]>
git.ipfire.org Git - thirdparty/openembedded/openembedded-core.git/log
Adam Blank [Thu, 2 Apr 2026 15:39:39 +0000 (17:39 +0200)]
sstate: remove dead code and unify path operations
Most substring replacement operations performed on
'dirs' and 'plaindirs' are implemented in the same
pattern, except two. Unify the implementation.
Signed-off-by: Adam Blank <adam.blank.g@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Adam Blank [Thu, 2 Apr 2026 15:39:37 +0000 (17:39 +0200)]
lib/packagedata.py: slight improvement to code readability
Make use of an existing variable rather than creating a new one
when collecting files of a package.
Signed-off-by: Adam Blank <adam.blank.g@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Antonin Godard [Tue, 28 Apr 2026 11:54:27 +0000 (13:54 +0200)]
mirrors: remove inactive sources.openembedded.org URLs
It was confirmed these mirrors were inactive in [1]. Remove them.
[1]: https://lore.kernel.org/r/
b9c4ddd5ae72ae21ee0b6e12fb1a1f63661c685c .camel@linuxfoundation.org
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Richard Purdie [Mon, 27 Apr 2026 21:28:49 +0000 (22:28 +0100)]
pseudo: Update 1.9.5 -> 1.9.6
Pulls in the changes:
* Makefile.in: Bump version to 1.9.6
* pseudo_util.c: Fix symlink processing for symlinkat and related
* test: Add test symlinkat and related
* ports/unix: realpath: Fix chroot processing
* test: Add test cases for canonicalize functions
* ports/unix: fts_open: Fix chroot behavior
* ports/unix: fts_*: Certain functions were incorrectly returning stat data
* test: Add fts test case
* test: Add test for linkat chroot path stripping
* linkat: Avoid a segmentation fault
* Only copy xattrs on a rename if it's cross-filesystem
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Viswanath Kraleti [Mon, 27 Apr 2026 10:30:40 +0000 (16:00 +0530)]
mirrors: switch Yocto Project mirrors to HTTPS
downloads.yoctoproject.org supports access over HTTPS, which provides
better security and reliability than HTTP.
Switch the default Yocto Project mirror URLs to use HTTPS instead of
HTTP to improve fetch reliability.
Signed-off-by: Viswanath Kraleti <viswanath.kraleti@oss.qualcomm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Mon, 27 Apr 2026 10:10:42 +0000 (12:10 +0200)]
ffmpeg: set status for 4 CVEs
These reappeared after update of sbom-cve-check tooling.
Fixed version found by links from Debian security tracker.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Wang Mingyu [Wed, 22 Apr 2026 10:36:26 +0000 (18:36 +0800)]
u-boot: upgrade 2026.01 -> 2026.04
CVE-2026-33243.patch
removed since it's included 2026.04
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Sun, 12 Apr 2026 03:57:57 +0000 (20:57 -0700)]
u-boot-tools: Add dependency on libyaml for dtschema validation
yamltree host tool, used to emit YAML from the DT, is now
built as part of the normal u-boot-tools build to support
the schema infrastructure
Fixes link errors like
| /usr/bin/ld: scripts/dtc/yamltree.o: in function `dt_to_yaml':
| yamltree.c:(.text+0x91b): undefined reference to `yaml_emitter_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x926): undefined reference to `yaml_emitter_set_output_file'
| /usr/bin/ld: yamltree.c:(.text+0x933): undefined reference to `yaml_stream_start_event_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x93e): undefined reference to `yaml_emitter_emit'
| /usr/bin/ld: yamltree.c:(.text+0x957): undefined reference to `yaml_document_start_event_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x962): undefined reference to `yaml_emitter_emit'
| /usr/bin/ld: yamltree.c:(.text+0x983): undefined reference to `yaml_sequence_start_event_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x98e): undefined reference to `yaml_emitter_emit'
| /usr/bin/ld: yamltree.c:(.text+0x9ab): undefined reference to `yaml_sequence_end_event_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x9b6): undefined reference to `yaml_emitter_emit'
| /usr/bin/ld: yamltree.c:(.text+0x9c8): undefined reference to `yaml_document_end_event_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x9d3): undefined reference to `yaml_emitter_emit'
| /usr/bin/ld: yamltree.c:(.text+0x9e3): undefined reference to `yaml_stream_end_event_initialize'
| /usr/bin/ld: yamltree.c:(.text+0x9ee): undefined reference to `yaml_emitter_emit'
| /usr/bin/ld: yamltree.c:(.text+0x9fa): undefined reference to `yaml_emitter_delete'
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
João Marcos Costa [Fri, 24 Apr 2026 15:10:13 +0000 (17:10 +0200)]
soc-family.inc: improve clarity at MACHINEOVERRIDES's prepend
Use Python's ternary operator "A if condition else B".
Signed-off-by: João Marcos Costa <joaomarcos.costa@bootlin.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Zk47T [Thu, 23 Apr 2026 10:04:05 +0000 (17:04 +0700)]
oe-selftest: add test for useradd with only USERADD_DEPENDS
Add a test case to verify that a recipe inheriting useradd with only
USERADD_DEPENDS set (and no USERADD_PACKAGES) parses and builds
successfully. This validates the fix in useradd.bbclass for
[YOCTO #15863].
Signed-off-by: Nguyen Minh Tien <zizuzacker@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Zk47T [Thu, 23 Apr 2026 10:04:04 +0000 (17:04 +0700)]
meta-selftest: add usegroup-deponly recipe to test USERADD_DEPENDS only
Add a test recipe that inherits useradd and only sets USERADD_DEPENDS
without USERADD_PACKAGES to validate the fix for [YOCTO #15863].
The root bug is that useradd.bbclass unconditionally requires
USERADD_PACKAGES to be set, even when a recipe only needs to depend on
users/groups created by another recipe via USERADD_DEPENDS. This recipe
depends on creategroup1 for user gt1 and group grouptest, but does not
create any users/groups itself, exercising the code path fixed in the
previous commit.
Signed-off-by: Nguyen Minh Tien <zizuzacker@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Sam Kent [Tue, 21 Apr 2026 10:28:44 +0000 (11:28 +0100)]
package.py: fix kernel module file pre-filter and document strip asymmetry
Change the check to f.endswith(".ko"), consistent with strip_execs() and
with the /lib/modules/ guard already present in is_elf() and
splitdebuginfo().
Fixes [YOCTO #2348]
Signed-off-by: Sam Kent <sam.john.kent@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Tejas Kanfade [Tue, 21 Apr 2026 06:01:03 +0000 (11:31 +0530)]
pulseaudio: split pactl into a dedicated client subpackage
pactl is a client-side control utility and is required on
PipeWire-based systems for audio control. pactl was packaged
as part of pulseaudio-server, making it difficult to use
without also installing and enabling the pulseaudio daemon,
which can conflict with pipewire.
Move the pactl binary into a standalone pulseaudio-pactl subpackage
so it can be installed without pulling in the pulseaudio server.
Signed-off-by: Tejas Kanfade <tkanfade@qti.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Corentin Guillevic [Mon, 20 Apr 2026 14:31:55 +0000 (16:31 +0200)]
sanity: add check for own-mirrors/SOURCE_MIRROR_URL
The SOURCE_MIRROR_URL variable belongs to the own-mirrors class. However, the
user may forget to define it. This will cause the class to inject incorrect
content into PREMIRRORS, resulting in the following error:
ERROR: gettext-minimal-native-1.0-r0 do_fetch: Bitbake Fetcher Error: MalformedUrl('${SOURCE_MIRROR_URL}')
ERROR: Logfile of failure stored in: /path/to/tmp/work/x86_64-linux/gettext-minimal-native/1.0/temp/log.do_fetch.258066
ERROR: Task (/path/to/layers/poky/meta/recipes-core/gettext/gettext-minimal-native_1.0.bb:do_fetch) failed with exit code '1'
Add a check to the sanity class, to detect this case and raise an error.
Signed-off-by: Corentin Guillevic <corentin.guillevic@smile.fr>
Reviewed-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Bin Cao [Mon, 20 Apr 2026 02:42:37 +0000 (10:42 +0800)]
scripts/cve-json-to-text.py: simplify getopt argument parsing
Remove unused long options from getopt.getopt() call. The long options
"help", "input", and "output" were never handled in the option parsing
logic, so they are dead code.
Signed-off-by: Bin Cao <bin.cao.cn@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Li Wang [Fri, 24 Apr 2026 09:20:51 +0000 (17:20 +0800)]
perf: add PACKAGECONFIG for llvm
for avoiding to enable llvm option under uncommon condition,
make llvm controll under PACKAGECONFIG.
error log:
ERROR: perf-1.0-r2 do_package_qa: QA Issue: /usr/bin/trace contained in package perf requires libLLVM.so.2x.x(LLVM_2x.x)(64bit), but no providers found in RDEPENDS:perf? [file-rdeps]
Signed-off-by: Li Wang <li.wang@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Trevor Gamblin [Thu, 23 Apr 2026 17:12:46 +0000 (13:12 -0400)]
python3-vcs-versioning: add ptest
The tests are in the 'testing_vcs' directory, so set PTEST_PYTEST_DIR
accordingly. Add setuptools, setuptools-scm, and git to the ptest
RDEPENDS, since many of the tests make use of them. Many of the skipped
tests depend on mercurial, but that's in meta-oe and not worth moving to
oe-core just for this.
Add python3-vcs-versioning to PTESTS_FAST in ptest-packagelists.inc,
since the suite only takes a few seconds.
We also need a custom run-ptest script for two reasons:
1. There is a 'vcs_versioning.test_api' used as a plugin. This is
mentioned in conftest.py but is intended to be picked up from
pyproject.toml, which we don't ship with the ptest image. Instead,
just add '-p vcs_versioning.test_api' to the pytest call.
2. The test logic tries to rewrite pytest's assertion failures, which
doesn't work well with our automake formatting. We can work around
this by telling pytest to output plain messages with --assert=plain.
Example test results:
|============================================================================
|Testsuite summary
|# TOTAL: 409
|# PASS: 364
|# SKIP: 44
|# XFAIL: 1
|# FAIL: 0
|# XPASS: 0
|# ERROR: 0
|DURATION: 3
|END: /usr/lib/python3-vcs-versioning/ptest
|2026-04-23T16:21
|STOP: ptest-runner
|TOTAL: 1 FAIL: 0
Signed-off-by: Trevor Gamblin <tgamblin@baylibre.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Trevor Gamblin [Thu, 23 Apr 2026 17:12:45 +0000 (13:12 -0400)]
maintainers.inc: add self for python3-uv-build
It's listed as unmaintained, so fix that.
Signed-off-by: Trevor Gamblin <tgamblin@baylibre.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Trevor Gamblin [Thu, 23 Apr 2026 17:12:44 +0000 (13:12 -0400)]
python3-setuptools-scm: upgrade 9.2.2 -> 10.0.5
Changelog: https://github.com/pypa/setuptools-scm/releases
Note that the releases page also includes notes for the vcs-versioning
module, which is published separately (and which setuptools-scm depends
on). The new python3-vcs-versioning recipe is added to dependency lists.
Also rework the DEPENDS list to match the same formatting as RDEPENDS.
Signed-off-by: Trevor Gamblin <tgamblin@baylibre.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Trevor Gamblin [Thu, 23 Apr 2026 17:12:43 +0000 (13:12 -0400)]
python3-vcs-versioning: add recipe
The setuptools-scm project[1] now ships a second module which can be
used independently of setuptools if desired. This is now a dependency
for setuptools-scm, so add a recipe for it.
Update the maintainers.inc file with the recipe and myself as
maintainer.
[1] https://github.com/pypa/setuptools-scm
Signed-off-by: Trevor Gamblin <tgamblin@baylibre.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Trevor Gamblin [Fri, 24 Apr 2026 18:41:05 +0000 (14:41 -0400)]
python3-urllib3: enable setuptools-scm 10.x
Backport a patch from upstream to allow python3-urllib3 2.6.3 to build
with python3-setuptools-scm 10.x, so that we can use an updated version
of that recipe.
Signed-off-by: Trevor Gamblin <tgamblin@baylibre.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Khem Raj [Thu, 16 Apr 2026 05:54:07 +0000 (22:54 -0700)]
libmpc: Upgrade to 1.4.0
- Add mpc_exp10, mpc_exp2, mpc_log2 functions
- Fix mpc_tan/mpc_tanh for large imaginary parts
- Fix mpc_pow imaginary sign with real inputs
- Fix mpc_fr_div/mpc_ui_div zero sign handling per C2Y draft
- Add pkg-config support
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Thu, 16 Apr 2026 05:54:06 +0000 (22:54 -0700)]
re2c: upgrade 4.4 -> 4.5.1
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Thu, 16 Apr 2026 05:54:05 +0000 (22:54 -0700)]
python3-lxml: upgrade 6.0.2 -> 6.0.4
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Thu, 16 Apr 2026 05:54:04 +0000 (22:54 -0700)]
python3-pdm: upgrade 2.26.6 -> 2.26.7
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Thu, 16 Apr 2026 05:54:03 +0000 (22:54 -0700)]
python3-pdm-backend: upgrade 2.4.7 -> 2.4.8
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Thu, 16 Apr 2026 05:54:02 +0000 (22:54 -0700)]
dos2unix: upgrade 7.5.4 -> 7.5.5
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Khem Raj [Thu, 16 Apr 2026 05:54:01 +0000 (22:54 -0700)]
gn: upgrade to latest revision
Signed-off-by: Khem Raj <khem.raj@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Leonardo Costa [Thu, 23 Apr 2026 12:40:30 +0000 (09:40 -0300)]
bluez5: add patches to fix 8.56 cli issues
On bluez5 5.86, the bluetoothctl cli interface does not work outside of
the dedicated shell to list controllers and devices [1]. These patches fix
the issue while version 5.87 is not published.
[1] https://github.com/bluez/bluez/issues/1896
Upstream-Status: Backport [https://github.com/bluez/bluez/commit/
b33e923b55e4d0e9d78a83cfcb541fd1f687ef54 ,
https://github.com/bluez/bluez/commit/
21e13976f2e375d701b8b7032ba5c1b2e56c305f ]
Signed-off-by: Leonardo Costa <leonardo.costa@toradex.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Moritz Haase [Thu, 23 Apr 2026 08:41:21 +0000 (10:41 +0200)]
cmake: upgrade 4.3.1 -> 4.3.2
Release notes are available at [0].
[0]: https://cmake.org/cmake/help/v4.3/release/4.3.html#id2
Signed-off-by: Moritz Haase <Moritz.Haase@bmw.de>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Peter Tatrai [Thu, 23 Apr 2026 07:17:01 +0000 (09:17 +0200)]
rust: fix codegen test failure on big-endian targets
The test tests/codegen-llvm/issues/multiple-option-or-permutations.rs
uses FileCheck to verify LLVM IR for Option::or operations on slices.
The CHECK-NEXT directives assumed a little-endian memory layout where
the Option discriminant is the low byte, emitting a simple:
trunc i16 %0 to i1
On big-endian targets (e.g. powerpc), the discriminant resides in the
high byte, so LLVM first emits an lshr before the trunc, causing the
test to fail.
Backport upstream fix from rust-lang/rust#151780 which introduces
BIG/LITTLE revisions with the only-endian-big / ignore-endian-big
directives (also backported via directive_names.rs change) to handle
both layouts correctly.
Fixes: rust-lang/rust#151718
Upstream-Status: Backport [https://github.com/rust-lang/rust/pull/151780]
Signed-off-by: Peter Tatrai <peter.tatrai.ext@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Vijay Anusuri [Thu, 23 Apr 2026 07:14:56 +0000 (12:44 +0530)]
avahi: Fix CVE-2026-34933
Pick patch according to [1]
[1] https://security-tracker.debian.org/tracker/CVE-2026-34933
[2] https://github.com/avahi/avahi/pull/891
[3] https://nvd.nist.gov/vuln/detail/CVE-2026-34933
Signed-off-by: Vijay Anusuri <vanusuri@mvista.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Wed, 22 Apr 2026 10:36:24 +0000 (18:36 +0800)]
python3-cryptography(-vectors): upgrade 46.0.5 -> 46.0.7
Add 0001-bump-uv_build-to-0.11.0.patch to bump uv_build version
0001-bump-uv_build-to-0.10.0-14271.patch
0001-pyproject.toml-bump-uv_build-version-requirement.patch
removed since they're not needed in 46.0.7
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:27 +0000 (17:55 +0800)]
libmicrohttpd: upgrade 1.0.2 -> 1.0.5
0001-Remove-broken-experimental-code.patch
removed since it's included in 1.0.5
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:59 +0000 (17:55 +0800)]
xserver-xorg: upgrade 21.1.21 -> 21.1.22
License-Update:
add author to HPND-sell-MIT-disclaimer-xserver
add missing paragraph to SGI-B-2.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:58 +0000 (17:55 +0800)]
wayland-protocols: upgrade 1.47 -> 1.48
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:57 +0000 (17:55 +0800)]
vala: upgrade 0.56.18 -> 0.56.19
Changelog
============
* Various improvements and bug fixes:
- codegen: Minor refactoring of TypeRegisterFunction and its subclasses
- codegen: Use G_TYPE_FLAG_NONE when targetting glib >= 2.74
- codegen: Use g_once_init_{enter,leave}_pointer when targetting glib >= 2.80
- codegen: Propagate default_value_on_error from parent struct
- codegen: Return default_value_on_error on precondition failures
- gdbus: Avoid unused variables in method call and properties getter/setter
- gdbus: Allow GLib.VariantDict for a{sv}
- gdbus: Do not provide unintended read/write access to properties
- parser: Fix statement error recovery
- vala: Use reference-transfer as needed when transforming
conditional-expression
- girwriter: Don't use instance-parameter inside function elements
- girwriter: Add the doc:format argument in the .gir file
- libvaladoc: Do not error-out on doc:format
- libvaladoc: Add compat layer for gvRenderData to cope with API break
* Bindings:
- glib-2.0: allow FileUtils.open_tmp's first argument to be null
- posix: add UTIME_{NOW,OMIT} constants for utimensat
- gsl: Deprecate gsl_linalg_cholesky_decomp in favour of
gsl_linalg_cholesky_decomp1
- libxml-2.0: Add more fields to ParserCtxt
- gobject-2.0: Set default_value{,_on_error} for GType
- glib-2.0: Fix *.add_once () callbacks
- gobject-2.0: Fix return type
- gobject-2.0: Add Type.to_string ()
- gstreamer-1.0: Fix ownership of Caps.full*() parameters
- glib-2.0: fix a typo in a parameter name
- gtk4: Update to 4.21.6+
83716767
- gtk4: Make all Gsk.RenderNode and Gsk.Renderer shadow their parent type
- gtk4: Fix CursorGetTextureCallback declaration
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:55 +0000 (17:55 +0800)]
stress-ng: upgrade 0.20.01 -> 0.21.00
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:54 +0000 (17:55 +0800)]
sqlite3: upgrade 3.51.3 -> 3.53.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:53 +0000 (17:55 +0800)]
resolvconf: upgrade 1.94 -> 1.95
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:52 +0000 (17:55 +0800)]
repo: upgrade 2.61.1 -> 2.62
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:50 +0000 (17:55 +0800)]
python3-zipp: upgrade 3.23.0 -> 3.23.1
License-Update: Copyright year updated to 2026
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:48 +0000 (17:55 +0800)]
python3-testtools: upgrade 2.8.7 -> 2.9.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:46 +0000 (17:55 +0800)]
python3-setuptools-rust: upgrade 1.12.0 -> 1.12.1
Changelog:
===========
- Migrate to trusted publishing.
- Strip target suffix for cargo-zigbuild compatibility.
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:45 +0000 (17:55 +0800)]
python3-pytest: upgrade 9.0.2 -> 9.0.3
Bug fixes
============
- #12444: Fixed pytest.approx which now correctly takes into account
~collections.abc.Mapping keys order to compare them.
- #13634: Blocking a conftest.py file using the -p no: option is now explicitly
disallowed.
- Previously this resulted in an internal assertion failure during plugin
loading.
- Pytest now raises a clear UsageError explaining that conftest files are not
plugins and cannot be disabled via -p.
- #13734: Fixed crash when a test raises an exceptiongroup with
__tracebackhide__ = True.
- #14195: Fixed an issue where non-string messages passed to
unittest.TestCase.subTest() were not printed.
- #14343: Fixed use of insecure temporary directory (CVE-2025-71176).
Improved documentation ======================
- #13388: Clarified documentation for -p vs PYTEST_PLUGINS plugin loading and
fixed an incorrect -p example.
- #13731: Clarified that capture fixtures (e.g. capsys and capfd) take
precedence over the -s / --capture=no command-line options in Accessing
captured output from a test function <accessing-captured-output>.
- #14088: Clarified that the default pytest_collection hook sets session.items
before it calls pytest_collection_finish, not after.
- #14255: TOML integer log levels must be quoted: Updating reference
documentation.
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:43 +0000 (17:55 +0800)]
python3-pygments: upgrade 2.19.2 -> 2.20.0
Changelog:
============
- New lexers:
* Rell
- Updated lexers:
* archetype: Fix catastrophic backtracking in GUID and ID patterns
* ASN.1: Recognize minus sign and fix range operator
* C++: Add C++26 keywords
* ComponentPascal: Fix "analyse_text"
* Coq renamed to Rocq
* Cython: Various improvements
* Debian control: Improve architecture parsing
* Devicetree: Add support for overlay/fragments, add bytestring support, fix catastrophic backtracking
* Fennel: Various improvements
* Haskell: Handle escape sequences in character literals
* Java: Add module keywords
* Lean4: Add operators "]'", "]?", "]!"
