* [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12
@ 2026-04-23 15:44 bruce.ashfield
2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 01/18] linux-yocto/6.12: update to v6.12.72 bruce.ashfield
` (18 more replies)
0 siblings, 19 replies; 20+ messages in thread
From: bruce.ashfield @ 2026-04-23 15:44 UTC (permalink / raw)
To: yoann.congal; +Cc: openembedded-core
From: Bruce Ashfield <bruce.ashfield@gmail.com>
Hi all,
I know that whinlatter is about to go EOL, but here are the stable
updates I've been tracking for the kernel.
I'll continue to update 6.12 even after whinlatter is no longer
being udpated.
Bruce
openembedded-core (18):
linux-yocto/6.12: update to v6.12.72
linux-yocto/6.12: update CVE exclusions
linux-yocto/6.12: update to v6.12.73
linux-yocto/6.12: update CVE exclusions
linux-yocto/6.12: update to v6.12.74
linux-yocto/6.12: update CVE exclusions
linux-yocto/6.12: update to v6.12.76
linux-yocto/6.12: update CVE exclusions
linux-yocto/6.12: update to v6.12.77
linux-yocto/6.12: update CVE exclusions
linux-yocto/6.12: update to v6.12.79
linux-yocto/6.12: update CVE exclusions
linux-yocto/6.12: update to v6.12.80
linux-yocto/6.12: update CVE exclusions
linux-yocto/6.12: update to v6.12.81
linux-yocto/6.12: update CVE exclusions
linux-yocto/6.12: update to v6.12.83
linux-yocto/6.12: update CVE exclusions
openembedded-core:
meta/recipes-kernel/linux/cve-exclusion_6.12.inc | 1148 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++---------
meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb | 6 +-
meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb | 6 +-
meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++---
4 files changed, 1127 insertions(+), 61 deletions(-)
--
2.43.0
^ permalink raw reply [flat|nested] 20+ messages in thread* [openembedded-core][whinlatter][PATCH 01/18] linux-yocto/6.12: update to v6.12.72 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield @ 2026-04-23 15:44 ` bruce.ashfield 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 02/18] linux-yocto/6.12: update CVE exclusions (6.12.72) bruce.ashfield ` (17 subsequent siblings) 18 siblings, 0 replies; 20+ messages in thread From: bruce.ashfield @ 2026-04-23 15:44 UTC (permalink / raw) To: yoann.congal; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: 19b3cac2b50b5 Linux 6.12.72 2211d77892913 gpio: omap: do not register driver in probe() 5d810ba377edd wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add d9af3cf58bb4c PCI: endpoint: Avoid creating sub-groups asynchronously 1d411278dda29 xfs: fix UAF in xchk_btree_check_block_owner ae385826840a3 erofs: fix UAF issue for file-backed mounts w/ directio option 51223bdd0f60b mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() 9bef8beef1557 bus: mhi: host: pci_generic: Add Telit FE990B40 modem support 2a6bfa97d4d52 scsi: qla2xxx: Query FW again before proceeding with login 05fcd590e5fbb scsi: qla2xxx: Free sp in error path to fix system crash d70f71d4c92bc scsi: qla2xxx: Delay module unload while fabric scan in progress 387c26bf60042 scsi: qla2xxx: Allow recovery for tape devices 40ae93668226b scsi: qla2xxx: Validate sp before freeing associated memory 7d31dde1bd867 wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon() ea2278657ad0d nilfs2: Fix potential block overflow that cause system hang 687e1d4af79c3 crypto: virtio - Remove duplicated virtqueue_kick in virtio_crypto_skcipher_crypt_req c0a0ded3bb7fd crypto: virtio - Add spinlock protection with virtqueue notification c184341920ed7 crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly 1ff337fc7cefe crypto: octeontx - Fix length check to avoid truncation in ucode_load_store c77b33b585127 crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode 52b6e7417ff76 Bluetooth: btusb: Add USB ID 7392:e611 for Edimax EW-7611UXB cd0e0a76e40c2 driver core: enforce device_lock for driver_match_device() baf664fc90a61 smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() f7b1c2f5642bb ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths 3eaa22d688311 smb: client: split cached_fid bitfields to avoid shared-byte RMW races ae591174b1f2e Linux 6.12.71 aa9f6f353bcc3 vsock/test: verify socket options after setting them ceab30fec9ed2 io_uring/rw: recycle buffers manually for non-mshot reads 4ce768ac429ec net: tunnel: make skb_vlan_inet_prepare() return drop reasons 88969c951665e Linux 6.12.70 c1ae8301551f3 gpiolib-acpi: Update file references in the Documentation and MAINTAINERS 833a9452f59f4 ALSA: hda/realtek: Really fix headset mic for TongFang X6AR55xU. 6d6b23aada49c spi: tegra114: Preserve SPI mode bits in def_command1_reg 075415ae18b5b spi: tegra: Fix a memory leak in tegra_slink_probe() 947e6c7ba1578 spi: tegra210-quad: Protect curr_xfer clearing in tegra_qspi_non_combined_seq_xfer 6fd446178a610 spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer f5a8a27e6eea4 spi: tegra210-quad: Protect curr_xfer assignment in tegra_qspi_setup_transfer_one 62059d8ac0acf spi: tegra210-quad: Move curr_xfer read inside spinlock 69079e7b26d55 spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed transfer c9c14d2abe4c5 ASoC: amd: fix memory leak in acp3x pdm dma ops ae0aad8c49df8 ALSA: usb-audio: fix broken logic in snd_audigy2nx_led_update() d8143c54ceeba ipv6: Fix ECMP sibling count mismatch when clearing RTF_ADDRCONF 1444ff890b465 netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() 09dc5be323d4f hwmon: (occ) Mark occ_init_attribute() as __printf c0de1cc6a6943 drm/xe/pm: Disable D3Cold for BMG only on specific platforms c8a5ec95c9616 drm/xe/pm: Also avoid missing outer rpm warning on system suspend 422f646b4ab50 drm/xe/query: Fix topology query pointer advance 1aacebe9d4ccb drm/mgag200: fix mgag200_bmc_stop_scanout() b83557bc6f560 net: gro: fix outer network offset 642c8a50df4c7 net: ethernet: adi: adin1110: Check return value of devm_gpiod_get_optional() in adin1110_check_spi() d4d5d152d94f6 drm/amd/display: fix wrong color value mapping on MCM shaper LUT 5003e92af2b90 tipc: use kfree_sensitive() for session key material 73585e603dee8 net: don't touch dev->stats in BPF redirect paths 61c8091b7937f net: usb: r8152: fix resume reset deadlock 986967a162142 macvlan: fix error recovery in macvlan_common_newlink() 4a15468051d2c net: sfp: Fix quirk for Ubiquiti U-Fiber Instant SFP module d8f3c5b5543cf net: sfp: convert sfp quirks to modify struct sfp_module_support 248c29a4d3e47 net: sfp: pre-parse the module support ecd57017429e3 net: phy: add phy_interface_copy() 4dc7b69bca8ef net: phy: add phy_interface_weight() 2447edc367800 dpaa2-switch: add bounds check for if_id in IRQ handler 52b19b3a22306 net: liquidio: Fix off-by-one error in VF setup_nic_devices() cleanup f86bd16280a0f net: liquidio: Fix off-by-one error in PF setup_nic_devices() cleanup 1d4590fde856c net: liquidio: Initialize netdev pointer before queue setup 4acc40db06ffd dpaa2-switch: prevent ZERO_SIZE_PTR dereference when num_ifs is zero e41a23e61259f net/sched: cls_u32: use skb_header_pointer_careful() 8b6c7f1476646 net: add skb_header_pointer_careful() helper b64e3b5d8d759 smb/client: fix memory leak in smb2_open_file() 2b5e6819ff7ee platform/x86/intel/tpmi/plr: Make the file domain<n>/status writeable bd3ecd6018cb5 platform/x86: hp-bioscfg: Skip empty attribute names 177f8c06e879f platform/x86: intel_telemetry: Fix PSS event register mask bf0474356875d platform/x86: toshiba_haps: Fix memory leaks in add/remove routines 071982199b47a ALSA: hda/realtek: ALC269 fixup for Lenovo Yoga Book 9i 13IRU8 audio a928eecf030a9 btrfs: reject new transactions if the fs is fully read-only 586c628c0bdd8 wifi: mac80211: don't increment crypto_tx_tailroom_needed_cnt twice 29443629fe745 wifi: mac80211: correctly check if CSA is active 48fe983e92de2 scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() 2901d799a26d9 ALSA: hda/realtek: Fix headset mic for TongFang X6AR55xU 41b86a9ec037b scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() 30f1507376d6e wifi: cfg80211: Fix bitrate calculation overflow for HE rates 811b45e2d795d regmap: maple: free entry on mas_store_gfp() failure 70b24ad9d84a9 spi: hisi-kunpeng: Fixed the wrong debugfs node name in hisi_spi debugfs initialization 58df2eca707c2 ASoC: tlv320adcx140: Propagate error codes during probe 1c1c8fafa0b91 ASoC: amd: yc: Fix microphone on ASUS M6500RE 6e0c7503a5803 nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() fa301aef50e3f nvme-fc: release admin tagset if init fails 1d5c634789492 ASoC: simple-card-utils: Check device node before overwrite direction e07de198dbcca ASoC: davinci-evm: Fix reference leak in davinci_evm_probe 66a7153fd67c8 wifi: mac80211: collect station statistics earlier when disconnect 95d2a20ae6873 HID: logitech: add HID++ support for Logitech MX Anywhere 3S 4cd8f9799981b ring-buffer: Avoid softlockup in ring_buffer_resize() during memory free c1853ebbec980 drm/amd/pm: Disable MMIO access during SMU Mode 1 reset ff8a020151798 HID: Apply quirk HID_QUIRK_ALWAYS_POLL to Edifier QR30 (2d99:a101) 786ec171788bd HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report() 81a074334c01f HID: quirks: Add another Chicony HP 5MP Cameras to hid_ignore_list 3521db9fcbd22 netfilter: replace -EEXIST with -EBUSY beb54a7f9c674 PCI: qcom: Remove ASPM L0s support for MSM8996 SoC dc60a7d2dc78b ALSA: hda/realtek: add HP Laptop 15s-eq1xxx mute LED quirk 04818a914fdce ALSA: hda/realtek: Add quirk for Acer Nitro AN517-55 cba4664a19f5a HID: playstation: Center initial joystick axes to prevent spurious events 40c3f16aa7235 HID: intel-ish-hid: Reset enum_devices_done before enumeration c45848936ebdb riscv: Sanitize syscall table indexing under speculation f3ee1732851ae btrfs: fix reservation leak in some error paths when inserting inline extent 626f39c9c8ed3 HID: multitouch: add MT_QUIRK_STICKY_FINGERS to MT_CLS_VTL 367ec17610106 HID: intel-ish-hid: Update ishtp bus match to support device ID table 8a15107c4c031 smb/server: fix refcount leak in parse_durable_handle_context() c49a28068363f LoongArch: Enable exception fixup for specific ADE subcode 39ca11ff158c9 smb/server: fix refcount leak in smb2_open() 165d1359f945b md: suspend array while updating raid_disks via sysfs 380d7c1af4bd3 LoongArch: Set correct protection_map[] for VM_NONE/VM_SHARED ac18761b530b5 smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe() 5fa0faf0e4d08 block,bfq: fix aux stat accumulation destination e297a64beff9f net: usb: sr9700: support devices with virtual driver CD 71de0b6e04bbe wifi: wlcore: ensure skb headroom before skb_push 536447521b3b9 wifi: mac80211: ocb: skip rx_no_sta when interface is not joined 76d035271e120 tracing: Fix ftrace event field alignments b9b97e6aeb534 procfs: avoid fetching build ID while holding VMA lock 87ff11143615c KVM: selftests: Add -U_FORTIFY_SOURCE to avoid some unpredictable test failures ee5e42e9a59ac binderfs: fix ida_alloc_max() upper bound 9eec6f49d3fae binder: fix BR_FROZEN_REPLY error log 5b5228964619b hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() 9bcc47343ee0e ublk: fix deadlock when reading partition table d288ba832d92d tools/power turbostat: fix GCC9 build regression 58130e7ce6cb6 PCI/ERR: Ensure error recoverability at all times ff48c9312d042 KVM: Don't clobber irqfd routing type when deassigning irqfd 5b794951541e8 Revert "drm/amd: Check if ASPM is enabled from PCIe subsystem" dfc3ab6bd6486 mm, shmem: prevent infinite loop on truncate race fe787920fac00 gve: Correct ethtool rx_dropped calculation 9fa0a755db3e1 gve: Fix stats report corruption on queue count change 8c9af7339de41 ceph: fix oops due to invalid pointer for kfree() in parse_longname() 60645e27e3ec6 ARM: 9468/1: fix memset64() on big-endian 41ededf7ef153 rbd: check for EOD after exclusive lock is ensured to be held c6f8326f26bd2 ceph: fix NULL pointer dereference in ceph_mds_auth_match() b8bc72587c79f mm/slab: Add alloc_tagging_slab_free_hook for memcg_alloc_abort_single 4390dcdabb5fc pmdomain: imx8m-blk-ctrl: fix out-of-range access of bc->domains e142106ee355e pmdomain: imx8mp-blk-ctrl: Keep usb phy power domain on for system wakeup b8ea101959ab1 pmdomain: imx: gpcv2: Fix the imx8mm gpu hang due to wrong adb400 reset fb14cb9a1cd69 pmdomain: imx8mp-blk-ctrl: Keep gpc power domain on for system wakeup ab99415e30f22 pmdomain: qcom: rpmpd: fix off-by-one error in clamping to the highest state bad15420050db ALSA: aloop: Fix racy access at PCM trigger e6ff2ebff427b platform/x86: intel_telemetry: Fix swapped arrays in PSS output 917ccf6fd180a x86/kfence: fix booting on 32bit non-PAE systems 2f467a92df61e x86/vmware: Fix hypercall clobbers 19672ae68d52f nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 5816902a7f..0f21f2e4d5 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -15,13 +15,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "35d6569f165579f64f76cbdfd1feb41a2b5359ec" -SRCREV_meta ?= "5b1ff7df002df6e7069a53b361d9e8f5f9df3aac" +SRCREV_machine ?= "6adb3759af2b8904cab35fdb1b40c12e17e313c1" +SRCREV_meta ?= "5025770c6104c36f0b102a1a813ee23d7151a755" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.69" +LINUX_VERSION ?= "6.12.72" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 5828ff986b..7cea4ea4f7 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc include recipes-kernel/linux/cve-exclusion.inc include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.69" +LINUX_VERSION ?= "6.12.72" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c" -SRCREV_meta ?= "5b1ff7df002df6e7069a53b361d9e8f5f9df3aac" +SRCREV_machine ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" +SRCREV_meta ?= "5025770c6104c36f0b102a1a813ee23d7151a755" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index 91b013f498..6f9906fb74 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "4c24c5ab253ea3f46bb578fe43d25877bc269206" -SRCREV_machine:qemuarm64 ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c" -SRCREV_machine:qemuloongarch64 ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c" -SRCREV_machine:qemumips ?= "377285b4e49c411f89784c6b1c374dbfb634e253" -SRCREV_machine:qemuppc ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c" -SRCREV_machine:qemuriscv64 ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c" -SRCREV_machine:qemuriscv32 ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c" -SRCREV_machine:qemux86 ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c" -SRCREV_machine:qemux86-64 ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c" -SRCREV_machine:qemumips64 ?= "f2e77270b007d80acbfc32114e81d1abc411e8b4" -SRCREV_machine ?= "a7fbaf7533ae7ebc35f56c0dfb86970eda4d721c" -SRCREV_meta ?= "5b1ff7df002df6e7069a53b361d9e8f5f9df3aac" +SRCREV_machine:qemuarm ?= "c4d3cba9c7fe4e4f7275fdaa50e35d479108813f" +SRCREV_machine:qemuarm64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" +SRCREV_machine:qemuloongarch64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" +SRCREV_machine:qemumips ?= "e5e61bd34c2ce267b67502f95dd3f11dfdb5c77e" +SRCREV_machine:qemuppc ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" +SRCREV_machine:qemuriscv64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" +SRCREV_machine:qemuriscv32 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" +SRCREV_machine:qemux86 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" +SRCREV_machine:qemux86-64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" +SRCREV_machine:qemumips64 ?= "482153ceffc764c453274f27e950fee03a0fe17e" +SRCREV_machine ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" +SRCREV_meta ?= "5025770c6104c36f0b102a1a813ee23d7151a755" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the <version>/base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "ff2177382799753070b71747f646963147eabc7c" +SRCREV_machine:class-devupstream ?= "19b3cac2b50b53cc000b4cd795415c7d03484707" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.69" +LINUX_VERSION ?= "6.12.72" PV = "${LINUX_VERSION}+git" -- 2.43.0 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 02/18] linux-yocto/6.12: update CVE exclusions (6.12.72) 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 01/18] linux-yocto/6.12: update to v6.12.72 bruce.ashfield @ 2026-04-23 15:44 ` bruce.ashfield 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 03/18] linux-yocto/6.12: update to v6.12.73 bruce.ashfield ` (16 subsequent siblings) 18 siblings, 0 replies; 20+ messages in thread From: bruce.ashfield @ 2026-04-23 15:44 UTC (permalink / raw) To: yoann.congal; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 1 changes (0 new | 1 updated): - 0 new CVEs: - 1 updated CVEs: CVE-2025-7195 Date: Mon, 16 Feb 2026 17:05:40 +0000 ] Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/cve-exclusion_6.12.inc | 232 +++++++++++++++++- 1 file changed, 225 insertions(+), 7 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 64477c364e..089446fe87 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-02-10 02:33:33.917945+00:00 for kernel version 6.12.69 -# From linux_kernel_cves cve_2026-02-10_0100Z +# Generated at 2026-02-16 17:20:15.768713+00:00 for kernel version 6.12.72 +# From linux_kernel_cves cve_2026-02-16_1600Z-3-gf0e5d9ffdc0 python check_kernel_cve_status_version() { - this_version = "6.12.69" + this_version = "6.12.72" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -18980,7 +18980,7 @@ CVE_STATUS[CVE-2025-40080] = "cpe-stable-backport: Backported in 6.12.53" CVE_STATUS[CVE-2025-40081] = "cpe-stable-backport: Backported in 6.12.53" -CVE_STATUS[CVE-2025-40082] = "fixed-version: only affects 6.17 onwards" +CVE_STATUS[CVE-2025-40082] = "cpe-stable-backport: Backported in 6.12.70" CVE_STATUS[CVE-2025-40083] = "cpe-stable-backport: Backported in 6.12.57" @@ -20066,8 +20066,6 @@ CVE_STATUS[CVE-2025-68787] = "cpe-stable-backport: Backported in 6.12.64" CVE_STATUS[CVE-2025-68788] = "cpe-stable-backport: Backported in 6.12.64" -CVE_STATUS[CVE-2025-68789] = "cpe-stable-backport: Backported in 6.12.64" - CVE_STATUS[CVE-2025-68790] = "fixed-version: only affects 6.18 onwards" CVE_STATUS[CVE-2025-68791] = "fixed-version: only affects 6.14 onwards" @@ -20134,7 +20132,7 @@ CVE_STATUS[CVE-2025-68821] = "cpe-stable-backport: Backported in 6.12.64" CVE_STATUS[CVE-2025-68822] = "cpe-stable-backport: Backported in 6.12.64" -# CVE-2025-68823 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2025-68823] = "cpe-stable-backport: Backported in 6.12.70" CVE_STATUS[CVE-2025-71064] = "cpe-stable-backport: Backported in 6.12.64" @@ -20376,6 +20374,26 @@ CVE_STATUS[CVE-2025-71198] = "cpe-stable-backport: Backported in 6.12.68" CVE_STATUS[CVE-2025-71199] = "cpe-stable-backport: Backported in 6.12.68" +CVE_STATUS[CVE-2025-71200] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2025-71201] = "fixed-version: only affects 6.14 onwards" + +# CVE-2025-71202 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2025-71203] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2025-71204] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2025-71220] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2025-71221 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2025-71222] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2025-71223] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2025-71224] = "cpe-stable-backport: Backported in 6.12.70" + CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66" CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.12.66" @@ -20646,3 +20664,203 @@ CVE_STATUS[CVE-2026-23109] = "fixed-version: only affects 6.16 onwards" CVE_STATUS[CVE-2026-23110] = "cpe-stable-backport: Backported in 6.12.68" +CVE_STATUS[CVE-2026-23111] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23112] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23113] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23114] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23115] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23116] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23117] = "fixed-version: only affects 6.18.2 onwards" + +CVE_STATUS[CVE-2026-23118] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23119] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23120] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23121] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23122] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23123] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23124] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23125] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23126] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23127] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23128] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23129] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23130] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23131] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23132] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23133] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23134] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23135] = "cpe-stable-backport: Backported in 6.12.68" + +CVE_STATUS[CVE-2026-23136] = "cpe-stable-backport: Backported in 6.12.66" + +# CVE-2026-23137 needs backporting (fixed from 6.19) + +# CVE-2026-23138 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23139] = "cpe-stable-backport: Backported in 6.12.66" + +CVE_STATUS[CVE-2026-23140] = "cpe-stable-backport: Backported in 6.12.66" + +CVE_STATUS[CVE-2026-23141] = "cpe-stable-backport: Backported in 6.12.67" + +CVE_STATUS[CVE-2026-23142] = "cpe-stable-backport: Backported in 6.12.67" + +CVE_STATUS[CVE-2026-23143] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23144] = "cpe-stable-backport: Backported in 6.12.67" + +CVE_STATUS[CVE-2026-23145] = "cpe-stable-backport: Backported in 6.12.67" + +CVE_STATUS[CVE-2026-23146] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23147] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23148] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23149] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23150] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23151] = "cpe-stable-backport: Backported in 6.12.69" + +# CVE-2026-23152 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23153] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23154] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23155] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23156] = "cpe-stable-backport: Backported in 6.12.69" + +# CVE-2026-23157 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23158] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23159] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23160] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23161] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23162] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23163] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23164] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23165] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23166] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23167] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23168] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23169] = "cpe-stable-backport: Backported in 6.12.72" + +CVE_STATUS[CVE-2026-23170] = "cpe-stable-backport: Backported in 6.12.69" + +# CVE-2026-23171 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23172] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23173] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23174] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23175] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23176] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23177] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23178] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23179] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23180] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23181] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23182] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23183] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23184] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23185] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23186] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23187] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23188] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23189] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23190] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23191] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23192] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23193] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23194] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23195] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23196] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23197] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23198] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23199] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23200] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23201] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23202] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23203] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23204] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23205] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23206] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23207] = "fixed-version: only affects 6.18.2 onwards" + +# CVE-2026-23208 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23209] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2026-23210 needs backporting (fixed from 6.19) + -- 2.43.0 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 03/18] linux-yocto/6.12: update to v6.12.73 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 01/18] linux-yocto/6.12: update to v6.12.72 bruce.ashfield 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 02/18] linux-yocto/6.12: update CVE exclusions (6.12.72) bruce.ashfield @ 2026-04-23 15:44 ` bruce.ashfield 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 04/18] linux-yocto/6.12: update CVE exclusions (6.12.73) bruce.ashfield ` (15 subsequent siblings) 18 siblings, 0 replies; 20+ messages in thread From: bruce.ashfield @ 2026-04-23 15:44 UTC (permalink / raw) To: yoann.congal; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: 5fb0303f6cb6a Linux 6.12.73 a7fa9460b86f8 Revert "driver core: enforce device_lock for driver_match_device()" Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 0f21f2e4d5..4572915cf4 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -15,13 +15,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "6adb3759af2b8904cab35fdb1b40c12e17e313c1" -SRCREV_meta ?= "5025770c6104c36f0b102a1a813ee23d7151a755" +SRCREV_machine ?= "1be6d1eaceba0860348c41af8951ccebfa5aa2c8" +SRCREV_meta ?= "6d166217a8feea3a7e961be354ea9deabeb8d356" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.72" +LINUX_VERSION ?= "6.12.73" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 7cea4ea4f7..d5c1c8c052 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc include recipes-kernel/linux/cve-exclusion.inc include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.72" +LINUX_VERSION ?= "6.12.73" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" -SRCREV_meta ?= "5025770c6104c36f0b102a1a813ee23d7151a755" +SRCREV_machine ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" +SRCREV_meta ?= "6d166217a8feea3a7e961be354ea9deabeb8d356" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index 6f9906fb74..5b6bf7ef0a 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "c4d3cba9c7fe4e4f7275fdaa50e35d479108813f" -SRCREV_machine:qemuarm64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" -SRCREV_machine:qemuloongarch64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" -SRCREV_machine:qemumips ?= "e5e61bd34c2ce267b67502f95dd3f11dfdb5c77e" -SRCREV_machine:qemuppc ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" -SRCREV_machine:qemuriscv64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" -SRCREV_machine:qemuriscv32 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" -SRCREV_machine:qemux86 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" -SRCREV_machine:qemux86-64 ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" -SRCREV_machine:qemumips64 ?= "482153ceffc764c453274f27e950fee03a0fe17e" -SRCREV_machine ?= "0ca0aa71c7c9f5f206a3748c1b9475ae1023d172" -SRCREV_meta ?= "5025770c6104c36f0b102a1a813ee23d7151a755" +SRCREV_machine:qemuarm ?= "a7cf22192ce38f303c8a5070b750583953a34e09" +SRCREV_machine:qemuarm64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" +SRCREV_machine:qemuloongarch64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" +SRCREV_machine:qemumips ?= "9a4ed79b88cab20c169656abe310068f8cdab2c3" +SRCREV_machine:qemuppc ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" +SRCREV_machine:qemuriscv64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" +SRCREV_machine:qemuriscv32 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" +SRCREV_machine:qemux86 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" +SRCREV_machine:qemux86-64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" +SRCREV_machine:qemumips64 ?= "0a68bc37afffea25aa627239d1de74f4b7088824" +SRCREV_machine ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" +SRCREV_meta ?= "6d166217a8feea3a7e961be354ea9deabeb8d356" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the <version>/base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "19b3cac2b50b53cc000b4cd795415c7d03484707" +SRCREV_machine:class-devupstream ?= "5fb0303f6cb6a89bcfb19bd7a68cb793c86e78b2" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.72" +LINUX_VERSION ?= "6.12.73" PV = "${LINUX_VERSION}+git" -- 2.43.0 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 04/18] linux-yocto/6.12: update CVE exclusions (6.12.73) 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield ` (2 preceding siblings ...) 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 03/18] linux-yocto/6.12: update to v6.12.73 bruce.ashfield @ 2026-04-23 15:44 ` bruce.ashfield 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 05/18] linux-yocto/6.12: update to v6.12.74 bruce.ashfield ` (14 subsequent siblings) 18 siblings, 0 replies; 20+ messages in thread From: bruce.ashfield @ 2026-04-23 15:44 UTC (permalink / raw) To: yoann.congal; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 9 changes (3 new | 6 updated): - 3 new CVEs: CVE-2026-0874, CVE-2026-0875, CVE-2026-23491 - 6 updated CVEs: CVE-2025-13601, CVE-2025-70062, CVE-2025-70063, CVE-2025-7195, CVE-2026-25500, CVE-2026-2661 Date: Wed, 18 Feb 2026 19:58:22 +0000 ] Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/cve-exclusion_6.12.inc | 72 ++++++++++++++++++- 1 file changed, 69 insertions(+), 3 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 089446fe87..92a12f2c1f 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-02-16 17:20:15.768713+00:00 for kernel version 6.12.72 -# From linux_kernel_cves cve_2026-02-16_1600Z-3-gf0e5d9ffdc0 +# Generated at 2026-02-18 20:12:59.836870+00:00 for kernel version 6.12.73 +# From linux_kernel_cves cve_2026-02-18_1900Z-2-ge0bc67e5ce4 python check_kernel_cve_status_version() { - this_version = "6.12.72" + this_version = "6.12.73" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -20394,6 +20394,32 @@ CVE_STATUS[CVE-2025-71223] = "cpe-stable-backport: Backported in 6.12.70" CVE_STATUS[CVE-2025-71224] = "cpe-stable-backport: Backported in 6.12.70" +CVE_STATUS[CVE-2025-71225] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2025-71226 needs backporting (fixed from 6.19) + +# CVE-2025-71227 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2025-71228] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2025-71229 has no known resolution + +# CVE-2025-71230 has no known resolution + +# CVE-2025-71231 has no known resolution + +# CVE-2025-71232 has no known resolution + +# CVE-2025-71233 has no known resolution + +# CVE-2025-71234 has no known resolution + +# CVE-2025-71235 has no known resolution + +# CVE-2025-71236 has no known resolution + +# CVE-2025-71237 has no known resolution + CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66" CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.12.66" @@ -20864,3 +20890,43 @@ CVE_STATUS[CVE-2026-23209] = "cpe-stable-backport: Backported in 6.12.70" # CVE-2026-23210 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-23211] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23212] = "cpe-stable-backport: Backported in 6.12.69" + +CVE_STATUS[CVE-2026-23213] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23214] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23215] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23216] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2026-23217 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23218] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23219] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2026-23220 has no known resolution + +# CVE-2026-23221 has no known resolution + +# CVE-2026-23222 has no known resolution + +# CVE-2026-23223 has no known resolution + +# CVE-2026-23224 has no known resolution + +# CVE-2026-23225 has no known resolution + +# CVE-2026-23226 has no known resolution + +# CVE-2026-23227 has no known resolution + +# CVE-2026-23228 has no known resolution + +# CVE-2026-23229 has no known resolution + +# CVE-2026-23230 has no known resolution + -- 2.43.0 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 05/18] linux-yocto/6.12: update to v6.12.74 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield ` (3 preceding siblings ...) 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 04/18] linux-yocto/6.12: update CVE exclusions (6.12.73) bruce.ashfield @ 2026-04-23 15:44 ` bruce.ashfield 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 06/18] linux-yocto/6.12: update CVE exclusions (6.12.74) bruce.ashfield ` (13 subsequent siblings) 18 siblings, 0 replies; 20+ messages in thread From: bruce.ashfield @ 2026-04-23 15:44 UTC (permalink / raw) To: yoann.congal; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: 444b39ef6108 Linux 6.12.74 9001c6815e53 USB: serial: option: add Telit FN920C04 RNDIS compositions 962c167b0f26 f2fs: fix IS_CHECKPOINTED flag inconsistency issue caused by concurrent atomic commit and checkpoint writes cf4a9e1bc812 f2fs: fix to avoid UAF in f2fs_write_end_io() 121f787e740d iommu/arm-smmu-qcom: do not register driver in probe() 1ff415eef513 f2fs: fix to avoid mapping wrong physical block for swapfile 4ef30b9f1641 f2fs: fix out-of-bounds access in sysfs attribute read/write b72d775424f5 f2fs: fix to check sysfs filename w/ gc_pin_file_thresh correctly aeb70609e6b5 f2fs: fix to add gc count stat in f2fs_gc_range 52917e265aa5 fbdev: smscufx: properly copy ioctl memory to kernelspace 9efa0dc46270 fbdev: rivafb: fix divide error in nv3_arb() 7b7829839dac cpuset: Fix missing adaptation for cpuset_is_populated e94b369ff82f Revert "wireguard: device: enable threaded NAPI" 56db97af7c89 LoongArch: Rework KASAN initialization for PTW-enabled systems da06bb0ca45b mm/hugetlb: fix excessive IPI broadcasts when unsharing PMD tables using mmu_gather baa198a93401 mm/hugetlb: fix two comments related to huge_pmd_unshare() 3a18b452dd5f mm/hugetlb: fix hugetlb_pmd_shared() b285b1fd51fa mm/hugetlb: fix copy_hugetlb_page_range() to use ->pt_share_count 56ef68a5b8a1 gpiolib: acpi: Fix gpio count with string references daaf4fe333e0 ASoC: fsl_xcvr: fix missing lock in fsl_xcvr_mode_put() 67484f35c447 drm/amd/display: remove assert around dpp_base replacement 7165dc5133fb drm/amd/display: extend delta clamping logic to CM3 LUT helper 02d209bb018a tracing/dma: Cap dma_map_sg tracepoint arrays to prevent buffer overflow ded6043c3358 ASoC: cs42l43: Correct handling of 3-pole jack load detection b3851fb4aba8 platform/x86: panasonic-laptop: Fix sysfs group leak in error path bc3da98445cf platform/x86/amd/pmc: Add quirk for MECHREVO Wujie 15X Pro db8799e80cb7 ALSA: hda/realtek: Enable headset mic for Acer Nitro 5 c9575a0cd571 ASoC: amd: yc: Add quirk for HP 200 G2a 16 a1ad7bbeafd7 ASoC: Intel: sof_es8336: Add DMI quirk for Huawei BOD-WXX9 da6e06a5fdba platform/x86: classmate-laptop: Add missing NULL pointer checks 45668b63be01 drm/tegra: hdmi: sor: Fix error: variable ‘j’ set but not used 9b203b8ddd73 romfs: check sb_set_blocksize() return value 59ec2c61fe03 ALSA: hda/realtek - fixed speaker no sound 10a948cb71d1 ASoC: cs35l45: Corrects ASP_TX5 DAPM widget channel 284ded9e5b72 ALSA: hda/realtek: Add quirk for Inspur S14-G1 5beb4ddac6a9 gpio: sprd: Change sprd_gpio lock to raw_spin_lock 8a6e19a406d8 ASoC: amd: yc: Add ASUS ExpertBook PM1503CDA to quirks list 209d027747cb ALSA: hda/realtek: Fix headset mic for TongFang X6AR55xU dd8ba8c0c3f3 bus: fsl-mc: fix use-after-free in driver_override_show() b7a5b454b7f7 bus: fsl-mc: Replace snprintf and sprintf with sysfs_emit in sysfs show functions a22fe7581f11 bnxt_en: hide CONFIG_DETECT_HUNG_TASK specific code 7096cc734240 bnxt_en: Change FW message timeout warning 871f6236da96 scsi: qla2xxx: Fix bsg_done() causing double free Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 4572915cf4..a8d17a5c14 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -15,13 +15,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "1be6d1eaceba0860348c41af8951ccebfa5aa2c8" -SRCREV_meta ?= "6d166217a8feea3a7e961be354ea9deabeb8d356" +SRCREV_machine ?= "96b72162b68a3a6084945ef4bf357a3de5c196ed" +SRCREV_meta ?= "d427132ce6626fdae8a1690305e1b578a5509699" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.73" +LINUX_VERSION ?= "6.12.74" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index d5c1c8c052..22b15e69f2 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc include recipes-kernel/linux/cve-exclusion.inc include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.73" +LINUX_VERSION ?= "6.12.74" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" -SRCREV_meta ?= "6d166217a8feea3a7e961be354ea9deabeb8d356" +SRCREV_machine ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" +SRCREV_meta ?= "d427132ce6626fdae8a1690305e1b578a5509699" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index 5b6bf7ef0a..92807f9057 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "a7cf22192ce38f303c8a5070b750583953a34e09" -SRCREV_machine:qemuarm64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" -SRCREV_machine:qemuloongarch64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" -SRCREV_machine:qemumips ?= "9a4ed79b88cab20c169656abe310068f8cdab2c3" -SRCREV_machine:qemuppc ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" -SRCREV_machine:qemuriscv64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" -SRCREV_machine:qemuriscv32 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" -SRCREV_machine:qemux86 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" -SRCREV_machine:qemux86-64 ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" -SRCREV_machine:qemumips64 ?= "0a68bc37afffea25aa627239d1de74f4b7088824" -SRCREV_machine ?= "b67de812f086e14ab0897455a7bdc17dd9b0d6de" -SRCREV_meta ?= "6d166217a8feea3a7e961be354ea9deabeb8d356" +SRCREV_machine:qemuarm ?= "f4b46d6d3a4e38d532c5e11866d3d071ae398f16" +SRCREV_machine:qemuarm64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" +SRCREV_machine:qemuloongarch64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" +SRCREV_machine:qemumips ?= "da8487babd144628f801a204696523e077829fa2" +SRCREV_machine:qemuppc ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" +SRCREV_machine:qemuriscv64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" +SRCREV_machine:qemuriscv32 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" +SRCREV_machine:qemux86 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" +SRCREV_machine:qemux86-64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" +SRCREV_machine:qemumips64 ?= "29ca2370cd8722cc5fd712f4a6b4757ad84fde3e" +SRCREV_machine ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" +SRCREV_meta ?= "d427132ce6626fdae8a1690305e1b578a5509699" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the <version>/base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "5fb0303f6cb6a89bcfb19bd7a68cb793c86e78b2" +SRCREV_machine:class-devupstream ?= "444b39ef6108313e8452010b22aaba588e8fb92b" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.73" +LINUX_VERSION ?= "6.12.74" PV = "${LINUX_VERSION}+git" -- 2.43.0 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 06/18] linux-yocto/6.12: update CVE exclusions (6.12.74) 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield ` (4 preceding siblings ...) 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 05/18] linux-yocto/6.12: update to v6.12.74 bruce.ashfield @ 2026-04-23 15:44 ` bruce.ashfield 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 07/18] linux-yocto/6.12: update to v6.12.76 bruce.ashfield ` (12 subsequent siblings) 18 siblings, 0 replies; 20+ messages in thread From: bruce.ashfield @ 2026-04-23 15:44 UTC (permalink / raw) To: yoann.congal; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 1 changes (1 new | 0 updated): - 1 new CVEs: CVE-2026-2971 - 0 updated CVEs: Date: Mon, 23 Feb 2026 04:58:05 +0000 ] Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/cve-exclusion_6.12.inc | 48 +++++++++---------- 1 file changed, 24 insertions(+), 24 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 92a12f2c1f..c7726e1306 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-02-18 20:12:59.836870+00:00 for kernel version 6.12.73 -# From linux_kernel_cves cve_2026-02-18_1900Z-2-ge0bc67e5ce4 +# Generated at 2026-02-23 05:12:32.087151+00:00 for kernel version 6.12.74 +# From linux_kernel_cves cve_2026-02-23_0400Z-1-g3cbc7410733 python check_kernel_cve_status_version() { - this_version = "6.12.73" + this_version = "6.12.74" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -20402,23 +20402,23 @@ CVE_STATUS[CVE-2025-71225] = "cpe-stable-backport: Backported in 6.12.70" CVE_STATUS[CVE-2025-71228] = "cpe-stable-backport: Backported in 6.12.70" -# CVE-2025-71229 has no known resolution +CVE_STATUS[CVE-2025-71229] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2025-71230 has no known resolution +CVE_STATUS[CVE-2025-71230] = "fixed-version: only affects 6.13 onwards" -# CVE-2025-71231 has no known resolution +CVE_STATUS[CVE-2025-71231] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2025-71232 has no known resolution +CVE_STATUS[CVE-2025-71232] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2025-71233 has no known resolution +CVE_STATUS[CVE-2025-71233] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2025-71234 has no known resolution +CVE_STATUS[CVE-2025-71234] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2025-71235 has no known resolution +CVE_STATUS[CVE-2025-71235] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2025-71236 has no known resolution +CVE_STATUS[CVE-2025-71236] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2025-71237 has no known resolution +CVE_STATUS[CVE-2025-71237] = "cpe-stable-backport: Backported in 6.12.72" CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66" @@ -20668,7 +20668,7 @@ CVE_STATUS[CVE-2026-23098] = "cpe-stable-backport: Backported in 6.12.68" CVE_STATUS[CVE-2026-23099] = "cpe-stable-backport: Backported in 6.12.68" -CVE_STATUS[CVE-2026-23100] = "fixed-version: only affects 6.13 onwards" +CVE_STATUS[CVE-2026-23100] = "cpe-stable-backport: Backported in 6.12.74" CVE_STATUS[CVE-2026-23101] = "cpe-stable-backport: Backported in 6.12.68" @@ -20908,25 +20908,25 @@ CVE_STATUS[CVE-2026-23218] = "fixed-version: only affects 6.18 onwards" CVE_STATUS[CVE-2026-23219] = "cpe-stable-backport: Backported in 6.12.70" -# CVE-2026-23220 has no known resolution +CVE_STATUS[CVE-2026-23220] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2026-23221 has no known resolution +CVE_STATUS[CVE-2026-23221] = "cpe-stable-backport: Backported in 6.12.74" -# CVE-2026-23222 has no known resolution +CVE_STATUS[CVE-2026-23222] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2026-23223 has no known resolution +CVE_STATUS[CVE-2026-23223] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2026-23224 has no known resolution +CVE_STATUS[CVE-2026-23224] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2026-23225 has no known resolution +CVE_STATUS[CVE-2026-23225] = "fixed-version: only affects 6.19 onwards" -# CVE-2026-23226 has no known resolution +# CVE-2026-23226 needs backporting (fixed from 7.0rc1) -# CVE-2026-23227 has no known resolution +# CVE-2026-23227 needs backporting (fixed from 7.0rc1) -# CVE-2026-23228 has no known resolution +CVE_STATUS[CVE-2026-23228] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2026-23229 has no known resolution +CVE_STATUS[CVE-2026-23229] = "cpe-stable-backport: Backported in 6.12.72" -# CVE-2026-23230 has no known resolution +CVE_STATUS[CVE-2026-23230] = "cpe-stable-backport: Backported in 6.12.72" -- 2.43.0 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 07/18] linux-yocto/6.12: update to v6.12.76 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield ` (5 preceding siblings ...) 