,18 +29,18 @@ function test_kernel_userspace_probe_notification |
@@ -819,7 +819,7 @@ index 8ef8d708d..abddd9be7 100755 | |||
819 | 819 | ||
820 | rm -f "$TESTAPP_STATE_PATH" | 820 | rm -f "$TESTAPP_STATE_PATH" |
821 | diff --git a/tests/regression/tools/notification/test_notification_multi_app b/tests/regression/tools/notification/test_notification_multi_app | 821 | diff --git a/tests/regression/tools/notification/test_notification_multi_app b/tests/regression/tools/notification/test_notification_multi_app |
822 | index d8b639225..61891b56f 100755 | 822 | index d8b6392..61891b5 100755 |
823 | --- a/tests/regression/tools/notification/test_notification_multi_app | 823 | --- a/tests/regression/tools/notification/test_notification_multi_app |
824 | +++ b/tests/regression/tools/notification/test_notification_multi_app | 824 | +++ b/tests/regression/tools/notification/test_notification_multi_app |
825 | @@ -411,22 +411,18 @@ function test_on_register_evaluation () | 825 | @@ -411,22 +411,18 @@ function test_on_register_evaluation () |
@@ -851,10 +851,10 @@ index d8b639225..61891b56f 100755 | |||
851 | for fct_test in ${TESTS[@]}; | 851 | for fct_test in ${TESTS[@]}; |
852 | do | 852 | do |
853 | diff --git a/tests/regression/tools/notification/test_notification_notifier_discarded_count b/tests/regression/tools/notification/test_notification_notifier_discarded_count | 853 | diff --git a/tests/regression/tools/notification/test_notification_notifier_discarded_count b/tests/regression/tools/notification/test_notification_notifier_discarded_count |
854 | index c9235393e..a6c31a728 100755 | 854 | index 9850b49..778d37d 100755 |
855 | --- a/tests/regression/tools/notification/test_notification_notifier_discarded_count | 855 | --- a/tests/regression/tools/notification/test_notification_notifier_discarded_count |
856 | +++ b/tests/regression/tools/notification/test_notification_notifier_discarded_count | 856 | +++ b/tests/regression/tools/notification/test_notification_notifier_discarded_count |
857 | @@ -391,7 +391,8 @@ function test_ust_notifier_discarded_regardless_trigger_owner | 857 | @@ -376,7 +376,8 @@ function test_ust_notifier_discarded_regardless_trigger_owner |
858 | test_ust_notifier_discarded_count | 858 | test_ust_notifier_discarded_count |
859 | test_ust_notifier_discarded_count_max_bucket | 859 | test_ust_notifier_discarded_count_max_bucket |
860 | 860 | ||
@@ -864,7 +864,7 @@ index c9235393e..a6c31a728 100755 | |||
864 | 864 | ||
865 | validate_lttng_modules_present | 865 | validate_lttng_modules_present |
866 | 866 | ||
867 | @@ -413,9 +414,7 @@ if [ "$(id -u)" == "0" ]; then | 867 | @@ -398,9 +399,7 @@ if [ "$(id -u)" == "0" ]; then |
868 | modprobe --remove lttng-test | 868 | modprobe --remove lttng-test |
869 | 869 | ||
870 | rm -rf "${sessiond_pipe[@]}" 2> /dev/null | 870 | rm -rf "${sessiond_pipe[@]}" 2> /dev/null |
@@ -877,7 +877,7 @@ index c9235393e..a6c31a728 100755 | |||
877 | 877 | ||
878 | rm -rf "$TEST_TMPDIR" | 878 | rm -rf "$TEST_TMPDIR" |
879 | diff --git a/tests/regression/tools/regen-metadata/test_kernel b/tests/regression/tools/regen-metadata/test_kernel | 879 | diff --git a/tests/regression/tools/regen-metadata/test_kernel b/tests/regression/tools/regen-metadata/test_kernel |
880 | index 49eea32a7..555a4e2ce 100755 | 880 | index 49eea32..555a4e2 100755 |
881 | --- a/tests/regression/tools/regen-metadata/test_kernel | 881 | --- a/tests/regression/tools/regen-metadata/test_kernel |
882 | +++ b/tests/regression/tools/regen-metadata/test_kernel | 882 | +++ b/tests/regression/tools/regen-metadata/test_kernel |
883 | @@ -99,13 +99,7 @@ plan_tests $NUM_TESTS | 883 | @@ -99,13 +99,7 @@ plan_tests $NUM_TESTS |
@@ -896,7 +896,7 @@ index 49eea32a7..555a4e2ce 100755 | |||
896 | validate_lttng_modules_present | 896 | validate_lttng_modules_present |
897 | 897 | ||
898 | diff --git a/tests/regression/tools/regen-statedump/test_kernel b/tests/regression/tools/regen-statedump/test_kernel | 898 | diff --git a/tests/regression/tools/regen-statedump/test_kernel b/tests/regression/tools/regen-statedump/test_kernel |
899 | index 8a261355d..bbbac3942 100755 | 899 | index 8a26135..bbbac39 100755 |
900 | --- a/tests/regression/tools/regen-statedump/test_kernel | 900 | --- a/tests/regression/tools/regen-statedump/test_kernel |
901 | +++ b/tests/regression/tools/regen-statedump/test_kernel | 901 | +++ b/tests/regression/tools/regen-statedump/test_kernel |
902 | @@ -39,13 +39,7 @@ plan_tests $NUM_TESTS | 902 | @@ -39,13 +39,7 @@ plan_tests $NUM_TESTS |
@@ -915,7 +915,7 @@ index 8a261355d..bbbac3942 100755 | |||
915 | validate_lttng_modules_present | 915 | validate_lttng_modules_present |
916 | start_lttng_sessiond | 916 | start_lttng_sessiond |
917 | diff --git a/tests/regression/tools/rotation/test_kernel b/tests/regression/tools/rotation/test_kernel | 917 | diff --git a/tests/regression/tools/rotation/test_kernel b/tests/regression/tools/rotation/test_kernel |
918 | index f5f1f5553..efe3fd359 100755 | 918 | index f5f1f55..efe3fd3 100755 |
919 | --- a/tests/regression/tools/rotation/test_kernel | 919 | --- a/tests/regression/tools/rotation/test_kernel |
920 | +++ b/tests/regression/tools/rotation/test_kernel | 920 | +++ b/tests/regression/tools/rotation/test_kernel |
921 | @@ -82,13 +82,7 @@ plan_tests $NUM_TESTS | 921 | @@ -82,13 +82,7 @@ plan_tests $NUM_TESTS |
@@ -934,7 +934,7 @@ index f5f1f5553..efe3fd359 100755 | |||
934 | validate_lttng_modules_present | 934 | validate_lttng_modules_present |
935 | 935 | ||
936 | diff --git a/tests/regression/tools/snapshots/test_kernel b/tests/regression/tools/snapshots/test_kernel | 936 | diff --git a/tests/regression/tools/snapshots/test_kernel b/tests/regression/tools/snapshots/test_kernel |
937 | index abb243563..d91876867 100755 | 937 | index abb2435..d918768 100755 |
938 | --- a/tests/regression/tools/snapshots/test_kernel | 938 | --- a/tests/regression/tools/snapshots/test_kernel |
939 | +++ b/tests/regression/tools/snapshots/test_kernel | 939 | +++ b/tests/regression/tools/snapshots/test_kernel |
940 | @@ -217,13 +217,7 @@ plan_tests $NUM_TESTS | 940 | @@ -217,13 +217,7 @@ plan_tests $NUM_TESTS |
@@ -953,7 +953,7 @@ index abb243563..d91876867 100755 | |||
953 | 953 | ||
954 | validate_lttng_modules_present | 954 | validate_lttng_modules_present |
955 | diff --git a/tests/regression/tools/snapshots/test_kernel_streaming b/tests/regression/tools/snapshots/test_kernel_streaming | 955 | diff --git a/tests/regression/tools/snapshots/test_kernel_streaming b/tests/regression/tools/snapshots/test_kernel_streaming |
956 | index 0c92dc710..dd965afee 100755 | 956 | index 0c92dc7..dd965af 100755 |
957 | --- a/tests/regression/tools/snapshots/test_kernel_streaming | 957 | --- a/tests/regression/tools/snapshots/test_kernel_streaming |
958 | +++ b/tests/regression/tools/snapshots/test_kernel_streaming | 958 | +++ b/tests/regression/tools/snapshots/test_kernel_streaming |
959 | @@ -145,13 +145,7 @@ plan_tests $NUM_TESTS | 959 | @@ -145,13 +145,7 @@ plan_tests $NUM_TESTS |
@@ -972,7 +972,7 @@ index 0c92dc710..dd965afee 100755 | |||
972 | validate_lttng_modules_present | 972 | validate_lttng_modules_present |
973 | 973 | ||
974 | diff --git a/tests/regression/tools/streaming/test_high_throughput_limits b/tests/regression/tools/streaming/test_high_throughput_limits | 974 | diff --git a/tests/regression/tools/streaming/test_high_throughput_limits b/tests/regression/tools/streaming/test_high_throughput_limits |
975 | index 2b9e3ad39..c55d51098 100755 | 975 | index 2b9e3ad..c55d510 100755 |
976 | --- a/tests/regression/tools/streaming/test_high_throughput_limits | 976 | --- a/tests/regression/tools/streaming/test_high_throughput_limits |
977 | +++ b/tests/regression/tools/streaming/test_high_throughput_limits | 977 | +++ b/tests/regression/tools/streaming/test_high_throughput_limits |
978 | @@ -170,13 +170,7 @@ plan_tests $NUM_TESTS | 978 | @@ -170,13 +170,7 @@ plan_tests $NUM_TESTS |
@@ -991,7 +991,7 @@ index 2b9e3ad39..c55d51098 100755 | |||
991 | 991 | ||
992 | # Catch sigint and try to cleanup limits | 992 | # Catch sigint and try to cleanup limits |
993 | diff --git a/tests/regression/tools/streaming/test_kernel b/tests/regression/tools/streaming/test_kernel | 993 | diff --git a/tests/regression/tools/streaming/test_kernel b/tests/regression/tools/streaming/test_kernel |
994 | index 33334229f..113eea7bf 100755 | 994 | index 3333422..113eea7 100755 |
995 | --- a/tests/regression/tools/streaming/test_kernel | 995 | --- a/tests/regression/tools/streaming/test_kernel |
996 | +++ b/tests/regression/tools/streaming/test_kernel | 996 | +++ b/tests/regression/tools/streaming/test_kernel |
997 | @@ -47,13 +47,7 @@ plan_tests $NUM_TESTS | 997 | @@ -47,13 +47,7 @@ plan_tests $NUM_TESTS |
@@ -1010,7 +1010,7 @@ index 33334229f..113eea7bf 100755 | |||
1010 | validate_lttng_modules_present | 1010 | validate_lttng_modules_present |
1011 | 1011 | ||
1012 | diff --git a/tests/regression/tools/tracker/test_event_tracker b/tests/regression/tools/tracker/test_event_tracker | 1012 | diff --git a/tests/regression/tools/tracker/test_event_tracker b/tests/regression/tools/tracker/test_event_tracker |
1013 | index cc0f698d2..de0c79d36 100755 | 1013 | index cc0f698..de0c79d 100755 |
1014 | --- a/tests/regression/tools/tracker/test_event_tracker | 1014 | --- a/tests/regression/tools/tracker/test_event_tracker |
1015 | +++ b/tests/regression/tools/tracker/test_event_tracker | 1015 | +++ b/tests/regression/tools/tracker/test_event_tracker |
1016 | @@ -466,13 +466,7 @@ test_event_track_untrack ust 0 "${EVENT_NAME}" "--pid --all" # backward compat | 1016 | @@ -466,13 +466,7 @@ test_event_track_untrack ust 0 "${EVENT_NAME}" "--pid --all" # backward compat |
@@ -1029,7 +1029,7 @@ index cc0f698d2..de0c79d36 100755 | |||
1029 | diag "Test kernel tracker" | 1029 | diag "Test kernel tracker" |
1030 | 1030 | ||
