]>
git.ipfire.org Git - thirdparty/openembedded/openembedded-core.git/log
Antonin Godard [Tue, 28 Apr 2026 11:54:27 +0000 (13:54 +0200)]
mirrors: remove inactive sources.openembedded.org URLs
It was confirmed these mirrors were inactive in [1]. Remove them.
[1]: https://lore.kernel.org/r/
b9c4ddd5ae72ae21ee0b6e12fb1a1f63661c685c .camel@linuxfoundation.org
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Richard Purdie [Mon, 27 Apr 2026 21:28:49 +0000 (22:28 +0100)]
pseudo: Update 1.9.5 -> 1.9.6
Pulls in the changes:
* Makefile.in: Bump version to 1.9.6
* pseudo_util.c: Fix symlink processing for symlinkat and related
* test: Add test symlinkat and related
* ports/unix: realpath: Fix chroot processing
* test: Add test cases for canonicalize functions
* ports/unix: fts_open: Fix chroot behavior
* ports/unix: fts_*: Certain functions were incorrectly returning stat data
* test: Add fts test case
* test: Add test for linkat chroot path stripping
* linkat: Avoid a segmentation fault
* Only copy xattrs on a rename if it's cross-filesystem
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Viswanath Kraleti [Mon, 27 Apr 2026 10:30:40 +0000 (16:00 +0530)]
mirrors: switch Yocto Project mirrors to HTTPS
downloads.yoctoproject.org supports access over HTTPS, which provides
better security and reliability than HTTP.
Switch the default Yocto Project mirror URLs to use HTTPS instead of
HTTP to improve fetch reliability.
Signed-off-by: Viswanath Kraleti <viswanath.kraleti@oss.qualcomm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Mon, 27 Apr 2026 10:10:42 +0000 (12:10 +0200)]
ffmpeg: set status for 4 CVEs
These reappeared after update of sbom-cve-check tooling.
Fixed version found by links from Debian security tracker.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Wang Mingyu [Wed, 22 Apr 2026 10:36:26 +0000 (18:36 +0800)]
u-boot: upgrade 2026.01 -> 2026.04
CVE-2026-33243.patch
removed since it's included 2026.04
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Sun, 12 Apr 2026 03:57:57 +0000 (20:57 -0700)]
u-boot-tools: Add dependency on libyaml for dtschema validation
yamltree host tool, used to emit YAML from the DT, is now
built as part of the normal u-boot-tools build to support
the schema infrastructure
Fixes link errors like
| /usr/bin/ld: scripts/dtc/yamltree.o: in function `dt_to_yaml':
| yamltree.c:(.text+0x91b): undefined reference to `yaml_emitter_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x926): undefined reference to `yaml_emitter_set_output_file'
| /usr/bin/ld: yamltree.c:(.text+0x933): undefined reference to `yaml_stream_start_event_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x93e): undefined reference to `yaml_emitter_emit'
| /usr/bin/ld: yamltree.c:(.text+0x957): undefined reference to `yaml_document_start_event_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x962): undefined reference to `yaml_emitter_emit'
| /usr/bin/ld: yamltree.c:(.text+0x983): undefined reference to `yaml_sequence_start_event_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x98e): undefined reference to `yaml_emitter_emit'
| /usr/bin/ld: yamltree.c:(.text+0x9ab): undefined reference to `yaml_sequence_end_event_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x9b6): undefined reference to `yaml_emitter_emit'
| /usr/bin/ld: yamltree.c:(.text+0x9c8): undefined reference to `yaml_document_end_event_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x9d3): undefined reference to `yaml_emitter_emit'
| /usr/bin/ld: yamltree.c:(.text+0x9e3): undefined reference to `yaml_stream_end_event_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x9ee): undefined reference to `yaml_emitter_emit'
| /usr/bin/ld: yamltree.c:(.text+0x9fa): undefined reference to `yaml_emitter_delete'
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
João Marcos Costa [Fri, 24 Apr 2026 15:10:13 +0000 (17:10 +0200)]
soc-family.inc: improve clarity at MACHINEOVERRIDES's prepend
Use Python's ternary operator "A if condition else B".
Signed-off-by: João Marcos Costa <joaomarcos.costa@bootlin.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Zk47T [Thu, 23 Apr 2026 10:04:05 +0000 (17:04 +0700)]
oe-selftest: add test for useradd with only USERADD_DEPENDS
Add a test case to verify that a recipe inheriting useradd with only
USERADD_DEPENDS set (and no USERADD_PACKAGES) parses and builds
successfully. This validates the fix in useradd.bbclass for
[YOCTO #15863].
Signed-off-by: Nguyen Minh Tien <zizuzacker@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Zk47T [Thu, 23 Apr 2026 10:04:04 +0000 (17:04 +0700)]
meta-selftest: add usegroup-deponly recipe to test USERADD_DEPENDS only
Add a test recipe that inherits useradd and only sets USERADD_DEPENDS
without USERADD_PACKAGES to validate the fix for [YOCTO #15863].
The root bug is that useradd.bbclass unconditionally requires
USERADD_PACKAGES to be set, even when a recipe only needs to depend on
users/groups created by another recipe via USERADD_DEPENDS. This recipe
depends on creategroup1 for user gt1 and group grouptest, but does not
create any users/groups itself, exercising the code path fixed in the
previous commit.
Signed-off-by: Nguyen Minh Tien <zizuzacker@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Sam Kent [Tue, 21 Apr 2026 10:28:44 +0000 (11:28 +0100)]
package.py: fix kernel module file pre-filter and document strip asymmetry
Change the check to f.endswith(".ko"), consistent with strip_execs() and
with the /lib/modules/ guard already present in is_elf() and
splitdebuginfo().
Fixes [YOCTO #2348]
Signed-off-by: Sam Kent <sam.john.kent@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Tejas Kanfade [Tue, 21 Apr 2026 06:01:03 +0000 (11:31 +0530)]
pulseaudio: split pactl into a dedicated client subpackage
pactl is a client-side control utility and is required on
PipeWire-based systems for audio control. pactl was packaged
as part of pulseaudio-server, making it difficult to use
without also installing and enabling the pulseaudio daemon,
which can conflict with pipewire.
Move the pactl binary into a standalone pulseaudio-pactl subpackage
so it can be installed without pulling in the pulseaudio server.
Signed-off-by: Tejas Kanfade <tkanfade@qti.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Corentin Guillevic [Mon, 20 Apr 2026 14:31:55 +0000 (16:31 +0200)]
sanity: add check for own-mirrors/SOURCE_MIRROR_URL
The SOURCE_MIRROR_URL variable belongs to the own-mirrors class. However, the
user may forget to define it. This will cause the class to inject incorrect
content into PREMIRRORS, resulting in the following error:
ERROR: gettext-minimal-native-1.0-r0 do_fetch: Bitbake Fetcher Error: MalformedUrl('${SOURCE_MIRROR_URL}')
ERROR: Logfile of failure stored in: /path/to/tmp/work/x86_64-linux/gettext-minimal-native/1.0/temp/log.do_fetch.258066
ERROR: Task (/path/to/layers/poky/meta/recipes-core/gettext/gettext-minimal-native_1.0.bb:do_fetch) failed with exit code '1'
Add a check to the sanity class, to detect this case and raise an error.
Signed-off-by: Corentin Guillevic <corentin.guillevic@smile.fr>
Reviewed-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Bin Cao [Mon, 20 Apr 2026 02:42:37 +0000 (10:42 +0800)]
scripts/cve-json-to-text.py: simplify getopt argument parsing
Remove unused long options from getopt.getopt() call. The long options
"help", "input", and "output" were never handled in the option parsing
logic, so they are dead code.
Signed-off-by: Bin Cao <bin.cao.cn@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Li Wang [Fri, 24 Apr 2026 09:20:51 +0000 (17:20 +0800)]
perf: add PACKAGECONFIG for llvm
for avoiding to enable llvm option under uncommon condition,
make llvm controll under PACKAGECONFIG.
error log:
ERROR: perf-1.0-r2 do_package_qa: QA Issue: /usr/bin/trace contained in package perf requires libLLVM.so.2x.x(LLVM_2x.x)(64bit), but no providers found in RDEPENDS:perf? [file-rdeps]
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Trevor Gamblin [Thu, 23 Apr 2026 17:12:46 +0000 (13:12 -0400)]
python3-vcs-versioning: add ptest
The tests are in the 'testing_vcs' directory, so set PTEST_PYTEST_DIR
accordingly. Add setuptools, setuptools-scm, and git to the ptest
RDEPENDS, since many of the tests make use of them. Many of the skipped
tests depend on mercurial, but that's in meta-oe and not worth moving to
oe-core just for this.
Add python3-vcs-versioning to PTESTS_FAST in ptest-packagelists.inc,
since the suite only takes a few seconds.
We also need a custom run-ptest script for two reasons:
1. There is a 'vcs_versioning.test_api' used as a plugin. This is
mentioned in conftest.py but is intended to be picked up from
pyproject.toml, which we don't ship with the ptest image. Instead,
just add '-p vcs_versioning.test_api' to the pytest call.
2. The test logic tries to rewrite pytest's assertion failures, which
doesn't work well with our automake formatting. We can work around
this by telling pytest to output plain messages with --assert=plain.
Example test results:
|============================================================================
|Testsuite summary
|# TOTAL: 409
|# PASS: 364
|# SKIP: 44
|# XFAIL: 1
|# FAIL: 0
|# XPASS: 0
|# ERROR: 0
|DURATION: 3
|END: /usr/lib/python3-vcs-versioning/ptest
|2026-04-23T16:21
|STOP: ptest-runner
|TOTAL: 1 FAIL: 0
Signed-off-by: Trevor Gamblin <tgamblin@baylibre.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Trevor Gamblin [Thu, 23 Apr 2026 17:12:45 +0000 (13:12 -0400)]
maintainers.inc: add self for python3-uv-build
It's listed as unmaintained, so fix that.
Signed-off-by: Trevor Gamblin <tgamblin@baylibre.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Trevor Gamblin [Thu, 23 Apr 2026 17:12:44 +0000 (13:12 -0400)]
python3-setuptools-scm: upgrade 9.2.2 -> 10.0.5
Changelog: https://github.com/pypa/setuptools-scm/releases
Note that the releases page also includes notes for the vcs-versioning
module, which is published separately (and which setuptools-scm depends
on). The new python3-vcs-versioning recipe is added to dependency lists.
Also rework the DEPENDS list to match the same formatting as RDEPENDS.
Signed-off-by: Trevor Gamblin <tgamblin@baylibre.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Trevor Gamblin [Thu, 23 Apr 2026 17:12:43 +0000 (13:12 -0400)]
python3-vcs-versioning: add recipe
The setuptools-scm project[1] now ships a second module which can be
used independently of setuptools if desired. This is now a dependency
for setuptools-scm, so add a recipe for it.
Update the maintainers.inc file with the recipe and myself as
maintainer.
[1] https://github.com/pypa/setuptools-scm
Signed-off-by: Trevor Gamblin <tgamblin@baylibre.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Trevor Gamblin [Fri, 24 Apr 2026 18:41:05 +0000 (14:41 -0400)]
python3-urllib3: enable setuptools-scm 10.x
Backport a patch from upstream to allow python3-urllib3 2.6.3 to build
with python3-setuptools-scm 10.x, so that we can use an updated version
of that recipe.
Signed-off-by: Trevor Gamblin <tgamblin@baylibre.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Khem Raj [Thu, 16 Apr 2026 05:54:07 +0000 (22:54 -0700)]
libmpc: Upgrade to 1.4.0
- Add mpc_exp10, mpc_exp2, mpc_log2 functions
- Fix mpc_tan/mpc_tanh for large imaginary parts
- Fix mpc_pow imaginary sign with real inputs
- Fix mpc_fr_div/mpc_ui_div zero sign handling per C2Y draft
- Add pkg-config support
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Thu, 16 Apr 2026 05:54:06 +0000 (22:54 -0700)]
re2c: upgrade 4.4 -> 4.5.1
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Thu, 16 Apr 2026 05:54:05 +0000 (22:54 -0700)]
python3-lxml: upgrade 6.0.2 -> 6.0.4
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Thu, 16 Apr 2026 05:54:04 +0000 (22:54 -0700)]
python3-pdm: upgrade 2.26.6 -> 2.26.7
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Thu, 16 Apr 2026 05:54:03 +0000 (22:54 -0700)]
python3-pdm-backend: upgrade 2.4.7 -> 2.4.8
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Thu, 16 Apr 2026 05:54:02 +0000 (22:54 -0700)]
dos2unix: upgrade 7.5.4 -> 7.5.5
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Thu, 16 Apr 2026 05:54:01 +0000 (22:54 -0700)]
gn: upgrade to latest revision
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Leonardo Costa [Thu, 23 Apr 2026 12:40:30 +0000 (09:40 -0300)]
bluez5: add patches to fix 8.56 cli issues
On bluez5 5.86, the bluetoothctl cli interface does not work outside of
the dedicated shell to list controllers and devices [1]. These patches fix
the issue while version 5.87 is not published.
[1] https://github.com/bluez/bluez/issues/1896
Upstream-Status: Backport [https://github.com/bluez/bluez/commit/
b33e923b55e4d0e9d78a83cfcb541fd1f687ef54 ,
https://github.com/bluez/bluez/commit/
21e13976f2e375d701b8b7032ba5c1b2e56c305f ]
Signed-off-by: Leonardo Costa <leonardo.costa@toradex.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Moritz Haase [Thu, 23 Apr 2026 08:41:21 +0000 (10:41 +0200)]
cmake: upgrade 4.3.1 -> 4.3.2
Release notes are available at [0].
[0]: https://cmake.org/cmake/help/v4.3/release/4.3.html#id2
Signed-off-by: Moritz Haase <Moritz.Haase@bmw.de>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Peter Tatrai [Thu, 23 Apr 2026 07:17:01 +0000 (09:17 +0200)]
rust: fix codegen test failure on big-endian targets
The test tests/codegen-llvm/issues/multiple-option-or-permutations.rs
uses FileCheck to verify LLVM IR for Option::or operations on slices.
The CHECK-NEXT directives assumed a little-endian memory layout where
the Option discriminant is the low byte, emitting a simple:
trunc i16 %0 to i1
On big-endian targets (e.g. powerpc), the discriminant resides in the
high byte, so LLVM first emits an lshr before the trunc, causing the
test to fail.
Backport upstream fix from rust-lang/rust#151780 which introduces
BIG/LITTLE revisions with the only-endian-big / ignore-endian-big
directives (also backported via directive_names.rs change) to handle
both layouts correctly.
Fixes: rust-lang/rust#151718
Upstream-Status: Backport [https://github.com/rust-lang/rust/pull/151780]
Signed-off-by: Peter Tatrai <peter.tatrai.ext@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Vijay Anusuri [Thu, 23 Apr 2026 07:14:56 +0000 (12:44 +0530)]
avahi: Fix CVE-2026-34933
Pick patch according to [1]
[1] https://security-tracker.debian.org/tracker/CVE-2026-34933
[2] https://github.com/avahi/avahi/pull/891
[3] https://nvd.nist.gov/vuln/detail/CVE-2026-34933
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Wed, 22 Apr 2026 10:36:24 +0000 (18:36 +0800)]
python3-cryptography(-vectors): upgrade 46.0.5 -> 46.0.7
Add 0001-bump-uv_build-to-0.11.0.patch to bump uv_build version
0001-bump-uv_build-to-0.10.0-14271.patch
0001-pyproject.toml-bump-uv_build-version-requirement.patch
removed since they're not needed in 46.0.7
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:27 +0000 (17:55 +0800)]
libmicrohttpd: upgrade 1.0.2 -> 1.0.5
0001-Remove-broken-experimental-code.patch
removed since it's included in 1.0.5
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:59 +0000 (17:55 +0800)]
xserver-xorg: upgrade 21.1.21 -> 21.1.22
License-Update:
add author to HPND-sell-MIT-disclaimer-xserver
add missing paragraph to SGI-B-2.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:58 +0000 (17:55 +0800)]
wayland-protocols: upgrade 1.47 -> 1.48
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:57 +0000 (17:55 +0800)]
vala: upgrade 0.56.18 -> 0.56.19
Changelog
============
* Various improvements and bug fixes:
- codegen: Minor refactoring of TypeRegisterFunction and its subclasses
- codegen: Use G_TYPE_FLAG_NONE when targetting glib >= 2.74
- codegen: Use g_once_init_{enter,leave}_pointer when targetting glib >= 2.80
- codegen: Propagate default_value_on_error from parent struct
- codegen: Return default_value_on_error on precondition failures
- gdbus: Avoid unused variables in method call and properties getter/setter
- gdbus: Allow GLib.VariantDict for a{sv}
- gdbus: Do not provide unintended read/write access to properties
- parser: Fix statement error recovery
- vala: Use reference-transfer as needed when transforming
conditional-expression
- girwriter: Don't use instance-parameter inside function elements
- girwriter: Add the doc:format argument in the .gir file
- libvaladoc: Do not error-out on doc:format
- libvaladoc: Add compat layer for gvRenderData to cope with API break
* Bindings:
- glib-2.0: allow FileUtils.open_tmp's first argument to be null
- posix: add UTIME_{NOW,OMIT} constants for utimensat
- gsl: Deprecate gsl_linalg_cholesky_decomp in favour of
gsl_linalg_cholesky_decomp1
- libxml-2.0: Add more fields to ParserCtxt
- gobject-2.0: Set default_value{,_on_error} for GType
- glib-2.0: Fix *.add_once () callbacks
- gobject-2.0: Fix return type
- gobject-2.0: Add Type.to_string ()
- gstreamer-1.0: Fix ownership of Caps.full*() parameters
- glib-2.0: fix a typo in a parameter name
- gtk4: Update to 4.21.6+
83716767
- gtk4: Make all Gsk.RenderNode and Gsk.Renderer shadow their parent type
- gtk4: Fix CursorGetTextureCallback declaration
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:55 +0000 (17:55 +0800)]
stress-ng: upgrade 0.20.01 -> 0.21.00
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:54 +0000 (17:55 +0800)]
sqlite3: upgrade 3.51.3 -> 3.53.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:53 +0000 (17:55 +0800)]
resolvconf: upgrade 1.94 -> 1.95
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:52 +0000 (17:55 +0800)]
repo: upgrade 2.61.1 -> 2.62
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:50 +0000 (17:55 +0800)]
python3-zipp: upgrade 3.23.0 -> 3.23.1
License-Update: Copyright year updated to 2026
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:48 +0000 (17:55 +0800)]
python3-testtools: upgrade 2.8.7 -> 2.9.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:46 +0000 (17:55 +0800)]
python3-setuptools-rust: upgrade 1.12.0 -> 1.12.1
Changelog:
===========
- Migrate to trusted publishing.
- Strip target suffix for cargo-zigbuild compatibility.
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:45 +0000 (17:55 +0800)]
python3-pytest: upgrade 9.0.2 -> 9.0.3
Bug fixes
============
- #12444: Fixed pytest.approx which now correctly takes into account
~collections.abc.Mapping keys order to compare them.
- #13634: Blocking a conftest.py file using the -p no: option is now explicitly
disallowed.
- Previously this resulted in an internal assertion failure during plugin
loading.
- Pytest now raises a clear UsageError explaining that conftest files are not
plugins and cannot be disabled via -p.
- #13734: Fixed crash when a test raises an exceptiongroup with
__tracebackhide__ = True.
- #14195: Fixed an issue where non-string messages passed to
unittest.TestCase.subTest() were not printed.
- #14343: Fixed use of insecure temporary directory (CVE-2025-71176).
Improved documentation ======================
- #13388: Clarified documentation for -p vs PYTEST_PLUGINS plugin loading and
fixed an incorrect -p example.
- #13731: Clarified that capture fixtures (e.g. capsys and capfd) take
precedence over the -s / --capture=no command-line options in Accessing
captured output from a test function <accessing-captured-output>.
- #14088: Clarified that the default pytest_collection hook sets session.items
before it calls pytest_collection_finish, not after.
- #14255: TOML integer log levels must be quoted: Updating reference
documentation.
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:43 +0000 (17:55 +0800)]
python3-pygments: upgrade 2.19.2 -> 2.20.0
Changelog:
============
- New lexers:
* Rell
- Updated lexers:
* archetype: Fix catastrophic backtracking in GUID and ID patterns
* ASN.1: Recognize minus sign and fix range operator
* C++: Add C++26 keywords
* ComponentPascal: Fix "analyse_text"
* Coq renamed to Rocq
* Cython: Various improvements
* Debian control: Improve architecture parsing
* Devicetree: Add support for overlay/fragments, add bytestring support, fix catastrophic backtracking
* Fennel: Various improvements
* Haskell: Handle escape sequences in character literals
* Java: Add module keywords
* Lean4: Add operators "]'", "]?", "]!"
* LESS: Support single-line comments
* LilyPond: Update to 2.25.29
* LLVM: Support C-style comments
* Lua(u): Fix catastrophic backtracking
* Macaulay2: Update to 1.25.05, 1.25.11
* Mathematica: Various improvements
* meson: Add additional operators
* MySQL: Update keywords
* org-Mode: Support both schedule and deadline
* PHP: Add "__PROPERTY__" magic constant, add reserved keywords
* PostgreSQL: Add more keywords
* protobuf: Fix namespace tokenization
* Python: Add "t"-string support
* Tablegen: Fix infinite loop
* Tera Term macro: Add commands introduced in v5.3 through v5.6
* TOML: Support TOML 1.1.0
* Turtle: Allow empty comment lines
* XML: Added ".xbrl" as file ending
- Drop Python 3.8, and add Python 3.14 as a supported version
- Various improvements to "autopygmentize"
- Update "onedark" style to support more token types
- Update "rtt" style to support more token types
- Cache entry points to improve performance
- Fix "xterm-256" color table
- Fix "kwargs" dictionary getting mutated on each call
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:42 +0000 (17:55 +0800)]
python3-pyasn1: upgrade 0.6.2 -> 0.6.3
Changelog:
==========
- CVE-2026-30922 (GHSA-jr27-m4p2-rc6r): Added nesting depth limit to ASN.1
decoder to prevent stack overflow from deeply nested structures
- Fixed OverflowError from oversized BER length field
- Fixed DeprecationWarning stacklevel for deprecated attributes
- Fixed asDateTime incorrect fractional seconds parsing
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:41 +0000 (17:55 +0800)]
python3-poetry-core: upgrade 2.3.1 -> 2.3.2
Changed
========
- Update list of supported licenses (#917).
Fixed
======
- Fix an issue where platform_release could not be parsed on Debian Trixie
- Fix an issue where using project.readme.text in the pyproject.toml file
resulted in broken metadata
- Fix an issue where dependency groups were considered equal when their
resolved dependencies were equal, even if the groups themselves were not
- Fix an issue where removing a dependency from a group that included another
group resulted in other dependencies being added to the included group
- Fix an issue where PEP 735 include-group entries were lost when
[tool.poetry.group] also defined include-groups for the same group
- Fix an issue where the union of <value> not in <marker> constraints was
wrongly treated as always satisfied
- Fix an issue where a post release with a local version identifier was wrongly
allowed by a > version constraint
- Fix an issue where a version with the local version identifier 0 was treated
as equal to the corresponding public version
- Fix an issue where a != <version> constraint wrongly disallowed pre releases
and post releases of the specified version
- Fix an issue where in and not in constraints were wrongly not allowed by
specific compound constraints
- Fix an issue where data entries in generated setup.py files were duplicated
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:38 +0000 (17:55 +0800)]
python3-maturin: upgrade 1.12.4 -> 1.13.1
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:36 +0000 (17:55 +0800)]
python3-editables: upgrade 0.5 -> 0.6
License-Update: Line endings in the license file were changed from CRLF to LF.
Changelog:
==========
- Add a new "self_replace" strategy for map (and name the old strategy
"import_hook"). Based on an idea
- Rename the generated .pth file to _editable_impl_<project>.pth and document
that it is possible to customise the file names used.
- Rework the documentataion, replacing the "use cases" section with an expanded
and less opinionated "scope" section.
- Test suite improvements.
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:35 +0000 (17:55 +0800)]
python3-dtschema: upgrade 2025.12 -> 2026.4
Changelog:
===========
- New PCI bridge properties
- New linux,dmcryptkeys chosen property
- Relax simple-bus schema to have unit-addresses with chip-select number
and offset
- Avoid backtrace on missing $ref. Instead the missing ref will cause a
validation warning.
- Print the property name on decode failures
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:33 +0000 (17:55 +0800)]
python3-build: upgrade 1.4.0 -> 1.4.3
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:32 +0000 (17:55 +0800)]
pciutils: upgrade 3.14.0 -> 3.15.0
Changelog:
==========
* New capabilities are decoded: MMIO Register Block Locator,
Flit Error Injection, Flit Logging.
* Decoding of PCIe capabilities updated to Gen7.