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 06/18] linux-yocto/6.12: update CVE exclusions (6.12.74) bruce.ashfield @ 2026-04-23 15:44 ` bruce.ashfield 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 08/18] linux-yocto/6.12: update CVE exclusions (6.12.76) bruce.ashfield ` (11 subsequent siblings) 18 siblings, 0 replies; 20+ messages in thread From: bruce.ashfield @ 2026-04-23 15:44 UTC (permalink / raw) To: yoann.congal; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: 39b686f8d57d Linux 6.12.76 412c9b54585c Revert "x86/kexec: add a sanity check on previous kernel's ima kexec buffer" c1924e059c72 Linux 6.12.75 bbfe49ffb892 most: core: fix leak on early registration failure 9f3ffd49da12 arm64: Fix sampling the "stable" virtual counter in preemptible section 1147ab1336bc xfs: fix copy-paste error in previous fix c2bc05dc5ff2 drm/i915/wakeref: clean up INTEL_WAKEREF_PUT_* flag macros 5af4761d11a7 ALSA: pcm: Revert bufs move in snd_pcm_xfern_frames_ioctl() 26034b60d806 NTB: ntb_transport: Fix too small buffer for debugfs_name af45c677dbf9 tracing: Wake up poll waiters for hist files when removing an event 588c08026d6a tracing: Fix checking of freed trace_event_file for hist files fea7c9a23c0f fgraph: Do not call handlers direct when not using ftrace_ops b4700c089a10 tracing: ring-buffer: Fix to check event length before using 3b91160e9a91 net: nfc: nci: Fix parameter validation for packet data bd135851106c drm/amdgpu: keep vga memory on MacBooks with switchable graphics 5fc0933641a8 arm64: Force the use of CNTVCT_EL0 in __delay() d95f0851cf40 x86/kexec: Copy ACPI root pointer address from config table 015cebdfcb97 net/sched: act_skbedit: fix divide-by-zero in tcf_skbedit_hash() 1b1371cd4032 net: ethernet: ec_bhf: Fix dma_free_coherent() dma handle 8122e05bd27b ASoC: amd: yc: Add DMI quirk for ASUS Vivobook Pro 15X M6501RR 1d731e512134 cifs: some missing initializations on replay f73b3653a4c3 fbcon: Remove struct fbcon_display.inverse 8225baf882d5 fbdev: ffb: fix corrupted video output on Sun FFB1 d6f34bbff074 fbdev: of: display_timing: fix refcount leak in of_get_display_timings() f47d5b9e8aa6 fbdev: vt8500lcdfb: fix missing dma_free_coherent() 0b038c0be682 fbcon: check return value of con2fb_acquire_newinfo() e93d898ee997 mm: numa_memblks: Identify the accurate NUMA ID of CFMW 0591d6509c2f ipv6: ioam: fix heap buffer overflow in __ioam6_fill_trace_data() 91892dafccb1 function_graph: Restore direct mode when callbacks drop to one 97900f512252 atm: fore200e: fix use-after-free in tasklets during device removal df4308cb52dc net: intel: fix PCI device ID conflict between i40e and ipw2200 f9fe092084cd procfs: fix possible double mmput() in do_procmap_query() 82a7ea35a152 drm/amdgpu: fix sync handling in amdgpu_dma_buf_move_notify 8f08df326752 drm/amd/display: Increase DCN35 SR enter/exit latency 5cfc202825ba io_uring/filetable: clamp alloc_hint to the configured alloc range 74f7e464ad88 tracing: Fix to set write permission to per-cpu buffer_size_kb 6e704e89f16f net: macb: Fix tx/rx malfunction after phy link down and up 86ad5c4ac790 net: ti: icssg-prueth: Add optional dependency on HSR ccef79af58b4 octeontx2-af: CGX: fix bitmap leaks 84b932bc9899 net: wan/fsl_ucc_hdlc: Fix dma_free_coherent() in uhdlc_memclean() f73c042724d9 net: ethernet: marvell: skge: remove incorrect conflicting PCI ID e6e65be0752f LoongArch: Disable instrumentation for setup_ptwalker() 35a384eb064e LoongArch: Guard percpu handler under !CONFIG_PREEMPT_RT 808ac152e46a LoongArch: Use %px to print unmodified unwinding address af7db33e5d2e LoongArch: Prefer top-down allocation after arch_mem_init() 92adfb707bee LoongArch: Make cpumask_of_node() robust against NUMA_NO_NODE 4f5b7016e552 rust: kbuild: pass `-Zunstable-options` for Rust 1.95.0 531a76c5a2e4 ceph: supply snapshot context in ceph_zero_partial_object() e7d70a77ad6f MIPS: rb532: Fix MMIO UART resource registration 601dd3b79769 cifs: Fix locking usage for tcon fields 7d9e0df82207 watchdog/softlockup: fix sample ring index wrap in need_counting_irqs() 3713af7e95a3 kcsan, compiler_types: avoid duplicate type issues in BPF Type Format 04d24a3654ed staging: rtl8723bs: fix null dereference in find_network 6d2dae6b97bd parisc: kernel: replace kfree() with put_device() in create_tree_node() 0425aaf20b40 PCI: Fix pci_slot_trylock() error handling 87ab6b527f07 net: cpsw_new: Fix unnecessary netdev unregistration in cpsw_probe() error path 75fb57efdd78 drm/amdkfd: Fix out-of-bounds write in kfd_event_page_set() 43bc12f6d611 tipc: fix RCU dereference race in tipc_aead_users_dec() a4b964b7377c mtd: rawnand: pl353: Fix software ECC support 42ef7c504ae5 usb: dwc2: fix resume failure if dr_mode is host a7a80c25b651 usb: dwc3: gadget: Move vbus draw to workqueue context f3132336db39 PCI: dwc: Fix msg_atu_index assignment b6e5cef4d6df mm/slab: use unsigned long for orig_size to ensure proper metadata align aac2fee7513d scsi: ufs: core: Flush exception handling work when RPM level is zero 00d69f21ef2a perf/arm-cmn: Reject unsupported hardware configurations 65379adf7d23 remoteproc: imx_rproc: Fix invalid loaded resource table detection e00549dd86f5 btrfs: continue trimming remaining devices on failure 2f926875dffe clk: rs9: Reserve 8 struct clk_hw slots for for 9FGV0841 0ca20d699b64 arm64: Fix non-atomic __READ_ONCE() with CONFIG_LTO=y 97c18f074ff1 PCI/IOV: Fix race between SR-IOV enable/disable and hotplug d47f27e145f8 Revert "PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV" 875355152b33 kexec: derive purgatory entry from symbol b2952dbeac2c ocfs2: fix reflink preserve cleanup issue 87272e3e70ec rapidio: replace rio_free_net() with kfree() in rio_scan_alloc_net() 68b5efd6c6b3 mm/highmem: fix __kmap_to_page() build error 27d953201eae mtd: spinand: Disable continuous read during probe 7037f3161a6d iio: gyro: itg3200: Fix unchecked return value in read_raw ca46d2092f30 powerpc/smp: Add check for kcalloc() failure in parse_thread_groups() ddb57354634b vhost: move vdpa group bound check to vhost_vdpa 74a29a02ff65 tools: Fix bitfield dependency failure 9bc366175509 arm64: poe: fix stale POR_EL0 values for ptrace 052c611bcb28 dm mpath: make pg_init_delay_msecs settable a7733b51cd74 bus: fsl-mc: fix an error handling in fsl_mc_device_add() d1d07cbeca04 io_uring/net: don't continue send bundle if poll was required for retry 37b14e59db5d usb: gadget: tegra-xudc: Add handling for BLCG_COREPLL_PWRDN 2efa9c02c9b4 mm/vmalloc: prevent RCU stalls in kasan_release_vmalloc_node f8f73bf0f8a5 x86/kexec: add a sanity check on previous kernel's ima kexec buffer 77a31097d6df nvmem: Drop OF node reference on nvmem_add_one_cell() failure 982815bb0455 nfsd: fix return error code for nfsd_map_name_to_[ug]id a437e3bf30e3 md/bitmap: fix GPF in write_page caused by resize race d69de525bc7a xfs: check for deleted cursors when revalidating two btrees d6f3f7d4dd8a xfs: check return value of xchk_scrub_create_subord 5de5be3ed7e7 xfs: only call xf{array,blob}_destroy if we have a valid pointer 078e78821d91 pinctrl: intel: Add code name documentation 339191811e6f PCI: endpoint: Fix swapped parameters in pci_{primary/secondary}_epc_epf_unlink() functions 9f2bfea51151 KVM: x86: Add SRCU protection for reading PDPTRs in __get_sregs2() 1c9b6aad70e5 xfs: fix remote xattr valuelblk check 084d39d7847f xfs: fix the xattr scrub to detect freemap/entries array collisions ef42a8766ff3 xfs: fix freemap adjustments when adding xattrs to leaf blocks e1b8c6452ee9 xfs: delete attr leaf freemap entries when empty a40f31608598 iio: accel: adxl380: Avoid reading more entries than present in FIFO 90cde30d8815 mfd: omap-usb-host: Fix OF populate on driver rebind 428cfd5d5a50 mfd: qcom-pm8xxx: Fix OF populate on driver rebind db131ef9d898 mfd: core: Add locking around 'mfd_of_node_list' 9813306610d0 iommu/vt-d: Flush dev-IOTLB only when PCIe device is accessible in scalable mode 34f36f9c6114 media: verisilicon: AV1: Fix tile info buffer size 2fbc8421d1db xfs: remove xfs_attr_leaf_hasname 3628a1a38404 xfs: mark data structures corrupt on EIO and ENODATA 96775be9f12f drm/bridge: anx7625: Fix invalid EDID size d764b8dd4200 drm/buddy: Prevent BUG_ON by validating rounded allocation 51d54ff2b750 selftests/mm/charge_reserved_hugetlb: drop mount size for hugetlbfs 11165f420b2a mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations cbae775b2265 drm: of: drm_of_panel_bridge_remove(): fix device_node leak 087d915bb1ea media: venus: vdec: restrict EOS addr quirk to IRIS2 only 99cf4a8fbf9e media: venus: vdec: fix error state assignment for zero bytesused 63922c96e137 arm64: dts: rockchip: Do not enable hdmi_sound node on Pinebook Pro fbcc04ad7aec dm-unstripe: fix mapping bug when there are multiple targets in a table c6138af1f545 dm-integrity: fix recalculation in bitmap mode 09d6efc6abd4 reset: gpio: suppress bind attributes in sysfs f0cddb616f75 s390/pci: Handle futile config accesses of disabled devices directly 5aa2b0450031 clk: tegra: tegra124-emc: Fix potential memory leak in tegra124_clk_register_emc() d5952a3bfdd6 media: i2c: ov01a10: Fix digital gain range 330d37a24ecb media: stm32: dcmipp: bytecap: clear all interrupts upon stream stop bac9fc78f367 soc: rockchip: grf: Support multiple grf to be handled 61dfbb6bb9ee soc: rockchip: grf: Fix wrong RK3576_IOCGRF_MISC_CON definition 5059221d2ead clk: clk-apple-nco: Add "apple,t8103-nco" compatible 5b958dfe278f bus: omap-ocp2scp: fix OF populate on driver rebind fce2fd4a2ca0 KVM: nSVM: Always use vmcb01 in VMLOAD/VMSAVE emulation 69aa67c1e22d soc: ti: pruss: Fix double free in pruss_clk_mux_setup() eaa16059f9af soc: ti: k3-socinfo: Fix regmap leak on probe failure e2e738e8dfbb dm: clear cloned request bio pointer when last clone bio completes b95a9810c38c dm-integrity: fix a typo in the code for write/discard race e438caff813f platform/x86: ISST: Add missing write block check fdc06d36dab7 media: ipu6: Fix RPM reference leak in probe error paths 92019e41c1fe media: ipu6: Fix typo and wrong constant in ipu6-mmu.c 13aa594f5f7e media: i2c: ov5647: use our own mutex for the ctrl lock e83c4debf2c1 media: ccs: Fix setting initial sub-device state ecba356cd7c6 media: i2c: ov5647: Fix PIXEL_RATE value for VGA mode fbf2a108ed5e media: i2c: ov5647: Sensor should report RAW color space ff65571ffae5 media: i2c: ov5647: Correct minimum VBLANK value 58f1767ad5c9 media: i2c: ov5647: Correct pixel array offset 2dedda97a64e media: i2c: ov5647: Initialize subdev before controls 32a21ed2ad74 media: ccs: Avoid possible division by zero 1b103307df6d media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update() b9c3b0a13636 media: i2c: ov01a10: Fix test-pattern disabling b32a74bdc0a6 media: i2c: ov01a10: Fix passing stream instead of pad to v4l2_subdev_state_get_format() 93804dda39f0 media: i2c: ov01a10: Add missing v4l2_subdev_cleanup() calls 79dff20b1a57 media: i2c: ov01a10: Fix analogue gain range fe3e92312a46 media: i2c: ov01a10: Fix reported pixel-rate value 577dafd9f68e media: i2c: ov01a10: Fix the horizontal flip control fb09d8b80046 media: i2c/tw9906: Fix potential memory leak in tw9906_probe() a114918270f0 media: i2c/tw9903: Fix potential memory leak in tw9903_probe() 2df98c45a74a media: cx25821: Add missing unmap in snd_cx25821_hw_params() 9c0a6ff53866 media: cx23885: Add missing unmap in snd_cx23885_hw_params() e3fb15aadfc8 media: cx88: Add missing unmap in snd_cx88_hw_params() 7fa9754f48cb media: radio-keene: fix memory leak in error path cffde73f0d5f media: verisilicon: AV1: Set IDR flag for intra_only frame type 5da29ade540b media: rockchip: rga: Fix possible ERR_PTR dereference in rga_buf_init() 4ff5b0fd1faa media: amphion: Drop min_queued_buffers assignment b19beca4ae66 arm64: dts: apple: t8112-j473: Keep the HDMI port powered on f1ceaaf93ea3 HID: logitech-hidpp: Check maxfield in hidpp_get_report_length() e7ac1cd823cd HID: prodikeys: Check presence of pm->input_ep82 922bd3e498a4 HID: magicmouse: Do not crash on missing msc->input 04e50f45b517 HID: hid-pl: handle probe errors 43a19467d3f3 arm64: Disable branch profiling for all arm64 code ce904c8a5bbe KVM: nSVM: Remove a user-triggerable WARN on nested_svm_load_cr3() succeeding c481d4edf070 KVM: x86: Return "unsupported" instead of "invalid" on access to unsupported PV MSR b61843503d54 ARM: omap2: Fix reference count leaks in omap_control_init() 8c73302be475 arm64: dts: qcom: x1e80100: Add missing TCSR ref clock to the DP PHYs 885e26f6845d media: verisilicon: AV1: Fix tx mode bit setting 72e6e79568f3 media: verisilicon: AV1: Fix enable cdef computation b73d85231d5b media: chips-media: wave5: Fix device cleanup order to prevent kernel panic 156020e889ed media: chips-media: wave5: Fix kthread worker destruction in polling mode 4f2a51433a3a media: mtk-mdp: Fix a reference leak bug in mtk_mdp_remove() c8737d33d4e8 media: mtk-mdp: Fix error handling in probe function fe17309d9bf7 media: mediatek: encoder: Fix uninitialized scalar variable issue 9b8dc1d327e2 dm-verity: correctly handle dm_bufio_client_create() failure ff613d11f78e phy: qcom: edp: Make the number of clocks flexible 6ad50d3a1670 Revert "PCI: qcom: Enable MSI interrupts together with Link up if 'Global IRQ' is supported" 57fa97ae2385 drm/tests: shmem: Swap names of export tests 501ace56f3f8 fpga: dfl: use subsys_initcall to allow built-in drivers to be added 885ec8577622 ASoC: SOF: ipc4-control: Keep the payload size up to date 20b55c3831cf ASoC: SOF: ipc4-control: Use the correct size for scontrol->ipc_control_data 491956b45b5f ASoC: SOF: ipc4-topology: Correct the allocation size for bytes controls 698988dda4db ASoC: SOF: ipc4-control: If there is no data do not send bytes update 47671671a370 clk: renesas: rzg2l: Select correct div round macro 2f7042ca608d clk: renesas: rzg2l: Fix intin variable size 7654e6e3cd6b rpmsg: core: fix race in driver_override_show() and use core helper 53d32735d77a netfilter: nf_conntrack_h323: fix OOB read in decode_choice() 8b841fd529db dpaa2-switch: validate num_ifs to prevent out-of-bounds write ea5d7787635e net: consume xmit errors of GSO frames e1407fb7c337 net/mlx5e: Fix "scheduling while atomic" in IPsec MAC address query c7bbd8632bcf net/mlx5e: Support routed networks during IPsec MACs initialization b32498dd7621 net/mlx5e: Separate address related variables to be in struct 2e4c69121156 net/mlx5: Fix missing devlink lock in SRIOV enable error path 53f5c553149a net/mlx5: E-switch, Clear legacy flag when moving to switchdev 6a825a26f9e3 net/mlx5: DR, Fix circular locking dependency in dump ba3bf0f1bf1d RDMA/umem: Fix double dma_buf_unpin in failure path 67ba6b13dbca net: usb: pegasus: enable basic endpoint checking f21d71a0962a RDMA/efa: Fix typo in efa_alloc_mr() 200bdb8d367c net: wan: farsync: Fix use-after-free bugs caused by unfinished tasklets 36abfc850cdf RDMA/core: Fix stale RoCE GIDs during netdev events at registration 075cbc1a4aa2 tipc: fix duplicate publication key in tipc_service_insert_publ() 9ea3671d70ee kcm: fix zero-frag skb in frag_list on partial sendmsg error a5de36d6cee7 tls: Fix race condition in tls_sw_cancel_work_tx() ec91078e1321 Bluetooth: L2CAP: Fix missing key size check for L2CAP_LE_CONN_REQ ffb7214f04da Bluetooth: L2CAP: Fix not checking output MTU is acceptable on L2CAP_ECRED_CONN_REQ 730058f51b8f Bluetooth: L2CAP: Fix response to L2CAP_ECRED_CONN_REQ 8285742519b5 Bluetooth: hci_qca: Cleanup on all setup failures 935f324e4b24 Bluetooth: L2CAP: Fix result of L2CAP_ECRED_CONN_RSP when MTU is too short 1e09410c98fe Bluetooth: L2CAP: Fix invalid response to L2CAP_ECRED_RECONF_REQ 464808911fb9 Remove WARN_ALL_UNSEEDED_RANDOM kernel config option f204c1379a98 wifi: cfg80211: wext: fix IGTK key ID off-by-one cf95db5e33bd bnxt_en: Fix deleting of Ntuple filters 348a5f8d06c7 bnxt_en: Fix RSS context delete logic 21d1e80d0d6e net: ethernet: xscale: Check for PTP support properly d077c45b34b8 net: ixp4xx_eth: convert to ndo_hwtstamp_get() and ndo_hwtstamp_set() b88194c1cfe7 net: usb: lan78xx: scan all MDIO addresses on LAN7801 9c79b839a639 net: usb: kaweth: remove TX queue manipulation in kaweth_set_rx_mode f7ad8b1d0e42 espintcp: Fix race condition in espintcp_close() a3c8fede034f xfrm: always flush state and policy upon NETDEV_UNREGISTER event 2dfbc8c17dd1 ipmi: ipmb: initialise event handler read bytes f1713988e932 xfrm: skip templates check for packet offload tunnel mode dc0abce05513 xfrm6: fix uninitialized saddr in xfrm6_get_saddr() 2e4d5e8d86a9 ntb: ntb_hw_switchtec: Fix shift-out-of-bounds for 0 mw lut 0e9304209451 ntb: ntb_hw_switchtec: Fix array-index-out-of-bounds access faf7f4073d5d rtc: zynqmp: correct frequency value d4c08521c77d drm/amd/display: Remove conditional for shaper 3DLUT power-on 5c3de2cae7ce arm64: hugetlbpage: avoid unused-but-set-parameter warning (gcc-16) 4f2eb019d87b btrfs: replace BUG() with error handling in __btrfs_balance() fc9e5af60dc1 ALSA: usb-audio: Add sanity check for OOB writes at silencing 7a3b0a893b94 drm/radeon: Add HAINAN clock adjustment f8431b867223 spi: spidev: fix lock inversion between spi_lock and buf_lock b701db9f535a drm/amd/display: bypass post csc for additional color spaces in dal 6561e0914ac9 drm/amdgpu: Add HAINAN clock adjustment 32a1f64f8ff6 ALSA: usb-audio: Update the number of packets properly at receiving 2d9cb8a280aa drm/amdgpu: Adjust usleep_range in fence wait 3fb5155a39ab drm/amd/display: Avoid updating surface with the same surface under MPO 761b208dfafc drm/amd/display: Fix system resume lag issue 9a4483972bf7 drm/amd/display: Fix writeback on DCN 3.2+ 8ec5b525221e ARM: 9467/1: mm: Don't use %pK through printk 44c8c02779bf include: uapi: netfilter_bridge.h: Cover for musl libc 09e437ba3f2d ACPI: x86: Force enabling of PWM2 on the Yogabook YB1-X90 ecd2fc9e4c32 thermal: int340x: Fix sysfs group leak on DLVR registration failure 1b275bd49e58 libceph: define and enforce CEPH_MAX_KEY_LEN a46cec9cc5b2 ceph: supply snapshot context in ceph_uninline_data() 39aef9080f27 fs/ntfs3: avoid calling run_get_entry() when run == NULL in ntfs_read_run_nb_ra() 9b877e5e1cbf fs/ntfs3: drop preallocated clusters for sparse and compressed files 7ef219656feb fs: ntfs3: fix infinite loop triggered by zero-sized ATTR_LIST 78b61f7eac37 fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata 398e768d1acc fs: ntfs3: check return value of indx_find to avoid infinite loop 0569822bb36c MIPS: Loongson: Make cpumask_of_node() robust against NUMA_NO_NODE f86bee0ef4fd iio: magnetometer: Remove IRQF_ONESHOT 48be61552318 iio: Use IRQF_NO_THREAD a4c154685855 mfd: intel-lpss: Add Intel Nova Lake-S PCI IDs 1fb137d985f2 Revert "mfd: da9052-spi: Change read-mask to write-mask" 0bfb54195be6 phy: fsl-imx8mq-usb: disable bind/unbind platform driver feature c435e63530f7 phy: mvebu-cp110-utmi: fix dr_mode property read from dts 5db6da613e9c watchdog: imx7ulp_wdt: handle the nowayout option 21cc92fddf4f binder: don't use %pK through printk bf66b535daed fix it87_wdt early reboot by reporting running timer 29e9413dfae9 serial: 8250: 8250_omap.c: Clear DMA RX running status only after DMA termination is done aebf83897bb6 serial: 8250: 8250_omap.c: Add support for handling UART error conditions 9f70f78e22b3 staging: rtl8723bs: fix memory leak on failure path 1b72b834511d usb: chipidea: udc: fix DMA and SG cleanup in _ep_nuke() f505b91db2c0 usb: gadget: f_fs: Fix ioctl error handling 3875c8eca2df usb: gadget: f_fs: fix DMA-BUF OUT queues 4d55fe3cd765 misc: eeprom: Fix EWEN/EWDS/ERAL commands for 93xx56 and 93xx66 aa97ccc3dc1e misc: bcm_vk: Fix possible null-pointer dereferences in bcm_vk_read() 297428ee6f6e phy: cadence-torrent: restore parent clock for refclk during resume 2930ddda9273 phy: ti: phy-j721e-wiz: restore mux selection during resume 874558ec341b dmaengine: stm32-mdma: initialize m2m_hw_period and ccr to fix warnings 340d7c73dab7 dmaengine: sun6i: Choose appropriate burst length under maxburst a49028a796d7 most: core: fix resource leak in most_register_interface error paths 12afc931e7c7 fpga: of-fpga-region: Fail if any bridge is missing 0945ed3284e9 usb: typec: ucsi: psy: Fix voltage and current max for non-Fixed PDOs 3590c1751c1d serial: 8250_dw: handle clock enable errors in runtime_resume 98d6bdb521f2 staging: rtl8723bs: fix missing status update on sdio_alloc_irq() failure 23aaf922bd3e soundwire: intel_auxdevice: add cs42l45 codec to wake_capable_list d6f73398da63 soundwire: dmi-quirks: add mapping for Avell B.ON (OEM rebranded of NUC15) 0e6bf9b4e291 dmaengine: stm32-dma3: use module_platform_driver a5d00dff9711 9p/xen: protect xen_9pfs_front_free against concurrent calls edc3261ceb73 m68k: nommu: fix memmove() with differently aligned src and dest for 68000 bc775cc7c085 HID: i2c-hid: Add FocalTech FT8112 563a6ab857b3 clk: microchip: core: correct return value on *_get_parent() 8d6bc7da8021 mailbox: sprd: clear delivery flag before handling TX done 22cfa9e10cfa remoteproc: mediatek: Break lock dependency to `prepare_lock` 34035ddfbd77 mailbox: sprd: mask interrupts that are not handled 9824db3eadb3 mailbox: imx: Skip the suspend flag for i.MX7ULP fa3635fa761a mailbox: pcc: Remove spurious IRQF_ONESHOT usage b74e552df8e5 remoteproc: imx_dsp_rproc: Skip RP_MBOX_SUSPEND_SYSTEM when mailbox TX channel is uninitialized 37b7cc18380c tracing: Fix false sharing in hwlat get_sample() f7fc25362c07 riscv: vector: init vector context with proper vlenb d42ec56b30ba scsi: ufs: mediatek: Fix page faults in ufs_mtk_clk_scale() trace event 2fcdc1ccc201 vhost: fix caching attributes of MMIO regions by setting them explicitly c45363db0d5f scsi: buslogic: Reduce stack usage dbf9416360aa hisi_acc_vfio_pci: update status after RAS error 9cf87b6bf6fb ata: libata: avoid long timeouts on hot-unplugged SATA DAS 9662e7b1e915 RDMA/rtrs-clt: For conn rejection use actual err number 78ac2b2f981f nfc: nxp-nci: remove interrupt trigger type 0ed3ab68c153 myri10ge: avoid uninitialized variable use cbda3855897f PCI: Mark Nvidia GB10 to avoid bus reset 7e9a64228209 PCI: Add ACS quirk for Qualcomm Hamoa & Glymur 7a126c1b6cfa PCI: Enable ACS after configuring IOMMU for OF platforms 63345c47ae43 PCI: Fix pci_slot_lock () device locking 7ac154e37a91 PCI/AER: Clear stale errors on reporting agents upon probe bc8710fd1b92 PCI: Mark ASM1164 SATA controller to avoid bus reset ba2e3472022f net/rds: Clear reconnect pending bit 7ebd51c3f032 vmw_vsock: bypass false-positive Wnonnull warning with gcc-16 73a92ae5a990 net: usb: sr9700: remove code to drive nonexistent multicast filter c8847a8eaacb bnxt_en: Allow ntuple filters for drops 39c6ab2d2eea wifi: ath10k: fix lock protection in ath10k_wmi_event_peer_sta_ps_state_chg() 16ca0282e099 wifi: rtw89: pci: restore LDO setting after device resume 2a4f7827e001 net: sfp: add quirk for Lantech 8330-265D cec2ceb35ce7 octeontx2-af: Workaround SQM/PSE stalls by disabling sticky 416c01dd95f4 Bluetooth: btusb: Add device ID for Realtek RTL8761BU 5d0b46ab5d55 Bluetooth: btusb: Add new VID/PID for RTL8852CE 0f5c4d8745d7 Bluetooth: hci_conn: use mod_delayed_work for active mode timeout a86ebcb3b08f Bluetooth: hci_conn: Set link_policy on incoming ACL connections 430bdb44c0b2 Bluetooth: btusb: Add support for MediaTek7920 0489:e158 cdcaafeb40f9 ipv4: fib: Annotate access to struct fib_alias.fa_state. de3974edd057 wifi: iwlegacy: add missing mutex protection in il3945_store_measurement() 7d355d937dc3 wifi: iwlegacy: add missing mutex protection in il4965_store_tx_power() b9074687ffea net: hns3: extend HCLGE_FD_AD_QID to 11 bits 70debb2b34a2 ipv4: igmp: annotate data-races around idev->mr_maxdelay 2803d02aa7a1 gro: change the BUG_ON() in gro_pull_from_frag0() b3978714bd4a ext4: propagate flags to convert_initialized_extent() 81248b1eb3c5 net/rds: No shortcut out of RDS_CONN_ERROR b0ea9e2a5644 wifi: rtw89: 8922a: add digital compensation for 2GHz 0a56a63a3bb3 wifi: rtw89: fix unable to receive probe responses under MLO connection a8347aa56749 wifi: iwlwifi: mvm: check the validity of noa_len 4cca2bb73717 net: usb: r8152: fix transmit queue timeout 6cb281662a63 openrisc: define arch-specific version of nop() 8b300f726640 netfilter: xt_tcpmss: check remaining length before reading optlen fb0af2fcee17 netfilter: nf_conntrack: Add allow_clash to generic protocol handler c51755090c94 ext4: use reserved metadata blocks when splitting extent on endio 5b5a9abdc5f4 ext4: mark group extend fast-commit ineligible 9e9fb259bcdd ext4: move ext4_percpu_param_init() before ext4_mb_init() 102428f145f9 ext4: mark group add fast-commit ineligible bd463fcd7f0c ipv6: exthdrs: annotate data-race over multiple sysctl 762e76c93823 ipv6: annotate data-races over sysctl.flowlabel_reflect 45e2b1cf2689 ipv6: annotate data-races in ip6_multipath_hash_{policy,fields}() 69b4bcaece65 wifi: cfg80211: allow only one NAN interface, also in multi radio e2ee86fefe01 wifi: ath12k: fix preferred hardware mode calculation 4234f2d90f7b wifi: ath11k: Fix failure to connect to a 6 GHz AP b71487cb692e wifi: ath11k: add pm quirk for Thinkpad Z13/Z16 Gen1 26c82ec5add2 wifi: rtw89: wow: add reason codes for disassociation in WoWLAN mode faac634c2795 wifi: rtw89: mac: correct page number for CSI response 715c263119fd iommu/amd: move wait_on_sem() out of spinlock b82073564373 wifi: libertas: fix WARNING in usb_tx_block 939dc5eddae6 net: wwan: mhi: Add network support for Foxconn T99W760 65bc40fea4fd iommu/arm-smmu-v3: Improve CMDQ lock fairness and efficiency cf2d06c9fd4b dm: remove fake timeout to avoid leak request 209149bd758e dm: replace -EEXIST with -EBUSY b4d46b4fb240 wifi: rtw88: Fix inadvertent sharing of struct ieee80211_supported_band data 9b5418070ee8 wifi: rtw88: Use devm_kmemdup() in rtw_set_supported_band() 46216a48cd89 wifi: rtw89: ser: enable error IMR after recovering from L1 e31daf5fbcda wifi: rtw89: 8922a: set random mac if efuse contains zeroes 1c7ad1b82ec4 wifi: rtw88: rtw8821cu: Add ID for Mercusys MU6H 0d0c2fb80ca4 wifi: rtw88: 8822b: Avoid WARNING in rtw8822b_config_trx_mode() 400ca64e87ac wifi: rtw88: fix DTIM period handling when conf->dtim_period is zero 5d77c36cd4b6 jfs: nlink overflow in jfs_rename aeecd32724c5 jfs: Add missing set_freezable() for freezable kthread de10c10eb0e8 ALSA: usb-audio: Add iface reset and delay quirk for AB13X USB Audio ae583f113d15 ALSA: mixer: oss: Add card disconnect checkpoints 72210c1ad2d4 ALSA: hda/realtek - Enable mute LEDs on HP ENVY x360 15-es0xxx bfefacf1996f ASoC: fsl: imx-rpmsg: use snd_soc_find_dai_with_mutex() in probe 21207c003700 spi: geni-qcom: Fix abort sequence execution for serial engine errors 10411f1f2c76 ASoC: SOF: Intel: hda: Fix NULL pointer dereference 566657cafa5d power: sequencing: fix missing state_lock in pwrseq_power_on() error path 648a26c3bda4 modpost: Amend ppc64 save/restfpr symnames for -Os build 31a37c62e6a5 ASoC: es8328: Add error unwind in resume c46992fa770a HID: logitech-hidpp: Add support for Logitech K980 2ec472ad5c19 hwmon: (f71882fg) Add F81968 support 066bbecaef26 hwmon: (nct6775) Add ASUS Pro WS WRX90E-SAGE SE 2c7a5235a8c8 hwmon: (dell-smm) Add support for Dell OptiPlex 7080 ba5d922b3153 ASoC: codecs: max98390: Check return value of devm_gpiod_get_optional() in max98390_i2c_probe() 5a22d4560c35 drm/amd/display: avoid dig reg access timeout on usb4 link training fail b21402b55722 drm/amd/display: Fix GFX12 family constant checks f1c5fcf80d77 spi: spi-mem: Protect dirmap_create() with spi_mem_access_start/end 6d802e37525b ASoC: sunxi: sun50i-dmic: Add missing check for devm_regmap_init_mmio 2a85a0ebd33c gpio: aspeed-sgpio: Change the macro to support deferred probe adae2d63f81d ALSA: hda/realtek: fix LG Gram Style 14 speakers 6e1664116a96 ALSA: hda/conexant: Add headset mic fix for MECHREVO Wujie 15X Pro f5623483341b HID: elecom: Add support for ELECOM HUGE Plus M-HT1MRBK 0fa0a82274c8 HID: multitouch: add eGalaxTouch EXC3188 support 0f5fe6ae25f9 media: rkisp1: Fix filter mode register configuration a205740a7231 drm/atmel-hlcdc: fix use-after-free of drm_crtc_commit after release cc18db0860c8 drm/atmel-hlcdc: don't reject the commit if the src rect has fractional parts 25e832a78307 drm/atmel-hlcdc: fix memory leak from the atomic_destroy_state callback fe3cf809c1e5 drm/amd/display: Disable FEC when powering down encoders c3b6733dd4c9 PCI: Add Intel Nova Lake audio Device ID 02a4d03515d4 ASoC: soc-acpi-intel-arl-match: change rt722 amp endpoint to aggregated ae57ffd142fa virt: vbox: uapi: Mark inner unions in packed structs as packed 359d29e76dba hyper-v: Mark inner union in hv_kvp_exchg_msg_value as packed 8e1664b9ee43 drm: Account property blob allocations to memcg cc904b44e4e6 drm/amdkfd: Fix GART PTE for non-4K pagesize in svm_migrate_gart_map() ee0dc6c66a91 drm/amdkfd: Relax size checking during queue buffer get a2dfdb19f856 ALSA: hda/realtek: add HP Victus 16-e0xxx mute LED quirk 2d9b17a177c0 media: ipu6: Always close firmware stream 1ff2c616944c media: ipu6: Close firmware streams on streaming enable failure a4257bf49221 media: ipu6: Ensure stream_mutex is acquired when dealing with node list 888523a37c93 media: mt9m114: Return -EPROBE_DEFER if no endpoint is found 22ffbc504a73 media: mt9m114: Avoid a reset low spike during probe() 461733d83e67 media: v4l2-async: Fix error handling on steps after finding a match e220ec4c4596 media: cx25821: Fix a resource leak in cx25821_dev_setup() 5849ae68d7b8 media: solo6x10: Check for out of bounds chip_id 58dd722b6c3d media: pvrusb2: fix URB leak in pvr2_send_request_ex a854c58dc989 media: adv7180: fix frame interval in progressive mode ec2f37bbb733 drm/panel: Fix a possible null-pointer dereference in jdi_panel_dsi_remove() 533bd1c1e2ca media: amphion: Clear last_buffer_dequeued flag for DEC_CMD_START aaced618189a spi: spi-mem: Limit octal DTR constraints to octal DTR situations bbc8396394f2 ASoC: wm8962: Don't report a microphone if it's shorted to ground on plug 64d7ff20fb03 ASoC: wm8962: Add WM8962_ADC_MONOMIX to "3D Coefficients" mask 5b27fcb5d1eb drm/xe: Only toggle scheduling in TDR if GuC is running 2193fe76d360 drm/amd/display: only power down dig on phy endpoints ef9ed9e786dd drm/amdgpu: Skip loading SDMA_RS64 in VF a951d6630b3a HID: apple: Add "SONiX KN85 Keyboard" to the list of non-apple keyboards 23e7150afc70 drm/amd/display: Add signal type check for dcn401 get_phyd32clk_src d89aef80790f drm/amdgpu: avoid a warning in timedout job handler 11718976c53a drm/amd/display: Fix dsc eDP issue eba3bc49971d drm/amdgpu: add support for HDP IP version 6.1.1 4394a810dd66 media: mediatek: vcodec: Don't try to decode 422/444 VP9 1ba3a56f4854 media: chips-media: wave5: Process ready frames when CMD_STOP sent to Encoder 2ed2feef3d2a media: chips-media: wave5: Fix conditional in start_streaming 39a624a65c77 media: omap3isp: set initial format b78de03a56ce media: omap3isp: isppreview: always clamp in preview_try_format() 89772f640b0b media: omap3isp: isp_video_mbus_to_pix/pix_to_mbus fixes cf510785f74e drm/v3d: Set DMA segment size to avoid debug warnings 86ba653114ba spi: stm32: fix Overrun issue at < 8bpw a57f1024b9d7 media: dvb-core: dmxdevfilter must always flush bufs 1aa3db5864d9 ASoC: SOF: ipc4: Support for sending payload along with LARGE_CONFIG_GET ca36d953d7bb drm/amd/display: Add USB-C DP Alt Mode lane limitation in DCN32 46e108c70227 spi-geni-qcom: use xfer->bits_per_word for can_dma() e15d7f3597de spi-geni-qcom: initialize mode related registers to 0 f3a26d1d0a37 drm/amdkfd: Handle GPU reset and drain retry fault race 29fd416e0e08 drm/amdgpu: fix NULL pointer issue buffer funcs 0c11e9f7cf94 gpu/panel-edp: add AUO panel entry for B140HAN06.4 3f44cdb5371f drm/display/dp_mst: Add protection against 0 vcpi 47af25d855b7 parisc: Prevent interrupts during reboot 589b7b0fc87e arm64: tegra: smaug: Add usb-role-switch support eece81eeda10 Revert "arm64: zynqmp: Add an OP-TEE node to the device tree" 3dcd45cfda1b firmware: arm_ffa: Unmap Rx/Tx buffers on init failure 8d849adfbc3e pstore: ram_core: fix incorrect success return when vmap() fails d53d092019f8 sched/debug: Fix updating of ppos on server write ops c821922bb768 char: tpm: cr50: Remove IRQF_ONESHOT 117fe6b91c51 mailbox: bcm-ferxrm-mailbox: Use default primary handler a321dd2b6356 crypto: hisilicon/qm - move the barrier before writing to the mailbox register 76f7abd4ee01 PCI/MSI: Unmap MSI-X region on error bd1be0d58b61 clocksource/drivers/timer-integrator-ap: Add missing Kconfig dependency on OF 88c76792180d clocksource/drivers/sh_tmu: Always leave device running after probe dea9989a3f39 bpf: Recognize special arithmetic shift in the verifier 4e3e57dbf46d bpf: crypto: Use the correct destructor kfunc type caa44eb450d9 perf/x86/cstate: Add Airmont NP af1e3d63c8e2 perf/x86/msr: Add Airmont NP 17440ef493aa bpf: verifier improvement in 32bit shift sign extension pattern 5ab9a958681e sparc: don't reference obsolete termio struct for TC* constants 8e6b0e2adf86 sparc: Synchronize user stack on fork and clone bfc2420bac71 block: decouple secure erase size limit from discard size limit 1f0221070f02 blk-mq-debugfs: add missing debugfs_mutex in blk_mq_debugfs_register_hctxs() 7fb2e1fa6e98 xenbus: Use .freeze/.thaw to handle xenbus devices 6ac7d51ae076 ACPI: battery: fix incorrect charging status when current is zero 7aa95b6f1465 ACPI: x86: s2idle: Invoke Microsoft _DSM Function 9 (Turn On Display) e3f21fdea4cb perf/cxlpmu: Replace IRQF_ONESHOT with IRQF_NO_THREAD 7f5a66a18b5c s390/perf: Disable register readout on sampling events e35db916e803 cpufreq: dt-platdev: Block the driver from probing on more QC platforms dec123825c1e md-cluster: fix NULL pointer dereference in process_metadata_update d4ca6ca2c6f5 alpha: fix user-space corruption during memory compaction 33f53ac8e9d5 powercap: intel_rapl: Add PL4 support for Ice Lake 61103a85e632 ACPICA: Abort AML bytecode execution when executing AML_FATAL_OP 5e7c8b5cce4c ACPI: resource: Add JWIPC JVC9100 to irq1_level_low_skip_override[] b803811485ac ACPI: processor: Fix NULL-pointer dereference in acpi_processor_errata_piix4() be10c1bdf64a EFI/CPER: don't go past the ARM processor CPER record buffer 242c652849d9 APEI/GHES: ARM processor Error: don't go past allocated memory b6be51a12441 APEI/GHES: ensure that won't go past CPER allocated record 7780c0bad2a3 EFI/CPER: don't dump the entire memory region 0cb30030b483 x86/xen/pvh: Enable PAE mode for 32-bit guest only when CONFIG_X86_PAE is set 7aac0a30dcf4 rnbd-srv: Zero the rsp buffer before using it 5dbe1f143597 arm64: Add support for TSV110 Spectre-BHB mitigation fc38a1f0d55f perf/arm-cmn: Support CMN-600AE c0ec4299b15b s390/purgatory: Add -Wno-default-const-init-unsafe to KBUILD_CFLAGS bcbfd4d81812 tools/power cpupower: Reset errno before strtoull() ab6564f416a6 smb: client: prevent races in ->query_interfaces() 5d2c4f182ea8 gfs2: fiemap page fault fix a20d029585c2 smb: client: add proper locking around ses->iface_last_update 0a45c428ad19 btrfs: handle user interrupt properly in btrfs_trim_fs() b034e842e326 btrfs: fallback to buffered IO if the data profile has duplication 67288113c5e6 dlm: validate length in dlm_search_rsb_tree f57ccd4657c7 minix: Add required sanity checking to minix_check_superblock() 91705db6642c i3c: mipi-i3c-hci: Reset RING_OPERATION1 fields during init 689d85945cbd i3c: master: svc: Initialize 'dev' to NULL in svc_i3c_master_ibi_isr() d209ebaee93f hfsplus: pretend special inodes as regular files 5632d14b2f2a audit: add missing syscalls to read class 727e5140e0cf fs/buffer: add alert in try_to_free_buffers() for folios without buffers 773855c2ef5f hfsplus: fix volume corruption issue for generic/498 3e762a03713e audit: add fchmodat2() to change attributes class 9c1c09c3d134 statmount: permission check should return EPERM 0fd52d901b69 rtc: interface: Alarm race handling should not discard preceding error 70a69f675b9f libperf build: Always place libperf includes first 5f15fa06dccb libperf: Don't remove -g when EXTRA_CFLAGS are used 73e1f48e5149 perf vendor events amd: Fix Zen 5 MAB allocation events f7ed915c96b3 perf annotate: Fix memcpy size in arch__grow_instructions() 08e16d9a3cef perf maps: Fix reference count leak in maps__find_ams() e9003b440603 libsubcmd: Fix null intersection case in exclude_cmds() 2edbcd501c7b perf callchain: Fix srcline printing with inlines ccfafeb79a91 perf unwind-libdw: Fix invalid reference counts 4062fb52682c perf test stat tests: Fix for virtualized machines 99dc6b1674fb perf test stat: Update test expectations and events 6b3dd1674005 ASoC: dt-bindings: asahi-kasei,ak5558: Fix the supply names 6eb2b702dd61 ASoC: dt-bindings: asahi-kasei,ak4458: Fix the supply names cbebce4ddfab ASoC: dt-bindings: asahi-kasei,ak4458: set unevaluatedProperties:false 596900f63aaf dt-bindings: phy: qcom-edp: Add missing clock for X Elite e464e26b2457 SUNRPC: fix gss_auth kref leak in gss_alloc_msg error path b4af38068467 SUNRPC: auth_gss: fix memory leaks in XDR decoding error paths 6bd22de73c12 Drivers: hv: vmbus: Use kthread for vmbus interrupts on PREEMPT_RT e77bcf83bc90 ata: libata-scsi: refactor ata_scsi_translate() 17df036a24aa ata: pata_ftide010: Fix some DMA timings f1cd271b431b ext4: use optimized mballoc scanning regardless of inode format 61e372122b6d ext4: fix dirtyclusters double decrement on fs shutdown c05033cfc5c7 ext4: fix e4b bitmap inconsistency reports 2f4b1052246c ext4: fix memory leak in ext4_ext_shift_extents() 120c6bd7ca9d ext4: drop extent cache when splitting extent fails d8ee559fccde ext4: drop extent cache after doing PARTIAL_VALID1 zeroout 96007fd3c106 ext4: don't cache extent during splitting extent d17857b4fb9b ext4: don't zero the entire extent if EXT4_EXT_DATA_PARTIAL_VALID1 c83f08394056 ext4: subdivide EXT4_EXT_DATA_VALID1 e3a6498a6339 MIPS: Work around LLVM bug when gp is used as global register variable 6038e092508f drm/amd/display: Use same max plane scaling limits for all 64 bpp formats 6610bc8fe927 ASoC: rockchip: i2s-tdm: Use param rate if not provided by set_sysclk b5f50519bf20 x86/hyperv: Fix error pointer dereference 0761447f6f51 btrfs: fix invalid leaf access in btrfs_quota_enable() if ref key not found 74a52716ec24 btrfs: use the correct type to initialize block reserve for delayed refs ba6b6f1502fa efi: Fix reservation of unaccepted memory table bc78bfd287f3 drm/xe/xe2_hpg: Fix handling of Wa_14019988906 & Wa_14019877138 c89bde96e8dd drm/xe/xe2_hpg: Add set of workarounds 9e18acc5aa0e drm/xe/ptl: Apply Wa_13011645652 8f6848b2f6ea drm/xe/mmio: Avoid double-adjust in 64-bit reads 26a40327c25c drm/xe: Switch MMIO interface to take xe_mmio instead of xe_gt f5508f1e656c drm/xe: Adjust mmio code to pass VF substructure to SRIOV code 9472d36b3de9 drm/xe: Add xe_tile backpointer to xe_mmio 74bff541ec88 drm/xe: Switch mmio_ext to use 'struct xe_mmio' 0b433e086b9f drm/xe: Populate GT's mmio iomap from tile during init 85354b21a548 drm/xe: Move GSI offset adjustment fields into 'struct xe_mmio' c31019bca815 drm/xe: Clarify size of MMIO region 6c5894d7acdb drm/xe: Create dedicated xe_mmio structure 4d4e940bc00b drm/xe: Move forcewake to 'gt.pm' substructure acb70e2949d4 s390/kexec: Make KEXEC_SIG available when CONFIG_MODULES=n 2c538a0b3472 spi: wpcm-fiu: Fix potential NULL pointer dereference in wpcm_fiu_probe() 29f3824b08a9 drm/amd/display: Fix out-of-bounds stream encoder index v3 c4e4df8ea642 drm/amd/display: Reject cursor plane on DCE when scaled differently than primary a0d367e13db6 drm/amdkfd: Fix watch_id bounds checking in debug address watch v2 288311849f8e ASoC: codecs: aw88261: Fix erroneous bitmask logic in Awinic init 42dbd7cadc2c drm/i915/acpi: free _DSM package when no connectors b0f74f5d24fe ASoC: fsl_xcvr: Revert fix missing lock in fsl_xcvr_mode_put() c11cd77a1811 drm/amdgpu: Fix memory leak in amdgpu_ras_init() 16e7e7ad8cdc drm/amdgpu: Use kvfree instead of kfree in amdgpu_gmc_get_nps_memranges() 18a7bbd11f17 drm/amdgpu: Fix memory leak in amdgpu_acpi_enumerate_xcc() 3f2d2cbe8e22 apparmor: fix aa_label to return state from compount and component match 19f2e4055626 apparmor: fix invalid deref of rawdata when export_binary is unset 202824a1f89a apparmor: avoid per-cpu hold underflow in aa_get_buffer 6c7e329629a4 apparmor: make label_match return a consistent value d5eb32cf3e14 apparmor: remove apply_modes_to_perms from label_match e43818b16815 apparmor: fix rlimit for posix cpu timers bd7df71b91d9 apparmor: return -ENOMEM in unpack_perms_table upon alloc failure 47e351dfef60 apparmor: Fix & Optimize table creation from possibly unaligned memory ec737e7fdf2f AppArmor: Allow apparmor to handle unaligned dfa tables 3852eb9a0392 apparmor: fix NULL sock in aa_sock_file_perm 77d2e4d03db6 net/mlx5e: Use unsigned for mlx5e_get_max_num_channels 481a86e5a0e5 net/mlx5: Fix multiport device check over light SFs c65cdf46ce34 bonding: alb: fix UAF in rlb_arp_recv during bond up/down 0ff788b84fa5 octeontx2-af: Fix default entries mcam entry action c480680be377 inet: move icmp_global_{credit,stamp} to a separate cache line 5aea79b91084 icmp: prevent possible overflow in icmp_global_allow() a1f686d273d1 macvlan: observe an RCU grace period in macvlan_common_newlink() error path 1ec0d56a8467 ping: annotate data-races in ping_lookup() 6ed7864a5c1a bpftool: Fix truncated netlink dumps f26af58f794d ipv6: fix a race in ip6_sock_set_v6only() f3fe58ce3792 netfilter: nf_tables: fix use-after-free in nf_tables_addchain() 959ea349c7e2 net: remove WARN_ON_ONCE when accessing forward path array 64af43033503 ipvs: do not keep dest_dst if dev is going down 06676b8ea98f netfilter: nf_conntrack_h323: don't pass uninitialised l3num value bb7ce39f8864 selftests: forwarding: vxlan_bridge_1d_ipv6: fix test failure with br_netfilter enabled 48f3c88a8eaa selftests: forwarding: vxlan_bridge_1d: fix test failure with br_netfilter enabled 724a405ce030 net: bridge: mcast: always update mdb_n_entries for vlan contexts ac30e78dd8de net/rds: rds_sendmsg should not discard payload_len ec4859ac5c93 xen-netback: reject zero-queue configuration from guest a488001a8197 net: usb: catc: enable basic endpoint checking ae3cfa51471c net: sparx5/lan969x: fix PTP clock max_adj value bf5009a06e03 ipv6: Fix out-of-bound access in fib6_add_rt2node(). 