]>
git.ipfire.org Git - thirdparty/openembedded/openembedded-core.git/log
Khem Raj [Sun, 12 Apr 2026 03:57:57 +0000 (20:57 -0700)]
u-boot-tools: Add dependency on libyaml for dtschema validation
yamltree host tool, used to emit YAML from the DT, is now
built as part of the normal u-boot-tools build to support
the schema infrastructure
Fixes link errors like
| /usr/bin/ld: scripts/dtc/yamltree.o: in function `dt_to_yaml':
| yamltree.c:(.text+0x91b): undefined reference to `yaml_emitter_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x926): undefined reference to `yaml_emitter_set_output_file'
| /usr/bin/ld: yamltree.c:(.text+0x933): undefined reference to `yaml_stream_start_event_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x93e): undefined reference to `yaml_emitter_emit'
| /usr/bin/ld: yamltree.c:(.text+0x957): undefined reference to `yaml_document_start_event_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x962): undefined reference to `yaml_emitter_emit'
| /usr/bin/ld: yamltree.c:(.text+0x983): undefined reference to `yaml_sequence_start_event_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x98e): undefined reference to `yaml_emitter_emit'
| /usr/bin/ld: yamltree.c:(.text+0x9ab): undefined reference to `yaml_sequence_end_event_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x9b6): undefined reference to `yaml_emitter_emit'
| /usr/bin/ld: yamltree.c:(.text+0x9c8): undefined reference to `yaml_document_end_event_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x9d3): undefined reference to `yaml_emitter_emit'
| /usr/bin/ld: yamltree.c:(.text+0x9e3): undefined reference to `yaml_stream_end_event_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x9ee): undefined reference to `yaml_emitter_emit'
| /usr/bin/ld: yamltree.c:(.text+0x9fa): undefined reference to `yaml_emitter_delete'
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
João Marcos Costa [Fri, 24 Apr 2026 15:10:13 +0000 (17:10 +0200)]
soc-family.inc: improve clarity at MACHINEOVERRIDES's prepend
Use Python's ternary operator "A if condition else B".
Signed-off-by: João Marcos Costa <joaomarcos.costa@bootlin.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Zk47T [Thu, 23 Apr 2026 10:04:05 +0000 (17:04 +0700)]
oe-selftest: add test for useradd with only USERADD_DEPENDS
Add a test case to verify that a recipe inheriting useradd with only
USERADD_DEPENDS set (and no USERADD_PACKAGES) parses and builds
successfully. This validates the fix in useradd.bbclass for
[YOCTO #15863].
Signed-off-by: Nguyen Minh Tien <zizuzacker@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Zk47T [Thu, 23 Apr 2026 10:04:04 +0000 (17:04 +0700)]
meta-selftest: add usegroup-deponly recipe to test USERADD_DEPENDS only
Add a test recipe that inherits useradd and only sets USERADD_DEPENDS
without USERADD_PACKAGES to validate the fix for [YOCTO #15863].
The root bug is that useradd.bbclass unconditionally requires
USERADD_PACKAGES to be set, even when a recipe only needs to depend on
users/groups created by another recipe via USERADD_DEPENDS. This recipe
depends on creategroup1 for user gt1 and group grouptest, but does not
create any users/groups itself, exercising the code path fixed in the
previous commit.
Signed-off-by: Nguyen Minh Tien <zizuzacker@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Sam Kent [Tue, 21 Apr 2026 10:28:44 +0000 (11:28 +0100)]
package.py: fix kernel module file pre-filter and document strip asymmetry
Change the check to f.endswith(".ko"), consistent with strip_execs() and
with the /lib/modules/ guard already present in is_elf() and
splitdebuginfo().
Fixes [YOCTO #2348]
Signed-off-by: Sam Kent <sam.john.kent@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Tejas Kanfade [Tue, 21 Apr 2026 06:01:03 +0000 (11:31 +0530)]
pulseaudio: split pactl into a dedicated client subpackage
pactl is a client-side control utility and is required on
PipeWire-based systems for audio control. pactl was packaged
as part of pulseaudio-server, making it difficult to use
without also installing and enabling the pulseaudio daemon,
which can conflict with pipewire.
Move the pactl binary into a standalone pulseaudio-pactl subpackage
so it can be installed without pulling in the pulseaudio server.
Signed-off-by: Tejas Kanfade <tkanfade@qti.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Corentin Guillevic [Mon, 20 Apr 2026 14:31:55 +0000 (16:31 +0200)]
sanity: add check for own-mirrors/SOURCE_MIRROR_URL
The SOURCE_MIRROR_URL variable belongs to the own-mirrors class. However, the
user may forget to define it. This will cause the class to inject incorrect
content into PREMIRRORS, resulting in the following error:
ERROR: gettext-minimal-native-1.0-r0 do_fetch: Bitbake Fetcher Error: MalformedUrl('${SOURCE_MIRROR_URL}')
ERROR: Logfile of failure stored in: /path/to/tmp/work/x86_64-linux/gettext-minimal-native/1.0/temp/log.do_fetch.258066
ERROR: Task (/path/to/layers/poky/meta/recipes-core/gettext/gettext-minimal-native_1.0.bb:do_fetch) failed with exit code '1'
Add a check to the sanity class, to detect this case and raise an error.
Signed-off-by: Corentin Guillevic <corentin.guillevic@smile.fr>
Reviewed-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Bin Cao [Mon, 20 Apr 2026 02:42:37 +0000 (10:42 +0800)]
scripts/cve-json-to-text.py: simplify getopt argument parsing
Remove unused long options from getopt.getopt() call. The long options
"help", "input", and "output" were never handled in the option parsing
logic, so they are dead code.
Signed-off-by: Bin Cao <bin.cao.cn@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Li Wang [Fri, 24 Apr 2026 09:20:51 +0000 (17:20 +0800)]
perf: add PACKAGECONFIG for llvm
for avoiding to enable llvm option under uncommon condition,
make llvm controll under PACKAGECONFIG.
error log:
ERROR: perf-1.0-r2 do_package_qa: QA Issue: /usr/bin/trace contained in package perf requires libLLVM.so.2x.x(LLVM_2x.x)(64bit), but no providers found in RDEPENDS:perf? [file-rdeps]
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Trevor Gamblin [Thu, 23 Apr 2026 17:12:46 +0000 (13:12 -0400)]
python3-vcs-versioning: add ptest
The tests are in the 'testing_vcs' directory, so set PTEST_PYTEST_DIR
accordingly. Add setuptools, setuptools-scm, and git to the ptest
RDEPENDS, since many of the tests make use of them. Many of the skipped
tests depend on mercurial, but that's in meta-oe and not worth moving to
oe-core just for this.
Add python3-vcs-versioning to PTESTS_FAST in ptest-packagelists.inc,
since the suite only takes a few seconds.
We also need a custom run-ptest script for two reasons:
1. There is a 'vcs_versioning.test_api' used as a plugin. This is
mentioned in conftest.py but is intended to be picked up from
pyproject.toml, which we don't ship with the ptest image. Instead,
just add '-p vcs_versioning.test_api' to the pytest call.
2. The test logic tries to rewrite pytest's assertion failures, which
doesn't work well with our automake formatting. We can work around
this by telling pytest to output plain messages with --assert=plain.
Example test results:
|============================================================================
|Testsuite summary
|# TOTAL: 409
|# PASS: 364
|# SKIP: 44
|# XFAIL: 1
|# FAIL: 0
|# XPASS: 0
|# ERROR: 0
|DURATION: 3
|END: /usr/lib/python3-vcs-versioning/ptest
|2026-04-23T16:21
|STOP: ptest-runner
|TOTAL: 1 FAIL: 0
Signed-off-by: Trevor Gamblin <tgamblin@baylibre.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Trevor Gamblin [Thu, 23 Apr 2026 17:12:45 +0000 (13:12 -0400)]
maintainers.inc: add self for python3-uv-build
It's listed as unmaintained, so fix that.
Signed-off-by: Trevor Gamblin <tgamblin@baylibre.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Trevor Gamblin [Thu, 23 Apr 2026 17:12:44 +0000 (13:12 -0400)]
python3-setuptools-scm: upgrade 9.2.2 -> 10.0.5
Changelog: https://github.com/pypa/setuptools-scm/releases
Note that the releases page also includes notes for the vcs-versioning
module, which is published separately (and which setuptools-scm depends
on). The new python3-vcs-versioning recipe is added to dependency lists.
Also rework the DEPENDS list to match the same formatting as RDEPENDS.
Signed-off-by: Trevor Gamblin <tgamblin@baylibre.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Trevor Gamblin [Thu, 23 Apr 2026 17:12:43 +0000 (13:12 -0400)]
python3-vcs-versioning: add recipe
The setuptools-scm project[1] now ships a second module which can be
used independently of setuptools if desired. This is now a dependency
for setuptools-scm, so add a recipe for it.
Update the maintainers.inc file with the recipe and myself as
maintainer.
[1] https://github.com/pypa/setuptools-scm
Signed-off-by: Trevor Gamblin <tgamblin@baylibre.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Trevor Gamblin [Fri, 24 Apr 2026 18:41:05 +0000 (14:41 -0400)]
python3-urllib3: enable setuptools-scm 10.x
Backport a patch from upstream to allow python3-urllib3 2.6.3 to build
with python3-setuptools-scm 10.x, so that we can use an updated version
of that recipe.
Signed-off-by: Trevor Gamblin <tgamblin@baylibre.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Khem Raj [Thu, 16 Apr 2026 05:54:07 +0000 (22:54 -0700)]
libmpc: Upgrade to 1.4.0
- Add mpc_exp10, mpc_exp2, mpc_log2 functions
- Fix mpc_tan/mpc_tanh for large imaginary parts
- Fix mpc_pow imaginary sign with real inputs
- Fix mpc_fr_div/mpc_ui_div zero sign handling per C2Y draft
- Add pkg-config support
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Thu, 16 Apr 2026 05:54:06 +0000 (22:54 -0700)]
re2c: upgrade 4.4 -> 4.5.1
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Thu, 16 Apr 2026 05:54:05 +0000 (22:54 -0700)]
python3-lxml: upgrade 6.0.2 -> 6.0.4
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Thu, 16 Apr 2026 05:54:04 +0000 (22:54 -0700)]
python3-pdm: upgrade 2.26.6 -> 2.26.7
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Thu, 16 Apr 2026 05:54:03 +0000 (22:54 -0700)]
python3-pdm-backend: upgrade 2.4.7 -> 2.4.8
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Thu, 16 Apr 2026 05:54:02 +0000 (22:54 -0700)]
dos2unix: upgrade 7.5.4 -> 7.5.5
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Thu, 16 Apr 2026 05:54:01 +0000 (22:54 -0700)]
gn: upgrade to latest revision
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Leonardo Costa [Thu, 23 Apr 2026 12:40:30 +0000 (09:40 -0300)]
bluez5: add patches to fix 8.56 cli issues
On bluez5 5.86, the bluetoothctl cli interface does not work outside of
the dedicated shell to list controllers and devices [1]. These patches fix
the issue while version 5.87 is not published.
[1] https://github.com/bluez/bluez/issues/1896
Upstream-Status: Backport [https://github.com/bluez/bluez/commit/
b33e923b55e4d0e9d78a83cfcb541fd1f687ef54 ,
https://github.com/bluez/bluez/commit/
21e13976f2e375d701b8b7032ba5c1b2e56c305f ]
Signed-off-by: Leonardo Costa <leonardo.costa@toradex.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Moritz Haase [Thu, 23 Apr 2026 08:41:21 +0000 (10:41 +0200)]
cmake: upgrade 4.3.1 -> 4.3.2
Release notes are available at [0].
[0]: https://cmake.org/cmake/help/v4.3/release/4.3.html#id2
Signed-off-by: Moritz Haase <Moritz.Haase@bmw.de>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Peter Tatrai [Thu, 23 Apr 2026 07:17:01 +0000 (09:17 +0200)]
rust: fix codegen test failure on big-endian targets
The test tests/codegen-llvm/issues/multiple-option-or-permutations.rs
uses FileCheck to verify LLVM IR for Option::or operations on slices.
The CHECK-NEXT directives assumed a little-endian memory layout where
the Option discriminant is the low byte, emitting a simple:
trunc i16 %0 to i1
On big-endian targets (e.g. powerpc), the discriminant resides in the
high byte, so LLVM first emits an lshr before the trunc, causing the
test to fail.
Backport upstream fix from rust-lang/rust#151780 which introduces
BIG/LITTLE revisions with the only-endian-big / ignore-endian-big
directives (also backported via directive_names.rs change) to handle
both layouts correctly.
Fixes: rust-lang/rust#151718
Upstream-Status: Backport [https://github.com/rust-lang/rust/pull/151780]
Signed-off-by: Peter Tatrai <peter.tatrai.ext@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Vijay Anusuri [Thu, 23 Apr 2026 07:14:56 +0000 (12:44 +0530)]
avahi: Fix CVE-2026-34933
Pick patch according to [1]
[1] https://security-tracker.debian.org/tracker/CVE-2026-34933
[2] https://github.com/avahi/avahi/pull/891
[3] https://nvd.nist.gov/vuln/detail/CVE-2026-34933
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Wed, 22 Apr 2026 10:36:24 +0000 (18:36 +0800)]
python3-cryptography(-vectors): upgrade 46.0.5 -> 46.0.7
Add 0001-bump-uv_build-to-0.11.0.patch to bump uv_build version
0001-bump-uv_build-to-0.10.0-14271.patch
0001-pyproject.toml-bump-uv_build-version-requirement.patch
removed since they're not needed in 46.0.7
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:27 +0000 (17:55 +0800)]
libmicrohttpd: upgrade 1.0.2 -> 1.0.5
0001-Remove-broken-experimental-code.patch
removed since it's included in 1.0.5
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:59 +0000 (17:55 +0800)]
xserver-xorg: upgrade 21.1.21 -> 21.1.22
License-Update:
add author to HPND-sell-MIT-disclaimer-xserver
add missing paragraph to SGI-B-2.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:58 +0000 (17:55 +0800)]
wayland-protocols: upgrade 1.47 -> 1.48
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:57 +0000 (17:55 +0800)]
vala: upgrade 0.56.18 -> 0.56.19
Changelog
============
* Various improvements and bug fixes:
- codegen: Minor refactoring of TypeRegisterFunction and its subclasses
- codegen: Use G_TYPE_FLAG_NONE when targetting glib >= 2.74
- codegen: Use g_once_init_{enter,leave}_pointer when targetting glib >= 2.80
- codegen: Propagate default_value_on_error from parent struct
- codegen: Return default_value_on_error on precondition failures
- gdbus: Avoid unused variables in method call and properties getter/setter
- gdbus: Allow GLib.VariantDict for a{sv}
- gdbus: Do not provide unintended read/write access to properties
- parser: Fix statement error recovery
- vala: Use reference-transfer as needed when transforming
conditional-expression
- girwriter: Don't use instance-parameter inside function elements
- girwriter: Add the doc:format argument in the .gir file
- libvaladoc: Do not error-out on doc:format
- libvaladoc: Add compat layer for gvRenderData to cope with API break
* Bindings:
- glib-2.0: allow FileUtils.open_tmp's first argument to be null
- posix: add UTIME_{NOW,OMIT} constants for utimensat
- gsl: Deprecate gsl_linalg_cholesky_decomp in favour of
gsl_linalg_cholesky_decomp1
- libxml-2.0: Add more fields to ParserCtxt
- gobject-2.0: Set default_value{,_on_error} for GType
- glib-2.0: Fix *.add_once () callbacks
- gobject-2.0: Fix return type
- gobject-2.0: Add Type.to_string ()
- gstreamer-1.0: Fix ownership of Caps.full*() parameters
- glib-2.0: fix a typo in a parameter name
- gtk4: Update to 4.21.6+
83716767
- gtk4: Make all Gsk.RenderNode and Gsk.Renderer shadow their parent type
- gtk4: Fix CursorGetTextureCallback declaration
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:55 +0000 (17:55 +0800)]
stress-ng: upgrade 0.20.01 -> 0.21.00
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:54 +0000 (17:55 +0800)]
sqlite3: upgrade 3.51.3 -> 3.53.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:53 +0000 (17:55 +0800)]
resolvconf: upgrade 1.94 -> 1.95
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:52 +0000 (17:55 +0800)]
repo: upgrade 2.61.1 -> 2.62
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:50 +0000 (17:55 +0800)]
python3-zipp: upgrade 3.23.0 -> 3.23.1
License-Update: Copyright year updated to 2026
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:48 +0000 (17:55 +0800)]
python3-testtools: upgrade 2.8.7 -> 2.9.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:46 +0000 (17:55 +0800)]
python3-setuptools-rust: upgrade 1.12.0 -> 1.12.1
Changelog:
===========
- Migrate to trusted publishing.
- Strip target suffix for cargo-zigbuild compatibility.
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:45 +0000 (17:55 +0800)]
python3-pytest: upgrade 9.0.2 -> 9.0.3
Bug fixes
============
- #12444: Fixed pytest.approx which now correctly takes into account
~collections.abc.Mapping keys order to compare them.
- #13634: Blocking a conftest.py file using the -p no: option is now explicitly
disallowed.
- Previously this resulted in an internal assertion failure during plugin
loading.
- Pytest now raises a clear UsageError explaining that conftest files are not
plugins and cannot be disabled via -p.
- #13734: Fixed crash when a test raises an exceptiongroup with
__tracebackhide__ = True.
- #14195: Fixed an issue where non-string messages passed to
unittest.TestCase.subTest() were not printed.
- #14343: Fixed use of insecure temporary directory (CVE-2025-71176).
Improved documentation ======================
- #13388: Clarified documentation for -p vs PYTEST_PLUGINS plugin loading and
fixed an incorrect -p example.
- #13731: Clarified that capture fixtures (e.g. capsys and capfd) take
precedence over the -s / --capture=no command-line options in Accessing
captured output from a test function <accessing-captured-output>.
- #14088: Clarified that the default pytest_collection hook sets session.items
before it calls pytest_collection_finish, not after.
- #14255: TOML integer log levels must be quoted: Updating reference
documentation.
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:43 +0000 (17:55 +0800)]
python3-pygments: upgrade 2.19.2 -> 2.20.0
Changelog:
============
- New lexers:
* Rell
- Updated lexers:
* archetype: Fix catastrophic backtracking in GUID and ID patterns
* ASN.1: Recognize minus sign and fix range operator
* C++: Add C++26 keywords
* ComponentPascal: Fix "analyse_text"
* Coq renamed to Rocq
* Cython: Various improvements
* Debian control: Improve architecture parsing
* Devicetree: Add support for overlay/fragments, add bytestring support, fix catastrophic backtracking
* Fennel: Various improvements
* Haskell: Handle escape sequences in character literals
* Java: Add module keywords
* Lean4: Add operators "]'", "]?", "]!"
* LESS: Support single-line comments
* LilyPond: Update to 2.25.29
* LLVM: Support C-style comments
* Lua(u): Fix catastrophic backtracking
* Macaulay2: Update to 1.25.05, 1.25.11
* Mathematica: Various improvements
* meson: Add additional operators
* MySQL: Update keywords
* org-Mode: Support both schedule and deadline
* PHP: Add "__PROPERTY__" magic constant, add reserved keywords
* PostgreSQL: Add more keywords
* protobuf: Fix namespace tokenization
* Python: Add "t"-string support
* Tablegen: Fix infinite loop
* Tera Term macro: Add commands introduced in v5.3 through v5.6
* TOML: Support TOML 1.1.0
* Turtle: Allow empty comment lines
* XML: Added ".xbrl" as file ending
- Drop Python 3.8, and add Python 3.14 as a supported version
- Various improvements to "autopygmentize"
- Update "onedark" style to support more token types
- Update "rtt" style to support more token types
- Cache entry points to improve performance
- Fix "xterm-256" color table
- Fix "kwargs" dictionary getting mutated on each call
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:42 +0000 (17:55 +0800)]
python3-pyasn1: upgrade 0.6.2 -> 0.6.3
Changelog:
==========
- CVE-2026-30922 (GHSA-jr27-m4p2-rc6r): Added nesting depth limit to ASN.1
decoder to prevent stack overflow from deeply nested structures
- Fixed OverflowError from oversized BER length field
- Fixed DeprecationWarning stacklevel for deprecated attributes
- Fixed asDateTime incorrect fractional seconds parsing
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:41 +0000 (17:55 +0800)]
python3-poetry-core: upgrade 2.3.1 -> 2.3.2
Changed
========
- Update list of supported licenses (#917).
Fixed
======
- Fix an issue where platform_release could not be parsed on Debian Trixie
- Fix an issue where using project.readme.text in the pyproject.toml file
resulted in broken metadata
- Fix an issue where dependency groups were considered equal when their
resolved dependencies were equal, even if the groups themselves were not
- Fix an issue where removing a dependency from a group that included another
group resulted in other dependencies being added to the included group
- Fix an issue where PEP 735 include-group entries were lost when
[tool.poetry.group] also defined include-groups for the same group
- Fix an issue where the union of <value> not in <marker> constraints was
wrongly treated as always satisfied
- Fix an issue where a post release with a local version identifier was wrongly
allowed by a > version constraint
- Fix an issue where a version with the local version identifier 0 was treated
as equal to the corresponding public version
- Fix an issue where a != <version> constraint wrongly disallowed pre releases
and post releases of the specified version
- Fix an issue where in and not in constraints were wrongly not allowed by
specific compound constraints
- Fix an issue where data entries in generated setup.py files were duplicated
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:38 +0000 (17:55 +0800)]
python3-maturin: upgrade 1.12.4 -> 1.13.1
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:36 +0000 (17:55 +0800)]
python3-editables: upgrade 0.5 -> 0.6
License-Update: Line endings in the license file were changed from CRLF to LF.
Changelog:
==========
- Add a new "self_replace" strategy for map (and name the old strategy
"import_hook"). Based on an idea
- Rename the generated .pth file to _editable_impl_<project>.pth and document
that it is possible to customise the file names used.
- Rework the documentataion, replacing the "use cases" section with an expanded
and less opinionated "scope" section.
- Test suite improvements.
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:35 +0000 (17:55 +0800)]
python3-dtschema: upgrade 2025.12 -> 2026.4
Changelog:
===========
- New PCI bridge properties
- New linux,dmcryptkeys chosen property
- Relax simple-bus schema to have unit-addresses with chip-select number
and offset
- Avoid backtrace on missing $ref. Instead the missing ref will cause a
validation warning.
- Print the property name on decode failures
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:33 +0000 (17:55 +0800)]
python3-build: upgrade 1.4.0 -> 1.4.3
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:32 +0000 (17:55 +0800)]
pciutils: upgrade 3.14.0 -> 3.15.0
Changelog:
==========
* New capabilities are decoded: MMIO Register Block Locator,
Flit Error Injection, Flit Logging.
* Decoding of PCIe capabilities updated to Gen7.
* Both lspci and setpci warn when the "-s" or "-d" option
is given multiple times.
* Improved display of interrupts in "lspci -vv". Routing of
interrupt pins is shown only if the pins are not disabled.
Routing of MSI(X) interrupts is shown when available
(which is currently supported by the sysfs back-end only).
* Minor improvements to Windows back-ends.
* The dump back-end can read the dump from stdin when given "-"
as a file name.
* FreeBSD supports 64-bit addresses.
* Added README.DJGPP.
* Updated pci.ids.
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:31 +0000 (17:55 +0800)]
pango: upgrade 1.57.0 -> 1.57.1
Bugs fixed:
- #867 Bad font substitution causes application crashes
- #869 MacOS: subprojects/cairo/meson.build:1:0: ERROR: Value "gnu11,c11" (of
type "string") (sid)
- #870 MacOS: subprojects/pango/utils/viewer-cocoa.m:23:10: fatal error:
'cairo/cairo.h' file not found (sid)
- #871 gtk4-widget-factory crashes with pango error on macOS when an emoji is
entered into a text field
- #876 Inconsistency between documentation and code in
pango_context_set_font_description
- #882 The hex box characters generated in PDF can not be copied
- #885 warning: assignment discards 'const' qualifier from pointer target type
[-Wdiscarded-qualifiers]
- !884 Revert "meson: Rework introspection handling"
- !890 Update the code to support Unicode 17.0.0
- !892 Include fcfreetype.h where needed
- !893 meson: Update freetype2 wrap to fix ci warnings
- !894 Respect explicit language attribute when itemizing
- !895 Fix some subproject woes
- !896 meson: Add support for cross-compiling using Apple subsystems
- !897 (break.c) pass sentences to handle_sentences
- !898 add support for g_autoptr(PangoScriptIter)
- !900 fontmap: Mark get_family as nullable
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:30 +0000 (17:55 +0800)]
meson: upgrade 1.10.2 -> 1.11.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:28 +0000 (17:55 +0800)]
lzip: upgrade 1.25 -> 1.26
Changelog:
===========
- '-dvv' and '-tvv' now print (de)compressed sizes instead of compression
ratio. (Sizes are more informative than compression ratio).
- Large numbers in option arguments are now accepted with underscore
separators (-s 123_456_789).
- Large numbers are now printed with underscore separators (123_456_789).
- '-h' now prints a short help screen containing only the command-line
options. For full help, use '--help'.
- '--list' now can safely skip any trailing data added to a lzip file by the
option '--append' of lziprecover.
- '--list' now prints '+t' after the number of members to indicate the
presence of trailing data, and prints the size of the trailing data below
the size of the last member.
- '-lvv' now prints a blank line between the list of members of each
multimember file and the next file.
- Several improvements suggested by John Gilmore have been made to the manual.
- 'EXIT STATUS' now has its own section in the man page.
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:26 +0000 (17:55 +0800)]
libcap: upgrade 2.77 -> 2.78
Changelog:
===========
- Fix a security vulnerability (CVE-2026-4878).
- Fix a typo in a capset error
- Reverted some build macrology to get back to something that worked (admittedly sub-optimally).
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:25 +0000 (17:55 +0800)]
libadwaita: upgrade 1.8.4 -> 1.9.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:24 +0000 (17:55 +0800)]
hwdata: upgrade 0.405 -> 0.406
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:23 +0000 (17:55 +0800)]
gtk4: upgrade 4.22.1 -> 4.22.2
Bugs fixed:
- #8117 Docs for the new SVG parser?
- #8119 Wrong colors used for fallback symbolic icons containing classes
- #8125 svg: Animating hrefs does not work
- !9590 vulkan: fix GDK_VULKAN_FEATURE_SWAPCHAIN_MAINTENANCE check
- !9660 Various Vulkan fixes
- !9665 tests: fix libtestutils build under Windows.
- !9667 Update Serbian translation
- !9678 testsuite: Add dmabuf compare tests to needs-udmabuf suite
- !9681 dmabuf: Support dmabufs with fewer fds than planes
- !9682 Update Galician translation
- !9701 Update Turkish translation
- !9704 Update Catalan translation
- !9711 Load less icons as symbolics
- !9719 Fix traditional symbolic fallback
- !9736 svg: Fix invalidation
- !9739 Assorted backports
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:22 +0000 (17:55 +0800)]
gtk+3: upgrade 3.24.51 -> 3.24.52
* Bugs fixed:
- #6306 [GTK3] Zlib required when broadway is enabled.
- #7796 [GTK 3] Invalid a11y events when calling `gtk_tree_view_set_cursor` on
an unfocused GtkTreeView
- #7976 Firefox crashes at gdk_wayland_drag_context_manage_dnd() when missing
toplevel wl_surface
- #8103 gtk3 refresh_rate calculation overflows on 32-bit targets
- #8114 Images for recolored icons are constantly being reloaded
- GNOME/gimp#14901 Wild strobing in multi window mode
- GNOME/gimp#15480 GIMP does not focus on dialogue boxes on Mac
- !7332 quartz: add automagic uti<->mime conversion for clipboard
- !8216 Fix position of child tooltips in GTK3 custom windows
- !9005 a11y: Don't send focus-related events for unfocused treeview
- !9012 quartz: gtkwindow - fix windows fighting focus
- !9022 gtkmenu: Await more motion events before deactivating on release
- !9044 wayland: Handle XKB initialization failures gracefully
- !9067 gdk/win32: Add missing EGL conditional compilation guard
- !9098 gdk: do not run gdk_wayland_window_export_handle() callback when
window is already destroyed.
- !9119 Declare an explicit dependency on zlib when broadway is enabled
- !9141 [GTK 3] wayland: Try to open the display even if XDG_RUNTIME_DIR is
unset
- !9155 [gtk3] emoji: Update data to CLDR 48
- !9214 display/wayland: Gracefully handle dispose being called twice
- !9284 gdk/wayland: Map stylus buttons for BTN_BACK and BTN_FORWARD (Peter
Hutterer)
- !9322 [Quartz] Fix dialog keyboard focus while preventing focus fighting
- !9344 Fix a couple of leaks
- !9394 gdk/wayland: Map stylus buttons for BTN_BACK and BTN_FORWARD
- !9397 wayland: Avoid a crash
- !9600 Replace outdated freedesktop.org Window Manager spec links
- !9676 x11: fix overflow in refresh_rate calculation on 32-bit systems
- !9706 cssimage: Store and reuse icon info for recolored images
- !9707 wayland: Fix uninitialized value when no cursor
- !9708 fontchooser: Fix signedness of axes count
- !9709 fontchooser: Remove const on float return values
- !9710 print: Remove unused variable
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:21 +0000 (17:55 +0800)]
gsettings-desktop-schemas: upgrade 50.0 -> 50.1
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:20 +0000 (17:55 +0800)]
groff: upgrade 1.24.0 -> 1.24.1
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:19 +0000 (17:55 +0800)]
ghostscript: upgrade 10.06.0 -> 10.07.0
0001-Fix-32-bit-build.patch
removed since it's included in 10.07.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:18 +0000 (17:55 +0800)]
fastfloat: upgrade 8.2.4 -> 8.2.5
Changelog:
==========
- Fix Bazel build with bzlmod
- Replace std::min with ternary operators to avoid dependency
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:17 +0000 (17:55 +0800)]
epiphany: upgrade 49.7 -> 50.3
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:15 +0000 (17:55 +0800)]
diffoscope: upgrade 314 -> 317
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:14 +0000 (17:55 +0800)]
dhcpcd: upgrade 10.3.0 -> 10.3.1
Changelog:
==========
- BSD: don't send uninitialised memory using ps_root_indirectioctl
- Fix fallback_time option
- IPv4: Ignore DHCP state when building routes
- options: Ensure ldop is not NULL dereferenced
- route: Routes may not have an
- options: Ensure that an overly long bitflag string does not crash
- options: Don't assume vsio options have an argument
- common: Cast via uintptr_t rather than unsigned long
- privsep: Ensure we recv for real after a successful recv MSG_PEEK
- DHCP: Add parentheses to macro definitions
- ipv6nd: empty IPV6RA_EXPIRE eloop queue when dropping
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:13 +0000 (17:55 +0800)]
ccache: upgrade 4.13.2 -> 4.13.3
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:12 +0000 (17:55 +0800)]
adwaita-icon-theme: upgrade 49.0 -> 50.0
Changelog:
============
- use old format of the legacy icons for gtk3
- reintroduce legacy icons because themes
- symbolic:battery icons no longer fuzzy
- build: Windows build
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:11 +0000 (17:55 +0800)]
acpica: upgrade
20251212 ->
20260408
License-Update: Copyright year updated to 2026
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Richard Purdie [Thu, 16 Apr 2026 12:49:03 +0000 (13:49 +0100)]
useradd: Switch from --root to --prefix option
Whilst assessing where we use chroot (which requires superuser privileges),
I realised that shadow's utilities we use have the option of specifing
a prefix for files. This provides the same outcome but avoids the chroot
call. Whist we can emulate that under pseudo, it is probably nicer to avoid
doing that and use the prefix option instead.