* Both lspci and setpci warn when the "-s" or "-d" option
is given multiple times.
* Improved display of interrupts in "lspci -vv". Routing of
interrupt pins is shown only if the pins are not disabled.
Routing of MSI(X) interrupts is shown when available
(which is currently supported by the sysfs back-end only).
* Minor improvements to Windows back-ends.
* The dump back-end can read the dump from stdin when given "-"
as a file name.
* FreeBSD supports 64-bit addresses.
* Added README.DJGPP.
* Updated pci.ids.
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:31 +0000 (17:55 +0800)]
pango: upgrade 1.57.0 -> 1.57.1
Bugs fixed:
- #867 Bad font substitution causes application crashes
- #869 MacOS: subprojects/cairo/meson.build:1:0: ERROR: Value "gnu11,c11" (of
type "string") (sid)
- #870 MacOS: subprojects/pango/utils/viewer-cocoa.m:23:10: fatal error:
'cairo/cairo.h' file not found (sid)
- #871 gtk4-widget-factory crashes with pango error on macOS when an emoji is
entered into a text field
- #876 Inconsistency between documentation and code in
pango_context_set_font_description
- #882 The hex box characters generated in PDF can not be copied
- #885 warning: assignment discards 'const' qualifier from pointer target type
[-Wdiscarded-qualifiers]
- !884 Revert "meson: Rework introspection handling"
- !890 Update the code to support Unicode 17.0.0
- !892 Include fcfreetype.h where needed
- !893 meson: Update freetype2 wrap to fix ci warnings
- !894 Respect explicit language attribute when itemizing
- !895 Fix some subproject woes
- !896 meson: Add support for cross-compiling using Apple subsystems
- !897 (break.c) pass sentences to handle_sentences
- !898 add support for g_autoptr(PangoScriptIter)
- !900 fontmap: Mark get_family as nullable
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:30 +0000 (17:55 +0800)]
meson: upgrade 1.10.2 -> 1.11.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:28 +0000 (17:55 +0800)]
lzip: upgrade 1.25 -> 1.26
Changelog:
===========
- '-dvv' and '-tvv' now print (de)compressed sizes instead of compression
ratio. (Sizes are more informative than compression ratio).
- Large numbers in option arguments are now accepted with underscore
separators (-s 123_456_789).
- Large numbers are now printed with underscore separators (123_456_789).
- '-h' now prints a short help screen containing only the command-line
options. For full help, use '--help'.
- '--list' now can safely skip any trailing data added to a lzip file by the
option '--append' of lziprecover.
- '--list' now prints '+t' after the number of members to indicate the
presence of trailing data, and prints the size of the trailing data below
the size of the last member.
- '-lvv' now prints a blank line between the list of members of each
multimember file and the next file.
- Several improvements suggested by John Gilmore have been made to the manual.
- 'EXIT STATUS' now has its own section in the man page.
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:26 +0000 (17:55 +0800)]
libcap: upgrade 2.77 -> 2.78
Changelog:
===========
- Fix a security vulnerability (CVE-2026-4878).
- Fix a typo in a capset error
- Reverted some build macrology to get back to something that worked (admittedly sub-optimally).
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:25 +0000 (17:55 +0800)]
libadwaita: upgrade 1.8.4 -> 1.9.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:24 +0000 (17:55 +0800)]
hwdata: upgrade 0.405 -> 0.406
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:23 +0000 (17:55 +0800)]
gtk4: upgrade 4.22.1 -> 4.22.2
Bugs fixed:
- #8117 Docs for the new SVG parser?
- #8119 Wrong colors used for fallback symbolic icons containing classes
- #8125 svg: Animating hrefs does not work
- !9590 vulkan: fix GDK_VULKAN_FEATURE_SWAPCHAIN_MAINTENANCE check
- !9660 Various Vulkan fixes
- !9665 tests: fix libtestutils build under Windows.
- !9667 Update Serbian translation
- !9678 testsuite: Add dmabuf compare tests to needs-udmabuf suite
- !9681 dmabuf: Support dmabufs with fewer fds than planes
- !9682 Update Galician translation
- !9701 Update Turkish translation
- !9704 Update Catalan translation
- !9711 Load less icons as symbolics
- !9719 Fix traditional symbolic fallback
- !9736 svg: Fix invalidation
- !9739 Assorted backports
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:22 +0000 (17:55 +0800)]
gtk+3: upgrade 3.24.51 -> 3.24.52
* Bugs fixed:
- #6306 [GTK3] Zlib required when broadway is enabled.
- #7796 [GTK 3] Invalid a11y events when calling `gtk_tree_view_set_cursor` on
an unfocused GtkTreeView
- #7976 Firefox crashes at gdk_wayland_drag_context_manage_dnd() when missing
toplevel wl_surface
- #8103 gtk3 refresh_rate calculation overflows on 32-bit targets
- #8114 Images for recolored icons are constantly being reloaded
- GNOME/gimp#14901 Wild strobing in multi window mode
- GNOME/gimp#15480 GIMP does not focus on dialogue boxes on Mac
- !7332 quartz: add automagic uti<->mime conversion for clipboard
- !8216 Fix position of child tooltips in GTK3 custom windows
- !9005 a11y: Don't send focus-related events for unfocused treeview
- !9012 quartz: gtkwindow - fix windows fighting focus
- !9022 gtkmenu: Await more motion events before deactivating on release
- !9044 wayland: Handle XKB initialization failures gracefully
- !9067 gdk/win32: Add missing EGL conditional compilation guard
- !9098 gdk: do not run gdk_wayland_window_export_handle() callback when
window is already destroyed.
- !9119 Declare an explicit dependency on zlib when broadway is enabled
- !9141 [GTK 3] wayland: Try to open the display even if XDG_RUNTIME_DIR is
unset
- !9155 [gtk3] emoji: Update data to CLDR 48
- !9214 display/wayland: Gracefully handle dispose being called twice
- !9284 gdk/wayland: Map stylus buttons for BTN_BACK and BTN_FORWARD (Peter
Hutterer)
- !9322 [Quartz] Fix dialog keyboard focus while preventing focus fighting
- !9344 Fix a couple of leaks
- !9394 gdk/wayland: Map stylus buttons for BTN_BACK and BTN_FORWARD
- !9397 wayland: Avoid a crash
- !9600 Replace outdated freedesktop.org Window Manager spec links
- !9676 x11: fix overflow in refresh_rate calculation on 32-bit systems
- !9706 cssimage: Store and reuse icon info for recolored images
- !9707 wayland: Fix uninitialized value when no cursor
- !9708 fontchooser: Fix signedness of axes count
- !9709 fontchooser: Remove const on float return values
- !9710 print: Remove unused variable
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:21 +0000 (17:55 +0800)]
gsettings-desktop-schemas: upgrade 50.0 -> 50.1
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:20 +0000 (17:55 +0800)]
groff: upgrade 1.24.0 -> 1.24.1
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:19 +0000 (17:55 +0800)]
ghostscript: upgrade 10.06.0 -> 10.07.0
0001-Fix-32-bit-build.patch
removed since it's included in 10.07.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:18 +0000 (17:55 +0800)]
fastfloat: upgrade 8.2.4 -> 8.2.5
Changelog:
==========
- Fix Bazel build with bzlmod
- Replace std::min with ternary operators to avoid dependency
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:17 +0000 (17:55 +0800)]
epiphany: upgrade 49.7 -> 50.3
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:15 +0000 (17:55 +0800)]
diffoscope: upgrade 314 -> 317
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:14 +0000 (17:55 +0800)]
dhcpcd: upgrade 10.3.0 -> 10.3.1
Changelog:
==========
- BSD: don't send uninitialised memory using ps_root_indirectioctl
- Fix fallback_time option
- IPv4: Ignore DHCP state when building routes
- options: Ensure ldop is not NULL dereferenced
- route: Routes may not have an
- options: Ensure that an overly long bitflag string does not crash
- options: Don't assume vsio options have an argument
- common: Cast via uintptr_t rather than unsigned long
- privsep: Ensure we recv for real after a successful recv MSG_PEEK
- DHCP: Add parentheses to macro definitions
- ipv6nd: empty IPV6RA_EXPIRE eloop queue when dropping
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:13 +0000 (17:55 +0800)]
ccache: upgrade 4.13.2 -> 4.13.3
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:12 +0000 (17:55 +0800)]
adwaita-icon-theme: upgrade 49.0 -> 50.0
Changelog:
============
- use old format of the legacy icons for gtk3
- reintroduce legacy icons because themes
- symbolic:battery icons no longer fuzzy
- build: Windows build
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:11 +0000 (17:55 +0800)]
acpica: upgrade
20251212 ->
20260408
License-Update: Copyright year updated to 2026
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Richard Purdie [Thu, 16 Apr 2026 12:49:03 +0000 (13:49 +0100)]
useradd: Switch from --root to --prefix option
Whilst assessing where we use chroot (which requires superuser privileges),
I realised that shadow's utilities we use have the option of specifing
a prefix for files. This provides the same outcome but avoids the chroot
call. Whist we can emulate that under pseudo, it is probably nicer to avoid
doing that and use the prefix option instead.
Therefore switch --root -> --prefix
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Ross Burton [Thu, 23 Apr 2026 11:11:05 +0000 (12:11 +0100)]
classes/base: add explicit bzip2-native dependency for unpacking .bz2
Currently this is in ASSUME_PROVIDED and HOSTTOOLS so doesn't have any
effect, but declaring the dependency is the right thing to do.
Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sat, 25 Apr 2026 09:37:05 +0000 (11:37 +0200)]
expat: upgrade 2.7.5 -> 2.8.0
Release notes: [1]
Handles CVE-2026-41080
[1] https://github.com/libexpat/libexpat/blob/R_2_8_0/expat/Changes
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 19:26:28 +0000 (21:26 +0200)]
sed: upgrade 4.9 -> 4.10
Solves CVE-2026-5958.
Release notes: [1]
License-Update: copyright years refreshed
[1] https://gitweb.git.savannah.gnu.org/gitweb/?p=sed.git;a=blob_plain;f=NEWS;hb=v4.10
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 18:50:24 +0000 (20:50 +0200)]
ovmf: set status for 7 CVEs
These reappeared after last update of sbom-cve-check tooling.
"fixed-in" release was determined by following links in Debian CVE
reports except CVE-2025-2295 which was taken from Yocto master CVE
patch.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 18:50:22 +0000 (20:50 +0200)]
cargo: set CVE_PRODUCT
This removes mediawiki:cargo CVEs from CVE metrics.
* CVE-2026-39837, CVE-2026-39839, CVE-2026-39840, CVE-2026-39841
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 18:50:21 +0000 (20:50 +0200)]
cargo: set status of CVE-2023-40030
sbom-cve-check has problem matching version 1.72.
It works only if cvelistV5 is modified to indicate 1.72.0.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 19:12:08 +0000 (21:12 +0200)]
git: set status of 5 CVEs
It is unclear why entries in cvelistV5 cause these CVEs to appear in CVE
reports.
There is one which should also not be shown per listed CPEs, however it
does not have a patch, so it's not added to the list - CVE-2024-52005.
The others are set to fixed with version based on which .0 release
included patch mentioned in Debian security tracker for respective CVE.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:53 +0000 (14:02 +0200)]
python3-requests: set status for CVE-2024-47081
NVD [1] does not have CPE set.
Debian [2] shows comit from v2.32.4 as fix.
cvelistV5 [3] also says "< 2.32.4" however for cpe psf:requests.
Not sure why this is shown in CVE metrics.
[1] https://nvd.nist.gov/vuln/detail/CVE-2024-47081
[2] https://security-tracker.debian.org/tracker/CVE-2024-47081
[3] https://github.com/CVEProject/cvelistV5/blob/main/cves/2024/47xxx/CVE-2024-47081.json
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:52 +0000 (14:02 +0200)]
python3-requests: set status for CVE-2024-35195
NVD [1] does not have CPE set.
Debian [2] shows comit from v2.32.0 as fix.
cvelistV5 [3] also says "< 2.32.0", posibly "defaultStatus": "unknown"
is causing it to appear in CVE metrics...
[1] https://nvd.nist.gov/vuln/detail/CVE-2024-35195
[2] https://security-tracker.debian.org/tracker/CVE-2024-35195
[3] https://github.com/CVEProject/cvelistV5/blob/main/cves/2024/35xxx/CVE-2024-35195.json
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:51 +0000 (14:02 +0200)]
rsync: set status for CVE-2024-12084
Debian security tracker [1] says it's fixed in v3.4.0.
NVD [2] does not say that our version is vulnerable.
The CVE is reported probably because cvelistV5 has many CPE groups and
some of them are unparseable (so assumes vulnerable).
[1] https://security-tracker.debian.org/tracker/CVE-2024-12084
[2] https://nvd.nist.gov/vuln/detail/CVE-2024-12084
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:50 +0000 (14:02 +0200)]
base-files: set status for CVE-2018-6557
CPE in NVD [1] shows ubuntu.
Debian [1] says "Ubuntu specific motd update code".
cvelistV5 has unparseable CPE so it sbom-cve-check assumes vulnerable
("lessThan": "10.1ubuntu2.2").
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:49 +0000 (14:02 +0200)]
bind: set status for CVE-2017-3139
NVD [1] has only redhat cpes.
Debian [2] says RHEL6 specific.
cvelistV5 [3] has unparseable (so assumes affected):
"version": "shipped in Red Hat Enterprise Linux 6"
[1] https://nvd.nist.gov/vuln/detail/CVE-2017-3139
[2] https://security-tracker.debian.org/tracker/CVE-2017-3139
[3] https://github.com/CVEProject/cvelistV5/blob/main/cves/2017/3xxx/CVE-2017-3139.json
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:48 +0000 (14:02 +0200)]
cve-extra-exclusions: ignore CVE-2019-2708
Yet another CVE for berkeley DB, ignore as all others.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:47 +0000 (14:02 +0200)]
gnutls: set status for CVE-2026-1584
This is a version-less RedHat CVE.
Per Debian security tracker [1] this is fixed in 3.8.12.
[1] https://security-tracker.debian.org/tracker/CVE-2026-1584
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:46 +0000 (14:02 +0200)]
harfbuzz: set status for CVE-2024-56732
This CVE does not have cpe in NVD DB.
In cvelistV5 it shows "version": ">= 8.5.0, <= 10.0.1" which is not
parseable with our tooling.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sat, 25 Apr 2026 22:26:34 +0000 (00:26 +0200)]
libva: set status for CVE-2023-39929
This CVE is reported as open because NVD has no cpe and cvelistV5 has
unparseable "version": "before version 2.20.0".
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sat, 25 Apr 2026 22:26:33 +0000 (00:26 +0200)]
p11-kit: set status for CVE-2026-2100
This is a Redhat version-less CVE in NVD DB.
Per [1] this is fixed in 0.26.2.
[1] https://security-tracker.debian.org/tracker/CVE-2026-2100
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sat, 25 Apr 2026 22:26:32 +0000 (00:26 +0200)]
python3-setuptools: set status for CVE-2024-6345
Current version of sbom-cve-check reports this for some reason.
NVD does not have CPE and cvelistV5 ([1]) says "lessThan": "70.0".
[1] https://github.com/CVEProject/cvelistV5/blob/main/cves/2024/6xxx/CVE-2024-6345.json
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sat, 25 Apr 2026 22:26:31 +0000 (00:26 +0200)]
ruby: set status for CVE-2025-0306
This is a version-less Redhat CVE, so explicit status is needed.
Per [1] the issue is mitigated by using openssl >= 3.2.0.
[1] https://bugzilla.redhat.com/show_bug.cgi?id=
2336100
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sat, 25 Apr 2026 22:26:30 +0000 (00:26 +0200)]
shadow: set CVE_PRODUCT
This will remove CVE-2016-15024 from open cve reports.
This CVE for is for "doomsider:shadow" [1].
It will also remove
* CVE-2018-16588 (suse:shadow, [2])
* CVE-2019-16110 (blade-group:shadow [3])
which can be verified that they don't affect Yocto shadow.
[1] https://security-tracker.debian.org/tracker/CVE-2016-15024
[2] https://security-tracker.debian.org/tracker/CVE-2018-16588
[3] https://security-tracker.debian.org/tracker/CVE-2019-16110
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Richard Purdie [Thu, 23 Apr 2026 20:44:21 +0000 (21:44 +0100)]
build-appliance-image: Update to master head revisions
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Richard Purdie [Thu, 23 Apr 2026 11:07:45 +0000 (12:07 +0100)]
base/bitbake.conf: Rework DISTRO_FEATURES and MACHINE_FEATURES default handling
The existing code for handling defaults in distro/machine features
triggers from anonymous python in base.bbclass.
Anonymous python is executed after all inherits including deferred inherits
are processed. This means conditional inherits can't use DISTRO_FEATURES