7ac58d883280 net: mscc: ocelot: add missing lock protection in ocelot_port_xmit_inj() 6702700ad94c net: mscc: ocelot: split xmit into FDMA and register injection paths 1bbcb4e9c02c net: mscc: ocelot: extract ocelot_xmit_timestamp() helper 9e1815472ae4 net: sparx5/lan969x: fix DWRR cost max to match hardware register width 569a833031d7 selftests: mlxsw: tc_restrictions: Fix test failure with new iproute2 8f6833d919ba cpuidle: Skip governor when only one idle state is available d08fb559b455 ACPI: PM: Add unused power resource quirk for THUNDEROBOT ZERO f712f7256324 objpool: fix the overestimation of object pooling metadata size cf27a5efbbfb selftests/memfd: use IPC semaphore instead of SIGSTOP/SIGCONT 42c7b5d00261 kbuild: Add objtool to top-level clean target 5c32bfbcefc0 powercap: intel_rapl_tpmi: Remove FW_BUG from invalid version check ff0641957bce ACPI: CPPC: Fix remaining for_each_possible_cpu() to use online CPUs c065541b71b7 fs/ntfs3: Fix slab-out-of-bounds read in DeleteIndexEntryRoot b97e371e5d1c fs/ntfs3: prevent infinite loops caused by the next valid being the same dd6c81527d09 fs/ntfs3: Initialize new folios before use 65521ecb8640 io_uring/cancel: de-unionize file and user_data in struct io_cancel_data 0d1f21220261 drbd: always set BLK_FEAT_STABLE_WRITES 68feac21bd4d dmaengine: fsl-edma: don't explicitly disable clocks in .remove() f076d69aae81 backlight: qcom-wled: Change PM8950 WLED configurations 92de557d5de4 backlight: qcom-wled: Support ovp values for PMI8994 37fa7dd13786 leds: qcom-lpg: Check the return value of regmap_bulk_write() 7814b1431848 pinctrl: single: fix refcount leak in pcs_add_gpio_func() 50a55756c90e pinctrl: qcom: sm8250-lpass-lpi: Fix i2s2_data_groups definition 103ac8e3a7f3 iio: sca3000: Fix a resource leak in sca3000_probe() 721f679d4eb2 ovl: Fix uninit-value in ovl_fill_real a7a7196185c3 pinctrl: equilibrium: Fix device node reference leak in pinbank_init() 8991b4e55f85 usb: bdc: fix sleep during atomic 024ea0d2ff89 drivers: iio: mpu3050: use dev_err_probe for regulator request 2b81db8a7f44 mfd: simple-mfd-i2c: Add Delta TN48M CPLD support 02302482205a mfd: simple-mfd-i2c: Keep compatible strings in alphabetical order 8993ca8904db mfd: simple-mfd-i2c: Add SpacemiT P1 support 5614db619980 mfd: simple-mfd-i2c: Add compatible strings for Layerscape QIXIS FPGA 0ecce3512344 mfd: simple-mfd-i2c: Add MAX77705 support e0527c09bcf1 mfd: arizona: Fix regulator resource leak on wm5102_clear_write_sequencer() failure d225e23c07a4 Revert "mmc: rtsx_pci_sdmmc: increase power-on settling delay to 5ms" a771b386cb6c phy: freescale: imx8qm-hsio: fix NULL pointer dereference 3fa4fdfe6883 coresight: etm3x: Fix cpulocked warning on cpuhp 151becfbe1fd watchdog: starfive-wdt: Fix PM reference leak in probe error path 91557f3459e5 iio: pressure: mprls0025pa: fix pressure calculation b843b1f47868 iio: pressure: mprls0025pa: fix scan_type struct 188273fcb3c5 iio: pressure: mprls0025pa: fix interrupt flag 14207e94fe36 iio: pressure: mprls0025pa: fix SPI CS delay violation 72158f9ae29a iio: pressure: mprls0025pa: fix spi_transfer struct initialisation b58f107f359d mmc: rtsx_pci_sdmmc: increase power-on settling delay to 5ms 1ec1a893ee2a serial: SH_SCI: improve "DMA support" prompt 5449736d2a84 serial: imx: change SERIAL_IMX_CONSOLE to bool 01b91cb3e748 staging: greybus: lights: avoid NULL deref b1e288645d69 iio: test: drop dangling symbol in gain-time-scale helpers 9d00bf5ca6d5 soundwire: intel_ace2x: add SND_HDA_CORE dependency 055273d82544 dma: dma-axi-dmac: fix HW scatter-gather not looking at the queue 2813261626d4 dma: dma-axi-dmac: fix SW cyclic transfers 25da519fb5e9 dmaengine: mediatek: uart-apdma: Fix above 4G addressing TX/RX 525858eb00fb interconnect: mediatek: Aggregate bandwidth with saturating add 5d7c7c54b6a5 interconnect: mediatek: Don't hijack parent device c5fa94489fe8 clk: mediatek: Fix error handling in runtime PM setup 56360aa4ddd7 clk: qcom: gfx3d: add parent to parent request map cb7b741e350f clk: qcom: dispcc-sm7150: Fix dispcc_mdss_pclk1_clk_src f9c45fb866d9 clk: qcom: dispcc-sdm845: Enable parents for pixel clocks c4a00b99dc6d clk: Move clk_{save,restore}_context() to COMMON_CLK section b109dd4970a0 clk: qcom: gcc-ipq5018: flag sleep clock as critical 596048c0d7ec clk: qcom: gcc-msm8917: Remove ALWAYS_ON flag from cpp_gdsc 6b3b27031c5b clk: qcom: gcc-msm8953: Remove ALWAYS_ON flag from cpp_gdsc a4fb5a9dc622 clk: qcom: gcc-qdu1000: Update the SDCC RCGs to use shared_floor_ops 0c74a63b797c clk: qcom: gcc-x1e80100: Update the SDCC RCGs to use shared_floor_ops 1936fe74af4a clk: qcom: gcc-sdx75: Update the SDCC RCGs to use shared_floor_ops daa1b65f23cd clk: qcom: gcc-sm4450: Update the SDCC RCGs to use shared_floor_ops 99db18b34fd6 clk: qcom: gcc-sm8450: Update the SDCC RCGs to use shared_floor_ops 762c69e6ed2a clk: meson: gxbb: Limit the HDMI PLL OD to /4 on GXL/GXM SoCs 909b48a3b3b4 clk: qcom: rcg2: compute 2d using duty fraction directly 662676d6e735 clk: qcom: gcc-sm8650: Use floor ops for SDCC RCGs b1b6935689b8 clk: qcom: gcc-sm8550: Use floor ops for SDCC RCGs 762a26818934 fbdev: au1200fb: Fix a memory leak in au1200fb_drv_probe() f620398f0db1 fbdev: of_display_timing: Fix device node reference leak in of_get_display_timings() bcd1aea42610 tracing: Remove duplicate ENABLE_EVENT_STR and DISABLE_EVENT_STR macros 9b0513905e05 tracing: Properly process error handling in event_hist_trigger_parse() 596c8b168cfd fs/nfs: Fix readdir slow-start regression 2eff9d3537b8 nvdimm: virtio_pmem: serialize flush requests 6037124dbf67 scsi: csiostor: Fix dereference of null pointer rn eb10468cef22 scsi: ufs: host: mediatek: Require CONFIG_PM d52e13122d37 scsi: smartpqi: Fix memory leak in pqi_report_phys_luns() b3a8b2bbc48e pNFS: fix a missing wake up while waiting on NFS_LAYOUT_DRAIN 84667e99a8bc RDMA/uverbs: Add __GFP_NOWARN to ib_uverbs_unmarshall_recv() kmalloc 2b3b3e0d8abf power: supply: qcom_battmgr: Recognize "LiP" as lithium-polymer 9fab0120907e power: supply: pm8916_lbc: Fix use-after-free for extcon in IRQ handler 896a54984905 mtd: spinand: Fix kernel doc fbd5b014a966 mtd: parsers: ofpart: fix OF node refcount leak in parse_fixed_partitions() 130381dd82e7 cxl: Fix premature commit_end increment on decoder commit failure 5c32cabddc4e RDMA/core: add rdma_rw_max_sge() helper for SQ sizing 3c2ae79fb19d RDMA/rxe: Fix race condition in QP timer handlers ee998cdbff66 RDMA/mlx5: Fix memory leak in GET_DATA_DIRECT_SYSFS_PATH handler d533425ac1f2 RDMA/uverbs: Validate wqe_size before using it in ib_uverbs_post_send 8d9798d6ff41 NFS/localio: use GFP_NOIO and non-memreclaim workqueue in nfs_local_commit af87ebd34318 nfs/localio: eliminate unnecessary kref in nfs_local_fsync_ctx e97f5fac8ce9 mtd: parsers: Fix memory leak in mtd_parser_tplink_safeloader_parse() d473b0677310 crypto: ccp - Send PSP_CMD_TEE_RING_DESTROY when PSP_CMD_TEE_RING_INIT fails 90c1858d4e65 crypto: ccp - Factor out ring destroy handling to a helper 809fd697dab0 crypto: ccp - Add an S4 restore flow 122c3cb563bd crypto: ccp - Declare PSP dead if PSP_CMD_TEE_RING_INIT fails 38c30ee6a626 platform/x86/amd/pmf: Prevent TEE errors after hibernate 3d2b60a8d682 vfio/pci: Lock upstream bridge for vfio_pci_core_disable() 12e07451ef98 mtd: rawnand: cadence: Fix return type of CDMA send-and-wait helper 9b67c7fd5bff IB/mlx5: Fix port speed query for representors c8fb5c965ac7 RDMA/mlx5: Fix UMR hang in LAG error state unload f143ea1ff6bd tools/power/x86/intel-speed-select: Fix file descriptor leak in isolate_cpus() 38c5b49fffa1 RDMA/iwcm: Fix workqueue list corruption by removing work_list ce6f8e007682 RDMA/rxe: Fix double free in rxe_srq_from_init 6b644871d4e4 RDMA/rtrs-srv: fix SG mapping 93bdf715d33c power: supply: wm97xx: Fix NULL pointer dereference in power_supply_changed() 352e364a56cc power: supply: bq27xxx: fix wrong errno when bus ops are unsupported e9667db8b17e power: reset: nvmem-reboot-mode: respect cell size for nvmem_cell_write 82d3eb97a976 power: supply: sbs-battery: Fix use-after-free in power_supply_changed() 2178dc65d45e power: supply: rt9455: Fix use-after-free in power_supply_changed() dbe579e620ef power: supply: pm8916_lbc: Fix use-after-free in power_supply_changed() b69bb88e20c6 power: supply: pm8916_bms_vm: Fix use-after-free in power_supply_changed() 4350505e82b4 power: supply: goldfish: Fix use-after-free in power_supply_changed() f3fbe309c9bf power: supply: cpcap-battery: Fix use-after-free in power_supply_changed() 4aeaf03c1726 power: supply: bq25980: Fix use-after-free in power_supply_changed() 83c27fdd696a power: supply: bq256xx: Fix use-after-free in power_supply_changed() 76a42ba547a9 power: supply: act8945a: Fix use-after-free in power_supply_changed() 847eeb6c0efc power: supply: ab8500: Fix use-after-free in power_supply_changed() 7ac44096bad0 RDMA/hns: Notify ULP of remaining soft-WCs during reset c3c45f367981 RDMA/hns: Fix RoCEv1 failure due to DSCP 562c96b1393d RDMA/hns: Fix WQ_MEM_RECLAIM warning 2adc6c08f960 IB/cache: update gid cache on client reregister event 46ccb0a0f950 RDMA/rtrs: server: remove dead code 6d59928f8b0e octeontx2-pf: Unregister devlink on probe failure 193a9e2d4d18 ionic: Rate limit unknown xcvr type messages 63692055743e octeon_ep_vf: ensure dbell BADDR updation 530a79f0589c octeon_ep: ensure dbell BADDR updation 2286bfef3368 octeon_ep: disable per ring interrupts 52731ef44381 serial: caif: fix use-after-free in caif_serial ldisc_close() b04061f89ffc xfrm: fix ip_rt_bug race in icmp_route_lookup reverse path 35e00df60f7e net: Switch to skb_dstref_steal/skb_dstref_restore for ip_route_input callers 791f028b1e42 net: Add skb_dstref_steal and skb_dstref_restore b89269bdb3ba net: sunhme: Fix sbus regression 21c303fec138 net: atm: fix crash due to unvalidated vcc pointer in sigd_send() e99f816a424e smb: client: correct value for smbd_max_fragmented_recv_size 73ec7c96601d procfs: fix missing RCU protection when reading real_parent in do_task_stat() d2c785733dfb net: hns3: fix double free issue for tx spare buffer 5cd63214b529 PCI: Add ACS quirk for Pericom PI7C9X2G404 switches [12d8:b404] 05feaf826390 netfilter: nft_set_rbtree: check for partial overlaps in anonymous sets afe1a28fa9de netfilter: nft_set_rbtree: fix bogus EEXIST with NLM_F_CREATE with null interval 4f899976eedc netfilter: nft_counter: fix reset of counters on 32bit archs bce4581e02d5 netfilter: nft_set_hash: fix get operation on big endian 79b713ef4261 netfilter: nfnetlink_queue: do shared-unconfirmed check before segmentation 371de2bef658 netfilter: nfnetlink_queue: optimize verdict lookup with hash table cf70cedce327 nfc: hci: shdlc: Stop timers and work before freeing context 19e42490c89b inet: RAW sockets using IPPROTO_RAW MUST drop incoming ICMP da637d725a11 bonding: only set speed/duplex to unknown, if getting speed failed 7d56ba306e93 octeontx2-af: Fix PF driver crash with kexec kernel booting 73db8a61af8b mptcp: fix receive space timestamp initialization 1f5433b23e2a of: unittest: fix possible null-pointer dereferences in of_unittest_property_copy() 530d1ecd3639 ucount: check for CAP_SYS_RESOURCE using ns_capable_noaudit() d075cf169e82 ipc: don't audit capability check in ipc_permissions() a4720c30ea77 selftests/mm: convert page_size to unsigned long 306c11e7b82e selftests/mm: pagemap_ioctl: Fix types mismatches shown by compiler options 3f3dc0663ca1 PCI/ACPI: Restrict program_hpx_type2() to AER bits 7d168610e727 PCI: Add defines for bridge window indexing f68179cc3d88 PCI: Initialize RCB from pci_configure_device() ef04714ef4ae wifi: ath10k: sdio: add missing lock protection in ath10k_sdio_fw_crashed_dump() 0f514a9bf432 PCI: Check parent for NULL in of_pci_bus_release_domain_nr() f4a681c870d1 tcp: tcp_tx_timestamp() must look at the rtx queue 955c5d670b5a fat: avoid parent link count underflow in rmdir 063a6f22478e nfsd: never defer requests during idmap lookup e4d0e135ee38 xdrgen: Initialize data pointer for zero-length items 25ad5d691390 NFS: NFSERR_INVAL is not defined by NFSv2 a3a05e5ae1bb xdrgen: Fix struct prefix for typedef types in program wrappers 771ba4c6a805 dm: use bio_clone_blkg_association a84d30e8d2ba iommu/vt-d: Clear Present bit before tearing down PASID entry e148b5194ad9 iommu/vt-d: Avoid draining PRQ in sva mm release path 191311180935 iommu/vt-d: Drain PRQs when domain removed from RID d5cd1db0ac93 iommu/vt-d: Separate page request queue from SVM 5962c30a6f05 iommu/vt-d: Flush cache for PASID table before using it 428a543c4ab1 PCI: Mark 3ware-9650SA Root Port Extended Tags as broken 19d0708a39ed kallsyms/ftrace: set module buildid in ftrace_mod_address_lookup() 0bdc4b1ad694 module: add helper function for reading module_buildid() 95d9748cc9b4 netfilter: nf_conncount: fix tracking of connections from localhost 63fece123bbe netfilter: nft_compat: add more restrictions on netlink attributes 3d0994ed0aa1 netfilter: nf_conncount: increase the connection clean up limit to 64 4fe47671aa29 netfilter: nf_conncount: make nf_conncount_gc_list() to disable BH 01726b9021cb netfilter: nf_tables: reset table validation state on abort f6c4c7a5cf5b wifi: cfg80211: stop NAN and P2P in cfg80211_leave fa9861e5c8af mctp i2c: initialise event handler read bytes 8468dd5bc1c4 net: mctp-i2c: fix duplicate reception of old data 414259caf81a quota: fix livelock between quotactl and freeze_super dec62b741a39 dm: use READ_ONCE in dm_blk_report_zones 175ac0a61154 dm: fix unlocked test for dm_suspended_md 160913364fcc PCI/portdrv: Fix potential resource leak d773a4826195 PCI: Do not attempt to set ExtTag for VFs c8c6cb9fa632 Documentation: tracing: Add PCI tracepoint documentation 2cacab8c7a05 Documentation: trace: Refactor toctree b53efc230ab2 docs: fix WARNING document not included in any toctree 51b7181cfbed PCI/P2PDMA: Release per-CPU pgmap ref when vm_insert_page() fails 33b2230edd86 wifi: cfg80211: Fix use_for flag update on BSS refresh 9e2b4159289c PCI/PM: Avoid redundant delays on D3hot->D3cold 29c4f6e0ac97 Documentation: PCI: endpoint: Fix ntb/vntb copy & paste errors e44b390e01c1 PCI: mediatek: Fix IRQ domain leak when MSI allocation fails d8308dff30bd hwmon: (pmbus/mpq8785) fix VOUT_MODE mismatch during identification 369d2ed2da20 hwmon: pmbus: mpq8785: Add support for MPM82504 8c311c726f1f hwmon: pmbus: mpq8785: Implement VOUT feedback resistor divider ratio configuration 7cd0bc5fe14c hwmon: pmbus: mpq8785: Prepare driver for multiple device support 914b47c9b824 Revert "hwmon: (ibmpex) fix use-after-free in high/low store" ee842490a604 spi: tools: Add include folder to .gitignore 0b605e8ce606 HID: intel-ish-hid: fix NULL-ptr-deref in ishtp_bus_remove_all_clients 1a2482e5fcb4 platform/chrome: cros_ec_lightbar: Fix response size initialization be7486307449 drm/xe: Unregister drm device on probe error 450d8e18ba8b evm: Use ordered xattrs list to calculate HMAC in evm_init_hmac() e25b9f071226 media: uvcvideo: Fix allocation for small frame sizes 9aae11893e55 platform/chrome: cros_typec_switch: Don't touch struct fwnode_handle::dev b61deabec46b drm/buddy: release free_trees array on buddy mm teardown af8294a2a51c drm/msm/a2xx: fix pixel shader start on A225 9f6453e5177a media: ccs: Accommodate C-PHY into the calculation 33a76dcced8c drm/msm/dpu: fix CMD panels on DPU 1.x - 3.x 9c53a12b3eb4 drm/msm/disp: set num_planes to 1 for interleaved YUV formats d955aeb26e12 HID: playstation: Add missing check for input_ff_create_memless db3cc304a9a6 regulator: core: move supply check earlier in set_machine_constraints() a2106181066a drm/msm/dpu: fix WD timer handling on DPU 8.x f5478534cd47 drm/msm/dpu: Set vsync source irrespective of mdp top support 03306604738b drm/msm/disp/dpu: add merge3d support for sc7280 ba4c9a09e360 drm/amdgpu: Use explicit VCN instance 0 in SR-IOV init 0d4c7c2cbdf9 drm/amdkfd: Fix signal_eviction_fence() bool return value 9654ca3790b1 drm/amd: Drop "amdgpu kernel modesetting enabled" message 52defdd4034d media: chips-media: wave5: Fix memory leak on codec_info allocation failure 3ad42057c5b8 ASoC: nau8821: Fixup nau8821_enable_jack_detect() 47e5bf04d05b ASoC: nau8821: Avoid unnecessary blocking in IRQ handler bbedfab10d49 ASoC: nau8821: Consistently clear interrupts before unmasking f8071500177f smack: /smack/doi: accept previously used values 17da2a78bd31 smack: /smack/doi must be > 0 b78e8a12edb3 drm/panthor: Evict groups before VM termination d12be704f710 ALSA: vmaster: Relax __free() variable declarations 37135ec54b97 ALSA: pcm: Relax __free() variable declarations 232cfc860a9d ALSA: pcm: use new array-copying-wrapper a54e02cc637b drm/panel: sw43408: Remove manual invocation of unprepare at remove 00b16c7b17b4 workqueue: Process rescuer work items one-by-one using a cursor 2178f0587c91 workqueue: Only assign rescuer work when really needed fa80f288a5e4 workqueue: Factor out assign_rescuer_work() 104504a773b3 drm/panthor: Make sure we resume the tick when new jobs are submitted 47b2d73b5a0e drm/panthor: Fix the logic that decides when to stop ticking 4f74f3da52cb drm/panthor: Fix immediate ticking on a disabled tick bab13dcc4404 drm/panthor: Fix the group priority rotation logic 202d532672b3 drm/panthor: Fix the full_tick check 8ec4f1b14a61 drm/panthor: Recover from panthor_gpu_flush_caches() failures 50a74e38ded1 arm64: dts: qcom: sm6115: Add CX_MEM/DBGC GPU regions b5dc5990ee32 arm64: dts: qcom: agatti: Add CX_MEM/DBGC GPU regions 5d31ca77c743 arm64: dts: qcom: x1e: bus is 40-bits (fix 64GB models) 466400375386 arm64: dts: qcom: sdm845-db845c: specify power for WiFi CH1 e3e856e399ed arm64: dts: qcom: sdm845-db845c: drop CS from SPIO0 982a23d5d35b arm64: dts: qcom: qrb4210-rb2: Fix UART3 wakeup IRQ storm 8f15df824262 arm64: dts: amlogic: g12: assign the MMC A signal clock 041037a24fbe arm64: dts: amlogic: g12: assign the MMC B and C signal clocks 8f5196fc8d17 arm64: dts: amlogic: gx: assign the MMC signal clocks 0378739bc8ce arm64: dts: amlogic: axg: assign the MMC signal clocks ddf288f21d7a arm64: dts: amlogic: c3: assign the MMC signal clocks d1ffd3c633a9 hwspinlock: omap: Handle devm_pm_runtime_enable() errors 03af8c0d468e arm64: dts: ti: k3-j784s4-j742s2-main-common.dtsi: Refactor watchdog instances for j784s4 3f1cb740e890 arm64: dts: ti: k3-j784s4-main.dtsi: Move c71_3 node to appropriate order 448d14117381 arm64: dts: amlogic: s4: fix mmc clock assignment 6cdbd53e0867 arm64: dts: amlogic: s4: assign mmc b clock to 24MHz 3d9d76bfaf28 arm64: dts: mediatek: mt8183-jacuzzi-pico6: Fix typo in pinmux node e018f7d42b58 arm: dts: lpc32xx: add clocks property to Motor Control PWM device tree node 4b992b5cadf6 ARM: dts: lpc32xx: Set motor PWM #pwm-cells property value to 3 cells f8b16d5764ee powerpc/eeh: fix recursive pci_lock_rescan_remove locking in EEH event handling a58c97828911 soc: mediatek: svs: Fix memory leak in svs_enable_debug_write() cdcc7e335f2d soc: qcom: cmd-db: Use devm_memremap() to fix memory leak in cmd_db_dev_probe 682d9d73d513 powerpc/uaccess: Move barrier_nospec() out of allow_read_{from/write}_user() 37cf81576dff ARM: dts: allwinner: sun5i-a13-utoo-p66: delete "power-gpios" property 5a6ebb6cc3c5 arm64: dts: qcom: msm8994-octagon: Fix Analog Devices vendor prefix of AD7147 dce238e12d94 arm64: dts: qcom: x1e80100: Fix USB combo PHYs SS1 and SS2 ref clocks a7037c3eb013 arm64: dts: qcom: sdm845-oneplus: Mark l14a regulator as boot-on c818d840c878 arm64: dts: qcom: sdm845-oneplus: Don't mark ts supply boot-on cd4b042521d2 arm64: dts: qcom: sdm630: fix gpu_speed_bin size 7aaa4384b871 clk: qcom: Return correct error code in qcom_cc_probe_by_index() 5c85820e3905 arm64: dts: tqma8mpql-mba8mp-ras314: Fix HDMI CEC pad control settings 255af53a67e1 arm64: dts: tqma8mpql-mba8mpxl: Fix HDMI CEC pad control settings 4a4ffd352a69 firmware: arm_ffa: Correct 32-bit response handling in NOTIFICATION_INFO_GET dca904ffd751 EDAC/i5400: Fix snprintf() limit calculation in calculate_dimm_size() 1fd7c29a1543 EDAC/i5000: Fix snprintf() size calculation in calculate_dimm_size() 35b034cfddca soc: qcom: smem: handle ENOMEM error during probe 9a6fc69a570c pstore/ram: fix buffer overflow in persistent_ram_save_old() d5b7730f0699 hwrng: core - use RCU and work_struct to fix race condition 24761c8441c4 hwrng: core - Allow runtime disabling of the HW RNG 38d80307decc crypto: starfive - Fix memory leak in starfive_aes_aead_do_one_req() acd06323c2c4 fs/tests: exec: drop duplicate bprm_stack_limits test vectors a6a73403733e sched/rt: Skip currently executing CPU in rto_next_cpu() 375622de010f sched/deadline: Clear the defer params 6e661a23d886 media: pci: mg4b: Use IRQF_NO_THREAD 8da4ba169435 mfd: wm8350-core: Use IRQF_ONESHOT 670abc7e5694 EDAC/altera: Remove IRQF_ONESHOT fb7481344f9e scsi: efct: Use IRQF_ONESHOT and default primary handler be3ff229b90a Bluetooth: btintel_pcie: Use IRQF_ONESHOT and default primary handler 5938fb0e3285 platform/x86: int0002: Remove IRQF_ONESHOT from request_irq() a13566c2f7b7 genirq: Set IRQF_COND_ONESHOT in devm_request_irq(). 0db169a91381 bpf: Fix bpf_xdp_store_bytes proto for read-only arg d5c6f254528c crypto: caam - fix netdev memory leak in dpaa2_caam_probe 96bac9ce2292 crypto: hisilicon/trng - support tfms sharing the device a9c6d178d822 x86/fgraph,bpf: Switch kprobe_multi program stack unwind to hw_regs path 41d766859df7 x86/fgraph,bpf: Fix stack ORC unwind from kprobe_multi return probe 3eb79d8d02c7 tracing: Add ftrace_fill_perf_regs() for perf event a142bbc11f8b tracing: Add ftrace_partial_regs() for converting ftrace_regs to pt_regs 33d4e904e24d fgraph: Replace fgraph_ret_regs with ftrace_regs fee2da394085 ftrace: Rename ftrace_regs_return_value to ftrace_regs_get_return_value ff57dbe037be ftrace: Use arch_ftrace_regs() for ftrace_regs_*() macros a701884d1398 ftrace: Consolidate ftrace_regs accessor functions for archs using pt_regs 550a16d87d33 ftrace: Make ftrace_regs abstract from direct use ef3166bd8d33 tracing: Add a comment about ftrace_regs definition c2681ce178a2 bpf, sockmap: Fix FIONREAD for sockmap 4f9f0cbb4b27 bpf, sockmap: Fix incorrect copied_seq calculation 57cd88f4b609 crypto: ccp - narrow scope of snp_range_list 1c3506ea8599 crypto: ccp - Ensure implicit SEV/SNP init and shutdown in ioctls cf8a8f13deb0 hrtimer: Fix trace oddity 0f893b33e6a7 selftests/bpf: Fix resource leak in serial_test_wq on attach failure 58059335e465 bpf: Preserve id of register in sync_linked_regs() 0bbfa5542670 crypto: hisilicon/sec2 - support skcipher/aead fallback for hardware queue unavailable 21ad2c1dcb18 crypto: hisilicon/zip - adjust the way to obtain the req in the callback function ce2e7e471da0 crypto: octeontx - fix dma_free_coherent() size dc8af9baf764 crypto: cavium - fix dma_free_coherent() size 4e39e4d847b0 ARM: VDSO: Patch out __vdso_clock_getres() if unavailable 5731312c4cb5 libbpf: Fix OOB read in btf_dump_get_bitfield_value 5478540eafbe selftests/bpf: veristat: fix printing order in output_stats() 138fc0ee9034 crypto: qat - fix warning on adf_pfvf_pf_proto.c 9faf20a1819b perf/x86/core: Do not set bit width for unavailable counters f96c5ccf95ae s390/cio: Fix device lifecycle handling in css_alloc_subchannel() 06b3e765fdc5 PM: sleep: wakeirq: harden dev_pm_clear_wake_irq() against races 73caf86fe92e cpufreq: intel_pstate: Enable asym capacity only when CPU SMT is not possible 26bec96bc5f3 perf: arm_spe: Properly set hw.state on failures b909d420d6b8 PM: wakeup: Handle empty list in wakeup_sources_walk_start() c94fd6e8a71e md/raid1: fix memory leak in raid1_run() aaac92c72d6e md/raid1: fix memory leak in raid1_run() if no active rdev db8c4b15deab Partial revert "x86/xen: fix balloon target initialization for PVH dom0" dbe8e81a2ec6 ublk: Validate SQE128 flag before accessing the cmd 8af710156c53 thermal/of: Fix reference leak in thermal_of_cm_lookup() 87283ce6218b iomap: fix submission side handling of completion side errors 10bb2f5d365d cpufreq: scmi: Fix device_node reference leak in scmi_cpu_domain_id() b114bc9f075c OPP: Return correct value in dev_pm_opp_get_level 9a205d16e88b md/raid10: fix any_working flag handling in raid10_sync_request fcb54ef1dbfc md/raid5: fix raid5_run() to return error when log_init() fails 3c08d86d0c8e thermal: intel: x86_pkg_temp_thermal: Handle invalid temperature 101cc8e5506a cpuidle: governors: menu: Always check timers with tick stopped c812673deb81 io_uring/sync: validate passed in offset cce354524da4 ACPICA: Fix NULL pointer dereference in acpi_ev_address_space_dispatch() a67a23e9dedf io_uring: use release-acquire ordering for IORING_SETUP_R_DISABLED becedc3aceca xen/virtio: Don't use grant-dma-ops when running as Dom0 4dd5c62c201c rnbd-srv: Fix server side setting of bi_size for special IOs 5afd2f4e1608 rnbd-srv: use bio_add_virt_nofail cef2315cb84e block: add a bio_add_virt_nofail helper 4d339b219004 smb: client: fix potential UAF and double free in smb2_open_file() 4eb830847d84 btrfs: fix block_group_tree dirty_list corruption af30ffbdeb05 btrfs: qgroup: return correct error when deleting qgroup relation item 8d582d65d20b erofs: handle end of filesystem properly for file-backed mounts 113eac582ccb erofs: get rid of raw bi_end_io() usage cc09d55f519e tpm: st33zp24: Fix missing cleanup on get_burstcount() error a61b8412e3eb tpm: tpm_i2c_infineon: Fix locality leak on get_burstcount() failure 140a45bd4f6d i3c: dw: Fix memory leak in dw_i3c_master_i2c_xfers() 7ff9c410dd26 i3c: dw: Initialize spinlock to avoid upsetting lockdep 87d4954b5c59 gfs2: Fix use-after-free in iomap inline data write path ca7c67bdd293 gfs2: Fix slab-use-after-free in qd_put ae4d9781ed0f gfs2: Retries missing in gfs2_{rename,exchange} 1d8a994edffa i3c: master: Update hot-join flag only on success 7edd798f191e fs: add <linux/init_task.h> for 'init_fs' 28050803c559 i3c: Move device name assignment after i3c_bus_init 01fd0ceb44e1 audit: move the compat_xxx_class[] extern declarations to audit_arch.h 1f16679a5aa6 rcu: Fix rcu_read_unlock() deadloop due to softirq 586a5effe50f rcu: Remove local_irq_save/restore() in rcu_preempt_deferred_qs_handler() 24d44e0f05ab rcu: Refactor expedited handling check in rcu_read_unlock_special() 51838112d9c2 hfsplus: return error when node already exists in hfs_bnode_create 517813eb6e73 auxdisplay: arm-charlcd: fix release_mem_region() size 9c80d688f402 RDMA/umad: Reject negative data_len in ib_umad_write 87b7a036d2c7 RDMA/siw: Fix potential NULL pointer dereference in header processing Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index a8d17a5c14..444cab413f 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -15,13 +15,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "96b72162b68a3a6084945ef4bf357a3de5c196ed" -SRCREV_meta ?= "d427132ce6626fdae8a1690305e1b578a5509699" +SRCREV_machine ?= "5c7879a7b2753ea23b696b6a3e7e4a38c40f5776" +SRCREV_meta ?= "9a7e5434a02c01df4901784d29694d940743d56c" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.74" +LINUX_VERSION ?= "6.12.76" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 22b15e69f2..63135de5c7 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc include recipes-kernel/linux/cve-exclusion.inc include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.74" +LINUX_VERSION ?= "6.12.76" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" -SRCREV_meta ?= "d427132ce6626fdae8a1690305e1b578a5509699" +SRCREV_machine ?= "b1a05d710b72913717bcc1139e714080d99e79a8" +SRCREV_meta ?= "9a7e5434a02c01df4901784d29694d940743d56c" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index 92807f9057..0e1b1fa61f 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "f4b46d6d3a4e38d532c5e11866d3d071ae398f16" -SRCREV_machine:qemuarm64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" -SRCREV_machine:qemuloongarch64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" -SRCREV_machine:qemumips ?= "da8487babd144628f801a204696523e077829fa2" -SRCREV_machine:qemuppc ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" -SRCREV_machine:qemuriscv64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" -SRCREV_machine:qemuriscv32 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" -SRCREV_machine:qemux86 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" -SRCREV_machine:qemux86-64 ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" -SRCREV_machine:qemumips64 ?= "29ca2370cd8722cc5fd712f4a6b4757ad84fde3e" -SRCREV_machine ?= "daff0c37ea8999b6dbd3c7e2d761a102fe32a23d" -SRCREV_meta ?= "d427132ce6626fdae8a1690305e1b578a5509699" +SRCREV_machine:qemuarm ?= "9dcacd6df5189be895d0b0d59d728ef61743338d" +SRCREV_machine:qemuarm64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" +SRCREV_machine:qemuloongarch64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" +SRCREV_machine:qemumips ?= "eca7f78fe1f9f2bd98951df1100e46a8e39d0ea0" +SRCREV_machine:qemuppc ?= "b1a05d710b72913717bcc1139e714080d99e79a8" +SRCREV_machine:qemuriscv64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" +SRCREV_machine:qemuriscv32 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" +SRCREV_machine:qemux86 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" +SRCREV_machine:qemux86-64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" +SRCREV_machine:qemumips64 ?= "8acf70fbeddae4770f3d24cbd8548402ae6a4f9e" +SRCREV_machine ?= "b1a05d710b72913717bcc1139e714080d99e79a8" +SRCREV_meta ?= "9a7e5434a02c01df4901784d29694d940743d56c" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the <version>/base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "444b39ef6108313e8452010b22aaba588e8fb92b" +SRCREV_machine:class-devupstream ?= "39b686f8d57d7506af7789e915fe7fd103b0fe57" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.74" +LINUX_VERSION ?= "6.12.76" PV = "${LINUX_VERSION}+git" -- 2.43.0 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 08/18] linux-yocto/6.12: update CVE exclusions (6.12.76) 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield ` (6 preceding siblings ...) 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 07/18] linux-yocto/6.12: update to v6.12.76 bruce.ashfield @ 2026-04-23 15:44 ` bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 09/18] linux-yocto/6.12: update to v6.12.77 bruce.ashfield ` (10 subsequent siblings) 18 siblings, 0 replies; 20+ messages in thread From: bruce.ashfield @ 2026-04-23 15:44 UTC (permalink / raw) To: yoann.congal; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 3 changes (2 new | 1 updated): - 2 new CVEs: CVE-2025-70031, CVE-2026-0846 - 1 updated CVEs: CVE-2025-7195 Date: Mon, 9 Mar 2026 19:31:35 +0000 ] Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/cve-exclusion_6.12.inc | 30 ++++++++++++++----- 1 file changed, 23 insertions(+), 7 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index c7726e1306..60d337b010 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-02-23 05:12:32.087151+00:00 for kernel version 6.12.74 -# From linux_kernel_cves cve_2026-02-23_0400Z-1-g3cbc7410733 +# Generated at 2026-03-09 19:34:33.465338+00:00 for kernel version 6.12.76 +# From linux_kernel_cves cve_2026-03-09_1900Z-1-gab0cca33c43 python check_kernel_cve_status_version() { - this_version = "6.12.74" + this_version = "6.12.76" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -9032,6 +9032,8 @@ CVE_STATUS[CVE-2023-54326] = "fixed-version: Fixed from version 6.5" CVE_STATUS[CVE-2023-7324] = "fixed-version: Fixed from version 6.3" +# CVE-2024-14027 needs backporting (fixed from 6.13) + CVE_STATUS[CVE-2024-26581] = "fixed-version: Fixed from version 6.8" CVE_STATUS[CVE-2024-26582] = "fixed-version: Fixed from version 6.8" @@ -20396,12 +20398,8 @@ CVE_STATUS[CVE-2025-71224] = "cpe-stable-backport: Backported in 6.12.70" CVE_STATUS[CVE-2025-71225] = "cpe-stable-backport: Backported in 6.12.70" -# CVE-2025-71226 needs backporting (fixed from 6.19) - # CVE-2025-71227 needs backporting (fixed from 6.19) -CVE_STATUS[CVE-2025-71228] = "cpe-stable-backport: Backported in 6.12.70" - CVE_STATUS[CVE-2025-71229] = "cpe-stable-backport: Backported in 6.12.72" CVE_STATUS[CVE-2025-71230] = "fixed-version: only affects 6.13 onwards" @@ -20420,6 +20418,8 @@ CVE_STATUS[CVE-2025-71236] = "cpe-stable-backport: Backported in 6.12.72" CVE_STATUS[CVE-2025-71237] = "cpe-stable-backport: Backported in 6.12.72" +CVE_STATUS[CVE-2025-71238] = "cpe-stable-backport: Backported in 6.12.74" + CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66" CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.12.66" @@ -20930,3 +20930,19 @@ CVE_STATUS[CVE-2026-23229] = "cpe-stable-backport: Backported in 6.12.72" CVE_STATUS[CVE-2026-23230] = "cpe-stable-backport: Backported in 6.12.72" +CVE_STATUS[CVE-2026-23231] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-23232] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23233] = "cpe-stable-backport: Backported in 6.12.74" + +CVE_STATUS[CVE-2026-23234] = "cpe-stable-backport: Backported in 6.12.74" + +CVE_STATUS[CVE-2026-23235] = "cpe-stable-backport: Backported in 6.12.74" + +CVE_STATUS[CVE-2026-23236] = "cpe-stable-backport: Backported in 6.12.74" + +CVE_STATUS[CVE-2026-23237] = "cpe-stable-backport: Backported in 6.12.74" + +CVE_STATUS[CVE-2026-23238] = "cpe-stable-backport: Backported in 6.12.74" + -- 2.43.0 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 09/18] linux-yocto/6.12: update to v6.12.77 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield ` (7 preceding siblings ...) 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 08/18] linux-yocto/6.12: update CVE exclusions (6.12.76) bruce.ashfield @ 2026-04-23 15:45 ` bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 10/18] linux-yocto/6.12: update CVE exclusions (6.12.77) bruce.ashfield ` (9 subsequent siblings) 18 siblings, 0 replies; 20+ messages in thread From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw) To: yoann.congal; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: 6f232446a629 Linux 6.12.77 1ba82a3bbc09 ata: libata-eh: Fix detection of deferred qc timeouts 0d12453818c3 ata: libata: cancel pending work after clearing deferred_qc d2459cba1d99 ata: libata-eh: correctly handle deferred qc timeouts 42ea6c476b27 ata: libata-core: fix cancellation of a port deferred qc work 08d9175578d6 ext4: fix potential null deref in ext4_mb_init() eecce0263999 apparmor: fix race between freeing data and fs accessing it f9761add6d10 apparmor: fix race on rawdata dereference 34fc60b125ed apparmor: fix differential encoding verification 0fc63dd91706 apparmor: fix unprivileged local user can do privileged policy management 86feeccd6b93 apparmor: Fix double free of ns_name in aa_replace_profiles() 76b4d36c5122 apparmor: fix missing bounds check on DEFAULT table in verify_dfa() b73c1dff8a9d apparmor: fix side-effect bug in match_char() macro usage 853ce31ca720 apparmor: fix: limit the number of levels of policy namespaces 999bd704b0b6 apparmor: replace recursive profile removal with iterative approach 786e2c2a87d9 apparmor: fix memory leak in verify_header 15c3eb8916e7 apparmor: validate DFA start states are in bounds in unpack_pdb 524ce8b4ea8f net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks 42b380f97d65 tracing: Add NULL pointer check to trigger_data_free() 1cf22986da18 selftest/arm64: Fix sve2p1_sigill() to hwcap test c7c790a07697 xdp: produce a warning when calculated tailroom is negative 581e209d1ff0 i40e: use xdp.frame_sz as XDP RxQ info frag_size 7f46fd89d863 i40e: fix registering XDP RxQ info addccd49c541 xsk: introduce helper to determine rxq->frag_size c12b63c87250 xdp: use modulo operation to calculate XDP frag tailroom 91a89d3bdc2f net/sched: act_ife: Fix metalist update behavior f7c9f8e36074 net: ipv6: fix panic when IPv4 route references loopback IPv6 nexthop f0373e9317bc net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled aa73deb3b6b7 net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled 4614301b900a selftests/harness: order TEST_F and XFAIL_ADD constructors 0b7cd6fa9aff kselftest/harness: Use helper to avoid zero-size memset warning b73dfe1ea7be net: ethernet: mtk_eth_soc: Reset prog ptr to old_prog in case of error in mtk_xdp_setup() c12d570d7192 netfilter: nft_set_pipapo: split gc into unlink and reclaim phase dcba62d4fade net: stmmac: Fix error handling in VLAN add and delete paths 78141b8832e1 nfc: rawsock: cancel tx_work before socket teardown 0beea51b28b2 nfc: nci: clear NCI_DATA_EXCHANGE before calling completion callback 3245801d44a4 nfc: nci: free skb on nci_transceive early error paths 0196f36ad01e net_sched: sch_fq: clear q->band_pkt_count[] in fq_reset() 2451949f0584 net: nfc: nci: Fix zero-length proprietary notifications 5bc4e69306ed net: sched: avoid qdisc_reset_all_tx_gt() vs dequeue race for lockless qdiscs 5c38a7ed9a9f hwmon: (max6639) fix inverted polarity d7040a5da952 hwmon: (max6639) : Configure based on DT property 15fb6d627484 nvme: fix memory allocation in nvme_pr_read_keys() a0167a4984ca nvme: reject invalid pr_read_keys() num_keys values 549b68ba830f drm/xe/reg_sr: Fix leak on xa_store failure 9507f9953a2a i2c: i801: Revert "i2c: i801: replace acpi_lock with I2C bus lock" 1e6eaf2150ef drm/sched: Fix kernel-doc warning for drm_sched_job_done() d6bdc685e19f amd-xgbe: fix sleep while atomic on suspend/resume 4bdc94d45d54 net: ipv4: fix ARM64 alignment fault in multipath hash seed 3310fc11fc47 ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu() 827c92c15ac8 smb/client: fix buffer size for smb311_posix_qinfo in SMB311_posix_query_info() 20a126dbd61e smb/client: fix buffer size for smb311_posix_qinfo in smb2_compound_op() cfcfa0ca0212 bpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim 3dfab6040c10 iavf: fix netdev->max_mtu to respect actual hardware limit 27e9019fe199 xen/acpi-processor: fix _CST detection using undersized evaluation buffer 8519e6883a94 net/rds: Fix circular locking dependency in rds_tcp_tune 1f8b8f0db008 indirect_call_wrapper: do not reevaluate function pointer 7b692dff8df0 wifi: mt76: Fix possible oob access in mt76_connac2_mac_write_txwi_80211() 3356464e50e1 wifi: mt76: mt7925: Fix possible oob access in mt7925_mac_write_txwi_80211() ca1adc04fc2c wifi: mt76: mt7996: Fix possible oob access in mt7996_mac_write_txwi_80211() 5feeea59ed14 wifi: wlcore: Fix a locking bug 35e173d7b878 wifi: cw1200: Fix locking in error paths 02973ef983cb octeon_ep_vf: avoid compiler and IQ/OQ reordering 4f3acd77273c octeon_ep_vf: Relocate counter updates before NAPI 496163a7292e octeon_ep: avoid compiler and IQ/OQ reordering 799cc585326f octeon_ep: Relocate counter updates before NAPI d36ad7e126c6 bpf/bonding: reject vlan+srcmac xmit_hash_policy change when XDP is loaded fcb74331c483 net: dsa: realtek: rtl8365mb: fix rtl8365mb_phy_ocp_write return value 6c8d7984cb25 kunit: tool: copy caller args in run_kernel to prevent mutation 8891bffb532a rust: kunit: fix warning when !CONFIG_PRINTK 1a42ea28e01b drm/xe: Do not preempt fence signaling CS instructions b64fbd718cf4 wifi: rsi: Don't default to -EOPNOTSUPP in rsi_mac80211_config 38063cc435b6 can: mcp251x: fix deadlock in error path of mcp251x_open 8bcf2d847adb can: bcm: fix locking for bcm_op runtime updates c8e57b713c17 amd-xgbe: fix MAC_TCR_SS register width for 2.5G and 10M speeds ff4d5a3e77f7 net: ti: icssg-prueth: Fix ping failure after offload mode setup when link speed is not 1G 2d9f57ea29a1 atm: lec: fix null-ptr-deref in lec_arp_clear_vccs fa4412cdc517 dpaa2-switch: Fix interrupt storm after receiving bad if_id in IRQ handler 3f2793713c13 xsk: Fix zero-copy AF_XDP fragment drop 2a9ea988465e xsk: Fix fragment node deletion to prevent buffer leak bf56bae0e5ec xsk: s/free_list_node/list_node/ fd5614763805 xsk: Get rid of xdp_buff_xsk::xskb_list_node ebcdcb5063dd net: ethernet: ti: am65-cpsw-nuss/cpsw-ale: Fix multicast entry handling in ALE table 98c92c9b2414 drm/solomon: Fix page start when updating rectangle in page addressing mode 54b631ac6935 e1000e: clear DPG_EN after reset to avoid autonomous power-gating b7e91827e1cf i40e: Fix preempt count leak in napi poll tracepoint 7f213357476b idpf: change IRQ naming to match netdev and ethtool queue numbering 31f22b8051ee hwmon: (it87) Check the it87_lock() return value 188ba3468cb7 pinctrl: cirrus: cs42l43: Fix double-put in cs42l43_pin_probe() c2611fc89506 HID: multitouch: new class MT_CLS_EGALAX_P80H84 bdaabb4cf660 HID: multitouch: add quirks for Lenovo Yoga Book 9i 6890141e856c platform/x86: thinkpad_acpi: Fix errors reading battery thresholds af3b0ec98dc1 pinctrl: equilibrium: fix warning trace on load 5818c3fcd072 pinctrl: equilibrium: rename irq_chip function callbacks d5e7ed87a3b6 hwmon: (aht10) Fix initialization commands for AHT20 947a50cf8abf hwmon: (aht10) Add support for dht20 64f87b96de0e nvme: fix admin queue leak on controller reset 8cad5463aec6 ACPI: APEI: GHES: Disable KASAN instrumentation when compile testing with clang < 18 400989c54567 btrfs: always fallback to buffered write if the inode requires checksum 5d219040ee7b net: stmmac: dwmac-loongson: Set clk_csr_i to 100-150MHz 4d1ea0416384 ARM: clean up the memset64() C wrapper d151b94967c8 xattr: switch to CLASS(fd) 8899f3d3f3fa selftests: mptcp: join: check removing signal+subflow endp 7141b5997c59 selftests: mptcp: more stable simult_flows tests ec5c17c687b1 scsi: core: Fix refcount leak for tagset_refcnt b746a357abfb smb: client: Don't log plaintext credentials in cifs_set_cifscreds 5b3aa7384329 smb: client: fix broken multichannel with krb5+signing 4a5c8e1b6a58 smb: client: fix cifs_pick_channel when channels are equally loaded 1e906c08594c drbd: fix null-pointer dereference on local read error eef1390125b6 drbd: fix "LOGIC BUG" in drbd_al_begin_io_nonblock() 9e9fa5ad37c9 Squashfs: check metadata block offset is within range 4fcfa424a581 scsi: target: Fix recursive locking in __configfs_open_file() 91f3e8d84c89 tracing: Fix WARN_ON in tracing_buffers_mmap_close 41170716421c nfsd: Fix cred ref leak in nfsd_nl_threads_set_doit(). 78b8d2f55a56 net/sched: ets: fix divide by zero in the offload path 2fd37450d271 RDMA/irdma: Fix kernel stack leak in irdma_create_user_ah() da8eaa73bc37 IB/mthca: Add missed mthca_unmap_user_db() for mthca_create_srq() f5d8af683410 wifi: mac80211: fix NULL pointer dereference in mesh_rx_csa_frame() bfde158d5d13 wifi: mac80211: bounds-check link_id in ieee80211_ml_reconfiguration 57e39fe8da57 wifi: cfg80211: cancel rfkill_block work in wiphy_unregister() 2a60c588d5d3 wifi: radiotap: reject radiotap with unknown bits d3904ca40515 ALSA: usb-audio: Use correct version for UAC3 header validation 9067651da90a platform/x86: dell-wmi: Add audio/mic mute key codes 0e6115c2f2fa platform/x86: dell-wmi-sysman: Don't hex dump plaintext password data 399da820ecfe x86/efi: defer freeing of boot services memory 892dbaf46bb7 HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them 73f2354f5a33 can: usb: f81604: handle bulk write errors properly c5d69da6c919 can: usb: f81604: handle short interrupt urb messages properly b878444519fa can: usb: etas_es58x: correctly anchor the urb in the read bulk callback bd85f21a6219 can: ucan: Fix infinite loop from zero-length messages c001214e1220 can: usb: f81604: correctly anchor the urb in the read bulk callback 18f75b9cbdc3 can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message 95556b4e8797 net: usb: pegasus: validate USB endpoints 51c20ea5f155 net: usb: kalmia: validate USB endpoints f33e80d195a0 net: usb: kaweth: validate USB endpoints 7ff14eb070f0 nfc: pn533: properly drop the usb interface reference on disconnect d71781bad59b media: dvb-core: fix wrong reinitialization of ringbuffer on reopen d1398cca55cf namespace: fix proc mount iteration 029be23f553b eventpoll: Fix integer overflow in ep_loop_check_proc() 2ad8b01cb7ee net: arcnet: com20020-pci: fix support for 2.5Mbit cards ab6a494abecb ALSA: hda/conexant: Fix headphone jack handling on Acer Swift SF314 27e8f7a6a1b8 ALSA: hda/realtek: Add quirk for Samsung Galaxy Book3 Pro 360 (NP965QFG) a797f5ebfca8 ALSA: hda/realtek: Add quirk for Gigabyte G5 KF5 (2023) 57b36d4c3474 LoongArch: Remove some extern variables in source files 8eeb34ae9d4c LoongArch: Handle percpu handler address for ORC unwinder 5d8e3b81aee2 LoongArch: Remove unnecessary checks for ORC unwinder 2e6949777d1d LoongArch/orc: Use RCU in all users of __module_address(). 4c2ca3160852 ksmbd: add chann_lock to protect ksmbd_chann_list xarray c9c00b85b85b ksmbd: check return value of xa_store() in krb5_authenticate 5345810d9a80 hwmon: (max16065) Use READ/WRITE_ONCE to avoid compiler optimization induced race 1b15298ef44b ALSA: hda/conexant: Add quirk for HP ZBook Studio G4 4b9d205dbc74 drm/amd: Fix hang on amdgpu unload by using pci_dev_is_disconnected() 56289298431e usb: cdns3: fix role switching during resume eef31e654661 usb: cdns3: call cdns_power_is_lost() only once in cdns_resume() 151b775f5dbf usb: cdns3: remove redundant if branch 2788b1562776 btrfs: zoned: fixup last alloc pointer after extent removal for RAID0/10 acefb51f406c btrfs: define the AUTO_KFREE/AUTO_KVFREE helper macros 531c755f2507 btrfs: zoned: fix stripe width calculation 3a5125dd004c btrfs: zoned: fixup last alloc pointer after extent removal for DUP 21b26c833bfd btrfs: zoned: fixup last alloc pointer after extent removal for RAID1 ea7cc214d3b3 btrfs: zoned: fix alloc_offset calculation for partly conventional block groups 80cf22e7ffc1 btrfs: fix periodic reclaim condition fcb261823f7a btrfs: fix reclaimed bytes accounting after automatic block group reclaim c41742dabb80 btrfs: get used bytes while holding lock at btrfs_reclaim_bgs_work() be5ee3033326 btrfs: drop unused parameter fs_info from do_reclaim_sweep() 6c9b043177e6 uprobes: Fix incorrect lockdep condition in filter_chain() 1d34cb886c82 uprobes: switch to RCU Tasks Trace flavor for better performance abfdf449fb3d drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free fe99afca8cea drm/exynos/vidi: Remove redundant error handling in vidi_get_modes() 4c4193829109 drm/exynos: vidi: fix to avoid directly dereferencing user pointer 51a31c0bc282 of/kexec: refactor ima_get_kexec_buffer() to use ima_validate_range() f11d7d088f5e ima: verify the previous kernel's IMA buffer lies in addressable RAM a3c9222702e1 ima: kexec: define functions to copy IMA log at soft boot 130e69879746 kexec: define functions to map and unmap segments 24d7c77955b8 ima: define and call ima_alloc_kexec_file_buf() be4ac8d25924 ima: rename variable the seq_file "file" to "ima_kexec_file" 9e6bd0a8c1af ima: kexec: silence RCU list traversal warning a97228fb32e1 clk: tegra: tegra124-emc: fix device leak on set_rate() 76cce803bf51 arm64: dts: rockchip: Fix rk3588 PCIe range mappings 497b04231b8f arm64: dts: rockchip: Fix rk356x PCIe range mappings 48b3f08e68b2 iommu/vt-d: Skip dev-iotlb flush for inaccessible PCIe device without scalable mode 9b5df5eedc02 Input: synaptics_i2c - guard polling restart in resume 432612bf478b Input: synaptics_i2c - replace use of system_wq with system_dfl_wq c8272cfe36bd workqueue: Add system_percpu_wq and system_dfl_wq 9eea2f57d11b ext4: always allocate blocks only from groups inode can use ec23aa36ddf3 ext4: implement linear-like traversal across order xarrays 5abec3fee594 ext4: refactor choose group to scan group d99d714f714c ext4: convert free groups order lists to xarrays 007967dab681 ext4: factor out ext4_mb_scan_group() 2475d11bc431 ext4: factor out ext4_mb_might_prefetch() ca4c90dd2aac ext4: factor out __ext4_mb_scan_group() f0bb92429c97 ext4: add ext4_try_lock_group() to skip busy groups 01d9a8c2615d mailbox: Prevent out-of-bounds access in fw_mbox_index_xlate() ac75c29c9c95 mailbox: Allow controller specific mapping using fwnode b9816026481e mailbox: Use guard/scoped_guard for con_mutex 186ad0c3034a mailbox: Use dev_err when there is error 0469ec15c923 mailbox: remove unused header files c7b57c4d294c mailbox: sort headers alphabetically 492c8eb02e81 mailbox: don't protect of_parse_phandle_with_args with con_mutex 2920ec61c98b ext4: don't set EXT4_GET_BLOCKS_CONVERT when splitting before submitting I/O 3e00915433df ext4: correct the comments place for EXT4_EXT_MAY_ZEROOUT 97ac11dbcb42 drm/tegra: dsi: fix device leak on probe ce22aaed0112 ata: libata-scsi: avoid Non-NCQ command starvation e44a35402439 ata: libata: Introduce ata_port_eh_scheduled() 87097457625a ata: libata: Remove ATA_DFLAG_ZAC device flag 4e0e3c784f37 ata: libata-scsi: Remove struct ata_scsi_args bcb93aeed8b2 ata: libata-scsi: Document all VPD page inquiry actors b057df339361 ata: libata-scsi: Refactor ata_scsiop_maint_in() d62d7321212b ata: libata-scsi: Refactor ata_scsiop_read_cap() 2b3717897c38 ata: libata-scsi: Refactor ata_scsi_simulate() 2657439265d3 KVM: x86: Ignore -EBUSY when checking nested events from vcpu_block() 630a61552e58 media: dw9714: Fix powerup sequence a4cf3497fb9a media: dw9714: add support for powerdown pin 1158193e7635 media: dw9714: move power sequences to dedicated functions 3ca2f0906173 media: tegra-video: Fix memory leak in __tegra_channel_try_format() a29639a34297 PCI: Use resource_set_range() that correctly sets ->end 889b5cb678c1 resource: Add resource set range and size helpers 52d89a64dd31 Revert "PCI: qcom: Don't wait for link if we can detect Link Up" 29ff60fda59f PCI: qcom: Don't wait for link if we can detect Link Up ff6c9a40e426 Revert "PCI: dw-rockchip: Don't wait for link since we can detect Link Up" fdf5e166058a PCI: dw-rockchip: Don't wait for link since we can detect Link Up 1f23a48ff2b8 memory: mtk-smi: fix device leak on larb probe 984992f31cfb memory: mtk-smi: fix device leaks on common probe a7df760f7074 x86/acpi/boot: Correct acpi_is_processor_usable() check again 2129ce65c83e PCI: Correct PCI_CAP_EXP_ENDPOINT_SIZEOF_V2 value d2c31d8e03d0 bpf: Fix stack-out-of-bounds write in devmap 80ad264da02c bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing 283cc83f63e0 btrfs: fix compat mask in error messages in btrfs_check_features() a78db325aca1 btrfs: print correct subvol num if active swapfile prevents deletion 390cc898680e btrfs: fix warning in scrub_verify_one_metadata() ca57b339e4a7 btrfs: fix objectid value in error message in check_extent_data_ref() 0226914e4d5e btrfs: fix incorrect key offset in error message in check_dev_extent_item() 0507cf9ae0a9 ALSA: hda: cs35l56: Fix signedness error in cs35l56_hda_posture_put() 1c84c68e7524 ALSA: pci: hda: use snd_kcontrol_chip() 1359449b33bb drm/amdgpu: Fix locking bugs in error paths 3a9828141d4b drm/amdgpu: Replace kzalloc + copy_from_user with memdup_user 0518ce29ad20 drm/amdgpu: Unlock a mutex before destroying it a7afb8f810c0 PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry 5e13ef9235c7 PCI: dwc: ep: Use align addr function for dw_pcie_ep_raise_{msi,msix}_irq() fd9528fbe2fb PCI: dwc: endpoint: Implement the pci_epc_ops::align_addr() operation 9373f0bf9954 PCI: endpoint: Introduce pci_epc_mem_map()/unmap() fa391a36e178 PCI: endpoint: Introduce pci_epc_function_is_valid() 00d5cf8c5978 s390/vtime: Fix virtual timer forwarding 3120d12adfbf s390/idle: Fix cpu idle exit cpu time accounting 5c48fdc4b462 perf: Fix __perf_event_overflow() vs perf_remove_from_context() race 367e4285127f ALSA: usb-audio: Use inclusive terms 192cc667e77e ALSA: usb-audio: Cap the packet size pre-calculations 1bcc4ea8207a scsi: ufs: core: Move link recovery for hibern8 exit failure to wl_resume 6e4f70034387 cgroup/cpuset: Fix incorrect use of cpuset_update_tasks_cpumask() in update_cpumasks_hier() 27d4450c8f2b rseq: Clarify rseq registration rseq_size bound check comment 3bc5887b0a2b x86/fred: Correct speculative safety in fred_extint() 5190fc2ba7a0 ALSA: usb-audio: Remove VALIDATE_RATES quirk for Focusrite devices 7cefc67b2c4f ALSA: scarlett2: Fix DSP filter control array handling 2fd1470ca412 ALSA: scarlett2: Fix redeclaration of loop variable c5dc39f8ae05 scsi: pm8001: Fix use-after-free in pm8001_queue_command() 734c2363eb8a scsi: lpfc: Properly set WC for DPP mapping 686eb378a4a5 irqchip/sifive-plic: Fix frozen interrupt due to affinity setting 016f1f7ccafd KVM: arm64: Hide S1POE from guests when not supported by the host 871630255ecd drm/logicvc: Fix device node reference leak in logicvc_drm_config_parse() 36cb28b6d303 drm/vmwgfx: Return the correct value in vmw_translate_ptr functions 0d9cb5860077 drm/vmwgfx: Fix invalid kref_put callback in vmw_bo_dirty_release Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 444cab413f..dd906d5ac6 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -15,13 +15,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "5c7879a7b2753ea23b696b6a3e7e4a38c40f5776" -SRCREV_meta ?= "9a7e5434a02c01df4901784d29694d940743d56c" +SRCREV_machine ?= "d684a294eb3f7a4122771290905565ddc36efd45" +SRCREV_meta ?= "19b5087399932add6bc893493fe1146fca7d4799" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.76" +LINUX_VERSION ?= "6.12.77" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 63135de5c7..2803d0215a 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc include recipes-kernel/linux/cve-exclusion.inc include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.76" +LINUX_VERSION ?= "6.12.77" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "b1a05d710b72913717bcc1139e714080d99e79a8" -SRCREV_meta ?= "9a7e5434a02c01df4901784d29694d940743d56c" +SRCREV_machine ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" +SRCREV_meta ?= "19b5087399932add6bc893493fe1146fca7d4799" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index 0e1b1fa61f..294431f5dd 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "9dcacd6df5189be895d0b0d59d728ef61743338d" -SRCREV_machine:qemuarm64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" -SRCREV_machine:qemuloongarch64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" -SRCREV_machine:qemumips ?= "eca7f78fe1f9f2bd98951df1100e46a8e39d0ea0" -SRCREV_machine:qemuppc ?= "b1a05d710b72913717bcc1139e714080d99e79a8" -SRCREV_machine:qemuriscv64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" -SRCREV_machine:qemuriscv32 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" -SRCREV_machine:qemux86 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" -SRCREV_machine:qemux86-64 ?