1031 | diff --git a/tests/regression/tools/trigger/test_add_trigger_cli b/tests/regression/tools/trigger/test_add_trigger_cli | 1031 | diff --git a/tests/regression/tools/trigger/test_add_trigger_cli b/tests/regression/tools/trigger/test_add_trigger_cli |
1032 | index 98ecf6272..d1763aa2e 100755 | 1032 | index 98ecf62..d1763aa 100755 |
1033 | --- a/tests/regression/tools/trigger/test_add_trigger_cli | 1033 | --- a/tests/regression/tools/trigger/test_add_trigger_cli |
1034 | +++ b/tests/regression/tools/trigger/test_add_trigger_cli | 1034 | +++ b/tests/regression/tools/trigger/test_add_trigger_cli |
1035 | @@ -34,12 +34,6 @@ tmp_stdout=$(mktemp --tmpdir -t test_parse_cli_trigger_stdout.XXXXXX) | 1035 | @@ -34,12 +34,6 @@ tmp_stdout=$(mktemp --tmpdir -t test_parse_cli_trigger_stdout.XXXXXX) |
@@ -1073,7 +1073,7 @@ index 98ecf6272..d1763aa2e 100755 | |||
1073 | --name="syscall-trigger-0" \ | 1073 | --name="syscall-trigger-0" \ |
1074 | --condition event-rule-matches --type=syscall --name=open \ | 1074 | --condition event-rule-matches --type=syscall --name=open \ |
1075 | diff --git a/tests/regression/tools/trigger/test_list_triggers_cli b/tests/regression/tools/trigger/test_list_triggers_cli | 1075 | diff --git a/tests/regression/tools/trigger/test_list_triggers_cli b/tests/regression/tools/trigger/test_list_triggers_cli |
1076 | index a04018013..02c3de3e9 100755 | 1076 | index 2574e15..652a08c 100755 |
1077 | --- a/tests/regression/tools/trigger/test_list_triggers_cli | 1077 | --- a/tests/regression/tools/trigger/test_list_triggers_cli |
1078 | +++ b/tests/regression/tools/trigger/test_list_triggers_cli | 1078 | +++ b/tests/regression/tools/trigger/test_list_triggers_cli |
1079 | @@ -36,22 +36,12 @@ uprobe_sdt_binary=$(realpath "${TESTDIR}/utils/testapp/userspace-probe-sdt-binar | 1079 | @@ -36,22 +36,12 @@ uprobe_sdt_binary=$(realpath "${TESTDIR}/utils/testapp/userspace-probe-sdt-binar |
@@ -1120,7 +1120,7 @@ index a04018013..02c3de3e9 100755 | |||
1120 | test_buffer_usage_conditions | 1120 | test_buffer_usage_conditions |
1121 | test_session_rotation_conditions | 1121 | test_session_rotation_conditions |
1122 | diff --git a/tests/regression/tools/wildcard/test_event_wildcard b/tests/regression/tools/wildcard/test_event_wildcard | 1122 | diff --git a/tests/regression/tools/wildcard/test_event_wildcard b/tests/regression/tools/wildcard/test_event_wildcard |
1123 | index f69baffc4..14d9bb88a 100755 | 1123 | index f69baff..14d9bb8 100755 |
1124 | --- a/tests/regression/tools/wildcard/test_event_wildcard | 1124 | --- a/tests/regression/tools/wildcard/test_event_wildcard |
1125 | +++ b/tests/regression/tools/wildcard/test_event_wildcard | 1125 | +++ b/tests/regression/tools/wildcard/test_event_wildcard |
1126 | @@ -124,13 +124,7 @@ test_event_wildcard ust 1 'tp*tptest' | 1126 | @@ -124,13 +124,7 @@ test_event_wildcard ust 1 'tp*tptest' |
@@ -1139,7 +1139,7 @@ index f69baffc4..14d9bb88a 100755 | |||
1139 | diag "Test kernel wildcards" | 1139 | diag "Test kernel wildcards" |
1140 | 1140 | ||
1141 | diff --git a/tests/regression/tools/working-directory/test_relayd_working_directory b/tests/regression/tools/working-directory/test_relayd_working_directory | 1141 | diff --git a/tests/regression/tools/working-directory/test_relayd_working_directory b/tests/regression/tools/working-directory/test_relayd_working_directory |
1142 | index c7e784cca..6bd1e504a 100755 | 1142 | index c7e784c..6bd1e50 100755 |
1143 | --- a/tests/regression/tools/working-directory/test_relayd_working_directory | 1143 | --- a/tests/regression/tools/working-directory/test_relayd_working_directory |
1144 | +++ b/tests/regression/tools/working-directory/test_relayd_working_directory | 1144 | +++ b/tests/regression/tools/working-directory/test_relayd_working_directory |
1145 | @@ -145,9 +145,9 @@ function test_relayd_debug_permission() | 1145 | @@ -145,9 +145,9 @@ function test_relayd_debug_permission() |
@@ -1155,7 +1155,7 @@ index c7e784cca..6bd1e504a 100755 | |||
1155 | 1155 | ||
1156 | skip $is_user "Skipping permission debug output test; operation can't fail as root" 6 || | 1156 | skip $is_user "Skipping permission debug output test; operation can't fail as root" 6 || |
1157 | diff --git a/tests/regression/ust/namespaces/test_ns_contexts_change b/tests/regression/ust/namespaces/test_ns_contexts_change | 1157 | diff --git a/tests/regression/ust/namespaces/test_ns_contexts_change b/tests/regression/ust/namespaces/test_ns_contexts_change |
1158 | index 8a4b62ce3..622241f7b 100755 | 1158 | index 8a4b62c..622241f 100755 |
1159 | --- a/tests/regression/ust/namespaces/test_ns_contexts_change | 1159 | --- a/tests/regression/ust/namespaces/test_ns_contexts_change |
1160 | +++ b/tests/regression/ust/namespaces/test_ns_contexts_change | 1160 | +++ b/tests/regression/ust/namespaces/test_ns_contexts_change |
1161 | @@ -101,12 +101,7 @@ plan_tests $NUM_TESTS | 1161 | @@ -101,12 +101,7 @@ plan_tests $NUM_TESTS |
@@ -1173,7 +1173,7 @@ index 8a4b62ce3..622241f7b 100755 | |||
1173 | system_has_ns=0 | 1173 | system_has_ns=0 |
1174 | if [ -d "/proc/$$/ns" ]; then | 1174 | if [ -d "/proc/$$/ns" ]; then |
1175 | diff --git a/tests/regression/ust/test_event_perf b/tests/regression/ust/test_event_perf | 1175 | diff --git a/tests/regression/ust/test_event_perf b/tests/regression/ust/test_event_perf |
1176 | index 33aab2981..178959a19 100755 | 1176 | index 33aab29..178959a 100755 |
1177 | --- a/tests/regression/ust/test_event_perf | 1177 | --- a/tests/regression/ust/test_event_perf |
1178 | +++ b/tests/regression/ust/test_event_perf | 1178 | +++ b/tests/regression/ust/test_event_perf |
1179 | @@ -119,17 +119,11 @@ plan_tests $NUM_TESTS | 1179 | @@ -119,17 +119,11 @@ plan_tests $NUM_TESTS |
@@ -1196,10 +1196,10 @@ index 33aab2981..178959a19 100755 | |||
1196 | test_event_basic | 1196 | test_event_basic |
1197 | } | 1197 | } |
1198 | diff --git a/tests/utils/utils.sh b/tests/utils/utils.sh | 1198 | diff --git a/tests/utils/utils.sh b/tests/utils/utils.sh |
1199 | index faa87e783..da0e0569d 100644 | 1199 | index 35633fa..b6783ef 100644 |
1200 | --- a/tests/utils/utils.sh | 1200 | --- a/tests/utils/utils.sh |
1201 | +++ b/tests/utils/utils.sh | 1201 | +++ b/tests/utils/utils.sh |
1202 | @@ -318,6 +318,41 @@ function conf_proc_count() | 1202 | @@ -329,6 +329,41 @@ function conf_proc_count() |
1203 | echo | 1203 | echo |
1204 | } | 1204 | } |
1205 | 1205 | ||
@@ -1241,6 +1241,3 @@ index faa87e783..da0e0569d 100644 | |||
1241 | # Check if base lttng-modules are present. | 1241 | # Check if base lttng-modules are present. |
1242 | # Bail out on failure | 1242 | # Bail out on failure |
1243 | function validate_lttng_modules_present () | 1243 | function validate_lttng_modules_present () |
1244 | -- | ||
1245 | 2.25.1 | ||
1246 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/0001-tests-do-not-strip-a-helper-library.patch b/meta/recipes-kernel/lttng/lttng-tools/0001-tests-do-not-strip-a-helper-library.patch index 2d08b08879..84c02a02cf 100644 --- a/meta/recipes-kernel/lttng/lttng-tools/0001-tests-do-not-strip-a-helper-library.patch +++ b/meta/recipes-kernel/lttng/lttng-tools/0001-tests-do-not-strip-a-helper-library.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From ab238c213fac190972f55e73cf3e0bb1c7846eb8 Mon Sep 17 00:00:00 2001 | 1 | From 3f1f1dc868accca37d2f276ed741884698b38538 Mon Sep 17 00:00:00 2001 |
2 | From: Alexander Kanavin <alex.kanavin@gmail.com> | 2 | From: Alexander Kanavin <alex.kanavin@gmail.com> |
3 | Date: Thu, 12 Dec 2019 16:52:07 +0100 | 3 | Date: Thu, 12 Dec 2019 16:52:07 +0100 |
4 | Subject: [PATCH] tests: do not strip a helper library | 4 | Subject: [PATCH] tests: do not strip a helper library |
@@ -10,10 +10,10 @@ Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com> | |||
10 | 1 file changed, 1 insertion(+), 1 deletion(-) | 10 | 1 file changed, 1 insertion(+), 1 deletion(-) |
11 | 11 | ||
12 | diff --git a/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am b/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am | 12 | diff --git a/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am b/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am |
13 | index 03f5d5a..d12c343 100644 | 13 | index 836f13e..e19a554 100644 |
14 | --- a/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am | 14 | --- a/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am |
15 | +++ b/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am | 15 | +++ b/tests/utils/testapp/userspace-probe-elf-binary/Makefile.am |
16 | @@ -12,7 +12,7 @@ userspace_probe_elf_binary_LDADD = libfoo.la | 16 | @@ -14,7 +14,7 @@ userspace_probe_elf_binary_LDADD = libfoo.la |
17 | libfoo.strip: libfoo.la | 17 | libfoo.strip: libfoo.la |
18 | $(OBJCOPY) --strip-all .libs/libfoo.so | 18 | $(OBJCOPY) --strip-all .libs/libfoo.so |
19 | 19 | ||
@@ -22,6 +22,3 @@ index 03f5d5a..d12c343 100644 | |||
22 | @if [ x"$(srcdir)" != x"$(builddir)" ]; then \ | 22 | @if [ x"$(srcdir)" != x"$(builddir)" ]; then \ |
23 | for script in $(EXTRA_DIST); do \ | 23 | for script in $(EXTRA_DIST); do \ |
24 | cp -f $(srcdir)/$$script $(builddir); \ | 24 | cp -f $(srcdir)/$$script $(builddir); \ |
25 | -- | ||
26 | 2.17.1 | ||
27 | |||
diff --git a/meta/recipes-kernel/lttng/lttng-tools/disable-tests.patch b/meta/recipes-kernel/lttng/lttng-tools/disable-tests.patch index 3a77ea2e43..b8971a69de 100644 --- a/meta/recipes-kernel/lttng/lttng-tools/disable-tests.patch +++ b/meta/recipes-kernel/lttng/lttng-tools/disable-tests.patch | |||
@@ -1,3 +1,8 @@ | |||
1 | From 1fbd24512e8fce64b92efa846c301e45a7371ed2 Mon Sep 17 00:00:00 2001 | ||
2 | From: Richard Purdie <richard.purdie@linuxfoundation.org> | ||
3 | Date: Tue, 14 Dec 2021 12:34:04 +0000 | ||
4 | Subject: [PATCH] lttng-tools: Disable problem tests | ||
5 | |||
1 | Upstream-Status: Inappropriate [need to root cause the test hangs] | 6 | Upstream-Status: Inappropriate [need to root cause the test hangs] |