or MACHINE_FEATURES which is contra to user expectations. This leads to
a hard to understand failure mode.
Whilst it isn't as performant, we can handle the features using inline
python function calls. This patch switches to execute the code that way.
These changes depend on a new function in bb.utils (filter_string).
filter_default_features is changed to return a string rather than
set it and the tests for it are updated to match.
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Richard Purdie [Thu, 23 Apr 2026 13:31:56 +0000 (14:31 +0100)]
sanity.conf: Depend on bitbake 2.18
In readiness for release and due to the distro_features fix which needs
bb.utils.filter_string(), update to depend on bitbake 2.18.0
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:17 +0000 (11:32 -0400)]
linux-yocto/6.18: update CVE exclusions (6.18.24)
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 9101 changes (4 new | 9097 updated): - 4 new CVEs: CVE-2025-70994, CVE-2026-35225, CVE-2026-41460, CVE-2026-41461 - 9097 updated CVEs: CVE-2018-25259, CVE-2018-25267, CVE-2022-41650, CVE-2022-43472, CVE-2022-44578, CVE-2022-45806, CVE-2022-45819, CVE-2022-45832, CVE-2022-45840, CVE-2022-45841, CVE-2022-46795, CVE-2022-46796, CVE-2022-46807, CVE-2022-46811, CVE-2022-46838, CVE-2022-46840, CVE-2022-46846, CVE-2022-47168, CVE-2022-47176, CVE-2022-47182, CVE-2022-47429, CVE-2022-47594, CVE-2022-47601, CVE-2023-22697, CVE-2023-22701, CVE-2023-22708, CVE-2023-23715, CVE-2023-23716, CVE-2023-23725, CVE-2023-23726, CVE-2023-23729, CVE-2023-23814, CVE-2023-23823, CVE-2023-23825, CVE-2023-23834, CVE-2023-23868, CVE-2023-23886, CVE-2023-23887, CVE-2023-23893, CVE-2023-23895, CVE-2023-23975, CVE-2023-23986, CVE-2023-23987, CVE-2023-23989, CVE-2023-24375, CVE-2023-24407, CVE-2023-25026, CVE-2023-25035, CVE-2023-25037, CVE-2023-25048, CVE-2023-25060, CVE-2023-25067, CVE-2023-25068, CVE-2023-25445, CVE-2023-25446, CVE-2023-25454, CVE-2023-25455, CVE-2023-25469, CVE-2023-25486, CVE-2023-25703, CVE-2023-25714, CVE-2023-25791, CVE-2023-25959, CVE-2023-25966, CVE-2023-25988, CVE-2023-25993, CVE-2023-25995, CVE-2023-25997, CVE-2023-25998, CVE-2023-25999, CVE-2023-26000, CVE-2023-26001, CVE-2023-26002, CVE-2023-26003, CVE-2023-26005, CVE-2023-26520, CVE-2023-26522, CVE-2023-27428, CVE-2023-27449, CVE-2023-27454, CVE-2023-27456, CVE-2023-27609, CVE-2023-27625, CVE-2023-27626, CVE-2023-28165, CVE-2023-28168, CVE-2023-28416, CVE-2023-28417, CVE-2023-28532, CVE-2023-28534, CVE-2023-28536, CVE-2023-28619, CVE-2023-28689, CVE-2023-28990, CVE-2023-29173, CVE-2023-29235, CVE-2023-29237, CVE-2023-29239, CVE-2023-29422, CVE-2023-29429, CVE-2023-29431, CVE-2023-29433, CVE-2023-30476, CVE-2023-30479, CVE-2023-30486, CVE-2023-30488, CVE-2023-30490, CVE-2023-30783, CVE-2023-30870, CVE-2023-30873, CVE-2023-30874, CVE-2023-31073, CVE-2023-31078, CVE-2023-31214, CVE-2023-32094, CVE-2023-32117, CVE-2023-32126, CVE-2023-32240, CVE-2023-32293, CVE-2023-32299, CVE-2023-32506, CVE-2023-32507, CVE-2023-32519, CVE-2023-32520, CVE-2023-32574, CVE-2023-32581, CVE-2023-32585, CVE-2023-32586, CVE-2023-32593, CVE-2023-32599, CVE-2023-32601, CVE-2023-32798, CVE-2023-32963, CVE-2023-33215, CVE-2023-33324, CVE-2023-33928, CVE-2023-33994, CVE-2023-33995, CVE-2023-33996, CVE-2023-33998, CVE-2023-34009, CVE-2023-34014, CVE-2023-34019, CVE-2023-34376, CVE-2023-34381, CVE-2023-34387, CVE-2023-35037, CVE-2023-35040, CVE-2023-35046, CVE-2023-35051, CVE-2023-35052, CVE-2023-35091, CVE-2023-35777, CVE-2023-35875, CVE-2023-36385, CVE-2023-36506, CVE-2023-36509, CVE-2023-36510, CVE-2023-36518, CVE-2023-36519, CVE-2023-36526, CVE-2023-36528, CVE-2023-36531, CVE-2023-36680, CVE-2023-36681, CVE-2023-37885, CVE-2023-37886, CVE-2023-37887, CVE-2023-37967, CVE-2023-37969, CVE-2023-37971, CVE-2023-37984, CVE-2023-37987, CVE-2023-37989, CVE-2023-38383, CVE-2023-38385, CVE-2023-38475, CVE-2023-38477, CVE-2023-38479, CVE-2023-38480, CVE-2023-38483, CVE-2023-38512, CVE-2023-38514, CVE-2023-39305, CVE-2023-39920, CVE-2023-39994, CVE-2023-39995, CVE-2023-39996, CVE-2023-39997, CVE-2023-40001, CVE-2023-40003, CVE-2023-40005, CVE-2023-40011, CVE-2023-40203, CVE-2023-40205, CVE-2023-40209, CVE-2023-40213, CVE-2023-40331, CVE-2023-40334, CVE-2023-40670, CVE-2023-40678, CVE-2023-41130, CVE-2023-41132, CVE-2023-41133, CVE-2023-41649, CVE-2023-41664, CVE-2023-41671, CVE-2023-41683, CVE-2023-41686, CVE-2023-41688, CVE-2023-41689, CVE-2023-41690, CVE-2023-41695, CVE-2023-41729, CVE-2023-41730, CVE-2023-41802, CVE-2023-41803, CVE-2023-41848, CVE-2023-41849, CVE-2023-41857, CVE-2023-41862, CVE-2023-41865, CVE-2023-41866, CVE-2023-41869, CVE-2023-41870, CVE-2023-41873, CVE-2023-41875, CVE-2023-41951, CVE-2023-41952, CVE-2023-44142, CVE-2023-44147, CVE-2023-44149, CVE-2023-44258, CVE-2023-44988, CVE-2023-45002, CVE-2023-45045, CVE-2023-45061, CVE-2023-45101, CVE-2023-45104, CVE-2023-45110, CVE-2023-45271, CVE-2023-45272, CVE-2023-45275, CVE-2023-45631, CVE-2023-45633, CVE-2023-45636, CVE-2023-45649, CVE-2023-45760, CVE-2023-45765, CVE-2023-45766, CVE-2023-45828, CVE-2023-46073, CVE-2023-46079, CVE-2023-46080, CVE-2023-46082, CVE-2023-46083, CVE-2023-46188, CVE-2023-46195, CVE-2023-46196, CVE-2023-46203, CVE-2023-46206, CVE-2023-46309, CVE-2023-46605, CVE-2023-46606, CVE-2023-46607, CVE-2023-46608, CVE-2023-46609, CVE-2023-46610, CVE-2023-46611, CVE-2023-46612, CVE-2023-46616, CVE-2023-46628, CVE-2023-46631, CVE-2023-46632, CVE-2023-46633, CVE-2023-46635, CVE-2023-46637, CVE-2023-46639, CVE-2023-46644, CVE-2023-47179, CVE-2023-47180, CVE-2023-47183, CVE-2023-47187, CVE-2023-47188, CVE-2023-47224, CVE-2023-47225, CVE-2023-47241, CVE-2023-47515, CVE-2023-47517, CVE-2023-47523, CVE-2023-47525, CVE-2023-47557, CVE-2023-47647, CVE-2023-47648, CVE-2023-47661, CVE-2023-47689, CVE-2023-47692, CVE-2023-47693, CVE-2023-47694, CVE-2023-47698, CVE-2023-47756, CVE-2023-47759, CVE-2023-47760, CVE-2023-47761, CVE-2023-47762, CVE-2023-47763, CVE-2023-47764, CVE-2023-47776, CVE-2023-47778, CVE-2023-47780, CVE-2023-47793, CVE-2023-47805, CVE-2023-47807, CVE-2023-47820, CVE-2023-47823, CVE-2023-47826, CVE-2023-47830, CVE-2023-47832, CVE-2023-47836, CVE-2023-47838, CVE-2023-47841, CVE-2023-47847, CVE-2023-47849, CVE-2023-47869, CVE-2023-47871, CVE-2023-48274, CVE-2023-48277, CVE-2023-48286, CVE-2023-48287, CVE-2023-48324, CVE-2023-48332, CVE-2023-48739, CVE-2023-48740, CVE-2023-48750, CVE-2023-48758, CVE-2023-48774, CVE-2023-48775, CVE-2023-48776, CVE-2023-48779, CVE-2023-49154, CVE-2023-49156, CVE-2023-49158, CVE-2023-49167, CVE-2023-49192, CVE-2023-49193, CVE-2023-49194, CVE-2023-49196, CVE-2023-49754, CVE-2023-49755, CVE-2023-49756, CVE-2023-49757, CVE-2023-49758, CVE-2023-49817, CVE-2023-49818, CVE-2023-49831, CVE-2023-49832, CVE-2023-49835, CVE-2023-49845, CVE-2023-49848, CVE-2023-49849, CVE-2023-49850, CVE-2023-49851, CVE-2023-49856, CVE-2023-49857, CVE-2023-49858, CVE-2023-49859, CVE-2023-49861, CVE-2023-50373, CVE-2023-50375, CVE-2023-50850, CVE-2023-50854, CVE-2023-50876, CVE-2023-50877, CVE-2023-50882, CVE-2023-50884, CVE-2023-50887, CVE-2023-50899, CVE-2023-50903, CVE-2023-50904, CVE-2023-50905, CVE-2023-51353, CVE-2023-51355, CVE-2023-51357, CVE-2023-51359, CVE-2023-51360, CVE-2023-51362, CVE-2023-51484, CVE-2023-51486, CVE-2023-52135, CVE-2023-52190, CVE-2024-10676, CVE-2024-11402, CVE-2024-1435, CVE-2024-22145, CVE-2024-22162, CVE-2024-22289, CVE-2024-22307, CVE-2024-23500, CVE-2024-23506, CVE-2024-23507, CVE-2024-24831, CVE-2024-24833, CVE-2024-24871, CVE-2024-24878, CVE-2024-25100, CVE-2024-25599, CVE-2024-25932, CVE-2024-27188, CVE-2024-27193, CVE-2024-27195, CVE-2024-27949, CVE-2024-27950, CVE-2024-27965, CVE-2024-27971, CVE-2024-27987, CVE-2024-27993, CVE-2024-27994, CVE-2024-27997, CVE-2024-27998, CVE-2024-28000, CVE-2024-29093, CVE-2024-29095, CVE-2024-29125, CVE-2024-29134, CVE-2024-29136, CVE-2024-29137, CVE-2024-29138, CVE-2024-29777, CVE-2024-29792, CVE-2024-29921, CVE-2024-29931, CVE-2024-2889, CVE-2024-30178, CVE-2024-30182, CVE-2024-30193, CVE-2024-30194, CVE-2024-30197, CVE-2024-30199, CVE-2024-30221, CVE-2024-30229, CVE-2024-30236, CVE-2024-30238, CVE-2024-30244, CVE-2024-30245, CVE-2024-30422, CVE-2024-30424, CVE-2024-30425, CVE-2024-30428, CVE-2024-30435, CVE-2024-30488, CVE-2024-30493, CVE-2024-30503, CVE-2024-30505, CVE-2024-30529, CVE-2024-30534, CVE-2024-31246, CVE-2024-31281, CVE-2024-31303, CVE-2024-31359, CVE-2024-31373, CVE-2024-31374, CVE-2024-31376, CVE-2024-31382, CVE-2024-31421, CVE-2024-31424, CVE-2024-31433, CVE-2024-31924, CVE-2024-31929, CVE-2024-31942, CVE-2024-32082, CVE-2024-32090, CVE-2024-32101, CVE-2024-32126, CVE-2024-32140, CVE-2024-32141, CVE-2024-32433, CVE-2024-32435, CVE-2024-32444, CVE-2024-32445, CVE-2024-32505, CVE-2024-32507, CVE-2024-32523, CVE-2024-32553, CVE-2024-32555, CVE-2024-32564, CVE-2024-32566, CVE-2024-32568, CVE-2024-32573, CVE-2024-32589, CVE-2024-32599, CVE-2024-32679, CVE-2024-32698, CVE-2024-32699, CVE-2024-32701, CVE-2024-32702, CVE-2024-32703, CVE-2024-32704, CVE-2024-32705, CVE-2024-32706, CVE-2024-32711, CVE-2024-32719, CVE-2024-32725, CVE-2024-32778, CVE-2024-32782, CVE-2024-32791, CVE-2024-32792, CVE-2024-32796, CVE-2024-32810, CVE-2024-32815, CVE-2024-32817, CVE-2024-32824, CVE-2024-32825, CVE-2024-32832, CVE-2024-32836, CVE-2024-32956, CVE-2024-32959, CVE-2024-32961, CVE-2024-33568, CVE-2024-33570, CVE-2024-33571, CVE-2024-33572, CVE-2024-33648, CVE-2024-33678, CVE-2024-33689, CVE-2024-33907, CVE-2024-33939, CVE-2024-34371, CVE-2024-34373, CVE-2024-34385, CVE-2024-34438, CVE-2024-34443, CVE-2024-34444, CVE-2024-34546, CVE-2024-34556, CVE-2024-34557, CVE-2024-34569, CVE-2024-34757, CVE-2024-34763, CVE-2024-34770, CVE-2024-34794, CVE-2024-34795, CVE-2024-34800, CVE-2024-34801, CVE-2024-34807, CVE-2024-34812, CVE-2024-34813, CVE-2024-34814, CVE-2024-34815, CVE-2024-34819, CVE-2024-34821, CVE-2024-34826, CVE-2024-34828, CVE-2024-35169, CVE-2024-35172, CVE-2024-35633, CVE-2024-35637, CVE-2024-35639, CVE-2024-35645, CVE-2024-35646, CVE-2024-35650, CVE-2024-35653, CVE-2024-35655, CVE-2024-35659, CVE-2024-35664, CVE-2024-35674, CVE-2024-35679, CVE-2024-35680, CVE-2024-35684, CVE-2024-35693, CVE-2024-35694, CVE-2024-35698, CVE-2024-35700, CVE-2024-35709, CVE-2024-35723, CVE-2024-35729, CVE-2024-35732, CVE-2024-35739, CVE-2024-35759, CVE-2024-35760, CVE-2024-35764, CVE-2024-35768, CVE-2024-35769, CVE-2024-37093, CVE-2024-37102, CVE-2024-37103, CVE-2024-37104, CVE-2024-37114, CVE-2024-37202, CVE-2024-37213, CVE-2024-37228, CVE-2024-37235, CVE-2024-37236, CVE-2024-37237, CVE-2024-37238, CVE-2024-37239, CVE-2024-37240, CVE-2024-37241, CVE-2024-37242, CVE-2024-37243, CVE-2024-37255, CVE-2024-37259, CVE-2024-37261, CVE-2024-37270, CVE-2024-37271, CVE-2024-37272, CVE-2024-37274, CVE-2024-37275, CVE-2024-37409, CVE-2024-37410, CVE-2024-37411, CVE-2024-37412, CVE-2024-37413, CVE-2024-37415, CVE-2024-37417, CVE-2024-37421, CVE-2024-37422, CVE-2024-37426, CVE-2024-37429, CVE-2024-37430, CVE-2024-37431, CVE-2024-37433, CVE-2024-37434, CVE-2024-37435, CVE-2024-37437, CVE-2024-37438, CVE-2024-37440, CVE-2024-37441, CVE-2024-37444, CVE-2024-37448, CVE-2024-37449, CVE-2024-37450, CVE-2024-37451, CVE-2024-37452, CVE-2024-37458, CVE-2024-37467, CVE-2024-37472, CVE-2024-37473, CVE-2024-37478, CVE-2024-37481, CVE-2024-37482, CVE-2024-37483, CVE-2024-37488, CVE-2024-37490, CVE-2024-37491, CVE-2024-37493, CVE-2024-37495, CVE-2024-37497, CVE-2024-37502, CVE-2024-37503, CVE-2024-37508, CVE-2024-37511, CVE-2024-37518, CVE-2024-37519, CVE-2024-37520, CVE-2024-37540, CVE-2024-37541, CVE-2024-37543, CVE-2024-37544, CVE-2024-37554, CVE-2024-37555, CVE-2024-37560, CVE-2024-37918, CVE-2024-37922, CVE-2024-37923, CVE-2024-37925, CVE-2024-37929, CVE-2024-37930, CVE-2024-37931, CVE-2024-37937, CVE-2024-37943, CVE-2024-37945, CVE-2024-37946, CVE-2024-37962, CVE-2024-38687, CVE-2024-38691, CVE-2024-38706, CVE-2024-38708, CVE-2024-38712, CVE-2024-38714, CVE-2024-38729, CVE-2024-38731, CVE-2024-38732, CVE-2024-38735, CVE-2024-38751, CVE-2024-38753, CVE-2024-38754, CVE-2024-38762, CVE-2024-38763, CVE-2024-38764, CVE-2024-38765, CVE-2024-38766, CVE-2024-38771, CVE-2024-38778, CVE-2024-38787, CVE-2024-38789, CVE-2024-38790, CVE-2024-38795, CVE-2024-39619, CVE-2024-39620, CVE-2024-39621, CVE-2024-39622, CVE-2024-39623, CVE-2024-39624, CVE-2024-39626, CVE-2024-39631, CVE-2024-39637, CVE-2024-39646, CVE-2024-39647, CVE-2024-39649, CVE-2024-39654, CVE-2024-39663, CVE-2024-43117, CVE-2024-43118, CVE-2024-43136, CVE-2024-43153, CVE-2024-43158, CVE-2024-43159, CVE-2024-43208, CVE-2024-43214, CVE-2024-43216, CVE-2024-43218, CVE-2024-43222, CVE-2024-43228, CVE-2024-43229, CVE-2024-43230, CVE-2024-43237, CVE-2024-43238, CVE-2024-43239, CVE-2024-43240, CVE-2024-43241, CVE-2024-43243, CVE-2024-43252, CVE-2024-43253, CVE-2024-43254, CVE-2024-43255, CVE-2024-43259, CVE-2024-43264, CVE-2024-43266, CVE-2024-43283, CVE-2024-43290, CVE-2024-43299, CVE-2024-43300, CVE-2024-43306, CVE-2024-43313, CVE-2024-43318, CVE-2024-43333, CVE-2024-43334, CVE-2024-43336, CVE-2024-43338, CVE-2024-43349, CVE-2024-43353, CVE-2024-43927, CVE-2024-43932, CVE-2024-43933, CVE-2024-43938, CVE-2024-43944, CVE-2024-43953, CVE-2024-43954, CVE-2024-43955, CVE-2024-43956, CVE-2024-43959, CVE-2024-43971, CVE-2024-43973, CVE-2024-43975, CVE-2024-43976, CVE-2024-43977, CVE-2024-43978, CVE-2024-43989, CVE-2024-44000, CVE-2024-44001, CVE-2024-44002, CVE-2024-44003, CVE-2024-44004, CVE-2024-44005, CVE-2024-44006, CVE-2024-44007, CVE-2024-44008, CVE-2024-44009, CVE-2024-44010, CVE-2024-44011, CVE-2024-44012, CVE-2024-44013, CVE-2024-44014, CVE-2024-44015, CVE-2024-44016, CVE-2024-44017, CVE-2024-44018, CVE-2024-44019, CVE-2024-44020, CVE-2024-44021, CVE-2024-44022, CVE-2024-44023, CVE-2024-44024, CVE-2024-44025, CVE-2024-44026, CVE-2024-44027, CVE-2024-44028, CVE-2024-44029, CVE-2024-44030, CVE-2024-44031, CVE-2024-44032, CVE-2024-44033, CVE-2024-44034, CVE-2024-44035, CVE-2024-44036, CVE-2024-44037, CVE-2024-44038, CVE-2024-44039, CVE-2024-44040, CVE-2024-44041, CVE-2024-44042, CVE-2024-44043, CVE-2024-44044, CVE-2024-44045, CVE-2024-44046, CVE-2024-44047, CVE-2024-44048, CVE-2024-44049, CVE-2024-44050, CVE-2024-44051, CVE-2024-44052, CVE-2024-44055, CVE-2024-44059, CVE-2024-44061, CVE-2024-44064, CVE-2024-45451, CVE-2024-45452, CVE-2024-45453, CVE-2024-45454, CVE-2024-45455, CVE-2024-45456, CVE-2024-45457, CVE-2024-45458, CVE-2024-45459, CVE-2024-45460, CVE-2024-47297, CVE-2024-47298, CVE-2024-47299, CVE-2024-47300, CVE-2024-47301, CVE-2024-47302, CVE-2024-47303, CVE-2024-47304, CVE-2024-47305, CVE-2024-47306, CVE-2024-47307, CVE-2024-47308, CVE-2024-47309, CVE-2024-47310, CVE-2024-47311, CVE-2024-47312, CVE-2024-47313, CVE-2024-47314, CVE-2024-47315, CVE-2024-47316, CVE-2024-47317, CVE-2024-47318, CVE-2024-47319, CVE-2024-47320, CVE-2024-47321, CVE-2024-47322, CVE-2024-47323, CVE-2024-47324, CVE-2024-47325, CVE-2024-47326, CVE-2024-47327, CVE-2024-47328, CVE-2024-47329, CVE-2024-47331, CVE-2024-47332, CVE-2024-47333, CVE-2024-47334, CVE-2024-47335, CVE-2024-47336, CVE-2024-47337, CVE-2024-47338, CVE-2024-47339, CVE-2024-47340, CVE-2024-47341, CVE-2024-47342, CVE-2024-47343, CVE-2024-47344, CVE-2024-47345, CVE-2024-47346, CVE-2024-47347, CVE-2024-47348, CVE-2024-47349, CVE-2024-47350, CVE-2024-47351, CVE-2024-47352, CVE-2024-47353, CVE-2024-47354, CVE-2024-47355, CVE-2024-47356, CVE-2024-47357, CVE-2024-47358, CVE-2024-47359, CVE-2024-47360, CVE-2024-47361, CVE-2024-47362, CVE-2024-47363, CVE-2024-47364, CVE-2024-47365, CVE-2024-47366, CVE-2024-47367, CVE-2024-47368, CVE-2024-47369, CVE-2024-47370, CVE-2024-47371, CVE-2024-47372, CVE-2024-47373, CVE-2024-47374, CVE-2024-47375, CVE-2024-47376, CVE-2024-47377, CVE-2024-47378, CVE-2024-47379, CVE-2024-47380, CVE-2024-47381, CVE-2024-47382, CVE-2024-47383, CVE-2024-47384, CVE-2024-47385, CVE-2024-47386, CVE-2024-47387, CVE-2024-47388, CVE-2024-47389, CVE-2024-47390, CVE-2024-47391, CVE-2024-47392, CVE-2024-47393, CVE-2024-47394, CVE-2024-47395, CVE-2024-47396, CVE-2024-47621, CVE-2024-47622, CVE-2024-47623, CVE-2024-47624, CVE-2024-47625, CVE-2024-47626, CVE-2024-47627, CVE-2024-47628, CVE-2024-47629, CVE-2024-47630, CVE-2024-47631, CVE-2024-47632, CVE-2024-47633, CVE-2024-47634, CVE-2024-47635, CVE-2024-47636, CVE-2024-47637, CVE-2024-47638, CVE-2024-47639, CVE-2024-47640, CVE-2024-47641, CVE-2024-47642, CVE-2024-47643, CVE-2024-47644, CVE-2024-47645, CVE-2024-47646, CVE-2024-47647, CVE-2024-47648, CVE-2024-47649, CVE-2024-47650, CVE-2024-48020, CVE-2024-48021, CVE-2024-48022, CVE-2024-48023, CVE-2024-48024, CVE-2024-48025, CVE-2024-48026, CVE-2024-48027, CVE-2024-48028, CVE-2024-48029, CVE-2024-48030, CVE-2024-48031, CVE-2024-48032, CVE-2024-48033, CVE-2024-48034, CVE-2024-48035, CVE-2024-48036, CVE-2024-48037, CVE-2024-48038, CVE-2024-48039, CVE-2024-48040, CVE-2024-48041, CVE-2024-48042, CVE-2024-48043, CVE-2024-48044, CVE-2024-48045, CVE-2024-48046, CVE-2024-48047, CVE-2024-48048, CVE-2024-48049, CVE-2024-49222, CVE-2024-49225, CVE-2024-49228, CVE-2024-49229, CVE-2024-49231, CVE-2024-49232, CVE-2024-49233, CVE-2024-49234, CVE-2024-49236, CVE-2024-49237, CVE-2024-49241, CVE-2024-49243, CVE-2024-49249, CVE-2024-49250, CVE-2024-49251, CVE-2024-49252, CVE-2024-49254, CVE-2024-49255, CVE-2024-49256, CVE-2024-49257, CVE-2024-49258, CVE-2024-49259, CVE-2024-49260, CVE-2024-49261, CVE-2024-49262, CVE-2024-49263, CVE-2024-49264, CVE-2024-49265, CVE-2024-49266, CVE-2024-49267, CVE-2024-49268, CVE-2024-49270, CVE-2024-49271, CVE-2024-49272, CVE-2024-49273, CVE-2024-49274, CVE-2024-49275, CVE-2024-49276, CVE-2024-49277, CVE-2024-49278, CVE-2024-49279, CVE-2024-49280, CVE-2024-49281, CVE-2024-49282, CVE-2024-49283, CVE-2024-49284, CVE-2024-49285, CVE-2024-49286, CVE-2024-49287, CVE-2024-49288, CVE-2024-49289, CVE-2024-49290, CVE-2024-49291, CVE-2024-49292, CVE-2024-49293, CVE-2024-49294, CVE-2024-49295, CVE-2024-49296, CVE-2024-49297, CVE-2024-49298, CVE-2024-49299, CVE-2024-49300, CVE-2024-49301, CVE-2024-49302, CVE-2024-49303, CVE-2024-49304, CVE-2024-49305, CVE-2024-49306, CVE-2024-49307, CVE-2024-49308, CVE-2024-49309, CVE-2024-49310, CVE-2024-49311, CVE-2024-49312, CVE-2024-49313, CVE-2024-49316, CVE-2024-49318, CVE-2024-49319, CVE-2024-49320, CVE-2024-49323, CVE-2024-49324, CVE-2024-49325, CVE-2024-49326, CVE-2024-49327, CVE-2024-49328, CVE-2024-49329, CVE-2024-49330, CVE-2024-49331, CVE-2024-49332, CVE-2024-49333, CVE-2024-49334, CVE-2024-49335, CVE-2024-49604, CVE-2024-49605, CVE-2024-49606, CVE-2024-49607, CVE-2024-49608, CVE-2024-49609, CVE-2024-49610, CVE-2024-49611, CVE-2024-49612, CVE-2024-49613, CVE-2024-49614, CVE-2024-49615, CVE-2024-49616, CVE-2024-49617, CVE-2024-49618, CVE-2024-49619, CVE-2024-49620, CVE-2024-49621, CVE-2024-49622, CVE-2024-49623, CVE-2024-49624, CVE-2024-49627, CVE-2024-49628, CVE-2024-49629, CVE-2024-49630, CVE-2024-49631, CVE-2024-49632, CVE-2024-49633, CVE-2024-49634, CVE-2024-49635, CVE-2024-49636, CVE-2024-49637, CVE-2024-49638, CVE-2024-49639, CVE-2024-49640, CVE-2024-49641, CVE-2024-49642, CVE-2024-49643, CVE-2024-49644, CVE-2024-49645, CVE-2024-49646, CVE-2024-49647, CVE-2024-49648, CVE-2024-49649, CVE-2024-49650, CVE-2024-49651, CVE-2024-49652, CVE-2024-49653, CVE-2024-49654, CVE-2024-49655, CVE-2024-49656, CVE-2024-49657, CVE-2024-49658, CVE-2024-49659, CVE-2024-49660, CVE-2024-49661, CVE-2024-49662, CVE-2024-49663, CVE-2024-49664, CVE-2024-49665, CVE-2024-49666, CVE-2024-49667, CVE-2024-49668, CVE-2024-49669, CVE-2024-49670, CVE-2024-49671, CVE-2024-49672, CVE-2024-49673, CVE-2024-49674, CVE-2024-49675, CVE-2024-49676, CVE-2024-49677, CVE-2024-49678, CVE-2024-49679, CVE-2024-49680, CVE-2024-49681, CVE-2024-49682, CVE-2024-49683, CVE-2024-49684, CVE-2024-49685, CVE-2024-49686, CVE-2024-49687, CVE-2024-49688, CVE-2024-49689, CVE-2024-49690, CVE-2024-49691, CVE-2024-49692, CVE-2024-49693, CVE-2024-49694, CVE-2024-49695, CVE-2024-49696, CVE-2024-49697, CVE-2024-49698, CVE-2024-49699, CVE-2024-49700, CVE-2024-49701, CVE-2024-49702, CVE-2024-49703, CVE-2024-4689, CVE-2024-4746, CVE-2024-50407, CVE-2024-50408, CVE-2024-50409, CVE-2024-50410, CVE-2024-50411, CVE-2024-50412, CVE-2024-50413, CVE-2024-50414, CVE-2024-50415, CVE-2024-50416, CVE-2024-50417, CVE-2024-50418, CVE-2024-50419, CVE-2024-50420, CVE-2024-50421, CVE-2024-50422, CVE-2024-50423, CVE-2024-50424, CVE-2024-50425, CVE-2024-50426, CVE-2024-50427, CVE-2024-50428, CVE-2024-50429, CVE-2024-50430, CVE-2024-50431, CVE-2024-50432, CVE-2024-50433, CVE-2024-50434, CVE-2024-50435, CVE-2024-50436, CVE-2024-50437, CVE-2024-50438, CVE-2024-50439, CVE-2024-50440, CVE-2024-50441, CVE-2024-50442, CVE-2024-50445, CVE-2024-50446, CVE-2024-50447, CVE-2024-50448, CVE-2024-50449, CVE-2024-50450, CVE-2024-50451, CVE-2024-50453, CVE-2024-50454, CVE-2024-50455, CVE-2024-50456, CVE-2024-50457, CVE-2024-50458, CVE-2024-50459, CVE-2024-50460, CVE-2024-50461, CVE-2024-50462, CVE-2024-50463, CVE-2024-50464, CVE-2024-50465, CVE-2024-50467, CVE-2024-50468, CVE-2024-50469, CVE-2024-50470, CVE-2024-50471, CVE-2024-50472, CVE-2024-50473, CVE-2024-50475, CVE-2024-50476, CVE-2024-50477, CVE-2024-50478, CVE-2024-50479, CVE-2024-50480, CVE-2024-50481, CVE-2024-50482, CVE-2024-50483, CVE-2024-50484, CVE-2024-50485, CVE-2024-50486, CVE-2024-50487, CVE-2024-50488, CVE-2024-50489, CVE-2024-50490, CVE-2024-50491, CVE-2024-50492, CVE-2024-50493, CVE-2024-50494, CVE-2024-50495, CVE-2024-50496, CVE-2024-50497, CVE-2024-50498, CVE-2024-50500, CVE-2024-50501, CVE-2024-50502, CVE-2024-50503, CVE-2024-50504, CVE-2024-50506, CVE-2024-50507, CVE-2024-50508, CVE-2024-50509, CVE-2024-50510, CVE-2024-50511, CVE-2024-50512, CVE-2024-50513, CVE-2024-50514, CVE-2024-50515, CVE-2024-50516, CVE-2024-50517, CVE-2024-50518, CVE-2024-50519, CVE-2024-50520, CVE-2024-50521, CVE-2024-50522, CVE-2024-50523, CVE-2024-50524, CVE-2024-50525, CVE-2024-50526, CVE-2024-50527, CVE-2024-50528, CVE-2024-50529, CVE-2024-50530, CVE-2024-50531, CVE-2024-50532, CVE-2024-50533, CVE-2024-50534, CVE-2024-50535, CVE-2024-50536, CVE-2024-50537, CVE-2024-50538, CVE-2024-50539, CVE-2024-50540, CVE-2024-50541, CVE-2024-50542, CVE-2024-50543, CVE-2024-50544, CVE-2024-50545, CVE-2024-50546, CVE-2024-50547, CVE-2024-50548, CVE-2024-50549, CVE-2024-50550, CVE-2024-50551, CVE-2024-50552, CVE-2024-50553, CVE-2024-50554, CVE-2024-50556, CVE-2024-51570, CVE-2024-51571, CVE-2024-51572, CVE-2024-51573, CVE-2024-51574, CVE-2024-51575, CVE-2024-51576, CVE-2024-51577, CVE-2024-51578, CVE-2024-51579, CVE-2024-51580, CVE-2024-51581, CVE-2024-51582, CVE-2024-51583, CVE-2024-51584, CVE-2024-51585, CVE-2024-51586, CVE-2024-51587, CVE-2024-51588, CVE-2024-51589, CVE-2024-51590, CVE-2024-51591, CVE-2024-51592, CVE-2024-51593, CVE-2024-51594, CVE-2024-51595, CVE-2024-51596, CVE-2024-51597, CVE-2024-51598, CVE-2024-51599, CVE-2024-51601, CVE-2024-51602, CVE-2024-51603, CVE-2024-51604, CVE-2024-51605, CVE-2024-51606, CVE-2024-51607, CVE-2024-51608, CVE-2024-51609, CVE-2024-51610, CVE-2024-51611, CVE-2024-51612, CVE-2024-51613, CVE-2024-51614, CVE-2024-51615, CVE-2024-51616, CVE-2024-51617, CVE-2024-51618, CVE-2024-51619, CVE-2024-51620, CVE-2024-51621, CVE-2024-51622, CVE-2024-51623, CVE-2024-51624, CVE-2024-51625, CVE-2024-51626, CVE-2024-51627, CVE-2024-51628, CVE-2024-51629, CVE-2024-51630, CVE-2024-51631, CVE-2024-51632, CVE-2024-51633, CVE-2024-51634, CVE-2024-51635, CVE-2024-51636, CVE-2024-51637, CVE-2024-51638, CVE-2024-51639, CVE-2024-51640, CVE-2024-51641, CVE-2024-51642, CVE-2024-51643, CVE-2024-51644, CVE-2024-51645, CVE-2024-51648, CVE-2024-51649, CVE-2024-51650, CVE-2024-51651, CVE-2024-51652, CVE-2024-51653, CVE-2024-51654, CVE-2024-51655, CVE-2024-51656, CVE-2024-51657, CVE-2024-51658, CVE-2024-51659, CVE-2024-51660, CVE-2024-51661, CVE-2024-51662, CVE-2024-51663, CVE-2024-51664, CVE-2024-51665, CVE-2024-51666, CVE-2024-51667, CVE-2024-51668, CVE-2024-51669, CVE-2024-51670, CVE-2024-51671, CVE-2024-51672, CVE-2024-51673, CVE-2024-51674, CVE-2024-51675, CVE-2024-51676, CVE-2024-51677, CVE-2024-51678, CVE-2024-51679, CVE-2024-51680, CVE-2024-51681, CVE-2024-51682, CVE-2024-51683, CVE-2024-51684, CVE-2024-51685, CVE-2024-51686, CVE-2024-51687, CVE-2024-51688, CVE-2024-51689, CVE-2024-51690, CVE-2024-51691, CVE-2024-51692, CVE-2024-51693, CVE-2024-51694, CVE-2024-51695, CVE-2024-51696, CVE-2024-51697, CVE-2024-51698, CVE-2024-51699, CVE-2024-51700, CVE-2024-51701, CVE-2024-51702, CVE-2024-51703, CVE-2024-51704, CVE-2024-51705, CVE-2024-51706, CVE-2024-51707, CVE-2024-51708, CVE-2024-51709, CVE-2024-51710, CVE-2024-51711, CVE-2024-51712, CVE-2024-51713, CVE-2024-51714, CVE-2024-51715, CVE-2024-51716, CVE-2024-51717, CVE-2024-51718, CVE-2024-51719, CVE-2024-51759, CVE-2024-51760, CVE-2024-51761, CVE-2024-51762, CVE-2024-51763, CVE-2024-51776, CVE-2024-51778, CVE-2024-51779, CVE-2024-51780, CVE-2024-51781, CVE-2024-51782, CVE-2024-51783, CVE-2024-51784, CVE-2024-51785, CVE-2024-51786, CVE-2024-51787, CVE-2024-51788, CVE-2024-51789, CVE-2024-51790, CVE-2024-51791, CVE-2024-51792, CVE-2024-51793, CVE-2024-51794, CVE-2024-51795, CVE-2024-51796, CVE-2024-51797, CVE-2024-51798, CVE-2024-51799, CVE-2024-51800, CVE-2024-51801, CVE-2024-51802, CVE-2024-51803, CVE-2024-51804, CVE-2024-51805, CVE-2024-51806, CVE-2024-51807, CVE-2024-51808, CVE-2024-51809, CVE-2024-51810, CVE-2024-51811, CVE-2024-51812, CVE-2024-51813, CVE-2024-51814, CVE-2024-51815, CVE-2024-51816, CVE-2024-51817, CVE-2024-51818, CVE-2024-51819, CVE-2024-51820, CVE-2024-51821, CVE-2024-51822, CVE-2024-51823, CVE-2024-51824, CVE-2024-51825, CVE-2024-51826, CVE-2024-51827, CVE-2024-51828, CVE-2024-51829, CVE-2024-51830, CVE-2024-51831, CVE-2024-51832, CVE-2024-51833, CVE-2024-51834, CVE-2024-51835, CVE-2024-51836, CVE-2024-51837, CVE-2024-51838, CVE-2024-51839, CVE-2024-51840, CVE-2024-51841, CVE-2024-51842, CVE-2024-51843, CVE-2024-51844, CVE-2024-51845, CVE-2024-51846, CVE-2024-51847, CVE-2024-51848, CVE-2024-51849, CVE-2024-51850, CVE-2024-51851, CVE-2024-51852, CVE-2024-51853, CVE-2024-51854, CVE-2024-51855, CVE-2024-51856, CVE-2024-51857, CVE-2024-51858, CVE-2024-51859, CVE-2024-51860, CVE-2024-51861, CVE-2024-51862, CVE-2024-51863, CVE-2024-51864, CVE-2024-51865, CVE-2024-51866, CVE-2024-51867, CVE-2024-51868, CVE-2024-51869, CVE-2024-51870, CVE-2024-51871, CVE-2024-51872, CVE-2024-51873, CVE-2024-51874, CVE-2024-51875, CVE-2024-51876, CVE-2024-51877, CVE-2024-51878, CVE-2024-51879, CVE-2024-51880, CVE-2024-51881, CVE-2024-51882, CVE-2024-51883, CVE-2024-51884, CVE-2024-51885, CVE-2024-51886, CVE-2024-51887, CVE-2024-51888, CVE-2024-51889, CVE-2024-51890, CVE-2024-51891, CVE-2024-51892, CVE-2024-51893, CVE-2024-51894, CVE-2024-51895, CVE-2024-51896, CVE-2024-51897, CVE-2024-51898, CVE-2024-51899, CVE-2024-51900, CVE-2024-51901, CVE-2024-51902, CVE-2024-51903, CVE-2024-51904, CVE-2024-51905, CVE-2024-51906, CVE-2024-51907, CVE-2024-51908, CVE-2024-51909, CVE-2024-51910, CVE-2024-51911, CVE-2024-51912, CVE-2024-51913, CVE-2024-51914, CVE-2024-51916, CVE-2024-51917, CVE-2024-51918, CVE-2024-51919, CVE-2024-51920, CVE-2024-51921, CVE-2024-51922, CVE-2024-51923, CVE-2024-51924, CVE-2024-51925, CVE-2024-51926, CVE-2024-51927, CVE-2024-51928, CVE-2024-51929, CVE-2024-51930, CVE-2024-51931, CVE-2024-51932, CVE-2024-51933, CVE-2024-51934, CVE-2024-51935, CVE-2024-51936, CVE-2024-51937, CVE-2024-51938, CVE-2024-51939, CVE-2024-51940, CVE-2024-52339, CVE-2024-52340, CVE-2024-52341, CVE-2024-52342, CVE-2024-52343, CVE-2024-52344, CVE-2024-52345, CVE-2024-52346, CVE-2024-52347, CVE-2024-52348, CVE-2024-52349, CVE-2024-52350, CVE-2024-52351, CVE-2024-52352, CVE-2024-52353, CVE-2024-52354, CVE-2024-52355, CVE-2024-52356, CVE-2024-52357, CVE-2024-52358, CVE-2024-52369, CVE-2024-52370, CVE-2024-52371, CVE-2024-52372, CVE-2024-52373, CVE-2024-52374, CVE-2024-52375, CVE-2024-52376, CVE-2024-52377, CVE-2024-52378, CVE-2024-52379, CVE-2024-52380, CVE-2024-52381, CVE-2024-52382, CVE-2024-52383, CVE-2024-52384, CVE-2024-52385, CVE-2024-52386, CVE-2024-52388, CVE-2024-52389, CVE-2024-52390, CVE-2024-52391, CVE-2024-52392, CVE-2024-52393, CVE-2024-52394, CVE-2024-52395, CVE-2024-52396, CVE-2024-52397, CVE-2024-52398, CVE-2024-52399, CVE-2024-52400, CVE-2024-52401, CVE-2024-52402, CVE-2024-52403, CVE-2024-52404, CVE-2024-52405, CVE-2024-52406, CVE-2024-52407, CVE-2024-52408, CVE-2024-52409, CVE-2024-52410, CVE-2024-52411, CVE-2024-52412, CVE-2024-52413, CVE-2024-52414, CVE-2024-52415, CVE-2024-52416, CVE-2024-52417, CVE-2024-52418, CVE-2024-52419, CVE-2024-52420, CVE-2024-52421, CVE-2024-52422, CVE-2024-52423, CVE-2024-52424, CVE-2024-52425, CVE-2024-52426, CVE-2024-52427, CVE-2024-52428, CVE-2024-52429, CVE-2024-52430, CVE-2024-52431, CVE-2024-52432, CVE-2024-52433, CVE-2024-52434, CVE-2024-52435, CVE-2024-52436, CVE-2024-52437, CVE-2024-52438, CVE-2024-52439, CVE-2024-52440, CVE-2024-52441, CVE-2024-52442, CVE-2024-52443, CVE-2024-52444, CVE-2024-52445, CVE-2024-52446, CVE-2024-52447, CVE-2024-52448, CVE-2024-52449, CVE-2024-52450, CVE-2024-52451, CVE-2024-52452, CVE-2024-52453, CVE-2024-52454, CVE-2024-52455, CVE-2024-52456, CVE-2024-52457, CVE-2024-52458, CVE-2024-52459, CVE-2024-52460, CVE-2024-52461, CVE-2024-52462, CVE-2024-52463, CVE-2024-52464, CVE-2024-52465, CVE-2024-52466, CVE-2024-52467, CVE-2024-52468, CVE-2024-52469, CVE-2024-52470, CVE-2024-52471, CVE-2024-52472, CVE-2024-52473, CVE-2024-52474, CVE-2024-52475, CVE-2024-52476, CVE-2024-52477, CVE-2024-52478, CVE-2024-52479, CVE-2024-52482, CVE-2024-52483, CVE-2024-52484, CVE-2024-52485, CVE-2024-52486, CVE-2024-52487, CVE-2024-52489, CVE-2024-52490, CVE-2024-52491, CVE-2024-52492, CVE-2024-52493, CVE-2024-52494, CVE-2024-52495, CVE-2024-52496, CVE-2024-52497, CVE-2024-52498, CVE-2024-52499, CVE-2024-52500, CVE-2024-52501, CVE-2024-52502, CVE-2024-52503, CVE-2024-53707, CVE-2024-53708, CVE-2024-53709, CVE-2024-53710, CVE-2024-53711, CVE-2024-53712, CVE-2024-53713, CVE-2024-53714, CVE-2024-53715, CVE-2024-53716, CVE-2024-53717, CVE-2024-53718, CVE-2024-53719, CVE-2024-53720, CVE-2024-53721, CVE-2024-53722, CVE-2024-53723, CVE-2024-53724, CVE-2024-53725, CVE-2024-53726, CVE-2024-53727, CVE-2024-53728, CVE-2024-53729, CVE-2024-53730, CVE-2024-53731, CVE-2024-53732, CVE-2024-53733, CVE-2024-53734, CVE-2024-53735, CVE-2024-53736, CVE-2024-53737, CVE-2024-53738, CVE-2024-53739, CVE-2024-53740, CVE-2024-53741, CVE-2024-53742, CVE-2024-53743, CVE-2024-53744, CVE-2024-53745, CVE-2024-53746, CVE-2024-53747, CVE-2024-53748, CVE-2024-53749, CVE-2024-53750, CVE-2024-53751, CVE-2024-53752, CVE-2024-53753, CVE-2024-53754, CVE-2024-53755, CVE-2024-53756, CVE-2024-53757, CVE-2024-53758, CVE-2024-53759, CVE-2024-53760, CVE-2024-53761, CVE-2024-53762, CVE-2024-53763, CVE-2024-53764, CVE-2024-53765, CVE-2024-53766, CVE-2024-53767, CVE-2024-53768, CVE-2024-53769, CVE-2024-53770, CVE-2024-53771, CVE-2024-53772, CVE-2024-53773, CVE-2024-53774, CVE-2024-53775, CVE-2024-53776, CVE-2024-53777, CVE-2024-53778, CVE-2024-53779, CVE-2024-53780, CVE-2024-53781, CVE-2024-53782, CVE-2024-53783, CVE-2024-53784, CVE-2024-53785, CVE-2024-53786, CVE-2024-53787, CVE-2024-53788, CVE-2024-53789, CVE-2024-53790, CVE-2024-53791, CVE-2024-53792, CVE-2024-53793, CVE-2024-53794, CVE-2024-53795, CVE-2024-53796, CVE-2024-53797, CVE-2024-53798, CVE-2024-53799, CVE-2024-53801, CVE-2024-53802, CVE-2024-53803, CVE-2024-53805, CVE-2024-53806, CVE-2024-53807, CVE-2024-53808, CVE-2024-53809, CVE-2024-53810, CVE-2024-53811, CVE-2024-53812, CVE-2024-53813, CVE-2024-53814, CVE-2024-53815, CVE-2024-53816, CVE-2024-53817, CVE-2024-53818, CVE-2024-53819, CVE-2024-53820, CVE-2024-53821, CVE-2024-53822, CVE-2024-53823, CVE-2024-53824, CVE-2024-53825, CVE-2024-53826, CVE-2024-54205, CVE-2024-54206, CVE-2024-54207, CVE-2024-54208, CVE-2024-54209, CVE-2024-54210, CVE-2024-54211, CVE-2024-54212, CVE-2024-54213, CVE-2024-54214, CVE-2024-54215, CVE-2024-54216, CVE-2024-54217, CVE-2024-54218, CVE-2024-54219, CVE-2024-54220, CVE-2024-54221, CVE-2024-54223, CVE-2024-54224, CVE-2024-54225, CVE-2024-54226, CVE-2024-54227, CVE-2024-54228, CVE-2024-54229, CVE-2024-54230, CVE-2024-54231, CVE-2024-54232, CVE-2024-54233, CVE-2024-54234, CVE-2024-54235, CVE-2024-54236, CVE-2024-54237, CVE-2024-54238, CVE-2024-54239, CVE-2024-54240, CVE-2024-54241, CVE-2024-54242, CVE-2024-54243, CVE-2024-54244, CVE-2024-54245, CVE-2024-54246, CVE-2024-54247, CVE-2024-54248, CVE-2024-54249, CVE-2024-54250, CVE-2024-54251, CVE-2024-54252, CVE-2024-54253, CVE-2024-54254, CVE-2024-54255, CVE-2024-54256, CVE-2024-54257, CVE-2024-54258, CVE-2024-54259, CVE-2024-54260, CVE-2024-54261, CVE-2024-54262, CVE-2024-54264, CVE-2024-54265, CVE-2024-54266, CVE-2024-54267, CVE-2024-54268, CVE-2024-54269, CVE-2024-54270, CVE-2024-54271, CVE-2024-54272, CVE-2024-54273, CVE-2024-54274, CVE-2024-54275, CVE-2024-54276, CVE-2024-54277, CVE-2024-54278, CVE-2024-54280, CVE-2024-54282, CVE-2024-54283, CVE-2024-54284, CVE-2024-54285, CVE-2024-54286, CVE-2024-54287, CVE-2024-54288, CVE-2024-54289, CVE-2024-54290, CVE-2024-54291, CVE-2024-54292, CVE-2024-54293, CVE-2024-54294, CVE-2024-54295, CVE-2024-54296, CVE-2024-54297, CVE-2024-54298, CVE-2024-54299, CVE-2024-54300, CVE-2024-54301, CVE-2024-54302, CVE-2024-54303, CVE-2024-54304, CVE-2024-54305, CVE-2024-54306, CVE-2024-54307, CVE-2024-54308, CVE-2024-54309, CVE-2024-54310, CVE-2024-54311, CVE-2024-54312, CVE-2024-54313, CVE-2024-54314, CVE-2024-54315, CVE-2024-54316, CVE-2024-54317, CVE-2024-54318, CVE-2024-54319, CVE-2024-54320, CVE-2024-54321, CVE-2024-54322, CVE-2024-54323, CVE-2024-54324, CVE-2024-54325, CVE-2024-54326, CVE-2024-54327, CVE-2024-54328, CVE-2024-54329, CVE-2024-54330, CVE-2024-54331, CVE-2024-54332, CVE-2024-54333, CVE-2024-54334, CVE-2024-54335, CVE-2024-54336, CVE-2024-54337, CVE-2024-54338, CVE-2024-54339, CVE-2024-54340, CVE-2024-54341, CVE-2024-54342, CVE-2024-54343, CVE-2024-54344, CVE-2024-54345, CVE-2024-54346, CVE-2024-54347, CVE-2024-54348, CVE-2024-54349, CVE-2024-54350, CVE-2024-54351, CVE-2024-54352, CVE-2024-54353, CVE-2024-54354, CVE-2024-54355, CVE-2024-54356, CVE-2024-54357, CVE-2024-54358, CVE-2024-54359, CVE-2024-54360, CVE-2024-54361, CVE-2024-54362, CVE-2024-54363, CVE-2024-54364, CVE-2024-54365, CVE-2024-54366, CVE-2024-54367, CVE-2024-54368, CVE-2024-54369, CVE-2024-54370, CVE-2024-54372, CVE-2024-54373, CVE-2024-54374, CVE-2024-54375, CVE-2024-54376, CVE-2024-54378, CVE-2024-54379, CVE-2024-54380, CVE-2024-54381, CVE-2024-54382, CVE-2024-54383, CVE-2024-54384, CVE-2024-54385, CVE-2024-54386, CVE-2024-54387, CVE-2024-54388, CVE-2024-54389, CVE-2024-54390, CVE-2024-54391, CVE-2024-54392, CVE-2024-54393, CVE-2024-54394, CVE-2024-54395, CVE-2024-54396, CVE-2024-54397, CVE-2024-54398, CVE-2024-54399, CVE-2024-54400, CVE-2024-54401, CVE-2024-54402, CVE-2024-54403, CVE-2024-54404, CVE-2024-54405, CVE-2024-54406, CVE-2024-54407, CVE-2024-54408, CVE-2024-54409, CVE-2024-54410, CVE-2024-54411, CVE-2024-54412, CVE-2024-54413, CVE-2024-54414, CVE-2024-54415, CVE-2024-54416, CVE-2024-54417, CVE-2024-54418, CVE-2024-54419, CVE-2024-54420, CVE-2024-54421, CVE-2024-54422, CVE-2024-54423, CVE-2024-54424, CVE-2024-54425, CVE-2024-54426, CVE-2024-54427, CVE-2024-54428, CVE-2024-54429, CVE-2024-54430, CVE-2024-54431, CVE-2024-54432, CVE-2024-54433, CVE-2024-54434, CVE-2024-54435, CVE-2024-54436, CVE-2024-54437, CVE-2024-54438, CVE-2024-54439, CVE-2024-54440, CVE-2024-54441, CVE-2024-54442, CVE-2024-54443, CVE-2024-54444, CVE-2024-55972, CVE-2024-55973, CVE-2024-55974, CVE-2024-55975, CVE-2024-55976, CVE-2024-55977, CVE-2024-55978, CVE-2024-55979, CVE-2024-55980, CVE-2024-55981, CVE-2024-55982, CVE-2024-55983, CVE-2024-55984, CVE-2024-55985, CVE-2024-55986, CVE-2024-55987, CVE-2024-55988, CVE-2024-55989, CVE-2024-55990, CVE-2024-55991, CVE-2024-55992, CVE-2024-55993, CVE-2024-55994, CVE-2024-55995, CVE-2024-55996, CVE-2024-55997, CVE-2024-55998, CVE-2024-55999, CVE-2024-56001, CVE-2024-56002, CVE-2024-56003, CVE-2024-56004, CVE-2024-56005, CVE-2024-56006, CVE-2024-56007, CVE-2024-56008, CVE-2024-56009, CVE-2024-56010, CVE-2024-56011, CVE-2024-56012, CVE-2024-56013, CVE-2024-56014, CVE-2024-56015, CVE-2024-56016, CVE-2024-56017, CVE-2024-56018, CVE-2024-56019, CVE-2024-56020, CVE-2024-56021, CVE-2024-56022, CVE-2024-56023, CVE-2024-56024, CVE-2024-56025, CVE-2024-56026, CVE-2024-56027, CVE-2024-56028, CVE-2024-56029, CVE-2024-56030, CVE-2024-56031, CVE-2024-56032, CVE-2024-56033, CVE-2024-56034, CVE-2024-56035, CVE-2024-56036, CVE-2024-56037, CVE-2024-56038, CVE-2024-56039, CVE-2024-56040, CVE-2024-56041, CVE-2024-56042, CVE-2024-56043, CVE-2024-56044, CVE-2024-56045, CVE-2024-56046, CVE-2024-56047, CVE-2024-56048, CVE-2024-56049, CVE-2024-56050, CVE-2024-56051, CVE-2024-56052, CVE-2024-56053, CVE-2024-56054, CVE-2024-56055, CVE-2024-56057, CVE-2024-56058, CVE-2024-56059, CVE-2024-56060, CVE-2024-56061, CVE-2024-56062, CVE-2024-56063, CVE-2024-56064, CVE-2024-56065, CVE-2024-56066, CVE-2024-56068, CVE-2024-56069, CVE-2024-56070, CVE-2024-56071, CVE-2024-56203, CVE-2024-56204, CVE-2024-56205, CVE-2024-56206, CVE-2024-56207, CVE-2024-56209, CVE-2024-56210, CVE-2024-56211, CVE-2024-56212, CVE-2024-56213, CVE-2024-56214, CVE-2024-56215, CVE-2024-56216, CVE-2024-56217, CVE-2024-56218, CVE-2024-56219, CVE-2024-56220, CVE-2024-56221, CVE-2024-56222, CVE-2024-56223, CVE-2024-56224, CVE-2024-56225, CVE-2024-56226, CVE-2024-56227, CVE-2024-56228, CVE-2024-56229, CVE-2024-56230, CVE-2024-56231, CVE-2024-56232, CVE-2024-56233, CVE-2024-56234, CVE-2024-56235, CVE-2024-56236, CVE-2024-56237, CVE-2024-56238, CVE-2024-56239, CVE-2024-56240, CVE-2024-56241, CVE-2024-56242, CVE-2024-56243, CVE-2024-56244, CVE-2024-56245, CVE-2024-56246, CVE-2024-56247, CVE-2024-56248, CVE-2024-56249, CVE-2024-56250, CVE-2024-56251, CVE-2024-56252, CVE-2024-56253, CVE-2024-56254, CVE-2024-56255, CVE-2024-56256, CVE-2024-56257, CVE-2024-56258, CVE-2024-56259, CVE-2024-56260, CVE-2024-56261, CVE-2024-56262, CVE-2024-56263, CVE-2024-56264, CVE-2024-56265, CVE-2024-56266, CVE-2024-56267, CVE-2024-56268, CVE-2024-56270, CVE-2024-56271, CVE-2024-56272, CVE-2024-56273, CVE-2024-56274, CVE-2024-56275, CVE-2024-56276, CVE-2024-56278, CVE-2024-56279, CVE-2024-56280, CVE-2024-56281, CVE-2024-56282, CVE-2024-56283, CVE-2024-56284, CVE-2024-56285, CVE-2024-56286, CVE-2024-56287, CVE-2024-56288, CVE-2024-56289, CVE-2024-56290, CVE-2024-56291, CVE-2024-56292, CVE-2024-56293, CVE-2024-56294, CVE-2024-56295, CVE-2024-56296, CVE-2024-56297, CVE-2024-56298, CVE-2024-56299, CVE-2024-56300, CVE-2024-56301, CVE-2024-56302, CVE-2024-58344, CVE-2024-7399, CVE-2024-7590, CVE-2024-9146, CVE-2025-10019, CVE-2025-10549, CVE-2025-12549, CVE-2025-12550, CVE-2025-12551, CVE-2025-13504, CVE-2025-13763, CVE-2025-13835, CVE-2025-14314, CVE-2025-14358, CVE-2025-14359, CVE-2025-14360, CVE-2025-14429, CVE-2025-14430, CVE-2025-14431, CVE-2025-15635, CVE-2025-15636, CVE-2025-1249, CVE-2025-22260, CVE-2025-22261, CVE-2025-22262, CVE-2025-22263, CVE-2025-22264, CVE-2025-22265, CVE-2025-22267, CVE-2025-22268, CVE-2025-22269, CVE-2025-22276, CVE-2025-22277, CVE-2025-22278, CVE-2025-22279, CVE-2025-22280, CVE-2025-22281, CVE-2025-22282, CVE-2025-22283, CVE-2025-22284, CVE-2025-22286, CVE-2025-22289, CVE-2025-22290, CVE-2025-22291, CVE-2025-22292, CVE-2025-22293, CVE-2025-22294, CVE-2025-22296, CVE-2025-22297, CVE-2025-22298, CVE-2025-22299, CVE-2025-22300, CVE-2025-22301, CVE-2025-22302, CVE-2025-22303, CVE-2025-22304, CVE-2025-22305, CVE-2025-22306, CVE-2025-22307, CVE-2025-22308, CVE-2025-22309, CVE-2025-22310, CVE-2025-22311, CVE-2025-22312, CVE-2025-22313, CVE-2025-22314, CVE-2025-22315, CVE-2025-22316, CVE-2025-22317, CVE-2025-22318, CVE-2025-22319, CVE-2025-22320, CVE-2025-22321, CVE-2025-22322, CVE-2025-22323, CVE-2025-22324, CVE-2025-22325, CVE-2025-22326, CVE-2025-22327, CVE-2025-22328, CVE-2025-22329, CVE-2025-22330, CVE-2025-22331, CVE-2025-22332, CVE-2025-22333, CVE-2025-22334, CVE-2025-22335, CVE-2025-22336, CVE-2025-22337, CVE-2025-22338, CVE-2025-22339, CVE-2025-22340, CVE-2025-22341, CVE-2025-22342, CVE-2025-22343, CVE-2025-22344, CVE-2025-22345, CVE-2025-22346, CVE-2025-22347, CVE-2025-22348, CVE-2025-22349, CVE-2025-22350, CVE-2025-22351, CVE-2025-22352, CVE-2025-22354, CVE-2025-22355, CVE-2025-22356, CVE-2025-22357, CVE-2025-22358, CVE-2025-22359, CVE-2025-22360, CVE-2025-22361, CVE-2025-22362, CVE-2025-22363, CVE-2025-22364, CVE-2025-22365, CVE-2025-22496, CVE-2025-22497, CVE-2025-22498, CVE-2025-22499, CVE-2025-22500, CVE-2025-22501, CVE-2025-22502, CVE-2025-22503, CVE-2025-22504, CVE-2025-22505, CVE-2025-22506, CVE-2025-22507, CVE-2025-22508, CVE-2025-22509, CVE-2025-22510, CVE-2025-22511, CVE-2025-22512, CVE-2025-22513, CVE-2025-22514, CVE-2025-22515, CVE-2025-22516, CVE-2025-22517, CVE-2025-22518, CVE-2025-22519, CVE-2025-22520, CVE-2025-22521, CVE-2025-22522, CVE-2025-22523, CVE-2025-22524, CVE-2025-22525, CVE-2025-22526, CVE-2025-22528, CVE-2025-22529, CVE-2025-22530, CVE-2025-22532, CVE-2025-22533, CVE-2025-22534, CVE-2025-22535, CVE-2025-22536, CVE-2025-22537, CVE-2025-22538, CVE-2025-22539, CVE-2025-22540, CVE-2025-22541, CVE-2025-22542, CVE-2025-22543, CVE-2025-22544, CVE-2025-22545, CVE-2025-22546, CVE-2025-22547, CVE-2025-22548, CVE-2025-22549, CVE-2025-22550, CVE-2025-22551, CVE-2025-22552, CVE-2025-22553, CVE-2025-22554, CVE-2025-22555, CVE-2025-22556, CVE-2025-22557, CVE-2025-22558, CVE-2025-22559, CVE-2025-22560, CVE-2025-22561, CVE-2025-22562, CVE-2025-22563, CVE-2025-22564, CVE-2025-22565, CVE-2025-22566, CVE-2025-22567, CVE-2025-22568, CVE-2025-22569, CVE-2025-22570, CVE-2025-22571, CVE-2025-22572, CVE-2025-22573, CVE-2025-22574, CVE-2025-22575, CVE-2025-22576, CVE-2025-22577, CVE-2025-22578, CVE-2025-22579, CVE-2025-22580, CVE-2025-22581, CVE-2025-22582, CVE-2025-22583, CVE-2025-22584, CVE-2025-22585, CVE-2025-22586, CVE-2025-22587, CVE-2025-22588, CVE-2025-22589, CVE-2025-22590, CVE-2025-22591, CVE-2025-22592, CVE-2025-22593, CVE-2025-22594, CVE-2025-22595, CVE-2025-22628, CVE-2025-22629, CVE-2025-22630, CVE-2025-22631, CVE-2025-22632, CVE-2025-22634, CVE-2025-22635, CVE-2025-22636, CVE-2025-22637, CVE-2025-22638, CVE-2025-22639, CVE-2025-22640, CVE-2025-22641, CVE-2025-22642, CVE-2025-22643, CVE-2025-22644, CVE-2025-22646, CVE-2025-22647, CVE-2025-22648, CVE-2025-22649, CVE-2025-22651, CVE-2025-22652, CVE-2025-22653, CVE-2025-22654, CVE-2025-22655, CVE-2025-22656, CVE-2025-22657, CVE-2025-22658, CVE-2025-22659, CVE-2025-22660, CVE-2025-22661, CVE-2025-22662, CVE-2025-22663, CVE-2025-22664, CVE-2025-22665, CVE-2025-22667, CVE-2025-22668, CVE-2025-22669, CVE-2025-22670, CVE-2025-22671, CVE-2025-22672, CVE-2025-22673, CVE-2025-22674, CVE-2025-22675, CVE-2025-22676, CVE-2025-22677, CVE-2025-22678, CVE-2025-22679, CVE-2025-22680, CVE-2025-22681, CVE-2025-22682, CVE-2025-22683, CVE-2025-22684, CVE-2025-22685, CVE-2025-22686, CVE-2025-22687, CVE-2025-22688, CVE-2025-22689, CVE-2025-22690, CVE-2025-22691, CVE-2025-22692, CVE-2025-22693, CVE-2025-22694, CVE-2025-22695, CVE-2025-22696, CVE-2025-22697, CVE-2025-22699, CVE-2025-22700, CVE-2025-22701, CVE-2025-22702, CVE-2025-22703, CVE-2025-22704, CVE-2025-22705, CVE-2025-22706, CVE-2025-22707, CVE-2025-22708, CVE-2025-22709, CVE-2025-22710, CVE-2025-22712, CVE-2025-22713, CVE-2025-22714, CVE-2025-22715, CVE-2025-22716, CVE-2025-22717, CVE-2025-22718, CVE-2025-22719, CVE-2025-22720, CVE-2025-22721, CVE-2025-22722, CVE-2025-22723, CVE-2025-22725, CVE-2025-22726, CVE-2025-22727, CVE-2025-22728, CVE-2025-22729, CVE-2025-22730, CVE-2025-22731, CVE-2025-22732, CVE-2025-22733, CVE-2025-22734, CVE-2025-22735, CVE-2025-22736, CVE-2025-22737, CVE-2025-22738, CVE-2025-22739, CVE-2025-22740, CVE-2025-22742, CVE-2025-22743, CVE-2025-22744, CVE-2025-22745, CVE-2025-22746, CVE-2025-22747, CVE-2025-22748, CVE-2025-22749, CVE-2025-22750, CVE-2025-22751, CVE-2025-22752, CVE-2025-22753, CVE-2025-22755, CVE-2025-22757, CVE-2025-22758, CVE-2025-22759, CVE-2025-22760, CVE-2025-22761, CVE-2025-22762, CVE-2025-22763, CVE-2025-22764, CVE-2025-22765, CVE-2025-22766, CVE-2025-22767, CVE-2025-22768, CVE-2025-22770, CVE-2025-22771, CVE-2025-22772, CVE-2025-22774, CVE-2025-22775, CVE-2025-22776, CVE-2025-22777, CVE-2025-22778, CVE-2025-22779, CVE-2025-22780, CVE-2025-22781, CVE-2025-22782, CVE-2025-22783, CVE-2025-22784, CVE-2025-22785, CVE-2025-22786, CVE-2025-22787, CVE-2025-22788, CVE-2025-22789, CVE-2025-22790, CVE-2025-22791, CVE-2025-22792, CVE-2025-22794, CVE-2025-22795, CVE-2025-22796, CVE-2025-22797, CVE-2025-22798, CVE-2025-22799, CVE-2025-22800, CVE-2025-22801, CVE-2025-22802, CVE-2025-22803, CVE-2025-22804, CVE-2025-22805, CVE-2025-22806, CVE-2025-22807, CVE-2025-22808, CVE-2025-22809, CVE-2025-22810, CVE-2025-22811, CVE-2025-22812, CVE-2025-22813, CVE-2025-22814, CVE-2025-22815, CVE-2025-22816, CVE-2025-22817, CVE-2025-22818, CVE-2025-22819, CVE-2025-22820, CVE-2025-22821, CVE-2025-22822, CVE-2025-22823, CVE-2025-22824, CVE-2025-22825, CVE-2025-22826, CVE-2025-22827, CVE-2025-23422, CVE-2025-23423, CVE-2025-23424, CVE-2025-23425, CVE-2025-23426, CVE-2025-23427, CVE-2025-23428, CVE-2025-23430, CVE-2025-23431, CVE-2025-23433, CVE-2025-23435, CVE-2025-23436, CVE-2025-23437, CVE-2025-23438, CVE-2025-23439, CVE-2025-23440, CVE-2025-23441, CVE-2025-23442, CVE-2025-23443, CVE-2025-23445, CVE-2025-23446, CVE-2025-23447, CVE-2025-23448, CVE-2025-23449, CVE-2025-23450, CVE-2025-23451, CVE-2025-23452, CVE-2025-23453, CVE-2025-23454, CVE-2025-23455, CVE-2025-23456, CVE-2025-23457, CVE-2025-23458, CVE-2025-23459, CVE-2025-23460, CVE-2025-23461, CVE-2025-23462, CVE-2025-23463, CVE-2025-23464, CVE-2025-23465, CVE-2025-23466, CVE-2025-23467, CVE-2025-23468, CVE-2025-23469, CVE-2025-23470, CVE-2025-23471, CVE-2025-23472, CVE-2025-23473, CVE-2025-23474, CVE-2025-23475, CVE-2025-23476, CVE-2025-23477, CVE-2025-23478, CVE-2025-23479, CVE-2025-23480, CVE-2025-23481, CVE-2025-23482, CVE-2025-23483, CVE-2025-23484, CVE-2025-23485, CVE-2025-23486, CVE-2025-23487, CVE-2025-23488, CVE-2025-23489, CVE-2025-23490, CVE-2025-23491, CVE-2025-23492, CVE-2025-23493, CVE-2025-23494, CVE-2025-23495, CVE-2025-23496, CVE-2025-23497, CVE-2025-23498, CVE-2025-23499, CVE-2025-23500, CVE-2025-23501, CVE-2025-23502, CVE-2025-23503, CVE-2025-23505, CVE-2025-23506, CVE-2025-23507, CVE-2025-23508, CVE-2025-23509, CVE-2025-23510, CVE-2025-23511, CVE-2025-23512, CVE-2025-23513, CVE-2025-23514, CVE-2025-23515, CVE-2025-23516, CVE-2025-23517, CVE-2025-23518, CVE-2025-23519, CVE-2025-23520, CVE-2025-23521, CVE-2025-23522, CVE-2025-23523, CVE-2025-23524, CVE-2025-23525, CVE-2025-23526, CVE-2025-23527, CVE-2025-23529, CVE-2025-23530, CVE-2025-23531, CVE-2025-23532, CVE-2025-23533, CVE-2025-23534, CVE-2025-23535, CVE-2025-23536, CVE-2025-23537, CVE-2025-23538, CVE-2025-23539, CVE-2025-23540, CVE-2025-23541, CVE-2025-23542, CVE-2025-23543, CVE-2025-23544, CVE-2025-23545, CVE-2025-23546, CVE-2025-23547, CVE-2025-23548, CVE-2025-23549, CVE-2025-23550, CVE-2025-23551, CVE-2025-23552, CVE-2025-23553, CVE-2025-23554, CVE-2025-23555, CVE-2025-23556, CVE-2025-23557, CVE-2025-23558, CVE-2025-23559, CVE-2025-23560, CVE-2025-23561, CVE-2025-23562, CVE-2025-23563, CVE-2025-23564, CVE-2025-23565, CVE-2025-23566, CVE-2025-23567, CVE-2025-23568, CVE-2025-23569, CVE-2025-23570, CVE-2025-23571, CVE-2025-23572, CVE-2025-23573, CVE-2025-23574, CVE-2025-23575, CVE-2025-23576, CVE-2025-23577, CVE-2025-23578, CVE-2025-23579, CVE-2025-23580, CVE-2025-23581, CVE-2025-23582, CVE-2025-23583, CVE-2025-23584, CVE-2025-23585, CVE-2025-23586, CVE-2025-23587, CVE-2025-23588, CVE-2025-23589, CVE-2025-23590, CVE-2025-23591, CVE-2025-23592, CVE-2025-23593, CVE-2025-23594, CVE-2025-23595, CVE-2025-23596, CVE-2025-23597, CVE-2025-23598, CVE-2025-23599, CVE-2025-23600, CVE-2025-23601, CVE-2025-23602, CVE-2025-23603, CVE-2025-23604, CVE-2025-23605, CVE-2025-23606, CVE-2025-23607, CVE-2025-23608, CVE-2025-23609, CVE-2025-23610, CVE-2025-23611, CVE-2025-23612, CVE-2025-23613, CVE-2025-23614, CVE-2025-23615, CVE-2025-23616, CVE-2025-23617, CVE-2025-23618, CVE-2025-23619, CVE-2025-23620, CVE-2025-23621, CVE-2025-23622, CVE-2025-23623, CVE-2025-23624, CVE-2025-23625, CVE-2025-23626, CVE-2025-23627, CVE-2025-23628, CVE-2025-23629, CVE-2025-23630, CVE-2025-23631, CVE-2025-23632, CVE-2025-23633, CVE-2025-23634, CVE-2025-23635, CVE-2025-23636, CVE-2025-23637, CVE-2025-23638, CVE-2025-23639, CVE-2025-23640, CVE-2025-23641, CVE-2025-23642, CVE-2025-23643, CVE-2025-23644, CVE-2025-23645, CVE-2025-23646, CVE-2025-23647, CVE-2025-23648, CVE-2025-23649, CVE-2025-23650, CVE-2025-23651, CVE-2025-23652, CVE-2025-23653, CVE-2025-23654, CVE-2025-23655, CVE-2025-23656, CVE-2025-23657, CVE-2025-23658, CVE-2025-23659, CVE-2025-23660, CVE-2025-23661, CVE-2025-23662, CVE-2025-23663, CVE-2025-23664, CVE-2025-23665, CVE-2025-23666, CVE-2025-23667, CVE-2025-23668, CVE-2025-23669, CVE-2025-23670, CVE-2025-23671, CVE-2025-23672, CVE-2025-23673, CVE-2025-23674, CVE-2025-23675, CVE-2025-23676, CVE-2025-23677, CVE-2025-23678, CVE-2025-23679, CVE-2025-23680, CVE-2025-23681, CVE-2025-23682, CVE-2025-23683, CVE-2025-23684, CVE-2025-23685, CVE-2025-23686, CVE-2025-23687, CVE-2025-23688, CVE-2025-23689, CVE-2025-23690, CVE-2025-23691, CVE-2025-23692, CVE-2025-23693, CVE-2025-23694, CVE-2025-23695, CVE-2025-23696, CVE-2025-23697, CVE-2025-23698, CVE-2025-23699, CVE-2025-23700, CVE-2025-23701, CVE-2025-23702, CVE-2025-23703, CVE-2025-23704, CVE-2025-23705, CVE-2025-23706, CVE-2025-23707, CVE-2025-23708, CVE-2025-23709, CVE-2025-23710, CVE-2025-23711, CVE-2025-23712, CVE-2025-23713, CVE-2025-23714, CVE-2025-23715, CVE-2025-23716, CVE-2025-23717, CVE-2025-23718, CVE-2025-23719, CVE-2025-23720, CVE-2025-23721, CVE-2025-23722, CVE-2025-23723, CVE-2025-23724, CVE-2025-23725, CVE-2025-23726, CVE-2025-23727, CVE-2025-23728, CVE-2025-23729, CVE-2025-23730, CVE-2025-23731, CVE-2025-23732, CVE-2025-23733, CVE-2025-23734, CVE-2025-23735