= "b1a05d710b72913717bcc1139e714080d99e79a8" -SRCREV_machine:qemumips64 ?= "8acf70fbeddae4770f3d24cbd8548402ae6a4f9e" -SRCREV_machine ?= "b1a05d710b72913717bcc1139e714080d99e79a8" -SRCREV_meta ?= "9a7e5434a02c01df4901784d29694d940743d56c" +SRCREV_machine:qemuarm ?= "448ef862c891700b3d94201e63a831b34a7713e4" +SRCREV_machine:qemuarm64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" +SRCREV_machine:qemuloongarch64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" +SRCREV_machine:qemumips ?= "794aa4ace83aa50352e4abc39ed84229c864310c" +SRCREV_machine:qemuppc ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" +SRCREV_machine:qemuriscv64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" +SRCREV_machine:qemuriscv32 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" +SRCREV_machine:qemux86 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" +SRCREV_machine:qemux86-64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" +SRCREV_machine:qemumips64 ?= "3b21c90c913a00a52877a25a4cd1aff57fc14695" +SRCREV_machine ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" +SRCREV_meta ?= "19b5087399932add6bc893493fe1146fca7d4799" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the <version>/base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "39b686f8d57d7506af7789e915fe7fd103b0fe57" +SRCREV_machine:class-devupstream ?= "6f232446a62980e51f537db1c655e686d869b9ed" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.76" +LINUX_VERSION ?= "6.12.77" PV = "${LINUX_VERSION}+git" -- 2.43.0 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 10/18] linux-yocto/6.12: update CVE exclusions (6.12.77) 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield ` (8 preceding siblings ...) 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 09/18] linux-yocto/6.12: update to v6.12.77 bruce.ashfield @ 2026-04-23 15:45 ` bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 11/18] linux-yocto/6.12: update to v6.12.79 bruce.ashfield ` (8 subsequent siblings) 18 siblings, 0 replies; 20+ messages in thread From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw) To: yoann.congal; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 21 changes (20 new | 1 updated): - 20 new CVEs: CVE-2025-47873, CVE-2025-58427, CVE-2025-61952, CVE-2025-61979, CVE-2025-62403, CVE-2025-62500, CVE-2025-64301, CVE-2025-64733, CVE-2025-64735, CVE-2025-64776, CVE-2025-65119, CVE-2025-66000, CVE-2025-66042, CVE-2025-66342, CVE-2025-66503, CVE-2025-66617, CVE-2025-66633, CVE-2026-20726, CVE-2026-22882, CVE-2026-25790 - 1 updated CVEs: CVE-2026-3207 Date: Tue, 17 Mar 2026 18:55:39 +0000 ] Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/cve-exclusion_6.12.inc | 20 +++++++++++++------ 1 file changed, 14 insertions(+), 6 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 60d337b010..5fa3966719 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-03-09 19:34:33.465338+00:00 for kernel version 6.12.76 -# From linux_kernel_cves cve_2026-03-09_1900Z-1-gab0cca33c43 +# Generated at 2026-03-17 19:07:54.629545+00:00 for kernel version 6.12.77 +# From linux_kernel_cves cve_2026-03-17_1800Z-2-g4ae4487ca91 python check_kernel_cve_status_version() { - this_version = "6.12.76" + this_version = "6.12.77" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -9032,7 +9032,7 @@ CVE_STATUS[CVE-2023-54326] = "fixed-version: Fixed from version 6.5" CVE_STATUS[CVE-2023-7324] = "fixed-version: Fixed from version 6.3" -# CVE-2024-14027 needs backporting (fixed from 6.13) +CVE_STATUS[CVE-2024-14027] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2024-26581] = "fixed-version: Fixed from version 6.8" @@ -20420,6 +20420,8 @@ CVE_STATUS[CVE-2025-71237] = "cpe-stable-backport: Backported in 6.12.72" CVE_STATUS[CVE-2025-71238] = "cpe-stable-backport: Backported in 6.12.74" +CVE_STATUS[CVE-2025-71239] = "cpe-stable-backport: Backported in 6.12.75" + CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66" CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.12.66" @@ -20920,9 +20922,9 @@ CVE_STATUS[CVE-2026-23224] = "cpe-stable-backport: Backported in 6.12.72" CVE_STATUS[CVE-2026-23225] = "fixed-version: only affects 6.19 onwards" -# CVE-2026-23226 needs backporting (fixed from 7.0rc1) +CVE_STATUS[CVE-2026-23226] = "cpe-stable-backport: Backported in 6.12.77" -# CVE-2026-23227 needs backporting (fixed from 7.0rc1) +CVE_STATUS[CVE-2026-23227] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23228] = "cpe-stable-backport: Backported in 6.12.72" @@ -20946,3 +20948,9 @@ CVE_STATUS[CVE-2026-23237] = "cpe-stable-backport: Backported in 6.12.74" CVE_STATUS[CVE-2026-23238] = "cpe-stable-backport: Backported in 6.12.74" +CVE_STATUS[CVE-2026-23239] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-23240] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-23241] = "cpe-stable-backport: Backported in 6.12.75" + -- 2.43.0 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 11/18] linux-yocto/6.12: update to v6.12.79 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield ` (9 preceding siblings ...) 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 10/18] linux-yocto/6.12: update CVE exclusions (6.12.77) bruce.ashfield @ 2026-04-23 15:45 ` bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 12/18] linux-yocto/6.12: update CVE exclusions (6.12.79) bruce.ashfield ` (7 subsequent siblings) 18 siblings, 0 replies; 20+ messages in thread From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw) To: yoann.congal; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: c2d104a355013 Linux 6.12.79 62f01682102e0 Revert "LoongArch: Add machine_kexec_mask_interrupts() implementation" 4859112559405 Linux 6.12.78 1f00bad1b69b7 xen/privcmd: add boot control for restricted usage in domU 78432d8f0372c xen/privcmd: restrict usage in unprivileged domU 80b02e943613b perf/x86/intel: Add missing branch counters constraint apply e7c963868b67a hwmon: (max6639) Fix pulses-per-revolution implementation ebf6449effd94 tools/bootconfig: fix fd leak in load_xbc_file() on fstat failure 21156d04549d5 lib/bootconfig: check xbc_init_node() return in override path 1db7e11a2e2b9 fs/tests: exec: Remove bad test vector 2e20a886b443a drm/i915/gt: Check set_default_submission() before deferencing 568a25fd7bcdf ksmbd: fix use-after-free in durable v2 replay of active file handles c742b46a153d3 ksmbd: fix use-after-free of share_conf in compound request 131e4cafa7662 drm/amd: fix dcn 2.01 check 7f7d2c4a2333e drm/amd/display: Fix DisplayID not-found handling in parse_edid_displayid_vrr() 33d289267dfd9 mtd: rawnand: brcmnand: skip DMA during panic write f71ce0ae5aefe mtd: rawnand: serialize lock/unlock against other NAND operations 1bfd188284065 mm/shmem, swap: avoid redundant Xarray lookup during swapin 62414eec28583 mm/shmem, swap: improve cached mTHP handling and fix potential hang 1be8e41962f1f mm: shmem: avoid unpaired folio_unlock() in shmem_swapin_folio() b0e49178f2ed1 mm: shmem: fix potential data corruption during shmem swapin 246bbe3ee76f6 mtd: spi-nor: core: avoid odd length/address writes in 8D-8D-8D mode a0563931c0282 mtd: spi-nor: core: avoid odd length/address reads on 8D-8D-8D mode 9956d4892e788 x86/platform/uv: Handle deconfigured sockets da102725b4df3 ring-buffer: Fix to update per-subbuf entries of persistent ring buffer 93cad30c061f4 i2c: pxa: defer reset on Armada 3700 when recovery is used 3facec19f80cc i2c: fsi: Fix a potential leak in fsi_i2c_probe() 13ccf9b106bba i2c: cp2615: fix serial string NULL-deref at probe c6a24845728e9 USB: serial: f81232: fix incomplete serial port generation 3ccfbd4da541e drm/i915/psr: Compute PSR entry_setup_frames into intel_crtc_state 8b3267892b9ce hwmon: (pmbus/isl68137) Fix unchecked return value and use sysfs_emit() 15db8db56499f hwmon: (pmbus/mp2975) Add error check for pmbus_read_word_data() return value 9647e99d2a617 icmp: fix NULL pointer dereference in icmp_tag_validation() 665152cdd8ad0 net: dsa: bcm_sf2: fix missing clk_disable_unprepare() in error paths 7bd20f4b3ef30 net: mvpp2: guard flow control update with global_tx_fc in buffer switching ec8bf0571b142 nfnetlink_osf: validate individual option lengths in fingerprints 7e3955b282eae netfilter: nf_tables: release flowtable after rcu grace period on error cb2bf5efdb02a netfilter: bpf: defer hook memory release until rcu readers are done 6a3bb74e25d79 net: bonding: fix NULL deref in bond_debug_rlb_hash_show 9f036aa0fe46c udp_tunnel: fix NULL deref caused by udp_sock_create6 when CONFIG_IPV6=n 2051c709dce92 net/mlx5e: Fix race condition during IPSec ESN update c3db55dc0f334 net/mlx5e: Prevent concurrent access to IPSec ASO context 869ff44ecf693 net/mlx5: qos: Restrict RTNL area to avoid a lock cycle 25136c005f714 net: macb: fix uninitialized rx_fs_lock e0c470049344e ACPI: processor: Fix previous acpi_processor_errata_piix4() fix cfa64e2b3717b wifi: wlcore: Return -ENOMEM instead of -EAGAIN if there is not enough headroom a90279e7f7ea0 wifi: mac80211: fix NULL deref in mesh_matches_local() 97d97bf5b2d43 iavf: fix VLAN filter lost on add/delete race 5e4c90c94eb76 igc: fix page fault in XDP TX timestamps handling 79a230f90932a igc: fix missing update of skb->tail in igc_xmit_frame() 3267bcb744ee8 net: usb: aqc111: Do not perform PM inside suspend callback 37bef86e5428d clsact: Fix use-after-free in init/destroy rollback asymmetry af0d1613d6751 net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check 789204f980730 net: usb: cdc_ncm: add ndpoffset to NDP16 nframes bounds check 652ec118d8dc1 net: airoha: Remove airoha_dev_stop() in airoha_remove() 4cba4373abac7 net: airoha: Read completion queue data in airoha_qdma_tx_napi_poll() a04ac7bc97afe net: airoha: fix PSE memory configuration in airoha_fe_pse_ports_init() a9ed47c366321 net: airoha: read default PSE reserved pages value before updating afbc79a7770b2 net/sched: teql: Fix double-free in teql_master_xmit cadf3da46c155 net/smc: fix NULL dereference and UAF in smc_tcp_syn_recv_sock() 946bb6cacf0cc bonding: prevent potential infinite loop in bond_header_parse() c6febaacfb8a0 PM: runtime: Fix a race condition related to device removal bd2a8f06c263b sched: idle: Consolidate the handling of two special cases 2b001901f6890 net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown dcb88a003e390 net: bcmgenet: increase WoL poll timeout 633e8f87dad32 netfilter: nf_conntrack_h323: check for zero length in DecodeQ931() 171fe8e6da02c netfilter: xt_time: use unsigned int for monthday bit shift 19a230dec6bb8 netfilter: xt_CT: drop pending enqueued packets on template removal 6802ff8beceb9 netfilter: nft_ct: drop pending enqueued packets on removal d1354873cbe3b nf_tables: nft_dynset: fix possible stateful expression memleak in error path 774a434f8c9c8 netfilter: nf_conntrack_h323: fix OOB read in decode_int() CONS case 75fcaee5170e7 netfilter: nf_conntrack_sip: fix Content-Length u32 truncation in sip_help_tcp() f025171feef2a netfilter: ctnetlink: fix use-after-free in ctnetlink_dump_exp_ct() 078d33c95bf53 netfilter: ctnetlink: remove refcounting in expectation dumpers be3a573ba719f mpls: add missing unregister_netdevice_notifier to mpls_init 508f49ccbe032 net/rose: fix NULL pointer dereference in rose_transmit_link on reconnect e89dbd2736a45 bridge: cfm: Fix race condition in peer_mep deletion 8f8023ad95045 Bluetooth: qca: fix ROM version reading on WCN3998 chips c22a5e659959e Bluetooth: L2CAP: Fix use-after-free in l2cap_unregister_user 7c805b7d1e580 Bluetooth: HIDP: Fix possible UAF 695b45b2262fc Bluetooth: MGMT: Fix list corruption and UAF in command complete handlers 537a42a62e400 Bluetooth: hci_sync: Fix hci_le_create_conn_sync f678ea4b1315f Bluetooth: ISO: Fix defer tests being unstable c53c85583591b Bluetooth: SMP: make SM/PER/KDU/BI-04-C happy ca97abddf1968 Bluetooth: LE L2CAP: Disconnect if sum of payload sizes exceed SDU ab0b2de04d8de Bluetooth: LE L2CAP: Disconnect if received packet's SDU exceeds IMTU 158802642a695 firmware: arm_scpi: Fix device_node reference leak in probe path 71cdba40b4f8e firmware: arm_ffa: Remove vm_id argument in ffa_rxtx_unmap() b82eac7a1a38f arm64: dts: renesas: r9a09g057: Remove wdt{0,2,3} nodes d82a0f77999fb arm64: dts: renesas: r9a09g057: Add RTC node d32c07ef1880f wifi: cfg80211: cancel pmsr_free_wk in cfg80211_pmsr_wdev_down 29a1a350afcd2 wifi: mac80211: Fix static_branch_dec() underflow for aql_disable. af521c7d80ecc soc: fsl: cpm1: qmc: Fix error check for devm_ioremap_resource() in qmc_qe_init_resources() 751f60bd48eda soc: fsl: qbman: fix race condition in qman_destroy_fq 209551351a701 soc: rockchip: grf: Add missing of_node_put() when returning 44084194298cd cache: ax45mp: Fix device node reference leak in ax45mp_cache_init() bff13109276a6 cache: starfive: fix device node leak in starlink_cache_init() da4b44c42f405 soc: microchip: mpfs: Fix memory leak in mpfs_sys_controller_probe() e6b8133e0f51d btrfs: tree-checker: fix misleading root drop_level error message f556b1e09d054 btrfs: log new dentries when logging parent dir of a conflicting inode 18f67e5930724 ata: libata-scsi: report correct sense field pointer in ata_scsiop_maint_in() e9b76a88cf046 ata: libata-scsi: Return residual for emulated SCSI commands 6b949a6b33cbd Bluetooth: L2CAP: Fix accepting multiple L2CAP_ECRED_CONN_REQ e2b424aadecb6 drm/xe: Open-code GGTT MMIO access protection 91edd662f4d9f drm/xe/oa: Allow reading after disabling OA stream b7a629d07908b drm/amdgpu: apply state adjust rules to some additional HAINAN vairants 0285fc016a4fb drm/radeon: apply state adjust rules to some additional HAINAN vairants f99e8b813ae5c drm/imagination: Fix deadlock in soft reset sequence 5af0510112313 drm/amdgpu/mmhub4.1.0: add bounds checking for cid d23171e11a220 drm/amdgpu/mmhub3.0: add bounds checking for cid 76b0c2e88d1a2 drm/amdgpu/mmhub3.0.2: add bounds checking for cid 2acb07d01c435 drm/amdgpu/mmhub3.0.1: add bounds checking for cid 3ca77111881c4 drm/amdgpu/mmhub2.3: add bounds checking for cid 5b53680ff3f3d drm/amdgpu/mmhub2.0: add bounds checking for cid 04a789b30b002 drm/amdgpu/gmc9.0: add bounds checking for cid 68b2678c5f85e drm/amd/display: Wrap dcn32_override_min_req_memclk() in DC_FP_{START, END} 7e3ec3bf40151 drm: Fix use-after-free on framebuffers and property blobs when calling drm_dev_unplug 0866809dfe19d io_uring/kbuf: propagate BUF_MORE through early buffer commit path 04d57b332e37b serial: uartlite: fix PM runtime usage count underflow on probe 0bae1c670aa8c serial: 8250: Add late synchronize_irq() to shutdown to handle DW UART BUSY 2a72403b985ae serial: 8250: Fix TX deadlock when using DMA 868b44e2f6467 serial: 8250_pci: add support for the AX99100 31fd1e0281621 iommu/vt-d: Fix intel iommu iotlb sync hardlockup and retry 2025b2d1f9d5c mtd: Avoid boot crash in RedBoot partition table parser 0643441d70234 mtd: rawnand: cadence: Fix error check for dma_alloc_coherent() in cadence_nand_init() c96bae994552c mtd: rawnand: pl353: make sure optimal timings are applied df30056c78e8b spi: fix statistics allocation afe27c1f43aa5 spi: fix use-after-free on controller registration failure ea4fa54b83bb2 pmdomain: bcm: bcm2835-power: Increase ASB control timeout 45fd9d8352f22 mmc: sdhci: fix timing selection for 1-bit bus width 570bbd5264897 mmc: sdhci-pci-gli: fix GL9750 DMA write corruption 26760c3382d26 ata: libata-core: disable LPM on ADATA SU680 SSD 2ee1064926d33 net: macb: Reinitialize tx/rx queue pointer registers and rx ring during resume f1cf6177b2304 net: macb: Introduce gem_init_rx_ring() 6e40ebb999c2c batman-adv: avoid OGM aggregation when skb tailroom is insufficient e3d8efc157bc5 btrfs: fix transaction abort when snapshotting received subvolumes 4998dac563257 kprobes: Remove unneeded warnings from __arm_kprobe_ftrace() 7838880e78fd3 kprobes: Remove unneeded goto c75bdffc07599 powerpc64/bpf: fix kfunc call support a87072464ebb6 powerpc64/bpf: Fold bpf_jit_emit_func_call_hlp() into bpf_jit_emit_func_call_rel() cd3215d74b323 s390/zcrypt: Enable AUTOSEL_DOM for CCA serialnr sysfs attribute 1ec7d3c7dc8f2 drm/i915/psr: Write DSC parameters on Selective Update in ET mode 5329d725add8a drm/i915/dsc: Add helper for writing DSC Selective Update ET parameters 182d342b111f3 drm/i915/dsc: Add Selective Update register definitions ce00616bc1df6 ksmbd: use volume UUID in FS_OBJECT_ID_INFORMATION 89afe5e2dbea6 ksmbd: unset conn->binding on failed binding request d33cbf0bf8979 smb: client: fix krb5 mount with username option 9aeacde4da0f0 Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access d90150c72d2e6 Bluetooth: L2CAP: Fix type confusion in l2cap_ecred_reconf_rsp() 65c25b588994d mac80211: fix crash in ieee80211_chan_bw_change for AP_VLAN stations d646b038baea3 parisc: Flush correct cache in cacheflush() syscall 0bb848d8c6493 net: macb: fix use-after-free access to PTP clock 548a1bfe59136 NFC: nxp-nci: allow GPIOs to sleep 2970f0f4e7da7 LoongArch: Give more information if kmem access failed 2c638259ad750 nvdimm/bus: Fix potential use after free in asynchronous initialization 301670dcd098c sunrpc: fix cache_request leak in cache_release d6efaa50af62f HID: bpf: prevent buffer overflow in hid_hw_request 9cd1005cecfcc selftests/hid: fix compilation when bpf_wq and hid_device are not exported dad0c3c0a8e5d nfsd: fix heap overflow in NFSv4.0 LOCK replay cache e3d77f935639e NFSD: Hold net reference for the lifetime of /proc/fs/nfs/exports fd 0479268fdfaaf drm/amdgpu: Add basic validation for RAS header 0ea986a1cebae drm/amd/pm: Use pm_display_cfg in legacy DPM (v2) c179bece52fd2 drm/amd/display: Add pixel_clock to amd_pp_display_configuration b0e9965cebf9f drm/i915/psr: Repeat Selective Update area alignment bc4a6620e4243 drm/i915/alpm: ALPM disable fixes c962bdcd24b49 s390/xor: Fix xor_xc_2() inline assembly constraints 6949c35ef26e4 s390/stackleak: Fix __stackleak_poison() inline assembly constraint d2fc2dcfce47a sched/fair: Fix zero_vruntime tracking f3fb54e7a8b4a io_uring/kbuf: check if target buffer list is still legacy on recycle cc095cd305fdd sched_ext: Remove redundant css_put() in scx_cgroup_init() 08de46a75f91a mm: thp: deny THP for files on anonymous inodes ad07ea069f924 erofs: fix inline data read failure for ztailpacking pclusters 695455fbc4905 xfs: get rid of the xchk_xfile_*_descr calls 6cce7bc7fac84 binfmt_misc: restore write access before closing files opened by open_exec() b358fc6ff3b35 net: dsa: properly keep track of conduit reference fc023b8fab057 dmaengine: mmp_pdma: Fix race condition in mmp_pdma_residue() 7b4bfd02c934d blk-throttle: fix access race during throttle policy activation 25d2dc669f2a7 f2fs: fix to avoid migrating empty section cc81768212cdc f2fs: compress: fix UAF of f2fs_inode_info in f2fs_free_dic 7c002e242ddd0 f2fs: compress: change the first parameter of page_array_{alloc,free} to sbi cd19a32de5d05 net: stmmac: remove support for lpi_intr_o 7c1d221e475e3 mptcp: pm: in-kernel: always set ID as avail when rm endp 996092ba6df66 platform/x86/amd/pmc: Add support for Van Gogh SoC 5844e21800dc2 x86/uprobes: Fix XOL allocation failure for 32-bit tasks 55a88ab8a1314 io_uring/uring_cmd: fix too strict requirement on ioctl 079050a23de6b Octeontx2-af: Add proper checks for fwdata 19e18e6dabb1b tracing: Add recursion protection in kernel stack trace recording 8ac7dd0f813fb ice: fix devlink reload call trace 0c3666ec18864 btrfs: do not strictly require dirty metadata threshold for metadata writepages cf969bddd6e69 rxrpc: Fix recvmsg() unconditional requeue 4220cb3740691 dm-verity: disable recursive forward error correction bd0905e2122e3 ipv6: use RCU in ip6_xmit() 91c228f96fcfa drm/xe/sync: Cleanup partially initialized sync on parse failure 3729fd784d156 xfs: fix integer overflow in bmap intent sort comparator 1ab70c260cf16 crypto: atmel-sha204a - Fix OOM ->tfm_count leak 0e4b8faaaebe3 cifs: open files should not hold ref on superblock 88f974fe118cb net: macb: Shuffle the tx ring before enabling tx c20b47ae4f4dd drm/bridge: ti-sn65dsi83: halve horizontal syncs for dual LVDS output 3fe2d9ec166b7 ksmbd: Don't log keys in SMB3 signing and encryption key generation 60fe02840272d KVM: x86: Introduce KVM_X86_QUIRK_VMCS12_ALLOW_FREEZE_IN_SMM 0e729a5368925 KVM: nVMX: Add consistency checks for CR0.WP and CR4.CET 4055f250a3294 KVM: x86: Introduce Intel specific quirk KVM_X86_QUIRK_IGNORE_GUEST_PAT 18fd5e4bcf04d KVM: x86: Introduce supported_quirks to block disabling quirks 541304df9d989 KVM: x86: Allow vendor code to disable quirks 70bc291dcc804 KVM: x86: do not allow re-enabling quirks d3e2196c3e534 KVM: x86: Quirk initialization of feature MSRs to KVM's max configuration 715b07abac522 KVM: x86: Co-locate initialization of feature MSRs in kvm_arch_vcpu_create() 5bc7aeb75b65e fgraph: Fix thresh_return clear per-task notrace 2ca7125fff6bb iomap: reject delalloc mappings during writeback e0b14bf06393b sched_ext: Fix starvation of scx_enable() under fair-class saturation 41423912f7ac7 sched_ext: Disable preemption between scx_claim_exit() and kicking helper work 3376b345df155 nsfs: tighten permission checks for ns iteration ioctls fe8b548fb40da mm/kfence: fix KASAN hardware tag faults during late enablement e305204d7a5a8 mm/page_alloc: forward the gfp flags from alloc_contig_range() to post_alloc_hook() 05634a14e7437 mm/page_alloc: sort out the alloc_contig_range() gfp flags mess 9287df8de02e6 mm/page_alloc: move set_page_refcounted() to callers of post_alloc_hook() a10b3c5dec40e mmc: dw_mmc-rockchip: Fix runtime PM support for internal phase support 7457b35afafef mmc: dw_mmc-rockchip: Add memory clock auto-gating support bcb599684ef14 mmc: dw_mmc-rockchip: use modern PM macros 01651e7751edb KVM: SVM: Set/clear CR8 write interception when AVIC is (de)activated 04898c16f1bca KVM: SVM: Add a helper to look up the max physical ID for AVIC eb78f67f94d0e KVM: SVM: Limit AVIC physical max index based on configured max_vcpu_ids f962ca3b020e1 usb: gadget: f_tcm: Fix NULL pointer dereferences in nexus handling 93f116c3393a2 usb: gadget: f_ncm: Fix net_device lifecycle with device_move b1e8c177c033b cleanup: Provide retain_and_null_ptr() 88ced0d1aa62f can: gs_usb: gs_can_open(): always configure bitrates before starting device 970e13ead0a1e xfs: Fix error pointer dereference 035d0d09d5ab3 net/sched: act_gate: snapshot parameters with RCU on replace 03a072e0fbf99 kbuild: Leave objtool binary around with 'make clean' a60307872a2e3 selftests: mptcp: join: check RM_ADDR not sent over same subflow f6429557edd01 selftests: mptcp: add a check for 'add_addr_accepted' 27c9acbb9c81f drm/amd/display: Use GFP_ATOMIC in dc_create_stream_for_sink 5299c355c0921 mptcp: pm: avoid sending RM_ADDR over same subflow 67f34ab318807 mptcp: pm: in-kernel: always mark signal+subflow endp as used 3bc5856bd458b perf/x86/intel/uncore: Add per-scheduler IMC CAS count events 4597b9243fcce perf/x86/intel/uncore: Support more units on Granite Rapids d0155fe68f31b wifi: libertas: fix use-after-free in lbs_free_adapter() 0b6e86e18c354 platform/x86: hp-bioscfg: Support allocations of larger data 99e7b48c03972 x86/sev: Allow IBPB-on-Entry feature for SNP guests 241cd64cf2e32 net: phy: register phy led_triggers during probe to avoid AB-BA deadlock c171f90f58974 gve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL 65ed52200080e spi: cadence-quadspi: Implement refcount to handle unbind during busy 34d6691933682 ksmbd: call ksmbd_vfs_kern_path_end_removing() on some error paths f24a52948c95e dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() 7955a914cf935 smb: client: Compare MACs in constant time 2cdc56ed67615 ksmbd: Compare MACs in constant time 02669e2a4d207 net/tcp-md5: Fix MAC comparison to be constant-time 43515d1d4d826 drm/bridge: ti-sn65dsi86: Add support for DisplayPort mode with HPD d7159817b9f36 i3c: mipi-i3c-hci: Add missing TID field to no-op command descriptor bc729067d180a i3c: mipi-i3c-hci: Restart DMA ring correctly after dequeue abort 5775296df3cc2 i3c: mipi-i3c-hci: Use ETIMEDOUT instead of ETIME for timeout errors 451ec5e67444f iio: proximity: hx9023s: Protect against division by zero in set_samp_freq b776df251da87 iio: imu: inv_icm42600: fix odr switch when turning buffer off 1d9243d418153 iio: imu: inv_icm42600: fix odr switch to the same value 65932eadd9596 iio: gyro: mpu3050-i2c: fix pm_runtime error handling 66c0d1d600e7b iio: gyro: mpu3050-core: fix pm_runtime error handling 52b56f4377b78 iio: buffer: Fix wait_queue not being removed 3b99983617f9b iio: chemical: bme680: Fix measurement wait duration calculation bb99fac138b49 iio: potentiometer: mcp4131: fix double application of wiper shift 2a4d111a6a34a iio: chemical: sps30_i2c: fix buffer size in sps30_i2c_read_meas() 154a37c0d475a iio: chemical: sps30_serial: fix buffer size in sps30_serial_read_meas() 6bef4094e3c84 iio: frequency: adf4377: Fix duplicated soft reset mask d67832dc1dc96 iio: dac: ds4424: reject -128 RAW value 05d064e3633f3 btrfs: abort transaction on failure to update root in the received subvol ioctl 2e57b8cac2ba0 btrfs: fix transaction abort on set received ioctl due to item overflow 5e2ea10b800d1 btrfs: fix transaction abort on file creation due to name hash collision 7874947057851 smb: client: fix iface port assignment in parse_server_interfaces 52327268224fb smb: client: fix in-place encryption corruption in SMB2_write() b8dda19e36b1e smb: client: fix atomic open with O_DIRECT & O_SYNC ab10bf1645618 lib/bootconfig: check bounds before writing in __xbc_open_brace() 197c3716937ba lib/bootconfig: fix snprintf truncation check in xbc_node_compose_key_after() 1a85f84214f9d x86/apic: Disable x2apic on resume if the kernel expects so 2cb75e66b6f0c scsi: core: Fix error handling for scsi_alloc_sdev() 6a1b45a06880a lib/bootconfig: fix off-by-one in xbc_verify_tree() unclosed brace error b9f26a4b7f821 s390/dasd: Copy detected format information to secondary device 6413c7d2f71ef s390/dasd: Move quiesce state with pprc swap db353ade50dc3 xfs: ensure dquot item is deleted from AIL only after log shutdown e88ce9f0536f3 xfs: fix undersized l_iclog_roundoff values 2705ca90792b9 xfs: fix returned valued from xfs_defer_can_append 72a0bb8de73a7 cifs: make default value of retrans as zero f54fff845e469 qmi_wwan: allow max_mtu above hard_mtu to control rx_urb_size 06722ffc58135 tracing: Fix trace_buf_size= cmdline parameter with sizes >= 2G a8f96f00edcd2 tracing: Fix enabling multiple events on the kernel command line and bootconfig d34bc6eef9c5d drm/msm: Fix dma_free_attrs() buffer size 1c956f0fccc26 drm/i915: Fix potential overflow of shmem scatterlist length 3133acd82556a drm/bridge: ti-sn65dsi83: fix CHA_DSI_CLK_RANGE rounding 01c82133e226f drm/amd: Set num IP blocks to 0 if discovery fails 904025fa8bba1 drm/amdgpu: Fix use-after-free race in VM acquire a8de25f00bbf7 drm/amd/pm: remove invalid gpu_metrics.energy_accumulator on smu v13.0.x e80fef36c676c net: dsa: microchip: Fix error path in PTP IRQ setup d0f2386f52980 net: ethernet: arc: emac: quiesce interrupts before requesting IRQ 553366c271479 net: ncsi: fix skb leak in error paths abf4feaee6405 net: nexthop: fix percpu use-after-free in remove_nh_grp_entry 08aa9f3c8cf4d ksmbd: fix use-after-free by using call_rcu() for oplock_info 54b48ae83de8b smb: server: fix use-after-free in smb2_open() 960699317d39f ksmbd: fix use-after-free in smb_lazy_parent_lease_break_close() 7abf59e1852ed drm/amd/display: Fallback to boot snapshot for dispclk f897b72cc74d2 ata: libata-core: Disable LPM on ST1000DM010-2EP102 6b36695f5ec50 pmdomain: bcm: bcm2835-power: Fix broken reset status read 540e52dcf225a parisc: Check kernel mapping earlier at bootup 05d239f2c95e6 arm64: contpte: fix set_access_flags() no-op check for SMMU/ATS faults 7d1f55d8799a9 parisc: Fix initial page table creation for boot b48a0f8d4541a hwmon: (pmbus/q54sj108a2) fix stack overflow in debugfs read ab67221a6fdaf arm64: mm: Add PTE_DIRTY back to PAGE_KERNEL* to fix kexec/hibernation 6bdd2d70c338d nouveau/dpcd: return EBUSY for aux xfer if the device is asleep ce8ef2be6ae81 parisc: Increase initial mapping to 64 MB with KALLSYMS b7e5d8ddfdf1d batman-adv: Avoid double-rtnl_lock ELP metric worker 8be6ed64966da net/tcp-ao: Fix MAC comparison to be constant-time c2bbdee7650ca tracing: Fix syscall events activation by ensuring refcount hits zero efd959809cf6f ice: fix retry for AQ command 0x06EE 065783d651492 net: mana: Ring doorbell at 4 CQ wraparounds 145e50c2c700f media: dvb-net: fix OOB access in ULE extension header tables e14a1148f02e8 staging: rtl8723bs: fix potential out-of-bounds read in rtw_restruct_wmm_ie 821f7d759fb2d staging: rtl8723bs: properly validate the data in rtw_get_ie_ex() 27694ccbd8398 ixgbevf: fix link setup issue 0709748234159 ice: reintroduce retry mechanism for indirect AQ 0e4aaf5a3212b btrfs: fix chunk map leak in btrfs_map_block() after btrfs_chunk_map_num_copies() bb19587205443 irqchip/gic-v3-its: Limit number of per-device MSIs to the range the ITS supports 64dc258f9eec1 device property: Allow secondary lookup in fwnode_get_next_child_node() 02e87ec0bc706 nfsd: Fix cred ref leak in nfsd_nl_listener_set_doit(). 854f926195762 s390/pfault: Fix virtual vs physical address confusion 22d1abf8f5250 drm/bridge: ti-sn65dsi86: Enable HPD polling if IRQ is not used 0b07f7d2c5a40 drm/bridge: samsung-dsim: Fix memory leak in error path bde8659d8b51f drm/amd: Disable MES LR compute W/A 655d719aadbb8 Revert "tcpm: allow looking for role_sw device in the main node" 07faa2aaa6984 Fix CC_HAS_ASM_GOTO_OUTPUT on non-x86 architectures 391983c9118ea kbuild: Disable CC_HAS_ASM_GOTO_OUTPUT on clang < 17 40119a21d9769 scsi: hisi_sas: Fix NULL pointer exception during user_scan() 393763830ec84 scsi: hisi_sas: Use macro instead of magic number 890bcf9ef90ea scsi: hisi_sas: Add time interval between two H2D FIS following soft reset spec 2fcc2fc21cae7 scsi: ufs: core: Fix SError in ufshcd_rtc_work() during UFS suspend 980f18d058049 i3c: dw-i3c-master: Set SIR_REJECT in DAT on device attach and reattach 8ee08589549c2 time/jiffies: Mark jiffies_64_to_clock_t() notrace 5895d0164c84d ceph: fix memory leaks in ceph_mdsc_build_path() aedd29386b23f ceph: fix i_nlink underrun during async unlink f35736a3ae736 libceph: admit message frames only in CEPH_CON_S_OPEN state b268984ae88cb libceph: Use u32 for non-negative values in ceph_monmap_decode() dbd857a9e1e33 libceph: prevent potential out-of-bounds reads in process_message_header() 27a2a3c26ed30 libceph: reject preamble if control segment is empty ed024d2f4c79c libceph: Fix potential out-of-bounds access in ceph_handle_auth_reply() 644b47f0574fd ceph: add a bunch of missing ceph_path_info initializers b0ca81616a010 kprobes: avoid crash when rmmod/insmod after ftrace killed c2ebfbe63deb7 tipc: fix divide-by-zero in tipc_sk_filter_connect() 0da170b9e600d ASoC: qcom: qdsp6: Fix q6apm remove ordering during ADSP stop and start 45038e03f15e9 mmc: core: Avoid bitfield RMW for claim/retune flags 44520da00f6b2 mm/kfence: disable KFENCE upon KASAN HW tags enablement 590f8a4ad46c0 mmc: mmci: Fix device_node reference leak in of_get_dml_pipe_index() b07fc09a226c7 mm/tracing: rss_stat: ensure curr is false from kthread context 19a44efe43fec rust: kbuild: allow `unused_features` d4a400a6a4c4d usb: image: mdc800: kill download URB on timeout 7003be7a51189 usb: mdc800: handle signal and read racing 6287e0c01ccb8 usb: renesas_usbhs: fix use-after-free in ISR during device removal 276aef0fd2b92 usb: class: cdc-wdm: fix reordering issue in read code path 24b31a227f679 USB: core: Limit the length of unkillable synchronous timeouts 0535f84cb94c9 USB: usbtmc: Use usb_bulk_msg_killable() with user-specified timeouts 53ab34d522e50 USB: usbcore: Introduce usb_bulk_msg_killable() 5b561fabe682e usb: typec: altmode/displayport: set displayport signaling rate in configure message ed8c19af08423 usb: roles: get usb role switch from parent only for usb-b-connector c8eb4016c2571 usb: cdc-acm: Restore CAP_BRK functionnality to CH343 f43e86c19101c usb: core: don't power off roothub PHYs if phy_set_mode() fails 78aae91d7db26 usb: misc: uss720: properly clean up reference in uss720_probe() 5df5ce0cac6c2 usb: dwc3: pci: add support for the Intel Nova Lake -H 3cec135415a89 usb: yurex: fix race in probe 6f91f3f087194 usb: xhci: Prevent interrupt storm on host controller error (HCE) 807e4fb5140c7 usb: xhci: Fix memory leak in xhci_disable_slot() 015af103c06cb USB: ezcap401 needs USB_QUIRK_NO_BOS to function on 10gbs usb speed eb07da446ad97 usb/core/quirks: Add Huawei ME906S-device to wakeup quirk 41f33bd77bb51 USB: add QUIRK_NO_BOS for video capture several devices 43cbfb3bd6042 KVM: SVM: Initialize AVIC VMCB fields if AVIC is enabled with in-kernel APIC fe1c92383a771 ASoC: amd: yc: Add DMI quirk for ASUS EXPERTBOOK PM1503CDA 84e39ec13122b ata: libata-core: Add BRIDGE_OK quirk for QEMU drives 9037a536df46e net: usb: lan78xx: skip LTM configuration for LAN7850 cab4d982de09d net: usb: lan78xx: fix TX byte statistics for small packets b46d769ab2a05 net: usb: lan78xx: fix silent drop of packets with checksum errors b267255c15d2a ALSA: usb-audio: Check endpoint numbers at parsing Scarlett2 mixer interfaces ae8f8d30d334b ALSA: pcm: fix use-after-free on linked stream runtime in snd_pcm_drain() 9cca530c7cc1b cgroup: fix race between task migration and iteration ba76b18d8d2c8 Revert "arm64: dts: qcom: sdm845-oneplus: Mark l14a regulator as boot-on" 228b379363761 usb: gadget: f_mass_storage: Fix potential integer overflow in check_command_size_in_blocks() e4c887b673ec4 iio: imu: inv-mpu9150: fix irq ack preventing irq storms 1ecc39dc8cdc3 net: prevent NULL deref in ip[6]tunnel_xmit() 357fc9f07dbc3 octeontx2-af: devlink: fix NIX RAS reporter to use RAS interrupt status ad403c9607eb0 octeontx2-af: devlink: fix NIX RAS reporter recovery condition f18640b9236ea net: dsa: realtek: Fix LED group port bit for non-zero LED group c78f01abe5358 net: bonding: Fix nd_tbl NULL dereference when IPv6 is disabled 781110700ada2 drm/amdkfd: Unreserve bo if queue update failed 5f8d1ed366d86 ASoC: detect empty DMI strings 33de168afdd57 ASoC: amd: acp3x-rt5682-max9836: Add missing error check for clock acquisition 2ca9da563a5fc ACPI: OSL: fix __iomem type on return from acpi_os_map_generic_address() dd8ac1017b3c2 net: bcmgenet: fix broken EEE by converting to phylib-managed state fa5ba9867a55e e1000/e1000e: Fix leak in DMA error cleanup 5f205d2d640c8 i40e: fix src IP mask checks and memcpy argument names in cloud filter 843e913cef4e3 nvme-pci: Fix race bug in nvme_poll_irqdisable() 50bad78f03a02 nvme-pci: Fix slab-out-of-bounds in nvme_dbbuf_set 8d770de29989c sched: idle: Make skipping governor callbacks more consistent 6d9fc17dce6a2 perf ftrace: Fix hashmap__new() error checking baefa11ec8dc4 regulator: pca9450: Correct interrupt type 61e1a600338fc perf annotate: Fix hashmap__new() error checking 5e7ece24c5cb7 netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels 894c5780ddadd netfilter: nfnetlink_cthelper: fix OOB read in nfnl_cthelper_dump_table() cf4a4df38d174 netfilter: nfnetlink_queue: fix entry leak in bridge verdict error path 5b18b8b35c7cd netfilter: x_tables: guard option walkers against 1-byte tail reads dfbdac7191987 netfilter: nft_set_pipapo: fix stack out-of-bounds read in pipapo_drop() eb0948fa13298 netfilter: nf_tables: always walk all pending catchall elements 834c4f645726a net: add xmit recursion limit to tunnel xmit functions 0d070be560e6e xdp: register system page pool as an XDP memory model 2b1c64db6934f xdp: allow attaching already registered memory model to xdp_rxq_info 4f9c20113f87d amd-xgbe: prevent CRC errors during RX adaptation with AN disabled 9285fe46130ca amd-xgbe: fix link status handling in xgbe_rx_adaptation 0695712f3a6f1 mctp: route: hold key->lock in mctp_flow_prepare_output() 9baf26a91565b bonding: fix type confusion in bond_setup_by_slave() c8d250e0a8d61 bonding: use common function to compute the features 744c03df1002f net: add a common function to compute features for upper devices 00ed3c3ade696 bonding: Correctly support GSO ESP offload 999fed0236754 bonding: add ESP offload features when slaves support cde0bccc67739 can: hi311x: hi3110_open(): add check for hi3110_power_enable() return value 9f81be2ab9d8e mctp: i2c: fix skb memory leak in receive path acf162d8d7e91 bnxt_en: Fix RSS table size check when changing ethtool channels 27e43356d0def serial: caif: hold tty->link reference in ldisc_open and ser_release bbdf6d378e1dd net: sfp: improve Huawei MA5671a fixup 7dcf2de716560 ASoC: simple-card-utils: fix graph_util_is_ports0() for DT overlays 142a386a80580 ASoC: simple-card-utils: use __free(device_node) for device node eab71e11ce244 ASoC: soc-core: flush delayed work before removing DAIs and widgets b467eb43b5e98 ASoC: soc-core: drop delayed_work_pending() check before flush 3e41ae3fddcb7 drm/sitronix/st7586: fix bad pixel data due to byte swap 81a43e8005366 net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit 9c5ee9b981ee0 net/mlx5e: Fix DMA FIFO desync on error CQE SQ recovery 05c9a6df3646c net/mlx5: Fix crash when moving to switchdev mode 3c7313cb41b1b net/mlx5: Fix deadlock between devlink lock and esw->wq d7079f496a790 net/mlx5: Query to see if host PF is disabled 752e14738479c net/mlx5: IFC updates for disabled host PF eb9af3de556db bonding: handle BOND_LINK_FAIL, BOND_LINK_BACK as valid link states 9bd8c7a11c4ca drm/amd/pm: add missing od setting PP_OD_FEATURE_ZERO_FAN_BIT for smu v14 06a6e2d3c57b9 drm/msm/dsi: fix pclk rate calculation for bonded dsi 5a16ae6e3f174 net: dsa: realtek: rtl8365mb: remove ifOutDiscards from rx_packets 955387df028de perf disasm: Fix off-by-one bug in outside check 9937423c6647e workqueue: Use POOL_BH instead of WQ_BH when checking pool flags c1c08fd42a8ff btrfs: hold space_info->lock when clearing periodic reclaim ready 49f53ee4e2529 xprtrdma: Decrement re_receiving on the early exit paths 275dc9f8bc3c1 drm/msm/dsi: fix hdisplay calculation when programming dsi registers 7e2963773760a nfs: return EISDIR on nfs3_proc_create if d_alias is a dir d1e8b015bc621 smb/server: Fix another refcount leak in smb2_open() ca235eac5b3af powerpc: 83xx: km83xx: Fix keymile vendor prefix a8e66eed84608 remoteproc: mediatek: Unprepare SCP clock during system suspend ae48ed8c39686 remoteproc: sysmon: Correct subsys_name_len type in QMI request 631b7e154e58c powerpc/crash: adjust the elfcorehdr size b273e3a1b9ef3 powerpc/kexec/core: use big-endian types for crash variables c65c6ee4c56c5 kexec: Include kernel-end even without crashkernel 60331e09173fc kexec: Consolidate machine_kexec_mask_interrupts() implementation 7a03422aa3b47 powerpc/uaccess: Fix inline assembly for clang build on PPC32 394d89cf4626b ALSA: usb-audio: Check max frame size for implicit feedback mode, too 09927231a257f drm/amdgpu/vcn5: Add SMU dpm interface type 314f1b873862e ALSA: usb-audio: Avoid implicit feedback mode on DIYINHK USB Audio 2.0 6557af8245c07 scsi: ufs: core: Fix shift out of bounds when MAXQ=32 be730f9ee92ae scsi: ufs: core: Fix possible NULL pointer dereference in ufshcd_add_command_trace() f1d4b894076f4 ASoC: cs42l43: Report insert for exotic peripherals 20232d7bec4e5 ASoC: amd: yc: Add ASUS EXPERTBOOK BM1503CDA to quirk table af95b5735c822 scsi: ses: Fix devices attaching to different hosts c66c957bb7d2f ACPI: OSI: Add DMI quirk for Acer Aspire One D255 662d9f6d25d03 wifi: mac80211: set default WMM parameters on all links aa9ebc084505f unshare: fix unshare_fs() handling fe1dafba72ce4 ALSA: hda/realtek: Fix speaker pop on Star Labs StarFighter 78d3f201f8b60 scsi: mpi3mr: Add NULL checks when resetting request and reply queues 81b0e0276f5fe ACPI: PM: Save NVS memory on Lenovo G70-35 f8db760f4f52a scsi: storvsc: Fix scheduling while atomic on PREEMPT_RT Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index dd906d5ac6..609f2eaefb 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -15,13 +15,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "d684a294eb3f7a4122771290905565ddc36efd45" -SRCREV_meta ?= "19b5087399932add6bc893493fe1146fca7d4799" +SRCREV_machine ?= "7e842d87b9b4b32c87ffa1eff0923050b2fb4579" +SRCREV_meta ?= "50fc2fcce39b1abff6f5438f410b2ef015e10479" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.77" +LINUX_VERSION ?= "6.12.79" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 2803d0215a..2cd5b510d9 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc include recipes-kernel/linux/cve-exclusion.inc include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.77" +LINUX_VERSION ?= "6.12.79" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" -SRCREV_meta ?= "19b5087399932add6bc893493fe1146fca7d4799" +SRCREV_machine ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" +SRCREV_meta ?= "50fc2fcce39b1abff6f5438f410b2ef015e10479" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index 294431f5dd..7b34f33272 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "448ef862c891700b3d94201e63a831b34a7713e4" -SRCREV_machine:qemuarm64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" -SRCREV_machine:qemuloongarch64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" -SRCREV_machine:qemumips ?= "794aa4ace83aa50352e4abc39ed84229c864310c" -SRCREV_machine:qemuppc ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" -SRCREV_machine:qemuriscv64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" -SRCREV_machine:qemuriscv32 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" -SRCREV_machine:qemux86 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" -SRCREV_machine:qemux86-64 ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" -SRCREV_machine:qemumips64 ?= "3b21c90c913a00a52877a25a4cd1aff57fc14695" -SRCREV_machine ?= "43dd0f289325a90f8d17ec0ee8b2544555d056c3" -SRCREV_meta ?= "19b5087399932add6bc893493fe1146fca7d4799" +SRCREV_machine:qemuarm ?= "bdecc68b604a59ee8f0bde1b96240d48938009c2" +SRCREV_machine:qemuarm64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" +SRCREV_machine:qemuloongarch64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" +SRCREV_machine:qemumips ?= "0f5e1025c5fe2f07e5e64dca977e10f4d42389db" +SRCREV_machine:qemuppc ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" +SRCREV_machine:qemuriscv64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" +SRCREV_machine:qemuriscv32 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" +SRCREV_machine:qemux86 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" +SRCREV_machine:qemux86-64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" +SRCREV_machine:qemumips64 ?= "b1f97d0b31600bbbf29d4b9e519bca2a7104a2b4" +SRCREV_machine ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" +SRCREV_meta ?= "50fc2fcce39b1abff6f5438f410b2ef015e10479" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the <version>/base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "6f232446a62980e51f537db1c655e686d869b9ed" +SRCREV_machine:class-devupstream ?= "c2d104a355013a14bcd73e31fb2c4bc21922115a" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.77" +LINUX_VERSION ?= "6.12.79" PV = "${LINUX_VERSION}+git" -- 2.43.0 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 12/18] linux-yocto/6.12: update CVE exclusions (6.12.79) 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield ` (10 preceding siblings ...) 