2 | 7 | ||
3 | We keep seeing hangs in the tools/notifications tests on x86 and arm for | 8 | We keep seeing hangs in the tools/notifications tests on x86 and arm for |
@@ -8,11 +13,14 @@ of them. | |||
8 | https://bugzilla.yoctoproject.org/show_bug.cgi?id=14263 | 13 | https://bugzilla.yoctoproject.org/show_bug.cgi?id=14263 |
9 | 14 | ||
10 | Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> | 15 | Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> |
16 | --- | ||
17 | tests/regression/Makefile.am | 12 ------------ | ||
18 | 1 file changed, 12 deletions(-) | ||
11 | 19 | ||
12 | Index: lttng-tools-2.13.1/tests/regression/Makefile.am | 20 | diff --git a/tests/regression/Makefile.am b/tests/regression/Makefile.am |
13 | =================================================================== | 21 | index e556223..756fb98 100644 |
14 | --- lttng-tools-2.13.1.orig/tests/regression/Makefile.am | 22 | --- a/tests/regression/Makefile.am |
15 | +++ lttng-tools-2.13.1/tests/regression/Makefile.am | 23 | +++ b/tests/regression/Makefile.am |
16 | @@ -29,18 +29,6 @@ TESTS = tools/base-path/test_ust \ | 24 | @@ -29,18 +29,6 @@ TESTS = tools/base-path/test_ust \ |
17 | tools/crash/test_crash \ | 25 | tools/crash/test_crash \ |
18 | tools/regen-metadata/test_ust \ | 26 | tools/regen-metadata/test_ust \ |
diff --git a/meta/recipes-kernel/lttng/lttng-tools_2.13.11.bb b/meta/recipes-kernel/lttng/lttng-tools_2.13.15.bb index 08144e271c..f39404afa0 100644 --- a/meta/recipes-kernel/lttng/lttng-tools_2.13.11.bb +++ b/meta/recipes-kernel/lttng/lttng-tools_2.13.15.bb | |||
@@ -38,14 +38,18 @@ SRC_URI = "https://lttng.org/files/lttng-tools/lttng-tools-${PV}.tar.bz2 \ | |||
38 | file://disable-tests.patch \ | 38 | file://disable-tests.patch \ |
39 | file://0001-compat-Define-off64_t-as-off_t-on-linux.patch \ | 39 | file://0001-compat-Define-off64_t-as-off_t-on-linux.patch \ |
40 | file://0001-tests-add-check_skip_kernel_test-to-check-root-user-.patch \ | 40 | file://0001-tests-add-check_skip_kernel_test-to-check-root-user-.patch \ |
41 | file://0001-Fix-rotation-destroy-flush-fix-session-daemon-abort-.patch \ | ||
42 | file://0001-fix-lttng-tools-fails-to-compile-with-libxml2-2.14.0.patch \ | ||
41 | " | 43 | " |
42 | 44 | ||
43 | SRC_URI[sha256sum] = "ac5baeef9fa690936b1ca01ecd1742da762c2c08511ff1b4e923938d94d0f979" | 45 | SRC_URI[sha256sum] = "96ea42351ee112c19dad9fdc7aae93b583d9f1722b2175664a381d2d337703c4" |
44 | 46 | ||
45 | inherit autotools ptest pkgconfig useradd python3-dir manpages systemd | 47 | inherit autotools ptest pkgconfig useradd python3-dir manpages systemd |
46 | 48 | ||
47 | CACHED_CONFIGUREVARS = "PGREP=/usr/bin/pgrep" | 49 | CACHED_CONFIGUREVARS = "PGREP=/usr/bin/pgrep" |
48 | 50 | ||
51 | EXTRA_OECONF += "--disable-libtool-linkdep-fixup" | ||
52 | |||
49 | SYSTEMD_SERVICE:${PN} = "lttng-sessiond.service" | 53 | SYSTEMD_SERVICE:${PN} = "lttng-sessiond.service" |
50 | SYSTEMD_AUTO_ENABLE = "disable" | 54 | SYSTEMD_AUTO_ENABLE = "disable" |
51 | 55 | ||
@@ -68,7 +72,7 @@ PRIVATE_LIBS:${PN}-ptest = "libfoo.so" | |||
68 | do_install:append () { | 72 | do_install:append () { |
69 | # install systemd unit file | 73 | # install systemd unit file |
70 | install -d ${D}${systemd_system_unitdir} | 74 | install -d ${D}${systemd_system_unitdir} |
71 | install -m 0644 ${WORKDIR}/lttng-sessiond.service ${D}${systemd_system_unitdir} | 75 | install -m 0644 ${UNPACKDIR}/lttng-sessiond.service ${D}${systemd_system_unitdir} |
72 | } | 76 | } |
73 | 77 | ||
74 | do_install_ptest () { | 78 | do_install_ptest () { |
diff --git a/meta/recipes-kernel/lttng/lttng-ust/0001-Makefile.am-update-rpath-link.patch b/meta/recipes-kernel/lttng/lttng-ust/0001-Makefile.am-update-rpath-link.patch deleted file mode 100644 index 6aca8f85fa..0000000000 --- a/meta/recipes-kernel/lttng/lttng-ust/0001-Makefile.am-update-rpath-link.patch +++ /dev/null | |||
@@ -1,33 +0,0 @@ | |||
1 | From 7d053804ab3823d40ae10d90f4efc49dbfb4cb66 Mon Sep 17 00:00:00 2001 | ||
2 | From: Changqing Li <changqing.li@windriver.com> | ||
3 | Date: Wed, 22 Sep 2021 16:33:10 +0800 | ||
4 | Subject: [PATCH] Makefile.am: update rpath link | ||
5 | |||
6 | since commit 6339062 Move liblttng-ust to 'src/lib/', | ||
7 | liblttng-ust.so/liblttng-ust-common.so/liblttng-ust-tracepoint.so | ||
8 | 's location changed from one dir to multiple dirs. which make below | ||
9 | error: | ||
10 | ld: warning: liblttng-ust-common.so.1, needed by ../../../src/lib/lttng-ust/.libs/liblttng-ust.so, not found (try using -rpath or -rpath-link) | ||
11 | ld: warning: liblttng-ust-tracepoint.so.1, needed by ../../../src/lib/lttng-ust/.libs/liblttng-ust.so, not found (try using -rpath or -rpath-link) | ||
12 | |||
13 | Upstream-Status: Submitted [https://github.com/lttng/lttng-ust/pull/61] | ||
14 | |||
15 | Signed-off-by: Changqing Li <changqing.li@windriver.com> | ||
16 | |||
17 | --- | ||
18 | doc/examples/Makefile.am | 2 +- | ||
19 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
20 | |||
21 | diff --git a/doc/examples/Makefile.am b/doc/examples/Makefile.am | ||
22 | index 57782cc..d46caa6 100644 | ||
23 | --- a/doc/examples/Makefile.am | ||
24 | +++ b/doc/examples/Makefile.am | ||
25 | @@ -167,7 +167,7 @@ all-local: | ||
26 | CFLAGS='$(CFLAGS)' \ | ||
27 | AM_CFLAGS='$(AM_CFLAGS)' \ | ||
28 | LDFLAGS="$(LDFLAGS)" \ | ||
29 | - AM_LDFLAGS='$(AM_LDFLAGS) -L../../../src/lib/lttng-ust/.libs -Wl,-rpath="$(PWD)/../../src/lib/lttng-ust/.libs/" -Wl,-rpath-link="$(PWD)/../../src/lib/lttng-ust/.libs/"' \ | ||
30 | + AM_LDFLAGS='$(AM_LDFLAGS) -L../../../src/lib/lttng-ust/.libs -Wl,-rpath="$(PWD)/../../src/lib/lttng-ust/.libs/" -Wl,-rpath-link="$(PWD)/../../src/lib/lttng-ust/.libs/:$(PWD)/../../src/lib/lttng-ust-tracepoint/.libs:$(PWD)/../../src/lib/lttng-ust-common/.libs/"' \ | ||
31 | LTTNG_GEN_TP_PATH="$$rel_src_subdir$(top_srcdir)/tools/" \ | ||
32 | AM_V_P="$(AM_V_P)" \ | ||
33 | AM_V_at="$(AM_V_at)" \ | ||
diff --git a/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch b/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch index e85dbdb439..ceb240680b 100644 --- a/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch +++ b/meta/recipes-kernel/lttng/lttng-ust/0001-lttng-ust-common-link-with-liburcu-explicitly.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 27402453f25fbdb5a9fb1a1b88d1c4d9852187d2 Mon Sep 17 00:00:00 2001 | 1 | From 1b6bbf14de8fdfe60e446c93969e29bc2cf5f2dc Mon Sep 17 00:00:00 2001 |
2 | From: Alexander Kanavin <alex@linutronix.de> | 2 | From: Alexander Kanavin <alex@linutronix.de> |
3 | Date: Sun, 5 Sep 2021 10:44:19 +0200 | 3 | Date: Sun, 5 Sep 2021 10:44:19 +0200 |
4 | Subject: [PATCH] lttng-ust-common: link with liburcu explicitly | 4 | Subject: [PATCH] lttng-ust-common: link with liburcu explicitly |
@@ -7,7 +7,6 @@ Otherwise linking errors are seen on x86-32. | |||
7 | 7 | ||
8 | Upstream-Status: Submitted [by email to lttng-dev, Francis, Jonathan] | 8 | Upstream-Status: Submitted [by email to lttng-dev, Francis, Jonathan] |
9 | Signed-off-by: Alexander Kanavin <alex@linutronix.de> | 9 | Signed-off-by: Alexander Kanavin <alex@linutronix.de> |
10 | |||
11 | --- | 10 | --- |
12 | src/lib/lttng-ust-common/Makefile.am | 1 + | 11 | src/lib/lttng-ust-common/Makefile.am | 1 + |
13 | 1 file changed, 1 insertion(+) | 12 | 1 file changed, 1 insertion(+) |
diff --git a/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch b/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch index 7c49583e0d..7bbe5c216e 100644 --- a/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch +++ b/meta/recipes-kernel/lttng/lttng-ust/0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From f65efd963e52de51d35e2e03fb773f33dd64f565 Mon Sep 17 00:00:00 2001 | 1 | From 30660997d220602202d8dc7264e49095a1581947 Mon Sep 17 00:00:00 2001 |
2 | From: Richard Purdie <richard.purdie@linuxfoundation.org> | 2 | From: Richard Purdie <richard.purdie@linuxfoundation.org> |
3 | Date: Tue, 20 Feb 2024 12:19:06 +0000 | 3 | Date: Tue, 20 Feb 2024 12:19:06 +0000 |
4 | Subject: [PATCH] python-lttngust/Makefile.am: Add --install-lib to setup.py | 4 | Subject: [PATCH] python-lttngust/Makefile.am: Add --install-lib to setup.py |
@@ -9,7 +9,6 @@ building. | |||
9 | Upstream-Status: Submitted [https://github.com/lttng/lttng-ust/pull/59] | 9 | Upstream-Status: Submitted [https://github.com/lttng/lttng-ust/pull/59] |
10 | 10 | ||
11 | Signed-off-by: Robert Yang <liezhi.yang@windriver.com> | 11 | Signed-off-by: Robert Yang <liezhi.yang@windriver.com> |
12 | |||
13 | --- | 12 | --- |
14 | src/python-lttngust/Makefile.am | 2 +- | 13 | src/python-lttngust/Makefile.am | 2 +- |
15 | 1 file changed, 1 insertion(+), 1 deletion(-) | 14 | 1 file changed, 1 insertion(+), 1 deletion(-) |
diff --git a/meta/recipes-kernel/lttng/lttng-ust_2.13.7.bb b/meta/recipes-kernel/lttng/lttng-ust_2.13.9.bb index 9509185bad..dd7657e0cc 100644 --- a/meta/recipes-kernel/lttng/lttng-ust_2.13.7.bb +++ b/meta/recipes-kernel/lttng/lttng-ust_2.13.9.bb | |||
@@ -31,10 +31,9 @@ PE = "2" | |||
31 | SRC_URI = "https://lttng.org/files/lttng-ust/lttng-ust-${PV}.tar.bz2 \ | 31 | SRC_URI = "https://lttng.org/files/lttng-ust/lttng-ust-${PV}.tar.bz2 \ |
32 | file://0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch \ | 32 | file://0001-python-lttngust-Makefile.am-Add-install-lib-to-setup.patch \ |
33 | file://0001-lttng-ust-common-link-with-liburcu-explicitly.patch \ | 33 | file://0001-lttng-ust-common-link-with-liburcu-explicitly.patch \ |
34 | file://0001-Makefile.am-update-rpath-link.patch \ | ||
35 | " | 34 | " |
36 | 35 | ||
37 | SRC_URI[sha256sum] = "5fb4f17c307c8c1b79c68561e89be9562d07e7425bf40e728c4d66755342a5eb" | 36 | SRC_URI[sha256sum] = "2ad6d69a54a1d924c18a4aa7a233db104e3cc332bcdd240e196bf7adbed3f712" |
38 | 37 | ||
39 | CVE_PRODUCT = "ust" | 38 | CVE_PRODUCT = "ust" |
40 | 39 | ||