Therefore switch --root -> --prefix
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Ross Burton [Thu, 23 Apr 2026 11:11:05 +0000 (12:11 +0100)]
classes/base: add explicit bzip2-native dependency for unpacking .bz2
Currently this is in ASSUME_PROVIDED and HOSTTOOLS so doesn't have any
effect, but declaring the dependency is the right thing to do.
Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sat, 25 Apr 2026 09:37:05 +0000 (11:37 +0200)]
expat: upgrade 2.7.5 -> 2.8.0
Release notes: [1]
Handles CVE-2026-41080
[1] https://github.com/libexpat/libexpat/blob/R_2_8_0/expat/Changes
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 19:26:28 +0000 (21:26 +0200)]
sed: upgrade 4.9 -> 4.10
Solves CVE-2026-5958.
Release notes: [1]
License-Update: copyright years refreshed
[1] https://gitweb.git.savannah.gnu.org/gitweb/?p=sed.git;a=blob_plain;f=NEWS;hb=v4.10
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 18:50:24 +0000 (20:50 +0200)]
ovmf: set status for 7 CVEs
These reappeared after last update of sbom-cve-check tooling.
"fixed-in" release was determined by following links in Debian CVE
reports except CVE-2025-2295 which was taken from Yocto master CVE
patch.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 18:50:22 +0000 (20:50 +0200)]
cargo: set CVE_PRODUCT
This removes mediawiki:cargo CVEs from CVE metrics.
* CVE-2026-39837, CVE-2026-39839, CVE-2026-39840, CVE-2026-39841
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 18:50:21 +0000 (20:50 +0200)]
cargo: set status of CVE-2023-40030
sbom-cve-check has problem matching version 1.72.
It works only if cvelistV5 is modified to indicate 1.72.0.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 19:12:08 +0000 (21:12 +0200)]
git: set status of 5 CVEs
It is unclear why entries in cvelistV5 cause these CVEs to appear in CVE
reports.
There is one which should also not be shown per listed CPEs, however it
does not have a patch, so it's not added to the list - CVE-2024-52005.
The others are set to fixed with version based on which .0 release
included patch mentioned in Debian security tracker for respective CVE.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:53 +0000 (14:02 +0200)]
python3-requests: set status for CVE-2024-47081
NVD [1] does not have CPE set.
Debian [2] shows comit from v2.32.4 as fix.
cvelistV5 [3] also says "< 2.32.4" however for cpe psf:requests.
Not sure why this is shown in CVE metrics.
[1] https://nvd.nist.gov/vuln/detail/CVE-2024-47081
[2] https://security-tracker.debian.org/tracker/CVE-2024-47081
[3] https://github.com/CVEProject/cvelistV5/blob/main/cves/2024/47xxx/CVE-2024-47081.json
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:52 +0000 (14:02 +0200)]
python3-requests: set status for CVE-2024-35195
NVD [1] does not have CPE set.
Debian [2] shows comit from v2.32.0 as fix.
cvelistV5 [3] also says "< 2.32.0", posibly "defaultStatus": "unknown"
is causing it to appear in CVE metrics...
[1] https://nvd.nist.gov/vuln/detail/CVE-2024-35195
[2] https://security-tracker.debian.org/tracker/CVE-2024-35195
[3] https://github.com/CVEProject/cvelistV5/blob/main/cves/2024/35xxx/CVE-2024-35195.json
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:51 +0000 (14:02 +0200)]
rsync: set status for CVE-2024-12084
Debian security tracker [1] says it's fixed in v3.4.0.
NVD [2] does not say that our version is vulnerable.
The CVE is reported probably because cvelistV5 has many CPE groups and
some of them are unparseable (so assumes vulnerable).
[1] https://security-tracker.debian.org/tracker/CVE-2024-12084
[2] https://nvd.nist.gov/vuln/detail/CVE-2024-12084
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:50 +0000 (14:02 +0200)]
base-files: set status for CVE-2018-6557
CPE in NVD [1] shows ubuntu.
Debian [1] says "Ubuntu specific motd update code".
cvelistV5 has unparseable CPE so it sbom-cve-check assumes vulnerable
("lessThan": "10.1ubuntu2.2").
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:49 +0000 (14:02 +0200)]
bind: set status for CVE-2017-3139
NVD [1] has only redhat cpes.
Debian [2] says RHEL6 specific.
cvelistV5 [3] has unparseable (so assumes affected):
"version": "shipped in Red Hat Enterprise Linux 6"
[1] https://nvd.nist.gov/vuln/detail/CVE-2017-3139
[2] https://security-tracker.debian.org/tracker/CVE-2017-3139
[3] https://github.com/CVEProject/cvelistV5/blob/main/cves/2017/3xxx/CVE-2017-3139.json
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:48 +0000 (14:02 +0200)]
cve-extra-exclusions: ignore CVE-2019-2708
Yet another CVE for berkeley DB, ignore as all others.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:47 +0000 (14:02 +0200)]
gnutls: set status for CVE-2026-1584
This is a version-less RedHat CVE.
Per Debian security tracker [1] this is fixed in 3.8.12.
[1] https://security-tracker.debian.org/tracker/CVE-2026-1584
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:46 +0000 (14:02 +0200)]
harfbuzz: set status for CVE-2024-56732
This CVE does not have cpe in NVD DB.
In cvelistV5 it shows "version": ">= 8.5.0, <= 10.0.1" which is not
parseable with our tooling.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sat, 25 Apr 2026 22:26:34 +0000 (00:26 +0200)]
libva: set status for CVE-2023-39929
This CVE is reported as open because NVD has no cpe and cvelistV5 has
unparseable "version": "before version 2.20.0".
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sat, 25 Apr 2026 22:26:33 +0000 (00:26 +0200)]
p11-kit: set status for CVE-2026-2100
This is a Redhat version-less CVE in NVD DB.
Per [1] this is fixed in 0.26.2.
[1] https://security-tracker.debian.org/tracker/CVE-2026-2100
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sat, 25 Apr 2026 22:26:32 +0000 (00:26 +0200)]
python3-setuptools: set status for CVE-2024-6345
Current version of sbom-cve-check reports this for some reason.
NVD does not have CPE and cvelistV5 ([1]) says "lessThan": "70.0".
[1] https://github.com/CVEProject/cvelistV5/blob/main/cves/2024/6xxx/CVE-2024-6345.json
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sat, 25 Apr 2026 22:26:31 +0000 (00:26 +0200)]
ruby: set status for CVE-2025-0306
This is a version-less Redhat CVE, so explicit status is needed.
Per [1] the issue is mitigated by using openssl >= 3.2.0.
[1] https://bugzilla.redhat.com/show_bug.cgi?id=
2336100
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sat, 25 Apr 2026 22:26:30 +0000 (00:26 +0200)]
shadow: set CVE_PRODUCT
This will remove CVE-2016-15024 from open cve reports.
This CVE for is for "doomsider:shadow" [1].
It will also remove
* CVE-2018-16588 (suse:shadow, [2])
* CVE-2019-16110 (blade-group:shadow [3])
which can be verified that they don't affect Yocto shadow.
[1] https://security-tracker.debian.org/tracker/CVE-2016-15024
[2] https://security-tracker.debian.org/tracker/CVE-2018-16588
[3] https://security-tracker.debian.org/tracker/CVE-2019-16110
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Richard Purdie [Thu, 23 Apr 2026 20:44:21 +0000 (21:44 +0100)]
build-appliance-image: Update to master head revisions
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Richard Purdie [Thu, 23 Apr 2026 11:07:45 +0000 (12:07 +0100)]
base/bitbake.conf: Rework DISTRO_FEATURES and MACHINE_FEATURES default handling
The existing code for handling defaults in distro/machine features
triggers from anonymous python in base.bbclass.
Anonymous python is executed after all inherits including deferred inherits
are processed. This means conditional inherits can't use DISTRO_FEATURES
or MACHINE_FEATURES which is contra to user expectations. This leads to
a hard to understand failure mode.
Whilst it isn't as performant, we can handle the features using inline
python function calls. This patch switches to execute the code that way.
These changes depend on a new function in bb.utils (filter_string).
filter_default_features is changed to return a string rather than
set it and the tests for it are updated to match.
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Richard Purdie [Thu, 23 Apr 2026 13:31:56 +0000 (14:31 +0100)]
sanity.conf: Depend on bitbake 2.18
In readiness for release and due to the distro_features fix which needs
bb.utils.filter_string(), update to depend on bitbake 2.18.0
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:17 +0000 (11:32 -0400)]
linux-yocto/6.18: update CVE exclusions (6.18.24)
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 9101 changes (4 new | 9097 updated): - 4 new CVEs: CVE-2025-70994, CVE-2026-35225, CVE-2026-41460, CVE-2026-41461 - 9097 updated CVEs: CVE-2018-25259, CVE-2018-25267, CVE-2022-41650, CVE-2022-43472, CVE-2022-44578, CVE-2022-45806, CVE-2022-45819, CVE-2022-45832, CVE-2022-45840, CVE-2022-45841, CVE-2022-46795, CVE-2022-46796, CVE-2022-46807, CVE-2022-46811, CVE-2022-46838, CVE-2022-46840, CVE-2022-46846, CVE-2022-47168, CVE-2022-47176, CVE-2022-47182, CVE-2022-47429, CVE-2022-47594, CVE-2022-47601, CVE-2023-22697, CVE-2023-22701, CVE-2023-22708, CVE-2023-23715, CVE-2023-23716, CVE-2023-23725, CVE-2023-23726, CVE-2023-23729, CVE-2023-23814, CVE-2023-23823, CVE-2023-23825, CVE-2023-23834, CVE-2023-23868, CVE-2023-23886, CVE-2023-23887, CVE-2023-23893, CVE-2023-23895, CVE-2023-23975, CVE-2023-23986, CVE-2023-23987, CVE-2023-23989, CVE-2023-24375, CVE-2023-24407, CVE-2023-25026, CVE-2023-25035, CVE-2023-25037, CVE-2023-25048, CVE-2023-25060, CVE-2023-25067, CVE-2023-25068, CVE-2023-25445, CVE-2023-25446, CVE-2023-25454, CVE-2023-25455, CVE-2023-25469, CVE-2023-25486, CVE-2023-25703, CVE-2023-25714, CVE-2023-25791, CVE-2023-25959, CVE-2023-25966, CVE-2023-25988, CVE-2023-25993, CVE-2023-25995, CVE-2023-25997, CVE-2023-25998, CVE-2023-25999, CVE-2023-26000, CVE-2023-26001, CVE-2023-26002, CVE-2023-26003, CVE-2023-26005, CVE-2023-26520, CVE-2023-26522, CVE-2023-27428, CVE-2023-27449, CVE-2023-27454, CVE-2023-27456, CVE-2023-27609, CVE-2023-27625, CVE-2023-27626, CVE-2023-28165, CVE-2023-28168, CVE-2023-28416, CVE-2023-28417, CVE-2023-28532, CVE-2023-28534, CVE-2023-28536, CVE-2023-28619, CVE-2023-28689, CVE-2023-28990, CVE-2023-29173, CVE-2023-29235, CVE-2023-29237, CVE-2023-29239, CVE-2023-29422, CVE-2023-29429, CVE-2023-29431, CVE-2023-29433, CVE-2023-30476, CVE-2023-30479, CVE-2023-30486, CVE-2023-30488, CVE-2023-30490, CVE-2023-30783, CVE-2023-30870, CVE-2023-30873, CVE-2023-30874, CVE-2023-31073, CVE-2023-31078, CVE-2023-31214, CVE-2023-32094, CVE-2023-32117, CVE-2023-32126, CVE-2023-32240, CVE-2023-32293, CVE-2023-32299, CVE-2023-32506, CVE-2023-32507, CVE-2023-32519, CVE-2023-32520, CVE-2023-32574, CVE-2023-32581, CVE-2023-32585, CVE-2023-32586, CVE-2023-32593, CVE-2023-32599, CVE-2023-32601, CVE-2023-32798, CVE-2023-32963, CVE-2023-33215, CVE-2023-33324, CVE-2023-33928, CVE-2023-33994, CVE-2023-33995, CVE-2023-33996, CVE-2023-33998, CVE-2023-34009, CVE-2023-34014, CVE-2023-34019, CVE-2023-34376, CVE-2023-34381, CVE-2023-34387, CVE-2023-35037, CVE-2023-35040, CVE-2023-35046, CVE-2023-35051, CVE-2023-35052, CVE-2023-35091, CVE-2023-35777, CVE-2023-35875, CVE-2023-36385, CVE-2023-36506, CVE-2023-36509, CVE-2023-36510, CVE-2023-36518, CVE-2023-36519, CVE-2023-36526, CVE-2023-36528, CVE-2023-36531, CVE-2023-36680, CVE-2023-36681, CVE-2023-37885, CVE-2023-37886, CVE-2023-37887, CVE-2023-37967, CVE-2023-37969, CVE-2023-37971, CVE-2023-37984, CVE-2023-37987, CVE-2023-37989, CVE-2023-38383, CVE-2023-38385, CVE-2023-38475, CVE-2023-38477, CVE-2023-38479, CVE-2023-38480, CVE-2023-38483, CVE-2023-38512, CVE-2023-38514, CVE-2023-39305, CVE-2023-39920, CVE-2023-39994, CVE-2023-39995, CVE-2023-39996, CVE-2023-39997, CVE-2023-40001, CVE-2023-40003, CVE-2023-40005, CVE-2023-40011, CVE-2023-40203, CVE-2023-40205, CVE-2023-40209, CVE-2023-40213, CVE-2023-40331, CVE-2023-40334, CVE-2023-40670, CVE-2023-40678, CVE-2023-41130, CVE-2023-41132, CVE-2023-41133, CVE-2023-41649, CVE-2023-41664, CVE-2023-41671, CVE-2023-41683, CVE-2023-41686, CVE-2023-41688, CVE-2023-41689, CVE-2023-41690, CVE-2023-41695, CVE-2023-41729, CVE-2023-41730, CVE-2023-41802, CVE-2023-41803, CVE-2023-41848, CVE-2023-41849, CVE-2023-41857, CVE-2023-41862, CVE-2023-41865, CVE-2023-41866, CVE-2023-41869, CVE-2023-41870, CVE-2023-41873, CVE-2023-41875, CVE-2023-41951, CVE-2023-41952, CVE-2023-44142, CVE-2023-44147, CVE-2023-44149, CVE-2023-44258, CVE-2023-44988, CVE-2023-45002, CVE-2023-45045, CVE-2023-45061, CVE-2023-45101, CVE-2023-45104, CVE-2023-45110, CVE-2023-45271, CVE-2023-45272, CVE-2023-45275, CVE-2023-45631, CVE-2023-45633, CVE-2023-45636, CVE-2023-45649, CVE-2023-45760, CVE-2023-45765, CVE-2023-45766, CVE-2023-45828, CVE-2023-46073, CVE-2023-46079, CVE-2023-46080, CVE-2023-46082, CVE-2023-46083, CVE-2023-46188, CVE-2023-46195, CVE-2023-46196, CVE-2023-46203, CVE-2023-46206, CVE-2023-46309, CVE-2023-46605, CVE-2023-46606, CVE-2023-46607, CVE-2023-46608, CVE-2023-46609, CVE-2023-46610, CVE-2023-46611, CVE-2023-46612, CVE-2023-46616, CVE-2023-46628, CVE-2023-46631, CVE-2023-46632, CVE-2023-46633, CVE-2023-46635, CVE-2023-46637, CVE-2023-46639, CVE-2023-46644, CVE-2023-47179, CVE-2023-47180, CVE-2023-47183, CVE-2023-47187, CVE-2023-47188, CVE-2023-47224, CVE-2023-47225, CVE-2023-47241, CVE-2023-47515, CVE-2023-47517, CVE-2023-47523, CVE-2023-47525, CVE-2023-47557, CVE-2023-47647, CVE-2023-47648, CVE-2023-47661, CVE-2023-47689, CVE-2023-47692, CVE-2023-47693, CVE-2023-47694, CVE-2023-47698, CVE-2023-47756, CVE-2023-47759, CVE-2023-47760, CVE-2023-47761, CVE-2023-47762, CVE-2023-47763, CVE-2023-47764, CVE-2023-47776, CVE-2023-47778, CVE-2023-47780, CVE-2023-47793, CVE-2023-47805, CVE-2023-47807, CVE-2023-47820, CVE-2023-47823, CVE-2023-47826, CVE-2023-47830, CVE-2023-47832, CVE-2023-47836, CVE-2023-47838, CVE-2023-47841, CVE-2023-47847, CVE-2023-47849, CVE-2023-47869, CVE-2023-47871, CVE-2023-48274, CVE-2023-48277, CVE-2023-48286, CVE-2023-48287, CVE-2023-48324, CVE-2023-48332, CVE-2023-48739, CVE-2023-48740, CVE-2023-48750, CVE-2023-48758, CVE-2023-48774, CVE-2023-48775, CVE-2023-48776, CVE-2023-48779, CVE-2023-49154, CVE-2023-49156, CVE-2023-49158, CVE-2023-49167, CVE-2023-49192, CVE-2023-49193, CVE-2023-49194, CVE-2023-49196, CVE-2023-49754, CVE-2023-49755, CVE-2023-49756, CVE-2023-49757, CVE-2023-49758, CVE-2023-49817, CVE-2023-49818, CVE-2023-49831, CVE-2023-49832, CVE-2023-49835, CVE-2023-49845, CVE-2023-49848, CVE-2023-49849, CVE-2023-49850, CVE-2023-49851, CVE-2023-49856, CVE-2023-49857, CVE-2023-49858, CVE-2023-49859, CVE-2023-49861, CVE-2023-50373, CVE-2023-50375, CVE-2023-50850, CVE-2023-50854, CVE-2023-50876, CVE-2023-50877, CVE-2023-50882, CVE-2023-50884, CVE-2023-50887, CVE-2023-50899, CVE-2023-50903, CVE-2023-50904, CVE-2023-50905, CVE-2023-51353, CVE-2023-51355, CVE-2023-51357, CVE-2023-51359, CVE-2023-51360, CVE-2023-51362, CVE-2023-51484, CVE-2023-51486, CVE-2023-52135, CVE-2023-52190, CVE-2024-10676, CVE-2024-11402, CVE-2024-1435, CVE-2024-22145, CVE-2024-22162, CVE-2024-22289, CVE-2024-22307, CVE-2024-23500, CVE-2024-23506, CVE-2024-23507, CVE-2024-24831, CVE-2024-24833, CVE-2024-24871, CVE-2024-24878, CVE-2024-25100, CVE-2024-25599, CVE-2024-25932, CVE-2024-27188, CVE-2024-27193, CVE-2024-27195, CVE-2024-27949, CVE-2024-27950, CVE-2024-27965, CVE-2024-27971, CVE-2024-27987, CVE-2024-27993, CVE-2024-27994, CVE-2024-27997, CVE-2024-27998, CVE-2024-28000, CVE-2024-29093, CVE-2024-29095, CVE-2024-29125, CVE-2024-29134, CVE-2024-29136, CVE-2024-29137, CVE-2024-29138, CVE-2024-29777, CVE-2024-29792, CVE-2024-29921, CVE-2024-29931, CVE-2024-2889, CVE-2024-30178, CVE-2024-30182, CVE-2024-30193, CVE-2024-30194, CVE-2024-30197, CVE-2024-30199, CVE-2024-30221, CVE-2024-30229, CVE-2024-30236, CVE-2024-30238, CVE-2024-30244, CVE-2024-30245, CVE-2024-30422, CVE-2024-30424, CVE-2024-30425, CVE-2024-30428, CVE-2024-30435, CVE-2024-30488, CVE-2024-30493, CVE-2024-30503, CVE-2024-30505, CVE-2024-30529, CVE-2024-30534, CVE-2024-31246, CVE-2024-31281, CVE-2024-31303, CVE-2024-31359, CVE-2024-31373, CVE-2024-31374, CVE-2024-31376, CVE-2024-31382, CVE-2024-31421, CVE-2024-31424, CVE-2024-31433, CVE-2024-31924, CVE-2024-31929, CVE-2024-31942, CVE-2024-32082, CVE-2024-32090, CVE-2024-32101, CVE-2024-32126, CVE-2024-32140, CVE-2024-32141, CVE-2024-32433, CVE-2024-32435, CVE-2024-32444, CVE-2024-32445, CVE-2024-32505, CVE-2024-32507, CVE-2024-32523, CVE-2024-32553, CVE-2024-32555, CVE-2024-32564, CVE-2024-32566, CVE-2024-32568, CVE-2024-32573, CVE-2024-32589, CVE-2024-32599, CVE-2024-32679, CVE-2024-32698, CVE-2024-32699, CVE-2024-32701, CVE-2024-32702, CVE-2024-32703, CVE-2024-32704, CVE-2024-32705, CVE-2024-32706, CVE-2024-32711, CVE-2024-32719, CVE-2024-32725, CVE-2024-32778, CVE-2024-32782, CVE-2024-32791, CVE-2024-32792, CVE-2024-32796, CVE-2024-32810, CVE-2024-32815, CVE-2024-32817, CVE-2024-32824, CVE-2024-32825, CVE-2024-32832, CVE-2024-32836, CVE-2024-32956, CVE-2024-32959, CVE-2024-32961, CVE-2024-33568, CVE-2024-33570, CVE-2024-33571, CVE-2024-33572, CVE-2024-33648, CVE-2024-33678, CVE-2024-33689, CVE-2024-33907, CVE-2024-33939, CVE-2024-34371, CVE-2024-34373, CVE-2024-34385, CVE-2024-34438, CVE-2024-34443, CVE-2024-34444, CVE-2024-34546, CVE-2024-34556, CVE-2024-34557, CVE-2024-34569, CVE-2024-34757, CVE-2024-34763, CVE-2024-34770, CVE-2024-34794, CVE-2024-34795, CVE-2024-34800, CVE-2024-34801, CVE-2024-34807, CVE-2024-34812, CVE-2024-34813, CVE-2024-34814, CVE-2024-34815, CVE-2024-34819, CVE-2024-34821, CVE-2024-34826, CVE-2024-34828, CVE-2024-35169, CVE-2024-35172, CVE-2024-35633, CVE-2024-35637, CVE-2024-35639, CVE-2024-35645, CVE-2024-35646, CVE-2024-35650, CVE-2024-35653, CVE-2024-35655, CVE-2024-35659, CVE-2024-35664, CVE-2024-35674, CVE-2024-35679, CVE-2024-35680, CVE-2024-35684, CVE-2024-35693, CVE-2024-35694, CVE-2024-35698, CVE-2024-35700, CVE-2024-35709, CVE-2024-35723, CVE-2024-35729, CVE-2024-35732, CVE-2024-35739, CVE-2024-35759, CVE-2024-35760, CVE-2024-35764, CVE-2024-35768, CVE-2024-35769, CVE-2024-37093, CVE-2024-37102, CVE-2024-37103, CVE-2024-37104, CVE-2024-37114, CVE-2024-37202, CVE-2024-37213, CVE-2024-37228, CVE-2024-37235, CVE-2024-37236, CVE-2024-37237, CVE-2024-37238, CVE-2024-37239, CVE-2024-37240, CVE-2024-37241, CVE-2024-37242, CVE-2024-37243, CVE-2024-37255, CVE-2024-37259, CVE-2024-37261, CVE-2024-37270, CVE-2024-37271, CVE-2024-37272, CVE-2024-37274, CVE-2024-37275, CVE-2024-37409, CVE-2024-37410, CVE-2024-37411, CVE-2024-37412, CVE-2024-37413, CVE-2024-37415, CVE-2024-37417, CVE-2024-37421, CVE-2024-37422, CVE-2024-37426, CVE-2024-37429, CVE-2024-37430, CVE-2024-37431, CVE-2024-37433, CVE-2024-37434, CVE-2024-37435, CVE-2024-37437, CVE-2024-37438, CVE-2024-37440, CVE-2024-37441, CVE-2024-37444, CVE-2024-37448, CVE-2024-37449, CVE-2024-37450, CVE-2024-37451, CVE-2024-37452, CVE-2024-37458, CVE-2024-37467, CVE-2024-37472, CVE-2024-37473, CVE-2024-37478, CVE-2024-37481, CVE-2024-37482, CVE-2024-37483, CVE-2024-37488, CVE-2024-37490, CVE-2024-37491, CVE-2024-37493, CVE-2024-37495, CVE-2024-37497, CVE-2024-37502, CVE-2024-37503, CVE-2024-37508, CVE-2024-37511, CVE-2024-37518, CVE-2024-37519, CVE-2024-37520, CVE-2024-37540, CVE-2024-37541, CVE-2024-37543, CVE-2024-37544, CVE-2024-37554, CVE-2024-37555, CVE-2024-37560, CVE-2024-37918, CVE-2024-37922, CVE-2024-37923, CVE-2024-37925, CVE-2024-37929, CVE-2024-37930, CVE-2024-37931, CVE-2024-37937, CVE-2024-37943, CVE-2024-37945, CVE-2024-37946, CVE-2024-37962, CVE-2024-38687, CVE-2024-38691, CVE-2024-38706, CVE-2024-38708, CVE-2024-38712, CVE-2024-38714, CVE-2024-38729, CVE-2024-38731, CVE-2024-38732, CVE-2024-38735, CVE-2024-38751, CVE-2024-38753, CVE-2024-38754, CVE-2024-38762, CVE-2024-38763, CVE-2024-38764, CVE-2024-38765, CVE-2024-38766, CVE-2024-38771, CVE-2024-38778, CVE-2024-38787, CVE-2024-38789, CVE-2024-38790, CVE-2024-38795, CVE-2024-39619, CVE-2024-39620, CVE-2024-39621, CVE-2024-39622, CVE-2024-39623, CVE-2024-39624, CVE-2024-39626, CVE-2024-39631, CVE-2024-39637, CVE-2024-39646, CVE-2024-39647, CVE-2024-39649, CVE-2024-39654, CVE-2024-39663, CVE-2024-43117, CVE-2024-43118, CVE-2024-43136, CVE-2024-43153, CVE-2024-43158, CVE-2024-43159, CVE-2024-43208, CVE-2024-43214, CVE-2024-43216, CVE-2024-43218, CVE-2024-43222, CVE-2024-43228, CVE-2024-43229, CVE-2024-43230, CVE-2024-43237, CVE-2024-43238, CVE-2024-43239, CVE-2024-43240, CVE-2024-43241, CVE-2024-43243, CVE-2024-43252, CVE-2024-43253, CVE-2024-43254, CVE-2024-43255, CVE-2024-43259, CVE-2024-43264, CVE-2024-43266, CVE-2024-43283, CVE-2024-43290, CVE-2024-43299, CVE-2024-43300, CVE-2024-43306, CVE-2024-43313, CVE-2024-43318, CVE-2024-43333, CVE-2024-43334, CVE-2024-43336, CVE-2024-43338, CVE-2024-43349, CVE-2024-43353, CVE-2024-43927, CVE-2024-43932, CVE-2024-43933, CVE-2024-43938, CVE-2024-43944, CVE-2024-43953, CVE-2024-43954, CVE-2024-43955, CVE-2024-43956, CVE-2024-43959, CVE-2024-43971, CVE-2024-43973, CVE-2024-43975, CVE-2024-43976, CVE-2024-43977, CVE-2024-43978, CVE-2024-43989, CVE-2024-44000, CVE-2024-44001, CVE-2024-44002, CVE-2024-44003, CVE-2024-44004, CVE-2024-44005, CVE-2024-44006, CVE-2024-44007, CVE-2024-44008, CVE-2024-44009, CVE-2024-44010, CVE-2024-44011, CVE-2024-44012, CVE-2024-44013, CVE-2024-44014, CVE-2024-44015, CVE-2024-44016, CVE-2024-44017, CVE-2024-44018, CVE-2024-44019, CVE-2024-44020, CVE-2024-44021, CVE-2024-44022, CVE-2024-44023, CVE-2024-44024, CVE-2024-44025, CVE-2024-44026, CVE-2024-44027, CVE-2024-44028, CVE-2024-44029, CVE-2024-44030, CVE-2024-44031, CVE-2024-44032, CVE-2024-44033, CVE-2024-44034, CVE-2024-44035, CVE-2024-44036, CVE-2024-44037, CVE-2024-44038, CVE-2024-44039, CVE-2024-44040, CVE-2024-44041, CVE-2024-44042, CVE-2024-44043, CVE-2024-44044, CVE-2024-44045, CVE-2024-44046, CVE-2024-44047, CVE-2024-44048, CVE-2024-44049, CVE-2024-44050, CVE-2024-44051, CVE-2024-44052, CVE-2024-44055, CVE-2024-44059, CVE-2024-44061, CVE-2024-44064, CVE-2024-45451, CVE-2024-45452, CVE-2024-45453, CVE-2024-45454, CVE-2024-45455, CVE-2024-45456, CVE-2024-45457, CVE-2024-45458, CVE-2024-45459, CVE-2024-45460, CVE-2024-47297, CVE-2024-47298, CVE-2024-47299, CVE-2024-47300, CVE-2024-47301, CVE-2024-47302, CVE-2024-47303, CVE-2024-47304, CVE-2024-47305, CVE-2024-47306, CVE-2024-47307, CVE-2024-47308, CVE-2024-47309, CVE-2024-47310, CVE-2024-47311, CVE-2024-47312, CVE-2024-47313, CVE-2024-47314, CVE-2024-47315, CVE-2024-47316, CVE-2024-47317, CVE-2024-47318, CVE-2024-47319, CVE-2024-47320, CVE-2024-47321, CVE-2024-47322, CVE-2024-47323, CVE-2024-47324, CVE-2024-47325, CVE-2024-47326, CVE-2024-47327, CVE-2024-47328, CVE-2024-47329, CVE-2024-47331, CVE-2024-47332, CVE-2024-47333, CVE-2024-47334, CVE-2024-47335, CVE-2024-47336, CVE-2024-47337, CVE-2024-47338, CVE-2024-47339, CVE-2024-47340, CVE-2024-47341, CVE-2024-47342, CVE-2024-47343, CVE-2024-47344, CVE-2024-47345, CVE-2024-47346, CVE-2024-47347, CVE-2024-47348, CVE-2024-47349, CVE-2024-47350, CVE-2024-47351, CVE-2024-47352, CVE-2024-47353, CVE-2024-47354, CVE-2024-47355, CVE-2024-47356, CVE-2024-47357, CVE-2024-47358, CVE-2024-47359, CVE-2024-47360, CVE-2024-47361, CVE-2024-47362, CVE-2024-47363, CVE-2024-47364, CVE-2024-47365, CVE-2024-47366, CVE-2024-47367, CVE-2024-47368, CVE-2024-47369, CVE-2024-47370, CVE-2024-47371, CVE-2024-47372, CVE-2024-47373, CVE-2024-47374, CVE-2024-47375, CVE-2024-47376, CVE-2024-47377, CVE-2024-47378, CVE-2024-47379, CVE-2024-47380, CVE-2024-47381, CVE-2024-47382, CVE-2024-47383, CVE-2024-47384, CVE-2024-47385, CVE-2024-47386, CVE-2024-47387, CVE-2024-47388, CVE-2024-47389, CVE-2024-47390, CVE-2024-47391, CVE-2024-47392, CVE-2024-47393, CVE-2024-47394, CVE-2024-47395, CVE-2024-47396, CVE-2024-47621, CVE-2024-47622, CVE-2024-47623, CVE-2024-47624, CVE-2024-47625, CVE-2024-47626, CVE-2024-47627, CVE-2024-47628, CVE-2024-47629, CVE-2024-47630, CVE-2024-47631, CVE-2024-47632, CVE-2024-47633, CVE-2024-47634, CVE-2024-47635, CVE-2024-47636, CVE-2024-47637, CVE-2024-47638, CVE-2024-47639, CVE-2024-47640, CVE-2024-47641, CVE-2024-47642, CVE-2024-47643, CVE-2024-47644, CVE-2024-47645, CVE-2024-47646, CVE-2024-47647, CVE-2024-47648, CVE-2024-47649, CVE-2024-47650, CVE-2024-48020, CVE-2024-48021, CVE-2024-48022, CVE-2024-48023, CVE-2024-48024, CVE-2024-48025, CVE-2024-48026, CVE-2024-48027, CVE-2024-48028, CVE-2024-48029, CVE-2024-48030, CVE-2024-48031, CVE-2024-48032, CVE-2024-48033, CVE-2024-48034, CVE-2024-48035, CVE-2024-48036, CVE-2024-48037, CVE-2024-48038, CVE-2024-48039, CVE-2024-48040, CVE-2024-48041, CVE-2024-48042, CVE-2024-48043, CVE-2024-48044, CVE-2024-48045, CVE-2024-48046, CVE-2024-48047, CVE-2024-48048, CVE-2024-48049, CVE-2024-49222, CVE-2024-49225, CVE-2024-49228, CVE-2024-49229, CVE-2024-49231, CVE-2024-49232, CVE-2024-49233, CVE-2024-49234, CVE-2024-49236, CVE-2024-49237, CVE-2024-49241, CVE-2024-49243, CVE-2024-49249, CVE-2024-49250, CVE-2024-49251, CVE-2024-49252, CVE-2024-49254, CVE-2024-49255, CVE-2024-49256, CVE-2024-49257, CVE-2024-49258, CVE-2024-49259, CVE-2024-49260, CVE-2024-49261, CVE-2024-49262, CVE-2024-49263, CVE-2024-49264, CVE-2024-49265, CVE-2024-49266, CVE-2024-49267, CVE-2024-49268, CVE-2024-49270, CVE-2024-49271, CVE-2024-49272, CVE-2024-49273, CVE-2024-49274, CVE-2024-49275, CVE-2024-49276, CVE-2024-49277, CVE-2024-49278, CVE-2024-49279, CVE-2024-49280, CVE-2024-49281, CVE-2024-49282, CVE-2024-49283, CVE-2024-49284, CVE-2024-49285, CVE-2024-49286, CVE-2024-49287, CVE-2024-49288, CVE-2024-49289, CVE-2024-49290, CVE-2024-49291, CVE-2024-49292, CVE-2024-49293, CVE-2024-49294, CVE-2024-49295, CVE-2024-49296, CVE-2024-49297, CVE-2024-49298, CVE-2024-49299, CVE-2024-49300, CVE-2024-49301, CVE-2024-49302, CVE-2024-49303, CVE-2024-49304, CVE-2024-49305, CVE-2024-49306, CVE-2024-49307, CVE-2024-49308, CVE-2024-49309, CVE-2024-49310, CVE-2024-49311, CVE-2024-49312, CVE-2024-49313, CVE-2024-49316, CVE-2024-49318, CVE-2024-49319, CVE-2024-49320, CVE-2024-49323, CVE-2024-49324, CVE-2024-49325, CVE-2024-49326, CVE-2024-49327, CVE-2024-49328, CVE-2024-49329, CVE-2024-49330, CVE-2024-49331, CVE-2024-49332, CVE-2024-49333, CVE-2024-49334, CVE-2024-49335, CVE-2024-49604, CVE-2024-49605, CVE-2024-49606, CVE-2024-49607, CVE-2024-49608, CVE-2024-49609, CVE-2024-49610, CVE-2024-49611, CVE-2024-49612, CVE-2024-49613, CVE-2024-49614, CVE-2024-49615, CVE-2024-49616, CVE-2024-49617, CVE-2024-49618, CVE-2024-49619, CVE-2024-49620, CVE-2024-49621, CVE-2024-49622, CVE-2024-49623, CVE-2024-49624, CVE-2024-49627, CVE-2024-49628, CVE-2024-49629, CVE-2024-49630, CVE-2024-49631, CVE-2024-49632, CVE-2024-49633, CVE-2024-49634, CVE-2024-49635, CVE-2024-49636, CVE-2024-49637, CVE-2024-49638, CVE-2024-49639, CVE-2024-49640, CVE-2024-49641, CVE-2024-49642, CVE-2024-49643, CVE-2024-49644, CVE-2024-49645, CVE-2024-49646, CVE-2024-49647, CVE-2024-49648, CVE-2024-49649, CVE-2024-49650, CVE-2024-49651, CVE-2024-49652, CVE-2024-49653, CVE-2024-49654, CVE-2024-49655, CVE-2024-49656, CVE-2024-49657, CVE-2024-49658, CVE-2024-49659, CVE-2024-49660, CVE-2024-49661, CVE-2024-49662, CVE-2024-49663, CVE-2024-49664, CVE-2024-49665, CVE-2024-49666, CVE-2024-49667, CVE-2024-49668, CVE-2024-49669, CVE-2024-49670, CVE-2024-49671, CVE-2024-49672, CVE-2024-49673, CVE-2024-49674, CVE-2024-49675, CVE-2024-49676, CVE-2024-49677, CVE-2024-49678, CVE-2024-49679, CVE-2024-49680, CVE-2024-49681, CVE-2024-49682, CVE-2024-49683, CVE-2024-49684, CVE-2024-49685, CVE-2024-49686, CVE-2024-49687, CVE-2024-49688, CVE-2024-49689, CVE-2024-49690, CVE-2024-49691, CVE-2024-49692, CVE-2024-49693, CVE-2024-49694, CVE-2024-49695, CVE-2024-49696, CVE-2024-49697, CVE-2024-49698, CVE-2024-49699, CVE-2024-49700, CVE-2024-49701, CVE-2024-49702, CVE-2024-49703, CVE-2024-4689, CVE-2024-4746, CVE-2024-50407, CVE-2024-50408, CVE-2024-50409, CVE-2024-50410, CVE-2024-50411, CVE-2024-50412, CVE-2024-50413, CVE-2024-50414, CVE-2024-50415, CVE-2024-50416, CVE-2024-50417, CVE-2024-50418, CVE-2024-50419, CVE-2024-50420, CVE-2024-50421, CVE-2024-50422, CVE-2024-50423, CVE-2024-50424, CVE-2024-50425, CVE-2024-50426, CVE-2024-50427, CVE-2024-50428, CVE-2024-50429, CVE-2024-50430, CVE-2024-50431, CVE-2024-50432, CVE-2024-50433, CVE-2024-50434, CVE-2024-50435, CVE-2024-50436, CVE-2024-50437, CVE-2024-50438, CVE-2024-50439, CVE-2024-50440, CVE-2024-50441, CVE-2024-50442, CVE-2024-50445, CVE-2024-50446, CVE-2024-50447, CVE-2024-50448, CVE-2024-50449, CVE-2024-50450, CVE-2024-50451, CVE-2024-50453, CVE-2024-50454, CVE-2024-50455, CVE-2024-50456, CVE-2024-50457, CVE-2024-50458, CVE-2024-50459, CVE-2024-50460, CVE-2024-50461, CVE-2024-50462, CVE-2024-50463, CVE-2024-50464, CVE-2024-50465, CVE-2024-50467, CVE-2024-50468, CVE-2024-50469, CVE-2024-50470, CVE-2024-50471, CVE-2024-50472, CVE-2024-50473, CVE-2024-50475, CVE-2024-50476, CVE-2024-50477, CVE-2024-50478, CVE-2024-50479, CVE-2024-50480, CVE-2024-50481, CVE-2024-50482, CVE-2024-50483, CVE-2024-50484, CVE-2024-50485, CVE-2024-50486, CVE-2024-50487, CVE-2024-50488, CVE-2024-50489, CVE-2024-50490, CVE-2024-50491, CVE-2024-50492, CVE-2024-50493, CVE-2024-50494, CVE-2024-50495, CVE-2024-50496, CVE-2024-50497, CVE-2024-50498, CVE-2024-50500, CVE-2024-50501, CVE-2024-50502, CVE-2024-50503, CVE-2024-50504, CVE-2024-50506, CVE-2024-50507, CVE-2024-50508, CVE-2024-50509, CVE-2024-50510, CVE-2024-50511, CVE-2024-50512, CVE-2024-50513, CVE-2024-50514, CVE-2024-50515, CVE-2024-50516, CVE-2024-50517, CVE-2024-50518, CVE-2024-50519, CVE-2024-50520, CVE-2024-50521, CVE-2024-50522, CVE-2024-50523, CVE-2024-50524, CVE-2024-50525, CVE-2024-50526, CVE-2024-50527, CVE-2024-50528, CVE-2024-50529, CVE-2024-50530, CVE-2024-50531, CVE-2024-50532, CVE-2024-50533, CVE-2024-50534, CVE-2024-50535, CVE-2024-50536, CVE-2024-50537, CVE-2024-50538, CVE-2024-50539, CVE-2024-50540, CVE-2024-50541, CVE-2024-50542, CVE-2024-50543, CVE-2024-50544, CVE-2024-50545, CVE-2024-50546, CVE-2024-50547, CVE-2024-50548, CVE-2024-50549, CVE-2024-50550, CVE-2024-50551, CVE-2024-50552, CVE-2024-50553, CVE-2024-50554, CVE-2024-50556, CVE-2024-51570, CVE-2024-51571, CVE-2024-51572, CVE-2024-51573, CVE-2024-51574, CVE-2024-51575, CVE-2024-51576, CVE-2024-51577, CVE-2024-51578, CVE-2024-51579, CVE-2024-51580, CVE-2024-51581, CVE-2024-51582, CVE-2024-51583, CVE-2024-51584, CVE-2024-51585, CVE-2024-51586, CVE-2024-51587, CVE-2024-51588, CVE-2024-51589, CVE-2024-51590, CVE-2024-51591, CVE-2024-51592, CVE-2024-51593, CVE-2024-51594, CVE-2024-51595, CVE-2024-51596, CVE-2024-51597, CVE-2024-51598, CVE-2024-51599, CVE-2024-51601, CVE-2024-51602, CVE-2024-51603, CVE-2024-51604, CVE-2024-51605, CVE-2024-51606, CVE-2024-51607, CVE-2024-51608, CVE-2024-51609, CVE-2024-51610, CVE-2024-51611, CVE-2024-51612, CVE-2024-51613, CVE-2024-51614, CVE-2024-51615, CVE-2024-51616, CVE-2024-51617, CVE-2024-51618, CVE-2024-51619, CVE-2024-51620, CVE-2024-51621, CVE-2024-51622, CVE-2024-51623, CVE-2024-51624, CVE-2024-51625, CVE-2024-51626, CVE-2024-51627, CVE-2024-51628, CVE-2024-51629, CVE-2024-51630, CVE-2024-51631, CVE-2024-51632, CVE-2024-51633, CVE-2024-51634, CVE-2024-51635, CVE-2024-51636, CVE-2024-51637, CVE-2024-51638, CVE-2024-51639, CVE-2024-51640, CVE-2024-51641, CVE-2024-51642, CVE-2024-51643, CVE-2024-51644, CVE-2024-51645, CVE-2024-51648, CVE-2024-51649, CVE-2024-51650, CVE-2024-51651, CVE-2024-51652, CVE-2024-51653, CVE-2024-51654, CVE-2024-51655, CVE-2024-51656, CVE-2024-51657, CVE-2024-51658, CVE-2024-51659, CVE-2024-51660, CVE-2024-51661, CVE-2024-51662, CVE-2024-51663, CVE-2024-51664, CVE-2024-51665, CVE-2024-51666, CVE-2024-51667, CVE-2024-51668, CVE-2024-51669, CVE-2024-51670, CVE-2024-51671, CVE-2024-51672, CVE-2024-51673, CVE-2024-51674, CVE-2024-51675, CVE-2024-51676, CVE-2024-51677, CVE-2024-51678, CVE-2024-51679, CVE-2024-51680, CVE-2024-51681, CVE-2024-51682, CVE-2024-51683, CVE-2024-51684, CVE-2024-51685, CVE-2024-51686, CVE-2024-51687, CVE-2024-51688, CVE-2024-51689, CVE-2024-51690, CVE-2024-51691, CVE-2024-51692, CVE-2024-51693, CVE-2024-51694, CVE-2024-51695, CVE-2024-51696, CVE-2024-51697, CVE-2024-51698, CVE-2024-51699, CVE-2024-51700, CVE-2024-51701, CVE-2024-51702, CVE-2024-51703, CVE-2024-51704, CVE-2024-51705, CVE-2024-51706, CVE-2024-51707, CVE-2024-51708, CVE-2024-51709, CVE-2024-51710, CVE-2024-51711, CVE-2024-51712, CVE-2024-51713, CVE-2024-51714, CVE-2024-51715, CVE-2024-51716, CVE-2024-51717, CVE-2024-51718, CVE-2024-51719, CVE-2024-51759, CVE-2024-51760, CVE-2024-51761, CVE-2024-51762, CVE-2024-51763, CVE-2024-51776, CVE-2024-51778, CVE-2024-51779, CVE-2024-51780, CVE-2024-51781, CVE-2024-51782, CVE-2024-51783, CVE-2024-51784, CVE-2024-51785, CVE-2024-51786, CVE-2024-51787, CVE-2024-51788, CVE-2024-51789, CVE-2024-51790, CVE-2024-51791, CVE-2024-51792, CVE-2024-51793, CVE-2024-51794, CVE-2024-51795, CVE-2024-51796, CVE-2024-51797, CVE-2024-51798, CVE-2024-51799, CVE-2024-51800, CVE-2024-51801, CVE-2024-51802, CVE-2024-51803, CVE-2024-51804, CVE-2024-51805, CVE-2024-51806, CVE-2024-51807, CVE-2024-51808, CVE-2024-51809, CVE-2024-51810, CVE-2024-51811, CVE-2024-51812, CVE-2024-51813, CVE-2024-51814, CVE-2024-51815, CVE-2024-51816, CVE-2024-51817, CVE-2024-51818, CVE-2024-51819, CVE-2024-51820, CVE-2024-51821, CVE-2024-51822, CVE-2024-51823, CVE-2024-51824, CVE-2024-51825, CVE-2024-51826, CVE-2024-51827, CVE-2024-51828, CVE-2024-51829, CVE-2024-51830, CVE-2024-51831, CVE-2024-51832, CVE-2024-51833, CVE-2024-51834, CVE-2024-51835, CVE-2024-51836, CVE-2024-51837, CVE-2024-51838, CVE-2024-51839, CVE-2024-51840, CVE-2024-51841, CVE-2024-51842, CVE-2024-51843, CVE-2024-51844, CVE-2024-51845, CVE-2024-51846, CVE-2024-51847, CVE-2024-51848, CVE-2024-51849, CVE-2024-51850, CVE-2024-51851, CVE-2024-51852, CVE-2024-51853, CVE-2024-51854, CVE-2024-51855, CVE-2024-51856, CVE-2024-51857, CVE-2024-51858, CVE-2024-51859, CVE-2024-51860, CVE-2024-51861, CVE-2024-51862, CVE-2024-51863, CVE-2024-51864, CVE-2024-51865, CVE-2024-51866, CVE-2024-51867, CVE-2024-51868, CVE-2024-51869, CVE-2024-51870, CVE-2024-51871, CVE-2024-51872, CVE-2024-51873, CVE-2024-51874, CVE-2024-51875, CVE-2024-51876, CVE-2024-51877, CVE-2024-51878, CVE-2024-51879, CVE-2024-51880, CVE-2024-51881, CVE-2024-51882, CVE-2024-51883, CVE-2024-51884, CVE-2024-51885, CVE-2024-51886, CVE-2024-51887, CVE-2024-51888, CVE-2024-51889, CVE-2024-51890, CVE-2024-51891, CVE-2024-51892, CVE-2024-51893, CVE-2024-51894, CVE-2024-51895, CVE-2024-51896, CVE-2024-51897, CVE-2024-51898, CVE-2024-51899, CVE-2024-51900, CVE-2024-51901, CVE-2024-51902, CVE-2024-51903, CVE-2024-51904, CVE-2024-51905, CVE-2024-51906, CVE-2024-51907, CVE-2024-51908, CVE-2024-51909, CVE-2024-51910, CVE-2024-51911, CVE-2024-51912, CVE-2024-51913, CVE-2024-51914, CVE-2024-51916, CVE-2024-51917, CVE-2024-51918, CVE-2024-51919, CVE-2024-51920, CVE-2024-51921, CVE-2024-51922, CVE-2024-51923, CVE-2024-51924, CVE-2024-51925, CVE-2024-51926, CVE-2024-51927, CVE-2024-51928, CVE-2024-51929, CVE-2024-51930, CVE-2024-51931, CVE-2024-51932, CVE-2024-51933, CVE-2024-51934, CVE-2024-51935, CVE-2024-51936, CVE-2024-51937, CVE-2024-51938, CVE-2024-51939, CVE-2024-51940, CVE-2024-52339, CVE-2024-52340, CVE-2024-52341, CVE-2024-52342, CVE-2024-52343, CVE-2024-52344, CVE-2024-52345, CVE-2024-52346, CVE-2024-52347, CVE-2024-52348, CVE-2024-52349, CVE-2024-52350, CVE-2024-52351, CVE-2024-52352, CVE-2024-52353, CVE-2024-52354, CVE-2024-52355, CVE-2024-52356, CVE-2024-52357, CVE-2024-52358, CVE-2024-52369, CVE-2024-52370, CVE-2024-52371, CVE-2024-52372, CVE-2024-52373, CVE-2024-52374, CVE-2024-52375, CVE-2024-52376, CVE-2024-52377, CVE-2024-52378, CVE-2024-52379, CVE-2024-52380, CVE-2024-52381, CVE-2024-52382, CVE-2024-52383, CVE-2024-52384, CVE-2024-52385, CVE-2024-52386, CVE-2024-52388, CVE-2024-52389, CVE-2024-52390, CVE-2024-52391, CVE-2024-52392, CVE-2024-52393, CVE-2024-52394, CVE-2024-52395, CVE-2024-52396, CVE-2024-52397, CVE-2024-52398, CVE-2024-52399, CVE-2024-52400, CVE-2024-52401, CVE-2024-52402, CVE-2024-52403, CVE-2024-52404, CVE-2024-52405, CVE-2024-52406, CVE-2024-52407, CVE-2024-52408, CVE-2024-52409, CVE-2024-52410, CVE-2024-52411, CVE-2024-52412, CVE-2024-52413, CVE-2024-52414, CVE-2024-52415, CVE-2024-52416, CVE-2024-52417, CVE-2024-52418, CVE-2024-52419, CVE-2024-52420, CVE-2024-52421, CVE-2024-52422, CVE-2024-52423, CVE-2024-52424, CVE-2024-52425, CVE-2024-52426, CVE-2024-52427, CVE-2024-52428, CVE-2024-52429, CVE-2024-52430, CVE-2024-52431, CVE-2024-52432, CVE-2024-52433, CVE-2024-52434, CVE-2024-52435, CVE-2024-52436, CVE-2024-52437, CVE-2024-52438, CVE-2024-52439, CVE-2024-52440, CVE-2024-52441, CVE-2024-52442, CVE-2024-52443, CVE-2024-52444, CVE-2024-52445, CVE-2024-52446, CVE-2024-52447, CVE-2024-52448, CVE-2024-52449, CVE-2024-52450, CVE-2024-52451, CVE-2024-52452, CVE-2024-52453, CVE-2024-52454, CVE-2024-52455, CVE-2024-52456, CVE-2024-52457, CVE-2024-52458, CVE-2024-52459, CVE-2024-52460, CVE-2024-52461, CVE-2024-52462, CVE-2024-52463, CVE-2024-52464, CVE-2024-52465, CVE-2024-52466, CVE-2024-52467, CVE-2024-52468, CVE-2024-52469, CVE-2024-52470, CVE-2024-52471, CVE-2024-52472, CVE-2024-52473, CVE-2024-52474, CVE-2024-52475, CVE-2024-52476, CVE-2024-52477, CVE-2024-52478, CVE-2024-52479, CVE-2024-52482, CVE-2024-52483, CVE-2024-52484, CVE-2024-52485, CVE-2024-52486, CVE-2024-52487, CVE-2024-52489, CVE-2024-52490, CVE-2024-52491, CVE-2024-52492, CVE-2024-52493, CVE-2024-52494, CVE-2024-52495, CVE-2024-52496, CVE-2024-52497, CVE-2024-52498, CVE-2024-52499, CVE-2024-52500, CVE-2024-52501, CVE-2024-52502, CVE-2024-52503, CVE-2024-53707, CVE-2024-53708, CVE-2024-53709, CVE-2024-53710, CVE-2024-53711, CVE-2024-53712, CVE-2024-53713, CVE-2024-53714, CVE-2024-53715, CVE-2024-53716, CVE-2024-53717, CVE-2024-53718, CVE-2024-53719, CVE-2024-53720, CVE-2024-53721, CVE-2024-53722, CVE-2024-53723, CVE-2024-53724, CVE-2024-53725, CVE-2024-53726, CVE-2024-53727, CVE-2024-53728, CVE-2024-53729, CVE-2024-53730, CVE-2024-53731, CVE-2024-53732, CVE-2024-53733, CVE-2024-53734, CVE-2024-53735, CVE-2024-53736, CVE-2024-53737, CVE-2024-53738, CVE-2024-53739, CVE-2024-53740, CVE-2024-53741, CVE-2024-53742, CVE-2024-53743, CVE-2024-53744, CVE-2024-53745, CVE-2024-53746, CVE-2024-53747, CVE-2024-53748, CVE-2024-53749, CVE-2024-53750, CVE-2024-53751, CVE-2024-53752, CVE-2024-53753, CVE-2024-53754, CVE-2024-53755, CVE-2024-53756, CVE-2024-53757, CVE-2024-53758, CVE-2024-53759, CVE-2024-53760, CVE-2024-53761, CVE-2024-53762, CVE-2024-53763, CVE-2024-53764, CVE-2024-53765, CVE-2024-53766, CVE-2024-53767, CVE-2024-53768, CVE-2024-53769, CVE-2024-53770, CVE-2024-53771, CVE-2024-53772, CVE-2024-53773, CVE-2024-53774, CVE-2024-53775, CVE-2024-53776, CVE-2024-53777, CVE-2024-53778, CVE-2024-53779, CVE-2024-53780, CVE-2024-53781, CVE-2024-53782, CVE-2024-53783, CVE-2024-53784, CVE-2024-53785, CVE-2024-53786, CVE-2024-53787, CVE-2024-53788, CVE-2024-53789, CVE-2024-53790, CVE-2024-53791, CVE-2024-53792, CVE-2024-53793, CVE-2024-53794, CVE-2024-53795, CVE-2024-53796, CVE-2024-53797, CVE-2024-53798, CVE-2024-53799, CVE-2024-53801, CVE-2024-53802, CVE-2024-53803, CVE-2024-53805, CVE-2024-53806, CVE-2024-53807, CVE-2024-53808, CVE-2024-53809, CVE-2024-53810, CVE-2024-53811, CVE-2024-53812, CVE-2024-53813, CVE-2024-53814, CVE-2024-53815, CVE-2024-53816, CVE-2024-53817, CVE-2024-53818, CVE-2024-53819, CVE-2024-53820, CVE-2024-53821, CVE-2024-53822, CVE-2024-53823, CVE-2024-53824, CVE-2024-53825, CVE-2024-53826, CVE-2024-54205, CVE-2024-54206, CVE-2024-54207, CVE-2024-54208, CVE-2024-54209, CVE-2024-54210, CVE-2024-54211, CVE-2024-54212, CVE-2024-54213, CVE-2024-54214, CVE-2024-54215, CVE-2024-54216, CVE-2024-54217, CVE-2024-54218, CVE-2024-54219, CVE-2024-54220, CVE-2024-54221, CVE-2024-54223, CVE-2024-54224, CVE-2024-54225, CVE-2024-54226, CVE-2024-54227, CVE-2024-54228, CVE-2024-54229, CVE-2024-54230, CVE-2024-54231, CVE-2024-54232, CVE-2024-54233, CVE-2024-54234, CVE-2024-54235, CVE-2024-54236, CVE-2024-54237, CVE-2024-54238, CVE-2024-54239, CVE-2024-54240, CVE-2024-54241, CVE-2024-54242, CVE-2024-54243, CVE-2024-54244, CVE-2024-54245, CVE-2024-54246, CVE-2024-54247, CVE-2024-54248, CVE-2024-54249, CVE-2024-54250, CVE-2024-54251, CVE-2024-54252, CVE-2024-54253, CVE-2024-54254, CVE-2024-54255, CVE-2024-54256, CVE-2024-54257, CVE-2024-54258, CVE-2024-54259, CVE-2024-54260, CVE-2024-54261, CVE-2024-54262, CVE-2024-54264, CVE-2024-54265, CVE-2024-54266, CVE-2024-54267, CVE-2024-54268, CVE-2024-54269, CVE-2024-54270, CVE-2024-54271, CVE-2024-54272, CVE-2024-54273, CVE-2024-54274, CVE-2024-54275, CVE-2024-54276, CVE-2024-54277, CVE-2024-54278, CVE-2024-54280, CVE-2024-54282, CVE-2024-54283, CVE-2024-54284, CVE-2024-54285, CVE-2024-54286, CVE-2024-54287, CVE-2024-54288, CVE-2024-54289, CVE-2024-54290, CVE-2024-54291, CVE-2024-54292, CVE-2024-54293, CVE-2024-54294, CVE-2024-54295, CVE-2024-54296, CVE-2024-54297, CVE-2024-54298, CVE-2024-54299, CVE-2024-54300, CVE-2024-54301, CVE-2024-54302, CVE-2024-54303, CVE-2024-54304, CVE-2024-54305, CVE-2024-54306, CVE-2024-54307, CVE-2024-54308, CVE-2024-54309, CVE-2024-54310, CVE-2024-54311, CVE-2024-54312, CVE-2024-54313, CVE-2024-54314, CVE-2024-54315, CVE-2024-54316, CVE-2024-54317, CVE-2024-54318, CVE-2024-54319, CVE-2024-54320, CVE-2024-54321, CVE-2024-54322, CVE-2024-54323, CVE-2024-54324, CVE-2024-54325, CVE-2024-54326, CVE-2024-54327, CVE-2024-54328, CVE-2024-54329, CVE-2024-54330, CVE-2024-54331, CVE-2024-54332, CVE-2024-54333, CVE-2024-54334, CVE-2024-54335, CVE-2024-54336, CVE-2024-54337, CVE-2024-54338, CVE-2024-54339, CVE-2024-54340, CVE-2024-54341, CVE-2024-54342, CVE-2024-54343, CVE-2024-54344, CVE-2024-54345, CVE-2024-54346, CVE-2024-54347, CVE-2024-54348, CVE-2024-54349, CVE-2024-54350, CVE-2024-54351, CVE-2024-54352, CVE-2024-54353, CVE-2024-54354, CVE-2024-54355, CVE-2024-54356, CVE-2024-54357, CVE-2024-54358, CVE-2024-54359, CVE-2024-54360, CVE-2024-54361, CVE-2024-54362, CVE-2024-54363, CVE-2024-54364, CVE-2024-54365, CVE-2024-54366, CVE-2024-54367, CVE-2024-54368, CVE-2024-54369, CVE-2024-54370, CVE-2024-54372, CVE-2024-54373, CVE-2024-54374, CVE-2024-54375, CVE-2024-54376, CVE-2024-54378, CVE-2024-54379, CVE-2024-54380, CVE-2024-54381, CVE-2024-54382, CVE-2024-54383, CVE-2024-54384, CVE-2024-54385, CVE-2024-54386, CVE-2024-54387, CVE-2024-54388, CVE-2024-54389, CVE-2024-54390, CVE-2024-54391, CVE-2024-54392, CVE-2024-54393, CVE-2024-54394, CVE-2024-54395, CVE-2024-54396, CVE-2024-54397, CVE-2024-54398, CVE-2024-54399, CVE-2024-54400, CVE-2024-54401, CVE-2024-54402, CVE-2024-54403, CVE-2024-54404, CVE-2024-54405, CVE-2024-54406, CVE-2024-54407, CVE-2024-54408, CVE-2024-54409, CVE-2024-54410, CVE-2024-54411, CVE-2024-54412, CVE-2024-54413, CVE-2024-54414, CVE-2024-54415, CVE-2024-54416, CVE-2024-54417, CVE-2024-54418, CVE-2024-54419, CVE-2024-54420, CVE-2024-54421, CVE-2024-54422, CVE-2024-54423, CVE-2024-54424, CVE-2024-54425, CVE-2024-54426, CVE-2024-54427, CVE-2024-54428, CVE-2024-54429, CVE-2024-54430, CVE-2024-54431, CVE-2024-54432, CVE-2024-54433, CVE-2024-54434, CVE-2024-54435, CVE-2024-54436, CVE-2024-54437, CVE-2024-54438, CVE-2024-54439, CVE-2024-54440, CVE-2024-54441, CVE-2024-54442, CVE-2024-54443, CVE-2024-54444, CVE-2024-55972, CVE-2024-55973, CVE-2024-55974, CVE-2024-55975, CVE-2024-55976, CVE-2024-55977, CVE-2024-55978, CVE-2024-55979, CVE-2024-55980, CVE-2024-55981, CVE-2024-55982, CVE-2024-55983, CVE-2024-55984, CVE-2024-55985, CVE-2024-55986, CVE-2024-55987, CVE-2024-55988, CVE-2024-55989, CVE-2024-55990, CVE-2024-55991, CVE-2024-55992, CVE-2024-55993, CVE-2024-55994, CVE-2024-55995, CVE-2024-55996, CVE-2024-55997, CVE-2024-55998, CVE-2024-55999, CVE-2024-56001, CVE-2024-56002, CVE-2024-56003, CVE-2024-56004, CVE-2024-56005, CVE-2024-56006, CVE-2024-56007, CVE-2024-56008, CVE-2024-56009, CVE-2024-56010, CVE-2024-56011, CVE-2024-56012, CVE-2024-56013, CVE-2024-56014, CVE-2024-56015, CVE-2024-56016, CVE-2024-56017, CVE-2024-56018, CVE-2024-56019, CVE-2024-56020, CVE-2024-56021, CVE-2024-56022, CVE-2024-56023, CVE-2024-56024, CVE-2024-56025, CVE-2024-56026, CVE-2024-56027, CVE-2024-56028, CVE-2024-56029, CVE-2024-56030, CVE-2024-56031, CVE-2024-56032, CVE-2024-56033, CVE-2024-56034, CVE-2024-56035, CVE-2024-56036, CVE-2024-56037, CVE-2024-56038, CVE-2024-56039, CVE-2024-56040, CVE-2024-56041, CVE-2024-56042, CVE-2024-56043, CVE-2024-56044, CVE-2024-56045, CVE-2024-56046, CVE-2024-56047, CVE-2024-56048, CVE-2024-56049, CVE-2024-56050, CVE-2024-56051, CVE-2024-56052, CVE-2024-56053, CVE-2024-56054, CVE-2024-56055, CVE-2024-56057, CVE-2024-56058, CVE-2024-56059, CVE-2024-56060, CVE-2024-56061, CVE-2024-56062, CVE-2024-56063, CVE-2024-56064, CVE-2024-56065, CVE-2024-56066, CVE-2024-56068, CVE-2024-56069, CVE-2024-56070, CVE-2024-56071, CVE-2024-56203, CVE-2024-56204, CVE-2024-56205, CVE-2024-56206, CVE-2024-56207, CVE-2024-56209, CVE-2024-56210, CVE-2024-56211, CVE-2024-56212, CVE-2024-56213, CVE-2024-56214, CVE-2024-56215, CVE-2024-56216, CVE-2024-56217, CVE-2024-56218, CVE-2024-56219, CVE-2024-56220, CVE-2024-56221, CVE-2024-56222, CVE-2024-56223, CVE-2024-56224, CVE-2024-56225, CVE-2024-56226, CVE-2024-56227, CVE-2024-56228, CVE-2024-56229, CVE-2024-56230, CVE-2024-56231, CVE-2024-56232, CVE-2024-56233, CVE-2024-56234, CVE-2024-56235, CVE-2024-56236, CVE-2024-56237, CVE-2024-56238, CVE-2024-56239, CVE-2024-56240, CVE-2024-56241, CVE-2024-56242, CVE-2024-56243, CVE-2024-56244, CVE-2024-56245, CVE-2024-56246, CVE-2024-56247, CVE-2024-56248, CVE-2024-56249, CVE-2024-56250, CVE-2024-56251, CVE-2024-56252, CVE-2024-56253, CVE-2024-56254, CVE-2024-56255, CVE-2024-56256, CVE-2024-56257, CVE-2024-56258, CVE-2024-56259, CVE-2024-56260, CVE-2024-56261, CVE-2024-56262, CVE-2024-56263, CVE-2024-56264, CVE-2024-56265, CVE-2024-56266, CVE-2024-56267, CVE-2024-56268, CVE-2024-56270, CVE-2024-56271, CVE-2024-56272, CVE-2024-56273, CVE-2024-56274, CVE-2024-56275, CVE-2024-56276, CVE-2024-56278, CVE-2024-56279, CVE-2024-56280, CVE-2024-56281, CVE-2024-56282, CVE-2024-56283, CVE-2024-56284, CVE-2024-56285, CVE-2024-56286, CVE-2024-56287, CVE-2024-56288, CVE-2024-56289, CVE-2024-56290, CVE-2024-56291, CVE-2024-56292, CVE-2024-56293, CVE-2024-56294, CVE-2024-56295, CVE-2024-56296, CVE-2024-56297, CVE-2024-56298, CVE-2024-56299, CVE-2024-56300, CVE-2024-56301, CVE-2024-56302, CVE-2024-58344, CVE-2024-7399, CVE-2024-7590, CVE-2024-9146, CVE-2025-10019, CVE-2025-10549, CVE-2025-12549, CVE-2025-12550, CVE-2025-12551, CVE-2025-13504, CVE-2025-13763, CVE-2025-13835, CVE-2025-14314, CVE-2025-14358, CVE-2025-14359, CVE-2025-14360, CVE-2025-14429, CVE-2025-14430, CVE-2025-14431, CVE-2025-15635, CVE-2025-15636, CVE-2025-1249, CVE-2025-22260, CVE-2025-22261, CVE-2025-22262, CVE-2025-22263, CVE-2025-22264, CVE-2025-22265, CVE-2025-22267, CVE-2025-22268, CVE-2025-22269, CVE-2025-22276, CVE-2025-22277, CVE-2025-22278, CVE-2025-22279, CVE-2025-22280, CVE-2025-22281, CVE-2025-22282, CVE-2025-22283, CVE-2025-22284, CVE-2025-22286, CVE-2025-22289, CVE-2025-22290, CVE-2025-22291, CVE-2025-22292, CVE-2025-22293, CVE-2025-22294, CVE-2025-22296, CVE-2025-22297, CVE-2025-22298, CVE-2025-22299, CVE-2025-22300, CVE-2025-22301, CVE-2025-22302, CVE-2025-22303, CVE-2025-22304, CVE-2025-22305, CVE-2025-22306, CVE-2025-22307, CVE-2025-22308, CVE-2025-22309, CVE-2025-22310, CVE-2025-22311, CVE-2025-22312, CVE-2025-22313, CVE-2025-22314, CVE-2025-22315, CVE-2025-22316, CVE-2025-22317, CVE-2025-22318, CVE-2025-22319, CVE-2025-22320, CVE-2025-22321, CVE-2025-22322, CVE-2025-22323, CVE-2025-22324, CVE-2025-22325, CVE-2025-22326, CVE-2025-22327, CVE-2025-22328, CVE-2025-22329, CVE-2025-22330, CVE-2025-22331, CVE-2025-22332, CVE-2025-22333, CVE-2025-22334, CVE-2025-22335, CVE-2025-22336, CVE-2025-22337, CVE-2025-22338, CVE-2025-22339, CVE-2025-22340, CVE-2025-22341, CVE-2025-22342, CVE-2025-22343, CVE-2025-22344, CVE-2025-22345, CVE-2025-22346, CVE-2025-22347, CVE-2025-22348, CVE-2025-22349, CVE-2025-22350, CVE-2025-22351, CVE-2025-22352, CVE-2025-22354, CVE-2025-22355, CVE-2025-22356, CVE-2025-22357, CVE-2025-22358, CVE-2025-22359, CVE-2025-22360, CVE-2025-22361, CVE-2025-22362, CVE-2025-22363, CVE-2025-22364, CVE-2025-22365, CVE-2025-22496, CVE-2025-22497, CVE-2025-22498, CVE-2025-22499, CVE-2025-22500, CVE-2025-22501, CVE-2025-22502, CVE-2025-22503, CVE-2025-22504, CVE-2025-22505, CVE-2025-22506, CVE-2025-22507, CVE-2025-22508, CVE-2025-22509, CVE-2025-22510, CVE-2025-22511, CVE-2025-22512, CVE-2025-22513, CVE-2025-22514, CVE-2025-22515, CVE-2025-22516, CVE-2025-22517, CVE-2025-22518, CVE-2025-22519, CVE-2025-22520, CVE-2025-22521, CVE-2025-22522, CVE-2025-22523, CVE-2025-22524, CVE-2025-22525, CVE-2025-22526, CVE-2025-22528, CVE-2025-22529, CVE-2025-22530, CVE-2025-22532, CVE-2025-22533, CVE-2025-22534, CVE-2025-22535, CVE-2025-22536, CVE-2025-22537, CVE-2025-22538, CVE-2025-22539, CVE-2025-22540, CVE-2025-22541, CVE-2025-22542, CVE-2025-22543, CVE-2025-22544, CVE-2025-22545, CVE-2025-22546, CVE-2025-22547, CVE-2025-22548, CVE-2025-22549, CVE-2025-22550, CVE-2025-22551, CVE-2025-22552, CVE-2025-22553, CVE-2025-22554, CVE-2025-22555, CVE-2025-22556, CVE-2025-22557, CVE-2025-22558, CVE-2025-22559, CVE-2025-22560, CVE-2025-22561, CVE-2025-22562, CVE-2025-22563, CVE-2025-22564, CVE-2025-22565, CVE-2025-22566, CVE-2025-22567, CVE-2025-22568, CVE-2025-22569, CVE-2025-22570, CVE-2025-22571, CVE-2025-22572, CVE-2025-22573, CVE-2025-22574, CVE-2025-22575, CVE-2025-22576, CVE-2025-22577, CVE-2025-22578, CVE-2025-22579, CVE-2025-22580, CVE-2025-22581, CVE-2025-22582, CVE-2025-22583, CVE-2025-22584, CVE-2025-22585, CVE-2025-22586, CVE-2025-22587, CVE-2025-22588, CVE-2025-22589, CVE-2025-22590, CVE-2025-22591, CVE-2025-22592, CVE-2025-22593, CVE-2025-22594, CVE-2025-22595, CVE-2025-22628, CVE-2025-22629, CVE-2025-22630, CVE-2025-22631, CVE-2025-22632, CVE-2025-22634, CVE-2025-22635, CVE-2025-22636, CVE-2025-22637, CVE-2025-22638, CVE-2025-22639, CVE-2025-22640, CVE-2025-22641, CVE-2025-22642, CVE-2025-22643, CVE-2025-22644, CVE-2025-22646, CVE-2025-22647, CVE-2025-22648, CVE-2025-22649, CVE-2025-22651, CVE-2025-22652, CVE-2025-22653, CVE-2025-22654, CVE-2025-22655, CVE-2025-22656, CVE-2025-22657, CVE-2025-22658, CVE-2025-22659, CVE-2025-22660, CVE-2025-22661, CVE-2025-22662, CVE-2025-22663, CVE-2025-22664, CVE-2025-22665, CVE-2025-22667, CVE-2025-22668, CVE-2025-22669, CVE-2025-22670, CVE-2025-22671, CVE-2025-22672, CVE-2025-22673, CVE-2025-22674, CVE-2025-22675, CVE-2025-22676, CVE-2025-22677, CVE-2025-22678, CVE-2025-22679, CVE-2025-22680, CVE-2025-22681, CVE-2025-22682, CVE-2025-22683, CVE-2025-22684, CVE-2025-22685, CVE-2025-22686, CVE-2025-22687, CVE-2025-22688, CVE-2025-22689, CVE-2025-22690, CVE-2025-22691, CVE-2025-22692, CVE-2025-22693, CVE-2025-22694, CVE-2025-22695, CVE-2025-22696, CVE-2025-22697, CVE-2025-22699, CVE-2025-22700, CVE-2025-22701, CVE-2025-22702, CVE-2025-22703, CVE-2025-22704, CVE-2025-22705, CVE-2025-22706, CVE-2025-22707, CVE-2025-22708, CVE-2025-22709, CVE-2025-22710, CVE-2025-22712, CVE-2025-22713, CVE-2025-22714, CVE-2025-22715, CVE-2025-22716, CVE-2025-22717, CVE-2025-22718, CVE-2025-22719, CVE-2025-22720, CVE-2025-22721, CVE-2025-22722, CVE-2025-22723, CVE-2025-22725, CVE-2025-22726, CVE-2025-22727, CVE-2025-22728, CVE-2025-22729, CVE-2025-22730, CVE-2025-22731, CVE-2025-22732, CVE-2025-22733, CVE-2025-22734, CVE-2025-22735, CVE-2025-22736, CVE-2025-22737, CVE-2025-22738, CVE-2025-22739, CVE-2025-22740, CVE-2025-22742, CVE-2025-22743, CVE-2025-22744, CVE-2025-22745, CVE-2025-22746, CVE-2025-22747, CVE-2025-22748, CVE-2025-22749, CVE-2025-22750, CVE-2025-22751, CVE-2025-22752, CVE-2025-22753, CVE-2025-22755, CVE-2025-22757, CVE-2025-22758, CVE-2025-22759, CVE-2025-22760, CVE-2025-22761, CVE-2025-22762, CVE-2025-22763, CVE-2025-22764, CVE-2025-22765, CVE-2025-22766, CVE-2025-22767, CVE-2025-22768, CVE-2025-22770, CVE-2025-22771, CVE-2025-22772, CVE-2025-22774, CVE-2025-22775, CVE-2025-22776, CVE-2025-22777, CVE-2025-22778, CVE-2025-22779, CVE-2025-22780, CVE-2025-22781, CVE-2025-22782, CVE-2025-22783, CVE-2025-22784, CVE-2025-22785, CVE-2025-22786, CVE-2025-22787, CVE-2025-22788, CVE-2025-22789, CVE-2025-22790, CVE-2025-22791, CVE-2025-22792, CVE-2025-22794, CVE-2025-22795, CVE-2025-22796, CVE-2025-22797, CVE-2025-22798, CVE-2025-22799, CVE-2025-22800, CVE-2025-22801, CVE-2025-22802, CVE-2025-22803, CVE-2025-22804, CVE-2025-22805, CVE-2025-22806, CVE-2025-22807, CVE-2025-22808, CVE-2025-22809, CVE-2025-22810, CVE-2025-22811, CVE-2025-22812, CVE-2025-22813, CVE-2025-22814, CVE-2025-22815, CVE-2025-22816, CVE-2025-22817, CVE-2025-22818, CVE-2025-22819, CVE-2025-22820, CVE-2025-22821, CVE-2025-22822, CVE-2025-22823, CVE-2025-22824, CVE-2025-22825, CVE-2025-22826, CVE-2025-22827, CVE-2025-23422, CVE-2025-23423, CVE-2025-23424, CVE-2025-23425, CVE-2025-23426, CVE-2025-23427, CVE-2025-23428, CVE-2025-23430, CVE-2025-23431, CVE-2025-23433, CVE-2025-23435, CVE-2025-23436, CVE-2025-23437, CVE-2025-23438, CVE-2025-23439, CVE-2025-23440, CVE-2025-23441, CVE-2025-23442, CVE-2025-23443, CVE-2025-23445, CVE-2025-23446, CVE-2025-23447, CVE-2025-23448, CVE-2025-23449, CVE-2025-23450, CVE-2025-23451, CVE-2025-23452, CVE-2025-23453, CVE-2025-23454, CVE-2025-23455, CVE-2025-23456, CVE-2025-23457, CVE-2025-23458, CVE-2025-23459, CVE-2025-23460, CVE-2025-23461, CVE-2025-23462, CVE-2025-23463, CVE-2025-23464, CVE-2025-23465, CVE-2025-23466, CVE-2025-23467, CVE-2025-23468, CVE-2025-23469, CVE-2025-23470, CVE-2025-23471, CVE-2025-23472, CVE-2025-23473, CVE-2025-23474, CVE-2025-23475, CVE-2025-23476, CVE-2025-23477, CVE-2025-23478, CVE-2025-23479, CVE-2025-23480, CVE-2025-23481, CVE-2025-23482, CVE-2025-23483, CVE-2025-23484, CVE-2025-23485, CVE-2025-23486, CVE-2025-23487, CVE-2025-23488, CVE-2025-23489, CVE-2025-23490, CVE-2025-23491, CVE-2025-23492, CVE-2025-23493, CVE-2025-23494, CVE-2025-23495, CVE-2025-23496, CVE-2025-23497, CVE-2025-23498, CVE-2025-23499, CVE-2025-23500, CVE-2025-23501, CVE-2025-23502, CVE-2025-23503, CVE-2025-23505, CVE-2025-23506, CVE-2025-23507, CVE-2025-23508, CVE-2025-23509, CVE-2025-23510, CVE-2025-23511, CVE-2025-23512, CVE-2025-23513, CVE-2025-23514, CVE-2025-23515, CVE-2025-23516, CVE-2025-23517, CVE-2025-23518, CVE-2025-23519, CVE-2025-23520, CVE-2025-23521, CVE-2025-23522, CVE-2025-23523, CVE-2025-23524, CVE-2025-23525, CVE-2025-23526, CVE-2025-23527, CVE-2025-23529, CVE-2025-23530, CVE-2025-23531, CVE-2025-23532, CVE-2025-23533, CVE-2025-23534, CVE-2025-23535, CVE-2025-23536, CVE-2025-23537, CVE-2025-23538, CVE-2025-23539, CVE-2025-23540, CVE-2025-23541, CVE-2025-23542, CVE-2025-23543, CVE-2025-23544, CVE-2025-23545, CVE-2025-23546, CVE-2025-23547, CVE-2025-23548, CVE-2025-23549, CVE-2025-23550, CVE-2025-23551, CVE-2025-23552, CVE-2025-23553, CVE-2025-23554, CVE-2025-23555, CVE-2025-23556, CVE-2025-23557, CVE-2025-23558, CVE-2025-23559, CVE-2025-23560, CVE-2025-23561, CVE-2025-23562, CVE-2025-23563, CVE-2025-23564, CVE-2025-23565, CVE-2025-23566, CVE-2025-23567, CVE-2025-23568, CVE-2025-23569, CVE-2025-23570, CVE-2025-23571, CVE-2025-23572, CVE-2025-23573, CVE-2025-23574, CVE-2025-23575, CVE-2025-23576, CVE-2025-23577, CVE-2025-23578, CVE-2025-23579, CVE-2025-23580, CVE-2025-23581, CVE-2025-23582, CVE-2025-23583, CVE-2025-23584, CVE-2025-23585, CVE-2025-23586, CVE-2025-23587, CVE-2025-23588, CVE-2025-23589, CVE-2025-23590, CVE-2025-23591, CVE-2025-23592, CVE-2025-23593, CVE-2025-23594, CVE-2025-23595, CVE-2025-23596, CVE-2025-23597, CVE-2025-23598, CVE-2025-23599, CVE-2025-23600, CVE-2025-23601, CVE-2025-23602, CVE-2025-23603, CVE-2025-23604, CVE-2025-23605, CVE-2025-23606, CVE-2025-23607, CVE-2025-23608, CVE-2025-23609, CVE-2025-23610, CVE-2025-23611, CVE-2025-23612, CVE-2025-23613, CVE-2025-23614, CVE-2025-23615, CVE-2025-23616, CVE-2025-23617, CVE-2025-23618, CVE-2025-23619, CVE-2025-23620, CVE-2025-23621, CVE-2025-23622, CVE-2025-23623, CVE-2025-23624, CVE-2025-23625, CVE-2025-23626, CVE-2025-23627, CVE-2025-23628, CVE-2025-23629, CVE-2025-23630, CVE-2025-23631, CVE-2025-23632, CVE-2025-23633, CVE-2025-23634, CVE-2025-23635, CVE-2025-23636, CVE-2025-23637, CVE-2025-23638, CVE-2025-23639, CVE-2025-23640, CVE-2025-23641, CVE-2025-23642, CVE-2025-23643, CVE-2025-23644, CVE-2025-23645, CVE-2025-23646, CVE-2025-23647, CVE-2025-23648, CVE-2025-23649, CVE-2025-23650, CVE-2025-23651, CVE-2025-23652, CVE-2025-23653, CVE-2025-23654, CVE-2025-23655, CVE-2025-23656, CVE-2025-23657, CVE-2025-23658, CVE-2025-23659, CVE-2025-23660, CVE-2025-23661, CVE-2025-23662, CVE-2025-23663, CVE-2025-23664, CVE-2025-23665, CVE-2025-23666, CVE-2025-23667, CVE-2025-23668, CVE-2025-23669, CVE-2025-23670, CVE-2025-23671, CVE-2025-23672, CVE-2025-23673, CVE-2025-23674, CVE-2025-23675, CVE-2025-23676, CVE-2025-23677, CVE-2025-23678, CVE-2025-23679, CVE-2025-23680, CVE-2025-23681, CVE-2025-23682, CVE-2025-23683, CVE-2025-23684, CVE-2025-23685, CVE-2025-23686, CVE-2025-23687, CVE-2025-23688, CVE-2025-23689, CVE-2025-23690, CVE-2025-23691, CVE-2025-23692, CVE-2025-23693, CVE-2025-23694, CVE-2025-23695, CVE-2025-23696, CVE-2025-23697, CVE-2025-23698, CVE-2025-23699, CVE-2025-23700, CVE-2025-23701, CVE-2025-23702, CVE-2025-23703, CVE-2025-23704, CVE-2025-23705, CVE-2025-23706, CVE-2025-23707, CVE-2025-23708, CVE-2025-23709, CVE-2025-23710, CVE-2025-23711, CVE-2025-23712, CVE-2025-23713, CVE-2025-23714, CVE-2025-23715, CVE-2025-23716, CVE-2025-23717, CVE-2025-23718, CVE-2025-23719, CVE-2025-23720, CVE-2025-23721, CVE-2025-23722, CVE-2025-23723, CVE-2025-23724, CVE-2025-23725, CVE-2025-23726, CVE-2025-23727, CVE-2025-23728, CVE-2025-23729, CVE-2025-23730, CVE-2025-23731, CVE-2025-23732, CVE-2025-23733, CVE-2025-23734, CVE-2025-23735, CVE-2025-23736, CVE-2025-23737, CVE-2025-23738, CVE-2025-23739, CVE-2025-23740, CVE-2025-23741, CVE-2025-23742, CVE-2025-23743, CVE-2025-23744, CVE-2025-23745, CVE-2025-23746, CVE-2025-23747, CVE-2025-23748, CVE-2025-23749, CVE-2025-23750, CVE-2025-23751, CVE-2025-23752, CVE-2025-23753, CVE-2025-23754, CVE-2025-23755, CVE-2025-23756, CVE-2025-23757, CVE-2025-23758, CVE-2025-23759, CVE-2025-23760, CVE-2025-23761, CVE-2025-23762, CVE-2025-23763, CVE-2025-23764, CVE-2025-23765, CVE-2025-23766, CVE-2025-23767, CVE-2025-23768, CVE-2025-23769, CVE-2025-23770, CVE-2025-23771, CVE-2025-23772, CVE-2025-23773, CVE-2025-23774, CVE-2025-23775, CVE-2025-23776, CVE-2025-23777, CVE-2025-23778, CVE-2025-23779, CVE-2025-23780, CVE-2025-23781, CVE-2025-23782, CVE-2025-23783, CVE-2025-23785, CVE-2025-23786, CVE-2025-23787, CVE-2025-23788, CVE-2025-23789, CVE-2025-23790, CVE-2025-23791, CVE-2025-23792, CVE-2025-23793, CVE-2025-23794, CVE-2025-23795, CVE-2025-23796, CVE-2025-23797, CVE-2025-23798, CVE-2025-23799, CVE-2025-23800, CVE-2025-23801, CVE-2025-23802, CVE-2025-23803, CVE-2025-23804, CVE-2025-23805, CVE-2025-23807, CVE-2025-23808, CVE-2025-23809, CVE-2025-23810, CVE-2025-23811, CVE-2025-23812, CVE-2025-23813, CVE-2025-23814, CVE-2025-23815, CVE-2025-23816, CVE-2025-23817, CVE-2025-23818, CVE-2025-23819, CVE-2025-23820, CVE-2025-23821, CVE-2025-23822, CVE-2025-23823, CVE-2025-23824, CVE-2025-23825, CVE-2025-23826, CVE-2025-23827, CVE-2025-23828, CVE-2025-23829, CVE-2025-23830, CVE-2025-23831, CVE-2025-23832, CVE-2025-23833, CVE-2025-23834, CVE-2025-23835, CVE-2025-23836, CVE-2025-23837, CVE-2025-23838, CVE-2025-23839, CVE-2025-23840, CVE-2025-23841, CVE-2025-23842, CVE-2025-23843, CVE-2025-23844, CVE-2025-23845, CVE-2025-23846, CVE-2025-23847, CVE-2025-23848, CVE-2025-23849, CVE-2025-23850, CVE-2025-23851, CVE-2025-23852, CVE-2025-23853, CVE-2025-23854, CVE-2025-23855, CVE-2025-23856, CVE-2025-23857, CVE-2025-23858, CVE-2025-23859, CVE-2025-23860, CVE-2025-23861, CVE-2025-23862, CVE-2025-23863, CVE-2025-23864, CVE-2025-23865, CVE-2025-23866, CVE-2025-23867, CVE-2025-23868, CVE-2025-23869, CVE-2025-23870, CVE-2025-23871, CVE-2025-23872, CVE-2025-23873, CVE-2025-23874, CVE-2025-23875, CVE-2025-23876, CVE-2025-23877, CVE-2025-23878, CVE-2025-23879, CVE-2025-23880, CVE-2025-23881, CVE-2025-23882, CVE-2025-23883, CVE-2025-23884, CVE-2025-23885, CVE-2025-23886, CVE-2025-23887, CVE-2025-23888, CVE-2025-23889, CVE-2025-23890, CVE-2025-23891, CVE-2025-23892, CVE-2025-23893, CVE-2025-23894, CVE-2025-23895, CVE-2025-23896, CVE-2025-23897, CVE-2025-23898, CVE-2025-23899, CVE-2025-23900, CVE-2025-23901, CVE-2025-23902, CVE-2025-23903, CVE-2025-23904, CVE-2025-23905, CVE-2025-23906, CVE-2025-23907, CVE-2025-23908, CVE-2025-23909, CVE-2025-23910, CVE-2025-23911, CVE-2025-23912, CVE-2025-23913, CVE-2025-23914, CVE-2025-23915, CVE-2025-23916, CVE-2025-23917, CVE-2025-23918, CVE-2025-23919, CVE-2025-23920, CVE-2025-23921, CVE-2025-23922, CVE-2025-23923, CVE-2025-23924, CVE-2025-23925, CVE-2025-23926, CVE-2025-23927, CVE-2025-23928, CVE-2025-23929, CVE-2025-23930, CVE-2025-23931, CVE-2025-23932, CVE-2025-23933, CVE-2025-23934, CVE-2025-23935, CVE-2025-23936, CVE-2025-23937, CVE-2025-23938, CVE-2025-23939, CVE-2025-23940, CVE-2025-23941, CVE-2025-23942, CVE-2025-23943, CVE-2025-23944, CVE-2025-23945, CVE-2025-23946, CVE-2025-23947, CVE-2025-23948, CVE-2025-23949, CVE-2025-23950, CVE-2025-23951, CVE-2025-23952, CVE-2025-23953, CVE-2025-23954, CVE-2025-23955, CVE-2025-23956, CVE-2025-23957, CVE-2025-23958, CVE-2025-23959, CVE-2025-23960, CVE-2025-23961, CVE-2025-23962, CVE-2025-23963, CVE-2025-23964, CVE-2025-23965, CVE-2025-23966, CVE-2025-23967, CVE-2025-23968, CVE-2025-23969, CVE-2025-23970, CVE-2025-23971, CVE-2025-23972, CVE-2025-23973, CVE-2025-23974, CVE-2025-23975, CVE-2025-23976, CVE-2025-23977, CVE-2025-23978, CVE-2025-23979, CVE-2025-23980, CVE-2025-23981, CVE-2025-23982, CVE-2025-23983, CVE-2025-23984, CVE-2025-23985, CVE-2025-23986, CVE-2025-23987, CVE-2025-23988, CVE-2025-23989, CVE-2025-23990, CVE-2025-23991, CVE-2025-23992, CVE-2025-23993, CVE-2025-23994, CVE-2025-23995, CVE-2025-23996, CVE-2025-23997, CVE-2025-23998, CVE-2025-23999, CVE-2025-24000, CVE-2025-24001, CVE-2025-24533, CVE-2025-24534, CVE-2025-24535, CVE-2025-24536, CVE-2025-24537, CVE-2025-24538, CVE-2025-24539, CVE-2025-24540, CVE-2025-24541, CVE-2025-24542, CVE-2025-24543, CVE-2025-24544, CVE-2025-24545, CVE-2025-24546, CVE-2025-24547, CVE-2025-24548, CVE-2025-24549, CVE-2025-24550, CVE-2025-24551, CVE-2025-24552, CVE-2025-24553, CVE-2025-24554, CVE-2025-24555, CVE-2025-24557, CVE-2025-24558, CVE-2025-24559, CVE-2025-24560, CVE-2025-24561, CVE-2025-24562, CVE-2025-24563, CVE-2025-24564, CVE-2025-24565, CVE-2025-24566, CVE-2025-24567, CVE-2025-24568, CVE-2025-24569, CVE-2025-24570, CVE-2025-24571, CVE-2025-24572, CVE-2025-24573, CVE-2025-24574, CVE-2025-24575, CVE-2025-24576, CVE-2025-24577, CVE-2025-24578, CVE-2025-24579, CVE-2025-24580, CVE-2025-24581, CVE-2025-24582, CVE-2025-24583, CVE-2025-24584, CVE-2025-24585, CVE-2025-24586, CVE-2025-24587, CVE-2025-24588, CVE-2025-24589, CVE-2025-24590, CVE-2025-24591, CVE-2025-24592, CVE-2025-24593, CVE-2025-24594, CVE-2025-24595, CVE-2025-24596, CVE-2025-24597, CVE-2025-24598, CVE-2025-24599, CVE-2025-24600, CVE-2025-24601, CVE-2025-24602, CVE-2025-24603, CVE-2025-24604, CVE-2025-24605, CVE-2025-24608, CVE-2025-24609, CVE-2025-24610, CVE-2025-24611, CVE-2025-24612, CVE-2025-24613, CVE-2025-24614, CVE-2025-24615, CVE-2025-24616, CVE-2025-24617, CVE-2025-24618, CVE-2025-24619, CVE-2025-24620, CVE-2025-24621, CVE-2025-24622, CVE-2025-24623, CVE-2025-24624, CVE-2025-24625, CVE-2025-24626, CVE-2025-24627, CVE-2025-24629, CVE-2025-24630, CVE-2025-24631, CVE-2025-24632, CVE-2025-24633, CVE-2025-24634, CVE-2025-24635, CVE-2025-24636, CVE-2025-24637, CVE-2025-24638, CVE-2025-24639, CVE-2025-24640, CVE-2025-24641, CVE-2025-24642, CVE-2025-24644, CVE-2025-24645, CVE-2025-24646, CVE-2025-24647, CVE-2025-24648, CVE-2025-24649, CVE-2025-24650, CVE-2025-24652, CVE-2025-24653, CVE-2025-24654, CVE-2025-24655, CVE-2025-24656, CVE-2025-24657, CVE-2025-24658, CVE-2025-24659, CVE-2025-24660, CVE-2025-24661, CVE-2025-24662, CVE-2025-24663, CVE-2025-24664, CVE-2025-24665, CVE-2025-24666, CVE-2025-24667, CVE-2025-24668, CVE-2025-24669, CVE-2025-24670, CVE-2025-24671, CVE-2025-24672, CVE-2025-24673, CVE-2025-24674, CVE-2025-24675, CVE-2025-24676, CVE-2025-24677, CVE-2025-24678, CVE-2025-24679, CVE-2025-24680, CVE-2025-24681, CVE-2025-24682, CVE-2025-24683, CVE-2025-24684, CVE-2025-24685, CVE-2025-24686, CVE-2025-24687, CVE-2025-24688, CVE-2025-24689, CVE-2025-24690, CVE-2025-24691, CVE-2025-24692, CVE-2025-24693, CVE-2025-24694, CVE-2025-24695, CVE-2025-24696, CVE-2025-24697, CVE-2025-24698, CVE-2025-24699, CVE-2025-24700, CVE-2025-24701, CVE-2025-24702, CVE-2025-24703, CVE-2025-24704, CVE-2025-24705, CVE-2025-24706, CVE-2025-24707, CVE-2025-24708, CVE-2025-24709, CVE-2025-24710, CVE-2025-24711, CVE-2025-24712, CVE-2025-24713, CVE-2025-24714, CVE-2025-24715, CVE-2025-24716, CVE-2025-24717, CVE-2025-24718, CVE-2025-24719, CVE-2025-24720, CVE-2025-24721, CVE-2025-24722, CVE-2025-24723, CVE-2025-24724, CVE-2025-24725, CVE-2025-24726, CVE-2025-24727, CVE-2025-24728, CVE-2025-24729, CVE-2025-24730, CVE-2025-24731, CVE-2025-24732, CVE-2025-24733, CVE-2025-24734, CVE-2025-24736, CVE-2025-24737, CVE-2025-24738, CVE-2025-24739, CVE-2025-24740, CVE-2025-24741, CVE-2025-24742, CVE-2025-24743, CVE-2025-24744, CVE-2025-24745, CVE-2025-24746, CVE-2025-24747, CVE-2025-24748, CVE-2025-24749, CVE-2025-24750, CVE-2025-24751, CVE-2025-24752, CVE-2025-24753, CVE-2025-24754, CVE-2025-24755, CVE-2025-24756, CVE-2025-24757, CVE-2025-24758, CVE-2025-24759, CVE-2025-24760, CVE-2025-24761, CVE-2025-24762, CVE-2025-24763, CVE-2025-24764, CVE-2025-24765, CVE-2025-24766, CVE-2025-24767, CVE-2025-24768, CVE-2025-24769, CVE-2025-24770, CVE-2025-24771, CVE-2025-24772, CVE-2025-24773, CVE-2025-24774, CVE-2025-24775, CVE-2025-24776, CVE-2025-24777, CVE-2025-24778, CVE-2025-24779, CVE-2025-24780, CVE-2025-24781, CVE-2025-24782, CVE-2025-25070, CVE-2025-25071, CVE-2025-25072, CVE-2025-25073, CVE-2025-25074, CVE-2025-25075, CVE-2025-25076, CVE-2025-25077, CVE-2025-25078, CVE-2025-25079, CVE-2025-25080, CVE-2025-25081, CVE-2025-25082, CVE-2025-25083, CVE-2025-25085, CVE-2025-25086, CVE-2025-25087, CVE-2025-25088, CVE-2025-25089, CVE-2025-25090, CVE-2025-25091, CVE-2025-25092, CVE-2025-25093, CVE-2025-25094, CVE-2025-25095, CVE-2025-25096, CVE-2025-25097, CVE-2025-25098, CVE-2025-25099, CVE-2025-25100, CVE-2025-25101, CVE-2025-25102, CVE-2025-25103, CVE-2025-25104, CVE-2025-25105, CVE-2025-25106, CVE-2025-25107, CVE-2025-25108, CVE-2025-25109, CVE-2025-25110, CVE-2025-25111, CVE-2025-25112, CVE-2025-25113, CVE-2025-25114, CVE-2025-25115, CVE-2025-25116, CVE-2025-25117, CVE-2025-25118, CVE-2025-25119, CVE-2025-25120, CVE-2025-25121, CVE-2025-25122, CVE-2025-25123, CVE-2025-25124, CVE-2025-25125, CVE-2025-25126, CVE-2025-25127, CVE-2025-25128, CVE-2025-25129, CVE-2025-25130, CVE-2025-25131, CVE-2025-25132, CVE-2025-25133, CVE-2025-25134, CVE-2025-25135, CVE-2025-25136, CVE-2025-25137, CVE-2025-25138, CVE-2025-25139, CVE-2025-25140, CVE-2025-25141, CVE-2025-25142, CVE-2025-25143, CVE-2025-25144, CVE-2025-25145, CVE-2025-25146, CVE-2025-25147, CVE-2025-25148, CVE-2025-25149, CVE-2025-25150, CVE-2025-25151, CVE-2025-25152, CVE-2025-25153, CVE-2025-25154, CVE-2025-25155, CVE-2025-25156, CVE-2025-25157, CVE-2025-25158, CVE-2025-25159, CVE-2025-25160, CVE-2025-25161, CVE-2025-25162, CVE-2025-25163, CVE-2025-25164, CVE-2025-25165, CVE-2025-25166, CVE-2025-25167, CVE-2025-25168, CVE-2025-25169, CVE-2025-25170, CVE-2025-25171, CVE-2025-25172, CVE-2025-25173, CVE-2025-25174, CVE-2025-26534, CVE-2025-26535, CVE-2025-26536, CVE-2025-26537, CVE-2025-26538, CVE-2025-26539, CVE-2025-26540, CVE-2025-26541, CVE-2025-26542, CVE-2025-26543, CVE-2025-26544, CVE-2025-26545, CVE-2025-26546, CVE-2025-26547, CVE-2025-26548, CVE-2025-26549, CVE-2025-26550, CVE-2025-26551, CVE-2025-26552, CVE-2025-26553, CVE-2025-26554, CVE-2025-26555, CVE-2025-26556, CVE-2025-26557, CVE-2025-26558, CVE-2025-26559, CVE-2025-26560, CVE-2025-26561, CVE-2025-26562, CVE-2025-26563, CVE-2025-26564, CVE-2025-26565, CVE-2025-26566, CVE-2025-26567, CVE-2025-26568, CVE-2025-26569, CVE-2025-26570, CVE-2025-26571, CVE-2025-26572, CVE-2025-26573, CVE-2025-26574, CVE-2025-26575, CVE-2025-26576, CVE-2025-26577, CVE-2025-26578, CVE-2025-26579, CVE-2025-26580, CVE-2025-26581, CVE-2025-26582, CVE-2025-26583, CVE-2025-26584, CVE-2025-26585, CVE-2025-26586, CVE-2025-26587, CVE-2025-26588, CVE-2025-26589, CVE-2025-26590, CVE-2025-26591, CVE-2025-26592, CVE-2025-26593, CVE-2025-26730, CVE-2025-26731, CVE-2025-26732, CVE-2025-26733, CVE-2025-26734, CVE-2025-26735, CVE-2025-26736, CVE-2025-26737, CVE-2025-26738, CVE-2025-26739, CVE-2025-26740, CVE-2025-26741, CVE-2025-26742, CVE-2025-26743, CVE-2025-26744, CVE-2025-26745, CVE-2025-26746, CVE-2025-26747, CVE-2025-26748, CVE-2025-26749, CVE-2025-26750, CVE-2025-26751, CVE-2025-26752, CVE-2025-26753, CVE-2025-26754, CVE-2025-26755, CVE-2025-26756, CVE-2025-26757, CVE-2025-26758, CVE-2025-26759, CVE-2025-26761, CVE-2025-26762, CVE-2025-26763, CVE-2025-26764, CVE-2025-26765, CVE-2025-26766, CVE-2025-26767, CVE-2025-26768, CVE-2025-26769, CVE-2025-26770, CVE-2025-26771, CVE-2025-26772, CVE-2025-26773, CVE-2025-26774, CVE-2025-26775, CVE-2025-26776, CVE-2025-26778, CVE-2025-26779, CVE-2025-26867, CVE-2025-26868, CVE-2025-26870, CVE-2025-26871, CVE-2025-26872, CVE-2025-26873, CVE-2025-26874, CVE-2025-26875, CVE-2025-26876, CVE-2025-26877, CVE-2025-26878, CVE-2025-26880, CVE-2025-26881, CVE-2025-26882, CVE-2025-26883, CVE-2025-26884, CVE-2025-26886, CVE-2025-26887, CVE-2025-26888, CVE-2025-26889, CVE-2025-26890, CVE-2025-26891, CVE-2025-26892, CVE-2025-26893, CVE-2025-26894, CVE-2025-26895, CVE-2025-26896, CVE-2025-26897, CVE-2025-26898, CVE-2025-26899, CVE-2025-26900, CVE-2025-26901, CVE-2025-26902, CVE-2025-26903, CVE-2025-26904, CVE-2025-26905, CVE-2025-26906, CVE-2025-26907, CVE-2025-26908, CVE-2025-26909, CVE-2025-26910, CVE-2025-26911, CVE-2025-26912, CVE-2025-26913, CVE-2025-26914, CVE-2025-26915, CVE-2025-26916, CVE-2025-26918, CVE-2025-26919, CVE-2025-26920, CVE-2025-26921, CVE-2025-26922, CVE-2025-26923, CVE-2025-26924, CVE-2025-26925, CVE-2025-26926, CVE-2025-26927, CVE-2025-26928, CVE-2025-26929, CVE-2025-26930, CVE-2025-26931, CVE-2025-26932, CVE-2025-26933, CVE-2025-26934, CVE-2025-26935, CVE-2025-26936, CVE-2025-26937, CVE-2025-26938, CVE-2025-26939, CVE-2025-26940, CVE-2025-26941, CVE-2025-26943, CVE-2025-26944, CVE-2025-26945, CVE-2025-26946, CVE-2025-26947, CVE-2025-26948, CVE-2025-26949, CVE-2025-26950, CVE-2025-26951, CVE-2025-26952, CVE-2025-26954, CVE-2025-26955, CVE-2025-26956, CVE-2025-26957, CVE-2025-26959, CVE-2025-26960, CVE-2025-26961, CVE-2025-26962, CVE-2025-26963, CVE-2025-26964, CVE-2025-26966, CVE-2025-26967, CVE-2025-26968, CVE-2025-26969, CVE-2025-26970, CVE-2025-26971, CVE-2025-26972, CVE-2025-26973, CVE-2025-26974, CVE-2025-26975, CVE-2025-26976, CVE-2025-26977, CVE-2025-26978, CVE-2025-26979, CVE-2025-26980, CVE-2025-26981, CVE-2025-26982, CVE-2025-26983, CVE-2025-26984, CVE-2025-26985, CVE-2025-26986, CVE-2025-26987, CVE-2025-26988, CVE-2025-26989, CVE-2025-26990, CVE-2025-26991, CVE-2025-26992, CVE-2025-26993, CVE-2025-26994, CVE-2025-26995, CVE-2025-26996, CVE-2025-26997, CVE-2025-26998, CVE-2025-26999, CVE-2025-27000, CVE-2025-27001, CVE-2025-27002, CVE-2025-27003, CVE-2025-27004, CVE-2025-27005, CVE-2025-27006, CVE-2025-27007, CVE-2025-27008, CVE-2025-27009, CVE-2025-27010, CVE-2025-27011, CVE-2025-27012, CVE-2025-27013, CVE-2025-27014, CVE-2025-27015, CVE-2025-27016, CVE-2025-27263, CVE-2025-27264, CVE-2025-27265, CVE-2025-27266, CVE-2025-27267, CVE-2025-27268, CVE-2025-27269, CVE-2025-27270, CVE-2025-27271, CVE-2025-27272, CVE-2025-27273, CVE-2025-27274, CVE-2025-27275, CVE-2025-27276, CVE-2025-27277, CVE-2025-27278, CVE-2025-27279, CVE-2025-27280, CVE-2025-27281, CVE-2025-27282, CVE-2025-27283, CVE-2025-27284, CVE-2025-27285, CVE-2025-27286, CVE-2025-27287, CVE-2025-27288, CVE-2025-27289, CVE-2025-27290, CVE-2025-27291, CVE-2025-27292, CVE-2025-27293, CVE-2025-27294, CVE-2025-27295, CVE-2025-27296, CVE-2025-27297, CVE-2025-27298, CVE-2025-27299, CVE-2025-27300, CVE-2025-27301, CVE-2025-27302, CVE-2025-27303, CVE-2025-27304, CVE-2025-27305, CVE-2025-27306, CVE-2025-27307, CVE-2025-27308, CVE-2025-27309, CVE-2025-27310, CVE-2025-27311, CVE-2025-27312, CVE-2025-27313, CVE-2025-27314, CVE-2025-27315, CVE-2025-27316, CVE-2025-27317, CVE-2025-27318, CVE-2025-27319, CVE-2025-27320, CVE-2025-27321, CVE-2025-27322, CVE-2025-27323, CVE-2025-27324, CVE-2025-27325, CVE-2025-27326, CVE-2025-27327, CVE-2025-27328, CVE-2025-27329, CVE-2025-27330, CVE-2025-27331, CVE-2025-27332, CVE-2025-27333, CVE-2025-27334, CVE-2025-27335, CVE-2025-27336, CVE-2025-27337, CVE-2025-27338, CVE-2025-27339, CVE-2025-27340, CVE-2025-27341, CVE-2025-27342, CVE-2025-27343, CVE-2025-27344, CVE-2025-27345, CVE-2025-27347, CVE-2025-27348, CVE-2025-27349, CVE-2025-27350, CVE-2025-27351, CVE-2025-27352, CVE-2025-27353, CVE-2025-27354, CVE-2025-27355, CVE-2025-27356, CVE-2025-27357, CVE-2025-27358, CVE-2025-27359, CVE-2025-27360, CVE-2025-27361, CVE-2025-27362, CVE-2025-28855, CVE-2025-28856, CVE-2025-28857, CVE-2025-28859, CVE-2025-28860, CVE-2025-28861, CVE-2025-28862, CVE-2025-28863, CVE-2025-28864, CVE-2025-28865, CVE-2025-28866, CVE-2025-28867, CVE-2025-28868, CVE-2025-28869, CVE-2025-28870, CVE-2025-28871, CVE-2025-28872, CVE-2025-28873, CVE-2025-28874, CVE-2025-28875, CVE-2025-28876, CVE-2025-28877, CVE-2025-28878, CVE-2025-28879, CVE-2025-28880, CVE-2025-28881, CVE-2025-28882, CVE-2025-28883, CVE-2025-28884, CVE-2025-28885, CVE-2025-28886, CVE-2025-28887, CVE-2025-28888, CVE-2025-28889, CVE-2025-28890, CVE-2025-28891, CVE-2025-28892, CVE-2025-28893, CVE-2025-28894, CVE-2025-28895, CVE-2025-28896, CVE-2025-28897, CVE-2025-28898, CVE-2025-28899, CVE-2025-28900, CVE-2025-28901, CVE-2025-28902, CVE-2025-28903, CVE-2025-28904, CVE-2025-28905, CVE-2025-28906, CVE-2025-28907, CVE-2025-28908, CVE-2025-28909, CVE-2025-28910, CVE-2025-28911, CVE-2025-28912, CVE-2025-28913, CVE-2025-28914, CVE-2025-28915, CVE-2025-28916, CVE-2025-28917, CVE-2025-28918, CVE-2025-28919, CVE-2025-28920, CVE-2025-28921, CVE-2025-28922, CVE-2025-28923, CVE-2025-28924, CVE-2025-28925, CVE-2025-28926, CVE-2025-28927, CVE-2025-28928, CVE-2025-28929, CVE-2025-28930, CVE-2025-28931, CVE-2025-28932,...
Date: Thu, 23 Apr 2026 14:56:21 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:16 +0000 (11:32 -0400)]
linux-yocto/6.18: update to v6.18.24
Updating linux-yocto/6.18 to the latest korg -stable release that comprises
the following commits:
c0d886e4af57 Linux 6.18.24
ff628171d5f4 dma-mapping: handle DMA_ATTR_CPU_CACHE_CLEAN in trace output
c2d109c982e9 dma-debug: Allow multiple invocations of overlapping entries
574501ede47a mm/userfaultfd: fix hugetlb fault mutex hash calculation
07e9e674b614 media: hackrf: fix to not free memory after the device is registered in hackrf_probe()
6d75a9ec5bdb media: vidtv: fix pass-by-value structs causing MSAN warnings
c36e206f302f nilfs2: fix NULL i_assoc_inode dereference in nilfs_mdt_save_to_shadow_map
09e9206008b8 media: as102: fix to not free memory after the device is registered in as102_usb_probe()
9a9e69155b20 wireguard: device: use exit_rtnl callback instead of manual rtnl_lock in pre_exit
2d6965581e16 bcache: fix cached_dev.sb_bio use-after-free and crash
d21e8a2af486 ALSA: 6fire: fix use-after-free on disconnect
9e1b798257f9 hwmon: (powerz) Fix use-after-free on USB disconnect
871b8ea8ef39 media: em28xx: fix use-after-free in em28xx_v4l2_open()
f99353cd0e9f media: mediatek: vcodec: fix use-after-free in encoder release path
25f19e476ab1 media: vidtv: fix nfeeds state corruption on start_streaming failure
ea3af09eb87d mm: blk-cgroup: fix use-after-free in cgwb_release_workfn()
f6204f7ff6af mm/kasan: fix double free for kasan pXds
30383b7780ff ASoC: qcom: q6apm: move component registration to unmanaged version
22d2ff69d487 KVM: x86: Use scratch field in MMIO fragment to hold small write values
576d365f31d9 x86-64/arm64/powerpc: clean up and rename __copy_from_user_flushcache
03fd014cd9f3 x86: rename and clean up __copy_from_user_inatomic_nocache()
c6d4e0599e7e x86-64: rename misleadingly named '__copy_user_nocache()' function
8e7666acfabb checkpatch: add support for Assisted-by tag
0c1af902223b ocfs2: fix out-of-bounds write in ocfs2_write_end_inline
cd2d765aa715 ocfs2: validate inline data i_size during inode read
df030a9374a5 ocfs2: add inline inode consistency check to ocfs2_validate_inode_block()
0ed88ac9bc64 KVM: x86: Use __DECLARE_FLEX_ARRAY() for UAPI structures with VLAs
df61c2c99c7f KVM: Remove subtle "struct kvm_stats_desc" pseudo-overlay
9309daac5034 selftests/bpf: Test refinement of single-value tnum
28cc13ca2043 KVM: SEV: Drop WARN on large size for KVM_MEMORY_ENCRYPT_REG_REGION
30fd9d8c8208 KVM: SEV: Lock all vCPUs when synchronzing VMSAs for SNP launch finish
2c59132c4786 KVM: SEV: Disallow LAUNCH_FINISH if vCPUs are actively being created
35a0963d361f KVM: SEV: Protect *all* of sev_mem_enc_register_region() with kvm->lock
692fdf05e55f KVM: SEV: Reject attempts to sync VMSA of an already-launched/encrypted vCPU
5d57a1ee587c KVM: selftests: Remove duplicate LAUNCH_UPDATE_VMSA call in SEV-ES migrate test
cec9ead73ab1 PCI: endpoint: pci-epf-vntb: Remove duplicate resource teardown
9921cce25bfe PCI: endpoint: pci-epf-vntb: Stop cmd_handler work in epf_ntb_epc_cleanup
e384a850a337 ocfs2: handle invalid dinode in ocfs2_group_extend
d45ff441b416 ocfs2: fix use-after-free in ocfs2_fault() when VM_FAULT_RETRY
bc0fb5c7d54c ocfs2: fix possible deadlock between unlink and dio_end_io_write
2dff11fb5098 media: vidtv: fix NULL pointer dereference in vidtv_channel_pmt_match_sections
8140b21d1901 arm64: mm: Handle invalid large leaf mappings correctly
755b40903eff dcache: Limit the minimal number of bucket to two
3fd0685d7fef ALSA: ctxfi: Limit PTP to a single page
de5c3e67037f Docs/admin-guide/mm/damon/reclaim: warn commit_inputs vs param updates race
4c971d577a9f USB: serial: option: add Telit Cinterion FN990A MBIM composition
1412ba36597a staging: sm750fb: fix division by zero in ps_to_hz()
89a9c1bc7d79 wifi: rtw88: fix device leak on probe failure
9c401606e2d0 scripts: generate_rust_analyzer.py: avoid FD leak
6de048d78f30 fbdev: udlfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO
5d02df1b130b usb: port: add delay after usb_hub_set_port_power()
eb6ef6185f20 usb: gadget: f_hid: don't call cdev_init while cdev in use
5d29d7ff8679 USB: cdc-acm: Add quirks for Yoga Book 9 14IAH10 INGENIC touchscreen
63dc7cdb1f4e usb: storage: Expand range of matched versions for VL817 quirks entry
9aef3f979190 usb: typec: fusb302: Switch to threaded IRQ handler
906f16a836de usbip: validate number_of_packets in usbip_pack_ret_submit()
6968c91fab05 smb: server: avoid double-free in smb_direct_free_sendmsg after smb_direct_flush_send_list()
a9940dcbe5cb smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush()
dd53414e301b ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc
d2454f4a002d ksmbd: require 3 sub-authorities before reading sub_auth[2]
3363a770b193 ksmbd: validate EaNameLength in smb2_get_ea()
e0dd90d14cbb smb: client: fix OOB reads parsing symlink error response
b2b76d09a64c smb: client: fix off-by-8 bounds check in check_wsl_eas()
44216e3dd445 usb: gadget: renesas_usb3: validate endpoint index in standard request handlers
4e476c25bfca usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete()
6762f8a95772 usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb()
fc386daa6846 fbdev: tdfxfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO
67cfd14074cd ALSA: fireworks: bound device-supplied status before string array lookup
09b145c1f133 ALSA: usx2y: us144mkii: fix NULL deref on missing interface 0
0185e0494a56 drm/vc4: platform_get_irq_byname() returns an int
5a59bf70c38e NFC: digital: Bounds check NFC-A cascade depth in SDD response handler
c183d5775129 net: usb: cdc-phonet: fix skb frags[] overflow in rx_complete()
8a8333237f1f HID: core: clamp report_size in s32ton() to avoid undefined shift
0091dfa542a3 HID: alps: fix NULL pointer dereference in alps_raw_event()
b487a7754d87 staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify()
377fae22a137 i2c: s3c24xx: check the size of the SMBUS message before using it
1a0f2de81f7f can: raw: fix ro->uniq use-after-free in raw_rcv()
8977fad2b3c6 nfc: llcp: add missing return after LLCP_CLOSED checks
67c53c1978ce netfilter: conntrack: add missing netlink policy validations
78cea133daf7 crypto: algif_aead - Fix minimum RX size check for decryption
dea5fcf085f9 crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl
66dfc9179b78 sched/deadline: Use revised wakeup rule for dl_server
f34feda8e0c9 perf/x86/intel/uncore: Skip discovery table for offline dies
07c6f6ffe290 crypto: af_alg - limit RX SG extraction by receive buffer budget
7af379af9d34 gpio: tegra: fix irq_release_resources calling enable instead of disable
86534c97abd6 l2tp: Drop large packets with UDP encap
2d2dc166d551 net: ipa: fix event ring index not programmed for IPA v5.0+
bafc45ea30d2 net: ipa: fix GENERIC_CMD register field masks for IPA v5.0+
a31b3ee4dba0 devlink: Fix incorrect skb socket family dumping
900a4e0910e9 af_unix: read UNIX_DIAG_VFS data under unix_state_lock
8eff73e58e1f net: txgbe: leave space for null terminators on property_entry
6d1d9ed9b409 net: ioam6: fix OOB and missing lock
607b86397622 net: mdio: realtek-rtl9300: use scoped device_for_each_child_node loop
8c3984a0872c ASoC: amd: acp: update DMI quirk and add ACP DMIC for Lenovo platforms
c877bc8058a9 ASoC: SDCA: Fix overwritten var within for loop
41e3652a178c netfilter: nfnetlink_queue: make hash table per queue
06e054ace8b8 netfilter: nfnetlink_queue: nfqnl_instance GFP_ATOMIC -> GFP_KERNEL_ACCOUNT allocation
807d6ee15804 netfilter: ip6t_eui64: reject invalid MAC header for all packets
8368ce8eb01f netfilter: xt_multiport: validate range encoding in checkentry
d552bcfca323 netfilter: nfnetlink_log: initialize nfgenmsg in NLMSG_DONE terminator
a32dabacee11 ipvs: fix NULL deref in ip_vs_add_service error path
585fe11fedb8 selftests: net: bridge_vlan_mcast: wait for h1 before querier check
8083b7da229b drm/xe: Fix bug in idledly unit conversion
a4532ec7b885 ASoC: Intel: avs: Fix memory leak in avs_register_i2s_test_boards()
f779a6b6cdb6 xfrm_user: fix info leak in build_mapping()
836ee1b0426e xfrm: fix refcount leak in xfrm_migrate_policy_find
3733fce2871c xfrm: Wait for RCU readers during policy netns exit
25e1e91a8da8 xsk: validate MTU against usable frame size on bind
4947e2ae9c57 xsk: fix XDP_UMEM_SG_FLAG issues
29a68f4baaf9 xsk: respect tailroom for ZC setups
9ea6ba4f3195 xsk: tighten UMEM headroom validation to account for tailroom and min frame
70b85c177344 e1000: check return value of e1000_read_eeprom
4db7b61ec1d1 ixgbevf: add missing negotiate_features op to Hyper-V ops table
4da3465a7f00 ixgbe: stop re-reading flash on every get_drvinfo for e610
e19675b384e9 ice: ptp: don't WARN when controlling PF is unavailable
7dad8bf14346 tracing/probe: reject non-closed empty immediate strings
9550d1d9f716 dt-bindings: net: Fix Tegra234 MGBE PTP clock
b6b9c17ef8ae net: stmmac: Fix PTP ref clock for Tegra234
6d931680a985 nfc: s3fwrn5: allocate rx skb before consuming bytes
4d90f9a271a6 net: increase IP_TUNNEL_RECURSION_LIMIT to 5
f91b3ed9e7fa ipv4: icmp: fix null-ptr-deref in icmp_build_probe()
40bd39e383a0 ipv4: nexthop: allocate skb dynamically in rtm_get_nexthop()
69aa3c713980 ipv4: nexthop: avoid duplicate NHA_HW_STATS_ENABLE on nexthop group dump
0975b64ffb34 rtnetlink: add missing netlink_ns_capable() check for peer netns
fb612d436ff0 bridge: guard local VLAN-0 FDB helpers against NULL vlan group
4198aab6f000 ipv6: ioam: fix potential NULL dereferences in __ioam6_fill_trace_data()
4429b761874f net: airoha: Fix memory leak in airoha_qdma_rx_process()
63851f60781a net: lapbether: handle NETDEV_PRE_TYPE_CHANGE
ec4930979b3f net: sched: act_csum: validate nested VLAN headers
7e8083f5eeed eventpoll: defer struct eventpoll free to RCU grace period
0cf8ea9d677b drm/vc4: Protect madv read in vc4_gem_object_mmap() with madv_lock
e352e9adc9f6 drm/vc4: Fix a memory leak in hang state error path
421cea4f71f7 drm/vc4: Fix memory leak of BO array in hang state
ce12a1af6779 drm/vc4: Release runtime PM reference after binding V3D
9a945edeabb5 dma-debug: suppress cacheline overlap warning when arch has no DMA alignment requirement
ad187e0506ab dma-debug: track cache clean flag in entries
4e8a1b970168 dma-mapping: add DMA_ATTR_CPU_CACHE_CLEAN
e62e322ea20b xfrm: account XFRMA_IF_ID in aevent size calculation
73e3e4dac102 HID: amd_sfh: don't log error when device discovery fails with -EOPNOTSUPP
0d364d863c70 PCI: hv: Set default NUMA node to 0 for devices without affinity info
e4093997420f ARM: dts: microchip: sam9x7: fix gpio-lines count for pioB
edde62571f76 arm64: dts: qcom: monaco: Reserve full Gunyah metadata region
d0deac48e57a tools/power turbostat: Fix --show/--hide for individual cpuidle counters
fbc581977db2 tools/power/turbostat: Fix microcode patch level output for AMD/Hygon
7d75145672cf soc: qcom: pd-mapper: Fix element length in servreg_loc_pfr_req_ei
52632daf6425 arm64: dts: qcom: monaco: Fix UART10 pinconf
95894966bce9 arm64: dts: imx93-tqma9352: improve eMMC pad configuration
b3b725b902b3 arm64: dts: imx91-tqma9131: improve eMMC pad configuration
737a4ee014e1 arm64: dts: imx93-9x9-qsb: change usdhc tuning step for eMMC and SD
d0fcd4858918 arm64: dts: imx8mq: Set the correct gpu_ahb clock frequency
ecbc5e9277da arm64: dts: qcom: qcm6490-idp: Fix WCD9370 reset GPIO polarity
878ccc18d94c arm64: dts: qcom: hamoa/x1: fix idle exit latency
c448aad9a779 soc: aspeed: socinfo: Mask table entries for accurate SoC ID matching
d2c7153fe0ca ASoC: stm32_sai: fix incorrect BCLK polarity for DSP_A/B, LEFT_J
c64cebcc5c4f x86: shadow stacks: proper error handling for mmap lock
0a59c12ce50a net: sfp: add quirks for Hisense and HSGQ GPON ONT SFP modules
1ae1e1caa428 wifi: brcmfmac: validate bsscfg indices in IF events
f5a5d0e8704e ata: ahci: force 32-bit DMA for JMicron JMB582/JMB585
36bb2d0b9150 HID: roccat: fix use-after-free in roccat_report_event
0fa5713ac7a1 ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14IAH10
42032a75da03 HID: quirks: add HID_QUIRK_ALWAYS_POLL for 8BitDo Pro 3
c2854af5774b HID: Intel-thc-hid: Intel-quickspi: Add NVL Device IDs
0f2e312626c7 platform/x86/amd: pmc: Add Thinkpad L14 Gen3 to quirk_s2idle_bug
91f915d57416 pinctrl: intel: Fix the revision for new features (1kOhm PD, HW debouncer)
b98ecc1c60ad ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14IMH9
1d788e6a4150 ASoC: amd: yc: Add DMI entry for HP Laptop 15-fc0xxx
86f9c23e0814 fs/smb/client: fix out-of-bounds read in cifs_sanitize_prepath
647fb0dc3818 drm/amdkfd: Fix queue preemption/eviction failures by aligning control stack size to GPU page size
fceb2a469121 ALSA: hda/realtek: Add quirk for Lenovo Yoga Slim 7 14AKP10
66b315279b88 ALSA: usb-audio: Fix quirk flags for NeuralDSP Quad Cortex
f664b56d8fc3 ALSA: hda/realtek: Add quirk for Samsung Book2 Pro 360 (NP950QED)
a9d32e6c8a55 ASoC: soc-core: call missing INIT_LIST_HEAD() for card_aux_list
8d7465be5163 wifi: wl1251: validate packet IDs before indexing tx_frames
21a1acf6b16a ALSA: hda/realtek: add quirk for Framework F111:000F
07de44424bb7 netfilter: nft_set_pipapo_avx2: don't return non-matching entry on expiry
7556bd5cd8ef ALSA: hda/realtek: add HP Laptop 15-fd0xxx mute LED quirk
6a9f2683c66d drm/amdgpu: Handle GPU page faults correctly on non-4K page systems
f338ced04738 netfilter: ctnetlink: ensure safe access to master conntrack
8db3663d3c3e ALSA: hda/realtek: Add mute LED quirk for HP Pavilion 15-eg0xxx
2e4adfaec97e btrfs: tracepoints: get correct superblock from dentry in event btrfs_sync_file()
d4ff92dd98ad platform/x86: hp-wmi: Add support for Omen 16-wf1xxx (8C76)
fddb157536e6 btrfs: fix zero size inode with non-zero size after log replay
c66a0e9a19c0 platform/x86: asus-nb-wmi: add DMI quirk for ASUS ROG Flow Z13-KJP GZ302EAC
c2be593c7ec2 ALSA:usb:qcom: add AUXILIARY_BUS to Kconfig dependencies
5486d20a0818 ASoC: amd: acp: add ASUS HN7306EA quirk for legacy SDW machine
c306ac170bc3 can: mcp251x: add error handling for power enable in open and resume
550243229155 ASoC: SOF: topology: reject invalid vendor array size in token parser
36d706d03346 ASoC: amd: yc: Add DMI quirk for Thin A15 B7VF
a7a1cdb4a64c Bluetooth: hci_sync: annotate data-races around hdev->req_status
02ce2a77acc8 ALSA: asihpi: avoid write overflow check warning
222f4fd0fe06 media: rkvdec: reduce stack usage in rkvdec_init_v4l2_vp9_count_tbl()
fc40821d94b9 ALSA: hda/realtek: Add quirk for ASUS ROG Flow Z13-KJP GZ302EAC
e656ef8698e2 ALSA: hda/realtek: add quirk for Lenovo Yoga 7 2-in-1 16AKP10
b395549928e5 ALSA: hda/realtek: Add HP ENVY Laptop 13-ba0xxx quirk
4b59719db211 ASoC: amd: yc: Add DMI quirk for ASUS EXPERTBOOK BM1403CDA
0f22c32141ac RDMA/irdma: Fix double free related to rereg_user_mr
0aa0c509aa69 dmaengine: idxd: Fix lockdep warnings when calling idxd_device_config()
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:15 +0000 (11:32 -0400)]
linux-yocto/6.18: update CVE exclusions (6.18.23)
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 205 changes (128 new | 77 updated): - 128 new CVEs: CVE-2000-5001, CVE-2005-20001, CVE-2008-20002, CVE-2008-20003, CVE-2009-20012, CVE-2010-20110, CVE-2010-20116, CVE-2010-20117, CVE-2010-20118, CVE-2010-20124, CVE-2011-10031, CVE-2013-10041, CVE-2013-10045, CVE-2013-10056, CVE-2014-125120, CVE-2026-31192, CVE-2026-31434, CVE-2026-31435, CVE-2026-31436, CVE-2026-31437, CVE-2026-31438, CVE-2026-31439, CVE-2026-31440, CVE-2026-31441, CVE-2026-31442, CVE-2026-31443, CVE-2026-31444, CVE-2026-31445, CVE-2026-31446, CVE-2026-31447, CVE-2026-31448, CVE-2026-31449, CVE-2026-31450, CVE-2026-31451, CVE-2026-31452, CVE-2026-31453, CVE-2026-31454, CVE-2026-31455, CVE-2026-31456, CVE-2026-31457, CVE-2026-31458, CVE-2026-31459, CVE-2026-31460, CVE-2026-31461, CVE-2026-31462, CVE-2026-31463, CVE-2026-31464, CVE-2026-31465, CVE-2026-31466, CVE-2026-31467, CVE-2026-31468, CVE-2026-31469, CVE-2026-31470, CVE-2026-31471, CVE-2026-31472, CVE-2026-31473, CVE-2026-31474, CVE-2026-31475, CVE-2026-31476, CVE-2026-31477, CVE-2026-31478, CVE-2026-31479, CVE-2026-31480, CVE-2026-31481, CVE-2026-31482, CVE-2026-31483, CVE-2026-31484, CVE-2026-31485, CVE-2026-31486, CVE-2026-31487, CVE-2026-31488, CVE-2026-31489, CVE-2026-31490, CVE-2026-31491, CVE-2026-31492, CVE-2026-31493, CVE-2026-31494, CVE-2026-31495, CVE-2026-31496, CVE-2026-31497, CVE-2026-31498, CVE-2026-31499, CVE-2026-31500, CVE-2026-31501, CVE-2026-31502, CVE-2026-31503, CVE-2026-31504, CVE-2026-31505, CVE-2026-31506, CVE-2026-31507, CVE-2026-31508, CVE-2026-31509, CVE-2026-31510, CVE-2026-31511, CVE-2026-31512, CVE-2026-31513, CVE-2026-31514, CVE-2026-31515, CVE-2026-31516, CVE-2026-31517, CVE-2026-31518, CVE-2026-31519, CVE-2026-31520, CVE-2026-31521, CVE-2026-31522, CVE-2026-31523, CVE-2026-31524, CVE-2026-31525, CVE-2026-31526, CVE-2026-31527, CVE-2026-31528, CVE-2026-31529, CVE-2026-31530, CVE-2026-33254, CVE-2026-33593, CVE-2026-33594, CVE-2026-33595, CVE-2026-33596, CVE-2026-33597, CVE-2026-33598, CVE-2026-33599, CVE-2026-33602, CVE-2026-33608, CVE-2026-33609, CVE-2026-33610, CVE-2026-33611, CVE-2026-6861, CVE-2026-6862 - 77 updated CVEs: CVE-2026-0539, CVE-2026-1930, CVE-2026-20133, CVE-2026-21997, CVE-2026-21998, CVE-2026-21999, CVE-2026-22001, CVE-2026-22002, CVE-2026-22003, CVE-2026-22004, CVE-2026-22005, CVE-2026-22007, CVE-2026-22008, CVE-2026-22009, CVE-2026-22010, CVE-2026-22013, CVE-2026-22014, CVE-2026-22015, CVE-2026-22016, CVE-2026-22017, CVE-2026-22018, CVE-2026-22019, CVE-2026-22021, CVE-2026-22746, CVE-2026-25917, CVE-2026-33145, CVE-2026-34267, CVE-2026-34268, CVE-2026-34269, CVE-2026-34270, CVE-2026-34271, CVE-2026-34272, CVE-2026-34273, CVE-2026-34274, CVE-2026-34288, CVE-2026-34289, CVE-2026-34290, CVE-2026-34291, CVE-2026-34292, CVE-2026-34293, CVE-2026-34294, CVE-2026-34295, CVE-2026-34296, CVE-2026-34297, CVE-2026-34298, CVE-2026-34299, CVE-2026-34312, CVE-2026-34319, CVE-2026-35587, CVE-2026-39808, CVE-2026-3362, CVE-2026-40342, CVE-2026-40614, CVE-2026-40868, CVE-2026-40872, CVE-2026-40878, CVE-2026-40884, CVE-2026-40887, CVE-2026-40895, CVE-2026-40903, CVE-2026-40906, CVE-2026-40923, CVE-2026-40926, CVE-2026-40931, CVE-2026-40943, CVE-2026-41055, CVE-2026-41060, CVE-2026-41320, CVE-2026-4089, CVE-2026-4111, CVE-2026-5501, CVE-2026-5749, CVE-2026-5750, CVE-2026-6236, CVE-2026-6823, CVE-2026-6830, CVE-2026-6857
Date: Wed, 22 Apr 2026 14:13:54 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:14 +0000 (11:32 -0400)]
linux-yocto/6.18: update to v6.18.23
Updating linux-yocto/6.18 to the latest korg -stable release that comprises
the following commits:
47a33eea6d51 Linux 6.18.23
ad17f07e95e6 x86/CPU: Fix FPDSS on Zen1
2d64618ea846 net: skb: fix cross-cache free of KFENCE-allocated skb head
db297c78ce53 rxrpc: proc: size address buffers for %pISpc output
d0035e634dae rxrpc: only handle RESPONSE during service challenge
794586789800 rxrpc: Fix buffer overread in rxgk_do_verify_authenticator()
4b5e8365515f rxrpc: Fix leak of rxgk context in rxgk_verify_response()
1f864d9daaf6 rxrpc: Fix integer overflow in rxgk_verify_response()
bf4d6e4a6856 rxrpc: Fix missing error checks for rxkad encryption/decryption failure
03d1c51decae rxrpc: Fix key/keyring checks in setsockopt(RXRPC_SECURITY_KEY/KEYRING)
8ee931c3cd97 rxrpc: fix reference count leak in rxrpc_server_keyring()
beee051f259a rxrpc: fix oversized RESPONSE authenticator length check
7875f3d9777b rxrpc: fix RESPONSE authenticator parser OOB read
22f6258e7b31 rxrpc: reject undecryptable rxkad response tickets
8299ca146489 rxrpc: Only put the call ref if one was acquired
8b353f5f1385 rxrpc: Fix to request an ack if window is limited
2e6ef713b159 rxrpc: Fix key reference count leak from call->key
86303a1da93f rxrpc: Fix rack timer warning to report unexpected mode
9132b1a7bf83 rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial
3e04596cba8a rxrpc: Fix RxGK token loading to check bounds
3be718f65968 rxrpc: Fix call removal to use RCU safe deletion
3bb18ed3b2f6 rxrpc: Fix anonymous key handling
d5f76f812d2c rxrpc: Fix key parsing memleak
862cb78fb2c9 rxrpc: Fix key quota calculation for multitoken keys
92a673019943 net: lan966x: fix use-after-free and leak in lan966x_fdma_reload()
22e1ee9f22b5 net: lan966x: fix page pool leak in error paths
b5dcb41ba891 net: lan966x: fix page_pool error handling in lan966x_fdma_rx_alloc_page_pool()
214ceaa8a3a2 idpf: set the payload size before calling the async handler
d6e9bef3313a idpf: improve locking around idpf_vc_xn_push_free()
e02c974fc331 idpf: fix PREEMPT_RT raw/bh spinlock nesting for async VC handling
576543bedd61 mm: filemap: fix nr_pages calculation overflow in filemap_map_pages()
6fca757c2039 net: stmmac: fix integer underflow in chain mode
9fdece45f6e0 net: qualcomm: qca_uart: report the consumed byte on RX skb allocation failure
ea7468f61be0 mmc: vub300: fix use-after-free on disconnect
c83a282615d8 mmc: vub300: fix NULL-deref on disconnect
447f8870b484 mm/damon/stat: deallocate damon_call() failure leaking damon_ctx
b9dadf026a9f mm/damon/sysfs: dealloc repeat_call_control if damon_call() fails
49c00ae87230 mm/memory_hotplug: maintain N_NORMAL_MEMORY during hotplug
470047177574 igb: remove napi_synchronize() in igb_down()
e44919669f07 pmdomain: imx8mp-blk-ctrl: Keep the NOC_HDCP clock enabled
82e8174d1d0e net/mlx5: Update the list of the PCI supported devices
de9aa7e89b98 drm/i915/psr: Do not use pipe_src as borders for SU area
2af8b200cae3 drm/i915/gt: fix refcount underflow in intel_engine_park_heartbeat
4dee4c068844 batman-adv: hold claim backbone gateways by reference
60f462cd2716 net: altera-tse: fix skb leak on DMA mapping error in tse_start_xmit()
5d70eb25b41e net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption
87ce8ae51196 EDAC/mc: Fix error path ordering in edac_mc_alloc()
206121294b9c X.509: Fix out-of-bounds access when parsing extensions
de6c1dc3c7d0 batman-adv: reject oversized global TT response buffers
21ae2cda66a5 nfc: pn533: allocate rx skb before consuming bytes
083c5a417dee arm64: dts: hisilicon: hi3798cv200: Add missing dma-ranges
f0a0a6a8c1cc arm64: dts: hisilicon: poplar: Correct PCIe reset GPIO polarity
c82a3c9d9fb3 arm64: dts: renesas: sparrow-hawk: Reserve first 128 MiB of DRAM
a4115c2abab3 arm64: dts: imx8mq-librem5: Bump BUCK1 suspend voltage up to 0.85V
3b31b15230b0 Revert "arm64: dts: imx8mq-librem5: Set the DVS voltages lower"
aee881c21b57 Revert "arm64: dts: rockchip: Further describe the WiFi for the Pinebook Pro"
fecceacbaf48 platform/x86/intel-uncore-freq: Handle autonomous UFS status bit
c4e1eff4606c platform/x86: ISST: Reset core count to 0
b27fa888e4a4 wifi: brcmsmac: Fix dma_free_coherent() size
1b6f13f62666 tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG
0f451b43c88b xfrm: hold dev ref until after transport_finish NF_HOOK
b1dfd6b27df3 xfrm: clear trailing padding in build_polexpire()
688c1b491c35 modpost: Declare extra_warn with unused attribute
0133aa1a28af workqueue: Add pool_workqueue to pending_pwqs list when unplugging multiple inactive works
fbdb43f6bb2a firmware: thead: Fix buffer overflow and use standard endian macros
b42aca3660dc netfilter: nft_ct: fix use-after-free in timeout object destroy
2802ba3981f1 i2c: imx: zero-initialize dma_slave_config for eDMA
72cf49ad50c1 af_unix: Give up GC if MSG_PEEK intervened.
33120558237c af_unix: Simplify GC state.
1e211179f1d9 af_unix: Count cyclic SCC.
450e6a685d0c btrfs: fix incorrect return value after changing leaf in lookup_extent_data_ref()
2124a61e6e2b btrfs: remove pointless out labels from extent-tree.c
d8b281165a86 MIPS: mm: Rewrite TLB uniquification for the hidden bit feature
ccc6a2241a49 MIPS: mm: Suppress TLB uniquification on EHINV hardware
6c600fc0e991 MIPS: Always record SEGBITS in cpu_data.vmbits
6c098142b370 Input: uinput - take event lock when submitting FF request "event"
1e09dfbb4f5d Input: uinput - fix circular locking dependency with ff-core
fb56de5d9921 seg6: separate dst_cache for input and output paths in seg6 lwtunnel
15fa9ead4d5e mptcp: fix slab-use-after-free in __inet_lookup_established
96a95b6d9e6d Revert "mptcp: add needs_id for netlink appending addr"
130c991e6aad Revert "ALSA: hda/realtek: Add quirk for Gigabyte Technology to fix headphone"
a8c26800e022 net: rfkill: prevent unlimited numbers of rfkill events from being created
6c55714c9310 xfrm_user: fix info leak in build_report()
e360d15fcb1e wifi: rt2x00usb: fix devres lifetime
f4786c34216a usb: typec: ucsi: skip connector validation before init
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:13 +0000 (11:32 -0400)]
linux-yocto/6.18: update CVE exclusions (6.18.22)
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 4 changes (4 new | 0 updated): - 4 new CVEs: CVE-2026-33714, CVE-2026-33715, CVE-2026-34160, CVE-2026-34161 - 0 updated CVEs:
Date: Tue, 14 Apr 2026 21:14:51 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:12 +0000 (11:32 -0400)]
linux-yocto/6.18: update to v6.18.22
Updating linux-yocto/6.18 to the latest korg -stable release that comprises
the following commits:
f2b09e8b594ce Linux 6.18.22
5e7b2cc8fae9e sched_ext: Fix stale direct dispatch state in ddsp_dsq_id
d5776a31c1657 sched_ext: Refactor do_enqueue_task() local and global DSQ paths
9e36ceb5ca431 mm/memory: fix PMD/PUD checks in follow_pfnmap_start()
cef18bb87a6c2 mm: replace READ_ONCE() with standard page table accessors
a836054ea8101 scsi: target: tcm_loop: Drain commands in target_reset handler
ce54802fe6bb7 scsi: target: file: Use kzalloc_flex for aio_cmd
a98b78116a27e net: correctly handle tunneled traffic on IPV6_CSUM GSO fallback
5f4061f8225d1 net: mana: fix use-after-free in add_adev() error path
24ce568f7553a drm/amd/display: Fix DCE LVDS handling
ba9be472a438e drm/amd/pm: disable OD_FAN_CURVE if temp or pwm range invalid for smu v13
5bbadf60b1210 wifi: virt_wifi: remove SET_NETDEV_DEV to avoid use-after-free
e367143b520ae kallsyms: prevent module removal when printing module name and buildid
10bbeed03e1db kallsyms: cleanup code for appending the module buildid
c1d72e846cb4e kallsyms: clean up modname and modbuildid initialization in kallsyms_lookup_buildid()
ab5f05ae96fcd kallsyms: clean up @namebuf initialization in kallsyms_lookup_buildid()
8e5eb1d6e6a3d usb: gadget: f_uac1_legacy: validate control request size
5d1bb391ceeeb usb: gadget: f_hid: move list and spinlock inits from bind to alloc
18ada801899f2 usb: gadget: f_rndis: Fix net_device lifecycle with device_move
9cbc4f109bb21 usb: gadget: f_subset: Fix net_device lifecycle with device_move
4ccdccff8febc usb: gadget: f_eem: Fix net_device lifecycle with device_move
4e34f3f491fd7 usb: gadget: f_ecm: Fix net_device lifecycle with device_move
446f1842cda92 usb: gadget: f_rndis: Protect RNDIS options with mutex
3d436670b4741 usb: gadget: f_subset: Fix unbalanced refcnt in geth_free
1aa9356881ee4 usb: gadget: uvc: fix NULL pointer dereference during unbind race
a36e5e800b9c9 usb: gadget: u_ether: Fix NULL pointer deref in eth_get_drvinfo
6ad77458637b7 usb: gadget: u_ether: Fix race between gether_disconnect and eth_stop
63dc317dfcd3f ice: Fix memory leak in ice_set_ringparam()
7d581e2534693 HID: appletb-kbd: add .resume method in PM
f4e608fe12b7a usb: typec: ucsi: validate connector number in ucsi_notify_common()
cc300853b9eba usb: gadget: dummy_hcd: fix premature URB completion when ZLP follows partial transfer
5687a09776069 USB: dummy-hcd: Fix interrupt synchronization error
efbd9441f1e76 USB: dummy-hcd: Fix locking/synchronization error
cd9c6fcd1cf13 thunderbolt: Fix property read in nhi_wake_supported()
15f0c2d9eebc1 usb: typec: thunderbolt: Set enter_vdo during initialization
acea446ba4f42 misc: fastrpc: check qcom_scm_assign_mem() return in rpmsg_probe
3a164f640953c misc: fastrpc: possible double-free of cctx->remote_heap
c4c7219e93319 thermal: core: Fix thermal zone device registration error path
2dbe93f344f10 thermal: core: Address thermal zone removal races with resume
f0cf9c7b7c281 gpio: Fix resource leaks on errors in gpiochip_add_data_with_key()
70b6e2e015030 gpio: mxc: map Both Edge pad wakeup to Rising Edge
72c43eb2e334f sched_ext: Fix is_bpf_migration_disabled() false negative on non-PREEMPT_RCU
d2703b4f8fb7c cpufreq: governor: fix double free in cpufreq_dbs_governor_init() error path
65a5847e1a6c9 virtio_net: clamp rss_max_key_size to NETDEV_RSS_KEY_LEN
5dff799c67715 net: ethernet: mtk_ppe: avoid NULL deref when gmac0 is disabled
8351d18989c86 net: ftgmac100: fix ring allocation unwind on open failure
eddfce70a6f31 vxlan: validate ND option lengths in vxlan_na_create
3aea268b6d5cd crypto: tegra - Add missing CRYPTO_ALG_ASYNC
6562290225c19 counter: rz-mtu3-cnt: do not use struct rz_mtu3_channel's dev member
e07237df8538b counter: rz-mtu3-cnt: prevent counter from being toggled multiple times
bbb6c37c7a483 vt: resize saved unicode buffer on alt screen exit after resize
891d790fdb5c9 vt: discard stale unicode buffer on alt screen exit after resize
554d005d51611 gpib: Fix fluke driver s390 compile issue
68ca0eea0af02 netfilter: ipset: drop logically empty buckets in mtype_del
784ed4abded1c nvmem: zynqmp_nvmem: Fix buffer size in DMA and memcpy
0c94b84b6ef51 nvmem: imx: assign nvmem_cell_info::raw_len
5a8f2e95f9a19 s390/cpum_sf: Cap sampling rate to prevent lsctl exception
586222c37d402 s390/zcrypt: Fix memory leak with CCA cards used as accelerator
a11f022db7d85 spi: cadence-qspi: Fix exec_mem_op error handling
f5526abe978fd dt-bindings: connector: add pd-disable dependency
d266498da90d3 firmware: microchip: fail auto-update probe if no flash found
eae19cab44204 comedi: me4000: Fix potential overrun of firmware buffer
a47ae40339c10 comedi: me_daq: Fix potential overrun of firmware buffer
43c68a2c7cc35 comedi: ni_atmio16d: Fix invalid clean-up after failed attach
b89c026227712 comedi: Reinit dev->spinlock between attachments to low-level drivers
34c8b3a91bdfb comedi: dt2815: add hardware detection to prevent crash
e92f5ee730653 cdc-acm: new quirk for EPSON HMD
837392a384457 bridge: br_nd_send: validate ND option lengths
5da684c24e8b4 ASoC: qcom: sc7280: make use of common helpers
f43f77499ec8d io_uring: protect remaining lockless ctx->rings accesses with RCU
09f78265a93d4 usb: core: use dedicated spinlock for offload state
5a85599ca4d25 usb: cdns3: gadget: fix state inconsistency on gadget init failure
390536cc6af4c usb: cdns3: gadget: fix NULL pointer dereference in ep_queue
701903fcac4a4 usb: core: phy: avoid double use of 'usb3-phy'
61937f6862904 usb: dwc2: gadget: Fix spin_lock/unlock mismatch in dwc2_hsotg_udc_stop()
6288b46e5ac68 usb: ehci-brcm: fix sleep during atomic
34af2da733f4e usb: host: xhci-sideband: delegate offload_usage tracking to class drivers
65ff09f48b0e7 usb: misc: usbio: Fix URB memory leak on submit failure
977b632db51d2 usb: usbtmc: Flush anchored URBs in usbtmc_release
38c28fe256110 usb: ulpi: fix double free in ulpi_register_interface() error path
882bdb01ff12c usb: quirks: add DELAY_INIT quirk for another Silicon Motion flash drive
21f942879f861 gpib: lpvo_usb: fix memory leak on disconnect
ffacfe07177d3 mei: me: reduce the scope on unexpected reset
fefd0bceac15f iio: gyro: mpu3050: Fix out-of-sequence free_irq()
cc3de12a5612e iio: gyro: mpu3050: Move iio_device_register() to correct location
3a8e68d65a443 iio: gyro: mpu3050: Fix irq resource leak
ac1233397f4cf iio: gyro: mpu3050: Fix incorrect free_irq() variable
7f14b52a81f94 iio: imu: st_lsm6dsx: Set FIFO ODR for accelerometer and gyroscope only
d6e078c634094 iio: imu: bmi160: Remove potential undefined behavior in bmi160_config_pin()
04d8f0a785dc0 iio: light: veml6070: fix veml6070_read() return value
0ad74c370e8de iio: light: vcnl4035: fix scan buffer on big-endian
b0e1fec0a0d07 iio: imu: adis16550: fix swapped gyro/accel filter functions
2ed3d9bc86b66 iio: dac: ad5770r: fix error return in ad5770r_read_raw()
d7161e8b6211a iio: accel: adxl313: add missing error check in predisable
b6d6f6e2e329f iio: accel: adxl380: fix FIFO watermark bit 8 always written as 0
6c4591e716681 iio: accel: fix ADXL355 temperature signature value
85981790ea35d iio: adc: aspeed: clear reference voltage bits before configuring vref
5f482fd456bc5 iio: adc:
ade9000 : move mutex init before IRQ registration
87180f65f90da iio: adc:
ade9000 : fix wrong register in CALIBBIAS case for active power
3707af316f86d iio: adc:
ade9000 : fix wrong return type in streaming push
25e04a8291f42 iio: adc: ti-ads7950: do not clobber gpio state in ti_ads7950_get()
6afa581aed0f1 iio: adc: ti-ads7950: normalize return value of gpio_get
d0a6b8d186dab Input: xpad - add support for Razer Wolverine V3 Pro
86620132e9c4c Input: xpad - add support for BETOP BTP-KP50B/C controller's wireless mode
00f0cc75356b0 Input: bcm5974 - recover from failed mode switch
beba26c55f4e4 Input: i8042 - add TUXEDO InfinityBook Max 16 Gen10 AMD to i8042 quirk table
33e646804070c Input: synaptics-rmi4 - fix a locking bug in an error path
8ea8dc0d62e3a USB: core: add NO_LPM quirk for Razer Kiyo Pro webcam
42e4fbeb853a6 USB: serial: option: add support for Rolling Wireless RW135R-GL
70fd81b9c4bf3 USB: serial: io_edgeport: add support for Blackbox IC135A
2b8ae82d85d75 drm/amdgpu/pm: drop SMU driver if version not matched messages
77c918eaa4c91 drm/amdgpu: Change AMDGPU_VA_RESERVED_TRAP_SIZE to 64KB
3543005a42d7e drm/amdgpu: validate doorbell_offset in user queue creation
1e130cf9cd172 drm/amdgpu: Fix wait after reset sequence in S4
d0fd0bea84752 drm/i915/dp: Use crtc_state->enhanced_framing properly on ivb/hsw CPU eDP
86e926b108880 drm/i915/dsi: Don't do DSC horizontal timing adjustments in command mode
df4979eef358c drm/ast: dp501: Fix initialization of SCU2C
5a17678b74197 iio: adc: ti-ads1119: Replace IRQF_ONESHOT with IRQF_NO_THREAD
30e2275b3469f iio: adc: ti-ads1119: Reinit completion before wait_for_completion_timeout()
64bc0219e4d8e iio: adc: ti-ads1119: Fix unbalanced pm reference count in ds1119_single_conversion()
014c6d27878d3 iio: adc: ti-adc161s626: use DMA-safe memory for spi_read()
054ea2f12beb4 iio: adc: ti-adc161s626: fix buffer read on big-endian
d9bf25ef3d30f iio: orientation: hid-sensor-rotation: add timestamp hack to not break userspace
7d14b49de8fcc iio: orientation: hid-sensor-rotation: fix quaternion alignment
2b655a9176442 iio: add IIO_DECLARE_QUATERNION() macro
cae26eff1b56d gpib: fix use-after-free in IO ioctl handlers
115a4c8df909f drm/amdgpu: fix the idr allocation flags
1e3e98596c276 x86/kexec: Disable KCOV instrumentation after load_segments()
16062d6830a7f mips: mm: Allocate tlb_vpn array atomically
243d55bd3f08c hwmon: (occ) Fix division by zero in occ_show_power_1()
1010390094fa2 MIPS: Fix the GCC version check for `__multi3' workaround
247e1e7e25c8f MIPS: SiByte: Bring back cache initialisation
075ea208c648c ksmbd: fix OOB write in QUERY_INFO for compound requests
aba0aea354015 Bluetooth: hci_sync: fix stack buffer overflow in hci_le_big_create_sync
fa14e0e19820b Bluetooth: SMP: force responder MITM requirements before building the pairing response
061ee71ac6b03 Bluetooth: SMP: derive legacy responder STK authentication from MITM state
c314b405dcc4d io_uring/net: fix slab-out-of-bounds read in io_bundle_nbufs()
2e8194b4fdee7 ALSA: hda/realtek: add quirk for HP Victus 15-fb0xxx
682b5fd115689 ALSA: hda/realtek: Add quirk for ASUS ROG Strix SCAR 15
57698f184e1af ALSA: ctxfi: Fix missing SPDIFI1 index handling
3afa2e67f3523 ALSA: caiaq: fix stack out-of-bounds read in init_card
1933249263c3a lib/crypto: chacha: Zeroize permuted_state before it leaves scope
b49bf41b41148 sched_ext: Fix inconsistent NUMA node lookup in scx_select_cpu_dfl()
10c13c111d0d7 drm/amd/display: Fix NULL pointer dereference in dcn401_init_hw()
ce47541f5c408 USB: serial: option: add MeiG Smart SRM825WN
dd90880eb5ec5 wifi: iwlwifi: mvm: fix potential out-of-bounds read in iwl_mvm_nd_match_info_handler()
d8388614de613 wifi: wilc1000: fix u8 overflow in SSID scan buffer size calculation
20e2418b98369 rust_binder: use AssertSync for BINDER_VM_OPS
f0e441be08a2e drm/ioc32: stop speculation on the drm_compat_ioctl path
1200f4240c07d ACPI: RIMT: Add dependency between iommu and devices
50392cdfe95e0 riscv: Reset pmm when PR_TAGGED_ADDR_ENABLE is not set
e1425ff578c4a riscv: kgdb: fix several debug register assignment bugs
e435a30ca6fe1 perf/x86: Fix potential bad container_of in intel_pmu_hw_config
87573883c30f1 sched/fair: Fix zero_vruntime tracking fix
a99f94e4f28a3 mips: ralink: update CPU clock index
d6fbc5750f382 hwmon: (asus-ec-sensors) Fix T_Sensor for PRIME X670E-PRO WIFI
d16f8716c927f drm/sysfb: Fix efidrm error handling and memory type mismatch
6205de166dfb2 hwmon: (occ) Fix missing newline in occ_show_extended()
ee4c064e37d4d spi: amlogic: spifc-a4: unregister ECC engine on probe failure and remove() callback
fdbfa1bf2c759 hwmon: (tps53679) Fix device ID comparison and printing in tps53676_identify()
9e962e68a9d26 drm/xe/pxp: Clear restart flag in pxp_start after jumping back
5633454e28d30 drm/xe/pxp: Remove incorrect handling of impossible state during suspend
ec45309671920 drm/xe/pxp: Clean up termination status on failure
e8298e0cc68de spi: stm32-ospi: Fix reset control leak on probe error
b4ec54c974c6e spi: stm32-ospi: Fix resource leak in remove() callback
3a8b66a84f058 dt-bindings: gpio: fix microchip #interrupt-cells
dfe3a785ae7fc hwmon: (ltc4286) Add missing MODULE_IMPORT_NS("PMBUS")
13b0cb9963652 hwmon: (pxe1610) Check return value of page-select write in probe
79b7e588399bb hwmon: (tps53679) Fix array access with zero-length block read
040a1e7e0e2f0 io_uring/rsrc: reject zero-length fixed buffer import
f403094d9075d accel/qaic: Handle DBC deactivation if the owner went away
33b54c7793cf7 gpiolib: clear requested flag if line is invalid
606f88c162b27 gpio: rename gpio_chip_hwgpio() to gpiod_hwgpio()
9e5495d216bff iio: imu: bno055: fix BNO055_SCAN_CH_COUNT off by one
89c3a4ba60309 Revert "drm: Fix use-after-free on framebuffers and property blobs when calling drm_dev_unplug"
dc9a060d76c12 bpf: Reject sleepable kprobe_multi programs at attach time
63276547debc4 bpf: reject direct access to nullable PTR_TO_BUF pointers
7c15dabcbc9e3 eth: fbnic: Increase FBNIC_QUEUE_SIZE_MIN to 64
9ed81d692758d ipv6: avoid overflows in ip6_datagram_send_ctl()
1fe371a34e801 net: hsr: fix VLAN add unwind on slave errors
a208c3e123299 net/sched: cls_flow: fix NULL pointer dereference on shared blocks
3cb055df9e862 net/sched: cls_fw: fix NULL pointer dereference on shared blocks
8c92969c197b9 net/x25: Fix overflow when accumulating packets
fa1dbc93530b3 net/x25: Fix potential double free of skb
311efb3cfc926 bnxt_en: Restore default stat ctxs for ULP when resource is available
e27153b2bd6e6 net/mlx5: Fix switchdev mode rollback in case of failure
276b3efb2b487 net/mlx5: Avoid "No data available" when FW version queries fail
c53cf44588a93 net/mlx5: lag: Check for LAG device before creating debugfs
5392a5174df4f net: macb: properly unregister fixed rate clocks
16ab4c0e2b15d net: macb: fix clk handling on PCI glue driver removal
3a2999704ac36 net/sched: sch_netem: fix out-of-bounds access in packet corruption
18861f87a043e bpf: sockmap: Fix use-after-free of sk->sk_socket in sk_psock_verdict_data_ready().
23e07c340c445 rds: ib: reject FRMR registration before IB connection is established
edb5898cfa91a Bluetooth: MGMT: validate mesh send advertising payload length
1d0bdbfe3e91c Bluetooth: hci_event: fix potential UAF in hci_le_remote_conn_param_req_evt
7d568fede8eac Bluetooth: hci_conn: fix potential UAF in set_cig_params_sync
50fb64defa72a Bluetooth: MGMT: validate LTK enc_size on load
3ec3a1588876c Bluetooth: hci_h4: Fix race during initialization
98c8d3bfdaa65 Bluetooth: SCO: fix race conditions in sco_sock_connect()
d4d1a4eed6f6c Bluetooth: hci_sync: call destroy in hci_cmd_sync_run if immediate
42a47f4b1b769 netfilter: nf_tables: reject immediate NF_QUEUE verdict
dc3e27dd7d76e netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP
187b6ec5229ea netfilter: ctnetlink: ignore explicit helper on new expectations
a0684ccc1ddd2 netfilter: nf_conntrack_expect: store netns and zone in expectation
b53294bff19e5 netfilter: nf_conntrack_expect: use expect->helper
54cb3500e8af5 netfilter: nf_conntrack_expect: honor expectation helper field
929f7a9a7aad9 netfilter: ctnetlink: zero expect NAT fields when CTA_EXPECT_NAT absent
620f3d14c1ef5 netfilter: nf_conntrack_helper: pass helper to expect cleanup
a54bbbcd3c628 netfilter: ipset: use nla_strcmp for IPSET_ATTR_NAME attr
f419bdc205894 netfilter: x_tables: ensure names are nul-terminated
88a8f56e6276f netfilter: nfnetlink_log: account for netlink header size
504c9456699dc netfilter: flowtable: strictly check for maximum number of actions
908dd5faf8169 ALSA: usb-audio: Exclude Scarlett 2i2 1st Gen (8016) from SKIP_IFACE_SETUP
87a8287e76244 net: stmmac: skip VLAN restore when VLAN hash ops are missing
58b58b9ba89c4 mptcp: fix soft lockup in mptcp_recvmsg()
8d38f222795d3 mptcp: add eat_recv_skb helper
414726b69921f net: ipv6: flowlabel: defer exclusive option free until RCU teardown
8aebe18069394 bpf: Fix regsafe() for pointers to packet
917303fda0f1b ASoC: Intel: boards: fix unmet dependency on PINCTRL
2a0323a913109 net: xilinx: axienet: Fix BQL accounting for multi-BD TX packets
f3cf32dc1ebbd net: xilinx: axienet: Correct BD length masks to match AXIDMA IP spec
ad2f60de5045b NFC: pn533: bound the UART receive buffer
d4cc7e4c80b16 net: bonding: fix use-after-free in bond_xmit_broadcast()
153d5520c3f9f crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption
fafe0fa2995a0 crypto: algif_aead - Revert to operating out-of-place
c8d53b70166d1 bnxt_en: set backing store type from query type
906997ea3766c net: sched: cls_api: fix tc_chain_fill_node to initialize tcm_info to zero to prevent an info-leak
cc91202fc20a4 net: use skb_header_pointer() for TCPv4 GSO frag_off check
846cd4a5ffdce net: introduce mangleid_features
ae585d9ac863f net: airoha: Add missing cleanup bits in airoha_qdma_cleanup_rx_queue()
3cd4efb5df728 ipv6: prevent possible UaF in addrconf_permanent_addr()
2321b0d47a11a ASoC: ep93xx: Fix unchecked clk_prepare_enable() and add rollback on failure
19f90e0061b69 ALSA: usb-audio: Exclude Scarlett Solo 1st Gen from SKIP_IFACE_SETUP
15db5c44f79c4 net: enetc: do not allow VF to configure the RSS key
85b4fb46a8989 net: enetc: check whether the RSS algorithm is Toeplitz
3b4df3d43ae42 net: sfp: Fix Ubiquiti U-Fiber Instant SFP module on mvneta
17c1b9807b8a6 net/sched: sch_hfsc: fix divide-by-zero in rtsc_min()
9c55e41c73af5 bridge: br_nd_send: linearize skb before parsing ND options
117f9453dd7cd eth: fbnic: Account for page fragments when updating BDQ tail
590f622669b97 ip6_tunnel: clear skb2->cb[] in ip4ip6_err()
a2edbb6393972 ipv6: icmp: clear skb2->cb[] in ip6_err_gen_icmpv6_unreach()
7e55845bd8971 tg3: Fix race for querying speed/duplex
184d2e9db27c0 net/ipv6: ioam6: prevent schema length wraparound in trace fill
b485eef3d97b7 net: ipv6: ndisc: fix ndisc_ra_useropt to initialize nduseropt_padX fields to zero to prevent an info-leak
f2664bc4f0f35 net: qrtr: replace qrtr_tx_flow radix_tree with xarray to fix memory leak
77c5f0a105d04 net: enetc: reset PIR and CIR if they are not equal when initializing TX ring
98bef6f424a37 net: fec: fix the PTP periodic output sysfs interface
53219f87bd220 netdevsim: fix build if SKB_EXTENSIONS=n
7267e4c75f9f1 net: mana: Fix RX skb truesize accounting
00cbdec17c15d crypto: af-alg - fix NULL pointer dereference in scatterwalk
83622e52431eb crypto: deflate - fix spurious -ENOSPC
aa545df011338 crypto: caam - fix overflow on long hmac keys
68feed135a0c7 crypto: caam - fix DMA corruption on long hmac keys
91478edb8cbc2 wifi: ath11k: Pass the correct value of each TID during a stop AMPDU session
52dc79062f239 wifi: iwlwifi: mld: correctly set wifi generation data
2f84d5e9c1c57 wifi: iwlwifi: disable EHT if the device doesn't allow it
9d713f4f8bb0e wifi: iwlwifi: cfg: add new device names
c0b3fa5e0eaec wifi: iwlwifi: mvm: don't send a 6E related command when not supported
624af5c3baa2d wifi: iwlwifi: mld: Fix MLO scan timing
ee555d539975e wifi: iwlwifi: fix remaining kernel-doc warnings
fdbc00b8b2eec dt-bindings: auxdisplay: ht16k33: Use unevaluatedProperties to fix common property warning
4d47b812f9250 spi: geni-qcom: Check DMA interrupts early in ISR
f4e35576da439 smb: client: fix generic/694 due to wrong ->i_blocks
850de3d87f472 btrfs: reject root items with drop_progress and zero drop_level
86d7c80e1cfff i2c: tegra: Don't mark devices with pins as IRQ safe
cf930a651eef6 btrfs: reserve enough transaction items for qgroup ioctls
7f66fdbc077fa HID: multitouch: Check to ensure report responses match the request
8f71034649738 HID: core: Mitigate potential OOB by removing bogus memset()
b846fb0a73e99 HID: logitech-hidpp: Prevent use-after-free on force feedback initialisation failure
34b12ab75ae25 objtool: Fix Clang jump table detection
7e0576dcf245d tg3: replace placeholder MAC address with device property
8b3484011a83e btrfs: don't take device_list_mutex when querying zone info
abc10f85a3965 atm: lec: fix use-after-free in sock_def_readable()
c8dc23c97680e HID: wacom: fix out-of-bounds read in wacom_intuos_bt_irq
be81f17151fcb wifi: mac80211: check tdls flag in ieee80211_tdls_oper
6c4e67e6ba250 HID: logitech-hidpp: Enable MX Master 4 over bluetooth
1c41248cef835 arm64/scs: Fix handling of advance_loc4
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:11 +0000 (11:32 -0400)]
linux-yocto/6.18: update CVE exclusions (6.18.21)
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 35 changes (5 new | 30 updated): - 5 new CVEs: CVE-2025-57847, CVE-2025-57851, CVE-2025-57853, CVE-2025-57854, CVE-2025-58713 - 30 updated CVEs: CVE-2023-52356, CVE-2024-8299, CVE-2024-9852, CVE-2025-14104, CVE-2025-14821, CVE-2025-14831, CVE-2026-1757, CVE-2026-26157, CVE-2026-26158, CVE-2026-27787, CVE-2026-28261, CVE-2026-2625, CVE-2026-35393, CVE-2026-35398, CVE-2026-35409, CVE-2026-35413, CVE-2026-35444, CVE-2026-35452, CVE-2026-35473, CVE-2026-39698, CVE-2026-39700, CVE-2026-39702, CVE-2026-39935, CVE-2026-3142, CVE-2026-3781, CVE-2026-4483, CVE-2026-5302, CVE-2026-5506, CVE-2026-5688, CVE-2026-5705
Date: Wed, 8 Apr 2026 14:13:08 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:10 +0000 (11:32 -0400)]
linux-yocto/6.18: update to v6.18.21
Updating linux-yocto/6.18 to the latest korg -stable release that comprises
the following commits:
44c944a67997 Linux 6.18.21
e75a5c054d49 Bluetooth: L2CAP: Fix regressions caused by reusing ident
853f70c67d1b futex: Fix UaF between futex_key_to_node_opt() and vma_replace_policy()
18b7d09c2b79 futex: Require sys_futex_requeue() to have identical flags
a7df91375471 irqchip/renesas-rzv2h: Fix error path in rzv2h_icu_probe_common()
f0035858dfb2 netfs: Fix the handling of stream->front by removing it
e7ba52b38766 xen/privcmd: unregister xenstore notifier on module exit
806d40421a59 btrfs: fix lost error when running device stats on multiple devices fs
3c844d01f987 btrfs: fix leak of kobject name for sub-group space_info
c1677817b906 btrfs: fix super block offset in error message in btrfs_validate_super()
3e5fd8f53b57 netfs: Fix read abandonment during retry
0c9256f31003 selftests/mount_setattr: increase tmpfs size for idmapped mount tests
285a2602bf37 dmaengine: xilinx_dma: Fix reset related timeout with two-channel AXIDMA
ec48fb2f5936 dmaengine: xilinx: xilinx_dma: Fix unmasked residue subtraction
e75f5f76be90 dmaengine: xilinx: xilinx_dma: Fix residue calculation for cyclic DMA
e9a6eba5f0c0 dmaengine: xilinx: xilinx_dma: Fix dma_device directions
82656e8daf8d dmaengine: idxd: fix possible wrong descriptor completion in llist_abort_desc()
a4d1b4ba9754 netfs: Fix NULL pointer dereference in netfs_unbuffered_write() on retry
4bc2d72c7695 netfs: Fix kernel BUG in netfs_limit_iter() for ITER_KVEC iterators
f27197ccfd2e dmaengine: xilinx: xdma: Fix regmap init error handling
e1d0d0080bab dmaengine: dw-edma: Fix multiple times setting of the CYCLE_STATE and CYCLE_BIT bits for HDMA.
eb048d11fa2a phy: ti: j721e-wiz: Fix device node reference leak in wiz_get_lane_phy_types()
facd0012708e dmaengine: idxd: Fix leaking event log memory
a18e809e22d3 dmaengine: idxd: Fix freeing the allocated ida too late
a9e7815d3862 dmaengine: idxd: Fix memory leak when a wq is reset
958e96533ddb dmaengine: idxd: Fix not releasing workqueue on .release()
504c0e675100 dmaengine: idxd: Fix possible invalid memory access after FLR
aa0ffc6d3990 dmaengine: idxd: Fix crash when the event log is disabled
40b3f4700e55 mm/mseal: update VMA end correctly on merge
a5c6f6d6ceef ksmbd: fix use-after-free and NULL deref in smb_grant_oplock()
7ad1997b9bc8 mm/huge_memory: fix folio isn't locked in softleaf_to_folio()
e9de9f3ce06b mm/damon/sysfs: fix param_ctx leak on damon_sysfs_new_test_ctx() failure
9c495f9d3781 mm/damon/core: avoid use of half-online-committed context
9cf7588aa578 mm/damon/stat: monitor all System RAM resources
5eeba3a7bf49 drm/amd/pm: fix amdgpu_irq enabled counter unbalanced on smu v11.0
e1cd6e0251ef rust: pin-init: internal: init: document load-bearing fact of field accessors
6b60e35a7fdb unwind_user/x86: Fix arch=um build
41fc9825ac25 powerpc64/bpf: do not increment tailcall count when prog is NULL
b159111cdd8a arm64: dts: imx8mn-tqma8mqnl: fix LDO5 power off
812b6a7cd3e7 ext4: always drain queued discard work in ext4_mb_release()
f7817ad399d6 ext4: fix iloc.bh leak in ext4_fc_replay_inode() error paths
12624c5b724a ext4: handle wraparound when searching for blocks for indirect mapped blocks
0652ab1bd814 ext4: fix the might_sleep() warnings in kvfree()
c97e282f7bfd ext4: fix use-after-free in update_super_work when racing with umount
ad1f6d608f33 ext4: reject mount if bigalloc with s_first_data_block != 0
1895f7904be7 ext4: avoid allocate block from corrupted group in ext4_mb_find_by_goal()
416c86f30f91 ext4: avoid infinite loops caused by residual data
93f2e975ed65 ext4: validate p_idx bounds in ext4_ext_correct_indexes
b44fc445b3b7 ext4: test if inode's all dirty pages are submitted to disk
4855a59e2178 ext4: publish jinode after initialization
823849a26af0 ext4: replace BUG_ON with proper error handling in ext4_read_inline_folio
f49a14810dfe ext4: make recently_deleted() properly work with lazy itable initialization
1d4460f33ce8 ext4: fix fsync(2) for nojournal mode
16041a808b50 ext4: do not check fast symlink during orphan recovery
95de75794cd9 ext4: fix stale xarray tags after writeback
93cb2d103e5c ext4: convert inline data to extents when truncate exceeds inline size
69835472c726 ext4: fix journal credit check when setting fscrypt context
2c2db09b9043 xfs: remove file_path tracepoint data
a1a5df1038f0 xfs: don't irele after failing to iget in xfs_attri_recover_work
68d80f35ea62 xfs: fix ri_total validation in xlog_recover_attri_commit_pass2
3b0c3414b308 xfs: scrub: unlock dquot before early return in quota scrub
95fb5d643cc7 xfs: avoid dereferencing log items after push callbacks
50f5f056807b xfs: save ailp before dropping the AIL lock in push callbacks
8147e304d7d3 xfs: stop reclaim before pushing AIL during unmount
38ec58670a0c mm/pagewalk: fix race between concurrent split and refault
3527e9fdc385 mm/damon/sysfs: check contexts->nr in repeat_call_fn
708033c231bd mm/damon/sysfs: check contexts->nr before accessing contexts_arr[0]
54c143028eb4 drm/amd/pm: Return -EOPNOTSUPP for unsupported OD_MCLK on smu_v13_0_6
126053d0a685 LoongArch: KVM: Handle the case that EIOINTC's coremap is empty
878cf6acb4fd LoongArch: KVM: Make kvm_get_vcpu_by_cpuid() more robust
70fb63c5d36c LoongArch: Workaround LS2K/LS7A GPU DMA hang bug
53a27c09850b LoongArch: vDSO: Emit GNU_EH_FRAME correctly
a1da957c25cf LoongArch: Fix missing NULL checks for kstrdup()
70e2eb91cb63 drm/i915: Unlink NV12 planes earlier
859b14e0be9e drm/i915: Order OP vs. timeout correctly in __wait_for()
8581466b827f drm/i915/dp_tunnel: Fix error handling when clearing stream BW in atomic state
eb95595194e4 drm/amd/display: Fix drm_edid leak in amdgpu_dm
51ccaf0e30c3 drm/amdgpu: prevent immediate PASID reuse case
b6a468966347 dmaengine: sh: rz-dmac: Move CHCTRL updates under spinlock
2b2518b1abb3 dmaengine: sh: rz-dmac: Protect the driver specific lists
79d2151a7c30 dmaengine: fsl-edma: fix channel parameter config for fixed channel requests
20768be1734c i2c: imx: ensure no clock is generated after last read
dca0e38ecfd0 i2c: imx: fix i2c issue when reading multiple messages
92e47ad03e03 futex: Clear stale exiting pointer in futex_lock_pi() retry path
83bcea9da919 i2c: designware: amdisp: Fix resume-probe race condition issue
7319d57db908 irqchip/qcom-mpm: Add missing mailbox TX done acknowledgment
1d896b408646 jbd2: gracefully abort on checkpointing state corruptions
bab090e8fd56 KVM: x86/mmu: Only WARN in direct MMUs when overwriting shadow-present SPTE
695320de6ead KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE
f4bc91398b57 net: macb: Use dev_consume_skb_any() to free TX SKBs
33eeb5471a8b net: macb: Protect access to net_device::ip_ptr with RCU lock
99405131d6ed net: macb: Move devm_{free,request}_irq() out of spin lock area
4771b85954be scsi: ses: Handle positive SCSI error from ses_recv_diag()
786f10b1966e scsi: ibmvfc: Fix OOB access in ibmvfc_discover_targets_done()
e02685511282 ovl: fix wrong detection of 32bit inode numbers
ebbac99bb666 ovl: make fsync after metadata copy-up opt-in mount option
db08e8c32090 phy: qcom: qmp-ufs: Fix SM8650 PCS table for Gear 4
4cce3cd5ed79 x86/fred: Fix early boot failures on SEV-ES/SNP guests
a6e14114684d x86/cpu: Remove X86_CR4_FRED from the CR4 pinned bits mask
5433c7ac4bc8 x86/cpu: Enable FSGSBASE early in cpu_init_exception_handling()
83800f8ef358 writeback: don't block sync for filesystems with no data integrity guarantees
e54c8863ba33 alarmtimer: Fix argument order in alarm_timer_forward()
da4046406459 erofs: add GFP_NOIO in the bio completion if needed
9a18629f2525 virtio_net: Fix UAF on dst_ops when IFF_XMIT_DST_RELEASE is cleared and napi_tx is false
6f3c8795ae9b virt: tdx-guest: Fix handling of host controlled 'quote' buffer length
371a43c4ac70 xfrm: iptfs: only publish mode_data after clone setup
de6d8e8ce518 xfrm: iptfs: validate inner IPv4 header length in IPTFS payload
72b9e81e0203 media: mc, v4l2: serialize REINIT and REQBUFS with req_queue_mutex
529a3f3c49d3 hwmon: (peci/cputemp) Fix off-by-one in cputemp_is_visible()
d640ef7117a1 hwmon: (peci/cputemp) Fix crit_hyst returning delta instead of absolute temperature
67fd1e71f768 hwmon: (pmbus/isl68137) Add mutex protection for AVS enable sysfs attributes
bf28ab8bed18 hwmon: (pmbus/ina233) Fix error handling and sign extension in shunt voltage read
8e209d882b67 KVM: arm64: Discard PC update state on vcpu reset
4cf2cc6bc1cd platform/x86: ISST: Correct locked bit width
fdaf61f2831a RDMA/ionic: Preserve and set Ethernet source MAC after ib_ud_header_init()
ab839325a41c thermal: intel: int340x: soc_slider: Set offset only for balanced mode
8def1e51df14 kbuild: Delete .builtin-dtbs.S when running make clean
e2f7e4d83ab8 cpufreq: conservative: Reset requested_freq on limits change
f162aa749a40 can: netlink: can_changelink(): add missing error handling to call can_ctrlmode_changelink()
eec8a1b18a79 can: isotp: fix tx.buf use-after-free in isotp_sendmsg()
84f8b76d2427 can: gw: fix OOB heap access in cgw_csum_crc8_rel()
cab361aa6404 ASoC: SOF: ipc4-topology: Allow bytes controls without initial payload
d472d1a52985 ASoC: sma1307: fix double free of devm_kzalloc() memory
6ab27f2dc76d ASoC: codecs: wcd934x: fix typo in dt parsing
c215d25cf050 ALSA: firewire-lib: fix uninitialized local variable
61aff3c1edc3 ALSA: hda/realtek: add quirk for ASUS Strix G16 G615JMR
47c459a6c9b6 Revert "ALSA: hda/intel: Add MSI X870E Tomahawk to denylist"
a897064a4570 ksmbd: do not expire session on binding failure
3cdacd11b415 ksmbd: fix memory leaks and NULL deref in smb2_lock()
b0cd9725fe2b ksmbd: fix potencial OOB in get_file_all_info() for compound requests
80824c7e527b ksmbd: replace hardcoded hdr2_len with offsetof() in smb2_calc_max_out_buf_len()
5eda8001ebb5 drm/xe: always keep track of remap prev/next
f278b8ebf7eb tracing: Fix potential deadlock in cpu hotplug with osnoise
7f4e3233faa8 s390/entry: Scrub r12 register on kernel entry
3d39a4ec6380 s390/barrier: Make array_index_mask_nospec() __always_inline
87776f02449e s390/syscalls: Add spectre boundary for syscall dispatch table
449005087718 ALSA: usb-audio: Exclude Scarlett 2i4 1st Gen from SKIP_IFACE_SETUP
e89e2b97253c spi: spi-fsl-lpspi: fix teardown order issue (UAF)
efb07062d95c ASoC: adau1372: Fix clock leak on PLL lock failure
02709ae51f93 ASoC: adau1372: Fix unchecked clk_prepare_enable() return value
01d5711be772 sysctl: fix uninitialized variable in proc_do_large_bitmap
4e9d723d9f19 hwmon: (pmbus/core) Protect regulator operations with mutex
cdf31cf5ca4a hwmon: (pmbus) Introduce the concept of "write-only" attributes
34479e52f1e9 hwmon: (pmbus) Mark lowest/average/highest/rated attributes as read-only
8b476d95e98b hwmon: (adm1177) fix sysfs ABI violation and current unit conversion
39820864eacd drm/amdgpu: Fix fence put before wait in amdgpu_amdkfd_submit_ib
d04c007047c8 ACPI: EC: clean up handlers on probe failure in acpi_ec_setup()
c73a58661a76 spi: use generic driver_override infrastructure
15da4f5e1001 drm/xe: Implement recent spec updates to Wa_16025250150
4e96a8440e74 rust: regulator: do not assume that regulator_get() returns non-null
8f3226f00cb1 ASoC: dt-bindings: stm32: Fix incorrect compatible string in stm32h7-sai match
8a5edc97fd9c drm/amd/display: Do not skip unrelated mode changes in DSC validation
da06a104f048 spi: meson-spicc: Fix double-put in remove path
7af2d06ec25b ASoC: Intel: catpt: Fix the device initialization
234a82a13886 spi: sn-f-ospi: Fix resource leak in f_ospi_probe()
3025ca5daa9d PM: sleep: Drop spurious WARN_ON() from pm_restore_gfp_mask()
13a6af01c1e3 PM: hibernate: Drain trailing zero pages on userspace restore
842aa6103b6f drm/i915/gmbus: fix spurious timeout on 512-byte burst reads
9a709b7e3632 drm/mediatek: dsi: Store driver data before invoking mipi_dsi_host_register
f8afc292d4bc x86/efi: efi_unmap_boot_services: fix calculation of ranges_to_free size
a8b66cf9ba3c scsi: scsi_transport_sas: Fix the maximum channel scanning issue
6140239d4518 ASoC: fsl: imx-card: initialize playback_only and capture_only
3f08351de5ca RDMA/irdma: Harden depth calculation functions
0e04f3f2dca4 RDMA/irdma: Return EINVAL for invalid arp index error
cd8bcec2de5e RDMA/irdma: Fix deadlock during netdev reset with active connections
8203f295b4bc RDMA/irdma: Remove reset check from irdma_modify_qp_to_err()
30d9491bbb69 RDMA/irdma: Clean up unnecessary dereference of event->cm_node
4c2b2ea802bc RDMA/irdma: Remove a NOP wait_event() in irdma_modify_qp_roce()
feeabfc936d7 RDMA/irdma: Update ibqp state to error if QP is already in error state
3cb88c12461b RDMA/irdma: Initialize free_qp completion before using it
9d4fe0d7586e ALSA: usb-audio: Exclude Scarlett 2i2 1st Gen from SKIP_IFACE_SETUP
f9433abfcf83 RDMA/efa: Fix possible deadlock
21ae8790e5a8 RDMA/rw: Fall back to direct SGE on MR pool exhaustion
a1dc886137ab ALSA: hda/realtek: Sequence GPIO2 on Star Labs StarFighter
f710129df9fc regmap: Synchronize cache for the page selector
0dd98aea1c0c RDMA/efa: Fix use of completion ctx after free
97da0d993d7c RDMA/efa: Improve admin completion context state machine
26bd3a77c5ff RDMA/efa: Check stored completion CTX command ID with received one
7ff87da09921 net: macb: use the current queue number for stats
c6cb41eaae87 netfilter: ctnetlink: use netlink policy range checks
01f34a80ac23 netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp
9ca8c7452493 netfilter: nf_conntrack_expect: skip expectations in other netns via proc
53d8899452d9 netfilter: nft_set_rbtree: revisit array resize logic
d8795fde1f78 netfilter: ip6t_rt: reject oversized addrnr in rt_mt6_check()
c9f6c51d3648 netfilter: nfnetlink_log: fix uninitialized padding leak in NFULA_PAYLOAD
9f557c7eae12 tls: Purge async_hold in tls_decrypt_async_wait()
1019028eb124 Bluetooth: btusb: clamp SCO altsetting table indices
900e4db5385e Bluetooth: L2CAP: Fix ERTM re-init and zero pdu_len infinite loop
3f26ecbd9cde Bluetooth: L2CAP: Fix deadlock in l2cap_conn_del()
ea6cf86167b3 Bluetooth: L2CAP: Fix not tracking outstanding TX ident
66696648af47 Bluetooth: btintel: serialize btintel_hw_error() with hci_req_sync_lock
5c7cd74673bc Bluetooth: L2CAP: Fix send LE flow credits in ACL link
4f23cceb3500 dma-mapping: add missing `inline` for `dma_free_attrs`
064fede3ae78 rtnetlink: fix leak of SRCU struct in rtnl_link_register
4e27807943b1 net: lan743x: fix duplex configuration in mac_link_up
0a7468ed49a6 team: fix header_ops type confusion with non-Ethernet ports
a72891444623 virtio-net: correct hdr_len handling for tunnel gso
5f217e718236 virtio-net: correct hdr_len handling for VIRTIO_NET_F_GUEST_HDRLEN
2fefa595d484 net: enetc: fix the output issue of 'ethtool --show-ring'
18d84c45def3 udp: Fix wildcard bind conflict check when using hash2
966937039e07 net: airoha: add RCU lock around dev_fill_forward_path
d0c7cdc15fdf net: fix fanout UAF in packet_release() via NETDEV_UP race
103931f6fdbb ipv6: Don't remove permanent routes with exceptions from tb6_gc_hlist.
edf57ce04bc1 ipv6: Remove permanent routes from tb6_gc_hlist when all exceptions expire.
bb85741d2dc2 iavf: fix out-of-bounds writes in iavf_get_ethtool_stats()
22c117745495 ice: use ice_update_eth_stats() for representor stats
218609e1e466 ice: fix inverted ready check for VF representors
fe1ed519210a platform/x86: intel-hid: disable wakeup_mode during hibernation
a825ab202533 platform/olpc: olpc-xo175-ec: Fix overflow error message to print inlen
eaa3dae239f2 platform/x86: lenovo: wmi-gamezone: Drop gz_chain_head
e29850b0faa8 platform/x86: ISST: Check HWP support before MSR access
d57cf5c770c0 net: bcmasp: fix double disable of clk
9e5f5c07cc7d net: bcmasp: fix double free of WoL irq
aba90ae2379f net: bcmasp: streamline early exit in probe
60ed7fa717b1 rtnetlink: count IFLA_INFO_SLAVE_KIND in if_nlmsg_size
6fa3f2764f49 rtnetlink: count IFLA_PARENT_DEV_{NAME,BUS_NAME} in if_nlmsg_size
54c87a730157 net/smc: fix double-free of smc_spd_priv when tee() duplicates splice pipe buffer
bd50c7484c3b openvswitch: validate MPLS set/set_masked payload length
98b726ab5e2a openvswitch: defer tunnel netdev_put to RCU release
95265232b497 net: openvswitch: Avoid releasing netdev before teardown completes
d89b74bf08f0 nfc: nci: fix circular locking dependency in nci_close_device
097b16ffa61e ionic: fix persistent MAC address override on PF
936a3c0c10e2 pinctrl: mediatek: common: Fix probe failure for devices without EINT
1dc6db047919 Bluetooth: L2CAP: Fix null-ptr-deref on l2cap_sock_ready_cb
9ecbfd93cd6d Bluetooth: hci_ll: Fix firmware leak on error path
bafec9325d4d Bluetooth: MGMT: Fix dangling pointer on mgmt_add_adv_patterns_monitor_complete
7197462e90b8 Bluetooth: SCO: Fix use-after-free in sco_recv_frame() due to missing sock_hold
8c96f3bd4ae0 Bluetooth: L2CAP: Validate PDU length before reading SDU length in l2cap_ecred_data_rcv()
5b35f8211a91 Bluetooth: L2CAP: Fix stack-out-of-bounds read in l2cap_ecred_conn_req
46737243be21 pinctrl: stm32: fix HDP driver dependency on GPIO_GENERIC
1500005f286f can: statistics: add missing atomic access in hot path
5cf3972c8221 erofs: set fileio bio failed in short read case
f4b4debc0b73 dma: swiotlb: add KMSAN annotations to swiotlb_bounce()
83f644ea9298 af_key: validate families in pfkey_send_migrate()
8854e9367465 xfrm: prevent policy_hthresh.work from racing with netns teardown
2255ed6adbc3 xfrm: Fix work re-schedule after cancel in xfrm_nat_keepalive_net_fini()
ee0e3521f806 pinctrl: renesas: rza1: Normalize return value of gpio_get()
33a7b3626893 xfrm: iptfs: fix skb_put() panic on non-linear skb during reassembly
7068aaa1cef4 pinctrl: renesas: rzt2h: Fix device node leak in rzt2h_gpio_register()
88d386243ed3 esp: fix skb leak with espintcp and async crypto
af834169a410 xfrm: call xdo_dev_state_delete during state update
ecb02f949e3e xfrm: fix the condition on x->pcpu_num in xfrm_sa_len
88467620fa4a xfrm: add missing extack for XFRMA_SA_PCPU in add_acquire and allocspi
b4a1e07944fe i3c: master: dw-i3c: Fix missing of_node for virtual I2C adapter
6eee692c4204 ALSA: hda/realtek: add quirk for ASUS UM6702RC
72969a102f93 spi: intel-pci: Add support for Nova Lake mobile SPI flash
cbc467b4d9f3 usb: core: new quirk to handle devices with zero configurations
ad696758a45c drm/amdgpu: fix gpu idle power consumption issue for gfx v12
ca111c9d8d6c nvmet: move async event work off nvmet-wq
17c9ad5aa46c objtool: Handle Clang RSP musical chairs
90420418e622 ALSA: hda/realtek: Add headset jack quirk for Thinkpad X390
f93b6da04ec7 ALSA: hda/realtek: Add quirk for Gigabyte Technology to fix headphone
bee43f7b9bc6 ALSA: hda/realtek: add HP Laptop 14s-dr5xxx mute LED quirk
ed97a37b00d9 powerpc64/ftrace: fix OOL stub count with clang
2ec578e64521 btrfs: set BTRFS_ROOT_ORPHAN_CLEANUP during subvol create
91608747a8d2 sched_ext: Use WRITE_ONCE() for the write side of dsq->seq update
be1a341c1614 HID: apple: avoid memory leak in apple_report_fixup()
74b1b0d84697 bpf: Fix u32/s32 bounds when ranges cross min/max boundary
b4770c2e70e6 ASoC: amd: acp: Add ACP6.3 match entries for Cirrus Logic parts
be0c2255d717 drm/ttm/tests: Fix build failure on PREEMPT_RT
34f0790eb712 ALSA: hda/senary: Ensure EAPD is enabled during init
5cf83b76f738 block: break pcpu_alloc_mutex dependency on freeze_lock
e33c0c59f1f4 dma-buf: Include ioctl.h in UAPI header
9924fd289901 ASoC: cs35l56: Only patch ASP registers if the DAI is part of a DAIlink
1e68eeada7b0 ASoC: fsl_easrc: Fix event generation in fsl_easrc_iec958_put_bits()
77759925aeb6 ALSA: hda/hdmi: Add Tegra238 HDA codec device ID
3d5f63d86720 ASoC: Intel: sof_sdw: Add quirk for Alienware Area 51 (2025) 0CCD SKU
74b25178943f scsi: devinfo: Add BLIST_SKIP_IO_HINTS for Iomega ZIP
09293aecd479 ASoC: rt1321: fix DMIC ch2/3 mask issue
99c9a684b22d scsi: mpi3mr: Clear reset history on ready and recheck state after timeout
f927555140c7 ASoC: fsl_easrc: Fix event generation in fsl_easrc_iec958_set_reg()
ef75dc1401d8 module: Fix kernel panic when a symbol st_shndx is out of bounds
4ebc4d48fca9 HID: asus: add xg mobile 2023 external hardware support
bf0ffc028f82 HID: mcp2221: cancel last I2C command on read error
0a4e44eb4b0c platform/x86: oxpec: Add support for OneXPlayer X1 Air
ba6af12e600b platform/x86: oxpec: Add support for Aokzoe A2 Pro
6ea6cfdbd646 kbuild: install-extmod-build: Package resolve_btfids if necessary
4121e616c08a net: usb: r8152: add TRENDnet TUC-ET2G
1faaa81aabab platform/x86: oxpec: Add support for OneXPlayer X1z
b06021c3cfd8 HID: apple: Add EPOMAKER TH87 to the non-apple keyboards list
43c40bfb8503 platform/x86: oxpec: Add support for OneXPlayer APEX
f061affafb59 HID: intel-ish-hid: ipc: Add Nova Lake-H/S PCI device IDs
136f605e246b HID: magicmouse: avoid memory leak in magicmouse_report_fixup()
4101a437c236 HID: magicmouse: fix battery reporting for Apple Magic Trackpad 2
b96c7b25eb1b nvme-pci: ensure we're polling a polled queue
4877461104f2 platform/x86: touchscreen_dmi: Add quirk for y-inverted Goodix touchscreen on SUPI S10
05bc9939b501 platform/x86: intel-hid: Enable 5-button array on ThinkPad X1 Fold 16 Gen 1
94b2a56fd4b1 platform/x86: hp-wmi: Add Omen 16-xd0xxx fan and thermal support
470e01ae896c nvme-fabrics: use kfree_sensitive() for DHCHAP secrets
2e9b4ca982d8 nvme-pci: cap queue creation to used queues
47910033f542 platform/x86: intel-hid: Add Dell 14 Plus 2-in-1 to dmi_vgbs_allow_list
a41cc7c1668e HID: asus: avoid memory leak in asus_report_fixup()
c6a021ae84aa platform/x86: hp-wmi: Add Omen 16-wf0xxx fan and thermal support
61415d080d43 tracing: Revert "tracing: Remove pid in task_rename tracing output"
58bd87d0e692 bpf: Fix unsound scalar forking in maybe_fork_scalars() for BPF_OR
f14ca604c0ff bpf: Fix undefined behavior in interpreter sdiv/smod for INT_MIN
c0281da1f2aa bpf: Fix exception exit lock checking for subprogs
a85bbd9ef8a0 cxl: Adjust the startup priority of cxl_pmem to be higher than that of cxl_acpi
a446dbcb3877 bpf: Release module BTF IDR before module unload
7c02a9bd7d14 driver core: platform: use generic driver_override infrastructure
ad9465ca3444 driver core: generalize driver_override in struct device
1b1f570444dc sh: platform_early: remove pdev->driver_override check
1f11dc6dc792 hwmon: axi-fan: don't use driver_override as IRQ name
e85f446e82aa cxl/hdm: Avoid incorrect DVSEC fallback when HDM decoders are enabled
b36b0e804aee s390/mm: Add missing secure storage access fixups for donated memory
35f7914e54fe perf: Make sure to use pmu_ctx->pmu for groups
d94e6989e26c x86/perf: Make sure to program the counter value for stopped events on migration
ccbf29b28b55 bpf: Fix constant blinding for PROBE_MEM32 stores
a17443af8742 bpf: Reset register ID for BPF_END value tracking
2c3214146204 cxl/port: Fix use after free of parent_port in cxl_detach_ep()
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:09 +0000 (11:32 -0400)]
linux-yocto/6.18: update CVE exclusions (6.18.20)
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 13 changes (7 new | 6 updated): - 7 new CVEs: CVE-2026-31943, CVE-2026-31945, CVE-2026-31950, CVE-2026-31951, CVE-2026-32241, CVE-2026-34389, CVE-2026-34391 - 6 updated CVEs: CVE-2026-26060, CVE-2026-33284, CVE-2026-34374, CVE-2026-34387, CVE-2026-4966, CVE-2026-4972
Date: Fri, 27 Mar 2026 19:35:44 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:08 +0000 (11:32 -0400)]
linux-yocto/6.18: update to v6.18.20
Updating linux-yocto/6.18 to the latest korg -stable release that comprises
the following commits:
dd26ea937ef59 Linux 6.18.20
a52e3970f9717 xen/privcmd: add boot control for restricted usage in domU
389bae9a44099 xen/privcmd: restrict usage in unprivileged domU
f909f22f5cec6 hwmon: (max6639) Fix pulses-per-revolution implementation
96955cf9f5ba6 arm64: realm: Fix PTE_NS_SHARED for 52bit PA support
ef6e6484747e3 tools/bootconfig: fix fd leak in load_xbc_file() on fstat failure
d03e8c281fd3e lib/bootconfig: check xbc_init_node() return in override path
3ab1d7c8b6b7e fs/tests: exec: Remove bad test vector
cf4b224ffb9a5 drm/i915/gt: Check set_default_submission() before deferencing
a5828c14a9e3d ksmbd: fix use-after-free in durable v2 replay of active file handles
7f7468fd2a755 ksmbd: fix use-after-free of share_conf in compound request
2cb24caacee21 drm/bridge: dw-hdmi-qp: fix multi-channel audio output
c51a5319bf655 drm/amd: fix dcn 2.01 check
430334e9e4e81 drm/amd/display: Fix DisplayID not-found handling in parse_edid_displayid_vrr()
58abeb7b9562f iommu/sva: Fix crash in iommu_sva_unbind_device()
3f300a41a3668 drm/vmwgfx: Don't overwrite KMS surface dirty tracker
bec21d97c968a spi: amlogic-spisg: Fix memory leak in aml_spisg_probe()
f15e0706e366b spi: amlogic: spifc-a4: Remove redundant clock cleanup
a9e119d027fd5 mtd: rawnand: brcmnand: skip DMA during panic write
5fd5c078af23c mtd: rawnand: serialize lock/unlock against other NAND operations
f8b5b833728bf binfmt_elf_fdpic: fix AUXV size calculation for ELF_HWCAP3 and ELF_HWCAP4
75668e58244e6 tracing: Fix trace_marker copy link list updates
79f0faf81d3bb x86/platform/uv: Handle deconfigured sockets
38539f55f61ad tracing: Fix failure to read user space from system call trace events
b6925774dd15d ring-buffer: Fix to update per-subbuf entries of persistent ring buffer
886fa86915391 perf/x86: Move event pointer setup earlier in x86_pmu_enable()
ed1f5c1d43c30 perf/x86/intel: Add missing branch counters constraint apply
560ec8f998522 irqchip/riscv-rpmi-sysmsi: Fix mailbox channel leak in rpmi_sysmsi_probe()
aa9faa6486cfc i2c: pxa: defer reset on Armada 3700 when recovery is used
bf8a9c92cdd1f i2c: fsi: Fix a potential leak in fsi_i2c_probe()
a9778298f4703 i2c: cp2615: fix serial string NULL-deref at probe
7003794316b18 USB: serial: f81232: fix incomplete serial port generation
58b91c5cb685a hwmon: (pmbus/isl68137) Fix unchecked return value and use sysfs_emit()
81f61e3e1ca2d hwmon: (pmbus/mp2869) Check pmbus_read_byte_data() before using its return value
48fed64590800 hwmon: (pmbus/mp2975) Add error check for pmbus_read_word_data() return value
4418f3186b223 hwmon: (pmbus/ina233) Add error check for pmbus_read_word_data() return value
beab26de7bcac MPTCP: fix lock class name family in pm_nl_create_listen_socket
d938dd5a0ad78 icmp: fix NULL pointer dereference in icmp_tag_validation()
6ab68b4adf744 net: dsa: bcm_sf2: fix missing clk_disable_unprepare() in error paths
719f6784f918f net: shaper: protect from late creation of hierarchy
581eee0890a8b net: shaper: protect late read accesses to the hierarchy
7df2b50cae1a7 net: mvpp2: guard flow control update with global_tx_fc in buffer switching
3932620c04c29 nfnetlink_osf: validate individual option lengths in fingerprints
c8092edb9a11f netfilter: nf_tables: release flowtable after rcu grace period on error
c25e0dec366ae netfilter: bpf: defer hook memory release until rcu readers are done
017d674cf6930 net: bonding: fix NULL deref in bond_debug_rlb_hash_show
003343985f26d udp_tunnel: fix NULL deref caused by udp_sock_create6 when CONFIG_IPV6=n
96c9c25b74686 net/mlx5e: Fix race condition during IPSec ESN update
2c6a5be0aee5a net/mlx5e: Prevent concurrent access to IPSec ASO context
ea52e95be4638 net/mlx5: qos: Restrict RTNL area to avoid a lock cycle
c852ebfe43344 net: macb: fix uninitialized rx_fs_lock
63e192b8956a2 netdevsim: drop PSP ext ref on forward failure
98473309a36ac ACPI: processor: Fix previous acpi_processor_errata_piix4() fix
06e769dddcbeb wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure
46c670ff1ff46 wifi: wlcore: Return -ENOMEM instead of -EAGAIN if there is not enough headroom
44699c6cdfce8 wifi: mac80211: fix NULL deref in mesh_matches_local()
5f284b12cc127 libie: prevent memleak in fwlog code
cff11b1c03e6f iavf: fix VLAN filter lost on add/delete race
31521c124e648 igc: fix page fault in XDP TX timestamps handling
3472c22c067ab igc: fix missing update of skb->tail in igc_xmit_frame()
89b2b1c64d09a ACPICA: Update the format of Arg3 of _DSM
d3e32a612c639 net: usb: aqc111: Do not perform PM inside suspend callback
4c9af67f99aa3 clsact: Fix use-after-free in init/destroy rollback asymmetry
a5bd5a2710310 net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check
403f94ddcb36c net: usb: cdc_ncm: add ndpoffset to NDP16 nframes bounds check
d538b371da1e7 net: airoha: Remove airoha_dev_stop() in airoha_remove()
e9c66d3e7d855 net/sched: teql: Fix double-free in teql_master_xmit
fd7579f0a2c84 net/smc: fix NULL dereference and UAF in smc_tcp_syn_recv_sock()
4172a7901cf43 bonding: prevent potential infinite loop in bond_header_parse()
bb081fd37f831 PM: runtime: Fix a race condition related to device removal
34c979e29bf68 sched: idle: Consolidate the handling of two special cases
afdb1533eb9c0 net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown
6995dcc1a93de net: bcmgenet: increase WoL poll timeout
683be1d1670e9 crypto: ccp - Fix leaking the same page twice
9d00fe7d6d7c5 netfilter: nf_conntrack_h323: check for zero length in DecodeQ931()
f1aa81396d779 netfilter: xt_time: use unsigned int for monthday bit shift
cb549925875fa netfilter: xt_CT: drop pending enqueued packets on template removal
f29a055e4f593 netfilter: nft_ct: drop pending enqueued packets on removal
31641c682db73 nf_tables: nft_dynset: fix possible stateful expression memleak in error path
6bce72daeccca netfilter: nf_conntrack_h323: fix OOB read in decode_int() CONS case
865dba58958c3 netfilter: nf_conntrack_sip: fix Content-Length u32 truncation in sip_help_tcp()
04c8907ce4e3d netfilter: ctnetlink: fix use-after-free in ctnetlink_dump_exp_ct()
e01a597707c88 mpls: add missing unregister_netdevice_notifier to mpls_init
0c3e8bff808f1 net/rose: fix NULL pointer dereference in rose_transmit_link on reconnect
d8f35767bacb3 bridge: cfm: Fix race condition in peer_mep deletion
1e1b7a7496a2e Bluetooth: qca: fix ROM version reading on WCN3998 chips
da3000cbe4851 Bluetooth: L2CAP: Fix use-after-free in l2cap_unregister_user
f8b6ed2f06d3b Bluetooth: HIDP: Fix possible UAF
b5c5e96f3b0a5 Bluetooth: MGMT: Fix list corruption and UAF in command complete handlers
84d041cfefab5 Bluetooth: hci_sync: Fix hci_le_create_conn_sync
874e73969d48c Bluetooth: ISO: Fix defer tests being unstable
fce04c8b54e43 Bluetooth: SMP: make SM/PER/KDU/BI-04-C happy
37021b16b270c Bluetooth: LE L2CAP: Disconnect if sum of payload sizes exceed SDU
734aa845f2748 Bluetooth: LE L2CAP: Disconnect if received packet's SDU exceeds IMTU
70d9bd9a2e683 firmware: arm_scmi: Fix NULL dereference on notify error path
d282757b0f6dd firmware: arm_scpi: Fix device_node reference leak in probe path
3983811cab779 firmware: arm_ffa: Remove vm_id argument in ffa_rxtx_unmap()
ad01256fa62d0 arm64: dts: renesas: rzg3s-smarc-som: Set bypass for Versa3 PLL2
2a53d63ac78c2 arm64: dts: renesas: r9a09g087: Fix CPG register region sizes
dfe08c4dde872 arm64: dts: renesas: r9a09g077: Fix CPG register region sizes
fa59e9cfbed9a arm64: dts: renesas: r9a09g057: Remove wdt{0,2,3} nodes
74893eb6d3602 arm64: dts: renesas: r9a09g057: Add RTC node
2e5902c28fbde arm64: dts: renesas: rzv2-evk-cn15-sd: Add ramp delay for SD0 regulator
edf76d9576907 arm64: dts: renesas: rzt2h-n2h-evk: Add ramp delay for SD0 card regulator
a1b7a843f12a0 wifi: cfg80211: cancel pmsr_free_wk in cfg80211_pmsr_wdev_down
5ba05436f15d1 wifi: mac80211: Fix static_branch_dec() underflow for aql_disable.
31d4ceb785d9b wifi: mac80211: use jiffies_delta_to_msecs() for sta_info inactive times
f6a620a9d6a60 wifi: mac80211: remove keys after disabling beaconing
c2f6107728ea3 tee: shm: Remove refcounting of kernel pages
294e0c8bc3502 soc: fsl: cpm1: qmc: Fix error check for devm_ioremap_resource() in qmc_qe_init_resources()
85dbbf7dc88b0 soc: fsl: qbman: fix race condition in qman_destroy_fq
2315d328faa89 soc: rockchip: grf: Add missing of_node_put() when returning
640452dbc118e cache: ax45mp: Fix device node reference leak in ax45mp_cache_init()
606fcf901c132 cache: starfive: fix device node leak in starlink_cache_init()
e3dd5cffba07d soc: microchip: mpfs: Fix memory leak in mpfs_sys_controller_probe()
8f9e054f605ae btrfs: tree-checker: fix misleading root drop_level error message
1cf30c73602c6 btrfs: log new dentries when logging parent dir of a conflicting inode
9691c50fd5dd1 drm/i915/psr: Compute PSR entry_setup_frames into intel_crtc_state
8d0d94f8ba5b3 Bluetooth: L2CAP: Fix accepting multiple L2CAP_ECRED_CONN_REQ
1e9e2640d870d drm/xe: Open-code GGTT MMIO access protection
8613cca4f5f4f drm/xe/oa: Allow reading after disabling OA stream
954dae0d94fbf drm/xe/guc: Ensure CT state transitions via STOP before DISABLED
0b35d11fbbcfd drm/i915/dmc: Fix an unlikely NULL pointer deference at probe
5ce4a38e6c248 drm/amdgpu: Limit BO list entry count to prevent resource exhaustion
73908f65f5cc3 drm/amdgpu: apply state adjust rules to some additional HAINAN vairants
c18eef45af036 drm/radeon: apply state adjust rules to some additional HAINAN vairants
772f3653eef50 drm/imagination: Synchronize interrupts before suspending the GPU
9497b1f309436 drm/imagination: Fix deadlock in soft reset sequence
7687403d65805 drm/amdgpu/mmhub4.1.0: add bounds checking for cid
72365be44cc7e drm/amdgpu/mmhub3.0: add bounds checking for cid
4b9e5676db815 drm/amdgpu/mmhub3.0.2: add bounds checking for cid
56f0473d3c631 drm/amdgpu/mmhub3.0.1: add bounds checking for cid
603db8a36517c drm/amdgpu/mmhub2.3: add bounds checking for cid
2c4eea0eba197 drm/amdgpu/mmhub2.0: add bounds checking for cid
3256b95b2d3c4 drm/amdgpu/gmc9.0: add bounds checking for cid
e25fff4a9eac9 drm/amd/display: Wrap dcn32_override_min_req_memclk() in DC_FP_{START, END}
074d06d3724cc drm: Fix use-after-free on framebuffers and property blobs when calling drm_dev_unplug
3b02923b046af serial: uartlite: fix PM runtime usage count underflow on probe
efe85a557186b serial: core: fix infinite loop in handle_tx() for PORT_UNKNOWN
a773f019c0b06 serial: 8250_dw: Ensure BUSY is deasserted
0e16f461f2b19 serial: 8250: Add late synchronize_irq() to shutdown to handle DW UART BUSY
5dfd8c76c0a4d serial: 8250_dw: Rework IIR_NO_INT handling to stop interrupt storm
2d21617bce4f2 serial: 8250_dw: Rework dw8250_handle_irq() locking and IIR handling
9bb497252a420 serial: 8250: Add serial8250_handle_irq_locked()
3b1d813de41eb serial: 8250_dw: Avoid unnecessary LCR writes
e6cc0536d1547 serial: 8250: Protect LCR write in shutdown
4afc12dae7487 serial: 8250: always disable IRQ during THRE test
5f6b17562f03f serial: 8250: Fix TX deadlock when using DMA
5e5b209b2d932 serial: 8250_pci: add support for the AX99100
c4efef65a46f6 vt: save/restore unicode screen buffer for alternate screen
19e46bf37943b io_uring/kbuf: propagate BUF_MORE through early buffer commit path
f98405afd2a70 io_uring/kbuf: fix missing BUF_MORE for incremental buffers at EOF
0f4ce79b8db7b io_uring/poll: fix multishot recv missing EOF on wakeup race
ee312bb1052e4 iommu/vt-d: Only handle IOPF for SVA when PRI is supported
300e7cfdc92bb iommu/vt-d: Fix intel iommu iotlb sync hardlockup and retry
c4054ad2d8bff mtd: Avoid boot crash in RedBoot partition table parser
215f6d6845a3e mtd: rawnand: cadence: Fix error check for dma_alloc_coherent() in cadence_nand_init()
978f50a3d7dac mtd: rawnand: pl353: make sure optimal timings are applied
378b295f67102 spi: fix statistics allocation
80f3e8cd2b4ad spi: fix use-after-free on controller registration failure
18605b1b936b6 pmdomain: bcm: bcm2835-power: Increase ASB control timeout
5ed633b212bda mmc: sdhci: fix timing selection for 1-bit bus width
c8d5757ab6d6a mmc: sdhci-pci-gli: fix GL9750 DMA write corruption
1343f110663dd ata: libata-scsi: report correct sense field pointer in ata_scsiop_maint_in()
2229b4cf97301 ata: libata-core: disable LPM on ADATA SU680 SSD
08b2b65c63bb2 mm/huge_memory: fix a folio_split() race condition with folio_try_get()
edb6c2118293c ipmi:msghandler: Handle error returns from the SMI sender
1e363c11cd2f1 ipmi: Consolidate the run to completion checking for xmit msgs lock
522acaae34aa7 sched_ext: Disable preemption between scx_claim_exit() and kicking helper work
c1b8245c0a387 sched_ext: Simplify breather mechanism with scx_aborting flag
c44198f25fdfe sched_ext: Fix starvation of scx_enable() under fair-class saturation
2f3dea284c761 nsfs: tighten permission checks for ns iteration ioctls
05edc78eb4699 drm/xe/sync: Fix user fence leak on alloc failure
528aaa37d3c3f fgraph: Fix thresh_return nosleeptime double-adjust
407cc37c21d51 ksmbd: Don't log keys in SMB3 signing and encryption key generation
58f5d34f88e8f net: macb: Shuffle the tx ring before enabling tx
0cbc0d719ecc1 net: macb: sort #includes
8a7d29b8bda14 drm/i915/vrr: Configure VRR timings after enabling TRANS_DDI_FUNC_CTL
1aa7745b97fda drm/i915/vrr: Move HAS_VRR() check into intel_vrr_set_transcoder_timings()
c3aa7b837920c drm/xe: Fix memory leak in xe_vm_madvise_ioctl
f655467a9973f cifs: open files should not hold ref on superblock
6f502049a96b3 crypto: atmel-sha204a - Fix OOM ->tfm_count leak
2d7238eec40ad netconsole: fix sysdata_release_enabled_show checking wrong flag
f13fe67947267 ublk: fix NULL pointer dereference in ublk_ctrl_set_size()
bea2848ba20e1 LoongArch: Check return values for set_memory_{rw,rox}
fc9d6999ebfa2 net: macb: Reinitialize tx/rx queue pointer registers and rx ring during resume
4e1436e0b13c6 net: macb: Introduce gem_init_rx_ring()
4ab7c9fa0a477 drm/i915/psr: Write DSC parameters on Selective Update in ET mode
a5cdbbc771470 drm/i915/dsc: Add helper for writing DSC Selective Update ET parameters
291d19d586a5a drm/i915/dsc: Add Selective Update register definitions
3d80ebe6d1b7b ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION
9feb2d1bf86d9 ksmbd: unset conn->binding on failed binding request
9ee803bfdba0c smb: client: fix krb5 mount with username option
e7ff754e339e3 Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access
5a1ea296f8589 Bluetooth: L2CAP: Fix type confusion in l2cap_ecred_reconf_rsp()
1768244b85dd2 crypto: padlock-sha - Disable for Zhaoxin processor
5a86d4e920d97 mac80211: fix crash in ieee80211_chan_bw_change for AP_VLAN stations
0e35db29fc5a9 batman-adv: avoid OGM aggregation when skb tailroom is insufficient
f5ed9e50c0872 parisc: Flush correct cache in cacheflush() syscall
19aa416eed9e4 bnxt_en: fix OOB access in DBG_BUF_PRODUCER async event handler
1f4714065b2bc net: macb: fix use-after-free access to PTP clock
4de9ed2ea22d6 NFC: nxp-nci: allow GPIOs to sleep
8dd23bb5c6f5c LoongArch: No need to flush icache if text copy failed
250aae6a5738a LoongArch: Give more information if kmem access failed
6e096db800db8 mm/huge_memory: fix early failure try_to_migrate() when split huge pmd for shared THP
f3caaee0f9e48 mm/huge_memory: fix use of NULL folio in move_pages_huge_pmd()
99888a4f340ca mm/rmap: fix incorrect pte restoration for lazyfree folios
4897bd307ba87 crash_dump: don't log dm-crypt key bytes in read_key_from_user_keying
a226e5b49e5fe nvdimm/bus: Fix potential use after free in asynchronous initialization
be5c35960e5ea sunrpc: fix cache_request leak in cache_release
73c5b5aea1c44 HID: bpf: prevent buffer overflow in hid_hw_request
6487774a576dd selftests/hid: fix compilation when bpf_wq and hid_device are not exported
0f0e2a54a31a7 nfsd: fix heap overflow in NFSv4.0 LOCK replay cache
db4a9f99b12a7 NFSD: Hold net reference for the lifetime of /proc/fs/nfs/exports fd
2829e80d29b62 NFSD: Defer sub-object cleanup in export put callbacks
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Himanshu Jadon [Thu, 23 Apr 2026 06:11:17 +0000 (23:11 -0700)]
apt: Add CVE_PRODUCT to support product name
- Keep both the older deprecated debian:apt alias and the active
debian:advanced_package_tool identity in CVE_PRODUCT.
- This preserves completeness and avoids missing CVEs in case older
aliases are still used in NVD records.
Signed-off-by: Himanshu Jadon <hjadon@cisco.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Ross Burton [Wed, 22 Apr 2026 19:44:43 +0000 (20:44 +0100)]
vim: disable GTK+3 UI by default
Disable the GTK+ UI by default. By having vim be always built with GTK+
by default installing vim results in the entire GTK+/X11 stack being
pulled into images, even if they would otherwise be non-graphical.
Also, real vim users run it in a terminal.
The PACKAGECONFIG remains and can be enabled. Maybe a future improvement
would be to split the recipe into non-X vim and GTK+-based gvim recipes.
Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>