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 11/18] linux-yocto/6.12: update to v6.12.79 bruce.ashfield @ 2026-04-23 15:45 ` bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 13/18] linux-yocto/6.12: update to v6.12.80 bruce.ashfield ` (6 subsequent siblings) 18 siblings, 0 replies; 20+ messages in thread From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw) To: yoann.congal; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 55 changes (8 new | 47 updated): - 8 new CVEs: CVE-2026-33044, CVE-2026-33045, CVE-2026-33654, CVE-2026-33739, CVE-2026-33765, CVE-2026-33868, CVE-2026-34205, CVE-2026-34475 - 47 updated CVEs: CVE-2022-2713, CVE-2023-7340, CVE-2025-15612, CVE-2025-15615, CVE-2025-15616, CVE-2025-15617, CVE-2025-4393, CVE-2025-4394, CVE-2025-53521, CVE-2025-59028, CVE-2025-59031, CVE-2025-59032, CVE-2025-67030, CVE-2025-70887, CVE-2026-0394, CVE-2026-1556, CVE-2026-20670, CVE-2026-20692, CVE-2026-22738, CVE-2026-22742, CVE-2026-22743, CVE-2026-22744, CVE-2026-24031, CVE-2026-27855, CVE-2026-28831, CVE-2026-28867, CVE-2026-28870, CVE-2026-28871, CVE-2026-28892, CVE-2026-28893, CVE-2026-29055, CVE-2026-2436, CVE-2026-2485, CVE-2026-30304, CVE-2026-30587, CVE-2026-32859, CVE-2026-33366, CVE-2026-33529, CVE-2026-33531, CVE-2026-33537, CVE-2026-33559, CVE-2026-3098, CVE-2026-3622, CVE-2026-3650, CVE-2026-4346, CVE-2026-4926, CVE-2026-4982 Date: Fri, 27 Mar 2026 19:52:09 +0000 ] Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/cve-exclusion_6.12.inc | 376 ++++++++++++++++-- 1 file changed, 350 insertions(+), 26 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 5fa3966719..bba789c9e5 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-03-17 19:07:54.629545+00:00 for kernel version 6.12.77 -# From linux_kernel_cves cve_2026-03-17_1800Z-2-g4ae4487ca91 +# Generated at 2026-03-27 19:55:47.691205+00:00 for kernel version 6.12.79 +# From linux_kernel_cves cve_2026-03-27_1900Z-2-gb6d5823e23a python check_kernel_cve_status_version() { - this_version = "6.12.77" + this_version = "6.12.79" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -2770,8 +2770,6 @@ CVE_STATUS[CVE-2022-49265] = "fixed-version: Fixed from version 5.18" CVE_STATUS[CVE-2022-49266] = "fixed-version: Fixed from version 5.18" -CVE_STATUS[CVE-2022-49267] = "fixed-version: Fixed from version 5.18" - CVE_STATUS[CVE-2022-49268] = "fixed-version: Fixed from version 5.18" CVE_STATUS[CVE-2022-49269] = "fixed-version: Fixed from version 5.18" @@ -9916,8 +9914,6 @@ CVE_STATUS[CVE-2024-27040] = "fixed-version: Fixed from version 6.9" CVE_STATUS[CVE-2024-27041] = "fixed-version: Fixed from version 6.9" -CVE_STATUS[CVE-2024-27042] = "fixed-version: Fixed from version 6.9" - CVE_STATUS[CVE-2024-27043] = "fixed-version: Fixed from version 6.9" CVE_STATUS[CVE-2024-27044] = "fixed-version: Fixed from version 6.9" @@ -17552,7 +17548,7 @@ CVE_STATUS[CVE-2025-38424] = "cpe-stable-backport: Backported in 6.12.35" CVE_STATUS[CVE-2025-38425] = "cpe-stable-backport: Backported in 6.12.35" -# CVE-2025-38426 needs backporting (fixed from 6.16) +CVE_STATUS[CVE-2025-38426] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-38427] = "cpe-stable-backport: Backported in 6.12.35" @@ -17950,7 +17946,7 @@ CVE_STATUS[CVE-2025-38625] = "cpe-stable-backport: Backported in 6.12.42" CVE_STATUS[CVE-2025-38626] = "cpe-stable-backport: Backported in 6.12.42" -# CVE-2025-38627 needs backporting (fixed from 6.17) +CVE_STATUS[CVE-2025-38627] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-38628] = "cpe-stable-backport: Backported in 6.12.42" @@ -18352,7 +18348,7 @@ CVE_STATUS[CVE-2025-39761] = "cpe-stable-backport: Backported in 6.12.43" CVE_STATUS[CVE-2025-39763] = "cpe-stable-backport: Backported in 6.12.43" -# CVE-2025-39764 needs backporting (fixed from 6.17) +CVE_STATUS[CVE-2025-39764] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-39765] = "cpe-stable-backport: Backported in 6.12.44" @@ -18828,7 +18824,7 @@ CVE_STATUS[CVE-2025-40003] = "cpe-stable-backport: Backported in 6.12.54" CVE_STATUS[CVE-2025-40004] = "cpe-stable-backport: Backported in 6.12.53" -# CVE-2025-40005 needs backporting (fixed from 6.17) +CVE_STATUS[CVE-2025-40005] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-40006] = "cpe-stable-backport: Backported in 6.12.50" @@ -19086,7 +19082,7 @@ CVE_STATUS[CVE-2025-40133] = "cpe-stable-backport: Backported in 6.12.55" CVE_STATUS[CVE-2025-40134] = "cpe-stable-backport: Backported in 6.12.53" -# CVE-2025-40135 needs backporting (fixed from 6.18) +CVE_STATUS[CVE-2025-40135] = "cpe-stable-backport: Backported in 6.12.78" # CVE-2025-40136 needs backporting (fixed from 6.18) @@ -19108,13 +19104,13 @@ CVE_STATUS[CVE-2025-40145] = "fixed-version: only affects 6.15 onwards" # CVE-2025-40146 needs backporting (fixed from 6.18) -# CVE-2025-40147 needs backporting (fixed from 6.18) +CVE_STATUS[CVE-2025-40147] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-40148] = "fixed-version: only affects 6.16 onwards" CVE_STATUS[CVE-2025-40149] = "cpe-stable-backport: Backported in 6.12.66" -# CVE-2025-40150 needs backporting (fixed from 6.18) +CVE_STATUS[CVE-2025-40150] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-40151] = "fixed-version: only affects 6.17 onwards" @@ -19682,7 +19678,7 @@ CVE_STATUS[CVE-2025-68237] = "cpe-stable-backport: Backported in 6.12.60" CVE_STATUS[CVE-2025-68238] = "cpe-stable-backport: Backported in 6.12.60" -# CVE-2025-68239 needs backporting (fixed from 6.18) +CVE_STATUS[CVE-2025-68239] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-68240] = "cpe-stable-backport: Backported in 6.12.59" @@ -19844,7 +19840,7 @@ CVE_STATUS[CVE-2025-68332] = "cpe-stable-backport: Backported in 6.12.62" CVE_STATUS[CVE-2025-68333] = "cpe-stable-backport: Backported in 6.12.68" -# CVE-2025-68334 needs backporting (fixed from 6.18) +CVE_STATUS[CVE-2025-68334] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-68335] = "cpe-stable-backport: Backported in 6.12.62" @@ -20312,7 +20308,7 @@ CVE_STATUS[CVE-2025-71150] = "cpe-stable-backport: Backported in 6.12.64" CVE_STATUS[CVE-2025-71151] = "cpe-stable-backport: Backported in 6.12.64" -# CVE-2025-71152 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2025-71152] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-71153] = "cpe-stable-backport: Backported in 6.12.64" @@ -20330,7 +20326,7 @@ CVE_STATUS[CVE-2025-71159] = "fixed-version: only affects 6.18 onwards" CVE_STATUS[CVE-2025-71160] = "cpe-stable-backport: Backported in 6.12.66" -# CVE-2025-71161 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2025-71161] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-71162] = "cpe-stable-backport: Backported in 6.12.67" @@ -20388,7 +20384,7 @@ CVE_STATUS[CVE-2025-71204] = "cpe-stable-backport: Backported in 6.12.70" CVE_STATUS[CVE-2025-71220] = "cpe-stable-backport: Backported in 6.12.70" -# CVE-2025-71221 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2025-71221] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2025-71222] = "cpe-stable-backport: Backported in 6.12.70" @@ -20422,6 +20418,18 @@ CVE_STATUS[CVE-2025-71238] = "cpe-stable-backport: Backported in 6.12.74" CVE_STATUS[CVE-2025-71239] = "cpe-stable-backport: Backported in 6.12.75" +CVE_STATUS[CVE-2025-71265] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2025-71266] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2025-71267] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2025-71268] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2025-71269 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2025-71270] = "cpe-stable-backport: Backported in 6.12.70" + CVE_STATUS[CVE-2026-22976] = "cpe-stable-backport: Backported in 6.12.66" CVE_STATUS[CVE-2026-22977] = "cpe-stable-backport: Backported in 6.12.66" @@ -20478,7 +20486,7 @@ CVE_STATUS[CVE-2026-23002] = "cpe-stable-backport: Backported in 6.12.67" CVE_STATUS[CVE-2026-23003] = "cpe-stable-backport: Backported in 6.12.67" -# CVE-2026-23004 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-23004] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23005] = "cpe-stable-backport: Backported in 6.12.67" @@ -20602,7 +20610,7 @@ CVE_STATUS[CVE-2026-23064] = "cpe-stable-backport: Backported in 6.12.68" CVE_STATUS[CVE-2026-23065] = "cpe-stable-backport: Backported in 6.12.68" -# CVE-2026-23066 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-23066] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23067] = "fixed-version: only affects 6.16 onwards" @@ -20610,7 +20618,7 @@ CVE_STATUS[CVE-2026-23068] = "cpe-stable-backport: Backported in 6.12.68" CVE_STATUS[CVE-2026-23069] = "cpe-stable-backport: Backported in 6.12.68" -# CVE-2026-23070 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-23070] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23071] = "cpe-stable-backport: Backported in 6.12.68" @@ -20678,7 +20686,7 @@ CVE_STATUS[CVE-2026-23101] = "cpe-stable-backport: Backported in 6.12.68" CVE_STATUS[CVE-2026-23103] = "cpe-stable-backport: Backported in 6.12.68" -# CVE-2026-23104 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-23104] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23105] = "cpe-stable-backport: Backported in 6.12.68" @@ -20746,7 +20754,7 @@ CVE_STATUS[CVE-2026-23136] = "cpe-stable-backport: Backported in 6.12.66" # CVE-2026-23137 needs backporting (fixed from 6.19) -# CVE-2026-23138 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-23138] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23139] = "cpe-stable-backport: Backported in 6.12.66" @@ -20784,7 +20792,7 @@ CVE_STATUS[CVE-2026-23155] = "cpe-stable-backport: Backported in 6.12.69" CVE_STATUS[CVE-2026-23156] = "cpe-stable-backport: Backported in 6.12.69" -# CVE-2026-23157 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-23157] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23158] = "cpe-stable-backport: Backported in 6.12.69" @@ -20952,5 +20960,321 @@ CVE_STATUS[CVE-2026-23239] = "cpe-stable-backport: Backported in 6.12.75" CVE_STATUS[CVE-2026-23240] = "cpe-stable-backport: Backported in 6.12.75" -CVE_STATUS[CVE-2026-23241] = "cpe-stable-backport: Backported in 6.12.75" +CVE_STATUS[CVE-2026-23241] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23242] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-23243] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-23244] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23245] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23246] = "cpe-stable-backport: Backported in 6.12.77" + +# CVE-2026-23247 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23248] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23249] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-23250] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-23251] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-23252] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23253] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23254] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2026-23255 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23256] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23257] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23258] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2026-23259 needs backporting (fixed from 6.19) + +CVE_STATUS[CVE-2026-23260] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23261] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23262] = "cpe-stable-backport: Backported in 6.12.70" + +CVE_STATUS[CVE-2026-23263] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23264] = "cpe-stable-backport: Backported in 6.12.70" + +# CVE-2026-23265 needs backporting (fixed from 7.0rc1) + +CVE_STATUS[CVE-2026-23266] = "cpe-stable-backport: Backported in 6.12.74" + +CVE_STATUS[CVE-2026-23267] = "cpe-stable-backport: Backported in 6.12.74" + +CVE_STATUS[CVE-2026-23268] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23269] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23270] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23271] = "cpe-stable-backport: Backported in 6.12.77" + +# CVE-2026-23272 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23273] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-23274] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23275] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23276] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23277] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23278] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23279] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23280] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23281] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23282] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23283] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23284] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23285] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23286] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23287] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23288] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23289] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23290] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23291] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23292] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23293] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23294] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23295] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23296] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23297] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23298] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23299] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23300] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23301] = "fixed-version: only affects 6.19 onwards" + +# CVE-2026-23302 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23303] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23304] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23305] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23306] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23307] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23308] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23309] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23310] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23311] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-23312] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23313] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23314] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23315] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23316] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23317] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23318] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23319] = "cpe-stable-backport: Backported in 6.12.77" + +# CVE-2026-23320 needs backporting (fixed from 7.0rc1) + +CVE_STATUS[CVE-2026-23321] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23322] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23323] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23324] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23325] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23326] = "fixed-version: only affects 6.13 onwards" + +# CVE-2026-23327 needs backporting (fixed from 7.0rc2) + +CVE_STATUS[CVE-2026-23328] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23329] = "fixed-version: only affects 6.18 onwards" + +# CVE-2026-23330 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23331] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23332] = "fixed-version: only affects 6.16 onwards" + +# CVE-2026-23333 has no known resolution + +CVE_STATUS[CVE-2026-23334] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23335] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23336] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23337] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23338] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23339] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23340] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23341] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23342] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23343] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23344] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23345] = "fixed-version: only affects 6.13 onwards" + +# CVE-2026-23346 needs backporting (fixed from 7.0rc2) + +CVE_STATUS[CVE-2026-23347] = "cpe-stable-backport: Backported in 6.12.77" + +# CVE-2026-23348 needs backporting (fixed from 7.0rc2) + +CVE_STATUS[CVE-2026-23349] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23350] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23351] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23352] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23353] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23354] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23355] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23356] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23357] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23358] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23359] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23360] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23361] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23362] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23363] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23364] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23365] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23366] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23367] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23368] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23369] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23370] = "cpe-stable-backport: Backported in 6.12.77" + +# CVE-2026-23371 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23372] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23373] = "cpe-stable-backport: Backported in 6.12.77" + +# CVE-2026-23374 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23375] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23376] = "fixed-version: only affects 6.18 onwards" + +# CVE-2026-23377 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23378] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23379] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23380] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23381] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23382] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23383] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23384] = "fixed-version: only affects 6.18 onwards" + +# CVE-2026-23385 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23386] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23387] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23388] = "cpe-stable-backport: Backported in 6.12.77" + +# CVE-2026-23389 needs backporting (fixed from 7.0rc3) + +CVE_STATUS[CVE-2026-23390] = "cpe-stable-backport: Backported in 6.12.74" + +CVE_STATUS[CVE-2026-23391] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23392] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23393] = "cpe-stable-backport: Backported in 6.12.78" + +# CVE-2026-23394 needs backporting (fixed from 7.0rc5) + +CVE_STATUS[CVE-2026-23395] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23396] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23397] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23398] = "cpe-stable-backport: Backported in 6.12.78" + +# CVE-2026-31788 has no known resolution -- 2.43.0 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 13/18] linux-yocto/6.12: update to v6.12.80 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield ` (11 preceding siblings ...) 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 12/18] linux-yocto/6.12: update CVE exclusions (6.12.79) bruce.ashfield @ 2026-04-23 15:45 ` bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 14/18] linux-yocto/6.12: update CVE exclusions (6.12.80) bruce.ashfield ` (5 subsequent siblings) 18 siblings, 0 replies; 20+ messages in thread From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw) To: yoann.congal; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: 00d7934ffcc35 Linux 6.12.80 7b8410e13e7d2 idpf: nullify pointers after they are freed acf942d0dccd8 net: bcmasp: Fix network filter wake for asp-3.0 1c0a49ce24c43 net: bcmasp: Restore programming of TX map vector register d94f9b0ba28a2 dmaengine: idxd: Fix leaking event log memory 027145ace09fa futex: Require sys_futex_requeue() to have identical flags 33dce5758914b xen/privcmd: unregister xenstore notifier on module exit d25552196dec0 btrfs: fix lost error when running device stats on multiple devices fs 1737ddeafbb13 btrfs: fix leak of kobject name for sub-group space_info 77a119d54c5d6 btrfs: fix super block offset in error message in btrfs_validate_super() ea56f1a604941 dmaengine: xilinx_dma: Fix reset related timeout with two-channel AXIDMA ba972cf9fe492 dmaengine: xilinx: xilinx_dma: Fix unmasked residue subtraction dc2c68f3aa13c dmaengine: xilinx: xilinx_dma: Fix residue calculation for cyclic DMA 7317ae215d3f1 dmaengine: xilinx: xilinx_dma: Fix dma_device directions e21da2ad88445 dmaengine: idxd: fix possible wrong descriptor completion in llist_abort_desc() 18c2e20b42dd2 netfs: Fix kernel BUG in netfs_limit_iter() for ITER_KVEC iterators 9787b3d9b9087 dmaengine: xilinx: xdma: Fix regmap init error handling 97e777f94f9ea dmaengine: dw-edma: Fix multiple times setting of the CYCLE_STATE and CYCLE_BIT bits for HDMA. 78727334d9c11 phy: ti: j721e-wiz: Fix device node reference leak in wiz_get_lane_phy_types() 379361cba6e5a dmaengine: idxd: Fix freeing the allocated ida too late 39c1504e0e76b dmaengine: idxd: Fix memory leak when a wq is reset d02c24af126de dmaengine: idxd: Fix not releasing workqueue on .release() 46dd1b07dcec4 ASoC: ak4458: Convert to RUNTIME_PM_OPS() & co a09380354d2f1 idpf: Fix RSS LUT NULL ptr issue after soft reset df2790b5228fb idpf: Fix RSS LUT NULL pointer crash on early ethtool operations 9ad3d0836d8bc idpf: detach and close netdevs while handling a reset 1ca996324eaca idpf: check error for register_netdev() on init ba0c7fff66160 ice: Fix PTP NULL pointer dereference during VSI rebuild 363377af2c9e8 ice: fix using untrusted value of pkt_len in ice_vc_fdir_parse_raw() 426d5b681b2f3 landlock: Fix handling of disconnected directories 17e8b80f199e2 landlock: Optimize file path walks and prepare for audit support dcefd3f0b9ed8 net: add proper RCU protection to /proc/net/ptype a079a62883e33 virt: tdx-guest: Fix handling of host controlled 'quote' buffer length c4d603e8e58a3 xfs: avoid dereferencing log items after push callbacks 6c0cfbe020c0f ovl: make fsync after metadata copy-up opt-in mount option 67f35bd8653cc ovl: Use str_on_off() helper in ovl_show_options() 4fcfeecef69b2 rust: pin-init: internal: init: document load-bearing fact of field accessors acc105db08267 rust: pin-init: add references to previously initialized fields 1e8da79267248 mm/damon/sysfs: check contexts->nr before accessing contexts_arr[0] a2008925ed736 media: nxp: imx8-isi: Fix streaming cleanup on release 84e926c1c272a spi: tegra210-quad: Protect curr_xfer check in IRQ handler de4c7c5c131c8 LoongArch: vDSO: Emit GNU_EH_FRAME correctly ccd41f110c608 drm/xe: always keep track of remap prev/next 03474a01c199d tracing: Fix potential deadlock in cpu hotplug with osnoise 43e5f6deb8bf7 tracing: Switch trace_osnoise.c code over to use guard() and __free() 7de55bba69cbf ksmbd: fix use-after-free and NULL deref in smb_grant_oplock() ff255e69911fe powerpc64/bpf: do not increment tailcall count when prog is NULL 95a16dcb49227 arm64: dts: imx8mn-tqma8mqnl: fix LDO5 power off 9b4d9dda6a71a ext4: always drain queued discard work in ext4_mb_release() 19782b4c793b4 ext4: fix iloc.bh leak in ext4_fc_replay_inode() error paths 4bec4a498ce86 ext4: handle wraparound when searching for blocks for indirect mapped blocks de009e11f31a8 ext4: fix the might_sleep() warnings in kvfree() 034053378dd81 ext4: fix use-after-free in update_super_work when racing with umount d787d3ae96648 ext4: reject mount if bigalloc with s_first_data_block != 0 9370207b36d26 ext4: avoid allocate block from corrupted group in ext4_mb_find_by_goal() 3a7667595bcad ext4: avoid infinite loops caused by residual data 407c944f217c1 ext4: validate p_idx bounds in ext4_ext_correct_indexes d4b3f370c3d8f ext4: replace BUG_ON with proper error handling in ext4_read_inline_folio 30c6e26562ec9 ext4: make recently_deleted() properly work with lazy itable initialization f8f7f9ed88462 ext4: fix fsync(2) for nojournal mode a29ceb262e957 ext4: fix stale xarray tags after writeback 7920dcc571cef ext4: convert inline data to extents when truncate exceeds inline size ff01e2f410f18 ext4: fix journal credit check when setting fscrypt context d5c3ed01f297b xfs: remove file_path tracepoint data b5c5a50c2f513 xfs: don't irele after failing to iget in xfs_attri_recover_work 23e45598f1a83 xfs: fix ri_total validation in xlog_recover_attri_commit_pass2 e822f535273af xfs: scrub: unlock dquot before early return in quota scrub d8fc60bbaf5ae xfs: save ailp before dropping the AIL lock in push callbacks a89434a6188d8 xfs: stop reclaim before pushing AIL during unmount 596c3f8069c47 LoongArch: KVM: Make kvm_get_vcpu_by_cpuid() more robust 151ba1721ac50 LoongArch: Workaround LS2K/LS7A GPU DMA hang bug 5e7fde2c551f8 LoongArch: Fix missing NULL checks for kstrdup() 9a6cbb4a5c168 drm/i915/dp_tunnel: Fix error handling when clearing stream BW in atomic state c0b3882836de8 drm/amdgpu: prevent immediate PASID reuse case 22d997add640f dmaengine: sh: rz-dmac: Move CHCTRL updates under spinlock d91c84906e4c1 dmaengine: sh: rz-dmac: Protect the driver specific lists abc1f0dabe505 dmaengine: fsl-edma: fix channel parameter config for fixed channel requests 7475dfad10a05 futex: Clear stale exiting pointer in futex_lock_pi() retry path 7b61e89c43cc5 irqchip/qcom-mpm: Add missing mailbox TX done acknowledgment be9237be3f120 jbd2: gracefully abort on checkpointing state corruptions 459158151a158 KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE 984350b37372f net: macb: Use dev_consume_skb_any() to free TX SKBs ff10e3682da0d net: macb: Protect access to net_device::ip_ptr with RCU lock 17970e0f6b62a net: macb: Move devm_{free,request}_irq() out of spin lock area c52df6a33345e scsi: ses: Handle positive SCSI error from ses_recv_diag() d1466bf991b23 scsi: ibmvfc: Fix OOB access in ibmvfc_discover_targets_done() 3699caf7d6601 ovl: fix wrong detection of 32bit inode numbers a9f911b6607b1 phy: qcom: qmp-ufs: Fix SM8650 PCS table for Gear 4 d7853d9fe94ab x86/cpu: Remove X86_CR4_FRED from the CR4 pinned bits mask 756e19fe86542 x86/cpu: Enable FSGSBASE early in cpu_init_exception_handling() 6d37ec779d563 alarmtimer: Fix argument order in alarm_timer_forward() 378949f46e897 erofs: add GFP_NOIO in the bio completion if needed f04733c4dc40c virtio_net: Fix UAF on dst_ops when IFF_XMIT_DST_RELEASE is cleared and napi_tx is false d8549a453d5bd media: mc, v4l2: serialize REINIT and REQBUFS with req_queue_mutex 922a500e94767 hwmon: (peci/cputemp) Fix off-by-one in cputemp_is_visible() 8149678ff2684 hwmon: (peci/cputemp) Fix crit_hyst returning delta instead of absolute temperature 3510b90b7dcd3 hwmon: (pmbus/isl68137) Add mutex protection for AVS enable sysfs attributes 68e5da7c5326b KVM: arm64: Discard PC update state on vcpu reset 9808571b27969 platform/x86: ISST: Correct locked bit width 72d35b92d329a cpufreq: conservative: Reset requested_freq on limits change 9649d051e5441 can: isotp: fix tx.buf use-after-free in isotp_sendmsg() c4e8eaa75fa0b can: gw: fix OOB heap access in cgw_csum_crc8_rel() d131feed8d3ce ASoC: SOF: ipc4-topology: Allow bytes controls without initial payload 8771d7152f8d3 ALSA: firewire-lib: fix uninitialized local variable 1d1888b4a7aec ksmbd: do not expire session on binding failure 91aeaa7256006 ksmbd: fix memory leaks and NULL deref in smb2_lock() 7aec5a769d235 ksmbd: fix potencial OOB in get_file_all_info() for compound requests 6aef1765d6807 ksmbd: replace hardcoded hdr2_len with offsetof() in smb2_calc_max_out_buf_len() 95c899cd79180 s390/entry: Scrub r12 register on kernel entry 54571224d8988 s390/barrier: Make array_index_mask_nospec() __always_inline f8c444b918d63 s390/syscalls: Add spectre boundary for syscall dispatch table d5d01f24bc6fb spi: spi-fsl-lpspi: fix teardown order issue (UAF) 432fa716e96ef ASoC: adau1372: Fix clock leak on PLL lock failure 2c678860898a2 ASoC: adau1372: Fix unchecked clk_prepare_enable() return value 82f8dc236dc55 sysctl: fix uninitialized variable in proc_do_large_bitmap 129d89223c43b hwmon: (pmbus) Introduce the concept of "write-only" attributes 9f7304720fb87 hwmon: (pmbus) Mark lowest/average/highest/rated attributes as read-only 881b8d5bbc12d hwmon: (pmbus/core) Fix various coding style issues 60a1b27313cee hwmon: (adm1177) fix sysfs ABI violation and current unit conversion 138e42be35ff2 drm/amdgpu: Fix fence put before wait in amdgpu_amdkfd_submit_ib 808c0f156f48d ACPI: EC: clean up handlers on probe failure in acpi_ec_setup() eedf220442d13 spi: use generic driver_override infrastructure 5cd46bebc4e0c spi: Group CS related fields in struct spi_device 10862e344b4d6 drm/amd/display: Do not skip unrelated mode changes in DSC validation 40ad0334c17b2 spi: meson-spicc: Fix double-put in remove path 8367b909e015a ASoC: Intel: catpt: Fix the device initialization 6eba074a8a05f spi: sn-f-ospi: Fix resource leak in f_ospi_probe() f14c9acb1a773 PM: hibernate: Drain trailing zero pages on userspace restore 6453341a0c734 drm/i915/gmbus: fix spurious timeout on 512-byte burst reads a246bcb5f7ca1 x86/efi: efi_unmap_boot_services: fix calculation of ranges_to_free size a5162ebfe0458 scsi: scsi_transport_sas: Fix the maximum channel scanning issue 6b4d3a91259a1 RDMA/irdma: Return EINVAL for invalid arp index error a8a1c7621127a RDMA/irdma: Fix deadlock during netdev reset with active connections bb22bf9bf054f RDMA/irdma: Remove reset check from irdma_modify_qp_to_err() bc20987765932 RDMA/irdma: Clean up unnecessary dereference of event->cm_node 0d845d7d834fa RDMA/irdma: Remove a NOP wait_event() in irdma_modify_qp_roce() 6d1a63d4f2f12 RDMA/irdma: Update ibqp state to error if QP is already in error state cd1534c8f4984 RDMA/irdma: Initialize free_qp completion before using it 49bbcb76c4c8a RDMA/rw: Fall back to direct SGE on MR pool exhaustion 08cd190baec5a ALSA: hda/realtek: Sequence GPIO2 on Star Labs StarFighter 9fea479f155d6 regmap: Synchronize cache for the page selector 9d74d10e4e266 net: macb: use the current queue number for stats 675c913b94048 netfilter: ctnetlink: use netlink policy range checks 7edca70751b9b netfilter: nf_conntrack_sip: fix use of uninitialized rtp_addr in process_sdp dcfcd95b3ae76 netfilter: nf_conntrack_expect: skip expectations in other netns via proc ded71f5684df1 netfilter: ip6t_rt: reject oversized addrnr in rt_mt6_check() a2f6ff3444b66 netfilter: nfnetlink_log: fix uninitialized padding leak in NFULA_PAYLOAD 6dc11e0bd0a54 tls: Purge async_hold in tls_decrypt_async_wait() 834cf890d2c3d Bluetooth: btusb: clamp SCO altsetting table indices 9a21a631ee034 Bluetooth: L2CAP: Fix ERTM re-init and zero pdu_len infinite loop e10a4cb724686 Bluetooth: btintel: serialize btintel_hw_error() with hci_req_sync_lock d2d4f0f15d531 Bluetooth: L2CAP: Fix send LE flow credits in ACL link b07431f47fe22 dma-mapping: add missing `inline` for `dma_free_attrs` c0e696a74b19e net: lan743x: fix duplex configuration in mac_link_up 6d3161fa3eee6 team: fix header_ops type confusion with non-Ethernet ports a0d9efb1e8f3f net: enetc: fix the output issue of 'ethtool --show-ring' f1bed05a832ae udp: Fix wildcard bind conflict check when using hash2 afb7c7f20f2e0 tcp: optimize inet_use_bhash2_on_bind() 75fe6db23705a net: fix fanout UAF in packet_release() via NETDEV_UP race c58c705939c75 ipv6: Don't remove permanent routes with exceptions from tb6_gc_hlist. d9b859a7bf1fe ipv6: Remove permanent routes from tb6_gc_hlist when all exceptions expire. 1f931dee5b726 iavf: fix out-of-bounds writes in iavf_get_ethtool_stats() 1beb6a1711502 ice: use ice_update_eth_stats() for representor stats 7829daee9ba5d ice: fix inverted ready check for VF representors 42830f80495bb platform/x86: intel-hid: disable wakeup_mode during hibernation 392b2369fb215 platform/olpc: olpc-xo175-ec: Fix overflow error message to print inlen 8244cc1ce64bc net: bcmasp: fix double disable of clk db060603452b2 net: bcmasp: Add support for asp-v3.0 121a6ad9cd42b net: bcmasp: fix double free of WoL irq 6c0a48684e380 net: bcmasp: streamline early exit in probe 88fff072ba83f net: bcmasp: Remove support for asp-v2.0 2463b69ccb617 net: bcm: asp2: convert to phylib managed EEE 5b9555915ab80 net: bcm: asp2: remove tx_lpi_enabled ef6469df19f49 net: bcm: asp2: fix LPI timer handling bd2e6b6367a29 rtnetlink: count IFLA_INFO_SLAVE_KIND in if_nlmsg_size 7bcb974c771c8 net/smc: fix double-free of smc_spd_priv when tee() duplicates splice pipe buffer 98de18d327ef8 openvswitch: validate MPLS set/set_masked payload length bbe7bd722bfae openvswitch: defer tunnel netdev_put to RCU release 43579baa17270 net: openvswitch: Avoid releasing netdev before teardown completes 1edc12d2bbcb7 nfc: nci: fix circular locking dependency in nci_close_device e324506b98bf6 ionic: fix persistent MAC address override on PF 3334494e69f39 pinctrl: mediatek: common: Fix probe failure for devices without EINT 0780f93338529 Bluetooth: L2CAP: Fix null-ptr-deref on l2cap_sock_ready_cb 5213ef54528dd Bluetooth: hci_ll: Fix firmware leak on error path 340666172cf74 Bluetooth: MGMT: Fix dangling pointer on mgmt_add_adv_patterns_monitor_complete 108b81514d8f2 Bluetooth: SCO: Fix use-after-free in sco_recv_frame() due to missing sock_hold 40c7f7eea2f4d Bluetooth: L2CAP: Validate PDU length before reading SDU length in l2cap_ecred_data_rcv() c8e1a27edb8b4 Bluetooth: L2CAP: Fix stack-out-of-bounds read in l2cap_ecred_conn_req 76d115b228e4d can: statistics: add missing atomic access in hot path d1ba7d6b3cd17 erofs: set fileio bio failed in short read case 1cf9fc3b190b3 dma: swiotlb: add KMSAN annotations to swiotlb_bounce() 7b18692c59afb af_key: validate families in pfkey_send_migrate() 56ea2257b83ee xfrm: prevent policy_hthresh.work from racing with netns teardown 32d0f44c2f14d xfrm: Fix work re-schedule after cancel in xfrm_nat_keepalive_net_fini() df6f995358dc1 esp: fix skb leak with espintcp and async crypto ddd2d7f20ab1c xfrm: Fix the usage of skb->sk 4092242a7347d xfrm: call xdo_dev_state_delete during state update 02c30fb68bed9 xfrm: fix the condition on x->pcpu_num in xfrm_sa_len 934e87be76f3b xfrm: add missing extack for XFRMA_SA_PCPU in add_acquire and allocspi bd635bcd0a517 i3c: master: dw-i3c: Fix missing of_node for virtual I2C adapter 63a5bca438cfb ALSA: hda/realtek: add quirk for ASUS UM6702RC 3a800ad9382ad spi: intel-pci: Add support for Nova Lake mobile SPI flash 601e6ff6e5133 usb: core: new quirk to handle devices with zero configurations 7a27049b5bc27 drm/amdgpu: fix gpu idle power consumption issue for gfx v12 49c7c50ee6325 nvmet: move async event work off nvmet-wq fee55fffbfcd9 objtool: Handle Clang RSP musical chairs 437b469c801b4 ALSA: hda/realtek: Add headset jack quirk for Thinkpad X390 b685eba97a5ae ALSA: hda/realtek: add HP Laptop 14s-dr5xxx mute LED quirk a41a9b8d19a98 btrfs: set BTRFS_ROOT_ORPHAN_CLEANUP during subvol create d81d519f1236d sched_ext: Use WRITE_ONCE() for the write side of dsq->seq update 31860c3f7ac66 HID: apple: avoid memory leak in apple_report_fixup() 9535c3eda0949 drm/ttm/tests: Fix build failure on PREEMPT_RT c8324d387c794 ALSA: hda/senary: Ensure EAPD is enabled during init 5858510917896 dma-buf: Include ioctl.h in UAPI header c4a5601fe0866 ASoC: fsl_easrc: Fix event generation in fsl_easrc_iec958_put_bits() 6a029865ef062 scsi: devinfo: Add BLIST_SKIP_IO_HINTS for Iomega ZIP 1d90b17aea622 scsi: mpi3mr: Clear reset history on ready and recheck state after timeout fddbd2fe91cd7 ASoC: fsl_easrc: Fix event generation in fsl_easrc_iec958_set_reg() ec2b22a58073f module: Fix kernel panic when a symbol st_shndx is out of bounds 4abc2186ed5b6 HID: asus: add xg mobile 2023 external hardware support 6bafb2e9b5b4e HID: mcp2221: cancel last I2C command on read error da89e7137b9db kbuild: install-extmod-build: Package resolve_btfids if necessary efe3f0d9bc252 net: usb: r8152: add TRENDnet TUC-ET2G 34221ae510833 HID: apple: Add EPOMAKER TH87 to the non-apple keyboards list 79e5dcc95d9ab HID: magicmouse: avoid memory leak in magicmouse_report_fixup() 1ba445e496b5f HID: magicmouse: fix battery reporting for Apple Magic Trackpad 2 acbc72dd1a09d nvme-pci: ensure we're polling a polled queue e3baa5a402237 platform/x86: touchscreen_dmi: Add quirk for y-inverted Goodix touchscreen on SUPI S10 e34c5f314fa60 platform/x86: intel-hid: Enable 5-button array on ThinkPad X1 Fold 16 Gen 1 c5a280ff4f745 nvme-fabrics: use kfree_sensitive() for DHCHAP secrets 242934c6ddfb4 nvme-pci: cap queue creation to used queues 5e9788df789ce platform/x86: intel-hid: Add Dell 14 Plus 2-in-1 to dmi_vgbs_allow_list 7a6d6e4d8af04 HID: asus: avoid memory leak in asus_report_fixup() 342aa1ee995ef bpf: Fix unsound scalar forking in maybe_fork_scalars() for BPF_OR 9ab1227765c44 bpf: Fix undefined behavior in interpreter sdiv/smod for INT_MIN b1f3c2ba6512e bpf: Release module BTF IDR before module unload 9a6086d2a828d driver core: platform: use generic driver_override infrastructure 78aba57ca3de5 driver core: generalize driver_override in struct device 8e655e0effd71 sh: platform_early: remove pdev->driver_override check 0064ad7695412 hwmon: axi-fan: don't use driver_override as IRQ name 92c47342c66d4 cxl/hdm: Avoid incorrect DVSEC fallback when HDM decoders are enabled 3a696e84a8b1f perf: Make sure to use pmu_ctx->pmu for groups 56af722756ed8 bpf: Fix constant blinding for PROBE_MEM32 stores d216a4bd138eb cxl/port: Fix use after free of parent_port in cxl_detach_ep() Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 609f2eaefb..4c754bcd21 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -15,13 +15,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "7e842d87b9b4b32c87ffa1eff0923050b2fb4579" -SRCREV_meta ?= "50fc2fcce39b1abff6f5438f410b2ef015e10479" +SRCREV_machine ?= "682f6c2088ea37c1dcc324905956034eda630d52" +SRCREV_meta ?= "8bb0dbe2b50860402b07a506a5aa3a4ef7aba0a7" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.79" +LINUX_VERSION ?= "6.12.80" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 2cd5b510d9..d760030c21 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc include recipes-kernel/linux/cve-exclusion.inc include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.79" +LINUX_VERSION ?= "6.12.80" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" -SRCREV_meta ?= "50fc2fcce39b1abff6f5438f410b2ef015e10479" +SRCREV_machine ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" +SRCREV_meta ?= "8bb0dbe2b50860402b07a506a5aa3a4ef7aba0a7" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index 7b34f33272..c50dc6dfac 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "bdecc68b604a59ee8f0bde1b96240d48938009c2" -SRCREV_machine:qemuarm64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" -SRCREV_machine:qemuloongarch64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" -SRCREV_machine:qemumips ?= "0f5e1025c5fe2f07e5e64dca977e10f4d42389db" -SRCREV_machine:qemuppc ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" -SRCREV_machine:qemuriscv64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" -SRCREV_machine:qemuriscv32 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" -SRCREV_machine:qemux86 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" -SRCREV_machine:qemux86-64 ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" -SRCREV_machine:qemumips64 ?= "b1f97d0b31600bbbf29d4b9e519bca2a7104a2b4" -SRCREV_machine ?= "3bc3831f2b2a1caa0d0a0556019a2c7ff05fc81a" -SRCREV_meta ?= "50fc2fcce39b1abff6f5438f410b2ef015e10479" +SRCREV_machine:qemuarm ?= "dd1da548895086a19df2c3fc9586999789081636" +SRCREV_machine:qemuarm64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" +SRCREV_machine:qemuloongarch64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" +SRCREV_machine:qemumips ?= "14123935e5dd112c3a4daa4c5a756b82298ecf4d" +SRCREV_machine:qemuppc ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" +SRCREV_machine:qemuriscv64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" +SRCREV_machine:qemuriscv32 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" +SRCREV_machine:qemux86 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" +SRCREV_machine:qemux86-64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" +SRCREV_machine:qemumips64 ?= "d6af6b480ab453a08f04ce80ab25a131f54f8e34" +SRCREV_machine ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" +SRCREV_meta ?= "8bb0dbe2b50860402b07a506a5aa3a4ef7aba0a7" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the <version>/base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "c2d104a355013a14bcd73e31fb2c4bc21922115a" +SRCREV_machine:class-devupstream ?= "00d7934ffcc35e65b113ba4991c8a3338bd85fc1" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.79" +LINUX_VERSION ?= "6.12.80" PV = "${LINUX_VERSION}+git" -- 2.43.0 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 14/18] linux-yocto/6.12: update CVE exclusions (6.12.80) 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield ` (12 preceding siblings ...) 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 13/18] linux-yocto/6.12: update to v6.12.80 bruce.ashfield @ 2026-04-23 15:45 ` bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 15/18] linux-yocto/6.12: update to v6.12.81 bruce.ashfield ` (4 subsequent siblings) 18 siblings, 0 replies; 20+ messages in thread From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw) To: yoann.congal; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 49 changes (12 new | 37 updated): - 12 new CVEs: CVE-2026-39389, CVE-2026-39390, CVE-2026-39391, CVE-2026-39392, CVE-2026-39393, CVE-2026-39394, CVE-2026-39406, CVE-2026-39407, CVE-2026-39408, CVE-2026-39409, CVE-2026-39410, CVE-2026-39865 - 37 updated CVEs: CVE-2021-4473, CVE-2025-57854, CVE-2025-58713, CVE-2026-1342, CVE-2026-28264, CVE-2026-31790, CVE-2026-32712, CVE-2026-34765, CVE-2026-35023, CVE-2026-35035, CVE-2026-35463, CVE-2026-35484, CVE-2026-35488, CVE-2026-35533, CVE-2026-39319, CVE-2026-39332, CVE-2026-39356, CVE-2026-39369, CVE-2026-39374, CVE-2026-39688, CVE-2026-39690, CVE-2026-39692, CVE-2026-39694, CVE-2026-39696, CVE-2026-3243, CVE-2026-3296, CVE-2026-3480, CVE-2026-3600, CVE-2026-4065, CVE-2026-4111, CVE-2026-4300, CVE-2026-4330, CVE-2026-4785, CVE-2026-4788, CVE-2026-4808, CVE-2026-4931, CVE-2026-5300 Date: Wed, 8 Apr 2026 14:50:02 +0000 ] Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/cve-exclusion_6.12.inc | 236 ++++++++++++++++-- 1 file changed, 216 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index bba789c9e5..e4e81ee492 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-03-27 19:55:47.691205+00:00 for kernel version 6.12.79 -# From linux_kernel_cves cve_2026-03-27_1900Z-2-gb6d5823e23a +# Generated at 2026-04-08 14:59:27.074934+00:00 for kernel version 6.12.80 +# From linux_kernel_cves cve_2026-04-08_1400Z python check_kernel_cve_status_version() { - this_version = "6.12.79" + this_version = "6.12.80" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -16110,9 +16110,9 @@ CVE_STATUS[CVE-2025-22114] = "fixed-version: only affects 6.14 onwards" CVE_STATUS[CVE-2025-22115] = "cpe-stable-backport: Backported in 6.12.40" -# CVE-2025-22116 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-22116] = "cpe-stable-backport: Backported in 6.12.80" -# CVE-2025-22117 needs backporting (fixed from 6.15) +CVE_STATUS[CVE-2025-22117] = "cpe-stable-backport: Backported in 6.12.80" CVE_STATUS[CVE-2025-22118] = "fixed-version: only affects 6.13 onwards" @@ -19248,7 +19248,7 @@ CVE_STATUS[CVE-2025-40216] = "cpe-stable-backport: Backported in 6.12.36" CVE_STATUS[CVE-2025-40218] = "cpe-stable-backport: Backported in 6.12.54" -CVE_STATUS[CVE-2025-40219] = "cpe-stable-backport: Backported in 6.12.54" +CVE_STATUS[CVE-2025-40219] = "cpe-stable-backport: Backported in 6.12.75" CVE_STATUS[CVE-2025-40220] = "cpe-stable-backport: Backported in 6.12.54" @@ -19554,7 +19554,7 @@ CVE_STATUS[CVE-2025-68173] = "cpe-stable-backport: Backported in 6.12.58" # CVE-2025-68174 needs backporting (fixed from 6.18) -# CVE-2025-68175 needs backporting (fixed from 6.18) +CVE_STATUS[CVE-2025-68175] = "cpe-stable-backport: Backported in 6.12.80" CVE_STATUS[CVE-2025-68176] = "cpe-stable-backport: Backported in 6.12.58" @@ -19958,7 +19958,7 @@ CVE_STATUS[CVE-2025-68734] = "cpe-stable-backport: Backported in 6.12.59" # CVE-2025-68735 needs backporting (fixed from 6.19) -# CVE-2025-68736 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2025-68736] = "cpe-stable-backport: Backported in 6.12.80" CVE_STATUS[CVE-2025-68737] = "fixed-version: only affects 6.18 onwards" @@ -20108,8 +20108,6 @@ CVE_STATUS[CVE-2025-68810] = "cpe-stable-backport: Backported in 6.12.64" CVE_STATUS[CVE-2025-68811] = "cpe-stable-backport: Backported in 6.12.64" -CVE_STATUS[CVE-2025-68812] = "fixed-version: only affects 6.15 onwards" - CVE_STATUS[CVE-2025-68813] = "cpe-stable-backport: Backported in 6.12.64" CVE_STATUS[CVE-2025-68814] = "cpe-stable-backport: Backported in 6.12.64" @@ -20440,7 +20438,7 @@ CVE_STATUS[CVE-2026-22979] = "cpe-stable-backport: Backported in 6.12.66" CVE_STATUS[CVE-2026-22980] = "cpe-stable-backport: Backported in 6.12.66" -# CVE-2026-22981 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-22981] = "cpe-stable-backport: Backported in 6.12.80" CVE_STATUS[CVE-2026-22982] = "cpe-stable-backport: Backported in 6.12.66" @@ -20448,7 +20446,7 @@ CVE_STATUS[CVE-2026-22983] = "fixed-version: only affects 6.18.4 onwards" CVE_STATUS[CVE-2026-22984] = "cpe-stable-backport: Backported in 6.12.66" -# CVE-2026-22985 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-22985] = "cpe-stable-backport: Backported in 6.12.80" # CVE-2026-22986 needs backporting (fixed from 6.19) @@ -20464,7 +20462,7 @@ CVE_STATUS[CVE-2026-22991] = "cpe-stable-backport: Backported in 6.12.66" CVE_STATUS[CVE-2026-22992] = "cpe-stable-backport: Backported in 6.12.66" -# CVE-2026-22993 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-22993] = "cpe-stable-backport: Backported in 6.12.80" CVE_STATUS[CVE-2026-22994] = "cpe-stable-backport: Backported in 6.12.66" @@ -20892,13 +20890,13 @@ CVE_STATUS[CVE-2026-23205] = "cpe-stable-backport: Backported in 6.12.70" CVE_STATUS[CVE-2026-23206] = "cpe-stable-backport: Backported in 6.12.70" -CVE_STATUS[CVE-2026-23207] = "fixed-version: only affects 6.18.2 onwards" +CVE_STATUS[CVE-2026-23207] = "cpe-stable-backport: Backported in 6.12.80" # CVE-2026-23208 needs backporting (fixed from 6.19) CVE_STATUS[CVE-2026-23209] = "cpe-stable-backport: Backported in 6.12.70" -# CVE-2026-23210 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-23210] = "cpe-stable-backport: Backported in 6.12.80" CVE_STATUS[CVE-2026-23211] = "fixed-version: only affects 6.18 onwards" @@ -20988,7 +20986,7 @@ CVE_STATUS[CVE-2026-23253] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23254] = "cpe-stable-backport: Backported in 6.12.70" -# CVE-2026-23255 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-23255] = "cpe-stable-backport: Backported in 6.12.80" CVE_STATUS[CVE-2026-23256] = "cpe-stable-backport: Backported in 6.12.70" @@ -21118,8 +21116,6 @@ CVE_STATUS[CVE-2026-23318] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23319] = "cpe-stable-backport: Backported in 6.12.77" -# CVE-2026-23320 needs backporting (fixed from 7.0rc1) - CVE_STATUS[CVE-2026-23321] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23322] = "fixed-version: only affects 6.18 onwards" @@ -21144,7 +21140,7 @@ CVE_STATUS[CVE-2026-23331] = "fixed-version: only affects 6.13 onwards" CVE_STATUS[CVE-2026-23332] = "fixed-version: only affects 6.16 onwards" -# CVE-2026-23333 has no known resolution +# CVE-2026-23333 needs backporting (fixed from 7.0rc1) CVE_STATUS[CVE-2026-23334] = "cpe-stable-backport: Backported in 6.12.77" @@ -21276,5 +21272,205 @@ CVE_STATUS[CVE-2026-23397] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23398] = "cpe-stable-backport: Backported in 6.12.78" -# CVE-2026-31788 has no known resolution +CVE_STATUS[CVE-2026-23399] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23400] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23401] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-23402] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23403] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23404] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23405] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23406] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23407] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23408] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23409] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23410] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23411] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23412] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23413] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23414] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-23415] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23416] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23417] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-23418] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23419] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23420] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23421] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23422] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23423] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23424] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23425] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23426] = "cpe-stable-backport: Backported in 6.12.77" + +CVE_STATUS[CVE-2026-23427] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23428] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23429] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23430] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-23431] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-23432] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23433] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23434] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23435] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23436] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23437] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-23438] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23439] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23440] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23441] = "cpe-stable-backport: Backported in 6.12.78" + +# CVE-2026-23442 needs backporting (fixed from 7.0rc5) + +CVE_STATUS[CVE-2026-23443] = "cpe-stable-backport: Backported in 6.12.78" + +# CVE-2026-23444 needs backporting (fixed from 7.0rc5) + +CVE_STATUS[CVE-2026-23445] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23446] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23447] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23448] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23449] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23450] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23451] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-23452] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23453] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-23454] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23455] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23456] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23457] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23458] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23459] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-23460] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23461] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23462] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23463] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23464] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23465] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23466] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23467] = "fixed-version: only affects 6.16 onwards" + +# CVE-2026-23468 needs backporting (fixed from 7.0rc5) + +# CVE-2026-23469 needs backporting (fixed from 7.0rc5) + +CVE_STATUS[CVE-2026-23470] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23471] = "cpe-stable-backport: Backported in 6.12.78" + +# CVE-2026-23472 needs backporting (fixed from 7.0rc5) + +# CVE-2026-23473 needs backporting (fixed from 7.0rc5) + +CVE_STATUS[CVE-2026-23474] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-23475] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31389] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31390] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-31391] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31392] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31393] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31394] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31395] = "fixed-version: only affects 6.13 onwards" + +CVE_STATUS[CVE-2026-31396] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31397] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-31398] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-31399] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31400] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31401] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31402] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31403] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31404] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-31405] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31406] = "cpe-stable-backport: Backported in 6.12.80" + +# CVE-2026-31407 needs backporting (fixed from 7.0rc5) + +CVE_STATUS[CVE-2026-31408] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31409] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31410] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31411] = "cpe-stable-backport: Backported in 6.12.75" + +CVE_STATUS[CVE-2026-31788] = "cpe-stable-backport: Backported in 6.12.78" -- 2.43.0 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 15/18] linux-yocto/6.12: update to v6.12.81 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield ` (13 preceding siblings ...) 