diff --git a/meta/recipes-kernel/make-mod-scripts/make-mod-scripts_1.0.bb b/meta/recipes-kernel/make-mod-scripts/make-mod-scripts_1.0.bb index a91680d497..8fcb5e6eb3 100644 --- a/meta/recipes-kernel/make-mod-scripts/make-mod-scripts_1.0.bb +++ b/meta/recipes-kernel/make-mod-scripts/make-mod-scripts_1.0.bb | |||
@@ -8,7 +8,7 @@ inherit pkgconfig | |||
8 | 8 | ||
9 | PACKAGE_ARCH = "${MACHINE_ARCH}" | 9 | PACKAGE_ARCH = "${MACHINE_ARCH}" |
10 | 10 | ||
11 | S = "${WORKDIR}" | 11 | S = "${UNPACKDIR}" |
12 | 12 | ||
13 | do_configure[depends] += "virtual/kernel:do_shared_workdir openssl-native:do_populate_sysroot" | 13 | do_configure[depends] += "virtual/kernel:do_shared_workdir openssl-native:do_populate_sysroot" |
14 | do_compile[depends] += "virtual/kernel:do_compile_kernelmodules" | 14 | do_compile[depends] += "virtual/kernel:do_compile_kernelmodules" |
@@ -22,7 +22,7 @@ EXTRA_OEMAKE = " HOSTCC="${BUILD_CC} ${BUILD_CFLAGS} ${BUILD_LDFLAGS}" HOSTCPP=" | |||
22 | EXTRA_OEMAKE += " HOSTCXX="${BUILD_CXX} ${BUILD_CXXFLAGS} ${BUILD_LDFLAGS}" CROSS_COMPILE=${TARGET_PREFIX}" | 22 | EXTRA_OEMAKE += " HOSTCXX="${BUILD_CXX} ${BUILD_CXXFLAGS} ${BUILD_LDFLAGS}" CROSS_COMPILE=${TARGET_PREFIX}" |
23 | 23 | ||
24 | KERNEL_LOCALVERSION = "${@get_kernellocalversion_file("${STAGING_KERNEL_BUILDDIR}")}" | 24 | KERNEL_LOCALVERSION = "${@get_kernellocalversion_file("${STAGING_KERNEL_BUILDDIR}")}" |
25 | export LOCALVERSION="${KERNEL_LOCALVERSION}" | 25 | export LOCALVERSION = "${KERNEL_LOCALVERSION}" |
26 | 26 | ||
27 | # Build some host tools under work-shared. CC, LD, and AR are probably | 27 | # Build some host tools under work-shared. CC, LD, and AR are probably |
28 | # not used, but this is the historical way of invoking "make scripts". | 28 | # not used, but this is the historical way of invoking "make scripts". |
diff --git a/meta/recipes-kernel/makedumpfile/makedumpfile/0001-makedumpfile-replace-hardcode-CFLAGS.patch b/meta/recipes-kernel/makedumpfile/makedumpfile/0001-makedumpfile-replace-hardcode-CFLAGS.patch new file mode 100644 index 0000000000..796e036ab8 --- /dev/null +++ b/meta/recipes-kernel/makedumpfile/makedumpfile/0001-makedumpfile-replace-hardcode-CFLAGS.patch | |||
@@ -0,0 +1,139 @@ | |||
1 | From 59b8d59504c1bafff52a8794e67c6025fcd418a4 Mon Sep 17 00:00:00 2001 | ||
2 | From: Mingli Yu <mingli.yu@windriver.com> | ||
3 | Date: Sun, 24 Apr 2022 17:25:33 +0800 | ||
4 | Subject: [PATCH] makedumpfile: replace hardcode CFLAGS | ||
5 | |||
6 | * Create alias for target such as powerpc as powerpc32 | ||
7 | * Remove hardcode CFLAGS | ||
8 | * Add CFLAGS_COMMON to instead of CFLAGS so can flexibly | ||
9 | customize CFLAGS and not hardcode the CFLAGS as previously | ||
10 | * Forcibly to link dynamic library as the poky build | ||
11 | system doesn't build static library by default | ||
12 | |||
13 | Upstream-Status: Inappropriate [oe specific] | ||
14 | |||
15 | Signed-off-by: Mingli Yu <mingli.yu@windriver.com> | ||
16 | |||
17 | [2021-11-18] Patch updated to use CFLAGS_COMMON for zstd | ||
18 | Signed-off-by: Fathi Boudra <fathi.boudra@linaro.org> | ||
19 | |||
20 | Rebase to 1.7.1 | ||
21 | Signed-off-by: Mingli Yu <mingli.yu@windriver.com> | ||
22 | --- | ||
23 | Makefile | 40 +++++++++++++++++++++------------------- | ||
24 | 1 file changed, 21 insertions(+), 19 deletions(-) | ||
25 | |||
26 | diff --git a/Makefile b/Makefile | ||
27 | index aa73252..76fcafd 100644 | ||
28 | --- a/Makefile | ||
29 | +++ b/Makefile | ||
30 | @@ -8,12 +8,6 @@ ifeq ($(strip $CC),) | ||
31 | CC = gcc | ||
32 | endif | ||
33 | |||
34 | -CFLAGS_BASE := $(CFLAGS) -g -O2 -Wall -D_FILE_OFFSET_BITS=64 \ | ||
35 | - -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE | ||
36 | -CFLAGS := $(CFLAGS_BASE) -DVERSION='"$(VERSION)"' -DRELEASE_DATE='"$(DATE)"' | ||
37 | -CFLAGS_ARCH := $(CFLAGS_BASE) | ||
38 | -# LDFLAGS = -L/usr/local/lib -I/usr/local/include | ||
39 | - | ||
40 | HOST_ARCH := $(shell uname -m) | ||
41 | # Use TARGET as the target architecture if specified. | ||
42 | # Defaults to uname -m | ||
43 | @@ -24,26 +18,34 @@ endif | ||
44 | ARCH := $(shell echo ${TARGET} | sed -e s/i.86/x86/ -e s/sun4u/sparc64/ \ | ||
45 | -e s/arm.*/arm/ -e s/sa110/arm/ \ | ||
46 | -e s/s390x/s390/ -e s/parisc64/parisc/ \ | ||
47 | - -e s/ppc64/powerpc64/ -e s/ppc/powerpc32/) | ||
48 | + -e s/ppc64/powerpc64/ -e s/ppc/powerpc32/ \ | ||
49 | + -e s/_powerpc_/_powerpc32_/) | ||
50 | |||
51 | CROSS := | ||
52 | ifneq ($(TARGET), $(HOST_ARCH)) | ||
53 | CROSS := -U__$(HOST_ARCH)__ | ||
54 | endif | ||
55 | |||
56 | -CFLAGS += -D__$(ARCH)__ $(CROSS) | ||
57 | CFLAGS_ARCH += -D__$(ARCH)__ $(CROSS) | ||
58 | |||
59 | -ifeq ($(ARCH), powerpc64) | ||
60 | -CFLAGS += -m64 | ||
61 | +ifeq ($(ARCH), __powerpc64__) | ||
62 | CFLAGS_ARCH += -m64 | ||
63 | endif | ||
64 | |||
65 | -ifeq ($(ARCH), powerpc32) | ||
66 | -CFLAGS += -m32 | ||
67 | +ifeq ($(ARCH), __powerpc32__) | ||
68 | CFLAGS_ARCH += -m32 | ||
69 | endif | ||
70 | |||
71 | +CFLAGS_ARCH += $(CFLAGS) \ | ||
72 | + -D_FILE_OFFSET_BITS=64 \ | ||
73 | + -D_LARGEFILE_SOURCE \ | ||
74 | + -D_LARGEFILE64_SOURCE | ||
75 | + | ||
76 | +CFLAGS_COMMON = $(CFLAGS_ARCH) \ | ||
77 | + -DVERSION='"$(VERSION)"' \ | ||
78 | + -DRELEASE_DATE='"$(DATE)"' | ||
79 | + | ||
80 | + | ||
81 | SRC_BASE = makedumpfile.c makedumpfile.h diskdump_mod.h sadump_mod.h sadump_info.h | ||
82 | SRC_PART = print_info.c dwarf_info.c elf_info.c erase_info.c sadump_info.c cache.c tools.c printk.c detect_cycle.c | ||
83 | OBJ_PART=$(patsubst %.c,%.o,$(SRC_PART)) | ||
84 | @@ -52,12 +54,12 @@ OBJ_ARCH=$(patsubst %.c,%.o,$(SRC_ARCH)) | ||
85 | |||
86 | LIBS = -ldw -lbz2 -ldl -lelf -lz | ||
87 | ifneq ($(LINKTYPE), dynamic) | ||
88 | -LIBS := -static $(LIBS) -llzma | ||
89 | +LIBS := $(LIBS) -llzma | ||
90 | endif | ||
91 | |||
92 | ifeq ($(USELZO), on) | ||
93 | LIBS := -llzo2 $(LIBS) | ||
94 | -CFLAGS += -DUSELZO | ||
95 | +CFLAGS_COMMON += -DUSELZO | ||
96 | endif | ||
97 | |||
98 | ifeq ($(USESNAPPY), on) | ||
99 | @@ -65,12 +67,12 @@ LIBS := -lsnappy $(LIBS) | ||
100 | ifneq ($(LINKTYPE), dynamic) | ||
101 | LIBS := $(LIBS) -lstdc++ | ||
102 | endif | ||
103 | -CFLAGS += -DUSESNAPPY | ||
104 | +CFLAGS_COMMON += -DUSESNAPPY | ||
105 | endif | ||
106 | |||
107 | ifeq ($(USEZSTD), on) | ||
108 | LIBS := -lzstd $(LIBS) | ||
109 | -CFLAGS += -DUSEZSTD | ||
110 | +CFLAGS_COMMON += -DUSEZSTD | ||
111 | endif | ||
112 | |||
113 | ifeq ($(DEBUG), on) | ||
114 | @@ -106,14 +108,14 @@ SBINDIR ?= /usr/sbin | ||
115 | all: makedumpfile | ||
116 | |||
117 | $(OBJ_PART): $(SRC_PART) | ||
118 | - $(CC) $(CFLAGS) -c -o ./$@ $(VPATH)$(@:.o=.c) | ||
119 | + $(CC) $(CFLAGS_COMMON) -c -o ./$@ $(VPATH)$(@:.o=.c) | ||
120 | |||
121 | $(OBJ_ARCH): $(SRC_ARCH) | ||
122 | @mkdir -p $(@D) | ||
123 | $(CC) $(CFLAGS_ARCH) -c -o ./$@ $(VPATH)$(@:.o=.c) | ||
124 | |||
125 | makedumpfile: $(SRC_BASE) $(OBJ_PART) $(OBJ_ARCH) | ||
126 | - $(CC) $(CFLAGS) $(LDFLAGS) $(OBJ_PART) $(OBJ_ARCH) -rdynamic -o $@ $< $(LIBS) | ||
127 | + $(CC) $(CFLAGS_COMMON) $(LDFLAGS) $(OBJ_PART) $(OBJ_ARCH) -rdynamic -o $@ $< $(LIBS) | ||
128 | @sed -e "s/@DATE@/$(DATE)/" \ | ||
129 | -e "s/@VERSION@/$(VERSION)/" \ | ||
130 | $(VPATH)makedumpfile.8.in > $(VPATH)makedumpfile.8 | ||
131 | @@ -122,7 +124,7 @@ makedumpfile: $(SRC_BASE) $(OBJ_PART) $(OBJ_ARCH) | ||
132 | $(VPATH)makedumpfile.conf.5.in > $(VPATH)makedumpfile.conf.5 | ||
133 | |||
134 | eppic_makedumpfile.so: extension_eppic.c | ||
135 | - $(CC) $(CFLAGS) $(LDFLAGS) -shared -rdynamic -o $@ extension_eppic.c -fPIC -leppic -ltinfo | ||
136 | + $(CC) $(CFLAGS_COMMON) $(LDFLAGS) -shared -rdynamic -o $@ extension_eppic.c -fPIC -leppic -ltinfo | ||
137 | |||
138 | clean: | ||
139 | rm -f $(OBJ) $(OBJ_PART) $(OBJ_ARCH) makedumpfile makedumpfile.8 makedumpfile.conf.5 | ||
diff --git a/meta/recipes-kernel/makedumpfile/makedumpfile_1.7.7.bb b/meta/recipes-kernel/makedumpfile/makedumpfile_1.7.7.bb new file mode 100644 index 0000000000..99393e0984 --- /dev/null +++ b/meta/recipes-kernel/makedumpfile/makedumpfile_1.7.7.bb | |||
@@ -0,0 +1,60 @@ | |||
1 | SUMMARY = "VMcore extraction tool" | ||
2 | DESCRIPTION = "\ | ||
3 | This program is used to extract a subset of the memory available either \ | ||
4 | via /dev/mem or /proc/vmcore (for crashdumps). It is used to get memory \ | ||
5 | images without extra uneeded information (zero pages, userspace programs, \ | ||
6 | etc). \ | ||
7 | " | ||
8 | HOMEPAGE = "https://github.com/makedumpfile/makedumpfile" | ||
9 | |||
10 | LIC_FILES_CHKSUM = "file://COPYING;md5=751419260aa954499f7abaabaa882bbe" | ||
11 | LICENSE = "GPL-2.0-only" | ||
12 | |||
13 | SRCBRANCH ?= "master" | ||
14 | SRCREV = "e4ae6b5ee04edeeb03db89bee372904157e3378d" | ||
15 | |||
16 | DEPENDS = "bzip2 zlib elfutils xz" | ||
17 | RDEPENDS:${PN}-tools = "perl ${PN}" | ||
18 | |||
19 | # mips/rv32 would not compile. | ||
20 | COMPATIBLE_HOST:mipsarcho32 = "null" | ||
21 | COMPATIBLE_HOST:riscv32 = "null" | ||
22 | |||
23 | PACKAGES =+ "${PN}-tools" | ||
24 | FILES:${PN}-tools = "${bindir}/*.pl" | ||
25 | |||
26 | SRC_URI = "\ | ||
27 | git://github.com/makedumpfile/makedumpfile;branch=${SRCBRANCH};protocol=https \ | ||
28 | file://0001-makedumpfile-replace-hardcode-CFLAGS.patch \ | ||
29 | " | ||
30 | |||
31 | UPSTREAM_CHECK_GITTAGREGEX = "(?P<pver>\d+(\.\d+)+)" | ||
32 | |||
33 | SECTION = "base" | ||
34 | |||
35 | # If we do not specify TARGET, makedumpfile will build for the host but use the | ||
36 | # target gcc. | ||
37 | # | ||
38 | |||
39 | MAKEDUMPFILE_TARGET ?= "${TARGET_ARCH}" | ||
40 | MAKEDUMPFILE_TARGET:powerpc = "ppc" | ||
41 | |||
42 | EXTRA_OEMAKE = "\ | ||
43 | LINKTYPE=static \ | ||
44 | TARGET=${MAKEDUMPFILE_TARGET} \ | ||
45 | ${PACKAGECONFIG_CONFARGS} \ | ||
46 | " | ||
47 | |||
48 | PACKAGECONFIG ??= "" | ||
49 | PACKAGECONFIG[lzo] = "USELZO=on,USELZO=off,lzo" | ||
50 | PACKAGECONFIG[snappy] = "USESNAPPY=on,USESNAPPY=off,snappy" | ||
51 | PACKAGECONFIG[zstd] = "USEZSTD=on,USEZSTD=off,zstd" | ||
52 | |||
53 | do_install () { | ||
54 | mkdir -p ${D}/usr/bin | ||
55 | install -m 755 ${S}/makedumpfile ${D}/usr/bin | ||
56 | install -m 755 ${S}/makedumpfile-R.pl ${D}/usr/bin | ||
57 | |||
58 | mkdir -p ${D}/etc/ | ||
59 | install -m 644 ${S}/makedumpfile.conf ${D}/etc/makedumpfile.conf.sample | ||
60 | } | ||
diff --git a/meta/recipes-kernel/modutils-initscripts/modutils-initscripts.bb b/meta/recipes-kernel/modutils-initscripts/modutils-initscripts.bb index b630a402ff..fb7b09393a 100644 --- a/meta/recipes-kernel/modutils-initscripts/modutils-initscripts.bb +++ b/meta/recipes-kernel/modutils-initscripts/modutils-initscripts.bb | |||
@@ -4,8 +4,7 @@ LICENSE = "MIT" | |||
4 | LIC_FILES_CHKSUM = "file://modutils.sh;beginline=3;endline=3;md5=b2dccaa94b3629a08bfb4f983cad6f89" | 4 | LIC_FILES_CHKSUM = "file://modutils.sh;beginline=3;endline=3;md5=b2dccaa94b3629a08bfb4f983cad6f89" |
5 | SRC_URI = "file://modutils.sh" | 5 | SRC_URI = "file://modutils.sh" |
6 | 6 | ||
7 | 7 | S = "${UNPACKDIR}" | |
8 | S = "${WORKDIR}" | ||
9 | 8 | ||
10 | INITSCRIPT_NAME = "modutils.sh" | 9 | INITSCRIPT_NAME = "modutils.sh" |
11 | INITSCRIPT_PARAMS = "start 06 S ." | 10 | INITSCRIPT_PARAMS = "start 06 S ." |
@@ -17,7 +16,7 @@ do_compile () { | |||
17 | 16 | ||
18 | do_install () { | 17 | do_install () { |
19 | install -d ${D}${sysconfdir}/init.d/ | 18 | install -d ${D}${sysconfdir}/init.d/ |
20 | install -m 0755 ${WORKDIR}/modutils.sh ${D}${sysconfdir}/init.d/ | 19 | install -m 0755 ${S}/modutils.sh ${D}${sysconfdir}/init.d/ |
21 | } | 20 | } |
22 | 21 | ||
23 | PACKAGE_WRITE_DEPS:append = " ${@bb.utils.contains('DISTRO_FEATURES','systemd','systemd-systemctl-native','',d)}" | 22 | PACKAGE_WRITE_DEPS:append = " ${@bb.utils.contains('DISTRO_FEATURES','systemd','systemd-systemctl-native','',d)}" |
diff --git a/meta/recipes-kernel/perf/perf-perl.inc b/meta/recipes-kernel/perf/perf-perl.inc index 491f54c328..f3eef75a90 100644 --- a/meta/recipes-kernel/perf/perf-perl.inc +++ b/meta/recipes-kernel/perf/perf-perl.inc | |||
@@ -5,7 +5,3 @@ export PERLCONFIGTARGET = "${@is_target(d)}" | |||
5 | export PERL_INC = "${STAGING_LIBDIR}${PERL_OWN_DIR}/perl5/${@get_perl_version(d)}/${@get_perl_arch(d)}/CORE" | 5 | export PERL_INC = "${STAGING_LIBDIR}${PERL_OWN_DIR}/perl5/${@get_perl_version(d)}/${@get_perl_arch(d)}/CORE" |
6 | export PERL_LIB = "${STAGING_LIBDIR}${PERL_OWN_DIR}/perl5/${@get_perl_version(d)}" | 6 | export PERL_LIB = "${STAGING_LIBDIR}${PERL_OWN_DIR}/perl5/${@get_perl_version(d)}" |
7 | export PERL_ARCHLIB = "${STAGING_LIBDIR}${PERL_OWN_DIR}/perl5/${@get_perl_version(d)}/${@get_perl_arch(d)}" | 7 | export PERL_ARCHLIB = "${STAGING_LIBDIR}${PERL_OWN_DIR}/perl5/${@get_perl_version(d)}/${@get_perl_arch(d)}" |
8 | |||
9 | # The perl symbols CPPSTDIN and CPPRUN embed the sysroot into the | ||
10 | # binaries, work needed to remove this | ||
11 | INSANE_SKIP:${PN}-dbg += "buildpaths" | ||
diff --git a/meta/recipes-kernel/perf/perf.bb b/meta/recipes-kernel/perf/perf.bb index 4f26813de0..4f29bd5bbc 100644 --- a/meta/recipes-kernel/perf/perf.bb +++ b/meta/recipes-kernel/perf/perf.bb | |||
@@ -9,15 +9,12 @@ HOMEPAGE = "https://perf.wiki.kernel.org/index.php/Main_Page" | |||
9 | 9 | ||
10 | LICENSE = "GPL-2.0-only" | 10 | LICENSE = "GPL-2.0-only" |
11 | 11 | ||
12 | 12 | # zstd is required for kernels 6.14+ when libelf-zstd is detected | |
13 | PACKAGECONFIG ??= "python tui libunwind libtraceevent" | 13 | PACKAGECONFIG ??= "python tui libunwind libtraceevent zstd" |
14 | PACKAGECONFIG[dwarf] = ",NO_DWARF=1" | 14 | PACKAGECONFIG[dwarf] = ",NO_DWARF=1" |
15 | PACKAGECONFIG[perl] = ",NO_LIBPERL=1,perl" | 15 | PACKAGECONFIG[perl] = ",NO_LIBPERL=1,perl" |
16 | PACKAGECONFIG[python] = ",NO_LIBPYTHON=1,python3 python3-setuptools-native" | 16 | PACKAGECONFIG[python] = ",NO_LIBPYTHON=1,python3 python3-setuptools-native" |
17 | # gui support was added with kernel 3.6.35 | 17 | PACKAGECONFIG[tui] = ",NO_SLANG=1,slang" |
18 | # since 3.10 libnewt was replaced by slang | ||
19 | # to cover a wide range of kernel we add both dependencies | ||
20 | PACKAGECONFIG[tui] = ",NO_NEWT=1,libnewt slang" | ||
21 | PACKAGECONFIG[libunwind] = ",NO_LIBUNWIND=1 NO_LIBDW_DWARF_UNWIND=1,libunwind" | 18 | PACKAGECONFIG[libunwind] = ",NO_LIBUNWIND=1 NO_LIBDW_DWARF_UNWIND=1,libunwind" |
22 | PACKAGECONFIG[libnuma] = ",NO_LIBNUMA=1" | 19 | PACKAGECONFIG[libnuma] = ",NO_LIBNUMA=1" |
23 | PACKAGECONFIG[bfd] = ",NO_LIBBFD=1" | 20 | PACKAGECONFIG[bfd] = ",NO_LIBBFD=1" |
@@ -35,6 +32,7 @@ PACKAGECONFIG[jevents] = ",NO_JEVENTS=1,python3-native" | |||
35 | PACKAGECONFIG[coresight] = "CORESIGHT=1,,opencsd" | 32 | PACKAGECONFIG[coresight] = "CORESIGHT=1,,opencsd" |
36 | PACKAGECONFIG[pfm4] = ",NO_LIBPFM4=1,libpfm4" | 33 | PACKAGECONFIG[pfm4] = ",NO_LIBPFM4=1,libpfm4" |
37 | PACKAGECONFIG[babeltrace] = ",NO_LIBBABELTRACE=1,babeltrace" | 34 | PACKAGECONFIG[babeltrace] = ",NO_LIBBABELTRACE=1,babeltrace" |
35 | PACKAGECONFIG[zstd] = ",NO_LIBZSTD=1,zstd" | ||
38 | 36 | ||
39 | # libunwind is not yet ported for some architectures | 37 | # libunwind is not yet ported for some architectures |
40 | PACKAGECONFIG:remove:arc = "libunwind" | 38 | PACKAGECONFIG:remove:arc = "libunwind" |
@@ -68,22 +66,30 @@ include ${@bb.utils.contains('PACKAGECONFIG', 'perl', 'perf-perl.inc', '', d)} | |||
68 | 66 | ||
69 | inherit kernelsrc | 67 | inherit kernelsrc |
70 | 68 | ||
71 | S = "${WORKDIR}/${BP}" | 69 | S = "${UNPACKDIR}/${BP}" |
72 | SPDX_S = "${S}/tools/perf" | ||
73 | 70 | ||
74 | # The LDFLAGS is required or some old kernels fails due missing | 71 | # The LDFLAGS is required or some old kernels fails due missing |
75 | # symbols and this is preferred than requiring patches to every old | 72 | # symbols and this is preferred than requiring patches to every old |
76 | # supported kernel. | 73 | # supported kernel. |
77 | LDFLAGS="-ldl -lutil" | 74 | LDFLAGS = "-ldl -lutil" |
78 | 75 | ||
79 | # Perf's build system adds its own optimization flags for most TUs, | 76 | # Perf's build system adds its own optimization flags for most TUs, |
80 | # overriding the flags included here. But for some, perf does not add | 77 | # overriding the flags included here. But for some, perf does not add |
81 | # any -O option, so ensure the distro's chosen optimization gets used | 78 | # any -O option, so ensure the distro's chosen optimization gets used |
82 | # for those. Since ${SELECTED_OPTIMIZATION} always includes | 79 | # for those. Also include ${DEBUG_PREFIX_MAP} which ensures perf is |
83 | # ${DEBUG_FLAGS} which in turn includes ${DEBUG_PREFIX_MAP}, this also | 80 | # built with appropriate -f*-prefix-map options, |
84 | # ensures perf is built with appropriate -f*-prefix-map options, | ||
85 | # avoiding the 'buildpaths' QA warning. | 81 | # avoiding the 'buildpaths' QA warning. |
86 | TARGET_CC_ARCH += "${SELECTED_OPTIMIZATION}" | 82 | TARGET_CC_ARCH += "${SELECTED_OPTIMIZATION} ${DEBUG_PREFIX_MAP}" |
83 | |||
84 | #| libbpf.c: In function 'find_kernel_btf_id.constprop': | ||
85 | #| libbpf.c:10009:33: error: 'mod_len' may be used uninitialized [-Werror=maybe-uninitialized] | ||
86 | #| 10009 | if (mod_name && strncmp(mod->name, mod_name, mod_len) != 0) | ||
87 | #| | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | ||
88 | #| libbpf.c:9979:21: note: 'mod_len' was declared here | ||
89 | #| 9979 | int ret, i, mod_len; | ||
90 | #| | ^~~~~~~ | ||
91 | #| cc1: all warnings being treated as errors | ||
92 | TARGET_CC_ARCH:append:toolchain-clang:arm = " -fno-error=maybe-uninitialized" | ||
87 | 93 | ||
88 | EXTRA_OEMAKE = '\ | 94 | EXTRA_OEMAKE = '\ |
89 | V=1 \ | 95 | V=1 \ |
@@ -129,6 +135,10 @@ EXTRA_OEMAKE += "\ | |||
129 | # honour a JOBS variable. | 135 | # honour a JOBS variable. |
130 | EXTRA_OEMAKE:append:task-configure = " JOBS=1" | 136 | EXTRA_OEMAKE:append:task-configure = " JOBS=1" |
131 | 137 | ||
138 | # the architectures that need this file can be found in | ||
139 | # tools/include/uapi/asm/bpf_perf_event.h | ||
140 | # We are only listing supported arches at the moment | ||
141 | PERF_BPF_EVENT_SRC ?= '${@bb.utils.contains_any("ARCH", [ "riscv", "arm64" ], "arch/${ARCH}/include/uapi/asm/bpf_perf_event.h", "", d)}' | ||
132 | PERF_SRC ?= "Makefile \ | 142 | PERF_SRC ?= "Makefile \ |
133 | tools/arch \ | 143 | tools/arch \ |
134 | tools/build \ | 144 | tools/build \ |
@@ -139,7 +149,9 @@ PERF_SRC ?= "Makefile \ | |||
139 | tools/scripts \ | 149 | tools/scripts \ |
140 | scripts/ \ | 150 | scripts/ \ |
141 | arch/arm64/tools \ | 151 | arch/arm64/tools \ |
152 | ${PERF_BPF_EVENT_SRC} \ | ||
142 | arch/${ARCH}/Makefile \ | 153 | arch/${ARCH}/Makefile \ |
154 | include/uapi/asm-generic/Kbuild \ | ||
143 | " | 155 | " |
144 | 156 | ||
145 | PERF_EXTRA_LDFLAGS = "" | 157 | PERF_EXTRA_LDFLAGS = "" |
@@ -197,7 +209,7 @@ python copy_perf_source_from_kernel() { | |||
197 | do_configure:prepend () { | 209 | do_configure:prepend () { |
198 | # If building a multlib based perf, the incorrect library path will be | 210 | # If building a multlib based perf, the incorrect library path will be |
199 | # detected by perf, since it triggers via: ifeq ($(ARCH),x86_64). In a 32 bit | 211 | # detected by perf, since it triggers via: ifeq ($(ARCH),x86_64). In a 32 bit |
200 | # build, with a 64 bit multilib, the arch won't match and the detection of a | 212 | # build, with a 64 bit multilib, the arch won't match and the detection of a |
201 | # 64 bit build (and library) are not exected. To ensure that libraries are | 213 | # 64 bit build (and library) are not exected. To ensure that libraries are |
202 | # installed to the correct location, we can use the weak assignment in the | 214 | # installed to the correct location, we can use the weak assignment in the |
203 | # config/Makefile. | 215 | # config/Makefile. |
@@ -230,14 +242,18 @@ do_configure:prepend () { | |||
230 | if [ -e "${S}/tools/perf/Makefile.perf" ]; then | 242 | if [ -e "${S}/tools/perf/Makefile.perf" ]; then |
231 | sed -i -e 's,\ .config-detected, $(OUTPUT)/config-detected,g' \ | 243 | sed -i -e 's,\ .config-detected, $(OUTPUT)/config-detected,g' \ |
232 | ${S}/tools/perf/Makefile.perf | 244 | ${S}/tools/perf/Makefile.perf |
245 | # Variant with linux-yocto-specific patch | ||
233 | sed -i -e "s,prefix='\$(DESTDIR_SQ)/usr'$,prefix='\$(DESTDIR_SQ)/usr' --install-lib='\$(PYTHON_SITEPACKAGES_DIR)' --root='\$(DESTDIR)',g" \ | 246 | sed -i -e "s,prefix='\$(DESTDIR_SQ)/usr'$,prefix='\$(DESTDIR_SQ)/usr' --install-lib='\$(PYTHON_SITEPACKAGES_DIR)' --root='\$(DESTDIR)',g" \ |
234 | ${S}/tools/perf/Makefile.perf | 247 | ${S}/tools/perf/Makefile.perf |
248 | # Variant for mainline Linux | ||
249 | sed -i -e "s,root='/\$(DESTDIR_SQ)',prefix='\$(DESTDIR_SQ)/usr' --install-lib='\$(PYTHON_SITEPACKAGES_DIR)' --root='/\$(DESTDIR_SQ)',g" \ | ||
250 | ${S}/tools/perf/Makefile.perf | ||
235 | # backport https://github.com/torvalds/linux/commit/e4ffd066ff440a57097e9140fa9e16ceef905de8 | 251 | # backport https://github.com/torvalds/linux/commit/e4ffd066ff440a57097e9140fa9e16ceef905de8 |
236 | sed -i -e 's,\($(Q)$(SHELL) .$(arch_errno_tbl).\) $(CC) $(arch_errno_hdr_dir),\1 $(firstword $(CC)) $(arch_errno_hdr_dir),g' \ | 252 | sed -i -e 's,\($(Q)$(SHELL) .$(arch_errno_tbl).\) $(CC) $(arch_errno_hdr_dir),\1 $(firstword $(CC)) $(arch_errno_hdr_dir),g' \ |
237 | ${S}/tools/perf/Makefile.perf | 253 | ${S}/tools/perf/Makefile.perf |
238 | fi | 254 | fi |
239 | sed -i -e "s,--root='/\$(DESTDIR_SQ)',--prefix='\$(DESTDIR_SQ)/usr' --install-lib='\$(DESTDIR)\$(PYTHON_SITEPACKAGES_DIR)',g" \ | 255 | sed -i -e "s,--root='/\$(DESTDIR_SQ)',--prefix='\$(DESTDIR_SQ)/usr' --install-lib='\$(DESTDIR)\$(PYTHON_SITEPACKAGES_DIR)',g" \ |
240 | ${S}/tools/perf/Makefile* | 256 | ${S}/tools/perf/Makefile |
241 | 257 | ||
242 | if [ -e "${S}/tools/build/Makefile.build" ]; then | 258 | if [ -e "${S}/tools/build/Makefile.build" ]; then |
243 | sed -i -e 's,\ .config-detected, $(OUTPUT)/config-detected,g' \ | 259 | sed -i -e 's,\ .config-detected, $(OUTPUT)/config-detected,g' \ |
@@ -369,20 +385,15 @@ do_configure:prepend () { | |||
369 | done | 385 | done |
370 | } | 386 | } |
371 | 387 | ||
372 | python do_package:prepend() { | ||
373 | d.setVar('PKGV', d.getVar("KERNEL_VERSION").split("-")[0]) | ||
374 | } | ||
375 | |||
376 | PACKAGE_ARCH = "${MACHINE_ARCH}" | 388 | PACKAGE_ARCH = "${MACHINE_ARCH}" |
377 | 389 | ||
378 | |||
379 | PACKAGES =+ "${PN}-archive ${PN}-tests ${PN}-perl ${PN}-python" | 390 | PACKAGES =+ "${PN}-archive ${PN}-tests ${PN}-perl ${PN}-python" |
380 | 391 | ||
381 | RDEPENDS:${PN} += "elfutils bash" | 392 | RDEPENDS:${PN} += "elfutils bash" |
382 | RDEPENDS:${PN}-archive =+ "bash" | 393 | RDEPENDS:${PN}-archive =+ "bash" |
383 | RDEPENDS:${PN}-python =+ "bash python3 python3-modules ${@bb.utils.contains('PACKAGECONFIG', 'audit', 'audit-python', '', d)}" | 394 | RDEPENDS:${PN}-python =+ "bash python3 python3-modules ${@bb.utils.contains('PACKAGECONFIG', 'audit', 'audit-python', '', d)}" |
384 | RDEPENDS:${PN}-perl =+ "bash perl perl-modules" | 395 | RDEPENDS:${PN}-perl =+ "bash perl perl-modules" |
385 | RDEPENDS:${PN}-tests =+ "python3 bash" | 396 | RDEPENDS:${PN}-tests =+ "python3 bash perl" |
386 | 397 | ||
387 | RSUGGESTS:${PN} += "${PN}-archive ${PN}-tests \ | 398 | RSUGGESTS:${PN} += "${PN}-archive ${PN}-tests \ |
388 | ${@bb.utils.contains('PACKAGECONFIG', 'perl', '${PN}-perl', '', d)} \ | 399 | ${@bb.utils.contains('PACKAGECONFIG', 'perl', '${PN}-perl', '', d)} \ |
diff --git a/meta/recipes-kernel/powertop/powertop_2.15.bb b/meta/recipes-kernel/powertop/powertop_2.15.bb index 65c6d0fcd3..a9008b4074 100644 --- a/meta/recipes-kernel/powertop/powertop_2.15.bb +++ b/meta/recipes-kernel/powertop/powertop_2.15.bb | |||
@@ -11,9 +11,7 @@ SRC_URI = "git://github.com/fenrus75/powertop;protocol=https;branch=master \ | |||
11 | " | 11 | " |
12 | SRCREV = "d51ad395436d4d1dcc3ca46e1519ffeb475bf651" | 12 | SRCREV = "d51ad395436d4d1dcc3ca46e1519ffeb475bf651" |
13 | 13 | ||
14 | S = "${WORKDIR}/git" | 14 | LDFLAGS += "-pthread" |
15 | |||
16 | LDFLAGS:append = " -pthread" | ||
17 | 15 | ||
18 | inherit autotools gettext pkgconfig bash-completion | 16 | inherit autotools gettext pkgconfig bash-completion |
19 | 17 | ||
diff --git a/meta/recipes-kernel/systemtap/systemtap-native_git.bb b/meta/recipes-kernel/systemtap/systemtap-native_5.3.bb index 2690b259c8..8befa7a7ea 100644 --- a/meta/recipes-kernel/systemtap/systemtap-native_git.bb +++ b/meta/recipes-kernel/systemtap/systemtap-native_5.3.bb | |||
@@ -1,5 +1,4 @@ | |||
1 | 1 | require systemtap_${PV}.bb | |
2 | require systemtap_git.bb | ||
3 | 2 | ||
4 | inherit_defer native | 3 | inherit_defer native |
5 | 4 | ||
diff --git a/meta/recipes-kernel/systemtap/systemtap/0001-Install-python-modules-to-correct-library-dir.patch b/meta/recipes-kernel/systemtap/systemtap/0001-Install-python-modules-to-correct-library-dir.patch index 48cf4aee85..ee9baedcda 100644 --- a/meta/recipes-kernel/systemtap/systemtap/0001-Install-python-modules-to-correct-library-dir.patch +++ b/meta/recipes-kernel/systemtap/systemtap/0001-Install-python-modules-to-correct-library-dir.patch | |||
@@ -1,4 +1,4 @@ | |||
1 | From 2ada22f05460223924efe54080cb4419e2b4c276 Mon Sep 17 00:00:00 2001 | 1 | From 18d088d10c1a0885fa25ac40591e38c8aa545c81 Mon Sep 17 00:00:00 2001 |
2 | From: Alexander Kanavin <alex.kanavin@gmail.com> | 2 | From: Alexander Kanavin <alex.kanavin@gmail.com> |
3 | Date: Fri, 24 Feb 2017 17:53:02 +0200 | 3 | Date: Fri, 24 Feb 2017 17:53:02 +0200 |
4 | Subject: [PATCH] Install python modules to correct library dir. | 4 | Subject: [PATCH] Install python modules to correct library dir. |
@@ -19,7 +19,7 @@ Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | |||
19 | 1 file changed, 6 insertions(+), 2 deletions(-) | 19 | 1 file changed, 6 insertions(+), 2 deletions(-) |
20 | 20 | ||
21 | diff --git a/python/Makefile.am b/python/Makefile.am | 21 | diff --git a/python/Makefile.am b/python/Makefile.am |
22 | index a254480..578602f 100644 | 22 | index 13618dc2f..9d5cb7bcb 100644 |
23 | --- a/python/Makefile.am | 23 | --- a/python/Makefile.am |
24 | +++ b/python/Makefile.am | 24 | +++ b/python/Makefile.am |
25 | @@ -8,6 +8,10 @@ AUTOMAKE_OPTIONS = subdir-objects | 25 | @@ -8,6 +8,10 @@ AUTOMAKE_OPTIONS = subdir-objects |
@@ -35,7 +35,7 @@ index a254480..578602f 100644 | |||
35 | pkglibexecpython_PYTHON = | 35 | pkglibexecpython_PYTHON = |
36 | @@ -47,7 +51,7 @@ install-exec-local: | 36 | @@ -47,7 +51,7 @@ install-exec-local: |
37 | if HAVE_PYTHON2_PROBES | 37 | if HAVE_PYTHON2_PROBES |
38 | (cd $(srcdir); CFLAGS="$(AM_CPPFLAGS)" $(PYTHON) setup.py build \ | 38 | (cd $(srcdir); CFLAGS="$(CFLAGS) $(AM_CPPFLAGS)" $(PYTHON) setup.py build \ |
39 | --build-base $(shell readlink -f $(builddir))/py2build \ | 39 | --build-base $(shell readlink -f $(builddir))/py2build \ |
40 | - install --prefix $(DESTDIR)$(prefix) \ | 40 | - install --prefix $(DESTDIR)$(prefix) \ |
41 | + install --root $(DESTDIR) --prefix $(prefix) --prefix $(prefix) --install-lib=${pythondir} \ | 41 | + install --root $(DESTDIR) --prefix $(prefix) --prefix $(prefix) --install-lib=${pythondir} \ |
@@ -44,13 +44,10 @@ index a254480..578602f 100644 | |||
44 | --verbose) | 44 | --verbose) |
45 | @@ -55,7 +59,7 @@ endif | 45 | @@ -55,7 +59,7 @@ endif |
46 | if HAVE_PYTHON3_PROBES | 46 | if HAVE_PYTHON3_PROBES |
47 | (cd $(srcdir); CFLAGS="$(AM_CPPFLAGS)" $(PYTHON3) setup.py build \ | 47 | (cd $(srcdir); CFLAGS="$(CFLAGS) $(AM_CPPFLAGS)" $(PYTHON3) setup.py build \ |
48 | --build-base $(shell readlink -f $(builddir))/py3build \ | 48 | --build-base $(shell readlink -f $(builddir))/py3build \ |
49 | - install --prefix $(DESTDIR)$(prefix) \ | 49 | - install --prefix $(DESTDIR)$(prefix) \ |
50 | + install --root $(DESTDIR) --prefix $(prefix) --install-lib=${python3dir} \ | 50 | + install --root $(DESTDIR) --prefix $(prefix) --install-lib=${python3dir} \ |
51 | --single-version-externally-managed \ | 51 | --single-version-externally-managed \ |
52 | --record $(shell readlink -f $(builddir))/py3build/install_files.txt \ | 52 | --record $(shell readlink -f $(builddir))/py3build/install_files.txt \ |
53 | --verbose) | 53 | --verbose) |
54 | -- | ||
55 | 2.7.4 | ||
56 | |||
diff --git a/meta/recipes-kernel/systemtap/systemtap/0001-Makefile.am-remove-runtime-linux-uprobes-and-runtime.patch b/meta/recipes-kernel/systemtap/systemtap/0001-Makefile.am-remove-runtime-linux-uprobes-and-runtime.patch deleted file mode 100644 index 2d46a3962d..0000000000 --- a/meta/recipes-kernel/systemtap/systemtap/0001-Makefile.am-remove-runtime-linux-uprobes-and-runtime.patch +++ /dev/null | |||
@@ -1,40 +0,0 @@ | |||
1 | From 5a01e28bd806326b2143e3e6bb28d4780c5d879d Mon Sep 17 00:00:00 2001 | ||
2 | From: Victor Kamensky <victor.kamensky7@gmail.com> | ||
3 | Date: Sun, 3 Dec 2023 18:40:05 -0800 | ||
4 | Subject: [PATCH] Makefile.am: remove runtime/linux/uprobes and | ||
5 | runtime/linux/uprobes2 install | ||
6 | |||
7 | "PR30434 continuation: Removed old uprobes, uprobes2 implementation, | ||
8 | uprobes-inc.h & any mentions of CONFIG_UTRACE." commit removed uprobes, | ||
9 | and uprobes2 sources and directories, but Makefile.am still tries to | ||
10 | install them. In fact after failing to 'cd' into runtime/linux/uprobes | ||
11 | directory it copies top level *.[ch] files into | ||
12 | ${prefix}/share/systemtap/runtime/linux/uprobes directory. | ||
13 | |||
14 | The issue was caught by OpenEmbedded project do_package_qa checks. | ||
15 | |||
16 | Signed-off-by: Victor Kamensky <victor.kamensky7@gmail.com> | ||
17 | |||
18 | Upstream-Status: Submitted [https://sourceware.org/pipermail/systemtap/2023q4/027880.html] | ||
19 | --- | ||
20 | Makefile.am | 4 ---- | ||
21 | 1 file changed, 4 deletions(-) | ||
22 | |||
23 | diff --git a/Makefile.am b/Makefile.am | ||
24 | index 5737c6b20..2ba896088 100644 | ||
25 | --- a/Makefile.am | ||
26 | +++ b/Makefile.am | ||
27 | @@ -277,10 +277,6 @@ endif | ||
28 | do $(INSTALL_DATA) -D $$f $(DESTDIR)$(pkgdatadir)/runtime/softfloat/$$f; done) | ||
29 | (cd $(srcdir)/runtime/linux; for f in *.[ch]; \ | ||
30 | do $(INSTALL_DATA) -D $$f $(DESTDIR)$(pkgdatadir)/runtime/linux/$$f; done) | ||
31 | - (cd $(srcdir)/runtime/linux/uprobes; for f in Makefile *.[ch]; \ | ||
32 | - do $(INSTALL_DATA) -D $$f $(DESTDIR)$(pkgdatadir)/runtime/linux/uprobes/$$f; done) | ||
33 | - (cd $(srcdir)/runtime/linux/uprobes2; for f in *.[ch]; \ | ||
34 | - do $(INSTALL_DATA) -D $$f $(DESTDIR)$(pkgdatadir)/runtime/linux/uprobes2/$$f; done) | ||
35 | (cd $(srcdir)/tapset; find . \( -name '*.stp' -o -name '*.stpm' -o -name README \) -print \ | ||
36 | | while read f; do $(INSTALL_DATA) -D $$f $(DESTDIR)$(pkgdatadir)/tapset/$$f; done) | ||
37 | (cd $(srcdir)/testsuite/systemtap.examples; find . -type f -print \ | ||
38 | -- | ||
39 | 2.31.1 | ||
40 | |||
diff --git a/meta/recipes-kernel/systemtap/systemtap/0001-bpf-translate.cxx-fix-build-against-upcoming-gcc-14-.patch b/meta/recipes-kernel/systemtap/systemtap/0001-bpf-translate.cxx-fix-build-against-upcoming-gcc-14-.patch deleted file mode 100644 index e3d94d9312..0000000000 --- a/meta/recipes-kernel/systemtap/systemtap/0001-bpf-translate.cxx-fix-build-against-upcoming-gcc-14-.patch +++ /dev/null | |||
@@ -1,40 +0,0 @@ | |||
1 | From d42139cf9cd26d0c0363fcfe007716baeb8de517 Mon Sep 17 00:00:00 2001 | ||
2 | From: Sergei Trofimovich <slyich@gmail.com> | ||
3 | Date: Fri, 22 Dec 2023 19:42:38 +0000 | ||
4 | Subject: [PATCH] bpf-translate.cxx: fix build against upcoming `gcc-14` | ||
5 | (`-Werror=calloc-transposed-args`) | ||
6 | |||
7 | `gcc-14` added a new `-Wcalloc-transposed-args` warning recently. It | ||
8 | detected minor infelicity in `calloc()` API usage in `systemtap`: | ||
9 | |||
10 | bpf-translate.cxx: In function 'bpf::BPF_Section* bpf::output_probe(BPF_Output&, program&, const std::string&, unsigned int)': | ||
11 | bpf-translate.cxx:5044:39: error: 'void* calloc(size_t, size_t)' sizes specified with 'sizeof' in the earlier argument and not in the later argument [-Werror=calloc-transposed-args] | ||
12 | 5044 | bpf_insn *buf = (bpf_insn*) calloc (sizeof(bpf_insn), ninsns); | ||
13 | | ^~~~~~~~~~~~~~~~ | ||
14 | bpf-translate.cxx:5044:39: note: earlier argument should specify number of elements, later size of each element | ||
15 | |||
16 | Upstream-Status: Backport [https://sourceware.org/git/?p=systemtap.git;a=commit;h=d42139cf9cd26d0c0363fcfe007716baeb8de517] | ||
17 | Signed-off-by: Khem Raj <raj.khem@gmail.com> | ||
18 | --- | ||
19 | bpf-translate.cxx | 4 ++-- | ||
20 | 1 file changed, 2 insertions(+), 2 deletions(-) | ||
21 | |||
22 | diff --git a/bpf-translate.cxx b/bpf-translate.cxx | ||
23 | index 1a9302463..aa8ef65ce 100644 | ||
24 | --- a/bpf-translate.cxx | ||
25 | +++ b/bpf-translate.cxx | ||
26 | @@ -5041,9 +5041,9 @@ output_probe(BPF_Output &eo, program &prog, | ||
27 | } | ||
28 | } | ||
29 | |||
30 | - bpf_insn *buf = (bpf_insn*) calloc (sizeof(bpf_insn), ninsns); | ||
31 | + bpf_insn *buf = (bpf_insn*) calloc (ninsns, sizeof(bpf_insn)); | ||
32 | assert (buf); | ||
33 | - Elf64_Rel *rel = (Elf64_Rel*) calloc (sizeof(Elf64_Rel), nreloc); | ||
34 | + Elf64_Rel *rel = (Elf64_Rel*) calloc (nreloc, sizeof(Elf64_Rel)); | ||
35 | assert (rel); | ||
36 | |||
37 | unsigned i = 0, r = 0; | ||
38 | -- | ||
39 | 2.43.0 | ||
40 | |||
diff --git a/meta/recipes-kernel/systemtap/systemtap/0001-configure.ac-fix-broken-libdebuginfod-library-auto-d.patch b/meta/recipes-kernel/systemtap/systemtap/0001-configure.ac-fix-broken-libdebuginfod-library-auto-d.patch deleted file mode 100644 index 98641826f6..0000000000 --- a/meta/recipes-kernel/systemtap/systemtap/0001-configure.ac-fix-broken-libdebuginfod-library-auto-d.patch +++ /dev/null | |||
@@ -1,51 +0,0 @@ | |||
1 | From 3913ad3e28a19811e1b52338112344a487057e4f Mon Sep 17 00:00:00 2001 | ||
2 | From: Victor Kamensky <victor.kamensky7@gmail.com> | ||
3 | Date: Mon, 18 Dec 2023 03:13:38 +0000 | ||
4 | Subject: [PATCH 1/2] configure.ac: fix broken libdebuginfod library auto | ||
5 | detection | ||
6 | |||
7 | After 2e67b053e3796ee7cf29a39f9698729b52078406 "configury: rework debuginfod searches" | ||
8 | commit, libdebuginfod.so library auto detection is broken. It was reported by Martin Jansa | ||
9 | on openembedded-core mailing list [1]. | ||
10 | |||
11 | Currently configure.ac does "AC_DEFINE([HAVE_LIBDEBUGINFOD], [1] ..." as long as | ||
12 | no --without-debuginfod option is passed, regardless PKG_CHECK_MODULES check result. | ||
13 | It seems to be bad copy/paste. Address the issue by moving the AC_DEFINE back to | ||
14 | PKG_CHECK_MODULES action-if-found block. | ||
15 | |||
16 | To reproduce the issue on FC system, one can do the following | ||
17 | "sudo dnf remove elfutils-debuginfod-client-devel" and then try to build SystemTap | ||
18 | util.cxx will fail to compile because of missing elfutils/debuginfod.h because | ||
19 | config.h will have "#define HAVE_LIBDEBUGINFOD 1", while config.log and configure | ||
20 | output indicates that check for libdebuginfod library failed. | ||
21 | |||
22 | [1] https://lists.openembedded.org/g/openembedded-core/message/192109?p=%2C%2C%2C20%2C0%2C0%2C0%3A%3Acreated%2C0%2Csystemtap%2C20%2C2%2C0%2C102987514 | ||
23 | |||
24 | Upstream-Status: Submitted [https://sourceware.org/pipermail/systemtap/2023q4/027914.html] | ||
25 | Signed-off-by: Victor Kamensky <victor.kamensky7@gmail.com> | ||
26 | --- | ||
27 | configure.ac | 5 ++--- | ||
28 | 1 file changed, 2 insertions(+), 3 deletions(-) | ||
29 | |||
30 | diff --git a/configure.ac b/configure.ac | ||
31 | index d9559c5c3..18cd7f84a 100644 | ||
32 | --- a/configure.ac | ||
33 | +++ b/configure.ac | ||
34 | @@ -219,12 +219,11 @@ dnl take the user at his or her word | ||
35 | elif test "x$with_debuginfod" != xno; then | ||
36 | dnl check in the system pkgconfig | ||
37 | PKG_CHECK_MODULES([debuginfod], [libdebuginfod >= 0.179], | ||
38 | - [have_debuginfod=1], | ||
39 | + [have_debuginfod=1 | ||
40 | + AC_DEFINE([HAVE_LIBDEBUGINFOD], [1], [Define to 1 if debuginfod is enabled.])], | ||
41 | [if test "x$with_debuginfod" = xyes; then | ||
42 | AC_MSG_ERROR(["--with-debuginfod was given, but libdebuginfod is missing or unusable."]) | ||
43 | fi]) | ||
44 | - AC_DEFINE([HAVE_LIBDEBUGINFOD], [1], [Define to 1 if debuginfod is enabled.]) | ||
45 | - AC_MSG_RESULT([yes]) | ||
46 | else | ||
47 | AC_MSG_RESULT([no]) | ||
48 | fi | ||
49 | -- | ||
50 | 2.31.1 | ||
51 | |||
diff --git a/meta/recipes-kernel/systemtap/systemtap/0001-improve-reproducibility-for-c-compiling.patch b/meta/recipes-kernel/systemtap/systemtap/0001-improve-reproducibility-for-c-compiling.patch index 15a6f2a9a5..7d35f76b29 100644 --- a/meta/recipes-kernel/systemtap/systemtap/0001-improve-reproducibility-for-c-compiling.patch +++ b/meta/recipes-kernel/systemtap/systemtap/0001-improve-reproducibility-for-c-compiling.patch | |||
@@ -13,19 +13,16 @@ Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com> | |||
13 | stringtable.h | 2 +- | 13 | stringtable.h | 2 +- |
14 | 1 file changed, 1 insertion(+), 1 deletion(-) | 14 | 1 file changed, 1 insertion(+), 1 deletion(-) |
15 | 15 | ||
16 | diff --git a/stringtable.h b/stringtable.h | 16 | Index: git/stringtable.h |
17 | index 5fc42e7..6fd8a1e 100644 | 17 | =================================================================== |
18 | --- a/stringtable.h | 18 | --- git.orig/stringtable.h |
19 | +++ b/stringtable.h | 19 | +++ git/stringtable.h |
20 | @@ -19,7 +19,7 @@ | 20 | @@ -23,7 +23,7 @@ |
21 | 21 | ||
22 | #if defined(HAVE_BOOST_UTILITY_STRING_REF_HPP) | 22 | #if 0 && defined(HAVE_BOOST_UTILITY_STRING_REF_HPP) |
23 | #include <boost/version.hpp> | 23 | #include <boost/version.hpp> |
24 | -#include <boost/utility/string_ref.hpp> //header with string_ref | 24 | -#include <boost/utility/string_ref.hpp> //header with string_ref |
25 | +#include "@RELATIVE_STAGING_INCDIR@/boost/utility/string_ref.hpp" //header with string_ref | 25 | +#include "@RELATIVE_STAGING_INCDIR@/boost/utility/string_ref.hpp" //header with string_ref |
26 | 26 | ||
27 | // XXX: experimental tunables | 27 | // XXX: experimental tunables |
28 | #define INTERNED_STRING_FIND_MEMMEM 1 /* perf stat indicates a very slight benefit */ | 28 | #define INTERNED_STRING_FIND_MEMMEM 1 /* perf stat indicates a very slight benefit */ |
29 | -- | ||
30 | 2.7.4 | ||
31 | |||
diff --git a/meta/recipes-kernel/systemtap/systemtap/0001-prerelease-datestamp-fixes.patch b/meta/recipes-kernel/systemtap/systemtap/0001-prerelease-datestamp-fixes.patch deleted file mode 100644 index afdc10a3fe..0000000000 --- a/meta/recipes-kernel/systemtap/systemtap/0001-prerelease-datestamp-fixes.patch +++ /dev/null | |||
@@ -1,23 +0,0 @@ | |||
1 | From cfc2c1d53924face11e3fab78ded61c359778eb9 Mon Sep 17 00:00:00 2001 | ||
2 | From: "Frank Ch. Eigler" <fche@redhat.com> | ||
3 | Date: Sat, 4 Nov 2023 12:19:59 -0400 | ||
4 | Subject: [PATCH] prerelease datestamp fixes | ||
5 | |||
6 | Upstream-Status: Backport | ||
7 | --- | ||
8 | NEWS | 2 +- | ||
9 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
10 | |||
11 | diff --git a/NEWS b/NEWS | ||
12 | index c7f31e8b7..f0f9056c4 100644 | ||
13 | --- a/NEWS | ||
14 | +++ b/NEWS | ||
15 | @@ -1,4 +1,4 @@ | ||
16 | -* What's new in version 5.0, 2023-11-03 | ||
17 | +* What's new in version 5.0, 2023-11-04 | ||
18 | |||
19 | - Performance improvements in uprobe registration and module startup. | ||
20 | |||
21 | -- | ||
22 | 2.31.1 | ||
23 | |||
diff --git a/meta/recipes-kernel/systemtap/systemtap/0001-python-Makefile.am-use-absolute-path-for-source-dire.patch b/meta/recipes-kernel/systemtap/systemtap/0001-python-Makefile.am-use-absolute-path-for-source-dire.patch new file mode 100644 index 0000000000..dacd19edd1 --- /dev/null +++ b/meta/recipes-kernel/systemtap/systemtap/0001-python-Makefile.am-use-absolute-path-for-source-dire.patch | |||
@@ -0,0 +1,36 @@ | |||
1 | From 71e4ffd46dbbb7de1d06edb66f3e1fe0de423586 Mon Sep 17 00:00:00 2001 | ||
2 | From: Alexander Kanavin <alex@linutronix.de> | ||
3 | Date: Wed, 21 May 2025 13:25:46 +0200 | ||
4 | Subject: [PATCH] python/Makefile.am: use absolute path for source directory | ||
5 | includes as well | ||
6 | |||
7 | Otherwise it would be relative to the build directory, | ||
8 | which works only if the build and source directory are in the | ||
9 | same parent directory, and breaks if they're on different levels. | ||
10 | |||
11 | Upstream-Status: Submitted [by email to fche@redhat.com,wcohen@redhat.com,systemtap@sourceware.org] | ||
12 | Signed-off-by: Alexander Kanavin <alex@linutronix.de> | ||
13 | --- | ||
14 | python/Makefile.am | 4 ++-- | ||
15 | 1 file changed, 2 insertions(+), 2 deletions(-) | ||
16 | |||
17 | diff --git a/python/Makefile.am b/python/Makefile.am | ||
18 | index 9d5cb7bcb..130e90b24 100644 | ||
19 | --- a/python/Makefile.am | ||
20 | +++ b/python/Makefile.am | ||
21 | @@ -2,10 +2,10 @@ | ||
22 | |||
23 | AUTOMAKE_OPTIONS = subdir-objects | ||
24 | |||
25 | -# Note that we have to use 'abs_builddir' here since we change | ||
26 | +# Note that we have to use absolute directores here since we change | ||
27 | # directories back to the source directory when building the python | ||
28 | # extension. | ||
29 | -AM_CPPFLAGS = -I$(srcdir)/../includes | ||
30 | +AM_CPPFLAGS = -I$(abs_srcdir)/../includes | ||
31 | AM_CPPFLAGS += -I$(abs_builddir)/../includes/sys | ||
32 | |||
33 | # Add OE's CFLAGS which contains `-fdebug-prefix-map' options to | ||
34 | -- | ||
35 | 2.39.5 | ||
36 | |||
diff --git a/meta/recipes-kernel/systemtap/systemtap/0001-staprun-fix-build-against-upcoming-gcc-14-Werror-cal.patch b/meta/recipes-kernel/systemtap/systemtap/0001-staprun-fix-build-against-upcoming-gcc-14-Werror-cal.patch deleted file mode 100644 index 22578fb3f6..0000000000 --- a/meta/recipes-kernel/systemtap/systemtap/0001-staprun-fix-build-against-upcoming-gcc-14-Werror-cal.patch +++ /dev/null | |||
@@ -1,36 +0,0 @@ | |||
1 | From 52596f023652114642faba5726c99488529029ce Mon Sep 17 00:00:00 2001 | ||
2 | From: Sergei Trofimovich <slyich@gmail.com> | ||
3 | Date: Thu, 21 Dec 2023 10:00:06 +0000 | ||
4 | Subject: [PATCH] staprun: fix build against upcoming `gcc-14` | ||
5 | (`-Werror=calloc-transposed-args`) | ||
6 | |||
7 | `gcc-14` added a new `-Wcalloc-transposed-args` warning recently. It | ||
8 | detected minor infelicity in `calloc()` API usage in `systemtap`: | ||
9 | |||
10 | staprun.c: In function 'main': | ||
11 | staprun.c:550:50: error: 'calloc' sizes specified with 'sizeof' in the earlier argument and not in the later argument [-Werror=calloc-transposed-args] | ||
12 | 550 | char ** new_argv = calloc(sizeof(char *),argc+2); | ||
13 | | ^~~~ | ||
14 | |||
15 | Upstream-Status: Backport [https://sourceware.org/git/?p=systemtap.git;a=commit;h=52596f023652114642faba5726c99488529029ce] | ||
16 | Signed-off-by: Khem Raj <raj.khem@gmail.com> | ||
17 | --- | ||
18 | staprun/staprun.c | 2 +- | ||
19 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
20 | |||
21 | diff --git a/staprun/staprun.c b/staprun/staprun.c | ||
22 | index 8437f3af6..d1b0b221b 100644 | ||
23 | --- a/staprun/staprun.c | ||
24 | +++ b/staprun/staprun.c | ||
25 | @@ -547,7 +547,7 @@ int main(int argc, char **argv) | ||
26 | us to extend argv[], with all the C fun that entails. */ | ||
27 | #ifdef HAVE_OPENAT | ||
28 | if (relay_basedir_fd >= 0) { | ||
29 | - char ** new_argv = calloc(sizeof(char *),argc+2); | ||
30 | + char ** new_argv = calloc(argc+2, sizeof(char *)); | ||
31 | const int new_Foption_size = 10; /* -FNNNNN */ | ||
32 | char * new_Foption = malloc(new_Foption_size); | ||
33 | int i; | ||
34 | -- | ||
35 | 2.43.0 | ||
36 | |||
diff --git a/meta/recipes-kernel/systemtap/systemtap_git.bb b/meta/recipes-kernel/systemtap/systemtap_5.3.bb index 68f5c76428..588b3b8d36 100644 --- a/meta/recipes-kernel/systemtap/systemtap_git.bb +++ b/meta/recipes-kernel/systemtap/systemtap_5.3.bb | |||
@@ -9,6 +9,7 @@ require systemtap_git.inc | |||
9 | SRC_URI += " \ | 9 | SRC_URI += " \ |
10 | file://0001-improve-reproducibility-for-c-compiling.patch \ | 10 | file://0001-improve-reproducibility-for-c-compiling.patch \ |
11 | file://0001-staprun-address-ncurses-6.3-failures.patch \ | 11 | file://0001-staprun-address-ncurses-6.3-failures.patch \ |
12 | file://0001-python-Makefile.am-use-absolute-path-for-source-dire.patch \ | ||
12 | " | 13 | " |
13 | 14 | ||
14 | DEPENDS = "elfutils" | 15 | DEPENDS = "elfutils" |
@@ -17,6 +18,7 @@ EXTRA_OECONF += "--with-libelf=${STAGING_DIR_TARGET} --without-rpm \ | |||
17 | --without-nss --without-avahi --without-dyninst \ | 18 | --without-nss --without-avahi --without-dyninst \ |
18 | --disable-server --disable-grapher --enable-prologues \ | 19 | --disable-server --disable-grapher --enable-prologues \ |
19 | --with-python3 --without-python2-probes \ | 20 | --with-python3 --without-python2-probes \ |
21 | --with-extra-version="oe" \ | ||
20 | ac_cv_prog_have_javac=no \ | 22 | ac_cv_prog_have_javac=no \ |
21 | ac_cv_prog_have_jar=no " | 23 | ac_cv_prog_have_jar=no " |
22 | 24 | ||
@@ -35,9 +37,6 @@ PACKAGECONFIG[debuginfod] = "--with-debuginfod, --without-debuginfod" | |||
35 | inherit autotools gettext pkgconfig systemd | 37 | inherit autotools gettext pkgconfig systemd |
36 | inherit_defer ${@bb.utils.contains('PACKAGECONFIG', 'python3-probes', 'setuptools3-base', '', d)} | 38 | inherit_defer ${@bb.utils.contains('PACKAGECONFIG', 'python3-probes', 'setuptools3-base', '', d)} |
37 | 39 | ||
38 | # | ../git/elaborate.cxx:2601:21: error: storing the address of local variable 'sym' in '*s.systemtap_session::symbol_resolver' [-Werror=dangling-pointer=] | ||
39 | CXXFLAGS += "-Wno-dangling-pointer" | ||
40 | |||
41 | # exporter comes with python3-probes | 40 | # exporter comes with python3-probes |
42 | PACKAGES =+ "${PN}-exporter" | 41 | PACKAGES =+ "${PN}-exporter" |
43 | FILES:${PN}-exporter = "${sysconfdir}/stap-exporter/* \ | 42 | FILES:${PN}-exporter = "${sysconfdir}/stap-exporter/* \ |
@@ -101,3 +100,7 @@ do_install:append () { | |||
101 | } | 100 | } |
102 | 101 | ||
103 | BBCLASSEXTEND = "nativesdk" | 102 | BBCLASSEXTEND = "nativesdk" |
103 | |||
104 | # Emits lot of warning which are treated as errors | ||
105 | # They must be looked into before disabling | ||
106 | TOOLCHAIN = "gcc" | ||
diff --git a/meta/recipes-kernel/systemtap/systemtap_git.inc b/meta/recipes-kernel/systemtap/systemtap_git.inc index c574bcb2ba..86336b0779 100644 --- a/meta/recipes-kernel/systemtap/systemtap_git.inc +++ b/meta/recipes-kernel/systemtap/systemtap_git.inc | |||
@@ -1,24 +1,17 @@ | |||
1 | LICENSE = "GPL-2.0-only" | 1 | LICENSE = "GPL-2.0-only" |
2 | LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263" | 2 | LIC_FILES_CHKSUM = "file://COPYING;md5=b234ee4d69f5fce4486a80fdaf4a4263" |
3 | SRCREV = "e72dc118e563c645d93a1a2d771e8d90e8fec1ae" | ||
4 | PV = "5.0" | ||
5 | 3 | ||
6 | SRC_URI = "git://sourceware.org/git/systemtap.git;branch=master;protocol=https \ | 4 | SRC_URI = "git://sourceware.org/git/systemtap.git;protocol=https;branch=master;tag=release-${PV} \ |
7 | file://0001-Do-not-let-configure-write-a-python-location-into-th.patch \ | 5 | file://0001-Do-not-let-configure-write-a-python-location-into-th.patch \ |
8 | file://0001-Install-python-modules-to-correct-library-dir.patch \ | 6 | file://0001-Install-python-modules-to-correct-library-dir.patch \ |
9 | file://0001-staprun-stapbpf-don-t-support-installing-a-non-root.patch \ | 7 | file://0001-staprun-stapbpf-don-t-support-installing-a-non-root.patch \ |
10 | file://0001-Makefile.am-remove-runtime-linux-uprobes-and-runtime.patch \ | ||
11 | file://0001-prerelease-datestamp-fixes.patch \ | ||
12 | file://0001-configure.ac-fix-broken-libdebuginfod-library-auto-d.patch \ | ||
13 | file://0001-bpf-translate.cxx-fix-build-against-upcoming-gcc-14-.patch \ | ||
14 | file://0001-staprun-fix-build-against-upcoming-gcc-14-Werror-cal.patch \ | ||
15 | " | 8 | " |
16 | 9 | ||
10 | SRCREV = "c4fc655170b534478a6b131292b987630c7c0865" | ||
11 | |||
17 | COMPATIBLE_HOST = '(x86_64|i.86|powerpc|arm|aarch64|microblazeel|mips|riscv64).*-linux' | 12 | COMPATIBLE_HOST = '(x86_64|i.86|powerpc|arm|aarch64|microblazeel|mips|riscv64).*-linux' |
18 | COMPATIBLE_HOST:libc-musl = 'null' | 13 | COMPATIBLE_HOST:libc-musl = 'null' |
19 | 14 | ||
20 | S = "${WORKDIR}/git" | ||
21 | |||
22 | # systemtap can't be built without optimization, if someone tries to compile an | 15 | # systemtap can't be built without optimization, if someone tries to compile an |
23 | # entire image as -O0, break with fatal. | 16 | # entire image as -O0, break with fatal. |
24 | python () { | 17 | python () { |
diff --git a/meta/recipes-kernel/wireless-regdb/wireless-regdb_2024.01.23.bb b/meta/recipes-kernel/wireless-regdb/wireless-regdb_2025.02.20.bb index 8fde236ab4..09fff768c4 100644 --- a/meta/recipes-kernel/wireless-regdb/wireless-regdb_2024.01.23.bb +++ b/meta/recipes-kernel/wireless-regdb/wireless-regdb_2025.02.20.bb | |||
@@ -5,7 +5,7 @@ LICENSE = "ISC" | |||
5 | LIC_FILES_CHKSUM = "file://LICENSE;md5=07c4f6dea3845b02a18dc00c8c87699c" | 5 | LIC_FILES_CHKSUM = "file://LICENSE;md5=07c4f6dea3845b02a18dc00c8c87699c" |
6 | 6 | ||
7 | SRC_URI = "https://www.kernel.org/pub/software/network/${BPN}/${BP}.tar.xz" | 7 | SRC_URI = "https://www.kernel.org/pub/software/network/${BPN}/${BP}.tar.xz" |
8 | SRC_URI[sha256sum] = "c8a61c9acf76fa7eb4239e89f640dee3e87098d9f69b4d3518c9c60fc6d20c55" | 8 | SRC_URI[sha256sum] = "57f8e7721cf5a880c13ae0c202edbb21092a060d45f9e9c59bcd2a8272bfa456" |
9 | 9 | ||
10 | inherit bin_package allarch | 10 | inherit bin_package allarch |
11 | 11 | ||