* LESS: Support single-line comments
* LilyPond: Update to 2.25.29
* LLVM: Support C-style comments
* Lua(u): Fix catastrophic backtracking
* Macaulay2: Update to 1.25.05, 1.25.11
* Mathematica: Various improvements
* meson: Add additional operators
* MySQL: Update keywords
* org-Mode: Support both schedule and deadline
* PHP: Add "__PROPERTY__" magic constant, add reserved keywords
* PostgreSQL: Add more keywords
* protobuf: Fix namespace tokenization
* Python: Add "t"-string support
* Tablegen: Fix infinite loop
* Tera Term macro: Add commands introduced in v5.3 through v5.6
* TOML: Support TOML 1.1.0
* Turtle: Allow empty comment lines
* XML: Added ".xbrl" as file ending
- Drop Python 3.8, and add Python 3.14 as a supported version
- Various improvements to "autopygmentize"
- Update "onedark" style to support more token types
- Update "rtt" style to support more token types
- Cache entry points to improve performance
- Fix "xterm-256" color table
- Fix "kwargs" dictionary getting mutated on each call
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:42 +0000 (17:55 +0800)]
python3-pyasn1: upgrade 0.6.2 -> 0.6.3
Changelog:
==========
- CVE-2026-30922 (GHSA-jr27-m4p2-rc6r): Added nesting depth limit to ASN.1
decoder to prevent stack overflow from deeply nested structures
- Fixed OverflowError from oversized BER length field
- Fixed DeprecationWarning stacklevel for deprecated attributes
- Fixed asDateTime incorrect fractional seconds parsing
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:41 +0000 (17:55 +0800)]
python3-poetry-core: upgrade 2.3.1 -> 2.3.2
Changed
========
- Update list of supported licenses (#917).
Fixed
======
- Fix an issue where platform_release could not be parsed on Debian Trixie
- Fix an issue where using project.readme.text in the pyproject.toml file
resulted in broken metadata
- Fix an issue where dependency groups were considered equal when their
resolved dependencies were equal, even if the groups themselves were not
- Fix an issue where removing a dependency from a group that included another
group resulted in other dependencies being added to the included group
- Fix an issue where PEP 735 include-group entries were lost when
[tool.poetry.group] also defined include-groups for the same group
- Fix an issue where the union of <value> not in <marker> constraints was
wrongly treated as always satisfied
- Fix an issue where a post release with a local version identifier was wrongly
allowed by a > version constraint
- Fix an issue where a version with the local version identifier 0 was treated
as equal to the corresponding public version
- Fix an issue where a != <version> constraint wrongly disallowed pre releases
and post releases of the specified version
- Fix an issue where in and not in constraints were wrongly not allowed by
specific compound constraints
- Fix an issue where data entries in generated setup.py files were duplicated
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:38 +0000 (17:55 +0800)]
python3-maturin: upgrade 1.12.4 -> 1.13.1
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:36 +0000 (17:55 +0800)]
python3-editables: upgrade 0.5 -> 0.6
License-Update: Line endings in the license file were changed from CRLF to LF.
Changelog:
==========
- Add a new "self_replace" strategy for map (and name the old strategy
"import_hook"). Based on an idea
- Rename the generated .pth file to _editable_impl_<project>.pth and document
that it is possible to customise the file names used.
- Rework the documentataion, replacing the "use cases" section with an expanded
and less opinionated "scope" section.
- Test suite improvements.
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:35 +0000 (17:55 +0800)]
python3-dtschema: upgrade 2025.12 -> 2026.4
Changelog:
===========
- New PCI bridge properties
- New linux,dmcryptkeys chosen property
- Relax simple-bus schema to have unit-addresses with chip-select number
and offset
- Avoid backtrace on missing $ref. Instead the missing ref will cause a
validation warning.
- Print the property name on decode failures
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:33 +0000 (17:55 +0800)]
python3-build: upgrade 1.4.0 -> 1.4.3
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:32 +0000 (17:55 +0800)]
pciutils: upgrade 3.14.0 -> 3.15.0
Changelog:
==========
* New capabilities are decoded: MMIO Register Block Locator,
Flit Error Injection, Flit Logging.
* Decoding of PCIe capabilities updated to Gen7.
* Both lspci and setpci warn when the "-s" or "-d" option
is given multiple times.
* Improved display of interrupts in "lspci -vv". Routing of
interrupt pins is shown only if the pins are not disabled.
Routing of MSI(X) interrupts is shown when available
(which is currently supported by the sysfs back-end only).
* Minor improvements to Windows back-ends.
* The dump back-end can read the dump from stdin when given "-"
as a file name.
* FreeBSD supports 64-bit addresses.
* Added README.DJGPP.
* Updated pci.ids.
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:31 +0000 (17:55 +0800)]
pango: upgrade 1.57.0 -> 1.57.1
Bugs fixed:
- #867 Bad font substitution causes application crashes
- #869 MacOS: subprojects/cairo/meson.build:1:0: ERROR: Value "gnu11,c11" (of
type "string") (sid)
- #870 MacOS: subprojects/pango/utils/viewer-cocoa.m:23:10: fatal error:
'cairo/cairo.h' file not found (sid)
- #871 gtk4-widget-factory crashes with pango error on macOS when an emoji is
entered into a text field
- #876 Inconsistency between documentation and code in
pango_context_set_font_description
- #882 The hex box characters generated in PDF can not be copied
- #885 warning: assignment discards 'const' qualifier from pointer target type
[-Wdiscarded-qualifiers]
- !884 Revert "meson: Rework introspection handling"
- !890 Update the code to support Unicode 17.0.0
- !892 Include fcfreetype.h where needed
- !893 meson: Update freetype2 wrap to fix ci warnings
- !894 Respect explicit language attribute when itemizing
- !895 Fix some subproject woes
- !896 meson: Add support for cross-compiling using Apple subsystems
- !897 (break.c) pass sentences to handle_sentences
- !898 add support for g_autoptr(PangoScriptIter)
- !900 fontmap: Mark get_family as nullable
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:30 +0000 (17:55 +0800)]
meson: upgrade 1.10.2 -> 1.11.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:28 +0000 (17:55 +0800)]
lzip: upgrade 1.25 -> 1.26
Changelog:
===========
- '-dvv' and '-tvv' now print (de)compressed sizes instead of compression
ratio. (Sizes are more informative than compression ratio).
- Large numbers in option arguments are now accepted with underscore
separators (-s 123_456_789).
- Large numbers are now printed with underscore separators (123_456_789).
- '-h' now prints a short help screen containing only the command-line
options. For full help, use '--help'.
- '--list' now can safely skip any trailing data added to a lzip file by the
option '--append' of lziprecover.
- '--list' now prints '+t' after the number of members to indicate the
presence of trailing data, and prints the size of the trailing data below
the size of the last member.
- '-lvv' now prints a blank line between the list of members of each
multimember file and the next file.
- Several improvements suggested by John Gilmore have been made to the manual.
- 'EXIT STATUS' now has its own section in the man page.
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:26 +0000 (17:55 +0800)]
libcap: upgrade 2.77 -> 2.78
Changelog:
===========
- Fix a security vulnerability (CVE-2026-4878).
- Fix a typo in a capset error
- Reverted some build macrology to get back to something that worked (admittedly sub-optimally).
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:25 +0000 (17:55 +0800)]
libadwaita: upgrade 1.8.4 -> 1.9.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:24 +0000 (17:55 +0800)]
hwdata: upgrade 0.405 -> 0.406
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:23 +0000 (17:55 +0800)]
gtk4: upgrade 4.22.1 -> 4.22.2
Bugs fixed:
- #8117 Docs for the new SVG parser?
- #8119 Wrong colors used for fallback symbolic icons containing classes
- #8125 svg: Animating hrefs does not work
- !9590 vulkan: fix GDK_VULKAN_FEATURE_SWAPCHAIN_MAINTENANCE check
- !9660 Various Vulkan fixes
- !9665 tests: fix libtestutils build under Windows.
- !9667 Update Serbian translation
- !9678 testsuite: Add dmabuf compare tests to needs-udmabuf suite
- !9681 dmabuf: Support dmabufs with fewer fds than planes
- !9682 Update Galician translation
- !9701 Update Turkish translation
- !9704 Update Catalan translation
- !9711 Load less icons as symbolics
- !9719 Fix traditional symbolic fallback
- !9736 svg: Fix invalidation
- !9739 Assorted backports
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:22 +0000 (17:55 +0800)]
gtk+3: upgrade 3.24.51 -> 3.24.52
* Bugs fixed:
- #6306 [GTK3] Zlib required when broadway is enabled.
- #7796 [GTK 3] Invalid a11y events when calling `gtk_tree_view_set_cursor` on
an unfocused GtkTreeView
- #7976 Firefox crashes at gdk_wayland_drag_context_manage_dnd() when missing
toplevel wl_surface
- #8103 gtk3 refresh_rate calculation overflows on 32-bit targets
- #8114 Images for recolored icons are constantly being reloaded
- GNOME/gimp#14901 Wild strobing in multi window mode
- GNOME/gimp#15480 GIMP does not focus on dialogue boxes on Mac
- !7332 quartz: add automagic uti<->mime conversion for clipboard
- !8216 Fix position of child tooltips in GTK3 custom windows
- !9005 a11y: Don't send focus-related events for unfocused treeview
- !9012 quartz: gtkwindow - fix windows fighting focus
- !9022 gtkmenu: Await more motion events before deactivating on release
- !9044 wayland: Handle XKB initialization failures gracefully
- !9067 gdk/win32: Add missing EGL conditional compilation guard
- !9098 gdk: do not run gdk_wayland_window_export_handle() callback when
window is already destroyed.
- !9119 Declare an explicit dependency on zlib when broadway is enabled
- !9141 [GTK 3] wayland: Try to open the display even if XDG_RUNTIME_DIR is
unset
- !9155 [gtk3] emoji: Update data to CLDR 48
- !9214 display/wayland: Gracefully handle dispose being called twice
- !9284 gdk/wayland: Map stylus buttons for BTN_BACK and BTN_FORWARD (Peter
Hutterer)
- !9322 [Quartz] Fix dialog keyboard focus while preventing focus fighting
- !9344 Fix a couple of leaks
- !9394 gdk/wayland: Map stylus buttons for BTN_BACK and BTN_FORWARD
- !9397 wayland: Avoid a crash
- !9600 Replace outdated freedesktop.org Window Manager spec links
- !9676 x11: fix overflow in refresh_rate calculation on 32-bit systems
- !9706 cssimage: Store and reuse icon info for recolored images
- !9707 wayland: Fix uninitialized value when no cursor
- !9708 fontchooser: Fix signedness of axes count
- !9709 fontchooser: Remove const on float return values
- !9710 print: Remove unused variable
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:21 +0000 (17:55 +0800)]
gsettings-desktop-schemas: upgrade 50.0 -> 50.1
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:20 +0000 (17:55 +0800)]
groff: upgrade 1.24.0 -> 1.24.1
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:19 +0000 (17:55 +0800)]
ghostscript: upgrade 10.06.0 -> 10.07.0
0001-Fix-32-bit-build.patch
removed since it's included in 10.07.0
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:18 +0000 (17:55 +0800)]
fastfloat: upgrade 8.2.4 -> 8.2.5
Changelog:
==========
- Fix Bazel build with bzlmod
- Replace std::min with ternary operators to avoid dependency
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:17 +0000 (17:55 +0800)]
epiphany: upgrade 49.7 -> 50.3
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:15 +0000 (17:55 +0800)]
diffoscope: upgrade 314 -> 317
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:14 +0000 (17:55 +0800)]
dhcpcd: upgrade 10.3.0 -> 10.3.1
Changelog:
==========
- BSD: don't send uninitialised memory using ps_root_indirectioctl
- Fix fallback_time option
- IPv4: Ignore DHCP state when building routes
- options: Ensure ldop is not NULL dereferenced
- route: Routes may not have an
- options: Ensure that an overly long bitflag string does not crash
- options: Don't assume vsio options have an argument
- common: Cast via uintptr_t rather than unsigned long
- privsep: Ensure we recv for real after a successful recv MSG_PEEK
- DHCP: Add parentheses to macro definitions
- ipv6nd: empty IPV6RA_EXPIRE eloop queue when dropping
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:13 +0000 (17:55 +0800)]
ccache: upgrade 4.13.2 -> 4.13.3
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:12 +0000 (17:55 +0800)]
adwaita-icon-theme: upgrade 49.0 -> 50.0
Changelog:
============
- use old format of the legacy icons for gtk3
- reintroduce legacy icons because themes
- symbolic:battery icons no longer fuzzy
- build: Windows build
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Wang Mingyu [Tue, 21 Apr 2026 09:55:11 +0000 (17:55 +0800)]
acpica: upgrade
20251212 ->
20260408
License-Update: Copyright year updated to 2026
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Richard Purdie [Thu, 16 Apr 2026 12:49:03 +0000 (13:49 +0100)]
useradd: Switch from --root to --prefix option
Whilst assessing where we use chroot (which requires superuser privileges),
I realised that shadow's utilities we use have the option of specifing
a prefix for files. This provides the same outcome but avoids the chroot
call. Whist we can emulate that under pseudo, it is probably nicer to avoid
doing that and use the prefix option instead.
Therefore switch --root -> --prefix
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Ross Burton [Thu, 23 Apr 2026 11:11:05 +0000 (12:11 +0100)]
classes/base: add explicit bzip2-native dependency for unpacking .bz2
Currently this is in ASSUME_PROVIDED and HOSTTOOLS so doesn't have any
effect, but declaring the dependency is the right thing to do.
Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sat, 25 Apr 2026 09:37:05 +0000 (11:37 +0200)]
expat: upgrade 2.7.5 -> 2.8.0
Release notes: [1]
Handles CVE-2026-41080
[1] https://github.com/libexpat/libexpat/blob/R_2_8_0/expat/Changes
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 19:26:28 +0000 (21:26 +0200)]
sed: upgrade 4.9 -> 4.10
Solves CVE-2026-5958.
Release notes: [1]
License-Update: copyright years refreshed
[1] https://gitweb.git.savannah.gnu.org/gitweb/?p=sed.git;a=blob_plain;f=NEWS;hb=v4.10
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 18:50:24 +0000 (20:50 +0200)]
ovmf: set status for 7 CVEs
These reappeared after last update of sbom-cve-check tooling.
"fixed-in" release was determined by following links in Debian CVE
reports except CVE-2025-2295 which was taken from Yocto master CVE
patch.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 18:50:22 +0000 (20:50 +0200)]
cargo: set CVE_PRODUCT
This removes mediawiki:cargo CVEs from CVE metrics.
* CVE-2026-39837, CVE-2026-39839, CVE-2026-39840, CVE-2026-39841
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 18:50:21 +0000 (20:50 +0200)]
cargo: set status of CVE-2023-40030
sbom-cve-check has problem matching version 1.72.
It works only if cvelistV5 is modified to indicate 1.72.0.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 19:12:08 +0000 (21:12 +0200)]
git: set status of 5 CVEs
It is unclear why entries in cvelistV5 cause these CVEs to appear in CVE
reports.
There is one which should also not be shown per listed CPEs, however it
does not have a patch, so it's not added to the list - CVE-2024-52005.
The others are set to fixed with version based on which .0 release
included patch mentioned in Debian security tracker for respective CVE.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:53 +0000 (14:02 +0200)]
python3-requests: set status for CVE-2024-47081
NVD [1] does not have CPE set.
Debian [2] shows comit from v2.32.4 as fix.
cvelistV5 [3] also says "< 2.32.4" however for cpe psf:requests.
Not sure why this is shown in CVE metrics.
[1] https://nvd.nist.gov/vuln/detail/CVE-2024-47081
[2] https://security-tracker.debian.org/tracker/CVE-2024-47081
[3] https://github.com/CVEProject/cvelistV5/blob/main/cves/2024/47xxx/CVE-2024-47081.json
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:52 +0000 (14:02 +0200)]
python3-requests: set status for CVE-2024-35195
NVD [1] does not have CPE set.
Debian [2] shows comit from v2.32.0 as fix.
cvelistV5 [3] also says "< 2.32.0", posibly "defaultStatus": "unknown"
is causing it to appear in CVE metrics...
[1] https://nvd.nist.gov/vuln/detail/CVE-2024-35195
[2] https://security-tracker.debian.org/tracker/CVE-2024-35195
[3] https://github.com/CVEProject/cvelistV5/blob/main/cves/2024/35xxx/CVE-2024-35195.json
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:51 +0000 (14:02 +0200)]
rsync: set status for CVE-2024-12084
Debian security tracker [1] says it's fixed in v3.4.0.
NVD [2] does not say that our version is vulnerable.
The CVE is reported probably because cvelistV5 has many CPE groups and
some of them are unparseable (so assumes vulnerable).
[1] https://security-tracker.debian.org/tracker/CVE-2024-12084
[2] https://nvd.nist.gov/vuln/detail/CVE-2024-12084
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:50 +0000 (14:02 +0200)]
base-files: set status for CVE-2018-6557
CPE in NVD [1] shows ubuntu.
Debian [1] says "Ubuntu specific motd update code".
cvelistV5 has unparseable CPE so it sbom-cve-check assumes vulnerable
("lessThan": "10.1ubuntu2.2").
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:49 +0000 (14:02 +0200)]
bind: set status for CVE-2017-3139
NVD [1] has only redhat cpes.
Debian [2] says RHEL6 specific.
cvelistV5 [3] has unparseable (so assumes affected):
"version": "shipped in Red Hat Enterprise Linux 6"
[1] https://nvd.nist.gov/vuln/detail/CVE-2017-3139
[2] https://security-tracker.debian.org/tracker/CVE-2017-3139
[3] https://github.com/CVEProject/cvelistV5/blob/main/cves/2017/3xxx/CVE-2017-3139.json
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:48 +0000 (14:02 +0200)]
cve-extra-exclusions: ignore CVE-2019-2708
Yet another CVE for berkeley DB, ignore as all others.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:47 +0000 (14:02 +0200)]
gnutls: set status for CVE-2026-1584
This is a version-less RedHat CVE.
Per Debian security tracker [1] this is fixed in 3.8.12.
[1] https://security-tracker.debian.org/tracker/CVE-2026-1584
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sun, 26 Apr 2026 12:02:46 +0000 (14:02 +0200)]
harfbuzz: set status for CVE-2024-56732
This CVE does not have cpe in NVD DB.
In cvelistV5 it shows "version": ">= 8.5.0, <= 10.0.1" which is not
parseable with our tooling.
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sat, 25 Apr 2026 22:26:34 +0000 (00:26 +0200)]
libva: set status for CVE-2023-39929
This CVE is reported as open because NVD has no cpe and cvelistV5 has
unparseable "version": "before version 2.20.0".
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sat, 25 Apr 2026 22:26:33 +0000 (00:26 +0200)]
p11-kit: set status for CVE-2026-2100
This is a Redhat version-less CVE in NVD DB.
Per [1] this is fixed in 0.26.2.
[1] https://security-tracker.debian.org/tracker/CVE-2026-2100
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sat, 25 Apr 2026 22:26:32 +0000 (00:26 +0200)]
python3-setuptools: set status for CVE-2024-6345
Current version of sbom-cve-check reports this for some reason.
NVD does not have CPE and cvelistV5 ([1]) says "lessThan": "70.0".
[1] https://github.com/CVEProject/cvelistV5/blob/main/cves/2024/6xxx/CVE-2024-6345.json
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sat, 25 Apr 2026 22:26:31 +0000 (00:26 +0200)]
ruby: set status for CVE-2025-0306
This is a version-less Redhat CVE, so explicit status is needed.
Per [1] the issue is mitigated by using openssl >= 3.2.0.
[1] https://bugzilla.redhat.com/show_bug.cgi?id=
2336100
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Peter Marko [Sat, 25 Apr 2026 22:26:30 +0000 (00:26 +0200)]
shadow: set CVE_PRODUCT
This will remove CVE-2016-15024 from open cve reports.
This CVE for is for "doomsider:shadow" [1].
It will also remove
* CVE-2018-16588 (suse:shadow, [2])
* CVE-2019-16110 (blade-group:shadow [3])
which can be verified that they don't affect Yocto shadow.
[1] https://security-tracker.debian.org/tracker/CVE-2016-15024
[2] https://security-tracker.debian.org/tracker/CVE-2018-16588
[3] https://security-tracker.debian.org/tracker/CVE-2019-16110
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Richard Purdie [Thu, 23 Apr 2026 20:44:21 +0000 (21:44 +0100)]
build-appliance-image: Update to master head revisions
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Richard Purdie [Thu, 23 Apr 2026 11:07:45 +0000 (12:07 +0100)]
base/bitbake.conf: Rework DISTRO_FEATURES and MACHINE_FEATURES default handling
The existing code for handling defaults in distro/machine features
triggers from anonymous python in base.bbclass.
Anonymous python is executed after all inherits including deferred inherits
are processed. This means conditional inherits can't use DISTRO_FEATURES
or MACHINE_FEATURES which is contra to user expectations. This leads to
a hard to understand failure mode.
Whilst it isn't as performant, we can handle the features using inline
python function calls. This patch switches to execute the code that way.
These changes depend on a new function in bb.utils (filter_string).
filter_default_features is changed to return a string rather than
set it and the tests for it are updated to match.