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 14/18] linux-yocto/6.12: update CVE exclusions (6.12.80) bruce.ashfield @ 2026-04-23 15:45 ` bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 16/18] linux-yocto/6.12: update CVE exclusions (6.12.81) bruce.ashfield ` (3 subsequent siblings) 18 siblings, 0 replies; 20+ messages in thread From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw) To: yoann.congal; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: e7a3953084a70 Linux 6.12.81 787781697f216 selftests/bpf: test refining u32/s32 bounds when ranges cross min/max boundary ded1ea20d0b77 bpf: Fix u32/s32 bounds when ranges cross min/max boundary 58d4c4a257ad4 bpf: Add third round of bounds deduction d7a73ec8015bc selftests/bpf: Test invariants on JSLT crossing sign 269d80981a5c7 selftests/bpf: Test cross-sign 64bits range refinement d7d7b4879d994 bpf: Improve bounds when s64 crosses sign boundary 3708bea44e732 drm/amd/display: Correct logic check error for fastboot 4ab0ca29df9af drm/amd: Disable ASPM on SI 2b5a2083c9eb7 drm/amd/display: Disable scaling on DCE6 for now 3ab5be94925f4 drm/amd/display: Adjust DCE 8-10 clock, don't overclock by 15% 85229e17e8d7e drm/amd/display: Fix DCE 6.0 and 6.4 PLL programming. fd1b69d047a4a drm/amd/display: Keep PLL0 running on DCE 6.0 and 6.4 207b18daaae25 drm/amd/display: Disable fastboot on DCE 6 too 1f9b3e72fd7da drm/amd/amdgpu: disable ASPM in some situations 8f187036a3e65 drm/amd/amdgpu: decouple ASPM with pcie dpm 2145a80f47cd5 x86/CPU/AMD: Add additional fixed RDSEED microcode revisions f496eee88c605 MPTCP: fix lock class name family in pm_nl_create_listen_socket ac69fbda177f3 s390/cpum_sf: Cap sampling rate to prevent lsctl exception a1d24d8e59c8d s390/perf_cpum_sf: Convert to use try_cmpxchg128() e76bcb727e487 ext4: publish jinode after initialization 38bac39274a3a drm/amd/pm: disable OD_FAN_CURVE if temp or pwm range invalid for smu v13 2b307be747cf7 mm/memory: fix PMD/PUD checks in follow_pfnmap_start() 9bcbf9ae7db8b mm: replace READ_ONCE() with standard page table accessors b8c49ad888892 mm/huge_memory: fix folio isn't locked in softleaf_to_folio() 70cad63b3bc63 x86/fred: Fix early boot failures on SEV-ES/SNP guests 7cbd69aaa507b scsi: target: tcm_loop: Drain commands in target_reset handler 43f5b19fd190f net: mana: fix use-after-free in add_adev() error path 33670f780e012 net: correctly handle tunneled traffic on IPV6_CSUM GSO fallback 022e3d4112afa spi: cadence-qspi: Fix exec_mem_op error handling c5fa98842783e wifi: virt_wifi: remove SET_NETDEV_DEV to avoid use-after-free be2d32f0c3fe3 usb: gadget: f_uac1_legacy: validate control request size f7d00ee1c8082 usb: gadget: f_hid: move list and spinlock inits from bind to alloc 1ef251aa63972 usb: gadget: f_rndis: Fix net_device lifecycle with device_move 70707ce668494 usb: gadget: f_subset: Fix net_device lifecycle with device_move a6b8bce01a30a usb: gadget: f_eem: Fix net_device lifecycle with device_move 5eaeac22240d9 usb: gadget: f_ecm: Fix net_device lifecycle with device_move 7d8fa3b8783ab usb: gadget: f_rndis: Protect RNDIS options with mutex cc8ec610cd14c usb: gadget: f_subset: Fix unbalanced refcnt in geth_free 8a1128d604c36 usb: gadget: uvc: fix NULL pointer dereference during unbind race 0326429e8ba99 usb: gadget: u_ether: Fix NULL pointer deref in eth_get_drvinfo bbb09bb89ffa5 usb: gadget: u_ether: Fix race between gether_disconnect and eth_stop 0a1fbbd780f04 btrfs: do not free data reservation in fallback from inline due to -ENOSPC b6310d040d715 btrfs: fix the qgroup data free range for inline data extents b23282218eca2 ice: Fix memory leak in ice_set_ringparam() f6dcbf2b024d5 usb: typec: ucsi: validate connector number in ucsi_notify_common() bc9e80feec629 usb: gadget: dummy_hcd: fix premature URB completion when ZLP follows partial transfer 94d4fab1dd9e6 USB: dummy-hcd: Fix interrupt synchronization error 805b1833d6ed6 USB: dummy-hcd: Fix locking/synchronization error d35df146eff91 thunderbolt: Fix property read in nhi_wake_supported() 0bdee4118340c misc: fastrpc: possible double-free of cctx->remote_heap 604da9c04c218 thermal: core: Fix thermal zone device registration error path bc49d5a3c049a gpio: mxc: map Both Edge pad wakeup to Rising Edge 427d048e4f6ac cpufreq: governor: fix double free in cpufreq_dbs_governor_init() error path 0b832aad33e6f net: ethernet: mtk_ppe: avoid NULL deref when gmac0 is disabled d45230081f19c net: ftgmac100: fix ring allocation unwind on open failure de20d2e3b9179 vxlan: validate ND option lengths in vxlan_na_create bdbf027a4504b crypto: tegra - Add missing CRYPTO_ALG_ASYNC 633dfbf0eb276 counter: rz-mtu3-cnt: do not use struct rz_mtu3_channel's dev member ced8b48420edd counter: rz-mtu3-cnt: prevent counter from being toggled multiple times b7eef00f08b92 netfilter: ipset: drop logically empty buckets in mtype_del 2f6e5b9964d0a nvmem: zynqmp_nvmem: Fix buffer size in DMA and memcpy 9c01cfe54a7d2 nvmem: imx: assign nvmem_cell_info::raw_len 5de15580ef147 dt-bindings: connector: add pd-disable dependency cad3327ab50d9 firmware: microchip: fail auto-update probe if no flash found 99f31aa98ab6e comedi: me4000: Fix potential overrun of firmware buffer 1bf8761eb59e9 comedi: me_daq: Fix potential overrun of firmware buffer 3848ae00b1642 comedi: ni_atmio16d: Fix invalid clean-up after failed attach 430291d8f3884 comedi: Reinit dev->spinlock between attachments to low-level drivers 65c528fbeddd8 comedi: dt2815: add hardware detection to prevent crash f0e520784d5ac cdc-acm: new quirk for EPSON HMD c49b9256bbacb bridge: br_nd_send: validate ND option lengths 0b7f1d1352e46 Revert "LoongArch/orc: Use RCU in all users of __module_address()." 8eb219e34da19 Revert "LoongArch: Remove unnecessary checks for ORC unwinder" c471e3ae674f5 Revert "LoongArch: Handle percpu handler address for ORC unwinder" c7e475ae3a559 usb: cdns3: gadget: fix state inconsistency on gadget init failure d61446dfc9d38 usb: cdns3: gadget: fix NULL pointer dereference in ep_queue af0d688a8d55d usb: core: phy: avoid double use of 'usb3-phy' 4ed9d2dd9f298 usb: dwc2: gadget: Fix spin_lock/unlock mismatch in dwc2_hsotg_udc_stop() 874c95ebbe595 usb: ehci-brcm: fix sleep during atomic d13318dec0c1e usb: usbtmc: Flush anchored URBs in usbtmc_release 8763f8317bb38 usb: ulpi: fix double free in ulpi_register_interface() error path f8f45359f9682 usb: quirks: add DELAY_INIT quirk for another Silicon Motion flash drive f5a6a5f412b3f iio: gyro: mpu3050: Fix out-of-sequence free_irq() 92f18aa86302f iio: gyro: mpu3050: Move iio_device_register() to correct location b52fd1644ad2c iio: gyro: mpu3050: Fix irq resource leak 8631e755fc07b iio: gyro: mpu3050: Fix incorrect free_irq() variable 10ec3158d4719 iio: imu: st_lsm6dsx: Set FIFO ODR for accelerometer and gyroscope only 42d4e0d4f12cd iio: imu: bmi160: Remove potential undefined behavior in bmi160_config_pin() b64050f926145 iio: light: vcnl4035: fix scan buffer on big-endian 87a2fb7162d3f iio: dac: ad5770r: fix error return in ad5770r_read_raw() 6c122c911e405 iio: accel: adxl380: fix FIFO watermark bit 8 always written as 0 4f420f4b46e7d iio: accel: fix ADXL355 temperature signature value acdeaf1dea613 iio: adc: aspeed: clear reference voltage bits before configuring vref f3f9c94e504fa Input: xpad - add support for Razer Wolverine V3 Pro 2348168b7d71d Input: xpad - add support for BETOP BTP-KP50B/C controller's wireless mode ff809b77f4cfb Input: bcm5974 - recover from failed mode switch c9e103994e33e Input: i8042 - add TUXEDO InfinityBook Max 16 Gen10 AMD to i8042 quirk table 86f10a395325b Input: synaptics-rmi4 - fix a locking bug in an error path 3ac9c06f80ada USB: core: add NO_LPM quirk for Razer Kiyo Pro webcam 5a19500e3461b USB: serial: option: add support for Rolling Wireless RW135R-GL 2a8f48cd3c6e2 USB: serial: io_edgeport: add support for Blackbox IC135A 79129c94aa8a0 drm/amdgpu/pm: drop SMU driver if version not matched messages 6b2614a0ff05a drm/amdgpu: Change AMDGPU_VA_RESERVED_TRAP_SIZE to 64KB 890ee92cc4fd9 drm/i915/dp: Use crtc_state->enhanced_framing properly on ivb/hsw CPU eDP 55efe8402f46a drm/i915/dsi: Don't do DSC horizontal timing adjustments in command mode 9c40e6294756a drm/ast: dp501: Fix initialization of SCU2C 7685e0e3e3448 iio: adc: ti-ads1119: Replace IRQF_ONESHOT with IRQF_NO_THREAD 054836eecc469 iio: adc: ti-ads1119: Reinit completion before wait_for_completion_timeout() 1da4cf3a06c37 iio: adc: ti-ads1119: Fix unbalanced pm reference count in ds1119_single_conversion() 67b3a91bdc482 iio: adc: ti-adc161s626: use DMA-safe memory for spi_read() 6165d8d71ce8a iio: adc: ti-adc161s626: fix buffer read on big-endian 93ca9febac89b drm/amdgpu: fix the idr allocation flags 6e965c91983a8 mips: mm: Allocate tlb_vpn array atomically bbbefc48f6617 hwmon: (occ) Fix division by zero in occ_show_power_1() a8d2212538051 MIPS: Fix the GCC version check for `__multi3' workaround ab9a172ca0822 MIPS: SiByte: Bring back cache initialisation d48c64fb80ad7 ksmbd: fix OOB write in QUERY_INFO for compound requests f5d446624345d Bluetooth: hci_sync: fix stack buffer overflow in hci_le_big_create_sync c8ff0ca650853 Bluetooth: SMP: force responder MITM requirements before building the pairing response 0afc846bd8007 Bluetooth: SMP: derive legacy responder STK authentication from MITM state 90ced24c500ad io_uring/net: fix slab-out-of-bounds read in io_bundle_nbufs() a0b45bdfffce9 ALSA: ctxfi: Fix missing SPDIFI1 index handling 3178b62e2e31b ALSA: caiaq: fix stack out-of-bounds read in init_card 84f3fab430d85 USB: serial: option: add MeiG Smart SRM825WN e67d8c626ace8 wifi: iwlwifi: mvm: fix potential out-of-bounds read in iwl_mvm_nd_match_info_handler() c97b2a0005960 wifi: wilc1000: fix u8 overflow in SSID scan buffer size calculation 4a41c2b18fc05 drm/ioc32: stop speculation on the drm_compat_ioctl path c289154aef97f riscv: kgdb: fix several debug register assignment bugs c089147074ed9 sched/fair: Fix zero_vruntime tracking fix 6277998e3abce sched/fair: Use protect_slice() instead of direct comparison e8fd60338545f mips: ralink: update CPU clock index 2c9b408807bc5 hwmon: (occ) Fix missing newline in occ_show_extended() 5fb6dd8beeefa hwmon: (tps53679) Fix device ID comparison and printing in tps53676_identify() f286132539060 dt-bindings: gpio: fix microchip #interrupt-cells 7fd4a5682c788 hwmon: (ltc4286) Add missing MODULE_IMPORT_NS("PMBUS") 96878fbb37bfe hwmon: (pxe1610) Check return value of page-select write in probe 08021f2d4a557 accel/qaic: Handle DBC deactivation if the owner went away 931d71104fd71 iio: imu: bno055: fix BNO055_SCAN_CH_COUNT off by one 8624e819a2dcf Revert "drm: Fix use-after-free on framebuffers and property blobs when calling drm_dev_unplug" 70abd9d118da2 bpf: reject direct access to nullable PTR_TO_BUF pointers 63fda74885555 ipv6: avoid overflows in ip6_datagram_send_ctl() c1ed6d68fbe17 net: hsr: fix VLAN add unwind on slave errors 9bf5fc36a43f7 net/sched: cls_flow: fix NULL pointer dereference on shared blocks 5cf41031922c1 net/sched: cls_fw: fix NULL pointer dereference on shared blocks 4e2d1bcef78d2 net/x25: Fix overflow when accumulating packets 524371398d846 net/x25: Fix potential double free of skb 0856789f6064a bnxt_en: Restore default stat ctxs for ULP when resource is available 2ebb13f3e8be0 net/mlx5: Fix switchdev mode rollback in case of failure d22c8bb054dc0 net/mlx5: Avoid "No data available" when FW version queries fail cfa774e6c920c net/mlx5: lag: Check for LAG device before creating debugfs e35dbfdb1b771 net: macb: properly unregister fixed rate clocks f310a836da90d net: macb: fix clk handling on PCI glue driver removal 13a66ca1e235d net/sched: sch_netem: fix out-of-bounds access in packet corruption 68187f18a89be bpf: sockmap: Fix use-after-free of sk->sk_socket in sk_psock_verdict_data_ready(). a5bfd14c9a299 rds: ib: reject FRMR registration before IB connection is established 0b706fb2294af Bluetooth: MGMT: validate mesh send advertising payload length 7cadb03be37e7 Bluetooth: hci_event: fix potential UAF in hci_le_remote_conn_param_req_evt 66d432e9b45ba Bluetooth: hci_conn: fix potential UAF in set_cig_params_sync 82f342b3b006c Bluetooth: MGMT: validate LTK enc_size on load 7e296ffdab5bd Bluetooth: SCO: fix race conditions in sco_sock_connect() 94445b8517a0b Bluetooth: hci_sync: call destroy in hci_cmd_sync_run if immediate f710691be163a netfilter: nf_tables: reject immediate NF_QUEUE verdict e7e1b6bcb389c netfilter: x_tables: restrict xt_check_match/xt_check_target extensions for NFPROTO_ARP 0f6c33697ccfa netfilter: ctnetlink: ignore explicit helper on new expectations f8cebc41afd89 netfilter: nf_conntrack_expect: store netns and zone in expectation 4bd1b3d839172 netfilter: nf_conntrack_expect: use expect->helper afd5afd32ba82 netfilter: nf_conntrack_expect: honor expectation helper field fd002ff2ea030 netfilter: ctnetlink: zero expect NAT fields when CTA_EXPECT_NAT absent 2c16e4d64dd91 netfilter: nf_conntrack_helper: pass helper to expect cleanup 69acb09ef957c netfilter: ipset: use nla_strcmp for IPSET_ATTR_NAME attr 673bbd36cba21 netfilter: x_tables: ensure names are nul-terminated 6b419700e459f netfilter: nfnetlink_log: account for netlink header size 57c78bd2e2dd0 netfilter: flowtable: strictly check for maximum number of actions 8027964931785 net: ipv6: flowlabel: defer exclusive option free until RCU teardown 7241da033fdc5 bpf: Fix regsafe() for pointers to packet 8b079642413d6 ASoC: Intel: boards: fix unmet dependency on PINCTRL 6a2124da900a3 net: xilinx: axienet: Correct BD length masks to match AXIDMA IP spec f48ab6ee654ec NFC: pn533: bound the UART receive buffer d6db08484c6cb net: sched: cls_api: fix tc_chain_fill_node to initialize tcm_info to zero to prevent an info-leak f7a6cd508e9e8 net: use skb_header_pointer() for TCPv4 GSO frag_off check c3c09b7b771d4 net: introduce mangleid_features cce5027f9dc3a net: airoha: Add missing cleanup bits in airoha_qdma_cleanup_rx_queue() 25357b670afb5 ipv6: prevent possible UaF in addrconf_permanent_addr() 4045b72a0853f ASoC: ep93xx: Fix unchecked clk_prepare_enable() and add rollback on failure fdaa12c6682c0 net: enetc: check whether the RSS algorithm is Toeplitz 76dfdcef11199 net: sfp: Fix Ubiquiti U-Fiber Instant SFP module on mvneta b9e6431cbea8b net/sched: sch_hfsc: fix divide-by-zero in rtsc_min() 2ba4caba423ed bridge: br_nd_send: linearize skb before parsing ND options f513cdd55a480 eth: fbnic: Account for page fragments when updating BDQ tail 1063515ce15ff ip6_tunnel: clear skb2->cb[] in ip4ip6_err() e41953e7d118e ipv6: icmp: clear skb2->cb[] in ip6_err_gen_icmpv6_unreach() d8ce8e2dfd32c tg3: Fix race for querying speed/duplex 77695a69baca9 net/ipv6: ioam6: prevent schema length wraparound in trace fill 4f810c686fde5 net: ipv6: ndisc: fix ndisc_ra_useropt to initialize nduseropt_padX fields to zero to prevent an info-leak 69402908e277d net: qrtr: replace qrtr_tx_flow radix_tree with xarray to fix memory leak 5eb37a39ae80d net: fec: fix the PTP periodic output sysfs interface 44eafa39363e8 crypto: af-alg - fix NULL pointer dereference in scatterwalk c2fb4984fe09f crypto: caam - fix overflow on long hmac keys c0c133e0225d8 crypto: caam - fix DMA corruption on long hmac keys 08020567bf5fa wifi: ath11k: Pass the correct value of each TID during a stop AMPDU session 368bcaa8f3a03 dt-bindings: auxdisplay: ht16k33: Use unevaluatedProperties to fix common property warning 35783cb13a25e spi: geni-qcom: Check DMA interrupts early in ISR 53ceedd1eb628 btrfs: reject root items with drop_progress and zero drop_level 2b3cc69a318eb i2c: tegra: Don't mark devices with pins as IRQ safe bb6eb33c908ed btrfs: reserve enough transaction items for qgroup ioctls 6a4acd3e86fe5 HID: multitouch: Check to ensure report responses match the request 772f99cc8d6e5 HID: logitech-hidpp: Prevent use-after-free on force feedback initialisation failure e3da29787887c objtool: Fix Clang jump table detection ab319b5a8bca4 tg3: replace placeholder MAC address with device property 7eb0da6455986 btrfs: don't take device_list_mutex when querying zone info 3989740fa4978 atm: lec: fix use-after-free in sock_def_readable() 41026bcc0fdf8 HID: wacom: fix out-of-bounds read in wacom_intuos_bt_irq 8148c2fda4ebb wifi: mac80211: check tdls flag in ieee80211_tdls_oper 194c2e93e5ae2 HID: logitech-hidpp: Enable MX Master 4 over bluetooth c4bcd4a10edd3 arm64/scs: Fix handling of advance_loc4 fd65688547c99 io_uring/kbuf: propagate BUF_MORE through early buffer commit path 1593101304e64 io_uring/kbuf: fix missing BUF_MORE for incremental buffers at EOF 4399febfb1166 io_uring/kbuf: use WRITE_ONCE() for userspace-shared buffer ring fields 612c324f63965 io_uring/kbuf: use READ_ONCE() for userspace-mapped memory 91f262ea2a76a io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths c4dbca5be33c6 io_uring/kbuf: enable bundles for incrementally consumed buffers 341d13c23f79f io_uring/rw: check for NULL io_br_sel when putting a buffer c16afaebfdc65 io_uring/net: correct type for min_not_zero() cast 015f7e0507f40 io_uring: remove async/poll related provided buffer recycles 1249eae601f98 io_uring/kbuf: switch to storing struct io_buffer_list locally 7ba8b025035bb io_uring/net: use struct io_br_sel->val as the send finish value 72f60a59ef4ce io_uring/net: use struct io_br_sel->val as the recv finish value 0f045bf7287d3 io_uring/kbuf: use struct io_br_sel for multiple buffers picking 06877b3a72455 io_uring/kbuf: introduce struct io_br_sel ac6c9a9e5082a io_uring/kbuf: pass in struct io_buffer_list to commit/recycle helpers e6f280230e401 io_uring/net: clarify io_recv_buf_select() return value f7a76e3adf03f io_uring/net: don't use io_net_kbuf_recyle() for non-provided cases c0cdc6a0e9851 io_uring/kbuf: drop 'issue_flags' from io_put_kbuf(s)() arguments c6d48713644bf io_uring/kbuf: uninline __io_put_kbufs e802d79d11ce7 io_uring/kbuf: introduce io_kbuf_drop_legacy() bfd4739463ec4 io_uring/kbuf: open code __io_put_kbuf() 55de36310adce io_uring/kbuf: remove legacy kbuf caching 3fb42ddddfb17 io_uring/kbuf: simplify __io_put_kbuf badb3134c9113 io_uring/kbuf: remove legacy kbuf kmem cache 0e2e453f31359 io_uring/kbuf: remove legacy kbuf bulk allocation Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 4c754bcd21..5a7d17c21e 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -15,13 +15,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "682f6c2088ea37c1dcc324905956034eda630d52" -SRCREV_meta ?= "8bb0dbe2b50860402b07a506a5aa3a4ef7aba0a7" +SRCREV_machine ?= "4277a7a5b623fcf652c3c73d77baa1fc15c1faf4" +SRCREV_meta ?= "b507ba98ba3ecc385b14a231dddafaea3421f778" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.80" +LINUX_VERSION ?= "6.12.81" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index d760030c21..533da7130b 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc include recipes-kernel/linux/cve-exclusion.inc include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.80" +LINUX_VERSION ?= "6.12.81" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" -SRCREV_meta ?= "8bb0dbe2b50860402b07a506a5aa3a4ef7aba0a7" +SRCREV_machine ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" +SRCREV_meta ?= "b507ba98ba3ecc385b14a231dddafaea3421f778" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index c50dc6dfac..e48084fcd3 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "dd1da548895086a19df2c3fc9586999789081636" -SRCREV_machine:qemuarm64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" -SRCREV_machine:qemuloongarch64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" -SRCREV_machine:qemumips ?= "14123935e5dd112c3a4daa4c5a756b82298ecf4d" -SRCREV_machine:qemuppc ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" -SRCREV_machine:qemuriscv64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" -SRCREV_machine:qemuriscv32 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" -SRCREV_machine:qemux86 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" -SRCREV_machine:qemux86-64 ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" -SRCREV_machine:qemumips64 ?= "d6af6b480ab453a08f04ce80ab25a131f54f8e34" -SRCREV_machine ?= "18e0f76d6fff9522f4df78a484d68e814999b29a" -SRCREV_meta ?= "8bb0dbe2b50860402b07a506a5aa3a4ef7aba0a7" +SRCREV_machine:qemuarm ?= "54a370021957bfa24b4580a75518248174890205" +SRCREV_machine:qemuarm64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" +SRCREV_machine:qemuloongarch64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" +SRCREV_machine:qemumips ?= "0b864eeca749237236d8ec10e7ed373958f497c4" +SRCREV_machine:qemuppc ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" +SRCREV_machine:qemuriscv64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" +SRCREV_machine:qemuriscv32 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" +SRCREV_machine:qemux86 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" +SRCREV_machine:qemux86-64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" +SRCREV_machine:qemumips64 ?= "20f68d6b803a62b9bd958a453a669cd9ac75d22a" +SRCREV_machine ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" +SRCREV_meta ?= "b507ba98ba3ecc385b14a231dddafaea3421f778" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the <version>/base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "00d7934ffcc35e65b113ba4991c8a3338bd85fc1" +SRCREV_machine:class-devupstream ?= "e7a3953084a7050ca349010deb22546834c2e196" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.80" +LINUX_VERSION ?= "6.12.81" PV = "${LINUX_VERSION}+git" -- 2.43.0 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 16/18] linux-yocto/6.12: update CVE exclusions (6.12.81) 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield ` (14 preceding siblings ...) 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 15/18] linux-yocto/6.12: update to v6.12.81 bruce.ashfield @ 2026-04-23 15:45 ` bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 17/18] linux-yocto/6.12: update to v6.12.83 bruce.ashfield ` (2 subsequent siblings) 18 siblings, 0 replies; 20+ messages in thread From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw) To: yoann.congal; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 4 changes (4 new | 0 updated): - 4 new CVEs: CVE-2026-24893, CVE-2026-25125, CVE-2026-25133, CVE-2026-27287 - 0 updated CVEs: Date: Tue, 14 Apr 2026 20:56:01 +0000 ] Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/cve-exclusion_6.12.inc | 98 ++++++++++++------- 1 file changed, 64 insertions(+), 34 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index e4e81ee492..2ae4f461e5 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-04-08 14:59:27.074934+00:00 for kernel version 6.12.80 -# From linux_kernel_cves cve_2026-04-08_1400Z +# Generated at 2026-04-14 21:08:51.681656+00:00 for kernel version 6.12.81 +# From linux_kernel_cves cve_2026-04-14_2000Z-1-g4a280a922d3 python check_kernel_cve_status_version() { - this_version = "6.12.80" + this_version = "6.12.81" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -18450,7 +18450,7 @@ CVE_STATUS[CVE-2025-39814] = "fixed-version: only affects 6.16 onwards" CVE_STATUS[CVE-2025-39815] = "cpe-stable-backport: Backported in 6.12.45" -CVE_STATUS[CVE-2025-39816] = "cpe-stable-backport: Backported in 6.12.49" +CVE_STATUS[CVE-2025-39816] = "cpe-stable-backport: Backported in 6.12.81" CVE_STATUS[CVE-2025-39817] = "cpe-stable-backport: Backported in 6.12.45" @@ -20424,7 +20424,7 @@ CVE_STATUS[CVE-2025-71267] = "cpe-stable-backport: Backported in 6.12.75" CVE_STATUS[CVE-2025-71268] = "cpe-stable-backport: Backported in 6.12.70" -# CVE-2025-71269 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2025-71269] = "cpe-stable-backport: Backported in 6.12.81" CVE_STATUS[CVE-2025-71270] = "cpe-stable-backport: Backported in 6.12.70" @@ -20970,7 +20970,7 @@ CVE_STATUS[CVE-2026-23245] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23246] = "cpe-stable-backport: Backported in 6.12.77" -# CVE-2026-23247 needs backporting (fixed from 7.0rc3) +# CVE-2026-23247 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23248] = "fixed-version: only affects 6.14 onwards" @@ -21006,7 +21006,7 @@ CVE_STATUS[CVE-2026-23263] = "fixed-version: only affects 6.17 onwards" CVE_STATUS[CVE-2026-23264] = "cpe-stable-backport: Backported in 6.12.70" -# CVE-2026-23265 needs backporting (fixed from 7.0rc1) +# CVE-2026-23265 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23266] = "cpe-stable-backport: Backported in 6.12.74" @@ -21020,7 +21020,7 @@ CVE_STATUS[CVE-2026-23270] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23271] = "cpe-stable-backport: Backported in 6.12.77" -# CVE-2026-23272 needs backporting (fixed from 7.0rc3) +# CVE-2026-23272 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23273] = "cpe-stable-backport: Backported in 6.12.75" @@ -21052,7 +21052,7 @@ CVE_STATUS[CVE-2026-23286] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23287] = "cpe-stable-backport: Backported in 6.12.77" -CVE_STATUS[CVE-2026-23288] = "fixed-version: only affects 6.19 onwards" +CVE_STATUS[CVE-2026-23288] = "fixed-version: only affects 6.19.4 onwards" CVE_STATUS[CVE-2026-23289] = "cpe-stable-backport: Backported in 6.12.77" @@ -21080,7 +21080,7 @@ CVE_STATUS[CVE-2026-23300] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23301] = "fixed-version: only affects 6.19 onwards" -# CVE-2026-23302 needs backporting (fixed from 7.0rc3) +# CVE-2026-23302 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23303] = "cpe-stable-backport: Backported in 6.12.77" @@ -21128,20 +21128,18 @@ CVE_STATUS[CVE-2026-23325] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23326] = "fixed-version: only affects 6.13 onwards" -# CVE-2026-23327 needs backporting (fixed from 7.0rc2) +# CVE-2026-23327 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23328] = "fixed-version: only affects 6.14 onwards" CVE_STATUS[CVE-2026-23329] = "fixed-version: only affects 6.18 onwards" -# CVE-2026-23330 needs backporting (fixed from 7.0rc3) +# CVE-2026-23330 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23331] = "fixed-version: only affects 6.13 onwards" CVE_STATUS[CVE-2026-23332] = "fixed-version: only affects 6.16 onwards" -# CVE-2026-23333 needs backporting (fixed from 7.0rc1) - CVE_STATUS[CVE-2026-23334] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23335] = "cpe-stable-backport: Backported in 6.12.77" @@ -21156,7 +21154,7 @@ CVE_STATUS[CVE-2026-23339] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23340] = "cpe-stable-backport: Backported in 6.12.77" -CVE_STATUS[CVE-2026-23341] = "fixed-version: only affects 6.19 onwards" +CVE_STATUS[CVE-2026-23341] = "fixed-version: only affects 6.19.4 onwards" CVE_STATUS[CVE-2026-23342] = "fixed-version: only affects 6.18 onwards" @@ -21166,11 +21164,11 @@ CVE_STATUS[CVE-2026-23344] = "fixed-version: only affects 6.19 onwards" CVE_STATUS[CVE-2026-23345] = "fixed-version: only affects 6.13 onwards" -# CVE-2026-23346 needs backporting (fixed from 7.0rc2) +# CVE-2026-23346 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23347] = "cpe-stable-backport: Backported in 6.12.77" -# CVE-2026-23348 needs backporting (fixed from 7.0rc2) +# CVE-2026-23348 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23349] = "fixed-version: only affects 6.18 onwards" @@ -21184,7 +21182,7 @@ CVE_STATUS[CVE-2026-23353] = "fixed-version: only affects 6.19 onwards" CVE_STATUS[CVE-2026-23354] = "cpe-stable-backport: Backported in 6.12.77" -CVE_STATUS[CVE-2026-23355] = "fixed-version: only affects 6.18 onwards" +CVE_STATUS[CVE-2026-23355] = "fixed-version: only affects 6.18.14 onwards" CVE_STATUS[CVE-2026-23356] = "cpe-stable-backport: Backported in 6.12.77" @@ -21216,19 +21214,19 @@ CVE_STATUS[CVE-2026-23369] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23370] = "cpe-stable-backport: Backported in 6.12.77" -# CVE-2026-23371 needs backporting (fixed from 7.0rc3) +# CVE-2026-23371 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23372] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23373] = "cpe-stable-backport: Backported in 6.12.77" -# CVE-2026-23374 needs backporting (fixed from 7.0rc3) +# CVE-2026-23374 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23375] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23376] = "fixed-version: only affects 6.18 onwards" -# CVE-2026-23377 needs backporting (fixed from 7.0rc3) +# CVE-2026-23377 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23378] = "cpe-stable-backport: Backported in 6.12.77" @@ -21244,7 +21242,7 @@ CVE_STATUS[CVE-2026-23383] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23384] = "fixed-version: only affects 6.18 onwards" -# CVE-2026-23385 needs backporting (fixed from 7.0rc3) +# CVE-2026-23385 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23386] = "cpe-stable-backport: Backported in 6.12.78" @@ -21252,7 +21250,7 @@ CVE_STATUS[CVE-2026-23387] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23388] = "cpe-stable-backport: Backported in 6.12.77" -# CVE-2026-23389 needs backporting (fixed from 7.0rc3) +CVE_STATUS[CVE-2026-23389] = "cpe-stable-backport: Backported in 6.12.81" CVE_STATUS[CVE-2026-23390] = "cpe-stable-backport: Backported in 6.12.74" @@ -21262,7 +21260,7 @@ CVE_STATUS[CVE-2026-23392] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23393] = "cpe-stable-backport: Backported in 6.12.78" -# CVE-2026-23394 needs backporting (fixed from 7.0rc5) +# CVE-2026-23394 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23395] = "cpe-stable-backport: Backported in 6.12.78" @@ -21358,11 +21356,11 @@ CVE_STATUS[CVE-2026-23440] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23441] = "cpe-stable-backport: Backported in 6.12.78" -# CVE-2026-23442 needs backporting (fixed from 7.0rc5) +# CVE-2026-23442 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23443] = "cpe-stable-backport: Backported in 6.12.78" -# CVE-2026-23444 needs backporting (fixed from 7.0rc5) +# CVE-2026-23444 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23445] = "cpe-stable-backport: Backported in 6.12.78" @@ -21376,7 +21374,7 @@ CVE_STATUS[CVE-2026-23449] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23450] = "cpe-stable-backport: Backported in 6.12.78" -CVE_STATUS[CVE-2026-23451] = "fixed-version: only affects 6.18 onwards" +CVE_STATUS[CVE-2026-23451] = "fixed-version: only affects 6.18.19 onwards" CVE_STATUS[CVE-2026-23452] = "cpe-stable-backport: Backported in 6.12.78" @@ -21410,17 +21408,15 @@ CVE_STATUS[CVE-2026-23466] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23467] = "fixed-version: only affects 6.16 onwards" -# CVE-2026-23468 needs backporting (fixed from 7.0rc5) +# CVE-2026-23468 needs backporting (fixed from 7.0) -# CVE-2026-23469 needs backporting (fixed from 7.0rc5) +# CVE-2026-23469 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23470] = "cpe-stable-backport: Backported in 6.12.78" -CVE_STATUS[CVE-2026-23471] = "cpe-stable-backport: Backported in 6.12.78" - -# CVE-2026-23472 needs backporting (fixed from 7.0rc5) +# CVE-2026-23472 needs backporting (fixed from 7.0) -# CVE-2026-23473 needs backporting (fixed from 7.0rc5) +# CVE-2026-23473 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-23474] = "cpe-stable-backport: Backported in 6.12.78" @@ -21462,7 +21458,7 @@ CVE_STATUS[CVE-2026-31405] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-31406] = "cpe-stable-backport: Backported in 6.12.80" -# CVE-2026-31407 needs backporting (fixed from 7.0rc5) +# CVE-2026-31407 needs backporting (fixed from 7.0) CVE_STATUS[CVE-2026-31408] = "cpe-stable-backport: Backported in 6.12.80" @@ -21472,5 +21468,39 @@ CVE_STATUS[CVE-2026-31410] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-31411] = "cpe-stable-backport: Backported in 6.12.75" +CVE_STATUS[CVE-2026-31412] = "cpe-stable-backport: Backported in 6.12.78" + +CVE_STATUS[CVE-2026-31413] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31414] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31415] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31416] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31417] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31418] = "cpe-stable-backport: Backported in 6.12.81" + +# CVE-2026-31419 needs backporting (fixed from 7.0) + +# CVE-2026-31420 needs backporting (fixed from 7.0) + +CVE_STATUS[CVE-2026-31421] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31422] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31423] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31424] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31425] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31426] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31427] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31428] = "cpe-stable-backport: Backported in 6.12.80" + CVE_STATUS[CVE-2026-31788] = "cpe-stable-backport: Backported in 6.12.78" -- 2.43.0 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 17/18] linux-yocto/6.12: update to v6.12.83 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield ` (15 preceding siblings ...) 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 16/18] linux-yocto/6.12: update CVE exclusions (6.12.81) bruce.ashfield @ 2026-04-23 15:45 ` bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 18/18] linux-yocto/6.12: update CVE exclusions (6.12.83) bruce.ashfield 2026-04-24 15:00 ` [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 Yoann Congal 18 siblings, 0 replies; 20+ messages in thread From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw) To: yoann.congal; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Updating linux-yocto/6.12 to the latest korg -stable release that comprises the following commits: eefc95626b5c Linux 6.12.83 817daf163312 PCI: Revert "Enable ACS after configuring IOMMU for OF platforms" bc9843c39f99 ipv6: add NULL checks for idev in SRv6 paths f8f55a226aab PCI: Fix placement of pci_save_state() in pci_bus_add_device() 29f05b91d8da rxrpc: Fix key quota calculation for multitoken keys 947f953978b0 ocfs2: fix out-of-bounds write in ocfs2_write_end_inline c1de19e891be ocfs2: validate inline data i_size during inode read fad0e70f4ace ocfs2: add inline inode consistency check to ocfs2_validate_inode_block() 98a0a81ce780 media: hackrf: fix to not free memory after the device is registered in hackrf_probe() be57e52e27c7 media: vidtv: fix pass-by-value structs causing MSAN warnings 449ec5fc99f4 nilfs2: fix NULL i_assoc_inode dereference in nilfs_mdt_save_to_shadow_map 582fbecb3756 media: as102: fix to not free memory after the device is registered in as102_usb_probe() add4982510f3 bcache: fix cached_dev.sb_bio use-after-free and crash af75b486f7e8 ALSA: 6fire: fix use-after-free on disconnect c78e1d4e48f2 hwmon: (powerz) Fix use-after-free on USB disconnect 5fb294032772 media: em28xx: fix use-after-free in em28xx_v4l2_open() a8a55913552a media: mediatek: vcodec: fix use-after-free in encoder release path 98c22210aead media: vidtv: fix nfeeds state corruption on start_streaming failure dfc8292a1d67 mm: blk-cgroup: fix use-after-free in cgwb_release_workfn() a05f77cb227c mm/kasan: fix double free for kasan pXds b7412ed789ff ASoC: qcom: q6apm: move component registration to unmanaged version b5a02d37eb07 KVM: x86: Use scratch field in MMIO fragment to hold small write values b1e13fdc27ca x86-64/arm64/powerpc: clean up and rename __copy_from_user_flushcache f5945c8904e5 x86: rename and clean up __copy_from_user_inatomic_nocache() 14b9194db4a2 x86-64: rename misleadingly named '__copy_user_nocache()' function e46a2cbd942c checkpatch: add support for Assisted-by tag 300fb45afa7c KVM: x86: Use __DECLARE_FLEX_ARRAY() for UAPI structures with VLAs b46ef44fe927 KVM: Remove subtle "struct kvm_stats_desc" pseudo-overlay 74c2471eb891 kernel: be more careful about dup_mmap() failures and uprobe registering af2648ee5847 net: sched: fix TCF_LAYER_TRANSPORT handling in tcf_get_base_ptr() 1ef731547dfd gpiolib: fix race condition for gdev->srcu 3dc1f48c42f2 gpiolib: unify two loops initializing GPIO descriptors ab423e589282 KVM: SEV: Drop WARN on large size for KVM_MEMORY_ENCRYPT_REG_REGION d93f7c00d884 KVM: SEV: Disallow LAUNCH_FINISH if vCPUs are actively being created c9609847ae65 KVM: SEV: Reject attempts to sync VMSA of an already-launched/encrypted vCPU 6773cc24c004 PCI: endpoint: pci-epf-vntb: Stop cmd_handler work in epf_ntb_epc_cleanup 911b557dd781 ocfs2: handle invalid dinode in ocfs2_group_extend 4cf2768a0291 ocfs2: fix use-after-free in ocfs2_fault() when VM_FAULT_RETRY 2b884d52273c ocfs2: fix possible deadlock between unlink and dio_end_io_write e589de36da10 media: vidtv: fix NULL pointer dereference in vidtv_channel_pmt_match_sections ddd57ebce245 dcache: Limit the minimal number of bucket to two 365c36e1a126 ALSA: ctxfi: Limit PTP to a single page 3be0d8895704 Docs/admin-guide/mm/damon/reclaim: warn commit_inputs vs param updates race 6e921c599161 USB: serial: option: add Telit Cinterion FN990A MBIM composition 2f640c6043ae staging: sm750fb: fix division by zero in ps_to_hz() a4f4371d194d wifi: rtw88: fix device leak on probe failure 4b762046b1bd scripts: generate_rust_analyzer.py: avoid FD leak 03797cdee38e fbdev: udlfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO ad279de5d6f1 usb: port: add delay after usb_hub_set_port_power() c6c0d13db5d0 usb: gadget: f_hid: don't call cdev_init while cdev in use 603d5a711083 USB: cdc-acm: Add quirks for Yoga Book 9 14IAH10 INGENIC touchscreen 57662bd432f3 usb: storage: Expand range of matched versions for VL817 quirks entry 8d155e2d1c41 usbip: validate number_of_packets in usbip_pack_ret_submit() dd577cb55588 ksmbd: fix mechToken leak when SPNEGO decode fails after token alloc 08f9e6d899b5 ksmbd: require 3 sub-authorities before reading sub_auth[2] 551dfb15b182 ksmbd: validate EaNameLength in smb2_get_ea() 5cc0574c84aa smb: client: fix off-by-8 bounds check in check_wsl_eas() adb8014599fd usb: gadget: renesas_usb3: validate endpoint index in standard request handlers c9315ce9da36 usb: gadget: f_phonet: fix skb frags[] overflow in pn_rx_complete() 8757a2593631 usb: gadget: f_ncm: validate minimum block_len in ncm_unwrap_ntb() 53cb4e79a071 fbdev: tdfxfb: avoid divide-by-zero on FBIOPUT_VSCREENINFO e103f98f6615 ALSA: fireworks: bound device-supplied status before string array lookup ef2ee9db13b6 drm/vc4: platform_get_irq_byname() returns an int 1bec5698b55a NFC: digital: Bounds check NFC-A cascade depth in SDD response handler a23b1b1aaf41 net: usb: cdc-phonet: fix skb frags[] overflow in rx_complete() 58386f00af71 HID: core: clamp report_size in s32ton() to avoid undefined shift 8eed7bce7a4c HID: alps: fix NULL pointer dereference in alps_raw_event() d5b8f5f8d6fc staging: rtl8723bs: initialize le_tmp64 in rtw_BIP_verify() d87d5620125a i2c: s3c24xx: check the size of the SMBUS message before using it 572f0bf536eb can: raw: fix ro->uniq use-after-free in raw_rcv() 796e0cac0582 nfc: llcp: add missing return after LLCP_CLOSED checks b448529f2f29 idpf: fix PREEMPT_RT raw/bh spinlock nesting for async VC handling 09e17780dc0c ALSA: usb-audio: Improve Focusrite sample rate filtering 1a6d2b001eb7 thermal: core: Address thermal zone removal races with resume ac72b577dadb thermal: core: Mark thermal zones as exiting before unregistration 5d40cb3ba31b Revert "drm/xe: Switch MMIO interface to take xe_mmio instead of xe_gt" 94a14a68ad31 Revert "drm/xe/mmio: Avoid double-adjust in 64-bit reads" 9174d28f3f15 netfilter: conntrack: add missing netlink policy validations af2fa2fbbced crypto: algif_aead - Fix minimum RX size check for decryption d66792919d4f sched/deadline: Use revised wakeup rule for dl_server 6cfc187d85f1 perf/x86/intel/uncore: Skip discovery table for offline dies 9bf3e6ccfdcf crypto: af_alg - limit RX SG extraction by receive buffer budget 4ee7dcd76ce9 gpio: tegra: fix irq_release_resources calling enable instead of disable 77c1489398c8 l2tp: Drop large packets with UDP encap 2bf18b643c46 net: ipa: fix event ring index not programmed for IPA v5.0+ d1c66396796f net: ipa: fix GENERIC_CMD register field masks for IPA v5.0+ 0c739f3785f8 af_unix: read UNIX_DIAG_VFS data under unix_state_lock 16eb3c2f86de net: txgbe: leave space for null terminators on property_entry 22730cb96093 netfilter: nfnetlink_queue: make hash table per queue 7bc3f58c452f netfilter: nfnetlink_queue: nfqnl_instance GFP_ATOMIC -> GFP_KERNEL_ACCOUNT allocation 9eda5478746e netfilter: ip6t_eui64: reject invalid MAC header for all packets aec14808271f netfilter: xt_multiport: validate range encoding in checkentry d1399632ba25 netfilter: nfnetlink_log: initialize nfgenmsg in NLMSG_DONE terminator 403995931500 ipvs: fix NULL deref in ip_vs_add_service error path c2275ac1a9a3 selftests: net: bridge_vlan_mcast: wait for h1 before querier check 5a1a4b049ddd xfrm_user: fix info leak in build_mapping() 21e235a36cfb xfrm: fix refcount leak in xfrm_migrate_policy_find 438b1f668ad5 xfrm: Wait for RCU readers during policy netns exit f669d60db11d xsk: validate MTU against usable frame size on bind b412b5e33943 xsk: fix XDP_UMEM_SG_FLAG issues a4ee85f55a2d xsk: respect tailroom for ZC setups 0ec4d3f6e693 xsk: tighten UMEM headroom validation to account for tailroom and min frame dc230df28471 e1000: check return value of e1000_read_eeprom 2270ebab5312 ixgbevf: add missing negotiate_features op to Hyper-V ops table 83f2daf5297b tracing/probe: reject non-closed empty immediate strings 96f8efe50464 dt-bindings: net: Fix Tegra234 MGBE PTP clock 9a3351cf1b2c net: stmmac: Fix PTP ref clock for Tegra234 7c31f7a599cf nfc: s3fwrn5: allocate rx skb before consuming bytes be638321b0da net: increase IP_TUNNEL_RECURSION_LIMIT to 5 6be325206850 ipv4: icmp: fix null-ptr-deref in icmp_build_probe() 615517f3f8d5 ipv4: nexthop: allocate skb dynamically in rtm_get_nexthop() e20b85bfbed8 ipv4: nexthop: avoid duplicate NHA_HW_STATS_ENABLE on nexthop group dump 328bb2cff5c2 net: lapbether: handle NETDEV_PRE_TYPE_CHANGE a69738efea09 net: sched: act_csum: validate nested VLAN headers 5b1173b16542 eventpoll: defer struct eventpoll free to RCU grace period 0768598cf753 drm/vc4: Protect madv read in vc4_gem_object_mmap() with madv_lock d8fdd6adc07b drm/vc4: Fix a memory leak in hang state error path 0d3c014a8439 drm/vc4: Fix memory leak of BO array in hang state 44361a76b151 drm/vc4: Release runtime PM reference after binding V3D 2c41283d94af xfrm: account XFRMA_IF_ID in aevent size calculation c5c13f1a6dc4 HID: amd_sfh: don't log error when device discovery fails with -EOPNOTSUPP 5fde03df639d PCI: hv: Set default NUMA node to 0 for devices without affinity info 29af688c457a tools/power/turbostat: Fix microcode patch level output for AMD/Hygon c93ca7c5a72e soc: qcom: pd-mapper: Fix element length in servreg_loc_pfr_req_ei 2d3248fe5663 arm64: dts: imx93-tqma9352: improve eMMC pad configuration 7a5082db69e6 arm64: dts: imx93-9x9-qsb: change usdhc tuning step for eMMC and SD 42e3ff61bbd6 arm64: dts: imx8mq: Set the correct gpu_ahb clock frequency 35550eb71aaf arm64: dts: qcom: hamoa/x1: fix idle exit latency cd4aab4d7b61 soc: aspeed: socinfo: Mask table entries for accurate SoC ID matching 4ec47edcf3cd ASoC: stm32_sai: fix incorrect BCLK polarity for DSP_A/B, LEFT_J 9224ba3215a9 net: sfp: add quirks for Hisense and HSGQ GPON ONT SFP modules 9fca68c2512a wifi: brcmfmac: validate bsscfg indices in IF events ee95f3c56a0d ata: ahci: force 32-bit DMA for JMicron JMB582/JMB585 e16a6d11bd77 HID: roccat: fix use-after-free in roccat_report_event 609057040da9 ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14IAH10 1753b0c6fd53 HID: quirks: add HID_QUIRK_ALWAYS_POLL for 8BitDo Pro 3 a712242521be platform/x86/amd: pmc: Add Thinkpad L14 Gen3 to quirk_s2idle_bug 66dd07f0b93c pinctrl: intel: Fix the revision for new features (1kOhm PD, HW debouncer) 361b9cddf20b ALSA: hda/realtek: Add quirk for Lenovo Yoga Pro 7 14IMH9 f9ac49dda21e ASoC: amd: yc: Add DMI entry for HP Laptop 15-fc0xxx 2d29214448ec fs/smb/client: fix out-of-bounds read in cifs_sanitize_prepath 8db2ca260d56 ALSA: usb-audio: Fix quirk flags for NeuralDSP Quad Cortex 50eed7986f23 ALSA: hda/realtek: Add quirk for Samsung Book2 Pro 360 (NP950QED) ade07920ca2c ASoC: soc-core: call missing INIT_LIST_HEAD() for card_aux_list df15adc692a8 wifi: wl1251: validate packet IDs before indexing tx_frames 0843006565bd ALSA: hda/realtek: add quirk for Framework F111:000F 3d53f9aafd46 netfilter: nft_set_pipapo_avx2: don't return non-matching entry on expiry 48a21d309343 drm/amdgpu: Handle GPU page faults correctly on non-4K page systems b46e7a31e5d2 ALSA: hda/realtek: Add mute LED quirk for HP Pavilion 15-eg0xxx 32372781d664 btrfs: tracepoints: get correct superblock from dentry in event btrfs_sync_file() 7a8886444cc6 platform/x86: asus-nb-wmi: add DMI quirk for ASUS ROG Flow Z13-KJP GZ302EAC a06d3a930973 can: mcp251x: add error handling for power enable in open and resume 06d4938e41d6 ASoC: SOF: topology: reject invalid vendor array size in token parser c5dfe0fb6a43 ASoC: amd: yc: Add DMI quirk for Thin A15 B7VF 6e539907c0d1 Bluetooth: hci_sync: annotate data-races around hdev->req_status ec010891da57 ALSA: asihpi: avoid write overflow check warning c7630d574e33 media: rkvdec: reduce stack usage in rkvdec_init_v4l2_vp9_count_tbl() 545206174816 ALSA: hda/realtek: Add quirk for ASUS ROG Flow Z13-KJP GZ302EAC e3c263cb6e28 ALSA: hda/realtek: Add HP ENVY Laptop 13-ba0xxx quirk dcc2ab487da1 ASoC: amd: yc: Add DMI quirk for ASUS EXPERTBOOK BM1403CDA 66964118f1f5 RDMA/irdma: Fix double free related to rereg_user_mr d75ae3350fe8 Linux 6.12.82 b731aca06387 x86/CPU: Fix FPDSS on Zen1 ed918050c9ec ALSA: hda/hdmi: Add quirk for TUXEDO IBS14G6 60313768a8ed net: skb: fix cross-cache free of KFENCE-allocated skb head e9c369d58785 rxrpc: Fix missing error checks for rxkad encryption/decryption failure 57cf7625db25 rxrpc: Fix key/keyring checks in setsockopt(RXRPC_SECURITY_KEY/KEYRING) 12de9e0e0b0b rxrpc: fix reference count leak in rxrpc_server_keyring() a149dcae2330 rxrpc: reject undecryptable rxkad response tickets 0c156aff8a2d rxrpc: Only put the call ref if one was acquired e6b7943c5dc8 rxrpc: Fix key reference count leak from call->key c63abf25203b rxrpc: Fix call removal to use RCU safe deletion 502ff04fa3aa rxrpc: Fix anonymous key handling 691082c0b93c net: lan966x: fix use-after-free and leak in lan966x_fdma_reload() 73e940c4249d net: lan966x: fix page pool leak in error paths 305832c53551 net: lan966x: fix page_pool error handling in lan966x_fdma_rx_alloc_page_pool() 116cface1b13 idpf: set the payload size before calling the async handler 6911b7e365bf idpf: improve locking around idpf_vc_xn_push_free() 633ab680c405 mm: filemap: fix nr_pages calculation overflow in filemap_map_pages() 2c91b3991227 net: stmmac: fix integer underflow in chain mode 546cfc65c4bf net: qualcomm: qca_uart: report the consumed byte on RX skb allocation failure 53f2642d77ab mmc: vub300: fix NULL-deref on disconnect 3086374e8bc7 pmdomain: imx8mp-blk-ctrl: Keep the NOC_HDCP clock enabled a1a416134fc1 net/mlx5: Update the list of the PCI supported devices fe3b2f2084b1 drm/i915/psr: Do not use pipe_src as borders for SU area a00e92bf6583 drm/i915/gt: fix refcount underflow in intel_engine_park_heartbeat 7962b5222226 batman-adv: hold claim backbone gateways by reference 9f3ec44aeb58 net: altera-tse: fix skb leak on DMA mapping error in tse_start_xmit() aa9facde6c50 net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption d20e98c2df93 EDAC/mc: Fix error path ordering in edac_mc_alloc() 30ab358fad0c X.509: Fix out-of-bounds access when parsing extensions f970646b9a39 batman-adv: reject oversized global TT response buffers a9495069b43b nfc: pn533: allocate rx skb before consuming bytes bc7ee8cb8b3f arm64: dts: hisilicon: hi3798cv200: Add missing dma-ranges 53be38076032 arm64: dts: hisilicon: poplar: Correct PCIe reset GPIO polarity b7ea2a650ac4 arm64: dts: imx8mq-librem5: Bump BUCK1 suspend voltage up to 0.85V ec5cf6e8a125 Revert "arm64: dts: imx8mq-librem5: Set the DVS voltages lower" c17a2340d38b platform/x86/intel-uncore-freq: Handle autonomous UFS status bit 77263f053963 wifi: brcmsmac: Fix dma_free_coherent() size a2ea1ef0167d tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG eda30846ea54 xfrm: clear trailing padding in build_polexpire() 36a36105d957 workqueue: Add pool_workqueue to pending_pwqs list when unplugging multiple inactive works aa7cfa16f98f netfilter: nft_ct: fix use-after-free in timeout object destroy c1678b76541b LoongArch: Handle percpu handler address for ORC unwinder a9f522e12df8 LoongArch: Remove unnecessary checks for ORC unwinder c494448bb522 net: annotate data-races around sk->sk_{data_ready,write_space} 96bfd850d5d3 Revert "mptcp: add needs_id for netlink appending addr" ca685511f7af sched_ext: Fix stale direct dispatch state in ddsp_dsq_id 038cb4a94ed0 misc: fastrpc: check qcom_scm_assign_mem() return in rpmsg_probe 7854c0f118d8 arm64: dts: renesas: white-hawk-cpu-common: Add pin control for DSI-eDP IRQ 702029337b05 nfc: nci: complete pending data exchange on device close e5584932ac1d blktrace: fix __this_cpu_read/write in preemptible context 4125a194db4a btrfs: fix incorrect return value after changing leaf in lookup_extent_data_ref() 42995e4e034b btrfs: remove pointless out labels from extent-tree.c 8a340c39a33a btrfs: remove unused flag EXTENT_BUFFER_CORRUPT 70d34bd2a35c btrfs: remove unused flag EXTENT_BUFFER_READAHEAD 3e6ac6c4b395 btrfs: split waiting from read_extent_buffer_pages(), drop parameter wait 00f0fbd71440 btrfs: remove unused define WAIT_PAGE_LOCK for extent io 781da277d05c btrfs: make wait_on_extent_buffer_writeback() static inline 16a49e3fda33 ASoC: simple-card-utils: Don't use __free(device_node) at graph_util_parse_dai() 5bc51bc77f22 MIPS: mm: Rewrite TLB uniquification for the hidden bit feature 497f7f978946 MIPS: mm: Suppress TLB uniquification on EHINV hardware d937204d13f9 MIPS: Always record SEGBITS in cpu_data.vmbits b8acc3914594 Input: uinput - take event lock when submitting FF request "event" a3d6c9c053c9 Input: uinput - fix circular locking dependency with ff-core 6305ad032b03 seg6: separate dst_cache for input and output paths in seg6 lwtunnel eb9c6aeb512f mptcp: fix slab-use-after-free in __inet_lookup_established 82843afc1901 net: rfkill: prevent unlimited numbers of rfkill events from being created ff5ee5073023 xfrm_user: fix info leak in build_report() b245db719bc7 wifi: rt2x00usb: fix devres lifetime 632544de0fd9 usb: typec: ucsi: skip connector validation before init 1d761e5a7340 lib/crypto: chacha: Zeroize permuted_state before it leaves scope Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/linux-yocto-rt_6.12.bb | 6 ++-- .../linux/linux-yocto-tiny_6.12.bb | 6 ++-- meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++++++++---------- 3 files changed, 20 insertions(+), 20 deletions(-) diff --git a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb index 5a7d17c21e..03cd397db0 100644 --- a/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb @@ -15,13 +15,13 @@ python () { raise bb.parse.SkipRecipe("Set PREFERRED_PROVIDER_virtual/kernel to linux-yocto-rt to enable it") } -SRCREV_machine ?= "4277a7a5b623fcf652c3c73d77baa1fc15c1faf4" -SRCREV_meta ?= "b507ba98ba3ecc385b14a231dddafaea3421f778" +SRCREV_machine ?= "151d19206b5cd4a4cf6fd3ec8939463bf30d4b6b" +SRCREV_meta ?= "1a28be589c9aa79335563af67fbce0dadf570537" SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;branch=${KBRANCH};name=machine;protocol=https \ git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" -LINUX_VERSION ?= "6.12.81" +LINUX_VERSION ?= "6.12.83" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" diff --git a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb index 533da7130b..802205b38d 100644 --- a/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb @@ -9,7 +9,7 @@ require recipes-kernel/linux/linux-yocto.inc include recipes-kernel/linux/cve-exclusion.inc include recipes-kernel/linux/cve-exclusion_6.12.inc -LINUX_VERSION ?= "6.12.81" +LINUX_VERSION ?= "6.12.83" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" DEPENDS += "${@bb.utils.contains('ARCH', 'x86', 'elfutils-native', '', d)}" @@ -18,8 +18,8 @@ DEPENDS += "openssl-native util-linux-native" KMETA = "kernel-meta" KCONF_BSP_AUDIT_LEVEL = "2" -SRCREV_machine ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" -SRCREV_meta ?= "b507ba98ba3ecc385b14a231dddafaea3421f778" +SRCREV_machine ?= "f35602ea0c4f5b913a843251bc60949f65fda47c" +SRCREV_meta ?= "1a28be589c9aa79335563af67fbce0dadf570537" PV = "${LINUX_VERSION}+git" diff --git a/meta/recipes-kernel/linux/linux-yocto_6.12.bb b/meta/recipes-kernel/linux/linux-yocto_6.12.bb index e48084fcd3..3e91d22469 100644 --- a/meta/recipes-kernel/linux/linux-yocto_6.12.bb +++ b/meta/recipes-kernel/linux/linux-yocto_6.12.bb @@ -18,25 +18,25 @@ KBRANCH:qemux86.104 ?= "v6.12/standard/base" KBRANCH:qemuloongarch64 ?= "v6.12/standard/base" KBRANCH:qemumips64 ?= "v6.12/standard/mti-malta64" -SRCREV_machine:qemuarm ?= "54a370021957bfa24b4580a75518248174890205" -SRCREV_machine:qemuarm64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" -SRCREV_machine:qemuloongarch64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" -SRCREV_machine:qemumips ?= "0b864eeca749237236d8ec10e7ed373958f497c4" -SRCREV_machine:qemuppc ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" -SRCREV_machine:qemuriscv64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" -SRCREV_machine:qemuriscv32 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" -SRCREV_machine:qemux86 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" -SRCREV_machine:qemux86-64 ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" -SRCREV_machine:qemumips64 ?= "20f68d6b803a62b9bd958a453a669cd9ac75d22a" -SRCREV_machine ?= "bd0143fa06a31c277c6fba5d06f84e1165e734e5" -SRCREV_meta ?= "b507ba98ba3ecc385b14a231dddafaea3421f778" +SRCREV_machine:qemuarm ?= "429bd391e936b7a9d8164b1446d9c2e591680af4" +SRCREV_machine:qemuarm64 ?= "f35602ea0c4f5b913a843251bc60949f65fda47c" +SRCREV_machine:qemuloongarch64 ?= "f35602ea0c4f5b913a843251bc60949f65fda47c" +SRCREV_machine:qemumips ?= "4c9c4e63b8b075890e9837591cb3b5aa87599938" +SRCREV_machine:qemuppc ?= "f35602ea0c4f5b913a843251bc60949f65fda47c" +SRCREV_machine:qemuriscv64 ?= "f35602ea0c4f5b913a843251bc60949f65fda47c" +SRCREV_machine:qemuriscv32 ?= "f35602ea0c4f5b913a843251bc60949f65fda47c" +SRCREV_machine:qemux86 ?= "f35602ea0c4f5b913a843251bc60949f65fda47c" +SRCREV_machine:qemux86-64 ?= "f35602ea0c4f5b913a843251bc60949f65fda47c" +SRCREV_machine:qemumips64 ?= "aab15ddcde0fa7d8e367a6488ff5206fc12679ee" +SRCREV_machine ?= "f35602ea0c4f5b913a843251bc60949f65fda47c" +SRCREV_meta ?= "1a28be589c9aa79335563af67fbce0dadf570537" # set your preferred provider of linux-yocto to 'linux-yocto-upstream', and you'll # get the <version>/base branch, which is pure upstream -stable, and the same # meta SRCREV as the linux-yocto-standard builds. Select your version using the # normal PREFERRED_VERSION settings. BBCLASSEXTEND = "devupstream:target" -SRCREV_machine:class-devupstream ?= "e7a3953084a7050ca349010deb22546834c2e196" +SRCREV_machine:class-devupstream ?= "eefc95626b5cb02ea6268d1ae58237768004a60d" PN:class-devupstream = "linux-yocto-upstream" KBRANCH:class-devupstream = "v6.12/base" @@ -44,7 +44,7 @@ SRC_URI = "git://git.yoctoproject.org/linux-yocto.git;name=machine;branch=${KBRA git://git.yoctoproject.org/yocto-kernel-cache;type=kmeta;name=meta;branch=yocto-6.12;destsuffix=${KMETA};protocol=https" LIC_FILES_CHKSUM = "file://COPYING;md5=6bc538ed5bd9a7fc9398086aedcd7e46" -LINUX_VERSION ?= "6.12.81" +LINUX_VERSION ?= "6.12.83" PV = "${LINUX_VERSION}+git" -- 2.43.0 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* [openembedded-core][whinlatter][PATCH 18/18] linux-yocto/6.12: update CVE exclusions (6.12.83) 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield ` (16 preceding siblings ...) 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 17/18] linux-yocto/6.12: update to v6.12.83 bruce.ashfield @ 2026-04-23 15:45 ` bruce.ashfield 2026-04-24 15:00 ` [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 Yoann Congal 18 siblings, 0 replies; 20+ messages in thread From: bruce.ashfield @ 2026-04-23 15:45 UTC (permalink / raw) To: yoann.congal; +Cc: openembedded-core From: Bruce Ashfield <bruce.ashfield@gmail.com> Data pulled from: https://github.com/CVEProject/cvelistV5 1/1 [ Author: cvelistV5 Github Action Email: github_action@example.com Subject: 9101 changes (4 new | 9097 updated): - 4 new CVEs: CVE-2025-70994, CVE-2026-35225, CVE-2026-41460, CVE-2026-41461 - 9097 updated CVEs: CVE-2018-25259, CVE-2018-25267, CVE-2022-41650, CVE-2022-43472, CVE-2022-44578, CVE-2022-45806, CVE-2022-45819, CVE-2022-45832, CVE-2022-45840, CVE-2022-45841, CVE-2022-46795, CVE-2022-46796, CVE-2022-46807, CVE-2022-46811, CVE-2022-46838, CVE-2022-46840, CVE-2022-46846, CVE-2022-47168, CVE-2022-47176, CVE-2022-47182, CVE-2022-47429, CVE-2022-47594, CVE-2022-47601, CVE-2023-22697, CVE-2023-22701, CVE-2023-22708, CVE-2023-23715, CVE-2023-23716, CVE-2023-23725, CVE-2023-23726, CVE-2023-23729, CVE-2023-23814, CVE-2023-23823, CVE-2023-23825, CVE-2023-23834, CVE-2023-23868, CVE-2023-23886, CVE-2023-23887, CVE-2023-23893, CVE-2023-23895, CVE-2023-23975, CVE-2023-23986, CVE-2023-23987, CVE-2023-23989, CVE-2023-24375, CVE-2023-24407, CVE-2023-25026, CVE-2023-25035, CVE-2023-25037, CVE-2023-25048, CVE-2023-25060, CVE-2023-25067, CVE-2023-25068, CVE-2023-25445, CVE-2023-25446, CVE-2023-25454, CVE-2023-25455, CVE-2023-25469, CVE-2023-25486, CVE-2023-25703, CVE-2023-25714, CVE-2023-25791, CVE-2023-25959, CVE-2023-25966, CVE-2023-25988, CVE-2023-25993, CVE-2023-25995, CVE-2023-25997, CVE-2023-25998, CVE-2023-25999, CVE-2023-26000, CVE-2023-26001, CVE-2023-26002, CVE-2023-26003, CVE-2023-26005, CVE-2023-26520, CVE-2023-26522, CVE-2023-27428, CVE-2023-27449, CVE-2023-27454, CVE-2023-27456, CVE-2023-27609, CVE-2023-27625, CVE-2023-27626, CVE-2023-28165, CVE-2023-28168, CVE-2023-28416, CVE-2023-28417, CVE-2023-28532, CVE-2023-28534, CVE-2023-28536, CVE-2023-28619, CVE-2023-28689, CVE-2023-28990, CVE-2023-29173, CVE-2023-29235, CVE-2023-29237, CVE-2023-29239, CVE-2023-29422, CVE-2023-29429, CVE-2023-29431, CVE-2023-29433, CVE-2023-30476, CVE-2023-30479, CVE-2023-30486, CVE-2023-30488, CVE-2023-30490, CVE-2023-30783, CVE-2023-30870, CVE-2023-30873, CVE-2023-30874, CVE-2023-31073, CVE-2023-31078, CVE-2023-31214, CVE-2023-32094, CVE-2023-32117, CVE-2023-32126, CVE-2023-32240, CVE-2023-32293, CVE-2023-32299, CVE-2023-32506, CVE-2023-32507, CVE-2023-32519, CVE-2023-32520, CVE-2023-32574, CVE-2023-32581, CVE-2023-32585, CVE-2023-32586, CVE-2023-32593, CVE-2023-32599, CVE-2023-32601, CVE-2023-32798, CVE-2023-32963, CVE-2023-33215, CVE-2023-33324, CVE-2023-33928, CVE-2023-33994, CVE-2023-33995, CVE-2023-33996, CVE-2023-33998, CVE-2023-34009, CVE-2023-34014, CVE-2023-34019, CVE-2023-34376, CVE-2023-34381, CVE-2023-34387, CVE-2023-35037, CVE-2023-35040, CVE-2023-35046, CVE-2023-35051, CVE-2023-35052, CVE-2023-35091, CVE-2023-35777, CVE-2023-35875, CVE-2023-36385, CVE-2023-36506, CVE-2023-36509, CVE-2023-36510, CVE-2023-36518, CVE-2023-36519, CVE-2023-36526, CVE-2023-36528, CVE-2023-36531, CVE-2023-36680, CVE-2023-36681, CVE-2023-37885, CVE-2023-37886, CVE-2023-37887, CVE-2023-37967, CVE-2023-37969, CVE-2023-37971, CVE-2023-37984, CVE-2023-37987, CVE-2023-37989, CVE-2023-38383, CVE-2023-38385, CVE-2023-38475, CVE-2023-38477, CVE-2023-38479, CVE-2023-38480, CVE-2023-38483, CVE-2023-38512, CVE-2023-38514, CVE-2023-39305, CVE-2023-39920, CVE-2023-39994, CVE-2023-39995, CVE-2023-39996, CVE-2023-39997, CVE-2023-40001, CVE-2023-40003, CVE-2023-40005, CVE-2023-40011, CVE-2023-40203, CVE-2023-40205, CVE-2023-40209, CVE-2023-40213, CVE-2023-40331, CVE-2023-40334, CVE-2023-40670, CVE-2023-40678, CVE-2023-41130, CVE-2023-41132, CVE-2023-41133, CVE-2023-41649, CVE-2023-41664, CVE-2023-41671, CVE-2023-41683, CVE-2023-41686, CVE-2023-41688, CVE-2023-41689, CVE-2023-41690, CVE-2023-41695, CVE-2023-41729, CVE-2023-41730, CVE-2023-41802, CVE-2023-41803, CVE-2023-41848, CVE-2023-41849, CVE-2023-41857, CVE-2023-41862, CVE-2023-41865, CVE-2023-41866, CVE-2023-41869, CVE-2023-41870, CVE-2023-41873, CVE-2023-41875, CVE-2023-41951, CVE-2023-41952, CVE-2023-44142, CVE-2023-44147, CVE-2023-44149, CVE-2023-44258, CVE-2023-44988, CVE-2023-45002, CVE-2023-45045, CVE-2023-45061, CVE-2023-45101, CVE-2023-45104, CVE-2023-45110, CVE-2023-45271, CVE-2023-45272, CVE-2023-45275, CVE-2023-45631, CVE-2023-45633, CVE-2023-45636, CVE-2023-45649, CVE-2023-45760, CVE-2023-45765, CVE-2023-45766, CVE-2023-45828, CVE-2023-46073, CVE-2023-46079, CVE-2023-46080, CVE-2023-46082, CVE-2023-46083, CVE-2023-46188, CVE-2023-46195, CVE-2023-46196, CVE-2023-46203, CVE-2023-46206, CVE-2023-46309, CVE-2023-46605, CVE-2023-46606, CVE-2023-46607, CVE-2023-46608, CVE-2023-46609, CVE-2023-46610, CVE-2023-46611, CVE-2023-46612, CVE-2023-46616, CVE-2023-46628, CVE-2023-46631, CVE-2023-46632, CVE-2023-46633, CVE-2023-46635, CVE-2023-46637, CVE-2023-46639, CVE-2023-46644, CVE-2023-47179, CVE-2023-47180, CVE-2023-47183, CVE-2023-47187, CVE-2023-47188, CVE-2023-47224, CVE-2023-47225, CVE-2023-47241, CVE-2023-47515, CVE-2023-47517, CVE-2023-47523, CVE-2023-47525, CVE-2023-47557, CVE-2023-47647, CVE-2023-47648, CVE-2023-47661, CVE-2023-47689, CVE-2023-47692, CVE-2023-47693, CVE-2023-47694, CVE-2023-47698, CVE-2023-47756, CVE-2023-47759, CVE-2023-47760, CVE-2023-47761, CVE-2023-47762, CVE-2023-47763, CVE-2023-47764, CVE-2023-47776, CVE-2023-47778, CVE-2023-47780, CVE-2023-47793, CVE-2023-47805, CVE-2023-47807, CVE-2023-47820, CVE-2023-47823, CVE-2023-47826, CVE-2023-47830, CVE-2023-47832, CVE-2023-47836, CVE-2023-47838, CVE-2023-47841, CVE-2023-47847, CVE-2023-47849, CVE-2023-47869, CVE-2023-47871, CVE-2023-48274, CVE-2023-48277, CVE-2023-48286, CVE-2023-48287, CVE-2023-48324, CVE-2023-48332, CVE-2023-48739, CVE-2023-48740, CVE-2023-48750, CVE-2023-48758, CVE-2023-48774, CVE-2023-48775, CVE-2023-48776, CVE-2023-48779, CVE-2023-49154, CVE-2023-49156, CVE-2023-49158, CVE-2023-49167, CVE-2023-49192, CVE-2023-49193, CVE-2023-49194, CVE-2023-49196, CVE-2023-49754, CVE-2023-49755, CVE-2023-49756, CVE-2023-49757, CVE-2023-49758, CVE-2023-49817, CVE-2023-49818, CVE-2023-49831, CVE-2023-49832, CVE-2023-49835, CVE-2023-49845, CVE-2023-49848, CVE-2023-49849, CVE-2023-49850, CVE-2023-49851, CVE-2023-49856, CVE-2023-49857, CVE-2023-49858, CVE-2023-49859, CVE-2023-49861, CVE-2023-50373, CVE-2023-50375, CVE-2023-50850, CVE-2023-50854, CVE-2023-50876, CVE-2023-50877, CVE-2023-50882, CVE-2023-50884, CVE-2023-50887, CVE-2023-50899, CVE-2023-50903, CVE-2023-50904, CVE-2023-50905, CVE-2023-51353, CVE-2023-51355, CVE-2023-51357, CVE-2023-51359, CVE-2023-51360, CVE-2023-51362, CVE-2023-51484, CVE-2023-51486, CVE-2023-52135, CVE-2023-52190, CVE-2024-10676, CVE-2024-11402, CVE-2024-1435, CVE-2024-22145, CVE-2024-22162, CVE-2024-22289, CVE-2024-22307, CVE-2024-23500, CVE-2024-23506, CVE-2024-23507, CVE-2024-24831, CVE-2024-24833, CVE-2024-24871, CVE-2024-24878, CVE-2024-25100, CVE-2024-25599, CVE-2024-25932, CVE-2024-27188, CVE-2024-27193, CVE-2024-27195, CVE-2024-27949, CVE-2024-27950, CVE-2024-27965, CVE-2024-27971, CVE-2024-27987, CVE-2024-27993, CVE-2024-27994, CVE-2024-27997, CVE-2024-27998, CVE-2024-28000, CVE-2024-29093, CVE-2024-29095, CVE-2024-29125, CVE-2024-29134, CVE-2024-29136, CVE-2024-29137, CVE-2024-29138, CVE-2024-29777, CVE-2024-29792, CVE-2024-29921, CVE-2024-29931, CVE-2024-2889, CVE-2024-30178, CVE-2024-30182, CVE-2024-30193, CVE-2024-30194, CVE-2024-30197, CVE-2024-30199, CVE-2024-30221, CVE-2024-30229, CVE-2024-30236, CVE-2024-30238, CVE-2024-30244, CVE-2024-30245, CVE-2024-30422, CVE-2024-30424, CVE-2024-30425, CVE-2024-30428, CVE-2024-30435, CVE-2024-30488, CVE-2024-30493, CVE-2024-30503, CVE-2024-30505, CVE-2024-30529, CVE-2024-30534, CVE-2024-31246, CVE-2024-31281, CVE-2024-31303, CVE-2024-31359, CVE-2024-31373, CVE-2024-31374, CVE-2024-31376, CVE-2024-31382, CVE-2024-31421, CVE-2024-31424, CVE-2024-31433, CVE-2024-31924, CVE-2024-31929, CVE-2024-31942, CVE-2024-32082, CVE-2024-32090, CVE-2024-32101, CVE-2024-32126, CVE-2024-32140, CVE-2024-32141, CVE-2024-32433, CVE-2024-32435, CVE-2024-32444, CVE-2024-32445, CVE-2024-32505, CVE-2024-32507, CVE-2024-32523, CVE-2024-32553, CVE-2024-32555, CVE-2024-32564, CVE-2024-32566, CVE-2024-32568, CVE-2024-32573, CVE-2024-32589, CVE-2024-32599, CVE-2024-32679, CVE-2024-32698, CVE-2024-32699, CVE-2024-32701, CVE-2024-32702, CVE-2024-32703, CVE-2024-32704, CVE-2024-32705, CVE-2024-32706, CVE-2024-32711, CVE-2024-32719, CVE-2024-32725, CVE-2024-32778, CVE-2024-32782, CVE-2024-32791, CVE-2024-32792, CVE-2024-32796, CVE-2024-32810, CVE-2024-32815, CVE-2024-32817, CVE-2024-32824, CVE-2024-32825, CVE-2024-32832, CVE-2024-32836, CVE-2024-32956, CVE-2024-32959, CVE-2024-32961, CVE-2024-33568, CVE-2024-33570, CVE-2024-33571, CVE-2024-33572, CVE-2024-33648, CVE-2024-33678, CVE-2024-33689, CVE-2024-33907, CVE-2024-33939, CVE-2024-34371, CVE-2024-34373, CVE-2024-34385, CVE-2024-34438, CVE-2024-34443, CVE-2024-34444, CVE-2024-34546, CVE-2024-34556, CVE-2024-34557, CVE-2024-34569, CVE-2024-34757, CVE-2024-34763, CVE-2024-34770, CVE-2024-34794, CVE-2024-34795, CVE-2024-34800, CVE-2024-34801, CVE-2024-34807, CVE-2024-34812, CVE-2024-34813, CVE-2024-34814, CVE-2024-34815, CVE-2024-34819, CVE-2024-34821, CVE-2024-34826, CVE-2024-34828, CVE-2024-35169, CVE-2024-35172, CVE-2024-35633, CVE-2024-35637, CVE-2024-35639, CVE-2024-35645, CVE-2024-35646, CVE-2024-35650, CVE-2024-35653, CVE-2024-35655, CVE-2024-35659, CVE-2024-35664, CVE-2024-35674, CVE-2024-35679, CVE-2024-35680, CVE-2024-35684, CVE-2024-35693, CVE-2024-35694, CVE-2024-35698, CVE-2024-35700, CVE-2024-35709, CVE-2024-35723, CVE-2024-35729, CVE-2024-35732, CVE-2024-35739, CVE-2024-35759, CVE-2024-35760, CVE-2024-35764, CVE-2024-35768, CVE-2024-35769, CVE-2024-37093, CVE-2024-37102, CVE-2024-37103, CVE-2024-37104, CVE-2024-37114, CVE-2024-37202, CVE-2024-37213, CVE-2024-37228, CVE-2024-37235, CVE-2024-37236, CVE-2024-37237, CVE-2024-37238, CVE-2024-37239, CVE-2024-37240, CVE-2024-37241, CVE-2024-37242, CVE-2024-37243, CVE-2024-37255, CVE-2024-37259, CVE-2024-37261, CVE-2024-37270, CVE-2024-37271, CVE-2024-37272, CVE-2024-37274, CVE-2024-37275, CVE-2024-37409, CVE-2024-37410, CVE-2024-37411, CVE-2024-37412, CVE-2024-37413, CVE-2024-37415, CVE-2024-37417, CVE-2024-37421, CVE-2024-37422, CVE-2024-37426, CVE-2024-37429, CVE-2024-37430, CVE-2024-37431, CVE-2024-37433, CVE-2024-37434, CVE-2024-37435, CVE-2024-37437, CVE-2024-37438, CVE-2024-37440, CVE-2024-37441, CVE-2024-37444, CVE-2024-37448, CVE-2024-37449, CVE-2024-37450, CVE-2024-37451, CVE-2024-37452, CVE-2024-37458, CVE-2024-37467, CVE-2024-37472, CVE-2024-37473, CVE-2024-37478, CVE-2024-37481, CVE-2024-37482, CVE-2024-37483, CVE-2024-37488, CVE-2024-37490, CVE-2024-37491, CVE-2024-37493, CVE-2024-37495, CVE-2024-37497, CVE-2024-37502, CVE-2024-37503, CVE-2024-37508, CVE-2024-37511, CVE-2024-37518, CVE-2024-37519, CVE-2024-37520, CVE-2024-37540, CVE-2024-37541, CVE-2024-37543, CVE-2024-37544, CVE-2024-37554, CVE-2024-37555, CVE-2024-37560, CVE-2024-37918, CVE-2024-37922, CVE-2024-37923, CVE-2024-37925, CVE-2024-37929, CVE-2024-37930, CVE-2024-37931, CVE-2024-37937, CVE-2024-37943, CVE-2024-37945, CVE-2024-37946, CVE-2024-37962, CVE-2024-38687, CVE-2024-38691, CVE-2024-38706, CVE-2024-38708, CVE-2024-38712, CVE-2024-38714, CVE-2024-38729, CVE-2024-38731, CVE-2024-38732, CVE-2024-38735, CVE-2024-38751, CVE-2024-38753, CVE-2024-38754, CVE-2024-38762, CVE-2024-38763, CVE-2024-38764, CVE-2024-38765, CVE-2024-38766, CVE-2024-38771, CVE-2024-38778, CVE-2024-38787, CVE-2024-38789, CVE-2024-38790, CVE-2024-38795, CVE-2024-39619, CVE-2024-39620, CVE-2024-39621, CVE-2024-39622, CVE-2024-39623, CVE-2024-39624, CVE-2024-39626, CVE-2024-39631, CVE-2024-39637, CVE-2024-39646, CVE-2024-39647, CVE-2024-39649, CVE-2024-39654, CVE-2024-39663, CVE-2024-43117, CVE-2024-43118, CVE-2024-43136, CVE-2024-43153, CVE-2024-43158, CVE-2024-43159, CVE-2024-43208, CVE-2024-43214, CVE-2024-43216, CVE-2024-43218, CVE-2024-43222, CVE-2024-43228, CVE-2024-43229, CVE-2024-43230, CVE-2024-43237, CVE-2024-43238, CVE-2024-43239, CVE-2024-43240, CVE-2024-43241, CVE-2024-43243, CVE-2024-43252, CVE-2024-43253, CVE-2024-43254, CVE-2024-43255, CVE-2024-43259, CVE-2024-43264, CVE-2024-43266, CVE-2024-43283, CVE-2024-43290, CVE-2024-43299, CVE-2024-43300, CVE-2024-43306, CVE-2024-43313, CVE-2024-43318, CVE-2024-43333, CVE-2024-43334, CVE-2024-43336, CVE-2024-43338, CVE-2024-43349, CVE-2024-43353, CVE-2024-43927, CVE-2024-43932, CVE-2024-43933, CVE-2024-43938, CVE-2024-43944, CVE-2024-43953, CVE-2024-43954, CVE-2024-43955, CVE-2024-43956, CVE-2024-43959, CVE-2024-43971, CVE-2024-43973, CVE-2024-43975, CVE-2024-43976, CVE-2024-43977, CVE-2024-43978, CVE-2024-43989, CVE-2024-44000, CVE-2024-44001, CVE-2024-44002, CVE-2024-44003, CVE-2024-44004, CVE-2024-44005, CVE-2024-44006, CVE-2024-44007, CVE-2024-44008, CVE-2024-44009, CVE-2024-44010, CVE-2024-44011, CVE-2024-44012, CVE-2024-44013, CVE-2024-44014, CVE-2024-44015, CVE-2024-44016, CVE-2024-44017, CVE-2024-44018, CVE-2024-44019, CVE-2024-44020, CVE-2024-44021, CVE-2024-44022, CVE-2024-44023, CVE-2024-44024, CVE-2024-44025, CVE-2024-44026, CVE-2024-44027, CVE-2024-44028, CVE-2024-44029, CVE-2024-44030, CVE-2024-44031, CVE-2024-44032, CVE-2024-44033, CVE-2024-44034, CVE-2024-44035, CVE-2024-44036, CVE-2024-44037, CVE-2024-44038, CVE-2024-44039, CVE-2024-44040, CVE-2024-44041, CVE-2024-44042, CVE-2024-44043, CVE-2024-44044, CVE-2024-44045, CVE-2024-44046, CVE-2024-44047, CVE-2024-44048, CVE-2024-44049, CVE-2024-44050, CVE-2024-44051, CVE-2024-44052, CVE-2024-44055, CVE-2024-44059, CVE-2024-44061, CVE-2024-44064, CVE-2024-45451, CVE-2024-45452, CVE-2024-45453, CVE-2024-45454, CVE-2024-45455, CVE-2024-45456, CVE-2024-45457, CVE-2024-45458, CVE-2024-45459, CVE-2024-45460, CVE-2024-47297, CVE-2024-47298, CVE-2024-47299, CVE-2024-47300, CVE-2024-47301, CVE-2024-47302, CVE-2024-47303, CVE-2024-47304, CVE-2024-47305, CVE-2024-47306, CVE-2024-47307, CVE-2024-47308, CVE-2024-47309, CVE-2024-47310, CVE-2024-47311, CVE-2024-47312, CVE-2024-47313, CVE-2024-47314, CVE-2024-47315, CVE-2024-47316, CVE-2024-47317, CVE-2024-47318, CVE-2024-47319, CVE-2024-47320, CVE-2024-47321, CVE-2024-47322, CVE-2024-47323, CVE-2024-47324, CVE-2024-47325, CVE-2024-47326, CVE-2024-47327, CVE-2024-47328, CVE-2024-47329, CVE-2024-47331, CVE-2024-47332, CVE-2024-47333, CVE-2024-47334, CVE-2024-47335, CVE-2024-47336, CVE-2024-47337, CVE-2024-47338, CVE-2024-47339, CVE-2024-47340, CVE-2024-47341, CVE-2024-47342, CVE-2024-47343, CVE-2024-47344, CVE-2024-47345, CVE-2024-47346, CVE-2024-47347, CVE-2024-47348, CVE-2024-47349, CVE-2024-47350, CVE-2024-47351, CVE-2024-47352, CVE-2024-47353, CVE-2024-47354, CVE-2024-47355, CVE-2024-47356, CVE-2024-47357, CVE-2024-47358, CVE-2024-47359, CVE-2024-47360, CVE-2024-47361, CVE-2024-47362, CVE-2024-47363, CVE-2024-47364, CVE-2024-47365, CVE-2024-47366, CVE-2024-47367, CVE-2024-47368, CVE-2024-47369, CVE-2024-47370, CVE-2024-47371, CVE-2024-47372, CVE-2024-47373, CVE-2024-47374, CVE-2024-47375, CVE-2024-47376, CVE-2024-47377, CVE-2024-47378, CVE-2024-47379, CVE-2024-47380, CVE-2024-47381, CVE-2024-47382, CVE-2024-47383, CVE-2024-47384, CVE-2024-47385, CVE-2024-47386, CVE-2024-47387, CVE-2024-47388, CVE-2024-47389, CVE-2024-47390, CVE-2024-47391, CVE-2024-47392, CVE-2024-47393, CVE-2024-47394, CVE-2024-47395, CVE-2024-47396, CVE-2024-47621, CVE-2024-47622, CVE-2024-47623, CVE-2024-47624, CVE-2024-47625, CVE-2024-47626, CVE-2024-47627, CVE-2024-47628, CVE-2024-47629, CVE-2024-47630, CVE-2024-47631, CVE-2024-47632, CVE-2024-47633, CVE-2024-47634, CVE-2024-47635, CVE-2024-47636, CVE-2024-47637, CVE-2024-47638, CVE-2024-47639, CVE-2024-47640, CVE-2024-47641, CVE-2024-47642, CVE-2024-47643, CVE-2024-47644, CVE-2024-47645, CVE-2024-47646, CVE-2024-47647, CVE-2024-47648, CVE-2024-47649, CVE-2024-47650, CVE-2024-48020, CVE-2024-48021, CVE-2024-48022, CVE-2024-48023, CVE-2024-48024, CVE-2024-48025, CVE-2024-48026, CVE-2024-48027, CVE-2024-48028, CVE-2024-48029, CVE-2024-48030, CVE-2024-48031, CVE-2024-48032, CVE-2024-48033, CVE-2024-48034, CVE-2024-48035, CVE-2024-48036, CVE-2024-48037, CVE-2024-48038, CVE-2024-48039, CVE-2024-48040, CVE-2024-48041, CVE-2024-48042, CVE-2024-48043, CVE-2024-48044, CVE-2024-48045, CVE-2024-48046, CVE-2024-48047, CVE-2024-48048, CVE-2024-48049, CVE-2024-49222, CVE-2024-49225, CVE-2024-49228, CVE-2024-49229, CVE-2024-49231, CVE-2024-49232, CVE-2024-49233, CVE-2024-49234, CVE-2024-49236, CVE-2024-49237, CVE-2024-49241, CVE-2024-49243, CVE-2024-49249, CVE-2024-49250, CVE-2024-49251, CVE-2024-49252, CVE-2024-49254, CVE-2024-49255, CVE-2024-49256, CVE-2024-49257, CVE-2024-49258, CVE-2024-49259, CVE-2024-49260, CVE-2024-49261, CVE-2024-49262, CVE-2024-49263, CVE-2024-49264, CVE-2024-49265, CVE-2024-49266, CVE-2024-49267, CVE-2024-49268, CVE-2024-49270, CVE-2024-49271, CVE-2024-49272, CVE-2024-49273, CVE-2024-49274, CVE-2024-49275, CVE-2024-49276, CVE-2024-49277, CVE-2024-49278, CVE-2024-49279, CVE-2024-49280, CVE-2024-49281, CVE-2024-49282, CVE-2024-49283, CVE-2024-49284, CVE-2024-49285, CVE-2024-49286, CVE-2024-49287, CVE-2024-49288, CVE-2024-49289, CVE-2024-49290, CVE-2024-49291, CVE-2024-49292, CVE-2024-49293, CVE-2024-49294, CVE-2024-49295, CVE-2024-49296, CVE-2024-49297, CVE-2024-49298, CVE-2024-49299, CVE-2024-49300, CVE-2024-49301, CVE-2024-49302, CVE-2024-49303, CVE-2024-49304, CVE-2024-49305, CVE-2024-49306, CVE-2024-49307, CVE-2024-49308, CVE-2024-49309, CVE-2024-49310, CVE-2024-49311, CVE-2024-49312, CVE-2024-49313, CVE-2024-49316, CVE-2024-49318, CVE-2024-49319, CVE-2024-49320, CVE-2024-49323, CVE-2024-49324, CVE-2024-49325, CVE-2024-49326, CVE-2024-49327, CVE-2024-49328, CVE-2024-49329, CVE-2024-49330, CVE-2024-49331, CVE-2024-49332, CVE-2024-49333, CVE-2024-49334, CVE-2024-49335, CVE-2024-49604, CVE-2024-49605, CVE-2024-49606, CVE-2024-49607, CVE-2024-49608, CVE-2024-49609, CVE-2024-49610, CVE-2024-49611, CVE-2024-49612, CVE-2024-49613, CVE-2024-49614, CVE-2024-49615, CVE-2024-49616, CVE-2024-49617, CVE-2024-49618, CVE-2024-49619, CVE-2024-49620, CVE-2024-49621, CVE-2024-49622, CVE-2024-49623, CVE-2024-49624, CVE-2024-49627, CVE-2024-49628, CVE-2024-49629, CVE-2024-49630, CVE-2024-49631, CVE-2024-49632, CVE-2024-49633, CVE-2024-49634, CVE-2024-49635, CVE-2024-49636, CVE-2024-49637, CVE-2024-49638, CVE-2024-49639, CVE-2024-49640, CVE-2024-49641, CVE-2024-49642, CVE-2024-49643, CVE-2024-49644, CVE-2024-49645, CVE-2024-49646, CVE-2024-49647, CVE-2024-49648, CVE-2024-49649, CVE-2024-49650, CVE-2024-49651, CVE-2024-49652, CVE-2024-49653, CVE-2024-49654, CVE-2024-49655, CVE-2024-49656, CVE-2024-49657, CVE-2024-49658, CVE-2024-49659, CVE-2024-49660, CVE-2024-49661, CVE-2024-49662, CVE-2024-49663, CVE-2024-49664, CVE-2024-49665, CVE-2024-49666, CVE-2024-49667, CVE-2024-49668, CVE-2024-49669, CVE-2024-49670, CVE-2024-49671, CVE-2024-49672, CVE-2024-49673, CVE-2024-49674, CVE-2024-49675, CVE-2024-49676, CVE-2024-49677, CVE-2024-49678, CVE-2024-49679, CVE-2024-49680, CVE-2024-49681, CVE-2024-49682, CVE-2024-49683, CVE-2024-49684, CVE-2024-49685, CVE-2024-49686, CVE-2024-49687, CVE-2024-49688, CVE-2024-49689, CVE-2024-49690, CVE-2024-49691, CVE-2024-49692, CVE-2024-49693, CVE-2024-49694, CVE-2024-49695, CVE-2024-49696, CVE-2024-49697, CVE-2024-49698, CVE-2024-49699, CVE-2024-49700, CVE-2024-49701, CVE-2024-49702, CVE-2024-49703, CVE-2024-4689, CVE-2024-4746, CVE-2024-50407, CVE-2024-50408, CVE-2024-50409, CVE-2024-50410, CVE-2024-50411, CVE-2024-50412, CVE-2024-50413, CVE-2024-50414, CVE-2024-50415, CVE-2024-50416, CVE-2024-50417, CVE-2024-50418, CVE-2024-50419, CVE-2024-50420, CVE-2024-50421, CVE-2024-50422, CVE-2024-50423, CVE-2024-50424, CVE-2024-50425, CVE-2024-50426, CVE-2024-50427, CVE-2024-50428, CVE-2024-50429, CVE-2024-50430, CVE-2024-50431, CVE-2024-50432, CVE-2024-50433, CVE-2024-50434, CVE-2024-50435, CVE-2024-50436, CVE-2024-50437, CVE-2024-50438, CVE-2024-50439, CVE-2024-50440, CVE-2024-50441, CVE-2024-50442, CVE-2024-50445, CVE-2024-50446, CVE-2024-50447, CVE-2024-50448, CVE-2024-50449, CVE-2024-50450, CVE-2024-50451, CVE-2024-50453, CVE-2024-50454, CVE-2024-50455, CVE-2024-50456, CVE-2024-50457, CVE-2024-50458, CVE-2024-50459, CVE-2024-50460, CVE-2024-50461, CVE-2024-50462, CVE-2024-50463, CVE-2024-50464, CVE-2024-50465, CVE-2024-50467, CVE-2024-50468, CVE-2024-50469, CVE-2024-50470, CVE-2024-50471, CVE-2024-50472, CVE-2024-50473, CVE-2024-50475, CVE-2024-50476, CVE-2024-50477, CVE-2024-50478, CVE-2024-50479, CVE-2024-50480, CVE-2024-50481, CVE-2024-50482, CVE-2024-50483, CVE-2024-50484, CVE-2024-50485, CVE-2024-50486, CVE-2024-50487, CVE-2024-50488, CVE-2024-50489, CVE-2024-50490, CVE-2024-50491, CVE-2024-50492, CVE-2024-50493, CVE-2024-50494, CVE-2024-50495, CVE-2024-50496, CVE-2024-50497, CVE-2024-50498, CVE-2024-50500, CVE-2024-50501, CVE-2024-50502, CVE-2024-50503, CVE-2024-50504, CVE-2024-50506, CVE-2024-50507, CVE-2024-50508, CVE-2024-50509, CVE-2024-50510, CVE-2024-50511, CVE-2024-50512, CVE-2024-50513, CVE-2024-50514, CVE-2024-50515, CVE-2024-50516, CVE-2024-50517, CVE-2024-50518, CVE-2024-50519, CVE-2024-50520, CVE-2024-50521, CVE-2024-50522, CVE-2024-50523, CVE-2024-50524, CVE-2024-50525, CVE-2024-50526, CVE-2024-50527, CVE-2024-50528, CVE-2024-50529, CVE-2024-50530, CVE-2024-50531, CVE-2024-50532, CVE-2024-50533, CVE-2024-50534, CVE-2024-50535, CVE-2024-50536, CVE-2024-50537, CVE-2024-50538, CVE-2024-50539, CVE-2024-50540, CVE-2024-50541, CVE-2024-50542, CVE-2024-50543, CVE-2024-50544, CVE-2024-50545, CVE-2024-50546, CVE-2024-50547, CVE-2024-50548, CVE-2024-50549, CVE-2024-50550, CVE-2024-50551, CVE-2024-50552, CVE-2024-50553, CVE-2024-50554, CVE-2024-50556, CVE-2024-51570, CVE-2024-51571, CVE-2024-51572, CVE-2024-51573, CVE-2024-51574, CVE-2024-51575, CVE-2024-51576, CVE-2024-51577, CVE-2024-51578, CVE-2024-51579, CVE-2024-51580, CVE-2024-51581, CVE-2024-51582, CVE-2024-51583, CVE-2024-51584, CVE-2024-51585, CVE-2024-51586, CVE-2024-51587, CVE-2024-51588, CVE-2024-51589, CVE-2024-51590, CVE-2024-51591, CVE-2024-51592, CVE-2024-51593, CVE-2024-51594, CVE-2024-51595, CVE-2024-51596, CVE-2024-51597, CVE-2024-51598, CVE-2024-51599, CVE-2024-51601, CVE-2024-51602, CVE-2024-51603, CVE-2024-51604, CVE-2024-51605, CVE-2024-51606, CVE-2024-51607, CVE-2024-51608, CVE-2024-51609, CVE-2024-51610, CVE-2024-51611, CVE-2024-51612, CVE-2024-51613, CVE-2024-51614, CVE-2024-51615, CVE-2024-51616, CVE-2024-51617, CVE-2024-51618, CVE-2024-51619, CVE-2024-51620, CVE-2024-51621, CVE-2024-51622, CVE-2024-51623, CVE-2024-51624, CVE-2024-51625, CVE-2024-51626, CVE-2024-51627, CVE-2024-51628, CVE-2024-51629, CVE-2024-51630, CVE-2024-51631, CVE-2024-51632, CVE-2024-51633, CVE-2024-51634, CVE-2024-51635, CVE-2024-51636, CVE-2024-51637, CVE-2024-51638, CVE-2024-51639, CVE-2024-51640, CVE-2024-51641, CVE-2024-51642, CVE-2024-51643, CVE-2024-51644, CVE-2024-51645, CVE-2024-51648, CVE-2024-51649, CVE-2024-51650, CVE-2024-51651, CVE-2024-51652, CVE-2024-51653, CVE-2024-51654, CVE-2024-51655, CVE-2024-51656, CVE-2024-51657, CVE-2024-51658, CVE-2024-51659, CVE-2024-51660, CVE-2024-51661, CVE-2024-51662, CVE-2024-51663, CVE-2024-51664, CVE-2024-51665, CVE-2024-51666, CVE-2024-51667, CVE-2024-51668, CVE-2024-51669, CVE-2024-51670, CVE-2024-51671, CVE-2024-51672, CVE-2024-51673, CVE-2024-51674, CVE-2024-51675, CVE-2024-51676, CVE-2024-51677, CVE-2024-51678, CVE-2024-51679, CVE-2024-51680, CVE-2024-51681, CVE-2024-51682, CVE-2024-51683, CVE-2024-51684, CVE-2024-51685, CVE-2024-51686, CVE-2024-51687, CVE-2024-51688, CVE-2024-51689, CVE-2024-51690, CVE-2024-51691, CVE-2024-51692, CVE-2024-51693, CVE-2024-51694, CVE-2024-51695, CVE-2024-51696, CVE-2024-51697, CVE-2024-51698, CVE-2024-51699, CVE-2024-51700, CVE-2024-51701, CVE-2024-51702, CVE-2024-51703, CVE-2024-51704, CVE-2024-51705, CVE-2024-51706, CVE-2024-51707, CVE-2024-51708, CVE-2024-51709, CVE-2024-51710, CVE-2024-51711, CVE-2024-51712, CVE-2024-51713, CVE-2024-51714, CVE-2024-51715, CVE-2024-51716, CVE-2024-51717, CVE-2024-51718, CVE-2024-51719, CVE-2024-51759, CVE-2024-51760, CVE-2024-51761, CVE-2024-51762, CVE-2024-51763, CVE-2024-51776, CVE-2024-51778, CVE-2024-51779, CVE-2024-51780, CVE-2024-51781, CVE-2024-51782, CVE-2024-51783, CVE-2024-51784, CVE-2024-51785, CVE-2024-51786, CVE-2024-51787, CVE-2024-51788, CVE-2024-51789, CVE-2024-51790, CVE-2024-51791, CVE-2024-51792, CVE-2024-51793, CVE-2024-51794, CVE-2024-51795, CVE-2024-51796, CVE-2024-51797, CVE-2024-51798, CVE-2024-51799, CVE-2024-51800, CVE-2024-51801, CVE-2024-51802, CVE-2024-51803, CVE-2024-51804, CVE-2024-51805, CVE-2024-51806, CVE-2024-51807, CVE-2024-51808, CVE-2024-51809, CVE-2024-51810, CVE-2024-51811, CVE-2024-51812, CVE-2024-51813, CVE-2024-51814, CVE-2024-51815, CVE-2024-51816, CVE-2024-51817, CVE-2024-51818, CVE-2024-51819, CVE-2024-51820, CVE-2024-51821, CVE-2024-51822, CVE-2024-51823, CVE-2024-51824, CVE-2024-51825, CVE-2024-51826, CVE-2024-51827, CVE-2024-51828, CVE-2024-51829, CVE-2024-51830, CVE-2024-51831, CVE-2024-51832, CVE-2024-51833, CVE-2024-51834, CVE-2024-51835, CVE-2024-51836, CVE-2024-51837, CVE-2024-51838, CVE-2024-51839, CVE-2024-51840, CVE-2024-51841, CVE-2024-51842, CVE-2024-51843, CVE-2024-51844, CVE-2024-51845, CVE-2024-51846, CVE-2024-51847, CVE-2024-51848, CVE-2024-51849, CVE-2024-51850, CVE-2024-51851, CVE-2024-51852, CVE-2024-51853, CVE-2024-51854, CVE-2024-51855, CVE-2024-51856, CVE-2024-51857, CVE-2024-51858, CVE-2024-51859, CVE-2024-51860, CVE-2024-51861, CVE-2024-51862, CVE-2024-51863, CVE-2024-51864, CVE-2024-51865, CVE-2024-51866, CVE-2024-51867, CVE-2024-51868, CVE-2024-51869, CVE-2024-51870, CVE-2024-51871, CVE-2024-51872, CVE-2024-51873, CVE-2024-51874, CVE-2024-51875, CVE-2024-51876, CVE-2024-51877, CVE-2024-51878, CVE-2024-51879, CVE-2024-51880, CVE-2024-51881, CVE-2024-51882, CVE-2024-51883, CVE-2024-51884, CVE-2024-51885, CVE-2024-51886, CVE-2024-51887, CVE-2024-51888, CVE-2024-51889, CVE-2024-51890, CVE-2024-51891, CVE-2024-51892, CVE-2024-51893, CVE-2024-51894, CVE-2024-51895, CVE-2024-51896, CVE-2024-51897, CVE-2024-51898, CVE-2024-51899, CVE-2024-51900, CVE-2024-51901, CVE-2024-51902, CVE-2024-51903, CVE-2024-51904, CVE-2024-51905, CVE-2024-51906, CVE-2024-51907, CVE-2024-51908, CVE-2024-51909, CVE-2024-51910, CVE-2024-51911, CVE-2024-51912, CVE-2024-51913, CVE-2024-51914, CVE-2024-51916, CVE-2024-51917, CVE-2024-51918, CVE-2024-51919, CVE-2024-51920, CVE-2024-51921, CVE-2024-51922, CVE-2024-51923, CVE-2024-51924, CVE-2024-51925, CVE-2024-51926, CVE-2024-51927, CVE-2024-51928, CVE-2024-51929, CVE-2024-51930, CVE-2024-51931, CVE-2024-51932, CVE-2024-51933, CVE-2024-51934, CVE-2024-51935, CVE-2024-51936, CVE-2024-51937, CVE-2024-51938, CVE-2024-51939, CVE-2024-51940, CVE-2024-52339, CVE-2024-52340, CVE-2024-52341, CVE-2024-52342, CVE-2024-52343, CVE-2024-52344, CVE-2024-52345, CVE-2024-52346, CVE-2024-52347, CVE-2024-52348, CVE-2024-52349, CVE-2024-52350, CVE-2024-52351, CVE-2024-52352, CVE-2024-52353, CVE-2024-52354, CVE-2024-52355, CVE-2024-52356, CVE-2024-52357, CVE-2024-52358, CVE-2024-52369, CVE-2024-52370, CVE-2024-52371, CVE-2024-52372, CVE-2024-52373, CVE-2024-52374, CVE-2024-52375, CVE-2024-52376, CVE-2024-52377, CVE-2024-52378, CVE-2024-52379, CVE-2024-52380, CVE-2024-52381, CVE-2024-52382, CVE-2024-52383, CVE-2024-52384, CVE-2024-52385, CVE-2024-52386, CVE-2024-52388, CVE-2024-52389, CVE-2024-52390, CVE-2024-52391, CVE-2024-52392, CVE-2024-52393, CVE-2024-52394, CVE-2024-52395, CVE-2024-52396, CVE-2024-52397, CVE-2024-52398, CVE-2024-52399, CVE-2024-52400, CVE-2024-52401, CVE-2024-52402, CVE-2024-52403, CVE-2024-52404, CVE-2024-52405, CVE-2024-52406, CVE-2024-52407, CVE-2024-52408, CVE-2024-52409, CVE-2024-52410, CVE-2024-52411, CVE-2024-52412, CVE-2024-52413, CVE-2024-52414, CVE-2024-52415, CVE-2024-52416, CVE-2024-52417, CVE-2024-52418, CVE-2024-52419, CVE-2024-52420, CVE-2024-52421, CVE-2024-52422, CVE-2024-52423, CVE-2024-52424, CVE-2024-52425, CVE-2024-52426, CVE-2024-52427, CVE-2024-52428, CVE-2024-52429, CVE-2024-52430, CVE-2024-52431, CVE-2024-52432, CVE-2024-52433, CVE-2024-52434, CVE-2024-52435, CVE-2024-52436, CVE-2024-52437, CVE-2024-52438, CVE-2024-52439, CVE-2024-52440, CVE-2024-52441, CVE-2024-52442, CVE-2024-52443, CVE-2024-52444, CVE-2024-52445, CVE-2024-52446, CVE-2024-52447, CVE-2024-52448, CVE-2024-52449, CVE-2024-52450, CVE-2024-52451, CVE-2024-52452, CVE-2024-52453, CVE-2024-52454, CVE-2024-52455, CVE-2024-52456, CVE-2024-52457, CVE-2024-52458, CVE-2024-52459, CVE-2024-52460, CVE-2024-52461, CVE-2024-52462, CVE-2024-52463, CVE-2024-52464, CVE-2024-52465, CVE-2024-52466, CVE-2024-52467, CVE-2024-52468, CVE-2024-52469, CVE-2024-52470, CVE-2024-52471, CVE-2024-52472, CVE-2024-52473, CVE-2024-52474, CVE-2024-52475, CVE-2024-52476, CVE-2024-52477, CVE-2024-52478, CVE-2024-52479, CVE-2024-52482, CVE-2024-52483, CVE-2024-52484, CVE-2024-52485, CVE-2024-52486, CVE-2024-52487, CVE-2024-52489, CVE-2024-52490, CVE-2024-52491, CVE-2024-52492, CVE-2024-52493, CVE-2024-52494, CVE-2024-52495, CVE-2024-52496, CVE-2024-52497, CVE-2024-52498, CVE-2024-52499, CVE-2024-52500, CVE-2024-52501, CVE-2024-52502, CVE-2024-52503, CVE-2024-53707, CVE-2024-53708, CVE-2024-53709, CVE-2024-53710, CVE-2024-53711, CVE-2024-53712, CVE-2024-53713, CVE-2024-53714, CVE-2024-53715, CVE-2024-53716, CVE-2024-53717, CVE-2024-53718, CVE-2024-53719, CVE-2024-53720, CVE-2024-53721, CVE-2024-53722, CVE-2024-53723, CVE-2024-53724, CVE-2024-53725, CVE-2024-53726, CVE-2024-53727, CVE-2024-53728, CVE-2024-53729, CVE-2024-53730, CVE-2024-53731, CVE-2024-53732, CVE-2024-53733, CVE-2024-53734, CVE-2024-53735, CVE-2024-53736, CVE-2024-53737, CVE-2024-53738, CVE-2024-53739, CVE-2024-53740, CVE-2024-53741, CVE-2024-53742, CVE-2024-53743, CVE-2024-53744, CVE-2024-53745, CVE-2024-53746, CVE-2024-53747, CVE-2024-53748, CVE-2024-53749, CVE-2024-53750, CVE-2024-53751, CVE-2024-53752, CVE-2024-53753, CVE-2024-53754, CVE-2024-53755, CVE-2024-53756, CVE-2024-53757, CVE-2024-53758, CVE-2024-53759, CVE-2024-53760, CVE-2024-53761, CVE-2024-53762, CVE-2024-53763, CVE-2024-53764, CVE-2024-53765, CVE-2024-53766, CVE-2024-53767, CVE-2024-53768, CVE-2024-53769, CVE-2024-53770, CVE-2024-53771, CVE-2024-53772, CVE-2024-53773, CVE-2024-53774, CVE-2024-53775, CVE-2024-53776, CVE-2024-53777, CVE-2024-53778, CVE-2024-53779, CVE-2024-53780, CVE-2024-53781, CVE-2024-53782, CVE-2024-53783, CVE-2024-53784, CVE-2024-53785, CVE-2024-53786, CVE-2024-53787, CVE-2024-53788, CVE-2024-53789, CVE-2024-53790, CVE-2024-53791, CVE-2024-53792, CVE-2024-53793, CVE-2024-53794, CVE-2024-53795, CVE-2024-53796, CVE-2024-53797, CVE-2024-53798, CVE-2024-53799, CVE-2024-53801, CVE-2024-53802, CVE-2024-53803, CVE-2024-53805, CVE-2024-53806, CVE-2024-53807, CVE-2024-53808, CVE-2024-53809, CVE-2024-53810, CVE-2024-53811, CVE-2024-53812, CVE-2024-53813, CVE-2024-53814, CVE-2024-53815, CVE-2024-53816, CVE-2024-53817, CVE-2024-53818, CVE-2024-53819, CVE-2024-53820, CVE-2024-53821, CVE-2024-53822, CVE-2024-53823, CVE-2024-53824, CVE-2024-53825, CVE-2024-53826, CVE-2024-54205, CVE-2024-54206, CVE-2024-54207, CVE-2024-54208, CVE-2024-54209, CVE-2024-54210, CVE-2024-54211, CVE-2024-54212, CVE-2024-54213, CVE-2024-54214, CVE-2024-54215, CVE-2024-54216, CVE-2024-54217, CVE-2024-54218, CVE-2024-54219, CVE-2024-54220, CVE-2024-54221, CVE-2024-54223, CVE-2024-54224, CVE-2024-54225, CVE-2024-54226, CVE-2024-54227, CVE-2024-54228, CVE-2024-54229, CVE-2024-54230, CVE-2024-54231, CVE-2024-54232, CVE-2024-54233, CVE-2024-54234, CVE-2024-54235, CVE-2024-54236, CVE-2024-54237, CVE-2024-54238, CVE-2024-54239, CVE-2024-54240, CVE-2024-54241, CVE-2024-54242, CVE-2024-54243, CVE-2024-54244, CVE-2024-54245, CVE-2024-54246, CVE-2024-54247, CVE-2024-54248, CVE-2024-54249, CVE-2024-54250, CVE-2024-54251, CVE-2024-54252, CVE-2024-54253, CVE-2024-54254, CVE-2024-54255, CVE-2024-54256, CVE-2024-54257, CVE-2024-54258, CVE-2024-54259, CVE-2024-54260, CVE-2024-54261, CVE-2024-54262, CVE-2024-54264, CVE-2024-54265, CVE-2024-54266, CVE-2024-54267, CVE-2024-54268, CVE-2024-54269, CVE-2024-54270, CVE-2024-54271, CVE-2024-54272, CVE-2024-54273, CVE-2024-54274, CVE-2024-54275, CVE-2024-54276, CVE-2024-54277, CVE-2024-54278, CVE-2024-54280, CVE-2024-54282, CVE-2024-54283, CVE-2024-54284, CVE-2024-54285, CVE-2024-54286, CVE-2024-54287, CVE-2024-54288, CVE-2024-54289, CVE-2024-54290, CVE-2024-54291, CVE-2024-54292, CVE-2024-54293, CVE-2024-54294, CVE-2024-54295, CVE-2024-54296, CVE-2024-54297, CVE-2024-54298, CVE-2024-54299, CVE-2024-54300, CVE-2024-54301, CVE-2024-54302, CVE-2024-54303, CVE-2024-54304, CVE-2024-54305, CVE-2024-54306, CVE-2024-54307, CVE-2024-54308, CVE-2024-54309, CVE-2024-54310, CVE-2024-54311, CVE-2024-54312, CVE-2024-54313, CVE-2024-54314, CVE-2024-54315, CVE-2024-54316, CVE-2024-54317, CVE-2024-54318, CVE-2024-54319, CVE-2024-54320, CVE-2024-54321, CVE-2024-54322, CVE-2024-54323, CVE-2024-54324, CVE-2024-54325, CVE-2024-54326, CVE-2024-54327, CVE-2024-54328, CVE-2024-54329, CVE-2024-54330, CVE-2024-54331, CVE-2024-54332, CVE-2024-54333, CVE-2024-54334, CVE-2024-54335, CVE-2024-54336, CVE-2024-54337, CVE-2024-54338, CVE-2024-54339, CVE-2024-54340, CVE-2024-54341, CVE-2024-54342, CVE-2024-54343, CVE-2024-54344, CVE-2024-54345, CVE-2024-54346, CVE-2024-54347, CVE-2024-54348, CVE-2024-54349, CVE-2024-54350, CVE-2024-54351, CVE-2024-54352, CVE-2024-54353, CVE-2024-54354, CVE-2024-54355, CVE-2024-54356, CVE-2024-54357, CVE-2024-54358, CVE-2024-54359, CVE-2024-54360, CVE-2024-54361, CVE-2024-54362, CVE-2024-54363, CVE-2024-54364, CVE-2024-54365, CVE-2024-54366, CVE-2024-54367, CVE-2024-54368, CVE-2024-54369, CVE-2024-54370, CVE-2024-54372, CVE-2024-54373, CVE-2024-54374, CVE-2024-54375, CVE-2024-54376, CVE-2024-54378, CVE-2024-54379, CVE-2024-54380, CVE-2024-54381, CVE-2024-54382, CVE-2024-54383, CVE-2024-54384, CVE-2024-54385, CVE-2024-54386, CVE-2024-54387, CVE-2024-54388, CVE-2024-54389, CVE-2024-54390, CVE-2024-54391, CVE-2024-54392, CVE-2024-54