, CVE-2025-23736, CVE-2025-23737, CVE-2025-23738, CVE-2025-23739, CVE-2025-23740, CVE-2025-23741, CVE-2025-23742, CVE-2025-23743, CVE-2025-23744, CVE-2025-23745, CVE-2025-23746, CVE-2025-23747, CVE-2025-23748, CVE-2025-23749, CVE-2025-23750, CVE-2025-23751, CVE-2025-23752, CVE-2025-23753, CVE-2025-23754, CVE-2025-23755, CVE-2025-23756, CVE-2025-23757, CVE-2025-23758, CVE-2025-23759, CVE-2025-23760, CVE-2025-23761, CVE-2025-23762, CVE-2025-23763, CVE-2025-23764, CVE-2025-23765, CVE-2025-23766, CVE-2025-23767, CVE-2025-23768, CVE-2025-23769, CVE-2025-23770, CVE-2025-23771, CVE-2025-23772, CVE-2025-23773, CVE-2025-23774, CVE-2025-23775, CVE-2025-23776, CVE-2025-23777, CVE-2025-23778, CVE-2025-23779, CVE-2025-23780, CVE-2025-23781, CVE-2025-23782, CVE-2025-23783, CVE-2025-23785, CVE-2025-23786, CVE-2025-23787, CVE-2025-23788, CVE-2025-23789, CVE-2025-23790, CVE-2025-23791, CVE-2025-23792, CVE-2025-23793, CVE-2025-23794, CVE-2025-23795, CVE-2025-23796, CVE-2025-23797, CVE-2025-23798, CVE-2025-23799, CVE-2025-23800, CVE-2025-23801, CVE-2025-23802, CVE-2025-23803, CVE-2025-23804, CVE-2025-23805, CVE-2025-23807, CVE-2025-23808, CVE-2025-23809, CVE-2025-23810, CVE-2025-23811, CVE-2025-23812, CVE-2025-23813, CVE-2025-23814, CVE-2025-23815, CVE-2025-23816, CVE-2025-23817, CVE-2025-23818, CVE-2025-23819, CVE-2025-23820, CVE-2025-23821, CVE-2025-23822, CVE-2025-23823, CVE-2025-23824, CVE-2025-23825, CVE-2025-23826, CVE-2025-23827, CVE-2025-23828, CVE-2025-23829, CVE-2025-23830, CVE-2025-23831, CVE-2025-23832, CVE-2025-23833, CVE-2025-23834, CVE-2025-23835, CVE-2025-23836, CVE-2025-23837, CVE-2025-23838, CVE-2025-23839, CVE-2025-23840, CVE-2025-23841, CVE-2025-23842, CVE-2025-23843, CVE-2025-23844, CVE-2025-23845, CVE-2025-23846, CVE-2025-23847, CVE-2025-23848, CVE-2025-23849, CVE-2025-23850, CVE-2025-23851, CVE-2025-23852, CVE-2025-23853, CVE-2025-23854, CVE-2025-23855, CVE-2025-23856, CVE-2025-23857, CVE-2025-23858, CVE-2025-23859, CVE-2025-23860, CVE-2025-23861, CVE-2025-23862, CVE-2025-23863, CVE-2025-23864, CVE-2025-23865, CVE-2025-23866, CVE-2025-23867, CVE-2025-23868, CVE-2025-23869, CVE-2025-23870, CVE-2025-23871, CVE-2025-23872, CVE-2025-23873, CVE-2025-23874, CVE-2025-23875, CVE-2025-23876, CVE-2025-23877, CVE-2025-23878, CVE-2025-23879, CVE-2025-23880, CVE-2025-23881, CVE-2025-23882, CVE-2025-23883, CVE-2025-23884, CVE-2025-23885, CVE-2025-23886, CVE-2025-23887, CVE-2025-23888, CVE-2025-23889, CVE-2025-23890, CVE-2025-23891, CVE-2025-23892, CVE-2025-23893, CVE-2025-23894, CVE-2025-23895, CVE-2025-23896, CVE-2025-23897, CVE-2025-23898, CVE-2025-23899, CVE-2025-23900, CVE-2025-23901, CVE-2025-23902, CVE-2025-23903, CVE-2025-23904, CVE-2025-23905, CVE-2025-23906, CVE-2025-23907, CVE-2025-23908, CVE-2025-23909, CVE-2025-23910, CVE-2025-23911, CVE-2025-23912, CVE-2025-23913, CVE-2025-23914, CVE-2025-23915, CVE-2025-23916, CVE-2025-23917, CVE-2025-23918, CVE-2025-23919, CVE-2025-23920, CVE-2025-23921, CVE-2025-23922, CVE-2025-23923, CVE-2025-23924, CVE-2025-23925, CVE-2025-23926, CVE-2025-23927, CVE-2025-23928, CVE-2025-23929, CVE-2025-23930, CVE-2025-23931, CVE-2025-23932, CVE-2025-23933, CVE-2025-23934, CVE-2025-23935, CVE-2025-23936, CVE-2025-23937, CVE-2025-23938, CVE-2025-23939, CVE-2025-23940, CVE-2025-23941, CVE-2025-23942, CVE-2025-23943, CVE-2025-23944, CVE-2025-23945, CVE-2025-23946, CVE-2025-23947, CVE-2025-23948, CVE-2025-23949, CVE-2025-23950, CVE-2025-23951, CVE-2025-23952, CVE-2025-23953, CVE-2025-23954, CVE-2025-23955, CVE-2025-23956, CVE-2025-23957, CVE-2025-23958, CVE-2025-23959, CVE-2025-23960, CVE-2025-23961, CVE-2025-23962, CVE-2025-23963, CVE-2025-23964, CVE-2025-23965, CVE-2025-23966, CVE-2025-23967, CVE-2025-23968, CVE-2025-23969, CVE-2025-23970, CVE-2025-23971, CVE-2025-23972, CVE-2025-23973, CVE-2025-23974, CVE-2025-23975, CVE-2025-23976, CVE-2025-23977, CVE-2025-23978, CVE-2025-23979, CVE-2025-23980, CVE-2025-23981, CVE-2025-23982, CVE-2025-23983, CVE-2025-23984, CVE-2025-23985, CVE-2025-23986, CVE-2025-23987, CVE-2025-23988, CVE-2025-23989, CVE-2025-23990, CVE-2025-23991, CVE-2025-23992, CVE-2025-23993, CVE-2025-23994, CVE-2025-23995, CVE-2025-23996, CVE-2025-23997, CVE-2025-23998, CVE-2025-23999, CVE-2025-24000, CVE-2025-24001, CVE-2025-24533, CVE-2025-24534, CVE-2025-24535, CVE-2025-24536, CVE-2025-24537, CVE-2025-24538, CVE-2025-24539, CVE-2025-24540, CVE-2025-24541, CVE-2025-24542, CVE-2025-24543, CVE-2025-24544, CVE-2025-24545, CVE-2025-24546, CVE-2025-24547, CVE-2025-24548, CVE-2025-24549, CVE-2025-24550, CVE-2025-24551, CVE-2025-24552, CVE-2025-24553, CVE-2025-24554, CVE-2025-24555, CVE-2025-24557, CVE-2025-24558, CVE-2025-24559, CVE-2025-24560, CVE-2025-24561, CVE-2025-24562, CVE-2025-24563, CVE-2025-24564, CVE-2025-24565, CVE-2025-24566, CVE-2025-24567, CVE-2025-24568, CVE-2025-24569, CVE-2025-24570, CVE-2025-24571, CVE-2025-24572, CVE-2025-24573, CVE-2025-24574, CVE-2025-24575, CVE-2025-24576, CVE-2025-24577, CVE-2025-24578, CVE-2025-24579, CVE-2025-24580, CVE-2025-24581, CVE-2025-24582, CVE-2025-24583, CVE-2025-24584, CVE-2025-24585, CVE-2025-24586, CVE-2025-24587, CVE-2025-24588, CVE-2025-24589, CVE-2025-24590, CVE-2025-24591, CVE-2025-24592, CVE-2025-24593, CVE-2025-24594, CVE-2025-24595, CVE-2025-24596, CVE-2025-24597, CVE-2025-24598, CVE-2025-24599, CVE-2025-24600, CVE-2025-24601, CVE-2025-24602, CVE-2025-24603, CVE-2025-24604, CVE-2025-24605, CVE-2025-24608, CVE-2025-24609, CVE-2025-24610, CVE-2025-24611, CVE-2025-24612, CVE-2025-24613, CVE-2025-24614, CVE-2025-24615, CVE-2025-24616, CVE-2025-24617, CVE-2025-24618, CVE-2025-24619, CVE-2025-24620, CVE-2025-24621, CVE-2025-24622, CVE-2025-24623, CVE-2025-24624, CVE-2025-24625, CVE-2025-24626, CVE-2025-24627, CVE-2025-24629, CVE-2025-24630, CVE-2025-24631, CVE-2025-24632, CVE-2025-24633, CVE-2025-24634, CVE-2025-24635, CVE-2025-24636, CVE-2025-24637, CVE-2025-24638, CVE-2025-24639, CVE-2025-24640, CVE-2025-24641, CVE-2025-24642, CVE-2025-24644, CVE-2025-24645, CVE-2025-24646, CVE-2025-24647, CVE-2025-24648, CVE-2025-24649, CVE-2025-24650, CVE-2025-24652, CVE-2025-24653, CVE-2025-24654, CVE-2025-24655, CVE-2025-24656, CVE-2025-24657, CVE-2025-24658, CVE-2025-24659, CVE-2025-24660, CVE-2025-24661, CVE-2025-24662, CVE-2025-24663, CVE-2025-24664, CVE-2025-24665, CVE-2025-24666, CVE-2025-24667, CVE-2025-24668, CVE-2025-24669, CVE-2025-24670, CVE-2025-24671, CVE-2025-24672, CVE-2025-24673, CVE-2025-24674, CVE-2025-24675, CVE-2025-24676, CVE-2025-24677, CVE-2025-24678, CVE-2025-24679, CVE-2025-24680, CVE-2025-24681, CVE-2025-24682, CVE-2025-24683, CVE-2025-24684, CVE-2025-24685, CVE-2025-24686, CVE-2025-24687, CVE-2025-24688, CVE-2025-24689, CVE-2025-24690, CVE-2025-24691, CVE-2025-24692, CVE-2025-24693, CVE-2025-24694, CVE-2025-24695, CVE-2025-24696, CVE-2025-24697, CVE-2025-24698, CVE-2025-24699, CVE-2025-24700, CVE-2025-24701, CVE-2025-24702, CVE-2025-24703, CVE-2025-24704, CVE-2025-24705, CVE-2025-24706, CVE-2025-24707, CVE-2025-24708, CVE-2025-24709, CVE-2025-24710, CVE-2025-24711, CVE-2025-24712, CVE-2025-24713, CVE-2025-24714, CVE-2025-24715, CVE-2025-24716, CVE-2025-24717, CVE-2025-24718, CVE-2025-24719, CVE-2025-24720, CVE-2025-24721, CVE-2025-24722, CVE-2025-24723, CVE-2025-24724, CVE-2025-24725, CVE-2025-24726, CVE-2025-24727, CVE-2025-24728, CVE-2025-24729, CVE-2025-24730, CVE-2025-24731, CVE-2025-24732, CVE-2025-24733, CVE-2025-24734, CVE-2025-24736, CVE-2025-24737, CVE-2025-24738, CVE-2025-24739, CVE-2025-24740, CVE-2025-24741, CVE-2025-24742, CVE-2025-24743, CVE-2025-24744, CVE-2025-24745, CVE-2025-24746, CVE-2025-24747, CVE-2025-24748, CVE-2025-24749, CVE-2025-24750, CVE-2025-24751, CVE-2025-24752, CVE-2025-24753, CVE-2025-24754, CVE-2025-24755, CVE-2025-24756, CVE-2025-24757, CVE-2025-24758, CVE-2025-24759, CVE-2025-24760, CVE-2025-24761, CVE-2025-24762, CVE-2025-24763, CVE-2025-24764, CVE-2025-24765, CVE-2025-24766, CVE-2025-24767, CVE-2025-24768, CVE-2025-24769, CVE-2025-24770, CVE-2025-24771, CVE-2025-24772, CVE-2025-24773, CVE-2025-24774, CVE-2025-24775, CVE-2025-24776, CVE-2025-24777, CVE-2025-24778, CVE-2025-24779, CVE-2025-24780, CVE-2025-24781, CVE-2025-24782, CVE-2025-25070, CVE-2025-25071, CVE-2025-25072, CVE-2025-25073, CVE-2025-25074, CVE-2025-25075, CVE-2025-25076, CVE-2025-25077, CVE-2025-25078, CVE-2025-25079, CVE-2025-25080, CVE-2025-25081, CVE-2025-25082, CVE-2025-25083, CVE-2025-25085, CVE-2025-25086, CVE-2025-25087, CVE-2025-25088, CVE-2025-25089, CVE-2025-25090, CVE-2025-25091, CVE-2025-25092, CVE-2025-25093, CVE-2025-25094, CVE-2025-25095, CVE-2025-25096, CVE-2025-25097, CVE-2025-25098, CVE-2025-25099, CVE-2025-25100, CVE-2025-25101, CVE-2025-25102, CVE-2025-25103, CVE-2025-25104, CVE-2025-25105, CVE-2025-25106, CVE-2025-25107, CVE-2025-25108, CVE-2025-25109, CVE-2025-25110, CVE-2025-25111, CVE-2025-25112, CVE-2025-25113, CVE-2025-25114, CVE-2025-25115, CVE-2025-25116, CVE-2025-25117, CVE-2025-25118, CVE-2025-25119, CVE-2025-25120, CVE-2025-25121, CVE-2025-25122, CVE-2025-25123, CVE-2025-25124, CVE-2025-25125, CVE-2025-25126, CVE-2025-25127, CVE-2025-25128, CVE-2025-25129, CVE-2025-25130, CVE-2025-25131, CVE-2025-25132, CVE-2025-25133, CVE-2025-25134, CVE-2025-25135, CVE-2025-25136, CVE-2025-25137, CVE-2025-25138, CVE-2025-25139, CVE-2025-25140, CVE-2025-25141, CVE-2025-25142, CVE-2025-25143, CVE-2025-25144, CVE-2025-25145, CVE-2025-25146, CVE-2025-25147, CVE-2025-25148, CVE-2025-25149, CVE-2025-25150, CVE-2025-25151, CVE-2025-25152, CVE-2025-25153, CVE-2025-25154, CVE-2025-25155, CVE-2025-25156, CVE-2025-25157, CVE-2025-25158, CVE-2025-25159, CVE-2025-25160, CVE-2025-25161, CVE-2025-25162, CVE-2025-25163, CVE-2025-25164, CVE-2025-25165, CVE-2025-25166, CVE-2025-25167, CVE-2025-25168, CVE-2025-25169, CVE-2025-25170, CVE-2025-25171, CVE-2025-25172, CVE-2025-25173, CVE-2025-25174, CVE-2025-26534, CVE-2025-26535, CVE-2025-26536, CVE-2025-26537, CVE-2025-26538, CVE-2025-26539, CVE-2025-26540, CVE-2025-26541, CVE-2025-26542, CVE-2025-26543, CVE-2025-26544, CVE-2025-26545, CVE-2025-26546, CVE-2025-26547, CVE-2025-26548, CVE-2025-26549, CVE-2025-26550, CVE-2025-26551, CVE-2025-26552, CVE-2025-26553, CVE-2025-26554, CVE-2025-26555, CVE-2025-26556, CVE-2025-26557, CVE-2025-26558, CVE-2025-26559, CVE-2025-26560, CVE-2025-26561, CVE-2025-26562, CVE-2025-26563, CVE-2025-26564, CVE-2025-26565, CVE-2025-26566, CVE-2025-26567, CVE-2025-26568, CVE-2025-26569, CVE-2025-26570, CVE-2025-26571, CVE-2025-26572, CVE-2025-26573, CVE-2025-26574, CVE-2025-26575, CVE-2025-26576, CVE-2025-26577, CVE-2025-26578, CVE-2025-26579, CVE-2025-26580, CVE-2025-26581, CVE-2025-26582, CVE-2025-26583, CVE-2025-26584, CVE-2025-26585, CVE-2025-26586, CVE-2025-26587, CVE-2025-26588, CVE-2025-26589, CVE-2025-26590, CVE-2025-26591, CVE-2025-26592, CVE-2025-26593, CVE-2025-26730, CVE-2025-26731, CVE-2025-26732, CVE-2025-26733, CVE-2025-26734, CVE-2025-26735, CVE-2025-26736, CVE-2025-26737, CVE-2025-26738, CVE-2025-26739, CVE-2025-26740, CVE-2025-26741, CVE-2025-26742, CVE-2025-26743, CVE-2025-26744, CVE-2025-26745, CVE-2025-26746, CVE-2025-26747, CVE-2025-26748, CVE-2025-26749, CVE-2025-26750, CVE-2025-26751, CVE-2025-26752, CVE-2025-26753, CVE-2025-26754, CVE-2025-26755, CVE-2025-26756, CVE-2025-26757, CVE-2025-26758, CVE-2025-26759, CVE-2025-26761, CVE-2025-26762, CVE-2025-26763, CVE-2025-26764, CVE-2025-26765, CVE-2025-26766, CVE-2025-26767, CVE-2025-26768, CVE-2025-26769, CVE-2025-26770, CVE-2025-26771, CVE-2025-26772, CVE-2025-26773, CVE-2025-26774, CVE-2025-26775, CVE-2025-26776, CVE-2025-26778, CVE-2025-26779, CVE-2025-26867, CVE-2025-26868, CVE-2025-26870, CVE-2025-26871, CVE-2025-26872, CVE-2025-26873, CVE-2025-26874, CVE-2025-26875, CVE-2025-26876, CVE-2025-26877, CVE-2025-26878, CVE-2025-26880, CVE-2025-26881, CVE-2025-26882, CVE-2025-26883, CVE-2025-26884, CVE-2025-26886, CVE-2025-26887, CVE-2025-26888, CVE-2025-26889, CVE-2025-26890, CVE-2025-26891, CVE-2025-26892, CVE-2025-26893, CVE-2025-26894, CVE-2025-26895, CVE-2025-26896, CVE-2025-26897, CVE-2025-26898, CVE-2025-26899, CVE-2025-26900, CVE-2025-26901, CVE-2025-26902, CVE-2025-26903, CVE-2025-26904, CVE-2025-26905, CVE-2025-26906, CVE-2025-26907, CVE-2025-26908, CVE-2025-26909, CVE-2025-26910, CVE-2025-26911, CVE-2025-26912, CVE-2025-26913, CVE-2025-26914, CVE-2025-26915, CVE-2025-26916, CVE-2025-26918, CVE-2025-26919, CVE-2025-26920, CVE-2025-26921, CVE-2025-26922, CVE-2025-26923, CVE-2025-26924, CVE-2025-26925, CVE-2025-26926, CVE-2025-26927, CVE-2025-26928, CVE-2025-26929, CVE-2025-26930, CVE-2025-26931, CVE-2025-26932, CVE-2025-26933, CVE-2025-26934, CVE-2025-26935, CVE-2025-26936, CVE-2025-26937, CVE-2025-26938, CVE-2025-26939, CVE-2025-26940, CVE-2025-26941, CVE-2025-26943, CVE-2025-26944, CVE-2025-26945, CVE-2025-26946, CVE-2025-26947, CVE-2025-26948, CVE-2025-26949, CVE-2025-26950, CVE-2025-26951, CVE-2025-26952, CVE-2025-26954, CVE-2025-26955, CVE-2025-26956, CVE-2025-26957, CVE-2025-26959, CVE-2025-26960, CVE-2025-26961, CVE-2025-26962, CVE-2025-26963, CVE-2025-26964, CVE-2025-26966, CVE-2025-26967, CVE-2025-26968, CVE-2025-26969, CVE-2025-26970, CVE-2025-26971, CVE-2025-26972, CVE-2025-26973, CVE-2025-26974, CVE-2025-26975, CVE-2025-26976, CVE-2025-26977, CVE-2025-26978, CVE-2025-26979, CVE-2025-26980, CVE-2025-26981, CVE-2025-26982, CVE-2025-26983, CVE-2025-26984, CVE-2025-26985, CVE-2025-26986, CVE-2025-26987, CVE-2025-26988, CVE-2025-26989, CVE-2025-26990, CVE-2025-26991, CVE-2025-26992, CVE-2025-26993, CVE-2025-26994, CVE-2025-26995, CVE-2025-26996, CVE-2025-26997, CVE-2025-26998, CVE-2025-26999, CVE-2025-27000, CVE-2025-27001, CVE-2025-27002, CVE-2025-27003, CVE-2025-27004, CVE-2025-27005, CVE-2025-27006, CVE-2025-27007, CVE-2025-27008, CVE-2025-27009, CVE-2025-27010, CVE-2025-27011, CVE-2025-27012, CVE-2025-27013, CVE-2025-27014, CVE-2025-27015, CVE-2025-27016, CVE-2025-27263, CVE-2025-27264, CVE-2025-27265, CVE-2025-27266, CVE-2025-27267, CVE-2025-27268, CVE-2025-27269, CVE-2025-27270, CVE-2025-27271, CVE-2025-27272, CVE-2025-27273, CVE-2025-27274, CVE-2025-27275, CVE-2025-27276, CVE-2025-27277, CVE-2025-27278, CVE-2025-27279, CVE-2025-27280, CVE-2025-27281, CVE-2025-27282, CVE-2025-27283, CVE-2025-27284, CVE-2025-27285, CVE-2025-27286, CVE-2025-27287, CVE-2025-27288, CVE-2025-27289, CVE-2025-27290, CVE-2025-27291, CVE-2025-27292, CVE-2025-27293, CVE-2025-27294, CVE-2025-27295, CVE-2025-27296, CVE-2025-27297, CVE-2025-27298, CVE-2025-27299, CVE-2025-27300, CVE-2025-27301, CVE-2025-27302, CVE-2025-27303, CVE-2025-27304, CVE-2025-27305, CVE-2025-27306, CVE-2025-27307, CVE-2025-27308, CVE-2025-27309, CVE-2025-27310, CVE-2025-27311, CVE-2025-27312, CVE-2025-27313, CVE-2025-27314, CVE-2025-27315, CVE-2025-27316, CVE-2025-27317, CVE-2025-27318, CVE-2025-27319, CVE-2025-27320, CVE-2025-27321, CVE-2025-27322, CVE-2025-27323, CVE-2025-27324, CVE-2025-27325, CVE-2025-27326, CVE-2025-27327, CVE-2025-27328, CVE-2025-27329, CVE-2025-27330, CVE-2025-27331, CVE-2025-27332, CVE-2025-27333, CVE-2025-27334, CVE-2025-27335, CVE-2025-27336, CVE-2025-27337, CVE-2025-27338, CVE-2025-27339, CVE-2025-27340, CVE-2025-27341, CVE-2025-27342, CVE-2025-27343, CVE-2025-27344, CVE-2025-27345, CVE-2025-27347, CVE-2025-27348, CVE-2025-27349, CVE-2025-27350, CVE-2025-27351, CVE-2025-27352, CVE-2025-27353, CVE-2025-27354, CVE-2025-27355, CVE-2025-27356, CVE-2025-27357, CVE-2025-27358, CVE-2025-27359, CVE-2025-27360, CVE-2025-27361, CVE-2025-27362, CVE-2025-28855, CVE-2025-28856, CVE-2025-28857, CVE-2025-28859, CVE-2025-28860, CVE-2025-28861, CVE-2025-28862, CVE-2025-28863, CVE-2025-28864, CVE-2025-28865, CVE-2025-28866, CVE-2025-28867, CVE-2025-28868, CVE-2025-28869, CVE-2025-28870, CVE-2025-28871, CVE-2025-28872, CVE-2025-28873, CVE-2025-28874, CVE-2025-28875, CVE-2025-28876, CVE-2025-28877, CVE-2025-28878, CVE-2025-28879, CVE-2025-28880, CVE-2025-28881, CVE-2025-28882, CVE-2025-28883, CVE-2025-28884, CVE-2025-28885, CVE-2025-28886, CVE-2025-28887, CVE-2025-28888, CVE-2025-28889, CVE-2025-28890, CVE-2025-28891, CVE-2025-28892, CVE-2025-28893, CVE-2025-28894, CVE-2025-28895, CVE-2025-28896, CVE-2025-28897, CVE-2025-28898, CVE-2025-28899, CVE-2025-28900, CVE-2025-28901, CVE-2025-28902, CVE-2025-28903, CVE-2025-28904, CVE-2025-28905, CVE-2025-28906, CVE-2025-28907, CVE-2025-28908, CVE-2025-28909, CVE-2025-28910, CVE-2025-28911, CVE-2025-28912, CVE-2025-28913, CVE-2025-28914, CVE-2025-28915, CVE-2025-28916, CVE-2025-28917, CVE-2025-28918, CVE-2025-28919, CVE-2025-28920, CVE-2025-28921, CVE-2025-28922, CVE-2025-28923, CVE-2025-28924, CVE-2025-28925, CVE-2025-28926, CVE-2025-28927, CVE-2025-28928, CVE-2025-28929, CVE-2025-28930, CVE-2025-28931, CVE-2025-28932,...
Date: Thu, 23 Apr 2026 14:56:21 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:16 +0000 (11:32 -0400)]
linux-yocto/6.18: update to v6.18.24
Updating linux-yocto/6.18 to the latest korg -stable release that comprises
the following commits:
c0d886e4af57 Linux 6.18.24
ff628171d5f4 dma-mapping: handle DMA_ATTR_CPU_CACHE_CLEAN in trace output
c2d109c982e9 dma-debug: Allow multiple invocations of overlapping entries
574501ede47a mm/userfaultfd: fix hugetlb fault mutex hash calculation
07e9e674b614 media: hackrf: fix to not free memory after the device is registered in hackrf_probe()
6d75a9ec5bdb media: vidtv: fix pass-by-value structs causing MSAN warnings
c36e206f302f nilfs2: fix NULL i_assoc_inode dereference in nilfs_mdt_save_to_shadow_map
09e9206008b8 media: as102: fix to not free memory after the device is registered in as102_usb_probe()
9a9e69155b20 wireguard: device: use exit_rtnl callback instead of manual rtnl_lock in pre_exit
2d6965581e16 bcache: fix cached_dev.sb_bio use-after-free and crash
d21e8a2af486 ALSA: 6fire: fix use-after-free on disconnect
9e1b798257f9 hwmon: (powerz) Fix use-after-free on USB disconnect
871b8ea8ef39 media: em28xx: fix use-after-free in em28xx_v4l2_open()
f99353cd0e9f media: mediatek: vcodec: fix use-after-free in encoder release path
25f19e476ab1 media: vidtv: fix nfeeds state corruption on start_streaming failure
ea3af09eb87d mm: blk-cgroup: fix use-after-free in cgwb_release_workfn()
f6204f7ff6af mm/kasan: fix double free for kasan pXds
30383b7780ff ASoC: qcom: q6apm: move component registration to unmanaged version
22d2ff69d487 KVM: x86: Use scratch field in MMIO fragment to hold small write values
576d365f31d9 x86-64/arm64/powerpc: clean up and rename __copy_from_user_flushcache
03fd014cd9f3 x86: rename and clean up __copy_from_user_inatomic_nocache()
c6d4e0599e7e x86-64: rename misleadingly named '__copy_user_nocache()' function
8e7666acfabb checkpatch: add support for Assisted-by tag
0c1af902223b ocfs2: fix out-of-bounds write in ocfs2_write_end_inline
cd2d765aa715 ocfs2: validate inline data i_size during inode read
df030a9374a5 ocfs2: add inline inode consistency check to ocfs2_validate_inode_block()
0ed88ac9bc64 KVM: x86: Use __DECLARE_FLEX_ARRAY() for UAPI structures with VLAs
df61c2c99c7f KVM: Remove subtle "struct kvm_stats_desc" pseudo-overlay
9309daac5034 selftests/bpf: Test refinement of single-value tnum
28cc13ca2043 KVM: SEV: Drop WARN on large size for KVM_MEMORY_ENCRYPT_REG_REGION
30fd9d8c8208 KVM: SEV: Lock all vCPUs when synchronzing VMSAs for SNP launch finish
2c59132c4786 KVM: SEV: Disallow LAUNCH_FINISH if vCPUs are actively being created
35a0963d361f KVM: SEV: Protect *all* of sev_mem_enc_register_region() with kvm->lock
692fdf05e55f KVM: SEV: Reject attempts to sync VMSA of an already-launched/encrypted vCPU
5d57a1ee587c KVM: selftests: Remove duplicate LAUNCH_UPDATE_VMSA call in SEV-ES migrate test
cec9ead73ab1 PCI: endpoint: pci-epf-vntb: Remove duplicate resource teardown
9921cce25bfe PCI: endpoint: pci-epf-vntb: Stop cmd_handler work in epf_ntb_epc_cleanup
e384a850a337 ocfs2: handle invalid dinode in ocfs2_group_extend
d45ff441b416 ocfs2: fix use-after-free in ocfs2_fault() when VM_FAULT_RETRY
bc0fb5c7d54c ocfs2: fix possible deadlock between unlink and dio_end_io_write
2dff11fb5098 media: vidtv: fix NULL pointer dereference in vidtv_channel_pmt_match_sections
8140b21d1901 arm64: mm: Handle invalid large leaf mappings correctly
755b40903eff dcache: Limit the minimal number of bucket to two
3fd0685d7fef ALSA: ctxfi: Limit PTP to a single page
de5c3e67037f Docs/admin-guide/mm/damon/reclaim: warn commit_inputs vs param updates race
4c971d577a9f USB: serial: option: add Telit Cinterion FN990A MBIM composition
1412ba36597a staging: sm750fb: fix division by zero in ps_to_hz()
89a9c1bc7d79 wifi: rtw88: fix device leak on probe failure
9c401606e2d0 scripts: generate_rust_analyzer.py: avoid FD leak
6de048d78f30 fbdev: udlfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO
5d02df1b130b usb: port: add delay after usb_hub_set_port_power()
eb6ef6185f20 usb: gadget: f_hid: don't call cdev_init while cdev in use
5d29d7ff8679 USB: cdc-acm: Add quirks for Yoga Book 9 14IAH10 INGENIC touchscreen
63dc7cdb1f4e usb: storage: Expand range of matched versions for VL817 quirks entry
9aef3f979190 usb: typec: fusb302: Switch to threaded IRQ handler
906f16a836de usbip: validate number_of_packets in usbip_pack_ret_submit()
6968c91fab05 smb: server: avoid double-free in smb_direct_free_sendmsg after smb_direct_flush_send_list()
a9940dcbe5cb smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush()
dd53414e301b ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc
d2454f4a002d ksmbd: require 3 sub-authorities before reading sub_auth[2]
3363a770b193 ksmbd: validate EaNameLength in smb2_get_ea()
e0dd90d14cbb smb: client: fix OOB reads parsing symlink error response
b2b76d09a64c smb: client: fix off-by-8 bounds check in check_wsl_eas()
44216e3dd445 usb: gadget: renesas_usb3: validate endpoint index in standard request handlers
4e476c25bfca usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete()
6762f8a95772 usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb()
fc386daa6846 fbdev: tdfxfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO
67cfd14074cd ALSA: fireworks: bound device-supplied status before string array lookup
09b145c1f133 ALSA: usx2y: us144mkii: fix NULL deref on missing interface 0
0185e0494a56 drm/vc4: platform_get_irq_byname() returns an int
5a59bf70c38e NFC: digital: Bounds check NFC-A cascade depth in SDD response handler
c183d5775129 net: usb: cdc-phonet: fix skb frags[] overflow in rx_complete()
8a8333237f1f HID: core: clamp report_size in s32ton() to avoid undefined shift
0091dfa542a3 HID: alps: fix NULL pointer dereference in alps_raw_event()
b487a7754d87 staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify()
377fae22a137 i2c: s3c24xx: check the size of the SMBUS message before using it
1a0f2de81f7f can: raw: fix ro->uniq use-after-free in raw_rcv()
8977fad2b3c6 nfc: llcp: add missing return after LLCP_CLOSED checks
67c53c1978ce netfilter: conntrack: add missing netlink policy validations
78cea133daf7 crypto: algif_aead - Fix minimum RX size check for decryption
dea5fcf085f9 crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl
66dfc9179b78 sched/deadline: Use revised wakeup rule for dl_server
f34feda8e0c9 perf/x86/intel/uncore: Skip discovery table for offline dies
07c6f6ffe290 crypto: af_alg - limit RX SG extraction by receive buffer budget
7af379af9d34 gpio: tegra: fix irq_release_resources calling enable instead of disable
86534c97abd6 l2tp: Drop large packets with UDP encap
2d2dc166d551 net: ipa: fix event ring index not programmed for IPA v5.0+
bafc45ea30d2 net: ipa: fix GENERIC_CMD register field masks for IPA v5.0+
a31b3ee4dba0 devlink: Fix incorrect skb socket family dumping
900a4e0910e9 af_unix: read UNIX_DIAG_VFS data under unix_state_lock
8eff73e58e1f net: txgbe: leave space for null terminators on property_entry
6d1d9ed9b409 net: ioam6: fix OOB and missing lock
607b86397622 net: mdio: realtek-rtl9300: use scoped device_for_each_child_node loop
8c3984a0872c ASoC: amd: acp: update DMI quirk and add ACP DMIC for Lenovo platforms
c877bc8058a9 ASoC: SDCA: Fix overwritten var within for loop
41e3652a178c netfilter: nfnetlink_queue: make hash table per queue
06e054ace8b8 netfilter: nfnetlink_queue: nfqnl_instance GFP_ATOMIC -> GFP_KERNEL_ACCOUNT allocation
807d6ee15804 netfilter: ip6t_eui64: reject invalid MAC header for all packets
8368ce8eb01f netfilter: xt_multiport: validate range encoding in checkentry
d552bcfca323 netfilter: nfnetlink_log: initialize nfgenmsg in NLMSG_DONE terminator
a32dabacee11 ipvs: fix NULL deref in ip_vs_add_service error path
585fe11fedb8 selftests: net: bridge_vlan_mcast: wait for h1 before querier check
8083b7da229b drm/xe: Fix bug in idledly unit conversion
a4532ec7b885 ASoC: Intel: avs: Fix memory leak in avs_register_i2s_test_boards()
f779a6b6cdb6 xfrm_user: fix info leak in build_mapping()
836ee1b0426e xfrm: fix refcount leak in xfrm_migrate_policy_find
3733fce2871c xfrm: Wait for RCU readers during policy netns exit
25e1e91a8da8 xsk: validate MTU against usable frame size on bind
4947e2ae9c57 xsk: fix XDP_UMEM_SG_FLAG issues
29a68f4baaf9 xsk: respect tailroom for ZC setups
9ea6ba4f3195 xsk: tighten UMEM headroom validation to account for tailroom and min frame
70b85c177344 e1000: check return value of e1000_read_eeprom
4db7b61ec1d1 ixgbevf: add missing negotiate_features op to Hyper-V ops table
4da3465a7f00 ixgbe: stop re-reading flash on every get_drvinfo for e610
e19675b384e9 ice: ptp: don't WARN when controlling PF is unavailable
7dad8bf14346 tracing/probe: reject non-closed empty immediate strings
9550d1d9f716 dt-bindings: net: Fix Tegra234 MGBE PTP clock
b6b9c17ef8ae net: stmmac: Fix PTP ref clock for Tegra234
6d931680a985 nfc: s3fwrn5: allocate rx skb before consuming bytes
4d90f9a271a6 net: increase IP_TUNNEL_RECURSION_LIMIT to 5
f91b3ed9e7fa ipv4: icmp: fix null-ptr-deref in icmp_build_probe()
40bd39e383a0 ipv4: nexthop: allocate skb dynamically in rtm_get_nexthop()
69aa3c713980 ipv4: nexthop: avoid duplicate NHA_HW_STATS_ENABLE on nexthop group dump
0975b64ffb34 rtnetlink: add missing netlink_ns_capable() check for peer netns
fb612d436ff0 bridge: guard local VLAN-0 FDB helpers against NULL vlan group
4198aab6f000 ipv6: ioam: fix potential NULL dereferences in __ioam6_fill_trace_data()
4429b761874f net: airoha: Fix memory leak in airoha_qdma_rx_process()
63851f60781a net: lapbether: handle NETDEV_PRE_TYPE_CHANGE
ec4930979b3f net: sched: act_csum: validate nested VLAN headers
7e8083f5eeed eventpoll: defer struct eventpoll free to RCU grace period
0cf8ea9d677b drm/vc4: Protect madv read in vc4_gem_object_mmap() with madv_lock
e352e9adc9f6 drm/vc4: Fix a memory leak in hang state error path
421cea4f71f7 drm/vc4: Fix memory leak of BO array in hang state
ce12a1af6779 drm/vc4: Release runtime PM reference after binding V3D
9a945edeabb5 dma-debug: suppress cacheline overlap warning when arch has no DMA alignment requirement
ad187e0506ab dma-debug: track cache clean flag in entries
4e8a1b970168 dma-mapping: add DMA_ATTR_CPU_CACHE_CLEAN
e62e322ea20b xfrm: account XFRMA_IF_ID in aevent size calculation
73e3e4dac102 HID: amd_sfh: don't log error when device discovery fails with -EOPNOTSUPP
0d364d863c70 PCI: hv: Set default NUMA node to 0 for devices without affinity info
e4093997420f ARM: dts: microchip: sam9x7: fix gpio-lines count for pioB
edde62571f76 arm64: dts: qcom: monaco: Reserve full Gunyah metadata region
d0deac48e57a tools/power turbostat: Fix --show/--hide for individual cpuidle counters
fbc581977db2 tools/power/turbostat: Fix microcode patch level output for AMD/Hygon
7d75145672cf soc: qcom: pd-mapper: Fix element length in servreg_loc_pfr_req_ei
52632daf6425 arm64: dts: qcom: monaco: Fix UART10 pinconf
95894966bce9 arm64: dts: imx93-tqma9352: improve eMMC pad configuration
b3b725b902b3 arm64: dts: imx91-tqma9131: improve eMMC pad configuration
737a4ee014e1 arm64: dts: imx93-9x9-qsb: change usdhc tuning step for eMMC and SD
d0fcd4858918 arm64: dts: imx8mq: Set the correct gpu_ahb clock frequency
ecbc5e9277da arm64: dts: qcom: qcm6490-idp: Fix WCD9370 reset GPIO polarity
878ccc18d94c arm64: dts: qcom: hamoa/x1: fix idle exit latency
c448aad9a779 soc: aspeed: socinfo: Mask table entries for accurate SoC ID matching
d2c7153fe0ca ASoC: stm32_sai: fix incorrect BCLK polarity for DSP_A/B, LEFT_J
c64cebcc5c4f x86: shadow stacks: proper error handling for mmap lock
0a59c12ce50a net: sfp: add quirks for Hisense and HSGQ GPON ONT SFP modules
1ae1e1caa428 wifi: brcmfmac: validate bsscfg indices in IF events
f5a5d0e8704e ata: ahci: force 32-bit DMA for JMicron JMB582/JMB585
36bb2d0b9150 HID: roccat: fix use-after-free in roccat_report_event
0fa5713ac7a1 ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14IAH10
42032a75da03 HID: quirks: add HID_QUIRK_ALWAYS_POLL for 8BitDo Pro 3
c2854af5774b HID: Intel-thc-hid: Intel-quickspi: Add NVL Device IDs
0f2e312626c7 platform/x86/amd: pmc: Add Thinkpad L14 Gen3 to quirk_s2idle_bug
91f915d57416 pinctrl: intel: Fix the revision for new features (1kOhm PD, HW debouncer)
b98ecc1c60ad ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14IMH9
1d788e6a4150 ASoC: amd: yc: Add DMI entry for HP Laptop 15-fc0xxx
86f9c23e0814 fs/smb/client: fix out-of-bounds read in cifs_sanitize_prepath
647fb0dc3818 drm/amdkfd: Fix queue preemption/eviction failures by aligning control stack size to GPU page size
fceb2a469121 ALSA: hda/realtek: Add quirk for Lenovo Yoga Slim 7 14AKP10
66b315279b88 ALSA: usb-audio: Fix quirk flags for NeuralDSP Quad Cortex
f664b56d8fc3 ALSA: hda/realtek: Add quirk for Samsung Book2 Pro 360 (NP950QED)
a9d32e6c8a55 ASoC: soc-core: call missing INIT_LIST_HEAD() for card_aux_list
8d7465be5163 wifi: wl1251: validate packet IDs before indexing tx_frames
21a1acf6b16a ALSA: hda/realtek: add quirk for Framework F111:000F
07de44424bb7 netfilter: nft_set_pipapo_avx2: don't return non-matching entry on expiry
7556bd5cd8ef ALSA: hda/realtek: add HP Laptop 15-fd0xxx mute LED quirk
6a9f2683c66d drm/amdgpu: Handle GPU page faults correctly on non-4K page systems
f338ced04738 netfilter: ctnetlink: ensure safe access to master conntrack
8db3663d3c3e ALSA: hda/realtek: Add mute LED quirk for HP Pavilion 15-eg0xxx
2e4adfaec97e btrfs: tracepoints: get correct superblock from dentry in event btrfs_sync_file()
d4ff92dd98ad platform/x86: hp-wmi: Add support for Omen 16-wf1xxx (8C76)
fddb157536e6 btrfs: fix zero size inode with non-zero size after log replay
c66a0e9a19c0 platform/x86: asus-nb-wmi: add DMI quirk for ASUS ROG Flow Z13-KJP GZ302EAC
c2be593c7ec2 ALSA:usb:qcom: add AUXILIARY_BUS to Kconfig dependencies
5486d20a0818 ASoC: amd: acp: add ASUS HN7306EA quirk for legacy SDW machine
c306ac170bc3 can: mcp251x: add error handling for power enable in open and resume
550243229155 ASoC: SOF: topology: reject invalid vendor array size in token parser
36d706d03346 ASoC: amd: yc: Add DMI quirk for Thin A15 B7VF
a7a1cdb4a64c Bluetooth: hci_sync: annotate data-races around hdev->req_status
02ce2a77acc8 ALSA: asihpi: avoid write overflow check warning
222f4fd0fe06 media: rkvdec: reduce stack usage in rkvdec_init_v4l2_vp9_count_tbl()
fc40821d94b9 ALSA: hda/realtek: Add quirk for ASUS ROG Flow Z13-KJP GZ302EAC
e656ef8698e2 ALSA: hda/realtek: add quirk for Lenovo Yoga 7 2-in-1 16AKP10
b395549928e5 ALSA: hda/realtek: Add HP ENVY Laptop 13-ba0xxx quirk
4b59719db211 ASoC: amd: yc: Add DMI quirk for ASUS EXPERTBOOK BM1403CDA
0f22c32141ac RDMA/irdma: Fix double free related to rereg_user_mr
0aa0c509aa69 dmaengine: idxd: Fix lockdep warnings when calling idxd_device_config()
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:15 +0000 (11:32 -0400)]
linux-yocto/6.18: update CVE exclusions (6.18.23)
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 205 changes (128 new | 77 updated): - 128 new CVEs: CVE-2000-5001, CVE-2005-20001, CVE-2008-20002, CVE-2008-20003, CVE-2009-20012, CVE-2010-20110, CVE-2010-20116, CVE-2010-20117, CVE-2010-20118, CVE-2010-20124, CVE-2011-10031, CVE-2013-10041, CVE-2013-10045, CVE-2013-10056, CVE-2014-125120, CVE-2026-31192, CVE-2026-31434, CVE-2026-31435, CVE-2026-31436, CVE-2026-31437, CVE-2026-31438, CVE-2026-31439, CVE-2026-31440, CVE-2026-31441, CVE-2026-31442, CVE-2026-31443, CVE-2026-31444, CVE-2026-31445, CVE-2026-31446, CVE-2026-31447, CVE-2026-31448, CVE-2026-31449, CVE-2026-31450, CVE-2026-31451, CVE-2026-31452, CVE-2026-31453, CVE-2026-31454, CVE-2026-31455, CVE-2026-31456, CVE-2026-31457, CVE-2026-31458, CVE-2026-31459, CVE-2026-31460, CVE-2026-31461, CVE-2026-31462, CVE-2026-31463, CVE-2026-31464, CVE-2026-31465, CVE-2026-31466, CVE-2026-31467, CVE-2026-31468, CVE-2026-31469, CVE-2026-31470, CVE-2026-31471, CVE-2026-31472, CVE-2026-31473, CVE-2026-31474, CVE-2026-31475, CVE-2026-31476, CVE-2026-31477, CVE-2026-31478, CVE-2026-31479, CVE-2026-31480, CVE-2026-31481, CVE-2026-31482, CVE-2026-31483, CVE-2026-31484, CVE-2026-31485, CVE-2026-31486, CVE-2026-31487, CVE-2026-31488, CVE-2026-31489, CVE-2026-31490, CVE-2026-31491, CVE-2026-31492, CVE-2026-31493, CVE-2026-31494, CVE-2026-31495, CVE-2026-31496, CVE-2026-31497, CVE-2026-31498, CVE-2026-31499, CVE-2026-31500, CVE-2026-31501, CVE-2026-31502, CVE-2026-31503, CVE-2026-31504, CVE-2026-31505, CVE-2026-31506, CVE-2026-31507, CVE-2026-31508, CVE-2026-31509, CVE-2026-31510, CVE-2026-31511, CVE-2026-31512, CVE-2026-31513, CVE-2026-31514, CVE-2026-31515, CVE-2026-31516, CVE-2026-31517, CVE-2026-31518, CVE-2026-31519, CVE-2026-31520, CVE-2026-31521, CVE-2026-31522, CVE-2026-31523, CVE-2026-31524, CVE-2026-31525, CVE-2026-31526, CVE-2026-31527, CVE-2026-31528, CVE-2026-31529, CVE-2026-31530, CVE-2026-33254, CVE-2026-33593, CVE-2026-33594, CVE-2026-33595, CVE-2026-33596, CVE-2026-33597, CVE-2026-33598, CVE-2026-33599, CVE-2026-33602, CVE-2026-33608, CVE-2026-33609, CVE-2026-33610, CVE-2026-33611, CVE-2026-6861, CVE-2026-6862 - 77 updated CVEs: CVE-2026-0539, CVE-2026-1930, CVE-2026-20133, CVE-2026-21997, CVE-2026-21998, CVE-2026-21999, CVE-2026-22001, CVE-2026-22002, CVE-2026-22003, CVE-2026-22004, CVE-2026-22005, CVE-2026-22007, CVE-2026-22008, CVE-2026-22009, CVE-2026-22010, CVE-2026-22013, CVE-2026-22014, CVE-2026-22015, CVE-2026-22016, CVE-2026-22017, CVE-2026-22018, CVE-2026-22019, CVE-2026-22021, CVE-2026-22746, CVE-2026-25917, CVE-2026-33145, CVE-2026-34267, CVE-2026-34268, CVE-2026-34269, CVE-2026-34270, CVE-2026-34271, CVE-2026-34272, CVE-2026-34273, CVE-2026-34274, CVE-2026-34288, CVE-2026-34289, CVE-2026-34290, CVE-2026-34291, CVE-2026-34292, CVE-2026-34293, CVE-2026-34294, CVE-2026-34295, CVE-2026-34296, CVE-2026-34297, CVE-2026-34298, CVE-2026-34299, CVE-2026-34312, CVE-2026-34319, CVE-2026-35587, CVE-2026-39808, CVE-2026-3362, CVE-2026-40342, CVE-2026-40614, CVE-2026-40868, CVE-2026-40872, CVE-2026-40878, CVE-2026-40884, CVE-2026-40887, CVE-2026-40895, CVE-2026-40903, CVE-2026-40906, CVE-2026-40923, CVE-2026-40926, CVE-2026-40931, CVE-2026-40943, CVE-2026-41055, CVE-2026-41060, CVE-2026-41320, CVE-2026-4089, CVE-2026-4111, CVE-2026-5501, CVE-2026-5749, CVE-2026-5750, CVE-2026-6236, CVE-2026-6823, CVE-2026-6830, CVE-2026-6857
Date: Wed, 22 Apr 2026 14:13:54 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:14 +0000 (11:32 -0400)]
linux-yocto/6.18: update to v6.18.23
Updating linux-yocto/6.18 to the latest korg -stable release that comprises
the following commits:
47a33eea6d51 Linux 6.18.23
ad17f07e95e6 x86/CPU: Fix FPDSS on Zen1
2d64618ea846 net: skb: fix cross-cache free of KFENCE-allocated skb head
db297c78ce53 rxrpc: proc: size address buffers for %pISpc output
d0035e634dae rxrpc: only handle RESPONSE during service challenge
794586789800 rxrpc: Fix buffer overread in rxgk_do_verify_authenticator()
4b5e8365515f rxrpc: Fix leak of rxgk context in rxgk_verify_response()
1f864d9daaf6 rxrpc: Fix integer overflow in rxgk_verify_response()
bf4d6e4a6856 rxrpc: Fix missing error checks for rxkad encryption/decryption failure
03d1c51decae rxrpc: Fix key/keyring checks in setsockopt(RXRPC_SECURITY_KEY/KEYRING)
8ee931c3cd97 rxrpc: fix reference count leak in rxrpc_server_keyring()
beee051f259a rxrpc: fix oversized RESPONSE authenticator length check
7875f3d9777b rxrpc: fix RESPONSE authenticator parser OOB read
22f6258e7b31 rxrpc: reject undecryptable rxkad response tickets
8299ca146489 rxrpc: Only put the call ref if one was acquired
8b353f5f1385 rxrpc: Fix to request an ack if window is limited
2e6ef713b159 rxrpc: Fix key reference count leak from call->key
86303a1da93f rxrpc: Fix rack timer warning to report unexpected mode
9132b1a7bf83 rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial
3e04596cba8a rxrpc: Fix RxGK token loading to check bounds
3be718f65968 rxrpc: Fix call removal to use RCU safe deletion
3bb18ed3b2f6 rxrpc: Fix anonymous key handling
d5f76f812d2c rxrpc: Fix key parsing memleak
862cb78fb2c9 rxrpc: Fix key quota calculation for multitoken keys
92a673019943 net: lan966x: fix use-after-free and leak in lan966x_fdma_reload()
22e1ee9f22b5 net: lan966x: fix page pool leak in error paths
b5dcb41ba891 net: lan966x: fix page_pool error handling in lan966x_fdma_rx_alloc_page_pool()
214ceaa8a3a2 idpf: set the payload size before calling the async handler
d6e9bef3313a idpf: improve locking around idpf_vc_xn_push_free()
e02c974fc331 idpf: fix PREEMPT_RT raw/bh spinlock nesting for async VC handling
576543bedd61 mm: filemap: fix nr_pages calculation overflow in filemap_map_pages()
6fca757c2039 net: stmmac: fix integer underflow in chain mode
9fdece45f6e0 net: qualcomm: qca_uart: report the consumed byte on RX skb allocation failure
ea7468f61be0 mmc: vub300: fix use-after-free on disconnect
c83a282615d8 mmc: vub300: fix NULL-deref on disconnect
447f8870b484 mm/damon/stat: deallocate damon_call() failure leaking damon_ctx
b9dadf026a9f mm/damon/sysfs: dealloc repeat_call_control if damon_call() fails
49c00ae87230 mm/memory_hotplug: maintain N_NORMAL_MEMORY during hotplug
470047177574 igb: remove napi_synchronize() in igb_down()
e44919669f07 pmdomain: imx8mp-blk-ctrl: Keep the NOC_HDCP clock enabled
82e8174d1d0e net/mlx5: Update the list of the PCI supported devices
de9aa7e89b98 drm/i915/psr: Do not use pipe_src as borders for SU area
2af8b200cae3 drm/i915/gt: fix refcount underflow in intel_engine_park_heartbeat
4dee4c068844 batman-adv: hold claim backbone gateways by reference
60f462cd2716 net: altera-tse: fix skb leak on DMA mapping error in tse_start_xmit()
5d70eb25b41e net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption
87ce8ae51196 EDAC/mc: Fix error path ordering in edac_mc_alloc()
206121294b9c X.509: Fix out-of-bounds access when parsing extensions
de6c1dc3c7d0 batman-adv: reject oversized global TT response buffers
21ae2cda66a5 nfc: pn533: allocate rx skb before consuming bytes
083c5a417dee arm64: dts: hisilicon: hi3798cv200: Add missing dma-ranges
f0a0a6a8c1cc arm64: dts: hisilicon: poplar: Correct PCIe reset GPIO polarity
c82a3c9d9fb3 arm64: dts: renesas: sparrow-hawk: Reserve first 128 MiB of DRAM
a4115c2abab3 arm64: dts: imx8mq-librem5: Bump BUCK1 suspend voltage up to 0.85V
3b31b15230b0 Revert "arm64: dts: imx8mq-librem5: Set the DVS voltages lower"
aee881c21b57 Revert "arm64: dts: rockchip: Further describe the WiFi for the Pinebook Pro"
fecceacbaf48 platform/x86/intel-uncore-freq: Handle autonomous UFS status bit
c4e1eff4606c platform/x86: ISST: Reset core count to 0
b27fa888e4a4 wifi: brcmsmac: Fix dma_free_coherent() size
1b6f13f62666 tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG
0f451b43c88b xfrm: hold dev ref until after transport_finish NF_HOOK
b1dfd6b27df3 xfrm: clear trailing padding in build_polexpire()
688c1b491c35 modpost: Declare extra_warn with unused attribute
0133aa1a28af workqueue: Add pool_workqueue to pending_pwqs list when unplugging multiple inactive works
fbdb43f6bb2a firmware: thead: Fix buffer overflow and use standard endian macros
b42aca3660dc netfilter: nft_ct: fix use-after-free in timeout object destroy
2802ba3981f1 i2c: imx: zero-initialize dma_slave_config for eDMA
72cf49ad50c1 af_unix: Give up GC if MSG_PEEK intervened.
33120558237c af_unix: Simplify GC state.
1e211179f1d9 af_unix: Count cyclic SCC.
450e6a685d0c btrfs: fix incorrect return value after changing leaf in lookup_extent_data_ref()
2124a61e6e2b btrfs: remove pointless out labels from extent-tree.c
d8b281165a86 MIPS: mm: Rewrite TLB uniquification for the hidden bit feature
ccc6a2241a49 MIPS: mm: Suppress TLB uniquification on EHINV hardware
6c600fc0e991 MIPS: Always record SEGBITS in cpu_data.vmbits
6c098142b370 Input: uinput - take event lock when submitting FF request "event"
1e09dfbb4f5d Input: uinput - fix circular locking dependency with ff-core
fb56de5d9921 seg6: separate dst_cache for input and output paths in seg6 lwtunnel
15fa9ead4d5e mptcp: fix slab-use-after-free in __inet_lookup_established
96a95b6d9e6d Revert "mptcp: add needs_id for netlink appending addr"
130c991e6aad Revert "ALSA: hda/realtek: Add quirk for Gigabyte Technology to fix headphone"
a8c26800e022 net: rfkill: prevent unlimited numbers of rfkill events from being created
6c55714c9310 xfrm_user: fix info leak in build_report()
e360d15fcb1e wifi: rt2x00usb: fix devres lifetime
f4786c34216a usb: typec: ucsi: skip connector validation before init
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:13 +0000 (11:32 -0400)]
linux-yocto/6.18: update CVE exclusions (6.18.22)
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 4 changes (4 new | 0 updated): - 4 new CVEs: CVE-2026-33714, CVE-2026-33715, CVE-2026-34160, CVE-2026-34161 - 0 updated CVEs:
Date: Tue, 14 Apr 2026 21:14:51 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:12 +0000 (11:32 -0400)]
linux-yocto/6.18: update to v6.18.22
Updating linux-yocto/6.18 to the latest korg -stable release that comprises
the following commits:
f2b09e8b594ce Linux 6.18.22
5e7b2cc8fae9e sched_ext: Fix stale direct dispatch state in ddsp_dsq_id
d5776a31c1657 sched_ext: Refactor do_enqueue_task() local and global DSQ paths
9e36ceb5ca431 mm/memory: fix PMD/PUD checks in follow_pfnmap_start()
cef18bb87a6c2 mm: replace READ_ONCE() with standard page table accessors
a836054ea8101 scsi: target: tcm_loop: Drain commands in target_reset handler
ce54802fe6bb7 scsi: target: file: Use kzalloc_flex for aio_cmd
a98b78116a27e net: correctly handle tunneled traffic on IPV6_CSUM GSO fallback
5f4061f8225d1 net: mana: fix use-after-free in add_adev() error path
24ce568f7553a drm/amd/display: Fix DCE LVDS handling
ba9be472a438e drm/amd/pm: disable OD_FAN_CURVE if temp or pwm range invalid for smu v13
5bbadf60b1210 wifi: virt_wifi: remove SET_NETDEV_DEV to avoid use-after-free
e367143b520ae kallsyms: prevent module removal when printing module name and buildid
10bbeed03e1db kallsyms: cleanup code for appending the module buildid
c1d72e846cb4e kallsyms: clean up modname and modbuildid initialization in kallsyms_lookup_buildid()
ab5f05ae96fcd kallsyms: clean up @namebuf initialization in kallsyms_lookup_buildid()
8e5eb1d6e6a3d usb: gadget: f_uac1_legacy: validate control request size
5d1bb391ceeeb usb: gadget: f_hid: move list and spinlock inits from bind to alloc
18ada801899f2 usb: gadget: f_rndis: Fix net_device lifecycle with device_move
9cbc4f109bb21 usb: gadget: f_subset: Fix net_device lifecycle with device_move
4ccdccff8febc usb: gadget: f_eem: Fix net_device lifecycle with device_move
4e34f3f491fd7 usb: gadget: f_ecm: Fix net_device lifecycle with device_move
446f1842cda92 usb: gadget: f_rndis: Protect RNDIS options with mutex
3d436670b4741 usb: gadget: f_subset: Fix unbalanced refcnt in geth_free
1aa9356881ee4 usb: gadget: uvc: fix NULL pointer dereference during unbind race
a36e5e800b9c9 usb: gadget: u_ether: Fix NULL pointer deref in eth_get_drvinfo
6ad77458637b7 usb: gadget: u_ether: Fix race between gether_disconnect and eth_stop
63dc317dfcd3f ice: Fix memory leak in ice_set_ringparam()
7d581e2534693 HID: appletb-kbd: add .resume method in PM
f4e608fe12b7a usb: typec: ucsi: validate connector number in ucsi_notify_common()
cc300853b9eba usb: gadget: dummy_hcd: fix premature URB completion when ZLP follows partial transfer
5687a09776069 USB: dummy-hcd: Fix interrupt synchronization error
efbd9441f1e76 USB: dummy-hcd: Fix locking/synchronization error
cd9c6fcd1cf13 thunderbolt: Fix property read in nhi_wake_supported()
15f0c2d9eebc1 usb: typec: thunderbolt: Set enter_vdo during initialization
acea446ba4f42 misc: fastrpc: check qcom_scm_assign_mem() return in rpmsg_probe
3a164f640953c misc: fastrpc: possible double-free of cctx->remote_heap
c4c7219e93319 thermal: core: Fix thermal zone device registration error path
2dbe93f344f10 thermal: core: Address thermal zone removal races with resume
f0cf9c7b7c281 gpio: Fix resource leaks on errors in gpiochip_add_data_with_key()
70b6e2e015030 gpio: mxc: map Both Edge pad wakeup to Rising Edge
72c43eb2e334f sched_ext: Fix is_bpf_migration_disabled() false negative on non-PREEMPT_RCU
d2703b4f8fb7c cpufreq: governor: fix double free in cpufreq_dbs_governor_init() error path
65a5847e1a6c9 virtio_net: clamp rss_max_key_size to NETDEV_RSS_KEY_LEN
5dff799c67715 net: ethernet: mtk_ppe: avoid NULL deref when gmac0 is disabled
8351d18989c86 net: ftgmac100: fix ring allocation unwind on open failure
eddfce70a6f31 vxlan: validate ND option lengths in vxlan_na_create
3aea268b6d5cd crypto: tegra - Add missing CRYPTO_ALG_ASYNC
6562290225c19 counter: rz-mtu3-cnt: do not use struct rz_mtu3_channel's dev member
e07237df8538b counter: rz-mtu3-cnt: prevent counter from being toggled multiple times
bbb6c37c7a483 vt: resize saved unicode buffer on alt screen exit after resize
891d790fdb5c9 vt: discard stale unicode buffer on alt screen exit after resize
554d005d51611 gpib: Fix fluke driver s390 compile issue
68ca0eea0af02 netfilter: ipset: drop logically empty buckets in mtype_del
784ed4abded1c nvmem: zynqmp_nvmem: Fix buffer size in DMA and memcpy
0c94b84b6ef51 nvmem: imx: assign nvmem_cell_info::raw_len
5a8f2e95f9a19 s390/cpum_sf: Cap sampling rate to prevent lsctl exception
586222c37d402 s390/zcrypt: Fix memory leak with CCA cards used as accelerator
a11f022db7d85 spi: cadence-qspi: Fix exec_mem_op error handling
f5526abe978fd dt-bindings: connector: add pd-disable dependency
d266498da90d3 firmware: microchip: fail auto-update probe if no flash found
eae19cab44204 comedi: me4000: Fix potential overrun of firmware buffer
a47ae40339c10 comedi: me_daq: Fix potential overrun of firmware buffer
43c68a2c7cc35 comedi: ni_atmio16d: Fix invalid clean-up after failed attach
b89c026227712 comedi: Reinit dev->spinlock between attachments to low-level drivers
34c8b3a91bdfb comedi: dt2815: add hardware detection to prevent crash
e92f5ee730653 cdc-acm: new quirk for EPSON HMD
837392a384457 bridge: br_nd_send: validate ND option lengths
5da684c24e8b4 ASoC: qcom: sc7280: make use of common helpers
f43f77499ec8d io_uring: protect remaining lockless ctx->rings accesses with RCU
09f78265a93d4 usb: core: use dedicated spinlock for offload state
5a85599ca4d25 usb: cdns3: gadget: fix state inconsistency on gadget init failure
390536cc6af4c usb: cdns3: gadget: fix NULL pointer dereference in ep_queue
701903fcac4a4 usb: core: phy: avoid double use of 'usb3-phy'
61937f6862904 usb: dwc2: gadget: Fix spin_lock/unlock mismatch in dwc2_hsotg_udc_stop()
6288b46e5ac68 usb: ehci-brcm: fix sleep during atomic
34af2da733f4e usb: host: xhci-sideband: delegate offload_usage tracking to class drivers
65ff09f48b0e7 usb: misc: usbio: Fix URB memory leak on submit failure
977b632db51d2 usb: usbtmc: Flush anchored URBs in usbtmc_release
38c28fe256110 usb: ulpi: fix double free in ulpi_register_interface() error path
882bdb01ff12c usb: quirks: add DELAY_INIT quirk for another Silicon Motion flash drive
21f942879f861 gpib: lpvo_usb: fix memory leak on disconnect
ffacfe07177d3 mei: me: reduce the scope on unexpected reset
fefd0bceac15f iio: gyro: mpu3050: Fix out-of-sequence free_irq()
cc3de12a5612e iio: gyro: mpu3050: Move iio_device_register() to correct location
3a8e68d65a443 iio: gyro: mpu3050: Fix irq resource leak
ac1233397f4cf iio: gyro: mpu3050: Fix incorrect free_irq() variable
7f14b52a81f94 iio: imu: st_lsm6dsx: Set FIFO ODR for accelerometer and gyroscope only
d6e078c634094 iio: imu: bmi160: Remove potential undefined behavior in bmi160_config_pin()
04d8f0a785dc0 iio: light: veml6070: fix veml6070_read() return value
0ad74c370e8de iio: light: vcnl4035: fix scan buffer on big-endian
b0e1fec0a0d07 iio: imu: adis16550: fix swapped gyro/accel filter functions
2ed3d9bc86b66 iio: dac: ad5770r: fix error return in ad5770r_read_raw()
d7161e8b6211a iio: accel: adxl313: add missing error check in predisable
b6d6f6e2e329f iio: accel: adxl380: fix FIFO watermark bit 8 always written as 0
6c4591e716681 iio: accel: fix ADXL355 temperature signature value
85981790ea35d iio: adc: aspeed: clear reference voltage bits before configuring vref
5f482fd456bc5 iio: adc:
ade9000 : move mutex init before IRQ registration
87180f65f90da iio: adc:
ade9000 : fix wrong register in CALIBBIAS case for active power
3707af316f86d iio: adc:
ade9000 : fix wrong return type in streaming push
25e04a8291f42 iio: adc: ti-ads7950: do not clobber gpio state in ti_ads7950_get()
6afa581aed0f1 iio: adc: ti-ads7950: normalize return value of gpio_get
d0a6b8d186dab Input: xpad - add support for Razer Wolverine V3 Pro
86620132e9c4c Input: xpad - add support for BETOP BTP-KP50B/C controller's wireless mode
00f0cc75356b0 Input: bcm5974 - recover from failed mode switch
beba26c55f4e4 Input: i8042 - add TUXEDO InfinityBook Max 16 Gen10 AMD to i8042 quirk table
33e646804070c Input: synaptics-rmi4 - fix a locking bug in an error path
8ea8dc0d62e3a USB: core: add NO_LPM quirk for Razer Kiyo Pro webcam
42e4fbeb853a6 USB: serial: option: add support for Rolling Wireless RW135R-GL
70fd81b9c4bf3 USB: serial: io_edgeport: add support for Blackbox IC135A
2b8ae82d85d75 drm/amdgpu/pm: drop SMU driver if version not matched messages
77c918eaa4c91 drm/amdgpu: Change AMDGPU_VA_RESERVED_TRAP_SIZE to 64KB
3543005a42d7e drm/amdgpu: validate doorbell_offset in user queue creation
1e130cf9cd172 drm/amdgpu: Fix wait after reset sequence in S4
d0fd0bea84752 drm/i915/dp: Use crtc_state->enhanced_framing properly on ivb/hsw CPU eDP
86e926b108880 drm/i915/dsi: Don't do DSC horizontal timing adjustments in command mode
df4979eef358c drm/ast: dp501: Fix initialization of SCU2C
5a17678b74197 iio: adc: ti-ads1119: Replace IRQF_ONESHOT with IRQF_NO_THREAD
30e2275b3469f iio: adc: ti-ads1119: Reinit completion before wait_for_completion_timeout()
64bc0219e4d8e iio: adc: ti-ads1119: Fix unbalanced pm reference count in ds1119_single_conversion()
014c6d27878d3 iio: adc: ti-adc161s626: use DMA-safe memory for spi_read()
054ea2f12beb4 iio: adc: ti-adc161s626: fix buffer read on big-endian
d9bf25ef3d30f iio: orientation: hid-sensor-rotation: add timestamp hack to not break userspace
7d14b49de8fcc iio: orientation: hid-sensor-rotation: fix quaternion alignment
2b655a9176442 iio: add IIO_DECLARE_QUATERNION() macro
cae26eff1b56d gpib: fix use-after-free in IO ioctl handlers
115a4c8df909f drm/amdgpu: fix the idr allocation flags
1e3e98596c276 x86/kexec: Disable KCOV instrumentation after load_segments()
16062d6830a7f mips: mm: Allocate tlb_vpn array atomically
243d55bd3f08c hwmon: (occ) Fix division by zero in occ_show_power_1()
1010390094fa2 MIPS: Fix the GCC version check for `__multi3' workaround
247e1e7e25c8f MIPS: SiByte: Bring back cache initialisation
075ea208c648c ksmbd: fix OOB write in QUERY_INFO for compound requests
aba0aea354015 Bluetooth: hci_sync: fix stack buffer overflow in hci_le_big_create_sync
fa14e0e19820b Bluetooth: SMP: force responder MITM requirements before building the pairing response
061ee71ac6b03 Bluetooth: SMP: derive legacy responder STK authentication from MITM state
c314b405dcc4d io_uring/net: fix slab-out-of-bounds read in io_bundle_nbufs()
2e8194b4fdee7 ALSA: hda/realtek: add quirk for HP Victus 15-fb0xxx
682b5fd115689 ALSA: hda/realtek: Add quirk for ASUS ROG Strix SCAR 15
57698f184e1af ALSA: ctxfi: Fix missing SPDIFI1 index handling
3afa2e67f3523 ALSA: caiaq: fix stack out-of-bounds read in init_card
1933249263c3a lib/crypto: chacha: Zeroize permuted_state before it leaves scope
b49bf41b41148 sched_ext: Fix inconsistent NUMA node lookup in scx_select_cpu_dfl()
10c13c111d0d7 drm/amd/display: Fix NULL pointer dereference in dcn401_init_hw()
ce47541f5c408 USB: serial: option: add MeiG Smart SRM825WN
dd90880eb5ec5 wifi: iwlwifi: mvm: fix potential out-of-bounds read in iwl_mvm_nd_match_info_handler()
d8388614de613 wifi: wilc1000: fix u8 overflow in SSID scan buffer size calculation
20e2418b98369 rust_binder: use AssertSync for BINDER_VM_OPS
f0e441be08a2e drm/ioc32: stop speculation on the drm_compat_ioctl path
1200f4240c07d ACPI: RIMT: Add dependency between iommu and devices
50392cdfe95e0 riscv: Reset pmm when PR_TAGGED_ADDR_ENABLE is not set
e1425ff578c4a riscv: kgdb: fix several debug register assignment bugs
e435a30ca6fe1 perf/x86: Fix potential bad container_of in intel_pmu_hw_config
87573883c30f1 sched/fair: Fix zero_vruntime tracking fix
a99f94e4f28a3 mips: ralink: update CPU clock index
d6fbc5750f382 hwmon: (asus-ec-sensors) Fix T_Sensor for PRIME X670E-PRO WIFI
d16f8716c927f drm/sysfb: Fix efidrm error handling and memory type mismatch
6205de166dfb2 hwmon: (occ) Fix missing newline in occ_show_extended()
ee4c064e37d4d spi: amlogic: spifc-a4: unregister ECC engine on probe failure and remove() callback
fdbfa1bf2c759 hwmon: (tps53679) Fix device ID comparison and printing in tps53676_identify()
9e962e68a9d26 drm/xe/pxp: Clear restart flag in pxp_start after jumping back
5633454e28d30 drm/xe/pxp: Remove incorrect handling of impossible state during suspend
ec45309671920 drm/xe/pxp: Clean up termination status on failure
e8298e0cc68de spi: stm32-ospi: Fix reset control leak on probe error
b4ec54c974c6e spi: stm32-ospi: Fix resource leak in remove() callback
3a8b66a84f058 dt-bindings: gpio: fix microchip #interrupt-cells
dfe3a785ae7fc hwmon: (ltc4286) Add missing MODULE_IMPORT_NS("PMBUS")
13b0cb9963652 hwmon: (pxe1610) Check return value of page-select write in probe
79b7e588399bb hwmon: (tps53679) Fix array access with zero-length block read
040a1e7e0e2f0 io_uring/rsrc: reject zero-length fixed buffer import
f403094d9075d accel/qaic: Handle DBC deactivation if the owner went away
33b54c7793cf7 gpiolib: clear requested flag if line is invalid
606f88c162b27 gpio: rename gpio_chip_hwgpio() to gpiod_hwgpio()
9e5495d216bff iio: imu: bno055: fix BNO055_SCAN_CH_COUNT off by one
89c3a4ba60309 Revert "drm: Fix use-after-free on framebuffers and property blobs when calling drm_dev_unplug"
dc9a060d76c12 bpf: Reject sleepable kprobe_multi programs at attach time
63276547debc4 bpf: reject direct access to nullable PTR_TO_BUF pointers
7c15dabcbc9e3 eth: fbnic: Increase FBNIC_QUEUE_SIZE_MIN to 64
9ed81d692758d ipv6: avoid overflows in ip6_datagram_send_ctl()
1fe371a34e801 net: hsr: fix VLAN add unwind on slave errors
a208c3e123299 net/sched: cls_flow: fix NULL pointer dereference on shared blocks
3cb055df9e862 net/sched: cls_fw: fix NULL pointer dereference on shared blocks
8c92969c197b9 net/x25: Fix overflow when accumulating packets
fa1dbc93530b3 net/x25: Fix potential double free of skb
311efb3cfc926 bnxt_en: Restore default stat ctxs for ULP when resource is available
e27153b2bd6e6 net/mlx5: Fix switchdev mode rollback in case of failure
276b3efb2b487 net/mlx5: Avoid "No data available" when FW version queries fail
c53cf44588a93 net/mlx5: lag: Check for LAG device before creating debugfs
5392a5174df4f net: macb: properly unregister fixed rate clocks
16ab4c0e2b15d net: macb: fix clk handling on PCI glue driver removal
3a2999704ac36 net/sched: sch_netem: fix out-of-bounds access in packet corruption
18861f87a043e bpf: sockmap: Fix use-after-free of sk->sk_socket in sk_psock_verdict_data_ready().
23e07c340c445 rds: ib: reject FRMR registration before IB connection is established
edb5898cfa91a Bluetooth: MGMT: validate mesh send advertising payload length
1d0bdbfe3e91c Bluetooth: hci_event: fix potential UAF in hci_le_remote_conn_param_req_evt
7d568fede8eac Bluetooth: hci_conn: fix potential UAF in set_cig_params_sync
50fb64defa72a Bluetooth: MGMT: validate LTK enc_size on load
3ec3a1588876c Bluetooth: hci_h4: Fix race during initialization
98c8d3bfdaa65 Bluetooth: SCO: fix race conditions in sco_sock_connect()
d4d1a4eed6f6c Bluetooth: hci_sync: call destroy in hci_cmd_sync_run if immediate
42a47f4b1b769 netfilter: nf_tables: reject immediate NF_QUEUE verdict
dc3e27dd7d76e netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP
187b6ec5229ea netfilter: ctnetlink: ignore explicit helper on new expectations
a0684ccc1ddd2 netfilter: nf_conntrack_expect: store netns and zone in expectation
b53294bff19e5 netfilter: nf_conntrack_expect: use expect->helper
54cb3500e8af5 netfilter: nf_conntrack_expect: honor expectation helper field
929f7a9a7aad9 netfilter: ctnetlink: zero expect NAT fields when CTA_EXPECT_NAT absent
620f3d14c1ef5 netfilter: nf_conntrack_helper: pass helper to expect cleanup
a54bbbcd3c628 netfilter: ipset: use nla_strcmp for IPSET_ATTR_NAME attr
f419bdc205894 netfilter: x_tables: ensure names are nul-terminated
88a8f56e6276f netfilter: nfnetlink_log: account for netlink header size
504c9456699dc netfilter: flowtable: strictly check for maximum number of actions
908dd5faf8169 ALSA: usb-audio: Exclude Scarlett 2i2 1st Gen (8016) from SKIP_IFACE_SETUP
87a8287e76244 net: stmmac: skip VLAN restore when VLAN hash ops are missing
58b58b9ba89c4 mptcp: fix soft lockup in mptcp_recvmsg()
8d38f222795d3 mptcp: add eat_recv_skb helper
414726b69921f net: ipv6: flowlabel: defer exclusive option free until RCU teardown
8aebe18069394 bpf: Fix regsafe() for pointers to packet
917303fda0f1b ASoC: Intel: boards: fix unmet dependency on PINCTRL
2a0323a913109 net: xilinx: axienet: Fix BQL accounting for multi-BD TX packets
f3cf32dc1ebbd net: xilinx: axienet: Correct BD length masks to match AXIDMA IP spec
ad2f60de5045b NFC: pn533: bound the UART receive buffer
d4cc7e4c80b16 net: bonding: fix use-after-free in bond_xmit_broadcast()
153d5520c3f9f crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption
fafe0fa2995a0 crypto: algif_aead - Revert to operating out-of-place
c8d53b70166d1 bnxt_en: set backing store type from query type
906997ea3766c net: sched: cls_api: fix tc_chain_fill_node to initialize tcm_info to zero to prevent an info-leak
cc91202fc20a4 net: use skb_header_pointer() for TCPv4 GSO frag_off check
846cd4a5ffdce net: introduce mangleid_features
ae585d9ac863f net: airoha: Add missing cleanup bits in airoha_qdma_cleanup_rx_queue()
3cd4efb5df728 ipv6: prevent possible UaF in addrconf_permanent_addr()
2321b0d47a11a ASoC: ep93xx: Fix unchecked clk_prepare_enable() and add rollback on failure
19f90e0061b69 ALSA: usb-audio: Exclude Scarlett Solo 1st Gen from SKIP_IFACE_SETUP
15db5c44f79c4 net: enetc: do not allow VF to configure the RSS key
85b4fb46a8989 net: enetc: check whether the RSS algorithm is Toeplitz
3b4df3d43ae42 net: sfp: Fix Ubiquiti U-Fiber Instant SFP module on mvneta
17c1b9807b8a6 net/sched: sch_hfsc: fix divide-by-zero in rtsc_min()
9c55e41c73af5 bridge: br_nd_send: linearize skb before parsing ND options
117f9453dd7cd eth: fbnic: Account for page fragments when updating BDQ tail
590f622669b97 ip6_tunnel: clear skb2->cb[] in ip4ip6_err()
a2edbb6393972 ipv6: icmp: clear skb2->cb[] in ip6_err_gen_icmpv6_unreach()
7e55845bd8971 tg3: Fix race for querying speed/duplex
184d2e9db27c0 net/ipv6: ioam6: prevent schema length wraparound in trace fill
b485eef3d97b7 net: ipv6: ndisc: fix ndisc_ra_useropt to initialize nduseropt_padX fields to zero to prevent an info-leak
f2664bc4f0f35 net: qrtr: replace qrtr_tx_flow radix_tree with xarray to fix memory leak
77c5f0a105d04 net: enetc: reset PIR and CIR if they are not equal when initializing TX ring
98bef6f424a37 net: fec: fix the PTP periodic output sysfs interface
53219f87bd220 netdevsim: fix build if SKB_EXTENSIONS=n
7267e4c75f9f1 net: mana: Fix RX skb truesize accounting
00cbdec17c15d crypto: af-alg - fix NULL pointer dereference in scatterwalk
83622e52431eb crypto: deflate - fix spurious -ENOSPC
aa545df011338 crypto: caam - fix overflow on long hmac keys
68feed135a0c7 crypto: caam - fix DMA corruption on long hmac keys
91478edb8cbc2 wifi: ath11k: Pass the correct value of each TID during a stop AMPDU session
52dc79062f239 wifi: iwlwifi: mld: correctly set wifi generation data
2f84d5e9c1c57 wifi: iwlwifi: disable EHT if the device doesn't allow it
9d713f4f8bb0e wifi: iwlwifi: cfg: add new device names
c0b3fa5e0eaec wifi: iwlwifi: mvm: don't send a 6E related command when not supported
624af5c3baa2d wifi: iwlwifi: mld: Fix MLO scan timing
ee555d539975e wifi: iwlwifi: fix remaining kernel-doc warnings
fdbc00b8b2eec dt-bindings: auxdisplay: ht16k33: Use unevaluatedProperties to fix common property warning
4d47b812f9250 spi: geni-qcom: Check DMA interrupts early in ISR
f4e35576da439 smb: client: fix generic/694 due to wrong ->i_blocks
850de3d87f472 btrfs: reject root items with drop_progress and zero drop_level
86d7c80e1cfff i2c: tegra: Don't mark devices with pins as IRQ safe
cf930a651eef6 btrfs: reserve enough transaction items for qgroup ioctls
7f66fdbc077fa HID: multitouch: Check to ensure report responses match the request
8f71034649738 HID: core: Mitigate potential OOB by removing bogus memset()
b846fb0a73e99 HID: logitech-hidpp: Prevent use-after-free on force feedback initialisation failure
34b12ab75ae25 objtool: Fix Clang jump table detection
7e0576dcf245d tg3: replace placeholder MAC address with device property
8b3484011a83e btrfs: don't take device_list_mutex when querying zone info
abc10f85a3965 atm: lec: fix use-after-free in sock_def_readable()
c8dc23c97680e HID: wacom: fix out-of-bounds read in wacom_intuos_bt_irq
be81f17151fcb wifi: mac80211: check tdls flag in ieee80211_tdls_oper
6c4e67e6ba250 HID: logitech-hidpp: Enable MX Master 4 over bluetooth
1c41248cef835 arm64/scs: Fix handling of advance_loc4
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:11 +0000 (11:32 -0400)]
linux-yocto/6.18: update CVE exclusions (6.18.21)
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 35 changes (5 new | 30 updated): - 5 new CVEs: CVE-2025-57847, CVE-2025-57851, CVE-2025-57853, CVE-2025-57854, CVE-2025-58713 - 30 updated CVEs: CVE-2023-52356, CVE-2024-8299, CVE-2024-9852, CVE-2025-14104, CVE-2025-14821, CVE-2025-14831, CVE-2026-1757, CVE-2026-26157, CVE-2026-26158, CVE-2026-27787, CVE-2026-28261, CVE-2026-2625, CVE-2026-35393, CVE-2026-35398, CVE-2026-35409, CVE-2026-35413, CVE-2026-35444, CVE-2026-35452, CVE-2026-35473, CVE-2026-39698, CVE-2026-39700, CVE-2026-39702, CVE-2026-39935, CVE-2026-3142, CVE-2026-3781, CVE-2026-4483, CVE-2026-5302, CVE-2026-5506, CVE-2026-5688, CVE-2026-5705
Date: Wed, 8 Apr 2026 14:13:08 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>