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Richard Purdie [Thu, 23 Apr 2026 13:31:56 +0000 (14:31 +0100)]
sanity.conf: Depend on bitbake 2.18
In readiness for release and due to the distro_features fix which needs
bb.utils.filter_string(), update to depend on bitbake 2.18.0
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:17 +0000 (11:32 -0400)]
linux-yocto/6.18: update CVE exclusions (6.18.24)
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 9101 changes (4 new | 9097 updated): - 4 new CVEs: CVE-2025-70994, CVE-2026-35225, CVE-2026-41460, CVE-2026-41461 - 9097 updated CVEs: CVE-2018-25259, CVE-2018-25267, CVE-2022-41650, CVE-2022-43472, CVE-2022-44578, CVE-2022-45806, CVE-2022-45819, CVE-2022-45832, CVE-2022-45840, CVE-2022-45841, CVE-2022-46795, CVE-2022-46796, CVE-2022-46807, CVE-2022-46811, CVE-2022-46838, CVE-2022-46840, CVE-2022-46846, CVE-2022-47168, CVE-2022-47176, CVE-2022-47182, CVE-2022-47429, CVE-2022-47594, CVE-2022-47601, CVE-2023-22697, CVE-2023-22701, CVE-2023-22708, CVE-2023-23715, CVE-2023-23716, CVE-2023-23725, CVE-2023-23726, CVE-2023-23729, CVE-2023-23814, CVE-2023-23823, CVE-2023-23825, CVE-2023-23834, CVE-2023-23868, CVE-2023-23886, CVE-2023-23887, CVE-2023-23893, CVE-2023-23895, CVE-2023-23975, CVE-2023-23986, CVE-2023-23987, CVE-2023-23989, CVE-2023-24375, CVE-2023-24407, CVE-2023-25026, CVE-2023-25035, CVE-2023-25037, CVE-2023-25048, CVE-2023-25060, CVE-2023-25067, CVE-2023-25068, CVE-2023-25445, CVE-2023-25446, CVE-2023-25454, CVE-2023-25455, CVE-2023-25469, CVE-2023-25486, CVE-2023-25703, CVE-2023-25714, CVE-2023-25791, CVE-2023-25959, CVE-2023-25966, CVE-2023-25988, CVE-2023-25993, CVE-2023-25995, CVE-2023-25997, CVE-2023-25998, CVE-2023-25999, CVE-2023-26000, CVE-2023-26001, CVE-2023-26002, CVE-2023-26003, CVE-2023-26005, CVE-2023-26520, CVE-2023-26522, CVE-2023-27428, CVE-2023-27449, CVE-2023-27454, CVE-2023-27456, CVE-2023-27609, CVE-2023-27625, CVE-2023-27626, CVE-2023-28165, CVE-2023-28168, CVE-2023-28416, CVE-2023-28417, CVE-2023-28532, CVE-2023-28534, CVE-2023-28536, CVE-2023-28619, CVE-2023-28689, CVE-2023-28990, CVE-2023-29173, CVE-2023-29235, CVE-2023-29237, CVE-2023-29239, CVE-2023-29422, CVE-2023-29429, CVE-2023-29431, CVE-2023-29433, CVE-2023-30476, CVE-2023-30479, CVE-2023-30486, CVE-2023-30488, CVE-2023-30490, CVE-2023-30783, CVE-2023-30870, CVE-2023-30873, CVE-2023-30874, CVE-2023-31073, CVE-2023-31078, CVE-2023-31214, CVE-2023-32094, CVE-2023-32117, CVE-2023-32126, CVE-2023-32240, CVE-2023-32293, CVE-2023-32299, CVE-2023-32506, CVE-2023-32507, CVE-2023-32519, CVE-2023-32520, CVE-2023-32574, CVE-2023-32581, CVE-2023-32585, CVE-2023-32586, CVE-2023-32593, CVE-2023-32599, CVE-2023-32601, CVE-2023-32798, CVE-2023-32963, CVE-2023-33215, CVE-2023-33324, CVE-2023-33928, CVE-2023-33994, CVE-2023-33995, CVE-2023-33996, CVE-2023-33998, CVE-2023-34009, CVE-2023-34014, CVE-2023-34019, CVE-2023-34376, CVE-2023-34381, CVE-2023-34387, CVE-2023-35037, CVE-2023-35040, CVE-2023-35046, CVE-2023-35051, CVE-2023-35052, CVE-2023-35091, CVE-2023-35777, CVE-2023-35875, CVE-2023-36385, CVE-2023-36506, CVE-2023-36509, CVE-2023-36510, CVE-2023-36518, CVE-2023-36519, CVE-2023-36526, CVE-2023-36528, CVE-2023-36531, CVE-2023-36680, CVE-2023-36681, CVE-2023-37885, CVE-2023-37886, CVE-2023-37887, CVE-2023-37967, CVE-2023-37969, CVE-2023-37971, CVE-2023-37984, CVE-2023-37987, CVE-2023-37989, CVE-2023-38383, CVE-2023-38385, CVE-2023-38475, CVE-2023-38477, CVE-2023-38479, CVE-2023-38480, CVE-2023-38483, CVE-2023-38512, CVE-2023-38514, CVE-2023-39305, CVE-2023-39920, CVE-2023-39994, CVE-2023-39995, CVE-2023-39996, CVE-2023-39997, CVE-2023-40001, CVE-2023-40003, CVE-2023-40005, CVE-2023-40011, CVE-2023-40203, CVE-2023-40205, CVE-2023-40209, CVE-2023-40213, CVE-2023-40331, CVE-2023-40334, CVE-2023-40670, CVE-2023-40678, CVE-2023-41130, CVE-2023-41132, CVE-2023-41133, CVE-2023-41649, CVE-2023-41664, CVE-2023-41671, CVE-2023-41683, CVE-2023-41686, CVE-2023-41688, CVE-2023-41689, CVE-2023-41690, CVE-2023-41695, CVE-2023-41729, CVE-2023-41730, CVE-2023-41802, CVE-2023-41803, CVE-2023-41848, CVE-2023-41849, CVE-2023-41857, CVE-2023-41862, CVE-2023-41865, CVE-2023-41866, CVE-2023-41869, CVE-2023-41870, CVE-2023-41873, CVE-2023-41875, CVE-2023-41951, CVE-2023-41952, CVE-2023-44142, CVE-2023-44147, CVE-2023-44149, CVE-2023-44258, CVE-2023-44988, CVE-2023-45002, CVE-2023-45045, CVE-2023-45061, CVE-2023-45101, CVE-2023-45104, CVE-2023-45110, CVE-2023-45271, CVE-2023-45272, CVE-2023-45275, CVE-2023-45631, CVE-2023-45633, CVE-2023-45636, CVE-2023-45649, CVE-2023-45760, CVE-2023-45765, CVE-2023-45766, CVE-2023-45828, CVE-2023-46073, CVE-2023-46079, CVE-2023-46080, CVE-2023-46082, CVE-2023-46083, CVE-2023-46188, CVE-2023-46195, CVE-2023-46196, CVE-2023-46203, CVE-2023-46206, CVE-2023-46309, CVE-2023-46605, CVE-2023-46606, CVE-2023-46607, CVE-2023-46608, CVE-2023-46609, CVE-2023-46610, CVE-2023-46611, CVE-2023-46612, CVE-2023-46616, CVE-2023-46628, CVE-2023-46631, CVE-2023-46632, CVE-2023-46633, CVE-2023-46635, CVE-2023-46637, CVE-2023-46639, CVE-2023-46644, CVE-2023-47179, CVE-2023-47180, CVE-2023-47183, CVE-2023-47187, CVE-2023-47188, CVE-2023-47224, CVE-2023-47225, CVE-2023-47241, CVE-2023-47515, CVE-2023-47517, CVE-2023-47523, CVE-2023-47525, CVE-2023-47557, CVE-2023-47647, CVE-2023-47648, CVE-2023-47661, CVE-2023-47689, CVE-2023-47692, CVE-2023-47693, CVE-2023-47694, CVE-2023-47698, CVE-2023-47756, CVE-2023-47759, CVE-2023-47760, CVE-2023-47761, CVE-2023-47762, CVE-2023-47763, CVE-2023-47764, CVE-2023-47776, CVE-2023-47778, CVE-2023-47780, CVE-2023-47793, CVE-2023-47805, CVE-2023-47807, CVE-2023-47820, CVE-2023-47823, CVE-2023-47826, CVE-2023-47830, CVE-2023-47832, CVE-2023-47836, CVE-2023-47838, CVE-2023-47841, CVE-2023-47847, CVE-2023-47849, CVE-2023-47869, CVE-2023-47871, CVE-2023-48274, CVE-2023-48277, CVE-2023-48286, CVE-2023-48287, CVE-2023-48324, CVE-2023-48332, CVE-2023-48739, CVE-2023-48740, CVE-2023-48750, CVE-2023-48758, CVE-2023-48774, CVE-2023-48775, CVE-2023-48776, CVE-2023-48779, CVE-2023-49154, CVE-2023-49156, CVE-2023-49158, CVE-2023-49167, CVE-2023-49192, CVE-2023-49193, CVE-2023-49194, CVE-2023-49196, CVE-2023-49754, CVE-2023-49755, CVE-2023-49756, CVE-2023-49757, CVE-2023-49758, CVE-2023-49817, CVE-2023-49818, CVE-2023-49831, CVE-2023-49832, CVE-2023-49835, CVE-2023-49845, CVE-2023-49848, CVE-2023-49849, CVE-2023-49850, CVE-2023-49851, CVE-2023-49856, CVE-2023-49857, CVE-2023-49858, CVE-2023-49859, CVE-2023-49861, CVE-2023-50373, CVE-2023-50375, CVE-2023-50850, CVE-2023-50854, CVE-2023-50876, CVE-2023-50877, CVE-2023-50882, CVE-2023-50884, CVE-2023-50887, CVE-2023-50899, CVE-2023-50903, CVE-2023-50904, CVE-2023-50905, CVE-2023-51353, CVE-2023-51355, CVE-2023-51357, CVE-2023-51359, CVE-2023-51360, CVE-2023-51362, CVE-2023-51484, CVE-2023-51486, CVE-2023-52135, CVE-2023-52190, CVE-2024-10676, CVE-2024-11402, CVE-2024-1435, CVE-2024-22145, CVE-2024-22162, CVE-2024-22289, CVE-2024-22307, CVE-2024-23500, CVE-2024-23506, CVE-2024-23507, CVE-2024-24831, CVE-2024-24833, CVE-2024-24871, CVE-2024-24878, CVE-2024-25100, CVE-2024-25599, CVE-2024-25932, CVE-2024-27188, CVE-2024-27193, CVE-2024-27195, CVE-2024-27949, CVE-2024-27950, CVE-2024-27965, CVE-2024-27971, CVE-2024-27987, CVE-2024-27993, CVE-2024-27994, CVE-2024-27997, CVE-2024-27998, CVE-2024-28000, CVE-2024-29093, CVE-2024-29095, CVE-2024-29125, CVE-2024-29134, CVE-2024-29136, CVE-2024-29137, CVE-2024-29138, CVE-2024-29777, CVE-2024-29792, CVE-2024-29921, CVE-2024-29931, CVE-2024-2889, CVE-2024-30178, CVE-2024-30182, CVE-2024-30193, CVE-2024-30194, CVE-2024-30197, CVE-2024-30199, CVE-2024-30221, CVE-2024-30229, CVE-2024-30236, CVE-2024-30238, CVE-2024-30244, CVE-2024-30245, CVE-2024-30422, CVE-2024-30424, CVE-2024-30425, CVE-2024-30428, CVE-2024-30435, CVE-2024-30488, CVE-2024-30493, CVE-2024-30503, CVE-2024-30505, CVE-2024-30529, CVE-2024-30534, CVE-2024-31246, CVE-2024-31281, CVE-2024-31303, CVE-2024-31359, CVE-2024-31373, CVE-2024-31374, CVE-2024-31376, CVE-2024-31382, CVE-2024-31421, CVE-2024-31424, CVE-2024-31433, CVE-2024-31924, CVE-2024-31929, CVE-2024-31942, CVE-2024-32082, CVE-2024-32090, CVE-2024-32101, CVE-2024-32126, CVE-2024-32140, CVE-2024-32141, CVE-2024-32433, CVE-2024-32435, CVE-2024-32444, CVE-2024-32445, CVE-2024-32505, CVE-2024-32507, CVE-2024-32523, CVE-2024-32553, CVE-2024-32555, CVE-2024-32564, CVE-2024-32566, CVE-2024-32568, CVE-2024-32573, CVE-2024-32589, CVE-2024-32599, CVE-2024-32679, CVE-2024-32698, CVE-2024-32699, CVE-2024-32701, CVE-2024-32702, CVE-2024-32703, CVE-2024-32704, CVE-2024-32705, CVE-2024-32706, CVE-2024-32711, CVE-2024-32719, CVE-2024-32725, CVE-2024-32778, CVE-2024-32782, CVE-2024-32791, CVE-2024-32792, CVE-2024-32796, CVE-2024-32810, CVE-2024-32815, CVE-2024-32817, CVE-2024-32824, CVE-2024-32825, CVE-2024-32832, CVE-2024-32836, CVE-2024-32956, CVE-2024-32959, CVE-2024-32961, CVE-2024-33568, CVE-2024-33570, CVE-2024-33571, CVE-2024-33572, CVE-2024-33648, CVE-2024-33678, CVE-2024-33689, CVE-2024-33907, CVE-2024-33939, CVE-2024-34371, CVE-2024-34373, CVE-2024-34385, CVE-2024-34438, CVE-2024-34443, CVE-2024-34444, CVE-2024-34546, CVE-2024-34556, CVE-2024-34557, CVE-2024-34569, CVE-2024-34757, CVE-2024-34763, CVE-2024-34770, CVE-2024-34794, CVE-2024-34795, CVE-2024-34800, CVE-2024-34801, CVE-2024-34807, CVE-2024-34812, CVE-2024-34813, CVE-2024-34814, CVE-2024-34815, CVE-2024-34819, CVE-2024-34821, CVE-2024-34826, CVE-2024-34828, CVE-2024-35169, CVE-2024-35172, CVE-2024-35633, CVE-2024-35637, CVE-2024-35639, CVE-2024-35645, CVE-2024-35646, CVE-2024-35650, CVE-2024-35653, CVE-2024-35655, CVE-2024-35659, CVE-2024-35664, CVE-2024-35674, CVE-2024-35679, CVE-2024-35680, CVE-2024-35684, CVE-2024-35693, CVE-2024-35694, CVE-2024-35698, CVE-2024-35700, CVE-2024-35709, CVE-2024-35723, CVE-2024-35729, CVE-2024-35732, CVE-2024-35739, CVE-2024-35759, CVE-2024-35760, CVE-2024-35764, CVE-2024-35768, CVE-2024-35769, CVE-2024-37093, CVE-2024-37102, CVE-2024-37103, CVE-2024-37104, CVE-2024-37114, CVE-2024-37202, CVE-2024-37213, CVE-2024-37228, CVE-2024-37235, CVE-2024-37236, CVE-2024-37237, CVE-2024-37238, CVE-2024-37239, CVE-2024-37240, CVE-2024-37241, CVE-2024-37242, CVE-2024-37243, CVE-2024-37255, CVE-2024-37259, CVE-2024-37261, CVE-2024-37270, CVE-2024-37271, CVE-2024-37272, CVE-2024-37274, CVE-2024-37275, CVE-2024-37409, CVE-2024-37410, CVE-2024-37411, CVE-2024-37412, CVE-2024-37413, CVE-2024-37415, CVE-2024-37417, CVE-2024-37421, CVE-2024-37422, CVE-2024-37426, CVE-2024-37429, CVE-2024-37430, CVE-2024-37431, CVE-2024-37433, CVE-2024-37434, CVE-2024-37435, CVE-2024-37437, CVE-2024-37438, CVE-2024-37440, CVE-2024-37441, CVE-2024-37444, CVE-2024-37448, CVE-2024-37449, CVE-2024-37450, CVE-2024-37451, CVE-2024-37452, CVE-2024-37458, CVE-2024-37467, CVE-2024-37472, CVE-2024-37473, CVE-2024-37478, CVE-2024-37481, CVE-2024-37482, CVE-2024-37483, CVE-2024-37488, CVE-2024-37490, CVE-2024-37491, CVE-2024-37493, CVE-2024-37495, CVE-2024-37497, CVE-2024-37502, CVE-2024-37503, CVE-2024-37508, CVE-2024-37511, CVE-2024-37518, CVE-2024-37519, CVE-2024-37520, CVE-2024-37540, CVE-2024-37541, CVE-2024-37543, CVE-2024-37544, CVE-2024-37554, CVE-2024-37555, CVE-2024-37560, CVE-2024-37918, CVE-2024-37922, CVE-2024-37923, CVE-2024-37925, CVE-2024-37929, CVE-2024-37930, CVE-2024-37931, CVE-2024-37937, CVE-2024-37943, CVE-2024-37945, CVE-2024-37946, CVE-2024-37962, CVE-2024-38687, CVE-2024-38691, CVE-2024-38706, CVE-2024-38708, CVE-2024-38712, CVE-2024-38714, CVE-2024-38729, CVE-2024-38731, CVE-2024-38732, CVE-2024-38735, CVE-2024-38751, CVE-2024-38753, CVE-2024-38754, CVE-2024-38762, CVE-2024-38763, CVE-2024-38764, CVE-2024-38765, CVE-2024-38766, CVE-2024-38771, CVE-2024-38778, CVE-2024-38787, CVE-2024-38789, CVE-2024-38790, CVE-2024-38795, CVE-2024-39619, CVE-2024-39620, CVE-2024-39621, CVE-2024-39622, CVE-2024-39623, CVE-2024-39624, CVE-2024-39626, CVE-2024-39631, CVE-2024-39637, CVE-2024-39646, CVE-2024-39647, CVE-2024-39649, CVE-2024-39654, CVE-2024-39663, CVE-2024-43117, CVE-2024-43118, CVE-2024-43136, CVE-2024-43153, CVE-2024-43158, CVE-2024-43159, CVE-2024-43208, CVE-2024-43214, CVE-2024-43216, CVE-2024-43218, CVE-2024-43222, CVE-2024-43228, CVE-2024-43229, CVE-2024-43230, CVE-2024-43237, CVE-2024-43238, CVE-2024-43239, CVE-2024-43240, CVE-2024-43241, CVE-2024-43243, CVE-2024-43252, CVE-2024-43253, CVE-2024-43254, CVE-2024-43255, CVE-2024-43259, CVE-2024-43264, CVE-2024-43266, CVE-2024-43283, CVE-2024-43290, CVE-2024-43299, CVE-2024-43300, CVE-2024-43306, CVE-2024-43313, CVE-2024-43318, CVE-2024-43333, CVE-2024-43334, CVE-2024-43336, CVE-2024-43338, CVE-2024-43349, CVE-2024-43353, CVE-2024-43927, CVE-2024-43932, CVE-2024-43933, CVE-2024-43938, CVE-2024-43944, CVE-2024-43953, CVE-2024-43954, CVE-2024-43955, CVE-2024-43956, CVE-2024-43959, CVE-2024-43971, CVE-2024-43973, CVE-2024-43975, CVE-2024-43976, CVE-2024-43977, CVE-2024-43978, CVE-2024-43989, CVE-2024-44000, CVE-2024-44001, CVE-2024-44002, CVE-2024-44003, CVE-2024-44004, CVE-2024-44005, CVE-2024-44006, CVE-2024-44007, CVE-2024-44008, CVE-2024-44009, CVE-2024-44010, CVE-2024-44011, CVE-2024-44012, CVE-2024-44013, CVE-2024-44014, CVE-2024-44015, CVE-2024-44016, CVE-2024-44017, CVE-2024-44018, CVE-2024-44019, CVE-2024-44020, CVE-2024-44021, CVE-2024-44022, CVE-2024-44023, CVE-2024-44024, CVE-2024-44025, CVE-2024-44026, CVE-2024-44027, CVE-2024-44028, CVE-2024-44029, CVE-2024-44030, CVE-2024-44031, CVE-2024-44032, CVE-2024-44033, CVE-2024-44034, CVE-2024-44035, CVE-2024-44036, CVE-2024-44037, CVE-2024-44038, CVE-2024-44039, CVE-2024-44040, CVE-2024-44041, CVE-2024-44042, CVE-2024-44043, CVE-2024-44044, CVE-2024-44045, CVE-2024-44046, CVE-2024-44047, CVE-2024-44048, CVE-2024-44049, CVE-2024-44050, CVE-2024-44051, CVE-2024-44052, CVE-2024-44055, CVE-2024-44059, CVE-2024-44061, CVE-2024-44064, CVE-2024-45451, CVE-2024-45452, CVE-2024-45453, CVE-2024-45454, CVE-2024-45455, CVE-2024-45456, CVE-2024-45457, CVE-2024-45458, CVE-2024-45459, CVE-2024-45460, CVE-2024-47297, CVE-2024-47298, CVE-2024-47299, CVE-2024-47300, CVE-2024-47301, CVE-2024-47302, CVE-2024-47303, CVE-2024-47304, CVE-2024-47305, CVE-2024-47306, CVE-2024-47307, CVE-2024-47308, CVE-2024-47309, CVE-2024-47310, CVE-2024-47311, CVE-2024-47312, CVE-2024-47313, CVE-2024-47314, CVE-2024-47315, CVE-2024-47316, CVE-2024-47317, CVE-2024-47318, CVE-2024-47319, CVE-2024-47320, CVE-2024-47321, CVE-2024-47322, CVE-2024-47323, CVE-2024-47324, CVE-2024-47325, CVE-2024-47326, CVE-2024-47327, CVE-2024-47328, CVE-2024-47329, CVE-2024-47331, CVE-2024-47332, CVE-2024-47333, CVE-2024-47334, CVE-2024-47335, CVE-2024-47336, CVE-2024-47337, CVE-2024-47338, CVE-2024-47339, CVE-2024-47340, CVE-2024-47341, CVE-2024-47342, CVE-2024-47343, CVE-2024-47344, CVE-2024-47345, CVE-2024-47346, CVE-2024-47347, CVE-2024-47348, CVE-2024-47349, CVE-2024-47350, CVE-2024-47351, CVE-2024-47352, CVE-2024-47353, CVE-2024-47354, CVE-2024-47355, CVE-2024-47356, CVE-2024-47357, CVE-2024-47358, CVE-2024-47359, CVE-2024-47360, CVE-2024-47361, CVE-2024-47362, CVE-2024-47363, CVE-2024-47364, CVE-2024-47365, CVE-2024-47366, CVE-2024-47367, CVE-2024-47368, CVE-2024-47369, CVE-2024-47370, CVE-2024-47371, CVE-2024-47372, CVE-2024-47373, CVE-2024-47374, CVE-2024-47375, CVE-2024-47376, CVE-2024-47377, CVE-2024-47378, CVE-2024-47379, CVE-2024-47380, CVE-2024-47381, CVE-2024-47382, CVE-2024-47383, CVE-2024-47384, CVE-2024-47385, CVE-2024-47386, CVE-2024-47387, CVE-2024-47388, CVE-2024-47389, CVE-2024-47390, CVE-2024-47391, CVE-2024-47392, CVE-2024-47393, CVE-2024-47394, CVE-2024-47395, CVE-2024-47396, CVE-2024-47621, CVE-2024-47622, CVE-2024-47623, CVE-2024-47624, CVE-2024-47625, CVE-2024-47626, CVE-2024-47627, CVE-2024-47628, CVE-2024-47629, CVE-2024-47630, CVE-2024-47631, CVE-2024-47632, CVE-2024-47633, CVE-2024-47634, CVE-2024-47635, CVE-2024-47636, CVE-2024-47637, CVE-2024-47638, CVE-2024-47639, CVE-2024-47640, CVE-2024-47641, CVE-2024-47642, CVE-2024-47643, CVE-2024-47644, CVE-2024-47645, CVE-2024-47646, CVE-2024-47647, CVE-2024-47648, CVE-2024-47649, CVE-2024-47650, CVE-2024-48020, CVE-2024-48021, CVE-2024-48022, CVE-2024-48023, CVE-2024-48024, CVE-2024-48025, CVE-2024-48026, CVE-2024-48027, CVE-2024-48028, CVE-2024-48029, CVE-2024-48030, CVE-2024-48031, CVE-2024-48032, CVE-2024-48033, CVE-2024-48034, CVE-2024-48035, CVE-2024-48036, CVE-2024-48037, CVE-2024-48038, CVE-2024-48039, CVE-2024-48040, CVE-2024-48041, CVE-2024-48042, CVE-2024-48043, CVE-2024-48044, CVE-2024-48045, CVE-2024-48046, CVE-2024-48047, CVE-2024-48048, CVE-2024-48049, CVE-2024-49222, CVE-2024-49225, CVE-2024-49228, CVE-2024-49229, CVE-2024-49231, CVE-2024-49232, CVE-2024-49233, CVE-2024-49234, CVE-2024-49236, CVE-2024-49237, CVE-2024-49241, CVE-2024-49243, CVE-2024-49249, CVE-2024-49250, CVE-2024-49251, CVE-2024-49252, CVE-2024-49254, CVE-2024-49255, CVE-2024-49256, CVE-2024-49257, CVE-2024-49258, CVE-2024-49259, CVE-2024-49260, CVE-2024-49261, CVE-2024-49262, CVE-2024-49263, CVE-2024-49264, CVE-2024-49265, CVE-2024-49266, CVE-2024-49267, CVE-2024-49268, CVE-2024-49270, CVE-2024-49271, CVE-2024-49272, CVE-2024-49273, CVE-2024-49274, CVE-2024-49275, CVE-2024-49276, CVE-2024-49277, CVE-2024-49278, CVE-2024-49279, CVE-2024-49280, CVE-2024-49281, CVE-2024-49282, CVE-2024-49283, CVE-2024-49284, CVE-2024-49285, CVE-2024-49286, CVE-2024-49287, CVE-2024-49288, CVE-2024-49289, CVE-2024-49290, CVE-2024-49291, CVE-2024-49292, CVE-2024-49293, CVE-2024-49294, CVE-2024-49295, CVE-2024-49296, CVE-2024-49297, CVE-2024-49298, CVE-2024-49299, CVE-2024-49300, CVE-2024-49301, CVE-2024-49302, CVE-2024-49303, CVE-2024-49304, CVE-2024-49305, CVE-2024-49306, CVE-2024-49307, CVE-2024-49308, CVE-2024-49309, CVE-2024-49310, CVE-2024-49311, CVE-2024-49312, CVE-2024-49313, CVE-2024-49316, CVE-2024-49318, CVE-2024-49319, CVE-2024-49320, CVE-2024-49323, CVE-2024-49324, CVE-2024-49325, CVE-2024-49326, CVE-2024-49327, CVE-2024-49328, CVE-2024-49329, CVE-2024-49330, CVE-2024-49331, CVE-2024-49332, CVE-2024-49333, CVE-2024-49334, CVE-2024-49335, CVE-2024-49604, CVE-2024-49605, CVE-2024-49606, CVE-2024-49607, CVE-2024-49608, CVE-2024-49609, CVE-2024-49610, CVE-2024-49611, CVE-2024-49612, CVE-2024-49613, CVE-2024-49614, CVE-2024-49615, CVE-2024-49616, CVE-2024-49617, CVE-2024-49618, CVE-2024-49619, CVE-2024-49620, CVE-2024-49621, CVE-2024-49622, CVE-2024-49623, CVE-2024-49624, CVE-2024-49627, CVE-2024-49628, CVE-2024-49629, CVE-2024-49630, CVE-2024-49631, CVE-2024-49632, CVE-2024-49633, CVE-2024-49634, CVE-2024-49635, CVE-2024-49636, CVE-2024-49637, CVE-2024-49638, CVE-2024-49639, CVE-2024-49640, CVE-2024-49641, CVE-2024-49642, CVE-2024-49643, CVE-2024-49644, CVE-2024-49645, CVE-2024-49646, CVE-2024-49647, CVE-2024-49648, CVE-2024-49649, CVE-2024-49650, CVE-2024-49651, CVE-2024-49652, CVE-2024-49653, CVE-2024-49654, CVE-2024-49655, CVE-2024-49656, CVE-2024-49657, CVE-2024-49658, CVE-2024-49659, CVE-2024-49660, CVE-2024-49661, CVE-2024-49662, CVE-2024-49663, CVE-2024-49664, CVE-2024-49665, CVE-2024-49666, CVE-2024-49667, CVE-2024-49668, CVE-2024-49669, CVE-2024-49670, CVE-2024-49671, CVE-2024-49672, CVE-2024-49673, CVE-2024-49674, CVE-2024-49675, CVE-2024-49676, CVE-2024-49677, CVE-2024-49678, CVE-2024-49679, CVE-2024-49680, CVE-2024-49681, CVE-2024-49682, CVE-2024-49683, CVE-2024-49684, CVE-2024-49685, CVE-2024-49686, CVE-2024-49687, CVE-2024-49688, CVE-2024-49689, CVE-2024-49690, CVE-2024-49691, CVE-2024-49692, CVE-2024-49693, CVE-2024-49694, CVE-2024-49695, CVE-2024-49696, CVE-2024-49697, CVE-2024-49698, CVE-2024-49699, CVE-2024-49700, CVE-2024-49701, CVE-2024-49702, CVE-2024-49703, CVE-2024-4689, CVE-2024-4746, CVE-2024-50407, CVE-2024-50408, CVE-2024-50409, CVE-2024-50410, CVE-2024-50411, CVE-2024-50412, CVE-2024-50413, CVE-2024-50414, CVE-2024-50415, CVE-2024-50416, CVE-2024-50417, CVE-2024-50418, CVE-2024-50419, CVE-2024-50420, CVE-2024-50421, CVE-2024-50422, CVE-2024-50423, CVE-2024-50424, CVE-2024-50425, CVE-2024-50426, CVE-2024-50427, CVE-2024-50428, CVE-2024-50429, CVE-2024-50430, CVE-2024-50431, CVE-2024-50432, CVE-2024-50433, CVE-2024-50434, CVE-2024-50435, CVE-2024-50436, CVE-2024-50437, CVE-2024-50438, CVE-2024-50439, CVE-2024-50440, CVE-2024-50441, CVE-2024-50442, CVE-2024-50445, CVE-2024-50446, CVE-2024-50447, CVE-2024-50448, CVE-2024-50449, CVE-2024-50450, CVE-2024-50451, CVE-2024-50453, CVE-2024-50454, CVE-2024-50455, CVE-2024-50456, CVE-2024-50457, CVE-2024-50458, CVE-2024-50459, CVE-2024-50460, CVE-2024-50461, CVE-2024-50462, CVE-2024-50463, CVE-2024-50464, CVE-2024-50465, CVE-2024-50467, CVE-2024-50468, CVE-2024-50469, CVE-2024-50470, CVE-2024-50471, CVE-2024-50472, CVE-2024-50473, CVE-2024-50475, CVE-2024-50476, CVE-2024-50477, CVE-2024-50478, CVE-2024-50479, CVE-2024-50480, CVE-2024-50481, CVE-2024-50482, CVE-2024-50483, CVE-2024-50484, CVE-2024-50485, CVE-2024-50486, CVE-2024-50487, CVE-2024-50488, CVE-2024-50489, CVE-2024-50490, CVE-2024-50491, CVE-2024-50492, CVE-2024-50493, CVE-2024-50494, CVE-2024-50495, CVE-2024-50496, CVE-2024-50497, CVE-2024-50498, CVE-2024-50500, CVE-2024-50501, CVE-2024-50502, CVE-2024-50503, CVE-2024-50504, CVE-2024-50506, CVE-2024-50507, CVE-2024-50508, CVE-2024-50509, CVE-2024-50510, CVE-2024-50511, CVE-2024-50512, CVE-2024-50513, CVE-2024-50514, CVE-2024-50515, CVE-2024-50516, CVE-2024-50517, CVE-2024-50518, CVE-2024-50519, CVE-2024-50520, CVE-2024-50521, CVE-2024-50522, CVE-2024-50523, CVE-2024-50524, CVE-2024-50525, CVE-2024-50526, CVE-2024-50527, CVE-2024-50528, CVE-2024-50529, CVE-2024-50530, CVE-2024-50531, CVE-2024-50532, CVE-2024-50533, CVE-2024-50534, CVE-2024-50535, CVE-2024-50536, CVE-2024-50537, CVE-2024-50538, CVE-2024-50539, CVE-2024-50540, CVE-2024-50541, CVE-2024-50542, CVE-2024-50543, CVE-2024-50544, CVE-2024-50545, CVE-2024-50546, CVE-2024-50547, CVE-2024-50548, CVE-2024-50549, CVE-2024-50550, CVE-2024-50551, CVE-2024-50552, CVE-2024-50553, CVE-2024-50554, CVE-2024-50556, CVE-2024-51570, CVE-2024-51571, CVE-2024-51572, CVE-2024-51573, CVE-2024-51574, CVE-2024-51575, CVE-2024-51576, CVE-2024-51577, CVE-2024-51578, CVE-2024-51579, CVE-2024-51580, CVE-2024-51581, CVE-2024-51582, CVE-2024-51583, CVE-2024-51584, CVE-2024-51585, CVE-2024-51586, CVE-2024-51587, CVE-2024-51588, CVE-2024-51589, CVE-2024-51590, CVE-2024-51591, CVE-2024-51592, CVE-2024-51593, CVE-2024-51594, CVE-2024-51595, CVE-2024-51596, CVE-2024-51597, CVE-2024-51598, CVE-2024-51599, CVE-2024-51601, CVE-2024-51602, CVE-2024-51603, CVE-2024-51604, CVE-2024-51605, CVE-2024-51606, CVE-2024-51607, CVE-2024-51608, CVE-2024-51609, CVE-2024-51610, CVE-2024-51611, CVE-2024-51612, CVE-2024-51613, CVE-2024-51614, CVE-2024-51615, CVE-2024-51616, CVE-2024-51617, CVE-2024-51618, CVE-2024-51619, CVE-2024-51620, CVE-2024-51621, CVE-2024-51622, CVE-2024-51623, CVE-2024-51624, CVE-2024-51625, CVE-2024-51626, CVE-2024-51627, CVE-2024-51628, CVE-2024-51629, CVE-2024-51630, CVE-2024-51631, CVE-2024-51632, CVE-2024-51633, CVE-2024-51634, CVE-2024-51635, CVE-2024-51636, CVE-2024-51637, CVE-2024-51638, CVE-2024-51639, CVE-2024-51640, CVE-2024-51641, CVE-2024-51642, CVE-2024-51643, CVE-2024-51644, CVE-2024-51645, CVE-2024-51648, CVE-2024-51649, CVE-2024-51650, CVE-2024-51651, CVE-2024-51652, CVE-2024-51653, CVE-2024-51654, CVE-2024-51655, CVE-2024-51656, CVE-2024-51657, CVE-2024-51658, CVE-2024-51659, CVE-2024-51660, CVE-2024-51661, CVE-2024-51662, CVE-2024-51663, CVE-2024-51664, CVE-2024-51665, CVE-2024-51666, CVE-2024-51667, CVE-2024-51668, CVE-2024-51669, CVE-2024-51670, CVE-2024-51671, CVE-2024-51672, CVE-2024-51673, CVE-2024-51674, CVE-2024-51675, CVE-2024-51676, CVE-2024-51677, CVE-2024-51678, CVE-2024-51679, CVE-2024-51680, CVE-2024-51681, CVE-2024-51682, CVE-2024-51683, CVE-2024-51684, CVE-2024-51685, CVE-2024-51686, CVE-2024-51687, CVE-2024-51688, CVE-2024-51689, CVE-2024-51690, CVE-2024-51691, CVE-2024-51692, CVE-2024-51693, CVE-2024-51694, CVE-2024-51695, CVE-2024-51696, CVE-2024-51697, CVE-2024-51698, CVE-2024-51699, CVE-2024-51700, CVE-2024-51701, CVE-2024-51702, CVE-2024-51703, CVE-2024-51704, CVE-2024-51705, CVE-2024-51706, CVE-2024-51707, CVE-2024-51708, CVE-2024-51709, CVE-2024-51710, CVE-2024-51711, CVE-2024-51712, CVE-2024-51713, CVE-2024-51714, CVE-2024-51715, CVE-2024-51716, CVE-2024-51717, CVE-2024-51718, CVE-2024-51719, CVE-2024-51759, CVE-2024-51760, CVE-2024-51761, CVE-2024-51762, CVE-2024-51763, CVE-2024-51776, CVE-2024-51778, CVE-2024-51779, CVE-2024-51780, CVE-2024-51781, CVE-2024-51782, CVE-2024-51783, CVE-2024-51784, CVE-2024-51785, CVE-2024-51786, CVE-2024-51787, CVE-2024-51788, CVE-2024-51789, CVE-2024-51790, CVE-2024-51791, CVE-2024-51792, CVE-2024-51793, CVE-2024-51794, CVE-2024-51795, CVE-2024-51796, CVE-2024-51797, CVE-2024-51798, CVE-2024-51799, CVE-2024-51800, CVE-2024-51801, CVE-2024-51802, CVE-2024-51803, CVE-2024-51804, CVE-2024-51805, CVE-2024-51806, CVE-2024-51807, CVE-2024-51808, CVE-2024-51809, CVE-2024-51810, CVE-2024-51811, CVE-2024-51812, CVE-2024-51813, CVE-2024-51814, CVE-2024-51815, CVE-2024-51816, CVE-2024-51817, CVE-2024-51818, CVE-2024-51819, CVE-2024-51820, CVE-2024-51821, CVE-2024-51822, CVE-2024-51823, CVE-2024-51824, CVE-2024-51825, CVE-2024-51826, CVE-2024-51827, CVE-2024-51828, CVE-2024-51829, CVE-2024-51830, CVE-2024-51831, CVE-2024-51832, CVE-2024-51833, CVE-2024-51834, CVE-2024-51835, CVE-2024-51836, CVE-2024-51837, CVE-2024-51838, CVE-2024-51839, CVE-2024-51840, CVE-2024-51841, CVE-2024-51842, CVE-2024-51843, CVE-2024-51844, CVE-2024-51845, CVE-2024-51846, CVE-2024-51847, CVE-2024-51848, CVE-2024-51849, CVE-2024-51850, CVE-2024-51851, CVE-2024-51852, CVE-2024-51853, CVE-2024-51854, CVE-2024-51855, CVE-2024-51856, CVE-2024-51857, CVE-2024-51858, CVE-2024-51859, CVE-2024-51860, CVE-2024-51861, CVE-2024-51862, CVE-2024-51863, CVE-2024-51864, CVE-2024-51865, CVE-2024-51866, CVE-2024-51867, CVE-2024-51868, CVE-2024-51869, CVE-2024-51870, CVE-2024-51871, CVE-2024-51872, CVE-2024-51873, CVE-2024-51874, CVE-2024-51875, CVE-2024-51876, CVE-2024-51877, CVE-2024-51878, CVE-2024-51879, CVE-2024-51880, CVE-2024-51881, CVE-2024-51882, CVE-2024-51883, CVE-2024-51884, CVE-2024-51885, CVE-2024-51886, CVE-2024-51887, CVE-2024-51888, CVE-2024-51889, CVE-2024-51890, CVE-2024-51891, CVE-2024-51892, CVE-2024-51893, CVE-2024-51894, CVE-2024-51895, CVE-2024-51896, CVE-2024-51897, CVE-2024-51898, CVE-2024-51899, CVE-2024-51900, CVE-2024-51901, CVE-2024-51902, CVE-2024-51903, CVE-2024-51904, CVE-2024-51905, CVE-2024-51906, CVE-2024-51907, CVE-2024-51908, CVE-2024-51909, CVE-2024-51910, CVE-2024-51911, CVE-2024-51912, CVE-2024-51913, CVE-2024-51914, CVE-2024-51916, CVE-2024-51917, CVE-2024-51918, CVE-2024-51919, CVE-2024-51920, CVE-2024-51921, CVE-2024-51922, CVE-2024-51923, CVE-2024-51924, CVE-2024-51925, CVE-2024-51926, CVE-2024-51927, CVE-2024-51928, CVE-2024-51929, CVE-2024-51930, CVE-2024-51931, CVE-2024-51932, CVE-2024-51933, CVE-2024-51934, CVE-2024-51935, CVE-2024-51936, CVE-2024-51937, CVE-2024-51938, CVE-2024-51939, CVE-2024-51940, CVE-2024-52339, CVE-2024-52340, CVE-2024-52341, CVE-2024-52342, CVE-2024-52343, CVE-2024-52344, CVE-2024-52345, CVE-2024-52346, CVE-2024-52347, CVE-2024-52348, CVE-2024-52349, CVE-2024-52350, CVE-2024-52351, CVE-2024-52352, CVE-2024-52353, CVE-2024-52354, CVE-2024-52355, CVE-2024-52356, CVE-2024-52357, CVE-2024-52358, CVE-2024-52369, CVE-2024-52370, CVE-2024-52371, CVE-2024-52372, CVE-2024-52373, CVE-2024-52374, CVE-2024-52375, CVE-2024-52376, CVE-2024-52377, CVE-2024-52378, CVE-2024-52379, CVE-2024-52380, CVE-2024-52381, CVE-2024-52382, CVE-2024-52383, CVE-2024-52384, CVE-2024-52385, CVE-2024-52386, CVE-2024-52388, CVE-2024-52389, CVE-2024-52390, CVE-2024-52391, CVE-2024-52392, CVE-2024-52393, CVE-2024-52394, CVE-2024-52395, CVE-2024-52396, CVE-2024-52397, CVE-2024-52398, CVE-2024-52399, CVE-2024-52400, CVE-2024-52401, CVE-2024-52402, CVE-2024-52403, CVE-2024-52404, CVE-2024-52405, CVE-2024-52406, CVE-2024-52407, CVE-2024-52408, CVE-2024-52409, CVE-2024-52410, CVE-2024-52411, CVE-2024-52412, CVE-2024-52413, CVE-2024-52414, CVE-2024-52415, CVE-2024-52416, CVE-2024-52417, CVE-2024-52418, CVE-2024-52419, CVE-2024-52420, CVE-2024-52421, CVE-2024-52422, CVE-2024-52423, CVE-2024-52424, CVE-2024-52425, CVE-2024-52426, CVE-2024-52427, CVE-2024-52428, CVE-2024-52429, CVE-2024-52430, CVE-2024-52431, CVE-2024-52432, CVE-2024-52433, CVE-2024-52434, CVE-2024-52435, CVE-2024-52436, CVE-2024-52437, CVE-2024-52438, CVE-2024-52439, CVE-2024-52440, CVE-2024-52441, CVE-2024-52442, CVE-2024-52443, CVE-2024-52444, CVE-2024-52445, CVE-2024-52446, CVE-2024-52447, CVE-2024-52448, CVE-2024-52449, CVE-2024-52450, CVE-2024-52451, CVE-2024-52452, CVE-2024-52453, CVE-2024-52454, CVE-2024-52455, CVE-2024-52456, CVE-2024-52457, CVE-2024-52458, CVE-2024-52459, CVE-2024-52460, CVE-2024-52461, CVE-2024-52462, CVE-2024-52463, CVE-2024-52464, CVE-2024-52465, CVE-2024-52466, CVE-2024-52467, CVE-2024-52468, CVE-2024-52469, CVE-2024-52470, CVE-2024-52471, CVE-2024-52472, CVE-2024-52473, CVE-2024-52474, CVE-2024-52475, CVE-2024-52476, CVE-2024-52477, CVE-2024-52478, CVE-2024-52479, CVE-2024-52482, CVE-2024-52483, CVE-2024-52484, CVE-2024-52485, CVE-2024-52486, CVE-2024-52487, CVE-2024-52489, CVE-2024-52490, CVE-2024-52491, CVE-2024-52492, CVE-2024-52493, CVE-2024-52494, CVE-2024-52495, CVE-2024-52496, CVE-2024-52497, CVE-2024-52498, CVE-2024-52499, CVE-2024-52500, CVE-2024-52501, CVE-2024-52502, CVE-2024-52503, CVE-2024-53707, CVE-2024-53708, CVE-2024-53709, CVE-2024-53710, CVE-2024-53711, CVE-2024-53712, CVE-2024-53713, CVE-2024-53714, CVE-2024-53715, CVE-2024-53716, CVE-2024-53717, CVE-2024-53718, CVE-2024-53719, CVE-2024-53720, CVE-2024-53721, CVE-2024-53722, CVE-2024-53723, CVE-2024-53724, CVE-2024-53725, CVE-2024-53726, CVE-2024-53727, CVE-2024-53728, CVE-2024-53729, CVE-2024-53730, CVE-2024-53731, CVE-2024-53732, CVE-2024-53733, CVE-2024-53734, CVE-2024-53735, CVE-2024-53736, CVE-2024-53737, CVE-2024-53738, CVE-2024-53739, CVE-2024-53740, CVE-2024-53741, CVE-2024-53742, CVE-2024-53743, CVE-2024-53744, CVE-2024-53745, CVE-2024-53746, CVE-2024-53747, CVE-2024-53748, CVE-2024-53749, CVE-2024-53750, CVE-2024-53751, CVE-2024-53752, CVE-2024-53753, CVE-2024-53754, CVE-2024-53755, CVE-2024-53756, CVE-2024-53757, CVE-2024-53758, CVE-2024-53759, CVE-2024-53760, CVE-2024-53761, CVE-2024-53762, CVE-2024-53763, CVE-2024-53764, CVE-2024-53765, CVE-2024-53766, CVE-2024-53767, CVE-2024-53768, CVE-2024-53769, CVE-2024-53770, CVE-2024-53771, CVE-2024-53772, CVE-2024-53773, CVE-2024-53774, CVE-2024-53775, CVE-2024-53776, CVE-2024-53777, CVE-2024-53778, CVE-2024-53779, CVE-2024-53780, CVE-2024-53781, CVE-2024-53782, CVE-2024-53783, CVE-2024-53784, CVE-2024-53785, CVE-2024-53786, CVE-2024-53787, CVE-2024-53788, CVE-2024-53789, CVE-2024-53790, CVE-2024-53791, CVE-2024-53792, CVE-2024-53793, CVE-2024-53794, CVE-2024-53795, CVE-2024-53796, CVE-2024-53797, CVE-2024-53798, CVE-2024-53799, CVE-2024-53801, CVE-2024-53802, CVE-2024-53803, CVE-2024-53805, CVE-2024-53806, CVE-2024-53807, CVE-2024-53808, CVE-2024-53809, CVE-2024-53810, CVE-2024-53811, CVE-2024-53812, CVE-2024-53813, CVE-2024-53814, CVE-2024-53815, CVE-2024-53816, CVE-2024-53817, CVE-2024-53818, CVE-2024-53819, CVE-2024-53820, CVE-2024-53821, CVE-2024-53822, CVE-2024-53823, CVE-2024-53824, CVE-2024-53825, CVE-2024-53826, CVE-2024-54205, CVE-2024-54206, CVE-2024-54207, CVE-2024-54208, CVE-2024-54209, CVE-2024-54210, CVE-2024-54211, CVE-2024-54212, CVE-2024-54213, CVE-2024-54214, CVE-2024-54215, CVE-2024-54216, CVE-2024-54217, CVE-2024-54218, CVE-2024-54219, CVE-2024-54220, CVE-2024-54221, CVE-2024-54223, CVE-2024-54224, CVE-2024-54225, CVE-2024-54226, CVE-2024-54227, CVE-2024-54228, CVE-2024-54229, CVE-2024-54230, CVE-2024-54231, CVE-2024-54232, CVE-2024-54233, CVE-2024-54234, CVE-2024-54235, CVE-2024-54236, CVE-2024-54237, CVE-2024-54238, CVE-2024-54239, CVE-2024-54240, CVE-2024-54241, CVE-2024-54242, CVE-2024-54243, CVE-2024-54244, CVE-2024-54245, CVE-2024-54246, CVE-2024-54247, CVE-2024-54248, CVE-2024-54249, CVE-2024-54250, CVE-2024-54251, CVE-2024-54252, CVE-2024-54253, CVE-2024-54254, CVE-2024-54255, CVE-2024-54256, CVE-2024-54257, CVE-2024-54258, CVE-2024-54259, CVE-2024-54260, CVE-2024-54261, CVE-2024-54262, CVE-2024-54264, CVE-2024-54265, CVE-2024-54266, CVE-2024-54267, CVE-2024-54268, CVE-2024-54269, CVE-2024-54270, CVE-2024-54271, CVE-2024-54272, CVE-2024-54273, CVE-2024-54274, CVE-2024-54275, CVE-2024-54276, CVE-2024-54277, CVE-2024-54278, CVE-2024-54280, CVE-2024-54282, CVE-2024-54283, CVE-2024-54284, CVE-2024-54285, CVE-2024-54286, CVE-2024-54287, CVE-2024-54288, CVE-2024-54289, CVE-2024-54290, CVE-2024-54291, CVE-2024-54292, CVE-2024-54293, CVE-2024-54294, CVE-2024-54295, CVE-2024-54296, CVE-2024-54297, CVE-2024-54298, CVE-2024-54299, CVE-2024-54300, CVE-2024-54301, CVE-2024-54302, CVE-2024-54303, CVE-2024-54304, CVE-2024-54305, CVE-2024-54306, CVE-2024-54307, CVE-2024-54308, CVE-2024-54309, CVE-2024-54310, CVE-2024-54311, CVE-2024-54312, CVE-2024-54313, CVE-2024-54314, CVE-2024-54315, CVE-2024-54316, CVE-2024-54317, CVE-2024-54318, CVE-2024-54319, CVE-2024-54320, CVE-2024-54321, CVE-2024-54322, CVE-2024-54323, CVE-2024-54324, CVE-2024-54325, CVE-2024-54326, CVE-2024-54327, CVE-2024-54328, CVE-2024-54329, CVE-2024-54330, CVE-2024-54331, CVE-2024-54332, CVE-2024-54333, CVE-2024-54334, CVE-2024-54335, CVE-2024-54336, CVE-2024-54337, CVE-2024-54338, CVE-2024-54339, CVE-2024-54340, CVE-2024-54341, CVE-2024-54342, CVE-2024-54343, CVE-2024-54344, CVE-2024-54345, CVE-2024-54346, CVE-2024-54347, CVE-2024-54348, CVE-2024-54349, CVE-2024-54350, CVE-2024-54351, CVE-2024-54352, CVE-2024-54353, CVE-2024-54354, CVE-2024-54355, CVE-2024-54356, CVE-2024-54357, CVE-2024-54358, CVE-2024-54359, CVE-2024-54360, CVE-2024-54361, CVE-2024-54362, CVE-2024-54363, CVE-2024-54364, CVE-2024-54365, CVE-2024-54366, CVE-2024-54367, CVE-2024-54368, CVE-2024-54369, CVE-2024-54370, CVE-2024-54372, CVE-2024-54373, CVE-2024-54374, CVE-2024-54375, CVE-2024-54376, CVE-2024-54378, CVE-2024-54379, CVE-2024-54380, CVE-2024-54381, CVE-2024-54382, CVE-2024-54383, CVE-2024-54384, CVE-2024-54385, CVE-2024-54386, CVE-2024-54387, CVE-2024-54388, CVE-2024-54389, CVE-2024-54390, CVE-2024-54391, CVE-2024-54392, CVE-2024-54393, CVE-2024-54394, CVE-2024-54395, CVE-2024-54396, CVE-2024-54397, CVE-2024-54398, CVE-2024-54399, CVE-2024-54400, CVE-2024-54401, CVE-2024-54402, CVE-2024-54403, CVE-2024-54404, CVE-2024-54405, CVE-2024-54406, CVE-2024-54407, CVE-2024-54408, CVE-2024-54409, CVE-2024-54410, CVE-2024-54411, CVE-2024-54412, CVE-2024-54413, CVE-2024-54414, CVE-2024-54415, CVE-2024-54416, CVE-2024-54417, CVE-2024-54418, CVE-2024-54419, CVE-2024-54420, CVE-2024-54421, CVE-2024-54422, CVE-2024-54423, CVE-2024-54424, CVE-2024-54425, CVE-2024-54426, CVE-2024-54427, CVE-2024-54428, CVE-2024-54429, CVE-2024-54430, CVE-2024-54431, CVE-2024-54432, CVE-2024-54433, CVE-2024-54434, CVE-2024-54435, CVE-2024-54436, CVE-2024-54437, CVE-2024-54438, CVE-2024-54439, CVE-2024-54440, CVE-2024-54441, CVE-2024-54442, CVE-2024-54443, CVE-2024-54444, CVE-2024-55972, CVE-2024-55973, CVE-2024-55974, CVE-2024-55975, CVE-2024-55976, CVE-2024-55977, CVE-2024-55978, CVE-2024-55979, CVE-2024-55980, CVE-2024-55981, CVE-2024-55982, CVE-2024-55983, CVE-2024-55984, CVE-2024-55985, CVE-2024-55986, CVE-2024-55987, CVE-2024-55988, CVE-2024-55989, CVE-2024-55990, CVE-2024-55991, CVE-2024-55992, CVE-2024-55993, CVE-2024-55994, CVE-2024-55995, CVE-2024-55996, CVE-2024-55997, CVE-2024-55998, CVE-2024-55999, CVE-2024-56001, CVE-2024-56002, CVE-2024-56003, CVE-2024-56004, CVE-2024-56005, CVE-2024-56006, CVE-2024-56007, CVE-2024-56008, CVE-2024-56009, CVE-2024-56010, CVE-2024-56011, CVE-2024-56012, CVE-2024-56013, CVE-2024-56014, CVE-2024-56015, CVE-2024-56016, CVE-2024-56017, CVE-2024-56018, CVE-2024-56019, CVE-2024-56020, CVE-2024-56021, CVE-2024-56022, CVE-2024-56023, CVE-2024-56024, CVE-2024-56025, CVE-2024-56026, CVE-2024-56027, CVE-2024-56028, CVE-2024-56029, CVE-2024-56030, CVE-2024-56031, CVE-2024-56032, CVE-2024-56033, CVE-2024-56034, CVE-2024-56035, CVE-2024-56036, CVE-2024-56037, CVE-2024-56038, CVE-2024-56039, CVE-2024-56040, CVE-2024-56041, CVE-2024-56042, CVE-2024-56043, CVE-2024-56044, CVE-2024-56045, CVE-2024-56046, CVE-2024-56047, CVE-2024-56048, CVE-2024-56049, CVE-2024-56050, CVE-2024-56051, CVE-2024-56052, CVE-2024-56053, CVE-2024-56054, CVE-2024-56055, CVE-2024-56057, CVE-2024-56058, CVE-2024-56059, CVE-2024-56060, CVE-2024-56061, CVE-2024-56062, CVE-2024-56063, CVE-2024-56064, CVE-2024-56065, CVE-2024-56066, CVE-2024-56068, CVE-2024-56069, CVE-2024-56070, CVE-2024-56071, CVE-2024-56203, CVE-2024-56204, CVE-2024-56205, CVE-2024-56206, CVE-2024-56207, CVE-2024-56209, CVE-2024-56210, CVE-2024-56211, CVE-2024-56212, CVE-2024-56213, CVE-2024-56214, CVE-2024-56215, CVE-2024-56216, CVE-2024-56217, CVE-2024-56218, CVE-2024-56219, CVE-2024-56220, CVE-2024-56221, CVE-2024-56222, CVE-2024-56223, CVE-2024-56224, CVE-2024-56225, CVE-2024-56226, CVE-2024-56227, CVE-2024-56228, CVE-2024-56229, CVE-2024-56230, CVE-2024-56231, CVE-2024-56232, CVE-2024-56233, CVE-2024-56234, CVE-2024-56235, CVE-2024-56236, CVE-2024-56237, CVE-2024-56238, CVE-2024-56239, CVE-2024-56240, CVE-2024-56241, CVE-2024-56242, CVE-2024-56243, CVE-2024-56244, CVE-2024-56245, CVE-2024-56246, CVE-2024-56247, CVE-2024-56248, CVE-2024-56249, CVE-2024-56250, CVE-2024-56251, CVE-2024-56252, CVE-2024-56253, CVE-2024-56254, CVE-2024-56255, CVE-2024-56256, CVE-2024-56257, CVE-2024-56258, CVE-2024-56259, CVE-2024-56260, CVE-2024-56261, CVE-2024-56262, CVE-2024-56263, CVE-2024-56264, CVE-2024-56265, CVE-2024-56266, CVE-2024-56267, CVE-2024-56268, CVE-2024-56270, CVE-2024-56271, CVE-2024-56272, CVE-2024-56273, CVE-2024-56274, CVE-2024-56275, CVE-2024-56276, CVE-2024-56278, CVE-2024-56279, CVE-2024-56280, CVE-2024-56281, CVE-2024-56282, CVE-2024-56283, CVE-2024-56284, CVE-2024-56285, CVE-2024-56286, CVE-2024-56287, CVE-2024-56288, CVE-2024-56289, CVE-2024-56290, CVE-2024-56291, CVE-2024-56292, CVE-2024-56293, CVE-2024-56294, CVE-2024-56295, CVE-2024-56296, CVE-2024-56297, CVE-2024-56298, CVE-2024-56299, CVE-2024-56300, CVE-2024-56301, CVE-2024-56302, CVE-2024-58344, CVE-2024-7399, CVE-2024-7590, CVE-2024-9146, CVE-2025-10019, CVE-2025-10549, CVE-2025-12549, CVE-2025-12550, CVE-2025-12551, CVE-2025-13504, CVE-2025-13763, CVE-2025-13835, CVE-2025-14314, CVE-2025-14358, CVE-2025-14359, CVE-2025-14360, CVE-2025-14429, CVE-2025-14430, CVE-2025-14431, CVE-2025-15635, CVE-2025-15636, CVE-2025-1249, CVE-2025-22260, CVE-2025-22261, CVE-2025-22262, CVE-2025-22263, CVE-2025-22264, CVE-2025-22265, CVE-2025-22267, CVE-2025-22268, CVE-2025-22269, CVE-2025-22276, CVE-2025-22277, CVE-2025-22278, CVE-2025-22279, CVE-2025-22280, CVE-2025-22281, CVE-2025-22282, CVE-2025-22283, CVE-2025-22284, CVE-2025-22286, CVE-2025-22289, CVE-2025-22290, CVE-2025-22291, CVE-2025-22292, CVE-2025-22293, CVE-2025-22294, CVE-2025-22296, CVE-2025-22297, CVE-2025-22298, CVE-2025-22299, CVE-2025-22300, CVE-2025-22301, CVE-2025-22302, CVE-2025-22303, CVE-2025-22304, CVE-2025-22305, CVE-2025-22306, CVE-2025-22307, CVE-2025-22308, CVE-2025-22309, CVE-2025-22310, CVE-2025-22311, CVE-2025-22312, CVE-2025-22313, CVE-2025-22314, CVE-2025-22315, CVE-2025-22316, CVE-2025-22317, CVE-2025-22318, CVE-2025-22319, CVE-2025-22320, CVE-2025-22321, CVE-2025-22322, CVE-2025-22323, CVE-2025-22324, CVE-2025-22325, CVE-2025-22326, CVE-2025-22327, CVE-2025-22328, CVE-2025-22329, CVE-2025-22330, CVE-2025-22331, CVE-2025-22332, CVE-2025-22333, CVE-2025-22334, CVE-2025-22335, CVE-2025-22336, CVE-2025-22337, CVE-2025-22338, CVE-2025-22339, CVE-2025-22340, CVE-2025-22341, CVE-2025-22342, CVE-2025-22343, CVE-2025-22344, CVE-2025-22345, CVE-2025-22346, CVE-2025-22347, CVE-2025-22348, CVE-2025-22349, CVE-2025-22350, CVE-2025-22351, CVE-2025-22352, CVE-2025-22354, CVE-2025-22355, CVE-2025-22356, CVE-2025-22357, CVE-2025-22358, CVE-2025-22359, CVE-2025-22360, CVE-2025-22361, CVE-2025-22362, CVE-2025-22363, CVE-2025-22364, CVE-2025-22365, CVE-2025-22496, CVE-2025-22497, CVE-2025-22498, CVE-2025-22499, CVE-2025-22500, CVE-2025-22501, CVE-2025-22502, CVE-2025-22503, CVE-2025-22504, CVE-2025-22505, CVE-2025-22506, CVE-2025-22507, CVE-2025-22508, CVE-2025-22509, CVE-2025-22510, CVE-2025-22511, CVE-2025-22512, CVE-2025-22513, CVE-2025-22514, CVE-2025-22515, CVE-2025-22516, CVE-2025-22517, CVE-2025-22518, CVE-2025-22519, CVE-2025-22520, CVE-2025-22521, CVE-2025-22522, CVE-2025-22523, CVE-2025-22524, CVE-2025-22525, CVE-2025-22526, CVE-2025-22528, CVE-2025-22529, CVE-2025-22530, CVE-2025-22532, CVE-2025-22533, CVE-2025-22534, CVE-2025-22535, CVE-2025-22536, CVE-2025-22537, CVE-2025-22538, CVE-2025-22539, CVE-2025-22540, CVE-2025-22541, CVE-2025-22542, CVE-2025-22543, CVE-2025-22544, CVE-2025-22545, CVE-2025-22546, CVE-2025-22547, CVE-2025-22548, CVE-2025-22549, CVE-2025-22550, CVE-2025-22551, CVE-2025-22552, CVE-2025-22553, CVE-2025-22554, CVE-2025-22555, CVE-2025-22556, CVE-2025-22557, CVE-2025-22558, CVE-2025-22559, CVE-2025-22560, CVE-2025-22561, CVE-2025-22562, CVE-2025-22563, CVE-2025-22564, CVE-2025-22565, CVE-2025-22566, CVE-2025-22567, CVE-2025-22568, CVE-2025-22569, CVE-2025-22570, CVE-2025-22571, CVE-2025-22572, CVE-2025-22573, CVE-2025-22574, CVE-2025-22575, CVE-2025-22576, CVE-2025-22577, CVE-2025-22578, CVE-2025-22579, CVE-2025-22580, CVE-2025-22581, CVE-2025-22582, CVE-2025-22583, CVE-2025-22584, CVE-2025-22585, CVE-2025-22586, CVE-2025-22587, CVE-2025-22588, CVE-2025-22589, CVE-2025-22590, CVE-2025-22591, CVE-2025-22592, CVE-2025-22593, CVE-2025-22594, CVE-2025-22595, CVE-2025-22628, CVE-2025-22629, CVE-2025-22630, CVE-2025-22631, CVE-2025-22632, CVE-2025-22634, CVE-2025-22635, CVE-2025-22636, CVE-2025-22637, CVE-2025-22638, CVE-2025-22639, CVE-2025-22640, CVE-2025-22641, CVE-2025-22642, CVE-2025-22643, CVE-2025-22644, CVE-2025-22646, CVE-2025-22647, CVE-2025-22648, CVE-2025-22649, CVE-2025-22651, CVE-2025-22652, CVE-2025-22653, CVE-2025-22654, CVE-2025-22655, CVE-2025-22656, CVE-2025-22657, CVE-2025-22658, CVE-2025-22659, CVE-2025-22660, CVE-2025-22661, CVE-2025-22662, CVE-2025-22663, CVE-2025-22664, CVE-2025-22665, CVE-2025-22667, CVE-2025-22668, CVE-2025-22669, CVE-2025-22670, CVE-2025-22671, CVE-2025-22672, CVE-2025-22673, CVE-2025-22674, CVE-2025-22675, CVE-2025-22676, CVE-2025-22677, CVE-2025-22678, CVE-2025-22679, CVE-2025-22680, CVE-2025-22681, CVE-2025-22682, CVE-2025-22683, CVE-2025-22684, CVE-2025-22685, CVE-2025-22686, CVE-2025-22687, CVE-2025-22688, CVE-2025-22689, CVE-2025-22690, CVE-2025-22691, CVE-2025-22692, CVE-2025-22693, CVE-2025-22694, CVE-2025-22695, CVE-2025-22696, CVE-2025-22697, CVE-2025-22699, CVE-2025-22700, CVE-2025-22701, CVE-2025-22702, CVE-2025-22703, CVE-2025-22704, CVE-2025-22705, CVE-2025-22706, CVE-2025-22707, CVE-2025-22708, CVE-2025-22709, CVE-2025-22710, CVE-2025-22712, CVE-2025-22713, CVE-2025-22714, CVE-2025-22715, CVE-2025-22716, CVE-2025-22717, CVE-2025-22718, CVE-2025-22719, CVE-2025-22720, CVE-2025-22721, CVE-2025-22722, CVE-2025-22723, CVE-2025-22725, CVE-2025-22726, CVE-2025-22727, CVE-2025-22728, CVE-2025-22729, CVE-2025-22730, CVE-2025-22731, CVE-2025-22732, CVE-2025-22733, CVE-2025-22734, CVE-2025-22735, CVE-2025-22736, CVE-2025-22737, CVE-2025-22738, CVE-2025-22739, CVE-2025-22740, CVE-2025-22742, CVE-2025-22743, CVE-2025-22744, CVE-2025-22745, CVE-2025-22746, CVE-2025-22747, CVE-2025-22748, CVE-2025-22749, CVE-2025-22750, CVE-2025-22751, CVE-2025-22752, CVE-2025-22753, CVE-2025-22755, CVE-2025-22757, CVE-2025-22758, CVE-2025-22759, CVE-2025-22760, CVE-2025-22761, CVE-2025-22762, CVE-2025-22763, CVE-2025-22764, CVE-2025-22765, CVE-2025-22766, CVE-2025-22767, CVE-2025-22768, CVE-2025-22770, CVE-2025-22771, CVE-2025-22772, CVE-2025-22774, CVE-2025-22775, CVE-2025-22776, CVE-2025-22777, CVE-2025-22778, CVE-2025-22779, CVE-2025-22780, CVE-2025-22781, CVE-2025-22782, CVE-2025-22783, CVE-2025-22784, CVE-2025-22785, CVE-2025-22786, CVE-2025-22787, CVE-2025-22788, CVE-2025-22789, CVE-2025-22790, CVE-2025-22791, CVE-2025-22792, CVE-2025-22794, CVE-2025-22795, CVE-2025-22796, CVE-2025-22797, CVE-2025-22798, CVE-2025-22799, CVE-2025-22800, CVE-2025-22801, CVE-2025-22802, CVE-2025-22803, CVE-2025-22804, CVE-2025-22805, CVE-2025-22806, CVE-2025-22807, CVE-2025-22808, CVE-2025-22809, CVE-2025-22810, CVE-2025-22811, CVE-2025-22812, CVE-2025-22813, CVE-2025-22814, CVE-2025-22815, CVE-2025-22816, CVE-2025-22817, CVE-2025-22818, CVE-2025-22819, CVE-2025-22820, CVE-2025-22821, CVE-2025-22822, CVE-2025-22823, CVE-2025-22824, CVE-2025-22825, CVE-2025-22826, CVE-2025-22827, CVE-2025-23422, CVE-2025-23423, CVE-2025-23424, CVE-2025-23425, CVE-2025-23426, CVE-2025-23427, CVE-2025-23428, CVE-2025-23430, CVE-2025-23431, CVE-2025-23433, CVE-2025-23435, CVE-2025-23436, CVE-2025-23437, CVE-2025-23438, CVE-2025-23439, CVE-2025-23440, CVE-2025-23441, CVE-2025-23442, CVE-2025-23443, CVE-2025-23445, CVE-2025-23446, CVE-2025-23447, CVE-2025-23448, CVE-2025-23449, CVE-2025-23450, CVE-2025-23451, CVE-2025-23452, CVE-2025-23453, CVE-2025-23454, CVE-2025-23455, CVE-2025-23456, CVE-2025-23457, CVE-2025-23458, CVE-2025-23459, CVE-2025-23460, CVE-2025-23461, CVE-2025-23462, CVE-2025-23463, CVE-2025-23464, CVE-2025-23465, CVE-2025-23466, CVE-2025-23467, CVE-2025-23468, CVE-2025-23469, CVE-2025-23470, CVE-2025-23471, CVE-2025-23472, CVE-2025-23473, CVE-2025-23474, CVE-2025-23475, CVE-2025-23476, CVE-2025-23477, CVE-2025-23478, CVE-2025-23479, CVE-2025-23480, CVE-2025-23481, CVE-2025-23482, CVE-2025-23483, CVE-2025-23484, CVE-2025-23485, CVE-2025-23486, CVE-2025-23487, CVE-2025-23488, CVE-2025-23489, CVE-2025-23490, CVE-2025-23491, CVE-2025-23492, CVE-2025-23493, CVE-2025-23494, CVE-2025-23495, CVE-2025-23496, CVE-2025-23497, CVE-2025-23498, CVE-2025-23499, CVE-2025-23500, CVE-2025-23501, CVE-2025-23502, CVE-2025-23503, CVE-2025-23505, CVE-2025-23506, CVE-2025-23507, CVE-2025-23508, CVE-2025-23509, CVE-2025-23510, CVE-2025-23511, CVE-2025-23512, CVE-2025-23513, CVE-2025-23514, CVE-2025-23515, CVE-2025-23516, CVE-2025-23517, CVE-2025-23518, CVE-2025-23519, CVE-2025-23520, CVE-2025-23521, CVE-2025-23522, CVE-2025-23523, CVE-2025-23524, CVE-2025-23525, CVE-2025-23526, CVE-2025-23527, CVE-2025-23529, CVE-2025-23530, CVE-2025-23531, CVE-2025-23532, CVE-2025-23533, CVE-2025-23534, CVE-2025-23535, CVE-2025-23536, CVE-2025-23537, CVE-2025-23538, CVE-2025-23539, CVE-2025-23540, CVE-2025-23541, CVE-2025-23542, CVE-2025-23543, CVE-2025-23544, CVE-2025-23545, CVE-2025-23546, CVE-2025-23547, CVE-2025-23548, CVE-2025-23549, CVE-2025-23550, CVE-2025-23551, CVE-2025-23552, CVE-2025-23553, CVE-2025-23554, CVE-2025-23555, CVE-2025-23556, CVE-2025-23557, CVE-2025-23558, CVE-2025-23559, CVE-2025-23560, CVE-2025-23561, CVE-2025-23562, CVE-2025-23563, CVE-2025-23564, CVE-2025-23565, CVE-2025-23566, CVE-2025-23567, CVE-2025-23568, CVE-2025-23569, CVE-2025-23570, CVE-2025-23571, CVE-2025-23572, CVE-2025-23573, CVE-2025-23574, CVE-2025-23575, CVE-2025-23576, CVE-2025-23577, CVE-2025-23578, CVE-2025-23579, CVE-2025-23580, CVE-2025-23581, CVE-2025-23582, CVE-2025-23583, CVE-2025-23584, CVE-2025-23585, CVE-2025-23586, CVE-2025-23587, CVE-2025-23588, CVE-2025-23589, CVE-2025-23590, CVE-2025-23591, CVE-2025-23592, CVE-2025-23593, CVE-2025-23594, CVE-2025-23595, CVE-2025-23596, CVE-2025-23597, CVE-2025-23598, CVE-2025-23599, CVE-2025-23600, CVE-2025-23601, CVE-2025-23602, CVE-2025-23603, CVE-2025-23604, CVE-2025-23605, CVE-2025-23606, CVE-2025-23607, CVE-2025-23608, CVE-2025-23609, CVE-2025-23610, CVE-2025-23611, CVE-2025-23612, CVE-2025-23613, CVE-2025-23614, CVE-2025-23615, CVE-2025-23616, CVE-2025-23617, CVE-2025-23618, CVE-2025-23619, CVE-2025-23620, CVE-2025-23621, CVE-2025-23622, CVE-2025-23623, CVE-2025-23624, CVE-2025-23625, CVE-2025-23626, CVE-2025-23627, CVE-2025-23628, CVE-2025-23629, CVE-2025-23630, CVE-2025-23631, CVE-2025-23632, CVE-2025-23633, CVE-2025-23634, CVE-2025-23635, CVE-2025-23636, CVE-2025-23637, CVE-2025-23638, CVE-2025-23639, CVE-2025-23640, CVE-2025-23641, CVE-2025-23642, CVE-2025-23643, CVE-2025-23644, CVE-2025-23645, CVE-2025-23646, CVE-2025-23647, CVE-2025-23648, CVE-2025-23649, CVE-2025-23650, CVE-2025-23651, CVE-2025-23652, CVE-2025-23653, CVE-2025-23654, CVE-2025-23655, CVE-2025-23656, CVE-2025-23657, CVE-2025-23658, CVE-2025-23659, CVE-2025-23660, CVE-2025-23661, CVE-2025-23662, CVE-2025-23663, CVE-2025-23664, CVE-2025-23665, CVE-2025-23666, CVE-2025-23667, CVE-2025-23668, CVE-2025-23669, CVE-2025-23670, CVE-2025-23671, CVE-2025-23672, CVE-2025-23673, CVE-2025-23674, CVE-2025-23675, CVE-2025-23676, CVE-2025-23677, CVE-2025-23678, CVE-2025-23679, CVE-2025-23680, CVE-2025-23681, CVE-2025-23682, CVE-2025-23683, CVE-2025-23684, CVE-2025-23685, CVE-2025-23686, CVE-2025-23687, CVE-2025-23688, CVE-2025-23689, CVE-2025-23690, CVE-2025-23691, CVE-2025-23692, CVE-2025-23693, CVE-2025-23694, CVE-2025-23695, CVE-2025-23696, CVE-2025-23697, CVE-2025-23698, CVE-2025-23699, CVE-2025-23700, CVE-2025-23701, CVE-2025-23702, CVE-2025-23703, CVE-2025-23704, CVE-2025-23705, CVE-2025-23706, CVE-2025-23707, CVE-2025-23708, CVE-2025-23709, CVE-2025-23710, CVE-2025-23711, CVE-2025-23712, CVE-2025-23713, CVE-2025-23714, CVE-2025-23715, CVE-2025-23716, CVE-2025-23717, CVE-2025-23718, CVE-2025-23719, CVE-2025-23720, CVE-2025-23721, CVE-2025-23722, CVE-2025-23723, CVE-2025-23724, CVE-2025-23725, CVE-2025-23726, CVE-2025-23727, CVE-2025-23728, CVE-2025-23729, CVE-2025-23730, CVE-2025-23731, CVE-2025-23732, CVE-2025-23733, CVE-2025-23734, CVE-2025-23735, CVE-2025-23736, CVE-2025-23737, CVE-2025-23738, CVE-2025-23739, CVE-2025-23740, CVE-2025-23741, CVE-2025-23742, CVE-2025-23743, CVE-2025-23744, CVE-2025-23745, CVE-2025-23746, CVE-2025-23747, CVE-2025-23748, CVE-2025-23749, CVE-2025-23750, CVE-2025-23751, CVE-2025-23752, CVE-2025-23753, CVE-2025-23754, CVE-2025-23755, CVE-2025-23756, CVE-2025-23757, CVE-2025-23758, CVE-2025-23759, CVE-2025-23760, CVE-2025-23761, CVE-2025-23762, CVE-2025-23763, CVE-2025-23764, CVE-2025-23765, CVE-2025-23766, CVE-2025-23767, CVE-2025-23768, CVE-2025-23769, CVE-2025-23770, CVE-2025-23771, CVE-2025-23772, CVE-2025-23773, CVE-2025-23774, CVE-2025-23775, CVE-2025-23776, CVE-2025-23777, CVE-2025-23778, CVE-2025-23779, CVE-2025-23780, CVE-2025-23781, CVE-2025-23782, CVE-2025-23783, CVE-2025-23785, CVE-2025-23786, CVE-2025-23787, CVE-2025-23788, CVE-2025-23789, CVE-2025-23790, CVE-2025-23791, CVE-2025-23792, CVE-2025-23793, CVE-2025-23794, CVE-2025-23795, CVE-2025-23796, CVE-2025-23797, CVE-2025-23798, CVE-2025-23799, CVE-2025-23800, CVE-2025-23801, CVE-2025-23802, CVE-2025-23803, CVE-2025-23804, CVE-2025-23805, CVE-2025-23807, CVE-2025-23808, CVE-2025-23809, CVE-2025-23810, CVE-2025-23811, CVE-2025-23812, CVE-2025-23813, CVE-2025-23814, CVE-2025-23815, CVE-2025-23816, CVE-2025-23817, CVE-2025-23818, CVE-2025-23819, CVE-2025-23820, CVE-2025-23821, CVE-2025-23822, CVE-2025-23823, CVE-2025-23824, CVE-2025-23825, CVE-2025-23826, CVE-2025-23827, CVE-2025-23828, CVE-2025-23829, CVE-2025-23830, CVE-2025-23831, CVE-2025-23832, CVE-2025-23833, CVE-2025-23834, CVE-2025-23835, CVE-2025-23836, CVE-2025-23837, CVE-2025-23838, CVE-2025-23839, CVE-2025-23840, CVE-2025-23841, CVE-2025-23842, CVE-2025-23843, CVE-2025-23844, CVE-2025-23845, CVE-2025-23846, CVE-2025-23847, CVE-2025-23848, CVE-2025-23849, CVE-2025-23850, CVE-2025-23851, CVE-2025-23852, CVE-2025-23853, CVE-2025-23854, CVE-2025-23855, CVE-2025-23856, CVE-2025-23857, CVE-2025-23858, CVE-2025-23859, CVE-2025-23860, CVE-2025-23861, CVE-2025-23862, CVE-2025-23863, CVE-2025-23864, CVE-2025-23865, CVE-2025-23866, CVE-2025-23867, CVE-2025-23868, CVE-2025-23869, CVE-2025-23870, CVE-2025-23871, CVE-2025-23872, CVE-2025-23873, CVE-2025-23874, CVE-2025-23875, CVE-2025-23876, CVE-2025-23877, CVE-2025-23878, CVE-2025-23879, CVE-2025-23880, CVE-2025-23881, CVE-2025-23882, CVE-2025-23883, CVE-2025-23884, CVE-2025-23885, CVE-2025-23886, CVE-2025-23887, CVE-2025-23888, CVE-2025-23889, CVE-2025-23890, CVE-2025-23891, CVE-2025-23892, CVE-2025-23893, CVE-2025-23894, CVE-2025-23895, CVE-2025-23896, CVE-2025-23897, CVE-2025-23898, CVE-2025-23899, CVE-2025-23900, CVE-2025-23901, CVE-2025-23902, CVE-2025-23903, CVE-2025-23904, CVE-2025-23905, CVE-2025-23906, CVE-2025-23907, CVE-2025-23908, CVE-2025-23909, CVE-2025-23910, CVE-2025-23911, CVE-2025-23912, CVE-2025-23913, CVE-2025-23914, CVE-2025-23915, CVE-2025-23916, CVE-2025-23917, CVE-2025-23918, CVE-2025-23919, CVE-2025-23920, CVE-2025-23921, CVE-2025-23922, CVE-2025-23923, CVE-2025-23924, CVE-2025-23925, CVE-2025-23926, CVE-2025-23927, CVE-2025-23928, CVE-2025-23929, CVE-2025-23930, CVE-2025-23931, CVE-2025-23932, CVE-2025-23933, CVE-2025-23934, CVE-2025-23935, CVE-2025-23936, CVE-2025-23937, CVE-2025-23938, CVE-2025-23939, CVE-2025-23940, CVE-2025-23941, CVE-2025-23942, CVE-2025-23943, CVE-2025-23944, CVE-2025-23945, CVE-2025-23946, CVE-2025-23947, CVE-2025-23948, CVE-2025-23949, CVE-2025-23950, CVE-2025-23951, CVE-2025-23952, CVE-2025-23953, CVE-2025-23954, CVE-2025-23955, CVE-2025-23956, CVE-2025-23957, CVE-2025-23958, CVE-2025-23959, CVE-2025-23960, CVE-2025-23961, CVE-2025-23962, CVE-2025-23963, CVE-2025-23964, CVE-2025-23965, CVE-2025-23966, CVE-2025-23967, CVE-2025-23968, CVE-2025-23969, CVE-2025-23970, CVE-2025-23971, CVE-2025-23972, CVE-2025-23973, CVE-2025-23974, CVE-2025-23975, CVE-2025-23976, CVE-2025-23977, CVE-2025-23978, CVE-2025-23979, CVE-2025-23980, CVE-2025-23981, CVE-2025-23982, CVE-2025-23983, CVE-2025-23984, CVE-2025-23985, CVE-2025-23986, CVE-2025-23987, CVE-2025-23988, CVE-2025-23989, CVE-2025-23990, CVE-2025-23991, CVE-2025-23992, CVE-2025-23993, CVE-2025-23994, CVE-2025-23995, CVE-2025-23996, CVE-2025-23997, CVE-2025-23998, CVE-2025-23999, CVE-2025-24000, CVE-2025-24001, CVE-2025-24533, CVE-2025-24534, CVE-2025-24535, CVE-2025-24536, CVE-2025-24537, CVE-2025-24538, CVE-2025-24539, CVE-2025-24540, CVE-2025-24541, CVE-2025-24542, CVE-2025-24543, CVE-2025-24544, CVE-2025-24545, CVE-2025-24546, CVE-2025-24547, CVE-2025-24548, CVE-2025-24549, CVE-2025-24550, CVE-2025-24551, CVE-2025-24552, CVE-2025-24553, CVE-2025-24554, CVE-2025-24555, CVE-2025-24557, CVE-2025-24558, CVE-2025-24559, CVE-2025-24560, CVE-2025-24561, CVE-2025-24562, CVE-2025-24563, CVE-2025-24564, CVE-2025-24565, CVE-2025-24566, CVE-2025-24567, CVE-2025-24568, CVE-2025-24569, CVE-2025-24570, CVE-2025-24571, CVE-2025-24572, CVE-2025-24573, CVE-2025-24574, CVE-2025-24575, CVE-2025-24576, CVE-2025-24577, CVE-2025-24578, CVE-2025-24579, CVE-2025-24580, CVE-2025-24581, CVE-2025-24582, CVE-2025-24583, CVE-2025-24584, CVE-2025-24585, CVE-2025-24586, CVE-2025-24587, CVE-2025-24588, CVE-2025-24589, CVE-2025-24590, CVE-2025-24591, CVE-2025-24592, CVE-2025-24593, CVE-2025-24594, CVE-2025-24595, CVE-2025-24596, CVE-2025-24597, CVE-2025-24598, CVE-2025-24599, CVE-2025-24600, CVE-2025-24601, CVE-2025-24602, CVE-2025-24603, CVE-2025-24604, CVE-2025-24605, CVE-2025-24608, CVE-2025-24609, CVE-2025-24610, CVE-2025-24611, CVE-2025-24612, CVE-2025-24613, CVE-2025-24614, CVE-2025-24615, CVE-2025-24616, CVE-2025-24617, CVE-2025-24618, CVE-2025-24619, CVE-2025-24620, CVE-2025-24621, CVE-2025-24622, CVE-2025-24623, CVE-2025-24624, CVE-2025-24625, CVE-2025-24626, CVE-2025-24627, CVE-2025-24629, CVE-2025-24630, CVE-2025-24631, CVE-2025-24632, CVE-2025-24633, CVE-2025-24634, CVE-2025-24635, CVE-2025-24636, CVE-2025-24637, CVE-2025-24638, CVE-2025-24639, CVE-2025-24640, CVE-2025-24641, CVE-2025-24642, CVE-2025-24644, CVE-2025-24645, CVE-2025-24646, CVE-2025-24647, CVE-2025-24648, CVE-2025-24649, CVE-2025-24650, CVE-2025-24652, CVE-2025-24653, CVE-2025-24654, CVE-2025-24655, CVE-2025-24656, CVE-2025-24657, CVE-2025-24658, CVE-2025-24659, CVE-2025-24660, CVE-2025-24661, CVE-2025-24662, CVE-2025-24663, CVE-2025-24664, CVE-2025-24665, CVE-2025-24666, CVE-2025-24667, CVE-2025-24668, CVE-2025-24669, CVE-2025-24670, CVE-2025-24671, CVE-2025-24672, CVE-2025-24673, CVE-2025-24674, CVE-2025-24675, CVE-2025-24676, CVE-2025-24677, CVE-2025-24678, CVE-2025-24679, CVE-2025-24680, CVE-2025-24681, CVE-2025-24682, CVE-2025-24683, CVE-2025-24684, CVE-2025-24685, CVE-2025-24686, CVE-2025-24687, CVE-2025-24688, CVE-2025-24689, CVE-2025-24690, CVE-2025-24691, CVE-2025-24692, CVE-2025-24693, CVE-2025-24694, CVE-2025-24695, CVE-2025-24696, CVE-2025-24697, CVE-2025-24698, CVE-2025-24699, CVE-2025-24700, CVE-2025-24701, CVE-2025-24702, CVE-2025-24703, CVE-2025-24704, CVE-2025-24705, CVE-2025-24706, CVE-2025-24707, CVE-2025-24708, CVE-2025-24709, CVE-2025-24710, CVE-2025-24711, CVE-2025-24712, CVE-2025-24713, CVE-2025-24714, CVE-2025-24715, CVE-2025-24716, CVE-2025-24717, CVE-2025-24718, CVE-2025-24719, CVE-2025-24720, CVE-2025-24721, CVE-2025-24722, CVE-2025-24723, CVE-2025-24724, CVE-2025-24725, CVE-2025-24726, CVE-2025-24727, CVE-2025-24728, CVE-2025-24729, CVE-2025-24730, CVE-2025-24731, CVE-2025-24732, CVE-2025-24733, CVE-2025-24734, CVE-2025-24736, CVE-2025-24737, CVE-2025-24738, CVE-2025-24739, CVE-2025-24740, CVE-2025-24741, CVE-2025-24742, CVE-2025-24743, CVE-2025-24744, CVE-2025-24745, CVE-2025-24746, CVE-2025-24747, CVE-2025-24748, CVE-2025-24749, CVE-2025-24750, CVE-2025-24751, CVE-2025-24752, CVE-2025-24753, CVE-2025-24754, CVE-2025-24755, CVE-2025-24756, CVE-2025-24757, CVE-2025-24758, CVE-2025-24759, CVE-2025-24760, CVE-2025-24761, CVE-2025-24762, CVE-2025-24763, CVE-2025-24764, CVE-2025-24765, CVE-2025-24766, CVE-2025-24767, CVE-2025-24768, CVE-2025-24769, CVE-2025-24770, CVE-2025-24771, CVE-2025-24772, CVE-2025-24773, CVE-2025-24774, CVE-2025-24775, CVE-2025-24776, CVE-2025-24777, CVE-2025-24778, CVE-2025-24779, CVE-2025-24780, CVE-2025-24781, CVE-2025-24782, CVE-2025-25070, CVE-2025-25071, CVE-2025-25072, CVE-2025-25073, CVE-2025-25074, CVE-2025-25075, CVE-2025-25076, CVE-2025-25077, CVE-2025-25078, CVE-2025-25079, CVE-2025-25080, CVE-2025-25081, CVE-2025-25082, CVE-2025-25083, CVE-2025-25085, CVE-2025-25086, CVE-2025-25087, CVE-2025-25088, CVE-2025-25089, CVE-2025-25090, CVE-2025-25091, CVE-2025-25092, CVE-2025-25093, CVE-2025-25094, CVE-2025-25095, CVE-2025-25096, CVE-2025-25097, CVE-2025-25098, CVE-2025-25099, CVE-2025-25100, CVE-2025-25101, CVE-2025-25102, CVE-2025-25103, CVE-2025-25104, CVE-2025-25105, CVE-2025-25106, CVE-2025-25107, CVE-2025-25108, CVE-2025-25109, CVE-2025-25110, CVE-2025-25111, CVE-2025-25112, CVE-2025-25113, CVE-2025-25114, CVE-2025-25115, CVE-2025-25116, CVE-2025-25117, CVE-2025-25118, CVE-2025-25119, CVE-2025-25120, CVE-2025-25121, CVE-2025-25122, CVE-2025-25123, CVE-2025-25124, CVE-2025-25125, CVE-2025-25126, CVE-2025-25127, CVE-2025-25128, CVE-2025-25129, CVE-2025-25130, CVE-2025-25131, CVE-2025-25132, CVE-2025-25133, CVE-2025-25134, CVE-2025-25135, CVE-2025-25136, CVE-2025-25137, CVE-2025-25138, CVE-2025-25139, CVE-2025-25140, CVE-2025-25141, CVE-2025-25142, CVE-2025-25143, CVE-2025-25144, CVE-2025-25145, CVE-2025-25146, CVE-2025-25147, CVE-2025-25148, CVE-2025-25149, CVE-2025-25150, CVE-2025-25151, CVE-2025-25152, CVE-2025-25153, CVE-2025-25154, CVE-2025-25155, CVE-2025-25156, CVE-2025-25157, CVE-2025-25158, CVE-2025-25159, CVE-2025-25160, CVE-2025-25161, CVE-2025-25162, CVE-2025-25163, CVE-2025-25164, CVE-2025-25165, CVE-2025-25166, CVE-2025-25167, CVE-2025-25168, CVE-2025-25169, CVE-2025-25170, CVE-2025-25171, CVE-2025-25172, CVE-2025-25173, CVE-2025-25174, CVE-2025-26534, CVE-2025-26535, CVE-2025-26536, CVE-2025-26537, CVE-2025-26538, CVE-2025-26539, CVE-2025-26540, CVE-2025-26541, CVE-2025-26542, CVE-2025-26543, CVE-2025-26544, CVE-2025-26545, CVE-2025-26546, CVE-2025-26547, CVE-2025-26548, CVE-2025-26549, CVE-2025-26550, CVE-2025-26551, CVE-2025-26552, CVE-2025-26553, CVE-2025-26554, CVE-2025-26555, CVE-2025-26556, CVE-2025-26557, CVE-2025-26558, CVE-2025-26559, CVE-2025-26560, CVE-2025-26561, CVE-2025-26562, CVE-2025-26563, CVE-2025-26564, CVE-2025-26565, CVE-2025-26566, CVE-2025-26567, CVE-2025-26568, CVE-2025-26569, CVE-2025-26570, CVE-2025-26571, CVE-2025-26572, CVE-2025-26573, CVE-2025-26574, CVE-2025-26575, CVE-2025-26576, CVE-2025-26577, CVE-2025-26578, CVE-2025-26579, CVE-2025-26580, CVE-2025-26581, CVE-2025-26582, CVE-2025-26583, CVE-2025-26584, CVE-2025-26585, CVE-2025-26586, CVE-2025-26587, CVE-2025-26588, CVE-2025-26589, CVE-2025-26590, CVE-2025-26591, CVE-2025-26592, CVE-2025-26593, CVE-2025-26730, CVE-2025-26731, CVE-2025-26732, CVE-2025-26733, CVE-2025-26734, CVE-2025-26735, CVE-2025-26736, CVE-2025-26737, CVE-2025-26738, CVE-2025-26739, CVE-2025-26740, CVE-2025-26741, CVE-2025-26742, CVE-2025-26743, CVE-2025-26744, CVE-2025-26745, CVE-2025-26746, CVE-2025-26747, CVE-2025-26748, CVE-2025-26749, CVE-2025-26750, CVE-2025-26751, CVE-2025-26752, CVE-2025-26753, CVE-2025-26754, CVE-2025-26755, CVE-2025-26756, CVE-2025-26757, CVE-2025-26758, CVE-2025-26759, CVE-2025-26761, CVE-2025-26762, CVE-2025-26763, CVE-2025-26764, CVE-2025-26765, CVE-2025-26766, CVE-2025-26767, CVE-2025-26768, CVE-2025-26769, CVE-2025-26770, CVE-2025-26771, CVE-2025-26772, CVE-2025-26773, CVE-2025-26774, CVE-2025-26775, CVE-2025-26776, CVE-2025-26778, CVE-2025-26779, CVE-2025-26867, CVE-2025-26868, CVE-2025-26870, CVE-2025-26871, CVE-2025-26872, CVE-2025-26873, CVE-2025-26874, CVE-2025-26875, CVE-2025-26876, CVE-2025-26877, CVE-2025-26878, CVE-2025-26880, CVE-2025-26881, CVE-2025-26882, CVE-2025-26883, CVE-2025-26884, CVE-2025-26886, CVE-2025-26887, CVE-2025-26888, CVE-2025-26889, CVE-2025-26890, CVE-2025-26891, CVE-2025-26892, CVE-2025-26893, CVE-2025-26894, CVE-2025-26895, CVE-2025-26896, CVE-2025-26897, CVE-2025-26898, CVE-2025-26899, CVE-2025-26900, CVE-2025-26901, CVE-2025-26902, CVE-2025-26903, CVE-2025-26904, CVE-2025-26905, CVE-2025-26906, CVE-2025-26907, CVE-2025-26908, CVE-2025-26909, CVE-2025-26910, CVE-2025-26911, CVE-2025-26912, CVE-2025-26913, CVE-2025-26914, CVE-2025-26915, CVE-2025-26916, CVE-2025-26918, CVE-2025-26919, CVE-2025-26920, CVE-2025-26921, CVE-2025-26922, CVE-2025-26923, CVE-2025-26924, CVE-2025-26925, CVE-2025-26926, CVE-2025-26927, CVE-2025-26928, CVE-2025-26929, CVE-2025-26930, CVE-2025-26931, CVE-2025-26932, CVE-2025-26933, CVE-2025-26934, CVE-2025-26935, CVE-2025-26936, CVE-2025-26937, CVE-2025-26938, CVE-2025-26939, CVE-2025-26940, CVE-2025-26941, CVE-2025-26943, CVE-2025-26944, CVE-2025-26945, CVE-2025-26946, CVE-2025-26947, CVE-2025-26948, CVE-2025-26949, CVE-2025-26950, CVE-2025-26951, CVE-2025-26952, CVE-2025-26954, CVE-2025-26955, CVE-2025-26956, CVE-2025-26957, CVE-2025-26959, CVE-2025-26960, CVE-2025-26961, CVE-2025-26962, CVE-2025-26963, CVE-2025-26964, CVE-2025-26966, CVE-2025-26967, CVE-2025-26968, CVE-2025-26969, CVE-2025-26970, CVE-2025-26971, CVE-2025-26972, CVE-2025-26973, CVE-2025-26974, CVE-2025-26975, CVE-2025-26976, CVE-2025-26977, CVE-2025-26978, CVE-2025-26979, CVE-2025-26980, CVE-2025-26981, CVE-2025-26982, CVE-2025-26983, CVE-2025-26984, CVE-2025-26985, CVE-2025-26986, CVE-2025-26987, CVE-2025-26988, CVE-2025-26989, CVE-2025-26990, CVE-2025-26991, CVE-2025-26992, CVE-2025-26993, CVE-2025-26994, CVE-2025-26995, CVE-2025-26996, CVE-2025-26997, CVE-2025-26998, CVE-2025-26999, CVE-2025-27000, CVE-2025-27001, CVE-2025-27002, CVE-2025-27003, CVE-2025-27004, CVE-2025-27005, CVE-2025-27006, CVE-2025-27007, CVE-2025-27008, CVE-2025-27009, CVE-2025-27010, CVE-2025-27011, CVE-2025-27012, CVE-2025-27013, CVE-2025-27014, CVE-2025-27015, CVE-2025-27016, CVE-2025-27263, CVE-2025-27264, CVE-2025-27265, CVE-2025-27266, CVE-2025-27267, CVE-2025-27268, CVE-2025-27269, CVE-2025-27270, CVE-2025-27271, CVE-2025-27272, CVE-2025-27273, CVE-2025-27274, CVE-2025-27275, CVE-2025-27276, CVE-2025-27277, CVE-2025-27278, CVE-2025-27279, CVE-2025-27280, CVE-2025-27281, CVE-2025-27282, CVE-2025-27283, CVE-2025-27284, CVE-2025-27285, CVE-2025-27286, CVE-2025-27287, CVE-2025-27288, CVE-2025-27289, CVE-2025-27290, CVE-2025-27291, CVE-2025-27292, CVE-2025-27293, CVE-2025-27294, CVE-2025-27295, CVE-2025-27296, CVE-2025-27297, CVE-2025-27298, CVE-2025-27299, CVE-2025-27300, CVE-2025-27301, CVE-2025-27302, CVE-2025-27303, CVE-2025-27304, CVE-2025-27305, CVE-2025-27306, CVE-2025-27307, CVE-2025-27308, CVE-2025-27309, CVE-2025-27310, CVE-2025-27311, CVE-2025-27312, CVE-2025-27313, CVE-2025-27314, CVE-2025-27315, CVE-2025-27316, CVE-2025-27317, CVE-2025-27318, CVE-2025-27319, CVE-2025-27320, CVE-2025-27321, CVE-2025-27322, CVE-2025-27323, CVE-2025-27324, CVE-2025-27325, CVE-2025-27326, CVE-2025-27327, CVE-2025-27328, CVE-2025-27329, CVE-2025-27330, CVE-2025-27331, CVE-2025-27332, CVE-2025-27333, CVE-2025-27334, CVE-2025-27335, CVE-2025-27336, CVE-2025-27337, CVE-2025-27338, CVE-2025-27339, CVE-2025-27340, CVE-2025-27341, CVE-2025-27342, CVE-2025-27343, CVE-2025-27344, CVE-2025-27345, CVE-2025-27347, CVE-2025-27348, CVE-2025-27349, CVE-2025-27350, CVE-2025-27351, CVE-2025-27352, CVE-2025-27353, CVE-2025-27354, CVE-2025-27355, CVE-2025-27356, CVE-2025-27357, CVE-2025-27358, CVE-2025-27359, CVE-2025-27360, CVE-2025-27361, CVE-2025-27362, CVE-2025-28855, CVE-2025-28856, CVE-2025-28857, CVE-2025-28859, CVE-2025-28860, CVE-2025-28861, CVE-2025-28862, CVE-2025-28863, CVE-2025-28864, CVE-2025-28865, CVE-2025-28866, CVE-2025-28867, CVE-2025-28868, CVE-2025-28869, CVE-2025-28870, CVE-2025-28871, CVE-2025-28872, CVE-2025-28873, CVE-2025-28874, CVE-2025-28875, CVE-2025-28876, CVE-2025-28877, CVE-2025-28878, CVE-2025-28879, CVE-2025-28880, CVE-2025-28881, CVE-2025-28882, CVE-2025-28883, CVE-2025-28884, CVE-2025-28885, CVE-2025-28886, CVE-2025-28887, CVE-2025-28888, CVE-2025-28889, CVE-2025-28890, CVE-2025-28891, CVE-2025-28892, CVE-2025-28893, CVE-2025-28894, CVE-2025-28895, CVE-2025-28896, CVE-2025-28897, CVE-2025-28898, CVE-2025-28899, CVE-2025-28900, CVE-2025-28901, CVE-2025-28902, CVE-2025-28903, CVE-2025-28904, CVE-2025-28905, CVE-2025-28906, CVE-2025-28907, CVE-2025-28908, CVE-2025-28909, CVE-2025-28910, CVE-2025-28911, CVE-2025-28912, CVE-2025-28913, CVE-2025-28914, CVE-2025-28915, CVE-2025-28916, CVE-2025-28917, CVE-2025-28918, CVE-2025-28919, CVE-2025-28920, CVE-2025-28921, CVE-2025-28922, CVE-2025-28923, CVE-2025-28924, CVE-2025-28925, CVE-2025-28926, CVE-2025-28927, CVE-2025-28928, CVE-2025-28929, CVE-2025-28930, CVE-2025-28931, CVE-2025-28932,...
Date: Thu, 23 Apr 2026 14:56:21 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:16 +0000 (11:32 -0400)]
linux-yocto/6.18: update to v6.18.24
Updating linux-yocto/6.18 to the latest korg -stable release that comprises
the following commits:
c0d886e4af57 Linux 6.18.24
ff628171d5f4 dma-mapping: handle DMA_ATTR_CPU_CACHE_CLEAN in trace output
c2d109c982e9 dma-debug: Allow multiple invocations of overlapping entries
574501ede47a mm/userfaultfd: fix hugetlb fault mutex hash calculation
07e9e674b614 media: hackrf: fix to not free memory after the device is registered in hackrf_probe()
6d75a9ec5bdb media: vidtv: fix pass-by-value structs causing MSAN warnings
c36e206f302f nilfs2: fix NULL i_assoc_inode dereference in nilfs_mdt_save_to_shadow_map
09e9206008b8 media: as102: fix to not free memory after the device is registered in as102_usb_probe()
9a9e69155b20 wireguard: device: use exit_rtnl callback instead of manual rtnl_lock in pre_exit
2d6965581e16 bcache: fix cached_dev.sb_bio use-after-free and crash
d21e8a2af486 ALSA: 6fire: fix use-after-free on disconnect
9e1b798257f9 hwmon: (powerz) Fix use-after-free on USB disconnect
871b8ea8ef39 media: em28xx: fix use-after-free in em28xx_v4l2_open()
f99353cd0e9f media: mediatek: vcodec: fix use-after-free in encoder release path
25f19e476ab1 media: vidtv: fix nfeeds state corruption on start_streaming failure
ea3af09eb87d mm: blk-cgroup: fix use-after-free in cgwb_release_workfn()
f6204f7ff6af mm/kasan: fix double free for kasan pXds
30383b7780ff ASoC: qcom: q6apm: move component registration to unmanaged version
22d2ff69d487 KVM: x86: Use scratch field in MMIO fragment to hold small write values
576d365f31d9 x86-64/arm64/powerpc: clean up and rename __copy_from_user_flushcache
03fd014cd9f3 x86: rename and clean up __copy_from_user_inatomic_nocache()
c6d4e0599e7e x86-64: rename misleadingly named '__copy_user_nocache()' function
8e7666acfabb checkpatch: add support for Assisted-by tag
0c1af902223b ocfs2: fix out-of-bounds write in ocfs2_write_end_inline
cd2d765aa715 ocfs2: validate inline data i_size during inode read
df030a9374a5 ocfs2: add inline inode consistency check to ocfs2_validate_inode_block()
0ed88ac9bc64 KVM: x86: Use __DECLARE_FLEX_ARRAY() for UAPI structures with VLAs
df61c2c99c7f KVM: Remove subtle "struct kvm_stats_desc" pseudo-overlay
9309daac5034 selftests/bpf: Test refinement of single-value tnum
28cc13ca2043 KVM: SEV: Drop WARN on large size for KVM_MEMORY_ENCRYPT_REG_REGION
30fd9d8c8208 KVM: SEV: Lock all vCPUs when synchronzing VMSAs for SNP launch finish
2c59132c4786 KVM: SEV: Disallow LAUNCH_FINISH if vCPUs are actively being created
35a0963d361f KVM: SEV: Protect *all* of sev_mem_enc_register_region() with kvm->lock
692fdf05e55f KVM: SEV: Reject attempts to sync VMSA of an already-launched/encrypted vCPU
5d57a1ee587c KVM: selftests: Remove duplicate LAUNCH_UPDATE_VMSA call in SEV-ES migrate test
cec9ead73ab1 PCI: endpoint: pci-epf-vntb: Remove duplicate resource teardown
9921cce25bfe PCI: endpoint: pci-epf-vntb: Stop cmd_handler work in epf_ntb_epc_cleanup
e384a850a337 ocfs2: handle invalid dinode in ocfs2_group_extend
d45ff441b416 ocfs2: fix use-after-free in ocfs2_fault() when VM_FAULT_RETRY
bc0fb5c7d54c ocfs2: fix possible deadlock between unlink and dio_end_io_write
2dff11fb5098 media: vidtv: fix NULL pointer dereference in vidtv_channel_pmt_match_sections
8140b21d1901 arm64: mm: Handle invalid large leaf mappings correctly
755b40903eff dcache: Limit the minimal number of bucket to two
3fd0685d7fef ALSA: ctxfi: Limit PTP to a single page
de5c3e67037f Docs/admin-guide/mm/damon/reclaim: warn commit_inputs vs param updates race
4c971d577a9f USB: serial: option: add Telit Cinterion FN990A MBIM composition
1412ba36597a staging: sm750fb: fix division by zero in ps_to_hz()
89a9c1bc7d79 wifi: rtw88: fix device leak on probe failure
9c401606e2d0 scripts: generate_rust_analyzer.py: avoid FD leak
6de048d78f30 fbdev: udlfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO
5d02df1b130b usb: port: add delay after usb_hub_set_port_power()
eb6ef6185f20 usb: gadget: f_hid: don't call cdev_init while cdev in use
5d29d7ff8679 USB: cdc-acm: Add quirks for Yoga Book 9 14IAH10 INGENIC touchscreen
63dc7cdb1f4e usb: storage: Expand range of matched versions for VL817 quirks entry
9aef3f979190 usb: typec: fusb302: Switch to threaded IRQ handler
906f16a836de usbip: validate number_of_packets in usbip_pack_ret_submit()
6968c91fab05 smb: server: avoid double-free in smb_direct_free_sendmsg after smb_direct_flush_send_list()
a9940dcbe5cb smb: client: avoid double-free in smbd_free_send_io() after smbd_send_batch_flush()
dd53414e301b ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc
d2454f4a002d ksmbd: require 3 sub-authorities before reading sub_auth[2]
3363a770b193 ksmbd: validate EaNameLength in smb2_get_ea()
e0dd90d14cbb smb: client: fix OOB reads parsing symlink error response
b2b76d09a64c smb: client: fix off-by-8 bounds check in check_wsl_eas()
44216e3dd445 usb: gadget: renesas_usb3: validate endpoint index in standard request handlers
4e476c25bfca usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete()
6762f8a95772 usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb()
fc386daa6846 fbdev: tdfxfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO
67cfd14074cd ALSA: fireworks: bound device-supplied status before string array lookup
09b145c1f133 ALSA: usx2y: us144mkii: fix NULL deref on missing interface 0
0185e0494a56 drm/vc4: platform_get_irq_byname() returns an int
5a59bf70c38e NFC: digital: Bounds check NFC-A cascade depth in SDD response handler
c183d5775129 net: usb: cdc-phonet: fix skb frags[] overflow in rx_complete()
8a8333237f1f HID: core: clamp report_size in s32ton() to avoid undefined shift
0091dfa542a3 HID: alps: fix NULL pointer dereference in alps_raw_event()
b487a7754d87 staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify()
377fae22a137 i2c: s3c24xx: check the size of the SMBUS message before using it
1a0f2de81f7f can: raw: fix ro->uniq use-after-free in raw_rcv()
8977fad2b3c6 nfc: llcp: add missing return after LLCP_CLOSED checks
67c53c1978ce netfilter: conntrack: add missing netlink policy validations
78cea133daf7 crypto: algif_aead - Fix minimum RX size check for decryption
dea5fcf085f9 crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl
66dfc9179b78 sched/deadline: Use revised wakeup rule for dl_server
f34feda8e0c9 perf/x86/intel/uncore: Skip discovery table for offline dies
07c6f6ffe290 crypto: af_alg - limit RX SG extraction by receive buffer budget
7af379af9d34 gpio: tegra: fix irq_release_resources calling enable instead of disable
86534c97abd6 l2tp: Drop large packets with UDP encap
2d2dc166d551 net: ipa: fix event ring index not programmed for IPA v5.0+
bafc45ea30d2 net: ipa: fix GENERIC_CMD register field masks for IPA v5.0+
a31b3ee4dba0 devlink: Fix incorrect skb socket family dumping
900a4e0910e9 af_unix: read UNIX_DIAG_VFS data under unix_state_lock
8eff73e58e1f net: txgbe: leave space for null terminators on property_entry
6d1d9ed9b409 net: ioam6: fix OOB and missing lock
607b86397622 net: mdio: realtek-rtl9300: use scoped device_for_each_child_node loop
8c3984a0872c ASoC: amd: acp: update DMI quirk and add ACP DMIC for Lenovo platforms
c877bc8058a9 ASoC: SDCA: Fix overwritten var within for loop
41e3652a178c netfilter: nfnetlink_queue: make hash table per queue
06e054ace8b8 netfilter: nfnetlink_queue: nfqnl_instance GFP_ATOMIC -> GFP_KERNEL_ACCOUNT allocation
807d6ee15804 netfilter: ip6t_eui64: reject invalid MAC header for all packets
8368ce8eb01f netfilter: xt_multiport: validate range encoding in checkentry
d552bcfca323 netfilter: nfnetlink_log: initialize nfgenmsg in NLMSG_DONE terminator
a32dabacee11 ipvs: fix NULL deref in ip_vs_add_service error path
585fe11fedb8 selftests: net: bridge_vlan_mcast: wait for h1 before querier check
8083b7da229b drm/xe: Fix bug in idledly unit conversion
a4532ec7b885 ASoC: Intel: avs: Fix memory leak in avs_register_i2s_test_boards()
f779a6b6cdb6 xfrm_user: fix info leak in build_mapping()
836ee1b0426e xfrm: fix refcount leak in xfrm_migrate_policy_find
3733fce2871c xfrm: Wait for RCU readers during policy netns exit
25e1e91a8da8 xsk: validate MTU against usable frame size on bind
4947e2ae9c57 xsk: fix XDP_UMEM_SG_FLAG issues
29a68f4baaf9 xsk: respect tailroom for ZC setups
9ea6ba4f3195 xsk: tighten UMEM headroom validation to account for tailroom and min frame
70b85c177344 e1000: check return value of e1000_read_eeprom
4db7b61ec1d1 ixgbevf: add missing negotiate_features op to Hyper-V ops table
4da3465a7f00 ixgbe: stop re-reading flash on every get_drvinfo for e610
e19675b384e9 ice: ptp: don't WARN when controlling PF is unavailable
7dad8bf14346 tracing/probe: reject non-closed empty immediate strings
9550d1d9f716 dt-bindings: net: Fix Tegra234 MGBE PTP clock
b6b9c17ef8ae net: stmmac: Fix PTP ref clock for Tegra234
6d931680a985 nfc: s3fwrn5: allocate rx skb before consuming bytes
4d90f9a271a6 net: increase IP_TUNNEL_RECURSION_LIMIT to 5
f91b3ed9e7fa ipv4: icmp: fix null-ptr-deref in icmp_build_probe()
40bd39e383a0 ipv4: nexthop: allocate skb dynamically in rtm_get_nexthop()
69aa3c713980 ipv4: nexthop: avoid duplicate NHA_HW_STATS_ENABLE on nexthop group dump
0975b64ffb34 rtnetlink: add missing netlink_ns_capable() check for peer netns
fb612d436ff0 bridge: guard local VLAN-0 FDB helpers against NULL vlan group
4198aab6f000 ipv6: ioam: fix potential NULL dereferences in __ioam6_fill_trace_data()
4429b761874f net: airoha: Fix memory leak in airoha_qdma_rx_process()
63851f60781a net: lapbether: handle NETDEV_PRE_TYPE_CHANGE
ec4930979b3f net: sched: act_csum: validate nested VLAN headers
7e8083f5eeed eventpoll: defer struct eventpoll free to RCU grace period
0cf8ea9d677b drm/vc4: Protect madv read in vc4_gem_object_mmap() with madv_lock
e352e9adc9f6 drm/vc4: Fix a memory leak in hang state error path
421cea4f71f7 drm/vc4: Fix memory leak of BO array in hang state
ce12a1af6779 drm/vc4: Release runtime PM reference after binding V3D
9a945edeabb5 dma-debug: suppress cacheline overlap warning when arch has no DMA alignment requirement
ad187e0506ab dma-debug: track cache clean flag in entries
4e8a1b970168 dma-mapping: add DMA_ATTR_CPU_CACHE_CLEAN
e62e322ea20b xfrm: account XFRMA_IF_ID in aevent size calculation
73e3e4dac102 HID: amd_sfh: don't log error when device discovery fails with -EOPNOTSUPP
0d364d863c70 PCI: hv: Set default NUMA node to 0 for devices without affinity info
e4093997420f ARM: dts: microchip: sam9x7: fix gpio-lines count for pioB
edde62571f76 arm64: dts: qcom: monaco: Reserve full Gunyah metadata region
d0deac48e57a tools/power turbostat: Fix --show/--hide for individual cpuidle counters
fbc581977db2 tools/power/turbostat: Fix microcode patch level output for AMD/Hygon
7d75145672cf soc: qcom: pd-mapper: Fix element length in servreg_loc_pfr_req_ei
52632daf6425 arm64: dts: qcom: monaco: Fix UART10 pinconf
95894966bce9 arm64: dts: imx93-tqma9352: improve eMMC pad configuration
b3b725b902b3 arm64: dts: imx91-tqma9131: improve eMMC pad configuration
737a4ee014e1 arm64: dts: imx93-9x9-qsb: change usdhc tuning step for eMMC and SD
d0fcd4858918 arm64: dts: imx8mq: Set the correct gpu_ahb clock frequency
ecbc5e9277da arm64: dts: qcom: qcm6490-idp: Fix WCD9370 reset GPIO polarity
878ccc18d94c arm64: dts: qcom: hamoa/x1: fix idle exit latency
c448aad9a779 soc: aspeed: socinfo: Mask table entries for accurate SoC ID matching
d2c7153fe0ca ASoC: stm32_sai: fix incorrect BCLK polarity for DSP_A/B, LEFT_J
c64cebcc5c4f x86: shadow stacks: proper error handling for mmap lock
0a59c12ce50a net: sfp: add quirks for Hisense and HSGQ GPON ONT SFP modules
1ae1e1caa428 wifi: brcmfmac: validate bsscfg indices in IF events
f5a5d0e8704e ata: ahci: force 32-bit DMA for JMicron JMB582/JMB585
36bb2d0b9150 HID: roccat: fix use-after-free in roccat_report_event
0fa5713ac7a1 ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14IAH10
42032a75da03 HID: quirks: add HID_QUIRK_ALWAYS_POLL for 8BitDo Pro 3
c2854af5774b HID: Intel-thc-hid: Intel-quickspi: Add NVL Device IDs
0f2e312626c7 platform/x86/amd: pmc: Add Thinkpad L14 Gen3 to quirk_s2idle_bug
91f915d57416 pinctrl: intel: Fix the revision for new features (1kOhm PD, HW debouncer)
b98ecc1c60ad ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14IMH9
1d788e6a4150 ASoC: amd: yc: Add DMI entry for HP Laptop 15-fc0xxx
86f9c23e0814 fs/smb/client: fix out-of-bounds read in cifs_sanitize_prepath
647fb0dc3818 drm/amdkfd: Fix queue preemption/eviction failures by aligning control stack size to GPU page size
fceb2a469121 ALSA: hda/realtek: Add quirk for Lenovo Yoga Slim 7 14AKP10
66b315279b88 ALSA: usb-audio: Fix quirk flags for NeuralDSP Quad Cortex
f664b56d8fc3 ALSA: hda/realtek: Add quirk for Samsung Book2 Pro 360 (NP950QED)
a9d32e6c8a55 ASoC: soc-core: call missing INIT_LIST_HEAD() for card_aux_list
8d7465be5163 wifi: wl1251: validate packet IDs before indexing tx_frames
21a1acf6b16a ALSA: hda/realtek: add quirk for Framework F111:000F
07de44424bb7 netfilter: nft_set_pipapo_avx2: don't return non-matching entry on expiry
7556bd5cd8ef ALSA: hda/realtek: add HP Laptop 15-fd0xxx mute LED quirk
6a9f2683c66d drm/amdgpu: Handle GPU page faults correctly on non-4K page systems
f338ced04738 netfilter: ctnetlink: ensure safe access to master conntrack
8db3663d3c3e ALSA: hda/realtek: Add mute LED quirk for HP Pavilion 15-eg0xxx
2e4adfaec97e btrfs: tracepoints: get correct superblock from dentry in event btrfs_sync_file()
d4ff92dd98ad platform/x86: hp-wmi: Add support for Omen 16-wf1xxx (8C76)
fddb157536e6 btrfs: fix zero size inode with non-zero size after log replay
c66a0e9a19c0 platform/x86: asus-nb-wmi: add DMI quirk for ASUS ROG Flow Z13-KJP GZ302EAC
c2be593c7ec2 ALSA:usb:qcom: add AUXILIARY_BUS to Kconfig dependencies
5486d20a0818 ASoC: amd: acp: add ASUS HN7306EA quirk for legacy SDW machine
c306ac170bc3 can: mcp251x: add error handling for power enable in open and resume
550243229155 ASoC: SOF: topology: reject invalid vendor array size in token parser
36d706d03346 ASoC: amd: yc: Add DMI quirk for Thin A15 B7VF
a7a1cdb4a64c Bluetooth: hci_sync: annotate data-races around hdev->req_status
02ce2a77acc8 ALSA: asihpi: avoid write overflow check warning
222f4fd0fe06 media: rkvdec: reduce stack usage in rkvdec_init_v4l2_vp9_count_tbl()
fc40821d94b9 ALSA: hda/realtek: Add quirk for ASUS ROG Flow Z13-KJP GZ302EAC
e656ef8698e2 ALSA: hda/realtek: add quirk for Lenovo Yoga 7 2-in-1 16AKP10
b395549928e5 ALSA: hda/realtek: Add HP ENVY Laptop 13-ba0xxx quirk
4b59719db211 ASoC: amd: yc: Add DMI quirk for ASUS EXPERTBOOK BM1403CDA
0f22c32141ac RDMA/irdma: Fix double free related to rereg_user_mr
0aa0c509aa69 dmaengine: idxd: Fix lockdep warnings when calling idxd_device_config()
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:15 +0000 (11:32 -0400)]
linux-yocto/6.18: update CVE exclusions (6.18.23)
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 205 changes (128 new | 77 updated): - 128 new CVEs: CVE-2000-5001, CVE-2005-20001, CVE-2008-20002, CVE-2008-20003, CVE-2009-20012, CVE-2010-20110, CVE-2010-20116, CVE-2010-20117, CVE-2010-20118, CVE-2010-20124, CVE-2011-10031, CVE-2013-10041, CVE-2013-10045, CVE-2013-10056, CVE-2014-125120, CVE-2026-31192, CVE-2026-31434, CVE-2026-31435, CVE-2026-31436, CVE-2026-31437, CVE-2026-31438, CVE-2026-31439, CVE-2026-31440, CVE-2026-31441, CVE-2026-31442, CVE-2026-31443, CVE-2026-31444, CVE-2026-31445, CVE-2026-31446, CVE-2026-31447, CVE-2026-31448, CVE-2026-31449, CVE-2026-31450, CVE-2026-31451, CVE-2026-31452, CVE-2026-31453, CVE-2026-31454, CVE-2026-31455, CVE-2026-31456, CVE-2026-31457, CVE-2026-31458, CVE-2026-31459, CVE-2026-31460, CVE-2026-31461, CVE-2026-31462, CVE-2026-31463, CVE-2026-31464, CVE-2026-31465, CVE-2026-31466, CVE-2026-31467, CVE-2026-31468, CVE-2026-31469, CVE-2026-31470, CVE-2026-31471, CVE-2026-31472, CVE-2026-31473, CVE-2026-31474, CVE-2026-31475, CVE-2026-31476, CVE-2026-31477, CVE-2026-31478, CVE-2026-31479, CVE-2026-31480, CVE-2026-31481, CVE-2026-31482, CVE-2026-31483, CVE-2026-31484, CVE-2026-31485, CVE-2026-31486, CVE-2026-31487, CVE-2026-31488, CVE-2026-31489, CVE-2026-31490, CVE-2026-31491, CVE-2026-31492, CVE-2026-31493, CVE-2026-31494, CVE-2026-31495, CVE-2026-31496, CVE-2026-31497, CVE-2026-31498, CVE-2026-31499, CVE-2026-31500, CVE-2026-31501, CVE-2026-31502, CVE-2026-31503, CVE-2026-31504, CVE-2026-31505, CVE-2026-31506, CVE-2026-31507, CVE-2026-31508, CVE-2026-31509, CVE-2026-31510, CVE-2026-31511, CVE-2026-31512, CVE-2026-31513, CVE-2026-31514, CVE-2026-31515, CVE-2026-31516, CVE-2026-31517, CVE-2026-31518, CVE-2026-31519, CVE-2026-31520, CVE-2026-31521, CVE-2026-31522, CVE-2026-31523, CVE-2026-31524, CVE-2026-31525, CVE-2026-31526, CVE-2026-31527, CVE-2026-31528, CVE-2026-31529, CVE-2026-31530, CVE-2026-33254, CVE-2026-33593, CVE-2026-33594, CVE-2026-33595, CVE-2026-33596, CVE-2026-33597, CVE-2026-33598, CVE-2026-33599, CVE-2026-33602, CVE-2026-33608, CVE-2026-33609, CVE-2026-33610, CVE-2026-33611, CVE-2026-6861, CVE-2026-6862 - 77 updated CVEs: CVE-2026-0539, CVE-2026-1930, CVE-2026-20133, CVE-2026-21997, CVE-2026-21998, CVE-2026-21999, CVE-2026-22001, CVE-2026-22002, CVE-2026-22003, CVE-2026-22004, CVE-2026-22005, CVE-2026-22007, CVE-2026-22008, CVE-2026-22009, CVE-2026-22010, CVE-2026-22013, CVE-2026-22014, CVE-2026-22015, CVE-2026-22016, CVE-2026-22017, CVE-2026-22018, CVE-2026-22019, CVE-2026-22021, CVE-2026-22746, CVE-2026-25917, CVE-2026-33145, CVE-2026-34267, CVE-2026-34268, CVE-2026-34269, CVE-2026-34270, CVE-2026-34271, CVE-2026-34272, CVE-2026-34273, CVE-2026-34274, CVE-2026-34288, CVE-2026-34289, CVE-2026-34290, CVE-2026-34291, CVE-2026-34292, CVE-2026-34293, CVE-2026-34294, CVE-2026-34295, CVE-2026-34296, CVE-2026-34297, CVE-2026-34298, CVE-2026-34299, CVE-2026-34312, CVE-2026-34319, CVE-2026-35587, CVE-2026-39808, CVE-2026-3362, CVE-2026-40342, CVE-2026-40614, CVE-2026-40868, CVE-2026-40872, CVE-2026-40878, CVE-2026-40884, CVE-2026-40887, CVE-2026-40895, CVE-2026-40903, CVE-2026-40906, CVE-2026-40923, CVE-2026-40926, CVE-2026-40931, CVE-2026-40943, CVE-2026-41055, CVE-2026-41060, CVE-2026-41320, CVE-2026-4089, CVE-2026-4111, CVE-2026-5501, CVE-2026-5749, CVE-2026-5750, CVE-2026-6236, CVE-2026-6823, CVE-2026-6830, CVE-2026-6857
Date: Wed, 22 Apr 2026 14:13:54 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:14 +0000 (11:32 -0400)]
linux-yocto/6.18: update to v6.18.23
Updating linux-yocto/6.18 to the latest korg -stable release that comprises
the following commits:
47a33eea6d51 Linux 6.18.23
ad17f07e95e6 x86/CPU: Fix FPDSS on Zen1
2d64618ea846 net: skb: fix cross-cache free of KFENCE-allocated skb head
db297c78ce53 rxrpc: proc: size address buffers for %pISpc output
d0035e634dae rxrpc: only handle RESPONSE during service challenge
794586789800 rxrpc: Fix buffer overread in rxgk_do_verify_authenticator()
4b5e8365515f rxrpc: Fix leak of rxgk context in rxgk_verify_response()
1f864d9daaf6 rxrpc: Fix integer overflow in rxgk_verify_response()
bf4d6e4a6856 rxrpc: Fix missing error checks for rxkad encryption/decryption failure
03d1c51decae rxrpc: Fix key/keyring checks in setsockopt(RXRPC_SECURITY_KEY/KEYRING)
8ee931c3cd97 rxrpc: fix reference count leak in rxrpc_server_keyring()
beee051f259a rxrpc: fix oversized RESPONSE authenticator length check
7875f3d9777b rxrpc: fix RESPONSE authenticator parser OOB read
22f6258e7b31 rxrpc: reject undecryptable rxkad response tickets
8299ca146489 rxrpc: Only put the call ref if one was acquired
8b353f5f1385 rxrpc: Fix to request an ack if window is limited
2e6ef713b159 rxrpc: Fix key reference count leak from call->key
86303a1da93f rxrpc: Fix rack timer warning to report unexpected mode
9132b1a7bf83 rxrpc: Fix use of wrong skb when comparing queued RESP challenge serial
3e04596cba8a rxrpc: Fix RxGK token loading to check bounds
3be718f65968 rxrpc: Fix call removal to use RCU safe deletion
3bb18ed3b2f6 rxrpc: Fix anonymous key handling
d5f76f812d2c rxrpc: Fix key parsing memleak
862cb78fb2c9 rxrpc: Fix key quota calculation for multitoken keys
92a673019943 net: lan966x: fix use-after-free and leak in lan966x_fdma_reload()
22e1ee9f22b5 net: lan966x: fix page pool leak in error paths
b5dcb41ba891 net: lan966x: fix page_pool error handling in lan966x_fdma_rx_alloc_page_pool()
214ceaa8a3a2 idpf: set the payload size before calling the async handler
d6e9bef3313a idpf: improve locking around idpf_vc_xn_push_free()
e02c974fc331 idpf: fix PREEMPT_RT raw/bh spinlock nesting for async VC handling
576543bedd61 mm: filemap: fix nr_pages calculation overflow in filemap_map_pages()
6fca757c2039 net: stmmac: fix integer underflow in chain mode
9fdece45f6e0 net: qualcomm: qca_uart: report the consumed byte on RX skb allocation failure
ea7468f61be0 mmc: vub300: fix use-after-free on disconnect
c83a282615d8 mmc: vub300: fix NULL-deref on disconnect
447f8870b484 mm/damon/stat: deallocate damon_call() failure leaking damon_ctx
b9dadf026a9f mm/damon/sysfs: dealloc repeat_call_control if damon_call() fails
49c00ae87230 mm/memory_hotplug: maintain N_NORMAL_MEMORY during hotplug
470047177574 igb: remove napi_synchronize() in igb_down()
e44919669f07 pmdomain: imx8mp-blk-ctrl: Keep the NOC_HDCP clock enabled
82e8174d1d0e net/mlx5: Update the list of the PCI supported devices
de9aa7e89b98 drm/i915/psr: Do not use pipe_src as borders for SU area
2af8b200cae3 drm/i915/gt: fix refcount underflow in intel_engine_park_heartbeat
4dee4c068844 batman-adv: hold claim backbone gateways by reference
60f462cd2716 net: altera-tse: fix skb leak on DMA mapping error in tse_start_xmit()
5d70eb25b41e net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption
87ce8ae51196 EDAC/mc: Fix error path ordering in edac_mc_alloc()
206121294b9c X.509: Fix out-of-bounds access when parsing extensions
de6c1dc3c7d0 batman-adv: reject oversized global TT response buffers
21ae2cda66a5 nfc: pn533: allocate rx skb before consuming bytes
083c5a417dee arm64: dts: hisilicon: hi3798cv200: Add missing dma-ranges
f0a0a6a8c1cc arm64: dts: hisilicon: poplar: Correct PCIe reset GPIO polarity
c82a3c9d9fb3 arm64: dts: renesas: sparrow-hawk: Reserve first 128 MiB of DRAM
a4115c2abab3 arm64: dts: imx8mq-librem5: Bump BUCK1 suspend voltage up to 0.85V
3b31b15230b0 Revert "arm64: dts: imx8mq-librem5: Set the DVS voltages lower"
aee881c21b57 Revert "arm64: dts: rockchip: Further describe the WiFi for the Pinebook Pro"
fecceacbaf48 platform/x86/intel-uncore-freq: Handle autonomous UFS status bit
c4e1eff4606c platform/x86: ISST: Reset core count to 0
b27fa888e4a4 wifi: brcmsmac: Fix dma_free_coherent() size
1b6f13f62666 tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG
0f451b43c88b xfrm: hold dev ref until after transport_finish NF_HOOK
b1dfd6b27df3 xfrm: clear trailing padding in build_polexpire()
688c1b491c35 modpost: Declare extra_warn with unused attribute
0133aa1a28af workqueue: Add pool_workqueue to pending_pwqs list when unplugging multiple inactive works
fbdb43f6bb2a firmware: thead: Fix buffer overflow and use standard endian macros
b42aca3660dc netfilter: nft_ct: fix use-after-free in timeout object destroy
2802ba3981f1 i2c: imx: zero-initialize dma_slave_config for eDMA
72cf49ad50c1 af_unix: Give up GC if MSG_PEEK intervened.
33120558237c af_unix: Simplify GC state.
1e211179f1d9 af_unix: Count cyclic SCC.
450e6a685d0c btrfs: fix incorrect return value after changing leaf in lookup_extent_data_ref()
2124a61e6e2b btrfs: remove pointless out labels from extent-tree.c
d8b281165a86 MIPS: mm: Rewrite TLB uniquification for the hidden bit feature
ccc6a2241a49 MIPS: mm: Suppress TLB uniquification on EHINV hardware
6c600fc0e991 MIPS: Always record SEGBITS in cpu_data.vmbits
6c098142b370 Input: uinput - take event lock when submitting FF request "event"
1e09dfbb4f5d Input: uinput - fix circular locking dependency with ff-core
fb56de5d9921 seg6: separate dst_cache for input and output paths in seg6 lwtunnel
15fa9ead4d5e mptcp: fix slab-use-after-free in __inet_lookup_established
96a95b6d9e6d Revert "mptcp: add needs_id for netlink appending addr"
130c991e6aad Revert "ALSA: hda/realtek: Add quirk for Gigabyte Technology to fix headphone"
a8c26800e022 net: rfkill: prevent unlimited numbers of rfkill events from being created
6c55714c9310 xfrm_user: fix info leak in build_report()
e360d15fcb1e wifi: rt2x00usb: fix devres lifetime
f4786c34216a usb: typec: ucsi: skip connector validation before init
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Bruce Ashfield [Thu, 23 Apr 2026 15:32:13 +0000 (11:32 -0400)]
linux-yocto/6.18: update CVE exclusions (6.18.22)
Data pulled from: https://github.com/CVEProject/cvelistV5
1/1 [
Author: cvelistV5 Github Action
Email: github_action@example.com
Subject: 4 changes (4 new | 0 updated): - 4 new CVEs: CVE-2026-33714, CVE-2026-33715, CVE-2026-34160, CVE-2026-34161 - 0 updated CVEs:
Date: Tue, 14 Apr 2026 21:14:51 +0000
]
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>