393, CVE-2024-54394, CVE-2024-54395, CVE-2024-54396, CVE-2024-54397, CVE-2024-54398, CVE-2024-54399, CVE-2024-54400, CVE-2024-54401, CVE-2024-54402, CVE-2024-54403, CVE-2024-54404, CVE-2024-54405, CVE-2024-54406, CVE-2024-54407, CVE-2024-54408, CVE-2024-54409, CVE-2024-54410, CVE-2024-54411, CVE-2024-54412, CVE-2024-54413, CVE-2024-54414, CVE-2024-54415, CVE-2024-54416, CVE-2024-54417, CVE-2024-54418, CVE-2024-54419, CVE-2024-54420, CVE-2024-54421, CVE-2024-54422, CVE-2024-54423, CVE-2024-54424, CVE-2024-54425, CVE-2024-54426, CVE-2024-54427, CVE-2024-54428, CVE-2024-54429, CVE-2024-54430, CVE-2024-54431, CVE-2024-54432, CVE-2024-54433, CVE-2024-54434, CVE-2024-54435, CVE-2024-54436, CVE-2024-54437, CVE-2024-54438, CVE-2024-54439, CVE-2024-54440, CVE-2024-54441, CVE-2024-54442, CVE-2024-54443, CVE-2024-54444, CVE-2024-55972, CVE-2024-55973, CVE-2024-55974, CVE-2024-55975, CVE-2024-55976, CVE-2024-55977, CVE-2024-55978, CVE-2024-55979, CVE-2024-55980, CVE-2024-55981, CVE-2024-55982, CVE-2024-55983, CVE-2024-55984, CVE-2024-55985, CVE-2024-55986, CVE-2024-55987, CVE-2024-55988, CVE-2024-55989, CVE-2024-55990, CVE-2024-55991, CVE-2024-55992, CVE-2024-55993, CVE-2024-55994, CVE-2024-55995, CVE-2024-55996, CVE-2024-55997, CVE-2024-55998, CVE-2024-55999, CVE-2024-56001, CVE-2024-56002, CVE-2024-56003, CVE-2024-56004, CVE-2024-56005, CVE-2024-56006, CVE-2024-56007, CVE-2024-56008, CVE-2024-56009, CVE-2024-56010, CVE-2024-56011, CVE-2024-56012, CVE-2024-56013, CVE-2024-56014, CVE-2024-56015, CVE-2024-56016, CVE-2024-56017, CVE-2024-56018, CVE-2024-56019, CVE-2024-56020, CVE-2024-56021, CVE-2024-56022, CVE-2024-56023, CVE-2024-56024, CVE-2024-56025, CVE-2024-56026, CVE-2024-56027, CVE-2024-56028, CVE-2024-56029, CVE-2024-56030, CVE-2024-56031, CVE-2024-56032, CVE-2024-56033, CVE-2024-56034, CVE-2024-56035, CVE-2024-56036, CVE-2024-56037, CVE-2024-56038, CVE-2024-56039, CVE-2024-56040, CVE-2024-56041, CVE-2024-56042, CVE-2024-56043, CVE-2024-56044, CVE-2024-56045, CVE-2024-56046, CVE-2024-56047, CVE-2024-56048, CVE-2024-56049, CVE-2024-56050, CVE-2024-56051, CVE-2024-56052, CVE-2024-56053, CVE-2024-56054, CVE-2024-56055, CVE-2024-56057, CVE-2024-56058, CVE-2024-56059, CVE-2024-56060, CVE-2024-56061, CVE-2024-56062, CVE-2024-56063, CVE-2024-56064, CVE-2024-56065, CVE-2024-56066, CVE-2024-56068, CVE-2024-56069, CVE-2024-56070, CVE-2024-56071, CVE-2024-56203, CVE-2024-56204, CVE-2024-56205, CVE-2024-56206, CVE-2024-56207, CVE-2024-56209, CVE-2024-56210, CVE-2024-56211, CVE-2024-56212, CVE-2024-56213, CVE-2024-56214, CVE-2024-56215, CVE-2024-56216, CVE-2024-56217, CVE-2024-56218, CVE-2024-56219, CVE-2024-56220, CVE-2024-56221, CVE-2024-56222, CVE-2024-56223, CVE-2024-56224, CVE-2024-56225, CVE-2024-56226, CVE-2024-56227, CVE-2024-56228, CVE-2024-56229, CVE-2024-56230, CVE-2024-56231, CVE-2024-56232, CVE-2024-56233, CVE-2024-56234, CVE-2024-56235, CVE-2024-56236, CVE-2024-56237, CVE-2024-56238, CVE-2024-56239, CVE-2024-56240, CVE-2024-56241, CVE-2024-56242, CVE-2024-56243, CVE-2024-56244, CVE-2024-56245, CVE-2024-56246, CVE-2024-56247, CVE-2024-56248, CVE-2024-56249, CVE-2024-56250, CVE-2024-56251, CVE-2024-56252, CVE-2024-56253, CVE-2024-56254, CVE-2024-56255, CVE-2024-56256, CVE-2024-56257, CVE-2024-56258, CVE-2024-56259, CVE-2024-56260, CVE-2024-56261, CVE-2024-56262, CVE-2024-56263, CVE-2024-56264, CVE-2024-56265, CVE-2024-56266, CVE-2024-56267, CVE-2024-56268, CVE-2024-56270, CVE-2024-56271, CVE-2024-56272, CVE-2024-56273, CVE-2024-56274, CVE-2024-56275, CVE-2024-56276, CVE-2024-56278, CVE-2024-56279, CVE-2024-56280, CVE-2024-56281, CVE-2024-56282, CVE-2024-56283, CVE-2024-56284, CVE-2024-56285, CVE-2024-56286, CVE-2024-56287, CVE-2024-56288, CVE-2024-56289, CVE-2024-56290, CVE-2024-56291, CVE-2024-56292, CVE-2024-56293, CVE-2024-56294, CVE-2024-56295, CVE-2024-56296, CVE-2024-56297, CVE-2024-56298, CVE-2024-56299, CVE-2024-56300, CVE-2024-56301, CVE-2024-56302, CVE-2024-58344, CVE-2024-7399, CVE-2024-7590, CVE-2024-9146, CVE-2025-10019, CVE-2025-10549, CVE-2025-12549, CVE-2025-12550, CVE-2025-12551, CVE-2025-13504, CVE-2025-13763, CVE-2025-13835, CVE-2025-14314, CVE-2025-14358, CVE-2025-14359, CVE-2025-14360, CVE-2025-14429, CVE-2025-14430, CVE-2025-14431, CVE-2025-15635, CVE-2025-15636, CVE-2025-1249, CVE-2025-22260, CVE-2025-22261, CVE-2025-22262, CVE-2025-22263, CVE-2025-22264, CVE-2025-22265, CVE-2025-22267, CVE-2025-22268, CVE-2025-22269, CVE-2025-22276, CVE-2025-22277, CVE-2025-22278, CVE-2025-22279, CVE-2025-22280, CVE-2025-22281, CVE-2025-22282, CVE-2025-22283, CVE-2025-22284, CVE-2025-22286, CVE-2025-22289, CVE-2025-22290, CVE-2025-22291, CVE-2025-22292, CVE-2025-22293, CVE-2025-22294, CVE-2025-22296, CVE-2025-22297, CVE-2025-22298, CVE-2025-22299, CVE-2025-22300, CVE-2025-22301, CVE-2025-22302, CVE-2025-22303, CVE-2025-22304, CVE-2025-22305, CVE-2025-22306, CVE-2025-22307, CVE-2025-22308, CVE-2025-22309, CVE-2025-22310, CVE-2025-22311, CVE-2025-22312, CVE-2025-22313, CVE-2025-22314, CVE-2025-22315, CVE-2025-22316, CVE-2025-22317, CVE-2025-22318, CVE-2025-22319, CVE-2025-22320, CVE-2025-22321, CVE-2025-22322, CVE-2025-22323, CVE-2025-22324, CVE-2025-22325, CVE-2025-22326, CVE-2025-22327, CVE-2025-22328, CVE-2025-22329, CVE-2025-22330, CVE-2025-22331, CVE-2025-22332, CVE-2025-22333, CVE-2025-22334, CVE-2025-22335, CVE-2025-22336, CVE-2025-22337, CVE-2025-22338, CVE-2025-22339, CVE-2025-22340, CVE-2025-22341, CVE-2025-22342, CVE-2025-22343, CVE-2025-22344, CVE-2025-22345, CVE-2025-22346, CVE-2025-22347, CVE-2025-22348, CVE-2025-22349, CVE-2025-22350, CVE-2025-22351, CVE-2025-22352, CVE-2025-22354, CVE-2025-22355, CVE-2025-22356, CVE-2025-22357, CVE-2025-22358, CVE-2025-22359, CVE-2025-22360, CVE-2025-22361, CVE-2025-22362, CVE-2025-22363, CVE-2025-22364, CVE-2025-22365, CVE-2025-22496, CVE-2025-22497, CVE-2025-22498, CVE-2025-22499, CVE-2025-22500, CVE-2025-22501, CVE-2025-22502, CVE-2025-22503, CVE-2025-22504, CVE-2025-22505, CVE-2025-22506, CVE-2025-22507, CVE-2025-22508, CVE-2025-22509, CVE-2025-22510, CVE-2025-22511, CVE-2025-22512, CVE-2025-22513, CVE-2025-22514, CVE-2025-22515, CVE-2025-22516, CVE-2025-22517, CVE-2025-22518, CVE-2025-22519, CVE-2025-22520, CVE-2025-22521, CVE-2025-22522, CVE-2025-22523, CVE-2025-22524, CVE-2025-22525, CVE-2025-22526, CVE-2025-22528, CVE-2025-22529, CVE-2025-22530, CVE-2025-22532, CVE-2025-22533, CVE-2025-22534, CVE-2025-22535, CVE-2025-22536, CVE-2025-22537, CVE-2025-22538, CVE-2025-22539, CVE-2025-22540, CVE-2025-22541, CVE-2025-22542, CVE-2025-22543, CVE-2025-22544, CVE-2025-22545, CVE-2025-22546, CVE-2025-22547, CVE-2025-22548, CVE-2025-22549, CVE-2025-22550, CVE-2025-22551, CVE-2025-22552, CVE-2025-22553, CVE-2025-22554, CVE-2025-22555, CVE-2025-22556, CVE-2025-22557, CVE-2025-22558, CVE-2025-22559, CVE-2025-22560, CVE-2025-22561, CVE-2025-22562, CVE-2025-22563, CVE-2025-22564, CVE-2025-22565, CVE-2025-22566, CVE-2025-22567, CVE-2025-22568, CVE-2025-22569, CVE-2025-22570, CVE-2025-22571, CVE-2025-22572, CVE-2025-22573, CVE-2025-22574, CVE-2025-22575, CVE-2025-22576, CVE-2025-22577, CVE-2025-22578, CVE-2025-22579, CVE-2025-22580, CVE-2025-22581, CVE-2025-22582, CVE-2025-22583, CVE-2025-22584, CVE-2025-22585, CVE-2025-22586, CVE-2025-22587, CVE-2025-22588, CVE-2025-22589, CVE-2025-22590, CVE-2025-22591, CVE-2025-22592, CVE-2025-22593, CVE-2025-22594, CVE-2025-22595, CVE-2025-22628, CVE-2025-22629, CVE-2025-22630, CVE-2025-22631, CVE-2025-22632, CVE-2025-22634, CVE-2025-22635, CVE-2025-22636, CVE-2025-22637, CVE-2025-22638, CVE-2025-22639, CVE-2025-22640, CVE-2025-22641, CVE-2025-22642, CVE-2025-22643, CVE-2025-22644, CVE-2025-22646, CVE-2025-22647, CVE-2025-22648, CVE-2025-22649, CVE-2025-22651, CVE-2025-22652, CVE-2025-22653, CVE-2025-22654, CVE-2025-22655, CVE-2025-22656, CVE-2025-22657, CVE-2025-22658, CVE-2025-22659, CVE-2025-22660, CVE-2025-22661, CVE-2025-22662, CVE-2025-22663, CVE-2025-22664, CVE-2025-22665, CVE-2025-22667, CVE-2025-22668, CVE-2025-22669, CVE-2025-22670, CVE-2025-22671, CVE-2025-22672, CVE-2025-22673, CVE-2025-22674, CVE-2025-22675, CVE-2025-22676, CVE-2025-22677, CVE-2025-22678, CVE-2025-22679, CVE-2025-22680, CVE-2025-22681, CVE-2025-22682, CVE-2025-22683, CVE-2025-22684, CVE-2025-22685, CVE-2025-22686, CVE-2025-22687, CVE-2025-22688, CVE-2025-22689, CVE-2025-22690, CVE-2025-22691, CVE-2025-22692, CVE-2025-22693, CVE-2025-22694, CVE-2025-22695, CVE-2025-22696, CVE-2025-22697, CVE-2025-22699, CVE-2025-22700, CVE-2025-22701, CVE-2025-22702, CVE-2025-22703, CVE-2025-22704, CVE-2025-22705, CVE-2025-22706, CVE-2025-22707, CVE-2025-22708, CVE-2025-22709, CVE-2025-22710, CVE-2025-22712, CVE-2025-22713, CVE-2025-22714, CVE-2025-22715, CVE-2025-22716, CVE-2025-22717, CVE-2025-22718, CVE-2025-22719, CVE-2025-22720, CVE-2025-22721, CVE-2025-22722, CVE-2025-22723, CVE-2025-22725, CVE-2025-22726, CVE-2025-22727, CVE-2025-22728, CVE-2025-22729, CVE-2025-22730, CVE-2025-22731, CVE-2025-22732, CVE-2025-22733, CVE-2025-22734, CVE-2025-22735, CVE-2025-22736, CVE-2025-22737, CVE-2025-22738, CVE-2025-22739, CVE-2025-22740, CVE-2025-22742, CVE-2025-22743, CVE-2025-22744, CVE-2025-22745, CVE-2025-22746, CVE-2025-22747, CVE-2025-22748, CVE-2025-22749, CVE-2025-22750, CVE-2025-22751, CVE-2025-22752, CVE-2025-22753, CVE-2025-22755, CVE-2025-22757, CVE-2025-22758, CVE-2025-22759, CVE-2025-22760, CVE-2025-22761, CVE-2025-22762, CVE-2025-22763, CVE-2025-22764, CVE-2025-22765, CVE-2025-22766, CVE-2025-22767, CVE-2025-22768, CVE-2025-22770, CVE-2025-22771, CVE-2025-22772, CVE-2025-22774, CVE-2025-22775, CVE-2025-22776, CVE-2025-22777, CVE-2025-22778, CVE-2025-22779, CVE-2025-22780, CVE-2025-22781, CVE-2025-22782, CVE-2025-22783, CVE-2025-22784, CVE-2025-22785, CVE-2025-22786, CVE-2025-22787, CVE-2025-22788, CVE-2025-22789, CVE-2025-22790, CVE-2025-22791, CVE-2025-22792, CVE-2025-22794, CVE-2025-22795, CVE-2025-22796, CVE-2025-22797, CVE-2025-22798, CVE-2025-22799, CVE-2025-22800, CVE-2025-22801, CVE-2025-22802, CVE-2025-22803, CVE-2025-22804, CVE-2025-22805, CVE-2025-22806, CVE-2025-22807, CVE-2025-22808, CVE-2025-22809, CVE-2025-22810, CVE-2025-22811, CVE-2025-22812, CVE-2025-22813, CVE-2025-22814, CVE-2025-22815, CVE-2025-22816, CVE-2025-22817, CVE-2025-22818, CVE-2025-22819, CVE-2025-22820, CVE-2025-22821, CVE-2025-22822, CVE-2025-22823, CVE-2025-22824, CVE-2025-22825, CVE-2025-22826, CVE-2025-22827, CVE-2025-23422, CVE-2025-23423, CVE-2025-23424, CVE-2025-23425, CVE-2025-23426, CVE-2025-23427, CVE-2025-23428, CVE-2025-23430, CVE-2025-23431, CVE-2025-23433, CVE-2025-23435, CVE-2025-23436, CVE-2025-23437, CVE-2025-23438, CVE-2025-23439, CVE-2025-23440, CVE-2025-23441, CVE-2025-23442, CVE-2025-23443, CVE-2025-23445, CVE-2025-23446, CVE-2025-23447, CVE-2025-23448, CVE-2025-23449, CVE-2025-23450, CVE-2025-23451, CVE-2025-23452, CVE-2025-23453, CVE-2025-23454, CVE-2025-23455, CVE-2025-23456, CVE-2025-23457, CVE-2025-23458, CVE-2025-23459, CVE-2025-23460, CVE-2025-23461, CVE-2025-23462, CVE-2025-23463, CVE-2025-23464, CVE-2025-23465, CVE-2025-23466, CVE-2025-23467, CVE-2025-23468, CVE-2025-23469, CVE-2025-23470, CVE-2025-23471, CVE-2025-23472, CVE-2025-23473, CVE-2025-23474, CVE-2025-23475, CVE-2025-23476, CVE-2025-23477, CVE-2025-23478, CVE-2025-23479, CVE-2025-23480, CVE-2025-23481, CVE-2025-23482, CVE-2025-23483, CVE-2025-23484, CVE-2025-23485, CVE-2025-23486, CVE-2025-23487, CVE-2025-23488, CVE-2025-23489, CVE-2025-23490, CVE-2025-23491, CVE-2025-23492, CVE-2025-23493, CVE-2025-23494, CVE-2025-23495, CVE-2025-23496, CVE-2025-23497, CVE-2025-23498, CVE-2025-23499, CVE-2025-23500, CVE-2025-23501, CVE-2025-23502, CVE-2025-23503, CVE-2025-23505, CVE-2025-23506, CVE-2025-23507, CVE-2025-23508, CVE-2025-23509, CVE-2025-23510, CVE-2025-23511, CVE-2025-23512, CVE-2025-23513, CVE-2025-23514, CVE-2025-23515, CVE-2025-23516, CVE-2025-23517, CVE-2025-23518, CVE-2025-23519, CVE-2025-23520, CVE-2025-23521, CVE-2025-23522, CVE-2025-23523, CVE-2025-23524, CVE-2025-23525, CVE-2025-23526, CVE-2025-23527, CVE-2025-23529, CVE-2025-23530, CVE-2025-23531, CVE-2025-23532, CVE-2025-23533, CVE-2025-23534, CVE-2025-23535, CVE-2025-23536, CVE-2025-23537, CVE-2025-23538, CVE-2025-23539, CVE-2025-23540, CVE-2025-23541, CVE-2025-23542, CVE-2025-23543, CVE-2025-23544, CVE-2025-23545, CVE-2025-23546, CVE-2025-23547, CVE-2025-23548, CVE-2025-23549, CVE-2025-23550, CVE-2025-23551, CVE-2025-23552, CVE-2025-23553, CVE-2025-23554, CVE-2025-23555, CVE-2025-23556, CVE-2025-23557, CVE-2025-23558, CVE-2025-23559, CVE-2025-23560, CVE-2025-23561, CVE-2025-23562, CVE-2025-23563, CVE-2025-23564, CVE-2025-23565, CVE-2025-23566, CVE-2025-23567, CVE-2025-23568, CVE-2025-23569, CVE-2025-23570, CVE-2025-23571, CVE-2025-23572, CVE-2025-23573, CVE-2025-23574, CVE-2025-23575, CVE-2025-23576, CVE-2025-23577, CVE-2025-23578, CVE-2025-23579, CVE-2025-23580, CVE-2025-23581, CVE-2025-23582, CVE-2025-23583, CVE-2025-23584, CVE-2025-23585, CVE-2025-23586, CVE-2025-23587, CVE-2025-23588, CVE-2025-23589, CVE-2025-23590, CVE-2025-23591, CVE-2025-23592, CVE-2025-23593, CVE-2025-23594, CVE-2025-23595, CVE-2025-23596, CVE-2025-23597, CVE-2025-23598, CVE-2025-23599, CVE-2025-23600, CVE-2025-23601, CVE-2025-23602, CVE-2025-23603, CVE-2025-23604, CVE-2025-23605, CVE-2025-23606, CVE-2025-23607, CVE-2025-23608, CVE-2025-23609, CVE-2025-23610, CVE-2025-23611, CVE-2025-23612, CVE-2025-23613, CVE-2025-23614, CVE-2025-23615, CVE-2025-23616, CVE-2025-23617, CVE-2025-23618, CVE-2025-23619, CVE-2025-23620, CVE-2025-23621, CVE-2025-23622, CVE-2025-23623, CVE-2025-23624, CVE-2025-23625, CVE-2025-23626, CVE-2025-23627, CVE-2025-23628, CVE-2025-23629, CVE-2025-23630, CVE-2025-23631, CVE-2025-23632, CVE-2025-23633, CVE-2025-23634, CVE-2025-23635, CVE-2025-23636, CVE-2025-23637, CVE-2025-23638, CVE-2025-23639, CVE-2025-23640, CVE-2025-23641, CVE-2025-23642, CVE-2025-23643, CVE-2025-23644, CVE-2025-23645, CVE-2025-23646, CVE-2025-23647, CVE-2025-23648, CVE-2025-23649, CVE-2025-23650, CVE-2025-23651, CVE-2025-23652, CVE-2025-23653, CVE-2025-23654, CVE-2025-23655, CVE-2025-23656, CVE-2025-23657, CVE-2025-23658, CVE-2025-23659, CVE-2025-23660, CVE-2025-23661, CVE-2025-23662, CVE-2025-23663, CVE-2025-23664, CVE-2025-23665, CVE-2025-23666, CVE-2025-23667, CVE-2025-23668, CVE-2025-23669, CVE-2025-23670, CVE-2025-23671, CVE-2025-23672, CVE-2025-23673, CVE-2025-23674, CVE-2025-23675, CVE-2025-23676, CVE-2025-23677, CVE-2025-23678, CVE-2025-23679, CVE-2025-23680, CVE-2025-23681, CVE-2025-23682, CVE-2025-23683, CVE-2025-23684, CVE-2025-23685, CVE-2025-23686, CVE-2025-23687, CVE-2025-23688, CVE-2025-23689, CVE-2025-23690, CVE-2025-23691, CVE-2025-23692, CVE-2025-23693, CVE-2025-23694, CVE-2025-23695, CVE-2025-23696, CVE-2025-23697, CVE-2025-23698, CVE-2025-23699, CVE-2025-23700, CVE-2025-23701, CVE-2025-23702, CVE-2025-23703, CVE-2025-23704, CVE-2025-23705, CVE-2025-23706, CVE-2025-23707, CVE-2025-23708, CVE-2025-23709, CVE-2025-23710, CVE-2025-23711, CVE-2025-23712, CVE-2025-23713, CVE-2025-23714, CVE-2025-23715, CVE-2025-23716, CVE-2025-23717, CVE-2025-23718, CVE-2025-23719, CVE-2025-23720, CVE-2025-23721, CVE-2025-23722, CVE-2025-23723, CVE-2025-23724, CVE-2025-23725, CVE-2025-23726, CVE-2025-23727, CVE-2025-23728, CVE-2025-23729, CVE-2025-23730, CVE-2025-23731, CVE-2025-23732, CVE-2025-23733, CVE-2025-23734, CVE-2025-23735, CVE-2025-23736, CVE-2025-23737, CVE-2025-23738, CVE-2025-23739, CVE-2025-23740, CVE-2025-23741, CVE-2025-23742, CVE-2025-23743, CVE-2025-23744, CVE-2025-23745, CVE-2025-23746, CVE-2025-23747, CVE-2025-23748, CVE-2025-23749, CVE-2025-23750, CVE-2025-23751, CVE-2025-23752, CVE-2025-23753, CVE-2025-23754, CVE-2025-23755, CVE-2025-23756, CVE-2025-23757, CVE-2025-23758, CVE-2025-23759, CVE-2025-23760, CVE-2025-23761, CVE-2025-23762, CVE-2025-23763, CVE-2025-23764, CVE-2025-23765, CVE-2025-23766, CVE-2025-23767, CVE-2025-23768, CVE-2025-23769, CVE-2025-23770, CVE-2025-23771, CVE-2025-23772, CVE-2025-23773, CVE-2025-23774, CVE-2025-23775, CVE-2025-23776, CVE-2025-23777, CVE-2025-23778, CVE-2025-23779, CVE-2025-23780, CVE-2025-23781, CVE-2025-23782, CVE-2025-23783, CVE-2025-23785, CVE-2025-23786, CVE-2025-23787, CVE-2025-23788, CVE-2025-23789, CVE-2025-23790, CVE-2025-23791, CVE-2025-23792, CVE-2025-23793, CVE-2025-23794, CVE-2025-23795, CVE-2025-23796, CVE-2025-23797, CVE-2025-23798, CVE-2025-23799, CVE-2025-23800, CVE-2025-23801, CVE-2025-23802, CVE-2025-23803, CVE-2025-23804, CVE-2025-23805, CVE-2025-23807, CVE-2025-23808, CVE-2025-23809, CVE-2025-23810, CVE-2025-23811, CVE-2025-23812, CVE-2025-23813, CVE-2025-23814, CVE-2025-23815, CVE-2025-23816, CVE-2025-23817, CVE-2025-23818, CVE-2025-23819, CVE-2025-23820, CVE-2025-23821, CVE-2025-23822, CVE-2025-23823, CVE-2025-23824, CVE-2025-23825, CVE-2025-23826, CVE-2025-23827, CVE-2025-23828, CVE-2025-23829, CVE-2025-23830, CVE-2025-23831, CVE-2025-23832, CVE-2025-23833, CVE-2025-23834, CVE-2025-23835, CVE-2025-23836, CVE-2025-23837, CVE-2025-23838, CVE-2025-23839, CVE-2025-23840, CVE-2025-23841, CVE-2025-23842, CVE-2025-23843, CVE-2025-23844, CVE-2025-23845, CVE-2025-23846, CVE-2025-23847, CVE-2025-23848, CVE-2025-23849, CVE-2025-23850, CVE-2025-23851, CVE-2025-23852, CVE-2025-23853, CVE-2025-23854, CVE-2025-23855, CVE-2025-23856, CVE-2025-23857, CVE-2025-23858, CVE-2025-23859, CVE-2025-23860, CVE-2025-23861, CVE-2025-23862, CVE-2025-23863, CVE-2025-23864, CVE-2025-23865, CVE-2025-23866, CVE-2025-23867, CVE-2025-23868, CVE-2025-23869, CVE-2025-23870, CVE-2025-23871, CVE-2025-23872, CVE-2025-23873, CVE-2025-23874, CVE-2025-23875, CVE-2025-23876, CVE-2025-23877, CVE-2025-23878, CVE-2025-23879, CVE-2025-23880, CVE-2025-23881, CVE-2025-23882, CVE-2025-23883, CVE-2025-23884, CVE-2025-23885, CVE-2025-23886, CVE-2025-23887, CVE-2025-23888, CVE-2025-23889, CVE-2025-23890, CVE-2025-23891, CVE-2025-23892, CVE-2025-23893, CVE-2025-23894, CVE-2025-23895, CVE-2025-23896, CVE-2025-23897, CVE-2025-23898, CVE-2025-23899, CVE-2025-23900, CVE-2025-23901, CVE-2025-23902, CVE-2025-23903, CVE-2025-23904, CVE-2025-23905, CVE-2025-23906, CVE-2025-23907, CVE-2025-23908, CVE-2025-23909, CVE-2025-23910, CVE-2025-23911, CVE-2025-23912, CVE-2025-23913, CVE-2025-23914, CVE-2025-23915, CVE-2025-23916, CVE-2025-23917, CVE-2025-23918, CVE-2025-23919, CVE-2025-23920, CVE-2025-23921, CVE-2025-23922, CVE-2025-23923, CVE-2025-23924, CVE-2025-23925, CVE-2025-23926, CVE-2025-23927, CVE-2025-23928, CVE-2025-23929, CVE-2025-23930, CVE-2025-23931, CVE-2025-23932, CVE-2025-23933, CVE-2025-23934, CVE-2025-23935, CVE-2025-23936, CVE-2025-23937, CVE-2025-23938, CVE-2025-23939, CVE-2025-23940, CVE-2025-23941, CVE-2025-23942, CVE-2025-23943, CVE-2025-23944, CVE-2025-23945, CVE-2025-23946, CVE-2025-23947, CVE-2025-23948, CVE-2025-23949, CVE-2025-23950, CVE-2025-23951, CVE-2025-23952, CVE-2025-23953, CVE-2025-23954, CVE-2025-23955, CVE-2025-23956, CVE-2025-23957, CVE-2025-23958, CVE-2025-23959, CVE-2025-23960, CVE-2025-23961, CVE-2025-23962, CVE-2025-23963, CVE-2025-23964, CVE-2025-23965, CVE-2025-23966, CVE-2025-23967, CVE-2025-23968, CVE-2025-23969, CVE-2025-23970, CVE-2025-23971, CVE-2025-23972, CVE-2025-23973, CVE-2025-23974, CVE-2025-23975, CVE-2025-23976, CVE-2025-23977, CVE-2025-23978, CVE-2025-23979, CVE-2025-23980, CVE-2025-23981, CVE-2025-23982, CVE-2025-23983, CVE-2025-23984, CVE-2025-23985, CVE-2025-23986, CVE-2025-23987, CVE-2025-23988, CVE-2025-23989, CVE-2025-23990, CVE-2025-23991, CVE-2025-23992, CVE-2025-23993, CVE-2025-23994, CVE-2025-23995, CVE-2025-23996, CVE-2025-23997, CVE-2025-23998, CVE-2025-23999, CVE-2025-24000, CVE-2025-24001, CVE-2025-24533, CVE-2025-24534, CVE-2025-24535, CVE-2025-24536, CVE-2025-24537, CVE-2025-24538, CVE-2025-24539, CVE-2025-24540, CVE-2025-24541, CVE-2025-24542, CVE-2025-24543, CVE-2025-24544, CVE-2025-24545, CVE-2025-24546, CVE-2025-24547, CVE-2025-24548, CVE-2025-24549, CVE-2025-24550, CVE-2025-24551, CVE-2025-24552, CVE-2025-24553, CVE-2025-24554, CVE-2025-24555, CVE-2025-24557, CVE-2025-24558, CVE-2025-24559, CVE-2025-24560, CVE-2025-24561, CVE-2025-24562, CVE-2025-24563, CVE-2025-24564, CVE-2025-24565, CVE-2025-24566, CVE-2025-24567, CVE-2025-24568, CVE-2025-24569, CVE-2025-24570, CVE-2025-24571, CVE-2025-24572, CVE-2025-24573, CVE-2025-24574, CVE-2025-24575, CVE-2025-24576, CVE-2025-24577, CVE-2025-24578, CVE-2025-24579, CVE-2025-24580, CVE-2025-24581, CVE-2025-24582, CVE-2025-24583, CVE-2025-24584, CVE-2025-24585, CVE-2025-24586, CVE-2025-24587, CVE-2025-24588, CVE-2025-24589, CVE-2025-24590, CVE-2025-24591, CVE-2025-24592, CVE-2025-24593, CVE-2025-24594, CVE-2025-24595, CVE-2025-24596, CVE-2025-24597, CVE-2025-24598, CVE-2025-24599, CVE-2025-24600, CVE-2025-24601, CVE-2025-24602, CVE-2025-24603, CVE-2025-24604, CVE-2025-24605, CVE-2025-24608, CVE-2025-24609, CVE-2025-24610, CVE-2025-24611, CVE-2025-24612, CVE-2025-24613, CVE-2025-24614, CVE-2025-24615, CVE-2025-24616, CVE-2025-24617, CVE-2025-24618, CVE-2025-24619, CVE-2025-24620, CVE-2025-24621, CVE-2025-24622, CVE-2025-24623, CVE-2025-24624, CVE-2025-24625, CVE-2025-24626, CVE-2025-24627, CVE-2025-24629, CVE-2025-24630, CVE-2025-24631, CVE-2025-24632, CVE-2025-24633, CVE-2025-24634, CVE-2025-24635, CVE-2025-24636, CVE-2025-24637, CVE-2025-24638, CVE-2025-24639, CVE-2025-24640, CVE-2025-24641, CVE-2025-24642, CVE-2025-24644, CVE-2025-24645, CVE-2025-24646, CVE-2025-24647, CVE-2025-24648, CVE-2025-24649, CVE-2025-24650, CVE-2025-24652, CVE-2025-24653, CVE-2025-24654, CVE-2025-24655, CVE-2025-24656, CVE-2025-24657, CVE-2025-24658, CVE-2025-24659, CVE-2025-24660, CVE-2025-24661, CVE-2025-24662, CVE-2025-24663, CVE-2025-24664, CVE-2025-24665, CVE-2025-24666, CVE-2025-24667, CVE-2025-24668, CVE-2025-24669, CVE-2025-24670, CVE-2025-24671, CVE-2025-24672, CVE-2025-24673, CVE-2025-24674, CVE-2025-24675, CVE-2025-24676, CVE-2025-24677, CVE-2025-24678, CVE-2025-24679, CVE-2025-24680, CVE-2025-24681, CVE-2025-24682, CVE-2025-24683, CVE-2025-24684, CVE-2025-24685, CVE-2025-24686, CVE-2025-24687, CVE-2025-24688, CVE-2025-24689, CVE-2025-24690, CVE-2025-24691, CVE-2025-24692, CVE-2025-24693, CVE-2025-24694, CVE-2025-24695, CVE-2025-24696, CVE-2025-24697, CVE-2025-24698, CVE-2025-24699, CVE-2025-24700, CVE-2025-24701, CVE-2025-24702, CVE-2025-24703, CVE-2025-24704, CVE-2025-24705, CVE-2025-24706, CVE-2025-24707, CVE-2025-24708, CVE-2025-24709, CVE-2025-24710, CVE-2025-24711, CVE-2025-24712, CVE-2025-24713, CVE-2025-24714, CVE-2025-24715, CVE-2025-24716, CVE-2025-24717, CVE-2025-24718, CVE-2025-24719, CVE-2025-24720, CVE-2025-24721, CVE-2025-24722, CVE-2025-24723, CVE-2025-24724, CVE-2025-24725, CVE-2025-24726, CVE-2025-24727, CVE-2025-24728, CVE-2025-24729, CVE-2025-24730, CVE-2025-24731, CVE-2025-24732, CVE-2025-24733, CVE-2025-24734, CVE-2025-24736, CVE-2025-24737, CVE-2025-24738, CVE-2025-24739, CVE-2025-24740, CVE-2025-24741, CVE-2025-24742, CVE-2025-24743, CVE-2025-24744, CVE-2025-24745, CVE-2025-24746, CVE-2025-24747, CVE-2025-24748, CVE-2025-24749, CVE-2025-24750, CVE-2025-24751, CVE-2025-24752, CVE-2025-24753, CVE-2025-24754, CVE-2025-24755, CVE-2025-24756, CVE-2025-24757, CVE-2025-24758, CVE-2025-24759, CVE-2025-24760, CVE-2025-24761, CVE-2025-24762, CVE-2025-24763, CVE-2025-24764, CVE-2025-24765, CVE-2025-24766, CVE-2025-24767, CVE-2025-24768, CVE-2025-24769, CVE-2025-24770, CVE-2025-24771, CVE-2025-24772, CVE-2025-24773, CVE-2025-24774, CVE-2025-24775, CVE-2025-24776, CVE-2025-24777, CVE-2025-24778, CVE-2025-24779, CVE-2025-24780, CVE-2025-24781, CVE-2025-24782, CVE-2025-25070, CVE-2025-25071, CVE-2025-25072, CVE-2025-25073, CVE-2025-25074, CVE-2025-25075, CVE-2025-25076, CVE-2025-25077, CVE-2025-25078, CVE-2025-25079, CVE-2025-25080, CVE-2025-25081, CVE-2025-25082, CVE-2025-25083, CVE-2025-25085, CVE-2025-25086, CVE-2025-25087, CVE-2025-25088, CVE-2025-25089, CVE-2025-25090, CVE-2025-25091, CVE-2025-25092, CVE-2025-25093, CVE-2025-25094, CVE-2025-25095, CVE-2025-25096, CVE-2025-25097, CVE-2025-25098, CVE-2025-25099, CVE-2025-25100, CVE-2025-25101, CVE-2025-25102, CVE-2025-25103, CVE-2025-25104, CVE-2025-25105, CVE-2025-25106, CVE-2025-25107, CVE-2025-25108, CVE-2025-25109, CVE-2025-25110, CVE-2025-25111, CVE-2025-25112, CVE-2025-25113, CVE-2025-25114, CVE-2025-25115, CVE-2025-25116, CVE-2025-25117, CVE-2025-25118, CVE-2025-25119, CVE-2025-25120, CVE-2025-25121, CVE-2025-25122, CVE-2025-25123, CVE-2025-25124, CVE-2025-25125, CVE-2025-25126, CVE-2025-25127, CVE-2025-25128, CVE-2025-25129, CVE-2025-25130, CVE-2025-25131, CVE-2025-25132, CVE-2025-25133, CVE-2025-25134, CVE-2025-25135, CVE-2025-25136, CVE-2025-25137, CVE-2025-25138, CVE-2025-25139, CVE-2025-25140, CVE-2025-25141, CVE-2025-25142, CVE-2025-25143, CVE-2025-25144, CVE-2025-25145, CVE-2025-25146, CVE-2025-25147, CVE-2025-25148, CVE-2025-25149, CVE-2025-25150, CVE-2025-25151, CVE-2025-25152, CVE-2025-25153, CVE-2025-25154, CVE-2025-25155, CVE-2025-25156, CVE-2025-25157, CVE-2025-25158, CVE-2025-25159, CVE-2025-25160, CVE-2025-25161, CVE-2025-25162, CVE-2025-25163, CVE-2025-25164, CVE-2025-25165, CVE-2025-25166, CVE-2025-25167, CVE-2025-25168, CVE-2025-25169, CVE-2025-25170, CVE-2025-25171, CVE-2025-25172, CVE-2025-25173, CVE-2025-25174, CVE-2025-26534, CVE-2025-26535, CVE-2025-26536, CVE-2025-26537, CVE-2025-26538, CVE-2025-26539, CVE-2025-26540, CVE-2025-26541, CVE-2025-26542, CVE-2025-26543, CVE-2025-26544, CVE-2025-26545, CVE-2025-26546, CVE-2025-26547, CVE-2025-26548, CVE-2025-26549, CVE-2025-26550, CVE-2025-26551, CVE-2025-26552, CVE-2025-26553, CVE-2025-26554, CVE-2025-26555, CVE-2025-26556, CVE-2025-26557, CVE-2025-26558, CVE-2025-26559, CVE-2025-26560, CVE-2025-26561, CVE-2025-26562, CVE-2025-26563, CVE-2025-26564, CVE-2025-26565, CVE-2025-26566, CVE-2025-26567, CVE-2025-26568, CVE-2025-26569, CVE-2025-26570, CVE-2025-26571, CVE-2025-26572, CVE-2025-26573, CVE-2025-26574, CVE-2025-26575, CVE-2025-26576, CVE-2025-26577, CVE-2025-26578, CVE-2025-26579, CVE-2025-26580, CVE-2025-26581, CVE-2025-26582, CVE-2025-26583, CVE-2025-26584, CVE-2025-26585, CVE-2025-26586, CVE-2025-26587, CVE-2025-26588, CVE-2025-26589, CVE-2025-26590, CVE-2025-26591, CVE-2025-26592, CVE-2025-26593, CVE-2025-26730, CVE-2025-26731, CVE-2025-26732, CVE-2025-26733, CVE-2025-26734, CVE-2025-26735, CVE-2025-26736, CVE-2025-26737, CVE-2025-26738, CVE-2025-26739, CVE-2025-26740, CVE-2025-26741, CVE-2025-26742, CVE-2025-26743, CVE-2025-26744, CVE-2025-26745, CVE-2025-26746, CVE-2025-26747, CVE-2025-26748, CVE-2025-26749, CVE-2025-26750, CVE-2025-26751, CVE-2025-26752, CVE-2025-26753, CVE-2025-26754, CVE-2025-26755, CVE-2025-26756, CVE-2025-26757, CVE-2025-26758, CVE-2025-26759, CVE-2025-26761, CVE-2025-26762, CVE-2025-26763, CVE-2025-26764, CVE-2025-26765, CVE-2025-26766, CVE-2025-26767, CVE-2025-26768, CVE-2025-26769, CVE-2025-26770, CVE-2025-26771, CVE-2025-26772, CVE-2025-26773, CVE-2025-26774, CVE-2025-26775, CVE-2025-26776, CVE-2025-26778, CVE-2025-26779, CVE-2025-26867, CVE-2025-26868, CVE-2025-26870, CVE-2025-26871, CVE-2025-26872, CVE-2025-26873, CVE-2025-26874, CVE-2025-26875, CVE-2025-26876, CVE-2025-26877, CVE-2025-26878, CVE-2025-26880, CVE-2025-26881, CVE-2025-26882, CVE-2025-26883, CVE-2025-26884, CVE-2025-26886, CVE-2025-26887, CVE-2025-26888, CVE-2025-26889, CVE-2025-26890, CVE-2025-26891, CVE-2025-26892, CVE-2025-26893, CVE-2025-26894, CVE-2025-26895, CVE-2025-26896, CVE-2025-26897, CVE-2025-26898, CVE-2025-26899, CVE-2025-26900, CVE-2025-26901, CVE-2025-26902, CVE-2025-26903, CVE-2025-26904, CVE-2025-26905, CVE-2025-26906, CVE-2025-26907, CVE-2025-26908, CVE-2025-26909, CVE-2025-26910, CVE-2025-26911, CVE-2025-26912, CVE-2025-26913, CVE-2025-26914, CVE-2025-26915, CVE-2025-26916, CVE-2025-26918, CVE-2025-26919, CVE-2025-26920, CVE-2025-26921, CVE-2025-26922, CVE-2025-26923, CVE-2025-26924, CVE-2025-26925, CVE-2025-26926, CVE-2025-26927, CVE-2025-26928, CVE-2025-26929, CVE-2025-26930, CVE-2025-26931, CVE-2025-26932, CVE-2025-26933, CVE-2025-26934, CVE-2025-26935, CVE-2025-26936, CVE-2025-26937, CVE-2025-26938, CVE-2025-26939, CVE-2025-26940, CVE-2025-26941, CVE-2025-26943, CVE-2025-26944, CVE-2025-26945, CVE-2025-26946, CVE-2025-26947, CVE-2025-26948, CVE-2025-26949, CVE-2025-26950, CVE-2025-26951, CVE-2025-26952, CVE-2025-26954, CVE-2025-26955, CVE-2025-26956, CVE-2025-26957, CVE-2025-26959, CVE-2025-26960, CVE-2025-26961, CVE-2025-26962, CVE-2025-26963, CVE-2025-26964, CVE-2025-26966, CVE-2025-26967, CVE-2025-26968, CVE-2025-26969, CVE-2025-26970, CVE-2025-26971, CVE-2025-26972, CVE-2025-26973, CVE-2025-26974, CVE-2025-26975, CVE-2025-26976, CVE-2025-26977, CVE-2025-26978, CVE-2025-26979, CVE-2025-26980, CVE-2025-26981, CVE-2025-26982, CVE-2025-26983, CVE-2025-26984, CVE-2025-26985, CVE-2025-26986, CVE-2025-26987, CVE-2025-26988, CVE-2025-26989, CVE-2025-26990, CVE-2025-26991, CVE-2025-26992, CVE-2025-26993, CVE-2025-26994, CVE-2025-26995, CVE-2025-26996, CVE-2025-26997, CVE-2025-26998, CVE-2025-26999, CVE-2025-27000, CVE-2025-27001, CVE-2025-27002, CVE-2025-27003, CVE-2025-27004, CVE-2025-27005, CVE-2025-27006, CVE-2025-27007, CVE-2025-27008, CVE-2025-27009, CVE-2025-27010, CVE-2025-27011, CVE-2025-27012, CVE-2025-27013, CVE-2025-27014, CVE-2025-27015, CVE-2025-27016, CVE-2025-27263, CVE-2025-27264, CVE-2025-27265, CVE-2025-27266, CVE-2025-27267, CVE-2025-27268, CVE-2025-27269, CVE-2025-27270, CVE-2025-27271, CVE-2025-27272, CVE-2025-27273, CVE-2025-27274, CVE-2025-27275, CVE-2025-27276, CVE-2025-27277, CVE-2025-27278, CVE-2025-27279, CVE-2025-27280, CVE-2025-27281, CVE-2025-27282, CVE-2025-27283, CVE-2025-27284, CVE-2025-27285, CVE-2025-27286, CVE-2025-27287, CVE-2025-27288, CVE-2025-27289, CVE-2025-27290, CVE-2025-27291, CVE-2025-27292, CVE-2025-27293, CVE-2025-27294, CVE-2025-27295, CVE-2025-27296, CVE-2025-27297, CVE-2025-27298, CVE-2025-27299, CVE-2025-27300, CVE-2025-27301, CVE-2025-27302, CVE-2025-27303, CVE-2025-27304, CVE-2025-27305, CVE-2025-27306, CVE-2025-27307, CVE-2025-27308, CVE-2025-27309, CVE-2025-27310, CVE-2025-27311, CVE-2025-27312, CVE-2025-27313, CVE-2025-27314, CVE-2025-27315, CVE-2025-27316, CVE-2025-27317, CVE-2025-27318, CVE-2025-27319, CVE-2025-27320, CVE-2025-27321, CVE-2025-27322, CVE-2025-27323, CVE-2025-27324, CVE-2025-27325, CVE-2025-27326, CVE-2025-27327, CVE-2025-27328, CVE-2025-27329, CVE-2025-27330, CVE-2025-27331, CVE-2025-27332, CVE-2025-27333, CVE-2025-27334, CVE-2025-27335, CVE-2025-27336, CVE-2025-27337, CVE-2025-27338, CVE-2025-27339, CVE-2025-27340, CVE-2025-27341, CVE-2025-27342, CVE-2025-27343, CVE-2025-27344, CVE-2025-27345, CVE-2025-27347, CVE-2025-27348, CVE-2025-27349, CVE-2025-27350, CVE-2025-27351, CVE-2025-27352, CVE-2025-27353, CVE-2025-27354, CVE-2025-27355, CVE-2025-27356, CVE-2025-27357, CVE-2025-27358, CVE-2025-27359, CVE-2025-27360, CVE-2025-27361, CVE-2025-27362, CVE-2025-28855, CVE-2025-28856, CVE-2025-28857, CVE-2025-28859, CVE-2025-28860, CVE-2025-28861, CVE-2025-28862, CVE-2025-28863, CVE-2025-28864, CVE-2025-28865, CVE-2025-28866, CVE-2025-28867, CVE-2025-28868, CVE-2025-28869, CVE-2025-28870, CVE-2025-28871, CVE-2025-28872, CVE-2025-28873, CVE-2025-28874, CVE-2025-28875, CVE-2025-28876, CVE-2025-28877, CVE-2025-28878, CVE-2025-28879, CVE-2025-28880, CVE-2025-28881, CVE-2025-28882, CVE-2025-28883, CVE-2025-28884, CVE-2025-28885, CVE-2025-28886, CVE-2025-28887, CVE-2025-28888, CVE-2025-28889, CVE-2025-28890, CVE-2025-28891, CVE-2025-28892, CVE-2025-28893, CVE-2025-28894, CVE-2025-28895, CVE-2025-28896, CVE-2025-28897, CVE-2025-28898, CVE-2025-28899, CVE-2025-28900, CVE-2025-28901, CVE-2025-28902, CVE-2025-28903, CVE-2025-28904, CVE-2025-28905, CVE-2025-28906, CVE-2025-28907, CVE-2025-28908, CVE-2025-28909, CVE-2025-28910, CVE-2025-28911, CVE-2025-28912, CVE-2025-28913, CVE-2025-28914, CVE-2025-28915, CVE-2025-28916, CVE-2025-28917, CVE-2025-28918, CVE-2025-28919, CVE-2025-28920, CVE-2025-28921, CVE-2025-28922, CVE-2025-28923, CVE-2025-28924, CVE-2025-28925, CVE-2025-28926, CVE-2025-28927, CVE-2025-28928, CVE-2025-28929, CVE-2025-28930, CVE-2025-28931, CVE-2025-28932,... Date: Thu, 23 Apr 2026 14:56:21 +0000 ] Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com> --- .../linux/cve-exclusion_6.12.inc | 230 +++++++++++++++++- 1 file changed, 219 insertions(+), 11 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc index 2ae4f461e5..88a2da476c 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.12.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.12.inc @@ -1,11 +1,11 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2026-04-14 21:08:51.681656+00:00 for kernel version 6.12.81 -# From linux_kernel_cves cve_2026-04-14_2000Z-1-g4a280a922d3 +# Generated at 2026-04-23 14:57:09.231573+00:00 for kernel version 6.12.83 +# From linux_kernel_cves cve_2026-04-23_1300Z-1-g8aa5543fc90 python check_kernel_cve_status_version() { - this_version = "6.12.81" + this_version = "6.12.83" kernel_version = d.getVar("LINUX_VERSION") if kernel_version != this_version: bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) @@ -15308,7 +15308,7 @@ CVE_STATUS[CVE-2025-21707] = "cpe-stable-backport: Backported in 6.12.13" CVE_STATUS[CVE-2025-21708] = "cpe-stable-backport: Backported in 6.12.13" -# CVE-2025-21709 needs backporting (fixed from 6.14) +CVE_STATUS[CVE-2025-21709] = "cpe-stable-backport: Backported in 6.12.83" CVE_STATUS[CVE-2025-21710] = "cpe-stable-backport: Backported in 6.12.13" @@ -18674,7 +18674,7 @@ CVE_STATUS[CVE-2025-39928] = "fixed-version: only affects 6.13 onwards" CVE_STATUS[CVE-2025-39929] = "cpe-stable-backport: Backported in 6.12.49" -CVE_STATUS[CVE-2025-39930] = "fixed-version: only affects 6.14 onwards" +CVE_STATUS[CVE-2025-39930] = "cpe-stable-backport: Backported in 6.12.82" CVE_STATUS[CVE-2025-39931] = "cpe-stable-backport: Backported in 6.12.49" @@ -20448,7 +20448,7 @@ CVE_STATUS[CVE-2026-22984] = "cpe-stable-backport: Backported in 6.12.66" CVE_STATUS[CVE-2026-22985] = "cpe-stable-backport: Backported in 6.12.80" -# CVE-2026-22986 needs backporting (fixed from 6.19) +CVE_STATUS[CVE-2026-22986] = "cpe-stable-backport: Backported in 6.12.83" CVE_STATUS[CVE-2026-22987] = "fixed-version: only affects 6.17 onwards" @@ -21080,7 +21080,7 @@ CVE_STATUS[CVE-2026-23300] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23301] = "fixed-version: only affects 6.19 onwards" -# CVE-2026-23302 needs backporting (fixed from 7.0) +CVE_STATUS[CVE-2026-23302] = "cpe-stable-backport: Backported in 6.12.82" CVE_STATUS[CVE-2026-23303] = "cpe-stable-backport: Backported in 6.12.77" @@ -21134,7 +21134,7 @@ CVE_STATUS[CVE-2026-23328] = "fixed-version: only affects 6.14 onwards" CVE_STATUS[CVE-2026-23329] = "fixed-version: only affects 6.18 onwards" -# CVE-2026-23330 needs backporting (fixed from 7.0) +CVE_STATUS[CVE-2026-23330] = "cpe-stable-backport: Backported in 6.12.82" CVE_STATUS[CVE-2026-23331] = "fixed-version: only affects 6.13 onwards" @@ -21220,7 +21220,7 @@ CVE_STATUS[CVE-2026-23372] = "cpe-stable-backport: Backported in 6.12.77" CVE_STATUS[CVE-2026-23373] = "cpe-stable-backport: Backported in 6.12.77" -# CVE-2026-23374 needs backporting (fixed from 7.0) +CVE_STATUS[CVE-2026-23374] = "cpe-stable-backport: Backported in 6.12.82" CVE_STATUS[CVE-2026-23375] = "cpe-stable-backport: Backported in 6.12.78" @@ -21356,7 +21356,7 @@ CVE_STATUS[CVE-2026-23440] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-23441] = "cpe-stable-backport: Backported in 6.12.78" -# CVE-2026-23442 needs backporting (fixed from 7.0) +CVE_STATUS[CVE-2026-23442] = "cpe-stable-backport: Backported in 6.12.83" CVE_STATUS[CVE-2026-23443] = "cpe-stable-backport: Backported in 6.12.78" @@ -21458,7 +21458,7 @@ CVE_STATUS[CVE-2026-31405] = "cpe-stable-backport: Backported in 6.12.78" CVE_STATUS[CVE-2026-31406] = "cpe-stable-backport: Backported in 6.12.80" -# CVE-2026-31407 needs backporting (fixed from 7.0) +CVE_STATUS[CVE-2026-31407] = "cpe-stable-backport: Backported in 6.12.83" CVE_STATUS[CVE-2026-31408] = "cpe-stable-backport: Backported in 6.12.80" @@ -21502,5 +21502,213 @@ CVE_STATUS[CVE-2026-31427] = "cpe-stable-backport: Backported in 6.12.80" CVE_STATUS[CVE-2026-31428] = "cpe-stable-backport: Backported in 6.12.80" +CVE_STATUS[CVE-2026-31429] = "cpe-stable-backport: Backported in 6.12.82" + +CVE_STATUS[CVE-2026-31430] = "cpe-stable-backport: Backported in 6.12.82" + +# CVE-2026-31431 needs backporting (fixed from 7.0) + +CVE_STATUS[CVE-2026-31432] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31433] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31434] = "cpe-stable-backport: Backported in 6.12.80" + +# CVE-2026-31435 needs backporting (fixed from 7.0) + +CVE_STATUS[CVE-2026-31436] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31437] = "fixed-version: only affects 6.18.17 onwards" + +CVE_STATUS[CVE-2026-31438] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31439] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31440] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31441] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31442] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-31443] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-31444] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31445] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-31446] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31447] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31448] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31449] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31450] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31451] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31452] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31453] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31454] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31455] = "cpe-stable-backport: Backported in 6.12.80" + +# CVE-2026-31456 needs backporting (fixed from 7.0) + +CVE_STATUS[CVE-2026-31457] = "fixed-version: only affects 6.17 onwards" + +CVE_STATUS[CVE-2026-31458] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31459] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-31460] = "fixed-version: only affects 6.19 onwards" + +# CVE-2026-31461 needs backporting (fixed from 7.0) + +CVE_STATUS[CVE-2026-31462] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31463] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-31464] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31465] = "fixed-version: only affects 6.16 onwards" + +CVE_STATUS[CVE-2026-31466] = "cpe-stable-backport: Backported in 6.12.81" + +CVE_STATUS[CVE-2026-31467] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31468] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-31469] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31470] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31471] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-31472] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-31473] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31474] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31475] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-31476] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31477] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31478] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31479] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31480] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31481] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-31482] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31483] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31484] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-31485] = "cpe-stable-backport: Backported in 6.12.80" + +# CVE-2026-31486 needs backporting (fixed from 7.0) + +CVE_STATUS[CVE-2026-31487] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31488] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31489] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31490] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-31491] = "fixed-version: only affects 6.18 onwards" + +CVE_STATUS[CVE-2026-31492] = "cpe-stable-backport: Backported in 6.12.80" + +# CVE-2026-31493 needs backporting (fixed from 7.0) + +CVE_STATUS[CVE-2026-31494] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31495] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31496] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31497] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31498] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31499] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-31500] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31501] = "fixed-version: only affects 6.15 onwards" + +CVE_STATUS[CVE-2026-31502] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31503] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31504] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31505] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31506] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31507] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31508] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31509] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31510] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31511] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31512] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31513] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31514] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31515] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31516] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31517] = "fixed-version: only affects 6.14 onwards" + +CVE_STATUS[CVE-2026-31518] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31519] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31520] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31521] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31522] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31523] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31524] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31525] = "cpe-stable-backport: Backported in 6.12.80" + +# CVE-2026-31526 needs backporting (fixed from 7.0) + +CVE_STATUS[CVE-2026-31527] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31528] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31529] = "fixed-version: only affects 6.19 onwards" + +CVE_STATUS[CVE-2026-31530] = "cpe-stable-backport: Backported in 6.12.80" + +CVE_STATUS[CVE-2026-31531] = "cpe-stable-backport: Backported in 6.12.83" + +# CVE-2026-31532 has no known resolution + CVE_STATUS[CVE-2026-31788] = "cpe-stable-backport: Backported in 6.12.78" -- 2.43.0 ^ permalink raw reply related [flat|nested] 20+ messages in thread
* Re: [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield ` (17 preceding siblings ...) 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 18/18] linux-yocto/6.12: update CVE exclusions (6.12.83) bruce.ashfield @ 2026-04-24 15:00 ` Yoann Congal 18 siblings, 0 replies; 20+ messages in thread From: Yoann Congal @ 2026-04-24 15:00 UTC (permalink / raw) To: bruce.ashfield; +Cc: openembedded-core On Thu Apr 23, 2026 at 5:44 PM CEST, bruce.ashfield wrote: > From: Bruce Ashfield <bruce.ashfield@gmail.com> > > Hi all, > > I know that whinlatter is about to go EOL, but here are the stable > updates I've been tracking for the kernel. Sorry Bruce but I've stopped taking patch a while before you sent those. They won't be merged on branch. The same goes for the kirkstone series. > I'll continue to update 6.12 even after whinlatter is no longer > being udpated. You mean you will keep posting these upgrades on list for users that want them? Regards, > > Bruce > > openembedded-core (18): > linux-yocto/6.12: update to v6.12.72 > linux-yocto/6.12: update CVE exclusions > linux-yocto/6.12: update to v6.12.73 > linux-yocto/6.12: update CVE exclusions > linux-yocto/6.12: update to v6.12.74 > linux-yocto/6.12: update CVE exclusions > linux-yocto/6.12: update to v6.12.76 > linux-yocto/6.12: update CVE exclusions > linux-yocto/6.12: update to v6.12.77 > linux-yocto/6.12: update CVE exclusions > linux-yocto/6.12: update to v6.12.79 > linux-yocto/6.12: update CVE exclusions > linux-yocto/6.12: update to v6.12.80 > linux-yocto/6.12: update CVE exclusions > linux-yocto/6.12: update to v6.12.81 > linux-yocto/6.12: update CVE exclusions > linux-yocto/6.12: update to v6.12.83 > linux-yocto/6.12: update CVE exclusions > > openembedded-core: > meta/recipes-kernel/linux/cve-exclusion_6.12.inc | 1148 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++--------- > meta/recipes-kernel/linux/linux-yocto-rt_6.12.bb | 6 +- > meta/recipes-kernel/linux/linux-yocto-tiny_6.12.bb | 6 +- > meta/recipes-kernel/linux/linux-yocto_6.12.bb | 28 +++--- > 4 files changed, 1127 insertions(+), 61 deletions(-) -- Yoann Congal Smile ECS ^ permalink raw reply [flat|nested] 20+ messages in thread
end of thread, other threads:[~2026-04-24 15:01 UTC | newest] Thread overview: 20+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2026-04-23 15:44 [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 bruce.ashfield 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 01/18] linux-yocto/6.12: update to v6.12.72 bruce.ashfield 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 02/18] linux-yocto/6.12: update CVE exclusions (6.12.72) bruce.ashfield 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 03/18] linux-yocto/6.12: update to v6.12.73 bruce.ashfield 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 04/18] linux-yocto/6.12: update CVE exclusions (6.12.73) bruce.ashfield 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 05/18] linux-yocto/6.12: update to v6.12.74 bruce.ashfield 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 06/18] linux-yocto/6.12: update CVE exclusions (6.12.74) bruce.ashfield 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 07/18] linux-yocto/6.12: update to v6.12.76 bruce.ashfield 2026-04-23 15:44 ` [openembedded-core][whinlatter][PATCH 08/18] linux-yocto/6.12: update CVE exclusions (6.12.76) bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 09/18] linux-yocto/6.12: update to v6.12.77 bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 10/18] linux-yocto/6.12: update CVE exclusions (6.12.77) bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 11/18] linux-yocto/6.12: update to v6.12.79 bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 12/18] linux-yocto/6.12: update CVE exclusions (6.12.79) bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 13/18] linux-yocto/6.12: update to v6.12.80 bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 14/18] linux-yocto/6.12: update CVE exclusions (6.12.80) bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 15/18] linux-yocto/6.12: update to v6.12.81 bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 16/18] linux-yocto/6.12: update CVE exclusions (6.12.81) bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 17/18] linux-yocto/6.12: update to v6.12.83 bruce.ashfield 2026-04-23 15:45 ` [openembedded-core][whinlatter][PATCH 18/18] linux-yocto/6.12: update CVE exclusions (6.12.83) bruce.ashfield 2026-04-24 15:00 ` [whinlatter][PATCH 0/18] linux-yocto: stable updates to 6.12 Yoann Congal
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox